首页 > 最新文献

Complexity最新文献

英文 中文
Analysis of Violence Patterns in Mexico: A Complex Temporal Networks Approach 墨西哥的暴力模式分析:一个复杂的时间网络方法
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-30 DOI: 10.1155/cplx/4454714
Edwin Montes-Orozco, Roman-Anselmo Mora-Gutiérrez, Roberto Bernal-Jaquez, Daniela Aguirre-Guerrero

Violence in Mexico presents a significant challenge to public safety and social stability and requires a comprehensive understanding of its temporal dynamics. This study uses a complex temporal networks approach to analyze patterns of violence across municipalities, focusing on crimes such as homicide, sexual assault, discrimination, and armed robbery. Using data spanning 6 years (2015–2021), this study builds temporal networks to find fundamental patterns and trends in violence. Then, using advanced network analysis techniques, including robustness assessment and influence quantification, key influential municipalities were identified within the violence network. The findings of this research can offer valuable information to carry out specific interventions and resource allocation strategies to improve public safety in Mexico.

墨西哥的暴力对公共安全和社会稳定构成重大挑战,需要对其时间动态有全面的了解。本研究使用复杂的时间网络方法来分析各城市的暴力模式,重点关注杀人、性侵犯、歧视和武装抢劫等犯罪。利用跨越6年(2015-2021)的数据,本研究构建了时间网络,以发现暴力的基本模式和趋势。然后,使用先进的网络分析技术,包括鲁棒性评估和影响量化,在暴力网络中确定了关键的有影响力的城市。本研究的结果可以提供有价值的信息,以开展具体的干预措施和资源分配战略,以改善墨西哥的公共安全。
{"title":"Analysis of Violence Patterns in Mexico: A Complex Temporal Networks Approach","authors":"Edwin Montes-Orozco,&nbsp;Roman-Anselmo Mora-Gutiérrez,&nbsp;Roberto Bernal-Jaquez,&nbsp;Daniela Aguirre-Guerrero","doi":"10.1155/cplx/4454714","DOIUrl":"https://doi.org/10.1155/cplx/4454714","url":null,"abstract":"<div>\u0000 <p>Violence in Mexico presents a significant challenge to public safety and social stability and requires a comprehensive understanding of its temporal dynamics. This study uses a complex temporal networks approach to analyze patterns of violence across municipalities, focusing on crimes such as homicide, sexual assault, discrimination, and armed robbery. Using data spanning 6 years (2015–2021), this study builds temporal networks to find fundamental patterns and trends in violence. Then, using advanced network analysis techniques, including robustness assessment and influence quantification, key influential municipalities were identified within the violence network. The findings of this research can offer valuable information to carry out specific interventions and resource allocation strategies to improve public safety in Mexico.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/4454714","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144179200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Soliton and Wave Solutions for the Dual-Perturbed Integrable Boussinesq Equation 双摄动可积Boussinesq方程的新孤子解和波解
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-30 DOI: 10.1155/cplx/2800207
Akhtar Hussain, Tarek F. Ibrahim, Faizah D. Alanazi, Waleed M. Osman, Arafa A. Dawood, Jorge Herrera

Nonlinear science represents a foundational frontier in scientific inquiry that explores the shared characteristics inherent in nonlinear phenomena. This study focused on the perturbed Boussinesq (PB) equation incorporating dual perturbation terms. Soliton solutions were deduced by leveraging the traveling wave hypothesis. Furthermore, by employing the generalized Jacobi elliptic expansion function (JEEF) method and the improved tan (Λ/2) method, diverse nonlinear wave solutions, including kink, dark, periodic, bright, singular, periodic waves, bell-shaped solitons, solitary waves, shock waves, and kink-shaped soliton solutions, were acquired. The establishment of constraint relations is detailed to delineate the criteria for the existence of these wave solutions. Notably, these solutions are innovative and present novel contributions that have not yet been documented in the literature. In addition, 2D and 3D graphics were constructed to visually elucidate the physical behavior inherent to these newly acquired exact solutions.

非线性科学是探索非线性现象固有的共同特征的科学研究的基础前沿。本文研究了包含对偶扰动项的扰动Boussinesq (PB)方程。利用行波假设推导了孤子解。利用广义Jacobi椭圆展开函数(JEEF)方法和改进的tan (Λ/2)方法,得到了扭结波、暗波、周期波、亮波、奇异波、周期波、钟形孤子、孤立波、激波和扭结孤子等多种非线性波解。详细地建立了约束关系,描述了这些波解存在的判据。值得注意的是,这些解决方案具有创新性,并提出了尚未在文献中记录的新颖贡献。此外,还构建了二维和三维图形,以直观地阐明这些新获得的精确解所固有的物理行为。
{"title":"Novel Soliton and Wave Solutions for the Dual-Perturbed Integrable Boussinesq Equation","authors":"Akhtar Hussain,&nbsp;Tarek F. Ibrahim,&nbsp;Faizah D. Alanazi,&nbsp;Waleed M. Osman,&nbsp;Arafa A. Dawood,&nbsp;Jorge Herrera","doi":"10.1155/cplx/2800207","DOIUrl":"https://doi.org/10.1155/cplx/2800207","url":null,"abstract":"<div>\u0000 <p>Nonlinear science represents a foundational frontier in scientific inquiry that explores the shared characteristics inherent in nonlinear phenomena. This study focused on the perturbed Boussinesq (PB) equation incorporating dual perturbation terms. Soliton solutions were deduced by leveraging the traveling wave hypothesis. Furthermore, by employing the generalized Jacobi elliptic expansion function (JEEF) method and the improved tan (Λ/2) method, diverse nonlinear wave solutions, including kink, dark, periodic, bright, singular, periodic waves, bell-shaped solitons, solitary waves, shock waves, and kink-shaped soliton solutions, were acquired. The establishment of constraint relations is detailed to delineate the criteria for the existence of these wave solutions. Notably, these solutions are innovative and present novel contributions that have not yet been documented in the literature. In addition, 2D and 3D graphics were constructed to visually elucidate the physical behavior inherent to these newly acquired exact solutions.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/2800207","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144179199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Optimal Intervention Strategies on Psychoactive Substance Abuse Dynamics With Addicted Immigrants: A Mathematical Study 最优干预策略对成瘾移民精神活性物质滥用动态的影响:一个数学研究
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-23 DOI: 10.1155/cplx/5581960
Samson Olaniyi, Sulaimon F. Abimbade, Jamiu A. Ademosu, Richard C. Ogbonna, Ramoshweu S. Lebelo, Kazeem O. Okosun

In this work, the population dynamics of psychoactive substance abuse model governed by a system of nonlinear ordinary differential equations is studied through the efficacy and economic analyses. The study considers three time-variant intervention strategies, such as screening of addicted immigrants, advocacy against substance abuse and rehabilitation therapy for the control of substance abuse spread in the population. Most sensitive parameters to be targeted by the control interventions are examined through sensitivity analysis using the normalized forward sensitivity index. By employing optimal control theory, the existence of optimal control is qualitatively analysed and the control triple is characterized using Pontryagin’s maximum principle. To further assess the impact of the intervention strategies, three different policies combining any two of the intervention strategies, namely, Policy A (combination of screening of addicted immigrants and advocacy against substance abuse), Policy B (combination of screening of addicted immigrants and rehabilitation therapy) and Policy C (combination of advocacy against substance abuse and rehabilitation therapy), are considered. Efficacy and economic analyses are extensively conducted on each of the policies, and it is revealed that Policy B is the most efficient intervention, while Policy C is the most cost-effective intervention. As a result, the policy that averts the highest number of psychoactive substance abuse cases when limited resources are available is recommended.

本文通过有效性和经济性分析,研究了非线性常微分方程控制的精神活性物质滥用模型的人口动态。该研究考虑了三种时变干预策略,如筛选成瘾移民,倡导反对药物滥用和康复治疗,以控制药物滥用在人群中的传播。通过使用归一化前向灵敏度指数进行敏感性分析,对控制干预所针对的大多数敏感参数进行了检查。利用最优控制理论定性分析了最优控制的存在性,并利用庞特里亚金极大值原理对控制三重体进行了表征。为了进一步评估干预策略的影响,我们考虑了结合任意两种干预策略的三种不同政策,即政策A(结合筛查成瘾移民和倡导反对药物滥用)、政策B(结合筛查成瘾移民和康复治疗)和政策C(结合倡导反对药物滥用和康复治疗)。对每一项政策进行了广泛的有效性和经济分析,发现B政策是最有效的干预措施,而C政策是最具成本效益的干预措施。因此,建议在资源有限的情况下采取避免最多数量精神活性药物滥用案件的政策。
{"title":"Impact of Optimal Intervention Strategies on Psychoactive Substance Abuse Dynamics With Addicted Immigrants: A Mathematical Study","authors":"Samson Olaniyi,&nbsp;Sulaimon F. Abimbade,&nbsp;Jamiu A. Ademosu,&nbsp;Richard C. Ogbonna,&nbsp;Ramoshweu S. Lebelo,&nbsp;Kazeem O. Okosun","doi":"10.1155/cplx/5581960","DOIUrl":"https://doi.org/10.1155/cplx/5581960","url":null,"abstract":"<div>\u0000 <p>In this work, the population dynamics of psychoactive substance abuse model governed by a system of nonlinear ordinary differential equations is studied through the efficacy and economic analyses. The study considers three time-variant intervention strategies, such as screening of addicted immigrants, advocacy against substance abuse and rehabilitation therapy for the control of substance abuse spread in the population. Most sensitive parameters to be targeted by the control interventions are examined through sensitivity analysis using the normalized forward sensitivity index. By employing optimal control theory, the existence of optimal control is qualitatively analysed and the control triple is characterized using Pontryagin’s maximum principle. To further assess the impact of the intervention strategies, three different policies combining any two of the intervention strategies, namely, Policy A (combination of screening of addicted immigrants and advocacy against substance abuse), Policy B (combination of screening of addicted immigrants and rehabilitation therapy) and Policy C (combination of advocacy against substance abuse and rehabilitation therapy), are considered. Efficacy and economic analyses are extensively conducted on each of the policies, and it is revealed that Policy B is the most efficient intervention, while Policy C is the most cost-effective intervention. As a result, the policy that averts the highest number of psychoactive substance abuse cases when limited resources are available is recommended.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/5581960","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine-Reading Comprehension for Bridge Inspection Domain by Fusing Graph Embedding 基于融合图嵌入的桥梁检测领域机器阅读理解
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-22 DOI: 10.1155/cplx/6691354
Fangyue Xiang, Hongjin Zhu, YuFang Sun, Maobo Zheng, Wenyong Yan

Bridge inspection text records are very significant for the maintenance and upkeep of bridges, which can help engineers and maintenance personnel to understand the actual condition of bridges, detect and repair problems in time, and ensure the safe operation of bridges. Currently, more and more research focuses on how to extract potentially valuable bridge-related information from bridge inspection texts. In this study, we take the bridge inspection domain machine-reading comprehension corpus as the data support for model training and performance evaluation; oriented to the bridge inspection domain data text extraction machine-reading comprehension task, on the basis of word-granularity text input, we further explore two schemes of co-occurring linkage of cross-sentence entities in the context and co-occurring linkage of entities within the sentence through graph structure, and we learn and extract naming through graph-attentive neural networks-structured semantic information between entities and fused the obtained named entity embeddings with a hidden representation of the pretrained context. Tested on the bridge inspection domain dataset, the integrated model proposed in this research improves the EM optimum by 1.4% and the mean by 2.2% and the F1 optimum by 2.2% and the mean by 1.6% on the BIQA test, compared with the better-performing baseline model RoBERTa_wwm_ext.

桥梁检测文本记录对于桥梁的维护保养具有非常重要的意义,可以帮助工程师和维修人员了解桥梁的实际情况,及时发现和修复问题,保证桥梁的安全运行。目前,如何从桥梁检测文本中提取有潜在价值的桥梁相关信息成为越来越多的研究热点。本研究以桥梁检测领域机器阅读理解语料库作为模型训练和性能评价的数据支持;针对桥梁检测领域数据文本提取机器阅读理解任务,在词粒度文本输入的基础上,我们进一步探索了上下文中跨句实体共现联动和句子内实体共现联动两种方案,通过图结构实现。我们通过图关注神经网络来学习和提取实体之间结构化的语义信息,并将获得的命名实体嵌入与预训练上下文的隐藏表示融合在一起。在桥梁检测域数据集上测试,与性能更好的基线模型RoBERTa_wwm_ext相比,本文提出的集成模型在BIQA测试中EM最优提高1.4%,均值提高2.2%,F1最优提高2.2%,均值提高1.6%。
{"title":"Machine-Reading Comprehension for Bridge Inspection Domain by Fusing Graph Embedding","authors":"Fangyue Xiang,&nbsp;Hongjin Zhu,&nbsp;YuFang Sun,&nbsp;Maobo Zheng,&nbsp;Wenyong Yan","doi":"10.1155/cplx/6691354","DOIUrl":"https://doi.org/10.1155/cplx/6691354","url":null,"abstract":"<div>\u0000 <p>Bridge inspection text records are very significant for the maintenance and upkeep of bridges, which can help engineers and maintenance personnel to understand the actual condition of bridges, detect and repair problems in time, and ensure the safe operation of bridges. Currently, more and more research focuses on how to extract potentially valuable bridge-related information from bridge inspection texts. In this study, we take the bridge inspection domain machine-reading comprehension corpus as the data support for model training and performance evaluation; oriented to the bridge inspection domain data text extraction machine-reading comprehension task, on the basis of word-granularity text input, we further explore two schemes of co-occurring linkage of cross-sentence entities in the context and co-occurring linkage of entities within the sentence through graph structure, and we learn and extract naming through graph-attentive neural networks-structured semantic information between entities and fused the obtained named entity embeddings with a hidden representation of the pretrained context. Tested on the bridge inspection domain dataset, the integrated model proposed in this research improves the EM optimum by 1.4% and the mean by 2.2% and the F1 optimum by 2.2% and the mean by 1.6% on the BIQA test, compared with the better-performing baseline model RoBERTa_wwm_ext.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/6691354","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144108960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Deep Learning-Based Framework for Predicting Cyber Violence in Social Networks 基于深度学习的预测社交网络中网络暴力的有效框架
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-12 DOI: 10.1155/cplx/2750326
Younes Fayand Fathabad, Mohammad Ali Balafar, Amin Golzari Oskouei, Kamal Koohi

The widespread use of the internet has led to the rapid expansion of social networks, making it easier for individuals to share content online. However, this has also increased the prevalence of cyber violence, necessitating the development of automated detection methods. Deep learning-based algorithms have proven effective in identifying violent content, yet existing models often struggle with understanding contextual nuances and implicit forms of cyber violence. To address this limitation, we propose a novel deep multi-input recurrent neural network architecture that incorporates neighborhood-based contextual information during training. The Jaccard similarity metric is employed to construct neighborhoods of input texts, allowing the model to leverage surrounding context for improved feature extraction. The proposed model combines Bi-LSTM and GRU networks to capture both sequential dependencies and contextual relationships effectively. The proposed model was evaluated on a real-world cyber violence dataset, achieving an accuracy of 94.29%, recall of 81%, precision of 72%, and an F1-score of 76.23% when incorporating neighborhood-based learning. Without contextual information, the model attained an accuracy of 89.15%, recall of 72.00%, precision of 71.5%, and an F1-score of 71.74%. These results demonstrate that neighborhood-based learning contributed to an average improvement of 5.14% in accuracy and 4.49% in F1-score, underscoring the importance of contextual awareness in cyber violence detection. These results highlight the significance of contextual awareness in deep learning-based text classification and underscore the potential of our approach for real-world​ applications.

互联网的广泛使用导致了社交网络的迅速扩张,使个人更容易在网上分享内容。然而,这也增加了网络暴力的流行,有必要开发自动检测方法。基于深度学习的算法已被证明在识别暴力内容方面是有效的,但现有的模型往往难以理解上下文的细微差别和隐含的网络暴力形式。为了解决这一限制,我们提出了一种新的深度多输入递归神经网络架构,该架构在训练过程中结合了基于邻域的上下文信息。使用Jaccard相似度度量来构建输入文本的邻域,允许模型利用周围的上下文来改进特征提取。该模型结合了Bi-LSTM和GRU网络,有效地捕获了顺序依赖关系和上下文关系。在现实世界的网络暴力数据集上对该模型进行了评估,在纳入基于邻居的学习时,该模型的准确率为94.29%,召回率为81%,精度为72%,f1得分为76.23%。在没有上下文信息的情况下,该模型的准确率为89.15%,召回率为72.00%,精密度为71.5%,f1得分为71.74%。这些结果表明,基于社区的学习使网络暴力检测的准确率平均提高了5.14%,f1得分平均提高了4.49%,这凸显了语境意识在网络暴力检测中的重要性。这些结果突出了上下文感知在基于深度学习的文本分类中的重要性,并强调了我们的方法在现实世界应用中的潜力。
{"title":"An Efficient Deep Learning-Based Framework for Predicting Cyber Violence in Social Networks","authors":"Younes Fayand Fathabad,&nbsp;Mohammad Ali Balafar,&nbsp;Amin Golzari Oskouei,&nbsp;Kamal Koohi","doi":"10.1155/cplx/2750326","DOIUrl":"https://doi.org/10.1155/cplx/2750326","url":null,"abstract":"<div>\u0000 <p>The widespread use of the internet has led to the rapid expansion of social networks, making it easier for individuals to share content online. However, this has also increased the prevalence of cyber violence, necessitating the development of automated detection methods. Deep learning-based algorithms have proven effective in identifying violent content, yet existing models often struggle with understanding contextual nuances and implicit forms of cyber violence. To address this limitation, we propose a novel deep multi-input recurrent neural network architecture that incorporates neighborhood-based contextual information during training. The Jaccard similarity metric is employed to construct neighborhoods of input texts, allowing the model to leverage surrounding context for improved feature extraction. The proposed model combines Bi-LSTM and GRU networks to capture both sequential dependencies and contextual relationships effectively. The proposed model was evaluated on a real-world cyber violence dataset, achieving an accuracy of 94.29%, recall of 81%, precision of 72%, and an F1-score of 76.23% when incorporating neighborhood-based learning. Without contextual information, the model attained an accuracy of 89.15%, recall of 72.00%, precision of 71.5%, and an F1-score of 71.74%. These results demonstrate that neighborhood-based learning contributed to an average improvement of 5.14% in accuracy and 4.49% in F1-score, underscoring the importance of contextual awareness in cyber violence detection. These results highlight the significance of contextual awareness in deep learning-based text classification and underscore the potential of our approach for real-world​ applications.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/2750326","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143938866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Stability and Bifurcation in a Discretized Predator–Prey Model With Holling Type III Response and Prey Refuge Via Piecewise Constant Argument Method 用分段常参数法研究具有Holling III型响应和猎物避难所的离散捕食者-食饵模型的稳定性和分岔性
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-12 DOI: 10.1155/cplx/4542190
Faisal Alsharif, Rizwan Ahmed, Ibrahim Alraddadi, Mohammed Alsubhi, Muhammad Amer, Md. Jasim Uddin

This study explores the dynamics of a discrete-time predator–prey system, incorporating a Holling type III functional response and prey refuge, through the piecewise constant argument method. This method keeps things consistent and prevents negative population values, which is often a drawback of older techniques. We take a closer look at fixed points, exploring their existence and stability. We identify the conditions that lead to period-doubling and Neimark–Sacker bifurcations, and we back up our findings with numerical simulations. Our findings emphasize how important the predation coefficient is for keeping ecological balance and show that, in this model setup, the refuge for prey has a minimal effect on the stability of the system. These insights help us better understand the relationships between predators and their prey, providing valuable guidance for conserving biodiversity and managing ecosystems.

本研究通过分段常数参数方法探讨了一个包含Holling III型功能响应和猎物避难所的离散时间捕食者-猎物系统的动力学。这种方法使事情保持一致,并防止负的人口值,这通常是旧技术的缺点。我们仔细观察固定点,探索它们的存在性和稳定性。我们确定了导致周期加倍和内马克-萨克分岔的条件,并用数值模拟来支持我们的发现。我们的研究结果强调了捕食系数对保持生态平衡的重要性,并表明,在这个模型设置中,猎物的避难所对系统稳定性的影响很小。这些见解有助于我们更好地理解捕食者和猎物之间的关系,为保护生物多样性和管理生态系统提供有价值的指导。
{"title":"A Study of Stability and Bifurcation in a Discretized Predator–Prey Model With Holling Type III Response and Prey Refuge Via Piecewise Constant Argument Method","authors":"Faisal Alsharif,&nbsp;Rizwan Ahmed,&nbsp;Ibrahim Alraddadi,&nbsp;Mohammed Alsubhi,&nbsp;Muhammad Amer,&nbsp;Md. Jasim Uddin","doi":"10.1155/cplx/4542190","DOIUrl":"https://doi.org/10.1155/cplx/4542190","url":null,"abstract":"<div>\u0000 <p>This study explores the dynamics of a discrete-time predator–prey system, incorporating a Holling type III functional response and prey refuge, through the piecewise constant argument method. This method keeps things consistent and prevents negative population values, which is often a drawback of older techniques. We take a closer look at fixed points, exploring their existence and stability. We identify the conditions that lead to period-doubling and Neimark–Sacker bifurcations, and we back up our findings with numerical simulations. Our findings emphasize how important the predation coefficient is for keeping ecological balance and show that, in this model setup, the refuge for prey has a minimal effect on the stability of the system. These insights help us better understand the relationships between predators and their prey, providing valuable guidance for conserving biodiversity and managing ecosystems.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/4542190","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143938856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nonlinear Epidemic Model With Media Coverage: Stability, Bifurcation, and Control in a Population With Pre-Existing Immunity 具有媒体覆盖的非线性流行病模型:稳定性、分岔和具有预先免疫人群的控制
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-12 DOI: 10.1155/cplx/1572080
Mohammad Idrees, Nigar Ali, Ihtisham Ul Haq, Imtiaz Ahmad, Mohammed Daher Albalwi, Md. Haider Ali Biswas

This paper proposes a deterministic nonlinear epidemic model, , incorporating media coverage for the analysis of infectious disease transmission dynamics, considering quarantine and isolation control strategies in a community with pre-existing immunity, and taking into account both asymptomatic and symptomatic infections. The model examines two equilibria: the disease-free equilibrium and a unique endemic equilibrium, investigating their existence and local stability concerning the effective reproduction number, Re. In addition, global stability analysis of these equilibria is conducted. Media coverage is found to have no effect on Re but plays a crucial role in mitigating the disease burden by reducing the number of infectious individuals at the endemic steady state and decreasing the infection peak. A new method is introduced to estimate the coefficients of media coverage. Based on the findings of central manifold theory, it is observed that when Re exceeds unity, a transcritical bifurcation takes place in the system, leading to the asymptotic stability of the endemic equilibrium. Moreover, it is noted that the effectiveness of quarantine and isolation at the population level depends on the transmission rate among isolated and quarantined individuals, while higher pre-existing immunity in the population reduces the infection peak and hastens its occurrence. Theoretical results are validated through simulations, and sensitivity analysis is conducted for the effectiveness of Re with respect to model parameters.

本文提出了一个确定性的非线性流行病模型,将媒体报道纳入传染病传播动力学分析,考虑已有免疫社区的检疫和隔离控制策略,并考虑无症状感染和有症状感染。该模型考察了两种均衡:无病均衡和唯一地方性均衡,考察了它们的存在性和关于有效繁殖数Re的局部稳定性,并对这两种均衡进行了全局稳定性分析。发现媒体报道对Re没有影响,但通过减少地方性稳定状态的感染个体数量和降低感染高峰,在减轻疾病负担方面起着至关重要的作用。提出了一种估计媒体覆盖系数的新方法。根据中心流形理论的发现,当Re超过单位时,系统会发生跨临界分岔,从而导致地方性平衡的渐近稳定。此外,需要指出的是,在人群层面上,检疫隔离的有效性取决于被隔离和被隔离个体之间的传播率,而人群中较高的预先免疫力会降低感染高峰并加速其发生。通过仿真验证了理论结果,并对Re对模型参数的有效性进行了敏感性分析。
{"title":"Nonlinear Epidemic Model With Media Coverage: Stability, Bifurcation, and Control in a Population With Pre-Existing Immunity","authors":"Mohammad Idrees,&nbsp;Nigar Ali,&nbsp;Ihtisham Ul Haq,&nbsp;Imtiaz Ahmad,&nbsp;Mohammed Daher Albalwi,&nbsp;Md. Haider Ali Biswas","doi":"10.1155/cplx/1572080","DOIUrl":"https://doi.org/10.1155/cplx/1572080","url":null,"abstract":"<div>\u0000 <p>This paper proposes a deterministic nonlinear epidemic model, <span></span><math></math>, incorporating media coverage for the analysis of infectious disease transmission dynamics, considering quarantine and isolation control strategies in a community with pre-existing immunity, and taking into account both asymptomatic and symptomatic infections. The model examines two equilibria: the disease-free equilibrium and a unique endemic equilibrium, investigating their existence and local stability concerning the effective reproduction number, <i>R</i><sub><i>e</i></sub>. In addition, global stability analysis of these equilibria is conducted. Media coverage is found to have no effect on <i>R</i><sub><i>e</i></sub> but plays a crucial role in mitigating the disease burden by reducing the number of infectious individuals at the endemic steady state and decreasing the infection peak. A new method is introduced to estimate the coefficients of media coverage. Based on the findings of central manifold theory, it is observed that when <i>R</i><sub><i>e</i></sub> exceeds unity, a transcritical bifurcation takes place in the system, leading to the asymptotic stability of the endemic equilibrium. Moreover, it is noted that the effectiveness of quarantine and isolation at the population level depends on the transmission rate among isolated and quarantined individuals, while higher pre-existing immunity in the population reduces the infection peak and hastens its occurrence. Theoretical results are validated through simulations, and sensitivity analysis is conducted for the effectiveness of <i>R</i><sub><i>e</i></sub> with respect to model parameters.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/1572080","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143939196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Venture Capital and Social Responsibility Behavior: An Evolutionary Game-Based Approach 风险投资与社会责任行为:基于进化博弈的方法
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-11 DOI: 10.1155/cplx/6661472
Yuzhong Lu, Guillermo A. Buitrago, Meng Li

This study introduces a novel evolutionary game-based model to explore the dynamic interplay between venture capital (VC) institutions and their invested firms in adopting corporate social responsibility (CSR) practices, with a focus on the moderating role of government supervision. With CSR gaining prominence in VC-backed firm ecosystems, understanding these dynamics is critical. Verified through numerical simulations, the model examines system evolution under scenarios with and without government supervision. Key findings include the following: (1) VC-backed firms are more likely to adopt CSR practices when VCs prioritize long-term investment strategies, whereas short-term strategies centered on shareholder value hinder CSR efforts; (2) factors such as VC equity share, CSR costs, and benefits significantly influence CSR adoption; and (3) government incentives can promote CSR and accelerate convergence toward ideal outcomes, though with limited impact. This research advances the understanding of the VC-CSR relationship, offering theoretical insights and practical recommendations to foster responsible investment and business practices.

本文引入了一种基于进化博弈的新模型,探讨了风险投资机构与被投资企业在企业社会责任实践中的动态相互作用,并重点研究了政府监管的调节作用。随着企业社会责任在风投支持的公司生态系统中日益突出,了解这些动态至关重要。通过数值模拟验证,该模型考察了在有和没有政府监督的情况下的系统演化。主要发现如下:(1)当风险投资优先考虑长期投资策略时,风险投资支持的公司更有可能采取企业社会责任实践,而以股东价值为中心的短期战略阻碍了企业社会责任的努力;(2)风险投资股权比例、企业社会责任成本、企业社会责任收益等因素显著影响企业社会责任采纳;(3)政府激励可以促进企业社会责任,加速向理想结果趋同,但影响有限。本研究促进了对风险投资与企业社会责任关系的理解,为促进负责任的投资和商业实践提供了理论见解和实践建议。
{"title":"Venture Capital and Social Responsibility Behavior: An Evolutionary Game-Based Approach","authors":"Yuzhong Lu,&nbsp;Guillermo A. Buitrago,&nbsp;Meng Li","doi":"10.1155/cplx/6661472","DOIUrl":"https://doi.org/10.1155/cplx/6661472","url":null,"abstract":"<div>\u0000 <p>This study introduces a novel evolutionary game-based model to explore the dynamic interplay between venture capital (VC) institutions and their invested firms in adopting corporate social responsibility (CSR) practices, with a focus on the moderating role of government supervision. With CSR gaining prominence in VC-backed firm ecosystems, understanding these dynamics is critical. Verified through numerical simulations, the model examines system evolution under scenarios with and without government supervision. Key findings include the following: (1) VC-backed firms are more likely to adopt CSR practices when VCs prioritize long-term investment strategies, whereas short-term strategies centered on shareholder value hinder CSR efforts; (2) factors such as VC equity share, CSR costs, and benefits significantly influence CSR adoption; and (3) government incentives can promote CSR and accelerate convergence toward ideal outcomes, though with limited impact. This research advances the understanding of the VC-CSR relationship, offering theoretical insights and practical recommendations to foster responsible investment and business practices.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/6661472","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143939072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolutionary Game Analysis of Knowledge Sharing in Enterprise Sponsored Virtual Communities Considering User Characteristics 考虑用户特征的企业赞助虚拟社区知识共享演化博弈分析
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-08 DOI: 10.1155/cplx/7549833
Zhihui Ding, Zuoming Lu, Wenlong Zhu

Enterprise sponsored virtual communities (ESVC) are important platforms for user knowledge sharing. User characteristics, as influential factors in these communities, impact the evolution of knowledge sharing processes. In this study, a knowledge sharing evolutionary game model that considers the influence of user characteristics was constructed. A payoff matrix was established, and stable points were identified for further analysis. Simulation analysis was conducted to explore the impact of changes in user characteristics on the knowledge sharing strategies of both parties. This study revealed the following findings: First, the knowledge reservoir of ESVC users affects their willingness to share knowledge, with ordinary users’ willingness initially increasing and then decreasing as their knowledge reservoirs grow. Second, the willingness of leading users to share knowledge initially decreases and then increases as their knowledge reservoirs expand. Third, improvements in the knowledge absorption and transformation capabilities of both leading and ordinary users promote knowledge sharing behaviour, although the extent of this impact differs between the two groups.

企业赞助的虚拟社区(ESVC)是用户知识共享的重要平台。用户特征作为这些社区的影响因素,影响着知识共享过程的演变。本文构建了一个考虑用户特征影响的知识共享进化博弈模型。建立收益矩阵,确定稳定点进行进一步分析。通过仿真分析,探讨用户特征变化对双方知识共享策略的影响。研究发现:第一,ESVC用户的知识储备影响其知识分享意愿,随着知识储备的增加,普通用户的知识分享意愿先增加后降低;其次,随着知识储备的扩大,领导用户分享知识的意愿先降低后增加。第三,领先用户和普通用户的知识吸收和转化能力的提高都促进了知识共享行为,尽管这种影响的程度在两个群体之间有所不同。
{"title":"Evolutionary Game Analysis of Knowledge Sharing in Enterprise Sponsored Virtual Communities Considering User Characteristics","authors":"Zhihui Ding,&nbsp;Zuoming Lu,&nbsp;Wenlong Zhu","doi":"10.1155/cplx/7549833","DOIUrl":"https://doi.org/10.1155/cplx/7549833","url":null,"abstract":"<div>\u0000 <p>Enterprise sponsored virtual communities (ESVC) are important platforms for user knowledge sharing. User characteristics, as influential factors in these communities, impact the evolution of knowledge sharing processes. In this study, a knowledge sharing evolutionary game model that considers the influence of user characteristics was constructed. A payoff matrix was established, and stable points were identified for further analysis. Simulation analysis was conducted to explore the impact of changes in user characteristics on the knowledge sharing strategies of both parties. This study revealed the following findings: First, the knowledge reservoir of ESVC users affects their willingness to share knowledge, with ordinary users’ willingness initially increasing and then decreasing as their knowledge reservoirs grow. Second, the willingness of leading users to share knowledge initially decreases and then increases as their knowledge reservoirs expand. Third, improvements in the knowledge absorption and transformation capabilities of both leading and ordinary users promote knowledge sharing behaviour, although the extent of this impact differs between the two groups.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/7549833","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143919911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamics and Robust Synchronization of an Oscillator With Cubic and Signum Terms 三次项和sgn项振荡器的动力学与鲁棒同步
IF 1.7 4区 工程技术 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-02 DOI: 10.1155/cplx/9968119
Fernando E. Serrano, Viet-Thanh Pham, Giuseppe Grassi

In recent years, there has been a marked surge in research focused on nonlinear oscillators. Among these, a particular emphasis has been placed on a class of oscillators distinguished by their concealed attractors, drawing considerable attention due to their unique characteristics. This paper delves into the exploration of an elegant oscillator belonging to this distinctive class. Despite comprising five terms and lacking equilibrium points, this oscillator displays remarkably intricate dynamics. The study covers various aspects such as chaos, hidden attractors, offset boosting, and notably, different strange attractors exhibited by this oscillator. Additionally, approaches involving synchronization for such oscillators are introduced. Apart from the presentation of the novel chaotic oscillator, the synchronization of a nominal and uncertain chaotic system is evinced by the sliding mode technique (super-twisting algorithm) in the first case, and a robust controller is synthesized, respectively. The appropriate Lyapunov functions are implemented in the two synchronization strategies leading to obtain suitable control strategies to achieve fast and accurate control laws. The respective simulations are performed along with the conclusions of this work.

近年来,对非线性振荡器的研究有了显著的发展。其中,特别强调了一类以其隐藏吸引子为特征的振子,由于其独特的特性而引起了相当大的关注。本文深入探讨了属于这一独特类别的优雅振荡器。尽管该振子由五项组成且缺乏平衡点,但却表现出非常复杂的动力学。研究涵盖了混沌、隐藏吸引子、抵消助推等各个方面,特别是该振子所表现出的不同奇异吸引子。此外,还介绍了涉及这类振荡器同步的方法。除了提出新的混沌振荡器外,在第一种情况下,采用滑模技术(超扭转算法)证明了标称混沌系统和不确定混沌系统的同步,并分别合成了鲁棒控制器。在两种同步策略中实现适当的Lyapunov函数,从而获得合适的控制策略,以实现快速准确的控制律。根据本文的结论,进行了相应的仿真。
{"title":"Dynamics and Robust Synchronization of an Oscillator With Cubic and Signum Terms","authors":"Fernando E. Serrano,&nbsp;Viet-Thanh Pham,&nbsp;Giuseppe Grassi","doi":"10.1155/cplx/9968119","DOIUrl":"https://doi.org/10.1155/cplx/9968119","url":null,"abstract":"<div>\u0000 <p>In recent years, there has been a marked surge in research focused on nonlinear oscillators. Among these, a particular emphasis has been placed on a class of oscillators distinguished by their concealed attractors, drawing considerable attention due to their unique characteristics. This paper delves into the exploration of an elegant oscillator belonging to this distinctive class. Despite comprising five terms and lacking equilibrium points, this oscillator displays remarkably intricate dynamics. The study covers various aspects such as chaos, hidden attractors, offset boosting, and notably, different strange attractors exhibited by this oscillator. Additionally, approaches involving synchronization for such oscillators are introduced. Apart from the presentation of the novel chaotic oscillator, the synchronization of a nominal and uncertain chaotic system is evinced by the sliding mode technique (super-twisting algorithm) in the first case, and a robust controller is synthesized, respectively. The appropriate Lyapunov functions are implemented in the two synchronization strategies leading to obtain suitable control strategies to achieve fast and accurate control laws. The respective simulations are performed along with the conclusions of this work.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/9968119","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Complexity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1