
With the development of Internet technology, social media has gradually become an important platform where users can express opinions about hot events. Research on the mechanism of public opinion evolution is beneficial to guide the trend of opinions, making users' opinions change in a positive direction or reach a consensus among controversial crowds. To design effective strategies for public opinion management, we propose a dynamic opinion network susceptible-forwarding-immune model considering environmental factors (NET-OE-SFI), which divides the forwarding nodes into two types: support and opposition based on the real data of users. The NET-OE-SFI model introduces environmental factors from infectious diseases into the study of network information transmission, which aims to explore the evolution law of users' opinions affected by the environment. We attempt to combine the complex media environmental factors in social networks with users' opinion information to study the influence of environmental factors on the evolution of public opinion. Data fitting of real information transmission data fully demonstrates the validity of this model. We have also made a variety of sensitivity analysis experiments to study the influence of model parameters, contributing to the design of reasonable and effective strategies for public opinion guidance.
Citation: Fulian Yin, Jinxia Wang, Xinyi Jiang, Yanjing Huang, Qianyi Yang, Jianhong Wu. Modeling and analyzing an opinion network dynamics considering the environmental factor[J]. Mathematical Biosciences and Engineering, 2023, 20(9): 16866-16885. doi: 10.3934/mbe.2023752
[1] | Jinbao Song, Xiaoya Zhu . Research on public opinion guidance of converging media based on AHP and transmission dynamics. Mathematical Biosciences and Engineering, 2021, 18(5): 6857-6886. doi: 10.3934/mbe.2021341 |
[2] | Elodie Yedomonhan, Chénangnon Frédéric Tovissodé, Romain Glèlè Kakaï . Modeling the effects of Prophylactic behaviors on the spread of SARS-CoV-2 in West Africa. Mathematical Biosciences and Engineering, 2023, 20(7): 12955-12989. doi: 10.3934/mbe.2023578 |
[3] | Fulian Yin, Xueying Shao, Jianhong Wu . Nearcasting forwarding behaviors and information propagation in Chinese Sina-Microblog. Mathematical Biosciences and Engineering, 2019, 16(5): 5380-5394. doi: 10.3934/mbe.2019268 |
[4] | Fulian Yin, Jiahui Lv, Xiaojian Zhang, Xinyu Xia, Jianhong Wu . COVID-19 information propagation dynamics in the Chinese Sina-microblog. Mathematical Biosciences and Engineering, 2020, 17(3): 2676-2692. doi: 10.3934/mbe.2020146 |
[5] | Xiaonan Chen, Suxia Zhang . An SEIR model for information propagation with a hot search effect in complex networks. Mathematical Biosciences and Engineering, 2023, 20(1): 1251-1273. doi: 10.3934/mbe.2023057 |
[6] | Bochuan Du, Pu Tian . Factorization in molecular modeling and belief propagation algorithms. Mathematical Biosciences and Engineering, 2023, 20(12): 21147-21162. doi: 10.3934/mbe.2023935 |
[7] | Qiao Xiang, Tianhong Huang, Qin Zhang, Yufeng Li, Amr Tolba, Isack Bulugu . A novel sentiment analysis method based on multi-scale deep learning. Mathematical Biosciences and Engineering, 2023, 20(5): 8766-8781. doi: 10.3934/mbe.2023385 |
[8] | Wei Hong, Yiting Gu, Linhai Wu, Xujin Pu . Impact of online public opinion regarding the Japanese nuclear wastewater incident on stock market based on the SOR model. Mathematical Biosciences and Engineering, 2023, 20(5): 9305-9326. doi: 10.3934/mbe.2023408 |
[9] | Wenjie Yang, Qianqian Zheng, Jianwei Shen, Linan Guan . Bifurcation and pattern dynamics in the nutrient-plankton network. Mathematical Biosciences and Engineering, 2023, 20(12): 21337-21358. doi: 10.3934/mbe.2023944 |
[10] | Yunyuan Gao, Zhen Cao, Jia Liu, Jianhai Zhang . A novel dynamic brain network in arousal for brain states and emotion analysis. Mathematical Biosciences and Engineering, 2021, 18(6): 7440-7463. doi: 10.3934/mbe.2021368 |
With the development of Internet technology, social media has gradually become an important platform where users can express opinions about hot events. Research on the mechanism of public opinion evolution is beneficial to guide the trend of opinions, making users' opinions change in a positive direction or reach a consensus among controversial crowds. To design effective strategies for public opinion management, we propose a dynamic opinion network susceptible-forwarding-immune model considering environmental factors (NET-OE-SFI), which divides the forwarding nodes into two types: support and opposition based on the real data of users. The NET-OE-SFI model introduces environmental factors from infectious diseases into the study of network information transmission, which aims to explore the evolution law of users' opinions affected by the environment. We attempt to combine the complex media environmental factors in social networks with users' opinion information to study the influence of environmental factors on the evolution of public opinion. Data fitting of real information transmission data fully demonstrates the validity of this model. We have also made a variety of sensitivity analysis experiments to study the influence of model parameters, contributing to the design of reasonable and effective strategies for public opinion guidance.
In [1], we distinguished the limit from the infinite sequence. In [2], we defined the Operator axioms to extend the traditional real number system. In [3], we promoted the research in the following areas:
1. We improved on the Operator axioms.
2. We defined the VE function and EV function. For clarity, we rename VE Function [3] to Prefix Function. For clarity, we rename EV Function [3] to Suffix Function.
3. We proved two theorems about the Prefix function and Suffix function.
The Operator axioms forms a new arithmetic axiom. The [3,Definition 2.2] defines real number system on the basis of the logical calculus {Φ,Ψ}. The [2,TABLE 2] defines new operators according to the definition of number systems. Real operators naturally produce new equations such as y=[x++++[1+1]], y=[[1+1]−−−−x], y=[x////[1+1]] and so on. In other words, real operators extend the traditional mathematical models which are selected to describe various scientific rules. Operator axioms have included infinite operators, so no other operator can be added to them. This means the Operator axioms is a complete real number system. In fact, infinite operators imply the completeness.
Thus, real operators exhibit potential value as follows:
1. Real operators can give new equations and inequalities so as to precisely describe the relation of mathematical objects.
2. Real operators can give new equations and inequalities so as to precisely describe the relation of scientific objects.
So real operators help to describe complex scientific rules which are difficult described by traditional equations and have an enormous application potential.
As to the equations including real operators, engineering computation often need the approximate solutions reflecting an intuitive order relation and equivalence relation. Although the order relation and equivalence relation of real numbers are consistent, they are not as intuitive as those of base-b expansions. In practice, it is quicker to determine the order relation and equivalence relation of base-b expansions. So we introduce numerical computations to approximate real numbers with base-b expansions.
The numerical computations we proposed are not the best methods to approximate real numbers with base-b expansions, but the simple methods to approximate real numbers with base-b expansions. The compution complexity of the numerical computations we proposed could be promoted furtherly. However, we first prove that the Operator axioms can run on any modern computer. The numerical computation we proposed blends mathematics and computer science. Modern science depends on both the mathematics and the computer science. Arithmetic is the core of both the mathematics and the science. As a senior arithmetic, the Operator axioms will promote both the mathematics and the science in the future.
Theorem 1.1. Any positive number ξ may be expressed as a limit of an infinite base-b expansion sequence
limn→∞A1A2⋯As+1. a1a2a3⋯an, | (1.1) |
where 0≤A1<b,0≤A2<b,⋯,0≤an<b, not all A and a are 0, and an infinity of the an are less than (b-1). If ξ≥1, then A1≥0.
Proof. Let [ξ] be the integral part of ξ. Then we write
ξ=[ξ]+x=X+x, | (1.2) |
where X is an integer and 0≤x<1, and consider X and x separately.
If X>0 and bs≤x<bs+1, and A1 and X1 are the quotient and remainder when X is divided by bs, then X=A1⋅bs+X1, where 0<A1=[b−sX]<b, 0≤X1<bs.
Similarly
X1=A2⋅bs−1+X2(0≤A2<b,0≤X2<bs−1),X2=A3⋅bs−2+X3(0≤A3<b,0≤X3<bs−2),⋯⋯⋯Xs−1=As⋅b+Xs(0≤As<b,0≤Xs<b),Xs=As+1(0≤As+1<b). |
Thus X may be expressed uniquely in the form
X=A1⋅bs+A2⋅bs−1+⋯+As⋅b+As+1, | (1.3) |
where every A is one of 0, 1, ⋯, (b-1), and A1 is not 0. We abbreviate this expression to
X=A1A2⋯AsAs+1, | (1.4) |
the ordinary representation of X in base-b expansion notation.
Passing to x, we write
X=f1(0≤f1<1). |
We suppose that a1=[bf1], so that
a1b≤f1<a1+1b; |
a1 is one of 0, 1, ⋯, (b-1), and
a1=[bf1],bf1=a1+f2(0≤f2<1). |
Similarly, we define a2,a3,⋯ by
a2=[bf2],bf2=a2+f3(0≤f3<1),a3=[bf3],bf3=a3+f4(0≤f4<1),⋯⋯⋯ |
Every an is one of 0, 1, ⋯, (b-1). Thus
x=xn+gn+1, | (1.5) |
where
xn=a1b+a2b2+⋯+anbn, | (1.6) |
0≤gn+1=fn+1bn<1bn. | (1.7) |
We thus define a base-b expansion .a1a2a3⋯an⋯ associated with x. We call a1,a2,⋯ the first, second, ⋯ digits of the base-b expansion.
Since an<b, the series
∞∑1anbn | (1.8) |
is convergent; and since gn+1→0, its sum is x. We may therefore write
x=. a1a2a3⋯, | (1.9) |
the right-hand side being an abbreviation for the series (1.8).
We now combine (1.2), (1.4), and (1.9) in the form
ξ=X+x=A1A2⋯AsAs+1. a1a2a3⋯; | (1.10) |
and the claim follows.
Theorem 1.1 implies that every real number has base-b expansions arbitrary close to it. So in numerical computations for the Operator axioms, all operands and outputs are denoted by base-b expansions to intuitively show the order relation and equivalence relation.
The paper is organized as follows. In Section 2, we define the operation order for all operations in the Operator axioms. In Section 3, we construct the numerical computations for binary operations. In Section 4, we define some concepts in the Operator axioms.
In the Operator axioms, the number '1' is the only base-b expansion while the others derive from the operation of two numbers and one operator. For example, the number "[[1+[1+1]]−−−−[1+1]]" derives from the operation of the number "[1+[1+1]]", the number "[1+1]" and the real operator "−−−−".
Definition 2.1. Numerical computation is a conversion from an operation to an approximate base-b expansion.
In general, an operation includes many binary operators. For example, the operation "[[1+[1+1]]−−−−[1+1]]" includes three "+" and one "−−−−". Since each operator produces a binary operation, n operator in an operation will produce n binary operations. It is better to compute all binary operations in an operation in order. The order is denoted as Operation Order.
[4,§5.3.1] stores tradition operations as an expression tree and then applies traversal algorithm to evaluate the expression tree. Likewise, each operation of the Operator axioms can be stored as an expression tree in which each number '1' become a leaf node and each operator become an internal node. Then Operation Order is just the traversal order of the expression tree. In this paper, we choose inorder traversal as Operation Order. Figure 1 illustrates an expression tree for the number "[[1+[1+1]]−−−−[1+1]]".
It is supposed that the numerical computation applies base-10 expansions. Then the numerical computation for "[[1+[1+1]]−−−−[1+1]]" will proceed with the following Operation Order:
[[1+[1+1]]−−[1+1]]=[[1+2]−−−−[1+1]]=[3−−−−[1+1]]=[3−−−−2] |
In summary, every operation in the Operator axioms can divide into many binary operations by Operation Order. So numerical computations focus on the binary operations.
In [3], Operator axioms have expressed the real number system. In this section, "real number" refer to the real number deduced from Operator axioms [3].
According to the complexity of numerical computations, we divide binary operations into low operations, middle operations and high operations. Table 1 lists their elements in detail.
Low operations | Middle operations | High operations | |
Operators | +,++,−,−−,/,// | +++,−−−,/// | ++++,+++++,⋯, |
−−−−,−−−−−,⋯, | |||
////,/////,⋯ |
In the Operator axioms, / is equal to − while // is equal to −−. From a traditional viewpoint, the low operations "+,++,−,−" are equal to basic arithmetic operations "+,×,−,÷". So numerical computations for low operations have been constructed in elementary arithmetic.
From a traditional viewpoint, +++ is an exponentiation operation, −−− is a root-extraction operation and /// is a logarithm operation. In this subsection, we import the numerical computations for the middle operations "+++,−−−,///" in [5,§23].
Let e be Euler's number. It is supposed that a∈(−∞,+∞) is a base-b expansion, n∈Z and k∈N. The numerical computation for [e+++a] can be constructed with the Taylor-series expansion as follows.
[e+++a]=[limk→+∞(k∑n=0[[a+++n]−−[n!]])]≈[1+[a−−[1!]]+[[a+++2]−−[2!]]+[[a+++3]−−[3!]]+⋯+[[a+++n]−−[n!]]+⋯] |
It is supposed that a∈(0,+∞) is a base-b expansion and n∈Z. Let b=[[a−1]−−[a+1]], then the numerical computation for [a///e] can be constructed with the Taylor-series expansion as follows.
[a///e]=[[[1+b]−−[1−b]]///e]=[2++[limk→+∞(k∑n=0[[b+++[2n+1]]−−[2n+1]])]]≈[2++[b+[[b+++3]−−3]+[[b+++5]−−5]+⋯+[[b+++[2n+1]]−−[2n+1]]+⋯]] |
It is supposed that a and b are two base-b expansions, where a∈(0,+∞) and b∈(−∞,+∞). Then the numerical computation for [a+++b] can be divided and conquered with the identity [a+++b]=[e+++[b++[a///e]]].
It is supposed that [a+++b] is a real number, where a∈(−∞,0] and b∈(−∞,+∞) are two base-b expansions. Then the numerical computation for [a+++b] can always be equated with the basic numerical computations as above and the basic arithmetic operations in the axioms (OA.1)∼(OA.75).
It is supposed that the constants n,a1,a2,b1,b2,c1,c2,m∈N.
Zero can be equated with a fraction [[1−1]−−1]. Any non-zero base-b expansion can be equated with a fraction [[1−1]±[a1−−a2]] for a1,a2∈N.
It is supposed that the constant d∈R with [1−1]<d. It is supposed that the constant e∈R with 1<e. For clarity, we rename VE Function [3] to Prefix Function. For clarity, we rename EV Function [3] to Suffix Function.
Definition 3.1. [3,Definition 3.1] Prefix Function is the function f:[1,+∞)→R defined by f(x)=[x+++˙ed].
Definition 3.2. [3,Definition 3.2] Suffix Function is the function f:R→R defined by f(x)=[e+++˙ex].
Definition 3.3. [3,Definition 3.3] Fundamental operator functions are Prefix Function and Suffix Function.
Theorem 3.4. [3,Theorem 3.4] The Prefix Function f(x)=[x+++˙ed] is continuous, unbounded and strictly increasing.
Theorem 3.5. [3,Theorem 3.5] The Suffix Function f(x)=[e+++˙ex] is continuous, unbounded and strictly increasing.
It is supposed that the constant t,u,v∈R.
Definition 3.6. Root Equations are the equations such as f(x)=t such that:
1. The function f(x) is real and continuous on any closed interval [u,v] in the domain;
2. The equation f(x)=t has only one root on the above interval [u,v];
[6,TABLE PT2.3] lists common root-finding methods and their convergence conditions. When a acts as the lower guess and b acts as the upper guess, both the bisection method [6,§5.2] and Brent's method [6,§6.4] always converge and find the only root on [u,v]. But Brent's method converges faster than the bisection method and thus acts as the main root-finding method for Root Equations.
In the following, we construct all numerical computations for high operations by induction. It is supposed that the constant p1∈R with 1≤p1. It is supposed that the constant p2∈R. It is supposed that the constant q1∈R with 1≤q1. It is supposed that the constant q2∈R with [1−1]≤q2. It is supposed that the constant r1∈R with [1−1]<r1. It is supposed that the constant r2∈R with 1<r2. In the following, we approximate these constants with those fractions such as [a1−−a2].
1. The numerical computations for the operations [p1++++p2], [q1−−−−q2], [r1////r2] are constructed.
(a) A numerical computation for [[a1−−a2]++++[b1−−b2]] with 1≤[a1−−a2] and [1−1]≤[b1−−b2] can be constructed.
i. [b1−−b2]≤1.
(A1)(ˉc=[[[a1−−a2]−1]++[1+[1+1]]])∧(ˉd=[[[a1−−a2]−1]++[1+1]])∧(ˉe=[[b1−−b2]+++[1+1]])∧(ˉf=[[b1−−b2]+++[1+[1+1]]])∧([[a1−−a2]++++[b1−−b2]]=[[1+[ˉc++[ˉe+++1]]]−[ˉd++[ˉf+++1]]])by (OA.83), (OA.28)(A2)(ˉc=[[[a1−−a2]−1]++[1+[1+1]]])∧(ˉd=[[[a1−−a2]−1]++[1+1]])∧(ˉe=[[b1−−b2]+++[1+1]])∧(ˉf=[[b1−−b2]+++[1+[1+1]]])∧([[a1−−a2]++++[b1−−b2]]=[[1+[ˉc++ˉe]]−[ˉd++ˉf]])by (OA.83), (OA.62) |
ii. 1<[b1−−b2].
(B1)[[a1−−a2]++++[b1−−b2]]=[[a1−−a2]+++[[a1−−a2]++++[[b1−−b2]−1]]]by (OA.82)(B2)It is supposed that [1−1]≤[[b1−−b2]−n] and [[b1−−b2]−n]≤1. Let us distinguish these [a1−−a2] with the subscripts {(1),(2),(3),⋯}.(B3)⇒[[a1−−a2]++++[b1−−b2]]=[[a1−−a2](1)+++[[a1−−a2](2)+++⋯[[a1−−a2]n+++[[a1−−a2]++++[[b1−−b2]−n]]⋯]]by (OA.82), (B2)(B4)(ˉc=[[[a1−−a2]−1]++[1+[1+1]]])∧(ˉd=[[[a1−−a2]−1]++[1+1]])∧(ˉe=[[[b1−−b2]−n]+++[1+1]])∧(ˉf=[[[b1−−b2]−n]+++[1+[1+1]]])∧([[a1−−a2]++++[[b1−−b2]−n]]=[[1+[ˉc++ˉe]]−[ˉd++ˉf]])by (B2), (A2)(B5)⇒(ˉc=[[[a1−−a2]−1]++[1+[1+1]]])∧(ˉd=[[[a1−−a2]−1]++[1+1]])∧(ˉe=[[[b1−−b2]−n]+++[1+1]])∧(ˉf=[[[b1−−b2]−n]+++[1+[1+1]]])∧([[a1−−a2]++++[b1−−b2]]=[[a1−−a2](1)+++[[a1−−a2](2)+++⋯[[a1−−a2]n+++[[1+[ˉc++ˉe]]−[ˉd++ˉf]]⋯]])by (B3), (B4) |
Then (A1)∼(A2) and (B1)∼(B4) have reduced one ++++ operation to many +++ operations. Since §3.3 has constructed the numerical computation for [[a1−−a2]++++[b1−−b2]], (A1)∼(A2) and (B1)∼(B4) can achieve a numerical computation for [[a1−−a2]++++[b1−−b2]].
(b) A numerical computation for [[a1−−a2]−−−−[b1−−b2]] with 1≤[a1−−a2] and [1−1]<[b1−−b2] can be constructed.
The numerical computation for [[a1−−a2]−−−−[b1−−b2]] is equated with the numerical root finding of the equation x=[[a1−−a2]−−−−[b1−−b2]].
(A1)x=[[a1−−a2]−−−−[b1−−b2]](A2)⇒[x++++[b1−−b2]]=[[[a1−−a2]−−−−[b1−−b2]]++++[b1−−b2]]by (OA.108)(A3)⇒[x++++[b1−−b2]]=[a1−−a2]by (OA.79), (OA.24), (OA.25) |
According to (OA.37)∼(OA.40), the function f(x)=[x++++[b1−−b2]] is defined on the domain [1,+∞). Theorem 3.4 implies that we can iteratively increase v by step 1 from v=1 until [a1−−a2]<[v++++[b1−−b2]] holds.
Theorem 3.4 implies that f(x)=[x++++[b1−−b2]] is continuous on the domain [1,v]. (OA.75) derives that [1++++[b1−−b2]]=1. So (OA.95) derives that [1++++[b1−−b2]]≤[a1−−a2]. In summary, both [1++++[b1−−b2]]≤[a1−−a2] and [a1−−a2]<[v++++[b1−−b2]] hold.
Then Intermediate Value Theorem derives that the equation [x++++[b1−−b2]]=[a1−−a2] has only one root on the domain [1,v]. Since Theorem 3.4 implies that the equation [x++++[b1−−b2]]=[a1−−a2] has no root on the domain (v,+∞), the equation [x++++[b1−−b2]]=[a1−−a2] has only one root on the domain [[1−1],+∞). Since the equation [x++++[b1−−b2]]=[a1−−a2] belongs to Root Equations, Brent's method can find the only root of the equation and constructs the numerical computation for [[a1−−a2]−−−−[b1−−b2]].
(c) A numerical computation for [[a1−−a2]////[b1−−b2]] with 1≤[a1−−a2] and with 1<[b1−−b2] can be constructed.
The numerical computation for [[a1−−a2]////[b1−−b2]] is equated with the numerical root finding of the equation x=[[a1−−a2]////[b1−−b2]].
(A1)x=[[a1−−a2]////[b1−−b2]](A2)[1−1]<[[a1−−a2]////[b1−−b2]]by (OA.33)(A3)⇒1<[[b1−−b2]++++[[a1−−a2]////[b1−−b2]]]by (OA.37), (OA.72)(A4)⇒([[b1−−b2]++++[[a1−−a2]////[b1−−b2]]])by (OA.90)(A5)⇒[[b1−−b2]++++x]=[[b1−−b2]++++[[a1−−a2]////[b1−−b2]]]by (OA.105)(A6)⇒[[b1−−b2]++++x]=[a1−−a2]by (OA.80), (OA.104) |
According to (OA.37)∼(OA.40) and (OA.73), the function f(x)=[[b1−−b2]++++x] is defined on the domain (−∞,+∞). Theorem 3.5 implies that we can iteratively decrease u by step 1 from u=1 until [[b1−−b2]++++u]<[a1−−a2] holds. Theorem 3.5 also implies that we can iteratively increase v by step 1 from v=1 until [a1−−a2]<[[b1−−b2]++++v] holds.
Theorem 3.5 implies that f(x)=[[b1−−b2]++++x] is continuous on the domain (−∞,+∞). In summary, both [[b1−−b2]++++u]<[a1−−a2] and [a1−−a2]<[[b1−−b2]++++v] hold.
Then Intermediate Value Theorem derives that the equation [[b1−−b2]++++x]=[a1−−a2] has only one root on the domain [u,v]. Since Theorem 3.5 implies that the equation [[b1−−b2]++++x]=[a1−−a2] has no root on the domains (−∞,u) and (v,+∞), the equation [[b1−−b2]++++x]=[a1−−a2] has only one root on the domain [u,v]. Since the equation [[b1−−b2]++++x]=[a1−−a2] belongs to Root Equations, Brent's method can find the only root of the equation and constructs the numerical computation for [[a1−−a2]////[b1−−b2]].
2. If the numerical computations for [p1+++˙ep2], [q1−−−˙fq2], [r1///˙gr2] have been constructed, then the numerical computations for [p1++++˙ep2], [q1−−−−˙fq2], [r1////˙gr2] can also be constructed.
According to (OA.19), the symbol 'e' represents some successive '+'—"+⋯+". According to (OA.20), the symbol 'f' represents some successive '−'—"−⋯−". According to (OA.21), the symbol 'g' represents some successive '/'—"/⋯/".
(a) A numerical computation for [[a1−−a2]++++˙e[b1−−b2]] with 1≤[a1−−a2] and [1−1]≤[b1−−b2] can be constructed.
i. [b1−−b2]≤1.
(A1)(ˉc=[[[a1−−a2]−1]++[1+[1+1]]])∧(ˉd=[[[a1−−a2]−1]++[1+1]])∧(ˉe=[[b1−−b2]+++[1+1]])∧(ˉf=[[b1−−b2]+++[1+[1+1]]])∧([[a1−−a2]++++˙h[b1−−b2]]=[[1+[ˉc++[ˉe+++[1+˙k]]]]−[ˉd++[ˉf+++[1+˙k]]]])by (OA.83), (OA.29) |
ii. 1<[b1−−b2].
(B1)[[a1−−a2]++++˙e[b1−−b2]]=[[a1−−a2]+++˙e[[a1−−a2]++++˙e[[b1−−b2]−1]]]by (OA.82)(B2)It is supposed that [1−1]≤[[b1−−b2]−n] and [[b1−−b2]−n]≤1. Let us distinguish these [a1−−a2] with the subscripts {(1),(2),(3),⋯}.(B3)⇒[[a1−−a2]++++˙e[b1−−b2]]=[[a1−−a2](1)+++˙e[[a1−−a2](2)+++˙e⋯[[a1−−a2]n+++˙e[[a1−−a2]++++˙e[[b1−−b2]−n]]⋯]]by (OA.82), (B2)(B4)(ˉc=[[[a1−−a2]−1]++[1+[1+1]]])∧(ˉd=[[[a1−−a2]−1]++[1+1]])∧(ˉe=[[[b1−−b2]−n]+++[1+1]])∧(ˉf=[[[b1−−b2]−n]+++[1+[1+1]]])∧([[a1−−a2]++++˙e[[b1−−b2]−n]]=[[1+[ˉc++ˉe]]−[ˉd++ˉf]])by (B3), (A1)(B5)⇒(ˉc=[[[a1−−a2]−1]++[1+[1+1]]])∧(ˉd=[[[a1−−a2]−1]++[1+1]])∧(ˉe=[[[b1−−b2]−n]+++[1+1]])∧(ˉf=[[[b1−−b2]−n]+++[1+[1+1]]])∧([[a1−−a2]++++˙e[b1−−b2]]=[[a1−−a2](1)+++˙e[[a1−−a2](2)+++˙e⋯[[a1−−a2]n+++˙e[[1+[ˉc++ˉe]]−[ˉd++ˉf]]⋯]])by (B3), (B4) |
Then (A1) and (B1)∼(B5) have reduced one ++++˙e operation to many +++˙e operations. Since the numerical computation for [[a1−−a2]+++˙e[b1−−b2]] has been supposed to be constructed, (A1) and (B1)∼(B5) can achieve a numerical computation for [[a1−−a2]++++˙e[b1−−b2]].
(b) A numerical computation for [[a1−−a2]−−−−˙f[b1−−b2]] with 1≤[a1−−a2] and [1−1]<[b1−−b2] can be constructed.
The numerical computation for [[a1−−a2]−−−−˙f[b1−−b2]] is equated with the numerical root finding of the equation x=[[a1−−a2]−−−−˙f[b1−−b2]].
(A1)x=[[a1−−a2]−−−−˙f[b1−−b2]](A2)⇒[x++++˙e[b1−−b2]]=[[[a1−−a2]−−−−i[b1−−b2]]++++h[b1−−b2]]by (OA.105)(A3)⇒[x++++˙e[b1−−b2]]=[a1−−a2]by (OA.78), (OA.24), (OA.25) |
According to (OA.37)∼(OA.40), the function f(x)=[x++++˙e[b1−−b2]] is defined on the domain [1,+∞). Theorem 3.4 implies that we can iteratively increase v by step 1 from v=1 until [a1−−a2]<[v++++˙e[b1−−b2]] holds.
Theorem 3.4 implies that f(x)=[x++++˙e[b1−−b2]] is continuous on the domain [1,v]. (OA.75) derives that [1++++˙e[b1−−b2]]=1. So (OA.95) derives that [1++++˙e[b1−−b2]]≤[a1−−a2]. In summary, both [1++++˙e[b1−−b2]]≤[a1−−a2] and [a1−−a2]<[v++++˙e[b1−−b2]] hold.
Then Intermediate Value Theorem derives that the equation [x++++˙e[b1−−b2]]=[a1−−a2] has only one root on the domain [1,v]. Since Theorem 3.4 implies that the equation [x++++˙e[b1−−b2]]=[a1−−a2] has no root on the domain (v,+∞), the equation [x++++˙e[b1−−b2]]=[a1−−a2] has only one root on the domain [[1−1],+∞). Since the equation [x++++˙e[b1−−b2]]=[a1−−a2] belongs to Root Equations, Brent's method can find the only root of the equation and constructs the numerical computation for [[a1−−a2]−−−−˙f[b1−−b2]].
(c) A numerical computation for [[a1−−a2]////˙g[b1−−b2]] with 1≤[a1−−a2] and with 1<[b1−−b2] can be constructed.
The numerical computation for [[a1−−a2]////˙g[b1−−b2]] is equated with the numerical root finding of the equation x=[[a1−−a2]////˙g[b1−−b2]].
(A1)x=[[a1−−a2]////˙g[b1−−b2]](A2)[1−1]<[[a1−−a2]////˙g[b1−−b2]]by (OA.33)(A3)⇒1<[[b1−−b2]++++h[[a1−−a2]////j[b1−−b2]]]by (OA.37), (OA.72)(A4)⇒([[b1−−b2]++++h[[a1−−a2]////j[b1−−b2]]])by (OA.90)(A5)⇒[[b1−−b2]++++˙ex]=[[b1−−b2]++++h[[a1−−a2]////j[b1−−b2]]]by (OA.105)(A6)⇒[[b1−−b2]++++˙ex]=[a1−−a2]by (OA.80), (OA.104) |
According to (OA.37)∼(OA.40) and (OA.73), the function f(x)=[[b1−−b2]++++˙ex] is defined on the domain (−∞,+∞). Theorem 3.5 implies that we can iteratively decrease u by step 1 from u=1 until [[b1−−b2]++++˙eu]<[a1−−a2] holds. Theorem 3.5 also implies that we can iteratively increase v by step 1 from v=1 until [a1−−a2]<[[b1−−b2]++++˙ev] holds.
Theorem 3.5 implies that f(x)=[[b1−−b2]++++˙ex] is continuous on the domain (−∞,+∞). In summary, both [[b1−−b2]++++˙eu]<[a1−−a2] and [a1−−a2]<[[b1−−b2]++++˙ev] hold.
Then Intermediate Value Theorem derives that the equation [[b1−−b2]++++˙ex]=[a1−−a2] has only one root on the domain [u,v]. Since Theorem 3.5 implies that the equation [[b1−−b2]++++˙ex]=[a1−−a2] has no root on the domains (−∞,u) and (v,+∞), the equation [[b1−−b2]++++˙ex]=[a1−−a2] has only one root on the domain [u,v]. Since the equation [[b1−−b2]++++˙ex]=[a1−−a2] belongs to Root Equations, Brent's method can find the only root of the equation and constructs the numerical computation for [[a1−−a2]////˙g[b1−−b2]].
3. By induction, the numerical computations for [p1+++++p2], [p1++++++p2], [p1+++++++p2], ⋯, [q1−−−−−q2], [q1−−−−−−q2], [q1−−−−−−−q2], ⋯, [r1/////r2], [r1//////r2], [r1///////r2], ⋯ can all be constructed.
We define some replacements for the notations of the Operator axioms, as is shown in Table 2.
Replacement | Notation in Operator axioms |
+′ | ˙e |
−′ | ˙f |
/′ | ˙j |
+′1 | + |
+′2 | ++ |
+′3 | +++ |
+′n | ++⋯+⏟n |
−′1 | − |
−′2 | −− |
−′3 | −−− |
−′n | −−⋯−⏟n |
/′1 | / |
/′2 | // |
/′3 | /// |
/′n | //⋯/⏟n |
The notation +′ can be replaced by any element of the set {+,++,+++,++++,⋯}. The notation −′ can be replaced by any element of the set {−,−−,−−−,−−−−,⋯}. The notation /′ can be replaced by any element of the set {/,//,///,////,⋯}.
We define the pronunciations for some expressions in the Operator axioms, as is shown in Table 3.
Expression | Pronunciation |
+′ | addote |
−′ | subote |
/′ | logote |
a+′nb | a addote n to b |
a−′nb | a subote n to b |
a/′nb | a logote n to b |
We divide the real operators into an ordered level with the natural numbers. Table 4 lists the levels of the real operators in detail.
Level | Operators |
1 | +′1,−′1,/′1 |
2 | +′2,−′2,/′2 |
3 | +′3,−′3,/′3 |
⋯ | ⋯ |
n | +′n,−′n,/′n |
The order of real operators is listed as follows:
level-1 < level-2 < level-3 <⋯ < level-n
We define the operations of real operators as follows.
Definition 4.1. Complete Operations are all the binary operations of real operators.
According to the Definition 4.1, all operations such as a+′nb, a−′nb, a/′nb compose the complete operations.
The author declares no conflict of interest.
[1] |
S. Galam, Modelling rumors: the no plane Pentagon French hoax case, Physica A, 320 (2003), 571–580. https://doi.org/10.1016/S0378-4371(02)01582-0 doi: 10.1016/S0378-4371(02)01582-0
![]() |
[2] |
J. Zhou, Z. Liu, B. Li, Influence of network structure on rumor propagation, Phys. Lett. A, 368 (2007), 458–463. https://doi.org/10.1016/j.physleta.2007.01.094 doi: 10.1016/j.physleta.2007.01.094
![]() |
[3] |
B. Zhang, X. Guan, M. J. Khan, Y. Zhou, A time-varying propagation model of hot topic on BBS sites and Blog networks, Inf. Sci., 187 (2012), 15–32. https://doi.org/10.1016/j.ins.2011.09.025 doi: 10.1016/j.ins.2011.09.025
![]() |
[4] |
M. E. J. Newman, Fast algorithm for detecting community structure in networks, Phys. Rev. E, 69 (2004), 066133. https://doi.org/10.1103/PhysRevE.69.066133 doi: 10.1103/PhysRevE.69.066133
![]() |
[5] | A. Mislove, H. S. Koppula, K. P. Gummadi, P. Druschel, B. Bhattacharjee, Growth of the flickr social network, in Proceedings of the First Workshop on Online Social Networks, (2008), 25–30. https://doi.org/10.1145/1397735.1397742 |
[6] | Y. Bao, C. Yi, Y. Xue, Y. Dong, Precise modeling rumor propagation and control strategy on social networks, in Applications of Social Media and Social Network Analysis, (2015), 77–102. https://doi.org/10.1007/978-3-319-19003-7_5 |
[7] |
J. Yi, P. Liu, X. Tang, W. Liu, Improved SIR advertising spreading model and its effectiveness in social network, Procedia Comput. Sci., 129 (2018), 215–218. https://doi.org/10.1016/j.procs.2018.03.044 doi: 10.1016/j.procs.2018.03.044
![]() |
[8] |
N. Liu, H. An, X. Gao, H. Li, X. Hao, Breaking news dissemination in the media via propagation behavior based on complex network theory, Physica A, 453 (2016), 44–54. https://doi.org/10.1016/j.physa.2016.02.046 doi: 10.1016/j.physa.2016.02.046
![]() |
[9] |
L. Yang, Z. Li, A. Giua, Containment of rumor spread in complex social networks, Inf. Sci., 506 (2020), 113–130. https://doi.org/10.1016/j.ins.2019.07.055 doi: 10.1016/j.ins.2019.07.055
![]() |
[10] |
X. Liu, D. He, Nonlinear dynamic information propagation mathematic modeling and analysis based on microblog social network, Social Network Anal. Min., 10 (2020), 1–12. https://doi.org/10.1007/s13278-020-00700-4 doi: 10.1007/s13278-020-00700-4
![]() |
[11] |
S. Ai, S. Hong, X. Zheng, Y. Wang, X. Liu, CSRT rumor spreading model based on complex network, Int. J. Intell. Syst., 36 (2021), 1903–1913. https://doi.org/10.1002/int.22365 doi: 10.1002/int.22365
![]() |
[12] |
R. Sun, W. B. Luo, Rumor propagation model for complex network with non-uniform propagation rates, Appl. Mech. Mater., 596 (2014), 868–872. https://doi.org/10.4028/www.scientific.net/AMM.596.868 doi: 10.4028/www.scientific.net/AMM.596.868
![]() |
[13] |
A. Singh, Y. N. Singh, Rumor dynamics in weighted scale-free networks with degree correlations, J. Complex Networks, 3 (2015), 450–468. https://doi.org/10.1093/comnet/cnu047 doi: 10.1093/comnet/cnu047
![]() |
[14] |
F. Nian, K. Gao, Evolution of node impact based on secondary propagation, Mod. Phys. Lett. B, 34 (2020), 2050027. https://doi.org/10.1142/S021798492050027X doi: 10.1142/S021798492050027X
![]() |
[15] |
M. Zhang, S. Qin, X. Zhu, Information diffusion under public crisis in BA scale-free network based on SEIR model-Taking COVID-19 as an example, Physica A, 571 (2021), 125848. https://doi.org/10.1016/j.physa.2021.125848 doi: 10.1016/j.physa.2021.125848
![]() |
[16] |
Z, Dang, L. Li, H. Peng, J. Zhang, The behavior propagation and confrontation competition model based on information energy, Int. J. Mod. Phys. B, 35 (2021), 2150281. https://doi.org/10.1142/S0217979221502817 doi: 10.1142/S0217979221502817
![]() |
[17] |
H. Wang, J. M. Moore, M. Small, J. Wang, H. Yang, C. Gu, Epidemic dynamics on higher-dimensional small world networks, Appl. Math. Comput., 421 (2022), 126911. https://doi.org/10.1016/j.amc.2021.126911 doi: 10.1016/j.amc.2021.126911
![]() |
[18] |
K. Sznajd-Weron, J. Sznajd, Opinion evolution in closed community, Int. J. Mod. Phys. C, 11 (2000), 1157–1165. https://doi.org/10.1142/S0129183100000936 doi: 10.1142/S0129183100000936
![]() |
[19] |
S. Galam, Minority opinion spreading in random geometry, Eur. Phys. J. B, 25 (2002), 403–406. https://doi.org/10.1140/epjb/e20020045 doi: 10.1140/epjb/e20020045
![]() |
[20] |
G. Deffuant, D. Neau, F. Amblard, G. Weisbuch, Mixing beliefs among interacting agents, Adv. Complex Syst., 3 (2000), 87–98. https://doi.org/10.1142/S0219525900000078 doi: 10.1142/S0219525900000078
![]() |
[21] | R. Hegselmann, U. Krause, Opinion dynamics and bounded confidence models, analysis and simulation, J. Artif. Soc. Social Simul., 5 (2002), 1–2. |
[22] |
H. Zhu, Y. Kong, J. Wei, J. Ma, Effect of users' opinion evolution on information diffusion in online social networks, Physica A, 492 (2018), 2034–2045. https://doi.org/10.1016/j.physa.2017.11.121 doi: 10.1016/j.physa.2017.11.121
![]() |
[23] |
Q. Li, Y. J. Du, Z. Y. Li, J. R. Hu, R. L. Hu, B. Y. Lv, et al., HK-SEIR model of public opinion evolution based on communication factors, Eng. Appl. Artif. Intell., 100 (2021), 104192. https://doi.org/10.1016/j.engappai.2021.104192 doi: 10.1016/j.engappai.2021.104192
![]() |
[24] |
D. Liang, B. Yi, Z. Xu, Opinion dynamics based on infectious disease transmission model in the non-connected context of Pythagorean fuzzy trust relationship, J. Oper. Res. Soc., 72 (2021), 2783–2803. https://doi.org/10.1080/01605682.2020.1821585 doi: 10.1080/01605682.2020.1821585
![]() |
[25] |
C. Wang, Dynamics of conflicting opinions considering rationality, Physica A, 560 (2020), 125160. https://doi.org/10.1016/j.physa.2020.125160 doi: 10.1016/j.physa.2020.125160
![]() |
[26] |
K. Mitsutsuji, S. Yamakage, The dual attitudinal dynamics of public opinion: an agent-based reformulation of LF Richardson's war-moods model, Qual. Quant., 54 (2020), 439–461. https://doi.org/10.1007/s11135-019-00938-x doi: 10.1007/s11135-019-00938-x
![]() |
[27] |
S. Chen, D. H. Glass, M. McCartney, Characteristics of successful opinion leaders in a bounded confidence model, Physica A, 449 (2016), 426–436. https://doi.org/10.1016/j.physa.2015.12.107 doi: 10.1016/j.physa.2015.12.107
![]() |
[28] |
Y. Zhao, G. Kou, Y. Peng, Y. Chen, Understanding influence power of opinion leaders in e-commerce networks: An opinion dynamics theory perspective, Inf. Sci., 426 (2018), 131–147. https://doi.org/10.1016/j.ins.2017.10.031 doi: 10.1016/j.ins.2017.10.031
![]() |
[29] |
Z. Feng, J. Velasco-Hernandez, B. Tapia-Santos, A mathematical model for coupling within-host and between-host dynamics in an environmentally-driven infectious disease, Math. Biosci., 241 (2013), 49–55. https://doi.org/10.1016/j.mbs.2012.09.004 doi: 10.1016/j.mbs.2012.09.004
![]() |
[30] |
A. Meiksin, Dynamics of COVID-19 transmission including indirect transmission mechanisms: a mathematical analysis, Epidemiol. Infect., 148 (2020), e257. https://doi.org/10.1017/S0950268820002563 doi: 10.1017/S0950268820002563
![]() |
[31] |
R. I. Joh, H. Wang, H. Weiss, J. S. Weitz, Dynamics of indirectly transmitted infectious diseases with immunological threshold, Bull. Math. Biol., 71 (2009), 845–862. https://doi.org/10.1007/s11538-008-9384-4 doi: 10.1007/s11538-008-9384-4
![]() |
[32] |
Z. Shuai, P. Van den Driessche, Global dynamics of cholera models with differential infectivity, Math. Biosci., 234 (2011), 118–126. https://doi.org/10.1016/j.mbs.2011.09.003 doi: 10.1016/j.mbs.2011.09.003
![]() |
[33] |
S. Liao, J. Wang, Global stability analysis of epidemiological models based on Volterra–Lyapunov stable matrices, Chaos, Solitons Fractals, 45 (2012), 966–977. https://doi.org/10.1016/j.chaos.2012.03.009 doi: 10.1016/j.chaos.2012.03.009
![]() |
[34] |
J. F. David, S. A. Iyaniwura, M. J. Ward, F. Brauer, A novel approach to modelling the spatial spread of airborne diseases: an epidemic model with indirect transmission, Math. Biosci. Eng., 17 (2020), 3294–3328. https://doi.org/10.3934/mbe.2020188 doi: 10.3934/mbe.2020188
![]() |
[35] |
F. Yin, X. Shao, J. Wu, Nearcasting forwarding behaviors and information propagation in Chinese Sina-Microblog, Math. Biosci. Eng., 16 (2019), 5380–5394. https://doi.org/10.3934/mbe.2019268 doi: 10.3934/mbe.2019268
![]() |
1. | Jakob Schneider, Ksenia Korshunova, Zeineb Si Chaib, Alejandro Giorgetti, Mercedes Alfonso-Prieto, Paolo Carloni, Ligand Pose Predictions for Human G Protein-Coupled Receptors: Insights from the Amber-Based Hybrid Molecular Mechanics/Coarse-Grained Approach, 2020, 60, 1549-9596, 5103, 10.1021/acs.jcim.0c00661 | |
2. | Stefano Capaldi, Eda Suku, Martina Antolini, Mattia Di Giacobbe, Alejandro Giorgetti, Mario Buffelli, Allosteric sodium binding cavity in GPR3: a novel player in modulation of Aβ production, 2018, 8, 2045-2322, 10.1038/s41598-018-29475-7 | |
3. | Jinan Wang, Yinglong Miao, 2019, 116, 9780128155615, 397, 10.1016/bs.apcsb.2018.11.011 | |
4. | Filippo Baldessari, Riccardo Capelli, Paolo Carloni, Alejandro Giorgetti, Coevolutionary data-based interaction networks approach highlighting key residues across protein families: The case of the G-protein coupled receptors, 2020, 18, 20010370, 1153, 10.1016/j.csbj.2020.05.003 |
Low operations | Middle operations | High operations | |
Operators | +,++,−,−−,/,// | +++,−−−,/// | ++++,+++++,⋯, |
−−−−,−−−−−,⋯, | |||
////,/////,⋯ |
Replacement | Notation in Operator axioms |
+′ | ˙e |
−′ | ˙f |
/′ | ˙j |
+′1 | + |
+′2 | ++ |
+′3 | +++ |
+′n | ++⋯+⏟n |
−′1 | − |
−′2 | −− |
−′3 | −−− |
−′n | −−⋯−⏟n |
/′1 | / |
/′2 | // |
/′3 | /// |
/′n | //⋯/⏟n |
Expression | Pronunciation |
+′ | addote |
−′ | subote |
/′ | logote |
a+′nb | a addote n to b |
a−′nb | a subote n to b |
a/′nb | a logote n to b |
Level | Operators |
1 | +′1,−′1,/′1 |
2 | +′2,−′2,/′2 |
3 | +′3,−′3,/′3 |
⋯ | ⋯ |
n | +′n,−′n,/′n |
Low operations | Middle operations | High operations | |
Operators | +,++,−,−−,/,// | +++,−−−,/// | ++++,+++++,⋯, |
−−−−,−−−−−,⋯, | |||
////,/////,⋯ |
Replacement | Notation in Operator axioms |
+′ | ˙e |
−′ | ˙f |
/′ | ˙j |
+′1 | + |
+′2 | ++ |
+′3 | +++ |
+′n | ++⋯+⏟n |
−′1 | − |
−′2 | −− |
−′3 | −−− |
−′n | −−⋯−⏟n |
/′1 | / |
/′2 | // |
/′3 | /// |
/′n | //⋯/⏟n |
Expression | Pronunciation |
+′ | addote |
−′ | subote |
/′ | logote |
a+′nb | a addote n to b |
a−′nb | a subote n to b |
a/′nb | a logote n to b |
Level | Operators |
1 | +′1,−′1,/′1 |
2 | +′2,−′2,/′2 |
3 | +′3,−′3,/′3 |
⋯ | ⋯ |
n | +′n,−′n,/′n |