Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Global stability (2)
- Arbitrary order (1)
- Arterial flow (1)
- Basic reproductive number (1)
- Blood flow (1)
-
- Cryptography (1)
- Decryption (1)
- Discrete wavelet transformation (1)
- Encryption (1)
- Epidemic Model (1)
- Epidemic model (1)
- Fuzzy (1)
- Fuzzy Basic Reproduction number (1)
- Fuzzy Mathematics (1)
- Fuzzy number (1)
- HPM (1)
- Impedance (1)
- Malicious code (1)
- Multi stenosis (1)
- Predator-prey equations (1)
- Random hill cipher (1)
- SLn(F) (1)
- Stress force (1)
- Transcritical bifurcation (1)
- Triangular fuzzy number (1)
- Water-borne disease (1)
Articles 1 - 5 of 5
Full-Text Articles in Life Sciences
The Two-Phase Arterial Blood Flow With Or Without A Catheter And In The Presence Of A Single Or Multi Stenosis, Ani E. Garcia, Daniel N. Riahi
The Two-Phase Arterial Blood Flow With Or Without A Catheter And In The Presence Of A Single Or Multi Stenosis, Ani E. Garcia, Daniel N. Riahi
Applications and Applied Mathematics: An International Journal (AAM)
We consider the problem of blood flow in an artery with or without a catheter and in the presence of single or multi stenosis whose shape is based on the available experimental data for the stenosis in a human’s artery. The presence of stenosis in the artery, which locally narrows portion of the artery, can be a result of fatty materials such as cholesterol in the blood. The use of catheter is important as a standard tool for diagnosis and treatment in patience whose blood flow passage in the artery is affected adversely by the presence of the stenosis within …
Numerical Solution Of Fuzzy Arbitrary Order Predator-Prey Equations, Smita Tapaswini, S. Chakraverty
Numerical Solution Of Fuzzy Arbitrary Order Predator-Prey Equations, Smita Tapaswini, S. Chakraverty
Applications and Applied Mathematics: An International Journal (AAM)
This paper seeks to investigate the numerical solution of fuzzy arbitrary order predator-prey equations using the Homotopy Perturbation Method (HPM). Fuzziness in the initial conditions is taken to mean convex normalised fuzzy sets viz. triangular fuzzy number. Comparisons are made between crisp solution given by others and fuzzy solution in special cases. The results obtained are depicted in plots and tables to demonstrate the efficacy and powerfulness of the methodology.
Spread Of Malicious Objects In Computer Network: A Fuzzy Approach, Bimal K. Mishra, Apeksha Prajapati
Spread Of Malicious Objects In Computer Network: A Fuzzy Approach, Bimal K. Mishra, Apeksha Prajapati
Applications and Applied Mathematics: An International Journal (AAM)
We propose an e-epidemic fuzzy SEIQRS (Susceptible-Exposed-Infectious-Quarantine- Recovered-Susceptible) model for the transmission of malicious codes in a computer network. We have simulated the result for various parameters and analyzed the stability of the model. The efficiency of antivirus software and crashing of the nodes due to attack of malicious code is analyzed. Furthermore, initial simulation results illustrate the behavior of different classes for minimizing the infection in a computer network. It also reflects the positive impact of anti-virus software on malicious code propagation in a computer network. The basic reproduction number R0 f and its formulation is also discussed.
Grayscale-Image Encryption Using Random Hill Cipher Over Sln(F) Associated With Discrete Wavelet Transformation, D. C. Mishra, R. K. R. K. Sharma
Grayscale-Image Encryption Using Random Hill Cipher Over Sln(F) Associated With Discrete Wavelet Transformation, D. C. Mishra, R. K. R. K. Sharma
Applications and Applied Mathematics: An International Journal (AAM)
Image data are highly sensitive and prone to incidental decoding by intruders. The security of image data in an insecure network is therefore a major issue. In this paper, we have presented a novel approach for grayscale-image encryption and decryption using Random Hill cipher over SLn(F) associated with discrete wavelet transformation. Earlier techniques for encryption and decryption of image data discussed missing the keys, but in this approach, both the keys and the arrangement of RHC are emphasized. Additionally, keys multiplication side (pre or post) over a grayscale-image data matrix also inevitable to know, to correctly decrypt the encrypted image …
Global Dynamics Of A Water-Borne Disease Model With Multiple Transmission Pathways, Prasanta K. Mondal, T. K. Kar
Global Dynamics Of A Water-Borne Disease Model With Multiple Transmission Pathways, Prasanta K. Mondal, T. K. Kar
Applications and Applied Mathematics: An International Journal (AAM)
We propose and analyze a water born disease model introducing water-to-person and person-toperson transmission and saturated incidence. The disease-free equilibrium and the existence criterion of endemic equilibrium are investigated. Trans critical bifurcation at the disease-free equilibrium is obtained when the basic reproductive number is one. The local stability of both the equilibria is shown and a Lyapunov functional approach is also applied to explore the global stability of the system around the equilibria. We display the effects of pathogen contaminated water and infection through contact on the system dynamics in the absence of person-to-person contact as well as in the …