Loading...
Search for: immunization
0.006 seconds
Total 61 records

    Global existence and boundedness of classical solutions to the Owen-Sherratt model

    , Article Asian-European Journal of Mathematics ; Volume 9, Issue 1 , 2016 ; 17935571 (ISSN) Baghaei, K ; Hesaaraki, M ; Sharif University of Technology
    World Scientific Publishing Co. Pte Ltd  2016
    Abstract
    In this paper, we study the mathematical model proposed by Owen and Sherratt in 1997. We prove that the classical solutions to this model are uniformly-in-time bounded. © World Scientific Publishing Company  

    Network immunization under limited budget using graph spectra

    , Article International Journal of Modern Physics C ; Volume 27, Issue 8 , 2016 ; 01291831 (ISSN) Zahedi, R ; Khansari, M ; Sharif University of Technology
    World Scientific Publishing Co. Pte Ltd 
    Abstract
    In this paper, we propose a new algorithm that minimizes the worst expected growth of an epidemic by reducing the size of the largest connected component (LCC) of the underlying contact network. The proposed algorithm is applicable to any level of available resources and, despite the greedy approaches of most immunization strategies, selects nodes simultaneously. In each iteration, the proposed method partitions the LCC into two groups. These are the best candidates for communities in that component, and the available resources are sufficient to separate them. Using Laplacian spectral partitioning, the proposed method performs community detection inference with a time complexity that rivals... 

    Higher prevalence of asymptomatic or mild COVID-19 in children, claims and clues

    , Article Journal of Medical Virology ; Volume 92, Issue 11 , May , 2020 , Pages 2257-2259 Miri, S. M ; Noorbakhsh, F ; Mohebbi, S. R ; Ghaemi, A
    John Wiley and Sons Inc  2020

    Investigation of intestinal enzyme activity and effects of non-starch polysaccharide on it

    , Article International Journal of Engineering and Technology(UAE) ; Volume 7, Issue 4 , 2018 , Pages 23-27 ; 2227524X (ISSN) Piryaei, M ; Motamedi, A ; Mehrabi Far, A ; Sharif University of Technology
    Science Publishing Corporation Inc  2018
    Abstract
    Background and Purpose: Shigella is a human shigellosis and its lipopolysaccharide is identified by 4TLR. The 4TLR is a family of pseudo-TOLL receptors and many immune routes are triggered by stimulating these receptors. Many studies show increasing of 4TLR expression in Mesenchyme stem cells under the influence of lipopolysaccharide. The main objective of this study was to identify the appropriate lipopolysaccharide of Shigella strains by stimulating the immune system for vaccine studies. Materials and Methods: In this experimental study, the stem cell of human Mesenchymal derived from bone marrow was treated by three dilution of 0.1, 0.01, and 0.001 extract of Shigella strains (Flexneri,... 

    An opportunistic network approach towards disease spreading

    , Article 6th International Conference on Complex Networks and Their Applications, Complex Networks 2017, 29 November 2017 through 1 December 2017 ; Volume 689 , November , 2018 , Pages 314-325 ; 1860949X (ISSN) ; 9783319721491 (ISBN) Joneydi, S ; Khansari, M ; Kaveh, A ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    Research in modeling epidemic spreading in static networks has reached maturity in recent years. On the contrary, disease spreading in dynamic networks can be considered as an important open issue. Hence, mapping dynamic interactions of crowds to a static network and then immunizing the resulting network is the subject of this paper. In this work, we analogize spreading of diseases in dynamic networks -based on dynamic interactions- to message delivery in opportunistic networks. Thus, different diseases which have different spreading behaviors could be simulated by specific routing protocols. Having used interactions among individuals in the utilized dataset, the resulting network is... 

    A bio-inspired method for hardware Trojan detection

    , Article 2017 19th International Symposium on Computer Architecture and Digital Systems, CADS 2017 ; Volume 2018-January , 8 March , 2018 , Pages 1-2 ; 9781538643792 (ISBN) Farajipour Ghohroud, N ; Hessabi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Outsourcing the ICs for manufacturing introduces potential security threats such as hardware Trojans (HTs). In this paper, we propose hardware-based artificial immune system for solving this problem. This system uses a biologically-inspired technique which makes it attractive for using in computer security systems. Using our proposed method, the probability of HT detection can reach 100 percent, and the system can be made immune against HTs. © 2017 IEEE  

    Symbiotic evolution to avoid linkage problem

    , Article Studies in Computational Intelligence ; Volume 157 , 2008 , Pages 285-314 ; 1860949X (ISSN) ; 9783540850670 (ISBN) Halavati, R ; Bagheri Shouraki, S ; Sharif University of Technology
    2008
    Abstract
    In this chapter, we introduce Symbiotic Evolutionary Algorithm (SEA) as a template for search and optimization based on partially specified chromosomes and symbiotic combination operator. We show that in contrast to genetic algorithms with traditional recombination operators, this template will not be bound to linkage problems. We present three implementations of this template: first, as a pure algorithm for search and optimization, second, as an artificial immune system, and third, as an algorithm for classifier rule base evolution, and compare implementation results and feature lists with similar algorithms. © 2008 Springer-Verlag Berlin Heidelberg  

    An artificial immune system with partially specified antibodies

    , Article 9th Annual Genetic and Evolutionary Computation Conference, GECCO 2007, London, 7 July 2007 through 11 July 2007 ; Pages 57-62 , 2007 ; 9781595936974 (ISBN) Halavati, R ; Bagheri ShourakiS, S ; Jalali Heravi, M ; Jafari Jashmi, B ; Sharif University of Technology
    2007
    Abstract
    Artificial Immune System algorithms use antibodies which fully specify the solution of an optimization, learning, or pattern recognition problem. By being restricted to fully specified antibodies, an AIS algorithm can not make use of schemata or classes of partial solutions. This paper presents a symbiotic artificial immune system (SymbAIS) algorithm which is an extension of CLONALG algorithm. It uses partially specified antibodies and gradually builds up building blocks of suitable sub-antibodies. The algorithm is compared with CLONALG on multimodal function optimization and combinatorial optimization problems and it is shown that it can solve problems that CLONALG is unable to solve.... 

    Immune-based selection of pilot nodes for secondary voltage control

    , Article European Transactions on Electrical Power ; Volume 20, Issue 7 , 2010 , Pages 938-951 ; 1430144X (ISSN) Amraee, T ; Ranjbar, A. M ; Feuillet, R ; Sharif University of Technology
    2010
    Abstract
    Secondary voltage control is used to re-adjust the reference values of automatic voltage regulators of generators. The performance of the secondary voltage control strongly depends on pilot node selection. In this paper the two proposed control laws for secondary voltage control are discussed and then an immune based algorithm is proposed to solve the optimal pilot node selection problem. The proposed algorithm is based on the clonal selection theory. The merit of immune algorithm lies in pattern recognition and memorization capabilities. Also, to provide independency of electrical zones a decoupling factor based on electrical distance concept is proposed. To verify the network observability... 

    A Prevention Strategy Against Rumor Spreading in Complex Networks

    , M.Sc. Thesis Sharif University of Technology Sadati, Hoda (Author) ; Khansari, Mohammad (Supervisor)
    Abstract
    Complex networks have recently become a very noticeable subject because of their remarkable theory on real networks such as rumor spreading. This thesis contributes to a prevention strategy which uses a maximal clique algorithm to find overlapping communities and also uses inverse targeting immunization strategy to immune these communities. By the using maximal clique algorithm combined with inverse targeting strategy we have achieved that the TIK method (targeted immunization using k-clique percolation) obtains 10% of better immunization than HD (highest degree) method which is one of the best methods in targeted immunization strategies. The TIK also demonstrates that rumor spreading is... 

    Intrusion detection using a hybridization of evolutionary fuzzy systems and artificial immune systems

    , Article 2007 IEEE Congress on Evolutionary Computation, CEC 2007; Singapour 25 September 2007 through 28 September 2007 ; 2007 , Pages 3547-3553 ; 1424413400 (ISBN); 9781424413409 (ISBN) Saneei Abadeh, M ; Habibi, J ; Daneshi, M ; Jalali, M ; Khezrzadeh, M ; Sharif University of Technology
    2007
    Abstract
    This paper presents a novel hybrid approach for intrusion detection in computer networks. The proposed approach combines an evolutionary based fuzzy system with an artificial immune system to generate high quality fuzzy classification rules. The performance of final fuzzy classification system has been investigated using the KDD-Cup99 benchmark dataset. The results indicate that in comparison to several traditional techniques, such as C4.5, Naïve Bayes, k-NN and SVM, the proposed hybrid approach achieves better classification accuracies for most of the classes of the intrusion detection classification problem. Therefore, the resulted fuzzy classification rules can be used to produce a... 

    Application of the transmission line matrix method to the calculation of the shielding effectiveness for metallic enclosures

    , Article IEEE Antennas and Propagation Society, AP-S International Symposium (Digest) ; Volume 3 , 2002 , Pages 302-305 ; 15223965 (ISSN) Attari, A. R ; Barkeshli, K ; Ndagijimana, F ; Dansou, J ; Sharif University of Technology
    2002
    Abstract
    An efficient method for the analysis fo the shielding effectiveness in high frequency communication circuits based on the Transmission Line Matrix (TLM) method is presented. Since the formulation is in the time domain, wide band effects are easily and accurately modeled. Through comparisons, results obtained from that proposed numerical method with those obtained from measurement show that the TLM method gives more accurate results than other methods reported  

    A low-voltage low-power switched-capacitor filter using a new transistor configuration

    , Article 12th International Conference on Microelectronics, ICM 2000, 31 October 2000 through 2 November 2000 ; Volume 2000-October , 2000 , Pages 99-102 ; 9643600572 (ISBN) Lotfi, R ; Atarodi, S. M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2000
    Abstract
    A novel cascode configuration previously presented as a high output resistance load (Fujimori and Sugimoto, 1998) has been investigated and utilized for amplification to achieve higher gain and bandwidth by the authors (Lofti and Atarodi, Proc. ICEE'00, vol.1, pp.83-8, 2000). A low-voltage single-stage opamp using this configuration is designed. Finally, based on this idea a 1.5-V offset- and gain-compensated 5th order switched-capacitor low pass filter with only 150 μA current consumption in a 0.8 μm process is designed. © 2000 IEEE  

    Distinct dynamics of migratory response to pd-1 and ctla-4 blockade reveals new mechanistic insights for potential t-cell reinvigoration following immune checkpoint blockade

    , Article Cells ; Volume 11, Issue 22 , 2022 ; 20734409 (ISSN) Safaeifard, F ; Goliaei, B ; Aref, A. R ; Foroughmand-Araabi, M. H ; Goliaei, S ; Lorch, J ; Jenkins, R. W ; Barbie, D. A ; Shariatpanahi, S. P ; Rüegg, C ; Sharif University of Technology
    MDPI  2022
    Abstract
    Cytotoxic T-lymphocyte-associated antigen 4 (CTLA-4) and programmed cell death protein 1 (PD-1), two clinically relevant targets for the immunotherapy of cancer, are negative regulators of T-cell activation and migration. Optimizing the therapeutic response to CTLA-4 and PD-1 blockade calls for a more comprehensive insight into the coordinated function of these immune regulators. Mathematical modeling can be used to elucidate nonlinear tumor–immune interactions and highlight the underlying mechanisms to tackle the problem. Here, we investigated and statistically characterized the dynamics of T-cell migration as a measure of the functional response to these pathways. We used a previously... 

    Early detection of immunization: A study based on an animal model using 1H nuclear magnetic resonance spectroscopy

    , Article Pakistan Journal of Biological Sciences ; Volume 14, Issue 3 , 2011 , Pages 195-203 ; 10288880 (ISSN) Zamani, Z ; Arjmand, M ; Tafazzoli, M ; Ghohzadeh, A ; Pourfallah, F ; Sadeghi, S ; Mirzazadeh, R ; Mirkham, F ; Tahen, S ; Iravam, A ; Bayat, P ; Vahabi, F ; Sharif University of Technology
    2011
    Abstract
    Vaccines require a period of at least three months for clinical trials, hence a method that can identify elicitation of immune response a few days after the first dose is a necessity. Evolutionary variable selections are modeling approaches for proper manipulation of available data which were used to set up an animal model for classification of time dependent 'HNMR metabolomic profiles and pattern recognition of fluctuations of metabolites in two groups of male rabbits. One group of rabbits was immunized with human red blood cells and the other used as control. Blood was obtained every 48 h from each rabbit for a period of six weeks and the serum monitored for antibodies and metabolites by... 

    Mapping routine measles vaccination in low- and middle-income countries

    , Article Nature ; Volume 589, Issue 7842 , 2021 , Pages 415-419 ; 00280836 (ISSN) Sbarra, A. N ; Rolfe, S ; Nguyen, J.Q ; Earl, L ; Galles, N.C ; Marks, A ; Abbas, K.M ; Abbasi-Kangevari, M ; Abbastabar, H ; Abd-Allah, F ; Abdelalim, A ; Abdollahi, M ; Abegaz, K.H ; Abiy, H.A.A ; Abolhassani, H ; Abreu, L.G ; Abrigo, M.R.M ; Abushouk, A.I ; Accrombessi, M.M.K ; Adabi, M ; Adebayo, O.M ; Adekanmbi, V ; Adetokunboh, O.O ; Adham, D ; Afarideh, M ; Aghaali, M ; Ahmad, T ; Ahmadi, R ; Ahmadi, K ; Ahmed, M.B ; Alanezi, F.M ; Alanzi, T.M ; Alcalde-Rabanal, J.E ; Alemnew, B.T ; Ali, B.A ; Ali, M ; Alijanzadeh, M ; Alinia, C ; Alipoor, R ; Alipour, V ; Alizade, H ; Aljunid, S.M ; Almasi, A ; Almasi-Hashiani, A ; Al-Mekhlafi, H.M ; Altirkawi, K.A ; Amare, B ; Amini, S ; Amini-Rarani, M ; Amiri, F ; Amit, A.M.L ; Amugsi, D.A ; Ancuceanu, R ; Andrei, C.L ; Anjomshoa, M ; Ansari, F ; Ansari-Moghaddam, A ; Ansha, M.G ; Antonio, C.A.T ; Antriyandarti, E ; Anvari, D ; Arabloo, J ; Arab-Zozani, M ; Aremu, O ; Armoon, B ; Aryal, K.K ; Arzani, A ; Asadi-Aliabadi, M ; Asgari, S ; Atafar, Z ; Ausloos, M ; Awoke, N ; Quintanilla, B.P.A ; Ayanore, M.A ; Aynalem, Y.A ; Azadmehr, A ; Azari, S ; Babaee, E ; Badawi, A ; Badiye, A.D ; Bahrami, M.A ; Baig, A.A ; Bakhtiari, A ; Balakrishnan, S ; Banach, M ; Banik, P.C ; Barac, A ; Baradaran-Seyed, Z ; Baraki, A.G ; Basu, S ; Bayati, M ; Bayou, Y.T ; Bedi, N ; Behzadifar, M ; Bell, M.L ; Berbada, D.A ; Berhe, K ; Bhattarai, S ; Bhutta, Z.A ; Bijani, A ; Birhanu, M ; Bisanzio, D ; Biswas, A ; Bohlouli, S ; Bolla, S.R ; Borzouei, S ; Brady, O.J ; Bragazzi, N.L ; Briko, A.N ; Briko, N.I ; Nagaraja, S.B ; Butt, Z.A ; Cámera, L.A ; Campos-Nonato, I.R ; Car, J ; Cárdenas, R ; Carvalho, F ; Castaldelli-Maia, J.M ; Castro, F ; Chattu, V.K ; Chehrazi, M ; Chin, K.L ; Chu, D.-T ; Cook, A.J ; Cormier, N.M ; Cunningham, B ; Dahlawi, S.M.A ; Damiani, G ; Dandona, R ; Dandona, L ; Danovaro, M.C ; Dansereau, E ; Daoud, F ; Darwesh, A.M ; Darwish, A.H ; Das, J.K ; Weaver, N.D ; De Neve, J.-W ; Demeke, F.M ; Demis, A.B ; Denova-Gutiérrez, E ; Desalew, A ; Deshpande, A ; Desta, D.M ; Dharmaratne, S.D ; Dhungana, G.P ; Dianatinasab, M ; Diaz, D ; Dipeolu, I.O ; Djalalinia, S ; Do, H. T ; Dorostkar, F ; Doshmangir, L ; Doyle, K. E ; Dunachie, S. J ; Duraes, A. R ; Kalan, M. E ; Leylabadlo, H. E ; Edinur, H. A ; Effiong, A ; Eftekhari, A ; El Sayed, I ; El Sayed Zaki, M ; Elema, T. B ; Elhabashy, H. R ; El-Jaafary, S. I ; Elsharkawy, A ; Emamian, M. H ; Enany, S ; Eshrati, B ; Eskandari, K ; Eskandarieh, S ; Esmaeilnejad, S ; Esmaeilzadeh, F ; Esteghamati, A ; Etisso, A. E ; Farahmand, M ; Faraon, E. J. A ; Fareed, M ; Faridnia, R ; Farioli, A ; Farzadfar, F ; Fattahi, N ; Fazlzadeh, M ; Fereshtehnejad, S. M ; Fernandes, E ; Filip, I ; Fischer, F ; Foigt, N. A ; Folayan, M. O ; Foroutan, M ; Fukumoto, T ; Fullman, N ; Gad, M. M ; Geberemariyam, B. S ; Gebrehiwot, T. T ; Gebrehiwot, A. M ; Gebremariam, K. T ; Gebremedhin, K. B ; Gebremeskel, G. G ; Gebreslassie, A. A ; Gedefaw, G. A ; Gezae, K. E ; Ghadiri, K ; Ghaffari, R ; Ghaffarifar, F ; Ghajarzadeh, M ; Gheshlagh, R. G ; Ghashghaee, A ; Ghiasvand, H ; Gholamian, A ; Gilani, S. A ; Gill, P. S ; Girmay, A ; Gomes, N. G. M ; Gopalani, S. V ; Goulart, B. N. G ; Grada, A ; Guimarães, R. A ; Guo, Y ; Gupta, R ; Hafezi Nejad, N ; Haj-Mirzaian, A ; Haj-Mirzaian, A ; Handiso, D. W ; Hanif, A ; Haririan, H ; Hasaballah, A. I ; Hasan, M. M ; Hasanpoor, E ; Hasanzadeh, A ; Hassanipour, S ; Hassankhani, H ; Heidari Soureshjani, R ; Henry, N. J ; Herteliu, C ; Heydarpour, F ; Hollerich, G. I ; Rad, E. H ; Hoogar, P ; Hossain, N ; Hosseini, M ; Hosseinzadeh, M ; Househ, M ; Hu, G ; Huda, T. M ; Humayun, A ; Ibitoye, S. E ; Ikilezi, G ; Ilesanmi, O. S ; Ilic, I. M ; Ilic, M. D ; Imani Nasab, M. H ; Inbaraj, L.R ; Iqbal, U ; Irvani, S. S. N ; Islam, S. M. S ; Islam, M. M ; Iwu, C. J ; Iwu, C. C. D ; Jadidi Niaragh, F ; Jafarinia, M ; Jahanmehr, N ; Jakovljevic, M ; Jalali, A ; Jalilian, F ; Javidnia, J ; Jenabi, E ; Jha, V ; Ji, J. S ; John, O ; Johnson, K. B ; Joukar, F ; Jozwiak, J. J ; Kabir, Z ; Kabir, A ; Kalani, H ; Kalankesh, L. R ; Kalhor, R ; Kamal, Z ; Kanchan, T ; Kapoor, N ; Karami, M ; Matin, B. K ; Karch, A ; Karimi, S. E ; Kayode, G. A ; Karyani, A. K ; Keiyoro, P. N ; Khader, Y. S ; Khafaie, M. A ; Khammarnia, M ; Khan, M. S ; Khan, E. A ; Khan, J ; Khan, M. N ; Khatab, K ; Khater, M. M ; Khatib, M. N ; Khayamzadeh, M ; Khazaei, M ; Khazaei, S ; Khosravi, A ; Khubchandani, J ; Kianipour, N ; Kim, Y. J ; Kimokoti, R. W ; Kinyoki, D. K ; Kisa, A ; Kisa, S ; Kolola, T ; Komaki, H ; Kosen, S ; Koul, P.A ; Koyanagi, A ; Kraemer, M. U. G ; Krishan, K ; Kuate Defo, B ; Kumar, M ; Kumar, P ; Kumar, G. A ; Kusuma, D ; La Vecchia, C ; Lacey, B ; Lad, S. D ; Lal, D. K ; Lam, F ; Lami, F. H ; Lansingh, V. C ; Larson, H. J ; Lasrado, S ; Lee, S. W. H ; Lee, P. H ; LeGrand, K. E ; Lenjebo, T. L ; Li, S ; Liang, X ; Liu, P.Y ; Lopukhov, P. D ; Machado, D. B ; Mahasha, P. W ; Mahdavi, M. M ; Maheri, M ; Mahotra, N. B ; Maled, V ; Maleki, S ; Malik, M. A ; Malta, D. C ; Mansour Ghanaei, F ; Mansouri, B ; Mansourian, M ; Mansournia, M. A ; Martins Melo, F. R ; Masaka, A ; Mayala, B. K ; Mehndiratta, M. M ; Mehri, F ; Mehta, K. M ; Memiah, P. T. N ; Mendoza, W ; Menezes, R. G ; Mengesha, M. B ; Mengesha, E. W ; Mestrovic, T ; Mihretie, K. M ; Miller Petrie, M. K ; Mills, E. J ; Milne, G. J ; Mirabi, P ; Mirrakhimov, E. M ; Mirzaei, R ; Mirzaei, M ; Mirzaei, H. R ; Mirzaei, H ; Mirzaei Alavijeh, M ; Moazen, B ; Moghadaszadeh, M ; Mohamadi, E ; Mohammad, D. K ; Mohammad, Y ; Mohammad, K. A ; Mohammad Gholi Mezerji, N ; Mohammadbeigi, A ; Mohammadian Hafshejani, A ; Mohammadpourhodki, R ; Mohammed, S ; Mohammed, A. S ; Mohammed, H ; Mohebi, F ; Mokdad, A. H ; Monasta, L ; Moosavi, M. A ; Moosazadeh, M ; Moradi, G ; Moradi, M ; Moradi Joo, M ; Moradi Lakeh, M ; Moradzadeh, R ; Moraga, P ; Mosapour, A ; Sharif University of Technology
    Nature Research  2021
    Abstract
    The safe, highly effective measles vaccine has been recommended globally since 1974, yet in 2017 there were more than 17 million cases of measles and 83,400 deaths in children under 5 years old, and more than 99% of both occurred in low- and middle-income countries (LMICs)1–4. Globally comparable, annual, local estimates of routine first-dose measles-containing vaccine (MCV1) coverage are critical for understanding geographically precise immunity patterns, progress towards the targets of the Global Vaccine Action Plan (GVAP), and high-risk areas amid disruptions to vaccination programmes caused by coronavirus disease 2019 (COVID-19)5–8. Here we generated annual estimates of routine childhood... 

    Improving Anomaly Detection Methods for Intrusion Detection in MANETS

    , M.Sc. Thesis Sharif University of Technology Javanmard,Fahime (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    In recent decades, Securing mobile ad hoc networks has attracted much attention. Today, several security tools, such as intrusion detection systems are used in the network. Methods based IDS works on pattern recognition and anomaly detection are divided into two categories. Pattern recognition methods based on known attack patterns work with high detection rate, but do not have the ability to detect new attacks. Anomaly detection techniques have the ability to detect new attacks, but they have high false alarm rate.
    In this thesis, an anomaly detection system based on artificial immune designed, implemented and evaluated.For example, an anomaly detection methods such cases, a variety of... 

    Performance Improvement of Intrusion Detection Systems for Wireless Networks

    , M.Sc. Thesis Sharif University of Technology Safir, Sajjad (Author) ; Hematyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Wireless technology can now be seen almost everywhere. This technology has recently become very popular, and with the convenience that comes with its use, it will probably be the most commonly used technology among computer networks in the near future. Unfortunately, new technology is always under fire when it comes to security.So that this type of network security has become a big challenge for them.
    The researchers approach to security in wireless networks that have a lot of attention is the use of intrusion detection systems. An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alerts the system or network administrator. In some cases... 

    A New Immunization Algorithm Based on Spectral Properties for Complex Networks

    , M.Sc. Thesis Sharif University of Technology Zahedi, Ramin (Author) ; Khansari, Mohammd (Supervisor)
    Abstract
    Vaccination is one of the ways of disease control and prevention, which not only protect individuals against the disease, but also reduce the disease spread rate. Mass vaccination of individuals is not always possible due to the high cost and limitation of immunization resources. Therefore, researchers are always seeking solutions to find the persons that their immunization may have a greater impact in reduction of disease spread rate. The advent of network epidemic models and the possibility of removal the secured nodes in those models, showed that this problem is equivalent to finding a limited set of individuals that their removal will eliminate or minimize the number of people at risk of... 

    Preventing The Spread of Disease in Social Networks

    , M.Sc. Thesis Sharif University of Technology Abnousi, Armen (Author) ; Jafari, Amir (Supervisor)
    Abstract
    In this thesis, first we will have a thorough review on problems and models presented in the field of contagion in networks (spread of diseases, spread of computer viruses,etc.). Then we will investigate the basic model of virus inoculation game with purely selfish players and the modified version of it which takes into account a factor of friendship. We will discuss the results of these models including computing and comparing Nash Equilibria