In this paper, we propose and analyze a Susceptible-Vaccinated-Exposed-Infected-Recovered (SVEIR) type infectious disease model with imprecise parameters. Introducing the interval numbers in functional form, the SVEIR...
详细信息
In this paper, we propose and analyze a Susceptible-Vaccinated-Exposed-Infected-Recovered (SVEIR) type infectious disease model with imprecise parameters. Introducing the interval numbers in functional form, the SVEIR model is proposed and formulated. The existence of possible equilibrium points with their feasibility criteria and an explicit value of basic reproduction number is obtained. The asymptotic stability of the system at different equilibrium points are also discussed. Next by considering treatment and vaccination as two control parameters, an optimal control problem is formulated and solved. Finally, some computer simulation works are given in support of our analytical results.
The principle of network construction and the principle of request signals service of Secondary surveillance radar systems predetermined the work of the respondents of the considered systems in conditions of intra-sys...
详细信息
The purpose of this study is the development of the method of activity of ontology-based intelligent agent (OBIA) for evaluating the software requirements specifications (SRS). OBIA works on the basis of the developed...
详细信息
The purpose of this study is the development of the method of activity of ontology-based intelligent agent (OBIA) for evaluating the software requirements specifications (SRS). OBIA works on the basis of the developed method, and evaluates the sufficiency of information in the SRS for assessing the non-functional software features - provides the conclusion and the numerical evaluation of the level of sufficiency of information in the SRS for assessment of non-functional features.
This research is aimed at improving electric power supply reliability at major industrial plants by applying schematic design solutions. The authors analyzed the features of branch electric power distribution systems ...
This research is aimed at improving electric power supply reliability at major industrial plants by applying schematic design solutions. The authors analyzed the features of branch electric power distribution systems at a metallurgical plant; considered options of their revamping to improve reliability of electric power supply; carried out experimental research on splitting 110 kV meshed system at the integrated iron and steel works. When performing the research, mathematical simulation methods and full-scale experiment methods were used. Following the research, we proposed three options to revamp the power grid at the industrial plant applying schematic design solutions: Scheme A - separating substations, causing problems, in an individual block; Scheme B - separating independent 110 kV closed electric power grids; Scheme C – splitting the meshed system into two independent circuits. It is proved that the most efficient solution is Scheme C, which is characterized by a lower number of unscheduled downtimes of the facilities by mitigating the effects of faults in one of meshed systems on a continuous operation of shops powered from the neighboring grid; eliminated risks of simultaneous stops of all or the majority of metallurgical shops of the works during short circuits in 110 kV grids; and a considerable reduction in short circuit currents and active losses in 110 kV industrial grids. An aggregate benefit from the proposed measures aimed at revamping of the electrical grid of metallurgical units by applying schematic design solutions is over USD750,000/year.
This paper describes the development of an auto-active verification technique in the Frama-C framework. We outline the lemma functions method and present the corresponding ACSL extension, its implementation in Frama-C...
详细信息
ISBN:
(纸本)9781728112763;9781728112756
This paper describes the development of an auto-active verification technique in the Frama-C framework. We outline the lemma functions method and present the corresponding ACSL extension, its implementation in Frama-C, and evaluation on a set of string-manipulating functions from the Linux kernel. We illustrate the benefits our approach can bring concerning the effort required to prove lemmas, compared to the approach based on interactive provers such as Coq. Current limitations of the method and its implementation are discussed.
A numerical study on the flow over a square cylinder in the vicinity of a wall is conducted for different Couette-Poiseuille-based non-uniform flow with the non-dimensional pressure gradient P varying from 0 to 5. The...
详细信息
In this paper, we investigate the effects on prey of two predators which are also related in terms of prey-predator relationship. Different types of functional responses are con- sidered to formulate the mathematical ...
详细信息
In this paper, we investigate the effects on prey of two predators which are also related in terms of prey-predator relationship. Different types of functional responses are con- sidered to formulate the mathematical model for predator and generalist predator of our proposed model. Harvesting effort for the generalist predator is considered and the density-dependent mortality rate for predator and generalist predator is incorporated in our proposed model. Local stability as well as global stability for the system is dis- cussed. We analyze the different bifurcation parameters to evaluate Hopf bifurcation in the neighborhood of interior equilibrium point. Finally, some numerical simulations and graphical figures are provided to verify our analytical results with the help of different sets of parameters.
The paper proposes the architecture of distributed multilevel detection system of malicious software in local area networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilev...
详细信息
The paper proposes the architecture of distributed multilevel detection system of malicious software in local area networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilevel. This allows you to use it autonomously. In addition, the feature of autonomous program modules of the system is the same organization, which allows the exchange of knowledge in the middle of the system, which, unlike the known systems, allows you to use the knowledge gained by separate parts of the system in other parts. The developed system allows to fill it with subsystems of detection of various types of malicious software in local area networks.
Formal methods (in a broad sense) have been around almost since the beginning of computer science. Nonetheless, there is a perception in the formal methods community that take-up by industry is low considering the pot...
详细信息
This paper describes the development of an auto-active verification technique in the Frama-C framework. We outline the lemma functions method and present the corresponding ACSL extension, its implementation in Frama-C...
详细信息
暂无评论