
The rapid development of Internet and information technology has intensified the spread of rumors. Making full use of the comment mechanism on the Internet can effectively prevent the spread of rumors. This article focuses on strategies to reduce rumors by controlling comments. Firstly, based on the comment mechanism, a rumor propagation model with mixed rumor and truth is established. Secondly, we measure the cost of the rumor and, on this basis, model the comment based rumor-truth problem as the optimal control problem. Thirdly, we prove the existence of optimal control and derive the optimal system. Finally, the superiority of the optimal control strategy is verified by numerical simulation, and the rumor propagation is effectively slowed down under the premise of cost control, and the influence of some parameter changes on rumor cost-effectiveness control is studied.
Citation: Ying Yu, Jiaomin Liu, Jiadong Ren, Qian Wang, Cuiyi Xiao. Minimize the impact of rumors by optimizing the control of comments on the complex network[J]. AIMS Mathematics, 2021, 6(6): 6140-6159. doi: 10.3934/math.2021360
[1] | Yanchao Liu, Pengzhou Zhang, Deyu Li, Junpeng Gong . Dynamic analysis and optimum control of a rumor spreading model with multivariate gatekeepers. AIMS Mathematics, 2024, 9(11): 31658-31678. doi: 10.3934/math.20241522 |
[2] | Xuefeng Yue, Weiwei Zhu . The dynamics and control of an ISCRM fractional-order rumor propagation model containing media reports. AIMS Mathematics, 2024, 9(4): 9721-9745. doi: 10.3934/math.2024476 |
[3] | Xintong Wang, Sida Kang, Yuhan Hu . Dynamic analysis of a rumor propagation model considering individual identification ability. AIMS Mathematics, 2025, 10(2): 2295-2320. doi: 10.3934/math.2025107 |
[4] | Hongshuang Wang, Sida Kang, Yuhan Hu . Dynamic analysis and optimal control of rumor propagation models considering different education levels and hesitation mechanisms. AIMS Mathematics, 2024, 9(8): 20089-20117. doi: 10.3934/math.2024979 |
[5] | Hui Wang, Shuzhen Yu, Haijun Jiang . Rumor model on social networks contemplating self-awareness and saturated transmission rate. AIMS Mathematics, 2024, 9(9): 25513-25531. doi: 10.3934/math.20241246 |
[6] | Liuqin Huang, Jinling Wang, Jiarong Li, Tianlong Ma . Analysis of rumor spreading with different usage ranges in a multilingual environment. AIMS Mathematics, 2024, 9(9): 24018-24038. doi: 10.3934/math.20241168 |
[7] | Rongrong Yin, Ahmadjan Muhammadhaji . Dynamics in a delayed rumor propagation model with logistic growth and saturation incidence. AIMS Mathematics, 2024, 9(2): 4962-4989. doi: 10.3934/math.2024241 |
[8] | Xin Yi, Rong Liu . An age-dependent hybrid system for optimal contraception control of vermin. AIMS Mathematics, 2025, 10(2): 2619-2633. doi: 10.3934/math.2025122 |
[9] | Liyuan Xia, Jianjun Wang, Shihua Fu, Yuxin Gao . Control design to minimize the number of bankrupt players for networked evolutionary games with bankruptcy mechanism. AIMS Mathematics, 2024, 9(12): 35702-35720. doi: 10.3934/math.20241694 |
[10] | Houssine Zine, Abderrahim El Adraoui, Delfim F. M. Torres . Mathematical analysis, forecasting and optimal control of HIV/AIDS spatiotemporal transmission with a reaction diffusion SICA model. AIMS Mathematics, 2022, 7(9): 16519-16535. doi: 10.3934/math.2022904 |
The rapid development of Internet and information technology has intensified the spread of rumors. Making full use of the comment mechanism on the Internet can effectively prevent the spread of rumors. This article focuses on strategies to reduce rumors by controlling comments. Firstly, based on the comment mechanism, a rumor propagation model with mixed rumor and truth is established. Secondly, we measure the cost of the rumor and, on this basis, model the comment based rumor-truth problem as the optimal control problem. Thirdly, we prove the existence of optimal control and derive the optimal system. Finally, the superiority of the optimal control strategy is verified by numerical simulation, and the rumor propagation is effectively slowed down under the premise of cost control, and the influence of some parameter changes on rumor cost-effectiveness control is studied.
Nowadays, with the rapid development of network and information technology, the distance between people is shortened by the network. The common way of information transmission has also changed from the traditional face-to-face transmission to online social networks (OSN), such as Facebook, Twitter, etc. At the same time, the spread of inaccurate information, or rumors[1,2], through OSN has become very rapid. The spread of rumors will bring economic losses and adverse political effects to the society[3]. Therefore, it is of practical importance to effectively control the spread of rumors.
Scholars at home and abroad have conducted in-depth research on the spread of rumors on the Internet. In recent years, some scholars have used game theory to discuss the antagonistic game relationship between rumor and anti-rumor[4,5,6,7]; some scholars have used graph convolution to study the rumor propagation model[8,9]; some scholars have extracted the characteristics of user behavior from the big data in social networks and studied the rumor propagation law through deep learning algorithm[10,11,12]; using biological models including infectious disease models to study the mechanism of rumor transmission is also a major research method[13,14,15,16,17].
When spreading information (whether rumor or truth) on social networks, users can post comments representing their own views under the topic. The direction of public opinion will affect the spread of rumors or truth. In view of this situation, this paper establishes a node-based rumor propagation model under the comment mechanism by using the infectious disease model theory. The main contributions of this paper are as follows:
● First, we establish a node-level rumor-truth mixed propagation model based on the comment mechanism, so as to measure the influence of comment on rumors.
● Secondly, on this basis, we model the rumor-truth mixed problem based on comments as an optimal control problem, which is called uncertain-rumor-truth-comment (URTC) model.
● Thirdly, we prove that the model has the optimal control and obtain the optimal system for solving the model.
● Fourthly, by solving the corresponding optimal system, some optimal control strategies are given.
● Finally, through the sensitivity analysis of the relevant parameters of comments, the influence of comments on rumor propagation is further discussed.
This work is conducive to better suppressing the spread of rumors. The main organization of this paper is as follows: In Section 2, we review some of the relevant work. In Section 3, we modeled the node-level URTC model for the rumor-truth propagation problem, and modeled the URTC problem into the optimal control problem. Section 4 makes a theoretical analysis of the optimal control problem and gives a strategy to control rumors through comments. Some optimal URTC strategies are given in Section 5. In Section 6, the influence of comments on rumor propagation is further revealed through the sensitivity analysis of parameters. The work is closed by Section 7.
In this section, in order to illustrate the novelty of this work, we review the work related to this paper.
Pioneering research on rumor propagation based on infectious disease models was conducted in 1964, when the first classic rumor propagation model DK model was proposed by Daley and Kendal [18,19]. Later, some scholars improved the DK model for different network structures, and the common point of these models is to assume that the network structures are homogeneous. In fact, with the improvement of people's cognition of the Internet, empirical findings have shown that many real world networks are highly structured and heterogeneous since the end of last century. Under the guidance of this cognition, Zanette[20,21] first proposed the rumor propagation model based on small-world network in 2001. In 2004, Moreno[22] built a mathematical model based on rumor propagation in a scale-free complex network. Many researchers[23,24,25,26,27,28,29,30,31,32] have conducted in-depth studies on rumor propagation in heterogeneous network structures.
Since 2009, some scholars have studied the spread of infectious diseases[33,34,35], network security[36,37,38], software security[39,40,41] and other aspects based on the individual-level modeling method. Recently, some scholars have proposed a node-based rumor propagation model[42,43,44] by using the modeling method based on individual level. Compared with the rumor propagation model on heterogeneous networks, the node-level rumor propagation model not only considers the statistical data of topological attributes of the underlying network, but also the entire network structure, so it deeply reflects the influence of specific network structure on rumor propagation. Inspired by the node-level rumor propagation model, this paper considers the influence of comments on rumor propagation. Once an individual or organization publishes information online, ordinary people cannot judge whether the information is true or false. People may believe and spread the information, whether it is rumor or not. In fact, publicizing the truth is the main way to suppress rumor. In addition to choosing their own attitudes and disseminating them, some people who are exposed to information also post comments on the Internet to support their views and positions, and these comments will also influence the subsequent positions of people who are newly exposed to information. In other words, comments have an important impact on rumor propagation. On this basis, we establish a mixed rumor-truth propagation model based on comments. And it is modeled as an optimal control problem.
In this section we consider the issue of rumor propagation on OSN with comments. Suppose that in the process of spreading rumors, some people will comment that represent their own views. And those comments may influence the opinions of those exposed to the rumor. This section is dedicated to this problem according to the following procedures: First, introduce the basic terms and symbols. Secondly, the node-level model of URTC rumor spreading model is established. Finally, the URTC problem is modeled as an optimal control problem.
Assume that the number of nodes in the network is constant and the total number of users on the OSN is N, let G=(V,E) denote the topology of this network. Where V=(V1,V2,...,VN) represents the nodes of the network, N is the number of nodes in the network. Eij={Vi,Vj}∈E represents node Vj can sent messages to node Vi, so G is a directed network. Where A=(aij)N×N represents the adjacency matrix of network G. When aij=1, node Vj can forward rumors or truth to node Vi through the link. aij=0 means that node Vj cannot spread information to node Vi, whether it is rumors or truth.
Suppose that the rumor and the truth are spread in the network G in the finite time horizon [0,T]. Assuming that at any time t in the time horizon, the state of a node can only be one of three states: uncertain, rumor-spreading and truth-spreading. The uncertain state means that the node cannot make a choice, neither believes in rumor nor the truth, so no information will be spread. The state of rumor-spreading is to believe and spread rumor. The state of truth-spreading is the belief and transmission of truth. Let Oi(t)=0,1 and 2 respectively indicate that node Vi is an uncertain state, rumor-spreading and truth-spreading at time t. Let
O(t)=(O1(t),O2(t),...,ON(t)). | (3.1) |
In order to solve the problem of rumor propagation under the comment mechanism, we introduce the following hypotheses:
(1) Due to the influence of neighbor nodes who believe the rumor, an uncertain node Vi becomes rumor-spreading with probability βUN∑j=1aijχ{Oj(t)=1} on average.
(2) Due to the influence of neighbor nodes who believe the truth, an uncertain node Vi becomes truth-spreading with probability γUN∑j=1aijχ{Oj(t)=2} on average.
(3) Due to the influence of neighbor nodes who believe the rumor, a truth-spreading node Vi becomes rumor-spreading with probability βTN∑j=1aijχ{Oj(t)=1} on average, βU≥βT.
(4) Due to the influence of neighbor nodes who believe the truth, a rumor-spreading node Vi becomes truth-spreading with probability γRN∑j=1aijχ{Oj(t)=2} on average, γU≥γR.
(5) Due to the attenuation of memory, a rumor-spreading node becomes uncertain with probability δ on average.
(6) The average probability of comments supporting rumor posted on the network is CR0.
(7) The average probability of comments supporting truth posted on the network is CT0.
(8) Due to the influence of comments supporting the rumor, a truth-spreading node Vi is transformed into rumor-spreading with probability α1 on average.
(9) Due to the influence of comments supporting the rumor, an uncertain node Vi is transformed into rumor-spreading with probability α2 on average. Obviously, α1≤α2.
(10) Due to the influence of comments supporting the truth, a rumor-spreading node Vi is transformed into truth-spreading with probability ρ1 on average.
(11) Due to the influence of comments supporting the truth, an uncertain node Vi is transformed into truth-spreading with probability ρ2 on average. Obviously, ρ1≤ρ2.
The above assumptions are independent of each other, and the state transition diagram of the node is shown in Figure 1. In practice, parameters βU,γU,βT,γR,δ,CR0,CT0,α1,α2,ρ1,ρ2 can be estimated from the information of the network.
Then the vector O(t) represents the state of N nodes in the network at time t. Since some nodes will also publish comments representing their own opinions while spreading rumor and truth, this causes the status of nodes to change over time. Let Ui(t),Ri(t),Ti(t) denote the expected probabilities of node Vi being uncertain, rumor-spreading and truth-spreading at time t, respectively.
Ui(t)=Pr{Oi(t)=0},Ri(t)=Pr{Oi(t)=1},Ti(t)=Pr{Oi(t)=2}. | (3.2) |
Note that Ui(t)+Ri(t)+Ui(t)=1. The vector
E(t)=(U(t),R(t),T(t)) | (3.3) |
represents the expected state of node in the network at time t, where
{U(t)=(U1(t),U2(t),...,UN(t)),R(t)=(R1(t),R2(t),...,RN(t)),T(t)=(T1(t),T2(t),...,TN(t)). | (3.4) |
The rumor-truth hybrid with comments propagation model to be derived below conforms to the above hypothesis. The following system gives an equivalent form of the exact URTC model.
{dUi(t)dt=−[CR0⋅α2∑j≠iRj(t)+βUN∑j=1aijRj(t)]Ui(t)−[CT0⋅ρ2∑j≠iTj(t)+γUN∑j=1aijTj(t)]Ui(t)+δ(Ri(t)+Ti(t)),dRi(t)dt=[CR0⋅α2∑j≠iRj(t)+βUN∑j=1aijRj(t)]Ui(t)+[CR0⋅α1∑j≠iRj(t)+βTN∑j=1aijRj(t)]Ti(t)−[CT0⋅ρ1∑j≠iTj(t)+γRN∑j=1aijTj(t)+δ]Ri(t),dTi(t)dt=[CT0⋅ρ1∑j≠iTj(t)+γRN∑j=1aijTj(t)]Ri(t)+[CT0⋅ρ2∑j≠iTj(t)+γUN∑j=1aijTj(t)]Ui(t)−[δ+CR0⋅α1∑j≠iRj(t)+βTN∑j=1aijRj(t)]Ti(t),0≤t≤T,1≤i≤N, | (3.5) |
with the initial condition E(0)=E0.
The system (3.5) may be written in system as
{dE(t)dt=f1(E(t)),0≤t≤T,E(0)=E0. | (3.6) |
Let C(t)=(CR(t),CT(t)),0≤t≤T, consider C(t) as the control variable of the URTC problem, where CR(t) represents the rumor control variable and CT(t) represents the truth control variable. The upper limit of this strategy is determined as shown in the following remarks:
Remark 3.1. The upper limit ¯CR of CR(t) is determined by basic human rights, and CR(t) is controlled on the basis of comments CR0 spontaneously generated by rumor in the network, that is 0≤CR(t)≤¯CR≤1. When CR(t)=0, there is no human interference in rumor comments in the network. At this time, the comments supporting the rumor in the network are determined by the initial comments of the node. When CR(t)=1, comments supporting the rumor will disappear at time t.
Remark 3.2. The manual intervention to the comments supporting the truth takes the form of increasing the number of comments supporting the truth, denoted as CT(t). The upper bound ¯CT of CT(t) is determined by the cost of increasing comments that agree with the truth, and by the size of the network.
So we assume that the URTC strategy is
C={C(t)∈L[0,T]2|0≤CR(t)≤¯CR,0≤CT(t)≤¯CT,0≤t≤T}, |
where L[0,T] represents the set of all Lebesgue integrable functions defined on [0,T][45].
In order to solve the problem of rumor control with a comment mechanism, we first evaluate the loss caused by the negative impact of rumor. First, assuming that the unit loss caused by the spreading rumor node Vi per unit time is a constant θ1i. Then the total loss caused by the spreading of rumor in the time horizon [0,T] can be expressed as
L1(C)=∫T0N∑i=1θ1iRi(t)dt. | (3.7) |
The vector θ1=(θ11,θ12,...,θ1N) represents the unit loss caused by the rumor of each node.
Secondly, assuming that the unit cost of controlling the comments supporting rumor per unit time is θ2. The cost of controlling the comments supporting rumor in the time horizon [0,T] can be expressed as
L2(C)=∫T0θ2CR(t)CR0⋅N∑i=1Ri(t)dt. | (3.8) |
Finally, assuming that the unit cost of pushing the comments supporting truth per unit time is θ3. The scale of the number of artificially increased comments is ζN, where N is the number of nodes in the network and ζ is the ratio of increased comments. The cost of pushing the comments supporting the truth in the time horizon [0,T] can be expressed as
L3(C)=∫T0θ3CT(t)ζNdt. | (3.9) |
Remark 3.3. The parameter θ1 is estimated by the adverse social impact caused by the spread of rumor, and the parameter θ2 is estimated by deleting the comments supporting the rumor in the OSN; the parameter θ3 is estimated by sending or publishing comments on supporting the truth.
In summary, the expected loss of rumor spread is
J(C)=L1(C)+L2(C)+L3(C)=∫T0N∑i=1θ1iRi(t)dt+θ2∫T0CR(t)CR0⋅N∑i=1Ri(t)dt+θ3∫T0CT(t)ζNdt≡∫T0F(E(t),C(t))dt, | (3.10) |
where
F(E(t),C(t))=N∑i=1θ1iRi(t)+θ2CR(t)CR0⋅N∑i=1Ri(t)+θ3CT(t)ζN. | (3.11) |
Based on the above discussion and assumptions, this URTC problem is modeled as the following optimal control problem
minC∈C=∫T0F(E(t),C(t))dtsubjectto |
{dUi(t)dt=−[CR0(1−CR(t))⋅α2∑j≠iRj(t)+βUN∑j=1aijRj(t)]Ui(t)−[CT0⋅ρ2∑j≠iTj(t)+ζNCT(t)ρ2+γUN∑j=1aijTj(t)]Ui(t)+δ(Ri(t)+Ti(t)),dRi(t)dt=[CR0(1−CR(t))⋅α2∑j≠iRj(t)+βUN∑j=1aijRj(t)]Ui(t)+[CR0(1−CR(t))⋅α1∑j≠iRj(t)+βTN∑j=1aijRj(t)]Ti(t)−[CT0⋅ρ1∑j≠iTj(t)+ζNCT(t)ρ1+γRN∑j=1aijTj(t)+δ]Ri(t),dTi(t)dt=[CT0⋅ρ1∑j≠iTj(t)+ζNCT(t)ρ1+γRN∑j=1aijTj(t)]Ri(t)+[CT0⋅ρ2∑j≠iTj(t)+ζNCT(t)ρ2+γUN∑j=1aijTj(t)]Ui(t)−[δ+CR0(1−CR(t))⋅α1∑j≠iRj(t)+βTN∑j=1aijRj(t)]Ti(t),E(0)=E0. | (3.12) |
The associated rumor spreading model can be recast in matrix notation as
{dE(t)dt=f2(E(t),C(t)),0≤t≤T,E(0)=E0. | (3.13) |
We refer to this optimal control problem as the URTC* problem. This model can be described as the following 20-tuple problem:
Φ=(G,βU,βT,γU,γR,δ,¯CR,¯CT,α1,α2,ρ1,ρ2,CR0,CT0,θ1,θ2,θ3,ζ,T,E0) | (3.14) |
First, we first prove that this problem is an optimal control problem and can be solved. So we derive the following Lemma[46]:
Lemma 4.1. The URTC* problem is an optimal control if the following five conditions are held simultaneously.
(1) Cis convex and closed.
(2) There exists C∈C such that the system (3.13) is solvable.
(3) f2(E,C) is bounded by a linear function in E.
(4) F(E,C) is convex on C.
(5) There exist ρ>1,d1>0, and d2 such that F(E,C)≥d1‖C‖ρ2+d2.
Then we can conclude the following Theorem.
Theorem 4.1. This URTC* problem is an optimal control problem.
Proof. First, let C(t)=(CR(t),CT(t)) be a limit point of C. Then there exists a sequence of points of C, C(n)(t)=(C(n)R(t),C(n)T(t)),n=1,2,..., that approaches C(t). Since
0≤CR(t)=limn→∞C(n)R(t)≤¯CR,0≤CT(t)=limn→∞C(n)T(t)≤¯CT,0≤t≤T. |
Hence, C is closed. Let C(1),C(2)∈C,0<η<1,ˆC=(1−η)C(1)+ηC(2). As L[0,T]2 is a real vector space, we have ˆC∈L[0,T]2 and 0≤(1−η)C(1)R(t)+ηC(2)R(t)≤¯CR,0≤(1−η)C(1)T(t)+ηC(2)T(t)≤¯CT,0≤t≤T. Hence, C is convex. Secondly, let C∗(t)=(C∗R(t),C∗T(t)), then C∗∈C. As f2(E,C∗) is continuously differentiable, it follows by the Continuation Theorem for Differentiable Systems[47] that the corresponding state evolution state is solvable.
Thirdly, it follows from (3.13) that for 1≤i≤N. As Ui(t)=1−Ri(t)−Ti(t), then we have
g1i≤dUidt≤h1i,g2i≤dRidt≤h2i,g3i≤dTidt≤h3i. | (4.1) |
In inequality group (4.1),
g1i=−[CR0(1−CR(t))⋅α2∑j≠iRj(t)+βUN∑j=1aijRj(t)]Ui(t)−[CT0⋅ρ2∑j≠iTj(t)+ζNCT(t)ρ2+γUN∑j=1aijTj(t)]Ui(t)g2i=−[CT0⋅ρ1∑j≠iTj(t)+ζNCT(t)ρ1+γRN∑j=1aijTj(t)+δ]Ri(t),g3i=−[δ+CR0(1−CR(t))⋅α1∑j≠iRj(t)+βTN∑j=1aijRj(t)]Ti(t),h1i=δ[Ri(t)+Ti(t)]≤2δ,h2i=[CR0(1−CR(t))⋅α2∑j≠iRj(t)+βUN∑j=1aijRj(t)](1−Ri(t)−Ti(t))+[CR0(1−CR(t))⋅α1∑j≠iRj(t)+βTN∑j=1aijRj(t)]Ti(t)≤(α1+α2)CR0∑j≠iRj(t)+(βU+βT)N∑j=1aijRj(t),h3i=[CT0⋅ρ1∑j≠iTj(t)+ζNCT(t)ρ1+γRN∑j=1aijTj(t)]Ri(t)+[CT0⋅ρ2∑j≠iTj(t)+ζNCT(t)ρ2+γUN∑j=1aijTj(t)](1−Ri(t)−Ti(t))≤(ρ1+ρ2)(CT0∑j≠iTj(t)+¯CT(t)ζN)+(γR+γU)N∑j=1aijTj(t). |
Hence, f2(E,C) is bounded by a linear function in E.
Finally, F(E,C)≥0≥(C2R(t)+C2T(t))−(¯C2R+¯C2T)=‖C‖22−(¯C2R+¯C2T). Then there exists d1=1,ρ=2,d2=−(¯C2R+¯C2T) such that F(E,C)≥d1‖C‖ρ2+d2. By Lemma 4.1, the Theorem 4.1 is proved.
According to the optimal control theory, the Hamilton function of the URTC* problem is
H(E(t),C(t),X(t))=N∑i=1θ1iRi(t)+θ2CR0CR(t)N∑i=1Ri(t)+θ3CT(t)ζN+N∑i=1−λi(t){[CR0(1−CR(t))⋅α2∑j≠iRj(t)+βUN∑j=1aijRj(t)+CT0⋅ρ2∑j≠iTj(t)+ζNCT(t)ρ2+γUN∑j=1aijTj(t)]Ui(t)−δ(Ri(t)+Ti(t))}+N∑i=1μi(t){[CR0(1−CR(t))⋅α2∑j≠iRj(t)+βUN∑j=1aijRj(t)]Ui(t)+[CR0(1−CR(t))⋅α1∑j≠iRj(t)+βTN∑j=1aijRj(t)]Ti(t)−[δ+CT0⋅ρ1∑j≠iTj(t)+ζNCT(t)ρ1+γRN∑j=1aijTj(t)]Ri(t)}+N∑i=1νi(t){[CT0⋅ρ1∑j≠iTj(t)+ζNCT(t)ρ1+γRN∑j=1aijTj(t)]Ri(t)+[CT0⋅ρ2∑j≠iTj(t)+ζNCT(t)ρ2+γUN∑j=1aijTj(t)]Ui(t)−[δ+CR0(1−CR(t))⋅α1∑j≠iRj(t)+βTN∑j=1aijRj(t)]Ti(t)}, | (4.2) |
where X(t)=(λ(t),μ(t),ν(t))=(λ1,λ2,...,λN,μ1,μ2,...,μN,ν1,ν2,...,νN) is the adjoint of H. We give the necessary condition for the optimal control of the URTC* problem as follows.
Theorem 4.2. Suppose C=(CR(t),CT(t)) is an optimal control of the URTC* problem (3.12), E is the solution to the associated rumor spreading model (3.13). Then there exists an adjoint function X(t)=(λ(t),μ(t),ν(t)) such that the following equation hold.
{dλi(t)dt=(λi(t)−μi(t))[CR0(1−CR(t))⋅α2∑j≠iRj(t)+βUN∑j=1aijRj(t)]+(λi(t)−νi(t))[CT0⋅ρ2∑j≠iTj(t)+ζNCT(t)ρ2+γUN∑j=1aijTj(t)],dμi(t)dt=−θ1i−θ2CR0CR(t)−βUN∑j=1aji(μj(t)−λj(t))Uj(t)+δ(μi(t)−λi(t))−βTN∑j=1aji(μj(t)−νj(t))Tj(t)+[CT0⋅ρ1∑j≠iTj(t)+ζNCT(t)ρ1](μi(t)−νi(t))−γRN∑j=1aij(νi(t)−μi(t))Tj(t),dvi(t)dt=δ(νi(t)−λi(t))+γUN∑j=1aji(λj(t)−νj(t))Uj(t)−CR0(1−CR(t))⋅α1∑j≠iRj(t)(μi(t)−νi(t))−βTN∑j=1aij(μi(t)−νi(t))Rj(t)+γRN∑j=1aji(μj(t)−νj(t))Rj(t)0≤t≤T,i=1,2,...,N,λ(T)=μ(T)=ν(T)=0. | (4.3) |
Moreover, let
g1(t)=CR0⋅α2∑j≠iRj(t)N∑i=1(μi(t)−λi(t))Ui(t)+CR0⋅α1∑j≠iRj(t)N∑i=1(μi(t)−νi(t))Ti(t),g2(t)=ρ2N∑i=1(λi(t)−νi(t))Ui(t)+ρ1N∑i=1(μi(t)−νi(t))Ri(t). | (4.4) |
Then, for 0≤t≤T, we have
CR(t)={0,g1(t)<θ2CR0⋅N∑i=1Ri(t),¯CR,g1(t)>θ2CR0⋅N∑i=1Ri(t). | (4.5) |
CT(t)={0,g2(t)<θ3ζN,¯CT,g2(t)>θ3ζN. | (4.6) |
Proof. According to Pontryagin Minimum Principle[46], there exists (λ,μ,ν) such that
{dλidt=−∂H(E(t),CR(t),CT(t),λ(t),μ(t),ν(t))∂Ui,0≤t≤T,i=1,2,...,N,dμidt=−∂H(E(t),CR(t),CT(t),λ(t),μ(t),ν(t))∂Ri,0≤t≤T,i=1,2,...,N,dνidt=−∂H(E(t),CR(t),CT(t),λ(t),μ(t),ν(t))∂Ti,0≤t≤T,i=1,2,...,N. | (4.7) |
The first 3N equations in the system (4.3) follow by direct calculations. Since the terminal cost is unspecified and the final state is free, we have λ(T)=μ(T)=ν(T)=0. Based on Pontryagin Maximum Principle, we have
H(E(t),C(t),X(t))=argmin¯C∈CH(E(t),¯C,X(t)),0≤t≤T. | (4.8) |
Equations (4.4)-(4.6) follow by direct calculations.
By optimal control theory, Eqs (3.12) and (4.3) constitute the optimality system for the URTC model. We refer to the control in each solution to the optimality system as a potential optimal control (POC) of URTC* problem. It is seen from Eqs (4.5) and (4.6) that the optimality system may have more than one POC.
In the previous section, we introduced the notion of potential optimal control for the URTC model. In this section, we focus our attention on some examples of the potential control. First, in order to solve the problem of calculating the potential optimal control of the URTC model, we designed a POC algorithm, see Table 1: Algorithm POC. Here, POC is the acronym of the phrase "potential optimal control". Now solving the optimality system (3.13) and (4.4)-(4.6) by using Runge-Kutta and backward Runge-Kutta fourth order iterative procedure, where K=103[48,49]. The time computing complexity of Algorithm 1 is shown in Theorem 5.1. Suppose that the basic comment C0=(CR0,CT0)=(0.1,0.1) in the network. That is, the spontaneous comment ratio of network nodes at the initial moment. The control variables CR(t) and CT(t) are controlled on the basis of spontaneous comments.
Algorithm 1 POC |
Input: a URTC model Φ=(G,βU,βT,γU,γR,δ,¯CR,¯CT,α1,α2,ρ1,ρ2,CR0,CT0,θ1,θ2,θ3,ζ,T,E0), |
maximum number K of iteration. |
Output: the potential optimal control CR,CT. |
1.k←0,C(k)R←0,C(k)T←0,t∈[0,T], |
2.repeat, |
3.k←k+1, |
4.forward compute E using Eq (3.13) with CR=C(k−1)R,CT=C(k−1)T;E(k)←E, |
5.backward compute λ,μ and ν using Eq (4.3) with CR=C(k−1)R,CT=C(k−1)T and E=E(k); |
λ(k)←λ,μ(k)←μ,ν(k)←ν, |
6.compute CR,CT using Eqs (4.4)-(4.6) with E=E(k),λ=λ(k),μ=μ(k),ν=ν(k), |
C(k)R←CR,C(k)T←CT, |
7.until k>K, |
8.return C(k)R,C(k)T. |
Theorem 5.1. The time complexity of the Algorithm 1 is O(TKN2), where N is the number of nodes, T is the total number of controls the finite time horizon [0,T].
Proof. According to the algorithms we give in the original version of our paper, the analysis of their time complexity is given as follows. Assume that we perform our Algorithm 1 in a social network graph G(V,E) of N users and |E| connections. At time t, because solving each differential equation requires traversing the adjacency matrix of nodes. Therefore, the Runge-Kutta and backward Runge-Kutta fourth order iterative procedure has time complexity of O(N2). Because the maximum number of iterations of the Algorithm is K, and the number of control is T in the finite time horizon [0,T]. Therefore, the time complexity of Algorithm 1 is O(TKN2).
In order to generate a large number of URTC examples, two types of networks are selected: Synthetic networks include scale-free networks and small-world networks; real networks include Email network, Facebook network and Twitter network. The principle of parameter selection follows Table 2. In addition, the influence of different values of parameters on loss cost under Cpoc will be discussed in Section 6 for the parameters estimated according to the actual situation in the network.
Parameters | Description | Estimated value | Source |
βU | Probability of Uk→Rk affected by forwarding | 0.01-0.1 | [50] |
βT | Probability of Tk→Rk affected by forwarding | 0.05 | [50] |
γU | Probabilityof Uk→Tk affected by forwarding | 0.01-0.1 | [50] |
γR | Probability of Rk→Tk affected by forwarding | 0.05 | [50] |
δ | The conversin rate of returning to uncertain state | 0.09 | [51] |
α1 | Probability of Tk→Rk affected by comments | 0.01-0.5 | estimate |
α2 | Probability of Uk→Rk affected by comments | 0.01-0.5 | estimate |
ρ1 | Probability of Rk→Tk affected by comments | 0.01-0.5 | estimate |
ρ2 | Probability of Uk→Tk affected by comments | 0.01-0.5 | estimate |
ξ | The percentage of comments invested in support of truth | 0.01-0.05 | estimate |
Experiment 1: Optimal control strategies in synthetic and real networks.
The synthetic network selects classic complex network, scale-free network[52] and small-world network[53]. We get a synthetic scale-free network GSF and a small-world network GSW with N=100 nodes by software MATLAB, which is shown in Figure 2(a), (b). Let ASF and ASW denote the adjacency matrix of GSF and GSW. Subnetworks of real networks such as Email, Facebook and Twitter are selected, and their nodes are set as N=100. Their topological network graphs GEM,GFA,GTW are shown in Figure 2(c), (d), (e), and their corresponding adjacency matrices are AEM,AFA,ATW.
Suppose βU=0.1,βT=0.05,γU=0.08,γR=0.05,δ=0.02, ¯CR=¯CT=θ2=θ3=1, ξ=0.05,α1=ρ1=0.1,α2=ρ2=0.2, T=20,θ1=(1,...,1), E0=(U0,R0,T0)=(0.8,...,0.8,0.1,...,0.1,0.1,...,0.1). The optimal control Cpoc is obtained by solving the optimal system, as shown in Figure 3.
Experiment 2: The cost-effectiveness between Cpoc and Cp,q.
Suppose the parameters are the same as Experiment 1. Figure 4 shows the comparison of cost effectiveness between optimal strategy Cpoc and uniform control strategy Cp,q for URTC* problem. In the uniform control strategy, CR=p,CT=q, where p=(0,0.1,0.2,...,1),q=(0,0.1,0.2,...,1). It is seen that Cpoc<Cp,q for all p,q. Cpoc is superior to all the controls in both synthetic and real networks in terms of the cost effectiveness. In the above two experiments and 100 similar experiments, and in terms of cost-effectiveness, it is worth emphasizing that Cpoc outperforms all static controls in performance across all networks, confirming the optimality of Cpoc.
Experiment 3: The changes of node state under optimal control strategy Cpoc.
Suppose the parameters are the same as Experiment 1. In terms of the effect of rumor control, the following numerical simulation experiments are carried out. Taking node No. 50 as an example, we compare the change curves of the expected probabilities of rumor-spreading and truth-spreading under optimal control and uncontrolled control in synthetic and real networks. Under the optimal control Copc, along with the development of the time, rumor-spreading expected probability obviously decrease, truth expected probability obviously improved as shown in Figure 5. Among them, in Figure 5, It is clear that by controlling the comments we can make the rumor disappear and the probability of spreading the truth increase significantly.
In this section, we discuss the effect of the parameters related to comments on the expected cost-effectiveness under the optimal strategy through simulation experiments.
Experiment 4: The influence of spontaneous comments number CR0 and CT0 on rumor control.
The parameter CR0 represents the spontaneous comments in favor of rumor in the network, and CT0 represents the spontaneous comments in favor of the truth in the network. Let CR0=(0.1,0.3,0.5,0.7,0.9), CT0=0.1 and other parameters are the same as Experiment 1. Figure 6(a) expressed the change of cost-effectiveness under Cpoc as CR0 increases. Obviously, with the increase of CR0, the cost-effectiveness increases sharply, because the number of nodes believing rumor increases significantly due to the large number of spontaneous comments. In this case, the loss caused by rumor increases, and the efforts to control rumor also increase, so the cost-effectiveness increases significantly. That is, when the spontaneous comment of the rumor is large enough, that is, when the rumor has developed into public opinion, the cost of controlling the rumor will increase sharply. Another case, when CT0=(0.1,0.3,0.5,0.7,0.9),CR0=0.1 and other parameters are the same as Experiment 1. Figure 6(b) expressed the change of cost-effectiveness under Cpoc as CT0 increase. When believe the truth of the initial comments increases, will cause a lot of nodes under the influence of public opinion to increase a lot believe the truth of the node, then the probability of rumor of nodes is greatly reduced at the same time. As can be seen from the Figure 6(b), when CT0 is large enough, the cost-effectiveness caused by rumor becomes sharply smaller. This is because rumors will die out without any control.
Experiment 5: The effect of parameters α2 and ρ2 on the cost-effectiveness.
Let (1) α2=(0.1,0.2,0.3,0.4,0.5),ρ2=0.2; (2)ρ2=(0.1,0.2,0.3,0.4,0.5),α2=0.2, and other parameters are the same as Experiment 1. Figure 7 expressed the change of cost-effectiveness under Cpoc. As shown in Figure 7(a), it is worth noting that at this time, CR0=CT0=0.1 for the spontaneous comments, that is, when the rumor does not develop into public opinion, the cost of rumor control will hardly increase when α2 increases. Combined with the conclusion of Experiment 4, it can be seen that once rumor develop into public opinion, the loss of rumor control will increase greatly. Therefore, rumor control must be carried out at the early stage of rumor development. As shown in Figure 7(b), when ρ2 increases, the nodes that contact the comments of the truth position are more easily transformed into nodes that spread the truth. When ρ2 increases to a certain degree, there is no need to control the rumor, and the rumor will naturally die out, so the cost-effectiveness caused by rumor becomes smaller.
Experiment 6: The effect of parameters ξ on the cost-effectiveness.
Let ξ=(0.01,0.02,0.03,0.04,0.05), and other parameters are the same as Experiment 1. ξ indicates the percentage of invested comments that support the truth. This value is often determined by the rumor control budget. In fact, it is obvious that the higher the ratio of input to support the truth, the higher the cost consumed, but the higher the ratio of input, the influence of these comments will lead to the increase of the nodes spreading the truth, so as to achieve the purpose of rumor control. As can be seen from Figure 7(c), with the increase of ξ, the cost-effectiveness decreases obviously.
In this paper, a rumor-truth hybrid propagation node-level model based on comment mechanism is introduced to minimize the impact of rumor by developing comment strategies. On this basis, we model the original problem as the optimal control problem. Finally, we derive the optimal system for solving the optimal control problem. In the future, there are still many problems to be solved. In the node-level rumor propagation model, it is also worth studying how to select some nodes to control rumor, locate the location of rumor propagation sources and the influence of network community structure on rumor propagation.
This work is supported by the National Natural Science Foundation of China under Grant Nos.61807028, 61772449, 61572420 and 61802332, the Natural Science Foundation of Hebei Province China under Grant No. F2019203120. The authors are grateful to valuable comments and suggestions of the reviewers.
All authors declare no conflicts of interest in this paper.
[1] | J. Kostka, Y. A. Oswald, R. Wattenhofer, Word of mouth: Rumor dissemination in social networks, Springer Berlin Heidelberg, Berlin, Heidelberg, 2008. |
[2] |
W. Peterson, N. Gist, Rumor and public opinion, Am. J. Sociol., 57 (1951), 159-167. doi: 10.1086/220916
![]() |
[3] |
R. K. Garrett, Troubling consequences of online political rumoring, Hum. Commun. Res., 37 (2011), 255-274. doi: 10.1111/j.1468-2958.2010.01401.x
![]() |
[4] |
Y. Xiao, D. Chen, S. Wei, Q. Li, H. Wang, M. Xu, Rumor propagation dynamic model based on evolutionary game and anti-rumor, Nonlinear Dyn., 95 (2019), 523-539. doi: 10.1007/s11071-018-4579-1
![]() |
[5] | Y. Xiao, W. Li, S. Qiang, Q. Li, Y. Liu, A rumor & anti-rumor propagation model based on data enhancement and evolutionary game, IEEE Trans. Emerging Top. Comput., 2020. |
[6] |
Y. Xiao, Q. Yang, C. Sang, Y. Liu, Rumor diffusion model based on representation learning and anti-rumor, IEEE Trans. Network Serv. Manage., 17 (2020), 1910-1923. doi: 10.1109/TNSM.2020.2994141
![]() |
[7] | D. W. Huang, L. X. Yang, P. Li, X. Yang, Y. Y. Tang, Developing cost-effective rumor-refuting strategy through game-theoretic approach, IEEE Syst. J., (2020), 1-12. |
[8] | T. Bian, X. Xiao, T. Xu, P. Zhao, W. Huang, Y. Rong, et al., Rumor detection on social media with bi-directional graph convolutional networks, Proc. AAAI Conf. Artif. Intell., 34 (2020), 549-556. |
[9] |
K. Yu, H. Jiang, T. Li, S. Han, X. Wu, Data fusion oriented graph convolution network model for rumor detection, IEEE Trans. Network Serv. Manage., 17 (2020), 2171-2181. doi: 10.1109/TNSM.2020.3033996
![]() |
[10] | B. Wu, W. H. Cheng, Y. Zhang, J. Cao, J. Li, T. Mei, Unlocking author power: On the exploitation of auxiliary author-retweeter relations for predicting key retweeters, IEEE Trans. Knowledge Data Eng., 32 (2018), 549-559. |
[11] | X. Luo, C. Jiang, W. Wang, Y. Xu, J. H. Wang, W. Zhao, User behavior prediction in social networks using weighted extreme learning machine with distribution optimization, Future Gener. Comput. Syst., 93 (2018), 1023-1035. |
[12] |
Q. Lv, Y. Wang, B. Zhang, Q. Jin, RV-ML: An effective rumor verification scheme based on multi-task learning model, IEEE Commun. Lett., 24 (2020), 2527-2531. doi: 10.1109/LCOMM.2020.3011714
![]() |
[13] |
Y. Zhang, J. Xu, A dynamic competition and predation model for rumor and rumor-refutation, IEEE Access, 9 (2021), 9117-9129. doi: 10.1109/ACCESS.2020.3047934
![]() |
[14] |
Y. Cheng, L. Huo, L. Zhao, Rumor spreading in complex networks under stochastic node activity, Phys. A: Stat. Mech. Appl., 559 (2020), 125061. doi: 10.1016/j.physa.2020.125061
![]() |
[15] |
L. Zhu, F. Yang, G. Guan, Z. Zhang, Modeling the dynamics of rumor diffusion over complex networks, Inf. Sci., 562 (2021), 240-258. doi: 10.1016/j.ins.2020.12.071
![]() |
[16] |
L. Huo, S. Chen, Rumor propagation model with consideration of scientific knowledge level and social reinforcement in heterogeneous network, Phys. A: Stat. Mech. Appl., 559 (2020), 125063. doi: 10.1016/j.physa.2020.125063
![]() |
[17] |
S. Yu, Z. Yu, H. Jiang, J. Li, Dynamical study and event-triggered impulsive control of rumor propagation model on heterogeneous social network incorporating delay, Chaos, Solitons Fract., 145 (2021), 110806. doi: 10.1016/j.chaos.2021.110806
![]() |
[18] | D. Daley, D. Kendall, Epidemics and rumours, Nature, 204 (1964), 1118. |
[19] | D. J. Daley, D. G. Kendall, Stochastic rumours, IMA J. Appl. Math., 1 (1965), 42-55. |
[20] | D. H. Zanette, Dynamics of rumor propagation on small-world networks, Phys. Rev. E, 65 (2001), 041908. |
[21] |
D. H. Zanette, Critical behavior of propagation on small-world network, Phys. Rev. E, 64 (2001), 050901. doi: 10.1103/PhysRevE.64.050901
![]() |
[22] |
Y. Moreno, M. Nekovee, A. F. Pacheco, Dynamics of rumor spreading in complex networks, Phys. Rev. E, 69 (2004), 066130. doi: 10.1103/PhysRevE.69.066130
![]() |
[23] |
R. Pastor-Satorras, A. Vespignani, Epidemic dynamics and endemic states in complex networks, Phys. Rev. E, 63 (2001), 066117. doi: 10.1103/PhysRevE.63.066117
![]() |
[24] | Y. Moreno, R. Pastor-Satorras, A. Vespignani, Epidemic outbreaks in complex heterogeneous networks, Eur. Phys. J. B-Condens. Matter, 26 (2002), 521-529. |
[25] |
M. Nekovee, Y. Moreno, G. Bianconi, M. Marsili, Theory of rumour spreading in complex social networks, Phys. A: Stat. Mech. Appl., 374 (2007), 457-470. doi: 10.1016/j.physa.2006.07.017
![]() |
[26] |
J. Wang, L. Zhao, R. Huang, 2SI2R rumor spreading model in homogeneous networks, Phys. A: Stat. Mech. Appl., 413 (2014), 153-161. doi: 10.1016/j.physa.2014.06.053
![]() |
[27] |
J. Zhou, Z. Liu, B. Li, Influence of network structure on rumor propagation, Phys. Lett. A, 368 (2007), 458-463. doi: 10.1016/j.physleta.2007.01.094
![]() |
[28] |
F. Roshani, Y. Naimi, Effects of degree-biased transmission rate and nonlinear infectivity on rumor spreading in complex social networks, Phys. Rev. E, 85 (2012), 036109. doi: 10.1103/PhysRevE.85.036109
![]() |
[29] |
L. Zhao, X. Qiu, X. Wang, J. Wang, Rumor spreading model considering forgetting and remembering mechanisms in inhomogeneous network, Phys. A: Stat. Mech. Appl., 392 (2013), 987-994. doi: 10.1016/j.physa.2012.10.031
![]() |
[30] | Z. He, Z. Cai, X. Wang, Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks, Int. Conf. Distrib. Comput. Syst., 2015 (2015), 205-214. |
[31] |
Q. Liu, T. Li, M. Sun, The analysis of an seir rumor propagation model on heterogeneous network, Phys. A: Stat. Mech. Appl., 469 (2017), 372-380. doi: 10.1016/j.physa.2016.11.067
![]() |
[32] |
W. Liu, T. Li, X. Cheng, H. Xu, X. Liu, Spreading dynamics of a cyber violence model on scale-free networks, Phys. A: Stat. Mech. Appl., 531 (2019), 121752. doi: 10.1016/j.physa.2019.121752
![]() |
[33] | P. Van Mieghem, J. Omic, R. Kooij, Virus spread in networks, IEEE/ACM Trans. Networking, 17 (2008), 1-14. |
[34] |
P. Van Mieghem, The n-intertwined sis epidemic network model, Computing, 93 (2011), 147-169. doi: 10.1007/s00607-011-0155-y
![]() |
[35] |
F. D. Sahneh, F. N. Chowdhury, C. M. Scoglio, On the existence of a threshold for preventive behavioral responses to suppress epidemic spreading, Sci. Rep., 2 (2012), 632. doi: 10.1038/srep00632
![]() |
[36] |
S. Wen, J. Jiang, Y. Xiang, S. Yu, W. Zhou, W. Jia, To shut them up or to clarify: Restraining the spread of rumor in online social networks, IEEE Trans. Parallel Distrib. Syst., 25 (2014), 3306-3316. doi: 10.1109/TPDS.2013.2297115
![]() |
[37] |
L. X. Yang, P. Li, X. Yang, Y. Y. Tang, Security evaluation of the cyber networks under advanced persistent threats, IEEE Access, 5 (2017), 20111-20123. doi: 10.1109/ACCESS.2017.2757944
![]() |
[38] | K. Huang, P. D. Li, L. X. Yang, X. F. Yang, Y. Y. Tang, Seeking best-balanced patch-injecting strategies through optimal control approach, Secur. Commun. Networks, 2019 (2019), 122019. |
[39] |
S. Xu, W. Lu, Z. Zhan, A stochastic model of multivirus dynamics, IEEE Trans. Depend. Secure Comput., 9 (2012), 30-45. doi: 10.1109/TDSC.2011.33
![]() |
[40] | S. Xu, W. Lu, L. Xu, Z. Zhan, Adaptive epidemic dynamics in networks: Thresholds and control, Acm Trans. Auton. Adap. Syst., 8 (2014), 1-19. |
[41] |
L. Yang, M. Draief, X. Yang, Heterogeneous virus propagation in networks: A theoretical study, Math. Methods Appl. Sci., 40 (2017), 1396-1413. doi: 10.1002/mma.4061
![]() |
[42] |
L. X. Yang, T. R. Zhang, X. F. Yang, Y. B. Wu, Y. Yan, Effectiveness analysis of a mixed rumor-quelling strategy, J. Franklin Inst., 355 (2018), 8079-8105. doi: 10.1016/j.jfranklin.2018.07.040
![]() |
[43] |
C. Pan, L. Yang, X. Yang, Y. Wu, Y. Tang, An effective rumor-containing strategy, Phys. A: Stat. Mech. Appl., 500 (2018), 80-91. doi: 10.1016/j.physa.2018.02.025
![]() |
[44] |
J. Zhao, L. Yang, X. Zhong, X. Yang, Y. Wu, Y. Tang, Minimizing the impact of a rumor via isolation and conversion, Phys. A: Stat. Mech. Appl., 526 (2019), 120867. doi: 10.1016/j.physa.2019.04.103
![]() |
[45] | E. M. Stein, R. Shakarchi, Real analysis: Measure theory, integration, and Hilbert spaces, Princeton University Press, 2005. |
[46] | D. Liberzon, Calculus of variations and optimal control theory: A concise introduction, Princeton University Press, 2012. |
[47] | R. C. Robinson, An introduction to dynamical systems: Continuous and discrete, American Mathematical Society: Providence, RI, USA, 2004. |
[48] | S. Lenhart, J. T. Workman, Optimal control applied to biological models, Champion and Hall/CRC, 2007. |
[49] |
S. Jana, T. K. Kar, A mathematical study of a prey-predator model in relevance to pest control, Nonlinear Dyn., 74 (2013), 667-683. doi: 10.1007/s11071-013-0996-3
![]() |
[50] |
Y. Lan, Z. Lian, R. Zeng, D. Zhu, Y. Xia, M. Liu, et al., A statistical model of the impact of online rumors on theinformation quantity of online public opinion, Phys. A: Stat. Mech. Appl., 541 (2020), 123623. doi: 10.1016/j.physa.2019.123623
![]() |
[51] |
J. Chen, L. Yang, X. Yang, Y. Tang, Cost-effective anti-rumor message-pushing schemes, Phys. A: Stat. Mech. Appl., 540 (2020), 123085. doi: 10.1016/j.physa.2019.123085
![]() |
[52] |
R. Albert, A. L. Barabási, Statistical mechanics of complex networks, Rev. Modern Phys., 74 (2002), 47. doi: 10.1103/RevModPhys.74.47
![]() |
[53] |
D. J. Watts, S. H. Strogatz, Collective dynamics of 'small-world' networks, Nature, 393 (1998), 440-442. doi: 10.1038/30918
![]() |
1. | Ying Yu, Jiaomin Liu, Jiadong Ren, Cuiyi Xiao, Stability analysis and optimal control of a rumor propagation model based on two communication modes: friends and marketing account pushing, 2022, 19, 1551-0018, 4407, 10.3934/mbe.2022204 | |
2. | Haoming Guo, Xuefeng Yan, Dynamic modeling and simulation of rumor propagation based on the double refutation mechanism, 2023, 630, 00200255, 385, 10.1016/j.ins.2022.10.095 | |
3. | Linhe Zhu, Tianyu Yuan, Optimal control and parameter identification of a reaction–diffusion network propagation model, 2023, 111, 0924-090X, 21707, 10.1007/s11071-023-08949-y | |
4. | Peinan Ji, Xinyi Chen, Lianchao Yu, Research on the effect of corporate rumor clarification based on text analysis, 2024, 31, 1608-1625, 654, 10.1080/16081625.2024.2333750 | |
5. | Yang Xia, Haijun Jiang, A stochastic rumor spreading model with event-triggered discontinuous feedback control in multilingual online networks, 2024, 1598-5865, 10.1007/s12190-024-02184-3 |
Algorithm 1 POC |
Input: a URTC model Φ=(G,βU,βT,γU,γR,δ,¯CR,¯CT,α1,α2,ρ1,ρ2,CR0,CT0,θ1,θ2,θ3,ζ,T,E0), |
maximum number K of iteration. |
Output: the potential optimal control CR,CT. |
1.k←0,C(k)R←0,C(k)T←0,t∈[0,T], |
2.repeat, |
3.k←k+1, |
4.forward compute E using Eq (3.13) with CR=C(k−1)R,CT=C(k−1)T;E(k)←E, |
5.backward compute λ,μ and ν using Eq (4.3) with CR=C(k−1)R,CT=C(k−1)T and E=E(k); |
λ(k)←λ,μ(k)←μ,ν(k)←ν, |
6.compute CR,CT using Eqs (4.4)-(4.6) with E=E(k),λ=λ(k),μ=μ(k),ν=ν(k), |
C(k)R←CR,C(k)T←CT, |
7.until k>K, |
8.return C(k)R,C(k)T. |
Parameters | Description | Estimated value | Source |
βU | Probability of Uk→Rk affected by forwarding | 0.01-0.1 | [50] |
βT | Probability of Tk→Rk affected by forwarding | 0.05 | [50] |
γU | Probabilityof Uk→Tk affected by forwarding | 0.01-0.1 | [50] |
γR | Probability of Rk→Tk affected by forwarding | 0.05 | [50] |
δ | The conversin rate of returning to uncertain state | 0.09 | [51] |
α1 | Probability of Tk→Rk affected by comments | 0.01-0.5 | estimate |
α2 | Probability of Uk→Rk affected by comments | 0.01-0.5 | estimate |
ρ1 | Probability of Rk→Tk affected by comments | 0.01-0.5 | estimate |
ρ2 | Probability of Uk→Tk affected by comments | 0.01-0.5 | estimate |
ξ | The percentage of comments invested in support of truth | 0.01-0.05 | estimate |
Algorithm 1 POC |
Input: a URTC model Φ=(G,βU,βT,γU,γR,δ,¯CR,¯CT,α1,α2,ρ1,ρ2,CR0,CT0,θ1,θ2,θ3,ζ,T,E0), |
maximum number K of iteration. |
Output: the potential optimal control CR,CT. |
1.k←0,C(k)R←0,C(k)T←0,t∈[0,T], |
2.repeat, |
3.k←k+1, |
4.forward compute E using Eq (3.13) with CR=C(k−1)R,CT=C(k−1)T;E(k)←E, |
5.backward compute λ,μ and ν using Eq (4.3) with CR=C(k−1)R,CT=C(k−1)T and E=E(k); |
λ(k)←λ,μ(k)←μ,ν(k)←ν, |
6.compute CR,CT using Eqs (4.4)-(4.6) with E=E(k),λ=λ(k),μ=μ(k),ν=ν(k), |
C(k)R←CR,C(k)T←CT, |
7.until k>K, |
8.return C(k)R,C(k)T. |
Parameters | Description | Estimated value | Source |
βU | Probability of Uk→Rk affected by forwarding | 0.01-0.1 | [50] |
βT | Probability of Tk→Rk affected by forwarding | 0.05 | [50] |
γU | Probabilityof Uk→Tk affected by forwarding | 0.01-0.1 | [50] |
γR | Probability of Rk→Tk affected by forwarding | 0.05 | [50] |
δ | The conversin rate of returning to uncertain state | 0.09 | [51] |
α1 | Probability of Tk→Rk affected by comments | 0.01-0.5 | estimate |
α2 | Probability of Uk→Rk affected by comments | 0.01-0.5 | estimate |
ρ1 | Probability of Rk→Tk affected by comments | 0.01-0.5 | estimate |
ρ2 | Probability of Uk→Tk affected by comments | 0.01-0.5 | estimate |
ξ | The percentage of comments invested in support of truth | 0.01-0.05 | estimate |