<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Phys.</journal-id>
<journal-title>Frontiers in Physics</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Phys.</abbrev-journal-title>
<issn pub-type="epub">2296-424X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">1404464</article-id>
<article-id pub-id-type="doi">10.3389/fphy.2024.1404464</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Physics</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>The information propagation mechanism of individual heterogeneous adoption behavior under the heterogeneous network</article-title>
<alt-title alt-title-type="left-running-head">Cui and Zhu</alt-title>
<alt-title alt-title-type="right-running-head">
<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fphy.2024.1404464">10.3389/fphy.2024.1404464</ext-link>
</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Cui</surname>
<given-names>Shiru</given-names>
</name>
<uri xlink:href="https://loop.frontiersin.org/people/2676855/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/visualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/software/"/>
<role content-type="https://credit.niso.org/contributor-roles/project-administration/"/>
<role content-type="https://credit.niso.org/contributor-roles/investigation/"/>
<role content-type="https://credit.niso.org/contributor-roles/formal-analysis/"/>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Zhu</surname>
<given-names>Xuzhen</given-names>
</name>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1767384/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
</contrib-group>
<aff>
<institution>State Key Laboratory of Networking and Switching Technology</institution>, <institution>Beijing University of Posts and Telecommunications</institution>, <addr-line>Beijing</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/101109/overview">Chengyi Xia</ext-link>, Tiangong University, China</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1066052/overview">Shimin Cai</ext-link>, University of Electronic Science and Technology of China, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2696890/overview">Hai-Feng Zhang</ext-link>, Anhui University, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2696103/overview">Xiaoyang Liu</ext-link>, Chongqing University of Technology, China</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Xuzhen Zhu, <email>zhuxuzhen@bupt.edu.cn</email>
</corresp>
</author-notes>
<pub-date pub-type="epub">
<day>14</day>
<month>06</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="collection">
<year>2024</year>
</pub-date>
<volume>12</volume>
<elocation-id>1404464</elocation-id>
<history>
<date date-type="received">
<day>21</day>
<month>03</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>16</day>
<month>05</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2024 Cui and Zhu.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Cui and Zhu</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>To explore heterogeneous behavior diffusion in the same population under a heterogeneous network, this study establishes a dual-layer heterogeneous network model to simulate the spreading patterns of hesitant individuals and regular individuals in different networks. It analyzes the influence of to investigate heterogeneous behavior diffusion within the same population in a heterogeneous network, this paper establishes a dual-layer heterogeneous network model to simulate the spreading patterns of hesitant individuals and regular individuals in different networks. It analyzes the influence of individuals&#x2019; hesitation states and different spreading patterns in heterogeneous networks on the information diffusion mechanism. In the propagation of this model, when either layer of the dual-layer network becomes the dominant spreading layer, second-order continuous spreading is observed. However, when the regular adoption behavior serves as the dominant spreading layer, its spreading threshold occurs earlier than the spreading threshold when hesitant adoption behavior is the dominant spreading layer. When there is no dominant spreading layer, first-order discontinuous spreading is observed, and the spreading threshold occurs later than the threshold in the presence of a dominant spreading layer. Additionally, the study discovers the existence of cross-phase transitions during the spreading process. The results of theoretical analysis align with the simulation results.</p>
</abstract>
<kwd-group>
<kwd>complex network</kwd>
<kwd>nonlinear dynamics</kwd>
<kwd>behavioral propagation</kwd>
<kwd>heterogeneous network layer</kwd>
<kwd>heterogeneous adoption functions</kwd>
</kwd-group>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Social Physics</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>In the field of network science, the study of social communication has garnered widespread attention among researchers [<xref ref-type="bibr" rid="B1">1</xref>, <xref ref-type="bibr" rid="B2">2</xref>]. It can be applied to analyze financial behaviors [<xref ref-type="bibr" rid="B3">3</xref>, <xref ref-type="bibr" rid="B4">4</xref>], social information diffusion [<xref ref-type="bibr" rid="B5">5</xref>], and emotional contagion [<xref ref-type="bibr" rid="B6">6</xref>]. Furthermore, it can be utilized for disaster prediction [<xref ref-type="bibr" rid="B7">7</xref>] and risk mitigation [<xref ref-type="bibr" rid="B8">8</xref>]. Scholars have explored the mechanisms of social communication through both theoretical analysis and extensive experimental validation. Research has revealed that social communication exhibits certain unique reinforcement effects compared to biological propagation [<xref ref-type="bibr" rid="B9">9</xref>, <xref ref-type="bibr" rid="B10">10</xref>].</p>
<p>In the early stages of research, the most commonly used approach was the threshold model based on memoryless Markov processes [<xref ref-type="bibr" rid="B11">11</xref>]. In this threshold model, a behavior is adopted when the number of adopting neighbors exceeds a predetermined threshold [<xref ref-type="bibr" rid="B12">12</xref>, <xref ref-type="bibr" rid="B13">13</xref>]. Given the small proportion of initial seeds, the initial infection rate is predicted using percolation principles [<xref ref-type="bibr" rid="B14">14</xref>, <xref ref-type="bibr" rid="B15">15</xref>]. Based on the assumption of constant thresholds, because of variations in the average degree, saddle-node bifurcation occurs, leading to a continuous increase and subsequent discontinuous decrease in the final adoption size with increasing network average degree. Research has found that factors such as the initial number of seeds [<xref ref-type="bibr" rid="B16">16</xref>, <xref ref-type="bibr" rid="B17">17</xref>], clustering coefficient [<xref ref-type="bibr" rid="B18">18</xref>], multilayer networks [<xref ref-type="bibr" rid="B19">19</xref>], network temporal dynamics [<xref ref-type="bibr" rid="B20">20</xref>] and time-varying [<xref ref-type="bibr" rid="B21">21</xref>] significantly affect information propagation in the threshold model.</p>
<p>In the field of complex networks, numerous scholars have conducted extensive research on propagation behaviors in single-layer networks. However, studies have shown that multilayer networks better represent real-world social networks. In the context of bio-information networks [<xref ref-type="bibr" rid="B22">22</xref>], individuals can access various information in the information network to execute different strategies in the biological network [<xref ref-type="bibr" rid="B23">23</xref>]. For example, during the COVID-19 pandemic, people could obtain preventive measures through the internet, leading to improved habits and reduced chances of contracting the virus in the biological network. In the case of multilayer information networks, individuals often do not rely on a single channel to interact with the external world. Each person has multiple social channels, such as WeChat, Twitter, Instagram, and more. Thus, in a multilayer network, information does not propagate solely within a single layer but rather disseminates through multiple coupled networks. However, individual information acquisition remains singular [<xref ref-type="bibr" rid="B24">24</xref>]. For instance, on the YouTube platform, users can upload and share video content, and other users can subscribe to their channels. This forms a user-user connectivity network. Each video can be viewed, commented on, and shared by other users, creating a video-user connectivity network. When a user uploads a video, their subscribers can see it in their subscription feed. If these subscribers find the video appealing or valuable, they can choose to share it with their own audience. Consequently, the video spreads through user-to-user sharing in the network. In this example, the social network among users and the video-user connectivity network constitute a multilayer network. Video content propagates through sharing and viewing behaviors among users, and this multilayer network structure can influence the dissemination path, view counts, and impact of videos. In conclusion, multilayer networks better capture the essence of real-world networks, allowing us to simulate human behavior in real-life situations.</p>
<p>With the diversification of information channels and the complexity of information forms, people are living in an era of fragmented information, and the adoption patterns of information have gradually become differentiated and heterogeneous. This is especially true for differentiating information sources. For information channels with low trustworthiness, people may encounter a mix of correct and incorrect information, leading to skepticism towards the information from these channels. Conversely, for information channels with high trustworthiness, such as those associated with authoritative sources or long-standing trust, people are more likely to trust and adopt information from these channels [<xref ref-type="bibr" rid="B25">25</xref>]. Therefore, the two-layer network model [<xref ref-type="bibr" rid="B26">26</xref>] takes into account the more complex information transmission, which has significant practical implications. Previous research has not extensively addressed heterogeneous threshold functions. While some studies have explored two-layer networks, they often assume the same threshold function for both layers. However, in real life, due to the heterogeneity between layers, people have different levels of trust and acceptance for information from different sources. Consequently, people behave differently after acquiring information from different platforms. Therefore, adopting heterogeneous functions for different channels better reflects reality. In this study, a heterogeneous threshold function is employed in the two-layer model to capture this phenomenon.</p>
<p>Existing research has shown that individuals exhibit different adoption attitudes towards the same information on different network layers, and their attitudes may change as the amount of information they receive fluctuates [<xref ref-type="bibr" rid="B27">27</xref>]. However, there is relatively limited research on considering heterogeneous adoption in information propagation within complex networks. In real social networks, individuals vary in their level of adoption across different layers of information. Based on the adoption attitudes towards information on different layers, this study categorizes heterogeneous adoption in social networks into two types: regular adoption and hesitant adoption. Regular adoption refers to a linear increase in the willingness to adopt with the number of received information or behaviors. Hesitant adoption, on the other hand, involves a state of hesitation regarding whether to adopt, requiring repeated verification of information and accumulating more information before developing the willingness to adopt. For instance, when a popular piece of information appears on the internet, an individual is more likely to increase their trust and adopt it on reliable information platforms, leading to a rapid saturation of adoption on such platforms. However, when the same individual encounters this information on an untrustworthy platform, they may exhibit a hesitant adoption stance, repeatedly verifying the information before deciding to adopt. As a result, the propagation speed on such platforms is slower, and it takes some time for the adoption to reach a relative saturation point. Therefore, studying the behavioral division of inter-layer adoption heterogeneity will contribute to a deeper understanding of the propagation mechanisms in multi-layer social networks.</p>
<p>The paper proposes a heterogeneous threshold adoption function on a two-layer model and constructs a heterogeneous adoption behavior network model for the same information on the two layers. It investigates the heterogeneous information propagation in a heterogeneous network of the same population. Through extensive simulation and theoretical analysis, the study reveals that when either layer dominates, the final outbreak of the adoption range manifests a second-order continuous phase transition. In contrast, when there is no clear dominant layer, the outbreak follows a first-order discontinuous phase transition. The timing and extent of the outbreak are influenced by various factors such as hesitant adoption parameter, degree heterogeneity parameter, and propagation probability. In the steady state, the final propagation range reaches global dissemination.</p>
</sec>
<sec sec-type="intro" id="s2">
<title>2 Model introduction</title>
<sec id="s2-1">
<title>2.1 SAR model and information adoption mechanism</title>
<p>To investigate heterogeneous adoption behavior in a heterogeneous network within the same population, this study utilizes the SF network model and ER network model as the physical network structure models for the experiments. In each layer, a bipartite network model with <italic>N</italic> nodes and a degree distribution of <italic>P</italic>(<italic>k</italic>) is constructed. The layers <italic>A</italic> and <italic>B</italic> stand for two different social networks, while the edges between nodes stand for their social connections. To explain heterogeneous behavior propagation on the multilayer network, a generalized Susceptible-Adopter-Recovered (SAR) model is used. At any given time, each node can only be in one of the following three states: susceptible (S), adopter (A), or recovered (R). S-state nodes can only obtain behavioral information from their neighboring nodes and adopt that information with a certain probability. A-state nodes have already adopted the behavior and are willing to propagate the behavioral information to their neighbors. R-state nodes are not interested in the behavioral information and do not propagate it to other neighbors.</p>
<p>The variables <italic>m</italic>
<sub>
<italic>A</italic>
</sub> and <italic>m</italic>
<sub>
<italic>B</italic>
</sub> are used to accumulate the information received by nodes in layers <italic>A</italic> and <italic>B</italic>, respectively. At each time step, when a node successfully gets information from neighbors in layer <italic>A</italic> or layer <italic>B</italic>, the corresponding variable <inline-formula id="inf1">
<mml:math id="m1">
<mml:msubsup>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> or <inline-formula id="inf2">
<mml:math id="m2">
<mml:msubsup>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:math>
</inline-formula> will be incremented by 1. The adoption probability functions for layer <italic>A</italic> and layer <italic>B</italic> are denoted by <italic>h</italic>
<sub>
<italic>a</italic>
</sub> (<italic>x</italic>, <italic>&#x3b1;</italic>, <italic>&#x3b2;</italic>) and <italic>h</italic>
<sub>
<italic>b</italic>
</sub> (<italic>x</italic>, <italic>&#x3b1;</italic>), respectively. During the propagation process, S-state node <italic>i</italic> adopts information from layer <italic>A</italic> and layer <italic>B</italic> with adoption probabilities <italic>h</italic>
<sub>
<italic>a</italic>
</sub> (<italic>x</italic>, <italic>&#x3b1;</italic>, <italic>&#x3b2;</italic>) and <italic>h</italic>
<sub>
<italic>b</italic>
</sub> (<italic>x</italic>, <italic>&#x3b1;</italic>), respectively, converting to the A-state. The states of nodes in the bipartite network are synchronized, meaning that any node in the A-layer and B-layer has the same state. Once the state of a node changes in one layer, it will correspondingly change in the other layer as well.</p>
<p>
<xref ref-type="fig" rid="F2">Figure 2</xref> more intuitively illustrates the relationship between Layers A and B as discussed earlier. Arrows and directional cues emphasize the flow of information or influence from Layer A to Layer B, indicating the dynamic relationship between them. This illustration aims to enhance understanding by providing a visual aid that complements the textual description, helping to grasp the complex interactions between the layers more visually.</p>
</sec>
<sec id="s2-2">
<title>2.2 Heterogeneous adoption functions</title>
<p>For layer <italic>A</italic>, Eq. <xref ref-type="disp-formula" rid="e1">1</xref> is as follows:<disp-formula id="e1">
<mml:math id="m3">
<mml:msub>
<mml:mrow>
<mml:mi>h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="{" close="">
<mml:mrow>
<mml:mtable class="array">
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mi>&#x3b2;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>cos</mml:mi>
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3c0;</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.5</mml:mn>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>x</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mo>&#x2212;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>cos</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>x</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(1)</label>
</disp-formula>
</p>
<p>When 0 &#x2264; <italic>x</italic> &#x3c; <italic>&#x3b1;</italic> (Region I in <xref ref-type="fig" rid="F1">Figure 1D</xref>), the adoption probability initially increases non-linearly to its maximum value <italic>&#x3b2;</italic> and then decreases to 0. When <italic>&#x3b1;</italic> &#x2264; <italic>x</italic> &#x3c; 1 (Region II in <xref ref-type="fig" rid="F1">Figure 1D</xref>), the adoption probability increases non-linearly with x from 0 to 1:</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>
<bold>(A)</bold> shows the connections between individuals and the information dissemination of individuals in a two-layer heterogeneous network. <bold>(B)</bold> The probability of an adoptive individual transferring information to a susceptible individual is <italic>&#x3bb;</italic>. The probability of an adoptive individual changing into a recovered individual is <italic>&#x3b3;</italic>. <bold>(C)</bold> shows different colors represent different individual states. <bold>(D)</bold> shows the individual adoption behavior function image of an individual at layer <italic>A</italic>, and <bold>(E)</bold> shows the individual adoption behavior function image of an individual at layer <italic>B</italic>.</p>
</caption>
<graphic xlink:href="fphy-12-1404464-g001.tif"/>
</fig>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Figure illustrates the intricate connections within a complex network comprising multiple nodes. The states of the nodes and their relationships are essentially identical to those described in <xref ref-type="fig" rid="F1">Figure 1</xref>. Layer <italic>A</italic> and Layer <italic>B</italic> represent the social context of the same node within two distinct social communication networks. While the node maintains the same status across different social networks, its connectivity varies. Within each layer, solid lines denote connected nodes that do not propagate information, while dashed lines indicate the transmission of information between two nodes connected by an edge.</p>
</caption>
<graphic xlink:href="fphy-12-1404464-g002.tif"/>
</fig>
<p>For layer <italic>B</italic>, Eq. <xref ref-type="disp-formula" rid="e2">2</xref> is as follows:<disp-formula id="e2">
<mml:math id="m4">
<mml:msub>
<mml:mrow>
<mml:mi>h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>b</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="{" close="">
<mml:mrow>
<mml:mtable class="array">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mo>&#x2212;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>cos</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>x</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mn>1,1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>x</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(2)</label>
</disp-formula>
</p>
<p>When 0 &#x2264; <italic>x</italic> &#x3c; 1 &#x2212; <italic>&#x3b1;</italic>, as Region I in <xref ref-type="fig" rid="F1">Figure 1E</xref>, the adoption probability increases with the increase of x until it reaches 1. On the other hand, when 1 &#x2212; <italic>&#x3b1;</italic> &#x2264; <italic>x</italic> &#x3c; 1, as Region II in <xref ref-type="fig" rid="F1">Figure 1E</xref>, the adoption probability remains constant at 1. When <italic>x</italic> &#x3c; 1 &#x2212; <italic>&#x3b1;</italic>, the increase in <italic>x</italic> enhances the individual&#x2019;s adoption capability, while when <italic>x</italic> &#x3c; 1 &#x2212; <italic>&#x3b1;</italic>, the adoption capability remains stable.</p>
</sec>
<sec id="s2-3">
<title>2.3 Propagation process and methods</title>
<p>
<list list-type="simple">
<list-item>
<p>&#x2022; The network consists of <italic>N</italic> individuals, with a portion initially in state <italic>A</italic> and the remaining in state <italic>S</italic>, without any behavioral information (<italic>m</italic>
<sub>
<italic>X</italic>
</sub> &#x3d; 0). The quantity <italic>&#x3c1;</italic>
<sub>0</sub> stands for the initial ratio of individuals in state <italic>A</italic>, defined as the proprtion of the number of individuals in state <italic>A</italic> to the total number of individuals in the network.</p>
</list-item>
<list-item>
<p>&#x2022; The probability of an individual in state <italic>S</italic> receiving behavioral information from an individual in state <italic>A</italic> is <italic>&#x3bb;</italic>. When an individual receives behavioral information from another individual in state <italic>A</italic>, the information count <italic>m</italic> of that individual increases by 1. Due to the non-redundancy of information, an individual cannot receive the same neighbor&#x2019;s information repeatedly.</p>
</list-item>
<list-item>
<p>&#x2022; In layers <italic>A</italic> and <italic>B</italic>, individuals in state <italic>S</italic> adopt behavioral information with probabilities <italic>N</italic> and <italic>M</italic>, respectively. If adopted, the individual transitions to state <italic>A</italic>; otherwise, it remains in state <italic>S</italic>. Additionally, whenever the state of a node changes in one layer, the state of the other layer also changes accordingly.</p>
</list-item>
<list-item>
<p>&#x2022; When an individual in state <italic>A</italic> transmits behavioral information to neighboring individuals, there is a possibility of transitioning to state <italic>R</italic> with probability <italic>&#x3b3;</italic>, ceasing to take part in the subsequent propagation process.</p>
</list-item>
<list-item>
<p>&#x2022; Repeat the process from Step 2 to Step 4 until the state of individual nodes in the network remains unchanged, with only nodes in states <italic>S</italic> and <italic>R</italic>. At this moment, the propagation reaches a steady state, and the behavioral information stops spreading.</p>
</list-item>
</list>
</p>
</sec>
</sec>
<sec id="s3">
<title>3 Formula derivation</title>
<p>Based on Ref. [<xref ref-type="bibr" rid="B28">28</xref>], this study employs an edge-based compartmental (EBC) method for theoretical analysis of the model. By analyzing the variation in the number of individuals in different states in a multilayer network, the study provides a theoretical evaluation of the propagation mechanism in a heterogeneous adoption behavior network for the same information in a dual-layer setting.</p>
<p>Inspired by the &#x201c;Hole Theory&#x201d; [<xref ref-type="bibr" rid="B29">29</xref>], it shows that individual <italic>i</italic> is in a &#x201c;hole&#x201d; state, meaning it cannot transmit information to its neighbors but can receive information from them. Let <inline-formula id="inf3">
<mml:math id="m5">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>X</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> represent the probability that an individual with degree <italic>k</italic>
<sub>
<italic>j</italic>
</sub> has not transmitted information to <italic>i</italic> until time <italic>t</italic>. Then, in different layers, the probability that individual <italic>i</italic> has not received any information until time <italic>t</italic> can be expressed as Eqs <xref ref-type="disp-formula" rid="e3">3</xref>, <xref ref-type="disp-formula" rid="e4">4</xref>:<disp-formula id="e3">
<mml:math id="m6">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munder>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:munder>
</mml:mstyle>
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mi>P</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfrac>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(3)</label>
</disp-formula>and<disp-formula id="e4">
<mml:math id="m7">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munder>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:munder>
</mml:mstyle>
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mi>P</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfrac>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(4)</label>
</disp-formula>
</p>
<p>Based on the assumption that <inline-formula id="inf4">
<mml:math id="m8">
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mi>P</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfrac>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>X</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> represents the probability of node <italic>j</italic> being connected to node <italic>i</italic> in layer <italic>X</italic>, it can be derived that the probability that node <italic>i</italic> accumulates <italic>m</italic>
<sub>
<italic>X</italic>
</sub> non-redundant information in layer <italic>X</italic> at time t as Eq. <xref ref-type="disp-formula" rid="e5">5</xref>:<disp-formula id="e5">
<mml:math id="m9">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mtable class="matrix">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="center">
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msup>
<mml:msup>
<mml:mrow>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msup>
</mml:math>
<label>(5)</label>
</disp-formula>
</p>
<p>Therefore, the probability that node <italic>i</italic> does not adopt any behavior in layer <italic>A</italic> and remains in state <italic>S</italic> is <inline-formula id="inf5">
<mml:math id="m10">
<mml:msubsup>
<mml:mrow>
<mml:mo movablelimits="false" form="prefix">&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msubsup>
<mml:mrow>
<mml:mo stretchy="false">[</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo stretchy="false">]</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>, and the probability that node <italic>i</italic> does not adopt any behavior in layer <italic>B</italic> and remains in state <italic>S</italic> is <inline-formula id="inf6">
<mml:math id="m11">
<mml:msubsup>
<mml:mrow>
<mml:mo movablelimits="false" form="prefix">&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msubsup>
<mml:mrow>
<mml:mo stretchy="false">[</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>b</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo stretchy="false">]</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>. It can be then calculated that the probability that node <italic>i</italic> remains in state <italic>S</italic> after receiving <italic>m</italic>
<sub>
<italic>X</italic>
</sub> non-redundant information in both layer <italic>A</italic> and layer <italic>B</italic> until time t as Eqs <xref ref-type="disp-formula" rid="e6">6</xref>, <xref ref-type="disp-formula" rid="e7">7</xref>:<disp-formula id="e6">
<mml:math id="m12">
<mml:mtable class="array">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:munderover accentunder="false" accent="true">
<mml:mrow>
<mml:mo>&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:munderover>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>cos</mml:mi>
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3c0;</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.5</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mo>&#x2b;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>a</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>cos</mml:mi>
<mml:mfrac>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>&#x3c0;</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.5</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>a</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>cos</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.5</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
<label>(6)</label>
</disp-formula>
<disp-formula id="e7">
<mml:math id="m13">
<mml:mtable class="array">
<mml:mtr>
<mml:mtd columnalign="center">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mfenced open="" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
<mml:munderover accentunder="false" accent="true">
<mml:mrow>
<mml:mo>&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:munderover>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>b</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>cos</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.5</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mo>&#x2b;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>a</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>cos</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.5</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>a</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="center">
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>0.5</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>cos</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3c0;</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
<label>(7)</label>
</disp-formula>
</p>
<p>So, the probability that node <italic>i</italic>, with <inline-formula id="inf7">
<mml:math id="m14">
<mml:munder>
<mml:mrow>
<mml:mover>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x21c0;</mml:mo>
</mml:mrow>
</mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:munder>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula>, remains in state <italic>S</italic> after accumulating <italic>m</italic>
<sub>
<italic>A</italic>
</sub> and mB messages in networks <italic>A</italic> and <italic>B</italic> respectively until time <italic>t</italic> can be calculated as Eq. <xref ref-type="disp-formula" rid="e8">8</xref>:<disp-formula id="e8">
<mml:math id="m15">
<mml:mtable class="array">
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mi>s</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mover>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x21c0;</mml:mo>
</mml:mrow>
</mml:mover>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:msubsup>
<mml:mrow>
<mml:mo movablelimits="false" form="prefix">&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mo>&#xd7;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:msubsup>
<mml:mrow>
<mml:mo movablelimits="false" form="prefix">&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>b</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd columnalign="left">
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>m</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:math>
<label>(8)</label>
</disp-formula>
</p>
<p>If <italic>S</italic>(<italic>t</italic>), <italic>A</italic>(<italic>t</italic>), <italic>R</italic>(<italic>t</italic>) are used to represent the proportions of nodes in different states, considering nodes with different degrees, the proportion of nodes in the susceptible state at time <italic>t</italic> can be expressed as Eq. <xref ref-type="disp-formula" rid="e9">9</xref>:<disp-formula id="e9">
<mml:math id="m16">
<mml:mi>S</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munder>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mover>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x21c0;</mml:mo>
</mml:mrow>
</mml:mover>
</mml:mrow>
</mml:munder>
</mml:mstyle>
<mml:msub>
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mover>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x21c0;</mml:mo>
</mml:mrow>
</mml:mover>
</mml:mrow>
</mml:mfenced>
<mml:mi>s</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mrow>
<mml:mover>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x21c0;</mml:mo>
</mml:mrow>
</mml:mover>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(9)</label>
</disp-formula>
</p>
<p>Considering that the neighbors of individual <italic>i</italic> can be in the susceptible, adopter, or recovered state, <inline-formula id="inf8">
<mml:math id="m17">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> can be further expressed as Eq. <xref ref-type="disp-formula" rid="e10">10</xref>:<disp-formula id="e10">
<mml:math id="m18">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2b;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2b;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(10)</label>
</disp-formula>
</p>
<p>In this case, <inline-formula id="inf9">
<mml:math id="m19">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi>x</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi>x</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> represent the probabilities of neighbor node <italic>j</italic> being in the susceptible, adopter, and recovered states, respectively, and not having transmitted information to node <italic>i</italic> until time <italic>t</italic>. Since node <italic>i</italic> is in a &#x201c;hole&#x201d; state, it cannot transmit information to node <italic>j</italic>. Therefore, the probability that node <italic>j</italic> accumulates <italic>n</italic>
<sub>
<italic>X</italic>
</sub> non-redundant information in layer <italic>X</italic> at time <italic>t</italic> can be expressed as Eqs <xref ref-type="disp-formula" rid="e11">11</xref>, <xref ref-type="disp-formula" rid="e12">12</xref>:<disp-formula id="e11">
<mml:math id="m20">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b6;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:msubsup>
<mml:mrow>
<mml:mo movablelimits="false" form="prefix">&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(11)</label>
</disp-formula>
<disp-formula id="e12">
<mml:math id="m21">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b6;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3d5;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:msubsup>
<mml:mrow>
<mml:mo movablelimits="false" form="prefix">&#x220f;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>h</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>b</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b1;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(12)</label>
</disp-formula>
</p>
<p>In layer <italic>X</italic>, the probability that node <italic>j</italic> remains in the susceptible state at time <italic>t</italic> is as Eqs <xref ref-type="disp-formula" rid="e13">13</xref>, <xref ref-type="disp-formula" rid="e14">14</xref>:<disp-formula id="e13">
<mml:math id="m22">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mfenced open="(" close="]">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b6;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(13)</label>
</disp-formula>and<disp-formula id="e14">
<mml:math id="m23">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mfenced open="(" close="]">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b6;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(14)</label>
</disp-formula>
</p>
<p>Since the probability of transmitting information through edges is <italic>&#x3bb;</italic>, and the recovery probability of adopter nodes is <italic>&#x3b3;</italic>, the equation for <inline-formula id="inf10">
<mml:math id="m24">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> as Eq. <xref ref-type="disp-formula" rid="e15">15</xref>:<disp-formula id="e15">
<mml:math id="m25">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3b3;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(15)</label>
</disp-formula>
</p>
<p>At time <italic>t</italic>, the probability of information being transmitted through an edge is equal to the probability of an adopter node transmitting the information to a susceptible neighbor. Therefore, Eq. <xref ref-type="disp-formula" rid="e16">16</xref> is as follows:<disp-formula id="e16">
<mml:math id="m26">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3bb;</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(16)</label>
</disp-formula>
</p>
<p>By combining Eqs <xref ref-type="disp-formula" rid="e12">12</xref> and <xref ref-type="disp-formula" rid="e13">13</xref>, Eq. <xref ref-type="disp-formula" rid="e17">17</xref> can be obtained:<disp-formula id="e17">
<mml:math id="m27">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3b3;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
<label>(17)</label>
</disp-formula>
</p>
<p>By substituting Eqs <xref ref-type="disp-formula" rid="e8">8</xref> and <xref ref-type="disp-formula" rid="e14">14</xref> into Eq. <xref ref-type="disp-formula" rid="e13">13</xref>, Eq. <xref ref-type="disp-formula" rid="e18">18</xref> can be obtained:<disp-formula id="e18">
<mml:math id="m28">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3bb;</mml:mi>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2212;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3b3;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mfenced open="[" close="]">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(18)</label>
</disp-formula>
</p>
<p>Given the initial conditions for <italic>&#x3b8;</italic>
<sub>
<italic>X</italic>
</sub> (0) &#x3d; 1 and <inline-formula id="inf11">
<mml:math id="m29">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:math>
</inline-formula>, when <italic>t</italic> &#x2192; <italic>&#x221e;</italic> the Eq. <xref ref-type="disp-formula" rid="e15">15</xref> equals 0, Eq. <xref ref-type="disp-formula" rid="e19">19</xref> can be derived the expression for <inline-formula id="inf12">
<mml:math id="m30">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> as:<disp-formula id="e19">
<mml:math id="m31">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3b3;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3b3;</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
<label>(19)</label>
</disp-formula>
</p>
<p>By substituting the expression for <inline-formula id="inf13">
<mml:math id="m32">
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> into Eqs <xref ref-type="disp-formula" rid="e2">2</xref> and <xref ref-type="disp-formula" rid="e3">3</xref>, Eq. <xref ref-type="disp-formula" rid="e20">20</xref> can be obtained:<disp-formula id="e20">
<mml:math id="m33">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munder>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:munder>
</mml:mstyle>
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mi>P</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfrac>
<mml:msubsup>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msubsup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>f</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(20)</label>
</disp-formula>
</p>
<p>To simplify the notation, let&#x2019;s use the function <italic>f</italic>(<italic>x</italic>) to represent <italic>&#x3b8;</italic>
<sub>
<italic>X</italic>
</sub> (<italic>&#x221e;</italic>).</p>
<p>By substituting the obtained equations into (4)&#x2013;(7), it can be derived that the proportion of susceptible nodes <italic>S</italic> (<italic>&#x221e;</italic>). Since the growth of <inline-formula id="inf14">
<mml:math id="m34">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>A</mml:mi>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> is due to the decrease in <italic>S</italic>(<italic>t</italic>), so the equations for the proportions of nodes in different states as Eqs <xref ref-type="disp-formula" rid="e21">21</xref>, <xref ref-type="disp-formula" rid="e22">22</xref>:<disp-formula id="e21">
<mml:math id="m35">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>A</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>S</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>A</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(21)</label>
</disp-formula>and<disp-formula id="e22">
<mml:math id="m36">
<mml:mfrac>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>R</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3b3;</mml:mi>
<mml:mi>A</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:math>
<label>(22)</label>
</disp-formula>
</p>
<p>Based on <italic>S</italic> (<italic>&#x221e;</italic>), it can be obtained that <italic>R</italic> (<italic>&#x221e;</italic>) as a complement to 1, since the proportions of nodes in all states must sum up to 1.</p>
<p>To further investigate the conditions for non-continuous growth of the function, the situation can be determined when Eq. <xref ref-type="disp-formula" rid="e17">17</xref> is tangent to <italic>&#x3b8;</italic>
<sub>
<italic>X</italic>
</sub> (<italic>&#x221e;</italic>) &#x3c; 1 by calculating the following Eq. <xref ref-type="disp-formula" rid="e23">23</xref>:<disp-formula id="e23">
<mml:math id="m37">
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x2202;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>f</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x2202;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfrac>
<mml:mfrac>
<mml:mrow>
<mml:mi>&#x2202;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>f</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x2202;</mml:mi>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3b8;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:math>
<label>(23)</label>
</disp-formula>
</p>
</sec>
<sec id="s4">
<title>4 Parameter settings</title>
<p>To ensure simulation accuracy, a minimum of 10<sup>3</sup> dynamic realizations are recommended in the network for this study. The network size is set to <italic>N</italic> &#x3d; 10<sup>4</sup>, with an average degree of <inline-formula id="inf15">
<mml:math id="m38">
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>10</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>10</mml:mn>
</mml:math>
</inline-formula>. To investigate the impact of contact capacity on information propagation mechanisms in ER-ER and SF-SF networks, the network layer <italic>X</italic>
<inline-formula id="inf16">
<mml:math id="m39">
<mml:mi>X</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mfenced open="{" close="}">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:math>
</inline-formula> in ER-ER network follows a Poisson degree distribution <inline-formula id="inf17">
<mml:math id="m40">
<mml:msub>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>e</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:msup>
<mml:mfrac>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:msup>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>!</mml:mo>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula>, while in SF-SF network, the network layer follows a power-law degree distribution <inline-formula id="inf18">
<mml:math id="m41">
<mml:msub>
<mml:mrow>
<mml:mi>p</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mo stretchy="false">(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msup>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msup>
</mml:math>
</inline-formula>. Here, <inline-formula id="inf19">
<mml:math id="m42">
<mml:msub>
<mml:mrow>
<mml:mi>&#x3be;</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munder>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:munder>
</mml:mstyle>
<mml:msup>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mfrac>
</mml:math>
</inline-formula> and <italic>&#x3bd;</italic> are parameters representing the degree exponent of layer <italic>A</italic> and layer <italic>B</italic>, respectively.</p>
<p>The heterogeneity of the network degree distribution is negatively correlated with the degree distribution exponent <italic>&#x3bd;</italic>. When <italic>&#x3bd;</italic> is small, the network contains a few high-degree nodes and many low-degree nodes. Additionally, to make the process more convenient, the information transmission probability is set as <italic>&#x3bb;</italic>
<sub>
<italic>A</italic>
</sub> &#x3d; <italic>&#x3bb;</italic>
<sub>
<italic>B</italic>
</sub> &#x3d; <italic>&#x3bb;</italic>, and the recovery rate is set as <italic>&#x3b3;</italic> &#x3d; 1.0.</p>
<p>The peak of the relative variance <italic>&#x3c7;</italic> curve of the final adoption range and the corresponding information transmission probability at the critical points are as Eq. <xref ref-type="disp-formula" rid="e24">24</xref>:<disp-formula id="e24">
<mml:math id="m43">
<mml:mi>&#x3c7;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>N</mml:mi>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x27e8;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close="">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x27e9;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>&#x221e;</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfrac>
</mml:math>
<label>(24)</label>
</disp-formula>
</p>
<p>The symbol <inline-formula id="inf20">
<mml:math id="m44">
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:mo>&#x2026;</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:math>
</inline-formula> here represents the ensemble average.</p>
</sec>
<sec id="s5">
<title>5 Simulation and discussion</title>
<p>In this paper, the first exploration is about the propagation of information on a weighted ER network, where the nodes in the ER network follow a Poisson distribution, denoted as [<inline-formula id="inf21">
<mml:math id="m45">
<mml:mi>P</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mi>e</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:msup>
<mml:msup>
<mml:mrow>
<mml:mfenced open="&#x27e8;" close="&#x27e9;">
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo>/</mml:mo>
<mml:mi>k</mml:mi>
<mml:mo>!</mml:mo>
</mml:math>
</inline-formula>. The simulation results represented by symbols and the predicted results represented by lines show consistent trends.</p>
<sec id="s5-1">
<title>5.1 ER network</title>
<p>From <xref ref-type="fig" rid="F3">Figure 3A</xref>, it can be observed that when the individual hesitation amplitude is relatively small (<italic>&#x3b2;</italic> &#x3d; 0.5), the outbreak of <italic>R</italic> (<italic>&#x221e;</italic>) exhibits second-order continuous phase transitions for <italic>&#x3b1;</italic> &#x3d; 0.2 and <italic>&#x3b1;</italic> &#x3d; 0.8. The propagation outbreak occurs earlier but with a slower growth rate for <italic>&#x3b1;</italic> &#x3d; 0.2 compared to <italic>&#x3b1;</italic> &#x3d; 0.8. However, when <italic>&#x3b1;</italic> &#x3d; 0.5, the outbreak point occurs later, and the growth pattern is characterized by discontinuous growth with a faster rate. In the steady state, the final propagation size reaches complete spread for all values of <italic>&#x3b1;</italic>. <xref ref-type="fig" rid="F3">Figure 3C</xref> indicates that when the individual hesitation amplitude is relatively large (<italic>&#x3b2;</italic> &#x3d; 0.8), the propagation patterns are similar to those in <xref ref-type="fig" rid="F3">Figure 3A</xref>, but the outbreak of <italic>R</italic> (<italic>&#x221e;</italic>) occurs earlier, and there are cross-over phase transitions in the propagation. Additionally, when <italic>&#x3b1;</italic> &#x3d; 0.2 and <italic>&#x3b1;</italic> &#x3d; 0.8, the outbreak point for <italic>&#x3b1;</italic> &#x3d; 0.2 precedes that of <italic>&#x3b1;</italic> &#x3d; 0.8, indicating that the impact of the hesitation amplitude <italic>&#x3b2;</italic> on the propagation differs for different hesitation degrees <italic>&#x3b1;</italic>.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>The graph illustrates the impact of the hesitation degree parameter <italic>&#x3b1;</italic> and the propagation probability <italic>&#x3bb;</italic> on the information outbreak size <italic>R</italic> (<italic>&#x221e;</italic>), the final adoption range, and the relative variance in an ER-ER network, with a fixed hesitation amplitude parameter <italic>&#x3b2;</italic>. In graph <bold>(A)</bold> (<italic>&#x3b2;</italic> &#x3d; 0.5) and graph <bold>(C)</bold> (<italic>&#x3b2;</italic> &#x3d; 0.8), the influence of <italic>&#x3b1;</italic> on the information outbreak size is shown as the propagation probability varies. The symbols represent simulation results, while the lines depict theoretical predictions. Different values of <italic>&#x3b1;</italic> correspond to different propagation patterns of information. In graph <bold>(B)</bold> (<italic>&#x3b2;</italic> &#x3d; 0.5) and graph <bold>(D)</bold> (<italic>&#x3b2;</italic> &#x3d; 0.8), the peak distribution of the relative variance of the adoption range is shown as the propagation probability varies for different <italic>&#x3b1;</italic> values. The peaks correspond to the outbreak points in graph <bold>(A)</bold> and graph <bold>(C)</bold>, respectively. The remaining parameters are set as <italic>&#x3c1;</italic>
<sub>0</sub> and <italic>&#x3b3;</italic> &#x3d; 1.</p>
</caption>
<graphic xlink:href="fphy-12-1404464-g003.tif"/>
</fig>
<p>
<xref ref-type="fig" rid="F3">Figure 3B</xref> demonstrates that when <italic>&#x3b2;</italic> &#x3d; 0.5, the relative variance of the adoption range exhibits an earlier outbreak for <italic>&#x3b1;</italic> &#x3d; 0.8, followed by <italic>&#x3b1;</italic> &#x3d; 0.2, and finally <italic>&#x3b1;</italic> &#x3d; 0.5. The saturation order is <italic>&#x3b1;</italic> &#x3d; 0.8, <italic>&#x3b1;</italic> &#x3d; 0.2, <italic>&#x3b1;</italic> &#x3d; 0.5. In <xref ref-type="fig" rid="F3">Figure 3D</xref>, when <italic>&#x3b2;</italic> &#x3d; 0.8, the relative variance of the adoption range exhibits an earlier outbreak for <italic>&#x3b1;</italic> &#x3d; 0.2, followed by <italic>&#x3b1;</italic> &#x3d; 0.8, and finally <italic>&#x3b1;</italic> &#x3d; 0.5. The saturation order is <italic>&#x3b1;</italic> &#x3d; 0.2, <italic>&#x3b1;</italic> &#x3d; 0.8, <italic>&#x3b1;</italic> &#x3d; 0.5.</p>
<p>
<xref ref-type="fig" rid="F4">Figure 4A</xref> represents the joint effect of the hesitation amplitude parameter <italic>&#x3b2;</italic> and the hesitation degree parameter <italic>&#x3b1;</italic> on the final adoption range <italic>R</italic> (<italic>&#x221e;</italic>) in an ER network. Based on different phase transition patterns, <xref ref-type="fig" rid="F4">Figure 4A</xref> can be divided into four regions. In regions I (0.75 &#x3c; <italic>&#x3b1;</italic> &#x2264; 1) and III (0.09 &#x3c; <italic>&#x3b1;</italic> &#x2264; 0.41), as <italic>&#x3bb;</italic> increases, a second-order continuous phase transition is observed. This is because when <italic>&#x3b1;</italic> is large (dominance of the ordinary state) or small (dominance of the hesitant state), both layer <italic>A</italic> (ordinary state adoption) and layer <italic>B</italic> (hesitant state adoption) exhibit single-layer outbreaks, where the outbreak of one layer leads to the outbreak of the other layers, resulting in continuous propagation. In region II (0.41 &#x3c; <italic>&#x3b1;</italic> &#x2264; 0.75), a discontinuous first-order phase transition is observed as <italic>&#x3bb;</italic> increases. This occurs when both layers simultaneously outbreak, but with a delayed outbreak point, indicating the absence of a dominant propagation layer. In region IV (0 &#x3c; <italic>&#x3b1;</italic> &#x2264; 0.09), there is no growth, indicating the absence of information outbreak in this region.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Graph <bold>(A)</bold> represents the relationship between the information outbreak size and the hesitation degree parameter <italic>&#x3b1;</italic> and propagation probability <italic>&#x3bb;</italic> in an ER-ER network, with a fixed hesitation amplitude parameter <italic>&#x3b2;</italic> &#x3d; 0.5. Graph <bold>(B)</bold> represents the relationship between the information outbreak size and the hesitation amplitude parameter <italic>&#x3b2;</italic> and propagation probability <italic>&#x3bb;</italic> in an ER-ER network, with a fixed hesitation degree parameter <italic>&#x3b1;</italic> &#x3d; 0.5. The remaining parameters are set as <italic>&#x3c1;</italic>
<sub>0</sub> and <italic>&#x3b3;</italic> &#x3d; 1.</p>
</caption>
<graphic xlink:href="fphy-12-1404464-g004.tif"/>
</fig>
<p>
<xref ref-type="fig" rid="F3">Figure 3B</xref> represents a continuous single-stage process, exhibiting a continuous second-order phase transition as <italic>&#x3bb;</italic> increases. As <italic>&#x3b2;</italic> decreases, the propagation becomes slower, indicating a positive correlation between the hesitation amplitude parameter and the hesitant population.</p>
</sec>
<sec id="s5-2">
<title>5.2 SF network</title>
<p>In a weighted SF network, there is a negative correlation between the heterogeneity of node degree distribution and the degree exponent <italic>&#x3bd;</italic>. Node degrees in this network follow a power-law distribution, denoted as <inline-formula id="inf22">
<mml:math id="m46">
<mml:mi>P</mml:mi>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:mfenced>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3be;</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3bd;</mml:mi>
</mml:mrow>
</mml:msup>
</mml:math>
</inline-formula>, <inline-formula id="inf23">
<mml:math id="m47">
<mml:mi>&#x3be;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>/</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munder>
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:munder>
</mml:mstyle>
<mml:msup>
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3bd;</mml:mi>
</mml:mrow>
</mml:msup>
</mml:math>
</inline-formula>, where the parameter <italic>&#x3bd;</italic> represents the heterogeneity parameter of the SF network.<list list-type="simple">
<list-item>
<p>&#x2022; for <italic>&#x3bd;</italic> &#x3d; 2.1</p>
</list-item>
</list>
</p>
<p>In <xref ref-type="fig" rid="F5">Figure 5A</xref>, it is shown that when the individual hesitation amplitude is relatively low (<italic>&#x3b2;</italic> &#x3d; 0.5), the values of the outbreak threshold for <italic>&#x3b1;</italic> &#x3d; 0.2, <italic>&#x3b1;</italic> &#x3d; 0.5, and <italic>&#x3b1;</italic> &#x3d; 0.8 are all relatively large, indicating a first-order discontinuous phase transition. The outbreaks in these cases are rapid and of short duration. In the steady state, the final propagation size is fully spread. In <xref ref-type="fig" rid="F5">Figure 5C</xref>, it is shown that when the individual hesitation amplitude is relatively high (<italic>&#x3b2;</italic> &#x3d; 0.5), the outbreaks for <italic>&#x3b1;</italic> &#x3d; 0.2 and <italic>&#x3b1;</italic> &#x3d; 0.8 exhibit second-order continuous phase transitions. The outbreak point for <italic>&#x3b1;</italic> &#x3d; 0.2 occurs earlier than that for <italic>&#x3b1;</italic> &#x3d; 0.8, which is different from the case when <italic>&#x3b2;</italic> &#x3d; 0.5. This indicates that the impact of changes in the hesitation amplitude <italic>&#x3b2;</italic> on the propagation varies depending on the hesitation degree <italic>&#x3b1;</italic>. For <italic>&#x3b1;</italic> &#x3d; 0.5, the outbreak exhibits a first-order discontinuous phase transition. Additionally, when the individual hesitation amplitude is larger, the outbreaks occur earlier, and there is evidence of cross-contagion.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>The graph shows the effects of the hesitation degree parameter <italic>&#x3b1;</italic> and the propagation probability <italic>&#x3bb;</italic> on the information outbreak size <italic>R</italic> (<italic>&#x221e;</italic>) and the relative variance of the final adoption range in an SF-SF network with a fixed hesitation amplitude parameter <italic>&#x3b2;</italic>, where the heterogeneity parameter V is set to 2.1. Graphs <bold>(A)</bold> (<italic>&#x3b2;</italic> &#x3d; 0.5) and <bold>(C)</bold> (<italic>&#x3b2;</italic> &#x3d; 0.8) illustrate the influence of <italic>&#x3b1;</italic> on the information outbreak size as the propagation probability varies. The symbols represent simulation results, while the lines depict theoretical predictions. Different propagation patterns of information are observed for different values of <italic>&#x3b1;</italic>. Graphs <bold>(B)</bold> (<italic>&#x3b2;</italic> &#x3d; 0.5) and <bold>(D)</bold> (<italic>&#x3b2;</italic> &#x3d; 0.8) display the distribution of the relative variance of the adoption range for different <italic>&#x3b1;</italic> values as the propagation probability changes. They correspond to the variations observed in graphs <bold>(A, C)</bold>, respectively. The remaining parameters are set as <italic>&#x3c1;</italic>
<sub>0</sub> and <italic>&#x3b3;</italic> &#x3d; 1.</p>
</caption>
<graphic xlink:href="fphy-12-1404464-g005.tif"/>
</fig>
<p>In <xref ref-type="fig" rid="F5">Figure 5B</xref>, when <italic>&#x3b2;</italic> &#x3d; 0.5, the relative variance of the adoption range first reaches its outbreak point for <italic>&#x3b1;</italic> &#x3d; 0.8, followed by <italic>&#x3b1;</italic> &#x3d; 0.2, and finally <italic>&#x3b1;</italic> &#x3d; 0.5. The saturation order of the relative variance is <italic>&#x3b1;</italic> &#x3d; 0.8, <italic>&#x3b1;</italic> &#x3d; 0.2, <italic>&#x3b1;</italic> &#x3d; 0.5. In <xref ref-type="fig" rid="F5">Figure 5D</xref>, when <italic>&#x3b2;</italic> &#x3d; 0.8, the relative variance of the adoption range first reaches its outbreak point for <italic>&#x3b1;</italic> &#x3d; 0.2, followed by <italic>&#x3b1;</italic> &#x3d; 0.8, and finally <italic>&#x3b1;</italic> &#x3d; 0.5. The saturation order of the relative variance is <italic>&#x3b1;</italic> &#x3d; 0.2, <italic>&#x3b1;</italic> &#x3d; 0.8, <italic>&#x3b1;</italic> &#x3d; 0.5.</p>
<p>
<xref ref-type="fig" rid="F6">Figure 6</xref> represents the joint effect of the hesitation amplitude parameter <italic>&#x3b1;</italic> and the hesitation degree parameter <italic>&#x3b2;</italic> on the final adoption range <italic>R</italic> (<italic>&#x221e;</italic>) in an ER network. Based on different phase transition patterns, <xref ref-type="fig" rid="F6">Figure 6A</xref> can be divided into three regions. In regions I (0.84 &#x3c; <italic>&#x3b1;</italic> &#x2264; 1) and III (0 &#x3c; <italic>&#x3b1;</italic> &#x2264; 0.32), as <italic>&#x3bb;</italic> increases, there is a continuous second-order phase transition. This is because when <italic>&#x3b1;</italic> is large (dominance of ordinary state) or small (dominance of hesitant state), in layer <italic>A</italic> (ordinary state adoption) and layer <italic>B</italic> (hesitant state adoption), there is a single-layer outbreak triggered by the outbreak of the other layer, resulting in continuous propagation. In region II (0.32 &#x3c; <italic>&#x3b1;</italic> &#x2264; 0.84), as <italic>&#x3bb;</italic> increases, there is a discontinuous first-order phase transition. This is because both layers simultaneously undergo an outbreak, and the outbreak occurs relatively late, indicating that there is no dominant propagating layer. In region III, as <italic>&#x3bb;</italic> increases, there is a continuous second-order phase transition, similar to region I. Comparing <xref ref-type="fig" rid="F6">Figures 6A, B</xref>, it can be observed that when the hesitation amplitude is higher, a larger <italic>&#x3bb;</italic> is required to achieve the same adoption range.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>The graphs represent the relationship between the information outbreak size and the hesitation degree parameter <italic>&#x3b1;</italic> and the propagation probability <italic>&#x3bb;</italic> in an SF-SF network with <italic>&#x3bd;</italic> &#x3d; 2.1, while the hesitation amplitude parameter <italic>&#x3b2;</italic> is fixed. In Graph <bold>(A)</bold>, the hesitation amplitude parameter <italic>&#x3b2;</italic> is set to 0.5, while in graph <bold>(B)</bold>, it is set to 0.8. The remaining parameters are set as <italic>&#x3c1;</italic>
<sub>0</sub> and <italic>&#x3b3;</italic> &#x3d; 1.</p>
</caption>
<graphic xlink:href="fphy-12-1404464-g006.tif"/>
</fig>
<p>
<list list-type="simple">
<list-item>
<p>&#x2022; for <italic>&#x3bd;</italic> &#x3d; 4</p>
</list-item>
</list>
</p>
<p>
<xref ref-type="fig" rid="F7">Figure 7A</xref> indicates that when the individual hesitation amplitude is relatively low (<italic>&#x3b2;</italic> &#x3d; 0.5), the outbreaks for <italic>&#x3b1;</italic> &#x3d; 0.2 and <italic>&#x3b1;</italic> &#x3d; 0.8 exhibit second-order continuous phase transitions. The outbreaks occur earlier compared to <italic>&#x3b1;</italic> &#x3d; 0.5, but the growth rate is slower for <italic>&#x3b1;</italic> &#x3d; 0.2 compared to <italic>&#x3b1;</italic> &#x3d; 0.8. For <italic>&#x3b1;</italic> &#x3d; 0.5, the outbreak shows a first-order discontinuous phase transition. The outbreak occurs later but with a faster growth rate, and in the end, the propagation is fully spread. <xref ref-type="fig" rid="F7">Figure 7C</xref> shows that when the individual hesitation amplitude is relatively high (<italic>&#x3b2;</italic> &#x3d; 0.8), the propagation patterns are similar to those in <xref ref-type="fig" rid="F7">Figure 7A</xref>, but the outbreaks occur earlier. Additionally, there is evidence of cross-contagion in the propagation. Furthermore, for <italic>&#x3b1;</italic> &#x3d; 0.2 and <italic>&#x3b1;</italic> &#x3d; 0.8, the outbreak point occurs earlier for <italic>&#x3b1;</italic> &#x3d; 0.2 compared to <italic>&#x3b1;</italic> &#x3d; 0.8, indicating that the impact of changes in the hesitation amplitude <italic>&#x3b2;</italic> on the propagation varies depending on the hesitation degree <italic>&#x3b1;</italic>.</p>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>
<italic>&#x3bd;</italic> &#x3d; 4, with a fixed hesitation amplitude parameter <italic>&#x3b2;</italic>, the graphs <bold>(A)</bold> (<italic>&#x3b2;</italic> &#x3d; 0.5) and <bold>(C)</bold> (<italic>&#x3b2;</italic> &#x3d; 0.8) illustrate the effects of the hesitation degree parameter <italic>&#x3b1;</italic> and the propagation probability <italic>&#x3bb;</italic> on the information outbreak size <italic>R</italic> (<italic>&#x221e;</italic>) and the relative variance of the final adoption range. Graphs <bold>(A)</bold> and <bold>(C)</bold> show the impact of <italic>&#x3b1;</italic> on the information outbreak size as the propagation probability varies. The symbols represent simulation results, while the lines depict theoretical predictions. Different propagation patterns of information are observed for different values of <italic>&#x3b1;</italic>. Graphs <bold>(B)</bold> (<italic>&#x3b2;</italic> &#x3d; 0.5) and <bold>(D)</bold> (<italic>&#x3b2;</italic> &#x3d; 0.8) display the distribution of the relative variance of the adoption range for different <italic>&#x3b1;</italic> values as the propagation probability changes. They correspond to the variations observed in graphs <bold>(A)</bold> and <bold>(C)</bold>, respectively.</p>
</caption>
<graphic xlink:href="fphy-12-1404464-g007.tif"/>
</fig>
<p>In <xref ref-type="fig" rid="F7">Figure 7B</xref>, when <italic>&#x3b2;</italic> &#x3d; 0.5, the relative variance of the adoption range first reaches its outbreak point for <italic>&#x3b1;</italic> &#x3d; 0.8, followed by <italic>&#x3b1;</italic> &#x3d; 0.2, and finally <italic>&#x3b1;</italic> &#x3d; 0.5. The saturation order of the relative variance is <italic>&#x3b1;</italic> &#x3d; 0.8, <italic>&#x3b1;</italic> &#x3d; 0.2, <italic>&#x3b1;</italic> &#x3d; 0.5. In <xref ref-type="fig" rid="F7">Figure 7D</xref>, when <italic>&#x3b2;</italic> &#x3d; 0.8, the relative variance of the adoption range first reaches its outbreak point for <italic>&#x3b1;</italic> &#x3d; 0.2, followed by <italic>&#x3b1;</italic> &#x3d; 0.8, and finally <italic>&#x3b1;</italic> &#x3d; 0.5. The saturation order of the relative variance is<italic>&#x3b1;</italic> &#x3d; 0.2, <italic>&#x3b1;</italic> &#x3d; 0.8, <italic>&#x3b1;</italic> &#x3d; 0.5.</p>
<p>
<xref ref-type="fig" rid="F8">Figure 8</xref> represents the process of change in four stages. In regions I (0.75 &#x3c; <italic>&#x3b1;</italic> &#x2264; 1) and III(0.05 &#x3c; <italic>&#x3b1;</italic> &#x2264; 0.41), as <italic>&#x3bb;</italic> increases, there is a continuous second-order phase transition. This is because when <italic>&#x3b1;</italic> is large (dominance of the ordinary state) or small (dominance of the hesitant state), in layer <italic>A</italic> (adoption of the ordinary state) and layer <italic>B</italic> (adoption of the hesitant state), there is a single-layer outbreak triggered by the outbreak of the other layer, resulting in continuous propagation. In region II(0.41 &#x3c; <italic>&#x3b1;</italic> &#x2264; 0.75), as <italic>&#x3bb;</italic> increases, there is a discontinuous first-order phase transition. This is because both layers simultaneously undergo an outbreak, and the outbreak occurs relatively late, indicating that there is no dominant propagating layer. In region IV(0 &#x3c; <italic>&#x3b1;</italic> &#x2264; 0.05), there is no growth, indicating the absence of information outbreaks in this region. Additionally, from the <xref ref-type="fig" rid="F8">Figures 8A, B</xref>, it can be observed that as <italic>&#x3b2;</italic> decreases, the propagation becomes slower, indicating a positive correlation between the hesitation amplitude parameter and the hesitant population.</p>
<fig id="F8" position="float">
<label>FIGURE 8</label>
<caption>
<p>The graphs illustrate the relationship between the information outbreak size and the hesitation degree parameter <italic>&#x3b1;</italic> and the propagation probability <italic>&#x3bb;</italic> in an SF-SF network with v &#x3d; 4, while the hesitation amplitude parameter <italic>&#x3b2;</italic> is fixed. In graph <bold>(A)</bold>, the hesitation amplitude parameter <italic>&#x3b2;</italic> is set to 0.5, while in graph <bold>(B)</bold>, it is set to 0.8. The remaining parameters are set as <italic>&#x3c1;</italic>
<sub>0</sub> and <italic>&#x3b3;</italic> &#x3d; 1.</p>
</caption>
<graphic xlink:href="fphy-12-1404464-g008.tif"/>
</fig>
</sec>
</sec>
<sec sec-type="conclusion" id="s6">
<title>6 Conclusion</title>
<p>In real-life, individuals exhibit different social behaviors within various social networks. To analyze the propagation mechanisms and investigate heterogeneous adoption behavior in a heterogeneous network of the same population, this study proposes a dual-layer heterogeneous adoption information propagation network model from both simulation and theoretical perspectives. A heterogeneous threshold function based on realistic psychological research is designed, and extensive experiments demonstrate the consistent results between simulations and theory.</p>
<p>This paper focuses on the innovative aspect of heterogeneous adoption behavior within a dual-layer model and explores the propagation of heterogeneous behavior within the same population in a dual-layer heterogeneous network. Through extensive simulation and theoretical analysis in SF and ER networks, it is observed that when either layer dominates, the final adoption range exhibits a second-order continuous phase transition. In the absence of a clear dominant layer, a first-order discontinuous phase transition occurs with the presence of cross-propagation phenomena. The propagation process and modes are influenced by factors such as hesitation parameters, degree heterogeneity parameters, and propagation probabilities, ultimately leading to complete propagation.</p>
<p>The inter-layer adoption heterogeneity in information propagation networks has a crucial impact, yet there is limited research in this area. This paper rigorously models and analyzes the significant influence of heterogeneous adoption behavior within multi-layer networks on information propagation. The study also provides a new direction for information propagation in multi-layer heterogeneous networks. However, this article has certain limitations. Firstly, it does not use real datasets, lacks standardized data representing human behavioral characteristics, and cannot extensively validate the behavior propagation with real-world data. Secondly, it does not consider several conventional parameters that may influence the research process, such as weights and fluctuation-based adoption. To emphasize the influence of heterogeneous adoption behavior within this model, other parameters were reduced to better highlight the significance of studying heterogeneous adoption behavior. It is hoped that more experts and scholars will pay attention to this field and further expand the research.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s7">
<title>Data availability statement</title>
<p>The raw data supporting the conclusion of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec id="s8">
<title>Author contributions</title>
<p>SC: Writing&#x2013;review and editing, Writing&#x2013;original draft, Visualization, Software, Project administration, Investigation, Formal Analysis, Data curation. XZ: Writing&#x2013;review and editing, Writing&#x2013;original draft, Visualization, Validation, Resources, Methodology, Investigation, Formal Analysis, Conceptualization.</p>
</sec>
<sec sec-type="funding-information" id="s9">
<title>Funding</title>
<p>The author(s) declare that no financial support was received for the research, authorship, and/or publication of this article.</p>
</sec>
<ack>
<p>We would like to thank the reviewers for their insightful comments on the manuscript, as their remarks led to an improvement of the work.</p>
</ack>
<sec sec-type="COI-statement" id="s10">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s11">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<label>1.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kobayashi</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Ogisu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Onaga</surname>
<given-names>T.</given-names>
</name>
</person-group> <article-title>Unstable diffusion in social networks</article-title>. <source>J Econ Dyn Control</source> (<year>2022</year>) <volume>146</volume>:<fpage>104561</fpage>. <pub-id pub-id-type="doi">10.1016/j.jedc.2022.104561</pub-id>
</citation>
</ref>
<ref id="B2">
<label>2.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Furutani</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Shibahara</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Akiyama</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Aida</surname>
<given-names>M.</given-names>
</name>
</person-group> <article-title>Analysis of homophily effects on information diffusion on social networks</article-title>. <source>IEEE Access</source> (<year>2023</year>) <volume>11</volume>:<fpage>79974</fpage>&#x2013;<lpage>83</lpage>. <pub-id pub-id-type="doi">10.1109/access.2023.3299854</pub-id>
</citation>
</ref>
<ref id="B3">
<label>3.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cai</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Xia</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>H.</given-names>
</name>
</person-group> <article-title>Dynamics of momentum in financial markets based on the information diffusion in complex social networks</article-title>. <source>J Behav Exp Finance</source> (<year>2024</year>) <volume>41</volume>:<fpage>100897</fpage>. <pub-id pub-id-type="doi">10.1016/j.jbef.2024.100897</pub-id>
</citation>
</ref>
<ref id="B4">
<label>4.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lin</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Duan</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Xiao</surname>
<given-names>Q.</given-names>
</name>
</person-group> <article-title>The roles of information diffusion on financial risk spreading on two-layer networks</article-title>. <source>Front Phys</source> (<year>2022</year>) <volume>10</volume>. <pub-id pub-id-type="doi">10.3389/fphy.2022.905205</pub-id>
</citation>
</ref>
<ref id="B5">
<label>5.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gaeta</surname>
<given-names>R.</given-names>
</name>
</person-group> <article-title>A model of information diffusion in interconnected online social networks</article-title>. <source>ACM Trans Web</source> (<year>2018</year>) <volume>12</volume>:<fpage>1</fpage>&#x2013;<lpage>21</lpage>. <pub-id pub-id-type="doi">10.1145/3160000</pub-id>
</citation>
</ref>
<ref id="B6">
<label>6.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jiang</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Kong</surname>
<given-names>J.</given-names>
</name>
</person-group> <article-title>Prototype equilibrium network with group emotional contagion for few-shot emotion recognition in conversation</article-title>. <source>Int J Machine Learn Cybernetics</source> (<year>2023</year>) <volume>15</volume>:<fpage>2229</fpage>&#x2013;<lpage>46</lpage>. <pub-id pub-id-type="doi">10.1007/s13042-023-02025-y</pub-id>
</citation>
</ref>
<ref id="B7">
<label>7.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yin</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>X.</given-names>
</name>
</person-group> <article-title>Spatial prediction of highway slope disasters based on convolution neural networks</article-title>. <source>Nat Hazards</source> (<year>2022</year>) <volume>113</volume>:<fpage>813</fpage>&#x2013;<lpage>31</lpage>. <pub-id pub-id-type="doi">10.1007/s11069-022-05325-8</pub-id>
</citation>
</ref>
<ref id="B8">
<label>8.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Yin</surname>
<given-names>X.</given-names>
</name>
</person-group> <article-title>Financial risk avoidance based on the sensor network and edge computing</article-title>. <source>J Electr Comp Eng</source> (<year>2022</year>) <volume>2022</volume>:<fpage>1</fpage>&#x2013;<lpage>11</lpage>. <pub-id pub-id-type="doi">10.1155/2022/2028155</pub-id>
</citation>
</ref>
<ref id="B9">
<label>9.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>F.</given-names>
</name>
</person-group> <article-title>Research on optimization algorithms for artificial intelligence network security management based on all ip internet of things fusion technology</article-title>. <source>Comput Electr Eng</source> (<year>2024</year>) <volume>115</volume>:<fpage>109105</fpage>. <pub-id pub-id-type="doi">10.1016/j.compeleceng.2024.109105</pub-id>
</citation>
</ref>
<ref id="B10">
<label>10.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tsai</surname>
<given-names>K-C</given-names>
</name>
<name>
<surname>Zhuang</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Lent</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Qi</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L-C</given-names>
</name>
<etal/>
</person-group> <article-title>Tensor-based reinforcement learning for network routing</article-title>. <source>IEEE J Selected Top Signal Process</source> (<year>2021</year>) <volume>15</volume>:<fpage>617</fpage>&#x2013;<lpage>29</lpage>. <pub-id pub-id-type="doi">10.1109/jstsp.2021.3055957</pub-id>
</citation>
</ref>
<ref id="B11">
<label>11.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bryc</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Kuznetsov</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Weso&#x142;owski</surname>
<given-names>J.</given-names>
</name>
</person-group> <article-title>Markov processes related to the stationary measure for the open kpz equation</article-title>. <source>Probab Theor Relat Fields</source> (<year>2023</year>) <volume>185</volume>:<fpage>353</fpage>&#x2013;<lpage>89</lpage>. <pub-id pub-id-type="doi">10.1007/s00440-022-01110-7</pub-id>
</citation>
</ref>
<ref id="B12">
<label>12.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Moser</surname>
<given-names>BA</given-names>
</name>
<name>
<surname>Lunglmayr</surname>
<given-names>M.</given-names>
</name>
</person-group> <article-title>On quasi-isometry of threshold-based sampling</article-title>. <source>IEEE Trans Signal Process</source> (<year>2019</year>) <volume>67</volume>:<fpage>3832</fpage>&#x2013;<lpage>41</lpage>. <pub-id pub-id-type="doi">10.1109/tsp.2019.2919415</pub-id>
</citation>
</ref>
<ref id="B13">
<label>13.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Han</surname>
<given-names>JG</given-names>
</name>
<name>
<surname>Park</surname>
<given-names>TH</given-names>
</name>
<name>
<surname>Moon</surname>
<given-names>YH</given-names>
</name>
<name>
<surname>Eom</surname>
<given-names>IK.</given-names>
</name>
</person-group> <article-title>Efficient markov feature extraction method for image splicing detection using maximization and threshold expansion</article-title>. <source>J Electron Imaging</source> (<year>2016</year>) <volume>25</volume>:<fpage>023031</fpage>. <pub-id pub-id-type="doi">10.1117/1.jei.25.2.023031</pub-id>
</citation>
</ref>
<ref id="B14">
<label>14.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fan</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Meng</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Saberi</surname>
<given-names>AA</given-names>
</name>
<name>
<surname>Kurths</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Nagler</surname>
<given-names>J.</given-names>
</name>
</person-group> <article-title>Universal gap scaling in percolation</article-title>. <source>Nat Phys</source> (<year>2020</year>) <volume>16</volume>:<fpage>455</fpage>&#x2013;<lpage>61</lpage>. <pub-id pub-id-type="doi">10.1038/s41567-019-0783-2</pub-id>
</citation>
</ref>
<ref id="B15">
<label>15.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hermon</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Sousi</surname>
<given-names>P.</given-names>
</name>
</person-group> <article-title>A comparison principle for random walk on dynamical percolation</article-title>. <source>Anim Probab</source> (<year>2020</year>) <volume>48</volume>:<fpage>2952</fpage>&#x2013;<lpage>87</lpage>. <pub-id pub-id-type="doi">10.1214/20-AOP1441</pub-id>
</citation>
</ref>
<ref id="B16">
<label>16.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>X</given-names>
</name>
<name>
<surname>He</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Leung</surname>
<given-names>VCM.</given-names>
</name>
</person-group> <article-title>Freshness-aware seed selection for offloading cellular traffic through opportunistic mobile networks</article-title>. <source>IEEE Trans Wireless Commun</source> (<year>2020</year>) <volume>19</volume>:<fpage>2658</fpage>&#x2013;<lpage>69</lpage>. <pub-id pub-id-type="doi">10.1109/twc.2020.2967658</pub-id>
</citation>
</ref>
<ref id="B17">
<label>17.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shekatkar</surname>
<given-names>SM</given-names>
</name>
<name>
<surname>Barve</surname>
<given-names>S.</given-names>
</name>
</person-group> <article-title>Importance of initial conditions in the polarization of complex networks</article-title>. <source>EPL</source> (<year>2018</year>) <volume>122</volume>:<fpage>38002</fpage>. <pub-id pub-id-type="doi">10.1209/0295-5075/122/38002</pub-id>
</citation>
</ref>
<ref id="B18">
<label>18.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Masuda</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Sakaki</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Ezaki</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Watanabe</surname>
<given-names>T.</given-names>
</name>
</person-group> <article-title>Clustering coefficients for correlation networks</article-title>. <source>Front Neuroinformatics</source> (<year>2018</year>) <volume>12</volume>:<fpage>7</fpage>. <pub-id pub-id-type="doi">10.3389/fninf.2018.00007</pub-id>
</citation>
</ref>
<ref id="B19">
<label>19.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ding</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Song</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>K.</given-names>
</name>
</person-group> <article-title>Target controllability of multiplex networks with weighted interlayer edges</article-title>. <source>IEEE Trans Netw Sci Eng</source> (<year>2024</year>) <volume>11</volume>:<fpage>313</fpage>&#x2013;<lpage>25</lpage>. <pub-id pub-id-type="doi">10.1109/tnse.2023.3296706</pub-id>
</citation>
</ref>
<ref id="B20">
<label>20.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xue</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Pan</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Zheng</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>W.</given-names>
</name>
</person-group> <article-title>Network temporality can promote and suppress information spreading</article-title>. <source>Chaos Interdiscip J Nonlinear Sci</source> (<year>2020</year>) <volume>30</volume>:<fpage>113136</fpage>. <pub-id pub-id-type="doi">10.1063/5.0027758</pub-id>
</citation>
</ref>
<ref id="B21">
<label>21.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Huang</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>X-L</given-names>
</name>
<name>
<surname>Tang</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>S-M.</given-names>
</name>
</person-group> <article-title>Coupled dynamic model of resource diffusion and epidemic spreading in time-varying multiplex networks</article-title>. <source>Complexity</source> (<year>2021</year>) <volume>2021</volume>:<fpage>1</fpage>&#x2013;<lpage>11</lpage>. <pub-id pub-id-type="doi">10.1155/2021/6629105</pub-id>
</citation>
</ref>
<ref id="B22">
<label>22.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>T.</given-names>
</name>
</person-group> <article-title>Link cooperation effect of cooperative epidemics on complex networks</article-title>. <source>Appl Math Comput</source> (<year>2022</year>) <volume>437</volume>:<fpage>127537</fpage>. <pub-id pub-id-type="doi">10.1016/j.amc.2022.127537</pub-id>
</citation>
</ref>
<ref id="B23">
<label>23.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>S-M</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>T.</given-names>
</name>
</person-group> <article-title>Immunization of cooperative spreading dynamics on complex networks</article-title>. <source>Complexity</source> (<year>2021</year>) <volume>2021</volume>:<fpage>1</fpage>&#x2013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.1155/2021/6645113</pub-id>
</citation>
</ref>
<ref id="B24">
<label>24.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Cao</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Fu</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>Y.</given-names>
</name>
</person-group> <article-title>Epidemic spreading on multi-layer networks with active nodes</article-title>. <source>Chaos Interdiscip J Nonlinear Sci</source> (<year>2023</year>) <volume>33</volume>:<fpage>073128</fpage>. <pub-id pub-id-type="doi">10.1063/5.0151777</pub-id>
</citation>
</ref>
<ref id="B25">
<label>25.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ting</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Ahn</surname>
<given-names>J.</given-names>
</name>
</person-group> <article-title>Understanding the roles of interaction and trust in formation of loyalty toward customer-to-customer (c2c) platforms</article-title>. <source>Asia Pac J Marketing Logistics</source> (<year>2023</year>) <volume>35</volume>:<fpage>2565</fpage>&#x2013;<lpage>81</lpage>. <pub-id pub-id-type="doi">10.1108/APJML-12-2022-1072</pub-id>
</citation>
</ref>
<ref id="B26">
<label>26.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lv</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>S.</given-names>
</name>
</person-group> <article-title>Construction and analysis of multi-relationship bipartite network model</article-title>. <source>Complex Intell Syst</source> (<year>2023</year>) <volume>9</volume>:<fpage>5851</fpage>&#x2013;<lpage>63</lpage>. <pub-id pub-id-type="doi">10.1007/s40747-023-01038-y</pub-id>
</citation>
</ref>
<ref id="B27">
<label>27.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Huo</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>Y.</given-names>
</name>
</person-group> <article-title>Impact of individual behavior adoption heterogeneity on epidemic transmission in multiplex networks</article-title>. <source>Chin Phys B</source> (<year>2023</year>) <volume>32</volume>:<fpage>108703</fpage>. <pub-id pub-id-type="doi">10.1088/1674-1056/acea65</pub-id>
</citation>
</ref>
<ref id="B28">
<label>28.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y-X</given-names>
</name>
<name>
<surname>Zou</surname>
<given-names>L.</given-names>
</name>
</person-group> <article-title>Research on information dissemination on social networks based on edge-based compartmental theory</article-title>. <source>Int J Mod Phys B</source> (<year>2021</year>) <volume>35</volume>. <pub-id pub-id-type="doi">10.1142/s0217979221502490</pub-id>
</citation>
</ref>
<ref id="B29">
<label>29.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zheng</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Cao</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>S</given-names>
</name>
<etal/>
</person-group> <article-title>Wideband gain enhancement and rcs reduction of fabry-perot resonator antenna with chessboard arranged metamaterial superstrate</article-title>. <source>IEEE Trans Antennas Propagation</source> (<year>2018</year>) <volume>66</volume>:<fpage>590</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1109/TAP.2017.2780896</pub-id>
</citation>
</ref>
</ref-list>
</back>
</article>