Parameter | Value | Source |
b | 1 | [13] |
p | 0.9 | [13] |
β | 0.65 | [13] |
σ | 0.4 | [13] |
d | 0.1 | assumed |
δ | 0.7 | [13] |
ε | 0.14 | assumed |
γ | 0.3 | [13] |
η | 0.1 | assumed |
α1 | 0.1 | assumed |
α2 | 0.18 | assumed |
The coronavirus disease 2019 (COVID-19) outbreak has resulted in countless infections and deaths worldwide, posing increasing challenges for the health care system. The use of artificial intelligence to assist in diagnosis not only had a high accuracy rate but also saved time and effort in the sudden outbreak phase with the lack of doctors and medical equipment. This study aimed to propose a weakly supervised COVID-19 classification network (W-COVNet). This network was divided into three main modules: weakly supervised feature selection module (W-FS), deep learning bilinear feature fusion module (DBFF) and Grad-CAM++ based network visualization module (Grad-Ⅴ). The first module, W-FS, mainly removed redundant background features from computed tomography (CT) images, performed feature selection and retained core feature regions. The second module, DBFF, mainly used two symmetric networks to extract different features and thus obtain rich complementary features. The third module, Grad-Ⅴ, allowed the visualization of lesions in unlabeled images. A fivefold cross-validation experiment showed an average classification accuracy of 85.3%, and a comparison with seven advanced classification models showed that our proposed network had a better performance.
Citation: Jingyao Liu, Qinghe Feng, Yu Miao, Wei He, Weili Shi, Zhengang Jiang. COVID-19 disease identification network based on weakly supervised feature selection[J]. Mathematical Biosciences and Engineering, 2023, 20(5): 9327-9348. doi: 10.3934/mbe.2023409
[1] | Jagdev Singh, Jitendra Kumar, Devendra kumar, Dumitru Baleanu . A reliable numerical algorithm based on an operational matrix method for treatment of a fractional order computer virus model. AIMS Mathematics, 2024, 9(2): 3195-3210. doi: 10.3934/math.2024155 |
[2] | Khalaf M. Alanazi . The asymptotic spreading speeds of COVID-19 with the effect of delay and quarantine. AIMS Mathematics, 2024, 9(7): 19397-19413. doi: 10.3934/math.2024945 |
[3] | Hui Miao . Global stability of a diffusive humoral immunity viral infection model with time delays and two modes of transmission. AIMS Mathematics, 2025, 10(6): 14122-14139. doi: 10.3934/math.2025636 |
[4] | Wajaree Weera, Thongchai Botmart, Teerapong La-inchua, Zulqurnain Sabir, Rafaél Artidoro Sandoval Núñez, Marwan Abukhaled, Juan Luis García Guirao . A stochastic computational scheme for the computer epidemic virus with delay effects. AIMS Mathematics, 2023, 8(1): 148-163. doi: 10.3934/math.2023007 |
[5] | Xin Jiang . Threshold dynamics of a general delayed HIV model with double transmission modes and latent viral infection. AIMS Mathematics, 2022, 7(2): 2456-2478. doi: 10.3934/math.2022138 |
[6] | Kalpana Umapathy, Balaganesan Palanivelu, Renuka Jayaraj, Dumitru Baleanu, Prasantha Bharathi Dhandapani . On the decomposition and analysis of novel simultaneous SEIQR epidemic model. AIMS Mathematics, 2023, 8(3): 5918-5933. doi: 10.3934/math.2023298 |
[7] | Omar Kahouli, Imane Zouak, Ma'mon Abu Hammad, Adel Ouannas . Chaos, control and synchronization in discrete time computer virus system with fractional orders. AIMS Mathematics, 2025, 10(6): 13594-13621. doi: 10.3934/math.2025612 |
[8] | Liang Hong, Jie Li, Libin Rong, Xia Wang . Global dynamics of a delayed model with cytokine-enhanced viral infection and cell-to-cell transmission. AIMS Mathematics, 2024, 9(6): 16280-16296. doi: 10.3934/math.2024788 |
[9] | Ahmed M. Elaiw, Ghadeer S. Alsaadi, Aatef D. Hobiny . Global co-dynamics of viral infections with saturated incidence. AIMS Mathematics, 2024, 9(6): 13770-13818. doi: 10.3934/math.2024671 |
[10] | Nada A. Almuallem, Hasanur Mollah, Sahabuddin Sarwardi . A study of a prey-predator model with disease in predator including gestation delay, treatment and linear harvesting of predator species. AIMS Mathematics, 2025, 10(6): 14657-14698. doi: 10.3934/math.2025660 |
The coronavirus disease 2019 (COVID-19) outbreak has resulted in countless infections and deaths worldwide, posing increasing challenges for the health care system. The use of artificial intelligence to assist in diagnosis not only had a high accuracy rate but also saved time and effort in the sudden outbreak phase with the lack of doctors and medical equipment. This study aimed to propose a weakly supervised COVID-19 classification network (W-COVNet). This network was divided into three main modules: weakly supervised feature selection module (W-FS), deep learning bilinear feature fusion module (DBFF) and Grad-CAM++ based network visualization module (Grad-Ⅴ). The first module, W-FS, mainly removed redundant background features from computed tomography (CT) images, performed feature selection and retained core feature regions. The second module, DBFF, mainly used two symmetric networks to extract different features and thus obtain rich complementary features. The third module, Grad-Ⅴ, allowed the visualization of lesions in unlabeled images. A fivefold cross-validation experiment showed an average classification accuracy of 85.3%, and a comparison with seven advanced classification models showed that our proposed network had a better performance.
Since the first personal computer came out in 1980, computers gradually appeared in our daily life. In 1995, the emergence of the Internet further promoted the computers into all fields of production and living. By June 2020, China's Internet users had reached 940 million, an increase of 36.25 million compared with March 2020, and the Internet penetration rate reached 67.0%, an increase of 2.5 percentage points compared with March 2020 [1]. Computer network is a sharp double-edged sword, bringing conveniences as well as disasters. In October 2019, a total of 44.23 million new viruses was found in the National Computer Virus Emergency Response Center and 218.04 million computers were infected, which was 1.78% higher than that in September, and the main transmission channels were "phishing", "webpage pegging" and loopholes [2]. The propagation of computer virus has become more rapid and harmful, posing serious changes. In the early October 2019, Demant, the world's largest hearing aid manufacturer, was invaded by blackmail virus, resulting in a direct economic loss of more than 95 million dollars. Fractional derivative equations are often used to study the dynamic behavior of systems, which can help us understand the evolution law of the system [3,4,5,6]. Consequently, it is of great practical significance to analyze the propagation of computer virus to protect computers against viruses by use fractional derivative equations.
Some mathematical models, which characterized the spread of computer viruses over the internet, were proposed to help us study the problem quantitatively. There are many similarities between computer virus and biological virus, such as infectivity, destructiveness, variability and so on. Based on these similarities, J. O. Kephart and S. R. White applied the mathematical models of epidemics to the computer virus propagation model creatively [7]. On this foundation, many computer virus models have been established [8,9,10]. Singh et al. [11] considered a fractional epidemiological SIR model with an arbitrary order derivative having nonsingular kernel, and discussed the existence of the solution. Considering that the recovered nodes may become susceptible again once some new viruses appear or the known computer viruses mutate, Chen et al. [12] presented a new SIRS model. But they all assumed the infection rate in models is bilinear. But in fact, this situation is not the case. In most realistic situations, the bilinear infection rate is always impossible to achieve due to the increase of the susceptible computers and infectious computers. In view of the nonlinear infection rate, both of the inhibition effect owing to the uncertain behavior of susceptible computers and the crowding effect of infectious computers are considered at the same time.
Considering that the network topology in the proliferation of virus may lead to nonlinear infection rate, MadhuSudanan et al. [13] formulated a computer viruses model with nonlinear infection rate and incubation period delay:
{dS(t)dt=(1−p)b−βS(t−τ)I(t−τ)1+σS(t−τ)−dS(t)+δR(t),dI(t)dt=βS(t−τ)I(t−τ)1+σS(t−τ)−(d+α+γ)I(t),dR(t)dt=pb+γI(t)−(d+δ)R(t), | (1.1) |
where S(t), I(t), R(t) represent the number of susceptible computers, infected computers and recovered computers at time t, respectively. The meanings of all the parameters in system (1.1) can be referred to [13].
Quarantine strategy generally refers to the control of individuals with abnormal performance, so as to prevent others from being infected by viruses. Quarantine strategy is an important measure for the treatment of infectious diseases. It can not only conduct centralized management and treatment for infected individuals, but also effectively control the source of infection and greatly reduce the number of contacts. Later, inspired by the biological infectious disease model, many scholars applied the quarantine strategy to the research of computer virus model, and put forward a series of models accordingly [14,15]. Hence, quarantine strategy should be introduced into the computer virus model. The effect of Anti-virus can protect recovered computers from the known viruses, however, as time goes on, Anti-virus may lose function as a result of the emergence of new viruses and the variation of known viruses, and the update speed of anti-virus software is always slower than that of new virus. So it needs a short time before entering susceptible state, called the temporary immune time delay. Considering the effect of quarantine strategy and the existence of temporary immune time delay, we investigate a new SIQRS computer virus model with two delays:
{dS(t)dt=(1−p)b−βS(t−τ1)I(t−τ1)1+σS(t−τ1)−dS(t)+δR(t−τ2),dI(t)dt=βS(t−τ1)I(t−τ1)1+σS(t−τ1)−(d+α1+γ+ε)I(t),dQ(t)dt=εI(t)−(η+d+α2)Q(t),dR(t)dt=pb+γI(t)+ηQ(t)−dR(t)−δR(t−τ2), | (1.2) |
where Q(t) is the number of quarantine computers at time t; α1 is the death rate of infected computers due to virus; α2 is the death rate of quarantine computers due to virus; ε is the quarantine rate of infected computers; η is the recovered rate of the quarantine computers; τ1 is the incubation period delay; τ2 is the temporary immune time delay before the recovered computers come into the susceptible status.
When the system (1.2) reaches the virus-free equilibrium, there is no virus, namely I∗0=0. Let us equate system (1.2) to be zero, we can obtain:
{δR∗0+(1−p)b−βS∗0I∗01+σS∗0−dS∗0=0,βS∗0I∗01+σS∗0−(d+α1+γ+ε)I∗0=0,εI∗0−(η+d+α2)Q∗0=0,γI∗0+ηQ∗0+pb−(d+δ)R∗0=0, | (2.1) |
Then, then system (1.2) has a virus-free equilibrium E∗0(S∗0,I∗0,Q∗0,R∗0). Here,
S∗0=δb+bd(1−p)d(d+δ),I∗0=0,Q∗0=0,R∗0=pbd+δ. |
The basic regeneration number is the critical threshold to determine whether there is a virus in system (1.2). According to the way in [16], it is easy to obtain the basic regeneration number of system (1.2). Let X=(I,S,Q,R)T, then system (1.2) can be equivalent to dX(t)dt=F−V, where
F=(βSI1+σS000),V=((d+α1+η+γ)I−(1−p)b+βSI1+σS+dS+δR(η+d+α2)Q−εIdR+δR−ηQ−γI−pb). |
The infected compartment is I, giving m=1, then the Jacobian matrixes of F and V at E∗0(S∗0,I∗0,Q∗0,R∗0) are
F′=(βS∗01+σS∗0),V′=(d+α1+η+γ). |
Then
R0=βS∗0(1+σS∗0)(d+α1+γ+ε). | (2.2) |
If R0<1, then system (1.2) has a virus-free equilibrium E∗0(S∗0,I∗0,Q∗0,R∗0). The Jacobian matrix of system (1.2) at E∗0(S∗0,I∗0,Q∗0,R∗0) is
J(E∗0)=(−d−βS∗01+σS∗00δ0βS∗01+σS∗0−(d+α1+γ+ε)000ε−(η+d+α2)00γη−(d+δ)), |
The corresponding characteristic equation becomes
(λ+d)(λ−βS∗01+σS∗0+d+α1+γ+ε)(λ+d+η+α2)(λ+d+δ)=0. | (2.3) |
Then the eigenvalues of Eq.(2.3) are
λ1=−d<0,λ2=βS∗01+σS∗0−(d+α1+γ+ε)<0,λ3=−(d+η+α2)<0,λ4=−(d+δ)<0, |
So, when all the eigenvalues are less than zero, the virus-free equilibrium of system (1.2) is locally stable according to Routh-Hurwitz criteria.
If R0=βS∗0(1+σS∗0)(d+α1+γ+ε)>1, then system (1.2) has a unique virus-existence equilibrium E∗(S∗,I∗,Q∗,R∗). Here,
S∗=d+α1+γ+εβ−σ(d+α1+γ+ε),I∗=(d+δ)dS∗−(d+δ)(1−p)b−δpbk1+δγ−k2,Q∗=εη+d+α2I∗,R∗=pb+γI∗+ηQ∗d+δ, |
where
k1=δηεη+d+α2,k2=(δ+d)βS∗1+σS∗. |
The linearized part of system (1.2) is
{dS(t)dt=l11S(t)+m11S(t−τ1)+m12I(t−τ1)+n14R(t−τ2),dI(t)dt=m21S(t−τ1)+l22I(t)+m22I(t−τ1),dQ(t)dt=l32I(t)+l33Q(t),dR(t)dt=l42I(t)+l43Q(t)+l44R(t)+n44R(t−τ2), | (3.1) |
where
l11=−d,m11=−βI∗(1+σS∗)2,m12=−βS∗1+σS∗,n14=δ,m21=βI∗(1+σS∗)2,m22=βS∗1+σS∗,l22=−(d+α1+γ+ε),l32=ε,l33=−(η+d+α2),l42=γ,l43=η,l44=−d,n44=−δ, |
From the system (3.1), we can obtain that
X0(λ)+X1(λ)e−λτ1+X2(λ)e−λτ2+X3(λ)e−λ(τ1+τ2)+X4(λ)e−2λτ2+X5(λ)e−λ(2τ1+τ2)=0, | (3.2) |
where
X0(λ)=λ4+λ3(−l11−l22−l33−l44)+λ2(l11l22+l11l33+l11l44+l22l33+l22l44+l33l44)+λ(−l11l22l33−l11l22l44−l11l33l44−l22l33l44)+l11l22l33l44,X1(λ)=λ3(−m11−m22)+λ2(l11m22+l22m11+l33m11+l33m22+l44m11+l44m22)+λ(−l33l44m22−l11l44m22−l11l33m22−l33l44m11−l22l44m11−l22l33m11)+l22l33l44m22+l22l33l44m11,X2(λ)=−n44λ3+λ2(l11n44+l22n44+l33n44)+λ(−l11l22n44−l11l33n44−l22l33n44)+l11l22l33n44,X3(λ)=λ2(m11n44+m22n44)+λ(−l11m22n44−l22m22n44−l33m11n44−l33m22n44+l42m21n44)+(l11l33m22n44+l22l33m11n44+l32l43m21n14−l33l42m21n14),X4(λ)=λ2(m11m22+m12m21)+λ(−l33m11m22−l44m11m22−l33m12m21−l44m12m21)+l33l44m11m22+l33l44m12m21,X5(λ)=λ(−m11m22n44−m12m21n44)+l33m11m22n44+l33m12m21n44. |
Case 1. τ1=τ2=0, Eq (3.2) becomes
λ4+X30λ3+X20λ2+X10λ+X00=0, | (3.3) |
where Xji(i=0,1,2,3,4,5;j=0,1,2,3,4) represents the coefficient of λj in Xi(λ).
Lemma 1 [13]. According to Routh-Hurwitz criteria, when R0>1, the virus-existence equilibrium E∗(S∗,I∗,Q∗,R∗) is locally asymptotically stable.
Case 2. τ1>0, τ2=0. Then, Eq (3.2) becomes
[X0(λ)+X2(λ)]+[X1(λ)+X3(λ)]e−λτ1+[X4(λ)+X5(λ)]e−2λτ1=0. | (3.4) |
Taking λ=iω1 into Eq (3.4) and separating the real and imaginary parts, we obtain
{A11cosτ1ω1+A21sinτ1ω1+B11=−A31sin2τ1ω1+A41cos2τ1ω1,A21cosτ1ω1−A11sinτ1ω1+B21=−A31cos2τ1ω1−A41sin2τ1ω1, | (3.5) |
with
A11=X01−X21ω21+X03−X23ω21,A21=X11ω1−X31ω31+X13ω1,A31=X14ω1+X15ω1,A41=X24ω21−X04−X05,B11=ω41−X20ω21+X00−X22ω21+X02,B21=X10ω11−X30ω31−X32ω31−X12ω1, |
Because cos2τ1ω1+sin2τ1ω1=1, sinτ1ω1=±√1−cos2τ1ω1.
(1) If sinτ1ω1=√1−cos2τ1ω1, after calculation, we have
A211+A221+B211+B221−A231−A241+2(A11B11+A21B21)cosτ1ω1+2(B11A21−A11B21)√1−cos2τ1ω1=0. | (3.6) |
Let f1(ω1)=cosτ1ω1, and we suppose that (G1): f1(ω1)=cosτ1ω1 has at least a positive root ω11, which makes Eq (3.6) true. Thus,
τ(i)11=1ω11×[arccos(f1(ω11))+2iπ],i=0,1,2,⋯. | (3.7) |
(2) If sinτ1ω1=−√1−cos2τ1ω1, after calculation, we have
A211+A221+B211+B221−A231−A241+2(A11B11+A21B21)cosτ1ω1+2(A11B21−A21B11)√1−cos2τ1ω1=0. | (3.8) |
Let g1(ω1)=cosτ1ω1, and we suppose that (G2): g1(ω1)=cosτ1ω1 has at least a positive root ω12, which makes Eq (3.8) true. Thus,
τ(i)12=1ω12×[arccos(g1(ω12))+2iπ],i=0,1,2,⋯. | (3.9) |
Define
τ10=min{τ(i)11,τ(i)12},i=0,1,2,⋯, | (3.10) |
where τ(i)11 and τ(i)12 are defined by Eq (3.7) and Eq (3.9), respectively.
Multiplying eλτ1 on both sides of Eq (3.4), and then after deriving from τ to λ, we can get
[dλdτ1]−1=−[X′0(λ)+X′2(λ)]eλτ1+[X′1(λ)+X′3(λ)]+[X′4(λ)+X′5(λ)]e−λτ1−λ[X0(λ)+X2(λ)]e−λτ1+λ[X4(λ)+X5(λ)]eλτ1−τ1λ. | (3.11) |
According to the Hopf bifurcation theorem [17], if the surmise (G3): Re[dλ/dτ1]−1τ1=τ10≠0 is true, the virus-existence equilibrium E∗(S∗,I∗,Q∗,R∗) is locally asymptotically stable. So, we have Theorem 1.
Theorem 1. For system (1.2), when R0>1 and the conditions (G1)-(G3) hold, then E∗(S∗,I∗, Q∗,R∗) is locally asymptotically stable when τ1∈[0,τ10); there is a Hopf bifurcation at E∗(S∗,I∗, Q∗,R∗) when τ1=τ10.
Case 3. τ1=0, τ2>0. Then Eq (3.2) becomes
[X0(λ)+X1(λ)+X4(λ)]+[X2(λ)+X3(λ)+X5(λ)]e−λτ2=0, | (3.12) |
Substituting λ=iω2 into Eq (3.12), we obtain
{C11cosτ2ω2+C21sinτ2ω2=D11,C21cosτ2ω2−C11sinτ2ω2=D21, | (3.13) |
with
C11=−X22ω22+X02+X03+X05−X23ω22,C21=−X32ω32+X12ω2+X13ω2+X15ω2,D11=X20ω22+X21ω22+X24ω22−ω42−X00−X01−X04,D21=X30ω32+X31ω32−X10ω2−X11ω2−X14ω2, |
Squaring both sides of two equations in Eq (3.13), and adding them up, we obtain
C211+C221=D211+D221. | (3.14) |
We suppose that (G4): Eq (3.14) has at least one positive real root ω20. Then, from Eq (3.13), we derive
τ(i)2=1ω20×[arccosC11D11+C21D21C211+C221+2iπ], | (3.15) |
where i=0,1,2,⋯.
Define
τ20=min{τ(i)2,i=0,1,2,⋯}, | (3.16) |
and τ(i)2 is defined by Eq (3.15).
Taking the derivative of λ with respect to τ, we obtain
[dλdτ2]−1=−X′0+X′1+X′4λ[X0+X1+X4]+X′2+X′3+X′5λ[X2+X3+X5]−τ2λ, | (3.17) |
Thus, it is easy to obtain the expression of Re[dλ/dτ2]−1τ2=τ20. According to the Hopf bifurcation theorem [17], if the hypothesis (G5): Re[dλ/dτ2]−1τ2=τ20≠0 is true, the virus-existence equilibrium E∗(S∗,I∗,Q∗,R∗) is locally asymptotically stable. In conclusion, Theorem 2 can be obtained.
Theorem 2. For system (1.2), when R0>1 and the conditions (G4)-(G5) hold, then E∗(S∗,I∗, Q∗,R∗) is locally asymptotically stable when τ2∈[0,τ20); there is a Hopf bifurcation at E∗(S∗,I∗, Q∗,R∗) when τ2=τ20.
Case 4. τ1=τ2=τ∗. Then Eq (3.2) becomes
X0(λ)+[X1(λ)+X2(λ)]e−λτ∗+[X3(λ)+X4(λ)]e−2λτ∗+X5(λ)e−3λτ∗=0, | (3.18) |
Multiplying eλτ∗ on both sides of Eq (3.18), then we obtain
X0(λ)eλτ∗+[X1(λ)+X2(λ)]+[X3(λ)+X4(λ)]e−λτ∗+X5(λ)e−2λτ∗=0, | (3.19) |
Substituting λ=iω3 into Eq (3.19), we obtain
{A12cosτ∗ω3+A22sinτ∗ω3=−A32sin2τ∗ω3+A42cos2τ∗ω3,A′22cosτ∗ω3−A12sinτ∗ω3=−A32cos2τ∗ω3−A42sin2τ∗ω3, | (3.20) |
with
A12=X30ω33−X10ω3−X13ω3−X14ω3,A22=ω43−X20ω23−X23ω23+X24ω23+X00−X03−X04,A′22=ω43−X20ω23−X23ω23−X24ω23+X00+X03+X04,A32=X15ω3,A42=−X05,B12=−X21ω23+X01−X22ω23+X02,B22=−X31ω33−X32ω33+X11ω3+X12ω3, |
Squaring both sides of two equations in Eq (3.20), and adding them up, we obtain
(A12cosτ∗ω3+A22sinτ∗ω3+B12)2+(A′22cosτ∗ω3−A12sinτ∗ω3+B22)2=A232+A242. | (3.21) |
Because cos2τ∗ω3+sin2τ∗ω3=1, sinτ∗ω3=±√1−cos2τ∗ω3.
(1) If sinτ∗ω3=√1−cos2τ∗ω3, after calculation, we have
A212+A222+B212+B222−A232−A242+2(A12A22+A12B12+A22B12)cosτ∗ω3+2(A′22B22−A′22A12−A12B22)√1−cos2τ∗ω3=0. | (3.22) |
Let f2(ω3)=cosτ∗ω3, and we suppose that (G6): f2(ω3)=cosτ∗ω3 has at least a positive root ω31, which makes Eq (3.22) true. Thus,
τ(i)∗1=1ω31×[arccos(f2(ω31))+2iπ],i=0,1,2,⋯. | (3.23) |
(2) If sinτ∗ω3=−√1−cos2τ∗ω3, after calculation, we have
A212+A222+B212+B222−A232−A242+2(A12A22+A12B12+A22B12)cosτ∗ω3−2(A′22B22−A′22A12−A12B22)√1−cos2τ∗ω3=0. | (3.24) |
Let g2(ω3)=cosτ∗ω3, and we suppose that (G7): g2(ω3)=cosτ∗ω3 has at least a positive root ω32, which makes Eq (3.24) true. Thus,
τ(i)∗2=1ω32×[arccos(g2(ω32))+2iπ],i=0,1,2,⋯. | (3.25) |
Define
τ∗0=min{τ(i)∗1,τ(i)∗2},i=0,1,2,⋯, | (3.26) |
where τ(i)∗1 and τ(i)∗2 are defined by Eq (3.23) and Eq (3.25), respectively.
Then after deriving from τ to λ, we can get
[dλdτ∗]−1=−X′0(λ)eλτ∗+[X′1(λ)+X′2(λ)]+[X′3(λ)+X′4(λ)]e−λτ∗+X′5(λ)e−2λτ∗−λX0(λ)eλτ∗+λ[X3(λ)+X4(λ)]e−λτ∗+2λX5(λ)e−2λτ∗−τ∗λ. | (3.27) |
Based on the Hopf bifurcation theorem [17], if the surmise (G8): Re[dλ/dτ∗]−1τ∗=τ∗0≠0 is true, the virus-existence equilibrium E∗(S∗,I∗,Q∗,R∗) is locally asymptotically stable. Therefore, Theorem 3 can be obtained.
Theorem 3. For system (1.2), when R0>1 and the conditions (G6)-(G8) hold, then E∗(S∗,I∗, Q∗,R∗) is locally asymptotically stable when τ∗∈[0,τ∗0); there is a Hopf bifurcation at E∗(S∗,I∗, Q∗,R∗) when τ∗=τ∗0.
Case 5. τ1>0, τ2∈(0,τ20). For convenience, let ω4 be equal to ω1. Then, this case is similar as in Case 2.
[X0(λ)+X1(λ)+X4(λ)]+[X1(λ)+X3(λ)]e−λτ1+[X4(λ)+X5(λ)]e−2λτ1=0. | (3.28) |
{A13cosτ1∗ω4+A23sinτ1∗ω4+B13=−A33sin2τ1∗ω4+A43cos2τ1∗ω4,A23cosτ1∗ω4−A13sinτ1∗ω4+B23=−A33cos2τ1∗ω4−A43sin2τ1∗ω4, | (3.29) |
with
A13=X01−X21ω24+X03−X23ω24,A23=X11ω4−X31ω34+X13ω4,A33=X14ω4+X15ω4,A43=X24ω24−X04−X05,B13=ω44−X20ω24+X00−X22ω24+X02,B23=X10ω14−X30ω34−X32ω34−X12ω4, |
Because cos2τ1∗ω4+sin2τ1∗ω4=1, sinτ1∗ω4=±√1−cos2τ1∗ω4.
(1) If sinτ1∗ω4=√1−cos2τ1∗ω4, after calculation, we have
A213+A223+B213+B223−A233−A243+2(A13B13+A23B23)cosτ1∗ω4+2(B13A23−A13B23)√1−cos2τ1∗ω4=0. | (3.30) |
Let f3(ω4)=cosτ1∗ω4, and we suppose that (G9): f3(ω4)=cosτ1∗ω4 has at least a positive root ω41, which makes Eq (3.30) true. Thus,
τ(i)1∗1=1ω41×[arccos(f3(ω41))+2iπ],i=0,1,2,⋯. | (3.31) |
(2) If sinτ1∗ω4=−√1−cos2τ1∗ω4, after calculation, we have
A213+A223+B213+B223−A233−A243+2(A13B13+A23B23)cosτ1∗ω4+2(A13B23−A23B13)√1−cos2τ1∗ω4=0. | (3.32) |
Let g3(ω4)=cosτ1∗ω4, and we suppose that (G10): g3(ω4)=cosτ1∗ω4 has at least a positive root ω42, which makes Eq (3.32) true. Thus,
τ(i)1∗2=1ω42×[arccos(g3(ω42))+2iπ],i=0,1,2,⋯. | (3.33) |
Define
τ1∗0=min{τ(i)1∗1,τ(i)1∗2},i=0,1,2,⋯, | (3.34) |
where τ(i)1∗1 and τ(i)1∗2 are defined by Eq (3.31) and Eq (3.33), respectively. Multiplying eλτ1∗ on both sides of Eq (3.28), and then after deriving from τ to λ, we can get
[dλdτ1∗]−1=−[X′0(λ)+X′2(λ)]eλτ1∗+[X′1(λ)+X′3(λ)]+[X′4(λ)+X′5(λ)]e−λτ1∗−λ[X0(λ)+X2(λ)]e−λτ1∗+λ[X4(λ)+X5(λ)]eλτ1∗−τ1∗λ. | (3.35) |
According to the Hopf bifurcation theorem [17], if the surmise (G11): Re[dλ/dτ1∗]−1τ1∗=τ1∗0≠0 is true, the virus-existence equilibrium E∗(S∗,I∗,Q∗,R∗) is locally asymptotically stable. Thus, we have Theorem 4.
Theorem 4. For system (1.2), when R0>1 and the conditions (G9)-(G11) hold, then E∗(S∗,I∗, Q∗,R∗) is locally asymptotically stable when τ1∗∈[0,τ1∗0); there is a Hopf bifurcation at E∗(S∗,I∗,Q∗,R∗) when τ1∗=τ1∗0.
Case 6. τ1∈[0,τ10), τ2>0. Assume that λ=iω5 is the root of Eq (3.2). For convenience, let ω5 be equal to ω2. Then, this case is similar as in Case 3. Then we can get
[X0(λ)+X1(λ)+X4(λ)]+[X2(λ)+X3(λ)+X5(λ)]e−λτ2∗=0, | (3.36) |
Substituting λ=iω5 into Eq.(3.36), we obtain
{C12cosτ2∗ω5+C22sinτ2∗ω5=D12,C22cosτ2∗ω5−C12sinτ2∗ω5=D22, | (3.37) |
with
C12=−X22ω25+X02+X03+X05−X23ω25,C22=−X32ω35+X12ω5+X13ω5+X15ω5,D12=X20ω25+X21ω25+X24ω25−ω45−X00−X01−X04,D22=X30ω35+X31ω35−X10ω5−X11ω5−X14ω5, |
Squaring both sides of two equations in Eq.(3.37), and adding them up, we obtain
C212+C222=D212+D222. | (3.38) |
We suppose that (G12): Eq (3.38) has at least one positive real root ω50. Then, from Eq (3.36), we derive
τ(i)2∗=1ω50×[arccosC13D13+C13D13C213+C223+2iπ], | (3.39) |
where i=0,1,2,⋯.
Define
τ2∗0=min{τ(i)2∗,1=0,1,2,⋯}, | (3.40) |
and τ(i)2∗ is defined by Eq (3.39).
Taking the derivative of λ with respect to τ, we obtain
[dλdτ2∗]−1=−X′0+X′1+X′4λ[X0+X1+X4]+X′2+X′3+X′5λ[X2+X3+X5]−τ2∗λ, | (3.41) |
Thus, it is easy to obtain the expression of Re[dλ/dτ2∗]−1τ2∗=τ2∗0. Based on the Hopf bifurcation theorem [17], when the hypothesis (G13): Re[dλ/dτ2∗]−1τ2∗=τ2∗0≠0 is true. In conclusion, Theorem 5 can be gotten.
Theorem 5. For system (1.2), when R0>1 and the conditions (G12)-(G13) hold, then E∗(S∗,I∗, Q∗,R∗) is locally asymptotically stable when τ2∗∈[0,τ2∗0); there is a Hopf bifurcation at E∗(S∗,I∗,Q∗,R∗) when τ2∗=τ2∗0.
Center manifold theory is one of the important theories for studying Hopf bifurcation. Considering this idea, in this section, we use the method in [18,19] to study direction and stability of Hopf bifurcation of system (1.2). We assume that τ∗2<τ∗1, where τ∗2∈(0,τ20). Let τ1=τ∗1+ϖ(ϖ∈R), χ1=S(τ1t), χ2=I(τ1t), χ3=Q(τ1t), χ4=R(τ1t). System (1.2) becomes
˙χ(t)=Lϖ(χt)+F(ϖ,χt), | (4.1) |
where χ(t)=(χ1,χ2,χ3,χ4)T∈C=C([−1,0],R4) and Lϖ: C→R4 and F: R×C→R4 are defined as
Lϖφ=(τ∗1+ϖ)(L′φ(0)+M′φ(−τ∗2τ∗1)+N′φ(−1)), | (4.2) |
and
F(ϖ,φ)=(τ∗1+ϖ)[F1,F2,0,0]T, | (4.3) |
with
L′=(l110000l22000l32l3300l42l43l44),M′=(0m1200m21m220000000000),N′=(000n1400000000000n44), |
and
F1=h11φ1(0)φ2(0)+h12φ21(0)+h13φ21(0)φ2(0)+h14φ31(0)+⋯,F2=h21φ1(0)φ2(0)+h22φ21(0)+h23φ21(0)φ2(0)+h24φ31(0)+⋯, |
h11=−β(1+σS∗)2,h12=−2σβI∗(1+σS∗)3,h13=2σβ(1+σS∗)3,h14=6σ2βI∗(1+σS∗)4,h21=β(1+σS∗)2,h22=2σβI∗(1+σS∗)3,h23=−2σβI∗(1+σS∗)3,h24=−6σ2βI∗(1+σS∗)4. |
According to Riesz representation theorem, there exists η(ϑ,ϖ) and ϑ∈[−1,0) such that
Lϖφ=∫0−1dη(ϑ,ϖ)φ(ϑ). | (4.4) |
In fact, we choose
η(ϑ,ϖ)={(τ∗1+ϖ)(L′+M′+N′),ϑ=0,(τ∗1+ϖ)(M′+N′),ϑ∈[−τ∗2τ∗1,0),(τ∗1+ϖ)(N′),ϑ∈(−1,−τ∗2τ∗1),0,ϑ=−1. | (4.5) |
with ϕ(ϑ) is the Dirac delta function.
For φ∈C([−1,0],R4), define
A(ϖ)φ={dφ(ϑ)dϑ,−1≤ϑ<0,∫0−1dη(ϑ,ϖ)φ(ϑ),ϑ=0, |
and
R(ϖ)φ={0,−1≤ϑ<0,F(ϖ,φ),ϑ=0. |
Then system (1.2) is equivalent to
˙χ(t)=A(ϖ)χt+R(ϖ)χt. | (4.6) |
For ψ∈C1([0,1],(R4)∗), define
A∗(ψ)={−dψ(s)ds,0<s≤1,∫0−1dηT(s,0)ψ(−s),s=0, |
and the bilinear inner form for A(0) and A∗
⟨ψ(s),φ(ϑ)⟩=ˉψ(0)φ(0)−∫0ϑ=−1∫ϑζ=0ˉψ(ζ−ϑ)dη(ϑ)φ(ζ)dζ, | (4.7) |
where η(ϑ)=η(ϑ,0).
Let u(ϑ)=(1,u2,u3,u4)Teiτ∗1ω∗1ϑ and u∗(s)=D(1,u∗2,u∗3,u∗4)Teiτ∗1ω∗1s. Based on definitions of A(0) and A∗(0), one can obtain
u2=m21e−iτ∗1ω∗1iω∗1−l22−m22e−iτ∗1ω∗1,u3=l32u2iω∗1−l33,u4=l42u2+l43u3iω∗1−l44−n44e−iτ∗2ω∗1,u∗2=−iω∗1+l11m21eiτ∗1ω∗1,u∗3=−l43u∗2iτ∗1ω∗1+l33,u∗4=−n14eiτ∗2ω∗1l44+n14eiτ∗2ω∗1+iω∗1. |
Then, we have
ˉD=[1+u2ˉu∗2+u3ˉu∗3+u4ˉu∗4+τ∗1e−iτ∗1ω∗1u2(m12+m22ˉu∗2)+τ∗1e−iτ∗1ω∗1m21ˉu∗2+τ∗2e−iτ∗2ω∗1u4(n14+n44ˉu∗4)]−1. |
Next, g20, g11, g02 and g21 can be obtained with aid of the method in [20]:
g20=2τ∗1ˉD[h11u2+h12+ˉu∗2(h21u2+h22)],g11=τ∗1ˉD[h11(u2+ˉu2)+2h12+ˉu∗2h21(u2+ˉu2)+2h22ˉu∗2)],g20=2τ∗1ˉD[h11ˉu2+h12+ˉu∗2h21ˉu2+h22ˉu∗2)],g21=2τ∗1ˉD[h11(u2W(1)11(0)+12W(1)20(0)ˉu2+W(2)11(0)+12W(2)20(0))+h12(W(2)11(0)+W(1)20(0))+h13(2u2+ˉu2)+3h14+ˉu∗2h21(W(1)11(0)u2+12W(1)20(0)ˉu2+W(2)11(0)+12W(2)20(0))+h22ˉu∗2(W(2)11(0)+W(1)20(0))+h22(2u2+ˉu2)+3h24], |
with
W20(ϑ)=ig20u(0)τ∗1ω∗1eiτ∗1ω∗1ϑ+iˉg02ˉu(0)3τ∗1ω∗1e−iτ∗1ω∗1ϑ+P1e2iτ∗1ω∗1ϑ,W11(θ)=−ig11u(0)τ∗1ω∗1eiτ∗1ω∗1ϑ+iˉg11ˉu(0)τ∗1ω∗1e−iτ∗1ω∗1ϑ+P2. |
P1 and P2 can be computed by
P1=2(l∗11−m12e−iτ∗1ω∗10−n14e−iτ∗2ω∗1−m21e−iτ∗1ω∗1l∗22000−l32l∗3300−l42−l43l∗44)−1×(P(1)1P(2)100), |
P2=−(l11+m11m120n14m21l22+m22000l32l3300l42l43l44+n44)−1×(P(1)2P(2)200). |
where
l∗11=2iω∗1−l11−m11e−iτ∗1ω∗1,l∗22=2iω∗1−l22−m22e−iτ∗1ω∗1,l∗33=2iω∗1−l33,l∗44=2iω∗1−l44−n44e−iτ∗2ω∗1, |
and
P(1)1=h11u2+h12,P(2)1=h21u2+h22,P(1)2=h11(u2+ˉu2)+2h12,P(2)2=h21(u2+ˉu2)+2h22. |
Then, we can obtain
C1(0)=i2τ∗1ω∗1(g11g20−2|g11|2−|g02|23)+g212μ2=−Re{C1(0)}Re{λ′(τ∗1)},β2=2Re{C1(0)},T2=−Im{C1(0)}+μ2Im{λ′(τ∗1)}τ∗1ω∗1, | (4.8) |
Thus, we have Theorem 6 about the Hopf bifurcation at τ∗1.
Theorem 6. For system (1.2), the following results hold. If μ2>0 (μ2<0), then the Hopf bifurcation is supercritical (subcritical); If β2<0 (β2>0), then the bifurcating periodic solutions are stable (unstable); If T2>0 (T2<0), then the period of the bifurcating periodic solutions increase (decrease).
In order to identify the correctness of above results, some parameters are used to numerical simulations. The values of all parameters are shown in Table 1.
Parameter | Value | Source |
b | 1 | [13] |
p | 0.9 | [13] |
β | 0.65 | [13] |
σ | 0.4 | [13] |
d | 0.1 | assumed |
δ | 0.7 | [13] |
ε | 0.14 | assumed |
γ | 0.3 | [13] |
η | 0.1 | assumed |
α1 | 0.1 | assumed |
α2 | 0.18 | assumed |
Then, system (1.2) takes the form
{dS(t)dt=0.1−0.65S(t−τ1)I(t−τ1)1+0.4S(t−τ1)−0.1S(t)+0.7R(t−τ2),dI(t)dt=0.65S(t−τ1)I(t−τ1)1+0.4S(t−τ1)−0.64I(t),dQ(t)dt=0.14I(t)−0.48Q(t),dR(t)dt=0.9+0.1Q(t)+0.3I(t)−0.7R(t−τ2)−0.1R(t), | (5.1) |
from which we can obtain R0=1.98>1 and E∗(1.6244,2.0598,0.7739,2.0011).
To verify Theorem 1, we use Matlab software and obtain ω10=0.0786 and τ10=9.3985. Figure 1 shows that system (5.1) is locally asymptotically stable when τ1∈[0,τ10), τ2=0 and a Hopf bifurcation arises when τ1=τ10. After that, from Figure 2, system (5.1) becomes unstable when τ1>τ10.
In the same way, we apply Matlab software to verify Theorem 2. Then, we obtain ω20=0.3307 and τ20=2.2352. From Figure 3, system (5.1) is locally asymptotically stable when τ1=0, τ2∈[0,τ20), and a Hopf bifurcation arises when τ2=τ20. Otherwise, system (5.1) becomes unstable when τ2>τ20 in Figure 4.
A short calculation revealed that ω30=0.3833 and τ∗0=1.9282. Afterwards, Figure 5 shows that system (5.1) is locally asymptotically stable when τ1=τ2∈[0,τ∗0), and it can be seen a Hopf bifurcation when τ1=τ2=τ∗0. Figure 6 shows that system (5.1) becomes unstable when τ1=τ2>τ∗0.
It is easy to obtain ω40=0.0710 and τ1∗0=10.4056. When τ1∈[0,τ1∗0), τ2∈[0,τ20), system (1.2) is locally asymptotically stable, and system (5.1) undergoes a Hopf bifurcation when τ1=τ1∗0. Once τ1>τ1∗0, system (5.1) becomes unstable. The corresponding simulations are shown in Figure 7 and Figure 8.
Through simple calculation, ω50=0.3971 and τ2∗0=1.8612 can be got. As Figure 9 shows, system (5.1) is locally asymptotically stable when τ1∈[0,τ10), τ2∈[0,τ2∗0) and a Hopf bifurcation arises when τ2=τ2∗0. And we can see that system (5.1) becomes unstable when τ2>τ2∗0 in Figure 10.
In this paper, we propose a novel Susceptible-Infected-Quarantined-Recovered (SIQRS) computer virus propagation model with quarantine strategy based on the model formulated in [13]. We consider not only incubation period delay, but also temporary immunization time delay when we observe the dynamics of the SIQRS model. The local stability of the virus-free equilibrium and the virus-existent equilibrium also has been discussed. Furthermore, we analyze the local stability and Hopf bifurcation under another five cases with different delays. If τ is less than the key value, system (1.2) is local stable; otherwise, there is a Hopf bifurcation. Then, we determine the direction of Hopf bifurcation and the stability of bifurcating periodic solutions by using the normal form and center manifold theorem. Ultimately, some numerical simulations are used to prove the validity of the theoretical results.
Compared with the model in [13], our novel model consider quarantine strategy, which is used to the prevention and cure of computer virus, so our model is closer to the actual situation. Furthermore, incubation period is one of the significant characteristics of computer virus, and it is very important to take the latency delay into account. Nowadays, antivirus software, which enable computers to gain temporary immunity, plays a very important role in the defense of computer virus. Temporary immunity delay is a common phenomena in real life. In our SIQRS model, the above cases are taken into account at the same time, and our model has more reference value over the existing ones. Global asymptotic stability is as important as local asymptotic stability, and it will be studied in the future.
This research was supported by the Natural Science Foundation of the Higher Education Institutions of Anhui Province (No.KJ2020A0002), the Project of Natural Science Foundation of Anhui Province (No.2008085QA09) and National Natural Science Research Foundation Project (No.12061033).
The authors declare that there are no conflicts of interest regarding the publication of this paper.
[1] |
O. A. Ataguba, J. E. Ataguba, Social determinants of health: the role of effective communication in the COVID-19 pandemic in developing countries, Global Health Action, 1 (2020), 1788263. https://doi.org/10.1080/16549716.2020.1788263 doi: 10.1080/16549716.2020.1788263
![]() |
[2] | World Health Organization, WHO coronavirus disease (COVID-19) Dashboard, 2022. Available from: https://covid19.who.int/?gclid = Cj0KCQjwtZH7BRDzARIsAGjbK2ZXWRpJROEl97HGmSOx0_ydkVbc02Ka1FlcysGjEI7hnaIeR6xWhr4aAu57EALw_wcB. |
[3] |
Q. Huang, X. Huang, Z. Kong, X. Li, D. Tao, Bi-phase evolutionary searching for biclusters in gene expression data, IEEE Trans. Evol. Comput., 5 (2018), 803–814. https://doi.org/10.1109/TEVC.2018.2884521 doi: 10.1109/TEVC.2018.2884521
![]() |
[4] |
Q. Huang, J. Yao, J. Li, M. Li, M. R. Pickering, X. Li, Measurement of quasi-static 3-D knee joint movement based on the registration from CT to US, IEEE Trans. Ultrason. Free, 6 (2020), 1141–50. https://doi.org/10.1109/TUFFC.2020.2965149 doi: 10.1109/TUFFC.2020.2965149
![]() |
[5] |
J. Xi, Z. Miao, L. Liu, X. Yang, W. Zhang, Q. Huang, et al., Knowledge tensor embedding framework with association enhancement for breast ultrasound diagnosis of limited labeled samples, Neurocomputing, 468 (2022), 60–70. https://doi.org/10.1016/j.neucom.2021.10.013 doi: 10.1016/j.neucom.2021.10.013
![]() |
[6] |
Q. Huang, F. Pan, W. Li, F. Yuan, H. Hu, J. Huang, et al., Differential diagnosis of atypical hepatocellular carcinoma in contrast-enhanced ultrasound using spatio-temporal diagnostic semantics, IEEE J. Biomed. Health, 10 (2020), 2860–2869. https://doi.org/10.1109/JBHI.2020.2977937 doi: 10.1109/JBHI.2020.2977937
![]() |
[7] |
J. Xi, D. Wang, X. Yang, W. Zhang, Q. Huang, Cancer omic data based explainable AI drug recommendation inference: A traceability perspective for explainability, Biomed. Signal Process., 79 (2023), 104144. https://doi.org/10.1016/j.bspc.2022.104144 doi: 10.1016/j.bspc.2022.104144
![]() |
[8] |
W. Shi, W. N. Chen, S. Kwong, J. Zhang, H. Wang, T. Gu, et al., A coevolutionary estimation of distribution algorithm for group insurance portfolio, IEEE Trans. Syst. Man CY-S, 11 (2021), 6714–28. https://doi.org/10.1109/TSMC.2021.3096013 doi: 10.1109/TSMC.2021.3096013
![]() |
[9] |
Y. Yuan, M. Chao, Y.C. Lo, Automatic skin lesion segmentation using deep fully convolutional networks with jaccard distance, IEEE Trans. Med. Imaging, 9 (2017), 1876–1886. https://doi.org/10.1109/TMI.2017.2695227 doi: 10.1109/TMI.2017.2695227
![]() |
[10] |
P. Liskowski, K. Krawiec, Segmenting retinal blood vessels with deep neural networks, IEEE Trans. Med. Imaging, 11 (2016), 2369–2380. https://doi.org/10.1109/TMI.2016.2546227 doi: 10.1109/TMI.2016.2546227
![]() |
[11] |
H. Fu, J. Cheng, Y. Xu, D. W. K. Wong, J. Liu, X. Cao, Joint optic disc and cup segmentation based on multi-label deep network and polar transformation, IEEE Trans. Med. Imaging, 7 (2018), 1597–1605. https://doi.org/10.1109/TMI.2018.2791488 doi: 10.1109/TMI.2018.2791488
![]() |
[12] |
H. Fu, Y. Xu, S. Lin, X. Zhang, D. W. K. Wong, J. Liu, et al., Segmentation and quantification for angle-closure glaucoma assessment in anterior segment OCT, IEEE Trans. Med. Imaging, 9 (2017), 1930–1938. https://doi.org/10.1109/TMI.2017.2703147 doi: 10.1109/TMI.2017.2703147
![]() |
[13] |
M. Anthimopoulos, S. Christodoulidis, L. Ebner, A. Christe, S. Mougiakakou, Lung pattern classification for interstitial lung diseases using a deep convolutional neural network, IEEE Trans. Med. Imaging, 5 (2016), 1207–1216. https://doi.org/10.1109/TMI.2016.2535865 doi: 10.1109/TMI.2016.2535865
![]() |
[14] |
J. M. Wolterink, T. Leiner, M. A. Viergever, I. Išgum, Generative adversarial networks for noise reduction in low-dose CT, IEEE Trans. Med. Imaging, 12 (2017), 2536–2345. https://doi.org/10.1109/TMI.2017.2708987 doi: 10.1109/TMI.2017.2708987
![]() |
[15] |
S. Albarqouni, C. Baur, F. Achilles, V. Belagiannis, S. Demirci, N. Navab, Aggnet: Deep learning from crowds for mitosis detection in breast cancer histology images, IEEE Trans. Med. Imaging, 5 (2016), 1313–1321. https://doi.org/10.1109/TMI.2016.2528120 doi: 10.1109/TMI.2016.2528120
![]() |
[16] |
X. Zhang, G. Wang, S. G. Zhao, CapsNet-COVID19: Lung CT image classification method based on CapsNet model, Math. Biosci. Eng., 19 (2022), 5055–5074. https://doi.org/10.3934/mbe.2022236 doi: 10.3934/mbe.2022236
![]() |
[17] |
M. J. Horry, S. Chakraborty, B. Pradhan, M. Fallahpoor, H. Chegeni, M. Paul, Factors determining generalization in deep learning models for scoring COVID-CT images, Math. Biosci. Eng., 18 (2021), 9264–9293. https://doi.org/10.3934/mbe.2021456 doi: 10.3934/mbe.2021456
![]() |
[18] |
A. Singh, K. K. Singh, M. Greguš, I. Izonin, CNGOD-An improved convolution neural network with grasshopper optimization for detection of COVID-19, Math. Biosci. Eng., 19 (2022), 12518–12531. https://doi.org/10.3934/mbe.2022584 doi: 10.3934/mbe.2022584
![]() |
[19] |
S. H. Wang, S. C. Satapathy, M. X. Xie, Y. D. Zhang, ELUCNN for explainable COVID-19 diagnosis, Soft Comput., 2023 (2023), 1–17. https://doi.org/10.1007/s00500-023-07813-w doi: 10.1007/s00500-023-07813-w
![]() |
[20] |
Y. Zhang, M. A. Khan, Z. Zhu, S. Wang, SNELM: SqueezeNet-guided ELM for COVID-19 recognition, Comput. Syst. Sci. Eng., 1 (2023), 13–26. https://doi.org/10.32604/csse.2023.034172 doi: 10.32604/csse.2023.034172
![]() |
[21] |
Y. Zhang, X. Zhang, W. Zhu, ANC: Attention network for COVID-19 explainable diagnosis based on convolutional block attention module, CMES COMP Model. Eng., 3 (2021), 1037–1058. https://doi.org/10.32604/cmes.2021.015807 doi: 10.32604/cmes.2021.015807
![]() |
[22] |
C. C. Lai, T. P. Shih, W. C. Ko, H. J. Tang, P. R. Hsueh, Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) and coronavirus disease-2019 (COVID-19): The epidemic and the challenges, Int. J. Antimicrob. Ag., 3 (2020), 105924. https://doi.org/10.1016/j.ijantimicag.2020.105924 doi: 10.1016/j.ijantimicag.2020.105924
![]() |
[23] |
E. Irmak, Implementation of convolutional neural network approach for COVID-19 disease detection, Physiol. Genomics, 12 (2020), 590–601. https://doi.org/10.1152/physiolgenomics.00084.2020 doi: 10.1152/physiolgenomics.00084.2020
![]() |
[24] |
F. Xie, J. Xi, Q. Duan, Driver attribute filling for genes in interaction network via modularity subspace-based concept learning from small samples, Complexity, 2020 (2020), 1–12. https://doi.org/10.1155/2020/6643551 doi: 10.1155/2020/6643551
![]() |
[25] |
Q. Huang, F. Zhang, X. Li, A new breast tumor ultrasonography CAD system based on decision tree and BI-RADS features, World Wide Web, 21 (2018), 1491–1504. https://doi.org/10.1007/s11280-017-0522-5 doi: 10.1007/s11280-017-0522-5
![]() |
[26] |
G. Dong, Z. C. Zhang, J. Feng, X. M. Zhao, MorbidGCN: Prediction of multimorbidity with a graph convolutional network based on integration of population phenotypes and disease network, Brief Bioinform., 4 (2022). https://doi.org/10.1093/bib/bbac255 doi: 10.1093/bib/bbac255
![]() |
[27] |
S. Wang, P. Li, P. Chen, P. Phillips, G. Liu, S. Du, et al., Pathological brain detection via wavelet packet tsallis entropy and real-coded biogeography-based optimization, Fund. Inform., 4 (2017), 275–291. https://doi.org/10.3233/FI-2017-1492 doi: 10.3233/FI-2017-1492
![]() |
[28] |
L. V. Fulton, D. Dolezel, J. Harrop, Y. Yan, C. P. Fulton, Classification of Alzheimer's disease with and without imagery using gradient boosted machines and ResNet-50, Brain Sci., 9 (2019), 212. https://doi.org/10.3390/brainsci9090212 doi: 10.3390/brainsci9090212
![]() |
[29] | Q. Guan, Y. Huang, Z. Zhong, Z. Zheng, L. Zheng, Y. Yang, Diagnose like a radiologist: Attention guided convolutional neural network for thorax disease classification, preprint, arXiv: 1801.09927. |
[30] | P. P. Ypsilantis, G. Montana, Learning what to look in chest X-rays with a recurrent visual attention model, preprint, arXiv: 1701.06452. |
[31] |
E. Pesce, S. J. Withey, P. P. Ypsilantis, R. Bakewell, V. Goh, G. Montana, Learning to detect chest radiographs containing pulmonary lesions using visual attention networks, Med. Image Anal., 53 (2019), 26–38. https://doi.org/10.1016/j.media.2018.12.007 doi: 10.1016/j.media.2018.12.007
![]() |
[32] |
M. Toğaçar, B. Ergen, Z. Cömert, COVID-19 detection using deep learning models to exploit Social Mimic Optimization and structured chest X-ray images using fuzzy color and stacking approaches, Comput. Biol. Med., 121 (2020), 103805.https://doi.org/10.1016/j.compbiomed.2020.103805 doi: 10.1016/j.compbiomed.2020.103805
![]() |
[33] |
J. P. Cohen, L. Dao, K. Roth, P. Morrison, Y. Bengio, A. F. Abbasi, et al., Predicting covid-19 pneumonia severity on chest x-ray with deep learning, Cureus J. Med. Sci., 12 (2020), e9448. https://doi.org/10.7759/cureus.9448 doi: 10.7759/cureus.9448
![]() |
[34] |
Q. Ni, Z. Y. Sun, L. Qi, W. Chen, Y. Yang, L. Wang, et al., A deep learning approach to characterize 2019 coronavirus disease (COVID-19) pneumonia in chest CT images, Eur. Radiol., 30 (2020), 6517–6527. https://doi.org/10.1007/s00330-020-07044-9 doi: 10.1007/s00330-020-07044-9
![]() |
[35] |
H. Ko, H. Chung, W. S. Kang, K. W. Kim, Y. Shin, S. J. Kang, et al., COVID-19 pneumonia diagnosis using a simple 2D deep learning framework with a single chest CT image: model development and validation, J. Med. Int. Res., 6 (2020), e19569. https://doi.org/10.2196/19569 doi: 10.2196/19569
![]() |
[36] |
X. Wang, X. Deng, Q. Fu, Q. Zhou, J. Feng, H. Ma, et al., A weakly-supervised framework for COVID-19 classification and lesion localization from chest CT, IEEE Trans. Med. Imaging, 8 (2020), 2615–2625. https://doi.org/10.1109/TMI.2020.2995965 doi: 10.1109/TMI.2020.2995965
![]() |
[37] |
A. I. Khan, J. L. Shah, M. M. Bhat, CoroNet: A deep neural network for detection and diagnosis of COVID-19 from chest x-ray images, Comput. Method Prog. Bio., 196 (2020), 105581. https://doi.org/10.1016/j.cmpb.2020.105581 doi: 10.1016/j.cmpb.2020.105581
![]() |
[38] |
L. Hussain, T. Nguyen, H. Li, A. A. Abbasi, K. J. Lone, Z. Zhao, et al., Machine-learning classification of texture features of portable chest X-ray accurately classifies COVID-19 lung infection, Biomed. Eng. Online, 19 (2020), 1–18. https://doi.org/10.1186/s12938-020-00831-x doi: 10.1186/s12938-020-00831-x
![]() |
[39] | J. Zhao, Y. Zhang, X. He, P. Xie, Covid-ct-dataset: a ct scan dataset about covid-19, 2020. |
[40] | COVID-19 CT segmentation dataset. Available from: https://medicalsegmentation.com/covid19/. |
[41] |
D. P. Fan, T. Zhou, G. P. Ji, Y. Zhou, G. Chen, H. Fu, et al., Inf-net: Automatic covid-19 lung infection segmentation from ct images, IEEE Trans. Med. Imaging, 8 (2020), 2626–2637. https://doi.org/10.1109/TMI.2020.2996645 doi: 10.1109/TMI.2020.2996645
![]() |
[42] |
S. H. Wang, V. V. Govindaraj, J. M. Górriz, X. Zhang, Y. D. Zhang, Covid-19 classification by FGCNet with deep feature fusion from graph convolutional network and convolutional neural network, Inform. Fusion, 67 (2021), 208–229. https://doi.org/10.1016/j.inffus.2020.10.004 doi: 10.1016/j.inffus.2020.10.004
![]() |
[43] |
R. R. Selvaraju, M. Cogswell, A. Das, R. Vedantam, D. Parikh, D. Batra, et al., Grad-cam: Visual explanations from deep networks via gradient-based localization, Int. J. Comput. Vision, 2 (2020), 336–359. https://doi.org/10.1007/s11263-019-01228-7 doi: 10.1007/s11263-019-01228-7
![]() |
[44] | A. Chattopadhay, A. Sarkar, P. Howlader, V. N. Balasubramanian, Grad-cam++: Generalized gradient-based visual explanations for deep convolutional networks, in 2018 IEEE winter conference on applications of computer vision (WACV), (2018), 839–847. https://doi.org/10.1109/WACV.2018.00097 |
[45] |
D. Chicco, N. Tötsch, G. Jurman, The Matthews correlation coefficient (MCC) is more reliable than balanced accuracy, bookmaker informedness, and markedness in two-class confusion matrix evaluation, Biodata Min., 1 (2021), 1–22. https://doi.org/10.1186/s13040-021-00244-z doi: 10.1186/s13040-021-00244-z
![]() |
[46] |
Q. Huang, Y. Lei, W. Xing, C. He, G. Wei, Z. Miao, et al., Evaluation of pulmonary edema using ultrasound imaging in patients with COVID-19 pneumonia based on a non-local Channel attention ResNet, Ultrasound Med. Biol., 5 (2022), 945–953. https://doi.org/10.1016/j.ultrasmedbio.2022.01.023 doi: 10.1016/j.ultrasmedbio.2022.01.023
![]() |
[47] |
F. J. P. Montalbo, Diagnosing Covid-19 chest x-rays with a lightweight truncated DenseNet with partial layer freezing and feature fusion, Biomed. Signal Process., 68 (2021), 102583. https://doi.org/10.1016/j.bspc.2021.102583 doi: 10.1016/j.bspc.2021.102583
![]() |
[48] |
R. Mastouri, N. Khlifa, H. Neji, S. Hantous-Zannad, A bilinear convolutional neural network for lung nodules classification on CT images, Int. J. Comput. Ass Rad, 16 (2021), 91–101. https://doi.org/10.1007/s11548-020-02283-z doi: 10.1007/s11548-020-02283-z
![]() |
[49] |
A. Garg, S. Salehi, M. La Rocca, R. Garner, D. Duncan, Efficient and visualizable convolutional neural networks for COVID-19 classification using Chest CT, Expert Syst. Appl., 195 (2022), 116540. https://doi.org/10.1016/j.eswa.2022.116540 doi: 10.1016/j.eswa.2022.116540
![]() |
[50] | F. Chollet, Xception: Deep learning with depthwise separable convolutions, in Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), (2017), 1251–1258. https://doi.org/10.48550/arXiv.1610.02357 |
[51] |
H. Panwar, P. Gupta, M. K. Siddiqui, R. Morales-Menendez, P. Bhardwaj, V. Singh, A deep learning and grad-CAM based color visualization approach for fast detection of COVID-19 cases using chest X-ray and CT-Scan images, Chaos Soliton Fract., 140 (2020), 110190. https://doi.org/10.1016/j.chaos.2020.110190 doi: 10.1016/j.chaos.2020.110190
![]() |
1. | Ge Zhang, Zhiming Li, Anwarud Din, A stochastic SIQR epidemic model with Lévy jumps and three-time delays, 2022, 431, 00963003, 127329, 10.1016/j.amc.2022.127329 | |
2. | Jiaxing Chen, Chengyi Xia, Matjaž Perc, The SIQRS Propagation Model With Quarantine on Simplicial Complexes, 2024, 11, 2329-924X, 4267, 10.1109/TCSS.2024.3351173 | |
3. | Haokuan Cheng, Min Xiao, Yunxiang Lu, Haibo Bao, Leszek Rutkowski, Jinde Cao, Complex pattern evolution of a two-dimensional space diffusion model of malware spread, 2024, 99, 0031-8949, 045237, 10.1088/1402-4896/ad30ee | |
4. | Linji Yang, Qiankun Song, Yurong Liu, Stability and Hopf bifurcation analysis for fractional-order SVEIR computer virus propagation model with nonlinear incident rate and two delays, 2023, 547, 09252312, 126397, 10.1016/j.neucom.2023.126397 | |
5. | Jie 杰 Gao 高, Jianfeng 建锋 Luo 罗, Xing 星 Li 李, Yihong 毅红 Li 李, Zunguang 尊光 Guo 郭, Xiaofeng 晓峰 Luo 罗, Triadic percolation in computer virus spreading dynamics, 2025, 34, 1674-1056, 028701, 10.1088/1674-1056/ad9ff8 | |
6. | JunLing Wang, Xinxin Chang, Lei Zhong, A SEIQRS Computer Virus Propagation Model and Impulse Control With Two Delays, 2025, 0170-4214, 10.1002/mma.10721 | |
7. | Junling Wang, Lei Zhong, Xinxin Chang, Sandip V. George, SEIQRS model analysis and optimal control with two delays, 2025, 20, 1932-6203, e0319417, 10.1371/journal.pone.0319417 |