Loading [MathJax]/jax/element/mml/optable/GeneralPunctuation.js
Research article Special Issues

Calculation and determination of radioactivity in the old district of Najaf by using the track detector CR-39 and geographical information systems (GIS) methods

  • Received: 24 July 2022 Revised: 03 October 2022 Accepted: 19 October 2022 Published: 26 October 2022
  • This research aims to study the radiation concentration distribution of the old District of Najaf (Iraq), where 15 samples were taken from featured sites in the District, which represents archaeological, religious, and heritage sites. Track detector CR-39 was used to calculate the concentration of three different soil weights for each sample site after being exposed for a month. Geographical information systems (GIS) were used to distribute the radioactive concentration on the sites of the samples, where two interpolation methods, namely the inverse distance weight method (IDW) and the triangle irregular network method (NIT), to study the distribution of the radioactivity concentration. The study showed that the western part of the district, which includes the old cemetery and the areas adjacent to the Najaf water depression, are characterized by a relatively high amount of radioactivity concentration compared to the eastern part, which represent the residential areas, and for all sample weights.

    Citation: Adil A Mansoor, Hameed M Abduljabbar. Calculation and determination of radioactivity in the old district of Najaf by using the track detector CR-39 and geographical information systems (GIS) methods[J]. AIMS Geosciences, 2022, 8(4): 709-717. doi: 10.3934/geosci.2022039

    Related Papers:

    [1] Yanchao Liu, Pengzhou Zhang, Deyu Li, Junpeng Gong . Dynamic analysis and optimum control of a rumor spreading model with multivariate gatekeepers. AIMS Mathematics, 2024, 9(11): 31658-31678. doi: 10.3934/math.20241522
    [2] Xuefeng Yue, Weiwei Zhu . The dynamics and control of an ISCRM fractional-order rumor propagation model containing media reports. AIMS Mathematics, 2024, 9(4): 9721-9745. doi: 10.3934/math.2024476
    [3] Xintong Wang, Sida Kang, Yuhan Hu . Dynamic analysis of a rumor propagation model considering individual identification ability. AIMS Mathematics, 2025, 10(2): 2295-2320. doi: 10.3934/math.2025107
    [4] Hongshuang Wang, Sida Kang, Yuhan Hu . Dynamic analysis and optimal control of rumor propagation models considering different education levels and hesitation mechanisms. AIMS Mathematics, 2024, 9(8): 20089-20117. doi: 10.3934/math.2024979
    [5] Hui Wang, Shuzhen Yu, Haijun Jiang . Rumor model on social networks contemplating self-awareness and saturated transmission rate. AIMS Mathematics, 2024, 9(9): 25513-25531. doi: 10.3934/math.20241246
    [6] Liuqin Huang, Jinling Wang, Jiarong Li, Tianlong Ma . Analysis of rumor spreading with different usage ranges in a multilingual environment. AIMS Mathematics, 2024, 9(9): 24018-24038. doi: 10.3934/math.20241168
    [7] Rongrong Yin, Ahmadjan Muhammadhaji . Dynamics in a delayed rumor propagation model with logistic growth and saturation incidence. AIMS Mathematics, 2024, 9(2): 4962-4989. doi: 10.3934/math.2024241
    [8] Xin Yi, Rong Liu . An age-dependent hybrid system for optimal contraception control of vermin. AIMS Mathematics, 2025, 10(2): 2619-2633. doi: 10.3934/math.2025122
    [9] Liyuan Xia, Jianjun Wang, Shihua Fu, Yuxin Gao . Control design to minimize the number of bankrupt players for networked evolutionary games with bankruptcy mechanism. AIMS Mathematics, 2024, 9(12): 35702-35720. doi: 10.3934/math.20241694
    [10] Houssine Zine, Abderrahim El Adraoui, Delfim F. M. Torres . Mathematical analysis, forecasting and optimal control of HIV/AIDS spatiotemporal transmission with a reaction diffusion SICA model. AIMS Mathematics, 2022, 7(9): 16519-16535. doi: 10.3934/math.2022904
  • This research aims to study the radiation concentration distribution of the old District of Najaf (Iraq), where 15 samples were taken from featured sites in the District, which represents archaeological, religious, and heritage sites. Track detector CR-39 was used to calculate the concentration of three different soil weights for each sample site after being exposed for a month. Geographical information systems (GIS) were used to distribute the radioactive concentration on the sites of the samples, where two interpolation methods, namely the inverse distance weight method (IDW) and the triangle irregular network method (NIT), to study the distribution of the radioactivity concentration. The study showed that the western part of the district, which includes the old cemetery and the areas adjacent to the Najaf water depression, are characterized by a relatively high amount of radioactivity concentration compared to the eastern part, which represent the residential areas, and for all sample weights.



    Nowadays, with the rapid development of network and information technology, the distance between people is shortened by the network. The common way of information transmission has also changed from the traditional face-to-face transmission to online social networks (OSN), such as Facebook, Twitter, etc. At the same time, the spread of inaccurate information, or rumors[1,2], through OSN has become very rapid. The spread of rumors will bring economic losses and adverse political effects to the society[3]. Therefore, it is of practical importance to effectively control the spread of rumors.

    Scholars at home and abroad have conducted in-depth research on the spread of rumors on the Internet. In recent years, some scholars have used game theory to discuss the antagonistic game relationship between rumor and anti-rumor[4,5,6,7]; some scholars have used graph convolution to study the rumor propagation model[8,9]; some scholars have extracted the characteristics of user behavior from the big data in social networks and studied the rumor propagation law through deep learning algorithm[10,11,12]; using biological models including infectious disease models to study the mechanism of rumor transmission is also a major research method[13,14,15,16,17].

    When spreading information (whether rumor or truth) on social networks, users can post comments representing their own views under the topic. The direction of public opinion will affect the spread of rumors or truth. In view of this situation, this paper establishes a node-based rumor propagation model under the comment mechanism by using the infectious disease model theory. The main contributions of this paper are as follows:

    ● First, we establish a node-level rumor-truth mixed propagation model based on the comment mechanism, so as to measure the influence of comment on rumors.

    ● Secondly, on this basis, we model the rumor-truth mixed problem based on comments as an optimal control problem, which is called uncertain-rumor-truth-comment (URTC) model.

    ● Thirdly, we prove that the model has the optimal control and obtain the optimal system for solving the model.

    ● Fourthly, by solving the corresponding optimal system, some optimal control strategies are given.

    ● Finally, through the sensitivity analysis of the relevant parameters of comments, the influence of comments on rumor propagation is further discussed.

    This work is conducive to better suppressing the spread of rumors. The main organization of this paper is as follows: In Section 2, we review some of the relevant work. In Section 3, we modeled the node-level URTC model for the rumor-truth propagation problem, and modeled the URTC problem into the optimal control problem. Section 4 makes a theoretical analysis of the optimal control problem and gives a strategy to control rumors through comments. Some optimal URTC strategies are given in Section 5. In Section 6, the influence of comments on rumor propagation is further revealed through the sensitivity analysis of parameters. The work is closed by Section 7.

    In this section, in order to illustrate the novelty of this work, we review the work related to this paper.

    Pioneering research on rumor propagation based on infectious disease models was conducted in 1964, when the first classic rumor propagation model DK model was proposed by Daley and Kendal [18,19]. Later, some scholars improved the DK model for different network structures, and the common point of these models is to assume that the network structures are homogeneous. In fact, with the improvement of people's cognition of the Internet, empirical findings have shown that many real world networks are highly structured and heterogeneous since the end of last century. Under the guidance of this cognition, Zanette[20,21] first proposed the rumor propagation model based on small-world network in 2001. In 2004, Moreno[22] built a mathematical model based on rumor propagation in a scale-free complex network. Many researchers[23,24,25,26,27,28,29,30,31,32] have conducted in-depth studies on rumor propagation in heterogeneous network structures.

    Since 2009, some scholars have studied the spread of infectious diseases[33,34,35], network security[36,37,38], software security[39,40,41] and other aspects based on the individual-level modeling method. Recently, some scholars have proposed a node-based rumor propagation model[42,43,44] by using the modeling method based on individual level. Compared with the rumor propagation model on heterogeneous networks, the node-level rumor propagation model not only considers the statistical data of topological attributes of the underlying network, but also the entire network structure, so it deeply reflects the influence of specific network structure on rumor propagation. Inspired by the node-level rumor propagation model, this paper considers the influence of comments on rumor propagation. Once an individual or organization publishes information online, ordinary people cannot judge whether the information is true or false. People may believe and spread the information, whether it is rumor or not. In fact, publicizing the truth is the main way to suppress rumor. In addition to choosing their own attitudes and disseminating them, some people who are exposed to information also post comments on the Internet to support their views and positions, and these comments will also influence the subsequent positions of people who are newly exposed to information. In other words, comments have an important impact on rumor propagation. On this basis, we establish a mixed rumor-truth propagation model based on comments. And it is modeled as an optimal control problem.

    In this section we consider the issue of rumor propagation on OSN with comments. Suppose that in the process of spreading rumors, some people will comment that represent their own views. And those comments may influence the opinions of those exposed to the rumor. This section is dedicated to this problem according to the following procedures: First, introduce the basic terms and symbols. Secondly, the node-level model of URTC rumor spreading model is established. Finally, the URTC problem is modeled as an optimal control problem.

    Assume that the number of nodes in the network is constant and the total number of users on the OSN is N, let G=(V,E) denote the topology of this network. Where V=(V1,V2,...,VN) represents the nodes of the network, N is the number of nodes in the network. Eij={Vi,Vj}E represents node Vj can sent messages to node Vi, so G is a directed network. Where A=(aij)N×N represents the adjacency matrix of network G. When aij=1, node Vj can forward rumors or truth to node Vi through the link. aij=0 means that node Vj cannot spread information to node Vi, whether it is rumors or truth.

    Suppose that the rumor and the truth are spread in the network G in the finite time horizon [0,T]. Assuming that at any time t in the time horizon, the state of a node can only be one of three states: uncertain, rumor-spreading and truth-spreading. The uncertain state means that the node cannot make a choice, neither believes in rumor nor the truth, so no information will be spread. The state of rumor-spreading is to believe and spread rumor. The state of truth-spreading is the belief and transmission of truth. Let Oi(t)=0,1 and 2 respectively indicate that node Vi is an uncertain state, rumor-spreading and truth-spreading at time t. Let

    O(t)=(O1(t),O2(t),...,ON(t)). (3.1)

    In order to solve the problem of rumor propagation under the comment mechanism, we introduce the following hypotheses:

    (1) Due to the influence of neighbor nodes who believe the rumor, an uncertain node Vi becomes rumor-spreading with probability βUNj=1aijχ{Oj(t)=1} on average.

    (2) Due to the influence of neighbor nodes who believe the truth, an uncertain node Vi becomes truth-spreading with probability γUNj=1aijχ{Oj(t)=2} on average.

    (3) Due to the influence of neighbor nodes who believe the rumor, a truth-spreading node Vi becomes rumor-spreading with probability βTNj=1aijχ{Oj(t)=1} on average, βUβT.

    (4) Due to the influence of neighbor nodes who believe the truth, a rumor-spreading node Vi becomes truth-spreading with probability γRNj=1aijχ{Oj(t)=2} on average, γUγR.

    (5) Due to the attenuation of memory, a rumor-spreading node becomes uncertain with probability δ on average.

    (6) The average probability of comments supporting rumor posted on the network is CR0.

    (7) The average probability of comments supporting truth posted on the network is CT0.

    (8) Due to the influence of comments supporting the rumor, a truth-spreading node Vi is transformed into rumor-spreading with probability α1 on average.

    (9) Due to the influence of comments supporting the rumor, an uncertain node Vi is transformed into rumor-spreading with probability α2 on average. Obviously, α1α2.

    (10) Due to the influence of comments supporting the truth, a rumor-spreading node Vi is transformed into truth-spreading with probability ρ1 on average.

    (11) Due to the influence of comments supporting the truth, an uncertain node Vi is transformed into truth-spreading with probability ρ2 on average. Obviously, ρ1ρ2.

    The above assumptions are independent of each other, and the state transition diagram of the node is shown in Figure 1. In practice, parameters βU,γU,βT,γR,δ,CR0,CT0,α1,α2,ρ1,ρ2 can be estimated from the information of the network.

    Figure 1.  Diagram of the rumor and truth mixed spreading with comments model.

    Then the vector O(t) represents the state of N nodes in the network at time t. Since some nodes will also publish comments representing their own opinions while spreading rumor and truth, this causes the status of nodes to change over time. Let Ui(t),Ri(t),Ti(t) denote the expected probabilities of node Vi being uncertain, rumor-spreading and truth-spreading at time t, respectively.

    Ui(t)=Pr{Oi(t)=0},Ri(t)=Pr{Oi(t)=1},Ti(t)=Pr{Oi(t)=2}. (3.2)

    Note that Ui(t)+Ri(t)+Ui(t)=1. The vector

    E(t)=(U(t),R(t),T(t)) (3.3)

    represents the expected state of node in the network at time t, where

    {U(t)=(U1(t),U2(t),...,UN(t)),R(t)=(R1(t),R2(t),...,RN(t)),T(t)=(T1(t),T2(t),...,TN(t)). (3.4)

    The rumor-truth hybrid with comments propagation model to be derived below conforms to the above hypothesis. The following system gives an equivalent form of the exact URTC model.

    {dUi(t)dt=[CR0α2jiRj(t)+βUNj=1aijRj(t)]Ui(t)[CT0ρ2jiTj(t)+γUNj=1aijTj(t)]Ui(t)+δ(Ri(t)+Ti(t)),dRi(t)dt=[CR0α2jiRj(t)+βUNj=1aijRj(t)]Ui(t)+[CR0α1jiRj(t)+βTNj=1aijRj(t)]Ti(t)[CT0ρ1jiTj(t)+γRNj=1aijTj(t)+δ]Ri(t),dTi(t)dt=[CT0ρ1jiTj(t)+γRNj=1aijTj(t)]Ri(t)+[CT0ρ2jiTj(t)+γUNj=1aijTj(t)]Ui(t)[δ+CR0α1jiRj(t)+βTNj=1aijRj(t)]Ti(t),0tT,1iN, (3.5)

    with the initial condition E(0)=E0.

    The system (3.5) may be written in system as

    {dE(t)dt=f1(E(t)),0tT,E(0)=E0. (3.6)

    Let C(t)=(CR(t),CT(t)),0tT, consider C(t) as the control variable of the URTC problem, where CR(t) represents the rumor control variable and CT(t) represents the truth control variable. The upper limit of this strategy is determined as shown in the following remarks:

    Remark 3.1. The upper limit ¯CR of CR(t) is determined by basic human rights, and CR(t) is controlled on the basis of comments CR0 spontaneously generated by rumor in the network, that is 0CR(t)¯CR1. When CR(t)=0, there is no human interference in rumor comments in the network. At this time, the comments supporting the rumor in the network are determined by the initial comments of the node. When CR(t)=1, comments supporting the rumor will disappear at time t.

    Remark 3.2. The manual intervention to the comments supporting the truth takes the form of increasing the number of comments supporting the truth, denoted as CT(t). The upper bound ¯CT of CT(t) is determined by the cost of increasing comments that agree with the truth, and by the size of the network.

    So we assume that the URTC strategy is

    C={C(t)L[0,T]2|0CR(t)¯CR,0CT(t)¯CT,0tT},

    where L[0,T] represents the set of all Lebesgue integrable functions defined on [0,T][45].

    In order to solve the problem of rumor control with a comment mechanism, we first evaluate the loss caused by the negative impact of rumor. First, assuming that the unit loss caused by the spreading rumor node Vi per unit time is a constant θ1i. Then the total loss caused by the spreading of rumor in the time horizon [0,T] can be expressed as

    L1(C)=T0Ni=1θ1iRi(t)dt. (3.7)

    The vector θ1=(θ11,θ12,...,θ1N) represents the unit loss caused by the rumor of each node.

    Secondly, assuming that the unit cost of controlling the comments supporting rumor per unit time is θ2. The cost of controlling the comments supporting rumor in the time horizon [0,T] can be expressed as

    L2(C)=T0θ2CR(t)CR0Ni=1Ri(t)dt. (3.8)

    Finally, assuming that the unit cost of pushing the comments supporting truth per unit time is θ3. The scale of the number of artificially increased comments is ζN, where N is the number of nodes in the network and ζ is the ratio of increased comments. The cost of pushing the comments supporting the truth in the time horizon [0,T] can be expressed as

    L3(C)=T0θ3CT(t)ζNdt. (3.9)

    Remark 3.3. The parameter θ1 is estimated by the adverse social impact caused by the spread of rumor, and the parameter θ2 is estimated by deleting the comments supporting the rumor in the OSN; the parameter θ3 is estimated by sending or publishing comments on supporting the truth.

    In summary, the expected loss of rumor spread is

    J(C)=L1(C)+L2(C)+L3(C)=T0Ni=1θ1iRi(t)dt+θ2T0CR(t)CR0Ni=1Ri(t)dt+θ3T0CT(t)ζNdtT0F(E(t),C(t))dt, (3.10)

    where

    F(E(t),C(t))=Ni=1θ1iRi(t)+θ2CR(t)CR0Ni=1Ri(t)+θ3CT(t)ζN. (3.11)

    Based on the above discussion and assumptions, this URTC problem is modeled as the following optimal control problem

    minCC=T0F(E(t),C(t))dtsubjectto
    {dUi(t)dt=[CR0(1CR(t))α2jiRj(t)+βUNj=1aijRj(t)]Ui(t)[CT0ρ2jiTj(t)+ζNCT(t)ρ2+γUNj=1aijTj(t)]Ui(t)+δ(Ri(t)+Ti(t)),dRi(t)dt=[CR0(1CR(t))α2jiRj(t)+βUNj=1aijRj(t)]Ui(t)+[CR0(1CR(t))α1jiRj(t)+βTNj=1aijRj(t)]Ti(t)[CT0ρ1jiTj(t)+ζNCT(t)ρ1+γRNj=1aijTj(t)+δ]Ri(t),dTi(t)dt=[CT0ρ1jiTj(t)+ζNCT(t)ρ1+γRNj=1aijTj(t)]Ri(t)+[CT0ρ2jiTj(t)+ζNCT(t)ρ2+γUNj=1aijTj(t)]Ui(t)[δ+CR0(1CR(t))α1jiRj(t)+βTNj=1aijRj(t)]Ti(t),E(0)=E0. (3.12)

    The associated rumor spreading model can be recast in matrix notation as

    {dE(t)dt=f2(E(t),C(t)),0tT,E(0)=E0. (3.13)

    We refer to this optimal control problem as the URTC* problem. This model can be described as the following 20-tuple problem:

    Φ=(G,βU,βT,γU,γR,δ,¯CR,¯CT,α1,α2,ρ1,ρ2,CR0,CT0,θ1,θ2,θ3,ζ,T,E0) (3.14)

    First, we first prove that this problem is an optimal control problem and can be solved. So we derive the following Lemma[46]:

    Lemma 4.1. The URTC* problem is an optimal control if the following five conditions are held simultaneously.

    (1) Cis convex and closed.

    (2) There exists CC such that the system (3.13) is solvable.

    (3) f2(E,C) is bounded by a linear function in E.

    (4) F(E,C) is convex on C.

    (5) There exist ρ>1,d1>0, and d2 such that F(E,C)d1.

    Then we can conclude the following Theorem.

    Theorem 4.1. This URTC* problem is an optimal control problem.

    Proof. First, let C(t) = (C_R(t), C_T(t)) be a limit point of \mathbb{C} . Then there exists a sequence of points of \mathbb{C} , C^{(n)}(t) = (C_R^{(n)}(t), C_T^{(n)}(t)), n = 1, 2, ..., that approaches C(t) . Since

    0\leq C_R(t) = \lim\limits_{n\rightarrow \infty} C_R^{(n)}(t)\leq \overline{C}_R, 0\leq C_T(t) = \lim\limits_{n\rightarrow \infty} C_T^{(n)}(t)\leq \overline{C}_T, 0\leq t\leq T.

    Hence, \mathbb{C} is closed. Let C^{(1)}, C^{(2)}\in\mathbb{C}, 0 < \eta < 1, \hat{C} = (1-\eta)C^{(1)}+\eta C^{(2)} . As L[0, T]^2 is a real vector space, we have \hat{C}\in L[0, T]^2 and 0\leq (1-\eta)C_R^{(1)}(t)+\eta C_R^{(2)}(t)\leq \overline{C}_R, 0\leq (1-\eta)C_T^{(1)}(t)+\eta C_T^{(2)}(t)\leq \overline{C}_T, 0\leq t\leq T. Hence, \mathbb{C} is convex. Secondly, let C^*(t) = (C_R^*(t), C_T^*(t)), then C^*\in \mathbb{C} . As \textbf{f}_2(\textbf{E}, C^*) is continuously differentiable, it follows by the Continuation Theorem for Differentiable Systems[47] that the corresponding state evolution state is solvable.

    Thirdly, it follows from (3.13) that for 1\leq i\leq N . As U_i(t) = 1-R_i(t)-T_i(t), then we have

    \begin{equation} \begin{aligned} g_{1i}\leq \frac{dU_i}{dt}\leq h_{1i}, \\ g_{2i}\leq \frac{dR_i}{dt}\leq h_{2i}, \\ g_{3i}\leq \frac{dT_i}{dt}\leq h_{3i}.\\ \end{aligned} \end{equation} (4.1)

    In inequality group (4.1),

    \begin{align*} g_{1i} = &-[C_{R0}(1-C_R(t))\cdot\alpha_2\sum\limits_{j\neq i}R_j(t)+\beta_U\sum\limits_{j = 1}^{N}a_{ij}R_j(t)]U_i(t)\\ &-[C_{T0}\cdot\rho_2\sum\limits_{j\neq i}T_j(t)+\zeta NC_T(t)\rho_2+\gamma _U\sum\limits_{j = 1}^{N}a_{ij}T_j(t)]U_i(t)\\ g_{2i} = &-[C_{T0}\cdot\rho_1\sum\limits_{j\neq i}T_j(t)+\zeta NC_T(t)\rho_1+\gamma_R\sum\limits_{j = 1}^{N}a_{ij}T_j(t)+\delta]R_i(t), \\ g_{3i} = &-[\delta+C_{R0}(1-C_R(t))\cdot\alpha_1\sum\limits_{j\neq i}R_j(t)+\beta_T\sum\limits_{j = 1}^{N}a_{ij}R_j(t)]T_i(t), \\ h_{1i} = &\delta[R_i(t)+T_i(t)]\leq 2\delta, \\ h_{2i} = &[C_{R0}(1-C_R(t))\cdot\alpha_2\sum\limits_{j\neq i}R_j(t)+\beta_U\sum\limits_{j = 1}^{N}a_{ij}R_j(t)](1-R_i(t)-T_i(t))\\ &+[C_{R0}(1-C_R(t))\cdot\alpha_1\sum\limits_{j\neq i}R_j(t)+\beta_T\sum\limits_{j = 1}^{N}a_{ij}R_j(t)]T_i(t)\\ \leq&(\alpha_1+\alpha_2)C_{R0}\sum\limits_{j\neq i}R_j(t)+(\beta_U+\beta_T)\sum\limits_{j = 1}^{N}a_{ij}R_j(t), \\ h_{3i} = &[C_{T0}\cdot\rho_1\sum\limits_{j\neq i}T_j(t)+\zeta NC_T(t)\rho_1+ \gamma_R\sum\limits_{j = 1}^{N}a_{ij}T_j(t)]R_i(t)\\ &+[C_{T0}\cdot\rho_2\sum\limits_{j\neq i}T_j(t)+\zeta NC_T(t)\rho_2+\gamma_U\sum\limits_{j = 1}^{N}a_{ij}T_j(t)](1-R_i(t)-T_i(t))\\ \leq&(\rho_1+\rho_2)(C_{T0}\sum\limits_{j\neq i}T_j(t)+\overline{C}_T(t)\zeta N)+(\gamma_R+\gamma_U)\sum\limits_{j = 1}^{N}a_{ij}T_j(t). \end{align*}

    Hence, \textbf{f}_2(\textbf{E}, C) is bounded by a linear function in \textbf{E} .

    Finally, \textbf{F}(\textbf{E}, C)\geq0\geq(C_R^2(t)+C_T^2(t))-(\overline{C}_R^2+\overline{C}_T^2) = \|C\|_2^2-(\overline{C}_R^2+\overline{C}_T^2) . Then there exists d_1 = 1, \rho = 2, d_2 = -(\overline{C}_R^2+\overline{C}_T^2) such that \textbf{F}(\textbf{E}, C)\geq d_1\|C\|_2^\rho+d_2 . By Lemma 4.1, the Theorem 4.1 is proved.

    According to the optimal control theory, the Hamilton function of the URTC* problem is

    \begin{align} H(\textbf{E}(t), C(t), X(t))& = \sum\limits_{i = 1}^{N}\theta_{1i}R_i(t)+\theta_2C_{R0}C_R(t)\sum\limits_{i = 1}^{N}R_i(t)+\theta_3C_T(t)\zeta N\\ &+\sum\limits_{i = 1}^{N}-\lambda_i(t)\{[C_{R0}(1-C_R(t))\cdot\alpha_2\sum\limits_{j\neq i}R_j(t)+\beta_U\sum\limits_{j = 1}^{N}a_{ij}R_j(t)\\ &+C_{T0}\cdot\rho_2\sum\limits_{j\neq i}T_j(t)+\zeta NC_T(t)\rho_2+\gamma_U\sum\limits_{j = 1}^{N}a_{ij}T_j(t)]U_i(t)-\delta(R_i(t)+T_i(t))\}\\ &+\sum\limits_{i = 1}^{N}\mu_i(t)\{[C_{R0}(1-C_R(t))\cdot\alpha_2\sum\limits_{j\neq i}R_j(t)+\beta_U\sum\limits_{j = 1}^{N}a_{ij}R_j(t)]U_i(t)\\ &+[C_{R0}(1-C_R(t))\cdot\alpha_1\sum\limits_{j\neq i}R_j(t)+\beta_T\sum\limits_{j = 1}^{N}a_{ij}R_j(t)]T_i(t)\\ &-[\delta+C_{T0}\cdot\rho_1\sum\limits_{j\neq i}T_j(t)+\zeta NC_T(t)\rho_1+\gamma_R\sum\limits_{j = 1}^{N}a_{ij}T_j(t)]R_i(t)\}\\ &+\sum\limits_{i = 1}^{N}\nu_i(t)\{[C_{T0}\cdot\rho_1\sum\limits_{j\neq i}T_j(t)+\zeta NC_T(t)\rho_1+\gamma_R\sum\limits_{j = 1}^{N}a_{ij}T_j(t)]R_i(t)\\ &+[C_{T0}\cdot\rho_2\sum\limits_{j\neq i}T_j(t)+\zeta NC_T(t)\rho_2+\gamma_U\sum\limits_{j = 1}^{N}a_{ij}T_j(t)]U_i(t)\\ &-[\delta+C_{R0}(1-C_R(t))\cdot\alpha_1\sum\limits_{j\neq i}R_j(t)+\beta_T\sum\limits_{j = 1}^{N}a_{ij}R_j(t)]T_i(t)\}, \end{align} (4.2)

    where X(t) = (\lambda(t), \mu(t), \nu(t)) = (\lambda_1, \lambda_2, ..., \lambda_N, \mu_1, \mu_2, ..., \mu_N, \nu_1, \nu_2, ..., \nu_N) is the adjoint of H . We give the necessary condition for the optimal control of the URTC* problem as follows.

    Theorem 4.2. Suppose C = (C_R(t), C_T(t)) is an optimal control of the URTC* problem (3.12), \mathbf{E} is the solution to the associated rumor spreading model (3.13). Then there exists an adjoint function X(t) = (\lambda(t), \mu(t), \nu(t)) such that the following equation hold.

    \begin{equation} \begin{cases} \frac{d\lambda_i(t)}{dt}& = (\lambda_i(t)-\mu_i(t))[C_{R0}(1-C_R(t))\cdot\alpha_2\sum\limits_{j\neq i}R_j(t)+\beta_U\sum\limits_{j = 1}^{N}a_{ij}R_j(t)]\\ &+(\lambda_i(t)-\nu_i(t))[C_{T0}\cdot\rho_2\sum\limits_{j\neq i}T_j(t)+\zeta NC_T(t)\rho_2+\gamma_U\sum\limits_{j = 1}^{N}a_{ij}T_j(t)], \\ \frac{d\mu_i(t)}{dt}& = -\theta_{1i}-\theta_2C_{R0}C_R(t)-\beta_U\sum\limits_{j = 1}^{N}a_{ji}(\mu_j(t)-\lambda_j(t))U_j(t)+\delta(\mu_i(t)-\lambda_i(t))\\ &-\beta_T\sum\limits_{j = 1}^{N}a_{ji}(\mu_j(t)-\nu_j(t))T_j(t)+[C_{T0}\cdot\rho_1\sum\limits_{j\neq i}T_j(t)\\ &+\zeta NC_T(t)\rho_1](\mu_i(t)-\nu_i(t))-\gamma_R\sum\limits_{j = 1}^{N}a_{ij}(\nu_i(t)-\mu_i(t))T_j(t), \\ \frac{dv_i(t)}{dt}& = \delta(\nu_i(t)-\lambda_i(t))+\gamma_U\sum\limits_{j = 1}^{N}a_{ji}(\lambda_j(t)-\nu_j(t))U_j(t)\\ &-C_{R0}(1-C_R(t))\cdot\alpha_1\sum\limits_{j\neq i}R_j(t)(\mu_i(t)-\nu_i(t))\\ &-\beta_T\sum\limits_{j = 1}^{N}a_{ij}(\mu_i(t)-\nu_i(t))R_j(t)+\gamma_R\sum\limits_{j = 1}^{N}a_{ji}(\mu_j(t)-\nu_j(t))R_j(t)\\ &0\leq t\leq T, i = 1, 2, ..., N, \\ &\lambda(T) = \mu(T) = \nu(T) = 0. \end{cases} \end{equation} (4.3)

    Moreover, let

    \begin{equation} \begin{aligned} g_1(t) = &C_{R0}\cdot\alpha_2\sum\limits_{j\neq i}R_j(t)\sum\limits_{i = 1}^{N}(\mu_i(t)-\lambda_i(t))U_i(t)\\ &+C_{R0}\cdot\alpha_1\sum\limits_{j\neq i}R_j(t)\sum\limits_{i = 1}^{N}(\mu_i(t)-\nu_i(t))T_i(t), \\ g_2(t) = &\rho_2\sum\limits_{i = 1}^{N}(\lambda_i(t)-\nu_i(t))U_i(t)+\rho_1\sum\limits_{i = 1}^{N}(\mu_i(t)-\nu_i(t))R_i(t).\\ \end{aligned} \end{equation} (4.4)

    Then, for 0\leq t\leq T , we have

    \begin{equation} C_R(t) = \begin{cases} 0, & g_1(t) < \theta_2C_{R0}\cdot\sum\limits_{i = 1}^{N}R_i(t), \\ \overline{C}_R, & g_1(t) > \theta_2 C_{R0}\cdot\sum\limits_{i = 1}^{N}R_i(t). \end{cases} \\ \end{equation} (4.5)
    \begin{equation} C_T(t) = \begin{cases} 0, & g_2(t) < \theta_3\zeta N, \\ \overline{C}_T, & g_2(t) > \theta_3\zeta N. \end{cases} \end{equation} (4.6)

    Proof. According to Pontryagin Minimum Principle[46], there exists (\lambda, \mu, \nu) such that

    \begin{equation} \begin{cases} \frac{d\lambda_i}{dt} = - \frac{\partial H(E(t), C_R(t), C_T(t), \lambda(t), \mu(t), \nu(t))}{\partial U_i}, 0\leq t\leq T, i = 1, 2, ..., N, \\ \frac{d\mu_i}{dt} = - \frac{\partial H(E(t), C_R(t), C_T(t), \lambda(t), \mu(t), \nu(t))}{\partial R_i}, 0\leq t\leq T, i = 1, 2, ..., N, \\ \frac{d\nu_i}{dt} = - \frac{\partial H(E(t), C_R(t), C_T(t), \lambda(t), \mu(t), \nu(t))}{\partial T_i}, 0\leq t\leq T, i = 1, 2, ..., N. \end{cases} \end{equation} (4.7)

    The first 3N equations in the system (4.3) follow by direct calculations. Since the terminal cost is unspecified and the final state is free, we have \lambda(T) = \mu(T) = \nu(T) = 0. Based on Pontryagin Maximum Principle, we have

    \begin{equation} \begin{aligned} H(E(t), C(t), X(t)) = \arg\min\limits_{\overline{C}\in\mathbb{C}}H(E(t), \overline{C}, X(t)), 0\leq t\leq T. \end{aligned} \end{equation} (4.8)

    Equations (4.4)-(4.6) follow by direct calculations.

    By optimal control theory, Eqs (3.12) and (4.3) constitute the optimality system for the URTC model. We refer to the control in each solution to the optimality system as a potential optimal control (POC) of URTC* problem. It is seen from Eqs (4.5) and (4.6) that the optimality system may have more than one POC.

    In the previous section, we introduced the notion of potential optimal control for the URTC model. In this section, we focus our attention on some examples of the potential control. First, in order to solve the problem of calculating the potential optimal control of the URTC model, we designed a POC algorithm, see Table 1: Algorithm POC. Here, POC is the acronym of the phrase "potential optimal control". Now solving the optimality system (3.13) and (4.4)-(4.6) by using Runge-Kutta and backward Runge-Kutta fourth order iterative procedure, where K = 10^3 [48,49]. The time computing complexity of Algorithm 1 is shown in Theorem 5.1. Suppose that the basic comment C_0 = (C_{R0}, C_{T0}) = (0.1, 0.1) in the network. That is, the spontaneous comment ratio of network nodes at the initial moment. The control variables C_R(t) and C_T(t) are controlled on the basis of spontaneous comments.

    Table 1.  Algorithm POC.
    Algorithm 1 POC
    Input: a URTC model \Phi=(G, \beta_U, \beta_T, \gamma_U, \gamma_R, \delta, \overline{C}_R, \overline{C}_T, \alpha_1, \alpha_2, \rho_1, \rho_2, C_{R0}, C_{T0}, \theta_1, \theta_2, \theta_3, \zeta, T, \textbf{E}_0) ,
    maximum number K of iteration.
    Output: the potential optimal control C_R, C_T .
    1. k\leftarrow 0, C_R^{(k)}\leftarrow0, C_T^{(k)}\leftarrow0, t\in[0, T] ,
    2.repeat,
    3. k\leftarrow k+1 ,
    4.forward compute \mathbf{E} using Eq (3.13) with C_R=C_R^{(k-1)}, C_T=C_T^{(k-1)}; \mathbf{E}^{(k)} \leftarrow \mathbf{E} ,
    5.backward compute \lambda, \mu and \nu using Eq (4.3) with C_R=C_R^{(k-1)}, C_T=C_T^{(k-1)} and \mathbf{E}=\mathbf{E}^{(k)} ;
    \lambda^{(k)}\leftarrow \lambda, \mu^{(k)}\leftarrow \mu, \nu^{(k)}\leftarrow \nu,
    6.compute C_R, C_T using Eqs (4.4)-(4.6) with \mathbf{E}=\mathbf{E}^{(k)}, \lambda=\lambda^{(k)}, \mu=\mu^{(k)}, \nu=\nu^{(k)} ,
    C_R^{(k)}\leftarrow C_R, C_T^{(k)}\leftarrow C_T,
    7.until k > K ,
    8.return C_R^{(k)}, C_T^{(k)} .

     | Show Table
    DownLoad: CSV

    Theorem 5.1. The time complexity of the Algorithm 1 is O(TKN^2) , where N is the number of nodes, T is the total number of controls the finite time horizon [0, T] .

    Proof. According to the algorithms we give in the original version of our paper, the analysis of their time complexity is given as follows. Assume that we perform our Algorithm 1 in a social network graph G(V, E) of N users and |E| connections. At time t , because solving each differential equation requires traversing the adjacency matrix of nodes. Therefore, the Runge-Kutta and backward Runge-Kutta fourth order iterative procedure has time complexity of O(N^2) . Because the maximum number of iterations of the Algorithm is K , and the number of control is T in the finite time horizon [0, T] . Therefore, the time complexity of Algorithm 1 is O(TKN^2) .

    In order to generate a large number of URTC examples, two types of networks are selected: Synthetic networks include scale-free networks and small-world networks; real networks include Email network, Facebook network and Twitter network. The principle of parameter selection follows Table 2. In addition, the influence of different values of parameters on loss cost under C_{poc} will be discussed in Section 6 for the parameters estimated according to the actual situation in the network.

    Table 2.  The parameters description of the URTC model.
    Parameters Description Estimated value Source
    \beta_U Probability of U_k\rightarrow R_k affected by forwarding 0.01-0.1 [50]
    \beta_T Probability of T_k\rightarrow R_k affected by forwarding 0.05 [50]
    \gamma_U Probabilityof U_k\rightarrow T_k affected by forwarding 0.01-0.1 [50]
    \gamma_R Probability of R_k\rightarrow T_k affected by forwarding 0.05 [50]
    \delta The conversin rate of returning to uncertain state 0.09 [51]
    \alpha_1 Probability of T_k\rightarrow R_k affected by comments 0.01-0.5 estimate
    \alpha_2 Probability of U_k\rightarrow R_k affected by comments 0.01-0.5 estimate
    \rho_1 Probability of R_k\rightarrow T_k affected by comments 0.01-0.5 estimate
    \rho_2 Probability of U_k\rightarrow T_k affected by comments 0.01-0.5 estimate
    \xi The percentage of comments invested in support of truth 0.01-0.05 estimate

     | Show Table
    DownLoad: CSV

    Experiment 1: Optimal control strategies in synthetic and real networks.

    The synthetic network selects classic complex network, scale-free network[52] and small-world network[53]. We get a synthetic scale-free network G_{SF} and a small-world network G_{SW} with N = 100 nodes by software MATLAB, which is shown in Figure 2(a), (b). Let A_{SF} and A_{SW} denote the adjacency matrix of G_{SF} and G_{SW} . Subnetworks of real networks such as Email, Facebook and Twitter are selected, and their nodes are set as N = 100 . Their topological network graphs G_{EM}, G_{FA}, G_{TW} are shown in Figure 2(c), (d), (e), and their corresponding adjacency matrices are A_{EM}, A_{FA}, A_{TW} .

    Figure 2.  Two synthetic network: (a) Scale-free network, (b) Small-world network, (c) Email network, (d) Facebook network, (e) Twitter network.

    Suppose \beta_U = 0.1, \beta_T = 0.05, \gamma_U = 0.08, \gamma_R = 0.05, \delta = 0.02, \overline{C}_R = \overline{C}_T = \theta_2 = \theta_3 = 1, \xi = 0.05, \alpha_1 = \rho_1 = 0.1, \alpha_2 = \rho_2 = 0.2, T = 20, \theta_1 = (1, ..., 1), \textbf{E}_0 = (U_0, R_0, T_0) = (0.8, ..., 0.8, 0.1, ..., 0.1, 0.1, ..., 0.1) . The optimal control C_{poc} is obtained by solving the optimal system, as shown in Figure 3.

    Figure 3.  Optimal control strategies C_{poc} in synthetic and real networks: (a) Scale-free network, (b) Small-world network, (c) Email network, (d) Facebook network, (e) Twitter network.

    Experiment 2: The cost-effectiveness between C_{poc} and C_{p, q} .

    Suppose the parameters are the same as Experiment 1. Figure 4 shows the comparison of cost effectiveness between optimal strategy C_{poc} and uniform control strategy C_{p, q} for URTC* problem. In the uniform control strategy, C_R = p, C_T = q , where p = (0, 0.1, 0.2, ..., 1), q = (0, 0.1, 0.2, ..., 1) . It is seen that C_{poc} < C_{p, q} for all p, q . C_{poc} is superior to all the controls in both synthetic and real networks in terms of the cost effectiveness. In the above two experiments and 100 similar experiments, and in terms of cost-effectiveness, it is worth emphasizing that C_{poc} outperforms all static controls in performance across all networks, confirming the optimality of C_{poc} .

    Figure 4.  The comparison of cost-effectiveness J(C) between optimal strategy C_{poc} and uniform control strategy C_{p, q} : (a) Scale-free network, (b) Small-world network, (c) Email network, (d) Facebook network, (e) Twitter network.

    Experiment 3: The changes of node state under optimal control strategy C_{poc} .

    Suppose the parameters are the same as Experiment 1. In terms of the effect of rumor control, the following numerical simulation experiments are carried out. Taking node No. 50 as an example, we compare the change curves of the expected probabilities of rumor-spreading and truth-spreading under optimal control and uncontrolled control in synthetic and real networks. Under the optimal control C_{opc} , along with the development of the time, rumor-spreading expected probability obviously decrease, truth expected probability obviously improved as shown in Figure 5. Among them, in Figure 5, It is clear that by controlling the comments we can make the rumor disappear and the probability of spreading the truth increase significantly.

    Figure 5.  (a) Rumor-spreading expectation probability of node 50 under C_{poc} and without control C_{0, 0} , (b) Truth-spreading expectation probability of node 50 under C_{poc} and without control C_{0, 0} .

    In this section, we discuss the effect of the parameters related to comments on the expected cost-effectiveness under the optimal strategy through simulation experiments.

    Experiment 4: The influence of spontaneous comments number C_{R0} and C_{T0} on rumor control.

    The parameter C_{R0} represents the spontaneous comments in favor of rumor in the network, and C_{T0} represents the spontaneous comments in favor of the truth in the network. Let C_{R0} = {(0.1, 0.3, 0.5, 0.7, 0.9)} , C_{T0} = 0.1 and other parameters are the same as Experiment 1. Figure 6(a) expressed the change of cost-effectiveness under C_{poc} as C_{R0} increases. Obviously, with the increase of C_{R0} , the cost-effectiveness increases sharply, because the number of nodes believing rumor increases significantly due to the large number of spontaneous comments. In this case, the loss caused by rumor increases, and the efforts to control rumor also increase, so the cost-effectiveness increases significantly. That is, when the spontaneous comment of the rumor is large enough, that is, when the rumor has developed into public opinion, the cost of controlling the rumor will increase sharply. Another case, when C_{T0} = (0.1, 0.3, 0.5, 0.7, 0.9), C_{R0} = 0.1 and other parameters are the same as Experiment 1. Figure 6(b) expressed the change of cost-effectiveness under C_{poc} as C_{T0} increase. When believe the truth of the initial comments increases, will cause a lot of nodes under the influence of public opinion to increase a lot believe the truth of the node, then the probability of rumor of nodes is greatly reduced at the same time. As can be seen from the Figure 6(b), when C_{T0} is large enough, the cost-effectiveness caused by rumor becomes sharply smaller. This is because rumors will die out without any control.

    Figure 6.  The cost-effectiveness J(C) :(a) J(C) depends on C_{R0} , (b) J(C) depends on C_{T0} .

    Experiment 5: The effect of parameters \alpha_2 and \rho_2 on the cost-effectiveness.

    Let (1) \alpha_2 = (0.1, 0.2, 0.3, 0.4, 0.5), \rho_2 = 0.2 ; (2) \rho_2 = (0.1, 0.2, 0.3, 0.4, 0.5), \alpha_2 = 0.2 , and other parameters are the same as Experiment 1. Figure 7 expressed the change of cost-effectiveness under C_{poc}. As shown in Figure 7(a), it is worth noting that at this time, C_{R0} = C_{T0} = 0.1 for the spontaneous comments, that is, when the rumor does not develop into public opinion, the cost of rumor control will hardly increase when \alpha_2 increases. Combined with the conclusion of Experiment 4, it can be seen that once rumor develop into public opinion, the loss of rumor control will increase greatly. Therefore, rumor control must be carried out at the early stage of rumor development. As shown in Figure 7(b), when \rho_2 increases, the nodes that contact the comments of the truth position are more easily transformed into nodes that spread the truth. When \rho_2 increases to a certain degree, there is no need to control the rumor, and the rumor will naturally die out, so the cost-effectiveness caused by rumor becomes smaller.

    Figure 7.  The cost-effectiveness J(C) :(a) J(C) depends on \alpha_2 , (b) J(C) depends on \rho_2 , (c) J(C) depends on \xi .

    Experiment 6: The effect of parameters \xi on the cost-effectiveness.

    Let \xi = (0.01, 0.02, 0.03, 0.04, 0.05) , and other parameters are the same as Experiment 1. \xi indicates the percentage of invested comments that support the truth. This value is often determined by the rumor control budget. In fact, it is obvious that the higher the ratio of input to support the truth, the higher the cost consumed, but the higher the ratio of input, the influence of these comments will lead to the increase of the nodes spreading the truth, so as to achieve the purpose of rumor control. As can be seen from Figure 7(c), with the increase of \xi , the cost-effectiveness decreases obviously.

    In this paper, a rumor-truth hybrid propagation node-level model based on comment mechanism is introduced to minimize the impact of rumor by developing comment strategies. On this basis, we model the original problem as the optimal control problem. Finally, we derive the optimal system for solving the optimal control problem. In the future, there are still many problems to be solved. In the node-level rumor propagation model, it is also worth studying how to select some nodes to control rumor, locate the location of rumor propagation sources and the influence of network community structure on rumor propagation.

    This work is supported by the National Natural Science Foundation of China under Grant Nos.61807028, 61772449, 61572420 and 61802332, the Natural Science Foundation of Hebei Province China under Grant No. F2019203120. The authors are grateful to valuable comments and suggestions of the reviewers.

    All authors declare no conflicts of interest in this paper.



    [1] Hussein DAS, Measurement of Radon Concentrations in College of Education/Ibn Al-Haitham Buildings Using CR-39 Detector and RAD-7 Monitor. Baghdad: College of Education/Ibn Al- Haitham, University of Baghdad, 2018.
    [2] Mahdi KH, Subhi AT, Sharif NR, et al. (2018) Determination of Radon Concentrations in Soil Around Al-Tuwaitha Site Using CR-39 Detector. Eng Technol J 36: 108–112. http://dx.doi.org/10.30684/etj.36.2C.2 doi: 10.30684/etj.36.2C.2
    [3] Saed BM (1998) Determination of radon concentration in buildings by using the nuclear track detector CR-39. College of Education. Ibn Al- Haitham, University of Baghdad.
    [4] Tawfiq NF, Nasir HM, Khalid R (2018) Determination of Radon Concentrations in AL-NAJAF Governorate by Using Nuclear Track Detector CR-39. ANJS 15: 83–87. https://doi.org/10.22401/JNUS.15.1.12 doi: 10.22401/JNUS.15.1.12
    [5] Mohammad GM (1994) Land use mapping of selected areas of county Durham, north-east England, by satellite remote sensing and field survey methods. Durham University.
    [6] Congalton RG, Fenstermaker LK, Ensen JR, et al. (1991) Remote sensing and geographic information system data integration: error sources and Research Issues. Photogramm Eng Remote Sens 57: 677–687.
    [7] Jha MK, Chowdary VM, Peiffer S (2017) Groundwater management and development by integrated remote sensing and geographic information systems: prospects and constraints, CRC Press. Water Resour Manage 21: 427–467. https://doi.org/10.1007/s11269-006-9024-4 doi: 10.1007/s11269-006-9024-4
    [8] Libeesh NK, Naseer KA, Arivazhagan S, et al. (2022) Characterization of Ultramafic–Alkaline–Carbonatite complex for radiation shielding competencies: An experimental and Monte Carlo study with lithological mapping. Ore Geol Rev 142: 104735. https://doi.org/10.1016/j.oregeorev.2022.104735 doi: 10.1016/j.oregeorev.2022.104735
    [9] Alasadi LA, Abojassim AA (2022) Mapping of natural radioactivity in soils of Kufa districts, Iraq using GIS technique. Environ Earth Sci 81: 279. https://doi.org/10.1007/s12665-022-10407-8 doi: 10.1007/s12665-022-10407-8
    [10] Nikezic D, Yu KN (2009) Light scattering from an assembly of tracks in a PADC film. Nucl Instrum Methods Phys Res Sect A 602: 545–551. https://doi.org/10.1016/j.nima.2009.01.204 doi: 10.1016/j.nima.2009.01.204
    [11] Sato F, Kuchimaru T, Kato Y, et al. (2008) Digital image analysis of etch pit formation in CR-39 track detector. Jap J Appl Phys 47: 269–272.
    [12] Mostofizadeh A, Sun X, Kardan MR (2008) Improvement of nuclear track density measurements using image processing techniques. Am J Appl Sci 5: 71–76.
    [13] Tilehnoee Hadad K, Hakimdavoud MR, Hashemi-Tilehnoee M (2011) Indoor radon survey in Shiraz-Iran using developed passive measurement method. Iran J Radiat Res 9: 175–182.
    [14] Yousif SR, Abojassim AA, Hayder A (2019) Mapping of natural radioactivity in soil samples of badra oil field project using GIS program. Nucl Phys Energy 20: 60–69.
    [15] Abduljabbar HM, Abdul IM, Mahdia SH (2018) Measuring surface porosity for zirconium enforced by different additive rates of nanosilica by means of image processing. AIP Conf Proc 1968: 1–8. https://doi.org/10.1063/1.5039231 doi: 10.1063/1.5039231
    [16] Marid HA, Jarallah NT, Abduljabbar HM (2018) Radioactivity effect on the shape ofd even-even nuclei for Uranium and thorium series. Results Phys 11: 406–409. https://doi.org/10.1016/j.rinp.2018.06.024 doi: 10.1016/j.rinp.2018.06.024
    [17] Mahdi KH (2006) Identification and Measurements of Natural and Industrial Radioactive Pollutants in Environment of Baghdad City Using Gamma Spectrometry and Solid State Nuclear Track Detector CR-39. Baghdad: College of Education/Ibn Al- Haitham, Baghdad University.
    [18] Subhi AT (2013) Calculation of the concentrations of depleted uranium in the diyala river sediment samples using the nuclear track detector CR-39. Ibn Al-Haytham J Pure Appl Sci 26: 122–131.
    [19] Mohammed NA, Calculation of the Specific Activity of Radionuclides in Soil and Radon Concentration and its Health Effects in, Baghdad: Collage of Education for Pure Science-Ibn Al Haitham, University of Baghdad, 2020.
    [20] Ishnayyin HG, Find an Empirical Formula for Indoor Radon Measurement Emitting from Building Materials. Baghdad: College of Education/Ibn Al- Haitham, Baghdad University, 2015.
  • This article has been cited by:

    1. Ying Yu, Jiaomin Liu, Jiadong Ren, Cuiyi Xiao, Stability analysis and optimal control of a rumor propagation model based on two communication modes: friends and marketing account pushing, 2022, 19, 1551-0018, 4407, 10.3934/mbe.2022204
    2. Haoming Guo, Xuefeng Yan, Dynamic modeling and simulation of rumor propagation based on the double refutation mechanism, 2023, 630, 00200255, 385, 10.1016/j.ins.2022.10.095
    3. Linhe Zhu, Tianyu Yuan, Optimal control and parameter identification of a reaction–diffusion network propagation model, 2023, 111, 0924-090X, 21707, 10.1007/s11071-023-08949-y
    4. Peinan Ji, Xinyi Chen, Lianchao Yu, Research on the effect of corporate rumor clarification based on text analysis, 2024, 31, 1608-1625, 654, 10.1080/16081625.2024.2333750
    5. Yang Xia, Haijun Jiang, A stochastic rumor spreading model with event-triggered discontinuous feedback control in multilingual online networks, 2024, 1598-5865, 10.1007/s12190-024-02184-3
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1573) PDF downloads(55) Cited by(1)

Figures and Tables

Figures(8)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog