Next Article in Journal
Irruption Theory: A Novel Conceptualization of the Enactive Account of Motivated Activity
Previous Article in Journal
Research on Improved DNA Coding and Multidirectional Diffusion Image Encryption Algorithm
Previous Article in Special Issue
Social Influence Maximization in Hypergraphs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Supply Chain Risk Diffusion in Partially Mapping Double-Layer Hypernetworks

1
School of Science, Dalian Maritime University, Dalian 116026, China
2
School of Maritime Economics and Management, Dalian Maritime University, Dalian 116026, China
*
Authors to whom correspondence should be addressed.
Entropy 2023, 25(5), 747; https://doi.org/10.3390/e25050747
Submission received: 8 March 2023 / Revised: 19 April 2023 / Accepted: 28 April 2023 / Published: 2 May 2023
(This article belongs to the Special Issue Advances in Complex Systems Modelling via Hypergraphs)

Abstract

:
The impact of COVID-19 is global, and uncertain information will affect product quality and worker efficiency in the complex supply chain network, thus bringing risks. Aiming at individual heterogeneity, a partial mapping double-layer hypernetwork model is constructed to study the supply chain risk diffusion under uncertain information. Here, we explore the risk diffusion dynamics, drawing on epidemiology, and establish an SPIR (Susceptible–Potential–Infected–Recovered) model to simulate the risk diffusion process. The node represents the enterprise, and hyperedge represents the cooperation among enterprises. The microscopic Markov chain approach (MMCA) is used to prove the theory. Network dynamic evolution includes two removal strategies: (i) removing aging nodes; (ii) removing key nodes. Using Matlab to simulate the model, we found that it is more conducive to market stability to eliminate outdated enterprises than to control key enterprises during risk diffusion. The risk diffusion scale is related to interlayer mapping. Increasing the upper layer mapping rate to strengthen the efforts of official media to issue authoritative information will reduce the infected enterprise number. Reducing the lower layer mapping rate will reduce the misled enterprise number, thereby weakening the efficiency of risk infection. The model is helpful for understanding the risk diffusion characteristics and the importance of online information, and it has guiding significance for supply chain management.

1. Introduction

A supply chain consists of manufacturers, distributors, retailers, consumers, and so on. Products, funds, and information flow through the supply chain. To become bigger and stronger, enterprises will integrate into a larger economic environment, which has led to a shift in the supply chain from a traditional chain structure to a supply chain network structure. Enterprises on the supply chain network are interdependent, and any problem with one enterprise may affect other cooperating enterprises. In April 2020, COVID-19 caused serious damage to the world. According to data released by the World Health Organization, the global cumulative number of COVID-19 cases reached 3,018,952, and there were 2,934,583 confirmed cases outside China. Factory productivity declined, the household consumption index fell, and the real economy slumped significantly. Various risks brought by the epidemic have affected the increasingly complex supply chain network [1]. The risk diffusion process on the supply chain network is an extremely complex phenomenon, and its outbreak is often accompanied by the emergence of unconfirmed information. Social software such as Microblog, Forum, YouTube, and so on have accelerated the spread of uncertain information during the epidemic and intensified the risk diffusion. The official media guides the public’s cognition and is conducive to market stability [2]. In fact, not all enterprises have online social accounts that obtain uncertain information, and not all accounts follow the official media. The heterogeneity of individuals determines that the partially mapped double-layer hypernetwork is more suitable for studying the risk diffusion process under uncertain information. It helps managers realize the importance of Internet information management and is an important part of coupling dynamics research.
Research on supply chain risk is crucial to financial risk management [3,4]. There is a need to study the performance indicators and characteristics of the supply chain and develop a conceptual model for identifying supply chain risks [5], design an intuitionistic fuzzy two-stage supply chain network considering multi-mode demand and multi-mode transportation [6], and utilize machine learning to optimize supply chain management and maximize benefits on block-chained big data [7]. In addition to the main supply chain research mentioned above, the study of supply chain risk diffusion behavior referencing epidemic models is also a hot topic. In 1927, Kermark and McKendrick first constructed the SIR (Susceptible–Infected–Recovered) model to study the spreading scale of the London Black Death [8]. After that, considering that individuals will be susceptible again, the threshold theory of the SIS (Susceptible–Infected–Susceptible) model was proposed [9], which laid the foundation for future dynamics research [10]. The epidemic model is suitable for describing the risk diffusion behavior with contagiousness in the supply chain network. Wang et al. [11] used the SIR model to discuss the impact of multiple drivers including network heterogeneity on supply chain risk diffusion. Liang et al. [12] proved that there is a significant relationship between network structure and risk transmission and supply network health.
The above research found that the propagation dynamics model is mostly based on the theoretical knowledge of complex networks represented by graphs [3,11,12]. As a complex system, the supply chain has the characteristics of complexity, dynamics, and coordination. It is not the binary relationship that ordinary graphs express. At this time, it is particularly important to use nested mathematical theoretical tools to express multiple relationships. The hypernetwork was proposed by Sheff in 1985 [13]. It has the characteristics of multi-layer, multi-level, multi-dimensional, multi-attribute, and so on. Later, Estrada et al. [14] used hypergraphs to represent complex networks, extending the concepts of subgraph centrality and clustering. Hypergraphs have been applied in various fields. Suo et al. studied the dynamic process and macro behavior of the supply chain system with the evolutionary hypergraph theory [15]. Nodes represent individuals and hyperedges represent the relationship among individuals. Yin et al. described the non-uniform evolution of social networks [16] and obtained the explicit analytical expression of hyperdegree distribution. Hypernetworks are also used for risk dynamics research to explore the formation and development process of risk [17].
However, risk diffusion in supply chain networks is influenced by multiple factors. It is not comprehensive to capture the risk diffusion behavior of each node by building an isolated network [11,12]. Mukunda et al. [18] constructs a two-layer supply chain model under dynamic demand to optimize supply chain profits. Huo et al. [19] constructed multiple networks to analyze the impact of herd psychology and risk preference on risk propagation under warning information. To mitigate the damage caused by risk, it is reasonable to establish a risk transmission model with an information transmission effect [20]. Clear information will eliminate uncertainty and curb risk diffusion. Establishing a two-layer dynamic model and discussing the detailed process characteristics of the multiplexing network are of great significance [21,22]. Based on the above reasons, we deeply discuss the interaction between uncertain information and supply chain risk diffusion in partially mapping double-layer hypernetworks with the help of the SEIR epidemic model. The main contributions are as follows:
  • Based on the partially mapping double-layer hypernetwork model, the randomness of the mapping between layers is proposed, and the interaction between supply chain risk and uncertain information is described.
  • Two removal strategies are proposed to describe the network dynamic evolution process. The contribution of control means to market stability is analyzed.
  • The supply chain risk diffusion process in a partially mapping double-layer hypernetwork with MATLAB is simulated, the effectiveness of MMCA is proved, and the risk diffusion trend under two strategies and dynamic evolution parameters is grasped.
The rest of the article is as follows. Section 2 describes the partially mapping double-layer hypernetwork structure and explains the applicability of the UBU-SPIR compartment model. Section 3 makes a detailed theoretical analysis of the risk diffusion process through MMCA. Section 4 uses MATLAB to carry out the numerical simulation, test the influence of parameters, and verify the correctness of the theoretical analysis. Finally, we sum up and prospect the risk diffusion dynamics in Section 5.

2. Model Description

In the complex supply chain network, risk diffusion is not an independent event. It will be affected by instant messages [23]. Correct information will improve vigilance [19], while uncertain information has the characteristics of wide coverage, strong communication power, and low communication cost, which will affect the public psychology and knowledge system [24] and give incorrect guidance to people’s activities. Therefore, it is in line with the actual need to use a hypernetwork to abstract the supply chain network system and analyze the risk diffusion process under the influence of uncertain information.

2.1. Hypernetwork Model

Hypernetworks are represented by hypergraphs. Suppose the supply chain network has n enterprises. There are complex cooperative relationships among enterprises. The hypergraph H = { V , E h } represents the supply chain network, the node set V = { v 1 , v 2 , , v n } represents all enterprises in the supply chain network, and the node v i represents enterprises i . The hyperedge E i = { v i 1 , v i 2 , , v i g i } ( v i y V , y = 1 , 2 , g i ) represents the cooperation formed by some enterprises, and the hyperedge set E h = { E 1 , E 2 , , E m } represents all cooperation in the supply chain network. Based on the hypernetwork theory, this paper discusses the interaction between uncertain information on virtual social networks and risk diffusion on supply chain networks. The hypernetwork representation of virtual social networks is similar [16]. In virtual social networks, the node represents the enterprise, and the hyperedge represents information exchanges that accompany cooperation between enterprises. Assume that the dynamic evolution of virtual social networks and supply chain networks is consistent, and some hyperedges added randomly represent the communication between non-cooperative enterprises. To simplify the model, assume the nodes in the double-layer network correspond to each other. However, only some enterprises have social accounts, and only some accounts follow official media, so only some nodes have mapping. In this paper, the vector L = { l 1 , l 2 , , l N } represents the mapping between nodes in virtual social networks and nodes in supply chain networks, used to describe whether nodes in the supply chain networks have social accounts for information exchange in the virtual social networks. Introduce the official media O to suppress the uncertain information circulating in virtual social networks; the vector L = { l 1 , l 2 , , l N } represents the mapping between the official media and each node in the virtual social network, used to describe whether nodes in the virtual social network follow official media accounts.
The market environment is changing rapidly, and commercial orders change frequently. The supply chain network continues to develop and expand with the growth of emerging enterprises, the increase in cooperation projects, and the withdrawal of some enterprises from the initial small-scale development to regionalization and even globalization. Assume that the rate of nodes entering and exiting the supply chain network is λ 1 and λ 2 ( λ 1 > λ 2 ) , respectively, following the Poisson process. The number of nodes in each batch is fixed. The evolution behavior of the supply chain network gradually has certain regularity over time. Next, we describe the dynamic evolution process of the supply chain network with the knowledge of hypernetwork theory:
  • Enterprises in the supply chain network establish new cooperative relations.
Add m hyperedges with probability p . First, select a node randomly in the current supply chain network, and then form a new hyperedge with a nodes selected through the hyperdegree preferential attachment mechanism [25]. This process is repeated m times, corresponding to m new cooperation in the supply chain network.
2.
When the contract expires, some enterprises no longer renew the contract with former partners but cooperate with new partners.
Rewire m hyperedges with probability q . First, select node i randomly in the current network to delete one of its hyperedges e i , and then select node a as in Process 1 to form a new hyperedge e i ~ . This process is repeated m times, corresponding to the end of m old cooperation and the generation of m new cooperation in the supply chain network.
3.
New enterprises enter, and some enterprises withdraw from the market.
Add m 2 nodes and remove m 1 nodes with probability r . Different strategies lead to different removal rules. The old node in the supply chain network is more vulnerable to risks than others because of its outdated technology and weak resistance to risks. If key enterprises are infected by risk, it will cause multiple nodes to be affected by risk. Therefore, we consider removing aging nodes according to the appearance order of the node or removing key nodes according to the hyperdegree to inhibit the risk diffusion.
Figure 1 is an example of the dynamic evolution of the supply chain network. Table 1 shows the parameters related to the model.

2.2. UBU-SPIR Compartment Model

In the process of supply chain risk diffusion, uncertain information will accelerate the diffusion of risk, while the official media restricts the spread of uncertain information. This paper constructs a partially mapped double-layer hypernetwork; the upper layer is the virtual social network that describes the process of uncertain information dissemination, and the lower layer is a supply chain network that spreads risks through cooperation. In the past research on information dissemination, nodes only considered two states [26]. Therefore, as shown in Figure 2a, on the virtual communication layer, the enterprise transitions between two states through the UBU (Unbelieve–Believe–Unbelieve) model. λ indicates the probability that the U-state enterprise believes information after contacting the B-state neighbor. δ indicates the probability that the B-state enterprises no longer believe. In addition to the interaction between enterprises, the official media will release authoritative information, which will prevent the spread of uncertain information. θ j ( t , t i ) indicates the probability that the j th B-state enterprise in the i th batch no longer believes under the influence of the official media.
θ j ( t , t i ) = { τ   ,   l i j = 1 0   ,   l i j = 0 ,
where τ indicates the probability that enterprises that follow the official media no longer believe after receiving the authoritative information. l i j denotes the mapping between the j th node of the i th batch in the virtual communication layer and official media. The risks on the supply chain network are contagious. If an enterprise’s demand for raw materials decreases, it will impact the suppliers at the front end of the supply chain. If the supplier’s raw material is insufficient, the backend of the supply chain will suffer production damage. Any problem in any link of the supply chain will interfere with other cooperative enterprises, leading to risk diffusion. On the risk diffusion layer. Due to the existence of potential risks, the SPIR (Susceptible–Potential–Infected–Recovered) model is used to simulate the risk diffusion in the supply chain network. The hyperdegree is the number of hyperedges contained in a node. Enterprises with a greater hyperdegree h j ( t , t i ) are more likely to be exposed to risks. In Figure 2b, susceptible enterprises contact with infected enterprises or enterprises with potential risk with probability ω j ( t , t i ) and then convert to the P-state with probability β . η indicates the probability of being completely infected by the risk after the potential risk is serious. Infected enterprises recover at recovery rate μ and no longer involve such risks.
ω j ( t , t i ) = h j ( t , t i ) M a x ( h ( t ) ) ,
where h j ( t , t i ) indicates the hyperdegree of the j th node in the i th batch. M a x ( h ( t ) ) indicates the maximum hyperdegree at time t .
The risk diffusion on the supply chain network and the transmission of uncertain information on the virtual social network are interactive processes. If there is a mapping between the two layers ( l i j = 1 ), the infected enterprise in the risk diffusion layer will immediately realize the error of the uncertain information on the virtual communication layer, and then it will be transformed into a U-state. No mapping has no effect. For susceptible enterprises at the risk diffusion layer, the probability of enterprises misled by information being infected must be greater than that of Unbelieve-enterprises being infected. Hence, enterprises that believe in uncertain information change from the S-state to the P-state with probability β j B ( t , t i ) = Γ j ( t , t i ) β , Γ j ( t , t i ) is an inter-layer reinforcement factor, and β U = β denotes the probability that Unbelieve-enterprises change from the S-state to the P-state.
Γ j ( t , t i ) = { γ   ,   l i j = 1 1   ,   l i j = 0 ,
Γ j ( t , t i ) is related to interlayer mapping. γ ( γ > 1 ) indicates the inter-layer enhancement factor. l i j indicates the mapping between the two layers of the j th node in the i th batch. β 1 = γ β indicates the probability that the B-state enterprise changes from the S-state to the P-state when there is a mapping between the two layers. Considering the UBU-SPIR compartment model and inter-layer influence, the enterprise in the model will be in one of eight states: the US state (Unbelieve and Susceptible), UP state (Unbelieve and Potential), UI state (Unbelieve and Infected), UR state (Unbelieve and Recovered), BS state (Believe and Susceptible), BP state (Believe and Potential), BI state (Believe and Infected), or BR state (Believe and Recovered).

2.3. Dynamic Evolution Steps of the Model

Under the influence of uncertain information, the supply chain risk diffusion model on the partially mapping double-layer hypernetwork first undergoes network dynamic evolution at each time step t and then undergoes dynamic propagation. In the process of dynamic propagation, three dynamic processes occur at the same time: the dissemination of uncertain information (UBU), the release of authoritative information from official media, and the diffusion of risk (SPIR). The goal of this paper is to obtain the proportion of recovered enterprises in a stable state of the system. The dynamic evolution steps of the entire model are as follows:
Step 1: Network initialization. The initial number of nodes is 16, and an initial network of 1000 nodes is formed through the network dynamic evolution Process 1–3 in Section 2.1. The upper is the virtual communication layer, the lower is the risk diffusion layer. O represents the official media. Add 30 hyperedges randomly in the virtual communication layer to represent the information exchange between non-cooperative enterprises.
Step 2: The dynamic evolution of the double-layer hypernetwork. At each time step t , the dynamic evolution Process 1–3 in Section 2.1 randomly occur in the supply chain network and virtual social network with the probabilities p , q , and r .
Step 3: Node state transition. At each time step t , nodes in the double-layer network update states according to Figure 2. The nodes of the virtual communication layer and the risk diffusion layer interact through partial mapping.
The supply chain risk diffusion process on the partially mapping double-layer hypernetwork continues to cycle from step 2 to step 3 until the number of nodes in each state is stable, i.e., the system reaches the stable state. The dynamic evolution process of the entire model is shown in Figure 3.

3. Theoretical Analysis

As is known to all, the risk diffusion scale is related to the network structure [11]. Different node removal strategies lead to different network evolution processes, which will be beneficial to inhibiting risks. To study the impact of uncertain information, we derive the key parameters under different removal strategies and then use MMCA to obtain the proportion of enterprise in various states when the system is stable.

3.1. Remove the Aging Node

If the removal of Process 3 is determined by the node life [27], h j ( t , t i ) affected by Process 1–3 in Section 2.1 will meet the following three dynamic equations:
h j ( t , t i ) t = p m ( λ 1 λ 2 ) [ 1 N ( t ) + a h j ( t , t i ) + 1 i j ( h j ( t , t i ) + 1 ) ] ,
h j ( t , t i ) t = q m ( λ 1 λ 2 ) [ 1 N ( t ) + a h j ( t , t i ) + 1 i j ( h j ( t , t i ) + 1 ) ] ,
h j ( t , t i ) t = r m 1 λ 2 t i j 1 i j t i j 1 h j ( t , t i ) ,
where t i j represents the time when the j th node in the i th batch enters the system.
In fact, in a unit time step, three steps occur simultaneously. Thus, the hyperdegree h j ( t , t i ) change should include three dynamic processes. Combined with Equations (4)–(6), we can obtain:
h j ( t , t i ) t = m ( λ 1 λ 2 ) N ( t ) ( p q ) + a h j ( t , t i ) + 1 i j ( h j ( t , t i ) + 1 ) m ( λ 1 λ 2 ) ( p + q ) r λ 2 m 1 t i j 1 i j t i j 1 h j ( t , t i ) .
When t , N ( t ) ( λ 1 λ 2 ) t , and i j ( h j ( t , t i ) + 1 ) [ p m ( 1 + a ) + m 2 r m 1 ] E [ N ( t ) ] . Let A = lim t i j t i j 1 N ( t ) and G = A m 1 ; Equation (7) can be written as:
h j ( t , t i ) t = 1 t { m ( p q ) + [ a m ( p + q ) p m ( 1 + a ) + m 2 r m 1 r λ 2 t i j 1 G ( λ 1 λ 2 ) ] h j ( t , t i ) + a m ( p + q ) p m ( 1 + a ) + m 2 r m 1 } .
From the initial conditions, we know that the j th node in the i th batch reaches the system at t i ; thus, h j ( t i , t i ) = r . Let Q = a m ( p + q ) p m ( 1 + a ) + m 2 r m 1 , J = m ( p q ) , and K = a m ( p + q ) p m ( 1 + a ) + m 2 r m 1 r λ 2 t i j 1 G ( λ 1 λ 2 ) . . Solving Equation (8), we obtain
h j ( t , t i ) = ( r + J + Q K ) ( t t i ) K J + Q K .
Therefore,
ω j ( t , t i ) = ( r + J + Q K ) ( t t i ) K J + Q K M a x ( h ( t ) ) .

3.2. Remove the Key Node

If the Process 3 is to select key nodes for removal, for the three equations that h j ( t , t i ) meets, the first two equations are the same as Equations (4) and (5), and the third equation is as follows:
h j ( t , t i ) t = r m 1 λ 2 h j ( t , t i ) + 1 i j ( h j ( t , t i ) + 1 ) h j ( t , t i ) .
Combining Equations (4), (5), and (11), Equation (12) is obtained:
h j ( t , t i ) t = m ( λ 1 λ 2 ) N ( t ) ( p q ) + m ( λ 1 λ 2 ) a h j ( t , t i ) + 1 i j ( h j ( t , t i ) + 1 ) ( p + q ) r m 1 λ 2 h j ( t , t i ) + 1 i j ( h j ( t , t i ) + 1 ) h j ( t , t i ) .
When t , N ( t ) ( λ 1 λ 2 ) t , and i j ( h j ( t , t i ) + 1 ) [ p m ( a + 1 ) + m 2 r m 1 ] E [ N ( t ) ] . Therefore,
h j ( t , t i ) t = 1 t { m ( p q ) + m a ( λ 1 λ 2 ) ( p + q ) [ p m ( 1 + a ) + m 2 r m 1 ] ( λ 1 λ 2 ) ( h j ( t , t i ) + 1 )   r m 1 λ 2 [ p m ( 1 + a ) + m 2 r m 1 ] ( λ 1 λ 2 ) ( h j ( t , t i ) + 1 ) h j ( t , t i ) } .
Let K = m a ( λ 1 λ 2 ) ( p + q ) [ p m ( a + 1 ) + m 2 r m 1 ] ( λ 1 λ 2 ) , Q = r m 1 λ 2 [ p m ( a + 1 ) + m 2 r m 1 ] ( λ 1 λ 2 ) , and J = m ( p q ) . Then, integrate both sides of Equation (13) and finally obtain
h j ( t , t i ) = K Q 2 Q 4 Q ( J + K ) + ( Q K ) 2 2 Q P a .
P a = 2 Q r + Q K + 4 Q ( J + K ) + ( Q K ) 2 + [ 2 Q r + Q K 4 Q ( J + K ) + ( Q K ) 2 ] ( t t i ) 4 Q ( J + K ) + ( Q K ) 2 2 Q r + Q K 4 Q ( J + K ) + ( Q K ) 2 ( t t i ) 4 Q ( J + K ) + ( Q K ) 2 [ 2 Q r + Q K + 4 Q ( J + K ) + ( Q K ) 2 ] .
The probability of the j th node in the i th batch encountering the risk is obtained by Equations (2) and (14).
At each time step t , the node is in one of eight states with the probabilities P j U S ( t , t i ) , P j U P ( t , t i ) , P j U I ( t , t i ) , P j U R ( t , t i ) , P j B S ( t , t i ) , P j B P ( t , t i ) , P j B I ( t , t i ) , and P j B R ( t , t i ) , respectively, and meets the normalization conditions P j U S ( t , t i ) + P j U P ( t , t i ) + P j U I ( t , t i ) + P j U R ( t , t i ) + P j B S ( t , t i ) + P j B P ( t , t i ) + P j B I ( t , t i ) + P j B R ( t , t i ) 1 . In the risk diffusion layer, n i j represents the j th node in the i th batch. If there is a relationship between the nodes n i j and n z f , then c i j z f = 1 ; otherwise, c i j z f = 0 . So, in the virtual communication layer, d i j z f = 1 means there is a relationship between the nodes n i j and n z f , and d i j z f = 0 means there is no relationship. Let Θ j ( t , t i ) indicate the probability that the U-state node does not receive uncertain information from neighbors, q j U ( t , t i ) indicate the probability that the U-state node is infected by risk, and q j B ( t , t i ) indicate the probability that the B-state node is infected by risk. Combined with Figure 2, the state transition probability tree of eight states is shown in Figure 4.
Θ j ( t , t i ) = Π z Π f [ 1 d i j z f λ P f B ( t , t z ) ] ,
q j U ( t , t i ) = Π z Π f { 1 c i j z f [ P f P ( t , t z ) + P f I ( t , t z ) ] κ ω j ( t , t i ) β U } ,
q j B ( t , t i ) = Π z Π f { 1 c i j z f [ P f P ( t , t z ) + P f I ( t , t z ) ] κ ω j ( t , t i ) β j B ( t , t i ) } ,
where κ is the adjustment coefficient. P f B ( t , t z ) = P f B S ( t , t z ) + P f B P ( t , t z ) + P f B I ( t , t z ) + P f B R ( t , t z ) , P f P ( t , t z ) = P f U P ( t , t z ) + P f B P ( t , t z ) , P f I ( t , t z ) = P f U I ( t , t z ) + P f B I ( t , t z ) .
MMCA has been used for dynamic research many times, including disease spreading and information dissemination [28,29,30]. It can track the node state in the supply chain risk diffusion process [19]. According to the state transition probability tree in Figure 4, the dynamic transition process of each node state in the model is written as:
P j U S ( t + 1 , t i ) = P j U S ( t , t i ) { Θ j ( t , t i ) q j U ( t , t i ) + [ 1 Θ j ( t , t i ) ] θ j ( t , t i ) q j U ( t , t i ) }   + P j B S ( t , t i ) [ δ q j U ( t , t i ) + ( 1 δ ) θ j ( t , t i ) q j U ( t , t i ) ] ,
P j B S ( t + 1 , t i ) = P j U S ( t , t i ) [ 1 Θ j ( t , t i ) ] [ 1 θ j ( t , t i ) ] q j B ( t , t i )   + P j B S ( t , t i ) ( 1 δ ) [ 1 θ j ( t , t i ) ] q j B ( t , t i ) ,
P j U P ( t + 1 , t i ) = P j U S ( t , t i ) { Θ j ( t , t i ) [ 1 q j U ( t , t i ) ] + [ 1 Θ j ( t , t i ) ] θ j ( t , t i ) [ 1 q j U ( t , t i ) ] }   + P j B S ( t , t i ) { δ [ 1 q j U ( t , t i ) ] + ( 1 δ ) θ j ( t , t i ) [ 1 q j U ( t , t i ) ] } + P j U P ( t , t i )   { Θ j ( t , t i ) ( 1 η ) + [ 1 Θ j ( t , t i ) ] θ j ( t , t i ) ( 1 η ) } + P j B P ( t , t i ) [ δ ( 1 η )   + ( 1 δ ) θ j ( t , t i ) ( 1 η ) ] ,
P j B P ( t + 1 , t i ) = P j U S ( t , t i ) [ 1 Θ j ( t , t i ) ] [ 1 θ j ( t , t i ) ] [ 1 q j B ( t , t i ) ] + P j B S ( t , t i )   ( 1 δ ) [ 1 θ j ( t , t i ) ] [ 1 q j B ( t , t i ) ] + P j U P ( t , t i ) [ 1 Θ j ( t , t i ) ]   [ 1 θ j ( t , t i ) ] ( 1 η ) + P j B P ( t , t i ) ( 1 δ ) [ 1 θ j ( t , t i ) ] ( 1 η ) ,
P j U I ( t + 1 , t i ) = P j U P ( t , t i ) { Θ j ( t , t i ) η + [ 1 Θ j ( t , t i ) ] θ j ( t , t i ) η + [ 1 Θ j ( t , t i ) ] [ 1 θ j ( t , t i ) ] η l i j }   + P j B P ( t , t i ) { δ η + ( 1 δ ) θ j ( t , t i ) η + ( 1 δ ) [ 1 θ j ( t , t i ) ] η l i j } + P j U I ( t , t i )   { Θ j ( t , t i ) ( 1 μ ) + [ 1 Θ j ( t , t i ) ] θ j ( t , t i ) ( 1 μ ) + [ 1 Θ j ( t , t i ) ] [ 1 θ j ( t , t i ) ]   ( 1 μ ) l i j } + P j B I ( t , t i ) [ δ ( 1 μ ) + ( 1 δ ) θ j ( t , t i ) ( 1 μ ) ] ,
P j B I ( t + 1 , t i ) = P j U P ( t , t i ) [ 1 Θ j ( t , t i ) ] [ 1 θ j ( t , t i ) ] η ( 1 l i j ) + P j B P ( t , t i )   ( 1 δ ) [ 1 θ j ( t , t i ) ] η ( 1 l i j ) + P j U I ( t , t i ) [ 1 Θ j ( t , t i ) ]   [ 1 θ j ( t , t i ) ] ( 1 μ ) ( 1 l i j ) + P j B I ( t , t i ) ( 1 δ ) [ 1 θ j ( t , t i ) ] ( 1 μ ) ,
P j U R ( t + 1 , t i ) = P j U I ( t , t i ) { Θ j ( t , t i ) μ + [ 1 Θ j ( t , t i ) ] θ j ( t , t i ) μ } + P j B I ( t , t i ) [ δ μ + ( 1 δ ) θ j ( t , t i )   μ ] + P j U R ( t , t i ) { Θ j ( t , t i ) + [ 1 Θ j ( t , t i ) ] θ j ( t , t i ) } + P j B R ( t , t i ) [ δ + ( 1 δ ) θ j ( t , t i ) ] ,
P j B R ( t + 1 , t i ) = P j U I ( t , t i ) [ 1 Θ j ( t , t i ) ] [ 1 θ j ( t , t i ) ] μ + P j B I ( t , t i ) ( 1 δ ) [ 1 θ j ( t , t i ) ] μ   + P j U R ( t , t i ) [ 1 Θ j ( t , t i ) ] [ 1 θ j ( t , t i ) ] + P j B R ( t , t i ) ( 1 δ ) [ 1 θ j ( t , t i ) ] .
According to the Markov Chain Approach, node state transitions occur over time. The state probability of any node at any time is obtained.
P j R ( t + 1 , t i ) = P j U R ( t + 1 , t i ) + P j B R ( t + 1 , t i ) = μ P j I ( t , t i ) + P j R ( t , t i ) ,
P j I ( t + 1 , t i ) = P j U I ( t + 1 , t i ) + P j B I ( t + 1 , t i ) = η P j P ( t , t i ) + ( 1 μ ) P j I ( t , t i ) .
The system tends to be stable when the time step is large enough. Thus, when t , P j I ( t + 1 , t i ) P j I ( t , t i ) P i j I , and P j R ( t + 1 , t i ) P j R ( t , t i ) P i j R . P j R ( t + 1 , t i ) P j R ( t , t i ) < ε . Equation (26) can be written as
μ P i j I < ε ,   P i j I < ε μ .
This shows that the proportion of infected enterprises approaches 0 when the system is stable. According to Equation (27), we will obtain the probability under a stable state
P i j I = η μ P i j P .
This paper considers the heterogeneity of individuals. Official media, virtual social networks, and supply chain networks are all partially mapped. Furthermore, we compared the removal of key nodes with aging nodes to find the best strategy for mitigating risk. In fact, if L = L = { 1 , 1 , , 1 } , nodes exit according to the lifetime during the dynamic evolution of the network (Section 3.1). The model will degenerate into the risk diffusion model in Ref. [27].

4. Numerical Simulation

In the study of risk diffusion, the proportion of recovered enterprises ρ R in the stable state is an important indicator for judging the effect of risk mitigation. In this section, we will discuss the influence of model parameters on ρ R through Monte Carlo (MC) simulation and MMCA iterative calculation. In the iterative calculation of MMCA, ρ R = i j P i j U R + P i j B R N × 100 % . In MC simulation, ρ R = N U R + N B R N × 100 % . P i j U R and P i j B R , respectively, represent the probability that the j th node in the i th batch is in the UR and BR states, while N U R and N B R represent the number of nodes in the UR and BR states, respectively. N represents the total number of nodes. The setting parameter of the initial network is a = 5 , m = 2 , m 1 = 5 , m 2 = 7 , p = 0.3 , and q = 0.25 . Consider the dynamic evolution of the network; let, p + q + r 1 . The upper layer mapping rate and the lower layer mapping rate are defined as ψ = i j l i j N × 100 % and ϕ = i j l i j N × 100 % , respectively, where l i j L , and l i j L . When the simulation starts, the mapping is randomly generated, and the mapping rate is 80%. Furthermore, 10 nodes are randomly selected to set to the P-state. B-state nodes are generated in the same way.

4.1. Removal of Aging Nodes

First, to verify the effectiveness of MMCA in characterizing the supply chain risk diffusion in the partially mapping double-layer hypernetwork under the strategy of removing aging nodes, Figure 5 describes the change in the proportion of enterprises in each state with time t . Then, the average relative error between MMCA and MC simulation is calculated using the formula | ρ M C ρ M M C A | / ρ M C . The result shows that the point plot and line plot basically overlap. The relative error of the proportion of enterprises in the U-, B-, S-, and R-states is 1.42%, 4.58%, 1.81%, and 4.55%, respectively. Hence, MMCA can be used to simulate the risk diffusion process of the supply chain in a partially mapping double-layer hypernetwork.
Second, in Figure 6, we draw ρ R as a function of β 1 for different dynamic parameters ( p , q , r ) and the lower layer mapping rate ϕ . When β 1 ( 0 , 1 ) is constant, it can be seen that the proportion of recovered enterprises increases with the lower layer mapping rate ϕ . There is no difference between Figure 6a,b, while the function image in Figure 6c decreases as a whole. This is because when the lower layer mapping rate is high, most enterprises will make wrong judgments after receiving uncertain information and then be infected by risks. In this case, the development of new cooperation and the transfer of partners will increase the probability of being infected, which will make risks greatly spread in the system. Only by eliminating outdated enterprises can the proportion of infected enterprises be reduced.
Under different dynamic parameters ( p , q , r ), Figure 7 shows the change in ρ R with the increase in β 1 for different upper layer mapping rates ψ . Obviously, the proportion of recovered enterprises ρ R decreases with the increase in the upper mapping rate ψ . The function images in Figure 7a,b are basically the same, and the function image in Figure 7c moves down as a whole. Thus, too much cooperation is not suitable during the risk, and the elimination of outdated enterprises is conducive to market stability. The improvement of the upper layer mapping rate has increased the attention of enterprises to authoritative information, which will inhibit the spread of uncertain information and largely prevent the spread of risk.

4.2. Removal of Key Nodes

It is the same as in Section 4.1. First, the effectiveness of MMCA in characterizing supply chain risk diffusion under the strategy of removing key nodes is verified. From Figure 8, it can be seen that the function image of the proportion of enterprises in U-, B-, S-, P-, I-, and R-states under MC simulation and MMCA iteration is basically consistent. For the proportion of U-state enterprises, the relative error is 1.60%. For the proportion of enterprises in the B-state, S-state, and R-state, the relative error is 5.11%, 3.07%, and 6.79%, respectively. Therefore, MMCA is suitable for continuing to test the impact of parameters on supply chain risk diffusion under the strategy of removing key nodes.
Next, under different dynamic parameters ( p , q , r ), Figure 9 shows ρ R as a function of β 1 for different lower layer mapping rates ϕ . It is basically consistent with the results in Figure 6; ρ R increases with the upper layer mapping rate ϕ . Compared with Figure 9a,b, the function diagram of Figure 9c is significantly reduced. However, under the same parameter settings, the proportion of recovered enterprises in Figure 9 is larger than that in Figure 6 as a whole. This shows that under the strategy of removing key nodes, the large scale of risk diffusion leads to a large proportion of recovered enterprises. Although removing key nodes suppresses risks, there is still a certain gap between the effect and that of removing aging nodes.
Finally, Figure 10 shows the impact of the upper layer mapping rate ψ on the proportion of recovered enterprises ρ R with the increase in β 1 under the different dynamic parameters ( p , q , r ). The results are consistent with those in Figure 7; the proportion of recovered enterprises ρ R decreases with the increase in the upper layer mapping rate ψ . The images in Figure 10a,b are basically the same, and the proportion of recovered enterprises in Figure 10c decreases as a whole. This once again proves that improving the upper layer mapping rate and removing key enterprises will curb risks, while it is not wise to cooperate during risk. Compared with Figure 7 with the same parameter settings, the proportion of recovered enterprises in Figure 10 increases as a whole. Therefore, in terms of curbing the diffusion of risks, it is indeed more effective to eliminate outdated enterprises than to eliminate key enterprises.

5. Conclusions

The key to supply chain management is to establish a strategic partnership, risk taking, and control. To better suppress risk diffusion in partially mapped double-layer hypernetworks, we consider two node removal strategies to establish a dynamic network evolution model. The node relationships between double-layer networks in the past were too idealized [26,29]. The inter-layer mappings in this paper are all randomly generated to make the model more realistic. Finally, numerical simulations are conducted to test the effects of the mapping rate and dynamic parameters on risk diffusion under different strategies, and the following major findings are obtained:
(1)
The increase in the upper layer mapping rate and adding and removing nodes will inhibit the diffusion of risks.
(2)
The increase in the lower layer mapping rate and adding and rewiring hyperedges will promote the risk diffusion.
(3)
To restrain risk, it is more effective to remove aging nodes than key nodes.
The interlayer mapping affects the probability of being infected by risk. If the mapping exists, enterprises have social accounts and will make incorrect judgments when receiving uncertain information, increasing the probability of being infected. Without mapping, there is no impact. Based on the major findings above, enterprises with social accounts should focus on the authoritative information release of official media. The government should adjust the market structure in a timely manner, control key enterprises, and eliminate outdated enterprises. Regarding the advantages of the model, first, the partially mapping double-layer hypernetwork can better express the phenomenon that only some enterprises have social accounts, and only some social accounts follow official media in reality. Second, the contribution of two node removal strategies to risk suppression is compared, and a better risk suppression effect is obtained. Finally, this paper helps decision makers to better use internet information to establish cooperative relations and provides a theoretical basis for the government to administrate large-scale market risks. The disadvantage is that the paper only considers a single risk, while the actual risk is diverse. Furthermore, the cooperation between enterprises is also divided into intimacy and estrangement, and a type of hyperedge will overlook important information such as the degree of cooperation between different enterprises. Therefore, more efforts on building a propagation model and introducing a weighting matrix are expected in future works. The above provides inspiration for the study of supply chain risk diffusion behavior, supplier selection, contract design, and risk assessment.

Author Contributions

Conceptualization, P.Y. and Z.W.; Methodology, P.Y. and Y.S.; Software, P.Y.; Supervision, Z.W.; Formal analysis, P.W.; Writing—original draft, P.Y.; Writing—review and editing, P.W., Z.W. and Y.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Xu, A.; Qian, F.; Pai, C.H.; Yu, N.; Zhou, P. The Impact of COVID-19 Epidemic on the Development of the Digital Economy of China—Based on the Data of 31 Provinces in China. Front. Public Health 2022, 9, 2245. [Google Scholar] [CrossRef]
  2. Song, Y.; Kwon, K.H.; Lu, Y.; Fan, Y.; Li, B. The “Parallel Pandemic” in the Context of China: The Spread of Rumors and Rumor-Corrections During COVID-19 in Chinese Social Media. Am. Behav. Sci. 2021, 65, 2014–2036. [Google Scholar] [CrossRef]
  3. Zhao, Z.; Chen, D.; Wang, L.; Han, C. Credit Risk Diffusion in Supply Chain Finance: A Complex Networks Perspective. Sustainability 2018, 10, 4608. [Google Scholar] [CrossRef]
  4. Zhang, G.; Wang, X.; Gao, Z.; Xiang, T. Research on Risk Diffusion Mechanism of Logistics Service Supply Chain in Urgent Scenarios. Math. Probl. Eng. 2020, 2020, 5906901. [Google Scholar] [CrossRef]
  5. Liu, C.; Ji, H.; Wei, J. Smart Supply Chain Risk Assessment in Intelligent Manufacturing. J. Comput. Inf. Syst. 2022, 62, 609–621. [Google Scholar] [CrossRef]
  6. Niroomand, S.; Garg, H.; Mahmoodirad, A. An Intuitionistic Fuzzy Two Stage Supply Chain Network Design Problem with Multi-Mode Demand and Multi-Mode Transportation. ISA Trans. 2020, 107, 117–133. [Google Scholar] [CrossRef] [PubMed]
  7. Dong, Z.; Liang, W.; Liang, Y.; Gao, W.; Lu, Y. Blockchained Supply Chain Management Based on IoT Tracking and Machine Learning. EURASIP J. Wirel. Commun. Netw. 2022, 2022, 127. [Google Scholar] [CrossRef] [PubMed]
  8. Kermack, W.O.; McKendrick, A.G. A Contribution to the Mathematical Theory of Epidemics. Proc. R. Soc. Lond. Ser. A Contain. Pap. A Math. Phys. Character 1927, 115, 700–721. [Google Scholar] [CrossRef]
  9. Kermack, W.O.; McKendrick, A.G. Contributions to the Mathematical Theory of Epidemics. III.—Further Studies of the Problem of Endemicity. Proc. R. Soc. Lond. Ser. A Contain. Pap. A Math. Phys. Character 1933, 141, 94–122. [Google Scholar] [CrossRef]
  10. Kandhway, K.; Kuri, J. How to Run a Campaign: Optimal Control of SIS and SIR Information Epidemics. Appl. Math. Comput. 2014, 231, 79–92. [Google Scholar] [CrossRef]
  11. Wang, J.; Zhou, H.; Jin, X. Risk Transmission in Complex Supply Chain Network with Multi-Drivers. Chaos Solitons Fractals 2021, 143, 110259. [Google Scholar] [CrossRef]
  12. Liang, D.; Bhamra, R.; Liu, Z.; Pan, Y. Risk Propagation and Supply Chain Health Control Based on the SIR Epidemic Model. Mathematics 2022, 10, 3008. [Google Scholar] [CrossRef]
  13. Denning, P.J. The science of computing: Supernetworks. Am. Sci. 1985, 73, 225–227. [Google Scholar]
  14. Estrada, E.; Rodriguez-Velazquez, J.A. Subgraph Centrality and Clustering in Complex Hyper-Networks. Phys. A Stat. Mech. Its Appl. 2006, 364, 581–594. [Google Scholar] [CrossRef]
  15. Suo, Q.; Guo, J.L.; Sun, S.; Liu, H. Exploring the Evolutionary Mechanism of Complex Supply Chain Systems Using Evolving Hypergraphs. Phys. A Stat. Mech. Its Appl. 2018, 489, 141–148. [Google Scholar] [CrossRef]
  16. Wang, Z.; Yin, H.; Jiang, X. Exploring the Dynamic Growth Mechanism of Social Networks Using Evolutionary Hypergraph. Phys. A Stat. Mech. Its Appl. 2020, 544, 122545. [Google Scholar] [CrossRef]
  17. Li, J.; Yu, A.; Xu, B. Risk Propagation and Evolution Analysis of Multi-Level Handlings at Automated Terminals Based on Double-Layer Dynamic Network Model. Phys. A Stat. Mech. Its Appl. 2022, 605, 127963. [Google Scholar] [CrossRef]
  18. Choudhury, M.; Mahata, G.C. Dual Channel Supply Chain Inventory Policies for Controllable Deteriorating Items Having Dynamic Demand under Trade Credit Policy with Default Risk. RAIRO-Oper. Res. 2022, 56, 2443–2473. [Google Scholar] [CrossRef]
  19. Huo, L.; Guo, H.; Cheng, Y.; Xie, X. A New Model for Supply Chain Risk Propagation Considering Herd Mentality and Risk Preference under Warning Information on Multiplex Networks. Phys. A Stat. Mech. Its Appl. 2020, 545, 123506. [Google Scholar] [CrossRef]
  20. Qian, Q.; Feng, H.; Gu, J. The Influence of Risk Attitude on Credit Risk Contagion—Perspective of Information Dissemination. Phys. A Stat. Mech. Its Appl. 2021, 582, 126226. [Google Scholar] [CrossRef]
  21. Xiao, Y.; Zhang, L.; Li, Q.; Liu, L. MM-SIS: Model for Multiple Information Spreading in Multiplex Network. Phys. A Stat. Mech. Its Appl. 2019, 513, 135–146. [Google Scholar] [CrossRef]
  22. Hu, P.; Geng, D.; Lin, T.; Ding, L. Coupled Propagation Dynamics on Multiplex Activity-Driven Networks. Phys. A Stat. Mech. Its Appl. 2021, 561, 125212. [Google Scholar] [CrossRef]
  23. Jin, D.; Ma, X.; Zhang, Y.; Abbas, H.; Yu, H. Information Diffusion Model Based on Social Big Data. Mob. Netw. Appl. 2018, 23, 717–722. [Google Scholar] [CrossRef]
  24. Yin, H.; Wang, Z.; Gou, Y.; Xu, Z. Rumor Diffusion and Control Based on Double-Layer Dynamic Evolution Model. IEEE Access 2020, 8, 115273–115286. [Google Scholar] [CrossRef]
  25. Wang, J.W.; Rong, L.L.; Deng, Q.H.; Zhang, J.Y. Evolving Hypernetwork Model. Eur. Phys. J. B 2010, 77, 493–498. [Google Scholar] [CrossRef]
  26. Xia, C.; Wang, Z.; Zheng, C.; Guo, Q.; Shi, Y.; Dehmer, M.; Chen, Z. A New Coupled Disease-Awareness Spreading Model with Mass Media on Multiplex Networks. Inf. Sci. 2019, 471, 185–200. [Google Scholar] [CrossRef]
  27. Yu, P.; Wang, Z.; Sun, Y.; Wang, P. Risk Diffusion and Control under Uncertain Information Based on Hypernetwork. Mathematics 2022, 10, 4344. [Google Scholar] [CrossRef]
  28. Ma, W.; Zhang, P.; Zhao, X.; Xue, L. The Coupled Dynamics of Information Dissemination and SEIR-Based Epidemic Spreading in Multiplex Networks. Phys. A Stat. Mech. Its Appl. 2022, 588, 126558. [Google Scholar] [CrossRef] [PubMed]
  29. Chen, P.; Guo, X.; Jiao, Z.; Liang, S.; Li, L.; Yan, J.; Huang, Y.; Liu, Y.; Fan, W. Effects of Individual Heterogeneity and Multi-Type Information on the Coupled Awareness-Epidemic Dynamics in Multiplex Networks. Front. Phys. 2022, 10, 964883. [Google Scholar] [CrossRef]
  30. Guo, H.; Yin, Q.; Xia, C.; Dehmer, M. Impact of Information Diffusion on Epidemic Spreading in Partially Mapping Two-Layered Time-Varying Networks. Nonlinear Dyn. 2021, 105, 3819–3833. [Google Scholar] [CrossRef]
Figure 1. Dynamic evolution of the network. One of the three processes will occur at t + 1 . (a) Add hyperedge e 3 containing nodes 1, 3, and 4; (b) Randomly select a hyperedge e 1 containing node 3 to remove, and then form a hyperedge e 4 with nodes 2 and 5; (c) Remove node 3 and add nodes 6 and 7 in the system. Blue node represents the old node, pink node represents the new node.
Figure 1. Dynamic evolution of the network. One of the three processes will occur at t + 1 . (a) Add hyperedge e 3 containing nodes 1, 3, and 4; (b) Randomly select a hyperedge e 1 containing node 3 to remove, and then form a hyperedge e 4 with nodes 2 and 5; (c) Remove node 3 and add nodes 6 and 7 in the system. Blue node represents the old node, pink node represents the new node.
Entropy 25 00747 g001
Figure 2. State transition of the nodes in each layer. Left panel (a) shows the node state transition during the dissemination of uncertain information. Right panel (b) shows the node state transition in the process of supply chain risk diffusion.
Figure 2. State transition of the nodes in each layer. Left panel (a) shows the node state transition during the dissemination of uncertain information. Right panel (b) shows the node state transition in the process of supply chain risk diffusion.
Entropy 25 00747 g002
Figure 3. The risk diffusion process in the partially mapping double-layer hypernetwork. The virtual communication layer contains two states: Unbelieve (blue) and Believe (pink). The risk diffusion layer contains four states: Susceptible (green), Potential (purple), Infected (red), and Recovered (orange). Process (1)–(3) correspond to the three processes (a)–(c) in Figure 1. The red link represents the new hyperedge, and the dotted line represents the deleted hyperedge. e 1 * denotes communication between enterprises without cooperation. Numbers represent serial numbers of a node or a hyperedge.
Figure 3. The risk diffusion process in the partially mapping double-layer hypernetwork. The virtual communication layer contains two states: Unbelieve (blue) and Believe (pink). The risk diffusion layer contains four states: Susceptible (green), Potential (purple), Infected (red), and Recovered (orange). Process (1)–(3) correspond to the three processes (a)–(c) in Figure 1. The red link represents the new hyperedge, and the dotted line represents the deleted hyperedge. e 1 * denotes communication between enterprises without cooperation. Numbers represent serial numbers of a node or a hyperedge.
Entropy 25 00747 g003
Figure 4. State transition probability tree.
Figure 4. State transition probability tree.
Entropy 25 00747 g004
Figure 5. Under the strategy of removing aging nodes. (a) The fraction of U-state and B-state enterprises as a function with time step t . (b) The fraction of S-state, P-state, I-state, and R-state enterprises as a function with time step t . Parameters are set as follows: p = 0.5 , q = 0.45 , β = 0.5 , η = 0.6 , μ = 0.8 , λ = 0.5 , δ = 0.3 , τ = 0.8 , γ = 2 , and κ = 2 .
Figure 5. Under the strategy of removing aging nodes. (a) The fraction of U-state and B-state enterprises as a function with time step t . (b) The fraction of S-state, P-state, I-state, and R-state enterprises as a function with time step t . Parameters are set as follows: p = 0.5 , q = 0.45 , β = 0.5 , η = 0.6 , μ = 0.8 , λ = 0.5 , δ = 0.3 , τ = 0.8 , γ = 2 , and κ = 2 .
Entropy 25 00747 g005
Figure 6. The impact of dynamic parameters ( p , q , r ) and the lower layer mapping rate ϕ under the strategy of removing aging nodes. Parameters are set as follows: η = 0.6 , μ = 0.8 , λ = 0.5 , δ = 0.3 , τ = 0.2 , γ = 2 , and κ = 2 . (a) p = 0.9 , q = 0.05 , r = 0.05 ; (b) p = 0.05 , q = 0.9 , r = 0.05 ; (c) p = 0.05 , q = 0.05 , r = 0.9 .
Figure 6. The impact of dynamic parameters ( p , q , r ) and the lower layer mapping rate ϕ under the strategy of removing aging nodes. Parameters are set as follows: η = 0.6 , μ = 0.8 , λ = 0.5 , δ = 0.3 , τ = 0.2 , γ = 2 , and κ = 2 . (a) p = 0.9 , q = 0.05 , r = 0.05 ; (b) p = 0.05 , q = 0.9 , r = 0.05 ; (c) p = 0.05 , q = 0.05 , r = 0.9 .
Entropy 25 00747 g006
Figure 7. The impact of dynamic parameters ( p , q , r ) and the upper layer mapping rate ψ under the strategy of removing aging nodes. Parameters are set as follows: η = 0.6 , μ = 0.8 , λ = 0.5 , δ = 0.3 , τ = 0.8 , γ = 2 , and κ = 2 . (a) p = 0.9 , q = 0.05 , r = 0.05 ; (b) p = 0.05 , q = 0.9 , r = 0.05 ; (c) p = 0.05 , q = 0.05 , r = 0.9 .
Figure 7. The impact of dynamic parameters ( p , q , r ) and the upper layer mapping rate ψ under the strategy of removing aging nodes. Parameters are set as follows: η = 0.6 , μ = 0.8 , λ = 0.5 , δ = 0.3 , τ = 0.8 , γ = 2 , and κ = 2 . (a) p = 0.9 , q = 0.05 , r = 0.05 ; (b) p = 0.05 , q = 0.9 , r = 0.05 ; (c) p = 0.05 , q = 0.05 , r = 0.9 .
Entropy 25 00747 g007
Figure 8. Under the strategy of removing key nodes. (a) The fraction of U-state and B-state enterprises as a function with time step t . (b) The fraction of S-state, P-state, I-state, and R-state enterprises as a function with time step t. Parameters are set as follows: p = 0.5 , q = 0.45 , β = 0.5 , η = 0.6 , μ = 0.8 , λ = 0.5 , δ = 0.3 , τ = 0.8 , γ = 2 , and κ = 2 .
Figure 8. Under the strategy of removing key nodes. (a) The fraction of U-state and B-state enterprises as a function with time step t . (b) The fraction of S-state, P-state, I-state, and R-state enterprises as a function with time step t. Parameters are set as follows: p = 0.5 , q = 0.45 , β = 0.5 , η = 0.6 , μ = 0.8 , λ = 0.5 , δ = 0.3 , τ = 0.8 , γ = 2 , and κ = 2 .
Entropy 25 00747 g008
Figure 9. The impact of dynamic parameters ( p , q , r ) and the lower layer mapping rate ϕ under the strategy of removing key nodes. Parameters are set as follows: η = 0.6 , μ = 0.8 , λ = 0.5 , δ = 0.3 , τ = 0.2 , γ = 2 , and κ = 2 . (a) p = 0.9 , q = 0.05 , r = 0.05 ; (b) p = 0.05 , q = 0.9 , r = 0.05 ; (c) p = 0.05 , q = 0.05 , r = 0.9 .
Figure 9. The impact of dynamic parameters ( p , q , r ) and the lower layer mapping rate ϕ under the strategy of removing key nodes. Parameters are set as follows: η = 0.6 , μ = 0.8 , λ = 0.5 , δ = 0.3 , τ = 0.2 , γ = 2 , and κ = 2 . (a) p = 0.9 , q = 0.05 , r = 0.05 ; (b) p = 0.05 , q = 0.9 , r = 0.05 ; (c) p = 0.05 , q = 0.05 , r = 0.9 .
Entropy 25 00747 g009
Figure 10. The impact of dynamic parameters ( p , q , r ) and the upper layer mapping rate ψ under the strategy of removing key nodes. Parameters are set as follows: η = 0.6 , μ = 0.8 , λ = 0.5 , δ = 0.3 , τ = 0.8 , γ = 2 , and κ = 2 . (a) p = 0.9 , q = 0.05 , r = 0.05 ; (b) p = 0.05 , q = 0.9 , r = 0.05 ; (c) p = 0.05 , q = 0.05 , r = 0.9 .
Figure 10. The impact of dynamic parameters ( p , q , r ) and the upper layer mapping rate ψ under the strategy of removing key nodes. Parameters are set as follows: η = 0.6 , μ = 0.8 , λ = 0.5 , δ = 0.3 , τ = 0.8 , γ = 2 , and κ = 2 . (a) p = 0.9 , q = 0.05 , r = 0.05 ; (b) p = 0.05 , q = 0.9 , r = 0.05 ; (c) p = 0.05 , q = 0.05 , r = 0.9 .
Entropy 25 00747 g010
Table 1. Parameter and meaning.
Table 1. Parameter and meaning.
ParameterThe Meaning of the Parameter
p Probability of adding the hyperedge
q Probability of rewiring the hyperedge
r Probability of adding and removing nodes
N ( t ) The total number of nodes
ω j ( t , t i ) The probability of the j th node in the i th batch encountering risk
β Probability of transition from the S-state to the P-state
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, P.; Wang, Z.; Sun, Y.; Wang, P. Supply Chain Risk Diffusion in Partially Mapping Double-Layer Hypernetworks. Entropy 2023, 25, 747. https://doi.org/10.3390/e25050747

AMA Style

Yu P, Wang Z, Sun Y, Wang P. Supply Chain Risk Diffusion in Partially Mapping Double-Layer Hypernetworks. Entropy. 2023; 25(5):747. https://doi.org/10.3390/e25050747

Chicago/Turabian Style

Yu, Ping, Zhiping Wang, Ya’nan Sun, and Peiwen Wang. 2023. "Supply Chain Risk Diffusion in Partially Mapping Double-Layer Hypernetworks" Entropy 25, no. 5: 747. https://doi.org/10.3390/e25050747

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop