scholarly journals A Fractional SAIDR Model in the Frame of Atangana–Baleanu Derivative

2021 ◽  
Vol 5 (2) ◽  
pp. 32
Author(s):  
Esmehan Uçar ◽  
Sümeyra Uçar ◽  
Fırat Evirgen ◽  
Necati Özdemir

It is possible to produce mobile phone worms, which are computer viruses with the ability to command the running of cell phones by taking advantage of their flaws, to be transmitted from one device to the other with increasing numbers. In our day, one of the services to gain currency for circulating these malignant worms is SMS. The distinctions of computers from mobile devices render the existing propagation models of computer worms unable to start operating instantaneously in the mobile network, and this is particularly valid for the SMS framework. The susceptible–affected–infectious–suspended–recovered model with a classical derivative (abbreviated as SAIDR) was coined by Xiao et al., (2017) in order to correctly estimate the spread of worms by means of SMS. This study is the first to implement an Atangana–Baleanu (AB) derivative in association with the fractional SAIDR model, depending upon the SAIDR model. The existence and uniqueness of the drinking model solutions together with the stability analysis are shown through the Banach fixed point theorem. The special solution of the model is investigated using the Laplace transformation and then we present a set of numeric graphics by varying the fractional-order θ with the intention of showing the effectiveness of the fractional derivative.

2021 ◽  
Vol 10 (2) ◽  
pp. 61-71
Author(s):  
Moulay Rchid Sidi Ammi ◽  
Mostafa Tahiri ◽  
Delfim F. M. Torres

In this paper, we study an epidemic model with Atangana-Baleanu-Caputo fractional derivative. We obtain a special solution using an iterative scheme via Laplace transformation. Uniqueness and existence of a solution using the Banach fixed point theorem are studied. A detailed analysis of the stability of the special solution is presented. Finally, our generalized model in the derivative sense is solved numerically by the Adams-Bashforth-Moulton method.


2012 ◽  
Vol 2012 ◽  
pp. 1-16 ◽  
Author(s):  
Chunming Zhang ◽  
Yun Zhao ◽  
Yingjiang Wu ◽  
Shuwen Deng

A stochastic computer virus spread model is proposed and its dynamic behavior is fully investigated. Specifically, we prove the existence and uniqueness of positive solutions, and the stability of the virus-free equilibrium and viral equilibrium by constructing Lyapunov functions and applying Ito's formula. Some numerical simulations are finally given to illustrate our main results.


Author(s):  
Ahmed Refice ◽  
Mohammed Said Souid ◽  
Ali Yakar

The existence-uniqueness criteria of nonlinear fractional integro-differential equations of variable order with multiterm boundary value conditions are considered in this work. By utilizing the concepts of generalized intervals combined with the piecewise constant functions, we transform our problem into usual Caputo’s fractional differential equations of constant order. We develop the necessary criteria for assuring the solution's existence and uniqueness by applying Schauder and Banach fixed point theorem. We also examine the stability of the derived solution in the Ulam-Hyers-Rassias (UHR) sense and provide an example to demonstrate the credibility of the results.


2014 ◽  
Vol 2014 ◽  
pp. 1-14 ◽  
Author(s):  
Wei Yang ◽  
Xi-liang Wei ◽  
Hao Guo ◽  
Gang An ◽  
Lei Guo ◽  
...  

Mobile phone virus is a rogue program written to propagate from one phone to another, which can take control of a mobile device by exploiting its vulnerabilities. In this paper the propagation model of mobile phone virus is tackled to understand how particular factors can affect its propagation and design effective containment strategies to suppress mobile phone virus. Two different propagation models of mobile phone viruses under the complex network are proposed in this paper. One is intended to describe the propagation of user-tricking virus, and the other is to describe the propagation of the vulnerability-exploiting virus. Based on the traditional epidemic models, the characteristics of mobile phone viruses and the network topology structure are incorporated into our models. A detailed analysis is conducted to analyze the propagation models. Through analysis, the stable infection-free equilibrium point and the stability condition are derived. Finally, considering the network topology, the numerical and simulation experiments are carried out. Results indicate that both models are correct and suitable for describing the spread of two different mobile phone viruses, respectively.


Author(s):  
Godfrey C. Hoskins ◽  
V. Williams ◽  
V. Allison

The method demonstrated is an adaptation of a proven procedure for accurately determining the magnification of light photomicrographs. Because of the stability of modern electrical lenses, the method is shown to be directly applicable for providing precise reproducibility of magnification in various models of electron microscopes.A readily recognizable area of a carbon replica of a crossed-line diffraction grating is used as a standard. The same area of the standard was photographed in Phillips EM 200, Hitachi HU-11B2, and RCA EMU 3F electron microscopes at taps representative of the range of magnification of each. Negatives from one microscope were selected as guides and printed at convenient magnifications; then negatives from each of the other microscopes were projected to register with these prints. By deferring measurement to the print rather than comparing negatives, correspondence of magnification of the specimen in the three microscopes could be brought to within 2%.


Author(s):  
Ali Shirzad ◽  
Shaban Mohammadi ◽  
Hamedesmaeili Oghaz

Dependence on information and rapidly changing technology can be seen in many organizations, with proper security and intelligence systems to protect themselves. But success in providing security depends on the awareness of managers and employees. The accounting information systems in organizations are the most important element. One of the factors threatening their system is virus. Malware are computer viruses that can cause a variety of disorders, including loss of data and accounting information systems are impaired in such case. On the other hand, one of the main objectives of the viruses is to steal financial information. In this paper, one of the main factors threatening the security of accounting information systems, the viruses are described.


2020 ◽  
Vol 12 (7) ◽  
pp. 2767 ◽  
Author(s):  
Víctor Yepes ◽  
José V. Martí ◽  
José García

The optimization of the cost and CO 2 emissions in earth-retaining walls is of relevance, since these structures are often used in civil engineering. The optimization of costs is essential for the competitiveness of the construction company, and the optimization of emissions is relevant in the environmental impact of construction. To address the optimization, black hole metaheuristics were used, along with a discretization mechanism based on min–max normalization. The stability of the algorithm was evaluated with respect to the solutions obtained; the steel and concrete values obtained in both optimizations were analyzed. Additionally, the geometric variables of the structure were compared. Finally, the results obtained were compared with another algorithm that solved the problem. The results show that there is a trade-off between the use of steel and concrete. The solutions that minimize CO 2 emissions prefer the use of concrete instead of those that optimize the cost. On the other hand, when comparing the geometric variables, it is seen that most remain similar in both optimizations except for the distance between buttresses. When comparing with another algorithm, the results show a good performance in optimization using the black hole algorithm.


2019 ◽  
Vol 12 (06) ◽  
pp. 1950067 ◽  
Author(s):  
Zhaohua Wu ◽  
Zhiming Wang ◽  
Tiejun Zhou

Fractional-order gene regulatory networks with time delay (DFGRNs) have proven that they are more suitable to model gene regulation mechanism than integer-order. In this paper, a novel DFGRN is proposed. The existence and uniqueness of the equilibrium point for the DFGRN are proved under certain conditions. On this basis, the conditions on the global asymptotic stability are established by using the Lyapunov method and comparison theorem for the DFGRN, and the stability conditions are dependent on the fractional-order [Formula: see text]. Finally, numerical simulations show that the obtained results are reasonable.


Games ◽  
2021 ◽  
Vol 12 (3) ◽  
pp. 53
Author(s):  
Roberto Rozzi

We consider an evolutionary model of social coordination in a 2 × 2 game where two groups of players prefer to coordinate on different actions. Players can pay a cost to learn their opponent’s group: if they pay it, they can condition their actions concerning the groups. We assess the stability of outcomes in the long run using stochastic stability analysis. We find that three elements matter for the equilibrium selection: the group size, the strength of preferences, and the information’s cost. If the cost is too high, players never learn the group of their opponents in the long run. If one group is stronger in preferences for its favorite action than the other, or its size is sufficiently large compared to the other group, every player plays that group’s favorite action. If both groups are strong enough in preferences, or if none of the groups’ sizes is large enough, players play their favorite actions and miscoordinate in inter-group interactions. Lower levels of the cost favor coordination. Indeed, when the cost is low, in inside-group interactions, players always coordinate on their favorite action, while in inter-group interactions, they coordinate on the favorite action of the group that is stronger in preferences or large enough.


2011 ◽  
Vol 374-377 ◽  
pp. 2605-2609
Author(s):  
Lei Shi ◽  
Li Gao

Logit model is among the most important model in SUE DTA study. A lot of work have been done based on Logit model. As the other very important SUE DTA model, Probit model has not been the focus of many researcher. This paper presents a SUE model based on Probit model, which aims at building up the Probit model with constant demand. The existence and uniqueness of the model is presented, Finally, a algorithm is given.


Sign in / Sign up

Export Citation Format

Share Document