scholarly journals Modeling the Propagation of Mobile Phone Virus under Complex Network

2014 ◽  
Vol 2014 ◽  
pp. 1-14 ◽  
Author(s):  
Wei Yang ◽  
Xi-liang Wei ◽  
Hao Guo ◽  
Gang An ◽  
Lei Guo ◽  
...  

Mobile phone virus is a rogue program written to propagate from one phone to another, which can take control of a mobile device by exploiting its vulnerabilities. In this paper the propagation model of mobile phone virus is tackled to understand how particular factors can affect its propagation and design effective containment strategies to suppress mobile phone virus. Two different propagation models of mobile phone viruses under the complex network are proposed in this paper. One is intended to describe the propagation of user-tricking virus, and the other is to describe the propagation of the vulnerability-exploiting virus. Based on the traditional epidemic models, the characteristics of mobile phone viruses and the network topology structure are incorporated into our models. A detailed analysis is conducted to analyze the propagation models. Through analysis, the stable infection-free equilibrium point and the stability condition are derived. Finally, considering the network topology, the numerical and simulation experiments are carried out. Results indicate that both models are correct and suitable for describing the spread of two different mobile phone viruses, respectively.

2021 ◽  
Vol 5 (2) ◽  
pp. 32
Author(s):  
Esmehan Uçar ◽  
Sümeyra Uçar ◽  
Fırat Evirgen ◽  
Necati Özdemir

It is possible to produce mobile phone worms, which are computer viruses with the ability to command the running of cell phones by taking advantage of their flaws, to be transmitted from one device to the other with increasing numbers. In our day, one of the services to gain currency for circulating these malignant worms is SMS. The distinctions of computers from mobile devices render the existing propagation models of computer worms unable to start operating instantaneously in the mobile network, and this is particularly valid for the SMS framework. The susceptible–affected–infectious–suspended–recovered model with a classical derivative (abbreviated as SAIDR) was coined by Xiao et al., (2017) in order to correctly estimate the spread of worms by means of SMS. This study is the first to implement an Atangana–Baleanu (AB) derivative in association with the fractional SAIDR model, depending upon the SAIDR model. The existence and uniqueness of the drinking model solutions together with the stability analysis are shown through the Banach fixed point theorem. The special solution of the model is investigated using the Laplace transformation and then we present a set of numeric graphics by varying the fractional-order θ with the intention of showing the effectiveness of the fractional derivative.


2013 ◽  
Vol 2013 ◽  
pp. 1-11 ◽  
Author(s):  
Yu Yao ◽  
Nan Zhang ◽  
Wenlong Xiang ◽  
Ge Yu ◽  
Fuxiang Gao

A delayed worm propagation model with birth and death rates is formulated. The stability of the positive equilibrium is studied. Through theoretical analysis, a critical valueτ0of Hopf bifurcation is derived. The worm propagation system is locally asymptotically stable when time delay is less thanτ0. However, Hopf bifurcation appears when time delayτpasses the thresholdτ0, which means that the worm propagation system is unstable and out of control. Consequently, time delay should be adjusted to be less thanτ0to ensure the stability of the system stable and better prediction of the scale and speed of Internet worm spreading. Finally, numerical and simulation experiments are presented to simulate the system, which fully support our analysis.


2019 ◽  
Vol 2019 ◽  
pp. 1-10 ◽  
Author(s):  
Changjin Xu ◽  
Maoxin Liao ◽  
Peiluan Li

In recent years, with the rapid development of the Internet and the Internet of Things, network security is urgently needed. Malware becomes a major threat to network security. Thus, the study on malware propagation model plays an important role in network security. In the past few decades, numerous researchers put up various kinds of malware propagation models to analyze the dynamic interaction. However, many works are only concerned with the integer-order malware propagation models, while the investigation on fractional-order ones is very few. In this paper, based on the earlier works, we will put up a new fractional-order delayed malware propagation model. Letting the delay be bifurcation parameter and analyzing the corresponding characteristic equations of considered system, we will establish a set of new sufficient conditions to guarantee the stability and the existence of Hopf bifurcation of fractional-order delayed malware propagation model. The study shows that the delay and the fractional order have important effect on the stability and Hopf bifurcation of considered system. To check the correctness of theoretical analyses, we carry out some computer simulations. At last, a simple conclusion is drawn. The derived results of this paper are completely innovative and play an important guiding role in network security.


2011 ◽  
Vol 204-210 ◽  
pp. 433-436
Author(s):  
Juan Zhou ◽  
Xiang Hu Chen

A single model can hardly describe all viruses because computer viruses replicate in a variety of ways. Therefore, this paper proposes a model, which is based on multiple characteristics of the virus. Traditional models cannot effectively reflect the characteristics and process of computer virus propagation. This paper presents a new virus propagation model to describe the spread of viruses in the network environment. By solving the model equations, running data analyses, and conducting simulation experiments, this study collected the actual statistical data and compared them with the experimental data. The result indicates that the model can effectively reflect the characteristics of the spread of the virus. Therefore, this model provides a scientific basis for the computer virus prevention.


Author(s):  
Godfrey C. Hoskins ◽  
V. Williams ◽  
V. Allison

The method demonstrated is an adaptation of a proven procedure for accurately determining the magnification of light photomicrographs. Because of the stability of modern electrical lenses, the method is shown to be directly applicable for providing precise reproducibility of magnification in various models of electron microscopes.A readily recognizable area of a carbon replica of a crossed-line diffraction grating is used as a standard. The same area of the standard was photographed in Phillips EM 200, Hitachi HU-11B2, and RCA EMU 3F electron microscopes at taps representative of the range of magnification of each. Negatives from one microscope were selected as guides and printed at convenient magnifications; then negatives from each of the other microscopes were projected to register with these prints. By deferring measurement to the print rather than comparing negatives, correspondence of magnification of the specimen in the three microscopes could be brought to within 2%.


2020 ◽  
Vol 12 (7) ◽  
pp. 2767 ◽  
Author(s):  
Víctor Yepes ◽  
José V. Martí ◽  
José García

The optimization of the cost and CO 2 emissions in earth-retaining walls is of relevance, since these structures are often used in civil engineering. The optimization of costs is essential for the competitiveness of the construction company, and the optimization of emissions is relevant in the environmental impact of construction. To address the optimization, black hole metaheuristics were used, along with a discretization mechanism based on min–max normalization. The stability of the algorithm was evaluated with respect to the solutions obtained; the steel and concrete values obtained in both optimizations were analyzed. Additionally, the geometric variables of the structure were compared. Finally, the results obtained were compared with another algorithm that solved the problem. The results show that there is a trade-off between the use of steel and concrete. The solutions that minimize CO 2 emissions prefer the use of concrete instead of those that optimize the cost. On the other hand, when comparing the geometric variables, it is seen that most remain similar in both optimizations except for the distance between buttresses. When comparing with another algorithm, the results show a good performance in optimization using the black hole algorithm.


Games ◽  
2021 ◽  
Vol 12 (3) ◽  
pp. 53
Author(s):  
Roberto Rozzi

We consider an evolutionary model of social coordination in a 2 × 2 game where two groups of players prefer to coordinate on different actions. Players can pay a cost to learn their opponent’s group: if they pay it, they can condition their actions concerning the groups. We assess the stability of outcomes in the long run using stochastic stability analysis. We find that three elements matter for the equilibrium selection: the group size, the strength of preferences, and the information’s cost. If the cost is too high, players never learn the group of their opponents in the long run. If one group is stronger in preferences for its favorite action than the other, or its size is sufficiently large compared to the other group, every player plays that group’s favorite action. If both groups are strong enough in preferences, or if none of the groups’ sizes is large enough, players play their favorite actions and miscoordinate in inter-group interactions. Lower levels of the cost favor coordination. Indeed, when the cost is low, in inside-group interactions, players always coordinate on their favorite action, while in inter-group interactions, they coordinate on the favorite action of the group that is stronger in preferences or large enough.


Mathematics ◽  
2021 ◽  
Vol 9 (12) ◽  
pp. 1447
Author(s):  
Jose P. Suárez ◽  
Agustín Trujillo ◽  
Tania Moreno

Showing whether the longest-edge (LE) bisection of tetrahedra meshes degenerates the stability condition or not is still an open problem. Some reasons, in part, are due to the cost for achieving the computation of similarity classes of millions of tetrahedra. We prove the existence of tetrahedra where the LE bisection introduces, at most, 37 similarity classes. This family of new tetrahedra was roughly pointed out by Adler in 1983. However, as far as we know, there has been no evidence confirming its existence. We also introduce a new data structure and algorithm for computing the number of similarity tetrahedral classes based on integer arithmetic, storing only the square of edges. The algorithm lets us perform compact and efficient high-level similarity class computations with a cost that is only dependent on the number of similarity classes.


SLEEP ◽  
2020 ◽  
Vol 43 (Supplement_1) ◽  
pp. A5-A5
Author(s):  
A Gozar ◽  
A Seixas ◽  
L Hale ◽  
C Branas ◽  
M Barrett ◽  
...  

Abstract Introduction Mobile phone use at night is associated with worse sleep quality. It may also be associated with daytime productivity, possibly via anxiety. Methods Data were obtained from the Sleep and Healthy Activity, Diet, Environment, and Socialization (SHADES) study, including N=1007 adults age 22–60. Mobile device use in bed was assessed as the frequency that participants reported: a device in the bedroom, use of the device in bed, texting, emails, internet browsing, calls, and/or social networking in bed, being woken up by the device in a planned (alarm) or unplanned (alert/call/message) way, and checking the phone at night. Each of these were coded as “never,” “rarely,” or “often.” Work productivity was assessed with the Well-Being Assessment of Productivity (WBA-P; scores 0–22 measure productivity loss). Regressions with WBA-P score as outcome and mobile phone variables as predictors were adjusted for age, sex, race/ethnicity, education, and income level. Post-hoc analyses included GAD7 score to examine the mediating role of anxiety. Results The presence of a device was not associated with productivity loss, but frequent use (“often”) was (B=1.26,p=0.01). Increased productivity loss was also seen in those who frequently (“often”) sent texts (B=1.20,p=0.008), browsed internet (B=1.14,p=0.01), emailed (B=2.09,p<0.0005), called (B=1.42,p=0.004), and used social media (B=1.26,p=0.004). Productivity loss was associated with being woken by a call/alert “rarely” (B=1.20,p=0.001) or “often” (B=1.72,p=0.005), but not by alarm. Checking the phone at night “rarely” (B=0.89,p=0.01) and “often” (B=1.73,p<0.0005) were also associated with productivity loss. When anxiety was entered into the model, all relationships except those with frequent emails and calls in bed became nonsignificant. Conclusion Anxiety may be the underlying cause for both increased mobile phone usage and reduced productivity. Reducing anxiety levels may indirectly aid in decreasing nighttime mobile phone use and increasing daytime productivity. Support The SHADES study was funded by R21ES022931 Dr. Grandner is supported by R01MD011600


2011 ◽  
Vol 2011 ◽  
pp. 1-12 ◽  
Author(s):  
H. Saberi Najafi ◽  
A. Refahi Sheikhani ◽  
A. Ansari

We analyze the stability of three classes of distributed order fractional differential equations (DOFDEs) with respect to the nonnegative density function. In this sense, we discover a robust stability condition for these systems based on characteristic function and new inertia concept of a matrix with respect to the density function. Moreover, we check the stability of a distributed order fractional WINDMI system to illustrate the validity of proposed procedure.


Sign in / Sign up

Export Citation Format

Share Document