
A significant distinction between the COVID-19 pandemic and previous pandemics is the significant role of social media platforms in shaping public adherence to non-pharmaceutical interventions and vaccine acceptance. However, with the recurrence of the epidemic, the conflict between epidemic prevention and production recovery has become increasingly prominent on social media. To help design effective communication strategies to guide public opinion, we propose a susceptible-forwarding-immune pseudo-environment (SFI-PE) dynamic model for understanding the environment with direct and indirect propagation behaviors. Then, we introduce a system with external interventions for direct and indirect propagation behaviors, termed the macro-controlled SFI-PE (M-SFI-PE) model. Based on the numerical analyses that were performed using actual data from the Chinese Sina microblogging platform, the data fitting results prove our models' effectiveness. The research grasps the law of the new information propagation paradigm, and our work bridges the gap between reality and theory in information interventions.
Citation: Fulian Yin, Xinyi Tang, Tongyu Liang, Yanjing Huang, Jianhong Wu. External intervention model with direct and indirect propagation behaviors on social media platforms[J]. Mathematical Biosciences and Engineering, 2022, 19(11): 11380-11398. doi: 10.3934/mbe.2022530
[1] | Syeda Nadiah Fatima Nahri, Shengzhi Du, Barend J. van Wyk, Oluwaseun Kayode Ajayi . A comparative study on time-delay estimation for time-delay nonlinear system control. AIMS Electronics and Electrical Engineering, 2025, 9(3): 314-338. doi: 10.3934/electreng.2025015 |
[2] | José M. Campos-Salazar, Pablo Lecaros, Rodrigo Sandoval-García . Dynamic analysis and comparison of the performance of linear and nonlinear controllers applied to a nonlinear non-interactive and interactive process. AIMS Electronics and Electrical Engineering, 2024, 8(4): 441-465. doi: 10.3934/electreng.2024021 |
[3] | José M. Campos-Salazar, Roya Rafiezadeh, Felipe Santander, Juan L. Aguayo-Lazcano, Nicolás Kunakov . Comprehensive GSSA and D-Q frame dynamic modeling of dual-active-bridge DC-DC converters. AIMS Electronics and Electrical Engineering, 2025, 9(3): 288-313. doi: 10.3934/electreng.2025014 |
[4] | Jun Yoneyama . H∞ disturbance attenuation of nonlinear networked control systems via Takagi-Sugeno fuzzy model. AIMS Electronics and Electrical Engineering, 2019, 3(3): 257-273. doi: 10.3934/ElectrEng.2019.3.257 |
[5] | Thanh Tung Pham, Chi-Ngon Nguyen . Adaptive PID sliding mode control based on new Quasi-sliding mode and radial basis function neural network for Omni-directional mobile robot. AIMS Electronics and Electrical Engineering, 2023, 7(2): 121-134. doi: 10.3934/electreng.2023007 |
[6] | José M. Campos-Salazar, Juan L. Aguayo-Lazcano, Roya Rafiezadeh . Non-ideal two-level battery charger—modeling and simulation. AIMS Electronics and Electrical Engineering, 2025, 9(1): 60-80. doi: 10.3934/electreng.2025004 |
[7] | Qichun Zhang, Xuewu Dai . Special Issue "Uncertainties in large-scale networked control systems". AIMS Electronics and Electrical Engineering, 2020, 4(4): 345-346. doi: 10.3934/ElectrEng.2020.4.345 |
[8] | Yanming Wu, Zelun Wang, Guanglei Meng, Jinguo Liu . Neural networks-based event-triggered consensus control for nonlinear multiagent systems with communication link faults and DoS attacks. AIMS Electronics and Electrical Engineering, 2024, 8(3): 332-349. doi: 10.3934/electreng.2024015 |
[9] | Rasool M. Imran, Kadhim Hamzah Chalok, Siraj A. M. Nasrallah . Innovative two-stage thermal control of DC-DC converter for hybrid PV-battery system. AIMS Electronics and Electrical Engineering, 2025, 9(1): 26-45. doi: 10.3934/electreng.2025002 |
[10] | Qichun Zhang . Performance enhanced Kalman filter design for non-Gaussian stochastic systems with data-based minimum entropy optimisation. AIMS Electronics and Electrical Engineering, 2019, 3(4): 382-396. doi: 10.3934/ElectrEng.2019.4.382 |
A significant distinction between the COVID-19 pandemic and previous pandemics is the significant role of social media platforms in shaping public adherence to non-pharmaceutical interventions and vaccine acceptance. However, with the recurrence of the epidemic, the conflict between epidemic prevention and production recovery has become increasingly prominent on social media. To help design effective communication strategies to guide public opinion, we propose a susceptible-forwarding-immune pseudo-environment (SFI-PE) dynamic model for understanding the environment with direct and indirect propagation behaviors. Then, we introduce a system with external interventions for direct and indirect propagation behaviors, termed the macro-controlled SFI-PE (M-SFI-PE) model. Based on the numerical analyses that were performed using actual data from the Chinese Sina microblogging platform, the data fitting results prove our models' effectiveness. The research grasps the law of the new information propagation paradigm, and our work bridges the gap between reality and theory in information interventions.
This work is motivated by the networked control system (NCS) or remote control system where the media that connects the controller and actuator causes random packet delays or dropouts. This type of control systems are anticipated to have vast applications. The readers are referred to the review paper [1]. The common features of NCS are random packet delays or dropouts, competition of multiple nodes in the network, data quantization, etc., and this makes the modeling and stability analysis very challenging. Markovian type regime switching models have been proved to be very successful in modeling NCS [2,3]. However, the stability of such systems still remains a challenge. Most stability criteria are given as complicated LMI conditions [4,5] via Lyapunov function approach, or dwell time [6], or delay Riccati equations [7]. A stability condition using hybrid system analysis is found in [8], which is again a sufficient condition and is not easy to verify. A neat sufficient and necessary condition is in great need.
In order to overcome the constraints of NCS, such as random packet delays or dropouts, it is a natural idea to estimate system state and compensate for packet disorders [9]. One believes that in this way better system performance and better system stability can be achieved. Predictive control has been effectively applied to NCS [10,11,12,13]. This control method generates a sequence of future control variables, which can be used to compensate for packet disorder or dropouts [14], and to estimate unknown system state as well [15,16]. However, as mentioned earlier, the stability conditions are usually hard to verify. To analyze the stability issue, one must have a thorough understanding of the dynamics of NCS with random time delays and state estimate.
In this paper we propose a predictive control method of NCS with random packet delays and state estimate/compensation, and clearly show the structure of this system. This control method has much less computational burden compared to classical predictive control method. Then the system is modeled as a regime switching system, and an upper bound on the number of regimes is provided. By the word ``scale'' we mean the number of distinct regimes (denoted by
Throughout this paper we use
Unlike most NCSs where the objective systems on the actuator side are time invariant, here we assume that the objective system is a regime switching system with Markovian jumps, and we call it a Markov Jump System (MJS). The application of switching systems in engineering can be found, for example, in [17,18,19]. We let
We begin with simple and practically reasonable assumptions on this system.
● The actuator receives signals with random delays.
The actuator receives control signals from the controller and performs the required actions. Due to the random packet delays, the actuator might receive no signal, or receive a packet that is randomly delayed, or receive multiple packets. If more than one packet arrive at the same time, the actuator executes the most recent one.
● Obsolete signals are discarded.
If, at a certain time instant, a control variable has been applied, then any control signal older than it but arrives at later times will be discarded. For example, if
● The delay times are bounded.
The backward time delay
● The controller sends out signals at every discrete instant.
The controller receives state feedback from the actuator via randomly delayed packets, and the controller estimates the future system state and sends out a new control signal. If no state feedback is received at a certain time instant, the controller simply sends a zero control signal.
● Past control signals are recorded.
The controller keeps a record of past control signals that have been sent. This information is used to calculate a new control signal whenever a feedback packet arrives.
● Packet size is limited.
The network bandwidth is very limited so that each time the controller and actuator just send out one small packet to the other party. That means, sending out a large packet containing a long sequence of controls or system states is not applicable. (Otherwise this system reduces to classical control system without time delay.)
The controlled system on the actuator side becomes
xk+1=a(ik)xk+b(j)(ik)uk−τ2, | (1.1) |
where
The NCS is a special dynamical system that might be easy to describe in words, but is hard to understand because its dynamics looks chaotic. One must get down to the bottom and have a careful dissemination to obtain a clear understanding. In what follows we shall do this work.
We use the triplet
If no control signal arrives at time
The expression
We use a similar mechanism to represent the situation at the controller side. The pair
Notice that the received information depends on the sequence of the past states
Proposition 2.1. An upper bound on the number of different regimes of this problem (denoted by
m2+T1⋅(1+T2)2+T1⋅(2+T2)/2⋅(1+T1)⋅(2+T1)/2 | (2.1) |
Proof. On the controller side we consider the pair
Similarly, on the actuator side, any pair
Due to the feedback delay, a sequence with length
The controller then calculates and sends out a new control variable
However, recall that not all the transitions
m⋅(1+T2)⋅(2+T2)/2⋅[m⋅(1+T2)]1+T1=m2+T1⋅(1+T2)2+T1⋅(2+T2)/2. |
Now the proof is complete.
It is clear that to represent the complete system scenario, we need
In each scenario in
zk=[xk(ik),xk−1(ik−1),...,xk−T1(ik−T1),uk−1,uk−2,...,uk−T1−T2]T, | (3.1) |
where the superscript
zk+1=A(C(k)2,τ(k)2,ik)zk+B(C(k)2,τ(k)2,ik)uk, | (3.2) |
which is an extension of (1.1). Since each entry in (3.1) is necessary to describe the system dynamics in a certain regime, we are clear that
If
A(C(k)2,τ(k)2,ik)=(a(ik) 0 0 0 0⋯1 0 0 0 0⋯0 1 0 0 0⋯⋯⋯⋯⋯⋯⋯0(∗)⋯ 0 0 0⋯0⋯ 0 1 0⋯⋯⋯⋯⋯⋯⋯),B(C(k)2,τ(k)2,ik)=[0 0 0⋯ 1(∗) 0 0⋯]T, |
where
If
If
A(0,τ(k)2,ik)=(a(ik) 0⋯b(ik) 0 0⋯1 0 0 0 0 0⋯0 1 0 0 0 0⋯⋯⋯⋯⋯⋯⋯⋯0(∗)⋯ 0 0 0 0⋯0⋯ 0 1 0 0⋯⋯⋯⋯⋯⋯⋯⋯),B(0,τ(k)2,ik)=[0 0 0⋯ 1(∗) 0 0⋯]T, |
where the position of
On the controller side we have
uk=−F(C(k)1,τ(k)1,C(k−τ(k)1−1)2,τ(k−τ(k)1−1)2,ik−τ(k)1−1)zk. | (3.3) |
If
uk−τ(k)1−τ(k−τ(k)1−1)2,uk−τ(k)1−τ(k−τ(k)1−1)2+1,...,uk−1, | (3.4) |
the controller is able to estimate the system state
Recall that if the controller does not receive any feedback packet at present time
We need to point out that there is much flexibility in calculating the new control variable, which might be the most resourceful research in NCS. In this paper we present our control method as follows. Firstly, based on the most recent information
ˆxk−τ(k)1+1=a(ˆik−τ(k)1)xk−τ(k)1+b(ˆik−τ(k)1)uk−τ(k)1−τ(k−τ(k)1−1)2, | (3.5) |
and
ˆxk−τ(k)1+2=a(ˆik−τ(k)1+1)ˆxk−τ(k)1+1+b(ˆik−τ(k)1+1)uk−τ(k)1−τ(k−τ(k)1−1)2+1, | (3.6) |
and so forth until
One may notice that the system mode information
Based on the probability transition matrix
To calculate a new control
ˆik−τ(k)1,ˆik−τ(k)1+1,⋯,ˆik+τ(k−τ(k)1−1)2−1,ˆik+τ(k−τ(k)1−1)2,..,ˆik−τ(k)1+L−1, | (3.7) |
where
J(ˆxk+τ2,ˆik+τ(k−τ(k)1−1)2−1,τ(k)1,τ(k−τ(k)1−1)2)=L−τ(k)1∑j=τ(k−τ(k)1−1)2+1ˆxTk+jQ(k+j)ˆxk+j+L−τ(k)1−τ(k−τ(k)1−1)2−1∑j=0ˆuTk+jR(k+j)ˆuk+j, | (3.8) |
where
Unlike the usual cost function which is the expected value along all possible future paths, this cost function (3.8) is calculated along the deterministic path (3.7), and because the optimization is performed on one path, a huge amount of calculation is saved. To see this in more details, let us consider a control method which chooses future controls
J(ˆxk+τ2,ˆik+τ(k−τ(k)1−1)2−1,τ(k)1,τ(k−τ(k)1−1)2)=L−τ(k)1∑j=τ(k−τ(k)1−1)2+1E[ˆxTk+jQ(k+j)ˆxk+j|xk−τ(k)1]+L−τ(k)1−τ(k−τ(k)1−1)2−1∑j=0ˆuTk+jR(k+j)ˆuk+j, | (3.9) |
where
But for our proposed simplified predictive control method, a natural question remains: what if the path we predicted does not actually occur? Remember that so far we have not used rolling optimization which is the true power of RHC. The calculation of future control sequences is repeated at each sample instant, and if a prediction error occurs, it will be corrected by re-planning at the next sample instant.
Actually we can make this calculation faster by noticing that the control format in RHC with quadratic criterion function (3.8) is given by linear feedback form, see, e.g., [20]. We borrow the iterative algorithm in [20] for the calculation of state feedback control in time varying case, then we obtain
uk=−F(ˆik+τ(k−τ(k)1−1)2−1,τ(k)1,τ(k−τ(k)1−1)2)ˆxk+τ(k−τ(k)1−1)2. | (3.10) |
Recall that
Dk−τ(k)1+1=(0 ⋯0 a(ˆik−τ(k)1) 0 ⋯0 b(ˆik−τ(k)1)⋯0 ⋯⋯ ⋯ ⋯ 0 1 0⋯0 ⋯⋯ ⋯⋯ 1 0 0⋯⋯⋯⋯ ⋯⋯⋯⋯ ⋯⋯), |
where
Dk−τ(k)1+1zk=(ˆxk−τ(k)1+1 uk−τ(k)1−τ(k−τ(k)1−1)2+1⋯⋯uk−1)T |
by (3.5).
Now we define
Dk−τ(k)1+2=(a(ˆik−τ(k)1+1) b(ˆik−τ(k)1+1)0 0⋯0 01 0⋯0 00 1⋯⋯ ⋯⋯ ⋯⋯), |
and get
Dk−τ(k)1+2Dk−τ(k)1+1zk=(ˆxk−τ(k)1+2 uk−τ(k)1−τ(k−τ(k)1−1)2+2 ⋯uk−1)T |
by (3.6). Continue this process until we reach
Dk+τ(k−τ(k)1−1)2⋯Dk−τ(k)1+1zk=ˆxk+τ(k−τ(k)1−1)2. | (3.11) |
Substituting (3.11) in (3.10) yields
uk=−F(ˆik+τ(k−τ(k)1−1)2−1,τ(k)1,τ(k−τ(k)1−1)2)⋅Dk+τ(k−τ(k)1−1)2⋯Dk−τ(k)1+1zk. |
Since
F(C(k)1,τ(k)1,C(k−τ(k)1−1)2,τ(k−τ(k)1−1)2,ik−τ(k)1−1)=F(ˆik+τ(k−τ(k)1−1)2−1,τ(k)1,τ(k−τ(k)1−1)2)⋅Dk+τ(k−τ(k)1−1)2⋯Dk−τ(k)1+1. | (3.12) |
In the next section we shall investigate the stability of this control algorithm.
Putting (3.3) in (3.2) yields
zk+1=A(C(k)2,τ(k)2,ik)zk−B(C(k)2,τ(k)2,ik)⋅F(C(k)1,τ(k)1,C(k−τ(k)1−1)2,τ(k−τ(k)1−1)2,ik−τ(k)1−1)zk. | (4.1) |
Denote
H=H(C(k)2,τ(k)2,ik,C(k)1,τ(k)1,C(k−τ(k)1−1)2,τ(k−τ(k)1−1)2,ik−τ(k)1−1)=A(C(k)2,τ(k)2,ik)−B(C(k)2,τ(k)2,ik)⋅F(C(k)1,τ(k)1,C(k−τ(k)1−1)2,τ(k−τ(k)1−1)2,ik−τ(k)1−1), |
then we obtain the following dynamics
zk+1=H⋅zk, | (4.2) |
where
The usual stability criteria on MJSs are mean convergence (MC) and mean square convergence (MSC). We say that a system is uniformly MC if
F=diag(H)⋅(P′⊗Id),A=diag(H⊗H)⋅(P′⊗Id2), | (4.3) |
where
Theorem 4.1. The MJS (4.1) is uniformly MC if and only if
Proof. The proof can be found in [22]. Here we just point out that the matrices
In the numerical example we shall test both stabilities.
Remark 4.1. We are able to provide this sufficient and necessary condition on stability, and this is largely due to the fact that the structure of this NCS has been clearly revealed.
For the complete representation
(C(k)2,τ(k)2,ik,C(k)1,τ(k)1)→(C(k+1)2,τ(k+1)2,ik+1,C(k+1)1,τ(k+1)1). | (5.1) |
As we mentioned earlier, the regimes do not have full reachability, but the transition (5.1) can be decomposed into three parts that are treated independently. The first part
We consider an example where the objective system, which is a MJS, has two modes (
[x(1)k+1x(2)k+1]=[1.20.2 10 ][x(1)kx(2)k]+[0.05 0.1]uk−τ2, |
and
[x(1)k+1x(2)k+1]=[0.70.2 10 ][x(1)kx(2)k]+[0.10.3]uk−τ2, |
respectively. This system is controlled by a controller through a network with random time delays. It is assumed that
The matrix
Pm=(0.8 0.20.2 0.8). |
To construct
(0,0)(0,1) (0,2)(1,0) (1,1)(2,0)(0,0) 0.70 00.3 00 (0,1) 0.40.4 00 0.20 (0,2) 0.50.2 0.30 00 (1,0) 0.30.4 00 00.3 (1,1) 0.50.2 0.30 00 (2,0) 0.40.2 0.40 00 | (6.1) |
Now that
P1=(0.6 0 0.40.5 0.5 00.7 0.3 0). |
By the derivation in this paper, we need to keep
(0,0)→(0,0)→(0,0)(0,0)→(0,0)→(1,0)(0,0)→(1,0)→(0,0)(0,0)→(1,0)→(0,1)(0,0)→(1,0)→(2,0)⋯⋯⋯, |
and the total number of all possible 3-pair paths is 45. The estimate from (2.1) on this part is given by
The vector
Without any control we have
We choose the prediction horizon
The MJS stability certainly depends on the transition probabilities among the regimes. For instance, if we use
Pm=(0.85 0.150.25 0.75),P1=(0.7 0 0.30.6 0.4 00.8 0.2 0), |
and
P2=(0.8 0 0 0.2 0 00.5 0.3 0 00.2 00.6 0.3 0.1 00 00.4 0.30 00 0.30.5 0.20.3 00 00.7 0.20.1 00 0), |
then again, without control we have
Then we apply the proposed predictive control method and have
To overcome the constraints of NCS such as random packet delays/disorders, it is a natural idea to estimate the system states and send out a control signal that compensates the time delay, hence the expectation of a better control performance. In this paper we modeled the NCS as a regime switching system and proposed a simplified predictive control method. The regime estimate (2.1), which is one of the main contributions of this paper, illustrates that this seemingly small system actually has a very large scale. The structure of this system has been clearly revealed, and a concise sufficient and necessary condition on stability is obtained. Numerical examples clearly show the features of this dynamical system.
This work is supported by Barrios Technology Faculty Fellowship from University of Houston - Clear Lake, 2017-2018.
The author declares no conflict of interest in this paper.
[1] |
C. Iwendi, S. Mohan, S. Khan, E. Ibeke, A. Ahmadian, T. Ciano, COVID-19 fake news sentiment analysis, Comput. Electr. Eng., 101 (2022), 107967. https://doi.org/10.1016/j.compeleceng.2022.107967 doi: 10.1016/j.compeleceng.2022.107967
![]() |
[2] | T. H. Davenport, Information Ecology: Mastering the Information and Knowledge Environment, Oxford University Press, Oxford, 1977. |
[3] | W. Lippmann, M. Curtis, Public Opinion, 1st Edition, Taylor & Francis, New York, 2017. https://doi.org/10.4324/9781315127736 |
[4] |
C. Iwendi, C. G. Y. Huescas, C. Chakraborty, S. Mohan, COVID-19 health analysis and prediction using machine learning algorithms for Mexico and Brazil patients, J. Exp. Theor. Artif. Intell., 2022 (2022), 1–21. https://doi.org/10.1080/0952813X.2022.2058097 doi: 10.1080/0952813X.2022.2058097
![]() |
[5] |
M. Bibi, W. A. Abbasi, W. Aziz, S. Khalil, M. Uddin, C. Iwendi, et al., A novel unsupervised ensemble framework using concept-based linguistic methods and machine learning for twitter sentiment analysis, Pattern Recognit. Lett., 158 (2022), 80–86. https://doi.org/10.1016/j.patrec.2022.04.004 doi: 10.1016/j.patrec.2022.04.004
![]() |
[6] |
X. X. Zhao, J. Z. Wang, Dynamical behaviors of rumor spreading model with control measures, Abstr. Appl. Anal., 2014 (2014). https://doi.org/10.1155/2014/247359 doi: 10.1155/2014/247359
![]() |
[7] |
J. P. Xu, M. X. Zhang, J. N. Ni, A coupled model for government communication and rumor spreading in emergencies, Adv. Differ. Equations, 208 (2016), 1–15. https://doi.org/10.1186/s13662-016-0932-1 doi: 10.1186/s13662-016-0932-1
![]() |
[8] |
Y. Zhang, J. P. Xu, Y. Wu, A rumor control competition model considering intervention of the official rumor-refuting information, Int. J. Mod. Phys. C, 31 (2020), 2050123. https://doi.org/10.1142/S0129183120501235 doi: 10.1142/S0129183120501235
![]() |
[9] |
Y. M. Zhang, Y. Y. Su, W. G. Li, H. O. Liu, Rumor and authoritative information propagation model considering super spreading in complex social networks, Physica A, 506 (2018), 395–411. https://doi.org/10.1016/j.physa.2018.04.082 doi: 10.1016/j.physa.2018.04.082
![]() |
[10] |
L. A. Huo, P. Q. Huang, X. Fang, An interplay model for authorities actions and rumor spreading in emergency event, Physica A, 390 (2011), 3267–3274. https://doi.org/10.1016/j.physa.2011.05.008 doi: 10.1016/j.physa.2011.05.008
![]() |
[11] |
H. J. Paek, T. Hove, Mediating and moderating roles of trust in government in effective risk rumor management: A test case of radiation‐contaminated seafood in South Korea, Risk Anal., 39 (2019), 2653–2667. https://doi.org/10.1111/risa.13377 doi: 10.1111/risa.13377
![]() |
[12] |
F. L. Yin, M. Q. Ji, Z. L. Yang, Z. L. Wu, X. Y. Xia, T. T. Xing, et al., Exploring the determinants of global vaccination campaigns to combat COVID-19, Humanit. Social Sci. Commun., 9 (2022), 1–13. https://doi.org/10.1057/s41599-022-01106-7 doi: 10.1057/s41599-022-01106-7
![]() |
[13] |
F. H. Chen, A susceptible-infected epidemic model with voluntary vaccinations, J. Math. Biol., 53 (2006), 253–272. https://doi.org/10.1007/s00285-006-0006-1 doi: 10.1007/s00285-006-0006-1
![]() |
[14] |
Z. H. Lu, S. J. Gao, L. S. Chen, Analysis of an SI epidemic model with nonlinear transmission and stage structure, Acta Math. Sci., 23 (2003), 440–446. https://doi.org/10.1016/S0252-9602(17)30486-1 doi: 10.1016/S0252-9602(17)30486-1
![]() |
[15] |
M. Y. Li, J. S. Muldowney, Global stability for the SEIR model in epidemiology, Math. Biosci., 125 (1995), 155–164. https://doi.org/10.1016/0025-5564(95)92756-5 doi: 10.1016/0025-5564(95)92756-5
![]() |
[16] |
W. O. Kermack, A. G. McKendrick, Contributions to the mathematical theory of epidemics-Ⅰ, 1927, Bull. Math. Biol., 53 (1991), 33–55. https://doi.org/10.1007/bf02464423 doi: 10.1007/bf02464423
![]() |
[17] |
L. Stone, B. Shulgin, Z, Agur, Theoretical examination of the pulse vaccination policy in the SIR epidemic model, Math. Comput. Modell., 31 (2000), 207–215. https://doi.org/10.1016/S0895-7177(00)00040-6 doi: 10.1016/S0895-7177(00)00040-6
![]() |
[18] |
C. Y. Xia, S. W. Sun, F. Rao, J. Q. Sun, J. S. Wang, Z. Q. Chen, SIS model of epidemic spreading on dynamical networks with community, Front. Comput. Sci. Chin., 3 (2009), 361–365. https://doi.org/10.1007/s11704-009-0057-8 doi: 10.1007/s11704-009-0057-8
![]() |
[19] |
A. Lahrouz, L. Omari, D. Kiouach, A. Belmaâtic, Complete global stability for an SIRS epidemic model with generalized non-linear incidence and vaccination, Appl. Math. Comput., 218 (2012), 6519–6525. https://doi.org/10.1016/j.amc.2011.12.024 doi: 10.1016/j.amc.2011.12.024
![]() |
[20] |
T. Berge, J. M. S. Lubuma, G. M. Moremedi, N. Morris, R. Kondera-Shava, A simple mathematical model for Ebola in Africa, J. Biol. Dyn., 11 (2017), 42–74. https://doi.org/10.1080/17513758.2016.1229817 doi: 10.1080/17513758.2016.1229817
![]() |
[21] |
M. Kumar, S. Abbas, Age-structured SIR model for the spread of infectious diseases through indirect contacts, Mediterr. J. Math., 19 (2022), 1–18. https://doi.org/10.1007/s00009-021-01925-z doi: 10.1007/s00009-021-01925-z
![]() |
[22] |
J. F. David, S. A. Iyaniwura, M. J. Ward, F. Brauer, A novel approach to modelling the spatial spread of airborne diseases: an epidemic model with indirect transmission, Math. Biosci. Eng., 17 (2020), 3294–3328. https://doi.org/10.3934/mbe.2020188 doi: 10.3934/mbe.2020188
![]() |
[23] |
J. F. David, S. A. Iyaniwura, P. Yuan, Y. Tan, J. Kong, H. P. Zhu, Modeling the potential impact of indirect transmission on COVID-19 epidemic, MedRxiv, 2021 (2021). https://doi.org/10.1101/2021.01.28.20181040 doi: 10.1101/2021.01.28.20181040
![]() |
[24] |
M. H. Cortez, J. S. Weitz, Distinguishing between indirect and direct modes of transmission using epidemiological time series, Am. Nat., 181 (2013), E43–E52. https://doi.org/10.1086/668826 doi: 10.1086/668826
![]() |
[25] |
O. Vasilyeva, T. Oraby, F. Lutscher, Aggregation and environmental transmission in chronic wasting disease, Math. Biosci. Eng., 12 (2015), 209. https://doi.org/10.3934/mbe.2015.12.209 doi: 10.3934/mbe.2015.12.209
![]() |
[26] |
F. L. Yin, X. Y. Shao, J. H. Wu, Nearcasting forwarding behaviors and information propagation in Chinese Sina-Microblog, Math. Biosci. Eng., 16 (2019), 5380–5394. https://doi.org/10.3934/mbe.2019268 doi: 10.3934/mbe.2019268
![]() |
[27] |
Y. Yu, J. M. Liu, J. D. Ren, C. Y. Xiao, Stability analysis and optimal control of a rumor propagation model based on two communication modes: friends and marketing account pushing, Math. Biosci. Eng., 19 (2022), 4407–4428. https://doi.org/10.3934/mbe.2022204 doi: 10.3934/mbe.2022204
![]() |
[28] |
X. M. Feng, X. Huo, B. Tang, S. Y. Tang, K. Wang, J. H. Wu, Modelling and analyzing virus mutation dynamics of chikungunya outbreaks, Sci. Rep., 9 (2019), 1–15. https://doi.org/10.1038/s41598-019-38792-4 doi: 10.1038/s41598-019-38792-4
![]() |
[29] |
A. D. Myttenaere, B. Golden, B. L. Grand, F. Rossi, Mean absolute percentage error for regression models, Neurocomputing, 192 (2016), 38–48. https://doi.org/10.1016/j.neucom.2015.12.114 doi: 10.1016/j.neucom.2015.12.114
![]() |
[30] |
U. L. Abbas, R. M. Anderson, J. W. Mellors, Potential impact of antiretroviral chemoprophylaxis on HIV-1 transmission in resource-limited settings, PLOS ONE, 2 (2007), e875. https://doi.org/10.1371/journal.pone.0000875 doi: 10.1371/journal.pone.0000875
![]() |