999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Numerical Study of Computer Virus Reaction Diffusion Epidemic Model

2021-12-16 06:41:24UmbreenFatimaDumitruBaleanuNaumanAhmedShumailaAzamAliRazaMuhammadRafiqandMuhammadAzizurRehman
Computers Materials&Continua 2021年3期

Umbreen Fatima,Dumitru Baleanu,Nauman Ahmed, Shumaila Azam,Ali Raza,Muhammad Rafiq and Muhammad Aziz-ur Rehman

1Department of Computer Science, The University of Lahore, Lahore, Pakistan

2Department of Mathematics, Cankaya University,Ankara, Turkey

3Institute of Space Sciences, Magurele-Bucharest, Romania

4Department of Medical Research, China Medical University Hospital, China Medical University, Taichung,Taiwan

5Department of Mathematics and Statistics, The University of Lahore, Lahore, Pakistan

6Department of Mathematics, National College of Business Administration and Economics Lahore, Lahore, Pakistan

7Faculty of Engineering, University of Central Punjab, Lahore, Pakistan

8Department of Mathematics, University of Management and Technology, Lahore, Pakistan

Abstract:Reaction-diffusion systems are mathematical models which link to several physical phenomena.The most common is the change in space and time of the meditation of one or more materials.Reaction-diffusion modeling is a substantial role in the modeling of computer propagation like infectious diseases.We investigated the transmission dynamics of the computer virus in which connected to each other through network globally.The current study devoted to the structure-preserving analysis of the computer propagation model.This manuscript is devoted to finding the numerical investigation of the reaction-diffusion computer virus epidemic model with the help of a reliable technique.The designed technique is finite difference scheme which sustains the important physical behavior of continuous model like the positivity of the dependent variables,the stability of the equilibria.The theoretical analysis of the proposed method like the positivity of the approximation, stability, and consistency is discussed in detail.A numerical example of simulations yields the authentication of the theoretical results of the designed technique.

Keywords: Computer virus dynamics; reaction-diffusion system; positive solution;simulations

1 Introduction

Computer viruses are automated programs that, against the users’ wish, make copies of themselves to spread to new targets and as a result infect the computers [1].With the accelerated advancement of modern technologies, the internet has assimilated into each part of our life, which is a great help for us,as well as it also poses a serious problem to individual and corporate computer systems through cyberattacks [2].A lot of effort has been dedicated to studying how to avoid harmful actions.To control effectively the diffusion of computer viruses, it is very crucial to figure out the ways that nasty codes propagate over the Internet.In order to minimize the threat of virus spread,various strategies can be proposed by using epidemic models.In 2018, Ali et al.[3] studied the Padé approximation method to describe the propagation of a computer virus via the SEIR model.Due to the compelling analogy between a computer virus and a biological virus, some classic computer virus epidemic models, such as SIRS, SIS, SIR, SLB,SEIR, delayed, and stochastic models were proposed and studied.In epidemics, the most common fatal infectious diseases are measles, malaria, HIV/AIDS, tuberculosis, influenza, etc., determine the individual mechanisms and environmental conditions that have contributed to their spread.Epidemic modeling helps to identify the specific areas of virus spread and also predict effective preventives and creative measures to control it [4].Mishra et al.[5] presented various mathematical models on computer viruses.In 2017,Kumar [6] developed a SIRA dynamical model of the computer virus.In 2008, Doud et al.[7] proposed computer virus plans and discovery methods by using different delays.In 2015, Ebenezer et al.[8]presented the SIER mathematical model by the use of local and global sense dynamics of computer bugs productivity.In 2019, Ozdemir et al.[9] proposed the SEIR-KS model of fractional order model for computer virus transmission.In 2015, Oztürk et al.[10] presented the mathematical modeling of an improved version of the SIR model.Rey [11] investigated the dynamics of computer virus spread in the system of networks.In 2019, Lanz et al.[12] proposed the SEI1I2QR model in which they examine types of malware acquired based on infection symptoms treatment.In 2016, Xu et al.[13] presented the SEIR model to discuss the spread of malware in the presence of anti-virus capacity.In 2016, Liu et al.[14]represented the SIQR model by utilizing two delays strategy.In 2008, Yuan et al.[15] described the SEIR model by use of three crucial networking environmental factors.In 2012, Yang et al.[16]suggested the SLBS model in which explains the prohibition of malware on the internet.In 2020, Dubey et al.[17]studied the analytically schemes for malware spread through the network and proposed the CVP model.In 2020, Arif et al.[18] investigated the stochastic dynamics of the computer propagation model by using the different numerical techniques in which focus on the structure-preserving method.In our opinion, the epidemic models for computer viruses can help to better understanding how the viruses diffuse on networks.In this study, we extend a computer virus epidemic model by placing a diffusion term.We determine the conditions under which epidemics are likely to occur.The computer virus has a latent period, during which individuals are exposed to a computer virus but are not yet infectious.An infected computer which is in latency, will not infect other computers immediately; however, it still can be infected [19].In this study, the following reaction-diffusion computer virus epidemic model is proposed for numerical analysis which is an extended form of the model given by Persaei et al.[20].

with initial conditions

S (x,0 )=F1(x )≥0,L(x,0 )=F2(x )≥0, B(x,0 )=F3(x )≥0,

and homogenous Neumann boundary conditions.Where S (x,t )represents the class of uninfected computers,L(x,t )represents latent computers and B(x,t )represents the seizing computers at time t.The constant rate of connecting external computers with internet and disconnecting internal computers from internet is denoted by δ.β is the constant rate of infection and the term βS (L+B) is the percentage of internal computers infected at time t.′α is the constant rate of latent computer breakout.Latent computers are cured at the constant rate of γ1, while breaking out computers are cured at the constant rate of γ2.d1, d2, d3are constant rate of diffusion.All these parameters used in this model are positive.It is observed that the variables of interest of the proposed computer virus model are the computer populations.Now it is the basic need for the solution of system (Eqs.(1)-(3)) to be positive as values of unknown variables involved are taken as absolute [21].In the present era, several positivity persevering numerical techniques are proposed by various authors because many dynamical continuous systems require the positive solution [22,23].The current work is dedicated to designing and analyzing a finite difference algorithm which retains the positive solution of the state variables of the continuous system for the solution of computer virus epidemic model (Eqs.(1)-(3)).This manuscript is sectioned as follows.The reproductive number and equilibrium points of the system under study is explained in Section 2.In Section 3, a numerical algorithm is designed to solve the computer virus epidemic system.In the same section, the theoretical analysis of the proposed technique is performed.It is shown that the designed numerical technique is capable of retaining the positivity of the solution.The stability and consistency of the proposed algorithm are also authenticated in this section.Section 4 is devoted to the computation results.The simulations are justified the theoretical results of the designed method.

2 Equilibria of the Model

The model Eqs.(1)-(3)admits two equilibrium points,VFE(virus free equilibrium)=E0= (1, 0, 0),and the CVE(computer virus endemic equilibrium point)=E1= (S1, L1, B1).

3 Numerical Modeling

Divide [0,L ]× [0,T]into M2×N with step sizes h=and k =Grid points are

xj=jh, j=0,1,2,...,M,

tn=nk, n=0,1,2,...,N,

Take Eq.(1)

Similarly we have from Eq.(2)and Eq.(3)simultaneously.

3.1 Consistency of the Proposed Scheme

This section is concerned about the verification of the proposed scheme to be consistent.For this,

By putting all these definitions’in Eq.(7),we have

Similarly we can check for ?Land ?Bi.e.,

Hence our proposed scheme is consistent and first order accurate in time and second order accurate in space.

3.2 Stability of Proposed Scheme

In this section,we will use von Neumann stability criteria to show our proposed implicit scheme from Eqs.(4)-(6)is unconditionally stable.For this purpose,we will introduce the following terms,

Put all these terms in Eq.(4),we have

After proper calculation and rearranging terms, we have

Take absolute value on both sides,we have the following inequality,

By using similar process for Eq.(5),and Eq.(6)simultaneously we have,we have

and

Inequalities from Eqs.(11)-(13)are showing that our proposed implicit scheme is unconditionally stable by using von Neumann stability analysis.

3.3 Positivity

Theorem 1:For any positive k and h,Sn, Lnand Bnappertaining the to the Eqs.(4)-(6)are positive for all n=0,1, ...

Proof:We will use m-matrix theory and mathematical induction to show our scheme preserve positivity.For this purpose rewrite Eqs.(4)-(6)in vector form, as

Thus G, H, I are m-matrices.

This implies G, H, I are non-singular matrices.So Eqs.(14)-(16) can be written as

Suppose that Sn, Ln, Bn>0, ? Sn+δk+γ1kLn+γ2kBn>0,Ln+>0, and Bn+Ln>0.

Also G, H, I are m-matrices.This guarantees that all the entries of G-1, H-1, I-1are positive.The product of two positive matrices is also positive.

?R.H.S of Eqs.(17)-(19) are >0.

So Sn+1, Ln+1, Bn+1are also positive.

Hence our proposed implicit scheme preserve positivity.

4 Numerical Example and Simulations

In this section, we demonstrate a numerical example and simulations for the application of proposed structure preserving technique.For this we consider the following initial conditions,

4.1 CVF Point

First we discuss the simulations of proposed structure preserving method at CVF point.For the CVF point we take the following values of parameters involved in the model so that the value of R0is less than one.

d1=0.01, d2=0.01,d3=0.01,α=0.6,δ=0.1, β=0.3, γ1=0.1, γ2=0.3

Figs.1-3 demonstrate the numerical solution of model by implementing the proposed technique at the VFE point.It is given that the VFE point of the computer virus model is (1,0,0).This point is stable when the reproductive number values are less than one.So it is concluded that the computer virus epidemic model under study possesses two main properties, positive solution, and stability of both equilibria.It is evident from Figs.1-3 that the simulation results are with the good agreement of theorem 1.The proposed structure-preserving technique retains positive solutions and stability of the CVF point.The graphs of susceptible, latent,and breaking out computers shows the convergence towards VFE point (1,0,0).

Figure 1: The solution graphs of susceptible computers representing the behavior of proposed structure preserving technique with values of step sizes h=0.1 and k =0.8

4.2 CVE Point

Now we present the simulations of proposed structure preserving method at CVE point.For the CVE point we use the following values of parameters involved in the model so that the value of R0is greater than one.

d1=0.01, d2=0.01,d3=0.01,α=0.3,δ=0.1, β=0.4, γ1=0.1, γ2=0.3.

Figure 2: The solution graphs of latent computers representing the behavior of proposed structure preserving technique with values of step sizes h=0.1 and k =0.8

Figure 3: The solution graphs of breaking out computers representing the behavior of proposed structure preserving technique with values of step sizes h=0.1 and k =0.8

Figs.4-6 describe the graphical solution of the system by using the proposed technique at CVE point.The CVE point is stable when the reproductive number values are greater than one.It is clearly shown from the Figs.4-6 that the proposed structure-preserving numerical technique sustains the positive behavior of the solution of continuous system.Also,this method preserves the stability of the CVF point.It is validated from the solution graphs of susceptible,latent and breaking out computers in above figures as the sketches in these figures show the convergence towards CVE point (S*,L*,B*).

Figure 4: The solution graphs of susceptible computers representing the behavior of proposed structure preserving technique with values of step sizes h=0.1 and k =0.8

Figure 5: The solution graphs of latent computers representing the behavior of proposed structure preserving technique with values of step sizes h=0.1 and k =0.8

Figure 6: The solution graphs of breaking out computers representing the behavior of proposed structure preserving technique with values of step sizes h=0.1 and k =0.8

5 Conclusion

In this paper,we propose an extended reaction-diffusion epidemic model of computer virus dynamics for the numerical investigation.An efficient and reliable numerical technique is designed which preserves the stability of equilibria and positivity of the approximation.The stability, consistency, and positivity of the proposed algorithm are shown mathematically and are validated graphically with the help of a numerical example.The proposed algorithm can be used for the solution of reaction-diffusion models like predatorprey models, chemical reaction models and infectious disease models.In future work, we shall extend the modeling of a computer virus in the computer population in the well-known notations like fractional and stochastic fractional-order derivatives[24-26].

Acknowledgement:The authors are grateful to anonymous referees.Also,thankful to the Vice-Chancellor of University of the Lahore, National College of Business Administration and Economics Lahore and University of Central Punjab Lahore,for providing an excellent research environment and facilities.

Funding Statement:The authors declare that they have no funding for the present study.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 久久精品视频一| 国产午夜一级淫片| 精品人妻一区二区三区蜜桃AⅤ| 国产尤物在线播放| 中文字幕人妻无码系列第三区| 人妻少妇久久久久久97人妻| 日韩在线观看网站| 国产成人久久777777| 免费国产不卡午夜福在线观看| 久久国产V一级毛多内射| 亚洲自偷自拍另类小说| 国内精品免费| 欧美日韩国产在线人成app| 日韩AV手机在线观看蜜芽| 在线精品亚洲国产| 一级毛片高清| 久久成人国产精品免费软件| 精品成人一区二区三区电影| 欧美一级色视频| 精品成人一区二区三区电影 | 午夜国产在线观看| 少妇露出福利视频| 九九久久99精品| 亚洲一区无码在线| 成人在线不卡| 久久免费观看视频| 日韩免费成人| 91久久国产综合精品女同我| 亚洲男人天堂2018| 美女扒开下面流白浆在线试听| 日韩一级二级三级| 欧美一级在线播放| 久久精品丝袜高跟鞋| 婷婷综合亚洲| 欧美成在线视频| 亚洲成A人V欧美综合天堂| 欧洲高清无码在线| 成人一区专区在线观看| 亚洲无码高清免费视频亚洲| 最新午夜男女福利片视频| 激情综合婷婷丁香五月尤物 | 亚洲综合第一区| 欧美国产三级| 波多野结衣二区| 精品日韩亚洲欧美高清a| 在线无码av一区二区三区| 国产视频欧美| 国产在线拍偷自揄拍精品| 无码综合天天久久综合网| 狠狠色香婷婷久久亚洲精品| 亚洲啪啪网| 国产不卡国语在线| 极品av一区二区| av尤物免费在线观看| 午夜国产大片免费观看| 国产黄色片在线看| 亚洲三级电影在线播放| 成年女人a毛片免费视频| 成人国产精品网站在线看| 99色亚洲国产精品11p| 亚洲无码高清一区| 国产精品毛片在线直播完整版| 亚洲成av人无码综合在线观看| 久久精品中文字幕免费| 91无码国产视频| 欧美一级特黄aaaaaa在线看片| 97视频在线精品国自产拍| 國產尤物AV尤物在線觀看| 五月婷婷亚洲综合| 九九热精品在线视频| 国产精品密蕾丝视频| 亚洲最大综合网| 色悠久久久久久久综合网伊人| 亚洲一区二区三区国产精品| 精品国产免费观看| 久久国产精品嫖妓| 日韩精品成人在线| 亚洲欧美色中文字幕| 亚洲日本中文综合在线| 国产毛片高清一级国语 | 欧美成人看片一区二区三区| 亚洲视频在线网|