{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T19:18:29Z","timestamp":1771442309326,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Theory Biosci."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s12064-025-00450-x","type":"journal-article","created":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T18:47:20Z","timestamp":1764614840000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Epidemic threshold : a Laplacian spectral and structural approach of prediction"],"prefix":"10.1007","volume":"145","author":[{"given":"Claude","family":"Kanyou","sequence":"first","affiliation":[]},{"given":"Etienne","family":"Kouokam","sequence":"additional","affiliation":[]},{"given":"Norbert","family":"Tsopze","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,1]]},"reference":[{"key":"450_CR1","doi-asserted-by":"publisher","unstructured":"Kresge K, Petruzelli N (2021) Analyzing epidemic thresholds on dynamic network structures. SIAM Undergraduate Research Online. https:\/\/doi.org\/10.1137\/20S1368227","DOI":"10.1137\/20S1368227"},{"issue":"4","key":"450_CR2","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1093\/comnet\/cny033","volume":"7","author":"U Niranjan","year":"2019","unstructured":"Niranjan U, Singh A, Kumar Agrawal R (2019) A mean-field-theoretic model for dual information propagation in networks. J Complex Netw 7(4):585\u2013602. https:\/\/doi.org\/10.1093\/comnet\/cny033 (https:\/\/academic.oup.com\/comnet\/article-pdf\/7\/4\/585\/29161093\/cny033.pdf)","journal-title":"J Complex Netw"},{"key":"450_CR3","doi-asserted-by":"publisher","unstructured":"Mohammed ZAT, Seifedine NK (2017) Python for Graph and Network Analysis. Advanced Information and Knowledge Processing. Springer, Springer International Publishing, New York . https:\/\/doi.org\/10.1007\/978-3-319-53004-8","DOI":"10.1007\/978-3-319-53004-8"},{"key":"450_CR4","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.epidem.2014.07.003","volume":"10","author":"L Pellis","year":"2015","unstructured":"Pellis L, Ball F, Bansal S, Eames K, House T, Isham V, Trapman P (2015) Eight challenges for network epidemic models. Epidemics 10:58\u201362. https:\/\/doi.org\/10.1016\/j.epidem.2014.07.003","journal-title":"Epidemics"},{"key":"450_CR5","doi-asserted-by":"publisher","unstructured":"Newman MEJ (2010) Networks: an Introduction. Oxford University Press, Oxford; New York . https:\/\/doi.org\/10.1093\/acprof:oso\/9780199206650.001.0001","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001"},{"issue":"6","key":"450_CR6","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1093\/comnet\/cny004","volume":"6","author":"JC Lang","year":"2018","unstructured":"Lang JC, De Sterck H, Kaiser JL, Miller JC (2018) Analytic models for SIR disease spread on random spatial networks. J Complex Netw 6(6):948\u2013970. https:\/\/doi.org\/10.1093\/comnet\/cny004 (https:\/\/academic.oup.com\/comnet\/article-pdf\/6\/6\/948\/28007602\/cny004.pdf)","journal-title":"J Complex Netw"},{"issue":"1","key":"450_CR7","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1109\/TCSS.2022.3225639","volume":"11","author":"V Kansal","year":"2024","unstructured":"Kansal V, Pandey PK (2024) $${S{E}{I}_3}{R}_{2}{D}_{2}{V}$$: pandemic modeling and analysis of its latent factors: a case study of covid-19 in india. IEEE Trans Comput Soc Syst 11(1):625\u2013638. https:\/\/doi.org\/10.1109\/TCSS.2022.3225639","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"3","key":"450_CR8","doi-asserted-by":"publisher","first-page":"4511","DOI":"10.1109\/TCSS.2024.3362885","volume":"11","author":"V Kansal","year":"2024","unstructured":"Kansal V, Pandey PK (2024) Stability and parameter sensitivity analyses of $${S}{E}{I}_{3}$$$${R}_{2}$$$${D}_{2}{V}$$ model to control covid-19 pandemic. IEEE Trans Comput Soc Syst 11(3):4511\u20134523. https:\/\/doi.org\/10.1109\/TCSS.2024.3362885","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"450_CR9","doi-asserted-by":"publisher","unstructured":"Mieghem PV, Bovenkamp RVd (2015) Accuracy criterion for the mean-field approximation in susceptible-infected-susceptible epidemics on networks. Physical Review E, Statistical, nonlinear, biological, and soft matter physics 91 https:\/\/doi.org\/10.1103\/PhysRevE.91.032812","DOI":"10.1103\/PhysRevE.91.032812"},{"key":"450_CR10","doi-asserted-by":"publisher","unstructured":"Keeling M, Rohani P (2011) Modeling Infectious Diseases in Humans and Animals. Princeton University Press, New Jersey, https:\/\/doi.org\/10.1515\/9781400841035","DOI":"10.1515\/9781400841035"},{"key":"450_CR11","doi-asserted-by":"publisher","unstructured":"Bogachev V, Smolyanov O (2020) Spectral Theory. Chapter of Real and Functional Analysis, Moscow Lectures, pp. 279\u2013356 . https:\/\/doi.org\/10.1007\/978-3-030-38219-3-7","DOI":"10.1007\/978-3-030-38219-3-7"},{"key":"450_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.060","author":"M Alshahrani","year":"2020","unstructured":"Alshahrani M, Fuxi Z, Sameh A, Mekouar S, Huang S (2020) Efficient algorithms based on centrality measures for identification of top-k influential users in social networks. Inform Sci. https:\/\/doi.org\/10.1016\/j.ins.2020.03.060","journal-title":"Inform Sci"},{"key":"450_CR13","doi-asserted-by":"publisher","unstructured":"Biggs N (1993). Algebraic graph theory Cambridge University Press. https:\/\/doi.org\/10.1017\/CBO9780511608704. (2nd ed.), Cambridge","DOI":"10.1017\/CBO9780511608704"},{"key":"450_CR14","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10115-012-0520-yy","volume":"33","author":"BA Prakash","year":"2012","unstructured":"Prakash BA, Chakrabarti D, Valler NC, Faloutsos M, Faloutsos C (2012) Threshold conditions for arbitrary cascade models on arbitrary networks. Knowl Inf Syst 33:549\u2013575. https:\/\/doi.org\/10.1007\/s10115-012-0520-yy","journal-title":"Knowl Inf Syst"},{"key":"450_CR15","doi-asserted-by":"publisher","unstructured":"Chen Q, Porter MA (2021) Epidemic thresholds of infectious diseases on tie-decay networks. Journal of Complex Networks 10(1) https:\/\/doi.org\/10.1093\/comnet\/cnab031 https:\/\/academic.oup.com\/comnet\/article-pdf\/10\/1\/cnab031\/41987208\/cnab031.pdf","DOI":"10.1093\/comnet\/cnab031"},{"key":"450_CR16","doi-asserted-by":"publisher","unstructured":"Wang Y, Chakrabarti D, Wang C, Faloutsos C (2003) Epidemic spreading in real networks: An eigenvalue viewpoint. 22nd International Symposium on Reliable Distributed Systems (SRDS 2003). Proceedings, 25\u201334 https:\/\/doi.org\/10.1109\/RELDIS.2003.1238052","DOI":"10.1109\/RELDIS.2003.1238052"},{"key":"450_CR17","doi-asserted-by":"publisher","unstructured":"Chung FRK (1997) Spectral Graph Theory (1994 : California State University\u00a0(Fresno)), C.C.: Spectral Graph Theory. CBMS-NSF regional conference series in mathematics, No. 92. Conference Board of the Mathematical Sciences, California State University . https:\/\/doi.org\/10.1090\/cbms\/092","DOI":"10.1090\/cbms\/092"},{"key":"450_CR18","doi-asserted-by":"publisher","unstructured":"Cvetkovic D, Doob M, Sachs H (1980). Spectra of graphs - theory and application. https:\/\/doi.org\/10.1017\/S0013091500022902. New York","DOI":"10.1017\/S0013091500022902"},{"key":"450_CR19","doi-asserted-by":"publisher","unstructured":"Kephart J, White S (1991) Directed-graph epidemiological models of computer viruses. In: Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 343\u2013359 https:\/\/doi.org\/10.1109\/RISP.1991.130801","DOI":"10.1109\/RISP.1991.130801"},{"key":"450_CR20","doi-asserted-by":"publisher","first-page":"3200","DOI":"10.1103\/PhysRevLett.86.3200","volume":"86","author":"R Pastor-Satorras","year":"2001","unstructured":"Pastor-Satorras R, Vespignani A (2001) Epidemic spreading in scale-free networks. Phys Rev Lett 86:3200\u20133203. https:\/\/doi.org\/10.1103\/PhysRevLett.86.3200","journal-title":"Phys Rev Lett"},{"key":"450_CR21","doi-asserted-by":"publisher","unstructured":"Kanyou C, Kouokam E, Emvudu Y (2023) Epidemic threshold : A new spectral and structural approach of prediction. Revue Africaine de Recherche en Informatique et Math\u00e9matiques Appliqu\u00e9es (ARIMA) https:\/\/doi.org\/10.46298\/arima.11186","DOI":"10.46298\/arima.11186"},{"key":"450_CR22","doi-asserted-by":"publisher","unstructured":"Wang W, Li C, Qu B, Li X (2024) Predicting epidemic threshold in complex networks by graph neural network. Chaos Interdiscip J Nonlinear Sci. https:\/\/doi.org\/10.1063\/5.0209912","DOI":"10.1063\/5.0209912"},{"key":"450_CR23","first-page":"1","volume":"103","author":"I Gutman","year":"1978","unstructured":"Gutman I (1978) The energy of a graph. Ber Math Statist Sekt Forschungsz Graz 103:1\u201322","journal-title":"Ber Math Statist Sekt Forschungsz Graz"},{"key":"450_CR24","doi-asserted-by":"publisher","unstructured":"Li X, Shi Y, Gutman I (2012) Graph Energy. Springer, New York . https:\/\/doi.org\/10.1007\/978-1-4614-4220-2","DOI":"10.1007\/978-1-4614-4220-2"},{"key":"450_CR25","first-page":"277","volume":"84","author":"I Gutman","year":"2020","unstructured":"Gutman I, Ramane H (2020) Research on graph energies in 2019. MATCH Commun Math Comput Chem 84:277\u2013292","journal-title":"MATCH Commun Math Comput Chem"},{"key":"450_CR26","doi-asserted-by":"publisher","unstructured":"Ferreira S, Castellano C, Pastor-Satorras R (2012) Epidemic thresholds of the susceptible-infected-susceptible model on networks: A comparison of numerical and theoretical results. Physical Review E, Statistical, nonlinear, biological, and soft matter physics 86. https:\/\/doi.org\/10.1103\/PhysRevE.86.041125","DOI":"10.1103\/PhysRevE.86.041125"},{"issue":"3","key":"450_CR27","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6633\/aa5398","volume":"80","author":"W Wang","year":"2016","unstructured":"Wang W, Tang M, Stanley HE, Braunstein L (2016) Unification of theoretical approaches for epidemic spreading on complex networks. Rep Prog Phys 80(3):036603. https:\/\/doi.org\/10.1088\/1361-6633\/aa5398","journal-title":"Rep Prog Phys"},{"issue":"6","key":"450_CR28","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1007\/s00285-020-01542-6","volume":"81","author":"B Prasse","year":"2020","unstructured":"Prasse B, Mieghem PV (2020) Time-dependent solution of the nimfa equations around the epidemic threshold. J Math Biol 81(6):1299\u20131355. https:\/\/doi.org\/10.1007\/s00285-020-01542-6","journal-title":"J Math Biol"},{"key":"450_CR29","doi-asserted-by":"publisher","unstructured":"Aggrawal N, Anand A (2022) Social Networks: Modelling and Analysis, 1st, hardcover and e-book edn. CRC Press, Boca Raton, FL . https:\/\/doi.org\/10.1201\/9781003088066","DOI":"10.1201\/9781003088066"},{"key":"450_CR30","unstructured":"Kanyou C, Kouokam E, Emvudu Y (2022) Structural network analysis: Correlation between centrality measures. Colloque Africain sur la Recherche en Informatique et en Math\u00e9matiques Appliqu\u00e9es (CARI 2022)"},{"key":"450_CR31","doi-asserted-by":"publisher","first-page":"17","DOI":"10.2307\/621721","volume":"55","author":"KJ Tinkler","year":"1972","unstructured":"Tinkler KJ (1972) The physical interpretation of eigenfunctions of dichotomous matrices. Trans Inst Br Geogr 55:17\u201346. https:\/\/doi.org\/10.2307\/621721","journal-title":"Trans Inst Br Geogr"},{"key":"450_CR32","doi-asserted-by":"publisher","unstructured":"Kazienko P (2018) Process of social network analysis. Springer, Encyclopedia of Social Network Analysis and Mining, 1927\u20131942 https:\/\/doi.org\/10.1007\/978-1-4939-7131-2-244","DOI":"10.1007\/978-1-4939-7131-2-244"}],"container-title":["Theory in Biosciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12064-025-00450-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12064-025-00450-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12064-025-00450-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T18:43:26Z","timestamp":1771440206000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12064-025-00450-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,1]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["450"],"URL":"https:\/\/doi.org\/10.1007\/s12064-025-00450-x","relation":{},"ISSN":["1431-7613","1611-7530"],"issn-type":[{"value":"1431-7613","type":"print"},{"value":"1611-7530","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,1]]},"assertion":[{"value":"21 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Original work. All authors approve and consent this work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"All authors approve and consent to publish this work.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"1"}}