2017 Constructive Nonsmooth Analysis and Related Topics (Dedicated to the Memory of V.F. Demyanov) (CNSA) 2017
DOI: 10.1109/cnsa.2017.7974023
|View full text |Cite
|
Sign up to set email alerts
|

Optimal impulse control of bi-virus SIR epidemics with application to heterogeneous Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 11 publications
1
8
0
Order By: Relevance
“…We leverage the Pontryagin's minimum principle for impulsive systems to obtain an optimal structure of the controller and use numerical experiments to demonstrate the computation of the optimal control and the controlled dynamics. This work extends the investigation of previous related works [7,18,5] to a new paradigm of coupled epidemic models and the regime of optimal impulsive control.…”
Section: Introductionsupporting
confidence: 69%
See 1 more Smart Citation
“…We leverage the Pontryagin's minimum principle for impulsive systems to obtain an optimal structure of the controller and use numerical experiments to demonstrate the computation of the optimal control and the controlled dynamics. This work extends the investigation of previous related works [7,18,5] to a new paradigm of coupled epidemic models and the regime of optimal impulsive control.…”
Section: Introductionsupporting
confidence: 69%
“…4 The structure of impulse control According to principle maximum in impulse form [2], [3], [4], [5] we write Hamiltonian for dynamic system (1)…”
Section: The Modelmentioning
confidence: 99%
“…While traditional Internet connects people to a network, IoT has a different approach in which it provides Machine-to-Machine (M2M) and Human-to-Machine (H2M) connectivity, for heterogeneous types of machines in order to support variety of applications (e.g., identifying, locating, tracking, monitoring, and controlling) [ 8 ]. Connecting a huge number of heterogeneous machines [ 9 ] leads to a massive traffic, hence the need to deal with the storage of big data [ 10 , 11 ]. Therefore, the TCP/IP architecture, which has been used for a long time for network connectivity, does not suit the needs of IoT regarding various aspects including privacy and security (e.g., information privacy, machine’s safety, data confidentiality, data encryption, and network security) [ 12 ], scalability, reliability, interoperability, and quality of service [ 13 ].…”
Section: Iot Generic Architecturementioning
confidence: 99%
“…IoT features a distinctive tactic gives Machine-to-Machine (M2M) and Human-to-Machine (H2M) network, for dissimilar sorts of machines in arrange to back an assortment of uses (e.g., distinguishing, finding, following, checking, and controlling), whereas classical web interfaces individuals to a organize [16]. Interfacing several dissimilar machines [17] clues to a gigantic activity, consequently, the got to bargain with the capacity of enormous information [18,19].In this manner, the TCP/IP design, which is well-known for arranging networks, still unsatisfactory regarding the IoT desires concerning different viewpoints counting protection and security [20,21]. Even though various designs were projected for IoT, there are more requirements for developing reference designs [22,23].…”
Section: Iot Generic Architecturementioning
confidence: 99%
“…Step (17), Device1 sends an encrypted message by public key K b contain ID 1 , TS 5 , ND 1 (text message encrypted by device private key PV d1 ) to the server to respond with the data wanted by the server.…”
Section: Text Messages Phasementioning
confidence: 99%