Loading [MathJax]/jax/output/SVG/jax.js
Research article

Some weighted estimates for the commutators of p-adic Hardy operator on two weighted p-adic Herz-type spaces

  • Received: 31 March 2021 Accepted: 23 June 2021 Published: 25 June 2021
  • MSC : 42B35, 26D15, 46B25, 47G10

  • In the present artice we discuss the weighted p-adic central bounded mean oscillations (CMO) and p-adic Lipschtiz estimates for the commutators of p-adic Hardy operator on two weighted p-adic Herz-type spaces.

    Citation: Naqash Sarfraz, Muhammad Aslam. Some weighted estimates for the commutators of p-adic Hardy operator on two weighted p-adic Herz-type spaces[J]. AIMS Mathematics, 2021, 6(9): 9633-9646. doi: 10.3934/math.2021561

    Related Papers:

    [1] Yanchao Liu, Pengzhou Zhang, Deyu Li, Junpeng Gong . Dynamic analysis and optimum control of a rumor spreading model with multivariate gatekeepers. AIMS Mathematics, 2024, 9(11): 31658-31678. doi: 10.3934/math.20241522
    [2] Xuefeng Yue, Weiwei Zhu . The dynamics and control of an ISCRM fractional-order rumor propagation model containing media reports. AIMS Mathematics, 2024, 9(4): 9721-9745. doi: 10.3934/math.2024476
    [3] Xintong Wang, Sida Kang, Yuhan Hu . Dynamic analysis of a rumor propagation model considering individual identification ability. AIMS Mathematics, 2025, 10(2): 2295-2320. doi: 10.3934/math.2025107
    [4] Hongshuang Wang, Sida Kang, Yuhan Hu . Dynamic analysis and optimal control of rumor propagation models considering different education levels and hesitation mechanisms. AIMS Mathematics, 2024, 9(8): 20089-20117. doi: 10.3934/math.2024979
    [5] Hui Wang, Shuzhen Yu, Haijun Jiang . Rumor model on social networks contemplating self-awareness and saturated transmission rate. AIMS Mathematics, 2024, 9(9): 25513-25531. doi: 10.3934/math.20241246
    [6] Liuqin Huang, Jinling Wang, Jiarong Li, Tianlong Ma . Analysis of rumor spreading with different usage ranges in a multilingual environment. AIMS Mathematics, 2024, 9(9): 24018-24038. doi: 10.3934/math.20241168
    [7] Rongrong Yin, Ahmadjan Muhammadhaji . Dynamics in a delayed rumor propagation model with logistic growth and saturation incidence. AIMS Mathematics, 2024, 9(2): 4962-4989. doi: 10.3934/math.2024241
    [8] Xin Yi, Rong Liu . An age-dependent hybrid system for optimal contraception control of vermin. AIMS Mathematics, 2025, 10(2): 2619-2633. doi: 10.3934/math.2025122
    [9] Liyuan Xia, Jianjun Wang, Shihua Fu, Yuxin Gao . Control design to minimize the number of bankrupt players for networked evolutionary games with bankruptcy mechanism. AIMS Mathematics, 2024, 9(12): 35702-35720. doi: 10.3934/math.20241694
    [10] Houssine Zine, Abderrahim El Adraoui, Delfim F. M. Torres . Mathematical analysis, forecasting and optimal control of HIV/AIDS spatiotemporal transmission with a reaction diffusion SICA model. AIMS Mathematics, 2022, 7(9): 16519-16535. doi: 10.3934/math.2022904
  • In the present artice we discuss the weighted p-adic central bounded mean oscillations (CMO) and p-adic Lipschtiz estimates for the commutators of p-adic Hardy operator on two weighted p-adic Herz-type spaces.



    Nowadays, with the rapid development of network and information technology, the distance between people is shortened by the network. The common way of information transmission has also changed from the traditional face-to-face transmission to online social networks (OSN), such as Facebook, Twitter, etc. At the same time, the spread of inaccurate information, or rumors[1,2], through OSN has become very rapid. The spread of rumors will bring economic losses and adverse political effects to the society[3]. Therefore, it is of practical importance to effectively control the spread of rumors.

    Scholars at home and abroad have conducted in-depth research on the spread of rumors on the Internet. In recent years, some scholars have used game theory to discuss the antagonistic game relationship between rumor and anti-rumor[4,5,6,7]; some scholars have used graph convolution to study the rumor propagation model[8,9]; some scholars have extracted the characteristics of user behavior from the big data in social networks and studied the rumor propagation law through deep learning algorithm[10,11,12]; using biological models including infectious disease models to study the mechanism of rumor transmission is also a major research method[13,14,15,16,17].

    When spreading information (whether rumor or truth) on social networks, users can post comments representing their own views under the topic. The direction of public opinion will affect the spread of rumors or truth. In view of this situation, this paper establishes a node-based rumor propagation model under the comment mechanism by using the infectious disease model theory. The main contributions of this paper are as follows:

    ● First, we establish a node-level rumor-truth mixed propagation model based on the comment mechanism, so as to measure the influence of comment on rumors.

    ● Secondly, on this basis, we model the rumor-truth mixed problem based on comments as an optimal control problem, which is called uncertain-rumor-truth-comment (URTC) model.

    ● Thirdly, we prove that the model has the optimal control and obtain the optimal system for solving the model.

    ● Fourthly, by solving the corresponding optimal system, some optimal control strategies are given.

    ● Finally, through the sensitivity analysis of the relevant parameters of comments, the influence of comments on rumor propagation is further discussed.

    This work is conducive to better suppressing the spread of rumors. The main organization of this paper is as follows: In Section 2, we review some of the relevant work. In Section 3, we modeled the node-level URTC model for the rumor-truth propagation problem, and modeled the URTC problem into the optimal control problem. Section 4 makes a theoretical analysis of the optimal control problem and gives a strategy to control rumors through comments. Some optimal URTC strategies are given in Section 5. In Section 6, the influence of comments on rumor propagation is further revealed through the sensitivity analysis of parameters. The work is closed by Section 7.

    In this section, in order to illustrate the novelty of this work, we review the work related to this paper.

    Pioneering research on rumor propagation based on infectious disease models was conducted in 1964, when the first classic rumor propagation model DK model was proposed by Daley and Kendal [18,19]. Later, some scholars improved the DK model for different network structures, and the common point of these models is to assume that the network structures are homogeneous. In fact, with the improvement of people's cognition of the Internet, empirical findings have shown that many real world networks are highly structured and heterogeneous since the end of last century. Under the guidance of this cognition, Zanette[20,21] first proposed the rumor propagation model based on small-world network in 2001. In 2004, Moreno[22] built a mathematical model based on rumor propagation in a scale-free complex network. Many researchers[23,24,25,26,27,28,29,30,31,32] have conducted in-depth studies on rumor propagation in heterogeneous network structures.

    Since 2009, some scholars have studied the spread of infectious diseases[33,34,35], network security[36,37,38], software security[39,40,41] and other aspects based on the individual-level modeling method. Recently, some scholars have proposed a node-based rumor propagation model[42,43,44] by using the modeling method based on individual level. Compared with the rumor propagation model on heterogeneous networks, the node-level rumor propagation model not only considers the statistical data of topological attributes of the underlying network, but also the entire network structure, so it deeply reflects the influence of specific network structure on rumor propagation. Inspired by the node-level rumor propagation model, this paper considers the influence of comments on rumor propagation. Once an individual or organization publishes information online, ordinary people cannot judge whether the information is true or false. People may believe and spread the information, whether it is rumor or not. In fact, publicizing the truth is the main way to suppress rumor. In addition to choosing their own attitudes and disseminating them, some people who are exposed to information also post comments on the Internet to support their views and positions, and these comments will also influence the subsequent positions of people who are newly exposed to information. In other words, comments have an important impact on rumor propagation. On this basis, we establish a mixed rumor-truth propagation model based on comments. And it is modeled as an optimal control problem.

    In this section we consider the issue of rumor propagation on OSN with comments. Suppose that in the process of spreading rumors, some people will comment that represent their own views. And those comments may influence the opinions of those exposed to the rumor. This section is dedicated to this problem according to the following procedures: First, introduce the basic terms and symbols. Secondly, the node-level model of URTC rumor spreading model is established. Finally, the URTC problem is modeled as an optimal control problem.

    Assume that the number of nodes in the network is constant and the total number of users on the OSN is N, let G=(V,E) denote the topology of this network. Where V=(V1,V2,...,VN) represents the nodes of the network, N is the number of nodes in the network. Eij={Vi,Vj}E represents node Vj can sent messages to node Vi, so G is a directed network. Where A=(aij)N×N represents the adjacency matrix of network G. When aij=1, node Vj can forward rumors or truth to node Vi through the link. aij=0 means that node Vj cannot spread information to node Vi, whether it is rumors or truth.

    Suppose that the rumor and the truth are spread in the network G in the finite time horizon [0,T]. Assuming that at any time t in the time horizon, the state of a node can only be one of three states: uncertain, rumor-spreading and truth-spreading. The uncertain state means that the node cannot make a choice, neither believes in rumor nor the truth, so no information will be spread. The state of rumor-spreading is to believe and spread rumor. The state of truth-spreading is the belief and transmission of truth. Let Oi(t)=0,1 and 2 respectively indicate that node Vi is an uncertain state, rumor-spreading and truth-spreading at time t. Let

    O(t)=(O1(t),O2(t),...,ON(t)). (3.1)

    In order to solve the problem of rumor propagation under the comment mechanism, we introduce the following hypotheses:

    (1) Due to the influence of neighbor nodes who believe the rumor, an uncertain node Vi becomes rumor-spreading with probability βUNj=1aijχ{Oj(t)=1} on average.

    (2) Due to the influence of neighbor nodes who believe the truth, an uncertain node Vi becomes truth-spreading with probability γUNj=1aijχ{Oj(t)=2} on average.

    (3) Due to the influence of neighbor nodes who believe the rumor, a truth-spreading node Vi becomes rumor-spreading with probability βTNj=1aijχ{Oj(t)=1} on average, βUβT.

    (4) Due to the influence of neighbor nodes who believe the truth, a rumor-spreading node Vi becomes truth-spreading with probability γRNj=1aijχ{Oj(t)=2} on average, γUγR.

    (5) Due to the attenuation of memory, a rumor-spreading node becomes uncertain with probability δ on average.

    (6) The average probability of comments supporting rumor posted on the network is CR0.

    (7) The average probability of comments supporting truth posted on the network is CT0.

    (8) Due to the influence of comments supporting the rumor, a truth-spreading node Vi is transformed into rumor-spreading with probability α1 on average.

    (9) Due to the influence of comments supporting the rumor, an uncertain node Vi is transformed into rumor-spreading with probability α2 on average. Obviously, α1α2.

    (10) Due to the influence of comments supporting the truth, a rumor-spreading node Vi is transformed into truth-spreading with probability ρ1 on average.

    (11) Due to the influence of comments supporting the truth, an uncertain node Vi is transformed into truth-spreading with probability ρ2 on average. Obviously, ρ1ρ2.

    The above assumptions are independent of each other, and the state transition diagram of the node is shown in Figure 1. In practice, parameters βU,γU,βT,γR,δ,CR0,CT0,α1,α2,ρ1,ρ2 can be estimated from the information of the network.

    Figure 1.  Diagram of the rumor and truth mixed spreading with comments model.

    Then the vector O(t) represents the state of N nodes in the network at time t. Since some nodes will also publish comments representing their own opinions while spreading rumor and truth, this causes the status of nodes to change over time. Let Ui(t),Ri(t),Ti(t) denote the expected probabilities of node Vi being uncertain, rumor-spreading and truth-spreading at time t, respectively.

    Ui(t)=Pr{Oi(t)=0},Ri(t)=Pr{Oi(t)=1},Ti(t)=Pr{Oi(t)=2}. (3.2)

    Note that Ui(t)+Ri(t)+Ui(t)=1. The vector

    E(t)=(U(t),R(t),T(t)) (3.3)

    represents the expected state of node in the network at time t, where

    {U(t)=(U1(t),U2(t),...,UN(t)),R(t)=(R1(t),R2(t),...,RN(t)),T(t)=(T1(t),T2(t),...,TN(t)). (3.4)

    The rumor-truth hybrid with comments propagation model to be derived below conforms to the above hypothesis. The following system gives an equivalent form of the exact URTC model.

    {dUi(t)dt=[CR0α2jiRj(t)+βUNj=1aijRj(t)]Ui(t)[CT0ρ2jiTj(t)+γUNj=1aijTj(t)]Ui(t)+δ(Ri(t)+Ti(t)),dRi(t)dt=[CR0α2jiRj(t)+βUNj=1aijRj(t)]Ui(t)+[CR0α1jiRj(t)+βTNj=1aijRj(t)]Ti(t)[CT0ρ1jiTj(t)+γRNj=1aijTj(t)+δ]Ri(t),dTi(t)dt=[CT0ρ1jiTj(t)+γRNj=1aijTj(t)]Ri(t)+[CT0ρ2jiTj(t)+γUNj=1aijTj(t)]Ui(t)[δ+CR0α1jiRj(t)+βTNj=1aijRj(t)]Ti(t),0tT,1iN, (3.5)

    with the initial condition E(0)=E0.

    The system (3.5) may be written in system as

    {dE(t)dt=f1(E(t)),0tT,E(0)=E0. (3.6)

    Let C(t)=(CR(t),CT(t)),0tT, consider C(t) as the control variable of the URTC problem, where CR(t) represents the rumor control variable and CT(t) represents the truth control variable. The upper limit of this strategy is determined as shown in the following remarks:

    Remark 3.1. The upper limit ¯CR of CR(t) is determined by basic human rights, and CR(t) is controlled on the basis of comments CR0 spontaneously generated by rumor in the network, that is 0CR(t)¯CR1. When CR(t)=0, there is no human interference in rumor comments in the network. At this time, the comments supporting the rumor in the network are determined by the initial comments of the node. When CR(t)=1, comments supporting the rumor will disappear at time t.

    Remark 3.2. The manual intervention to the comments supporting the truth takes the form of increasing the number of comments supporting the truth, denoted as CT(t). The upper bound ¯CT of CT(t) is determined by the cost of increasing comments that agree with the truth, and by the size of the network.

    So we assume that the URTC strategy is

    C={C(t)L[0,T]2|0CR(t)¯CR,0CT(t)¯CT,0tT},

    where L[0,T] represents the set of all Lebesgue integrable functions defined on [0,T][45].

    In order to solve the problem of rumor control with a comment mechanism, we first evaluate the loss caused by the negative impact of rumor. First, assuming that the unit loss caused by the spreading rumor node Vi per unit time is a constant θ1i. Then the total loss caused by the spreading of rumor in the time horizon [0,T] can be expressed as

    L1(C)=T0Ni=1θ1iRi(t)dt. (3.7)

    The vector θ1=(θ11,θ12,...,θ1N) represents the unit loss caused by the rumor of each node.

    Secondly, assuming that the unit cost of controlling the comments supporting rumor per unit time is θ2. The cost of controlling the comments supporting rumor in the time horizon [0,T] can be expressed as

    L2(C)=T0θ2CR(t)CR0Ni=1Ri(t)dt. (3.8)

    Finally, assuming that the unit cost of pushing the comments supporting truth per unit time is θ3. The scale of the number of artificially increased comments is ζN, where N is the number of nodes in the network and ζ is the ratio of increased comments. The cost of pushing the comments supporting the truth in the time horizon [0,T] can be expressed as

    L3(C)=T0θ3CT(t)ζNdt. (3.9)

    Remark 3.3. The parameter θ1 is estimated by the adverse social impact caused by the spread of rumor, and the parameter θ2 is estimated by deleting the comments supporting the rumor in the OSN; the parameter θ3 is estimated by sending or publishing comments on supporting the truth.

    In summary, the expected loss of rumor spread is

    J(C)=L1(C)+L2(C)+L3(C)=T0Ni=1θ1iRi(t)dt+θ2T0CR(t)CR0Ni=1Ri(t)dt+θ3T0CT(t)ζNdtT0F(E(t),C(t))dt, (3.10)

    where

    F(E(t),C(t))=Ni=1θ1iRi(t)+θ2CR(t)CR0Ni=1Ri(t)+θ3CT(t)ζN. (3.11)

    Based on the above discussion and assumptions, this URTC problem is modeled as the following optimal control problem

    minCC=T0F(E(t),C(t))dtsubjectto
    {dUi(t)dt=[CR0(1CR(t))α2jiRj(t)+βUNj=1aijRj(t)]Ui(t)[CT0ρ2jiTj(t)+ζNCT(t)ρ2+γUNj=1aijTj(t)]Ui(t)+δ(Ri(t)+Ti(t)),dRi(t)dt=[CR0(1CR(t))α2jiRj(t)+βUNj=1aijRj(t)]Ui(t)+[CR0(1CR(t))α1jiRj(t)+βTNj=1aijRj(t)]Ti(t)[CT0ρ1jiTj(t)+ζNCT(t)ρ1+γRNj=1aijTj(t)+δ]Ri(t),dTi(t)dt=[CT0ρ1jiTj(t)+ζNCT(t)ρ1+γRNj=1aijTj(t)]Ri(t)+[CT0ρ2jiTj(t)+ζNCT(t)ρ2+γUNj=1aijTj(t)]Ui(t)[δ+CR0(1CR(t))α1jiRj(t)+βTNj=1aijRj(t)]Ti(t),E(0)=E0. (3.12)

    The associated rumor spreading model can be recast in matrix notation as

    {dE(t)dt=f2(E(t),C(t)),0tT,E(0)=E0. (3.13)

    We refer to this optimal control problem as the URTC* problem. This model can be described as the following 20-tuple problem:

    Φ=(G,βU,βT,γU,γR,δ,¯CR,¯CT,α1,α2,ρ1,ρ2,CR0,CT0,θ1,θ2,θ3,ζ,T,E0) (3.14)

    First, we first prove that this problem is an optimal control problem and can be solved. So we derive the following Lemma[46]:

    Lemma 4.1. The URTC* problem is an optimal control if the following five conditions are held simultaneously.

    (1) Cis convex and closed.

    (2) There exists CC such that the system (3.13) is solvable.

    (3) f2(E,C) is bounded by a linear function in E.

    (4) F(E,C) is convex on C.

    (5) There exist ρ>1,d1>0, and d2 such that F(E,C)d1Cρ2+d2.

    Then we can conclude the following Theorem.

    Theorem 4.1. This URTC* problem is an optimal control problem.

    Proof. First, let C(t)=(CR(t),CT(t)) be a limit point of C. Then there exists a sequence of points of C, C(n)(t)=(C(n)R(t),C(n)T(t)),n=1,2,..., that approaches C(t). Since

    0CR(t)=limnC(n)R(t)¯CR,0CT(t)=limnC(n)T(t)¯CT,0tT.

    Hence, C is closed. Let C(1),C(2)C,0<η<1,ˆC=(1η)C(1)+ηC(2). As L[0,T]2 is a real vector space, we have ˆCL[0,T]2 and 0(1η)C(1)R(t)+ηC(2)R(t)¯CR,0(1η)C(1)T(t)+ηC(2)T(t)¯CT,0tT. Hence, C is convex. Secondly, let C(t)=(CR(t),CT(t)), then CC. As f2(E,C) is continuously differentiable, it follows by the Continuation Theorem for Differentiable Systems[47] that the corresponding state evolution state is solvable.

    Thirdly, it follows from (3.13) that for 1iN. As Ui(t)=1Ri(t)Ti(t), then we have

    g1idUidth1i,g2idRidth2i,g3idTidth3i. (4.1)

    In inequality group (4.1),

    g1i=[CR0(1CR(t))α2jiRj(t)+βUNj=1aijRj(t)]Ui(t)[CT0ρ2jiTj(t)+ζNCT(t)ρ2+γUNj=1aijTj(t)]Ui(t)g2i=[CT0ρ1jiTj(t)+ζNCT(t)ρ1+γRNj=1aijTj(t)+δ]Ri(t),g3i=[δ+CR0(1CR(t))α1jiRj(t)+βTNj=1aijRj(t)]Ti(t),h1i=δ[Ri(t)+Ti(t)]2δ,h2i=[CR0(1CR(t))α2jiRj(t)+βUNj=1aijRj(t)](1Ri(t)Ti(t))+[CR0(1CR(t))α1jiRj(t)+βTNj=1aijRj(t)]Ti(t)(α1+α2)CR0jiRj(t)+(βU+βT)Nj=1aijRj(t),h3i=[CT0ρ1jiTj(t)+ζNCT(t)ρ1+γRNj=1aijTj(t)]Ri(t)+[CT0ρ2jiTj(t)+ζNCT(t)ρ2+γUNj=1aijTj(t)](1Ri(t)Ti(t))(ρ1+ρ2)(CT0jiTj(t)+¯CT(t)ζN)+(γR+γU)Nj=1aijTj(t).

    Hence, f2(E,C) is bounded by a linear function in E.

    Finally, F(E,C)0(C2R(t)+C2T(t))(¯C2R+¯C2T)=C22(¯C2R+¯C2T). Then there exists d1=1,ρ=2,d2=(¯C2R+¯C2T) such that F(E,C)d1Cρ2+d2. By Lemma 4.1, the Theorem 4.1 is proved.

    According to the optimal control theory, the Hamilton function of the URTC* problem is

    H(E(t),C(t),X(t))=Ni=1θ1iRi(t)+θ2CR0CR(t)Ni=1Ri(t)+θ3CT(t)ζN+Ni=1λi(t){[CR0(1CR(t))α2jiRj(t)+βUNj=1aijRj(t)+CT0ρ2jiTj(t)+ζNCT(t)ρ2+γUNj=1aijTj(t)]Ui(t)δ(Ri(t)+Ti(t))}+Ni=1μi(t){[CR0(1CR(t))α2jiRj(t)+βUNj=1aijRj(t)]Ui(t)+[CR0(1CR(t))α1jiRj(t)+βTNj=1aijRj(t)]Ti(t)[δ+CT0ρ1jiTj(t)+ζNCT(t)ρ1+γRNj=1aijTj(t)]Ri(t)}+Ni=1νi(t){[CT0ρ1jiTj(t)+ζNCT(t)ρ1+γRNj=1aijTj(t)]Ri(t)+[CT0ρ2jiTj(t)+ζNCT(t)ρ2+γUNj=1aijTj(t)]Ui(t)[δ+CR0(1CR(t))α1jiRj(t)+βTNj=1aijRj(t)]Ti(t)}, (4.2)

    where X(t)=(λ(t),μ(t),ν(t))=(λ1,λ2,...,λN,μ1,μ2,...,μN,ν1,ν2,...,νN) is the adjoint of H. We give the necessary condition for the optimal control of the URTC* problem as follows.

    Theorem 4.2. Suppose C=(CR(t),CT(t)) is an optimal control of the URTC* problem (3.12), E is the solution to the associated rumor spreading model (3.13). Then there exists an adjoint function X(t)=(λ(t),μ(t),ν(t)) such that the following equation hold.

    {dλi(t)dt=(λi(t)μi(t))[CR0(1CR(t))α2jiRj(t)+βUNj=1aijRj(t)]+(λi(t)νi(t))[CT0ρ2jiTj(t)+ζNCT(t)ρ2+γUNj=1aijTj(t)],dμi(t)dt=θ1iθ2CR0CR(t)βUNj=1aji(μj(t)λj(t))Uj(t)+δ(μi(t)λi(t))βTNj=1aji(μj(t)νj(t))Tj(t)+[CT0ρ1jiTj(t)+ζNCT(t)ρ1](μi(t)νi(t))γRNj=1aij(νi(t)μi(t))Tj(t),dvi(t)dt=δ(νi(t)λi(t))+γUNj=1aji(λj(t)νj(t))Uj(t)CR0(1CR(t))α1jiRj(t)(μi(t)νi(t))βTNj=1aij(μi(t)νi(t))Rj(t)+γRNj=1aji(μj(t)νj(t))Rj(t)0tT,i=1,2,...,N,λ(T)=μ(T)=ν(T)=0. (4.3)

    Moreover, let

    g1(t)=CR0α2jiRj(t)Ni=1(μi(t)λi(t))Ui(t)+CR0α1jiRj(t)Ni=1(μi(t)νi(t))Ti(t),g2(t)=ρ2Ni=1(λi(t)νi(t))Ui(t)+ρ1Ni=1(μi(t)νi(t))Ri(t). (4.4)

    Then, for 0tT, we have

    CR(t)={0,g1(t)<θ2CR0Ni=1Ri(t),¯CR,g1(t)>θ2CR0Ni=1Ri(t). (4.5)
    CT(t)={0,g2(t)<θ3ζN,¯CT,g2(t)>θ3ζN. (4.6)

    Proof. According to Pontryagin Minimum Principle[46], there exists (λ,μ,ν) such that

    {dλidt=H(E(t),CR(t),CT(t),λ(t),μ(t),ν(t))Ui,0tT,i=1,2,...,N,dμidt=H(E(t),CR(t),CT(t),λ(t),μ(t),ν(t))Ri,0tT,i=1,2,...,N,dνidt=H(E(t),CR(t),CT(t),λ(t),μ(t),ν(t))Ti,0tT,i=1,2,...,N. (4.7)

    The first 3N equations in the system (4.3) follow by direct calculations. Since the terminal cost is unspecified and the final state is free, we have λ(T)=μ(T)=ν(T)=0. Based on Pontryagin Maximum Principle, we have

    H(E(t),C(t),X(t))=argmin¯CCH(E(t),¯C,X(t)),0tT. (4.8)

    Equations (4.4)-(4.6) follow by direct calculations.

    By optimal control theory, Eqs (3.12) and (4.3) constitute the optimality system for the URTC model. We refer to the control in each solution to the optimality system as a potential optimal control (POC) of URTC* problem. It is seen from Eqs (4.5) and (4.6) that the optimality system may have more than one POC.

    In the previous section, we introduced the notion of potential optimal control for the URTC model. In this section, we focus our attention on some examples of the potential control. First, in order to solve the problem of calculating the potential optimal control of the URTC model, we designed a POC algorithm, see Table 1: Algorithm POC. Here, POC is the acronym of the phrase "potential optimal control". Now solving the optimality system (3.13) and (4.4)-(4.6) by using Runge-Kutta and backward Runge-Kutta fourth order iterative procedure, where K=103[48,49]. The time computing complexity of Algorithm 1 is shown in Theorem 5.1. Suppose that the basic comment C0=(CR0,CT0)=(0.1,0.1) in the network. That is, the spontaneous comment ratio of network nodes at the initial moment. The control variables CR(t) and CT(t) are controlled on the basis of spontaneous comments.

    Table 1.  Algorithm POC.
    Algorithm 1 POC
    Input: a URTC model Φ=(G,βU,βT,γU,γR,δ,¯CR,¯CT,α1,α2,ρ1,ρ2,CR0,CT0,θ1,θ2,θ3,ζ,T,E0),
    maximum number K of iteration.
    Output: the potential optimal control CR,CT.
    1.k0,C(k)R0,C(k)T0,t[0,T],
    2.repeat,
    3.kk+1,
    4.forward compute E using Eq (3.13) with CR=C(k1)R,CT=C(k1)T;E(k)E,
    5.backward compute λ,μ and ν using Eq (4.3) with CR=C(k1)R,CT=C(k1)T and E=E(k);
    λ(k)λ,μ(k)μ,ν(k)ν,
    6.compute CR,CT using Eqs (4.4)-(4.6) with E=E(k),λ=λ(k),μ=μ(k),ν=ν(k),
    C(k)RCR,C(k)TCT,
    7.until k>K,
    8.return C(k)R,C(k)T.

     | Show Table
    DownLoad: CSV

    Theorem 5.1. The time complexity of the Algorithm 1 is O(TKN2), where N is the number of nodes, T is the total number of controls the finite time horizon [0,T].

    Proof. According to the algorithms we give in the original version of our paper, the analysis of their time complexity is given as follows. Assume that we perform our Algorithm 1 in a social network graph G(V,E) of N users and |E| connections. At time t, because solving each differential equation requires traversing the adjacency matrix of nodes. Therefore, the Runge-Kutta and backward Runge-Kutta fourth order iterative procedure has time complexity of O(N2). Because the maximum number of iterations of the Algorithm is K, and the number of control is T in the finite time horizon [0,T]. Therefore, the time complexity of Algorithm 1 is O(TKN2).

    In order to generate a large number of URTC examples, two types of networks are selected: Synthetic networks include scale-free networks and small-world networks; real networks include Email network, Facebook network and Twitter network. The principle of parameter selection follows Table 2. In addition, the influence of different values of parameters on loss cost under Cpoc will be discussed in Section 6 for the parameters estimated according to the actual situation in the network.

    Table 2.  The parameters description of the URTC model.
    Parameters Description Estimated value Source
    βU Probability of UkRk affected by forwarding 0.01-0.1 [50]
    βT Probability of TkRk affected by forwarding 0.05 [50]
    γU Probabilityof UkTk affected by forwarding 0.01-0.1 [50]
    γR Probability of RkTk affected by forwarding 0.05 [50]
    δ The conversin rate of returning to uncertain state 0.09 [51]
    α1 Probability of TkRk affected by comments 0.01-0.5 estimate
    α2 Probability of UkRk affected by comments 0.01-0.5 estimate
    ρ1 Probability of RkTk affected by comments 0.01-0.5 estimate
    ρ2 Probability of UkTk affected by comments 0.01-0.5 estimate
    ξ The percentage of comments invested in support of truth 0.01-0.05 estimate

     | Show Table
    DownLoad: CSV

    Experiment 1: Optimal control strategies in synthetic and real networks.

    The synthetic network selects classic complex network, scale-free network[52] and small-world network[53]. We get a synthetic scale-free network GSF and a small-world network GSW with N=100 nodes by software MATLAB, which is shown in Figure 2(a), (b). Let ASF and ASW denote the adjacency matrix of GSF and GSW. Subnetworks of real networks such as Email, Facebook and Twitter are selected, and their nodes are set as N=100. Their topological network graphs GEM,GFA,GTW are shown in Figure 2(c), (d), (e), and their corresponding adjacency matrices are AEM,AFA,ATW.

    Figure 2.  Two synthetic network: (a) Scale-free network, (b) Small-world network, (c) Email network, (d) Facebook network, (e) Twitter network.

    Suppose βU=0.1,βT=0.05,γU=0.08,γR=0.05,δ=0.02, ¯CR=¯CT=θ2=θ3=1, ξ=0.05,α1=ρ1=0.1,α2=ρ2=0.2, T=20,θ1=(1,...,1), E0=(U0,R0,T0)=(0.8,...,0.8,0.1,...,0.1,0.1,...,0.1). The optimal control Cpoc is obtained by solving the optimal system, as shown in Figure 3.

    Figure 3.  Optimal control strategies Cpoc in synthetic and real networks: (a) Scale-free network, (b) Small-world network, (c) Email network, (d) Facebook network, (e) Twitter network.

    Experiment 2: The cost-effectiveness between Cpoc and Cp,q.

    Suppose the parameters are the same as Experiment 1. Figure 4 shows the comparison of cost effectiveness between optimal strategy Cpoc and uniform control strategy Cp,q for URTC* problem. In the uniform control strategy, CR=p,CT=q, where p=(0,0.1,0.2,...,1),q=(0,0.1,0.2,...,1). It is seen that Cpoc<Cp,q for all p,q. Cpoc is superior to all the controls in both synthetic and real networks in terms of the cost effectiveness. In the above two experiments and 100 similar experiments, and in terms of cost-effectiveness, it is worth emphasizing that Cpoc outperforms all static controls in performance across all networks, confirming the optimality of Cpoc.

    Figure 4.  The comparison of cost-effectiveness J(C) between optimal strategy Cpoc and uniform control strategy Cp,q: (a) Scale-free network, (b) Small-world network, (c) Email network, (d) Facebook network, (e) Twitter network.

    Experiment 3: The changes of node state under optimal control strategy Cpoc.

    Suppose the parameters are the same as Experiment 1. In terms of the effect of rumor control, the following numerical simulation experiments are carried out. Taking node No. 50 as an example, we compare the change curves of the expected probabilities of rumor-spreading and truth-spreading under optimal control and uncontrolled control in synthetic and real networks. Under the optimal control Copc, along with the development of the time, rumor-spreading expected probability obviously decrease, truth expected probability obviously improved as shown in Figure 5. Among them, in Figure 5, It is clear that by controlling the comments we can make the rumor disappear and the probability of spreading the truth increase significantly.

    Figure 5.  (a) Rumor-spreading expectation probability of node 50 under Cpoc and without control C0,0, (b) Truth-spreading expectation probability of node 50 under Cpoc and without control C0,0.

    In this section, we discuss the effect of the parameters related to comments on the expected cost-effectiveness under the optimal strategy through simulation experiments.

    Experiment 4: The influence of spontaneous comments number CR0 and CT0 on rumor control.

    The parameter CR0 represents the spontaneous comments in favor of rumor in the network, and CT0 represents the spontaneous comments in favor of the truth in the network. Let CR0=(0.1,0.3,0.5,0.7,0.9), CT0=0.1 and other parameters are the same as Experiment 1. Figure 6(a) expressed the change of cost-effectiveness under Cpoc as CR0 increases. Obviously, with the increase of CR0, the cost-effectiveness increases sharply, because the number of nodes believing rumor increases significantly due to the large number of spontaneous comments. In this case, the loss caused by rumor increases, and the efforts to control rumor also increase, so the cost-effectiveness increases significantly. That is, when the spontaneous comment of the rumor is large enough, that is, when the rumor has developed into public opinion, the cost of controlling the rumor will increase sharply. Another case, when CT0=(0.1,0.3,0.5,0.7,0.9),CR0=0.1 and other parameters are the same as Experiment 1. Figure 6(b) expressed the change of cost-effectiveness under Cpoc as CT0 increase. When believe the truth of the initial comments increases, will cause a lot of nodes under the influence of public opinion to increase a lot believe the truth of the node, then the probability of rumor of nodes is greatly reduced at the same time. As can be seen from the Figure 6(b), when CT0 is large enough, the cost-effectiveness caused by rumor becomes sharply smaller. This is because rumors will die out without any control.

    Figure 6.  The cost-effectiveness J(C):(a)J(C) depends on CR0, (b)J(C) depends on CT0.

    Experiment 5: The effect of parameters α2 and ρ2 on the cost-effectiveness.

    Let (1) α2=(0.1,0.2,0.3,0.4,0.5),ρ2=0.2; (2)ρ2=(0.1,0.2,0.3,0.4,0.5),α2=0.2, and other parameters are the same as Experiment 1. Figure 7 expressed the change of cost-effectiveness under Cpoc. As shown in Figure 7(a), it is worth noting that at this time, CR0=CT0=0.1 for the spontaneous comments, that is, when the rumor does not develop into public opinion, the cost of rumor control will hardly increase when α2 increases. Combined with the conclusion of Experiment 4, it can be seen that once rumor develop into public opinion, the loss of rumor control will increase greatly. Therefore, rumor control must be carried out at the early stage of rumor development. As shown in Figure 7(b), when ρ2 increases, the nodes that contact the comments of the truth position are more easily transformed into nodes that spread the truth. When ρ2 increases to a certain degree, there is no need to control the rumor, and the rumor will naturally die out, so the cost-effectiveness caused by rumor becomes smaller.

    Figure 7.  The cost-effectiveness J(C):(a)J(C) depends on α2, (b)J(C) depends on ρ2, (c)J(C) depends on ξ.

    Experiment 6: The effect of parameters ξ on the cost-effectiveness.

    Let ξ=(0.01,0.02,0.03,0.04,0.05), and other parameters are the same as Experiment 1. ξ indicates the percentage of invested comments that support the truth. This value is often determined by the rumor control budget. In fact, it is obvious that the higher the ratio of input to support the truth, the higher the cost consumed, but the higher the ratio of input, the influence of these comments will lead to the increase of the nodes spreading the truth, so as to achieve the purpose of rumor control. As can be seen from Figure 7(c), with the increase of ξ, the cost-effectiveness decreases obviously.

    In this paper, a rumor-truth hybrid propagation node-level model based on comment mechanism is introduced to minimize the impact of rumor by developing comment strategies. On this basis, we model the original problem as the optimal control problem. Finally, we derive the optimal system for solving the optimal control problem. In the future, there are still many problems to be solved. In the node-level rumor propagation model, it is also worth studying how to select some nodes to control rumor, locate the location of rumor propagation sources and the influence of network community structure on rumor propagation.

    This work is supported by the National Natural Science Foundation of China under Grant Nos.61807028, 61772449, 61572420 and 61802332, the Natural Science Foundation of Hebei Province China under Grant No. F2019203120. The authors are grateful to valuable comments and suggestions of the reviewers.

    All authors declare no conflicts of interest in this paper.



    [1] M. Christ, L. Grafakos, Best Constants for two non convolution inequalities, Proc. Amer. Math. Soc., 123 (1995), 1687–1693. doi: 10.1090/S0002-9939-1995-1239796-6
    [2] D. E. Edmunds, W. D. Evans, Hardy Operators, Function Spaces and Embeddings, Springer Verlag, Berlin, 2004.
    [3] W. G. Faris, Weak Lebesgue spaces and quantum mechanical binding, Duke Math. J., 43 (1976), 365–373.
    [4] Z. W. Fu, Q. Y. Wu, S. Z. Lu, Sharp estimates of p-adic Hardy and Hardy-Littlewood-Pólya Operators, Acta Math. Sin., 29 (2013), 137–150.
    [5] G. Gao, Y. Zhong, Some estimates of Hardy Operators and their commutators on Morrey-Herz spaces, J. Math. Inequal., 11 (2017), 49–58.
    [6] G. H. Hardy, Note on a theorem of Hilbert, Math. Z., 6 (1920), 314–317.
    [7] G. H. Hardy, J. E. Littlewood, G. Pólya, Inequalities, second edtion, Cambridge Univ. Press, London, 1952.
    [8] A. Hussain, A. Ajaib, Some weighted inequalities for Hausdorff operators and commutators, J. Ineq. Appl., 2018 (2018), 1–19.
    [9] A. Hussain, N. Sarfraz, The Hausdorff operator on weighted p-adic Morrey and Herz type spaces, p-Adic Numb. Ultrametric Anal. Appl., 11 (2019), 151–162. doi: 10.1134/S2070046619020055
    [10] A. Hussain, N. Sarfraz, Optimal weak type estimates for p-Adic Hardy operator, p-Adic Numb. Ultrametric. Anal. Appl., 12 (2020), 12–21. doi: 10.1134/S2070046620010021
    [11] A. Hussain, N. Sarfraz, F. Gürbüz, Sharp Weak Bounds for p-adic Hardy operators on p-adic Linear Spaces, arXiv: 2002.08045.
    [12] A. Hussain, N. Sarfraz, I. Khan, A. M. Alqahtani, Estimates for Commutators of Bilinear Fractional p-Adic Hardy Operator on Herz-Type Spaces, J. Funct. Space., 2021 (2021), 1–7.
    [13] A. Hussain, N. Sarfraz, I. Khan, A. Alsuble, N. N. Hamadnehs, The Boundedness of Commutators of Rough p-Adic Fractional Hardy Type Operators on Herz-Type Spaces, J. Inequal. Appl., 2021 (2021), (to appear).
    [14] J. L. Journe, Calderón-Zygmund operators, differential operators and the cauchy integral of Calderón, Lect. Notes Math., 994 (1983), 1–127. doi: 10.1007/BFb0061459
    [15] A. Khrennikov, p-Adic Valued Distributions in Mathematical Physics and its Applications, Kluwer Academic Publishers Group, Dordrecht, 1994.
    [16] M. Kian, On a Hardy operator inequality, Positivity, 22 (2018), 773–781. doi: 10.1007/s11117-017-0543-4
    [17] S.V. Kozyrev, Methods and applications of ultrametric and p-adic analysis: From wavelet theory to biophysics, Proc. Steklov. Inst. Math, 274 (2011), 1-84.
    [18] R. H. Liu, J. Zhou, Sharp estimates for the p-adic Hardy type Operator on higher-dimensional product spaces, J. Inequal. Appl., 2017 (2017), 1–13. doi: 10.1186/s13660-016-1272-0
    [19] B. Muckenhoupt, Weighted norm inequalities for the Hardy maximal function, Trans. Amer. Math. Soc., 165 (1972), 207–226. doi: 10.1090/S0002-9947-1972-0293384-6
    [20] L. E. Persson, S. G. Samko, A note on the best constants in some Hardy inequalities, J. Math. Inequal., 9 (2015), 437–447.
    [21] N. Sarfraz, F. Gürbüz, Weak and strong boundedness for p-adic fractional Hausdorff operator and its commutators, arXiv: 1911.09392, 2019.
    [22] N. Sarfraz, A. Hussain, Estimates for the commutators of p-adic Hausdorff operator on Herz-Morrey spaces, Mathematics, 7 (2019), 127. doi: 10.3390/math7020127
    [23] N. Sarfraz, D. Filali, A. Hussain, F. Jarad, Weighted estimates for commutator of rough p-adic fractional Hardy operator on weighted p-adic Herz- Morrey spaces, J. Math., 2021 (2021), 1–14.
    [24] Q. Sun, X. Yu, H. Li, Hardy-type operators in Lorentz-type spaces defined on measure spaces, Indian J. Pure Appl. Math., 51 (2020), 1105–1132. doi: 10.1007/s13226-020-0453-1
    [25] S. S. Volosivets, Weak and strong estimates for rough hausdorff type operator defined on p-adic linear space, p-Adic Numb. Ultrametric Anal. Appl., 9 (2017), 236–241. doi: 10.1134/S2070046617030062
    [26] V. S. Varadarajan, Path integrals for a class of p-adic Schrodiner equations, Lett. Math. Phys. Math., 39 (1997), 97–106. doi: 10.1023/A:1007364631796
    [27] V. S. Vladimirov, Tables of integrals of complex Valued Functions of p- Adic Arguments, Proc. Steklov. Inst. Math., 284 (2014), 1–59.
    [28] V. S. Vladimirov, I. V. Volovich, E. I. Zelenov, p-Adic Analysis and Mathematical Physics, World Scientific, Singapore, 1994.
    [29] S. M. Wang, D. Y. Yan, Weighted boundedness of commutators of fractional Hardy operators with Besov-Lipschitz functions, Anal. Theory Appl., 28 (2012), 79–86. doi: 10.4208/ata.2012.v28.n1.10
    [30] S. R. Wang, J. S. Xu, Commutators of the bilinear Hardy operator on Herz type spaces with variable exponents, J. Funct. Space., 2019 (2019), 1–11.
    [31] Q. Y. Wu, Boundedness for Commutators of fractional p-adic Hardy Operator, J. Inequal. Appl., 2012 (2012), 1–12. doi: 10.1186/1029-242X-2012-1
    [32] Q. Y. Wu, L. Mi, Z. W. Fu, Boundedness of p-adic Hardy Operators and their commutators on p-adic central Morrey and BMO spaces, J. Funct. Spaces Appl., 2013 (2013), 1–10.
    [33] N. Xudong, Y. Dunyan, Sharp constant of Hardy operators corresponding to general positive measures, J. Inequal. Appl., 2018 (2018), 1–18. doi: 10.1186/s13660-017-1594-6
    [34] N. Zhuang, G. Shasha, L. Wenming, Hardy operators and the commutators on Hardy spaces, J. Inequal. Appl., 2020 (2020), 1–11. doi: 10.1186/s13660-019-2265-6
  • This article has been cited by:

    1. Ying Yu, Jiaomin Liu, Jiadong Ren, Cuiyi Xiao, Stability analysis and optimal control of a rumor propagation model based on two communication modes: friends and marketing account pushing, 2022, 19, 1551-0018, 4407, 10.3934/mbe.2022204
    2. Haoming Guo, Xuefeng Yan, Dynamic modeling and simulation of rumor propagation based on the double refutation mechanism, 2023, 630, 00200255, 385, 10.1016/j.ins.2022.10.095
    3. Linhe Zhu, Tianyu Yuan, Optimal control and parameter identification of a reaction–diffusion network propagation model, 2023, 111, 0924-090X, 21707, 10.1007/s11071-023-08949-y
    4. Peinan Ji, Xinyi Chen, Lianchao Yu, Research on the effect of corporate rumor clarification based on text analysis, 2024, 31, 1608-1625, 654, 10.1080/16081625.2024.2333750
    5. Yang Xia, Haijun Jiang, A stochastic rumor spreading model with event-triggered discontinuous feedback control in multilingual online networks, 2024, 1598-5865, 10.1007/s12190-024-02184-3
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2495) PDF downloads(124) Cited by(4)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog