Research Article Modeling and Bifurcation Research of a Worm Propagation Dynamical System with Time Delay

Size: px
Start display at page:

Download "Research Article Modeling and Bifurcation Research of a Worm Propagation Dynamical System with Time Delay"

Transcription

1 Mathematical Problems in Engineering Volume, Article ID, pages Research Article Modeling and Bifurcation Research of a Worm Propagation Dynamical System with Time Delay Yu Yao,, Zhao Zhang, Wenlong Xiang, Wei Yang, and Fuxiang Gao College of Information Science and Engineering, Northeastern University, Shenyang 9, China Key Laboratory of Medical Image Computing, Northeastern University, Ministry of Education, Shenyang 9, China Correspondence should be addressed to Yu Yao; yaoyu@mail.neu.edu.cn Received March ; Revised June ; Accepted June ; Published July Academic Editor: Yuxin Zhao Copyright Yu Yao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Both vaccination and quarantine strategy are adopted to control the Internet worm propagation. By considering the interaction infection between computers and external removable devices, a worm propagation dynamical system with time delay under quarantine strategy is constructed based on anomaly intrusion detection system (IDS). By regarding the time delay caused by time window of anomaly IDS as the bifurcation parameter, local asymptotic stability at the positive equilibrium and local Hopf bifurcation are discussed. Through theoretical analysis, a threshold τ is derived. When time delay is less than τ,the worm propagation is stable and easy to predict; otherwise, Hopf bifurcation occurs so that the system is out of control and the containment strategy does not work effectively. Numerical analysis and discrete-time simulation experiments are given to illustrate the correctness of theoretical analysis.. Introduction Internet worms, a great threat to the network security, can spread quickly among hosts via wired or wireless networks. In real network environment, many intelligent worms, such as Conficker, Stuxnet, and Flamer, can also spread themselves via external removable devices (USB drives, CD/DVD drives, external hard drives, etc.), which have become one of the main means of infection transmission as well as networks. Conficker can copy itself as the autorun.inf to removable media drives in the system, thereby forcing the executable to be launched every time a removable drive is inserted into asystem[, ]. Discovered in the summer of, Stuxnet is a threat targeting a specific industrial control system (ICS) likely in Iran, such as a gas pipeline or power plant. Removable device is one of the main pathways for Stuxnet to migrate from the outside world to supposedly isolated and secure ICS [ ]. Discovered in May, Flamer can spread via removable drives using a special folder that hides thefilesandcanresultinautomaticexecutiononviewing the removable drive when combined with the Microsoft Windows Shortcut LNK/PIF File Automatic File Execution Vulnerability (CVE--) [, 7]. Therefore, it is time to analyze the dynamic behavior and containment strategy of such worms. Worm propagation dynamical system plays an important role in predicting the spread of worms. It aids in identifying the weakness in the worm spreading chain and provides accurate prediction for the purpose of damage assessment for a new worm threat. Over decades of years, many researches on worms dynamical behavior have been done. Kermack and Mckendrick [] proposed the classical SIR model to explain the rapid rise and fall in the number of infected patients observed in epidemics, which also suits the worm spread. Based on the classical SIR model, Zou et al. derived an Internet worm model called the two-factor model [9]. Quarantine strategy, which borrows from the method of epidemic disease control, has been widely used in worm containment and produced a tremendous effect on controlling worm propagation [ ]. Zou et al. proposed a worm propagation model under dynamic quarantine defense based on the principle assume [sic] guilty before proven

2 Mathematical Problems in Engineering innocent []. Wang et al. proposed a novel epidemic model named SEIQV model which combines both vaccinations and dynamic quarantine methods []. However, there is time delay in actual network environment, which may lead to bifurcation phenomenon. Much research has been done on time delay and bifurcation [ ].Han and Tan studied the dynamic spread behavior of worms by incorporating the delay factor [9]. Dong et al. proposed a computer virus model with time delay based on SEIR model and regarded time delay as bifurcating parameter to study the dynamical behaviors including local asymptotical stability and local Hopf bifurcation []. Yao et al. constructed a model with time delay under quarantine strategy []. Wu et al. investigated the problem of sliding mode control of Markovian jump singular time-delay systems []. Li and Zhang established a delay-dependent bounded real lemma for singular linear parameter-varying systems with timevariant delay []. The problems of D-stability and nonfragile control for a class of discrete-time descriptor Takagi-Sugeno fuzzy systems with multiple state delays are discussed in []. However, the above works consider less of the effect of removable devices on worm propagation. As mentioned above, removable devices have become a main pathway for some worms to intrude those hosts not connected to the Internet. Song et al. presented a worm model incorporating specific features to worms spreading via both web-based scanning and removable devices []. Zhu et al. studied the dynamics of interaction infection between computers and removable devices in [7]. However, time delay and bifurcation research are not considered in their work. In this paper, by considering the interaction infection between hosts and removable devices, we model a delayed worm propagation dynamical system which combines both vaccination and quarantine strategy. Local asymptotic stability of the positive equilibrium and local Hopf bifurcation are discussed to analyze the influence of time delay on worm propagation dynamical system. The main contributions of this paper can be summarized as follows. () Considering the influence of removable devices on Internet worm propagation and the time delay caused by anomaly IDS, we propose a novel worm propagation dynamical system with time delay. () We analyze the system stability at positive equilibrium and derive the time delay threshold at which Hopf bifurcation occurs. () By numerical analysis, we illustrate the correctness of theoretical analysis. () The discrete-time simulation is adopted to simulate the worm propagation in real network environment. The results demonstrate the reasonableness of the worm propagation model. The rest of the paper is organized as follows. In Section, considering the influence of removable devices, a worm propagation dynamical system with time delay under quarantine strategy is constructed. In Section, local stability of the positive equilibrium and local Hopf bifurcation are investigated. In Section,severalnumericalanalysessupportingthe theoretical analysis are given. Section makes a comparison between simulation experiments and numerical ones. Finally, we give our conclusions in Section.. Model Formulation The system contains both hosts and removable devices. In thismodel,allhostsareinoneoffollowingfivestates: susceptible (S), infectious (I), delayed (D), quarantined (Q), and removed (R). All removable devices are divided into two groups: susceptible (R S ) and infectious (R I ). N and R N denote the total number of hosts and removable devices, respectively. That is, S+I+D+Q+R = N; R S +R I = R N. Susceptible (S) hosts,whicharevulnerabletotheattack from worms, will be infected by infectious hosts or removable devices; then they will infect other hosts connected to them or removabledevicespluggedintothem.infectious(i)hostswill be immunized by antivirus software at the rate of γ.removed (R) hosts, which have been immunized by antivirus software, will become susceptible at reassembly rate ω. Hosts whose behavior looks anomaly will be quarantined by IDS and then they will become in a quarantined (Q) state.asusceptible removabledevice(r S )willbeinfectedwheninsertedintoan infectious host. Worm in an infectious removable device (R I ) will be eliminated when connected to removed hosts; then it will become in a susceptible state. The quarantine strategy is an effective measure to defend against worms attack and make up the deficiency of vaccination strategy. In this paper, anomaly intrusion detection system is chosen for applying quarantine strategy. Comparing with misuse IDS, anomaly IDS has great advantage in detecting unknown intrusion or the variants of known intrusion. However, anomaly IDS judges whether a detected behavior is an attack or not via comparing detected behavior with the normal or expected behavior of system and user. If a deviation occurs, the detected behavior is treated as an intrusion immediately. Because of the difficulty in collecting and building the normal behavior database, high false-alarm rate is considered the main drawback of anomaly IDS. In order to reduce the false alarm of anomaly IDS, the mechanism of time window is adopted. A suspicious behavior will not trigger an alarm immediately. On the contrary, anomaly IDS has a period of time to analyze the accumulated behavior. Therefore, an intermediate state, delayed (D) state, is added into the propagationmodel.thelargerthevalueoftimewindow, thelessthefalsealarmarousedbyanomalyids,because there is enough time for anomaly IDS to recognize whether a behavior is an intrusion or not. However, the overlarge time window may lead to worm propagation dynamical system beingunstableandoutofcontrol.themainnotationsand definitions are listed in Table. The state transition diagram is given by Figure. On the basis of current research, we present a delayed worm propagation model which combines both vaccination and quarantine strategy. Several appropriate assumptions are given as follows.

3 Mathematical Problems in Engineering Notations N R N S(t) I(t) D(t) Q(t) R(t) R S (t) R I (t) β β γ γ ω θ θ δ τ Table : Notations and definitions of the model. Definitions Total number of hosts in the network Total number of removable devices in the network Number of susceptible hosts at time t at time t Number of delayed hosts at time t Number of quarantined hosts at time t τ Number of removed hosts at time t Number of susceptible removable devices at time t Number of infectious removable devices at time t Infection ratio of infectious hosts Contact infection rate between computers and removable devices Recovery rate of infectious hosts Recovery rate of infectious removable devices Reassembly rate of immunized hosts Quarantine rate of susceptible hosts Quarantine rate of infectious hosts Immunization rate of quarantined hosts Time delay of detection by anomaly intrusion detection system () β denotes the infection ratio of infectious hosts. Therefore, at time t, the infection force of infectious computers to susceptible computers is given by β S(t)I(t). () Infectious removable devices have the same infectious ability as the infectious hosts. β is the contact infection rate between computers and removable devices, that is, the interactive infection rate when a removable device links to a host. The probability of connecting removable devices for every host is R N /N, anhe probability of removable device exactly being in the infectious state is R I (t)/r N. Therefore, the infection force of infectious removable devices to susceptible hosts is β (R N /N)(R I (t)/r N )S(t). () Susceptible removable devices will be infected when connecting to an infectious host, and then they will infect any other hosts to which they are connected. Meanwhile, worms of infectious removable devices will be eliminated when connecting to one immunized host. That is, the infection force of infectious hosts to susceptible removable devices is β (I(t)/N)R S (t), anherecoveryforce of removed hosts to infectious removable devices is γ (R(t)/N)R I (t). () Owingtotheinfluenceoftimedelayτ, the increment of the number of quarantined hosts is the ones quarantined at time t τ. Therefore, the increment is θ S(t τ) + θ I(t τ). () The time window mechanism leads to an intermediate state, delayed state (D).Theincrementofthenumber of delayed hosts at time t is given by θ S(t) + θ I(t); the decrement of delayed hosts is the number of those being quarantined, that is, θ S(t τ) + θ I(t τ). Based on the analyses and assumptions above, the delayed differential equations of the model are formulated as (). The differential on the left of equations means the change rate of related states at time t. Consider ds (t) di (t) = β S (t) I (t) β R I (t) N S (t) +ωr(t) θ S (t), R =β S (t) I (t) +β I (t) N S (t) γ I (t) θ I (t), dr (t) =γ I (t) ωr(t) +δq(t), dd (t) =θ S (t) θ S (t τ) +θ I (t) θ I (t τ), dq (t) =θ S (t τ) +θ I (t τ) δq(t), dr S (t) dr I (t) = β I (t) N R S (t) +γ R (t) N R I (t), =β I (t) N R S (t) γ R (t) N R I (t).. Stability at the Positive Equilibrium and Bifurcation Analysis Theorem. The system () has a unique positive equilibrium E =(S,I,D,Q,R,R S,R I ),where I = b S +b S b b S, D =θ S τ+θ I τ, Q = θ S +θ I δ, R = γ I +θ S +θ I, ω R I = β R N I β I +γ R. Proof. For system (), according to [], if all the derivatives on the left of equal sign of the system are set to, which implies that the system becomes stable, we can derive I= b S +b S b b S, Q= θ S +θ I, δ R= γ I +θ S +θ I, ω R I = β R N I β I +γ R, () () ()

4 Mathematical Problems in Engineering ω S β SI β (R /N)S I γ I R θ S θ I D δ β (/N)R S θ S(t τ)+ θ I(t τ) R S R I Q γ (R/N)R Figure : The state transition diagram. where b =ωβ β +γ γ β +β γ θ, Since S+I+D+Q+R=N, R S +R I =R N, Q=N S I D R, R S =R N R I.System() can be simplified to b =β γ θ, b = β ωr N N θ γ (γ +θ ), () b =(γ +θ ) (ωβ +γ γ +γ θ ). Assume that system ()becomes stable at timet. By integrating the fourth equation of system () withtimet from to T+τ,wecanget Since S+I+D+Q+R=N, S + b S +b S b b S + θ S +θ I δ D=θ S τ+θ I τ. () +θ S τ+θ I τ + γ I +θ S +θ I ω =N. Obviously, ()hasoneuniquepositiverooti.sothereisone unique positive equilibrium E =(S,I,D,Q,R,R S,R I ) of system (). The proof is completed. () ds (t) di (t) = β S (t) I (t) β R I (t) N S (t) +ωr(t) θ S (t), =β S (t) I (t) +β R I (t) N S (t) γ I (t) θ I (t), dr (t) dd (t) dr I (t) =γ I (t) ωr(t) +δ(n S(t) I(t) D(t) R(t)), =θ S (t) θ S (t τ) +θ I (t) θ I (t τ), =β I (t) N (R N R I (t)) γ R (t) N R I (t). The Jacobian matrix of (7)aboutE =(S,I,D,R,R I ) is given by (7) β I R I β N θ β S ω β S N β J(E I R I +β β )= N S β γ θ S N ( δ γ δ ω δ δ. () ) θ θ e λτ θ θ e λτ β ( (R N R I ) γ R I N N β I +γ R N ) Let c =β I +β R I N, c =β S, c = β S N, c = β (R N R I ), N

5 Mathematical Problems in Engineering c = γ R I N, c = β I +γ R, N p =c c +γ +θ +ω+δ+c +θ, p =c ( c +γ +θ )+(ω+δ+c +θ )(c c +r +θ ) +(c +θ ) (ω+δ) c c +c c +δω, p =c (ω + δ + c +θ )( c +γ +θ ) +((c +θ ) (ω+δ) + δω) (c c +γ +θ ) According to Routh-Hurwitz criterion, all roots of () have negative real parts. Therefore, it can be concluded that the positive equilibrium E = (S,I,D,R,R I ) is locally asymptotically stable without time delay. The proof is completed. If λ = iω (ω > ) is the root of (), separating the real and imaginary parts, the following two equations can be obtained: c c (θ +ω+δ)+c c (c +ω+δ) +(c ω c c )(δ γ )+δ(c +ωθ ), p =(c (c +θ ) (ω+δ) +c δω + δc )( c +γ +θ ) +(c c c θ c c ) (ω+δ) +(c c ω θ c c )(δ γ ) δω(c c +θ +θ (c c +γ +θ )) +δc (c c +c θ θ θ ), p =δω(θ c θ c c +θ c ( c +γ +θ )) +δc (θ c c +θ c c +c θ ( c +γ +θ ) c θ (c +θ )), q = δθ ω, p ω p ω +p +q ω sin (ωτ) q ω cos (ωτ) +q cos (ωτ) =, ω p ω +p ω+q ω cos (ωτ) +q ω sin (ωτ) q sin (ωτ) =. From (), the followingequationcan be obtained: q ω +(q q ω ) =(p ω p ω +p ) +(ω p ω +p ω). That is, () () q = δω(θ +θ (c c +γ +θ )) δc (c θ c θ ), q =δω(θ c θ c c +c θ ( c +γ +θ )) +δc (θ c c +θ c c +θ c ( c +γ +θ ) c θ (c +θ )). (9) The characteristic equation of system ()canbeobtainedby P (λ) +Q(λ) e λτ =, () where P (λ) =λ +p λ +p λ +p λ +p λ+p, () Q (λ) =q λ +q λ+q. Theorem. The positive equilibrium E is locally asymptotically stable without time delay, if condition (H )issatisfied: H :p >, d >, d >, () (p +q )d p d >, where d =p p (p +q ), d =p +q. () Proof. When τ=,()reducesto λ +p λ +p λ +(p +q )λ +(p +q )λ+(p +q )=. () where ω +D ω +D ω +D ω +D =, (7) D =p p, D =p +p p p, D =p q +p p p p, D =p q +q q p p. Letting z=ω,(7)canbewrittenas () h (z) =z +D z +D z +D z+d. (9) Zhang et al. [] obtained the following results on the distribution of roots of (9). Denote m= D D, n = D D D +D, Δ=( n ) +( m ), σ = + i, y = n + Δ+ n Δ, y = n + Δσ + n Δσ,

6 Mathematical Problems in Engineering y = n + Δσ + n Δσ, z i =y i D, (i =,, ). () Lemma. For the polynomial equation (9), () if D <,then(9) has at least one positive root; () if D and Δ,then(9) haspositiverootifand only if z >and h(z )<; () if D and Δ<,then(9) haspositiverootifand only if there exists at least one z (z,z,z ),such that z >and h(z ). Lemma. Suppose that condition H :p >, d >, d >, (p +q )d p d >is satisfied. () If one of the followings holds, (a) D < ;(b)d, Δ, z >,and h(z ) < ;(c)d,and Δ<, and there exits at least a z (z,z,z ) such that z >and h(z ),thenallrootsof () have negative real parts when τ [,τ ); here, τ is a certain positive constant. () If conditions (a) (c) of () are not satisfied, then all roots of () have negative real parts for all τ. Proof. When τ=,()can be reduced to λ +p λ +p λ +(p +q )λ+(p +q )=. () According to the Routh-Hurwitz criterion, all roots of () have negative real parts if and only if p >, d >, d >,and(p +q )d p d >. From Lemma, it can be known that if (a) (c) are not satisfied, then ()hasnorootswithzerorealpartforallτ ; if one of (a) (c) holds, when τ =τ (j) k, k =,,,, j>, () hasnorootswithzerorealpartandτ is the minimum value of τ, so() has purely imaginary roots. According to [], one obtains the conclusion of the lemma. Let λ(τ) = V(τ) + iω(τ) be the root of (), V(τ )=and ω(τ )=ω. From Lemmas and, the following are obtained. When conditions (a) (c) of Lemma () are not satisfied, h(z) always has no positive root. Therefore, under these conditions, () has no purely imaginary roots for any τ >, which implies that the positive equilibrium E = (S,I,D,R,R I ) of system (7) isabsolutelystable. Therefore, the following theorem on the stability of positive equilibrium E = (S,I,D,R,R I ) can be easily obtained. Hosts in each state 7 S(t) I(t) D(t) Q(t) R(t) Figure : Propagation trend of the five kinds of hosts when τ<τ. Removable devices in each state R S R Figure : Propagation trend of the two kinds of removable devices when τ<τ. Theorem. Supposing that condition (H )issatisfied,(a) D, Δ, z <,andh(z )>;(b)d and Δ<, and there is no z (z,z,z ) such that z >and h(z ), then the positive equilibrium E = (S,I,D,R,R I ) of system (7) is absolutely stable. In what follows, it is assumed that the coefficients in h(z) satisfy the condition (H ) (a) D, Δ, z <,andh(z )>;(b)d, Δ <,anhereisnoz (z,z,z ) such that z >and h(z ). According to [9], it is known that (9) has at least a positive root ω, which implies that characteristic equation () has a pair of purely imaginary roots ±iω.

7 Mathematical Problems in Engineering 7 Hosts in each state 7... S(t) I(t) Q(t) R(t) Figure : Propagation trend of the four kinds of hosts when τ>τ. τ= τ= τ= τ=9 Figure : The number of infectious hosts when τ is changed in one coordinate. Number of removable devices Let λ(τ) = V(τ) + iω(τ) be the root of (). V(τ k )=and ω(τ k )=ω are satisfied when τ=τ k. Lemma. Suppose that h (z ) =.Ifτ = τ,then±iω is apairofpurelyimaginaryrootsof (). Inaddition,ifthe conditions of Lemma () are satisfied, then d Re λ(τ )/dτ >. It is claimed that d Re λ sgn [ dτ ] = sgn {h (ω )}. () τ=τ k R S R Figure : Propagation trend of the two kinds of removable devices when τ>τ. This signifies that there is at least one eigenvalue with positive real part for τ>τ k. Differentiating two sides of () with respect to τ,it can be written as Since () has a pair of purely imaginary roots ±iω,the corresponding τ k >is given by ().Consider ( dλ dτ ) =((λ +p λ +p λ +p λ+p ) +(q λ+q )e λτ (q λ +q λ+q )τe λτ ) τ k = ω arccos [((q q ω )(p ω p ω p ) +q ω (p ω ω p ω )) ((q q ω ) +q ω ) ]+ kπ ω, (k =,,,,...). () ((q λ +q λ+q )λe λτ ) = (λ +p λ +p λ +p λ+p )e λτ (q λ +q λ+q )λ q + λ+q (q λ +q λ+q )λ τ λ. ()

8 Mathematical Problems in Engineering τ= τ= (a) (b) τ= τ= (c) (d) Figure 7: The number of infectious hosts when τ is changed in four coordinates. τ= τ= 7 7 S(t) S(t)... I(t)... I(t) (a) (b) Figure : The phase portrait of susceptible hosts S(t) and infectious hostsi(t).

9 Mathematical Problems in Engineering 9 τ= τ= S(t) S(t) R(t) I(t) R(t) I(t) (a) (b) Figure 9: The projection of the phase portrait of system () in(s, I, R)-space. Therefore sgn [ d Re λ dτ ] τ=τ k = sgn [Re ( dλ dτ ) ] λ=iω = sgn [Re ( (λ +p λ +p λ +p λ+p )e λτ (q λ +q λ+q )λ q + λ+q (q λ +q λ+q )λ τ λ )] λ=iω Hopf bifurcation 7 9 τ(s) = sgnre {((ω p ω i p ω +p ω i+p ) Figure : Bifurcation diagram of system ()withτ ranging from to 9. [cos (ω τ k )+isin (ω τ k )] ) ((q ω i+q q ω )ω i) q + ω i+q (q ω i+q q ω )ω i } = sgn ω K [ω + (p p )ω +(p +p p p )ω +(p +p p p p )] = sgn ω Γ = sgn ω Γ {h (ω )} = sgn {h (ω )}, () where K=q ω +(q ω q ω ). It follows from the hypothesis (H ) that h (ω ) =and therefore the transversality condition holds. It can be obtained that d(re λ) >. () dτ τ=τ k The root of characteristic equation () crosses from the left to the right on the imaginary axis as τ continuously varies from a value less than τ k to one greater than τ k according to Rouche s theorem []. Therefore, according to the Hopf bifurcation theorem [] for functional differential equations, the transversality condition holds and the conditions for Hopf bifurcation are satisfied at τ=τ k.thenthefollowingresultcan be obtained. Theorem 7. Supposing that condition (H ) is satisfied, () if τ [,τ ), then the positive equilibrium E = (S,I,D,R,R I ) of system (7) is asymptotically stable and unstable when τ>τ ; () if condition (H ) is satisfied, system (7) will undergo a Hopf bifurcation at the positive equilibrium E = (S,I,D,R,R I ) when τ = τ k (k =,,,...), where τ k is defined by (). This implies that when the time delay τ<τ,thesystem will stabilize at its infection equilibrium point, which is beneficial for us to implement a containment strategy; when time delay τ > τ, the system will be unstable and worms cannot be effectively controlled.

10 Mathematical Problems in Engineering Number of susceptible hosts... (a) (b) Number of quarantined hosts Number of removed hosts.. (c) (d) Figure : Comparisons between numerical curves and simulation curves when τ<τ.. Numerical Analysis In this section, several numerical results are presented to prove the correctness of theoretical analysis above. 7, hosts and, removable devices are selected as the populationsize;theworm saveragescanrateisη = per second. The worm infection rate can be calculated as α= ηn/ =.9, which means that average.9 hosts of all the hosts can be scanned by one infectious host. The infection ratio is β =η/ =.9. The contact infection rate between hosts and removable devices is β =.. The recovery rates of infectious hosts and removable devices are γ =. and γ =., respectively.theimmunization rate of quarantined hosts is δ =. and the reassembly rate of immunization hosts is ω =.. At the beginning, there are infectious hosts and infectious removable devices, while the rest of hosts and removable devices are susceptible. In anomaly intrusion detection system, the rate at which infected hosts are detected and quarantined is θ =. per second. It means that an infected host can be detected and quarantinedinabouts.therateatwhichsusceptiblehosts are detected and quarantined is θ =. per second; that is, about two false alarms are generated by the anomaly intrusion detection system per day. When τ = < τ, Figure presents the changes ofthenumberoffivekindsofhostsandfigure shows the curves of two kinds of removable devices. According to Theorem, the positive equilibrium E =(S,I,D,R,R I ) is asymptotically stable when τ [,τ ),whichisillustrated by the numerical simulations in Figures and. Finally,the

11 Mathematical Problems in Engineering Number of susceptible hosts... (a) (b) Number of quarantined hosts Number of removed hosts.. (c) (d) Figure : Comparisons between numerical curves and simulation curves when τ>τ. number of every kind of host and removable device keeps stable. When τ gets increased and passes through the threshold τ,thepositiveequilibriume = (S,I,D,R,R I ) will lose its stability and a Hopf bifurcation will occur. A family of periodic solution bifurcates from the positive equilibrium E.Whenτ = > τ, Figure shows the curves of susceptible, infectious, quarantined, and removed hosts and thenumericalsimulationresultsoftwokindsofremovable devices are depicted by Figure.FromFiguresand,wecan clearlyseethateverystateofhostsandremovabledevicesis unstable. Figure shows that the number of infectious hosts will outburst after a short period of peace and repeat again and again. In order to state the influence of time delay, the delay τ is set to a different value each time with other parameters remaining unchanged. Figure shows four curves of the number of infectious hosts in the same coordinate with four delays:τ =, τ=, τ=, andτ=9, respectively. Figures 7(a) 7(c) show four curves of the number of infectious hosts in four coordinates. Initially, the four curves are overlapped which means that the time delay has little effect on the initial stateofwormspread.withtheincreaseofthetimet, the time delay affects the number of infectious hosts. With the increase of time delay, the curve begins to oscillate. The system becomes unstable as time delay passes through the critical value τ. At the same time, it can be discovered that theamplitudeandperiodofthenumberofinfectioushosts gradually increase. Figures (a) and (b) show the phase portraits of susceptible hosts S(t) and infectious hosts I(t) with τ = < τ and τ = > τ, respectively. Figures 9(a) and 9(b) show

12 Mathematical Problems in Engineering theprojectionofthephaseportraitofsystem() in(s, I, R)- space when τ=<τ and τ=>τ,respectively.itis clear that the curve converges to a fixed point when τ<τ, which means that the system is stable. When τ>τ,thecurve converges to a limit circle, which implies that the system is unstable and the worm propagation is out of control. Figure shows the bifurcation diagram with τ from to 9. It is clear that Hopf bifurcation will occur when τ=τ =.. Simulation Experiments In our simulation experiments, the discrete-time simulation is adopted because of its accuracy and is less time-consuming. The discrete-time simulation is an expanded version of Zou s program simulating Code Red worm propagation. All of the parameters are consistent with the numerical experiments. Figures (a) (d) show the comparisons between numerical and simulation curves of susceptible, infectious, quarantined, and removed hosts when τ = < τ, respectively. It is clearly seen that the simulation curves match the numerical ones very well. Figures (a) (d) show the comparisons between numerical and simulation resultsoffourkindsofhostswhenτ = 9 > τ.inthis figure, two curves are still matched well. It fully illustrates the correctness of our theoretical analysis.. Conclusions In this paper, considering the influence of removable devices, a delayed worm propagation dynamical system based on anomaly IDS has been constructed. By regarding the time delay caused by time window of anomaly IDS as the bifurcation parameter, the local asymptotic stability at the positive equilibrium and local Hopf bifurcation were discussed. Through theoretical analysis and related experiments, the main conclusions can be summarized as follows. (a) The critical time delay τ where Hopf bifurcation appearsisderived: τ = ω arccos [((q q ω )(p ω p ω p ) +q ω (p ω ω p ω )) ((q q ω ) +q ω ) ]. (7) (b) When the time delay τ<τ, worm propagation system is stable and worms behavior is easy to predict, which is beneficial for us to implement containment strategy to control and eliminate the worm. (c) When time delay τ τ,hopfbifurcationoccurs, which implies that the system will be unstable and containment strategy does not work effectively. Thus, in order to control and even eliminate the worm, the size of time window of anomaly IDS must be less than τ. In real network environment, various factors can affect worm propagation. This paper concentrates on analyzing the influence of time delay caused by anomaly IDS; other factors having an impact on worm propagation will be the center of our future study. Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper. Acknowledgments This paper is supported by the Program for New Century Excellent Talents in University (NCET--); Natural Science Foundation of Liaoning Province of China under Grant no. 9; Program for Liaoning Excellent Talents in University under LR; Fundamental Research Funds of the Central Universities under Grant nos. N and N7; and MOE-Intel Special Fund of Information Technology (MOE-INTEL--). References [] P. Porras, H. Saidi, and V. Yegneswaran, An Analysis of Conficker s Logic and Rendezvous Point, SRI International, 9. [] Unruly USB, Devices Expose Networks to Malware, Unruly-USB-Devices-Expose-Networks-to-Malware.pdf. []E.Byres,A.Ginter,andJ.Langill, Howstuxnetspreads a study of infection paths in best practice systems, White Paper,. [] N. Falliere, L. O. Murchu, and E. Chien, W.Stuxnet Dossier, Symantec Security Response,. [] Win.Stuxnet, response/ writeup.jsp?docid= [] Flamer: Highly Sophisticated and Discreet Threat Targets the Middle East, [7] W.Flamer, response/ writeup.jsp?docid= [] W.O.KermackandA.G.Mckendrick, Acontributiontothe mathematical theory of epidemics, Proceedings of the Royal Society A,vol.,no.77,pp.7 7,97. [9]C.C.Zou,W.Gong,andD.Towsley, Coderedwormpropagation modeling and analysis, in Proceedings of the 9th ACM Conference on Computer and Communications Security,pp. 7, Washington, DC, USA, November. [] C. C. Zou, W. B. Gong, and D. Towsley, Worm propagation modeling and analysis under dynamic quarantine defense, in Proceedings of the ACM Workshop on Rapid Malcode (WORM ), pp., Washington, DC, USA, October. [] F. Wang, Y. Zhang, C. Wang, J. Ma, and S. Moon, Stability analysis of a SEIQV epidemic model for rapid spreading worms, Computers and Security, vol. 9, no., pp.,. [] Y.Yao,W.Xiang,A.Qu,G.Yu,andF.Gao, Hopfbifurcation in an SEIDQV worm propagation model with quarantine strategy, Discrete Dynamics in Nature and Society, vol., Article ID, pages,.

13 Mathematical Problems in Engineering []Y.Yao,L.Guo,H.Guo,G.Yu,F.Gao,andX.Tong, Pulse quarantine strategy of internet worm propagation: modeling and analysis, Computers and Electrical Engineering, vol., no., pp. 7,. [] B. K. Mishra and N. Jha, SEIQRS model for the transmission of malicious objects in computer network, Applied Mathematical Modelling,vol.,no.,pp.7 7,. []B.D.Hassard,N.D.Kazarinoff,andY.H.Wan,Theory and Applications of Hopf Bifurcation,vol.ofLondon Mathematical Society Lecture Note Series, Cambridge University Press, Cambridge, UK, 9. [] Y. Yao, N. Zhang, W. Xiang, G. Yu, and F. Gao, Modeling and analysis of bifurcation in a delayed worm propagation model, Applied Mathematics,vol.,ArticleID979, pages,. [7] W. Yu and J. Cao, Hopf bifurcation and stability of periodic solutions for van der Pol equation with time delay, Nonlinear Analysis:Theory,MethodsandApplications,vol.,no.,pp.,. [] J. Zhang, W. Li, and X. Yan, Hopf bifurcation and stability of periodic solutions in a delayed eco-epidemiological system, Applied Mathematics and Computation,vol.9,no.,pp. 7,. [9] X. Han and Q. Tan, Dynamical behavior of computer virus on Internet, Applied Mathematics and Computation, vol. 7, no., pp.,. [] T. Dong, X. Liao, and H. Li, Stability and Hopf bifurcation in a computer virus model with multistate antivirus, Abstract and Applied Analysis, vol., Article ID 97, pages,. []Y.Yao,X.Xie,H.Guo,G.Yu,F.Gao,andX.Tong, Hopf bifurcation in an Internet worm propagation model with time delay in quarantine, Mathematical and Computer Modelling, vol. 7, no. -, pp.,. []J.Ren,X.Yang,Q.Zhu,L.Yang,andC.Zhang, Anovel computer virus model and its dynamics, Nonlinear Analysis: Real World Applications,vol.,no.,pp.7,. [] L. Wu, X. Su, and P. Shi, Sliding mode control with bounded l gain performance of Markovian jump singular time-delay systems, Automatica, vol., no., pp. 99 9,. [] F. Li and X. Zhang, A delay-dependent bounded real lemma forsingularlpvsystemswithtime-variantdelay, International Robust and Nonlinear Control,vol.,no.,pp.9 7,. []F.Li,P.Shi,L.Wu,andX.Zhang, Fuzzy-model-basedDstability and non-fragile control for discrete-time descriptor systems with multiple delays, IEEE Transaction on Fuzzy System,vol.99,page,. [] L. Song, J. Zhen, G. Sun, J. Zhang, and X. Han, Influence of removable devices on computer worms: dynamic analysis and control strategies, Computers and Mathematics with Applications,vol.,no.7,pp. 9,. [7] Q. Zhu, X. Yang, and J. Ren, Modeling and analysis of the spread of computer virus, Communications in Nonlinear Science and Numerical Simulation,vol.7,no.,pp.7,. [] S. Wang, Q. Liu, X. Yu, and Y. Ma, Bifurcation analysis of a model for network worm propagation with time delay, Mathematical and Computer Modelling,vol.,no.-,pp. 7,. [9] L. Wang, Y. Fan, and W. Li, Multiple bifurcations in a predatorprey system with monotonic functional response, Applied Mathematics and Computation, vol.7,no.,pp.,. [] J. K. Hale and S. M. Verduyn Lunel, Introduction to Functional Differential Equations, vol.99,springer,newyork,ny,usa, 99.

14 Advances in Operations Research Volume Advances in Decision Sciences Volume Applied Mathematics Algebra Volume Probability and Statistics Volume The Scientific World Journal Volume International Differential Equations Volume Volume Submit your manuscripts at International Advances in Combinatorics Mathematical Physics Volume Complex Analysis Volume International Mathematics and Mathematical Sciences Mathematical Problems in Engineering Mathematics Volume Volume Volume Volume Discrete Mathematics Volume Discrete Dynamics in Nature and Society Function Spaces Abstract and Applied Analysis Volume Volume Volume International Stochastic Analysis Optimization Volume Volume

Research Article Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy

Research Article Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy Hindawi Publishing Corporation Discrete Dynamics in Nature and Society Volume 1, Article ID 3868, 18 pages doi:1.11/1/3868 Research Article Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine

More information

Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model

Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model Discrete Dynamics in Nature and ociety Volume 2012, Article ID 106950, 8 pages doi:10.1155/2012/106950 Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model Chenquan

More information

Research Article Stability and Hopf Bifurcation in a Computer Virus Model with Multistate Antivirus

Research Article Stability and Hopf Bifurcation in a Computer Virus Model with Multistate Antivirus Abstract and Applied Analysis Volume, Article ID 84987, 6 pages doi:.55//84987 Research Article Stability and Hopf Bifurcation in a Computer Virus Model with Multistate Antivirus Tao Dong,, Xiaofeng Liao,

More information

Global Stability of a Computer Virus Model with Cure and Vertical Transmission

Global Stability of a Computer Virus Model with Cure and Vertical Transmission International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 3, Issue 1, January 016, PP 16-4 ISSN 349-4840 (Print) & ISSN 349-4859 (Online) www.arcjournals.org Global

More information

Research Article Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network

Research Article Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network e Scientific World Journal Volume 4, Article ID 944, 4 pages http://dx.doi.org/.55/4/944 Research Article Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network Zizhen

More information

Research Article Stability Switches and Hopf Bifurcations in a Second-Order Complex Delay Equation

Research Article Stability Switches and Hopf Bifurcations in a Second-Order Complex Delay Equation Hindawi Mathematical Problems in Engineering Volume 017, Article ID 679879, 4 pages https://doi.org/10.1155/017/679879 Research Article Stability Switches and Hopf Bifurcations in a Second-Order Complex

More information

Research Article Modeling Computer Virus and Its Dynamics

Research Article Modeling Computer Virus and Its Dynamics Mathematical Problems in Engineering Volume 213, Article ID 842614, 5 pages http://dx.doi.org/1.1155/213/842614 Research Article Modeling Computer Virus and Its Dynamics Mei Peng, 1 Xing He, 2 Junjian

More information

Spread of Malicious Objects in Computer Network: A Fuzzy Approach

Spread of Malicious Objects in Computer Network: A Fuzzy Approach Available at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 8, Issue 2 (December 213), pp. 684 7 Applications and Applied Mathematics: An International Journal (AAM) Spread of Malicious Objects

More information

Research Article An Impulse Model for Computer Viruses

Research Article An Impulse Model for Computer Viruses Discrete Dynamics in Nature and Society Volume 2012, Article ID 260962, 13 pages doi:10.1155/2012/260962 Research Article An Impulse Model for Computer Viruses Chunming Zhang, Yun Zhao, and Yingjiang Wu

More information

Stability Analysis of a Quarantined Epidemic Model with Latent and Breaking-Out over the Internet

Stability Analysis of a Quarantined Epidemic Model with Latent and Breaking-Out over the Internet Vol.8 No.7 5 pp.-8 http://dx.doi.org/.57/ijhit.5.8.7. Stability Analysis of a Quarantined Epidemic Model with Latent and reaking-out over the Internet Munna Kumar a imal Kumar Mishra b and T. C. Panda

More information

Research Article Adaptive Control of Chaos in Chua s Circuit

Research Article Adaptive Control of Chaos in Chua s Circuit Mathematical Problems in Engineering Volume 2011, Article ID 620946, 14 pages doi:10.1155/2011/620946 Research Article Adaptive Control of Chaos in Chua s Circuit Weiping Guo and Diantong Liu Institute

More information

Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population

Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population Ruzhang Zhao, Lijun Yang Department of Mathematical Science, Tsinghua University, China. Corresponding author. Email: lyang@math.tsinghua.edu.cn,

More information

Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components

Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components Applied Mathematics Volume 202, Article ID 689820, 3 pages doi:0.55/202/689820 Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components

More information

Department of Mathematics, Faculty of Sciences and Mathematics, Diponegoro University,Semarang, Indonesia

Department of Mathematics, Faculty of Sciences and Mathematics, Diponegoro University,Semarang, Indonesia ISS: 978-602-71169-7-9 Proceeding of 5th International Seminar on ew Paradigm and Innovation on atural Science and Its Application (5th ISPISA) Mathematical Modeling of worm infection on computer in a

More information

Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination

Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination International Journal of Network Security, Vol.18, No.3, PP.493-5, May 216 493 Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination Fangwei Wang 1,2, Fang Yang 3, Changguang Wang

More information

Research Article Partial Pole Placement in LMI Region

Research Article Partial Pole Placement in LMI Region Control Science and Engineering Article ID 84128 5 pages http://dxdoiorg/11155/214/84128 Research Article Partial Pole Placement in LMI Region Liuli Ou 1 Shaobo Han 2 Yongji Wang 1 Shuai Dong 1 and Lei

More information

A comparison of delayed SIR and SEIR epidemic models

A comparison of delayed SIR and SEIR epidemic models Nonlinear Analysis: Modelling and Control, 2011, Vol. 16, No. 2, 181 190 181 A comparison of delayed SIR and SEIR epidemic models Abdelilah Kaddar a, Abdelhadi Abta b, Hamad Talibi Alaoui b a Université

More information

SI j RS E-Epidemic Model With Multiple Groups of Infection In Computer Network. 1 Introduction. Bimal Kumar Mishra 1, Aditya Kumar Singh 2

SI j RS E-Epidemic Model With Multiple Groups of Infection In Computer Network. 1 Introduction. Bimal Kumar Mishra 1, Aditya Kumar Singh 2 ISSN 1749-3889 (print), 1749-3897 (online) International Journal of Nonlinear Science Vol.13(2012) No.3,pp.357-362 SI j RS E-Epidemic Model With Multiple Groups of Infection In Computer Network Bimal Kumar

More information

A delayed SIR model with general nonlinear incidence rate

A delayed SIR model with general nonlinear incidence rate Liu Advances in Difference Equations 2015) 2015:329 DOI 10.1186/s13662-015-0619-z R E S E A R C H Open Access A delayed SIR model with general nonlinear incidence rate Luju Liu * * Correspondence: lujuliu@126.com

More information

Research Article Stabilizing of Subspaces Based on DPGA and Chaos Genetic Algorithm for Optimizing State Feedback Controller

Research Article Stabilizing of Subspaces Based on DPGA and Chaos Genetic Algorithm for Optimizing State Feedback Controller Mathematical Problems in Engineering Volume 2012, Article ID 186481, 9 pages doi:10.1155/2012/186481 Research Article Stabilizing of Subspaces Based on DPGA and Chaos Genetic Algorithm for Optimizing State

More information

An Improved Computer Multi-Virus Propagation Model with User Awareness

An Improved Computer Multi-Virus Propagation Model with User Awareness Journal of Information & Computational Science 8: 16 (2011) 4301 4308 Available at http://www.joics.com An Improved Computer Multi-Virus Propagation Model with User Awareness Xiaoqin ZHANG a,, Shuyu CHEN

More information

Delay SIR Model with Nonlinear Incident Rate and Varying Total Population

Delay SIR Model with Nonlinear Incident Rate and Varying Total Population Delay SIR Model with Nonlinear Incident Rate Varying Total Population Rujira Ouncharoen, Salinthip Daengkongkho, Thongchai Dumrongpokaphan, Yongwimon Lenbury Abstract Recently, models describing the behavior

More information

Research Article Design of PDC Controllers by Matrix Reversibility for Synchronization of Yin and Yang Chaotic Takagi-Sugeno Fuzzy Henon Maps

Research Article Design of PDC Controllers by Matrix Reversibility for Synchronization of Yin and Yang Chaotic Takagi-Sugeno Fuzzy Henon Maps Abstract and Applied Analysis Volume 212, Article ID 35821, 11 pages doi:1.1155/212/35821 Research Article Design of PDC Controllers by Matrix Reversibility for Synchronization of Yin and Yang Chaotic

More information

Research Article On the Stability Property of the Infection-Free Equilibrium of a Viral Infection Model

Research Article On the Stability Property of the Infection-Free Equilibrium of a Viral Infection Model Hindawi Publishing Corporation Discrete Dynamics in Nature and Society Volume, Article ID 644, 9 pages doi:.55//644 Research Article On the Stability Property of the Infection-Free Equilibrium of a Viral

More information

Research Article Two Quarantine Models on the Attack of Malicious Objects in Computer Network

Research Article Two Quarantine Models on the Attack of Malicious Objects in Computer Network Mathematical Problems in Engineering Volume 2012, Article ID 407064, 13 pages doi:10.1155/2012/407064 Research Article Two Quarantine Models on the Attack of Malicious Objects in Computer Network Bimal

More information

A Mathematical Analysis on the Transmission Dynamics of Neisseria gonorrhoeae. Yk j N k j

A Mathematical Analysis on the Transmission Dynamics of Neisseria gonorrhoeae. Yk j N k j North Carolina Journal of Mathematics and Statistics Volume 3, Pages 7 20 (Accepted June 23, 2017, published June 30, 2017 ISSN 2380-7539 A Mathematical Analysis on the Transmission Dynamics of Neisseria

More information

Qualitative Analysis of a Discrete SIR Epidemic Model

Qualitative Analysis of a Discrete SIR Epidemic Model ISSN (e): 2250 3005 Volume, 05 Issue, 03 March 2015 International Journal of Computational Engineering Research (IJCER) Qualitative Analysis of a Discrete SIR Epidemic Model A. George Maria Selvam 1, D.

More information

Research Article Dynamical Models for Computer Viruses Propagation

Research Article Dynamical Models for Computer Viruses Propagation Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 28, Article ID 9426, 11 pages doi:1.11/28/9426 Research Article Dynamical Models for Computer Viruses Propagation José R. C. Piqueira

More information

Research Article Modeling and Analysis of Epidemic Diffusion within Small-World Network

Research Article Modeling and Analysis of Epidemic Diffusion within Small-World Network Applied Mathematics Volume 212, Article ID 841531, 14 pages doi:1.1155/212/841531 Research Article Modeling and Analysis of Epidemic Diffusion within Small-World Network Ming Liu and Yihong Xiao Department

More information

Research Article Hopf Bifurcation Analysis and Anticontrol of Hopf Circles of the Rössler-Like System

Research Article Hopf Bifurcation Analysis and Anticontrol of Hopf Circles of the Rössler-Like System Abstract and Applied Analysis Volume, Article ID 3487, 6 pages doi:.55//3487 Research Article Hopf Bifurcation Analysis and Anticontrol of Hopf Circles of the Rössler-Like System Ranchao Wu and Xiang Li

More information

Research Article Modeling and Analysis of Peer-to-Peer Botnets

Research Article Modeling and Analysis of Peer-to-Peer Botnets Discrete Dynamics in Nature and Society Volume 2012, Article ID 865075, 18 pages doi:10.1155/2012/865075 Research Article Modeling and Analysis of Peer-to-Peer nets Liping Feng, 1, 2 Xiaofeng Liao, 1 Qi

More information

HOPF BIFURCATION CONTROL WITH PD CONTROLLER

HOPF BIFURCATION CONTROL WITH PD CONTROLLER HOPF BIFURCATION CONTROL WITH PD CONTROLLER M. DARVISHI AND H.M. MOHAMMADINEJAD DEPARTMENT OF MATHEMATICS, FACULTY OF MATHEMATICS AND STATISTICS, UNIVERSITY OF BIRJAND, BIRJAND, IRAN E-MAILS: M.DARVISHI@BIRJAND.AC.IR,

More information

KingSaudBinAbdulazizUniversityforHealthScience,Riyadh11481,SaudiArabia. Correspondence should be addressed to Raghib Abu-Saris;

KingSaudBinAbdulazizUniversityforHealthScience,Riyadh11481,SaudiArabia. Correspondence should be addressed to Raghib Abu-Saris; Chaos Volume 26, Article ID 49252, 7 pages http://dx.doi.org/.55/26/49252 Research Article On Matrix Projective Synchronization and Inverse Matrix Projective Synchronization for Different and Identical

More information

Available online at Commun. Math. Biol. Neurosci. 2016, 2016:17 ISSN:

Available online at   Commun. Math. Biol. Neurosci. 2016, 2016:17 ISSN: Available online at http://scik.org Commun. Math. Biol. Neurosci. 216, 216:17 ISSN: 252-2541 OPTIMAL CONTROL OF A COMPUTER VIRUS MODEL WITH NETWORK ATTACKS HONGYUE PEI 1, YONGZHEN PEI 1,2,, XIYIN LIANG

More information

Research Article Mathematical Model and Cluster Synchronization for a Complex Dynamical Network with Two Types of Chaotic Oscillators

Research Article Mathematical Model and Cluster Synchronization for a Complex Dynamical Network with Two Types of Chaotic Oscillators Applied Mathematics Volume 212, Article ID 936, 12 pages doi:1.11/212/936 Research Article Mathematical Model and Cluster Synchronization for a Complex Dynamical Network with Two Types of Chaotic Oscillators

More information

Research Article The Application of Baum-Welch Algorithm in Multistep Attack

Research Article The Application of Baum-Welch Algorithm in Multistep Attack e Scientific World Journal, Article ID 374260, 7 pages http://dx.doi.org/10.1155/2014/374260 Research Article The Application of Baum-Welch Algorithm in Multistep Attack Yanxue Zhang, 1 Dongmei Zhao, 2

More information

OPTIMAL CONTROL ON THE SPREAD OF SLBS COMPUTER VIRUS MODEL. Brawijaya University Jl. Veteran Malang, 65145, INDONESIA

OPTIMAL CONTROL ON THE SPREAD OF SLBS COMPUTER VIRUS MODEL. Brawijaya University Jl. Veteran Malang, 65145, INDONESIA International Journal of Pure and Applied Mathematics Volume 17 No. 3 216, 749-758 ISSN: 1311-88 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: 1.12732/ijpam.v17i3.21

More information

CHATTERING-FREE SMC WITH UNIDIRECTIONAL AUXILIARY SURFACES FOR NONLINEAR SYSTEM WITH STATE CONSTRAINTS. Jian Fu, Qing-Xian Wu and Ze-Hui Mao

CHATTERING-FREE SMC WITH UNIDIRECTIONAL AUXILIARY SURFACES FOR NONLINEAR SYSTEM WITH STATE CONSTRAINTS. Jian Fu, Qing-Xian Wu and Ze-Hui Mao International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 12, December 2013 pp. 4793 4809 CHATTERING-FREE SMC WITH UNIDIRECTIONAL

More information

Research Article Forward and Reverse Movements of a Linear Positioning Stage Based on the Parasitic Motion Principle

Research Article Forward and Reverse Movements of a Linear Positioning Stage Based on the Parasitic Motion Principle Advances in Mechanical Engineering, Article ID 45256, 7 pages http://dx.doi.org/1.1155/214/45256 Research Article Forward and Reverse Movements of a Linear Positioning Stage Based on the Parasitic Motion

More information

Research Article New Oscillation Criteria for Second-Order Neutral Delay Differential Equations with Positive and Negative Coefficients

Research Article New Oscillation Criteria for Second-Order Neutral Delay Differential Equations with Positive and Negative Coefficients Abstract and Applied Analysis Volume 2010, Article ID 564068, 11 pages doi:10.1155/2010/564068 Research Article New Oscillation Criteria for Second-Order Neutral Delay Differential Equations with Positive

More information

GLOBAL STABILITY AND HOPF BIFURCATION OF A DELAYED EPIDEMIOLOGICAL MODEL WITH LOGISTIC GROWTH AND DISEASE RELAPSE YUGUANG MU, RUI XU

GLOBAL STABILITY AND HOPF BIFURCATION OF A DELAYED EPIDEMIOLOGICAL MODEL WITH LOGISTIC GROWTH AND DISEASE RELAPSE YUGUANG MU, RUI XU Available online at http://scik.org Commun. Math. Biol. Neurosci. 2018, 2018:7 https://doi.org/10.28919/cmbn/3636 ISSN: 2052-2541 GLOBAL STABILITY AND HOPF BIFURCATION OF A DELAYED EPIDEMIOLOGICAL MODEL

More information

Research Article Towards the Epidemiological Modeling of Computer Viruses

Research Article Towards the Epidemiological Modeling of Computer Viruses Discrete Dynamics in Nature and Society Volume 2012, Article ID 259671, 11 pages doi:10.1155/2012/259671 Research Article Towards the Epidemiological Modeling of Computer Viruses Xiaofan Yang 1, 2 and

More information

Research Article Unicity of Entire Functions concerning Shifts and Difference Operators

Research Article Unicity of Entire Functions concerning Shifts and Difference Operators Abstract and Applied Analysis Volume 204, Article ID 38090, 5 pages http://dx.doi.org/0.55/204/38090 Research Article Unicity of Entire Functions concerning Shifts and Difference Operators Dan Liu, Degui

More information

Stability of SEIR Model of Infectious Diseases with Human Immunity

Stability of SEIR Model of Infectious Diseases with Human Immunity Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 6 (2017), pp. 1811 1819 Research India Publications http://www.ripublication.com/gjpam.htm Stability of SEIR Model of Infectious

More information

Stability analysis of delayed SIR epidemic models with a class of nonlinear incidence rates

Stability analysis of delayed SIR epidemic models with a class of nonlinear incidence rates Published in Applied Mathematics and Computation 218 (2012 5327-5336 DOI: 10.1016/j.amc.2011.11.016 Stability analysis of delayed SIR epidemic models with a class of nonlinear incidence rates Yoichi Enatsu

More information

Research Article Solvability for a Coupled System of Fractional Integrodifferential Equations with m-point Boundary Conditions on the Half-Line

Research Article Solvability for a Coupled System of Fractional Integrodifferential Equations with m-point Boundary Conditions on the Half-Line Abstract and Applied Analysis Volume 24, Article ID 29734, 7 pages http://dx.doi.org/.55/24/29734 Research Article Solvability for a Coupled System of Fractional Integrodifferential Equations with m-point

More information

Open Access Permanent Magnet Synchronous Motor Vector Control Based on Weighted Integral Gain of Sliding Mode Variable Structure

Open Access Permanent Magnet Synchronous Motor Vector Control Based on Weighted Integral Gain of Sliding Mode Variable Structure Send Orders for Reprints to reprints@benthamscienceae The Open Automation and Control Systems Journal, 5, 7, 33-33 33 Open Access Permanent Magnet Synchronous Motor Vector Control Based on Weighted Integral

More information

ANALYSIS AND CONTROLLING OF HOPF BIFURCATION FOR CHAOTIC VAN DER POL-DUFFING SYSTEM. China

ANALYSIS AND CONTROLLING OF HOPF BIFURCATION FOR CHAOTIC VAN DER POL-DUFFING SYSTEM. China Mathematical and Computational Applications, Vol. 9, No., pp. 84-9, 4 ANALYSIS AND CONTROLLING OF HOPF BIFURCATION FOR CHAOTIC VAN DER POL-DUFFING SYSTEM Ping Cai,, Jia-Shi Tang, Zhen-Bo Li College of

More information

Research Article A Note on the Solutions of the Van der Pol and Duffing Equations Using a Linearisation Method

Research Article A Note on the Solutions of the Van der Pol and Duffing Equations Using a Linearisation Method Mathematical Problems in Engineering Volume 1, Article ID 693453, 1 pages doi:11155/1/693453 Research Article A Note on the Solutions of the Van der Pol and Duffing Equations Using a Linearisation Method

More information

A Note on the Spread of Infectious Diseases. in a Large Susceptible Population

A Note on the Spread of Infectious Diseases. in a Large Susceptible Population International Mathematical Forum, Vol. 7, 2012, no. 50, 2481-2492 A Note on the Spread of Infectious Diseases in a Large Susceptible Population B. Barnes Department of Mathematics Kwame Nkrumah University

More information

Research Article Solvability of a Class of Integral Inclusions

Research Article Solvability of a Class of Integral Inclusions Abstract and Applied Analysis Volume 212, Article ID 21327, 12 pages doi:1.1155/212/21327 Research Article Solvability of a Class of Integral Inclusions Ying Chen and Shihuang Hong Institute of Applied

More information

STABILITY ANALYSIS OF DELAY DIFFERENTIAL EQUATIONS WITH TWO DISCRETE DELAYS

STABILITY ANALYSIS OF DELAY DIFFERENTIAL EQUATIONS WITH TWO DISCRETE DELAYS CANADIAN APPLIED MATHEMATICS QUARTERLY Volume 20, Number 4, Winter 2012 STABILITY ANALYSIS OF DELAY DIFFERENTIAL EQUATIONS WITH TWO DISCRETE DELAYS XIHUI LIN AND HAO WANG ABSTRACT. We use an algebraic

More information

Research Article Propagation Characteristics of Oblique Incident Terahertz Wave in Nonuniform Dusty Plasma

Research Article Propagation Characteristics of Oblique Incident Terahertz Wave in Nonuniform Dusty Plasma Antennas and Propagation Volume 216, Article ID 945473, 6 pages http://dx.doi.org/1.1155/216/945473 Research Article Propagation Characteristics of Oblique Incident Terahert Wave in Nonuniform Dusty Plasma

More information

Research Article The Microphone Feedback Analogy for Chatter in Machining

Research Article The Microphone Feedback Analogy for Chatter in Machining Shock and Vibration Volume 215, Article ID 976819, 5 pages http://dx.doi.org/1.1155/215/976819 Research Article The Microphone Feedback Analogy for Chatter in Machining Tony Schmitz UniversityofNorthCarolinaatCharlotte,Charlotte,NC28223,USA

More information

Research Article Existence of Periodic Positive Solutions for Abstract Difference Equations

Research Article Existence of Periodic Positive Solutions for Abstract Difference Equations Discrete Dynamics in Nature and Society Volume 2011, Article ID 870164, 7 pages doi:10.1155/2011/870164 Research Article Existence of Periodic Positive Solutions for Abstract Difference Equations Shugui

More information

Research Article Robust Switching Control Strategy for a Transmission System with Unknown Backlash

Research Article Robust Switching Control Strategy for a Transmission System with Unknown Backlash Mathematical Problems in Engineering Volume 24, Article ID 79384, 8 pages http://dx.doi.org/.55/24/79384 Research Article Robust Switching Control Strategy for a Transmission System with Unknown Backlash

More information

Hopf Bifurcation Analysis and Approximation of Limit Cycle in Coupled Van Der Pol and Duffing Oscillators

Hopf Bifurcation Analysis and Approximation of Limit Cycle in Coupled Van Der Pol and Duffing Oscillators The Open Acoustics Journal 8 9-3 9 Open Access Hopf ifurcation Analysis and Approximation of Limit Cycle in Coupled Van Der Pol and Duffing Oscillators Jianping Cai *a and Jianhe Shen b a Department of

More information

Qualitative analysis for a delayed epidemic model with latent and breaking-out over the Internet

Qualitative analysis for a delayed epidemic model with latent and breaking-out over the Internet Zhang and Wang Advances in Difference Equations (17) 17:31 DOI 1.1186/s1366-17-174-9 R E S E A R C H Open Access Qualitative analysis for a delayed epidemic model with latent and breaking-out over the

More information

Research Article On Exponential Stability Conditions of Descriptor Systems with Time-Varying Delay

Research Article On Exponential Stability Conditions of Descriptor Systems with Time-Varying Delay Applied Mathematics Volume 2012, Article ID 532912, 12 pages doi:10.1155/2012/532912 Research Article On Exponential Stability Conditions of Descriptor Systems with Time-Varying Delay S. Cong and Z.-B.

More information

New results on the existences of solutions of the Dirichlet problem with respect to the Schrödinger-prey operator and their applications

New results on the existences of solutions of the Dirichlet problem with respect to the Schrödinger-prey operator and their applications Chen Zhang Journal of Inequalities Applications 2017 2017:143 DOI 10.1186/s13660-017-1417-9 R E S E A R C H Open Access New results on the existences of solutions of the Dirichlet problem with respect

More information

Research Article A New Class of Meromorphic Functions Associated with Spirallike Functions

Research Article A New Class of Meromorphic Functions Associated with Spirallike Functions Applied Mathematics Volume 202, Article ID 49497, 2 pages doi:0.55/202/49497 Research Article A New Class of Meromorphic Functions Associated with Spirallike Functions Lei Shi, Zhi-Gang Wang, and Jing-Ping

More information

Research Article Representing Smoothed Spectrum Estimate with the Cauchy Integral

Research Article Representing Smoothed Spectrum Estimate with the Cauchy Integral Mathematical Problems in Engineering Volume 1, Article ID 67349, 5 pages doi:1.1155/1/67349 Research Article Representing Smoothed Spectrum Estimate with the Cauchy Integral Ming Li 1, 1 School of Information

More information

Research Article Chaos and Control of Game Model Based on Heterogeneous Expectations in Electric Power Triopoly

Research Article Chaos and Control of Game Model Based on Heterogeneous Expectations in Electric Power Triopoly Discrete Dnamics in Nature and Societ Volume 29, Article ID 469564, 8 pages doi:.55/29/469564 Research Article Chaos and Control of Game Model Based on Heterogeneous Epectations in Electric Power Triopol

More information

Research Article Chaos Control on a Duopoly Game with Homogeneous Strategy

Research Article Chaos Control on a Duopoly Game with Homogeneous Strategy Hindawi Publishing Corporation Discrete Dynamics in Nature and Society Volume 16, Article ID 74185, 7 pages http://dx.doi.org/1.1155/16/74185 Publication Year 16 Research Article Chaos Control on a Duopoly

More information

Research Article The Stability of Gauss Model Having One-Prey and Two-Predators

Research Article The Stability of Gauss Model Having One-Prey and Two-Predators Abstract and Applied Analysis Volume 2012, Article ID 219640, 9 pages doi:10.1155/2012/219640 Research Article The Stability of Gauss Model Having One-Prey and Two-Predators A. Farajzadeh, 1 M. H. Rahmani

More information

GLOBAL STABILITY OF SIR MODELS WITH NONLINEAR INCIDENCE AND DISCONTINUOUS TREATMENT

GLOBAL STABILITY OF SIR MODELS WITH NONLINEAR INCIDENCE AND DISCONTINUOUS TREATMENT Electronic Journal of Differential Equations, Vol. 2015 (2015), No. 304, pp. 1 8. SSN: 1072-6691. URL: http://ejde.math.txstate.edu or http://ejde.math.unt.edu ftp ejde.math.txstate.edu GLOBAL STABLTY

More information

Research Article The Approximate Solution of Fredholm Integral Equations with Oscillatory Trigonometric Kernels

Research Article The Approximate Solution of Fredholm Integral Equations with Oscillatory Trigonometric Kernels Applied Mathematics, Article ID 72327, 7 pages http://ddoiorg/055/204/72327 Research Article The Approimate Solution of Fredholm Integral Equations with Oscillatory Trigonometric Kernels Qinghua Wu School

More information

Research Article Asymptotic Behavior of the Solutions of System of Difference Equations of Exponential Form

Research Article Asymptotic Behavior of the Solutions of System of Difference Equations of Exponential Form Difference Equations Article ID 936302 6 pages http://dx.doi.org/10.1155/2014/936302 Research Article Asymptotic Behavior of the Solutions of System of Difference Equations of Exponential Form Vu Van Khuong

More information

Research Article An Optimized Grey GM(2,1) Model and Forecasting of Highway Subgrade Settlement

Research Article An Optimized Grey GM(2,1) Model and Forecasting of Highway Subgrade Settlement Mathematical Problems in Engineering Volume 015, Article ID 606707, 6 pages http://dx.doi.org/10.1155/015/606707 Research Article An Optimized Grey GM(,1) Model and Forecasting of Highway Subgrade Settlement

More information

Research Article A Novel Differential Evolution Invasive Weed Optimization Algorithm for Solving Nonlinear Equations Systems

Research Article A Novel Differential Evolution Invasive Weed Optimization Algorithm for Solving Nonlinear Equations Systems Journal of Applied Mathematics Volume 2013, Article ID 757391, 18 pages http://dx.doi.org/10.1155/2013/757391 Research Article A Novel Differential Evolution Invasive Weed Optimization for Solving Nonlinear

More information

Research Article Minor Prime Factorization for n-d Polynomial Matrices over Arbitrary Coefficient Field

Research Article Minor Prime Factorization for n-d Polynomial Matrices over Arbitrary Coefficient Field Complexity, Article ID 6235649, 9 pages https://doi.org/10.1155/2018/6235649 Research Article Minor Prime Factorization for n-d Polynomial Matrices over Arbitrary Coefficient Field Jinwang Liu, Dongmei

More information

Global Analysis of an Epidemic Model with Nonmonotone Incidence Rate

Global Analysis of an Epidemic Model with Nonmonotone Incidence Rate Global Analysis of an Epidemic Model with Nonmonotone Incidence Rate Dongmei Xiao Department of Mathematics, Shanghai Jiaotong University, Shanghai 00030, China E-mail: xiaodm@sjtu.edu.cn and Shigui Ruan

More information

Research Article Positive Solutions for Neumann Boundary Value Problems of Second-Order Impulsive Differential Equations in Banach Spaces

Research Article Positive Solutions for Neumann Boundary Value Problems of Second-Order Impulsive Differential Equations in Banach Spaces Abstract and Applied Analysis Volume 212, Article ID 41923, 14 pages doi:1.1155/212/41923 Research Article Positive Solutions for Neumann Boundary Value Problems of Second-Order Impulsive Differential

More information

Research Article A PLS-Based Weighted Artificial Neural Network Approach for Alpha Radioactivity Prediction inside Contaminated Pipes

Research Article A PLS-Based Weighted Artificial Neural Network Approach for Alpha Radioactivity Prediction inside Contaminated Pipes Mathematical Problems in Engineering, Article ID 517605, 5 pages http://dxdoiorg/101155/2014/517605 Research Article A PLS-Based Weighted Artificial Neural Network Approach for Alpha Radioactivity Prediction

More information

Research Article On New Wilker-Type Inequalities

Research Article On New Wilker-Type Inequalities International Scholarly Research Network ISRN Mathematical Analysis Volume 2011, Article ID 681702, 7 pages doi:10.5402/2011/681702 Research Article On New Wilker-Type Inequalities Zhengjie Sun and Ling

More information

Research Article A New Fractional Integral Inequality with Singularity and Its Application

Research Article A New Fractional Integral Inequality with Singularity and Its Application Abstract and Applied Analysis Volume 212, Article ID 93798, 12 pages doi:1.1155/212/93798 Research Article A New Fractional Integral Inequality with Singularity and Its Application Qiong-Xiang Kong 1 and

More information

Hopf Bifurcation Analysis of a Dynamical Heart Model with Time Delay

Hopf Bifurcation Analysis of a Dynamical Heart Model with Time Delay Applied Mathematical Sciences, Vol 11, 2017, no 22, 1089-1095 HIKARI Ltd, wwwm-hikaricom https://doiorg/1012988/ams20177271 Hopf Bifurcation Analysis of a Dynamical Heart Model with Time Delay Luca Guerrini

More information

Research Article Data-Driven Fault Diagnosis Method for Power Transformers Using Modified Kriging Model

Research Article Data-Driven Fault Diagnosis Method for Power Transformers Using Modified Kriging Model Hindawi Mathematical Problems in Engineering Volume 2017, Article ID 3068548, 5 pages https://doi.org/10.1155/2017/3068548 Research Article Data-Driven Fault Diagnosis Method for Power Transformers Using

More information

Dynamics on a General Stage Structured n Parallel Food Chains

Dynamics on a General Stage Structured n Parallel Food Chains Memorial University of Newfoundland Dynamics on a General Stage Structured n Parallel Food Chains Isam Al-Darabsah and Yuan Yuan November 4, 2013 Outline: Propose a general model with n parallel food chains

More information

Research Article Global Existence and Boundedness of Solutions to a Second-Order Nonlinear Differential System

Research Article Global Existence and Boundedness of Solutions to a Second-Order Nonlinear Differential System Applied Mathematics Volume 212, Article ID 63783, 12 pages doi:1.1155/212/63783 Research Article Global Existence and Boundedness of Solutions to a Second-Order Nonlinear Differential System Changjian

More information

Research Article Nonlinear Conjugate Gradient Methods with Wolfe Type Line Search

Research Article Nonlinear Conjugate Gradient Methods with Wolfe Type Line Search Abstract and Applied Analysis Volume 013, Article ID 74815, 5 pages http://dx.doi.org/10.1155/013/74815 Research Article Nonlinear Conjugate Gradient Methods with Wolfe Type Line Search Yuan-Yuan Chen

More information

Introduction to SEIR Models

Introduction to SEIR Models Department of Epidemiology and Public Health Health Systems Research and Dynamical Modelling Unit Introduction to SEIR Models Nakul Chitnis Workshop on Mathematical Models of Climate Variability, Environmental

More information

Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion Control

Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion Control International Journal of Engineering esearch And Management (IJEM) ISSN: 349-58, Volume-5, Issue-6, June 18 Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion

More information

Australian Journal of Basic and Applied Sciences

Australian Journal of Basic and Applied Sciences AENSI Journals Australian Journal of Basic and Applied Sciences ISSN:1991-8178 Journal home page: www.ajbasweb.com A SIR Transmission Model of Political Figure Fever 1 Benny Yong and 2 Nor Azah Samat 1

More information

THE STABILITY AND HOPF BIFURCATION OF THE DENGUE FEVER MODEL WITH TIME DELAY 1

THE STABILITY AND HOPF BIFURCATION OF THE DENGUE FEVER MODEL WITH TIME DELAY 1 italian journal of pure and applied mathematics n. 37 2017 (139 156) 139 THE STABILITY AND HOPF BIFURCATION OF THE DENGUE FEVER MODEL WITH TIME DELAY 1 Jinlan Guan 2 Basic Courses Department Guangdong

More information

Research Article Existence and Uniqueness of Smooth Positive Solutions to a Class of Singular m-point Boundary Value Problems

Research Article Existence and Uniqueness of Smooth Positive Solutions to a Class of Singular m-point Boundary Value Problems Hindawi Publishing Corporation Boundary Value Problems Volume 29, Article ID 9627, 3 pages doi:.55/29/9627 Research Article Existence and Uniqueness of Smooth Positive Solutions to a Class of Singular

More information

Research Article Remarks on the Regularity Criterion of the Navier-Stokes Equations with Nonlinear Damping

Research Article Remarks on the Regularity Criterion of the Navier-Stokes Equations with Nonlinear Damping Mathematical Problems in Engineering Volume 15, Article ID 194, 5 pages http://dx.doi.org/1.1155/15/194 Research Article Remarks on the Regularity Criterion of the Navier-Stokes Equations with Nonlinear

More information

Research Article An Inverse Eigenvalue Problem for Jacobi Matrices

Research Article An Inverse Eigenvalue Problem for Jacobi Matrices Mathematical Problems in Engineering Volume 2011 Article ID 571781 11 pages doi:10.1155/2011/571781 Research Article An Inverse Eigenvalue Problem for Jacobi Matrices Zhengsheng Wang 1 and Baoiang Zhong

More information

Research Article Frequent Oscillatory Behavior of Delay Partial Difference Equations with Positive and Negative Coefficients

Research Article Frequent Oscillatory Behavior of Delay Partial Difference Equations with Positive and Negative Coefficients Hindawi Publishing Corporation Advances in Difference Equations Volume 2010, Article ID 606149, 15 pages doi:10.1155/2010/606149 Research Article Frequent Oscillatory Behavior of Delay Partial Difference

More information

Research Article A New Roper-Suffridge Extension Operator on a Reinhardt Domain

Research Article A New Roper-Suffridge Extension Operator on a Reinhardt Domain Abstract and Applied Analysis Volume 2011, Article ID 865496, 14 pages doi:10.1155/2011/865496 Research Article A New Roper-Suffridge Extension Operator on a Reinhardt Domain Jianfei Wang and Cailing Gao

More information

Research Article Dual-Domain Transform for Travelling Wave in FRFT Domain

Research Article Dual-Domain Transform for Travelling Wave in FRFT Domain International Scholarly Research Network ISRN Applied Mathematics Volume 011, Article ID 161643, 8 pages doi:10.540/011/161643 Research Article Dual-Domain Transform for Travelling Wave in FRFT Domain

More information

Thursday. Threshold and Sensitivity Analysis

Thursday. Threshold and Sensitivity Analysis Thursday Threshold and Sensitivity Analysis SIR Model without Demography ds dt di dt dr dt = βsi (2.1) = βsi γi (2.2) = γi (2.3) With initial conditions S(0) > 0, I(0) > 0, and R(0) = 0. This model can

More information

Research Article Uniqueness Theorems of Difference Operator on Entire Functions

Research Article Uniqueness Theorems of Difference Operator on Entire Functions Discrete Dynamics in Nature and Society Volume 203, Article ID 3649, 6 pages http://dx.doi.org/0.55/203/3649 Research Article Uniqueness Theorems of Difference Operator on Entire Functions Jie Ding School

More information

The Dynamic Properties of a Deterministic SIR Epidemic Model in Discrete-Time

The Dynamic Properties of a Deterministic SIR Epidemic Model in Discrete-Time Applied Mathematics, 05, 6, 665-675 Published Online September 05 in SciRes http://wwwscirporg/journal/am http://dxdoiorg/046/am056048 The Dynamic Properties of a Deterministic SIR Epidemic Model in Discrete-Time

More information

Research Article Chaotic Attractor Generation via a Simple Linear Time-Varying System

Research Article Chaotic Attractor Generation via a Simple Linear Time-Varying System Discrete Dnamics in Nature and Societ Volume, Article ID 836, 8 pages doi:.//836 Research Article Chaotic Attractor Generation via a Simple Linear Time-Varing Sstem Baiu Ou and Desheng Liu Department of

More information

Applications in Biology

Applications in Biology 11 Applications in Biology In this chapter we make use of the techniques developed in the previous few chapters to examine some nonlinear systems that have been used as mathematical models for a variety

More information

Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies

Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies Jun Dai, Xiaoyan Sun, and Peng Liu College of Information Sciences and Technology Pennsylvania State University,

More information

Delay-dependent Stability Analysis for Markovian Jump Systems with Interval Time-varying-delays

Delay-dependent Stability Analysis for Markovian Jump Systems with Interval Time-varying-delays International Journal of Automation and Computing 7(2), May 2010, 224-229 DOI: 10.1007/s11633-010-0224-2 Delay-dependent Stability Analysis for Markovian Jump Systems with Interval Time-varying-delays

More information

Stability of a Numerical Discretisation Scheme for the SIS Epidemic Model with a Delay

Stability of a Numerical Discretisation Scheme for the SIS Epidemic Model with a Delay Stability of a Numerical Discretisation Scheme for the SIS Epidemic Model with a Delay Ekkachai Kunnawuttipreechachan Abstract This paper deals with stability properties of the discrete numerical scheme

More information

Research Article Statistical Tests for the Reciprocal of a Normal Mean with a Known Coefficient of Variation

Research Article Statistical Tests for the Reciprocal of a Normal Mean with a Known Coefficient of Variation Probability and Statistics Volume 2015, Article ID 723924, 5 pages http://dx.doi.org/10.1155/2015/723924 Research Article Statistical Tests for the Reciprocal of a Normal Mean with a Known Coefficient

More information