首页 > 最新文献

Complexity最新文献

英文 中文
Analysis of Vaccination Strategies and Epidemic Therapy in Heterogeneous Networks: The Monkey Pox Case 异质网络中疫苗接种策略及流行病治疗分析:猴痘病例
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-06-26 DOI: 10.1155/cplx/3746855
Abdoulaye Sow, Cherif Diallo, Hocine Cherifi

In this publication, we present a model that simulates the spread of monkeypox virus. The model takes into account the effect of interactions between human and rodent populations, as well as certain realistic factors such as the complex network with a heterogeneous mean field and certain disease control measures such as vaccination and disease therapy. Although vaccines do not offer total protection against the disease, they can reduce the transmission of monkeypox, which could help reduce the spread of the virus in a population, as our results show. So to develop efficient strategies for epidemic control and prevention, we studied global sensitivity analysis to determine the parameters most influential on disease spread. The existence and overall stability of the disease-free equilibrium are also discussed. The basic reproduction number R0 of the model is calculated. The results show that if R0 < 1, the disease-free equilibrium of the model is globally asymptotically stable. In addition, the model’s key parameters are calculated using a least-mean-squares curve fit to the real data.

在这篇文章中,我们提出了一个模拟猴痘病毒传播的模型。该模型考虑了人类和啮齿动物种群之间相互作用的影响,以及某些现实因素,如具有异质平均场的复杂网络和某些疾病控制措施,如疫苗接种和疾病治疗。正如我们的研究结果所显示的那样,尽管疫苗不能提供对这种疾病的全面保护,但它们可以减少猴痘的传播,这可能有助于减少病毒在人群中的传播。因此,为了制定有效的疫情控制和预防策略,我们研究了全局敏感性分析,以确定对疾病传播影响最大的参数。讨论了无病平衡的存在性和总体稳定性。计算了模型的基本复制数R0。结果表明,当R0 <;1、模型的无病平衡点是全局渐近稳定的。此外,利用拟合实际数据的最小均方曲线计算了模型的关键参数。
{"title":"Analysis of Vaccination Strategies and Epidemic Therapy in Heterogeneous Networks: The Monkey Pox Case","authors":"Abdoulaye Sow,&nbsp;Cherif Diallo,&nbsp;Hocine Cherifi","doi":"10.1155/cplx/3746855","DOIUrl":"https://doi.org/10.1155/cplx/3746855","url":null,"abstract":"<div>\u0000 <p>In this publication, we present a model that simulates the spread of monkeypox virus. The model takes into account the effect of interactions between human and rodent populations, as well as certain realistic factors such as the complex network with a heterogeneous mean field and certain disease control measures such as vaccination and disease therapy. Although vaccines do not offer total protection against the disease, they can reduce the transmission of monkeypox, which could help reduce the spread of the virus in a population, as our results show. So to develop efficient strategies for epidemic control and prevention, we studied global sensitivity analysis to determine the parameters most influential on disease spread. The existence and overall stability of the disease-free equilibrium are also discussed. The basic reproduction number <i>R</i><sub>0</sub> of the model is calculated. The results show that if <i>R</i><sub>0</sub> &lt; 1, the disease-free equilibrium of the model is globally asymptotically stable. In addition, the model’s key parameters are calculated using a least-mean-squares curve fit to the real data.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/3746855","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144482071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “Western North American Cruise Shipping Network: Space Structure and System” “北美西部邮轮网络:空间结构和系统”的勘误表
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-06-17 DOI: 10.1155/cplx/9830914

X. Li, C. Li, Z. Long, “Western North American Cruise Shipping Network: Space Structure and System,” Complexity, (2024): 1–10, https://doi.org/10.1155/2024/9190221.

In the article, published online on 28 October 2024 in Wiley Online Library (https://wileyonlinelibrary.com), there was an error in the corresponding author.

The correct corresponding author is Zukun Long.

We apologize for this error.

​正确的通讯作者是Zukun Long。我们为这个错误道歉。
{"title":"Corrigendum to “Western North American Cruise Shipping Network: Space Structure and System”","authors":"","doi":"10.1155/cplx/9830914","DOIUrl":"https://doi.org/10.1155/cplx/9830914","url":null,"abstract":"<p>X. Li, C. Li, Z. Long, “Western North American Cruise Shipping Network: Space Structure and System,” <i>Complexity</i>, (2024): 1–10, https://doi.org/10.1155/2024/9190221.</p><p>In the article, published online on 28 October 2024 in Wiley Online Library (https://wileyonlinelibrary.com), there was an error in the corresponding author.</p><p>The correct corresponding author is Zukun Long.</p><p>We apologize for this error.</p>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/9830914","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144309073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Controllability Network Method on Temporal Network Using Temporal Link Prediction and Network Embedding 基于时间链路预测和网络嵌入的时间网络鲁棒可控性网络方法
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-06-07 DOI: 10.1155/cplx/4749598
Yan Dou, WanLin Liu, Peyman Arebi

Controllability in temporal networks is considered one of the most important challenges in this type of network. Network controllability methods try to fully control the network with the minimum number of control nodes. This type of network is always exposed to internal and external attacks and failures. Therefore, controllability processes need recovery mechanisms to be resistant to various types of failures. The high volume of temporal networks causes the recovery controllability processes to be disrupted. In the paper, a novel method of recovery controllability in temporal networks is proposed to improving controllability network robustness. To restore controllability of the network, the RCTE framework is proposed, in which a temporal network is converted into snapshots at discrete times and then its dimensions are reduced by using network embedding. Finally, using link prediction based on local and global similarity, links that are subject to failure are identified. The effectiveness of the proposed method against various network attacks has been evaluated and compared with other conventional methods. The results show that the RCTE framework performed better than other conventional methods. Also, the proposed method has more controllability and tolerance against malicious attacks compared to other recovery methods.

时间网络的可控性被认为是这类网络中最重要的挑战之一。网络可控性方法试图用最少的控制节点数量对网络进行完全控制。这种类型的网络总是暴露于内部和外部的攻击和故障。因此,可控性过程需要能够抵抗各种类型故障的恢复机制。时间网络的高容量导致恢复可控性过程被中断。为了提高可控网络的鲁棒性,提出了一种恢复时间网络可控性的新方法。为了恢复网络的可控性,提出了RCTE框架,该框架将时间网络转换为离散时间点的快照,然后通过网络嵌入对其进行降维。最后,利用基于局部和全局相似性的链路预测,识别出易发生故障的链路。该方法对各种网络攻击的有效性进行了评估,并与其他传统方法进行了比较。结果表明,RCTE框架的性能优于其他常规方法。与其他恢复方法相比,该方法具有更好的可控性和对恶意攻击的容忍度。
{"title":"Robust Controllability Network Method on Temporal Network Using Temporal Link Prediction and Network Embedding","authors":"Yan Dou,&nbsp;WanLin Liu,&nbsp;Peyman Arebi","doi":"10.1155/cplx/4749598","DOIUrl":"https://doi.org/10.1155/cplx/4749598","url":null,"abstract":"<div>\u0000 <p>Controllability in temporal networks is considered one of the most important challenges in this type of network. Network controllability methods try to fully control the network with the minimum number of control nodes. This type of network is always exposed to internal and external attacks and failures. Therefore, controllability processes need recovery mechanisms to be resistant to various types of failures. The high volume of temporal networks causes the recovery controllability processes to be disrupted. In the paper, a novel method of recovery controllability in temporal networks is proposed to improving controllability network robustness. To restore controllability of the network, the RCTE framework is proposed, in which a temporal network is converted into snapshots at discrete times and then its dimensions are reduced by using network embedding. Finally, using link prediction based on local and global similarity, links that are subject to failure are identified. The effectiveness of the proposed method against various network attacks has been evaluated and compared with other conventional methods. The results show that the RCTE framework performed better than other conventional methods. Also, the proposed method has more controllability and tolerance against malicious attacks compared to other recovery methods.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/4749598","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144232406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complexity in the Wake of Artificial Intelligence 人工智能带来的复杂性
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-30 DOI: 10.1155/cplx/7656280
Theodore Modis

This study aims to evaluate quantitatively (albeit in arbitrary units) the evolution of complexity of the human system since the domestication of fire. This is made possible by studying the timing of the 14 most important milestones—breaks in historical perspective—in the evolution of humans. AI is considered here as the latest such milestone with importance comparable to that of the Internet. The complexity is modeled to have evolved along a bell-shaped curve, reaching a maximum around our times, and soon entering a declining trajectory. According to this curve, the next evolutionary milestone of comparable importance is expected around 2050–2052 and should add less complexity than AI but more than the milestone grouping together nuclear energy, DNA, and the transistor. The peak of the complexity curve coincides squarely with the life span of the baby boomers. The peak in the rate of growth of the world population precedes the complexity peak by 25 years, which is about the time it takes a young man or woman before they are able to add complexity to the human system in a significant way. It is in society’s interest to flatten the complexity bell-shaped curve to whatever extent this is possible in order to enjoy complexity longer.

本研究旨在定量评估(尽管以任意单位)自火被驯化以来人类系统复杂性的演变。这是通过研究人类进化过程中14个最重要的里程碑(历史上的突破)的时间来实现的。在这里,人工智能被认为是最新的里程碑,其重要性堪比互联网。复杂性被建模为沿着钟形曲线进化,在我们这个时代达到最大值,并很快进入下降轨道。根据这条曲线,下一个具有同等重要性的进化里程碑预计在2050-2052年左右,其复杂性将低于人工智能,但高于核能、DNA和晶体管的里程碑。复杂性曲线的峰值正好与婴儿潮一代的寿命吻合。世界人口增长率的峰值比复杂性的峰值早25年,这大约是一个年轻的男人或女人能够以一种重要的方式增加人类系统复杂性的时间。为了更长久地享受复杂性,尽可能地使复杂性钟形曲线变平,符合社会的利益。
{"title":"Complexity in the Wake of Artificial Intelligence","authors":"Theodore Modis","doi":"10.1155/cplx/7656280","DOIUrl":"https://doi.org/10.1155/cplx/7656280","url":null,"abstract":"<div>\u0000 <p>This study aims to evaluate quantitatively (albeit in arbitrary units) the evolution of complexity of the human system since the domestication of fire. This is made possible by studying the timing of the 14 most important milestones—breaks in historical perspective—in the evolution of humans. AI is considered here as the latest such milestone with importance comparable to that of the Internet. The complexity is modeled to have evolved along a bell-shaped curve, reaching a maximum around our times, and soon entering a declining trajectory. According to this curve, the next evolutionary milestone of comparable importance is expected around 2050–2052 and should add less complexity than AI but more than the milestone grouping together nuclear energy, DNA, and the transistor. The peak of the complexity curve coincides squarely with the life span of the baby boomers. The peak in the rate of growth of the world population precedes the complexity peak by 25 years, which is about the time it takes a young man or woman before they are able to add complexity to the human system in a significant way. It is in society’s interest to flatten the complexity bell-shaped curve to whatever extent this is possible in order to enjoy complexity longer.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/7656280","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144171786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Violence Patterns in Mexico: A Complex Temporal Networks Approach 墨西哥的暴力模式分析:一个复杂的时间网络方法
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-30 DOI: 10.1155/cplx/4454714
Edwin Montes-Orozco, Roman-Anselmo Mora-Gutiérrez, Roberto Bernal-Jaquez, Daniela Aguirre-Guerrero

Violence in Mexico presents a significant challenge to public safety and social stability and requires a comprehensive understanding of its temporal dynamics. This study uses a complex temporal networks approach to analyze patterns of violence across municipalities, focusing on crimes such as homicide, sexual assault, discrimination, and armed robbery. Using data spanning 6 years (2015–2021), this study builds temporal networks to find fundamental patterns and trends in violence. Then, using advanced network analysis techniques, including robustness assessment and influence quantification, key influential municipalities were identified within the violence network. The findings of this research can offer valuable information to carry out specific interventions and resource allocation strategies to improve public safety in Mexico.

墨西哥的暴力对公共安全和社会稳定构成重大挑战,需要对其时间动态有全面的了解。本研究使用复杂的时间网络方法来分析各城市的暴力模式,重点关注杀人、性侵犯、歧视和武装抢劫等犯罪。利用跨越6年(2015-2021)的数据,本研究构建了时间网络,以发现暴力的基本模式和趋势。然后,使用先进的网络分析技术,包括鲁棒性评估和影响量化,在暴力网络中确定了关键的有影响力的城市。本研究的结果可以提供有价值的信息,以开展具体的干预措施和资源分配战略,以改善墨西哥的公共安全。
{"title":"Analysis of Violence Patterns in Mexico: A Complex Temporal Networks Approach","authors":"Edwin Montes-Orozco,&nbsp;Roman-Anselmo Mora-Gutiérrez,&nbsp;Roberto Bernal-Jaquez,&nbsp;Daniela Aguirre-Guerrero","doi":"10.1155/cplx/4454714","DOIUrl":"https://doi.org/10.1155/cplx/4454714","url":null,"abstract":"<div>\u0000 <p>Violence in Mexico presents a significant challenge to public safety and social stability and requires a comprehensive understanding of its temporal dynamics. This study uses a complex temporal networks approach to analyze patterns of violence across municipalities, focusing on crimes such as homicide, sexual assault, discrimination, and armed robbery. Using data spanning 6 years (2015–2021), this study builds temporal networks to find fundamental patterns and trends in violence. Then, using advanced network analysis techniques, including robustness assessment and influence quantification, key influential municipalities were identified within the violence network. The findings of this research can offer valuable information to carry out specific interventions and resource allocation strategies to improve public safety in Mexico.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/4454714","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144179200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Soliton and Wave Solutions for the Dual-Perturbed Integrable Boussinesq Equation 双摄动可积Boussinesq方程的新孤子解和波解
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-30 DOI: 10.1155/cplx/2800207
Akhtar Hussain, Tarek F. Ibrahim, Faizah D. Alanazi, Waleed M. Osman, Arafa A. Dawood, Jorge Herrera

Nonlinear science represents a foundational frontier in scientific inquiry that explores the shared characteristics inherent in nonlinear phenomena. This study focused on the perturbed Boussinesq (PB) equation incorporating dual perturbation terms. Soliton solutions were deduced by leveraging the traveling wave hypothesis. Furthermore, by employing the generalized Jacobi elliptic expansion function (JEEF) method and the improved tan (Λ/2) method, diverse nonlinear wave solutions, including kink, dark, periodic, bright, singular, periodic waves, bell-shaped solitons, solitary waves, shock waves, and kink-shaped soliton solutions, were acquired. The establishment of constraint relations is detailed to delineate the criteria for the existence of these wave solutions. Notably, these solutions are innovative and present novel contributions that have not yet been documented in the literature. In addition, 2D and 3D graphics were constructed to visually elucidate the physical behavior inherent to these newly acquired exact solutions.

非线性科学是探索非线性现象固有的共同特征的科学研究的基础前沿。本文研究了包含对偶扰动项的扰动Boussinesq (PB)方程。利用行波假设推导了孤子解。利用广义Jacobi椭圆展开函数(JEEF)方法和改进的tan (Λ/2)方法,得到了扭结波、暗波、周期波、亮波、奇异波、周期波、钟形孤子、孤立波、激波和扭结孤子等多种非线性波解。详细地建立了约束关系,描述了这些波解存在的判据。值得注意的是,这些解决方案具有创新性,并提出了尚未在文献中记录的新颖贡献。此外,还构建了二维和三维图形,以直观地阐明这些新获得的精确解所固有的物理行为。
{"title":"Novel Soliton and Wave Solutions for the Dual-Perturbed Integrable Boussinesq Equation","authors":"Akhtar Hussain,&nbsp;Tarek F. Ibrahim,&nbsp;Faizah D. Alanazi,&nbsp;Waleed M. Osman,&nbsp;Arafa A. Dawood,&nbsp;Jorge Herrera","doi":"10.1155/cplx/2800207","DOIUrl":"https://doi.org/10.1155/cplx/2800207","url":null,"abstract":"<div>\u0000 <p>Nonlinear science represents a foundational frontier in scientific inquiry that explores the shared characteristics inherent in nonlinear phenomena. This study focused on the perturbed Boussinesq (PB) equation incorporating dual perturbation terms. Soliton solutions were deduced by leveraging the traveling wave hypothesis. Furthermore, by employing the generalized Jacobi elliptic expansion function (JEEF) method and the improved tan (Λ/2) method, diverse nonlinear wave solutions, including kink, dark, periodic, bright, singular, periodic waves, bell-shaped solitons, solitary waves, shock waves, and kink-shaped soliton solutions, were acquired. The establishment of constraint relations is detailed to delineate the criteria for the existence of these wave solutions. Notably, these solutions are innovative and present novel contributions that have not yet been documented in the literature. In addition, 2D and 3D graphics were constructed to visually elucidate the physical behavior inherent to these newly acquired exact solutions.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/2800207","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144179199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Optimal Intervention Strategies on Psychoactive Substance Abuse Dynamics With Addicted Immigrants: A Mathematical Study 最优干预策略对成瘾移民精神活性物质滥用动态的影响:一个数学研究
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-23 DOI: 10.1155/cplx/5581960
Samson Olaniyi, Sulaimon F. Abimbade, Jamiu A. Ademosu, Richard C. Ogbonna, Ramoshweu S. Lebelo, Kazeem O. Okosun

In this work, the population dynamics of psychoactive substance abuse model governed by a system of nonlinear ordinary differential equations is studied through the efficacy and economic analyses. The study considers three time-variant intervention strategies, such as screening of addicted immigrants, advocacy against substance abuse and rehabilitation therapy for the control of substance abuse spread in the population. Most sensitive parameters to be targeted by the control interventions are examined through sensitivity analysis using the normalized forward sensitivity index. By employing optimal control theory, the existence of optimal control is qualitatively analysed and the control triple is characterized using Pontryagin’s maximum principle. To further assess the impact of the intervention strategies, three different policies combining any two of the intervention strategies, namely, Policy A (combination of screening of addicted immigrants and advocacy against substance abuse), Policy B (combination of screening of addicted immigrants and rehabilitation therapy) and Policy C (combination of advocacy against substance abuse and rehabilitation therapy), are considered. Efficacy and economic analyses are extensively conducted on each of the policies, and it is revealed that Policy B is the most efficient intervention, while Policy C is the most cost-effective intervention. As a result, the policy that averts the highest number of psychoactive substance abuse cases when limited resources are available is recommended.

本文通过有效性和经济性分析,研究了非线性常微分方程控制的精神活性物质滥用模型的人口动态。该研究考虑了三种时变干预策略,如筛选成瘾移民,倡导反对药物滥用和康复治疗,以控制药物滥用在人群中的传播。通过使用归一化前向灵敏度指数进行敏感性分析,对控制干预所针对的大多数敏感参数进行了检查。利用最优控制理论定性分析了最优控制的存在性,并利用庞特里亚金极大值原理对控制三重体进行了表征。为了进一步评估干预策略的影响,我们考虑了结合任意两种干预策略的三种不同政策,即政策A(结合筛查成瘾移民和倡导反对药物滥用)、政策B(结合筛查成瘾移民和康复治疗)和政策C(结合倡导反对药物滥用和康复治疗)。对每一项政策进行了广泛的有效性和经济分析,发现B政策是最有效的干预措施,而C政策是最具成本效益的干预措施。因此,建议在资源有限的情况下采取避免最多数量精神活性药物滥用案件的政策。
{"title":"Impact of Optimal Intervention Strategies on Psychoactive Substance Abuse Dynamics With Addicted Immigrants: A Mathematical Study","authors":"Samson Olaniyi,&nbsp;Sulaimon F. Abimbade,&nbsp;Jamiu A. Ademosu,&nbsp;Richard C. Ogbonna,&nbsp;Ramoshweu S. Lebelo,&nbsp;Kazeem O. Okosun","doi":"10.1155/cplx/5581960","DOIUrl":"https://doi.org/10.1155/cplx/5581960","url":null,"abstract":"<div>\u0000 <p>In this work, the population dynamics of psychoactive substance abuse model governed by a system of nonlinear ordinary differential equations is studied through the efficacy and economic analyses. The study considers three time-variant intervention strategies, such as screening of addicted immigrants, advocacy against substance abuse and rehabilitation therapy for the control of substance abuse spread in the population. Most sensitive parameters to be targeted by the control interventions are examined through sensitivity analysis using the normalized forward sensitivity index. By employing optimal control theory, the existence of optimal control is qualitatively analysed and the control triple is characterized using Pontryagin’s maximum principle. To further assess the impact of the intervention strategies, three different policies combining any two of the intervention strategies, namely, Policy A (combination of screening of addicted immigrants and advocacy against substance abuse), Policy B (combination of screening of addicted immigrants and rehabilitation therapy) and Policy C (combination of advocacy against substance abuse and rehabilitation therapy), are considered. Efficacy and economic analyses are extensively conducted on each of the policies, and it is revealed that Policy B is the most efficient intervention, while Policy C is the most cost-effective intervention. As a result, the policy that averts the highest number of psychoactive substance abuse cases when limited resources are available is recommended.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/5581960","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine-Reading Comprehension for Bridge Inspection Domain by Fusing Graph Embedding 基于融合图嵌入的桥梁检测领域机器阅读理解
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-22 DOI: 10.1155/cplx/6691354
Fangyue Xiang, Hongjin Zhu, YuFang Sun, Maobo Zheng, Wenyong Yan

Bridge inspection text records are very significant for the maintenance and upkeep of bridges, which can help engineers and maintenance personnel to understand the actual condition of bridges, detect and repair problems in time, and ensure the safe operation of bridges. Currently, more and more research focuses on how to extract potentially valuable bridge-related information from bridge inspection texts. In this study, we take the bridge inspection domain machine-reading comprehension corpus as the data support for model training and performance evaluation; oriented to the bridge inspection domain data text extraction machine-reading comprehension task, on the basis of word-granularity text input, we further explore two schemes of co-occurring linkage of cross-sentence entities in the context and co-occurring linkage of entities within the sentence through graph structure, and we learn and extract naming through graph-attentive neural networks-structured semantic information between entities and fused the obtained named entity embeddings with a hidden representation of the pretrained context. Tested on the bridge inspection domain dataset, the integrated model proposed in this research improves the EM optimum by 1.4% and the mean by 2.2% and the F1 optimum by 2.2% and the mean by 1.6% on the BIQA test, compared with the better-performing baseline model RoBERTa_wwm_ext.

桥梁检测文本记录对于桥梁的维护保养具有非常重要的意义,可以帮助工程师和维修人员了解桥梁的实际情况,及时发现和修复问题,保证桥梁的安全运行。目前,如何从桥梁检测文本中提取有潜在价值的桥梁相关信息成为越来越多的研究热点。本研究以桥梁检测领域机器阅读理解语料库作为模型训练和性能评价的数据支持;针对桥梁检测领域数据文本提取机器阅读理解任务,在词粒度文本输入的基础上,我们进一步探索了上下文中跨句实体共现联动和句子内实体共现联动两种方案,通过图结构实现。我们通过图关注神经网络来学习和提取实体之间结构化的语义信息,并将获得的命名实体嵌入与预训练上下文的隐藏表示融合在一起。在桥梁检测域数据集上测试,与性能更好的基线模型RoBERTa_wwm_ext相比,本文提出的集成模型在BIQA测试中EM最优提高1.4%,均值提高2.2%,F1最优提高2.2%,均值提高1.6%。
{"title":"Machine-Reading Comprehension for Bridge Inspection Domain by Fusing Graph Embedding","authors":"Fangyue Xiang,&nbsp;Hongjin Zhu,&nbsp;YuFang Sun,&nbsp;Maobo Zheng,&nbsp;Wenyong Yan","doi":"10.1155/cplx/6691354","DOIUrl":"https://doi.org/10.1155/cplx/6691354","url":null,"abstract":"<div>\u0000 <p>Bridge inspection text records are very significant for the maintenance and upkeep of bridges, which can help engineers and maintenance personnel to understand the actual condition of bridges, detect and repair problems in time, and ensure the safe operation of bridges. Currently, more and more research focuses on how to extract potentially valuable bridge-related information from bridge inspection texts. In this study, we take the bridge inspection domain machine-reading comprehension corpus as the data support for model training and performance evaluation; oriented to the bridge inspection domain data text extraction machine-reading comprehension task, on the basis of word-granularity text input, we further explore two schemes of co-occurring linkage of cross-sentence entities in the context and co-occurring linkage of entities within the sentence through graph structure, and we learn and extract naming through graph-attentive neural networks-structured semantic information between entities and fused the obtained named entity embeddings with a hidden representation of the pretrained context. Tested on the bridge inspection domain dataset, the integrated model proposed in this research improves the EM optimum by 1.4% and the mean by 2.2% and the F1 optimum by 2.2% and the mean by 1.6% on the BIQA test, compared with the better-performing baseline model RoBERTa_wwm_ext.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/6691354","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144108960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Deep Learning-Based Framework for Predicting Cyber Violence in Social Networks 基于深度学习的预测社交网络中网络暴力的有效框架
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-12 DOI: 10.1155/cplx/2750326
Younes Fayand Fathabad, Mohammad Ali Balafar, Amin Golzari Oskouei, Kamal Koohi

The widespread use of the internet has led to the rapid expansion of social networks, making it easier for individuals to share content online. However, this has also increased the prevalence of cyber violence, necessitating the development of automated detection methods. Deep learning-based algorithms have proven effective in identifying violent content, yet existing models often struggle with understanding contextual nuances and implicit forms of cyber violence. To address this limitation, we propose a novel deep multi-input recurrent neural network architecture that incorporates neighborhood-based contextual information during training. The Jaccard similarity metric is employed to construct neighborhoods of input texts, allowing the model to leverage surrounding context for improved feature extraction. The proposed model combines Bi-LSTM and GRU networks to capture both sequential dependencies and contextual relationships effectively. The proposed model was evaluated on a real-world cyber violence dataset, achieving an accuracy of 94.29%, recall of 81%, precision of 72%, and an F1-score of 76.23% when incorporating neighborhood-based learning. Without contextual information, the model attained an accuracy of 89.15%, recall of 72.00%, precision of 71.5%, and an F1-score of 71.74%. These results demonstrate that neighborhood-based learning contributed to an average improvement of 5.14% in accuracy and 4.49% in F1-score, underscoring the importance of contextual awareness in cyber violence detection. These results highlight the significance of contextual awareness in deep learning-based text classification and underscore the potential of our approach for real-world​ applications.

互联网的广泛使用导致了社交网络的迅速扩张,使个人更容易在网上分享内容。然而,这也增加了网络暴力的流行,有必要开发自动检测方法。基于深度学习的算法已被证明在识别暴力内容方面是有效的,但现有的模型往往难以理解上下文的细微差别和隐含的网络暴力形式。为了解决这一限制,我们提出了一种新的深度多输入递归神经网络架构,该架构在训练过程中结合了基于邻域的上下文信息。使用Jaccard相似度度量来构建输入文本的邻域,允许模型利用周围的上下文来改进特征提取。该模型结合了Bi-LSTM和GRU网络,有效地捕获了顺序依赖关系和上下文关系。在现实世界的网络暴力数据集上对该模型进行了评估,在纳入基于邻居的学习时,该模型的准确率为94.29%,召回率为81%,精度为72%,f1得分为76.23%。在没有上下文信息的情况下,该模型的准确率为89.15%,召回率为72.00%,精密度为71.5%,f1得分为71.74%。这些结果表明,基于社区的学习使网络暴力检测的准确率平均提高了5.14%,f1得分平均提高了4.49%,这凸显了语境意识在网络暴力检测中的重要性。这些结果突出了上下文感知在基于深度学习的文本分类中的重要性,并强调了我们的方法在现实世界应用中的潜力。
{"title":"An Efficient Deep Learning-Based Framework for Predicting Cyber Violence in Social Networks","authors":"Younes Fayand Fathabad,&nbsp;Mohammad Ali Balafar,&nbsp;Amin Golzari Oskouei,&nbsp;Kamal Koohi","doi":"10.1155/cplx/2750326","DOIUrl":"https://doi.org/10.1155/cplx/2750326","url":null,"abstract":"<div>\u0000 <p>The widespread use of the internet has led to the rapid expansion of social networks, making it easier for individuals to share content online. However, this has also increased the prevalence of cyber violence, necessitating the development of automated detection methods. Deep learning-based algorithms have proven effective in identifying violent content, yet existing models often struggle with understanding contextual nuances and implicit forms of cyber violence. To address this limitation, we propose a novel deep multi-input recurrent neural network architecture that incorporates neighborhood-based contextual information during training. The Jaccard similarity metric is employed to construct neighborhoods of input texts, allowing the model to leverage surrounding context for improved feature extraction. The proposed model combines Bi-LSTM and GRU networks to capture both sequential dependencies and contextual relationships effectively. The proposed model was evaluated on a real-world cyber violence dataset, achieving an accuracy of 94.29%, recall of 81%, precision of 72%, and an F1-score of 76.23% when incorporating neighborhood-based learning. Without contextual information, the model attained an accuracy of 89.15%, recall of 72.00%, precision of 71.5%, and an F1-score of 71.74%. These results demonstrate that neighborhood-based learning contributed to an average improvement of 5.14% in accuracy and 4.49% in F1-score, underscoring the importance of contextual awareness in cyber violence detection. These results highlight the significance of contextual awareness in deep learning-based text classification and underscore the potential of our approach for real-world​ applications.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/2750326","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143938866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Stability and Bifurcation in a Discretized Predator–Prey Model With Holling Type III Response and Prey Refuge Via Piecewise Constant Argument Method 用分段常参数法研究具有Holling III型响应和猎物避难所的离散捕食者-食饵模型的稳定性和分岔性
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-12 DOI: 10.1155/cplx/4542190
Faisal Alsharif, Rizwan Ahmed, Ibrahim Alraddadi, Mohammed Alsubhi, Muhammad Amer, Md. Jasim Uddin

This study explores the dynamics of a discrete-time predator–prey system, incorporating a Holling type III functional response and prey refuge, through the piecewise constant argument method. This method keeps things consistent and prevents negative population values, which is often a drawback of older techniques. We take a closer look at fixed points, exploring their existence and stability. We identify the conditions that lead to period-doubling and Neimark–Sacker bifurcations, and we back up our findings with numerical simulations. Our findings emphasize how important the predation coefficient is for keeping ecological balance and show that, in this model setup, the refuge for prey has a minimal effect on the stability of the system. These insights help us better understand the relationships between predators and their prey, providing valuable guidance for conserving biodiversity and managing ecosystems.

本研究通过分段常数参数方法探讨了一个包含Holling III型功能响应和猎物避难所的离散时间捕食者-猎物系统的动力学。这种方法使事情保持一致,并防止负的人口值,这通常是旧技术的缺点。我们仔细观察固定点,探索它们的存在性和稳定性。我们确定了导致周期加倍和内马克-萨克分岔的条件,并用数值模拟来支持我们的发现。我们的研究结果强调了捕食系数对保持生态平衡的重要性,并表明,在这个模型设置中,猎物的避难所对系统稳定性的影响很小。这些见解有助于我们更好地理解捕食者和猎物之间的关系,为保护生物多样性和管理生态系统提供有价值的指导。
{"title":"A Study of Stability and Bifurcation in a Discretized Predator–Prey Model With Holling Type III Response and Prey Refuge Via Piecewise Constant Argument Method","authors":"Faisal Alsharif,&nbsp;Rizwan Ahmed,&nbsp;Ibrahim Alraddadi,&nbsp;Mohammed Alsubhi,&nbsp;Muhammad Amer,&nbsp;Md. Jasim Uddin","doi":"10.1155/cplx/4542190","DOIUrl":"https://doi.org/10.1155/cplx/4542190","url":null,"abstract":"<div>\u0000 <p>This study explores the dynamics of a discrete-time predator–prey system, incorporating a Holling type III functional response and prey refuge, through the piecewise constant argument method. This method keeps things consistent and prevents negative population values, which is often a drawback of older techniques. We take a closer look at fixed points, exploring their existence and stability. We identify the conditions that lead to period-doubling and Neimark–Sacker bifurcations, and we back up our findings with numerical simulations. Our findings emphasize how important the predation coefficient is for keeping ecological balance and show that, in this model setup, the refuge for prey has a minimal effect on the stability of the system. These insights help us better understand the relationships between predators and their prey, providing valuable guidance for conserving biodiversity and managing ecosystems.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/4542190","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143938856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Complexity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1