Complexity最新文献

筛选
英文 中文
Complexity in the Wake of Artificial Intelligence 人工智能带来的复杂性
IF 1.7 4区 工程技术
Complexity Pub Date : 2025-05-30 DOI: 10.1155/cplx/7656280
Theodore Modis
{"title":"Complexity in the Wake of Artificial Intelligence","authors":"Theodore Modis","doi":"10.1155/cplx/7656280","DOIUrl":"https://doi.org/10.1155/cplx/7656280","url":null,"abstract":"<div>\u0000 <p>This study aims to evaluate quantitatively (albeit in arbitrary units) the evolution of complexity of the human system since the domestication of fire. This is made possible by studying the timing of the 14 most important milestones—breaks in historical perspective—in the evolution of humans. AI is considered here as the latest such milestone with importance comparable to that of the Internet. The complexity is modeled to have evolved along a bell-shaped curve, reaching a maximum around our times, and soon entering a declining trajectory. According to this curve, the next evolutionary milestone of comparable importance is expected around 2050–2052 and should add less complexity than AI but more than the milestone grouping together nuclear energy, DNA, and the transistor. The peak of the complexity curve coincides squarely with the life span of the baby boomers. The peak in the rate of growth of the world population precedes the complexity peak by 25 years, which is about the time it takes a young man or woman before they are able to add complexity to the human system in a significant way. It is in society’s interest to flatten the complexity bell-shaped curve to whatever extent this is possible in order to enjoy complexity longer.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/7656280","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144171786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Violence Patterns in Mexico: A Complex Temporal Networks Approach 墨西哥的暴力模式分析:一个复杂的时间网络方法
IF 1.7 4区 工程技术
Complexity Pub Date : 2025-05-30 DOI: 10.1155/cplx/4454714
Edwin Montes-Orozco, Roman-Anselmo Mora-Gutiérrez, Roberto Bernal-Jaquez, Daniela Aguirre-Guerrero
{"title":"Analysis of Violence Patterns in Mexico: A Complex Temporal Networks Approach","authors":"Edwin Montes-Orozco,&nbsp;Roman-Anselmo Mora-Gutiérrez,&nbsp;Roberto Bernal-Jaquez,&nbsp;Daniela Aguirre-Guerrero","doi":"10.1155/cplx/4454714","DOIUrl":"https://doi.org/10.1155/cplx/4454714","url":null,"abstract":"<div>\u0000 <p>Violence in Mexico presents a significant challenge to public safety and social stability and requires a comprehensive understanding of its temporal dynamics. This study uses a complex temporal networks approach to analyze patterns of violence across municipalities, focusing on crimes such as homicide, sexual assault, discrimination, and armed robbery. Using data spanning 6 years (2015–2021), this study builds temporal networks to find fundamental patterns and trends in violence. Then, using advanced network analysis techniques, including robustness assessment and influence quantification, key influential municipalities were identified within the violence network. The findings of this research can offer valuable information to carry out specific interventions and resource allocation strategies to improve public safety in Mexico.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/4454714","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144179200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Soliton and Wave Solutions for the Dual-Perturbed Integrable Boussinesq Equation 双摄动可积Boussinesq方程的新孤子解和波解
IF 1.7 4区 工程技术
Complexity Pub Date : 2025-05-30 DOI: 10.1155/cplx/2800207
Akhtar Hussain, Tarek F. Ibrahim, Faizah D. Alanazi, Waleed M. Osman, Arafa A. Dawood, Jorge Herrera
{"title":"Novel Soliton and Wave Solutions for the Dual-Perturbed Integrable Boussinesq Equation","authors":"Akhtar Hussain,&nbsp;Tarek F. Ibrahim,&nbsp;Faizah D. Alanazi,&nbsp;Waleed M. Osman,&nbsp;Arafa A. Dawood,&nbsp;Jorge Herrera","doi":"10.1155/cplx/2800207","DOIUrl":"https://doi.org/10.1155/cplx/2800207","url":null,"abstract":"<div>\u0000 <p>Nonlinear science represents a foundational frontier in scientific inquiry that explores the shared characteristics inherent in nonlinear phenomena. This study focused on the perturbed Boussinesq (PB) equation incorporating dual perturbation terms. Soliton solutions were deduced by leveraging the traveling wave hypothesis. Furthermore, by employing the generalized Jacobi elliptic expansion function (JEEF) method and the improved tan (Λ/2) method, diverse nonlinear wave solutions, including kink, dark, periodic, bright, singular, periodic waves, bell-shaped solitons, solitary waves, shock waves, and kink-shaped soliton solutions, were acquired. The establishment of constraint relations is detailed to delineate the criteria for the existence of these wave solutions. Notably, these solutions are innovative and present novel contributions that have not yet been documented in the literature. In addition, 2D and 3D graphics were constructed to visually elucidate the physical behavior inherent to these newly acquired exact solutions.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/2800207","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144179199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Optimal Intervention Strategies on Psychoactive Substance Abuse Dynamics With Addicted Immigrants: A Mathematical Study 最优干预策略对成瘾移民精神活性物质滥用动态的影响:一个数学研究
IF 1.7 4区 工程技术
Complexity Pub Date : 2025-05-23 DOI: 10.1155/cplx/5581960
Samson Olaniyi, Sulaimon F. Abimbade, Jamiu A. Ademosu, Richard C. Ogbonna, Ramoshweu S. Lebelo, Kazeem O. Okosun
{"title":"Impact of Optimal Intervention Strategies on Psychoactive Substance Abuse Dynamics With Addicted Immigrants: A Mathematical Study","authors":"Samson Olaniyi,&nbsp;Sulaimon F. Abimbade,&nbsp;Jamiu A. Ademosu,&nbsp;Richard C. Ogbonna,&nbsp;Ramoshweu S. Lebelo,&nbsp;Kazeem O. Okosun","doi":"10.1155/cplx/5581960","DOIUrl":"https://doi.org/10.1155/cplx/5581960","url":null,"abstract":"<div>\u0000 <p>In this work, the population dynamics of psychoactive substance abuse model governed by a system of nonlinear ordinary differential equations is studied through the efficacy and economic analyses. The study considers three time-variant intervention strategies, such as screening of addicted immigrants, advocacy against substance abuse and rehabilitation therapy for the control of substance abuse spread in the population. Most sensitive parameters to be targeted by the control interventions are examined through sensitivity analysis using the normalized forward sensitivity index. By employing optimal control theory, the existence of optimal control is qualitatively analysed and the control triple is characterized using Pontryagin’s maximum principle. To further assess the impact of the intervention strategies, three different policies combining any two of the intervention strategies, namely, Policy A (combination of screening of addicted immigrants and advocacy against substance abuse), Policy B (combination of screening of addicted immigrants and rehabilitation therapy) and Policy C (combination of advocacy against substance abuse and rehabilitation therapy), are considered. Efficacy and economic analyses are extensively conducted on each of the policies, and it is revealed that Policy B is the most efficient intervention, while Policy C is the most cost-effective intervention. As a result, the policy that averts the highest number of psychoactive substance abuse cases when limited resources are available is recommended.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/5581960","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine-Reading Comprehension for Bridge Inspection Domain by Fusing Graph Embedding 基于融合图嵌入的桥梁检测领域机器阅读理解
IF 1.7 4区 工程技术
Complexity Pub Date : 2025-05-22 DOI: 10.1155/cplx/6691354
Fangyue Xiang, Hongjin Zhu, YuFang Sun, Maobo Zheng, Wenyong Yan
{"title":"Machine-Reading Comprehension for Bridge Inspection Domain by Fusing Graph Embedding","authors":"Fangyue Xiang,&nbsp;Hongjin Zhu,&nbsp;YuFang Sun,&nbsp;Maobo Zheng,&nbsp;Wenyong Yan","doi":"10.1155/cplx/6691354","DOIUrl":"https://doi.org/10.1155/cplx/6691354","url":null,"abstract":"<div>\u0000 <p>Bridge inspection text records are very significant for the maintenance and upkeep of bridges, which can help engineers and maintenance personnel to understand the actual condition of bridges, detect and repair problems in time, and ensure the safe operation of bridges. Currently, more and more research focuses on how to extract potentially valuable bridge-related information from bridge inspection texts. In this study, we take the bridge inspection domain machine-reading comprehension corpus as the data support for model training and performance evaluation; oriented to the bridge inspection domain data text extraction machine-reading comprehension task, on the basis of word-granularity text input, we further explore two schemes of co-occurring linkage of cross-sentence entities in the context and co-occurring linkage of entities within the sentence through graph structure, and we learn and extract naming through graph-attentive neural networks-structured semantic information between entities and fused the obtained named entity embeddings with a hidden representation of the pretrained context. Tested on the bridge inspection domain dataset, the integrated model proposed in this research improves the EM optimum by 1.4% and the mean by 2.2% and the F1 optimum by 2.2% and the mean by 1.6% on the BIQA test, compared with the better-performing baseline model RoBERTa_wwm_ext.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/6691354","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144108960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Deep Learning-Based Framework for Predicting Cyber Violence in Social Networks 基于深度学习的预测社交网络中网络暴力的有效框架
IF 1.7 4区 工程技术
Complexity Pub Date : 2025-05-12 DOI: 10.1155/cplx/2750326
Younes Fayand Fathabad, Mohammad Ali Balafar, Amin Golzari Oskouei, Kamal Koohi
{"title":"An Efficient Deep Learning-Based Framework for Predicting Cyber Violence in Social Networks","authors":"Younes Fayand Fathabad,&nbsp;Mohammad Ali Balafar,&nbsp;Amin Golzari Oskouei,&nbsp;Kamal Koohi","doi":"10.1155/cplx/2750326","DOIUrl":"https://doi.org/10.1155/cplx/2750326","url":null,"abstract":"<div>\u0000 <p>The widespread use of the internet has led to the rapid expansion of social networks, making it easier for individuals to share content online. However, this has also increased the prevalence of cyber violence, necessitating the development of automated detection methods. Deep learning-based algorithms have proven effective in identifying violent content, yet existing models often struggle with understanding contextual nuances and implicit forms of cyber violence. To address this limitation, we propose a novel deep multi-input recurrent neural network architecture that incorporates neighborhood-based contextual information during training. The Jaccard similarity metric is employed to construct neighborhoods of input texts, allowing the model to leverage surrounding context for improved feature extraction. The proposed model combines Bi-LSTM and GRU networks to capture both sequential dependencies and contextual relationships effectively. The proposed model was evaluated on a real-world cyber violence dataset, achieving an accuracy of 94.29%, recall of 81%, precision of 72%, and an F1-score of 76.23% when incorporating neighborhood-based learning. Without contextual information, the model attained an accuracy of 89.15%, recall of 72.00%, precision of 71.5%, and an F1-score of 71.74%. These results demonstrate that neighborhood-based learning contributed to an average improvement of 5.14% in accuracy and 4.49% in F1-score, underscoring the importance of contextual awareness in cyber violence detection. These results highlight the significance of contextual awareness in deep learning-based text classification and underscore the potential of our approach for real-world​ applications.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/2750326","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143938866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Stability and Bifurcation in a Discretized Predator–Prey Model With Holling Type III Response and Prey Refuge Via Piecewise Constant Argument Method 用分段常参数法研究具有Holling III型响应和猎物避难所的离散捕食者-食饵模型的稳定性和分岔性
IF 1.7 4区 工程技术
Complexity Pub Date : 2025-05-12 DOI: 10.1155/cplx/4542190
Faisal Alsharif, Rizwan Ahmed, Ibrahim Alraddadi, Mohammed Alsubhi, Muhammad Amer, Md. Jasim Uddin
{"title":"A Study of Stability and Bifurcation in a Discretized Predator–Prey Model With Holling Type III Response and Prey Refuge Via Piecewise Constant Argument Method","authors":"Faisal Alsharif,&nbsp;Rizwan Ahmed,&nbsp;Ibrahim Alraddadi,&nbsp;Mohammed Alsubhi,&nbsp;Muhammad Amer,&nbsp;Md. Jasim Uddin","doi":"10.1155/cplx/4542190","DOIUrl":"https://doi.org/10.1155/cplx/4542190","url":null,"abstract":"<div>\u0000 <p>This study explores the dynamics of a discrete-time predator–prey system, incorporating a Holling type III functional response and prey refuge, through the piecewise constant argument method. This method keeps things consistent and prevents negative population values, which is often a drawback of older techniques. We take a closer look at fixed points, exploring their existence and stability. We identify the conditions that lead to period-doubling and Neimark–Sacker bifurcations, and we back up our findings with numerical simulations. Our findings emphasize how important the predation coefficient is for keeping ecological balance and show that, in this model setup, the refuge for prey has a minimal effect on the stability of the system. These insights help us better understand the relationships between predators and their prey, providing valuable guidance for conserving biodiversity and managing ecosystems.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/4542190","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143938856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nonlinear Epidemic Model With Media Coverage: Stability, Bifurcation, and Control in a Population With Pre-Existing Immunity 具有媒体覆盖的非线性流行病模型:稳定性、分岔和具有预先免疫人群的控制
IF 1.7 4区 工程技术
Complexity Pub Date : 2025-05-12 DOI: 10.1155/cplx/1572080
Mohammad Idrees, Nigar Ali, Ihtisham Ul Haq, Imtiaz Ahmad, Mohammed Daher Albalwi, Md. Haider Ali Biswas
{"title":"Nonlinear Epidemic Model With Media Coverage: Stability, Bifurcation, and Control in a Population With Pre-Existing Immunity","authors":"Mohammad Idrees,&nbsp;Nigar Ali,&nbsp;Ihtisham Ul Haq,&nbsp;Imtiaz Ahmad,&nbsp;Mohammed Daher Albalwi,&nbsp;Md. Haider Ali Biswas","doi":"10.1155/cplx/1572080","DOIUrl":"https://doi.org/10.1155/cplx/1572080","url":null,"abstract":"<div>\u0000 <p>This paper proposes a deterministic nonlinear epidemic model, <span></span><math></math>, incorporating media coverage for the analysis of infectious disease transmission dynamics, considering quarantine and isolation control strategies in a community with pre-existing immunity, and taking into account both asymptomatic and symptomatic infections. The model examines two equilibria: the disease-free equilibrium and a unique endemic equilibrium, investigating their existence and local stability concerning the effective reproduction number, <i>R</i><sub><i>e</i></sub>. In addition, global stability analysis of these equilibria is conducted. Media coverage is found to have no effect on <i>R</i><sub><i>e</i></sub> but plays a crucial role in mitigating the disease burden by reducing the number of infectious individuals at the endemic steady state and decreasing the infection peak. A new method is introduced to estimate the coefficients of media coverage. Based on the findings of central manifold theory, it is observed that when <i>R</i><sub><i>e</i></sub> exceeds unity, a transcritical bifurcation takes place in the system, leading to the asymptotic stability of the endemic equilibrium. Moreover, it is noted that the effectiveness of quarantine and isolation at the population level depends on the transmission rate among isolated and quarantined individuals, while higher pre-existing immunity in the population reduces the infection peak and hastens its occurrence. Theoretical results are validated through simulations, and sensitivity analysis is conducted for the effectiveness of <i>R</i><sub><i>e</i></sub> with respect to model parameters.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/1572080","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143939196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Venture Capital and Social Responsibility Behavior: An Evolutionary Game-Based Approach 风险投资与社会责任行为:基于进化博弈的方法
IF 1.7 4区 工程技术
Complexity Pub Date : 2025-05-11 DOI: 10.1155/cplx/6661472
Yuzhong Lu, Guillermo A. Buitrago, Meng Li
{"title":"Venture Capital and Social Responsibility Behavior: An Evolutionary Game-Based Approach","authors":"Yuzhong Lu,&nbsp;Guillermo A. Buitrago,&nbsp;Meng Li","doi":"10.1155/cplx/6661472","DOIUrl":"https://doi.org/10.1155/cplx/6661472","url":null,"abstract":"<div>\u0000 <p>This study introduces a novel evolutionary game-based model to explore the dynamic interplay between venture capital (VC) institutions and their invested firms in adopting corporate social responsibility (CSR) practices, with a focus on the moderating role of government supervision. With CSR gaining prominence in VC-backed firm ecosystems, understanding these dynamics is critical. Verified through numerical simulations, the model examines system evolution under scenarios with and without government supervision. Key findings include the following: (1) VC-backed firms are more likely to adopt CSR practices when VCs prioritize long-term investment strategies, whereas short-term strategies centered on shareholder value hinder CSR efforts; (2) factors such as VC equity share, CSR costs, and benefits significantly influence CSR adoption; and (3) government incentives can promote CSR and accelerate convergence toward ideal outcomes, though with limited impact. This research advances the understanding of the VC-CSR relationship, offering theoretical insights and practical recommendations to foster responsible investment and business practices.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/6661472","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143939072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolutionary Game Analysis of Knowledge Sharing in Enterprise Sponsored Virtual Communities Considering User Characteristics 考虑用户特征的企业赞助虚拟社区知识共享演化博弈分析
IF 1.7 4区 工程技术
Complexity Pub Date : 2025-05-08 DOI: 10.1155/cplx/7549833
Zhihui Ding, Zuoming Lu, Wenlong Zhu
{"title":"Evolutionary Game Analysis of Knowledge Sharing in Enterprise Sponsored Virtual Communities Considering User Characteristics","authors":"Zhihui Ding,&nbsp;Zuoming Lu,&nbsp;Wenlong Zhu","doi":"10.1155/cplx/7549833","DOIUrl":"https://doi.org/10.1155/cplx/7549833","url":null,"abstract":"<div>\u0000 <p>Enterprise sponsored virtual communities (ESVC) are important platforms for user knowledge sharing. User characteristics, as influential factors in these communities, impact the evolution of knowledge sharing processes. In this study, a knowledge sharing evolutionary game model that considers the influence of user characteristics was constructed. A payoff matrix was established, and stable points were identified for further analysis. Simulation analysis was conducted to explore the impact of changes in user characteristics on the knowledge sharing strategies of both parties. This study revealed the following findings: First, the knowledge reservoir of ESVC users affects their willingness to share knowledge, with ordinary users’ willingness initially increasing and then decreasing as their knowledge reservoirs grow. Second, the willingness of leading users to share knowledge initially decreases and then increases as their knowledge reservoirs expand. Third, improvements in the knowledge absorption and transformation capabilities of both leading and ordinary users promote knowledge sharing behaviour, although the extent of this impact differs between the two groups.</p>\u0000 </div>","PeriodicalId":50653,"journal":{"name":"Complexity","volume":"2025 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/cplx/7549833","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143919911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信