Robustness of dengue complex network under targeted versus random attack
Dengue virus infection is one of those epidemic diseases that require much consideration in order to save the humankind from its unsafe impacts. According to the World Health Organization (WHO), 3.6 billion individuals are at risk because of the dengue virus sickness. Researchers are striving to c...
| Main Authors: | Malik, Hafiz Abid Mahmood, Abid, Faiza, Wahiddin, Mohamed Ridza, Bhatti, Zeeshan |
|---|---|
| Format: | Article |
| Language: | English English English |
| Published: |
Hindawi Publishing Corporation
2017
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/54607/ http://irep.iium.edu.my/54607/1/2515928_Complexity.pdf http://irep.iium.edu.my/54607/7/54607_Robustness%20of%20Dengue%20Complex_WOS.pdf http://irep.iium.edu.my/54607/13/Robustness%20of%20dengue%20complex%20network%20under%20targeted%20versus%20random%20attack.pdf |
Similar Items
Nature of complex network of dengue epidemic as a scale-free network
by: Malik, Hafiz Abid Mahmood, et al.
Published: (2019)
by: Malik, Hafiz Abid Mahmood, et al.
Published: (2019)
Two-mode complex network modeling of dengue epidemic in Selangor, Malaysia
by: Mahmood Malik, Hafiz Abid, et al.
Published: (2014)
by: Mahmood Malik, Hafiz Abid, et al.
Published: (2014)
Two-mode network modeling and analysis of dengue epidemic behaviour in Gombak, Malaysia
by: Malik, Hafiz Abid Mahmood, et al.
Published: (2017)
by: Malik, Hafiz Abid Mahmood, et al.
Published: (2017)
Template based procedural rigging of quadrupeds with custom manipulators
by: Bhatti, Zeeshan, et al.
Published: (2013)
by: Bhatti, Zeeshan, et al.
Published: (2013)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
Computer assisted alerts using mental model approach for customer service improvement
by: Ghaffar, Abid, et al.
Published: (2013)
by: Ghaffar, Abid, et al.
Published: (2013)
Anticlone Gaussian attack for continuous variable EPR correlations
by: Messikh Azeddine, Azeddine, et al.
Published: (2007)
by: Messikh Azeddine, Azeddine, et al.
Published: (2007)
Impact of a Face-To-Face Versus Smartphone App Versus Combined Breastfeeding Intervention Targeting Fathers: Randomized Controlled Trial.
by: Scott, Jane, et al.
Published: (2021)
by: Scott, Jane, et al.
Published: (2021)
Method and apparatus for quantum-mechanically generating a random number
by: , Suryadi, et al.
Published: (2010)
by: , Suryadi, et al.
Published: (2010)
A robust security framework with bit-flipping attack and timing attack for key derivation functions
by: Wen Koh, Wen, et al.
Published: (2020)
by: Wen Koh, Wen, et al.
Published: (2020)
Multi-layered alert filtration and feedback cycle using Brahms model
by: Ghaffar, Abid, et al.
Published: (2016)
by: Ghaffar, Abid, et al.
Published: (2016)
The probe attack on the Bennett-Brassard 1984 protocol in the presences of noisy amplitude damping channel
by: Abdel-Hameed, Hossam Farouk, et al.
Published: (2017)
by: Abdel-Hameed, Hossam Farouk, et al.
Published: (2017)
RFID based smart hospital management system: A conceptual framework
by: Mahmood, Nadeem, et al.
Published: (2014)
by: Mahmood, Nadeem, et al.
Published: (2014)
Development of metamodel-based robust simulation optimization for complex systems under uncertainty
by: Parnianifard, Amir
Published: (2018)
by: Parnianifard, Amir
Published: (2018)
Synthesis and biological evaluation of new titanium (IV) complexes and their use in anti-cancer treatment
by: ABID, Mohammed Adnan
Published: (2021)
by: ABID, Mohammed Adnan
Published: (2021)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Robustness of frequency domain image watermarking against image processing attacks
by: Chai, Jee Sing
Published: (2008)
by: Chai, Jee Sing
Published: (2008)
Cylindrical shell buckling under axial compression load
by: Shah, Qasim Hussain, et al.
Published: (2011)
by: Shah, Qasim Hussain, et al.
Published: (2011)
Robust GMPHD filter with adaptive target birth
by: Ma, L., et al.
Published: (2014)
by: Ma, L., et al.
Published: (2014)
Robust versus Flexible Open Pit Mine Design
by: Topal, Erkan, et al.
Published: (2010)
by: Topal, Erkan, et al.
Published: (2010)
Targeting p110gamma in gastrointestinal cancers: attack on multiple fronts
by: Falasca, Marco, et al.
Published: (2014)
by: Falasca, Marco, et al.
Published: (2014)
An Active Contour For Underwater Target Tracking And Navigation.
by: Muhammad Asif, Muhammad Asif, et al.
Published: (2006)
by: Muhammad Asif, Muhammad Asif, et al.
Published: (2006)
Robust Multi-target Tracking
with Bootstrapped-GLMB Filter
by: Do, Cong-Thanh
Published: (2022)
by: Do, Cong-Thanh
Published: (2022)
Bonus versus penalty: how robust are the effects of contract framing?
by: De Quidt, Jonathan, et al.
Published: (2017)
by: De Quidt, Jonathan, et al.
Published: (2017)
A robust digital image watermarking using repetition codes
against common attacks
by: Hassan, Abdullahi Mohamud
Published: (2015)
by: Hassan, Abdullahi Mohamud
Published: (2015)
Entanglement for moving three-level atom under decoherence effect
by: Abdel-Khalek, Sayed, et al.
Published: (2015)
by: Abdel-Khalek, Sayed, et al.
Published: (2015)
Robust blind watermarking technique against geometric attacks for fingerprint image using DTCWT-DCT
by: Lebcir, Mohamed, et al.
Published: (2020)
by: Lebcir, Mohamed, et al.
Published: (2020)
Robust Random Regression Imputation method for missing data in the presence of outliers
by: John, Ahamefule Happy
Published: (2013)
by: John, Ahamefule Happy
Published: (2013)
Multiple Extended Target Tracking With Labeled Random Finite Sets
by: Beard, M., et al.
Published: (2016)
by: Beard, M., et al.
Published: (2016)
Seismic response of precast and IBS buildings under earthquake attacks
by: Hamid, N. H., et al.
Published: (2019)
by: Hamid, N. H., et al.
Published: (2019)
Cultivating the Communities of Practice in the Academia
by: Wahiddin, Mohamed Ridza
Published: (2016)
by: Wahiddin, Mohamed Ridza
Published: (2016)
The importance of building a conscience in business actions
by: Wahiddin, Mohamed Ridza
Published: (2016)
by: Wahiddin, Mohamed Ridza
Published: (2016)
Message from Deputy Rector (Research & Innovation)
by: Wahiddin, Mohamed Ridza
Published: (2017)
by: Wahiddin, Mohamed Ridza
Published: (2017)
Strategic planning: steering the ship through changing circumstances
by: Wahiddin, Mohamed Ridza
Published: (2013)
by: Wahiddin, Mohamed Ridza
Published: (2013)
Crop classification and yield prediction using robust machine learning models for agricultural sustainability
by: Badshah, Abid, et al.
Published: (2024)
by: Badshah, Abid, et al.
Published: (2024)
Development Of Robust Memory-Type Charts Under Repetitive Sampling And Triple Sampling Charts For The Gamma Process
by: Mahmood, Yasar
Published: (2024)
by: Mahmood, Yasar
Published: (2024)
Robust Multi-Object Tracking: A Labeled Random Finite Set Approach
by: Gardiyawasam Punchihewa, Yuthika Samanmali
Published: (2018)
by: Gardiyawasam Punchihewa, Yuthika Samanmali
Published: (2018)
Cascade applications of robust MIL-96 metal organic frameworks in environmental remediation: Proof of concept
by: Azhar, M., et al.
Published: (2018)
by: Azhar, M., et al.
Published: (2018)
Similar Items
-
Nature of complex network of dengue epidemic as a scale-free network
by: Malik, Hafiz Abid Mahmood, et al.
Published: (2019) -
Two-mode complex network modeling of dengue epidemic in Selangor, Malaysia
by: Mahmood Malik, Hafiz Abid, et al.
Published: (2014) -
Two-mode network modeling and analysis of dengue epidemic behaviour in Gombak, Malaysia
by: Malik, Hafiz Abid Mahmood, et al.
Published: (2017) -
Template based procedural rigging of quadrupeds with custom manipulators
by: Bhatti, Zeeshan, et al.
Published: (2013) -
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)