Background:Amid the global rise in adolescent sedentary behavior and psychological distress,extant research has largely focused on variable-level associations,neglecting symptom-level interactions.This study applies n...Background:Amid the global rise in adolescent sedentary behavior and psychological distress,extant research has largely focused on variable-level associations,neglecting symptom-level interactions.This study applies network analysis,aims to delineate the interconnections among sedentary time,social support,social exclusion,and psychological distress in Chinese students,and to identify core and bridge symptoms to inform targeted interventions.Methods:This study employed a cross-sectional design to investigate the complex relationships among sedentary behavior,social support,social exclusion,and psychological distress among Chinese students.The research involved 459 high school and university students,using network analysis and mediation models to examine these relationships.Results:Network analysis revealed that the network had a density of 58.33%and an average edge weight of 0.11.In terms of centrality,stress had the highest expected influence(EI=1.135),acting as the core amplifier in the network.Sedentary behavior demonstrated the highest bridging expected influence,functioning as a critical bridge for cross-community transmission.Conversely,friend support showed the lowest bridging EI with a negative value,indicating its effectiveness in blocking cross-community diffusion and alleviating symptoms.Conclusion:With stress acting as the most influential“core engine”within the symptom network and sedentary behavior serving as the key“bridge”for cross-community transmission,interventions should first target stress to weaken the overall symptom cascade,followed by reducing sedentary behavior or enhancing friend support to disrupt cross-community pathways,thereby achieving a core-bridge dual blockade.展开更多
Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for so...Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement.展开更多
Graph neural networks(GNN)have shown strong performance in node classification tasks,yet most existing models rely on uniform or shared weight aggregation,lacking flexibility in modeling the varying strength of relati...Graph neural networks(GNN)have shown strong performance in node classification tasks,yet most existing models rely on uniform or shared weight aggregation,lacking flexibility in modeling the varying strength of relationships among nodes.This paper proposes a novel graph coupling convolutional model that introduces an adaptive weighting mechanism to assign distinct importance to neighboring nodes based on their similarity to the central node.Unlike traditional methods,the proposed coupling strategy enhances the interpretability of node interactions while maintaining competitive classification performance.The model operates in the spatial domain,utilizing adjacency list structures for efficient convolution and addressing the limitations of weight sharing through a coupling-based similarity computation.Extensive experiments are conducted on five graph-structured datasets,including Cora,Citeseer,PubMed,Reddit,and BlogCatalog,as well as a custom topology dataset constructed from the Open University Learning Analytics Dataset(OULAD)educational platform.Results demonstrate that the proposed model achieves good classification accuracy,while significantly reducing training time through direct second-order neighbor fusion and data preprocessing.Moreover,analysis of neighborhood order reveals that considering third-order neighbors offers limited accuracy gains but introduces considerable computational overhead,confirming the efficiency of first-and second-order convolution in practical applications.Overall,the proposed graph coupling model offers a lightweight,interpretable,and effective framework for multi-label node classification in complex networks.展开更多
The shift toward specialized and large-scale agricultural production has spurred the emergence of agricultural clusters as key forces of rural vitalization and sustainable development.This paper explored the formation...The shift toward specialized and large-scale agricultural production has spurred the emergence of agricultural clusters as key forces of rural vitalization and sustainable development.This paper explored the formation and evolution of Meizhou pomelo industry cluster in China,focusing on its role in restructuring rural socio-economic systems and integrating the whole value chains.Based on a case study employing qualitative methods such as in-depth interviews and participatory observation,the agricultural cluster evolution of Meizhou pomelo was categorized into three key phases of initial decentralization,self-organized scaling,and reorganized clustering.Geographical proximity and industrial agglomeration constitute the physical foundation,while vertical/horizontal linkages,technologic-al innovation,and policy support enhance competitiveness.Special mechanisms emerge through localized social networks,farmer co-operatives’activation,and cross-regional market expansion.The cluster’s impact is manifested in the shift from extensive to standard-ized and modernized production,diversified and flexible livelihood of farmers,and the integration of agriculture with industry and ser-vices.The development of the whole value chain based on agricultural cluster represents a critical pathway for achieving agricultural modernization,encompassing both internal and external value chain optimization.Through quality assurance systems,product diversi-fication strategies,operational efficiency improvements,and brand enhancement,these clusters amplify product value propositions and market competitiveness.This systemic approach facilitates supply-demand coordination,enables resource synergies,and optimizes eco-nomic returns across the horizontal and vertical value chain.This paper argues that agricultural clusters serve as strategic catalysts for sustainable rural development by reconstructing local production systems,fostering innovation ecosystems,and aligning agricultural modernization.It contributes to debates on rural vitalization by demonstrating how agricultural clustering can reconfigure rural areas as hubs of ecological modernization,rather than mere urban peripheries.展开更多
Social bots are automated programs designed to spread rumors and misinformation,posing significant threats to online security.Existing research shows that the structure of a social network significantly affects the be...Social bots are automated programs designed to spread rumors and misinformation,posing significant threats to online security.Existing research shows that the structure of a social network significantly affects the behavioral patterns of social bots:a higher number of connected components weakens their collaborative capabilities,thereby reducing their proportion within the overall network.However,current social bot detection methods still make limited use of topological features.Furthermore,both graph neural network(GNN)-based methods that rely on local features and those that leverage global features suffer from their own limitations,and existing studies lack an effective fusion of multi-scale information.To address these issues,this paper proposes a topology-aware multi-scale social bot detection method,which jointly learns local and global representations through a co-training mechanism.At the local level,topological features are effectively embedded into node representations,enhancing expressiveness while alleviating the over-smoothing problem in GNNs.At the global level,a clustering attention mechanism is introduced to learn global node representations,mitigating the over-globalization problem.Experimental results demonstrate that our method effectively overcomes the limitations of single-scale approaches.Our code is publicly available at https://anonymous.4open.science/r/TopoMSG-2C41/(accessed on 27 October 2025).展开更多
Objectives:SocialNetworkAddiction(SNA)is becoming increasingly prevalent among college students;however,there remains a lack of consensus regarding the measurement tools and their optimal cutoff score.This study aims ...Objectives:SocialNetworkAddiction(SNA)is becoming increasingly prevalent among college students;however,there remains a lack of consensus regarding the measurement tools and their optimal cutoff score.This study aims to validate the 21-item SocialNetwork Addiction Scale-Chinese(SNAS-C)in its Chinese version and to determine its optimal cutoff score for identifying potential SNA cases within the college student population.Methods:A crosssectional survey was conducted,recruiting 3387 college students.Latent profile analysis(LPA)and receiver operating characteristic(ROC)curve analysis were employed to establish the optimal cutoff score for the validated 21-item SNAS-C.Results:Three profile models were selected based on multiple statistical criteria,classifying participants into low-risk,moderate-risk,and high-risk groups.The highest-risk group was defined as“positive”for SNA,while the remaining groups were considered“negative”,serving as the reference standard for ROC analysis.The optimal cutoff score was determined to be 72(sensitivity:98.2%,specificity:96.86%),with an overall classification accuracy of 97.0%.The“positive”group reported significantly higher frequency of social network usage,greater digitalmedia dependence scores,and a higher incidence of network addiction.Conclusion:This study identified the optimal cutoff score for the SNAS-C as≥72,demonstrating high sensitivity,specificity,and diagnostic accuracy.This threshold effectively distinguishes between high-risk and low-risk SNA.展开更多
Cybersecurity encompasses various elements such as strategies,policies,processes,and techniques to accomplish availability,confidentiality,and integrity of resource processing,network,software,and data from attacks.In...Cybersecurity encompasses various elements such as strategies,policies,processes,and techniques to accomplish availability,confidentiality,and integrity of resource processing,network,software,and data from attacks.In this scenario,the rising popularity of Online Social Networks(OSN)is under threat from spammers for which effective spam bot detection approaches should be developed.Earlier studies have developed different approaches for the detection of spam bots in OSN.But those techniques primarily concentrated on hand-crafted features to capture the features of malicious users while the application of Deep Learning(DL)models needs to be explored.With this motivation,the current research article proposes a Spam Bot Detection technique using Hybrid DL model abbreviated as SBDHDL.The proposed SBD-HDL technique focuses on the detection of spam bots that exist in OSNs.The technique has different stages of operations such as pre-processing,classification,and parameter optimization.Besides,SBD-HDL technique hybridizes Graph Convolutional Network(GCN)with Recurrent Neural Network(RNN)model for spam bot classification process.In order to enhance the detection performance of GCN-RNN model,hyperparameters are tuned using Lion Optimization Algorithm(LOA).Both hybridization of GCN-RNN and LOA-based hyperparameter tuning process make the current work,a first-of-its-kind in this domain.The experimental validation of the proposed SBD-HDL technique,conducted upon benchmark dataset,established the supremacy of the technique since it was validated under different measures.展开更多
Social interaction with peer pressure is widely studied in social network analysis.Game theory can be utilized to model dynamic social interaction,and one class of game network models assumes that people’s decision p...Social interaction with peer pressure is widely studied in social network analysis.Game theory can be utilized to model dynamic social interaction,and one class of game network models assumes that people’s decision payoff functions hinge on individual covariates and the choices of their friends.However,peer pressure would be misidentified and induce a non-negligible bias when incomplete covariates are involved in the game model.For this reason,we develop a generalized constant peer effects model based on homogeneity structure in dynamic social networks.The new model can effectively avoid bias through homogeneity pursuit and can be applied to a wider range of scenarios.To estimate peer pressure in the model,we first present two algorithms based on the initialize expand merge method and the polynomial-time twostage method to estimate homogeneity parameters.Then we apply the nested pseudo-likelihood method and obtain consistent estimators of peer pressure.Simulation evaluations show that our proposed methodology can achieve desirable and effective results in terms of the community misclassification rate and parameter estimation error.We also illustrate the advantages of our model in the empirical analysis when compared with a benchmark model.展开更多
This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data cons...This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.展开更多
Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate ...Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate these attacks but are cumbersome, neglect dynamic protection of community structure, and lack precise utility measures. To address these challenges, we present a dynamic social network graph anonymity scheme with community structure protection (DSNGA-CSP), which achieves the dynamic anonymization process by incorporating community detection. First, DSNGA-CSP categorizes communities of the original graph into three types at each timestamp, and only partitions community subgraphs for a specific category at each updated timestamp. Then, DSNGA-CSP achieves intra-community and inter-community anonymization separately to retain more of the community structure of the original graph at each timestamp. It anonymizes community subgraphs by the proposed novel -composition method and anonymizes inter-community edges by edge isomorphism. Finally, a novel information loss metric is introduced in DSNGA-CSP to precisely capture the utility of the anonymized graph through original information preservation and anonymous information changes. Extensive experiments conducted on five real-world datasets demonstrate that DSNGA-CSP consistently outperforms existing methods, providing a more effective balance between privacy and utility. Specifically, DSNGA-CSP shows an average utility improvement of approximately 30% compared to TAKG and CTKGA for three dynamic graph datasets, according to the proposed information loss metric IL.展开更多
Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall c...Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall competitive strength.Consequently,China proposed a strategy for the integration of industrialization and informatization,optimizing and adjusting its industrial structure to swiftly achieve transformation and upgrading in the Industry 4.0 era,thereby enhancing the sophistication of intelligent industrial control systems.The distributed control system in a nuclear power plant functions as an industrial control system,overseeing the operational status of the physical process.Its ability to ensure safe and reliable operation is directly linked to nuclear safety and the cybersecurity of the facility.The management of network security in distributed control systems(DCS)is crucial for achieving this objective.Due to the varying network settings and parameters of the DCS implemented in each nuclear power plant,the network security status of the system sometimes diverges from expectations.During system operation,it will undoubtedly encounter network security issues.Consequently,nuclear power plants utilize the technical criteria outlined in GB/T 22239 to formulate a network security management program aimed at enhancing the operational security of DCS within these facilities.This study utilizes existing network security regulations and standards as a reference to analyze the network security control standards based on the nuclear power plant’s control system.It delineates the fundamental requirements for network security management,facilitating integration with the entire life cycle of the research,development,and application of the nuclear power plant’s distributed control system,thereby establishing a network security management methodology that satisfies the control requirements of the nuclear power plant.Initially,it presents DCS and network security management,outlines current domestic and international network security legislation and standards,and specifies the standards pertinent to the administration of DCS in nuclear power plants.Secondly,the design of network security management for DCS is executed in conjunction with the specific context of nuclear power plants.This encompasses the deployment of network security apparatus,validation of the network security management strategy,and optimization adjustments.Consequently,recommendations beneficial to the network security management of nuclear power plants are compiled,aimed at establishing a management system and incorporating the concept of full life cycle management,which is predicated on system requirements,system design,and both software and hardware considerations.Conversely,it presents the notion of comprehensive life cycle management and suggests network security management strategies encompassing system requirements,system architecture,detailed hardware and software design and implementation,procurement,internal system integration,system validation and acceptance testing,system installation,operational maintenance,system modifications,and decommissioning.We will consistently enhance the performance and functionality of DCS in nuclear power plants,establish a safe and secure operational environment,and thereby facilitate the implementation of DCS in nuclear facilities while ensuring robust network security in the future.展开更多
The 5G-R network is on the verge of entering the construction stage.Given that the dedicated network for railways is closely linked to train operation safety,there are extremely high requirements for network security....The 5G-R network is on the verge of entering the construction stage.Given that the dedicated network for railways is closely linked to train operation safety,there are extremely high requirements for network security.As a result,there is an urgent need to conduct research on 5G-R network security.To comprehensively enhance the end-to-end security protection of the 5G-R network,this study summarized the security requirements of the GSM-R network,analyzed the security risks and requirements faced by the 5G-R network,and proposed an overall 5G-R network security architecture.The security technical schemes were detailed from various aspects:5G-R infrastructure security,terminal access security,networking security,operation and maintenance security,data security,and network boundary security.Additionally,the study proposed leveraging the 5G-R security situation awareness system to achieve a comprehensive upgrade from basic security technologies to endogenous security capabilities within the 5G-R system.展开更多
The construction of“park cities”requires a systematic thinking to coordinate the networked development of park system and break through the limitation of emphasizing scale and grade and neglecting dynamic correlatio...The construction of“park cities”requires a systematic thinking to coordinate the networked development of park system and break through the limitation of emphasizing scale and grade and neglecting dynamic correlation in traditional planning.Taking Haidian District of Beijing as an example,the social network analysis method is introduced to construct the network model of park green spaces.Through indicators such as clustering coefficient,network density and node centrality,the characteristics of its spatial structure and hierarchical relationship are analyzed.It is found that the network integrity presents the characteristics of“highly local concentration and global fragmentation”,fragmented park green space network and missing spatial connection,isolated clusters and collaborative failure,as well as the spatial mismatch between population and resource supply and demand.Hierarchical issues include“structural imbalance and functional disorder”,disorder between network hierarchy and park level,misalignment of functional hierarchy leading to weakened network risk resistance capacity,and a relatively dense distribution of core nodes,etc.In response to the above problems,a multi-level spatial intervention strategy should be adopted to solve the overall problem of the network.Meanwhile,it is needed to clarify the positioning of a park itself and improve the hierarchical system,so as to construct a multi-level and multi-scale park green space network,contribute to the construction of a park city,and provide residents with more diverse activity venues.展开更多
The idea of a network society was introduced by Western sociologists at the end of the 20th century after in-depth research was conducted from perspectives such as informationalism.Influenced by these developments,the...The idea of a network society was introduced by Western sociologists at the end of the 20th century after in-depth research was conducted from perspectives such as informationalism.Influenced by these developments,the concept of constructing a network society also emerged in China.Over the past 30 years,China has made significant progress and achievements in constructing a network society,both in terms of its fundamental construction and social development.It is important that these advancements be summarized and reviewed.China’s network society construction can be divided into two relatively independent yet interconnected components,based on their focal points:its foundational infrastructure and its social development.These two components of China’s network society are managed by different departments.China has integrated the fundamental construction of its network society with the social development of its network society,thereby achieving unified planning,collaborative advancement,and coordinated development.This approach aims to harmonize two aspects:building China’s cyberspace strength and contributing to Chinese informatization,thereby advancing Chinese modernization.展开更多
Intensely using online social networks(OSNs)makes users concerned about privacy of data.Given the centralized nature of these platforms,and since each platform has a particular storage mechanism,authentication,and acc...Intensely using online social networks(OSNs)makes users concerned about privacy of data.Given the centralized nature of these platforms,and since each platform has a particular storage mechanism,authentication,and access control,their users do not have the control and the right over their data.Therefore,users cannot easily switch between similar platforms or transfer data from one platform to another.These issues imply,among other things,a threat to privacy since such users depend on the interests of the service provider responsible for administering OSNs.As a strategy for the decentralization of the OSNs and,consequently,as a solution to the privacy problems in these environments,the so-called decentralized online social networks(DOSNs)have emerged.Unlike OSNs,DOSNs are decentralized content management platforms because they do not use centralized service providers.Although DOSNs address some of the privacy issues encountered in OSNs,DOSNs also pose significant challenges to consider,for example,access control to user profile information with high granularity.This work proposes developing an ontological model and a service to support privacy in DOSNs.The model describes the main concepts of privacy access control in DOSNs and their relationships.In addition,the service will consume the model to apply access control according to the policies represented in the model.Our model was evaluated in two phases to verify its compliance with the proposed domain.Finally,we evaluated our service with a performance evaluation,and the results were satisfactory concerning the response time of access control requests.展开更多
BACKGROUND Depression is a common mental disorder among adolescents,characterized by a high rate of suicide and self-harm,which not only is devastating to families but also has a negative impact on society.Psychologic...BACKGROUND Depression is a common mental disorder among adolescents,characterized by a high rate of suicide and self-harm,which not only is devastating to families but also has a negative impact on society.Psychological factors such as impulsive personality,perceived chronic social adversity(PCSA),and sense of security are closely associated with suicide risk in adolescents with depression.Few studies have been conducted on the relationship between these factors.AIM To explore the impact of impulsive personality on suicide risk in adolescents with depression and the chain mediating effect between PCSA and sense of security.METHODS This study is a retrospective study.A total of 200 adolescents with depression who visited the Guangxi Zhuang Autonomous Region Maternal and Child Health Hospital from January 2021 to December 2023 comprised the study cohort.The PCSA scale,Security Questionnaire,Barratt Impulsiveness Scale,and Beck Scale for Suicide Ideation were used to evaluate depression.RESULTS Suicide risk was positively correlated with impulsive personality and PCSA(P<0.05),whereas sense of security was negatively correlated with suicide risk,impulsive personality,and PCSA(P<0.05).The total indirect effect of PCSA and sense of security on impulsive personality and suicide risk was 35.43%,with the mediating effect of PCSA and sense of security contributing 16.53%and 15.75%,respectively.PCSA and sense of security exhibited a chain mediating effect between impulsive personality and suicide risk,accounting for 3.15%.CONCLUSION The suicide risk of adolescents with depression is significantly associated with impulsive personality,PCSA,and sense of security.Impulsive personality affects the suicide risk of adolescents with depression both directly and indirectly,with the latter occurring via PCSA and sense of security.展开更多
This study introduces an innovative hybrid approach that integrates deep learning with blockchain technology to improve cybersecurity,focusing on network intrusion detection systems(NIDS).The main goal is to overcome ...This study introduces an innovative hybrid approach that integrates deep learning with blockchain technology to improve cybersecurity,focusing on network intrusion detection systems(NIDS).The main goal is to overcome the shortcomings of conventional intrusion detection techniques by developing amore flexible and robust security architecture.We use seven unique machine learning models to improve detection skills,emphasizing data quality,traceability,and transparency,facilitated by a blockchain layer that safeguards against datamodification and ensures auditability.Our technique employs the Synthetic Minority Oversampling Technique(SMOTE)to equilibrate the dataset,therefore mitigating prevalent class imbalance difficulties in intrusion detection.The model selection procedure determined that Random Forest was the most successful model,with a notable detection accuracy of 97%.This substantially surpasses conventional methods and enhances the system’s capacity to identify both established and novel threats with exceptional accuracy.To optimize feature selection and maximize performance,we use Extreme Gradient Boosting(XGBoost),which improves the significance of chosen features while reducing the danger of overfitting.Our study indicates that the integrated use of machine learning for pattern identification,multi-factor authentication(MFA)for access security,and blockchain for data validation constitutes a thorough and sustainable cybersecurity solution.This architecture not only increases security but also lowers the need for regular human monitoring,significantly cutting energy consumption connected with cybersecurity infrastructure.The research finds that this integrated strategy provides a realistic road for increasing network security,addressing real-world cyber threats,and promoting eco-friendly practices in IT security.展开更多
With the rapid development of the internet,the dissemination of public opinion in online social networks has become increasingly complex.Existing dissemination models rarely consider group phenomena and the simultaneo...With the rapid development of the internet,the dissemination of public opinion in online social networks has become increasingly complex.Existing dissemination models rarely consider group phenomena and the simultaneous spread of competing public opinion information in online social networks.This paper introduces the UHNPR information dissemination model to study the dynamic spread and interaction of positive and negative public opinion information in hypernetworks.To improve the accuracy of modeling of information dissemination,we revise the traditional assumptions of constant propagation and decay rates by redefining these rates based on factors that influence the spread of public opinion information.Subsequently,we validate the effectiveness of the UHNPR model using numerical simulations and analyze the impact of factors such as authority effect,user intimacy,information content and information timeliness on the spread of public opinion,providing corresponding suggestions for public opinion control.Our research results demonstrate that this model outperforms the SIR,SEIR and SEIDR models in describing public opinion propagation in real social networks.Compared with complex networks,information spreads faster and more extensively in hypernetworks.展开更多
Information spreading has been investigated for many years,but the mechanism of why the information explosively catches on overnight is still under debate.This explosive spreading phenomenon was usually considered dri...Information spreading has been investigated for many years,but the mechanism of why the information explosively catches on overnight is still under debate.This explosive spreading phenomenon was usually considered driven separately by social reinforcement or higher-order interactions.However,due to the limitations of empirical data and theoretical analysis,how the higher-order network structure affects the explosive information spreading under the role of social reinforcement has not been fully explored.In this work,we propose an information-spreading model by considering the social reinforcement in real and synthetic higher-order networks,describable as hypergraphs.Depending on the average group size(hyperedge cardinality)and node membership(hyperdegree),we observe two different spreading behaviors:(i)The spreading progress is not sensitive to social reinforcement,resulting in the information localized in a small part of nodes;(ii)a strong social reinforcement will promote the large-scale spread of information and induce an explosive transition.Moreover,a large average group size and membership would be beneficial to the appearance of the explosive transition.Further,we display that the heterogeneity of the node membership and group size distributions benefit the information spreading.Finally,we extend the group-based approximate master equations to verify the simulation results.Our findings may help us to comprehend the rapidly information-spreading phenomenon in modern society.展开更多
Cryptocurrency has gained popularity as a potential new global payment method.It has the potential to be faster,cheaper,and more secure than existing payment networks,making it a game-changer in the global economy.How...Cryptocurrency has gained popularity as a potential new global payment method.It has the potential to be faster,cheaper,and more secure than existing payment networks,making it a game-changer in the global economy.However,more research is needed to identify the factors driving cryptocurrency adoption and understand its impact.We use social network analysis(SNA)to identify the influencing factors and reveal the impact of each on cryptocurrency adoption.Our analysis initially revealed 44 influential factors,which were later reduced to 25 factors,each exerting a different influence.Based on the SNA,we classify these factors into highly,moderately,and least influential categories.Discomfort and optimism are the most influential determinants of adoption.Moderately influential factors include trust,risk,relative advantage,social influence,and perceived behavioral control.Price/value,facilitating conditions,compatibility,and usefulness are the least influential.The factors affecting cryptocurrency adoption are interdependent.Our findings can help policymakers understand the factors influencing cryptocurrency adoption and aid in developing appropriate legal frameworks for cryptocurrency use.展开更多
文摘Background:Amid the global rise in adolescent sedentary behavior and psychological distress,extant research has largely focused on variable-level associations,neglecting symptom-level interactions.This study applies network analysis,aims to delineate the interconnections among sedentary time,social support,social exclusion,and psychological distress in Chinese students,and to identify core and bridge symptoms to inform targeted interventions.Methods:This study employed a cross-sectional design to investigate the complex relationships among sedentary behavior,social support,social exclusion,and psychological distress among Chinese students.The research involved 459 high school and university students,using network analysis and mediation models to examine these relationships.Results:Network analysis revealed that the network had a density of 58.33%and an average edge weight of 0.11.In terms of centrality,stress had the highest expected influence(EI=1.135),acting as the core amplifier in the network.Sedentary behavior demonstrated the highest bridging expected influence,functioning as a critical bridge for cross-community transmission.Conversely,friend support showed the lowest bridging EI with a negative value,indicating its effectiveness in blocking cross-community diffusion and alleviating symptoms.Conclusion:With stress acting as the most influential“core engine”within the symptom network and sedentary behavior serving as the key“bridge”for cross-community transmission,interventions should first target stress to weaken the overall symptom cascade,followed by reducing sedentary behavior or enhancing friend support to disrupt cross-community pathways,thereby achieving a core-bridge dual blockade.
文摘Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement.
基金Support by Sichuan Science and Technology Program[2023YFSY0026,2023YFH0004]Guangzhou Huashang University[2024HSZD01,HS2023JYSZH01].
文摘Graph neural networks(GNN)have shown strong performance in node classification tasks,yet most existing models rely on uniform or shared weight aggregation,lacking flexibility in modeling the varying strength of relationships among nodes.This paper proposes a novel graph coupling convolutional model that introduces an adaptive weighting mechanism to assign distinct importance to neighboring nodes based on their similarity to the central node.Unlike traditional methods,the proposed coupling strategy enhances the interpretability of node interactions while maintaining competitive classification performance.The model operates in the spatial domain,utilizing adjacency list structures for efficient convolution and addressing the limitations of weight sharing through a coupling-based similarity computation.Extensive experiments are conducted on five graph-structured datasets,including Cora,Citeseer,PubMed,Reddit,and BlogCatalog,as well as a custom topology dataset constructed from the Open University Learning Analytics Dataset(OULAD)educational platform.Results demonstrate that the proposed model achieves good classification accuracy,while significantly reducing training time through direct second-order neighbor fusion and data preprocessing.Moreover,analysis of neighborhood order reveals that considering third-order neighbors offers limited accuracy gains but introduces considerable computational overhead,confirming the efficiency of first-and second-order convolution in practical applications.Overall,the proposed graph coupling model offers a lightweight,interpretable,and effective framework for multi-label node classification in complex networks.
基金Under the auspices of the Key Projects of Philosophy and Social Sciences Research,Ministry of Education of China(No.23JZD008)National Natural Science Foundation of China(No.42171193)+2 种基金Key Project of Guangdong Provincial Philosophy and Social Sciences Planning(No.GD24ES013,GD25ZX04)2025 Guangzhou Basic and Applied Basic Research Special Project(No.2025A04J7127)Fundamental Research Funds for the Central Universities,Sun Yat-sen University(No.24wkjc11)。
文摘The shift toward specialized and large-scale agricultural production has spurred the emergence of agricultural clusters as key forces of rural vitalization and sustainable development.This paper explored the formation and evolution of Meizhou pomelo industry cluster in China,focusing on its role in restructuring rural socio-economic systems and integrating the whole value chains.Based on a case study employing qualitative methods such as in-depth interviews and participatory observation,the agricultural cluster evolution of Meizhou pomelo was categorized into three key phases of initial decentralization,self-organized scaling,and reorganized clustering.Geographical proximity and industrial agglomeration constitute the physical foundation,while vertical/horizontal linkages,technologic-al innovation,and policy support enhance competitiveness.Special mechanisms emerge through localized social networks,farmer co-operatives’activation,and cross-regional market expansion.The cluster’s impact is manifested in the shift from extensive to standard-ized and modernized production,diversified and flexible livelihood of farmers,and the integration of agriculture with industry and ser-vices.The development of the whole value chain based on agricultural cluster represents a critical pathway for achieving agricultural modernization,encompassing both internal and external value chain optimization.Through quality assurance systems,product diversi-fication strategies,operational efficiency improvements,and brand enhancement,these clusters amplify product value propositions and market competitiveness.This systemic approach facilitates supply-demand coordination,enables resource synergies,and optimizes eco-nomic returns across the horizontal and vertical value chain.This paper argues that agricultural clusters serve as strategic catalysts for sustainable rural development by reconstructing local production systems,fostering innovation ecosystems,and aligning agricultural modernization.It contributes to debates on rural vitalization by demonstrating how agricultural clustering can reconfigure rural areas as hubs of ecological modernization,rather than mere urban peripheries.
基金supported by“the Fundamental Research Funds for the Central Universities”(Grant No.CUCAI2511).
文摘Social bots are automated programs designed to spread rumors and misinformation,posing significant threats to online security.Existing research shows that the structure of a social network significantly affects the behavioral patterns of social bots:a higher number of connected components weakens their collaborative capabilities,thereby reducing their proportion within the overall network.However,current social bot detection methods still make limited use of topological features.Furthermore,both graph neural network(GNN)-based methods that rely on local features and those that leverage global features suffer from their own limitations,and existing studies lack an effective fusion of multi-scale information.To address these issues,this paper proposes a topology-aware multi-scale social bot detection method,which jointly learns local and global representations through a co-training mechanism.At the local level,topological features are effectively embedded into node representations,enhancing expressiveness while alleviating the over-smoothing problem in GNNs.At the global level,a clustering attention mechanism is introduced to learn global node representations,mitigating the over-globalization problem.Experimental results demonstrate that our method effectively overcomes the limitations of single-scale approaches.Our code is publicly available at https://anonymous.4open.science/r/TopoMSG-2C41/(accessed on 27 October 2025).
基金supported by the National Natural Science Foundation of China(Grant No.72364006).
文摘Objectives:SocialNetworkAddiction(SNA)is becoming increasingly prevalent among college students;however,there remains a lack of consensus regarding the measurement tools and their optimal cutoff score.This study aims to validate the 21-item SocialNetwork Addiction Scale-Chinese(SNAS-C)in its Chinese version and to determine its optimal cutoff score for identifying potential SNA cases within the college student population.Methods:A crosssectional survey was conducted,recruiting 3387 college students.Latent profile analysis(LPA)and receiver operating characteristic(ROC)curve analysis were employed to establish the optimal cutoff score for the validated 21-item SNAS-C.Results:Three profile models were selected based on multiple statistical criteria,classifying participants into low-risk,moderate-risk,and high-risk groups.The highest-risk group was defined as“positive”for SNA,while the remaining groups were considered“negative”,serving as the reference standard for ROC analysis.The optimal cutoff score was determined to be 72(sensitivity:98.2%,specificity:96.86%),with an overall classification accuracy of 97.0%.The“positive”group reported significantly higher frequency of social network usage,greater digitalmedia dependence scores,and a higher incidence of network addiction.Conclusion:This study identified the optimal cutoff score for the SNAS-C as≥72,demonstrating high sensitivity,specificity,and diagnostic accuracy.This threshold effectively distinguishes between high-risk and low-risk SNA.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP 1/53/42).www.kku.edu.sa.This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-Track Path of Research Funding Program。
文摘Cybersecurity encompasses various elements such as strategies,policies,processes,and techniques to accomplish availability,confidentiality,and integrity of resource processing,network,software,and data from attacks.In this scenario,the rising popularity of Online Social Networks(OSN)is under threat from spammers for which effective spam bot detection approaches should be developed.Earlier studies have developed different approaches for the detection of spam bots in OSN.But those techniques primarily concentrated on hand-crafted features to capture the features of malicious users while the application of Deep Learning(DL)models needs to be explored.With this motivation,the current research article proposes a Spam Bot Detection technique using Hybrid DL model abbreviated as SBDHDL.The proposed SBD-HDL technique focuses on the detection of spam bots that exist in OSNs.The technique has different stages of operations such as pre-processing,classification,and parameter optimization.Besides,SBD-HDL technique hybridizes Graph Convolutional Network(GCN)with Recurrent Neural Network(RNN)model for spam bot classification process.In order to enhance the detection performance of GCN-RNN model,hyperparameters are tuned using Lion Optimization Algorithm(LOA).Both hybridization of GCN-RNN and LOA-based hyperparameter tuning process make the current work,a first-of-its-kind in this domain.The experimental validation of the proposed SBD-HDL technique,conducted upon benchmark dataset,established the supremacy of the technique since it was validated under different measures.
基金supported by the National Nature Science Foundation of China(71771201,72531009,71973001)the USTC Research Funds of the Double First-Class Initiative(FSSF-A-240202).
文摘Social interaction with peer pressure is widely studied in social network analysis.Game theory can be utilized to model dynamic social interaction,and one class of game network models assumes that people’s decision payoff functions hinge on individual covariates and the choices of their friends.However,peer pressure would be misidentified and induce a non-negligible bias when incomplete covariates are involved in the game model.For this reason,we develop a generalized constant peer effects model based on homogeneity structure in dynamic social networks.The new model can effectively avoid bias through homogeneity pursuit and can be applied to a wider range of scenarios.To estimate peer pressure in the model,we first present two algorithms based on the initialize expand merge method and the polynomial-time twostage method to estimate homogeneity parameters.Then we apply the nested pseudo-likelihood method and obtain consistent estimators of peer pressure.Simulation evaluations show that our proposed methodology can achieve desirable and effective results in terms of the community misclassification rate and parameter estimation error.We also illustrate the advantages of our model in the empirical analysis when compared with a benchmark model.
文摘This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.
基金supported by the Natural Science Foundation of China(No.U22A2099)the Innovation Project of Guangxi Graduate Education(YCBZ2023130).
文摘Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate these attacks but are cumbersome, neglect dynamic protection of community structure, and lack precise utility measures. To address these challenges, we present a dynamic social network graph anonymity scheme with community structure protection (DSNGA-CSP), which achieves the dynamic anonymization process by incorporating community detection. First, DSNGA-CSP categorizes communities of the original graph into three types at each timestamp, and only partitions community subgraphs for a specific category at each updated timestamp. Then, DSNGA-CSP achieves intra-community and inter-community anonymization separately to retain more of the community structure of the original graph at each timestamp. It anonymizes community subgraphs by the proposed novel -composition method and anonymizes inter-community edges by edge isomorphism. Finally, a novel information loss metric is introduced in DSNGA-CSP to precisely capture the utility of the anonymized graph through original information preservation and anonymous information changes. Extensive experiments conducted on five real-world datasets demonstrate that DSNGA-CSP consistently outperforms existing methods, providing a more effective balance between privacy and utility. Specifically, DSNGA-CSP shows an average utility improvement of approximately 30% compared to TAKG and CTKGA for three dynamic graph datasets, according to the proposed information loss metric IL.
文摘Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall competitive strength.Consequently,China proposed a strategy for the integration of industrialization and informatization,optimizing and adjusting its industrial structure to swiftly achieve transformation and upgrading in the Industry 4.0 era,thereby enhancing the sophistication of intelligent industrial control systems.The distributed control system in a nuclear power plant functions as an industrial control system,overseeing the operational status of the physical process.Its ability to ensure safe and reliable operation is directly linked to nuclear safety and the cybersecurity of the facility.The management of network security in distributed control systems(DCS)is crucial for achieving this objective.Due to the varying network settings and parameters of the DCS implemented in each nuclear power plant,the network security status of the system sometimes diverges from expectations.During system operation,it will undoubtedly encounter network security issues.Consequently,nuclear power plants utilize the technical criteria outlined in GB/T 22239 to formulate a network security management program aimed at enhancing the operational security of DCS within these facilities.This study utilizes existing network security regulations and standards as a reference to analyze the network security control standards based on the nuclear power plant’s control system.It delineates the fundamental requirements for network security management,facilitating integration with the entire life cycle of the research,development,and application of the nuclear power plant’s distributed control system,thereby establishing a network security management methodology that satisfies the control requirements of the nuclear power plant.Initially,it presents DCS and network security management,outlines current domestic and international network security legislation and standards,and specifies the standards pertinent to the administration of DCS in nuclear power plants.Secondly,the design of network security management for DCS is executed in conjunction with the specific context of nuclear power plants.This encompasses the deployment of network security apparatus,validation of the network security management strategy,and optimization adjustments.Consequently,recommendations beneficial to the network security management of nuclear power plants are compiled,aimed at establishing a management system and incorporating the concept of full life cycle management,which is predicated on system requirements,system design,and both software and hardware considerations.Conversely,it presents the notion of comprehensive life cycle management and suggests network security management strategies encompassing system requirements,system architecture,detailed hardware and software design and implementation,procurement,internal system integration,system validation and acceptance testing,system installation,operational maintenance,system modifications,and decommissioning.We will consistently enhance the performance and functionality of DCS in nuclear power plants,establish a safe and secure operational environment,and thereby facilitate the implementation of DCS in nuclear facilities while ensuring robust network security in the future.
文摘The 5G-R network is on the verge of entering the construction stage.Given that the dedicated network for railways is closely linked to train operation safety,there are extremely high requirements for network security.As a result,there is an urgent need to conduct research on 5G-R network security.To comprehensively enhance the end-to-end security protection of the 5G-R network,this study summarized the security requirements of the GSM-R network,analyzed the security risks and requirements faced by the 5G-R network,and proposed an overall 5G-R network security architecture.The security technical schemes were detailed from various aspects:5G-R infrastructure security,terminal access security,networking security,operation and maintenance security,data security,and network boundary security.Additionally,the study proposed leveraging the 5G-R security situation awareness system to achieve a comprehensive upgrade from basic security technologies to endogenous security capabilities within the 5G-R system.
文摘The construction of“park cities”requires a systematic thinking to coordinate the networked development of park system and break through the limitation of emphasizing scale and grade and neglecting dynamic correlation in traditional planning.Taking Haidian District of Beijing as an example,the social network analysis method is introduced to construct the network model of park green spaces.Through indicators such as clustering coefficient,network density and node centrality,the characteristics of its spatial structure and hierarchical relationship are analyzed.It is found that the network integrity presents the characteristics of“highly local concentration and global fragmentation”,fragmented park green space network and missing spatial connection,isolated clusters and collaborative failure,as well as the spatial mismatch between population and resource supply and demand.Hierarchical issues include“structural imbalance and functional disorder”,disorder between network hierarchy and park level,misalignment of functional hierarchy leading to weakened network risk resistance capacity,and a relatively dense distribution of core nodes,etc.In response to the above problems,a multi-level spatial intervention strategy should be adopted to solve the overall problem of the network.Meanwhile,it is needed to clarify the positioning of a park itself and improve the hierarchical system,so as to construct a multi-level and multi-scale park green space network,contribute to the construction of a park city,and provide residents with more diverse activity venues.
基金“Research on Social Change and Network Society Planning in the Internet of Everything Era”(ID:21BSH005),a project under the National Social Science Fund of China
文摘The idea of a network society was introduced by Western sociologists at the end of the 20th century after in-depth research was conducted from perspectives such as informationalism.Influenced by these developments,the concept of constructing a network society also emerged in China.Over the past 30 years,China has made significant progress and achievements in constructing a network society,both in terms of its fundamental construction and social development.It is important that these advancements be summarized and reviewed.China’s network society construction can be divided into two relatively independent yet interconnected components,based on their focal points:its foundational infrastructure and its social development.These two components of China’s network society are managed by different departments.China has integrated the fundamental construction of its network society with the social development of its network society,thereby achieving unified planning,collaborative advancement,and coordinated development.This approach aims to harmonize two aspects:building China’s cyberspace strength and contributing to Chinese informatization,thereby advancing Chinese modernization.
基金Fundação de AmparoàPesquisa do Estado da Bahia(FAPESB),Coordenação de Aperfeiçoamento de Pessoal de Nível Superior(CAPES)Conselho Nacional de Desenvolvimento Científico e Tecnológico(CNPq)organizations for supporting the Graduate Program in Computer Science at the Federal University of Bahia.
文摘Intensely using online social networks(OSNs)makes users concerned about privacy of data.Given the centralized nature of these platforms,and since each platform has a particular storage mechanism,authentication,and access control,their users do not have the control and the right over their data.Therefore,users cannot easily switch between similar platforms or transfer data from one platform to another.These issues imply,among other things,a threat to privacy since such users depend on the interests of the service provider responsible for administering OSNs.As a strategy for the decentralization of the OSNs and,consequently,as a solution to the privacy problems in these environments,the so-called decentralized online social networks(DOSNs)have emerged.Unlike OSNs,DOSNs are decentralized content management platforms because they do not use centralized service providers.Although DOSNs address some of the privacy issues encountered in OSNs,DOSNs also pose significant challenges to consider,for example,access control to user profile information with high granularity.This work proposes developing an ontological model and a service to support privacy in DOSNs.The model describes the main concepts of privacy access control in DOSNs and their relationships.In addition,the service will consume the model to apply access control according to the policies represented in the model.Our model was evaluated in two phases to verify its compliance with the proposed domain.Finally,we evaluated our service with a performance evaluation,and the results were satisfactory concerning the response time of access control requests.
文摘BACKGROUND Depression is a common mental disorder among adolescents,characterized by a high rate of suicide and self-harm,which not only is devastating to families but also has a negative impact on society.Psychological factors such as impulsive personality,perceived chronic social adversity(PCSA),and sense of security are closely associated with suicide risk in adolescents with depression.Few studies have been conducted on the relationship between these factors.AIM To explore the impact of impulsive personality on suicide risk in adolescents with depression and the chain mediating effect between PCSA and sense of security.METHODS This study is a retrospective study.A total of 200 adolescents with depression who visited the Guangxi Zhuang Autonomous Region Maternal and Child Health Hospital from January 2021 to December 2023 comprised the study cohort.The PCSA scale,Security Questionnaire,Barratt Impulsiveness Scale,and Beck Scale for Suicide Ideation were used to evaluate depression.RESULTS Suicide risk was positively correlated with impulsive personality and PCSA(P<0.05),whereas sense of security was negatively correlated with suicide risk,impulsive personality,and PCSA(P<0.05).The total indirect effect of PCSA and sense of security on impulsive personality and suicide risk was 35.43%,with the mediating effect of PCSA and sense of security contributing 16.53%and 15.75%,respectively.PCSA and sense of security exhibited a chain mediating effect between impulsive personality and suicide risk,accounting for 3.15%.CONCLUSION The suicide risk of adolescents with depression is significantly associated with impulsive personality,PCSA,and sense of security.Impulsive personality affects the suicide risk of adolescents with depression both directly and indirectly,with the latter occurring via PCSA and sense of security.
文摘This study introduces an innovative hybrid approach that integrates deep learning with blockchain technology to improve cybersecurity,focusing on network intrusion detection systems(NIDS).The main goal is to overcome the shortcomings of conventional intrusion detection techniques by developing amore flexible and robust security architecture.We use seven unique machine learning models to improve detection skills,emphasizing data quality,traceability,and transparency,facilitated by a blockchain layer that safeguards against datamodification and ensures auditability.Our technique employs the Synthetic Minority Oversampling Technique(SMOTE)to equilibrate the dataset,therefore mitigating prevalent class imbalance difficulties in intrusion detection.The model selection procedure determined that Random Forest was the most successful model,with a notable detection accuracy of 97%.This substantially surpasses conventional methods and enhances the system’s capacity to identify both established and novel threats with exceptional accuracy.To optimize feature selection and maximize performance,we use Extreme Gradient Boosting(XGBoost),which improves the significance of chosen features while reducing the danger of overfitting.Our study indicates that the integrated use of machine learning for pattern identification,multi-factor authentication(MFA)for access security,and blockchain for data validation constitutes a thorough and sustainable cybersecurity solution.This architecture not only increases security but also lowers the need for regular human monitoring,significantly cutting energy consumption connected with cybersecurity infrastructure.The research finds that this integrated strategy provides a realistic road for increasing network security,addressing real-world cyber threats,and promoting eco-friendly practices in IT security.
基金supported by Yunnan High-tech Industry Development Project(Grant No.201606)Yunnan Provincial Major Science and Technology Special Plan Projects(Grant Nos.202103AA080015 and 202002AD080001-5)+1 种基金Yunnan Basic Research Project(Grant No.202001AS070014)Talents and Platform Program of Science and Technology of Yunnan(Grant No.202105AC160018)。
文摘With the rapid development of the internet,the dissemination of public opinion in online social networks has become increasingly complex.Existing dissemination models rarely consider group phenomena and the simultaneous spread of competing public opinion information in online social networks.This paper introduces the UHNPR information dissemination model to study the dynamic spread and interaction of positive and negative public opinion information in hypernetworks.To improve the accuracy of modeling of information dissemination,we revise the traditional assumptions of constant propagation and decay rates by redefining these rates based on factors that influence the spread of public opinion information.Subsequently,we validate the effectiveness of the UHNPR model using numerical simulations and analyze the impact of factors such as authority effect,user intimacy,information content and information timeliness on the spread of public opinion,providing corresponding suggestions for public opinion control.Our research results demonstrate that this model outperforms the SIR,SEIR and SEIDR models in describing public opinion propagation in real social networks.Compared with complex networks,information spreads faster and more extensively in hypernetworks.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.12305043 and 12165016)the Natural Science Foundation of Jiangsu Province(Grant No.BK20220511)+1 种基金the Project of Undergraduate Scientific Research(Grant No.22A684)the support from the Jiangsu Specially-Appointed Professor Program。
文摘Information spreading has been investigated for many years,but the mechanism of why the information explosively catches on overnight is still under debate.This explosive spreading phenomenon was usually considered driven separately by social reinforcement or higher-order interactions.However,due to the limitations of empirical data and theoretical analysis,how the higher-order network structure affects the explosive information spreading under the role of social reinforcement has not been fully explored.In this work,we propose an information-spreading model by considering the social reinforcement in real and synthetic higher-order networks,describable as hypergraphs.Depending on the average group size(hyperedge cardinality)and node membership(hyperdegree),we observe two different spreading behaviors:(i)The spreading progress is not sensitive to social reinforcement,resulting in the information localized in a small part of nodes;(ii)a strong social reinforcement will promote the large-scale spread of information and induce an explosive transition.Moreover,a large average group size and membership would be beneficial to the appearance of the explosive transition.Further,we display that the heterogeneity of the node membership and group size distributions benefit the information spreading.Finally,we extend the group-based approximate master equations to verify the simulation results.Our findings may help us to comprehend the rapidly information-spreading phenomenon in modern society.
文摘Cryptocurrency has gained popularity as a potential new global payment method.It has the potential to be faster,cheaper,and more secure than existing payment networks,making it a game-changer in the global economy.However,more research is needed to identify the factors driving cryptocurrency adoption and understand its impact.We use social network analysis(SNA)to identify the influencing factors and reveal the impact of each on cryptocurrency adoption.Our analysis initially revealed 44 influential factors,which were later reduced to 25 factors,each exerting a different influence.Based on the SNA,we classify these factors into highly,moderately,and least influential categories.Discomfort and optimism are the most influential determinants of adoption.Moderately influential factors include trust,risk,relative advantage,social influence,and perceived behavioral control.Price/value,facilitating conditions,compatibility,and usefulness are the least influential.The factors affecting cryptocurrency adoption are interdependent.Our findings can help policymakers understand the factors influencing cryptocurrency adoption and aid in developing appropriate legal frameworks for cryptocurrency use.