Research Article Adaptive Human Behavior in a Two-Worm Interaction Model

Size: px
Start display at page:

Download "Research Article Adaptive Human Behavior in a Two-Worm Interaction Model"

Transcription

1 Discrete Dynamics in ature and Society Volume 22, Article ID , 3 pages doi:.55/22/ Research Article Adaptive Human Behavior in a Two-Worm Interaction Model Li-Peng Song,, 2 Xie Han,, 2 Dong-Ming Liu, and Zhen Jin 3 Department of Computer Science and Technology, orth University of China, Shanxi, Taiyuan 35, China 2 ational Key Laboratory for Electronic Measurement Technology, orth University of China, Shanxi, Taiyuan 35, China 3 Department of Mathematics, orth University of China, Shanxi, Taiyuan 35, China Correspondence should be addressed to Zhen Jin, jinzhn@263.net Received 8 July 22; Accepted 8 October 22 Academic Editor: Bimal Kumar Mishra Copyright q 22 Li-Peng Song et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The complex interactions among internet worms have great impact on the dynamics of worms. To contain the propagation of worms, it is necessary to characterize these interactions. Therefore, a two-worm interaction model is presented in this paper. Different from previous researches, we have considered the influence of adaptive human reaction stirred by one cooperative worm on the other worm in the model. The model s equilibria and their stability conditions are obtained mathematically and verified by simulations. Results indicate that considering adaptive human behavior significantly changes the prospective propagation course of worms and that this consideration has implications for designing counterworm methods.. Introduction owadays, malware including worms, viruses, botnets et al. is prevalent on the internet, which has led to serious problems to the security of internet. For example, more than one hundred million web-based infections are detected by Kaspersky Lab in February 22. According to Crandall et al. 2, the fight against malware, which is often viewed as an arms race, is quickly becoming unsustainable as so many malware samples are collected each day. However, malware has also created a complex environment for itself. Understanding the effects of interactions of malware with other malware and with its environment may suggest new defense methods that give fundamental advantages to the defender. Mathematical models have been proposed to characterize the spreading of malware. Han and Tan 3 analyzed the influence of time delay on computer virus by using a susceptible-infected-recovered-susceptible model. They obtained the critical value of time delay

2 2 Discrete Dynamics in ature and Society which determined whether the model had periodic solution or not. Song et al. 4 presented a model focusing on the worms spreading via both Web-based scanning and removable devices. They found that the existence of infected removable devices was in favor of the outbreak of worms, and limiting the number of removable devices would prevent the worms outbreak. In 5, Mishra and Pandey focused on the vertical transmission of worms in computer network. Ren et al. 6 presented a novel model and analyzed the effect of antivirus ability. Different from other models, the ability of anti-virus software in their model was dependent on the number of infected computers. Some other models 7 have also been given in recent year. However, all of these studies have focused on one type of malware. Tanachaiwiwat and Helmy proposed the first model focusing on the interactions between two types of competitive worms, to our knowledge. In 2, Song et al. presented an interaction model between two different types of botnets and analyzed the influences of the strategies selected by interacting botnet owners on the propagation of both botnets. In this paper, we present a two-worm model to analyze the influence of one cooperative worm on the other worm. Different from previous models, 2, the influence of adaptive human behavior stirred by the cooperative worm has been included in the model. Our work is motivated by the phenomenon that many worms cooperative worms, e.g., -Worm.Win32.Bagle.p, -Worm.Win32.Roron.2, and so on can block the antivirus software and the firewall, which will be beneficial to the spreading of other worms 3 but may lead to people s reaction to the infection state. The remainder of this paper is organized as follows. In Section 2, we present the model and interpret the actual meanings of the model s parameters. Then, we give the analytical results in Section 3 and validate the analytical results using various simulations in Section 4. After that, we summarize our results in Section Model Description The basic model used in this paper is the susceptible-infected-susceptible SIS model 4. To depict the interactions between one cooperative worm and the other worm, here named as noncooperative worm, we enhance the model by dividing the infected compartment into three parts. Thus, the model, presented here, includes four compartments: susceptible computers S, computers infected by worm cooperative worm I computers that are currently infected by the cooperative worm and are susceptible to the noncooperative worm; computers infected by worm2 noncooperative worm I 2 computers that are currently infected by some noncooperative worm and are susceptible to the cooperative worm, and computers infected by both worms I 2. Here, we assume that the anti-virus software and the firewall will be blocked whenever computers are infected with the cooperative worm. We also assume that a computer s anti-virus software and firewall are always open unless stopped by the cooperative worm. Let β and β 2 denote the susceptible computer s infection rates due to the successful scanning of a computer infected with the cooperative worm and the successful scanning of a computer infected with the noncooperative worm, respectively. To model the influence of anti-virus software and firewall, an increasing factor in infection rate is given by μ μ > while trying to infect a computer with its anti-virus software and firewall closed. As in 2, 5, when the operating system was reinstalled, infected computers would return to the susceptible state. Here, we denote the random reinstallation rate as δ. We also assume an increasing in the reinstallation rate whenever a computer is infected with

3 Discrete Dynamics in ature and Society 3 the cooperative worm. It is reasonable since the cooperative worm will block the anti-virus software and firewall, and this may stimulate user s reaction to the invasion of malware. For simplicity, let δ δ >δ be the rate which combines the random reinstallation rate and the reinstallation rate caused by user s adaptive behavior. The probability of successfully finding a susceptible computer in one scan is S/, where is the total number of computers considered. Then, β S/ and β 2 S/ are the susceptible computer s infection numbers per time step caused by a computer infected with the cooperative worm and the noncooperative worm, respectively. Thus, the model is given below: S β S I I 2 β 2S I 2 I 2 δ I I 2 δi 2, I β S I I 2 μβ 2I I 2 I 2 δ I, I2 β 2S I 2 I 2 β I 2 I I 2 δi 2, I2 μβ 2I I 2 I 2 β I 2 I I 2 δ I 2, 2. where S I I 2 I 2. ote that the model is conservative for total computers since we do not include both new computers and obsolete computers in 2.. Then, the model can be rewritten as I β I I 2 I 2 I2 β 2 I I 2 I 2 I I 2 μβ 2I I 2 I 2 δ I, I 2 I 2 β I 2 I I 2 δi 2, I2 μβ 2I I 2 I 2 β I 2 I I 2 δ I The initial state of the system 2.2 is set to I I, I 2 I 2,andI 2 I 2, where S I I 2 I 2. The values of S, I, I 2,andI 2 are given in the simulation section. 3. Model Analysis 3.. Equilibria The equilibria of system 2.2 are given by β I I 2 I 2 I I 2 μβ 2I I 2 I 2 δ I, 3.a β 2 I I 2 I 2 I 2 I 2 β I 2 I I 2 δi 2, 3.b μβ 2 I I 2 I 2 β I 2 I I 2 δ I 2. 3.c

4 4 Discrete Dynamics in ature and Society Let R be the basic reproduction number, the number of secondary infections deriving from a single primary infection, of the cooperative worm, and R 2, R2 be the basic reproduction numbers of the noncooperative worm when the cooperative worm dies out or exists, respectively. Then, we have R β δ, 3.2 R 2 β 2 δ, 3.3a R 2 β [ 2 δ μi β δ δ )] β δ δ ), δ 3.3b where I b 2 4ac b, 3.4 2a and a μβ 2 β μβ μδ μδ /β, b μ β δ δ 2δ /β μβ 2 δ,and c δ β δ δ β δ /β β 2. As the derivations of R and R2 are very simple, we only give the derivation of R2 here. Adding 3.a to 3.c leads to I I 2 δ β 3.5 or I I R 2 means that the cooperative worm exists. Thus, we only consider the condition when I I 2 δ /β. Using this condition in 3.b and 3.c, weget β2 δ β ) 2I 2 I 2 I 2 β δ δ ) I 2, β ) μβ2 I δ I 2 I 2 β I This yields β β 2 I 2 β 2 δ μβ 2 I β δ δ ) β δ δ ) δ. 3.8 According to the right hand side of 3.8, we can get the term of R 2. Furthermore, 3.4 can be obtained by substituting I 2 in 3.8 into 3.a.

5 Discrete Dynamics in ature and Society 5 For the simplified system 2.2, there always exists a disease-free equilibrium,, for I,I 2,I 2.IfR > andr2 <, there exists an equilibrium δ /β,,, corresponding to the cooperative worm endemic equilibrium. If R < andr2 >, the noncooperative worm endemic equilibrium, δ/β 2, will exist. The coexistence endemic equilibrium I,I 2,I 2 occurs if R > andr2 >, where I is the same as in 3.4, I 2 β [ 2 δ μi β δ δ )] δ β δ δ ), β β 2 I 2 δ β I. 3.9 Thus, 3.3a and 3.3b give the noncooperative worm s existence thresholds when the cooperative worm dies out or exists, respectively, that is, to ensure the existence of noncooperative worm, β 2 must be greater than the threshold value δ predicted by R 2 cooperative worm dies out or the threshold value β δ δ δ / δ μi β δ δ predicted by R 2 cooperative worm exists Stability Theorem 3.. If R < and R2 stable. <, then the disease-free equilibrium,, is asymptotically Theorem 3.2. If R > and R2 <, then the cooperative worm endemic equilibrium δ /β,, is asymptotically stable. Theorem 3.3. If R < and R2 >, then the noncooperative worm endemic equilibrium, δ/β 2, is asymptotically stable. Theorems 3., 3.2,and3.3 are easy to be proven. Here, we only give the detailed proof of the stability of coexistence endemic equilibrium I, I 2, I 2. Let b 3 Y 3 Y2, 3. 3a β st where a 4μ 2, b 2μ 2 δ 8μ 2 δ δ, c 4μ 2 δ δ 3δ δ, d 4μ 2 δ δ δ 2, A b 2 3ac, B bc 9ad, C c 2 3bd,andY,2 Ab 3a B ± B 2 4AC /2. Theorem 3.4. If R >, R2 >, and β >β st, then the coexistence endemic equilibrium I, I 2, I 2 ) is asymptotically stable.

6 6 Discrete Dynamics in ature and Society Proof. The Jacobian matrix of system 2.2 at the coexistence endemic equilibrium is given by Jac I ),I 2,I 2 β 2I I 2 ) 2I 2 μβ 2 I I 2 β 2 I 2 2) I β I 2 β I 2 μβ 2 I I 2 β I 2) I μβ2 I β 2I I 2 ) 2I 2 δ μβ 2I β 2 I 2I 2 ) 2I 2 β I I 2 ) β I I 2) μβ2 I β 2 I 2I 2 2I 2 δ β I 2 β I 2 μβ 2I δ ). 3. By means of similarity transformation upon the matrix 3., we have Jac I,I 2 2),I β δ β 2 I 2 I 2) β I 2 β I 2 μβ 2 I I 2 β 2 I 2I 2 ) 2I 2 β δ δ β δ μβ 2I β 2 I I 2 ) I 2 μβ 2 I I 2 ) I 2. δ 3.2 The characteristic equation of 3.2 is given by ) [ ] λ β δ λ 2 a 22 a 33 λ a 22 a 33 a 23 a 32, 3.3 where a 22 β 2 I 2I 2 2I 2 / β δ δ, a 23 β 2 I I 2 I 2 /, a 32 β δ μβ 2 I /,anda 33 μβ 2 I I 2 I 2 / δ. In 3.3, λ β δ, which is less than zero as R >. Then, we only need to prove that the eigenvalues in the square brackets of 3.3 have negative real parts. According to the Hurwitz criteria 6, H a 22 a 33, H 2 a 22 a 33 a 22 a 33 a 23 a

7 Discrete Dynamics in ature and Society 7 It is easy to see that a 33 < and [ β2 I a 22 a 33 a 23 a 32 2I 2 ) ) 2I 2 μβ2 I β δ δ I 2 ) ) I 2 δ β 2 I I 2 ) I 2 β δ μβ 2I ) ] μβ 2 I [ I 2 β2 2I 2I 2 β 2 β δ δ δ ] μ ) ) β 2 β δ δ ) δ μβ 2I μβ 2 I [ I 2 β2 2I 2I 2 > μβ 2 I I 2 μβ 2 I I 2 a 22. δ β I 2 β 2 β δ δ δ ] μ [ β2 2I 2 2I 2 I ) ] β δ δ Thus, H > andh 2 > provided that a 22 <. Consider a 22 β 2 I 2I 2 ) 2I 2 β δ δ β 2 2β 2 I I 2 β 2I β δ δ β 2 2 [ δ β I 2 /) ) ] δ /β μ I δ β 2I β 2 2 [ β δ δ ) μi / δ ) ) /β 2 δ /β μ β 2 β 2I 2δ μβ 2 I δ β I ) β δ δ ) 2δ β β δ δ δ ] μβ 2 / ) I 2 AI ) 2δ /β 2 β δ δ ) ) δ /β μi β 2I ) β δ δ ) 2δ μ β δ δ μβ2 / ) μ β δ δ ) ) /β I 2 BI ) δ /β 2 β δ δ ) ) δ /β μβ2 μβ μδ μδ ) ) /β I 2 δ I ) δ /β 2 β δ δ ) ) δ /β, μi μi

8 8 Discrete Dynamics in ature and Society where A denotes μ β δ δ 2δ /β μβ 2 2δ and B denotes μ β δ δ 2δ /β μβ 2 δ.as μβ 2 / μ β δ δ /β I 2 μ β δ δ 2δ /β μβ 2 δ I δ /β 2 β δ δ δ /β /μi, we have μβ2 μβ μδ μδ ) ) /β I 2 δ I a 22 ) δ /β 2 β δ δ ) ) δ /β μi μβ2 μβ μδ μδ ) ) ) /β C δ /β 2 β δ δ ) )) δ /β D μi ) δ /β 2 β δ δ ) ) δ /β D < 3.7 μi δ β δ δ ) ) δ /β δ 2 β /4μ μβ μδ μδ ) μβ 2 I δ ] [aβ 4μ 2 β β δ δ ) 3 μβ 2 I bβ2 cβ d, where C denotes I δ β /2μβ 2 μβ μδ μδ 2 and D denotes δ 2 β /4μβ 2 μβ μδ μδ and where a, b, c,andd are the same as in 3.. According to the root extracting formula, the equation, aβ 3 bβ2 cβ d, has one positive real root β st. Furthermore, for any β,ifβ >β st, then aβ3 bβ2 cβ d>. As R > andβ >β st can guarantee a 22 <, according to the text mentioned above, a 22 < can guarantee that both H and H 2 are greater than zero, which means that both eigenvalues in the square brackets of 3.3 have negative real parts. Thus, if R >, R2 > and β >β st, there exists a coexistence endemic equilibrium, and it is asymptotically stable. The proof is completed. 4. Simulation In this paper, we use the improved Euler method to simulate the system 2.2. Inthe simulation, the total number of computers is set to. The initially infected computers with cooperative worm I, the initially infected computers with noncooperative worm I 2, and the initially infected computers with both worms I 2 are set to,, and, respectively, for all simulations. Thus, the initially susceptible computers S are Here, we first give the convergence proof of the numerical method used in the simulation. Let I I,I 2,I 2, a three-dimensional vector. Then, the system 2.2 can be rewritten as I f t, I, where f is a three-dimensional vector function in R 4. It is obvious that f is a continuous and differential function in R 4.Thus,f satisfies the Lipschitz condition, and we have f t, I f t, I 2 L I I 2, where L is a constant. The Euler iteration equation is I k n I n h/2 f t n, I n f t n, I k n, where k,, 2,..., I n I n hf t n, I n,andn,, 2,... h t n t n, representing the step value in the Euler iteration algorithm. Then, I k n I k n h f 2 hl 2 t n, I k n I k n I k n ) ) f t n, I k n

9 Discrete Dynamics in ature and Society 9 ) hl 2 I k 2 n I k 2 n ) hl k I 2 n I n. 4. Thus, the Euler iteration algorithm used in this paper is convergent as we can ensure that hl/2 < by selecting the step value h. To validate the accuracy of the thresholds predicted by 3.3a and 3.3b, we simulated the model 2.2 using four sets of variables: i the cooperative worm exists: β.48, δ.46, β 2.264, and δ.25, ii no cooperative worm: β., δ.46, β 2.264, and δ.25, iii the cooperative worm exists: β.48, δ.46, β 2.288, and δ.3, and iv no cooperative worm: β., δ.46, β 2.288, and δ.3. μ is set to.5 for these simulations. ote that in i β is less than the existence threshold.285 predicted by 3.3b. Thus, the noncooperative worm will die out although β 2 is greater than the existence threshold.25 predicted by 3.3a. Similar results can also be reached with the other three sets of variables. Figure shows the simulation results of the noncooperative worm using the first two sets of variables. Figure 2 shows the simulation results using another two sets of variables. As shown in Figure, when the cooperative worm exists and R 2 <, the noncooperative worm dies out; when the cooperative worm terminates and R 2 >, the noncooperative worm survives. In Figure 2, when the cooperative worm exists and R 2 >, the noncooperative worm survives; when the cooperative worm terminates and R 2 <, the noncooperative worm dies out. Thus, both Figures and 2 demonstrate that the simulation results are consistent with the theoretical prediction. Figures and 2 also show that the cooperative worm has dual influences on the noncooperative worm, which is different from our intuition. In Figure, the existence of cooperative worm i contains the propagation of noncooperative worm. However, the existence of cooperative worm iii favors the propagation of noncooperative worm in Figure 2. To get the effective noncooperative worm containment strategy, we further explore the influence of adaptive human behavior δ on the noncooperative worm. We simulated with various δ and calculated the thresholds of β 2 predicted by R 2 andr2. Figures 3 a, 3 b,and3 c plot the results with μ.2,.5 and 2, respectively. According to Figures 3 a, 3 b, and3 c, adaptive human behavior reflected by δ has great influence on the propagation of noncooperative worm. The threshold dash line increases rapidly with the increase of δ no matter what value μ is. Moreover, when δ.4, the thresholds dash line in all figures are much higher than the corresponding values solid line when no human behavior is considered the cooperative worm dies out, which also means a promising worm-counter-worm method. We also verified the accuracy of coexistence endemic equilibrium s stability thresholds given by Theorem 3.4. Here, the simulation parameters are set to i β.36, δ.46, β 2.3, δ.25, and μ 2 where β is greater than β st.346, and ii β.8, δ.46, β 2.3, δ.25, and μ 2 where β is less than β st. Figures 4 a and 4 b show the simulation results.

10 Discrete Dynamics in ature and Society I + I2)/ Time hour) β =.48,δ =.46, β 2 =.264, and δ =.25 β =.,δ =.46, β 2 =.264, and δ =.25 Figure : Fraction of computers infected with noncooperative worm: i green: the cooperative worm exists and R 2 < and ii blue: the cooperative worm dies out and R2 > I + I2)/ Time hour) β =.48,δ =.46, β 2 =.288, and δ =.3 β =.,δ =.46, β 2 =.288, and δ =.3 Figure 2: Fraction of computers infected with noncooperative worm: iii green: the cooperative worm exists and R 2 > and iv blue: the cooperative worm dies out and R2 <.

11 Discrete Dynamics in ature and Society Threshold of β δ Predicted by R 2 = Predicted by R 2 = a Threshold of β δ Predicted by R 2 = Predicted by R 2 = b Threshold of β δ Predicted by R 2 = Predicted by R 2 = c Figure 3: Thresholds of β 2 predicted by 3.3a and 3.3b with β.24 and δ.595, and a μ.2; b μ.5; c μ 2aregiven.δ is varied in the simulations. ote that the cooperative worm I I 2 δ /β is a constant with any given β and δ. Thus, we only plot the noncooperative worm s propagation process in Figures 4 a and 4 b. As shown in Figure 4 a, when β >β st, the noncooperative worm approaches a stable state. However, in Figure 4 b, when β < β st, we can see a clearly oscillatory epidemic phenomenon, which validates the conclusion of Theorem 3.4.

12 2 Discrete Dynamics in ature and Society.577 I + I2)/ a Time hour).3538 I + I2)/ Time hour) b Figure 4: Fraction of computers infected with noncooperative worm: a β >β st and b β <β st are given. 5. Conclusion Recently, the researches concerning network security and malware have focused on the fight between antimalware system and malware 3. In this paper, we have explored the interactions between one cooperative worm and the other noncooperative worm; especially we focus on the influence of adaptive human behavior, to find an inherent advantage in the fight against attackers. Different from our intuition, the results presented in this paper have shown that the cooperative worm has dual effects on the propagation of the noncooperative worm due to the existence of adaptive human behavior, which is a valuable information for defenders in designing counter-worm methods 7, 8. In the future, we plan to use real trace data to test our model and get the most effective policy to motivate people.

13 Discrete Dynamics in ature and Society 3 Acknowledgment This work is supported by the ational atural Science Foundation of China under Grant no. 734 and the atural Science Foundation of Shanxi Province of China under Grant no References Kaspersky Security Bulletin. Monthly Malware Statistics, February 22, 2 J. R. Crandall, R. Ensafi, S. Forrest, J. Ladau, and B. Shebaro, The ecology of malware, in Proceedings of the ew Security Paradigms Workshop SPW 8), pp. 99 6, September X. Han and Q. Tan, Dynamical behavior of computer virus on Internet, Applied Mathematics and Computation, vol. 27, no. 6, pp , 2. 4 L.-P. Song, Z. Jin, G.-Q. Sun, J. Zhang, and X. Han, Influence of removable devices on computer worms: dynamic analysis and control strategies, Computers & Mathematics with Applications, vol. 6, no. 7, pp , 2. 5 B. K. Mishra and S. K. Pandey, Dynamic model of worms with vertical transmission in computer network, Applied Mathematics and Computation, vol. 27, no. 2, pp , 2. 6 J. Ren, X. Yang, Q. Zhu, L.-X. Yang, and C. Zhang, A novel computer virus model and its dynamics, onlinear Analysis, vol. 3, no., pp , L. Feng, X. Liao, H. Li et al., Hopf bifurcation analysis of a delayed viral infection model in computer networks, Mathematical and Computer Modeling, vol. 56, no. 7, pp , L.-X. Yang and X. Yang, Propagation behavior of virus codes in the situation that infected computers are connected to the internet with positive probability, Discrete Dynamics in ature and Society, vol. 22, Article ID , 3 pages, Q. Zhu, X. Yang, and J. Ren, Modeling and analysis of the spread of computer virus, Communications in onlinear Science and umerical Simulation, vol. 7, no. 2, pp , 22. Y. Li, J.-X. Pan, and Z. Jin, Dynamic modeling and analysis of the virus propagation, Discrete Dynamics in ature and Society, vol. 22, Article ID 47272, 22 pages, 22. S. Tanachaiwiwat and A. Helmy, Encounter-based worms: analysis and defense, Ad Hoc etworks, vol. 7, no. 7, pp , L. P. Song, Z. Jin, and G. Q. Sun, Modeling and analyzing of botnet interactions, Physica A, vol. 39, no. 2, pp , 2. 3 Kaspersky Lab: Securelist, 4 J. D. Murray, Mathematical Biology, Springer, Berlin, Germany, W. H. Debany, Modeling the spread of internet worms via persistently unpatched hosts, IEEE etwork, vol. 22, no. 2, pp , E. A. Barbashin, Introduction to the Theory of Stability, Wolters-oordhoff Publishing, Groningen, The etherlands, S. Funk, M. Salathé, and V. A. A. Jansen, Modelling the influence of human behaviour on the spread of infectious diseases: a review, the Royal Society Interface, vol. 7, no. 5, pp , 2. 8 E. P. Fenichel, C. Castillo-Chavez, and M.G. Ceddia, Adaptive human behavior in epidemiological models, Proceedings of the ational Academy of Sciences of United States of America, vol. 8, no. 5, pp , 2.

14 Advances in Operations Research Advances in Decision Sciences Mathematical Problems in Engineering Algebra Probability and Statistics The Scientific World Journal International Differential Equations Submit your manuscripts at International Advances in Combinatorics Mathematical Physics Complex Analysis International Mathematics and Mathematical Sciences Stochastic Analysis Abstract and Applied Analysis International Mathematics Discrete Dynamics in ature and Society Discrete Mathematics Applied Mathematics Function Spaces Optimization

Study of Virus Propagation Model Under the Cloud

Study of Virus Propagation Model Under the Cloud Tongrang Fan, Yanjing Li, Feng Gao School of Information Science and Technology, Shijiazhuang Tiedao University, Shijiazhuang, 543, China Fantr29@26.com, 532465444 @qq.com, f.gao@live.com bstract. The

More information

Research Article Stability Analysis of an HIV/AIDS Dynamics Model with Drug Resistance

Research Article Stability Analysis of an HIV/AIDS Dynamics Model with Drug Resistance Discrete Dynamics in Nature and Society Volume 212, Article ID 162527, 13 pages doi:1.1155/212/162527 Research Article Stability Analysis of an HIV/AIDS Dynamics Model with Drug Resistance Qianqian Li,

More information

Stability analysis of a novel VEISV propagation model of computer worm attacks

Stability analysis of a novel VEISV propagation model of computer worm attacks ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 10 (2014) No. 3, pp. 163-174 Stability analysis of a novel VEISV propagation model of computer worm attacks M. Javidi 1, N. Nyamorady

More information

Research Article Determination of Pavement Rehabilitation Activities through a Permutation Algorithm

Research Article Determination of Pavement Rehabilitation Activities through a Permutation Algorithm Applied Mathematics Volume 2013, Article ID 252808, 5 pages http://dxdoiorg/101155/2013/252808 Research Article Determination of Pavement Rehabilitation Activities through a Permutation Algorithm Sangyum

More information

Research Article The General Traveling Wave Solutions of the Fisher Equation with Degree Three

Research Article The General Traveling Wave Solutions of the Fisher Equation with Degree Three Advances in Mathematical Physics Volume 203, Article ID 65798, 5 pages http://dx.doi.org/0.55/203/65798 Research Article The General Traveling Wave Solutions of the Fisher Equation with Degree Three Wenjun

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

Network Security Validation Using Game Theory

Network Security Validation Using Game Theory Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy

More information

Hello, my name is Olga Michasova and I present the work The generalized model of economic growth with human capital accumulation.

Hello, my name is Olga Michasova and I present the work The generalized model of economic growth with human capital accumulation. Hello, my name is Olga Michasova and I present the work The generalized model of economic growth with human capital accumulation. 1 Without any doubts human capital is a key factor of economic growth because

More information

Research Article Two-Period Inventory Control with Manufacturing and Remanufacturing under Return Compensation Policy

Research Article Two-Period Inventory Control with Manufacturing and Remanufacturing under Return Compensation Policy Discrete Dynamics in Nature and Society Volume 2013, Article ID 871286, 8 pages http://dx.doi.org/10.1155/2013/871286 Research Article Two-Period Inventory Control with Manufacturing and Remanufacturing

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

Research Article New Travelling Wave Solutions for Sine-Gordon Equation

Research Article New Travelling Wave Solutions for Sine-Gordon Equation Applied Mathematics Article ID 841416 4 pages http://dx.doi.org/10.1155/2014/841416 Research Article New Travelling Wave Solutions for Sine-Gordon Equation Yunchuan Sun Business School Beijing Normal University

More information

Einführung in die Mathematische Epidemiologie: Introduction to Mathematical Epidemiology: Deterministic Compartmental Models

Einführung in die Mathematische Epidemiologie: Introduction to Mathematical Epidemiology: Deterministic Compartmental Models Einführung in die Mathematische Epidemiologie: Introduction to Mathematical Epidemiology: Deterministic Compartmental Models Nakul Chitnis Universität Basel Mathematisches Institut Swiss Tropical and Public

More information

Ultrasonic Detection Algorithm Research on the Damage Depth of Concrete after Fire Jiangtao Yu 1,a, Yuan Liu 1,b, Zhoudao Lu 1,c, Peng Zhao 2,d

Ultrasonic Detection Algorithm Research on the Damage Depth of Concrete after Fire Jiangtao Yu 1,a, Yuan Liu 1,b, Zhoudao Lu 1,c, Peng Zhao 2,d Advanced Materials Research Vols. 368-373 (2012) pp 2229-2234 Online available since 2011/Oct/24 at www.scientific.net (2012) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.368-373.2229

More information

Fault Analysis in Software with the Data Interaction of Classes

Fault Analysis in Software with the Data Interaction of Classes , pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental

More information

Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme

Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme Lin Cai and Roberto Rojas-Cessa Abstract Peer-to-peer (P2P) networking is used by users with

More information

Research Article Stability Analysis for Higher-Order Adjacent Derivative in Parametrized Vector Optimization

Research Article Stability Analysis for Higher-Order Adjacent Derivative in Parametrized Vector Optimization Hindawi Publishing Corporation Journal of Inequalities and Applications Volume 2010, Article ID 510838, 15 pages doi:10.1155/2010/510838 Research Article Stability Analysis for Higher-Order Adjacent Derivative

More information

A Local Stability of Mathematical Models for Cancer Treatment by Using Gene Therapy

A Local Stability of Mathematical Models for Cancer Treatment by Using Gene Therapy International Journal of Modeling Optimization, Vol 5, No 3, June 2015 A Local Stability of Mathematical Models for Cancer Treatment by Using Gene Therapy Dwi Lestari Ratnasari Dwi Ambarwati Abstract This

More information

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

More information

OPTIMAL CONTROL OF TREATMENTS IN A TWO-STRAIN TUBERCULOSIS MODEL. E. Jung. S. Lenhart. Z. Feng. (Communicated by Glenn Webb)

OPTIMAL CONTROL OF TREATMENTS IN A TWO-STRAIN TUBERCULOSIS MODEL. E. Jung. S. Lenhart. Z. Feng. (Communicated by Glenn Webb) DISCRETE AND CONTINUOUS Website: http://aimsciences.org DYNAMICAL SYSTEMS SERIES B Volume 2, Number4, November2002 pp. 473 482 OPTIMAL CONTROL OF TREATMENTS IN A TWO-STRAIN TUBERCULOSIS MODEL E. Jung Computer

More information

Analysis of an Artificial Hormone System (Extended abstract)

Analysis of an Artificial Hormone System (Extended abstract) c 2013. This is the author s version of the work. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purpose or for creating

More information

Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents

Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents William H. Sandholm January 6, 22 O.. Imitative protocols, mean dynamics, and equilibrium selection In this section, we consider

More information

When to Refinance Mortgage Loans in a Stochastic Interest Rate Environment

When to Refinance Mortgage Loans in a Stochastic Interest Rate Environment When to Refinance Mortgage Loans in a Stochastic Interest Rate Environment Siwei Gan, Jin Zheng, Xiaoxia Feng, and Dejun Xie Abstract Refinancing refers to the replacement of an existing debt obligation

More information

Network Traffic Modelling

Network Traffic Modelling University of York Dissertation submitted for the MSc in Mathematics with Modern Applications, Department of Mathematics, University of York, UK. August 009 Network Traffic Modelling Author: David Slade

More information

Functional Optimization Models for Active Queue Management

Functional Optimization Models for Active Queue Management Functional Optimization Models for Active Queue Management Yixin Chen Department of Computer Science and Engineering Washington University in St Louis 1 Brookings Drive St Louis, MO 63130, USA chen@cse.wustl.edu

More information

Characterization and Modeling of Packet Loss of a VoIP Communication

Characterization and Modeling of Packet Loss of a VoIP Communication Characterization and Modeling of Packet Loss of a VoIP Communication L. Estrada, D. Torres, H. Toral Abstract In this work, a characterization and modeling of packet loss of a Voice over Internet Protocol

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

Effects of node buffer and capacity on network traffic

Effects of node buffer and capacity on network traffic Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,

More information

Optimization of PID parameters with an improved simplex PSO

Optimization of PID parameters with an improved simplex PSO Li et al. Journal of Inequalities and Applications (2015) 2015:325 DOI 10.1186/s13660-015-0785-2 R E S E A R C H Open Access Optimization of PID parameters with an improved simplex PSO Ji-min Li 1, Yeong-Cheng

More information

Example 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum. asin. k, a, and b. We study stability of the origin x

Example 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum. asin. k, a, and b. We study stability of the origin x Lecture 4. LaSalle s Invariance Principle We begin with a motivating eample. Eample 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum Dynamics of a pendulum with friction can be written

More information

Polynomial and Synthetic Division. Long Division of Polynomials. Example 1. 6x 2 7x 2 x 2) 19x 2 16x 4 6x3 12x 2 7x 2 16x 7x 2 14x. 2x 4.

Polynomial and Synthetic Division. Long Division of Polynomials. Example 1. 6x 2 7x 2 x 2) 19x 2 16x 4 6x3 12x 2 7x 2 16x 7x 2 14x. 2x 4. _.qd /7/5 9: AM Page 5 Section.. Polynomial and Synthetic Division 5 Polynomial and Synthetic Division What you should learn Use long division to divide polynomials by other polynomials. Use synthetic

More information

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,

More information

Research on Trust Management Strategies in Cloud Computing Environment

Research on Trust Management Strategies in Cloud Computing Environment Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING

More information

Exploiting Cellular Data for Disease Containment and Information Campaigns Strategies in Country-wide Epidemics

Exploiting Cellular Data for Disease Containment and Information Campaigns Strategies in Country-wide Epidemics Exploiting Cellular Data for Disease Containment and Information Campaigns Strategies in Country-wide Epidemics Antonio Lima, Manlio De Domenico, Veljko Pejovic, Mirco Musolesi Multi-Service Networks The

More information

Disease Transmission Networks

Disease Transmission Networks Dynamics of Disease Transmission Networks Winfried Just Ohio University Presented at the workshop Teaching Discrete and Algebraic Mathematical Biology to Undergraduates MBI, Columbus, OH, July 31, 2013

More information

Time series analysis as a framework for the characterization of waterborne disease outbreaks

Time series analysis as a framework for the characterization of waterborne disease outbreaks Interdisciplinary Perspectives on Drinking Water Risk Assessment and Management (Proceedings of the Santiago (Chile) Symposium, September 1998). IAHS Publ. no. 260, 2000. 127 Time series analysis as a

More information

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan

More information

The Method of Least Squares

The Method of Least Squares The Method of Least Squares Steven J. Miller Mathematics Department Brown University Providence, RI 0292 Abstract The Method of Least Squares is a procedure to determine the best fit line to data; the

More information

An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups

An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups Abstract Yan Shen 1, Bao Wu 2* 3 1 Hangzhou Normal University,

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

SECRET sharing schemes were introduced by Blakley [5]

SECRET sharing schemes were introduced by Blakley [5] 206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has

More information

Relatively dense sets, corrected uniformly almost periodic functions on time scales, and generalizations

Relatively dense sets, corrected uniformly almost periodic functions on time scales, and generalizations Wang and Agarwal Advances in Difference Equations (2015) 2015:312 DOI 10.1186/s13662-015-0650-0 R E S E A R C H Open Access Relatively dense sets, corrected uniformly almost periodic functions on time

More information

a 1 x + a 0 =0. (3) ax 2 + bx + c =0. (4)

a 1 x + a 0 =0. (3) ax 2 + bx + c =0. (4) ROOTS OF POLYNOMIAL EQUATIONS In this unit we discuss polynomial equations. A polynomial in x of degree n, where n 0 is an integer, is an expression of the form P n (x) =a n x n + a n 1 x n 1 + + a 1 x

More information

IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS

IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS Liuxi Zhang and Ali Abur Department of Electrical and Computer Engineering Northeastern University Boston, MA, USA lzhang@ece.neu.edu

More information

Modeling Internet Security Investments Tackling Topological Information Uncertainty

Modeling Internet Security Investments Tackling Topological Information Uncertainty Modeling Internet Security Investments Tackling Topological Information Uncertainty Ranjan Pal Department of Computer Science University of Southern California, USA Joint Work with Pan Hui Deutsch Telekom

More information

Diána H. Knipl PhD student University of Szeged, Hungary

Diána H. Knipl PhD student University of Szeged, Hungary ANTI-GRAVITY MODELS FOR EPIDEMIC SPREAD OF INFECTIOUS DISEASES ON LONG DISTANCE TRAVEL NETWORKS Diána H. Knipl PhD student University of Szeged, Hungary Based on the joint work with G. Röst (U of Szeged)

More information

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without

More information

Article from: ARCH 2014.1 Proceedings

Article from: ARCH 2014.1 Proceedings Article from: ARCH 20141 Proceedings July 31-August 3, 2013 1 Comparison of the Standard Rating Methods and the New General Rating Formula Muhamed Borogovac Boston Mutual Life Insurance Company*; muhamed_borogovac@bostonmutualcom

More information

4 Lyapunov Stability Theory

4 Lyapunov Stability Theory 4 Lyapunov Stability Theory In this section we review the tools of Lyapunov stability theory. These tools will be used in the next section to analyze the stability properties of a robot controller. We

More information

Research Article Average Bandwidth Allocation Model of WFQ

Research Article Average Bandwidth Allocation Model of WFQ Modelling and Simulation in Engineering Volume 2012, Article ID 301012, 7 pages doi:10.1155/2012/301012 Research Article Average Bandwidth Allocation Model of WFQ TomášBaloghandMartinMedvecký Institute

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality

Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality A Kazmierczak Computer Information Systems Northwest Arkansas Community College One College Dr. Bentonville,

More information

An Approach against a Computer Worm Attack

An Approach against a Computer Worm Attack 48 An Approach against a Computer Worm Attack Ossama Toutonji and Seong-Moo Yoo University of Alabama in untsville, Department of Electrical and Computer Engineering, untsville, Alabama 35899, USA {toutono;

More information

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer

More information

Usages of Selected Antivirus Software in Different Categories of Users in selected Districts

Usages of Selected Antivirus Software in Different Categories of Users in selected Districts Usages of Selected Antivirus Software in Different Categories of Users in selected Districts Dr. Bhaskar V. Patil 1, Dr. Milind. J. Joshi 2 Bharati Vidyapeeth University Yashwantrao Mohite institute of

More information

Network Security A Decision and Game-Theoretic Approach

Network Security A Decision and Game-Theoretic Approach Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

Find all of the real numbers x that satisfy the algebraic equation:

Find all of the real numbers x that satisfy the algebraic equation: Appendix C: Factoring Algebraic Expressions Factoring algebraic equations is the reverse of expanding algebraic expressions discussed in Appendix B. Factoring algebraic equations can be a great help when

More information

Summary of infectious disease epidemiology course

Summary of infectious disease epidemiology course Summary of infectious disease epidemiology course Mads Kamper-Jørgensen Associate professor, University of Copenhagen, maka@sund.ku.dk Public health science 3 December 2013 Slide number 1 Aim Possess knowledge

More information

Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model

Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model 1 September 004 A. Introduction and assumptions The classical normal linear regression model can be written

More information

Managing Security Risks in Modern IT Networks

Managing Security Risks in Modern IT Networks Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling

More information

Factoring Patterns in the Gaussian Plane

Factoring Patterns in the Gaussian Plane Factoring Patterns in the Gaussian Plane Steve Phelps Introduction This paper describes discoveries made at the Park City Mathematics Institute, 00, as well as some proofs. Before the summer I understood

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY

ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY CANADIAN APPLIED MATHEMATICS QUARTERLY Volume 12, Number 4, Winter 2004 ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY SURREY KIM, 1 SONG LI, 2 HONGWEI LONG 3 AND RANDALL PYKE Based on work carried out

More information

6 J - vector electric current density (A/m2 )

6 J - vector electric current density (A/m2 ) Determination of Antenna Radiation Fields Using Potential Functions Sources of Antenna Radiation Fields 6 J - vector electric current density (A/m2 ) M - vector magnetic current density (V/m 2 ) Some problems

More information

Continued Fractions. Darren C. Collins

Continued Fractions. Darren C. Collins Continued Fractions Darren C Collins Abstract In this paper, we discuss continued fractions First, we discuss the definition and notation Second, we discuss the development of the subject throughout history

More information

Research Article Effect Analysis of Intermittent Release Measures in Heavy Fog Weather with an Improved CA Model

Research Article Effect Analysis of Intermittent Release Measures in Heavy Fog Weather with an Improved CA Model Discrete Dynamics in ature and Society Volume 213, Article ID 812562, 7 pages http://dx.doi.org/1.1155/213/812562 Research Article Effect Analysis of Intermittent Release Measures in Heavy Fog Weather

More information

Predicting the Spread of Financial Innovations: An Epidemiological Approach

Predicting the Spread of Financial Innovations: An Epidemiological Approach SVERIGES RIKSBANK 279 WORKING PAPER SERIES Predicting the Spread of Financial Innovations: An Epidemiological Approach Isaiah Hull October 2013 WORKING PAPERS ARE OBTAINABLE FROM Sveriges Riksbank Information

More information

Coordination in Network Security Games

Coordination in Network Security Games Coordination in Network Security Games Marc Lelarge INRIA - ENS Paris, France Email: marc.lelarge@ens.fr Abstract Malicious softwares or malwares for short have become a major security threat. While originating

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Optimal Design of α-β-(γ) Filters

Optimal Design of α-β-(γ) Filters Optimal Design of --(γ) Filters Dirk Tenne Tarunraj Singh, Center for Multisource Information Fusion State University of New York at Buffalo Buffalo, NY 426 Abstract Optimal sets of the smoothing parameter

More information

Optimum Design of Worm Gears with Multiple Computer Aided Techniques

Optimum Design of Worm Gears with Multiple Computer Aided Techniques Copyright c 2008 ICCES ICCES, vol.6, no.4, pp.221-227 Optimum Design of Worm Gears with Multiple Computer Aided Techniques Daizhong Su 1 and Wenjie Peng 2 Summary Finite element analysis (FEA) has proved

More information

AN INTRODUCTION TO NUMERICAL METHODS AND ANALYSIS

AN INTRODUCTION TO NUMERICAL METHODS AND ANALYSIS AN INTRODUCTION TO NUMERICAL METHODS AND ANALYSIS Revised Edition James Epperson Mathematical Reviews BICENTENNIAL 0, 1 8 0 7 z ewiley wu 2007 r71 BICENTENNIAL WILEY-INTERSCIENCE A John Wiley & Sons, Inc.,

More information

How To Balance In A Distributed System

How To Balance In A Distributed System 6 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 11, NO. 1, JANUARY 2000 How Useful Is Old Information? Michael Mitzenmacher AbstractÐWe consider the problem of load balancing in dynamic distributed

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

A New Nature-inspired Algorithm for Load Balancing

A New Nature-inspired Algorithm for Load Balancing A New Nature-inspired Algorithm for Load Balancing Xiang Feng East China University of Science and Technology Shanghai, China 200237 Email: xfeng{@ecusteducn, @cshkuhk} Francis CM Lau The University of

More information

COMPARATIVE EVALUATION OF UNCERTAINTY TR- ANSFORMATION FOR MEASURING COMPLEX-VALU- ED QUANTITIES

COMPARATIVE EVALUATION OF UNCERTAINTY TR- ANSFORMATION FOR MEASURING COMPLEX-VALU- ED QUANTITIES Progress In Electromagnetics Research Letters, Vol. 39, 141 149, 2013 COMPARATIVE EVALUATION OF UNCERTAINTY TR- ANSFORMATION FOR MEASURING COMPLEX-VALU- ED QUANTITIES Yu Song Meng * and Yueyan Shan National

More information

Dynamical Behavior in an Innovation Diffusion Marketing Model with Thinker Class of Population

Dynamical Behavior in an Innovation Diffusion Marketing Model with Thinker Class of Population Dynamical Behavior in an Innovation Diffusion Marketing Model with Thinker Class of Population Joydip Dhar 1, Mani Tyagi 2 and Poonam sinha 2 1 ABV-Indian Institute of Information Technology and Management

More information

Community-Aware Prediction of Virality Timing Using Big Data of Social Cascades

Community-Aware Prediction of Virality Timing Using Big Data of Social Cascades 1 Community-Aware Prediction of Virality Timing Using Big Data of Social Cascades Alvin Junus, Ming Cheung, James She and Zhanming Jie HKUST-NIE Social Media Lab, Hong Kong University of Science and Technology

More information

On the Interaction and Competition among Internet Service Providers

On the Interaction and Competition among Internet Service Providers On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers

More information

1 Short Introduction to Time Series

1 Short Introduction to Time Series ECONOMICS 7344, Spring 202 Bent E. Sørensen January 24, 202 Short Introduction to Time Series A time series is a collection of stochastic variables x,.., x t,.., x T indexed by an integer value t. The

More information

Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data

Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Jun Wang Department of Mechanical and Automation Engineering The Chinese University of Hong Kong Shatin, New Territories,

More information

Eigenvalues, Eigenvectors, Matrix Factoring, and Principal Components

Eigenvalues, Eigenvectors, Matrix Factoring, and Principal Components Eigenvalues, Eigenvectors, Matrix Factoring, and Principal Components The eigenvalues and eigenvectors of a square matrix play a key role in some important operations in statistics. In particular, they

More information

Time-Frequency Detection Algorithm of Network Traffic Anomalies

Time-Frequency Detection Algorithm of Network Traffic Anomalies 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore Time-Frequency Detection Algorithm of Network Traffic Anomalies

More information

An Adaptive Decoding Algorithm of LDPC Codes over the Binary Erasure Channel. Gou HOSOYA, Hideki YAGI, Toshiyasu MATSUSHIMA, and Shigeichi HIRASAWA

An Adaptive Decoding Algorithm of LDPC Codes over the Binary Erasure Channel. Gou HOSOYA, Hideki YAGI, Toshiyasu MATSUSHIMA, and Shigeichi HIRASAWA 2007 Hawaii and SITA Joint Conference on Information Theory, HISC2007 Hawaii, USA, May 29 31, 2007 An Adaptive Decoding Algorithm of LDPC Codes over the Binary Erasure Channel Gou HOSOYA, Hideki YAGI,

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

REVIEW OF ANALYTIC GEOMETRY

REVIEW OF ANALYTIC GEOMETRY REVIEW OF ANALYTIC GEOMETRY The points in a plane can be identified with ordered pairs of real numbers. We start b drawing two perpendicular coordinate lines that intersect at the origin O on each line.

More information

How To Find Out How To Build An Elliptic Curve Over A Number Field

How To Find Out How To Build An Elliptic Curve Over A Number Field Numbers Volume 2015, Article ID 501629, 4 pages http://dx.doi.org/10.1155/2015/501629 Research Article On the Rank of Elliptic Curves in Elementary Cubic Extensions Rintaro Kozuma College of International

More information

ENSREdm: E-government Network Security Risk Evaluation Method Based on Danger Model

ENSREdm: E-government Network Security Risk Evaluation Method Based on Danger Model Research Journal of Applied Sciences, Engineering and Technology 5(21): 4988-4993, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: July 31, 2012 Accepted: September

More information

excerpted from Reducing Pandemic Risk, Promoting Global Health For the full report go to http://report.predict.global

excerpted from Reducing Pandemic Risk, Promoting Global Health For the full report go to http://report.predict.global excerpted from Reducing Pandemic Risk, Promoting Global Health For the full report go to http://report.predict.global FUTURE DIRECTIONS Historically, attempts to control deadly viruses, such as SARS and

More information

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College

More information

Competition and Fraud in Online Advertising Markets

Competition and Fraud in Online Advertising Markets Competition and Fraud in Online Advertising Markets Bob Mungamuru 1 and Stephen Weis 2 1 Stanford University, Stanford, CA, USA 94305 2 Google Inc., Mountain View, CA, USA 94043 Abstract. An economic model

More information

A Direct Numerical Method for Observability Analysis

A Direct Numerical Method for Observability Analysis IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method

More information

OutbreakShield Effective and Immediate Protection against Email Virus Outbreaks

OutbreakShield Effective and Immediate Protection against Email Virus Outbreaks OutbreakShield Effective and Immediate Protection against Email Virus Outbreaks Ralf Benzmüller G DATA Software AG Introduction The virus protection provided by all current antivirus software products

More information

Demand Forecasting Optimization in Supply Chain

Demand Forecasting Optimization in Supply Chain 2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V52.12 Demand Forecasting Optimization

More information

Modelling Emergence of Money

Modelling Emergence of Money Vol. 117 (2010) ACTA PHYSICA POLONICA A No. 4 Proceedings of the 4th Polish Symposium on Econo- and Sociophysics, Rzeszów, Poland, May 7 9, 2009 Modelling Emergence of Money A.Z. Górski a, S. Drożdż a,b

More information

Study of Impact of 3D Printing Technology and Development on Creative Industry

Study of Impact of 3D Printing Technology and Development on Creative Industry Study of Impact of 3D Printing Technology and Development on Creative Industry Zhang Feixiang (Corresponding author) College of Communication and Art Design, University of Shanghai for Science and Technology,

More information

QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP

QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP Mingzhe Wang School of Automation Huazhong University of Science and Technology Wuhan 430074, P.R.China E-mail: mingzhew@gmail.com Yu Liu School

More information

An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems

An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems ICWMC 211 : The Seventh International Conference on Wireless and Mobile Communications An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2 1x EVDO and LTE Systems Xinsheng

More information