JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2016, Vol. 51 ›› Issue (11): 107-114.
Previous Articles Next Articles
LIANG Lei, LIU Gui-rong*
CLC Number:
[1] 靳祯, 孙桂全, 刘茂省. 网络传染病动力学建模与分析[M]. 北京: 科学出版社, 2014. JIN Zhen, SUN Guiquan, LIU Maoxing. Modelling and analysis of epidemic spreading on networks[M]. Beijing: Science Press, 2014. [2] YASHIMA K, SASAKI A. Epidemic dynamics of infectious disease in metropolitan area and its optimal intervention strategy[J]. IFAC-Papers OnLine, 2015, 48(18):136-140. [3] KUMAR M, MISHRA B K, PANDA T C. Stability analysis of a quarantined epidemic model with latent and breaking-out over the internet[J]. International Journal of Hybrid Information Technology, 2015, 8(7): 133-148. [4] CHAKRABARTI D, WANG Y, WANG C, et al. Epidemic thresholds in real networks[J]. ACM Transactions on Information and System Security, 2008, 10(4):1-26. [5] VAN MIEGHEM P, OMIC J, KOOIJ R. Virus spread in networks[J]. Networking, IEEE/ACM Transactions on, 2009, 17(1):1-14. [6] KISS I Z, CASSELL J, RECKER M, et al. The impact of information transmission on epidemic outbreaks[J]. Mathematical Biosciences, 2010, 225(1):1-10. [7] HATZOPOULOS V, TAYLOR M, SIMON P L, et al. Multiple sources and routes of information transmission: implications for epidemic dynamics[J]. Mathematical Biosciences, 2011, 231(2):197-209. [8] SHAKERI H, SAHNEH F D, SCOGLIO C, et al. Optimal information dissemination strategy to promote preventive behaviours in multilayer epidemic networks[J]. Math Biosc Eng, 2015, 12(3):609-623. [9] SAHNEH F D, SCOGLIO C M. Epidemic spread in human networks[C] // Decision and Control and European Control Conference(CDC-ECC), 2011 50th IEEE Conference on. New York: IEEE, 2011. [10] SAHNEH F D, SCOGLIO C M. Optimal information dissemination in epidemic networks[C] // Decision and Control(CDC), 2012 IEEE 51st Annual Conference on. New York: IEEE, 2012. |
[1] | GAO Rui-mei, CHU Ying. Freeness of arrangements between the Weyl arrangements of types An-1 and Bn [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(6): 70-75. |
[2] | ZHANG Qian, LI Hai-yang. The iterative fraction thresholding algorithm in sparse information processing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 76-82. |
[3] | SHI Zhang-lei, LI Wei-guo. A† graded hard thresholding pursuit algorithm [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(8): 58-64. |
[4] | WANG Ya-qi, WANG Jing. Rumor spreading on dynamic complex networks with curious psychological mechanism [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 99-104. |
[5] | ZHANG Dao-xiang, HU Wei, TAO Long, ZHOU Wen. Dynamics of a stochastic SIS epidemic model with different incidences and double epidemic hypothesis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 10-17. |
[6] | ZHU Xi, DONG Xi-shuang, GUAN Yi, LIU Zhi-guang. Sentiment analysis of Chinese Micro-blog based on semi-supervised learning [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(11): 37-42. |
[7] | CHEN Gui-ying. Stability analysis of generalized fuzzy bidirectional associative #br# memory networks with thresholds [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(1): 80-85. |
[8] | ZHAO Xiu-feng, WANG Ai-lan, WANG Xiang. Threshold scheme for LWE inversion [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(07): 34-37. |
[9] | WU Fang-lan1, ZUO Lian-cui2*. Equitable colorings of a special class of Cartesian products of graphs [J]. J4, 2013, 48(4): 20-24. |
[10] | MA Yan, LIU Jian-wei, ZHANG Yu-fei. Threshold signature-based lightweight clustering handover scheme for Ad hoc networks [J]. J4, 2012, 47(11): 78-82. |
[11] | SUN Jing-Yun. Absolute ruin for the compound Piosson risk model with a threshold dividend strategy [J]. J4, 2010, 45(3): 105-110. |
[12] | ZHU Yi,DAI Tao,ZHANG Xian-feng . A state-tree based (t, n) secret sharing scheme [J]. J4, 2008, 43(9): 68-72 . |
[13] | HUA Zhao-xiu,NIU Ming-fei . A threshold dividend strategy in a risk model with inter-claim-dependent claim sizes [J]. J4, 2008, 43(10): 91-96 . |
[14] | XU Yan,YU Jia,LI Da-xing . An ID-based proactive threshold blind signature scheme [J]. J4, 2008, 43(1): 55-59 . |
[15] | LI Guo-wei,LI Ru-peng and LI Da-xing . Analysis and improvement of Wang threshold signature scheme [J]. J4, 2007, 42(1): 55-58 . |
|