Information Dissemination Control Algorithm of Ecological Changes in the New Media Communication Environment

Information dissemination has been a crucial social process, especially in modern information-centric societies; it has become one of the most critical ones. Social networks create a route for information dissemination with the use of social influencemechanisms. In order to improve the effectiveness of information dissemination control and influence the maximization of ecological change in the modern media communication environment, this paper combines the current network information dissemination methods and analyzes the community network model and the network dissemination states for spreading information. We propose an improved algorithm for information dissemination control of ecological changes in the new media dissemination environment. *e fuzzy control algorithm is employed as the core algorithm to improve and optimize the information dissemination network model. Furthermore, the mobile-assisted patch distribution mechanism is used to repair all the infected nodes in the network, and the information interaction form is analyzed to develop the corresponding system model structure and build the information traceability process. *e simulation results verify the feasibility of using the proposed algorithm to control effectively the information dissemination in the ecological changes of the new media environment. *e proposed algorithm can meet the ecological information control needs of new media dissemination.


Introduction
Information dissemination has been a crucial social process, particularly in recent information-centric societies. It has become one of the most critical ones. Most of the commercial communication infrastructures have been originally established in the past 20 years mostly to allow the transfer of various types of information. Diverse types of information are disseminating in human societies, especially through the computer and communication networks.
ese different types of information include news, educational, healthcare, financial, and military information. With the development of today's social science and technology, the development of multimedia, and the maturity of intelligent networks, these have gradually developed into new trends in the Internet. e Internet has had a great impact on human lives. All the information we need can be found on the Internet, and people's lives have gradually become inseparable from the network. Internet resources have expanded the wealth of space and time that people perceive and disseminate information and improved their active learning initiative [1]. People can get news, educational, healthcare, financial, and other information from the network at any time and from any place. Spreading valuable information on the network can meet the requirements of people not only of education but also of all sectors and ages to get information related to healthcare, financial, military, and climate and other aspects of learning. Many large-scale online social network sites, such as Facebook, Twitter, and Friendster, have become popular because they effectively connect people and bring together small and disconnected offline social networks. Moreover, they also become a huge dissemination and marketing platform, allowing information and ideas to influence a large population in a short period.
New media channels have built the fastest and most extensive social networking platform for the audience to disseminate news and other information. However, unlike the rigorous requirements for the dissemination of news and scientific and technological knowledge, new social networking platforms and channels may pursue sensational effects or emphasize relevance to life and dramatic plots, which directly affect the content of scientific and technological communication [2]. e study of the content of science and technology communication ecology in the new media era is based on the perspectives of relevance and integrity and dynamics and balance in ecological thinking to infiltrate ecology from the study of the interaction between organisms and the environment into other fields such as humanities and social sciences. Science and technology communication is a kind of communication practice activity, which focuses on the relationship between the main communication media and the communication content. It refers to the process in which scientific and technological information is used as the main content of communication to spread between the subject and the audience in the social environment and pursue a dynamic balance through the medium. In this sense, the communication of science and technology is ecological [1]. e study associates the media ecology tradition with the concept of the ecosystem, which was initially used in business economics. In an ecosystem economy, organizations work in close collaboration and share information more freely. One of the most basic themes of the media ecology tradition is how different public and private societies work and how to disseminate electronic and digital media. erefore, by comparing the similarities between the science and technology communication ecosystem and the natural ecosystem, analyzing the scope and complexity of the science and technology communication scenarios from the perspective of ecology, and revealing the nature and laws of science and technology communication, the real problems of the ecological imbalance of science and technology communication in the new media era can be better investigated [3]. Encouraged by this analysis, this study proposed an improved algorithm for the information dissemination control of ecological changes in the new media dissemination environment. Moreover, the fuzzy control algorithm was employed as the kernel algorithm to improve the system, build the corresponding frame structure, and analyze the system performance with experimental research. e rest of the paper is organized as follows. Section 2 presents the related works. Section 3 provides a discussion about different methods for membership function selection in fuzzy set theory. Section 4 illustrates the proposed information dissemination control algorithm. In Section 5, the performance results are presented, and Section 6 is about the conclusion.

Related Works
e impact of social networks on people's lives has increased significantly. e social influence for information dissemination acts as an inspiring force, governing the dissemination of the information in the network. When studying influence maximization, the communication model is the most basic problem, and the problem of maximizing social influence is explored through the information dissemination model. erefore, the selection of communication models is also an important research issue in the subject of influence maximization. e most classic ones of the information dissemination models that study influence maximization are the independent cascade (IC) model [4] and the linear threshold (LT) model [5]. Based on the independent cascade model and the linear threshold model, the general cascade model, the general threshold model, and the decreasing cascade propagation model have been successively proposed [6]. More and Lingam [7] proposed an improved independent cascade model and performed a comparison of the different approaches to compute activation probabilities of nodes in a social network. e path method (PM) was applied to compute the exact value of the activation probabilities but has an approximated method called SSS-Noself, which was computed by changing the existing SteadyStateSpread algorithm, based on fixed-point computation, to achieve better accuracy. Kemp et al. [8] proposed a greedy method for searching "K" influential network nodes out of all existing nodes. ey provided an approximation-guaranteed solution for the greedy algorithm. ey designed an analysis structure for finding the seed nodes.
is framework was depended upon submodular functions. A triggering model was also proposed to show that their proposed approximation algorithm worked better as compared with other known node selection strategies in social networks. However, the drawback of this algorithm is its efficiency. Moreover, an important part of their greedy algorithm is to compute the spread of influence based on a seed set, which turns out to be a challenging task. Kimura and Saito [9] developed influence cascade models based on the shortest path and designed an efficient algorithm to compute influence spread under these models. However, the models do not directly address the efficiency issue of the greedy algorithms for the cascaded models. e authors of [10] formulated the problem of information dissemination and influence maximization as the discrete optimization problem. A social network is represented as a graph with vertices showing individuals and edges representing connections between two individuals. Influence is broadcasted in the network based on the stochastic cascade model. ree cascade models, including the independent cascade model, the linear threshold model, and the weight cascade model, were considered for influence maximization.
A fast maximum influence arborescence (FMIA) model was proposed in [11]. e model uses the local tree structure of each node in the graph to adjust efficiently the top-k influencers in an evolving network. e method recursively predicts only the affected seed nodes due to active updates in the influence graph and then replaces them with more suitable ones. e method is effective in a variety of information dissemination models and influence maximization techniques. Pazura et al. [12] presented an improved model of the LT model, called competitive linear threshold (CLT model). In this model, each edge has two weights, plus, 2 Mobile Information Systems and minus. Based on the CLT model, the problem of maximum influence blocking is proposed to study how an object blocks the information transmission of competitors.
To improve the efficiency of the greedy algorithm, a new algorithm CELF++ was proposed based on the cost-effective lazy forward (CELF) algorithm. It augments the naive greedy algorithm to maximize the influence in social networks. e CELF++ algorithm makes use of the property of submodularity of the spread function to avoid excessive computations of marginal gains incurred by CELF. It was reported that on real-world social network data sets, the CELF++ works effectively and efficiently, resulting in significant improvements in terms of both running time and the average number of node lookups [13].
A new susceptible-infected-recovered (SIR) model was proposed to model the social network diffusion [5] based on various theories such as bond percolation [14]. Likewise, graph evolution parameters, such as shrinking diameters, and densification were examined for modeling information dissemination and influence maximization in social networks [15]. Based on global social network metrics, such as closeness centrality and betweenness centrality, a semilocal centrality metric was presented to design an effective ranking method.
is semilocal centrality metric along with the SIR epidemic model was used to assess the application of the diffusion model by considering the parameters such as the rate of influence spread and the number of infected nodes [16]. Social networks were investigated for quantifying user influence, and they dealt with web semantics to learn about influence in heterogeneous social networks [17]. Social influence was further employed for the study of human dynamics and human behavior [18]. In this study, a new algorithm is proposed for information dissemination and influence maximization of ecological changes in the new media communication environment. e fuzzy control algorithm is employed as the core algorithm to improve and optimize the network node model.

Information Dissemination Control Algorithm Based on Fuzzy Theory
Fuzzy set theory is an extension of the classical concept of a set. e basis of this theory is the fuzzy set, which is a set that does not have clearly defined limits and can contain elements only to some degree in which elements can have a certain degree of membership [19]. erefore, suitable functions are used called membership functions that determine the membership degree of each element in a fuzzy set. e membership functions perform a vigorous role in the overall performance of fuzzy representation. e membership functions are the building blocks of fuzzy set theory. e only condition a membership function must satisfy is that it must vary between 0 and 1 [20]. e degree of membership of an element x relative to set A can be represented in the form of a function. Set A is called a fuzzy set, and μ A is called the membership function of the fuzzy set. For a fuzzy set A, it can be characterized by its membership function. e closer the value μ A is to 0; the lower is the degree that the element x belongs to set A. On the contrary, the closer the value of μ A is to 1; the higher is the degree that the element x belongs to set A. In extreme cases, the value μ A is only 0 or 1. At this time, μ A is an ordinary traditional function, and set A is an ordinary set [19]. ere are many ways to represent the fuzzy sets. In general, it can be expressed as follows: For a fuzzy set containing multiple elements, A can also be represented using the following equation: e commonly used methods for determining the membership function are given in the following sections.

Expert Determination Method.
is method is used to determine the degree of membership value through subjective knowledge or personal experience, especially the expert's experience. is method is mainly used in the case of discrete elements in the universe of discourse. e membership degree values usually obtained have low credibility, but they are also closer to the real situation than the traditional 0 and 1 membership degrees. If we conduct multiple surveys and multiperson experience, the degree of approximation will be better [21].

Fuzzy Statistical Method.
is method takes n experts under investigation as the research object, and it forms the expert group N. For a known element u, the membership function μ A i (μ)(i � 1, 2, . . . , m) can be obtained by determining the multiphase fuzzy statistics of the element for A 1 , A 2 , . . . , A m of m fuzzy sets. For a single expert P ∈ N, it can be determined as follows: e member function μ must and only belong to one of the sets A 1 , A 2 , . . . , A m . e degree of members μ belonging to the fuzzy set A i can be expressed using the following equation: e weighted average can be computed as follows: 3.3. Transformation Method. Conventional comprehensive evaluation techniques use simple numerical representation and the total score method or weighted summation to obtain evaluation results [22]. Compared with the traditional comprehensive evaluation techniques, the fuzzy comprehensive evaluation establishes the factor set U � (U 1 , U 2 , . . . , U n ) of the evaluation index and then obtains the fuzzy comment matrix through expert evaluation and other methods.
Finally, the fuzzy transformation is performed by a suitable fuzzy calculation factor to obtain the evaluation result. For instance, the mapping shown in the following equation is called the fuzzy transformation from U to V: where ∀A ∈ F(U) is the original image of B, and B is also called the image of A in the case of fuzzy transformation T R . When we assume A: B ∈ F(U), if the transformation T R : F(U) ⟶ F(V) satisfies the following conditions in the following equation, the transformation T R is called a fuzzy linear transformation: If R ∈ F(U × V) is assumed to be a given fuzzy relationship, then R uniquely determines the fuzzy linear transformation relationship from U to V. For When the index factor set U � (U 1 , U 2 , . . . , U n ) and the judgment set v � (v 1 , v 2 , . . . , v m ) are both finite universes, A is the fuzzy vector in U; a � (a 1 , a 2 , . . . , a m ) and R � (r ij ) n×m are the fuzzy relationship matrix on U × V, and a ≥ 0, r ij ≤ 1. e fuzzy vector B calculated according to the fuzzy transformation is as follows: When using the fuzzy analytic hierarchy process to evaluate the state, generally, the bottom index evaluation is first performed, and then the comprehensive performance evaluation is performed through the fuzzy transformation theory. e specific steps are as follows: (i) e establishment of the bottom-level evaluation index factor set U � (U 1 , U 2 , . . . , U m ) According to the evaluation index system model, the lowest evaluation index set is U � (U 1 , U 2 , . . . , U m ). e index of the factor set U has different importance relative to the evaluation index, and the weight vector of each index needs to be formed into a fuzzy vector, which is expressed as A � (a 1 , a 2 , . . . , a m ) and used to represent the degree of importance between the indexes.
e above formula is the fuzzy comment of the i th index. When the fuzzy evaluation of all indicators is performed, the fuzzy evaluation matrix U × V can be obtained, namely, R � r 11 r 12 · · · r 1m From the above analysis, it can be seen that (U, V, R) constitutes a single-layer fuzzy comprehensive evaluation model. (iv) Comprehensive assessment of the status According to the fuzzy vector A � (a 1 , a 2 , . . . , a m ) on the factor set U and the fuzzy comment set matrix R, the fuzzy comprehensive evaluation vector B � (b 1 , b 2 , . . . , b m ) is obtained through proper selection of the fuzzy calculation operator and fuzzy transformation. According to the principle of maximum membership degree, the state evaluation result can be determined [23]. e comprehensive evaluation equation is as follows: where ∘ is a fuzzy calculation operator, which usually contains the following calculation forms: (a) e main factor prominent type (M(∧, ∨)).
(c) Weighted average type (M ( ⊗ ,  *  )). e contribution rate of each indicator in the model to the evaluation target is characterized by the weight and is computed as follows: In the analytic hierarchy process, it is divided into several levels of evaluation index system, and multilevel fuzzy comprehensive evaluation is required [24]. When it is assumed that the n subfactors of the i th layer constitute the corresponding factor set, the fuzzy synthesis operation combined with the fuzzy comment matrix R i is computed as follows: where W i is the weight vector set, and B i is the fuzzy comment vector of the (i + 1) th layer evaluation index of the fuzzy factor set obtained by multilayer operation.

Information Dissemination Control Algorithm
For large-scale wireless sensor networks, sensor nodes are generally randomly deployed in a target area, which can lead to irregular deployment of nodes and increase the network cost. us, node deployment approaches play a vigorous role under these conditions. Coverage control mostly emphasizes improving nodes deployment algorithms and correcting nodes positions to construct a network with limited resources; it also guarantees the quality of service (QoS) in monitoring region of interest (RoI) [23]. However, in conventional node deployment algorithms, the sensor nodes are arbitrarily deployed in the RoI, and this can cause the whole coverage problem, which will affect network performance. us, effective node deployment algorithms are essential to solve this problem.
Since there may be holes in the network connectivity of wireless sensor networks, which are caused by the exhaustion of energy of some nodes or virus attacks during the initial deployment of sensors, some areas of the network may not be reachable through the hop-by-hop propagation between sensor nodes. erefore, static patch distribution may not be able to repair all the infected sensor nodes. However, the mobile-assisted patch distribution mechanism can overcome the problem that the network may have independent infected network areas. erefore, the mobileassisted patch distribution mechanism can ensure that all infected sensor nodes in the network can be repaired and provide better performance in terms of repair thoroughness. Figures 1 and 2 show the difference between static patch distribution and mobile-assisted patch distribution, respectively.
When it is required to solve the number of sensor nodes in the convex hull, only the convex hull area S can be solved. As shown in Figure 3, the convex hull is divided into N − 2 triangles. When the coordinates of the three vertices of the triangle are known, the area of the triangle can be computed.
e social network can be taken as a directed graph G � (V, E), where V denotes the nodes in the graph, which represent the users in the social network, and E denotes the edges, which represent the relationship between the users. In this context, the relationship would be that of the influencer and influenced node. Figure 4 is a state transition diagram of the information dissemination model of social networks. Each box represents the state of the node, and the arrow indicates the probability of state transition after a period of propagation, and the probability of turning into an R state node after losing interest, and R represents an E state node.
Based on the communication model constructed above, a small sample is demonstrated here, so that the process of information dissemination and transformation can be understood more clearly. Figure 5 shows a small network consisting of digging a node and 15 edges. e above algorithm is simply applied to social networks and the Internet. is simple social network is a part of the real social network, as shown in Figure 6. e execution process and results in this kind of network are analyzed separately. Figure 7 shows an example of a network with a community structure, where node 2 (hexagon) in community C1 has many connections because it is a central node, and it is marked as an important node. When the information is disseminated in the C1 community, node 2 will play the main role. If node 2 is immunized, the dissemination of information in the C1 community will be greatly affected and will be slowed down. Likewise, node 12 (square) in community C2 has more edges (bridge nodes) connected to the nodes in other communities. When information is disseminated among communities, node 12 plays an important role. If it is immunized, it will slow down the spread of information from community C2 to other communities. erefore, both the bridge node and the community center node play an important role in the information dissemination process, and immunizing them will slow down the dissemination of all information in the network.

Mobile Information Systems
Based on the above discussion, in this study, an improved information traceability model is proposed, as shown in Figure 8. e model contains five steps: building a network, disseminating information, deploying observation points, detecting information sources, and excluding observation points. e model can be effectively used to trace information being disseminated in a network.
Based on the fuzzy control algorithm for information traceability and dissemination, a new model is constructed for the influencing factors of information interaction between enterprises and users under the new media environment. Figure 9 shows the new information dissemination model for factors affecting information interaction. e model includes five potential variables of external factors, namely, the quality of new media platforms, the quality of new media information, the quality of new media services, the immersive experience of new media, and the user's cognition. Moreover, it also includes two internal latent variables, namely, user satisfaction with new media information interaction and using new media information interaction behavior.

Performance Evaluation
Social networks have become the most important means of communication at present for sharing awareness, information, and innovations. With the realization that even weak social ties have the power to influence, social networks have become a medium for marketing and the influence maximization technique.
is study provides an improved information dissemination control algorithm of ecological changes in the new media environment and verifies the performance of the algorithm through simulation. e proposed algorithm can effectively control the information dissemination and obtain a large number of nodes from the network. Although the locality of selected nodes cannot fully represent all social networks, the selected nodes are randomly distributed. erefore, the selected samples of social networking sites are general and can be used to analyze social networks. e control effect and the node control effect of the algorithm were simulated. e statistical results of the simulation are represented in     Table 1 and Figure 10.
e proposed algorithm can effectively improve the ecological effect of the system for the information dissemination control of ecological changes in the new media environment. e results show that as the number of nodes increases, the control score and performance of the algorithm increases. A linear trend was observed between the number of nodes and the control score. For example, for 5 nodes, the algorithm scored 1.3, and when the number of nodes is increased to 60, the algorithm scored 4.9. erefore, the proposed intelligent algorithm can meet the ecological information control needs of new media dissemination.

Conclusion
e present paper studied the information dissemination control algorithm of the ecological changes in the new media communication environment and analyzed it according to the community network model and the network communication situation in the new media era. In order to improve the effectiveness of information dissemination control of ecological change in the current media communication environment, this paper combined the current network information dissemination methods and analyzed the community network model and the network dissemination states for spreading information. We proposed an improved algorithm for information dissemination in the new media dissemination environment. e fuzzy control algorithm was employed as the core algorithm to improve and optimize the information dissemination network model. e mobileassisted patch distribution mechanism was used to repair all the infected nodes in the communication network. e simulation results showed that the proposed algorithm can effectively control the information dissemination and obtain a large number of nodes from the network. e proposed study has the potential to control effectively the information dissemination in the new media and social networks.

Data Availability
e data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest
e author declares that there is no conflict of interest.