Keywords: information dissemination, social networking services (SNS), information value, user behavior, homotopy perturbation method, numerical simulation
American Journal of Modeling and Optimization, 2015 3 (1),
pp 26-34.
DOI: 10.12691/ajmo-3-1-4
Received February 02, 2015; Revised March 10, 2015; Accepted March 20, 2015
Copyright © 2015 Science and Education Publishing. All Rights Reserved.
1. Introduction
Social networking service is a service which is based on web 2.0 technology of social network. These days the scope of social networking has spread to all areas of the society and has become one of the tools of mass media communication with greater social. Social network has provided great facility by its quick, direct and wide range of information dissemination. On the other hand Information dissemination network has various demerits due to being dispersive, massive and uncontrollable which may result into public opinion problem by spreading false or fake information. Therefore this research paper is an eye opener for more research to be conducted on propagation mechanism of information on social networking which can be a helping hand towards better use of internal facility. The research on propagation mechanism of information on social networking which can be a helping hand towards better use of internet facility and analyze the mode of information dissemination.
The research on propagation mechanism of information dissemination began years ago by Kermark et al. [1] who proposed the epidemic mode of SIR with the application of dynamics method in 1927 which was provided an idea to use mathematical tools to study the propagation mechanism of infectious diseases. In 1991 Anderson et al. [2] added the exposed state to SIR model and then built a better SEIR model by analyzing propagation patterns of a variety of infectious diseases. In recent times a member of researches on propagation mechanism has been conducted using methods of propagation mechanism of infectious diseases for references. For example Yuan Hua et al. [3] modified SEIR model and came up with a new model known as E-SEIR for e-mail viruses spread.
E-SEIR model dealt with the influence of user behavior and anti-virus technology one-mail virus diffusion. Other researchers HuJieying et al. 1 [4] proposed IM- SEIR model for instant messaging network to study the influence of probabilities of status evolvement on information dissemination.
As per the previous models they made an assumption that the node passed messages to its neighbors in the same probability without taking the influence of information values and the number of infected nodes around every node. The social network of recent times gives the users the opportunity to make a message the moment it’s received. Hence the existing mode does not applied to social network. Due to the increase on the numbers of social network the user generally is much involved with its multiple social networks simultaneously. Information transmission from one social network to another is frequent. The S-SEIR model is proposed in this paper keeping in mind information value and user behavior through the analysis of information dissemination mode around different social networks. This S-SEIR model is adaptive to information dissemination characteristics on social network and the influence of correlation parameters on information dissemination is discussed as well.
2. Mathematical Formulation of the Initial Value Problem
As we refer Yancho [5] paper we define users in social network as nodes and the relation between the users as the edge between nodes. Information on social network spread along the edge between the nodes. The nodes are classified into four categories according to the propagation mechanism of information, such as publication node, communication node, immune node and uninfected node. Publication node publishes the original information. When the probability of information audit equals to one, it means that this social network does not have audit mechanism. Communication node receives message from its neighbor nodes and has the capacity to spread the information in or outside website. Immune node receives message from its neighbors but without spread the message. Infected node does not receive or browse the information from its neighbor temporarily but has the opportunity to receive the message. Communication node and immune node together referred as infected node. Considering the propagation mechanism of information on social network and having the basic knowledge of SEIR model, the S-SEIR model is constructed which is shown in Figure (1). In this paper, Hethcote [6] parameter setting is followed information value should lies between 0 to 1 and the sum of user behavior values are . As in the S-SEIR model [1], we define the following notations; N – Number of node; S – Susceptible node; E – Exposed node; I – Infected node; R – Rejected node.
Considering S-SEIR model, here is a continuous differentiable function of the time. The number of nodes receiving information per minute is , the nodes could not receive information and nodes browsing and spreading the information to the other website. So the equations at time is as follows
| (1) |
The above equation converted into differential form as
| (2) |
Similarly, other differential equations [1] can be worked out and the corresponding differential equations of S-SEIR model are as follows:
| (3) |
| (4) |
| (5) |
transfer efficiency function refers to paper of Xiaoyuan [7].
| (6) |
Where -dimensionless time, -Number of Susceptible node, - Number of Exposed node, - Number of Infected node, -Number of Rejected node, -characteristic scale factor, -Information value, -Probability value of SàR node, -Probability value of EàI node, -Probability value of SàE node, -Probability value of SàE node,- Probability value of SàE node, -Probability value of EàR node.
| (7) |
3. Analytical Solution of the Information Dissemination Model Using Homotopy Perturbation Method
Linear and non-linear phenomena are of fundamental importance in various fields of science and engineering. Most models of real – life problems are still very difficult to solve. Therefore, approximate analytical solutions such as Homotopy perturbation method (HPM) [8-22][8] were introduced. This method is the most effective and convenient ones for both linear and non-linear equations. Perturbation method is based on assuming a small parameter. The majority of non-linear problems, especially those having strong non-linearity, have no small parameters at all and the approximate solutions obtained by the perturbation methods, in most cases, are valid only for small values of the small parameter. Generally, the perturbation solutions are uniformly valid as long as a scientific system parameter is small. However, we cannot rely fully on the approximations, because there is no criterion on which the small parameter should exist. Thus, it is essential to check the validity of the approximations numerically and/or experimentally. To overcome these difficulties, HPM have been proposed recently.
Many authors have applied the Homotopy perturbation method (HPM) to solve the nonlinear boundary value problem in physics and engineering sciences [8, 9, 15, 16]. This method is also used to solve some of the non-linear problem in physical sciences [11-16][11]. This method is a combination of Homotopy in topology and classic perturbation techniques. Ji-Huan He used to solve the Lighthill equation [11], the Diffusion equation [12] and the Blasius equation [13]. The HPM is unique in its applicability, accuracy and efficiency. The HPM uses the imbedding parameter p as a small parameter, and only a few iterations are needed to search for an asymptotic solution. The approximate analytical solution of eqns.(2)-(5) using the Homotopy perturbation method [8-22][8] is given by
| (7) |
| (8) |
| (9) |
| (10) |
where are defined as follows,
| (11) |
| (12) |
| (13) |
| (14) |
| (15) |
| (16) |
| (17) |
| (18) |
| (19) |
| (20) |
| (21) |
| (22) |
| (23) |
| (24) |
4. Numerical simulation
The non-linear differential eqns. (2)-(5) are also solved numerically. We have used the function in Matlab/Scilab software to solve the initial-boundary value problems for the nonlinear differential equations numerically. This numerical solution is compared with our analytical results in figures (2)– (3). Upon comparison, it gives a satisfactory agreement for the values of the dimensionless time from the range The Matlab/Scilab program is also given in Appendix C.
5. Results and discussions
In this section we discuss the effect of information value , and the user behavior in the information dissemination on social network. Figure 2 – Figure 5 represent the function nodes versus the dimensionless time for different values of dimensionless parameters. From Figure 2 and Figure 4 it is clear that when increases the number of susceptible node is decreases from 10000. At the same time, the number of exposed node , the number of infected node and the number of rejected node are increases from 0 in some fixed values of . The number of infected node and the number of exposed node are remarkably increases when the information . When the information value the system is inactive status. From Figure 3 and Figure 5 it is clear that when changing the user behavior values show some impact in the information dissemination in some fixed value of . The changes in the value of the parameter affects the number of rejected nodes.
Figure 1. S-SEIR model for information dissemination
Figure 2 (a) The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn. (2)-(5) for the fixed value
where
Figure 2(b). The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn.(2)-(5) for the fixed values of
where
Figure 2(c). The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn. (2)-(5) for the fixed values of
where
Figure 2(d). The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn. (2)-(5) for the fixed values of
where
Figure 3(a). The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn.(2)-(5) for the fixed value of
where
Figure 3(b) The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn.(2)-(5) for the fixed value of
where
Figure 3(c) The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn.(2)-(5) for the fixed value of
where
Figure 3(d) The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn.(2)-(5) for the fixed value of
where
Figure 4(a) The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn.(2)-(5) for the fixed value of
where
Figure 4(b). The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn.(2)-(5) for the fixed value of
where
Figure 4(c). The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn.(2)-(5) for the fixed value of
where
Figure 4(d). The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn.(2)-(5) for the fixed value of
where
Figure 5(a). The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn.(2)-(5) for the fixed value of
where
Figure 5(b) The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn.(2)-(5) for the fixed value of
where
Figure 5(c) The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn.(2)-(5) for the fixed value of
where
Figure 5(d) The dimensionless function nodes
are computed with respect to the dimensionless time
using the eqn.(2)-(5) for the fixed value of
where
6. Conclusion
The primary result of the work is to give an analytical and numerical solution of the non-linear S-SEIR model.
A simple closed form of analytical expressions of the number susceptible node eqn. (7) and the number of exposed node eqn. (8) and the number of infected node eqn. (9) and the number of rejected node eqn. (10) are given in terms of . The analytical expressions for the S-SEIR model are derived using the Homotopy perturbation method. We have also presented graphical notations for impacting factors in S-SEIR model. A good agreement between the analytical results and a numerical simulation is observed. This HPM method is an extremely simple method and it is also a promising method to solve other non-linear differential equations.
Acknowledgement
The authors are thankful to Shri. S. Natanagopal, Secretary, the Madura College Board, Dr. R. Murali, The Principal and Mr. S. Muthukumar, Head of the Department of Mathematics, The Madura College (Autonomous), Madurai, Tamil Nadu, India for their constant encouragement.
References
[1] | RuzhiXu, Heli Li and Changming Xing, “Research on information Dissemination Model for Social Networking Services,” International Journal of Computer Science and Application, vol. 2 (1), 2013. |
| In article | |
|
[2] | Anderson, R M. and May, R M., “Infectious diseases of humans’ dynamics and control,” Oxford University Press, oxford, 1991. |
| In article | |
|
[3] | Hua Yuan and Guoqing Chen, “Simulation model of E-mail virus propagation and simulation of its influence factors,” Computer Engineering and Design, vol. 27 (11), pp. 1914-1960, 2006. |
| In article | |
|
[4] | Jieying Hu and Wangcheng Zhang, “Research of Information dissemination model on Instant Message network,” Science & Technology for China’s Mass Media, vol. 1, pp. 81-82. 2012. |
| In article | |
|
[5] | Yanchao Zhang, Yun Liu, Haifeng Zhang, Hui Cheng and FeiXiong “The research of information dissemination model on online social network,” PhysicaSinica, 2011. |
| In article | |
|
[6] | Hethcote, H.W., “The mathematics of infectious disease,” SIAM Review, vol. 42 (22000), pp. 599-653. |
| In article | CrossRef |
|
[7] | Xiaoyuan He, Xiafeng Hu and PiLuo “Modeling method Research of Web Information Diffusion Based on Petri Net,” Journal of System Simulation, Vol. 22 (3), 2010. |
| In article | |
|
[8] | Ozis, T., Yildirim, A., “A Comparative study of He’s Homotopy perturbation method for determining frequency-amplitude relation of a nonlinear oscillator with discontinuities,” Int. J. Nonlinear Sci. Numer. Simulat, vol. 8, pp. 243-248. 2007. |
| In article | CrossRef |
|
[9] | Li, S.J.andLiu, Y. X., “An Improved approach to nonlinear dynamical system identification using PID neural networks,” Int. J. Nonlinear Sci. Nume. Simulat, vol. 7, pp. 177-182.2006. |
| In article | |
|
[10] | Ananthaswamy, v. and Sahaya Amalaraj, L „Comparision of Homotopy perturbation method and recursive procedure for commensal host rate for both the species,”American journal of Applied mathematics, vol. 2 (5), pp. 149-154. 2014. |
| In article | |
|
[11] | He, J.H., “Homotopy perturbation technique,” Comp Meth. Appl. Mech. Eng, vol. 178, pp. 257-262.1999. |
| In article | |
|
[12] | He, J. H., “Homotopy perturbation method: a new nonlinear analytical technique,” Appl. Math. Comput, vol. 135, pp. 73-79. 2003. |
| In article | CrossRef |
|
[13] | He,J. H., “A simple perturbation approach to Blasius equation,” Appl. Math. Comput, vol. 140, pp. 217-222. 2003. |
| In article | CrossRef |
|
[14] | He, J.H., “Application of homotopy perturbation method to nonlinear wave equations,” Chaos Solitons Fractals. vol. 26, pp. 295-300. 2005. |
| In article | CrossRef |
|
[15] | He,J.H., “ Homotopy perturbation method for solving boundary value problems,” Phys. Lett. A, vol. 350, pp 87-88. 2006. |
| In article | CrossRef |
|
[16] | GhasemiM. And TavassoliKajani M., “Application of He’s homotopy perturbation method for linear and nonlinear heat equations,” Mathematics Scientific Journal, vol (1), pp. 17-27. 2008. |
| In article | |
|
[17] | Ananthaswamy, v. and Jeyabarathi, P., “Application of the Homotopy perturbation method to the steady state Brusselator mode,”Advances in chemical sciences, vol. 3 (3), pp. 31-39, 2014. |
| In article | |
|
[18] | Ariel,P.D., “Alternative approaches to construction of Homotopy perturbation Algorithms,” Nonlinear. Sci. Letts. A. vol. 1, pp. 43-52.2010. |
| In article | |
|
[19] | Ananthaswamy,V. and Rajendran, L., “Approximate analytical solution of non-linear kinetic equation in a porous pellet,” Global Journal of pure and applied mathematics, vol. 8 (2), pp. 101-111. 2012. |
| In article | |
|
[20] | Ananthaswamy,V. and Rajendran, L., “Analytical solution of non-isothermal diffusion-reaction processeses and effectiveness factors,” ISRN-Physical chemistry, pp. 1-14. 2013. |
| In article | |
|
[21] | Ananthaswamy, V., Ganesan, S., and Rajendran, L., “Approximate analytical solution of non-linear boundary value problem in steady state flow of a liquid film: Homotopy perturbation method,” International Journal of applied sciences and engineering research, vol. 2 (5), pp. 569-578.2013. |
| In article | |
|
[22] | Ananthaswamy,V., and Rajendran, L., “ Analytical solution of two-point non-linear boundary value problems in a porous catalyst particles,” International Journal of Mathematical Archive, vol. 3 (3), pp. 810-821.2012. |
| In article | |
|
Appendix A
Basic Concept of Homotopy Perturbation Method To explain this method, let us consider the following function:
| (A.1) |
with the boundary conditions of
| (A.2) |
where is a general differential operator, is a boundary operator, is a known analytical function and is the boundary of the domain . In general, the operator can be divided into a linear part and a non-linear part. Eqn. (A.1) can therefore be written as
| (A.3) |
By the Homotopy technique, we construct a Homotopy that satisfies
| (A.4) |
| (A.5) |
where p[0, 1] is an embedding parameter, and is an initial approximation of eqn. (A. 1) that satisfies the boundary conditions. From eqn. (A. 4) and eqn. (A. 5), we have
| (A.6) |
| (A.7) |
When p=0, eqn. (A.4) and eqn. (A.5) become linear equations. When p =1, they become non-linear equations. The process of changing p from zero to unity is that of to . We first use the embedding parameter as a “small parameter” and assume that the solutions of eqn. (A. 4) and eqn. (A. 5) can be written as a power series in:
| (A.8) |
Setting results in the approximate solution of Eqn. (A. 1):
| (A.9) |
This is the basic idea of the HPM.
Appendix B
Solution of the Initial Value Problem eqns.(2)-(5) Using Homotopy Perturbation MethodIn this Appendix, we indicate how the eqns. (7)-(10) are derived in this paper. To find the solutions of eqns. (2)-(5), we construct the homotopy as follows:
| (B.1) |
| (B.2) |
| (B.3) |
| (B.4) |
The analytical solutions of (B. 1), (B. 2), (B. 3) and (B. 4) are
| (B.5) |
| (B.6) |
| (B.7) |
| (B.8) |
Substituting the eqns. (B. 5) to (B. 6) in (B. 1) to (B. 4) respectively we get
| (B.9) |
| (B.10) |
| (B.11) |
| (B.12) |
The comparing the coefficient of like powers of p in
| (B.13) |
| (B.14) |
| (B.15) |
| (B.16) |
| (B.17) |
| (B.18) |
| (B.19) |
| (B.20) |
| (B.21) |
| (B.22) |
| (B.23) |
| (B.24) |
The initial approximations are given by
| (B.25) |
| (B.26) |
Solving the eqns. (B. 13)-(B. 24) and using the initial approximations the eqns. (B. 25) & (B. 26). We can obtain the following results
| (B.27) |
| (B.28) |
| (B.29) |
| (B.30) |
| (B.31) |
| (B.33) |
| (B.34) |
| (B.35) |
| (B.36) |
| (B.37) |
| (B.38) |
| (B.39) |
| (B.40) |
| (B.41) |
| (B.42) |
After putting (B. 27)-(B. 29) in (B. 39); (B. 30)-(B. 32) in (B. 40); (B. 31)-(B. 35) in (B. 41) and (B. 36)-(B. 38) in (B. 42). We obtain the solution in the text the eqns. (7)-(10).
Appendix C
Matlab/Scilab Program to Find the Numerical Solution of non-linear Equations (2)-(5)function s-seir
options= odeset ('RelTol', 1e-6, 'Stats', 'on');
%initial conditions
x0 = [10000; 0; 0;0];
tspan = [0,10];
tic[t,x]=ode45(@TestFunction, tspan, x0, options);
toc
figure
hold on
plot(t, x(:,1))
%plot(t, x(:,2))
%plot(t, x(:,3))
%plot(t, x(:,4))
legend('S','E','I','R')
ylabel('x')
xlabel('t')
return
function [dx_dt]= TestFunction(t,x)
n=4; a1=0.03; a2=0.45; a3=0.1; d1=0.4; d2=0.4; d3=0.2; v0=0.12;
dx_dt(1)=(-v0)*(exp(-n*t))*x(1)-a1*x(1)+d1*x(3);
dx_dt(2)=((v0)*(exp(-n*t)))*x(1)+d2*x(3)-((a2+a3)*x(2));
dx_dt(3)=(a2*x(2))-((d1+d2+d3)*x(3));
dx_dt(4)=(a3*x(2))+(a1*x(1)+d3*x(3));
dx_dt = dx_dt';
return
Appendix D
Nomenclature