Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Rumor propagation model based on edge-based compartmental theory
LUO Jingyu, TANG Ningjiu
Journal of Computer Applications    2019, 39 (11): 3409-3414.   DOI: 10.11772/j.issn.1001-9081.2019040739
Abstract272)      PDF (1024KB)(304)       Save
Aiming at the problem that spreader nodes will be influenced by their neighbors during the recovery in the rumor propagation process, a rumor propagation model based on edge-based compartmental theory was proposed. Firstly, a set of dynamic equations were established using the improved edge-based compartmental theory, and the propagation range and breaking threshold were theoretically analyzed. Then the influence of factors including network structure, propagation probability and basic recovery probability were analyzed through numerical simulation. Finally, an effective immunization strategy to control rumor propagation range and breaking threshold was presented on the above basis. The results of theoretical analysis and numerical simulation show that, compared with the classical SIR (Susceptible-Infected-Recovered) rumor propagation model, the presented model decrease the period of rumor propagation and increase the peak of the propagation of spreader nodes slightly. Through comparison experiments with the random immunization strategy, in the proposed strategy the edges with higher product of the degrees of two nodes were immuned preferentially to obtain better effect when rumor has minor propagation probability, and the edges with lower product of the degrees of two nodes were immuned preferentially to obtain better effect when rumor has larger propagation probability. Study results indicate that the presented model conform to the characteristics of rumor fading away phase and can provide theoretical and numerical support for rumor prediction and control.
Reference | Related Articles | Metrics
Blind watermarking algorithm of double keys based on Markov chain Monte Carlo sampling
XIAO Jiawei ZHANG Li LUO Jingyun
Journal of Computer Applications    2014, 34 (2): 469-472.  
Abstract580)      PDF (636KB)(688)       Save
In order to improve the security of watermarking algorithm, a robust blind watermarking based on two forms of key was proposed. Firstly, the watermark was encrypted by a key, then matrix Q was consisted of the first singular value of each block carrier and block Discrete Wavelete Transform (DWT) again to acquire four subbands, the k-th watermark bit was chosen to be embedded in the k-th block's low-frequency, horizontal, vertical and high-frequency subbands of matrix Q by Markov Chain Monte Carlo (MCMC) sampling of four subbands and record the current key of embedded subband. It not only made watermark bit randomization, but also improved the safety of the watermark algorithm. The experimental results show that the proposed watermarking has strong robustness against conventional attacks under the condition of satisfying invisibility, meanwhile, it enhances the security of the watermark algorithm, which is embedded with a different key by MCMC sampling in the watermark embedding process.
Related Articles | Metrics