Numerical technique based on the interpolation with Lagrange polynomials to analyze the fractional variable-order mathematical model of the hepatitis C with different types of virus genome

2021 ◽  
Vol 152 ◽  
pp. 111333
Author(s):  
M.M. Khader ◽  
Mustafa Inc
2006 ◽  
Vol 7 (1) ◽  
pp. 3-13 ◽  
Author(s):  
I. A. Moneim ◽  
G. A. Mosa

Hepatitis C virus (HCV) is one of the leading known causes of liver disease in the world. The HCV is a single-stranded RNA virus. The genomes of HCV display significant sequence heterogeneity and have been classified into types and subtypes. Types from 1 to 11 have so far been recognized, each type having a variable number of subtypes. It has been confirmed that 90% approximately of the isolates HCV infections in Egypt belong to a single subtype (4a) [10]. In this paper, we construct a mathematical model to study the spread of HCV-subtype 4a amongst the Egyptian population. The relation between HCV-subtype 4a and the other subtypes has also been studied. The values of reproduction numbersR01,R02have been derived [5]. Also, threshold conditions for the value of the transmission ratesk1andk02, in terms ofR01,R02and the mutation factor μ have been determined to insure that the disease will die out. If the conditions fail to happen the disease takes off and becomes endemic.


1995 ◽  
Vol 23 (5) ◽  
pp. 634-641
Author(s):  
Gill Langley

Three chimpanzee studies of hepatitis C infection were found to be duplicative of each other and of research with human volunteers. Research into taste neurophysiology also used chimpanzees, although data which are highly relevant (but less specific) can be obtained from human studies. The use of chimps to study benzene metabolism was found to be poorly planned and unjustifiable. Scientifically, chimps are not always the best “models” for humans, and their use raises insurmountable ethical concerns. Many alternatives are already available, but researchers will need to adjust their perspectives on the usefulness of different types of data.


2012 ◽  
Vol 8 (3) ◽  
pp. e1002561 ◽  
Author(s):  
Tomomi Ando ◽  
Hiromi Imamura ◽  
Ryosuke Suzuki ◽  
Hideki Aizaki ◽  
Toshiki Watanabe ◽  
...  

1994 ◽  
Vol 106 (6) ◽  
pp. 1603-1610 ◽  
Author(s):  
Kojiro Michitaka ◽  
Marilena Durazzo ◽  
Hans L. Tillmann ◽  
Diana Walker ◽  
Thomas Philipp ◽  
...  

2018 ◽  
Vol 34 (2) ◽  
pp. 197-210 ◽  
Author(s):  
Catherine Sodroski ◽  
Brianna Lowey ◽  
Laura Hertz ◽  
T. Jake Liang ◽  
Qisheng Li

1996 ◽  
Vol 9 (2) ◽  
pp. 89-96 ◽  
Author(s):  
FLOR H. PUJOL ◽  
YURY E. KHUDYAKOV ◽  
MARISOL DEVESA ◽  
GRACIELA LEÓN ◽  
LINDA BLITZ-DORFMAN ◽  
...  

2019 ◽  
Vol 8 (1) ◽  
pp. 486-495 ◽  
Author(s):  
Bimal Kumar Mishra ◽  
Ajit Kumar Keshri ◽  
Dheeresh Kumar Mallick ◽  
Binay Kumar Mishra

Abstract Internet of Things (IoT) opens up the possibility of agglomerations of different types of devices, Internet and human elements to provide extreme interconnectivity among them towards achieving a completely connected world of things. The mainstream adaptation of IoT technology and its widespread use has also opened up a whole new platform for cyber perpetrators mostly used for distributed denial of service (DDoS) attacks. In this paper, under the influence of internal and external nodes, a two - fold epidemic model is developed where attack on IoT devices is first achieved and then IoT based distributed attack of malicious objects on targeted resources in a network has been established. This model is mainly based on Mirai botnet made of IoT devices which came into the limelight with three major DDoS attacks in 2016. The model is analyzed at equilibrium points to find the conditions for their local and global stability. Impact of external nodes on the over-all model is critically analyzed. Numerical simulations are performed to validate the vitality of the model developed.


Sign in / Sign up

Export Citation Format

Share Document