In this paper, we propose and analyze a Susceptible-Vaccinated-Exposed-Infected-Recovered (SVEIR) type infectious disease model with imprecise parameters. Introducing the interval numbers in functional form, the SVEIR...
详细信息
In this paper, we propose and analyze a Susceptible-Vaccinated-Exposed-Infected-Recovered (SVEIR) type infectious disease model with imprecise parameters. Introducing the interval numbers in functional form, the SVEIR model is proposed and formulated. The existence of possible equilibrium points with their feasibility criteria and an explicit value of basic reproduction number is obtained. The asymptotic stability of the system at different equilibrium points are also discussed. Next by considering treatment and vaccination as two control parameters, an optimal control problem is formulated and solved. Finally, some computer simulation works are given in support of our analytical results.
Presently, fuzzy graph theory has wide applications in engineering and social networks. Based on the applications, different types of fuzzy graphs are defined. Among them the competition graph is significantly used to...
Presently, fuzzy graph theory has wide applications in engineering and social networks. Based on the applications, different types of fuzzy graphs are defined. Among them the competition graph is significantly used to model ecological problems. This graph is one kind of intersection graph. Different competitions of real world have been designed by fuzzy competition graphs. One generalization of fuzzy competition graph, called $$m$$ -step fuzzy competition graph, is defined in this paper. Some related fuzzy graphs including fuzzy $$m$$ -step neighbourhood graph, fuzzy economic competition graphs and fuzzy $$m$$ -step economic competition graphs are introduced. Some properties of these new graphs have been investigated.
Fuzzy competition graph as the generalization of competition graph is introduced here. A generalization of fuzzy competition graph known as fuzzy k-competition graph is also defined. These graphs are related to fuzzy ...
详细信息
Fuzzy competition graph as the generalization of competition graph is introduced here. A generalization of fuzzy competition graph known as fuzzy k-competition graph is also defined. These graphs are related to fuzzy digraphs. Fuzzy neighbourhood graphs, which are related to fuzzy graphs are defined here. Some relations between fuzzy competition graphs and fuzzy neighbourhood graphs have been established. Also several results to find strong edges of the stated graphs are obtained.
Interval-valued fuzzy threshold graph is an extension of fuzzy threshold graph. In this paper, interval-valued fuzzy threshold graph, interval-valued fuzzy alternating 4-cycle, and interval-valued fuzzy threshold dime...
详细信息
Interval-valued fuzzy threshold graph is an extension of fuzzy threshold graph. In this paper, interval-valued fuzzy threshold graph, interval-valued fuzzy alternating 4-cycle, and interval-valued fuzzy threshold dimension are defined, and certain properties are studied. It is demonstrated that every interval-valued fuzzy threshold graph can be treated as an interval-valued fuzzy split graph.
SYNOPTIC ABSTRACT: In this research article, a wholesaler-retailer supply chain model is developed for a seasonal deteriorating item where demand of the item increases with time at the beginning of season, reaches a m...
详细信息
Since the last few decades, the prey-predator system delivers attractive mathematical models to analyse the dynamics of prey-predator interaction. Due to the lack of precise information about the natural parameters, a...
详细信息
In this paper, we propose a dual-image based reversible data hiding scheme. Here, we divide a secret message into sub-stream of size n bits, where n-1 bits are embedded using Pixel Value Differencing (PVD) and 1 bit i...
详细信息
In this paper, we propose a dual-image based reversible data hiding scheme. Here, we divide a secret message into sub-stream of size n bits, where n-1 bits are embedded using Pixel Value Differencing (PVD) and 1 bit is embedded using Difference Expansion (DE). We consider two consecutive pixels from cover image, calculate the difference between them andthen embed n-1 bits secret message by modifying the pixel pair. Again, we consider that modified pixel pair to embed 1 bit secret message using embedding function. After that, we distribute these two stego pixel pairs among dual image depending on a shared secret key bit stream. At the receiver end, we extract the secret message successfully and recover original cover image from dual stego image without any distortion. Finally, we compare our scheme with other state-of-the-art methods and obtain reasonably better performance in terms of data embedding capacity.
Visual Cryptography (VC) is a technique to encrypt a secret image into transparent shares such that stacking a sufficient number of shares reveals the secret image without any computation. Cheating is possible in the ...
详细信息
Visual Cryptography (VC) is a technique to encrypt a secret image into transparent shares such that stacking a sufficient number of shares reveals the secret image without any computation. Cheating is possible in the Visual Cryptographic Schemes (VCS) by dishonest or malicious participant called a cheater, may provide a Fake Share (FS) to cheat the other participants. To achieve cheating prevention in VC we have proposed a steganographic scheme to embed a secret message in each of the shares in random location during share generation phase called stego share. Before stacking receiver can extract hidden message from stego share for checking authentication of shares. In this method no verification share is required to prevent cheating in VC.
The objective of this paper is to develop a new solution methodology for matrix games, in which goals are viewed as intuitionistic fuzzy sets (IFSs) and the elements of the pay-off matrix are represented by triangular...
详细信息
The objective of this paper is to develop a new solution methodology for matrix games, in which goals are viewed as intuitionistic fuzzy sets (IFSs) and the elements of the pay-off matrix are represented by triangular intuitionistic fuzzy numbers (TIFNs). In this methodology, a suitable ranking function is defined to establish an order relation between two TIFNs, and the concept of intuitionistic fuzzy (I-fuzzy) inequalities is interpreted. Utilizing these inequality relations and ranking functions, a pair of linear programming models is derived from a pair of auxiliary intuitionistic fuzzy programming models. Based on the aspiration levels, this pair of linear programming models is solved to determine the optimal strategies for both players of the game. The proposed method in this paper is illustrated with a voting share problem to demonstrate the validity and applicability of the method.
In this work, a new similarity measure was proposed based on the heights and areas of interval-valued trapezoidal fuzzy numbers. Some properties corresponding to the proposed similarity measure were illustrated. A com...
详细信息
In this work, a new similarity measure was proposed based on the heights and areas of interval-valued trapezoidal fuzzy numbers. Some properties corresponding to the proposed similarity measure were illustrated. A comparison with the different existing similarity-measurement techniques demonstrated that the proposed method gave better results, overcoming the drawbacks of the existing methods. The proposed similarity-measurement technique was applied to the prediction of risk in the burning problem of Familial Breast Cancer (FBC). Finally, a numerical illustration for FBC was given using interval-valued trapezoidal fuzzy numbers.
暂无评论