999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Spatio-Temporal Dynamics and Structure Preserving Algorithm for Computer Virus Model

2021-12-14 09:57:04NaumanAhmedUmbreenFatimaShahzaibIqbalAliRazaMuhammadRafqMuhammadAzizurRehmanShehlaSaeedIlyasKhanandKottakkaranSooppyNisar
Computers Materials&Continua 2021年7期

Nauman Ahmed,Umbreen Fatima,Shahzaib Iqbal,Ali Raza,Muhammad RafqMuhammad Aziz-ur-Rehman,Shehla Saeed,Ilyas Khan and Kottakkaran Sooppy Nisar

1Department of Mathematics and Statistics,The University of Lahore,Lahore,Pakistan

2Department of Mathematics,University of Management and Technology,Lahore,Pakistan

3Department of Mathematics,National College of Business Administration and Economics,Lahore,Pakistan

4Department of Mathematics,Faculty of Sciences,University of Central Punjab,Lahore,Pakistan

5Faculty of Mathematics and Statistics,Ton Duc Thang University,Ho Chi Minh,72915,Vietnam

6Department of Mathematics,College of Arts and Sciences at Wadi Aldawaser,Prince Sattam Bin Abdulaziz University,Alkharj,Saudi Arabia

Abstract: The present work is related to the numerical investigation of the spatio-temporal susceptible-latent-breaking out-recovered (SLBR) epidemic model.It describes the computer virus dynamics with vertical transmission via the internet.In these types of dynamics models, the absolute values of the state variables are the fundamental requirement that must be fulfilled by the numerical design.By taking into account this key property,the positivity preserving algorithm is designed to solve the underlying SLBR system.Since,the state variables associated with the phenomenon, represent the computer nodes,so they must take in absolute.Moreover,the continuous system(SLBR)acquires two steady states i.e.,the virus-free state and the virus existence state.The stability of the numerical design, at the equilibrium points, portrays an exceptional aspect about the propagation of the virus.The designed discretization algorithm sustains the stability of both the steady states.The computer simulations also endorse that the proposed discretization algorithm retains all the traits of the continuous SLBR model with spatial content.The stability and consistency of the proposed algorithm are verified, mathematically.All the facts are also ascertained by numerical simulations.

Keywords: Spatio-temporal; computer virus model; discretization; positive solution; computer simulations

1 Introduction

A computer virus is a program that can be spread out among the computers and networks by replicating itself.These viruses are deleterious for computer software as well as hardware.The message of removing all the files on your system is a clear indication of the virus attack.The virus can reproduce itself by operating on some other programs like an epidemic disease [1].The motive behind developing the malware is to contaminate the systems, destruction of computer hardware, and stealing of significant data.In this way, the hackers get administrative control of the system [2].They design such viruses with the malevolent intention to victimize online users by setting a trap for them.A virus infects the computer when malware runs on the system.They use many techniques to make the program run by the user.When someone opens the file, the virus attaches to it or hides in the form of codes that runs, automatically.When someone receives an infected file by email or from the internet while downloading the other files and the virus code becomes active, when the file is opened.In this way, the virus can make replicas of itself on a computer disk, on other files and can change the setting of the computers.Boot sector virus, direct action virus, resident virus, parasitic virus (file virus), multipartite virus, polymorphic virus, and macro viruses are some of the common computer viruses.The viruses not only corrupt or remove the data but can also harm the economy by interrupting trade activities.It is a common fact about the viruses that they can remove or corrupt everything on the hard drive.This is a serious issue, but a strong backup can resolve this problem.Some side-effects are more serious, for instance during working hours the virus prevents systems from functioning and gives a shutdown command to the device, resulting in economic loss.Some viruses interrupt the business activities, for instance, Melissa or Explore Zip, can block or destroy the server by generating a lot of unnecessary emails.Sometimes companies detect and respond to the risk by shutting down their mail servers to avoid the situation.When a system becomes infected, it shows unusual behavior such as low performance, automatic multiplication of the files, and the self-running of the program files, etc.Moreover, the files and folders become corrupted and the hard disk produces sounds.Now, people can get information more quickly than ever before, by the internet.The pitfall that has also arisen, is the harmful computer codes, which access the systems by different modes.The risk of virus spread has increased by the use of the internet and it is a major threat to internet users [3].In the recent past, most of the viruses were propagated by floppy or compact disks.So, the role of the user in spreading the virus was obvious.Moreover, the side effects of the virus were so clear that everyone could adopt safety and precautionary measures.Now, the extensive use of the internet has changed the scenario by rapid sharing of the software.So, the propagation of any virus via the internet is very easy.Anyone can download a program easily from a website.So, the parasitic (file) viruses can rapidly grow by the widespread usage of the net.The micro viruses can seriously affect the documents.The internet users download the documents, spreadsheets, or files in routine and exchange them by email.A computer is infected either by downloading the file or by email.A computer virus works in two ways, the first one is instant replication when it runs on a susceptible computer and the second one remains inactive.In other words, the infected program needs to be run for its activation.Consequently,it is highly important to stay protected from viruses by installing a robust antivirus program.Only the end-users of the internet are safe.Some hackers make websites for targeting web servers.It is a common strategy to send a large number of requests on the webserver which slow down or crash it.When this happens, the candid user can no longer be able to get access to the website which is hosted by the server.It is worth mentioning that malicious computer viruses have become a great peril to the community.Since they acquire data and damage the parts of the computer like the hard drive and motherboard.To understand the dynamics of the computer virus, the mathematical epidemic models play an imperative role [4–9].Numerous researchers suggested different mathematical models for explaining the virus communication through different mediums [10–14].Here, the spatially-structured computer virus model is studied analytically and numerically [15,16].

The initial conditions are of the form

and the boundary conditions are

Also,S+L+B≤1.

Here, the quantitySdescribes the susceptible computers at timetand spacex, that can be infected from virus,LandBrepresent the latent and the breaking out computers at timetand spacex.The parameterμis the rate at which the computers are connected and withdrawn from the internet.The parametersβ,γand?are transmission rate, recovery rate and latent to breaking out rate respectively.The nonnegative constant value ofαis the rate at which recovered computers become susceptible again.This study is about the numerical investigation of the computer virus epidemic model with diffusion in one space dimension.The motive behind this study is to design a reliable numerical algorithm that preserves all the core structure of the continuous computer virus epidemic model.In the literature, various researchers have designed many structure-preserving numerical techniques and applied them to solve the various dynamical systems belonging to different areas of science and engineering [17–21].The appearance of chaotic behavior in graphical solutions by using a numerical technique whereas this chaos is not the part of the physical system under study is called the contrived chaos.The algorithm proposed in this manuscript not only eliminates this type of contrived chaos but also retains the positive behavior of the solution to the model (1)–(3).

2 Steady States of the System

This section is meant for the steady states of the model.The steady states of a dynamical system have a decisive role in describing the stability of the system as well as of the algorithm.There are two states of the computer virus epidemic model, virus-free state (VFS) and virus persistence state (VPS).VFS is E1=(S0,L0,B0)=(1,0,0).

VPS is

R?=wheredS=dL=dB=0.R?is the basic reproductive value of underlying system (1)–(3).

3 Numerical Methods

In this portion, the proposed numerical design will be presented.To construct the algorithm,we divide [0,L]×[0,T] intoM×N, with step sizes Δx=and Δt=The nodal points for both the domains i.e., space and time, are considered as,xn=nΔx,n∈{0,1,...,M},tj=jΔt,j∈{0,1,...,N}.

anddenote the FD approximations ofS(nΔx,jΔt),L(nΔx,jΔt)andB(nΔx,jΔt)respectively.

Now, the proposed FD scheme for (3) is developed on the basis of the rules presented by Micken [22] as follows;

After some computations, we have

In a similar way, we have

and

4 Stability of the Proposed Scheme

This section is devoted to validate the stability of the proposed algorithm (5)–(7) by using Von Neumann stability criteria.

Theorem:The proposed algorithm (5)–(7) is Von Neumann stable.

Proof.Substituting=η(t)eiζxin the proposed algorithm (4) and then linearizing, we have

After some computations, we have,

From the above expression, it is clear that the approximation algorithm (5) is Von Neumann stable.In a similar fashion, it can be observed that the approximate algorithms (6) and (7) are also Von Neumann stable.

5 Consistency of the Proposed Scheme

In this section, we verify that the proposed algorithms (5)–(7) are consistent.For this, we apply the Taylor series expansion onandas follows:

First, we consider the finite difference approximation algorithm (4) for the consistency of the proposed numerical scheme,

After inserting Δt= Δx3and Δx→0, the above equation coincides with (1).The similar procedure can be adopted to show that the finite difference approximation algorithms (6) and (7)are consistent.

6 Positivity of the Scheme

In this section, we present a result which shows that the proposed algorithm unconditionally retains the positivity of the computer virus model.

Theorem:The proposed algorithms (5)–(7) provide the positive solutions which are exhibited by the continuous system (1)–(3) under the non-negative initial functionsφi,i=1,2,3.

Proof:It is clear that the valuesφi≥0, ?i∈{1,2,3} withS+L+B≤1.Also, no negative term is associated on the right hand side of algorithms (5)–(7).This proves the theorem.

7 Numerical Experiment

The following values of parameters [15,16] are used in numerical experiments.

7.1 Experiment 1

In the first experiment, the following initial conditions are supposed.

From Fig.1 it can be noticed that the maximum number of susceptible computers, latent computers, and infected computers are concentrated at the center of the domain value [0,1] and decreases linearly to zero at the cornersx=0 andx=1.

Figure 1:The initial dispersion of (a) susceptible computers, (b) latent computers and (c) breaking out computers

7.2 Disease Free Equilibrium

In this part, the graphical solutions of the proposed algorithm are examined against the parametric values taken in such a way that the value Ncvis less than one i.e., virus free state.

In Fig.2 we consider the values of the parameters describing VFS as mentioned in Tab.1.The graphical representations reveal that the proposed algorithm demonstrates the positive behavior of the state variablesS,LandB.Also, the algorithm under discussion attains the stability of VFS as these graphs converge to(1,0,0).

Figure 2:The graphical representation of (a) susceptible class of computers, (b) latent class of computers, (c) breaking out class of computers

Table 1:Parameters values

7.3 Endemic Equilibrium

This section is devoted to perform the graphical solutions of the proposed algorithm against the values that make Ncvis greater than one i.e., virus persistence state.

Fig.3 elaborates the solution behavior ofS(x,t),L(x,t)andB(x,t)using designed algorithm for the state when virus exists in the computer population.Again, the computer simulations illustrate that the designed algorithm holds all the important properties of the SLBR model under discussion.

Figure 3:The graphical representation of (a) susceptible class of computers, (b) latent class of computers, (c) breaking out class of computers

8 Conclusion

The spatio-temporal computer virus epidemic model is proposed and studied, numerically.The algorithm proposed for the SLBR model is developed with the aid of the rules developed by Mickens.The consistency and the stability of the designed algorithm are confirmed with the Taylor series expansion and the Von Neumann criteria.The unknown variables of the SLBR model exhibit the computer population, so it is the basic property of the solutions to be positive.A theorem is presented which verifies that the underlying algorithm preserves positivity.The computer simulations demonstrate that the proposed numerical algorithm describes the consistent behavior with the continuous SLBR system.In the future, the current algorithm may be applied to solve the multidimensional reaction-diffusion systems.Furthermore, this numerical scheme may be applied to epidemic reaction-diffusion systems with time delay and predator-prey models with spatial content.

Funding Statement:The author(s) received no specific funding for this study.

Conficts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 精品人妻无码区在线视频| 国内a级毛片| a级毛片毛片免费观看久潮| 成年人国产视频| 亚洲大学生视频在线播放| 国产成人无码久久久久毛片| 成人国产精品2021| 激情网址在线观看| 91黄视频在线观看| 亚洲国产天堂久久综合| 狠狠色噜噜狠狠狠狠色综合久| 久久亚洲高清国产| 视频国产精品丝袜第一页| 久久天天躁夜夜躁狠狠| 久久99国产精品成人欧美| 国产成人综合欧美精品久久| 三上悠亚在线精品二区| 亚洲品质国产精品无码| 18禁不卡免费网站| 精品国产www| 中文字幕 91| 国产激情无码一区二区三区免费| 亚洲精品日产AⅤ| 国内精品一区二区在线观看| 国产美女精品一区二区| 粉嫩国产白浆在线观看| 美女被操91视频| 91九色国产在线| 九九热免费在线视频| 久久国产精品电影| 免费看a毛片| 成人中文字幕在线| 视频二区亚洲精品| 国产乱人免费视频| 国产成人免费| 精品国产一区二区三区在线观看| 久久黄色免费电影| 亚洲a级毛片| 欧美激情成人网| 久久性视频| 久久婷婷六月| AV不卡国产在线观看| av天堂最新版在线| 国产在线拍偷自揄观看视频网站| 国产精品开放后亚洲| 91麻豆精品国产高清在线| 国产女人在线视频| 亚洲男人的天堂网| 啊嗯不日本网站| 日本午夜在线视频| 久久久久国产一级毛片高清板| 久久久久久尹人网香蕉| 久久毛片免费基地| 午夜人性色福利无码视频在线观看| 狠狠ⅴ日韩v欧美v天堂| 中文字幕在线观| 中文字幕伦视频| 日本精品影院| 亚洲h视频在线| 永久免费av网站可以直接看的 | 国产欧美视频综合二区 | 波多野结衣第一页| 国产91色在线| 欧美影院久久| 无码免费的亚洲视频| 亚洲欧美一级一级a| 九九这里只有精品视频| 成人免费视频一区二区三区 | 91精品综合| 国产剧情一区二区| 日韩欧美中文亚洲高清在线| 国产亚洲视频播放9000| 国产乱子伦无码精品小说| 日本91视频| 久久semm亚洲国产| 国产午夜精品一区二区三| 在线免费观看AV| 丝袜高跟美脚国产1区| 色噜噜在线观看| 99激情网| 国产91高跟丝袜| 亚洲精品成人福利在线电影|