Steady-State Analysis of SECIR Rumor Spreading Model in Complex Networks

Abstract

In this paper, the SECIR rumor spreading model is formulated and analyzed, in which the social education level and the counterattack mechanism are taken into consideration. The results show that improving education level and increasing the ratio of counter are effective in reducing the risk of rumor propagation and enhancing the resistance to rumor propagation.

Share and Cite:

Liu, Y. , Zeng, C. and Luo, Y. (2019) Steady-State Analysis of SECIR Rumor Spreading Model in Complex Networks. Applied Mathematics, 10, 75-86. doi: 10.4236/am.2019.103007.

1. Introduction

Rumor is a kind of social phenomenon that an unverified account or explanation of events spreads on a large-scale in a short time through people’s communication [1] [2] [3] . The spread of rumor can manipulate the public opinion in a locality, even can cause panic in some of the important public event [4] [5] [6] [7] [8] . Today, the increasing prevalence of social networking services, rumors spread by twitters, blogs, microblogs, WeChat and so on. In the Internet, the spreading of rumor is similar to epidemic spreading, but rumor’s spreading quantitative models have been rather limited in the complex network.

The standard model of rumor spreading is the Daley-Kendal (DK) model [9] [10] . The population in a local area is grouped ignorants, spreaders and stiflers. In this model, the rumor is propagated through the pair-wise contacts between spreaders and the others in the population. Spreader attempts to “infect” the other individuals with rumor. In the contact, ignorance becomes spreader, the others of individuals become stiflers. In the Maki-Thompson (MK) model [11] as the DK model’s variant, the spreader becomes stifler only who is the initiating spreader. The deficiencies of the DK model are considering homogeneous topology, and the simplified topology may not adequately describe the rumor’s spreading process in the Internet [12] - [17] . Zanette [18] [19] analyzed the MK model on a small-world network. His studies show that rumor “dies” in a small scale of its origin with varying network randomness. Morno et al. [20] [21] considered a rumor spreading model on a scale-free network. The results are the uniformity of the network which has a great impact on the rumor’s spreading process. Nekovee et al. [22] introduced the SIR model with forgetting mechanism and derived mean-field equation that describes the dynamics of rumor spreading process. His studies show that the SIR model is suitable for chain emails and large-scale information dissemination algorithms on the Internet. Zhao et al. [23] [24] refined the SIR rumor spreading model and took into account the remembering mechanism in addition to the forgetting mechanism. Zan et al. [25] considered the counterattack mechanism in the SIR model and introduced two models: Susceptible-infective-counterattack-Refractory (SICR) model and adjusted-SICR model. They derived mean-field equations to describe its dynamics in homogeneous network and involve steady-state analysis. Their studies show the self-resistance characteristic of networks to a rumor. Afassinou [26] extended the SIR model with the forgetting mechanism and population’s education rate and introduced SEIR model. He distinguishes two types of individuals in a population: educated individuals and non-educated individuals. His results show that improving the education rate of the population catalyzes the rumor spreading termination process. In social networks, when people with a higher degree of education heard a rumor which is in serious conflict with his/her belief, he/she is easier to counterattack the rumor, and even do the best to prevent the rumor propagation.

In this paper, inspiring of Zan et al. [25] , we consider two influential factors in rumor spreading process: the population’s education rate and the self-resistance feature of network. Motivatedly, we extend rumor spreading model―the SECIR model.

The remaining part of the paper is organized as follows. We formulate the propagation mechanism of the SECIR model in a social network, and derive a system of nonlinear ordinary differential equations that describe dynamics of rumor spreading process in Section 2. In Section 3, we analyze the steady-state of the SECIR model. We give some of the conclusions in the last section.

2. Model

We study the SECIR model in a closed homogeneously mixed population that we differentiate into five distinct classes: the rumor-mongers (spreader, S), those who are spreading the rumor, the non-educated ignorants individuals class (Ignorant, I), the people who never heard the rumor, the educated ignorants individuals class (Educatee, E), the people who never heard the rumor, but have more sophisticated behaviours with the non-educated ignorant individuals when they encountered the spreader, the counterattack class (Counter, C), those who do not agree but refute the rumor, and persuade others to agree with him (refute the rumor), and the stiflers class (Recovered, R), the ones who heard the rumor but have lost interest in disseminating it. For simplicity, we refer to the rumor spreading model as the SECIR model.

According to the MK model, we assume the rumor spreads by directed contact of the spreads with others in the population, and the contacts between rumor-mongers and the rest of the population are governed by the following dynamics (As shown in Figure 1):

・ Whenever a non-educated ignorant contact a spreader, the ignorant will be a relatively large probability ( β 1 ) into the spreader, but also with a smaller probability ( α 1 ) of transition to a stifler;

・ Whenever an educated ignorant contact a spreader, the ignorant will be one of the three class: spreader or stifler analog the non-educated ignorant, and he can be evolved into counterattack, and the change probability is β 2 , α 2 and θ , respectively;

・ Whenever a spreader contact a spreader, a stifler or a counter, the spreader will be into stifler with the probability g, g and η , respectively;

Let I ( t ) , E ( t ) , C ( t ) , C ( t ) , and R ( t ) respectively represent the density of the corresponding compartment in the total population. Namely that we have I ( t ) + E ( t ) + C ( t ) + S ( t ) + R ( t ) = 1 . Note that the resistance to the rumor of the educated ignorants more than the non-educated ignorants, we assume that

β 1 > β 2 , α 1 > α 2 and η > g . (1)

In accordance with the above rules, the mean-field equations of the SECIR model can be described as follows:

d I ( t ) d t = ( β 1 + α 1 ) k ¯ I ( t ) S ( t ) d E ( t ) d t = ( β 2 + α 2 + θ ) k ¯ E ( t ) S ( t ) d C ( t ) d t = θ k ¯ E ( t ) S ( t ) d S ( t ) d t = β 1 k ¯ I ( t ) S ( t ) + β 2 k ¯ E ( t ) S ( t ) g k ¯ S ( t ) ( S ( t ) + R ( t ) ) η k ¯ S ( t ) C ( t ) d R ( t ) d t = α 1 k ¯ I ( t ) S ( t ) + α 2 k ¯ E ( t ) S ( t ) + g k ¯ S ( t ) ( S ( t ) + R ( t ) ) + η k ¯ S ( t ) C ( t ) (2)

Figure 1. SECIR rumor spreading model.

We assume that all in the population are I or E but only one spreader at the beginning of the rumor spreading, and the ratio of E to the sum of I and E is ϵ when t = 0 . Namely, when t = 0 , the initial condition of rumor spreading is given as follows:

I ( 0 ) = N 1 N ( 1 ϵ ) , E ( 0 ) = N 1 N ϵ , S ( 0 ) = 1 N , C ( 0 ) = 0 , R ( 0 ) = 0. (3)

Note that for an ignorant, he/she can be a spreader or stifler, so we have β 1 + α 1 < 1 , and 1 β 1 α 1 is the probability that no one tells him/her the rumor. For the same reason, β 2 + α 2 + θ < 1 is considered.

3. Model Analysis

We then postulate that the number of individuals in the I class that have heard about the rumor is the same as the number of individuals in the E class that have heard about the rumor. This simply translates to

β 1 + α 1 = β 2 + α 2 + θ = M (4)

From the first and the second equation of (2), we have

d E ( t ) d I ( t ) = E ( t ) I ( t ) (5)

Solve the above differential equation with the initial conditions (3), we obtain

E ( t ) I ( t ) = E ( 0 ) I ( 0 ) = ϵ 1 ϵ (6)

From the first and the third Equation (2), we obtain

d C ( t ) d t = θ α 2 + β 2 + θ d E ( t ) d t

With the initial conditions (3), we can derive the relational expression between C ( t ) and E ( t ) by separation of variable,

C ( t ) = θ α 2 + β 2 + θ ( ϵ E ( t ) ) (7)

From (6) and (7), we have

S ( t ) + R ( t ) = 1 ( I ( t ) + C ( t ) + E ( t ) ) = 1 1 ϵ ϵ E ( t ) θ α 2 + β 2 + θ ( ϵ E ( t ) ) E ( t ) = ( 1 θ ϵ α 2 + β 2 + θ ) ( 1 ϵ θ α 2 + β 2 + θ ) E ( t ) (8)

Note that τ = g ϵ + ( η g ) θ α 2 + β 2 + θ and β = 1 ϵ ϵ β 1 + β 2 , then we have

d S ( t ) d t = β 1 k ¯ I ( t ) S ( t ) + β 2 k ¯ E ( t ) S ( t ) g k ¯ S ( t ) ( S ( t ) + R ( t ) ) η k ¯ S ( t ) C ( t ) = β 1 k ¯ 1 ϵ ϵ E ( t ) S ( t ) + β 2 k ¯ E ( t ) S ( t ) η k ¯ S ( t ) θ α 2 + β 2 + θ ( ϵ E ( t ) ) g k ¯ S ( t ) ( ( 1 θ ϵ α 2 + β 2 + θ ) ( 1 ϵ θ α 2 + β 2 + θ ) E ( t ) ) = ( 1 ϵ ϵ β 1 + β 2 + g ϵ + ( η g ) θ α 2 + β 2 + θ ) k ¯ E ( t ) S ( t ) ( g + θ ( η g ) ϵ α 2 + β 2 + θ ) k ¯ S ( t ) = ( β + τ ) k ¯ E ( t ) S ( t ) ϵ τ k ¯ S ( t ) (9)

From the second equation of (2), therefore (9) becomes

d S ( t ) d t = ϵ τ E ( t ) ( β + τ ) M d E ( t ) d t

Solving the differential equations above by the method of separation of variables, we have

S ( t ) = ϵ τ M ( ln E ( t ) ln ϵ ) β + τ M ( E ( t ) ϵ ) (10)

By the second equation of (2), it is easy to see that d E ( t ) d t < 0 and E ( t ) are monotonically decreasing and continuous function. Let d S ( t ) d t = 0 , we obtain E ( t ) = ϵ τ β + τ . It is easy to see that, the peak value of spreader is

S max = ϵ β M + ϵ τ M ln ( τ β + τ ) (11)

d R ( t ) d t = α 1 k ¯ I ( t ) S ( t ) + α 2 k ¯ E ( t ) S ( t ) + g k ¯ S ( t ) ( S ( t ) + R ( t ) ) + η k ¯ S ( t ) C ( t ) = α 1 k ¯ 1 ϵ ϵ E ( t ) S ( t ) + α 2 k ¯ E ( t ) S ( t ) + η k ¯ S ( t ) θ α 2 + β 2 + θ ( ϵ E ( t ) ) + g k ¯ S ( t ) ( ( 1 θ ϵ α 2 + β 2 + θ ) ( 1 ϵ θ α 2 + β 2 + θ ) E ( t ) ) = ( 1 ϵ ϵ α 1 + α 2 g ϵ ( η g ) θ α 2 + β 2 + θ ) k ¯ E ( t ) S ( t ) + ( g + θ ( η g ) ϵ α 2 + β 2 + θ ) k ¯ S ( t ) = ( α τ ) k ¯ E ( t ) S ( t ) + ϵ τ k ¯ S ( t ) (12)

where α = 1 ϵ ϵ α 1 + α 2 . From the second equation of (2), therefore (12) becomes

d R ( t ) d t = ( τ α α 2 + β 2 + θ ϵ τ α 2 + β 2 + θ 1 E ( t ) ) d E ( t ) d t (13)

Solving the above differential equations, we get

R ( t ) = α τ α 2 + β 2 + θ ( ϵ E ( t ) ) + ϵ τ α 2 + β 2 + θ ( ln ϵ ln E ( t ) ) (14)

It is easy know that S = 0 , let t , then (8) becomes

R = ( 1 ϵ θ α 2 + β 2 + θ ) ( ϵ E ) (15)

Let t , Substituting (15) into (14), it becomes

( 1 ϵ α τ + θ α 2 + β 2 + θ ) ( ϵ E ) = ϵ τ α 2 + β 2 + θ ( ln ϵ ln E ) (16)

α + β = 1 ϵ ϵ ( β 1 + α 1 ) + ( β 2 + α 2 ) = 1 ϵ ϵ ( β 2 + α 2 ) + ( β 2 + α 2 ) = 1 ϵ ( β 2 + α 2 + θ ) θ (17)

Solve from (17), we get ϵ = β 2 + α 2 + θ β + α + θ , substitute into (16), we have

( ϵ E ) = ϵ τ β + τ ( ln ϵ ln E ) (18)

Let A ( t ) = I ( t ) + E ( t ) = 1 ϵ ϵ E ( t ) + E ( t ) = E ( t ) / ϵ , from (18) we get the final size

A = τ β + τ ln A + 1 (19)

Theorem 1. For 0 < σ < 1 , the equation x = σ ln x + 1 has two solutions, x = 1 and a nontrivial solution x 1 , where 0 < x 1 < σ .

Proof. Obviously x = 1 is a solution of x = σ ln x + 1 .

Let f ( x ) = x σ ln x 1 , and take the derivative of f ( x ) with respect to x: f ( x ) = 1 σ / x , f ( x ) = σ / x 2 > 0 .

Let f ( x ) = 0 , we obtain the unique minimum point x = σ , and the function f ( x ) is a convex function, we have f ( σ ) = σ σ ln σ 1 < σ + σ ( 1 / σ 1 ) 1 = 0 , and f ( 0 + ) = . According to the Mean Value Theorem, f ( x ) have a nontrivial solution x 1 , where 0 < x 1 < σ . ,

Theorem 2. If the parameters are satisfied (1), (3) and (4), we have

(1) S max is decrease with ϵ , if the other parameters keep constant.

(2) S max is increase with β 1 , β 2 but decrease with α 1 , α 2 , if the other parameters keep constant.

(3) S max is decrease with g , η , if the other parameters keep constant.

Proof. (1) From (11), differential with ϵ , we have

d S max d ϵ = β 1 β 2 M + ϵ τ M ( ln τ β + τ ) ϵ + ( ϵ τ ) ϵ M ln τ β + τ = β 1 β 2 M + ϵ τ M ( β g + τ β 1 M ϵ ( β + τ ) ) + ( η g ) θ M 2 ln τ β + τ

β 1 β 2 M + ϵ τ M ( β g + τ β 1 M ϵ ( β + τ ) ) + ( η g ) θ M 2 ( τ β + τ 1 ) = ( ( 1 ϵ ) β 1 + β 2 ϵ ) ( β 1 β 2 ) M ( β + τ ) ϵ (20)

Therefore, d S max d ϵ < 0 , which implies that S max decreases as ϵ increases.

(2) Since that τ = g ϵ + ( η g ) θ α 2 + β 2 + θ and β = 1 ϵ ϵ β 1 + β 2 , we have τ β i = 0 , τ α i = 0 , i = 1 , 2 , β β i > 0 , β α i < 0 . Taking the derivative of (11), with respect to β i , we have d S max d β i = ϵ M β β i ϵ τ M β β i β + τ = ϵ M β β + ϵ β β i > 0 . It is easy to see that S max increases as β i ( i = 1 , 2 ) increases.

By the same way, we can proof that S max is decrease with α 1 , α 2 .

(3) Similarly (2), we have β η = 0 , β g = 0 , τ x > 0 , ( x = η or g ) , then

d S max d x = ϵ M ln τ β + τ τ x + ϵ τ M ( τ x τ τ x β + τ ) = ( ϵ M ln τ β + τ + ϵ β M ( β + τ ) ) τ x < ( ϵ M ( τ β + τ 1 ) + ϵ β M ( β + τ ) ) τ x = 0 (21)

which means that S max is decrease with g , η The proof is complete. ,

Theorem 3. If the parameters are satisfied (1), (3) and (4), we have

(1) the other parameters keep constant, the final state A is increased with ϵ .

(2) the other parameters keep constant, the final state A is decreased with β 1 , β 2 but decrease with α 1 , α 2 .

(3) the other parameters keep constant, the final state A is increased with g , η .

Proof. Let σ = τ β + τ , from (19) we have

d A d χ = d σ d χ ln A + σ 1 A d A d χ = A ln A A σ d σ d χ (22)

From Theorem 1, 0 < A < σ , it is obviously that A ln A A σ > 0 , so, if we know that the plus-minus sign of d σ d χ , then the plus-minus sign of d A d χ can be determined, and furthermore, the monotonicity between A and parameters χ can be proved.

(1)

d σ d ϵ = τ ϵ β τ β ϵ ( β + τ ) 2 = β 1 τ g β ϵ 2 ( β + τ ) 2 = ( β 1 β 2 ) g + ( η g ) θ M β 1 ϵ 2 ( β + τ ) 2 (23)

so d σ d ϵ > 0 , that is, σ increases as ϵ increases, and also implies that A increases as ϵ increases.

(2)

d σ d β i = τ β β i ( β + τ ) 2 < 0 , ( i = 1 , 2 ) (24)

similarly, we can get d σ d α i > 0 . and so A d β i < 0 , A d α i < 0 , where i = 1 , 2 , which proves (2).

(3)

d σ d x = τ x β ( β + τ ) 2 , x { η , g } (25)

then, d σ d x > 0 , it means that A increases as η ( g ) increases. The proof is complete.

4. Numerical Simulation

We assume N = 10 5 , the average degree of network k ¯ = 10 , and the initial condition of the model follows equation of (2).

Figure 2 shows the general trends of the five kinds of agents in the SEICR rumor spreading model. We see the density of spreaders begin to expand rapidly from the initial rumor spread. As the rumor spread further, the density of spreaders reaches a peak and thereafter declines. Finally the density of spreaders is to zero and this leads to the termination of rumor spreading. And over the course of the rumor spreading, the density of ignorants and educatees always decreases, and finally evolves to zero. but the density of counter and the recovered

Figure 2. Density of spreaders, educatees, ignorants, counters and recovereds over time, with α 1 = β 1 = 0.5 , α 2 = β 2 = 0.4 , g = 0.2 , η = 0.1 , ϵ = 0.5 .

always decreases, and eventually evolve to a stable value.

Figures 3-5 show how the densities of spreaders change over time for different system parameters include ϵ , α 1 , β 1 , α 2 , β 2 , g and η , and the change is consistent with theorem 2. It is interest that the higher parameter β 1 , β 2 , the earlier the outbreak, the larger the peak of the outbreak, but the shorter the outbreak period (Figure 4). However, if the parameter X is lowered, the outbreak period will not come earlier, and the outbreak period will be longer (in Figure 5).

5. Conclusion

In this paper, considering the social education level and the counterattack mechanism,

Figure 3. Density of spreaders over time under different population’s education rate ϵ , with α 1 = β 1 = 0.5 , α 2 = β 2 = 0.4 , g = 0.2 , η = 0.1 .

Figure 4. Density of spreaders over time under different α 1 , β 1 , α 2 , β 2 , with g = 0.2 , η = 0.1 , ε = 0.5 .

Figure 5. Density of spreaders over time under different g , η , with α 1 = β 1 = 0.5 , α 2 = β 2 = 0.4 , g = 0.2 , η = 0.1 , ϵ = 0.5 .

we analyze the dynamics of rumor propagation. The results of simulations show that improving education level and increasing the ratio of counter are effective in reducing the risk of rumor propagation and enhancing the resistance to rumor propagation.

Acknowledgements

The research has been supported by The National Natural Science Foundation of China (11561004) and The 12th Five-year Education Scientific Planning Project of Jiangxi Province (15ZD3LYB031).

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this paper.

References

[1] Peterson, W.A. and Gist, N.P. (1951) Rumor and Public Opinion. American Journal of Sociology, 57, 159-167.
https://doi.org/10.1086/220916
[2] Kesten, H. and Sidoravicius, V. (2005) The Spread of a Rumor or Infection in a Moving Population. Annals of Probability, 33, 2402-2462.
https://doi.org/10.1214/009117905000000413
[3] Kostka, J., Oswald, Y.A. and Wattenhofer, R. (2008) Word of Mouth: Rumor Dissemination in Social Networks. International Colloquium on Structural Information & Communication Complexity, Villars-sur-Ollon, 17-20 June 2008, 185-196.
https://doi.org/10.1007/978-3-540-69355-0_16
[4] Ganesh, A.J., Kermarrec, A.M. and Massoulie, L. (2002) Hiscamp: Self-Organizing Hierarchical Membership Protocol. Workshop on ACM Sigops European Workshop.
https://doi.org/10.1145/1133373.1133398
[5] Thomas, S.A. (2007) Lies, Damn Lies, and Rumors: An Analysis of Collective Efficacy, Rumors, and Fear in the Wake of Katrina. Sociological Spectrum, 27, 679-703.
https://doi.org/10.1080/02732170701534200
[6] Bhavnani, R. and Kuklinski, J.H. (2009) Rumor Dynamics in Ethnic Violence. Journal of Politics, 71, 876.
https://doi.org/10.1017/S002238160909077X
[7] Galam, S. (2002) Modelling Rumors: The No Plane Pentagon French Hoax Case. Physica A: Statistical Mechanics & Its Applications, 320, 571-580.
[8] Kimmel, A.J. (2004) Rumors and Rumor Control: A Manager’s Guide to Understanding and Combatting Rumors. Lawrence Erlbaum Associates.
[9] Daley, D.J. and Kendall, D.G. (1965) Stochastic Rumours. IMA Journal of Applied Mathematics, 1, 42-55.
https://doi.org/10.1093/imamat/1.1.42
[10] Daley, D.J. and Gani, J. (1999) Epidemic Modelling: An Introduction. Cambridge University Press, Cambridge.
https://doi.org/10.1017/CBO9780511608834
[11] Maki, D.P. and Thompson, M. (1973) Mathematical Models and Applications: With Emphasis on the Social, Life, and Management Sciences. Prentice Hall, Upper Saddle River.
[12] Pittel, B. (1990) On a Daley-Kendall Model of Random Rumours. Journal of Applied Probability, 27, 14-27.
https://doi.org/10.2307/3214592
[13] Newman, M.E., Forrest, S. and Balthrop, J. (2002) Email Networks and the Spread of Computer Viruses. Physical Review E, Statistical, Nonlinear, and Soft Matter Physics, 66, Article ID: 035101.
https://doi.org/10.1103/PhysRevE.66.035101
[14] Sudbury, A. (1985) The Proportion of the Population Never Hearing a Rumour. Journal of Applied Probability, 22, 443-446.
https://doi.org/10.2307/3213787
[15] Holger, E., Lutz-Ingo, M. and Stefan, B. (2002) Scale-Free Topology of E-Mail Networks. Physical Review E, Statistical, Nonlinear, and Soft Matter Physics, 66, Article ID: 035103.
[16] Smith, R.D. (2002) Instant Messaging as a Scale-Free Network.
[17] Fang, W., Yamir, M. and Yaoru, S. (2006) Structure of Peer-to-Peer Social Networks. Physical Review E Statistical Nonlinear & Soft Matter Physics, 73, Article ID: 036123.
[18] Zanette, D.H. (2001) Critical Behavior of Propagation on Small-World Networks. Physical Review E Statistical Nonlinear & Soft Matter Physics, 64, Article ID: 050901.
https://doi.org/10.1103/PhysRevE.64.050901
[19] Zanette, D.H. (2002) Dynamics of Rumor Propagation on Small-World Networks. Physical Review E Statistical Nonlinear & Soft Matter Physics, 65, Article ID: 041908.
https://doi.org/10.1103/PhysRevE.65.041908
[20] Yamir, M., Maziar, N. and Alessandro, V. (2004) Efficiency and Reliability of Epidemic Data Dissemination in Complex Networks. Physical Review E Statistical Nonlinear & Soft Matter Physics, 69, Article ID: 055101.
[21] Moreno, Y., Pastorsatorras, R. and Vespignani, R. (2001) Epidemic Outbreaks in Complex Heterogeneous Networks. The European Physical Journal B Condensed Matter and Complex Systems, 26, 521-529.
https://doi.org/10.1140/epjb/e20020122
[22] Nekovee, M., Moreno, Y., Bianconi, G. and Marsili, M. (2008) Theory of Rumour Spreading in Complex Social Networks. Physica A Statistical Mechanics & Its Applications, 374, 457-470.
https://doi.org/10.1016/j.physa.2006.07.017
[23] Zhao, L., Cui, H., Qiu, X. and Wang, X. (2013) Sir Rumor Spreading Model in the New Media Age. Physica A Statistical Mechanics & Its Applications, 392, 995-1003.
[24] Zhao, L., Wang, J., Chen, Y., Qin, W., Cheng, J. and Cui, H. (2012) Sihr Rumor Spreading Model in Social Networks. Physica A Statistical Mechanics & Its Applications, 391, 2444-2453.
https://doi.org/10.1016/j.physa.2011.12.008
[25] Zan, Y., Wu, J., Ping, L. and Yu, Q. (2014) Sicr Rumor Spreading Model in Complex Networks: Counterattack and Self-Resistance. Physica A Statistical Mechanics & Its Applications, 405, 159-170.
https://doi.org/10.1016/j.physa.2014.03.021
[26] Afassinou, K. (2014) Analysis of the Impact of Education Rate on the Rumor Spreading Mechanism. Physica A Statistical Mechanics & Its Applications, 414, 43-52.
https://doi.org/10.1016/j.physa.2014.07.041

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.