Next Article in Journal
Quantum Switch as a Thermodynamic Resource in the Context of Passive States
Next Article in Special Issue
Research on a Critical Link Discovery Method for Network Security Situational Awareness
Previous Article in Journal
Theoretical Improvements in Enzyme Efficiency Associated with Noisy Rate Constants and Increased Dissipation
Previous Article in Special Issue
Comparison of Graph Distance Measures for Movie Similarity Using a Multilayer Network Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Multi-Information Spreading Model for One-Time Retweet Information in Complex Networks

1
School of Information Science and Technology, Fudan University, Shanghai 200433, China
2
Shanghai Artificial Intelligence Laboratory, Shanghai 200232, China
3
School of Mathematics and Physics, Shanghai University of Electric Power, Shanghai 201306, China
4
School of Communication and Electronic Engineering, East China Normal University, Shanghai 200062, China
*
Authors to whom correspondence should be addressed.
Entropy 2024, 26(2), 152; https://doi.org/10.3390/e26020152
Submission received: 11 November 2023 / Revised: 5 February 2024 / Accepted: 5 February 2024 / Published: 9 February 2024

Abstract

:
In the realm of online social networks, the spreading of information is influenced by a complex interplay of factors. To explore the dynamics of one-time retweet information spreading, we propose a Susceptible–Infected–Completed (SIC) multi-information spreading model. This model captures how multiple pieces of information interact in online social networks by introducing inhibiting and enhancement factors. The SIC model considers the completed state, where nodes cease to spread a particular piece of information after transmitting it. It also takes into account the impact of past and present information received from neighboring nodes, dynamically calculating the probability of nodes spreading each piece of information at any given moment. To analyze the dynamics of multiple information pieces in various scenarios, such as mutual enhancement, partial competition, complete competition, and coexistence of competition and enhancement, we conduct experiments on BA scale-free networks and the Twitter network. Our findings reveal that competing information decreases the likelihood of its spread while cooperating information amplifies the spreading of mutually beneficial content. Furthermore, the strength of the enhancement factor between different information pieces determines their spread when competition and cooperation coexist. These insights offer a fresh perspective for understanding the patterns of information propagation in multiple contexts.

1. Introduction

The emergence of online social networks has revolutionized the spreading of information. These platforms provide easy access to a wide range of information, including news, entertainment, and academic research. This accessibility not only enhances people’s understanding of the world, but also facilitates the sharing and spread of knowledge, contributing to societal development and progress.
However, the rapid spread of information through online networks also brings about various challenges. Privacy breaches, exposure to false information, and the propagation of harmful rumors are among the negative impacts associated with this phenomenon [1,2,3,4,5,6]. Therefore, it is crucial to deeply explore different forms of information spreading. Understanding the mechanisms of information diffusion and implementing effective measures to mitigate its negative effects are essential for public opinion monitoring and information recommendation systems.
Drawing parallels between the spread of epidemics and information, researchers have often employed epidemic models to study information spreading. Previous research primarily focused on single information spread within networks [7,8,9,10,11,12,13,14]. However, given the vast array of information types and complex interactions within online social networks, which significantly impact the dynamics of information diffusion, scholars have increasingly turned their attention to multi-information spreading models. These models aimed to simulate and comprehend the intricate mechanisms underlying information propagation in online social networks [15,16,17,18,19,20,21,22].
The commonly used epidemic models, such as SIR and SIS, have been applied to the research of single information spreading [23,24,25,26]. Zhu [27] introduced the concept of information priority and focused on the competitive relationship between original false information and updated information. Shang [28] investigated the influence of overlap among communities on epidemics. By constructing an SIS model, it was found that epidemics spread faster in networks with a higher level of overlapping communities. Wang [29] studied the information spreading dynamics on complex networks with cliques and proved that the phase transition was always continuous and independent of the cliques. Continuous phase transition implies that the total number of infections during an epidemic varies with the infectiousness, exhibiting more complex collective dynamics influenced by environmental factors, including discontinuous or explosive transitions [30]. Prakash [15] proposed an information competition spreading model and discovered that strong information with a high spreading probability completely supplanted weaker information. Beutel [31] investigated the conditions for the coexistence of two competing viruses (or products or ideas) in a network. Wei [32] examined the intertwined diffusion of two rival information in a composite network based on the SIS model. They established a non-linear dynamic system and conducted an eigenvalue analysis to identify the critical point of epidemic behavior. Fátima [17] used the SIS model to explore the interaction between the spread of epidemics and the spreading of disease knowledge information, showing that the knowledge of the disease helped to reduce the disease prevalence and increase the epidemic threshold of the disease. Zhang [18] proposed an information diffusion framework to analyze the overall interactive behavior of users. Xiao [19] explored the impact factor and the interrelation of network layers on the information diffusion process based on the SIS model. Fan [33] studied the impact of a hybrid information propagation model on the epidemic and its related information coupling dynamics in a multilayer network. In this multilayer network, the upper layer was composed of randomly generated simple complexes, while the lower layer consisted of either traditional scale-free or Erdős–Rényi (ER) random networks.
However, despite extensive research on multi-information spreading models, there are still several unresolved issues that warrant attention.
  • When examining the relationships between different types of information, it is important to acknowledge that cooperation and competition can coexist within a network. While many researchers tend to focus on either cooperation or competition, understanding the interplay between these two dynamics is crucial. Even when two pieces of information compete, the degree of competition can vary, ranging from complete to partial. By considering the dynamics of spreading between different types of information, we can enhance our theoretical foundation for managing and controlling information spreading in networks. This deeper understanding allows us to develop strategies and measures that effectively address the negative impacts associated with information spreading. By recognizing the intricate interactions and complex nature of information propagation, we can establish more robust frameworks for managing and mitigating the consequences of network information spread.
  • Certain types of information possess strong timeliness, users may choose to retweet a piece of information upon first encountering it, but then cease to engage in any further retweets of the same content. Integrating the SIR model with one-time retweet behavior is crucial for accurately simulating and understanding the mechanisms of information spreading in social networks. In terms of its impact on information spreading, this ‘one-time retweet’ behavior could inhibit further diffusion of information, affecting the speed and breadth of information propagation. Therefore, this user behavior should be considered when constructing models of information propagation.
To address the above issues, we draw on the concept of influence factors [19] and propose a Susceptible–Infected–Completed (SIC) information-spreading dynamic model. We use the microscopic Markov chain approach (MMCA) [34,35] to establish the dynamic equation and discuss the information spreading mechanism under different relationships in both artificial and real networks. The main research results of this paper are as follows:
  • Proposal of the SIC model: We introduce a novel SIC model where nodes transition to a completed state after participating in information spreading. This model specifically focuses on one-time retweet information.
  • Examination of the impact factor: We incorporate the concept of influence factors to describe the interactions between different types of information. By considering free spreading, cooperative spreading, partial competitive spreading, complete competitive spreading, and the coexistence of competition and cooperation, we analyze how multiple pieces of information propagate within the network.
  • Utilization of the MMCA: We employ the MMCA to establish the dynamic equation of the SIC model. This mathematical framework allows us to dissect and understand the intricate dynamics of information spreading within the network.
By leveraging influence factors and employing the MMCA approach, we present a comprehensive analysis of information diffusion, shedding light on its mechanisms under diverse relationship scenarios. The proposed model is applied to analyze the spread of information in both simulated artificial networks and real-world network data.
The rest of this paper is organized as follows. In Section 2, we provide the problem definition. In Section 3, we describe the proposed model in detail. In Section 4, we present and analyze the experimental results of the model. Finally, in Section 5 we conclude the paper.

2. Problem Definition

In order to study the spreading of multiple pieces of information in a network and their interactions with each other, we first define a network G = V , E . V = v 1 , v 2 , v 3 , , v N represents the set of nodes in the network, v i is specific nodes, and E = e i j = v i , v j | i , j V represents the edges in the network, with e i j indicating the edges between node i and node j. Information can spread along these edges. I n f = I n f 1 , I n f 2 , , I n f M is employed to denote the collection of M distinct pieces of information.
In this paper, the focus is on analyzing the spreading of information in a network that has a lasting impact once it is disseminated. To address this, the proposed model is called the S I C model. The node status is divided into three categories: S (Susceptible), I (Infected), and C (Completed). Nodes in the S i state refer to those who have not yet been exposed to I n f i and are susceptible to its influence. Nodes in the I i state indicate those who receive I n f i from their neighbors and are interested in it. They are willing to spread I n f i to their friends. Nodes in the C i state indicate that the node has already spread a certain I n f i and maintains a memory of it, but the I n f i will no longer be spread by them. This state is similar to the “recovered” state in the SIR model. However, nodes in the C i state only mean that the node will no longer spread I n f i , but there is still a possibility of spreading other information on the network. Moreover, because nodes in the C i state maintain a memory of I n f i , this affects the probability of the node spreading other information in the future.
Table 1 displays the symbols used in our paper. The cooperative and competitive relationships between information are controlled by parameters a 1 and a 2 . a 1 represents the influence factor between information in a competitive relationship, with 0 a 1 1 . The larger the value of a 1 , the greater the inhibit strength. When a 1 = 1 , it means that the information completely repels other information, and the node only accepts certain information that repels others. When a 1 = 0 , the information does not compete with other information. a 2 represents the influence factor between information in a cooperative relationship, and the larger the value of a 2 , the stronger the cooperative strength. We use β = β 1 , β 2 , , β M to represent the infection rate, where β i denotes the infection rate of I n f i . The infection rate is defined as the probability that a node in the susceptible state (S state) will be influenced by a neighboring node in the infected state (I state)

3. Proposed Model

In this paper, the focus is on discussing five different types of information spreading within networks. These categories include free spreading, mutual enhancement, partial competition, complete competition, and the coexistence of competition and enhancement.
(1)
Free spreading: In this scenario, there is no mutual influence between different pieces of information. Each piece of information spreads independently throughout the network without any direct interaction or impact from other information items.
(2)
Mutual enhancement: When information spreads through mutual enhancement, the probability of a node spreading cooperative information increases after it disseminates a piece of information. This means that the act of spreading one piece of information enhances the likelihood of that node also spreading additional cooperative information.
(3)
Partial competition: In the case of local competition between information, the probability of a node spreading competitive information is inhibited after it spreads a piece of information. This implies that when multiple pieces of information compete, the spreading of one piece of information inhibits the node’s tendency to spread other competitive information.
(4)
Complete competition: when there is complete competition between information, a node will not spread competitive information after it spreads a piece of information.
(5)
Coexistence of competition and enhancement: in the case of the coexistence of competition and enhancement between different kinds of information, the probability of a node spreading cooperative information increases, and at the same time, the probability of spreading competitive information is inhibited after it spreads a piece of information.
By exploring these different types of information spreading and their dynamics, we aim to provide a comprehensive understanding of how information disseminates within networks. This knowledge can contribute to the development of effective strategies for managing and controlling the spread of network information.
The Markov chain approach is utilized in this paper to analyze the five types of information spreading mentioned earlier. To facilitate discussion and explanation, let us consider an example with three pieces of information. The principles can be extended to include more than three pieces of information.
In this model, the initial node can receive any of the M pieces of information present in the network. For the sake of simplicity, we refer to the three pieces of information as I n f 1 , I n f 2 , and I n f 3 . For further analysis, the subsequent content assumes that I n f 1 and I n f 3 have a cooperative relationship, while I n f 2 has a competitive relationship with both I n f 1 and I n f 3 . We will explore their relationships within the context of the SIC model. Here are some examples of states within this model: when a node is in the state of S 1 S 2 S 3 , it indicates that the node has not received any of the three pieces of information; when a node is in the state of I 1 S 2 S 3 , it means that the node has only spread I n f 1 ; when a node is in the state of C 1 I 2 S 3 , it means that the node has already spread I n f 1 , and now it spreads I n f 2 , which has a competitive relationship with I n f 1 ; and when a node is in the state of C 1 S 2 I 3 , it means that the node has already spread I n f 1 , and now it spreads I n f 3 , which has a cooperative relationship with I n f 1 . These states and their relationships are part of the SIC model, which aims to analyze the spread of information in a network while considering the effects of cooperation and competition among different pieces of information.
When the infection rate of I n f i is β i , if the node is in S 1 S 2 S 3 state at time t, it will change to I 1 S 2 S 3 , S 1 I 2 S 3 , S 1 S 2 I 3 with probabilities f i ( 1 ) , f i ( 2 ) , f i ( 3 ) [36], which are:
f i ( 1 ) t = 1 j = 1 N 1 β 1 A j i s j 1 t
f i ( 2 ) t = 1 j = 1 N 1 β 2 A j i s j 2 t
f i ( 3 ) t = 1 j = 1 N 1 β 3 A j i s j 3 t
The variable N denotes the total number of nodes in the network. A is the adjacency matrix of the network. A j i = 1 indicates that individual i has an edge directed towards individual j, while A j i = 0 signifies that there is no directed edge between them. The variables s j 1 ( t ) , s j 2 ( t ) , and s j 3 ( t ) , respectively, indicate whether individual j is in an infected state with I n f 1 , I n f 2 , and I n f 3 at time t. If individual j is in an infected state, we have s j 1 ( t ) = 1 , otherwise s j 1 ( t ) = 0 . Similarly, s j 2 ( t ) and s j 3 ( t ) are defined.
The spreading mechanism operates as follows: Every node in states I 1 S 2 S 3 transmits information i n f 1 to each of its adjacent nodes at time t. Each of these attempts has an independent success rate, represented by the probability β 1 . Concurrently, nodes in states S 1 I 2 S 3 and S 1 S 2 I 3 also aim to disseminate information I n f 2 and I n f 3 to each of their neighboring nodes with probabilities β 2 and β 3 , respectively. Therefore, f i ( 1 ) , f i ( 2 ) , and f i ( 3 ) represent the probabilities that a given node i receives information I n f 1 , I n f 2 , and I n f 3 from its neighboring nodes.
We construct a state transition diagram for the nodes, with Figure 1 represents the state transition diagram for prioritizing the reception of I n f 1 , I n f 2 , and I n f 3 .
According to state transmission, we use the MMCA to describe the collaborative evolution process of all information sources. MMCA pivots on the fundamental principles of Markov chains, where the future state of a system is dependent solely on its current state. At the heart of this approach is the consideration of each individual in the population as a distinct entity, with a set of possible states. The transitions between these states are governed by probabilities:
P i I 1 S 2 S 3 ( t + 1 ) = P i S 1 S 2 S 3 ( t ) f i 1 ( 1 f i 2 ) ( 1 f i 3 ) + P i I 1 S 2 S 3 ( t ) ( 1 r i 1 ) ( 1 f i 2 ) ( 1 f i 3 ) P i S 1 I 2 S 3 ( t + 1 ) = P i S 1 S 2 S 3 ( t ) f i 2 ( 1 f i 1 ) ( 1 f i 3 ) + P i S 1 I 2 S 3 ( t ) ( 1 r i 2 ) ( 1 f i 1 ) ( 1 f i 3 ) P i S 1 S 2 I 3 ( t + 1 ) = P i S 1 S 2 S 3 ( t ) f i 3 ( 1 f i 1 ) ( 1 f i 2 ) + P i S 1 S 2 I 3 ( t ) ( 1 r i 3 ) ( 1 f i 1 ) ( 1 f i 2 ) P i C 1 S 2 S 3 ( t + 1 ) = P i I 1 S 2 S 3 ( t ) r i 1 ( 1 f i 2 ) ( 1 f i 3 ) + P i C 1 S 2 S 3 ( t ) ( 1 f i 2 ) ( 1 f i 3 ) P i S 1 C 2 S 3 ( t + 1 ) = P i S 1 I 2 S 3 ( t ) r i 2 ( 1 f i 1 ) ( 1 f i 3 ) + P i S 1 C 2 S 3 ( t ) ( 1 f i 1 ) ( 1 f i 3 ) P i S 1 S 2 C 3 ( t + 1 ) = P i S 1 S 2 I 3 ( t ) r i 3 ( 1 f i 1 ) ( 1 f i 2 ) + P i S 1 S 2 C 3 ( t ) ( 1 f i 1 ) ( 1 f i 2 ) P i I 1 I 2 S 3 ( t + 1 ) = P i S 1 I 2 S 3 ( t ) ( 1 r i 2 ) f i 1 ( 1 f i 3 ) ( 1 a 1 ) + P i I 1 S 2 S 3 ( t ) ( 1 r i 1 ) f i 2 ( 1 f i 3 ) ( 1 a 1 ) + P i I 1 I 2 S 3 ( t ) ( 1 r i 1 ) ( 1 r i 2 ) ( 1 f i 3 ) P i I 1 S 2 I 3 ( t + 1 ) = P i I 1 S 2 I 3 ( t ) ( 1 r i 1 ) ( 1 r i 3 ) ( 1 f i 2 ) + P i S 1 S 2 I 3 ( t ) ( 1 r i 3 ) f i 1 ( 1 f i 2 ) ( 1 + a 2 ) + P i I 1 S 2 S 3 ( t ) ( 1 r i 1 ) f i 2 ( 1 f i 3 ) ( 1 + a 2 ) P i S 1 I 2 I 3 ( t + 1 ) = P i S 1 I 2 I 3 ( t ) ( 1 f i 1 ) ( 1 r i 2 ) ( 1 r i 3 ) + P i S 1 S 2 I 3 ( t ) ( 1 r i 3 ) f i 2 ( 1 f i 1 ) ( 1 a 1 ) + P i S 1 I 2 S 3 ( t ) ( 1 r i 2 ) f i 3 ( 1 f i 1 ) ( 1 a 1 ) P i C 1 I 2 S 3 ( t + 1 ) = P i I 1 I 2 S 3 ( t ) r i 1 ( 1 r i 2 ) ( 1 f i 3 ) + P i C 1 S 2 S 3 ( t ) f i 2 ( 1 f i 3 ) ( 1 a 1 ) + P i C 1 I 2 S 3 ( t ) ( 1 r i 2 ) ( 1 f i 3 ) P i I 1 C 2 S 3 ( t + 1 ) = P i I 1 I 2 S 3 ( t ) ( 1 r i 1 ) r i 2 ( 1 f i 3 ) + P i S 1 C 2 S 3 ( t ) f i 1 ( 1 f i 3 ) ( 1 a 1 ) + P i I 1 C 2 S 3 ( t ) ( 1 r i 1 ) ( 1 f i 3 ) P i I 1 S 2 C 3 ( t + 1 ) = P i I 1 S 2 I 3 ( t ) ( 1 r i 1 ) ( 1 f i 2 ) r i 3 + P i S 1 S 2 C 3 ( t ) f i 1 ( 1 f i 2 ) + P i I 1 S 2 C 3 ( t ) ( 1 r i 1 ) ( 1 f i 2 ) P i C 1 S 2 I 3 ( t + 1 ) = P i I 1 S 2 I 3 ( t ) r i 1 ( 1 f i 2 ) ( 1 r i 3 ) + P i C 1 S 2 S 3 ( t ) ( 1 f i 2 ) f i 3 ( 1 + a 2 ) + P i C 1 S 2 I 3 ( t ) ( 1 f i 2 ) ( 1 r i 3 ) P i S 1 I 2 C 3 ( t + 1 ) = P i S 1 I 2 C 3 ( t ) ( 1 f i 1 ) ( 1 r i 2 ) + P i S 1 S 2 C 3 ( t ) ( 1 f i 1 ) f i 2 ( 1 a 1 ) + P i S 1 I 2 I 3 ( t ) ( 1 f i 1 ) ( 1 r i 2 ) r i 3 P i S 1 C 2 I 3 ( t + 1 ) = P i S 1 C 2 I 3 ( t ) ( 1 f i 1 ) ( 1 r i 3 ) + P i S 1 I 2 I 3 ( t ) ( 1 f i 1 ) r i 2 ( 1 r i 3 ) + P i S 1 C 2 S 3 ( t ) ( 1 f i 1 ) f i 3 ( 1 + a 2 ) P i C 1 C 2 S 3 ( t + 1 ) = P i I 1 C 2 S 3 ( t ) r i 1 ( 1 f i 3 ) + P i C 1 I 2 S 3 ( t ) r i 2 ( 1 f i 3 ) + P i C 1 C 2 S 3 ( t ) ( 1 f i 3 ) P i S 1 C 2 C 3 ( t + 1 ) = P i S 1 C 2 C 3 ( t ) ( 1 f i 1 ) + P i S 1 I 2 C 3 ( t ) ( 1 f i 1 ) r i 2 + P i S 1 C 2 I 3 ( t ) ( 1 f i 1 ) r i 3 P i C 1 S 2 C 3 ( t + 1 ) = P i I 1 S 2 C 3 ( t ) r i 1 ( 1 f i 2 ) + P i C 1 S 2 C 3 ( t ) ( 1 f i 2 ) + P i C 1 S 2 I 3 ( t ) ( 1 f i 2 ) r i 3 P i I 1 I 2 I 3 ( t + 1 ) = P i I 1 I 2 I 3 ( t ) ( 1 r i 1 ) ( 1 r i 2 ) ( 1 r i 3 ) + P i S 1 I 2 I 3 ( t ) f i 1 ( 1 r i 2 ) ( 1 r i 3 ) ( 1 a 1 ) ( 1 + a 2 ) + P i I 1 S 2 I 3 ( t ) ( 1 r i 1 ) f i 2 ( 1 r i 3 ) ( 1 a 1 ) 2 + P i I 1 I 2 S 3 ( t ) ( 1 r i 1 ) ( 1 r i 2 ) f i 3 ( 1 a 1 ) ( 1 + a 2 ) P i I 1 I 2 C 3 ( t + 1 ) = P i S 1 I 2 C 3 ( t ) f i 1 ( 1 r i 2 ) ( 1 a 1 ) ( 1 + a 2 ) + P i I 1 S 2 C 3 ( t ) ( 1 r i 1 ) f i 2 ( 1 a 1 ) 2 + P i I 1 I 2 I 3 ( t ) ( 1 r i 1 ) ( 1 r i 2 ) r i 3 + P i I 1 I 2 C 3 ( t ) ( 1 r i 1 ) ( 1 r i 2 ) P i C 1 I 2 I 3 ( t + 1 ) = P i I 1 I 2 I 3 ( t ) r i 1 ( 1 r i 2 ) ( 1 r i 3 ) + P i C 1 S 2 I 3 ( t ) f i 2 ( 1 r i 3 ) ( 1 a 1 ) 2 + P i C 1 I 2 S 3 ( t ) ( 1 r i 2 ) f i 3 ( 1 a 1 ) ( 1 + a 2 ) + P i C 1 I 2 I 3 ( t ) ( 1 r i 2 ) ( 1 r i 3 ) P i C 1 C 2 I 3 ( t + 1 ) = P i I 1 C 2 I 3 ( t ) r i 1 ( 1 r i 3 ) + P i C 1 I 2 I 3 ( t ) r i 2 ( 1 r i 3 ) + P i C 1 C 2 S 3 ( t ) f i 3 ( 1 a 1 ) ( 1 + a 2 ) + P i C 1 C 2 I 3 ( t ) ( 1 r i 3 ) P i C 1 I 2 C 3 ( t + 1 ) = P i I 1 I 2 C 3 ( t ) r i 1 ( 1 r i 2 ) + P i C 1 S 2 C 3 ( t ) f i 2 ( 1 a 1 ) 2 + P i C 1 I 2 I 3 ( t ) ( 1 r i 2 ) r i 3 + P i C 1 I 2 C 3 ( t ) ( 1 r i 2 ) P i I 1 C 2 C 3 ( t + 1 ) = P i S 1 C 2 C 3 ( t ) f i 1 ( 1 a 1 ) ( 1 + a 2 ) + P i I 1 I 2 C 3 ( t ) ( 1 r i 1 ) r i 2 + P i I 1 C 2 I 3 ( t ) ( 1 r i 1 ) r i 3 + P i I 1 C 2 C 3 ( t ) ( 1 r i 1 ) P i C 1 C 2 C 3 ( t + 1 ) = P i I 1 C 2 C 3 ( t ) r i 1 + P i C 1 I 2 C 3 ( t ) r i 2 + P i C 1 C 2 I 3 ( t ) r i 3 P i S 1 S 2 S 3 ( t + 1 ) = 1 A b o v e
where P i I 1 S 2 S 3 ( t + 1 ) represents the probability of node i in the I 1 S 2 S 3 state at time t + 1 . A node is set in one of all different states, so P i S 1 S 2 S 3 ( t + 1 ) = 1 A b o v e . The epidemic threshold is the critical point for information explosion. To determine the threshold, we first simplify Equation (4) to a general expression P ( t + 1 ) = g ( P ( t ) ) , where
P ( t ) = ( P I 1 S 2 S 3 ( t ) , P S 1 I 2 S 3 ( t ) , P S 1 S 2 I 3 ( t ) , P S 1 I 2 I 3 ( t ) , P I 1 S 2 I 3 ( t ) , P I 1 I 2 S 3 ( t ) , P I 1 S 2 C 3 ( t ) P I 1 C 2 S 3 ( t ) , P S 1 I 2 C 3 ( t ) , P C 1 I 2 S 3 ( t ) , P C 1 S 2 I 3 ( t ) , P S 1 C 2 I 3 ( t ) , P I 1 I 2 C 3 ( t ) , P I 1 C 2 I 3 ( t ) , P C 1 I 2 I 3 ( t ) , P I 1 C 2 C 3 ( t ) , P C 1 I 2 C 3 ( t ) , P C 1 C 2 I 3 ( t ) , P I 1 I 2 I 3 ( t ) )
P I 1 S 2 S 3 ( t ) = P 1 I 1 S 2 S 3 ( t ) , P 2 I 1 S 2 S 3 ( t ) , , P N I 1 S 2 S 3 ( t ) and others are similarly.
Theorem 1. 
The system is asymptotically stable at P ( t ) = 0 when the eigenvalues of g ( 0 ) are less than 1 in absolute value, where Jacobian matrix is calculated as follows:
J = [ g ( 0 ) ] m , n = g m , t + 1 P n , t P n = 0 .
In order to compute the epidemic threshold, it is necessary to solve the Jacobian matrix of the system. Based on P = 0 , the eigenvalues of its Jacobian matrix are as follows:
1 γ 1 E + β 1 A 1 γ 2 E + β 2 A 1 γ 3 E + β 3 A 1 γ 1 1 γ 2 E 1 γ 1 1 γ 3 E 1 γ 2 1 γ 3 E 1 γ 1 E 1 γ 2 E 1 γ 3 E
According to Theorem 1, there are
M a x ( ( | ( 1 γ 1 ) + β 1 λ | , | ( 1 γ 2 ) + β 2 λ | , | ( 1 γ 3 ) + β 3 λ | , | ( 1 γ 1 ) ( 1 γ 2 ) | , | ( 1 γ 1 ) ( 1 γ 3 ) | , | ( 1 γ 2 ) ( 1 γ 3 ) | , | ( 1 γ 1 ) | , | ( 1 γ 2 ) | , | ( 1 γ 3 ) | ) < 1 )
where λ represents the maximum eigenvalue of the adjacency matrix. When the system attains stability, no information can spread through the network.
γ 1 , γ 2 , γ 3 , β 1 , β 2 , β 3 all range from 0 to 1. In the context of undirected networks, the adjacency matrix possesses the properties of irreducibility, non-negativity, and symmetry. In accordance with the Perron–Frobenius Theorem, its largest eigenvalue is a positive real number, therefore ( 1 γ 1 ) + β 1 λ > 0 , ( 1 γ 2 ) + β 2 λ > 0 and ( 1 γ 3 ) + β 3 λ > 0 and condition (8) can be rewritten as follows:
( 1 γ 1 ) + β 1 λ < 1 ( 1 γ 2 ) + β 2 λ < 1 ( 1 γ 3 ) + β 3 λ < 1 β 1 / γ 1 < 1 / λ β 2 / γ 2 < 1 / λ β 3 / γ 3 < 1 / λ
When β i / γ i < 1 / λ , the spreading of information within the network has completed. It is evident from the derived results that the epidemic threshold remains independent of the interaction factors.

4. Results and Analysis

In this section, we verify the influence of the relationships between different pieces of information on multiple information propagation processes separately on real-world networks and synthetic networks.

4.1. Experimental Datasets

We conduct simulations of the proposed model based on both real and synthetic networks. The dataset for the real network is extracted from the Twitter dataset. The details are as follows:
  • Twitter: Twitter serves as a platform for real-time global event tracking and discussions on trending topics. Users can engage in open, real-time conversations and interact with other users. The dataset is collected from 5000 users and their social circles, where users and their social relationships are represented as nodes and connections, respectively. The statistical characteristics of the Twitter network are shown in Table 2.
  • Synthetic network: The synthetic network is generated using the Barabási–Albert (BA) network [37] and consists of 1000 nodes. The parameter m is set to 3, indicating the number of connected edges when a new node is added.

4.2. Multiple Information Analysis

In this section, we explore the influence of interaction factors on propagation. Given that the emphasis of this section is on the interaction between pieces of information, we primarily observe the impact of changes in the values of α 1 and α 2 on the spreading, where a 1 0 , 1 , a 2 0 , . This ensures the generality of the experiments as we randomly select five initial nodes for information propagation experiments with each experiment repeated 100 times, and the results averaged.
In Figure 2a, we depict the relationship between the number of individuals involved in the spreading of information and the enhancement factor a 2 in the synthetic network, considering the parameters β 1 = 0.1 , β 3 = 0.1 . The information in the network mutually enhances each other. With an increase in a 2 , the number of individuals involved in the spreading of information grows. The positive correlation between the enhancement factor and the number of individuals engaged in spreading information implies that as the strength of mutual enhancement increases, a larger segment of the network actively participates in the propagation of information.
Figure 2b illustrates the impact of facilitation factors on information propagation under different spreading probabilities. With β 1 = 0.1 , β 3 = 0.3 , we initially observed that the propagation range of both pieces of information increases with the strengthening of the facilitation factor. Additionally, the enhancement amplitude for I n f 1 is greater, while the enhancement amplitude for I n f 3 is smaller. In scenarios of mutual enhancement, the information with a higher inherent tendency to spread can act as a catalyst, facilitating the dissemination of less infectious information.
Figure 3 illustrates the variation in individuals participating in information propagation in the Twitter network under different enhancement factors. Given the structural disparities between the Twitter network and a synthetic network, we set the infection rate β 1 = 0.08 , β 3 = 0.08 . It can be observed that with an increase in the enhancement factor, the propagation range of I n f 1 and I n f 3 becomes larger. These findings align with the results observed in studies of synthetic networks.
To investigate the impact of the inhibition factor, we disregard the enhancement relationship between I n f 1 and I n f 3 by setting a 2 = 0 . Figure 4a illustrates the influence of the inhibition factor on information propagation in a synthetic network. We set the infection rates as β 1 = 0.15 , β 3 = 0.15 , β 2 = 0.3 . When the inhibition factor a 1 = 0 , there is no competition among the three pieces of information. Therefore, all three pieces of information can be spread freely. As the inhibition factor increases, the propagation of all three pieces of information becomes constrained.
Figure 4b illustrates the impact of the inhibition factor a 1 on information propagation in the Twitter network. We set the infection rates as β 1 = 0.08 , β 3 = 0.08 and β 2 = 0.3 . When a 1 = 0 , the influence range of all three pieces of information, which propagate freely, is significantly large. However, as a 1 increases, the propagation range of information with lower infection rates notably decreases, while the impact on information with higher infection rates is comparatively lower.
Figure 5a illustrates the variation in information propagation with changes in a 2 when both inhibition and enhancement factors coexist in a synthetic network. It can be observed that when the infection rates β 1 = 0.15 , β 3 = 0.15 and β 2 = 0.3 , and the inhibition factor is a 1 = 1 , the propagation range of I n f 2 decreases with an increase in the enhancement factor. In contrast, the propagation ranges of I n f 1 and I n f 3 increase with the enhancement factor.
Figure 5b illustrates the variation in information propagation with changes in a 2 when both inhibition and enhancement factors coexist in the Twitter network. The infection rate is set as β 1 = 0.08 , β 3 = 0.08 and β 2 = 0.3 . When a 2 is small, the number of individuals spreading I n f 1 and I n f 3 is lower than that of I n f 2 . However, as a 2 continues to increase, the number of individuals spreading I n f 1 and I n f 3 gradually surpasses the number of individuals spreading I n f 2 . This dynamic signifies a critical turning point—when the enhancement factor is small, information with a higher infection rate impedes the dissemination of information with a lower infection rate. However, as the enhancement factor increases, a more complex interplay emerges. Information with a higher infection rate becomes subject to joint inhibition by multiple pieces of information characterized by lower influence probabilities.
Next, we explore the impact of enhancement and inhibiting factors on information spreading in networks constructed with different BA model parameters m. Figure 6a illustrates the changes in the propagation of I n f 1 in synthetic networks for different m values. The infection rate is set as β 1 = 0.1 , β 3 = 0.1 . When m is small, the spreading of information faces significant challenges. Sparse networks typically feature limited connectivity among nodes, which hinders the efficient spread of information. In such scenarios, even with an increase in the enhancement factor, the impact on information propagation remains minimal. As m increases, the number of individuals involved in the propagation of I n f 1 gradually increases. The amplifying effect of the enhancement factor a 2 also becomes more pronounced, indicating that improving the connectivity of the network has a positive impact on information propagation.
Figure 6b illustrates the varying impact of the inhibition factor a 1 on the propagation of I n f 2 in synthetic networks for different values of m. The infection rate is set as β 1 = 0.15 , β 3 = 0.15 and β 2 = 0.3 . When m is large, an increase in the inhibition factor leads to a gradual reduction in the proportion of individuals involved in the diffusion of I n f 2 . Conversely, when m is small, the influence of an increased inhibition factor on the diffusion of I n f 2 is small. These findings suggest that in networks with higher connectivity, the inhibition factor has a more significant impact on the propagation of I n f 2 , while in networks with lower connectivity, the effect of the inhibition factor on I n f 2 propagation is less pronounced.

5. Conclusions

In this paper, we propose a SIC multi-information spreading model that incorporates enhancement and inhibiting factors to analyze their influence on the spread of multiple pieces of information. Through our experiments, several significant findings have emerged: (1) When multiple pieces of information mutually enhance each other, information with a higher infection rate can amplify the spread of information with a lower infection rate. This highlights the interplay between different pieces of information and how they can synergistically contribute to the overall spread. (2) The presence of competition among pieces of information hinders their spread. Moreover, the lower the infection rate of a piece of information, the more it is inhibited by competing information. This emphasizes the impact of competition on the spreading of individual pieces of information. (3) In cases where there is cooperation and competition among pieces of information, the one with a higher infection rate exerts a dominant influence on information spreading. This showcases the power dynamics at play when multiple pieces of information interact within a network. (4) In sparse networks with limited connectivity, the challenges in spreading information are more pronounced. Additionally, the impact of enhancement and inhibiting factors on information transmission becomes less significant in such networks. Overall, we provide valuable insights into understanding and predicting the dynamics of multi-information spreading in various contexts.

Author Contributions

Conceptualization, D.H.; methodology, J.Q.; software, K.Z. and R.Y.; validation, K.Z. and Y.B.; investigation, K.Z.; data curation, K.Z. and R.Y.; writing—original draft preparation, K.Z.; writing—review and editing, D.H. and J.Q.; visualization, K.Z., Y.B. and R.Y.; supervision, D.H.; project administration, K.Z.; funding acquisition, D.H. All authors have read and agreed to the published version of the manuscript.

Funding

Research funded by National Natural Science Foundation of China (11875133, 12147101, 11075057) and Science and Technology Commission of Shanghai Municipality (22JC1402500).

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to privacy.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Moreno, Y.; Nekovee, M.; Pacheco, A.F. Dynamics of rumor spreading in complex networks. Phys. Rev. E 2004, 69, 066130. [Google Scholar] [CrossRef]
  2. Doerr, B.; Fouz, M.; Friedrich, T. Why rumors spread so quickly in social networks. Commun. ACM 2012, 55, 70–75. [Google Scholar] [CrossRef]
  3. Chierichetti, F.; Lattanzi, S.; Panconesi, A. Rumor spreading in social networks. Theor. Comput. Sci. 2011, 412, 2602–2610. [Google Scholar] [CrossRef]
  4. Zan, Y.; Wu, J.; Li, P.; Yu, Q. SICR rumor spreading model in complex networks: Counterattack and self-resistance. Phys. A Stat. Mech. Appl. 2014, 405, 159–170. [Google Scholar] [CrossRef]
  5. Xu, C.; Ding, A.S.; Zhao, K. A novel POI recommendation method based on trust relationship and spatial–temporal factors. Electron. Commer. Res. Appl. 2021, 48, 101060. [Google Scholar] [CrossRef]
  6. Wang, Y.; Ding, A.S.; Xu, C. The impact of paid social Q&A on panic buying and digital hoarding at the stage of coexistence with COVID-19: The moderating role of sensitivity to pain of payment. Int. J. Disaster Risk Reduct. 2023, 84, 103472. [Google Scholar]
  7. Liu, D.; Chen, X. Rumor propagation in online social networks like twitter—A simulation study. In Proceedings of the 2011 Third International Conference on Multimedia Information Networking and Security, Shanghai, China, 4–6 November 2011; pp. 278–282. [Google Scholar]
  8. Xu, X.-D.; Xiao, Y.-T.; Zhu, S.-R. Simulation investigation of rumor propagation in microblogging community. Comput. Eng. 2011, 37, 272–274. [Google Scholar]
  9. Wang, H.; Li, Y.; Feng, Z.; Feng, L. ReTweeting analysis and prediction in microblogs: An epidemic inspired approach. China Commun. 2013, 10, 13–24. [Google Scholar] [CrossRef]
  10. Xu, B.; Liu, L. Information diffusion through online social networks. In Proceedings of the 2010 IEEE International Conference on Emergency Management and Management Sciences, Beijing, China, 8–10 August 2010; pp. 53–56. [Google Scholar]
  11. Wei, Z.; Yanqing, Y.; Hanlin, T.; Qiwei, D.; Taowei, L. Information diffusion model based on social network. In Proceedings of the 2012 International Conference of Modern Computer Science and Applications, Wuhan, China, 8 September 2012; Springer: Berlin/Heidelberg, Germany, 2013; pp. 145–150. [Google Scholar]
  12. Zanette, D.H. Critical behavior of propagation on small-world networks. Phys. Rev. E 2001, 64, 050901. [Google Scholar] [CrossRef]
  13. Zanette, D.H. Dynamics of rumor propagation on small-world networks. Phys. Rev. E 2002, 65, 041908. [Google Scholar] [CrossRef]
  14. Leskovec, J.; McGlohon, M.; Faloutsos, C.; Glance, N.; Hurst, M. Patterns of cascading behavior in large blog graphs. In Proceedings of the 2007 SIAM International Conference on Data Mining, Minneapolis, MN, USA, 26–28 April 2007; SIAM: Philadelphia, PA, USA, 2007; pp. 551–556. [Google Scholar]
  15. Prakash, B.A.; Beutel, A.; Rosenfeld, R.; Faloutsos, C. Winner takes all: Competing viruses or ideas on fair-play networks. In Proceedings of the 21st International Conference on World Wide Web, Lyon, France, 16–20 April 2012; pp. 1037–1046. [Google Scholar]
  16. Wang, J.; Xiong, W.; Wang, R.; Cai, S.; Wu, D.; Wang, W.; Chen, X. Effects of the information-driven awareness on epidemic spreading on multiplex networks. Chaos Interdiscip. J. Nonlinear Sci. 2022, 32, 073123. [Google Scholar] [CrossRef] [PubMed]
  17. Velásquez-Rojas, F.; Ventura, P.C.; Connaughton, C.; Moreno, Y.; Rodrigues, F.A.; Vazquez, F. Disease and information spreading at different speeds in multiplex networks. Phys. Rev. E 2020, 102, 022312. [Google Scholar] [CrossRef] [PubMed]
  18. Zhang, X.; Su, Y.; Qu, S.; Xie, S.; Fang, B.; Philip, S.Y. IAD: Interaction-aware diffusion framework in social networks. IEEE Trans. Knowl. Data Eng. 2018, 31, 1341–1354. [Google Scholar] [CrossRef]
  19. Xiao, Y.; Zhang, L.; Li, Q.; Liu, L. MM-SIS: Model for multiple information spreading in multiplex network. Phys. A Stat. Mech. Appl. 2019, 513, 135–146. [Google Scholar] [CrossRef]
  20. Danziger, M.M.; Bonamassa, I.; Boccaletti, S.; Havlin, S. Dynamic interdependence and competition in multilayer networks. Nat. Phys. 2019, 15, 178–185. [Google Scholar] [CrossRef]
  21. Alvarez-Zuzek, L.G.; La Rocca, C.E.; Vazquez, F.; Braunstein, L.A. Interacting social processes on interconnected networks. PLoS ONE 2016, 11, e0163593. [Google Scholar] [CrossRef]
  22. Kahr, M.; Leitner, M.; Ruthmair, M.; Sinnl, M. Benders decomposition for competitive influence maximization in (social) networks. Omega 2021, 100, 102264. [Google Scholar] [CrossRef]
  23. Zhang, Y.; Zhou, S.; Zhang, Z.; Guan, J.; Zhou, S. Rumor evolution in social networks. Phys. Rev. E 2013, 87, 032133. [Google Scholar] [CrossRef]
  24. Zhou, X.; Hu, Y.; Wu, Y.; Xiong, X. Influence analysis of information erupted on social networks based on SIR model. Int. J. Mod. Phys. C 2015, 26, 1550018. [Google Scholar] [CrossRef]
  25. Xiong, X.; Qiao, S.; Han, N.; Li, Y.; Xiong, F.; He, L. Affective impression: Sentiment-awareness POI suggestion via embedding in heterogeneous LBSNs. IEEE Trans. Affect. Comput. 2019, 13, 272–284. [Google Scholar] [CrossRef]
  26. Xiong, X.; Li, Y.; Qiao, S.; Han, N.; Wu, Y.; Peng, J.; Li, B. An emotional contagion model for heterogeneous social media with multiple behaviors. Phys. A Stat. Mech. Appl. 2018, 490, 185–202. [Google Scholar] [CrossRef]
  27. Zhu, H.; Wu, H.; Cao, J.; Fu, G.; Li, H. Information dissemination model for social media with constant updates. Phys. A Stat. Mech. Appl. 2018, 502, 469–482. [Google Scholar] [CrossRef]
  28. Shang, J.; Liu, L.; Li, X.; Xie, F.; Wu, C. Epidemic spreading on complex networks with overlapping and non-overlapping community structure. Phys. A Stat. Mech. Appl. 2015, 419, 171–182. [Google Scholar] [CrossRef]
  29. Wang, W.; Wang, Z.X.; Cai, S.M. Critical phenomena of information spreading dynamics on networks with cliques. Phys. Rev. E 2018, 98, 052312. [Google Scholar] [CrossRef]
  30. Scarselli, D.; Budanur, N.B.; Timme, M.; Hof, B. Discontinuous epidemic transition due to limited testing. Nat. Commun. 2021, 12, 2586. [Google Scholar] [CrossRef] [PubMed]
  31. Beutel, A.; Prakash, B.A.; Rosenfeld, R.; Faloutsos, C. Interacting viruses in networks: Can both survive? In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Beijing, China, 12–16 August 2012; pp. 426–434. [Google Scholar]
  32. Wei, X.; Valler, N.C.; Prakash, B.A.; Neamtiu, I.; Faloutsos, M.; Faloutsos, C. Competing memes propagation on networks: A network science perspective. IEEE J. Sel. Areas Commun. 2013, 31, 1049–1060. [Google Scholar] [CrossRef]
  33. Fan, J.; Zhao, D.; Xia, C.; Tanimoto, J. Coupled spreading between information and epidemics on multiplex networks with simplicial complexes. Chaos Interdiscip. J. Nonlinear Sci. 2022, 32, 113115. [Google Scholar] [CrossRef] [PubMed]
  34. Gómez, S.; Arenas, A.; Borge-Holthoefer, J.; Meloni, S.; Moreno, Y. Discrete-time Markov chain approach to contact-based disease spreading in complex networks. Europhys. Lett. 2010, 89, 38009. [Google Scholar] [CrossRef]
  35. Guo, Q.; Lei, Y.; Jiang, X.; Ma, Y.; Huo, G.; Zheng, Z. Epidemic spreading with activity-driven awareness diffusion on multiplex network. Chaos Interdiscip. J. Nonlinear Sci. 2016, 26, 043110. [Google Scholar] [CrossRef] [PubMed]
  36. Trpevski, D.; Tang, W.K.; Kocarev, L. Model for rumor spreading over networks. Phys. Rev. E 2010, 81, 056102. [Google Scholar] [CrossRef] [PubMed]
  37. Barabási, A.L.; Albert, R. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar] [CrossRef] [PubMed]
Figure 1. The state transition diagram for prioritizing the spreading of I n f 1 , I n f 2 and I n f 3 .
Figure 1. The state transition diagram for prioritizing the spreading of I n f 1 , I n f 2 and I n f 3 .
Entropy 26 00152 g001
Figure 2. (a) The relationship in the synthetic network between the proportion of individuals spreading information and the enhancement factor a 2 with β 1 = 0.1 and β 3 = 0.1 . (b) The relationship in the synthetic network between the proportion of individuals spreading information and enhancement factor a 2 with β 1 = 0.1 , β 3 = 0.3 .
Figure 2. (a) The relationship in the synthetic network between the proportion of individuals spreading information and the enhancement factor a 2 with β 1 = 0.1 and β 3 = 0.1 . (b) The relationship in the synthetic network between the proportion of individuals spreading information and enhancement factor a 2 with β 1 = 0.1 , β 3 = 0.3 .
Entropy 26 00152 g002
Figure 3. The relationship in the Twitter network between the proportion of individuals spreading information and the enhancement factor a 2 with β 1 = 0.08 , β 3 = 0.08 .
Figure 3. The relationship in the Twitter network between the proportion of individuals spreading information and the enhancement factor a 2 with β 1 = 0.08 , β 3 = 0.08 .
Entropy 26 00152 g003
Figure 4. (a) The relationship in the synthetic network between the proportion of individuals spreading information and the inhibiting factor a 1 with β 1 = 0.15 , β 3 = 0.15 , β 2 = 0.3 . (b) The relationship in the Twitter network between the proportion of individuals spreading information with the inhibiting factor a 1 , β 1 = 0.08 , β 3 = 0.08 and β 2 = 0.3 .
Figure 4. (a) The relationship in the synthetic network between the proportion of individuals spreading information and the inhibiting factor a 1 with β 1 = 0.15 , β 3 = 0.15 , β 2 = 0.3 . (b) The relationship in the Twitter network between the proportion of individuals spreading information with the inhibiting factor a 1 , β 1 = 0.08 , β 3 = 0.08 and β 2 = 0.3 .
Entropy 26 00152 g004
Figure 5. (a) The relationship in the synthetic network between the proportion of individuals spreading information and enhancement factor a 2 with β 1 = 0.15 , β 3 = 0.15 , β 2 = 0.3 , a 1 = 1 . (b) The relationship in the Twitter network between the proportion of individuals spreading information and the enhancement factor a 2 with β 1 = 0.08 , β 3 = 0.08 , β 2 = 0.3 , a 1 = 1 .
Figure 5. (a) The relationship in the synthetic network between the proportion of individuals spreading information and enhancement factor a 2 with β 1 = 0.15 , β 3 = 0.15 , β 2 = 0.3 , a 1 = 1 . (b) The relationship in the Twitter network between the proportion of individuals spreading information and the enhancement factor a 2 with β 1 = 0.08 , β 3 = 0.08 , β 2 = 0.3 , a 1 = 1 .
Entropy 26 00152 g005
Figure 6. (a) The relationship in the synthetic network between the proportion of individuals spreading I n f 1 and the parameter m with β 1 = 0.1 , β 3 = 0.1 . (b) The relationship in the synthetic network between the proportion of individuals spreading I n f 2 and the inhibiting factor a 1 with β 1 = 0.15 , β 3 = 0.15 , β 2 = 0.3 and different m.
Figure 6. (a) The relationship in the synthetic network between the proportion of individuals spreading I n f 1 and the parameter m with β 1 = 0.1 , β 3 = 0.1 . (b) The relationship in the synthetic network between the proportion of individuals spreading I n f 2 and the inhibiting factor a 1 with β 1 = 0.15 , β 3 = 0.15 , β 2 = 0.3 and different m.
Entropy 26 00152 g006
Table 1. Symbols and definitions.
Table 1. Symbols and definitions.
SymbolsDefinitions
I n f Information
β i Infection rate of i n f i
γ i Completed rate of i n f i
a 1 The influence parameter of the competitive information, and satisfies a 1 0 , 1
a 2 The influence parameter of the cooperative information, and satisfies a 2 0 ,
VThe set of nodes
EThe set of edges
NThe number of nodes
MThe number of information
AThe adjacency matrix of the network
λ The largest eigenvalue of matrix A
S i Susceptible state for information i
I i Infected state for information i
C i Completed state for information i
Table 2. Features of the Twitter network.
Table 2. Features of the Twitter network.
Number of NodesNumber of EdgesAverage Path LengthClustering Coefficient
5000185,4333.25970.1178
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhao, K.; Han, D.; Bao, Y.; Qian, J.; Yang, R. A Multi-Information Spreading Model for One-Time Retweet Information in Complex Networks. Entropy 2024, 26, 152. https://doi.org/10.3390/e26020152

AMA Style

Zhao K, Han D, Bao Y, Qian J, Yang R. A Multi-Information Spreading Model for One-Time Retweet Information in Complex Networks. Entropy. 2024; 26(2):152. https://doi.org/10.3390/e26020152

Chicago/Turabian Style

Zhao, Kaidi, Dingding Han, Yihong Bao, Jianghai Qian, and Ruiqi Yang. 2024. "A Multi-Information Spreading Model for One-Time Retweet Information in Complex Networks" Entropy 26, no. 2: 152. https://doi.org/10.3390/e26020152

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop