Fig. 19From: Complex influence propagation based on trust-aware dynamic linear threshold modelsFocus on a connector from Fig. 18 and its adaptation for the npC-F2DLT modelBack to article page