دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: Jyoti Mishra (editor), Ritu Agarwal (editor), Abdon Atangana (editor) سری: Information Technology, Management and Operations Research Practices ISBN (شابک) : 0367903059, 9780367903053 ناشر: CRC Press سال نشر: 2020 تعداد صفحات: 441 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 22 مگابایت
در صورت تبدیل فایل کتاب Mathematical Modeling and Soft Computing in Epidemiology به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مدلسازی ریاضی و محاسبات نرم در اپیدمیولوژی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب استفاده از روشهای مختلف مدلسازی ریاضی و محاسبات نرم مورد استفاده در اپیدمیولوژی را برای تحقیقات تجربی در پروژههایی مانند چگونگی پیشرفت بیماریهای عفونی برای نشان دادن پیامد احتمالی یک بیماری همهگیر و کمک به مداخلات بهداشت عمومی توصیف میکند.
>این کتاب مدلسازی ریاضی و تکنیکهای محاسباتی نرم را پوشش میدهد که برای مطالعه شیوع بیماریها، پیشبینی سیر آینده شیوع بیماری، و ارزیابی استراتژیهای کنترل همهگیر استفاده میشوند. این کتاب کاربردهایی را که شامل راهحلهای عددی و تحلیلی میشوند را بررسی میکند، مفاهیم اولیه و پیشرفته را برای مبتدیان و متخصصان صنعت ارائه میکند، و جدیدترین روشها و چالشها را با استفاده از مدلسازی ریاضی و تکنیکهای محاسبات نرم در اپیدمیولوژی ترکیب میکند.
کاربران اصلی این کتاب. این کتاب شامل محققان، دانشگاهیان، دانشجویان کارشناسی ارشد و متخصصان است.
This book describes the uses of different mathematical modeling and soft computing techniques used in epidemiology for experiential research in projects such as how infectious diseases progress to show the likely outcome of an epidemic, and to contribute to public health interventions.
This book covers mathematical modeling and soft computing techniques used to study the spread of diseases, predict the future course of an outbreak, and evaluate epidemic control strategies. This book explores the applications covering numerical and analytical solutions, presents basic and advanced concepts for beginners and industry professionals, and incorporates the latest methodologies and challenges using mathematical modeling and soft computing techniques in epidemiology.
Primary users of this book include researchers, academicians, postgraduate students, and specialists.
Cover Half Title Series Page Title Page Copyright Page Table of Contents Preface Editors Contributors Chapter 1 Evolutionary Modeling of Dengue Fever with Incubation Period of Virus 1.1 Introduction 1.2 Basic Notions 1.2.1 Padé Approximation 1.2.2 Non-Stagnated Nelder–Mead Simplex Algorithm (NS-NMSA) 1.2.3 Differential Evolution (DE) 1.3 Model of Dengue Disease with Incubation Period of Virus 1.3.1 Steady States of the Model 1.3.2 Sensitivity of Basic Reproductive Number 1.4 The Proposed DCMP Framework 1.5 Results and Discussions 1.6 Conclusion References Chapter 2 Fuzzy-Genetic Approach to Epidemiology 2.1 Introduction 2.2 Genetic Epidemiology and Topology 2.3 Unequal Crossover 2.4 Mathematical Background 2.4.1 Fuzzy Sets 2.4.2 Fuzzy Pretopology 2.5 Fuzzy Topological Properties of Recombination Space 2.5.1 Mathematical Definition of Recombination Sets 2.5.2 Unrestricted Unequal Crossover 2.5.3 Fuzzy Pretopology in a Recombination Space 2.5.4 Separation Properties 2.5.5 Lindelofness and Compactness 2.5.6 Connectedness 2.6 Conclusion References Chapter 3 Role of Mathematical Models in Physiology and Pathology 3.1 Introduction 3.2 Role of Mathematical Models in the Study of Brain Injury Problems 3.3 Mathematical Modeling for Blood Flow in Human Artery/Vein 3.4 Conclusion References Chapter 4 Machine-Learned Regression Assessment of the HIV Epidemiological Development in Asian Region 4.1 Introduction 4.2 Mathematical Development of the HIV Epidemiology 4.2.1 Techniques Implemented for Analysis 4.2.1.1 Study of Phase Dynamics 4.2.1.2 Distribution Fitting 4.2.1.3 Goodness of Fit, Histogram, and Density Function 4.2.1.4 Coefficient of Determination (R[sup(2)]) 4.2.1.5 Kolmogorov–Smirnov Test 4.2.2 Analysis of Machine-Learned Regression Models 4.2.2.1 L-1 Norm Regression-Learned Model 4.2.2.2 Logistic Regression-Learned Model 4.2.2.3 Poisson Regression-Learned Model 4.2.3 Inferences of Multifaceted Epidemiological System 4.3 Conclusion Acknowledgment References Chapter 5 Mathematical Modeling to Find the Potential Number of Ways to Distribute Certain Things to Certain Places in Medical Field 5.1 Introduction 5.2 Real-Life Application of Mathematical Modeling of the Real-Life Situation Using Our Double Twin Domination Number of a Graph in Medical Field 5.3 Double Twin Domination Number of Derived Graphs and Special Type of Graphs 5.4 Conclusion References Chapter 6 Fractional SIRI Model with Delay in Context of the Generalized Liouville–Caputo Fractional Derivative 6.1 Introduction 6.2 Fractional Calculus Tools and Stability Notions 6.3 Presentation of SIRI Epidemic Model and Characteristics Numbers 6.4 Existence and Uniqueness of the SIRI Model with Delay 6.5 Stability of the SIRI Equation with Delay 6.6 Conclusion References Chapter 7 Optimal Control of a Nipah Virus Transmission Model 7.1 Introduction 7.2 Model Formulation 7.3 Boundedness of Solutions 7.4 Equilibrium Points and Basic Reproduction Number 7.5 Stability of Equilibria 7.6 Optimal Control of Nipah Virus Model 7.6.1 Existence 7.6.2 Construction of Optimal Control Problem 7.7 Numerical Simulation 7.8 Conclusion Appendix References Chapter 8 Application of Eternal Domination in Epidemiology 8.1 Introduction 8.2 Epidemiology 8.2.1 Real-Life Application in the Concept of Eternal Domination in Epidemiology 8.3 Eternal Domination Number of Standard Graphs 8.4 Eternal Domination Number of Some Product Related Graphs Acknowledgment References Chapter 9 Numerical Analysis of Coupled Time-Fractional Differential Equations Arising in Epidemiological Models 9.1 Introduction 9.2 Preliminaries 9.3 Basic Plan of HPTM for Coupled FDE in Epidemic Model 9.3.1 Convergence Analysis 9.3.2 Implementation of HPTM 9.4 Numerical Results and Discussion 9.5 Conclusion References Chapter 10 Balancing of Nitrogen Mass Cycle for Healthy Living Using Mathematical Model 10.1 Introduction 10.2 Mathematical Model of Nitrogen Mass Cycle 10.3 Mathematical Properties of the Deterministic Model 10.3.1 Boundedness of the Nitrogen Mass Cycle 10.3.2 Local Stability Analysis 10.3.3 Global Stability Analysis 10.3.4 Global Stability Analysis of Nitrogen Mass Cycle by Pseudo-Back-Propagation 10.4 Nondeterministic Mathematical Model of Nitrogen Mass Cycle 10.4.1 Description of the NonDeterministic Mathematical Model 10.4.2 Nondeterministic Stability of the Positive Equilibrium 10.5 Numerical Simulation 10.6 Conclusion References Chapter 11 Neutralizing of Nitrogen when the Changes of Nitrogen Content Is Rapid 11.1 Introduction 11.2 Description of the Mathematical Model 11.3 Mathematical Properties of the Deterministic Model 11.3.1 Boundedness of the Nitrogen Mass Cycle with Exponential Growth 11.3.2 Local Stability Analysis 11.3.3 Bifurcation 11.3.4 Global Stability Analysis 11.3.5 Global Stability Analysis of Nitrogen Mass Cycle with Exponential Growth by Pseudo-Back-Propagation 11.4 Numerical Simulation 11.5 Conclusion References Chapter 12 Application of Blockchain Technology in Hospital Information System 12.1 Introduction 12.2 Hospital Information System 12.3 Type of Hospital Information System 12.4 Purpose of Hospital Information System 12.5 Advantages of Hospital Information System 12.6 Disadvantages of Hospital Information System 12.7 Fragmented Health Data (Aggregation) 12.8 Insufficient Financial Sources 12.9 Maintenance by Different Departments 12.10 Confidentiality Issues 12.11 Acceptance Level Is Low 12.12 Technical and Infrastructure Issues 12.13 System Breakdown 12.14 History of Blockchain Technology 12.15 Fundamental Properties of Blockchain Technology 12.16 Types of Blockchain Technology 12.17 The Need of Blockchain Technology and its Advantages in Healthcare Sector 12.17.1 Patient Data Management 12.18 Payments and Reimbursement 12.19 Drug and Medical Device Traceability 12.20 Medical Research 12.21 Regulatory Procedure 12.22 Clinical Trials 12.23 Disadvantages of Blockchain Technology in Healthcare Sector 12.24 Conclusion References Chapter 13 Complexity Analysis of Pathogenesis of Coronavirus Epidemiological Spread in the China Region 13.1 Introduction 13.2 Case Study: Pathogenesis of Coronavirus Epidemiological Spread in the China Region 13.3 Phase, Time Progression, and Lyapunov Characteristics Exponent Analysis for the Prediction of its Spread 13.3.1 Phase Analysis 13.3.2 Lyapunov Characteristic Exponent (LCE) 13.3.3 Algorithm for the Computation of LCE 13.3.4 Attractors 13.3.5 Nonlinear Regression 13.3.6 Box–Cox Time Transformation Measure 13.3.7 Autocorrelation and Partial Correlation Function (ACF & PACF) 13.3.8 Augmented Dickey–Fuller Stationarity Test (ADF) 13.4 Results and Discussion 13.5 Conclusion Acknowledgments References Chapter 14 A Mathematical Fractional Model to Study the Hepatitis B Virus Infection 14.1 Introduction 14.2 The Fractional Model 14.3 Solution of the HBV Infection Model 14.4 Convergence Analysis 14.5 Result 14.6 Conclusion References Chapter 15 Nonlinear Dynamics of SARS-CoV2 Virus: India and Its Government Policy 15.1 Introduction 15.2 Brief Review 15.3 SEIR Model 15.4 Modification of SEIR Model: SEIRD Model 15.5 Analytical Study 15.6 How Can We Make the Model Better? 15.7 Conclusion Acknowledgment References Chapter 16 Ethical and Professional Issues in Epidemiology 16.1 Introduction 16.2 Immunization 16.3 Epidemiological Surveillance 16.4 Importance of Epidemiological Surveillance 16.5 Ethical Issues in Epidemiology 16.5.1 Mandates and Objections 16.5.2 Vaccine Research and Testing 16.5.3 Informed Consent 16.5.4 Learning Issues 16.5.5 Conflicts of Interest 16.5.6 Scientific Malpractice 16.5.7 Professional Issues in Epidemiology 16.5.8 Epidemiological Ethics Roots References Chapter 17 Cloud Virtual Image Security for Medical Data Processing 17.1 Introduction 17.2 Virtualization in Cloud Computing 17.2.1 Importance of Virtualization 17.2.2 Kerberos 17.2.2.1 How Does Kerberos Authentication Works 17.2.2.2 Challenges in Kerberos 17.3 Data Center Technology 17.3.1 Virtualization Technology 17.3.1.1 Hardware Independence 17.3.1.2 Server Consolidation 17.3.1.3 Resource Replication 17.3.1.4 Operating System-Based Virtualization 17.3.1.5 Hardware-Based Virtualization 17.3.1.6 Virtualization Management 17.4 Virtual Machine Images 17.4.1 System Virtual Machine 17.4.2 Process Virtual Machine (Language Virtual Machine) 17.5 Virtual Machine Switch and Session Management 17.5.1 Virtual Machine Switch 17.5.2 Session Management 17.6 Medical Data in Cloud Computing 17.6.1 e-Health Cloud Benefits 17.6.2 e-Health Cloud Limitations 17.6.3 Ownership and Privacy of Healthcare Information 17.6.4 Authenticity 17.6.5 Non-Repudiation 17.6.6 Audit 17.6.7 Access Control 17.6.8 Cloud-Specific Security Aspects for e-Health Systems: The Case of VM Image Management 17.6.8.1 VM Images as an Attack Vector 17.6.8.2 The Way Forward 17.6.8.3 Management of Virtual Image 17.6.8.4 Image Archival and Destruction 17.7 Literature Review 17.8 Objective 17.8.1 Implementation Model 17.8.2 Terminologies Used in Implementation Model 17.8.2.1 Access Server 17.8.2.2 Authentication Server 17.8.2.3 Storage Server 17.8.2.4 Kerberos Security Mechanism 17.8.2.5 Hardware Security Module (HSM) 17.8.2.6 OpenStack 17.8.2.7 Virtual Image Management 17.9 Conclusion References Chapter 18 Medical Data Security Using Blockchain and Machine Learning in Cloud Computing 18.1 Introduction 18.1.1 Cloud Computing 18.1.1.1 Service Models 18.1.1.2 Deployment Models 18.1.1.3 Cloud Computing Security Challenges 18.1.2 Cloud Computing Data Security and Threats Risks 18.1.2.1 Security Risks 18.1.2.2 Cloud Threats 18.1.2.3 Privacy and Security 18.1.2.4 Advantages of Cloud Computing Security 18.2 Electronic Health Records in Cloud Computing 18.2.1 Benefits and Risks of Cloud Computing in Healthcare 18.2.1.1 Benefits 18.2.1.2 Risk 18.2.2 Challenges Faced by Blockchain Technology 18.2.2.1 Security and Privacy Requirements of E-Health Data in Cloud 18.3 Electronic Health Record Security Using Blockchain 18.3.1 Medicalchain 18.3.1.1 Medicalchain Features 18.3.1.2 Process Flow 18.4 Existing Healthcare Data Predictive Analytics Using Machine Learning Techniques 18.4.1 Analytical Relation among EHR, AI, ML, and NLP 18.4.2 Some Common Machine Learning EHR Algorithms 18.4.3 Challenges for Machine Learning Approaches in EHR 18.4.4 Techniques for EHR Tasks 18.5 Literature Review 18.6 Objectives of the Study 18.7 Implementation Model 18.7.1 Proposed Working Stages of Proposed Methodology 18.8 Conclusion References Chapter 19 Mathematical Model to Avoid Delay Wound Healing by Infinite Element Method 19.1 Mathematical Modeling to Study Issue Temperature Deviation During Wound Healing 19.1.1 Statement of the Problem 19.2 Boundary Conditions at the Outer Surface and Inner Core 19.2.1 Initial Condition 19.3 Use of the Finite Element Method and the Infinite Element Method 19.4 Shape Functions 19.5 Matrix Formation 19.6 Assembly of Elements 19.7 Formation of Simultaneous Differential Equations in Time 19.8 Numerical Results and Discussions References Chapter 20 Data Classicafitiion Framework for Medical Data through Machine Learning Techniques in Cloud Computing 20.1 Introduction 20.1.1 Features of Cloud Computing 20.1.2 Advantages of Cloud Computing 20.1.3 Categories of Service Model 20.1.4 Types of Cloud 20.2 Data Storage in Cloud Computing 20.2.1 Storage Devices 20.2.2 Storage Classes of Cloud 20.2.3 Creating Cloud Storage System 20.2.4 Virtual Storage Containers 20.3 Virtualization in Cloud Computing 20.4 Security Issue in Cloud Computing 20.4.1 Common Security Requirement 20.5 Data Classification 20.5.1 Classification Applied to Information Types 20.5.2 Medical Data set Classification 20.5.3 Challenges of Medical Data Classification 20.5.4 EHR Information Extraction through Machine Learning Approaches 20.5.5 Security and Privacy of Classified Data 20.6 Literature Review 20.7 Objectives of the Study 20.8 Implementation Model 20.8.1 Proposed Model 20.9 Conclusion References Index