Loading...
Search for: immunization
0.07 seconds

    Failure Tolerance of Epidemic Spreading in Complex Network

    , M.Sc. Thesis Sharif University of Technology Mirzasoleiman, Baharan (Author) ; Jalili, Mahdi (Supervisor)
    Abstract
    Complex networks serve as generic models for many social, technological and biological systems that have been shown to share a number of common structural properties such as power-law degree distribution and small-worldness. These networks determine interactions and influence the spread of diseases, behaviours and ideas. Epidemics and failures like new behaviours ideas and innovations can spread throughout a network and prevent it from doing its functionalities. In this work, we investigate error and attack tolerance of epidemic spreading in complex networks. The main content of this thesis is arranged in three sections as follows: Firstly, the effect of random and systematic failures is... 

    Preventing The Spread of Disease in Social Networks

    , M.Sc. Thesis Sharif University of Technology Abnousi, Armen (Author) ; Jafari, Amir (Supervisor)
    Abstract
    In this thesis, first we will have a thorough review on problems and models presented in the field of contagion in networks (spread of diseases, spread of computer viruses,etc.). Then we will investigate the basic model of virus inoculation game with purely selfish players and the modified version of it which takes into account a factor of friendship. We will discuss the results of these models including computing and comparing Nash Equilibria  

    A New Immunization Algorithm Based on Spectral Properties for Complex Networks

    , M.Sc. Thesis Sharif University of Technology Zahedi, Ramin (Author) ; Khansari, Mohammd (Supervisor)
    Abstract
    Vaccination is one of the ways of disease control and prevention, which not only protect individuals against the disease, but also reduce the disease spread rate. Mass vaccination of individuals is not always possible due to the high cost and limitation of immunization resources. Therefore, researchers are always seeking solutions to find the persons that their immunization may have a greater impact in reduction of disease spread rate. The advent of network epidemic models and the possibility of removal the secured nodes in those models, showed that this problem is equivalent to finding a limited set of individuals that their removal will eliminate or minimize the number of people at risk of... 

    Physical Fault Injection Methods for Evaluation of Embedded Processors

    , M.Sc. Thesis Sharif University of Technology Shabahang, Soha (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    In order to ensure the Immunity of integrated circuits against electromagnetic interference, integrated circuits should go under the sensitivity measurement test. This test consists of radiation or directly injecting electromagnetic interference. Injected disturbances are applied, either to the whole device or to one part of the device under test. Standard 62132 describes the specification of the methods for determining the sensitivity in frequencies between 150 kHz to 1 GHz. To provide a method which is capable of implementing and is controllable, it is necessary to study the standard models, and examine and discuss the strengths and weaknesses of each from the point of performance and... 

    A Multilayer Approach to Network Immunization Based on Digital Information

    , M.Sc. Thesis Sharif University of Technology Joneydi, Sara (Author) ; Khansari, Mohammad (Supervisor)
    Abstract
    Researching in the field of optimization of network immunizing and epidemic spreading is an active and important area. According to literature review, influential nodes are detected based on global graph metrics such as centrality measures. On the other hand, when a network infrastructure is not available and a direct or straight path between source and destination may not be accessible, one can use opportunistic networks routing protocols in Delay Tolerant Networks to recognize influential users is an appropriate approach. In this work, we use a real world three layer dataset which consists of digital data (social relations and Bluetooth contact traces) of individuals. We convert the real...