ebbonya@yahoo.com Department The concept of information science is inevitable in the human development as science of Mathematics and Statistics, and technology has become the driving force of all economics. The connection of one Kumasi Technical University, Kumasi, Ghana human being during epidemics is vital and can be studied using mathematical princi- Full list of author information ples. In this study, a well-recognized model of computer virus by Piqueira et al. (J Com- is available at the end of the put Sci 1:31−34, 2005) and Piqueira and Araujo (Appl Math Comput 2(213):355−360, article 2009) is investigated through the Caputo and beta-derivatives. A less detail of stability analysis was discussed on the extended model. The analytical solution of the extended model was solved via the Laplace perturbation method and the homotopy decompo- sition technique. The sequential summary of each of iteration method for the extend model was presented. Using the parameters in Piqueira and Araujo (Appl Math Com- put 2(213):355−360, 2009), some numerical simulation results are presented. Keywords: Computer virus, Caputo fractional derivative, Beta-derivative, Antidotal, Stability Background The idea of computer virus came into being around 1980 and has continued threatening the society. During these early stages, the threat of this virus was minimal [1]. Modern civilized societies are being automated with computer applications making life easy in the areas such as education, health, transportation, agriculture and many more. Follow- ing recent development in complex computer systems, the trend has shifted to sophis- ticate dynamic of computer virus which is difficult to deal with. In 2001, for example, the cost associated with computer virus was estimated to be 10.7 United State dollars for only the first quarter [ 1]. Consequently, a comprehensive understanding of computer virus dynamics has become inevitable to researchers considering the role played by this wonderful device. To ensure the safety and reliability of computers, this virus burden can be tackled in twofold: microscopic and macroscopic [2−6]. The microscopic level has been investigated by [ 3], who developed anti-virus program that removes virus from the computer system when detected. The program is capable of upgrading itself to ensure that new virus can be dealt with when attacks computer. The characteristics of this program are similar to that of vaccination against a disease. They are not able to guarantee safety in computer network system and also difficult to make © The Author(s) 2017. This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 2 of 15 good future predictions. The macroscopic aspect of computer has seen tremendous attention in the area of modeling the spread of this virus and determining the long-term behavior of the virus in the network system since 1980 [4]. The concept of epidemiologi - cal modeling of disease has been applied in the study of the spread of computer virus in macroscopic scale [6−8]. Possibly reality of nature could be well understood via fractional calculus perspec- tive. A considerable attention has been devoted to fractional differential equations by the fact that fractional-order system is capable to converge to the integer-order system timely. Fractional-order differential equations’ applications in modeling processes have the merit of nonlocal property [9–11]. The model proposed in [10] is a deterministic one and fails to have hereditary and memory effect and therefore, cannot adequately describe the processes very well. In this paper, we present the fractional-order derivative and obtain analytic numeric solution of the model presented in [10]. The rationale behind the application of frac - tional derivatives can also be ascertained from some of the current papers published on mathematical modeling [12–16]. In addition to this, the practical implication of frac- tional derivative can be established in [17]. Model formulation In this study, we take into account the model proposed by [10]. In their study, the total population of this model is denoted by T which is subdivided into four groups. S denotes the non-infected computers capable of being infected after making contact with infected computer. A is the kind of computers non-infected equipped with antivirus. I denotes infected computers capable of infecting non-infected computers and R deals with removed ones due to infection or not. The recruitment rate of computers into the non-infected computers’ class is denoted by N and µ is the proportion coefficient for the mortality rate which is not attributable to the virus. β is the rate of proportion of infec- tion as a result of product of SI. The conversion of susceptible computer into antidotal is the product of SI denoted by α . The proportion of converting infected computers into SA antidotal ones in the network is the product of SA denoted by α . The rate of removed IA computers being converted into susceptible class is represented by σ and δ denotes the rate at which the virus rate computers useless and remove from the system. The mathematical model under consideration here is given as: dS = N − α SA − βSI − μS + σR, AS dt dI = βSI − α AI − δI − μI , AI dt (1) dR = δI − σR − μR, dt dA = α SA + α AI − μA. AS AS dt Here, the recruitment rate is taken to be N = 0, indicating that there is no new com- puter entering into the system during the propagation of the virus. This is because in reality the transfer of virus is faster than adding new computers into the system. The same reason can assign to the choice of µ = 0, taking into account the fact that the com- puter outmodedness time is longer than the time of the virus action being manifested. Accordingly, equation system (1) is reformulated as follows: Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 3 of 15 dS =−α SA − βSI + σ R, AS dt dI = βSI − α AI − δI , AI dt (2) dR = δI − σ R, dt dA = α SA + α AI . AS AS dt In this paper, we shall fully explore the concept of fractional derivatives and other cur- rent proposed derivatives, and in this study, we shall examine this model in the con- text of fractional derivatives as well as the beta-derivatives. Consequently, Eq. (2) can be transformed into the following: A α D S(t) =−α SA − βSI + σR, AS 0 t A α D I(t) = βSI − α AI − δI , AI 0 t (3) A α D R(t) = δI − σR, 0 A α D A(t) = α SA + α AI . AS AS 0 t A α where D represents the Caputo derivative or the new derivative called beta-derivative. In the next section, some background on the use of fractional and beta-derivatives will be presented. The basic aim of this study is to explore both fractional and beta-deriv - atives for modeling epidemiological problem in computers. The fractional derivatives are noted for non-local problems and maybe appropriate for epidemiological issues. The fractional order, however, is an indispensable tool for numerical simulations, and there- fore, a local derivative with fractional order is presented in this study to model the prop- agation of computer virus in a network. This provides the invariance of as to be determined. We conclude from this theorem, that it is sufficient to deal with the dynamics of (1) in . In this respect, the model can be assumed as being epidemiologically and mathematically well-posed [18]. Basic concept about the beta‑derivative and Caputo derivative Definition 1 Let f be a function, such that, f : [a,∞) → R. Then, the beta-derivative is expressed as follows: 1−β x + ε x + − f (x) Γ (β) (4) A β D f (x) = lim 0 x ε→0 ε x a, β ∈ 0, 1 . for all ( ] Then if the limit of the above exists, it is said to be beta-differen - tiable. It can be noted that the above definition does not depend on the interval stated. If the function is differentiable, then definition given at a point zero is different from zero. Theorem 1 Assuming that g �= 0 and there are two functions beta-differentiable with β ∈ (0, 1]; then, the following relations can be presented: Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 4 of 15 A α A α A α 1. D af (x) + bg(x) = a D f (x) + b D f (x) for all a and b being real num- 0 x 0 x 0 x bers, A α 2. D (c) = 0 for c any given constant, 0 x A α A α A α 3. D f (x)g(x) = g(x) D f (x) + f (x) D g(x) 0 x 0 x 0 x A α α f (x) g(x) D (f (x))−f (x)D (g(x)) A α 0 x x 4. D = 0 x g(x) g x The proofs of the above relations are identical to the one in [19]. Definition 2 Assuming that f : [a,∞) → R be a function in a way that f is differenti - able and also alpha-differentiable. Assume g be a function defined in the range of f and also differentiable, then we obtain the following rule: β−1 A α β (5) D I f (x) = t + f (t) dt. 0 x x Γ (β) The above operator is referred to as the inverse operator of the proposed fractional derivative. We shall present the principle behind this statement using the following theorem. A α A Theorem 2 D I f (x) = f (x) for all x a with f a given continuous and differenti - 0 x 0 able function. Definition 3 The Caputo fractional derivative of a differentiable function is expressed as: 1 d α n−α−1 D f (x) = (x − t) f (t) dt, n − 1 <α n. (6) Γ(n − α) dt The properties behind the use of the Caputo derivative can be established in [14–16, 19]. Given all the information discussed, we shall introduce in the subsequent section the analysis of this model. Analysis of the mathematical model This section is devoted to discuss the stability analysis of the model. The disease-free equilibrium and endemic equilibrium points are established. To determine the equilibria points, we make an asumption that the system does not depend on time; hence, A α A α A α A α D S(t) = D I(t) = D R(t) = D A(t) = 0. (7) 0 t 0 t 0 t 0 t ∗ ∗ ∗ ∗ ∗ 0 =−α S A − βS I + σR AS ∗ ∗ ∗ ∗ ∗ 0 = βS I − α A I − δI AI (8) ∗ ∗ 0 = δI − σR ∗ ∗ ∗ 0 = α S A + α A I AS AS Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 5 of 15 Solving the above system, we obtain δ T − δ/β T − δ/β ∗ ∗ ∗ S = ; I = ; R = ; A = 0. (9) β 1 + δ/σ 1 + σ/δ Hence, the disease-free equilibria are given as: E = (S, I, R, A) = (0, 0, 0, T ); 1 (10) E = (S, I , R, A) = (T ,0,0,0). 2 (11) The stability analysis of this model has been extensively dealt with in [10]. The next sec - tion will be concentrated on an approximate solution based on the two analytical tech- niques for each situation. Analysis of approximate solutions One of the most challenging tasks in non-linear fractional differential equation systems is probably how to obtain exact analytical solutions. This accounts for the reasons why in recent times, a lot of attention has been devoted in the quest for obtaining techniques that can ensure asymptotic solutions in such situations. We shall make reference to some of the recent techniques on this subject which are efficient and effective and have been widely used; for instance, the decomposition method [12], Sumudu homotopy perturba- tion method [20], the Adomian Decomposition method [11, 21], homotopy perturbation method [19, 22, 23], the homotopy Laplace perturbation method [24], and the homot- opy. In this study however, we shall make use of two of these stated techniques, spe- cifically the Laplace homotopy perturbation method and the homotopy decomposition method. The homotopy decomposition method will be employed to provide solution to the model with the beta-derivative, followed by the Laplace homotopy perturbation method which will be used to solve the system with Caputo derivative. Solution with the Laplace homotopy perturbation method This form was initially proposed in [18], and has been also employed in various scientific researches. We shall explore the methodology for obtaining solution to system (3) with the Caputo fractional derivative in this section: C α D S(t) =−α SA − βSI + σR, AS 0 t D I(t) = βSI − α AI − δI , AI 0 t (12) C α D R(t) = δI − σR, 0 t C α D A(t) = α SA + α AI . AS AI Applying the Laplace transform operator on both sides of the above system, we obtain the following: 1 1 S(τ ) = S(0) + ℓ(−α SA − βSI + σR), α α AS τ τ 1 1 I(τ ) = I(0) + ℓ(βSI − α AI − δI), α α AI τ τ 1 1 (13) R(τ ) = R(0) + ℓ(δI − σR), α α τ τ 1 1 A(τ ) = A(0) + ℓ(α SA + α AI). α α AS AI τ τ Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 6 of 15 The Laplace variable is denoted by τ s. Further, the inverse Laplace transform is applied on both sides of the system to yield � � −1 S(t) = S(0) + ℓ ℓ(−α SA − βSI + σ R) , α AS � � −1 1 I(t) = I(0) + ℓ ℓ(βSI − α AI − δI) , α AI � � (14) −1 1 R(t) = R(0) + ℓ ℓ(δI − σ R) , � � −1 1 A(t) = A(0) + ℓ ℓ(α SA + α AI) . α AS AI Following the system above, we shall make an assumption that a solution can be obtained in the form of series as follows: ∞ ∞ ∞ ∞ S(t) = S (t), I(t) = I (t), R(t) = R (t), A(t) = A (t). n n n n (15) n=0 n=0 n=0 n=0 Conversely, substituting the above solution in system (11) and adding the embedding parameter p ∈ (0, 1], bringing all the terms of the same power of the embedding param- eter p together, we have S (t) = S(0) I (t) = I(0) 0 0 p : , (16) R (t) = R(0) 0 A (t) = A(0) � � −1 S (t) = ℓ ℓ(−α S A − βS I + σ R ) 1 α AS 0 0 0 0 0 � � −1 1 I (t) = ℓ ℓ(βS I − α A I − δI ) 1 α 0 0 AI 0 0 0 � � p : (17) −1 1 R (t) = ℓ ℓ(δI − σ R ) 1 α 0 0 � � −1 1 A (t) = ℓ ℓ(α S A + α A I ) 1 α AS 0 0 AI 0 0 In broad-spectrum, we shall obtain the following system of iteration formulas (15): � � �� n−1 n−1 � � −1 S (t) = ℓ ℓ −α A S A − β I S + σ R α n AS (n−j−1) j j j (n−1) (n−j−1) s j=0 j=0 � � �� n−1 n−1 � � −1 1 I (t) = ℓ ℓ β I S − α I A − δI n α j Al j (n−1) n−j−1 n−j−1 s ( ) ( ) p : . j=0 j=0 � � � � −1 1 R (t) = ℓ ℓ δI − σ R n (n−1) (n−1) � � �� n−1 n−1 � � −1 1 A (t) = ℓ ℓ α α A S A + α I A n α AS AS (n−j−1) j j Al j n−j−1 s ( ) j=0 j=0 (18) The above general rule can be simplified in the following algorithm steps: S (t) = S(0) I (t) = I(0) 0 0 p : (19) R (t) = R(0) A (t) = A(0) 0 Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 7 of 15 Algorithm 1. This technique can be employed to obtain a special solution to system (2) via a Caputo fractional derivative S (t) = S(0) I (t) = I(0) Input p : as initial input, R (t) = R(0) 0 A (t) = A(0) j-number terms in the rough computation, S (t) = S(0) appr I (t) = I(0) appr Output: the estimated solution. R (t) = R(0) appr A (t) = A(0), appr S (t) = S(0) S (t) = S(0) S (t) = S(t) 0 appr 0 I (t) = I(0) I (t) = I(0) I (t) = I(t) 0 appr 0 Step1 : Put and = (20) R (t) = R(0) R (t) = R(0) R (t) = R(t) 0 appr 0 A (t) = A(0) A (t) = A(0) A (t) = A(t), 0 appr 0 Step 2: For j = 1 to n − 1 do step 3, step 4 and step 5: � � −1 1 S (t) = ℓ ℓ(−α S A − βS I + σ R ) 1 α AS 0 0 0 0 0 � � −1 1 I (t) = ℓ ℓ(βS I − α A I − δI ) 1 α 0 0 AI 0 0 0 � � (21) 1 −1 R (t) = ℓ ℓ(δI − σ R ) 1 0 0 � � −1 A (t) = ℓ ℓ(α S A + α A I ) 1 α AS 0 0 AI 0 0 Step 3: Compute � � �� n−1 n−1 � � −1 1 S (t) = ℓ ℓ −α A S A − β I S + σ R n α AS (n−j−1) j j j (n−1) n−j−1 τ ( ) j=0 j=0 � � �� n−1 n−1 � � −1 I (t) = ℓ ℓ β I S − α I A − δI n α j AI j (n−1) (n−j−1) (n−j−1) j=0 j=0 (22) � � � � −1 1 R (t) = ℓ ℓ δI − σ R n α (n−1) (n−1) � � �� n−1 n−1 � � 1 −1 A (t) = ℓ ℓ α α A S A + α I A n α AS AS (n−j−1) j j AI j (n−j−1) j=0 j=0 Step 4: Compute S (t) = B (t) + S (t) (m+1) m (appr) I (t) = B (t) + I (t) (m+1) m (appr) (23) R (t) = K (t) + R (t) (m+1) m (appr) A (t) = K (t) + A (t) (m+1) m (appr) Step 5: Compute S (t) = S (t) + S (t) (appr) appr (m+1) I (t) = I (t) + I (t) (appr) appr (m+1) (24) R (t) = R (t) + R (t) (appr) appr (m+1) A (t) = A (t) + A (t) (appr) appr (m+1) Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 8 of 15 Stop. The above algorithm shall be applied to obtain the unique solution of system (3) via the Caputo derivative. We shall explore the situation where the beta-derivative is used and this will be discussed in “Basic concept about the beta-derivative and Caputo deriva- tive” section. Solution with the homotopy decomposition method This method is explored here to obtain a special solution to system (3) with the beta- derivative. The reason is that using the Laplace transform on this derivative does not guarantee desirable results. The inverse operator of this derivative, however, can be applied which is termed as the beta-integral, and this helps to convert the ordinary dif- ferential equation into an integral equation in a way that the concept of homotopy can be applied. Consequently, taking the inverse operator on both sides of system (2), we have the following system of integral equations: A α S(τ ) = S(0) + I (−α SA − βSI + σ R) AS 0 t A α I(τ ) = I(0) + I (βSI − α AI − δI) AI (25) A α R(τ ) = R(0) + I (δI − σ R) 0 t A α A(τ ) = A(0) + I (α SA + α AI) AS AI 0 t where 1−β I f (x) = τ + f (τ )dτ . (26) 0 t Γ (β) Additionally, we shall make an assumption that a solution of the above can be derived in a form of series as follows: ∞ ∞ ∞ ∞ S(t) = S (t), I(t) = I (t), R(t) = R (t), A(t) = A (t). n n n n (27) n=0 n=0 n=0 n=0 Conversely, substituting the above solution in system (15) and adding the embedding parameter p ∈ (0, 1], bringing all the terms of the same power of the embedding param- eter p together, we have S (t) = S(0) I (t) = I(0) 0 0 p : (28) R (t) = R(0) 0 A (t) = A(0) 0 Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 9 of 15 � � � 1−β 1 S (t) = τ + {−α S A − βS I + σ R }dτ 1 AS 0 0 0 0 0 Γ (β) � � t � 1−β 1 I (t) = τ + {βS I − α A I − δI }dτ 1 0 0 AI 0 0 0 Γ (β) 1 0 p : . � � 1−β 1 (29) R (t) = τ + {δI − σ R }dτ 1 0 0 Γ (β) � � t 1−β 1 A (t) = τ + {α S A + α A I }dτ . 1 AS 0 0 AI 0 0 Γ (β) In broad sense, we shall have the ensuing system of iteration formulas: � � � � t n−1 n−1 � 1−β � � 1 S (t) = τ + −α A S A − β I S + σ R dτ n AS (n−j−1) j j j (n−1) Γ (β) (n−j−1) 0 j=0 j=0 � � � � t n−1 n−1 1−β � � � 1 I (t) = τ + β I S − α I A − δI dτ n j AI j (n−1) (n−j−1) (n−j−1) Γ (β) 0 j=0 j=0 p : (30) � � � 1−β� � R (t) = τ + δI − σ R dτ n (n−1) (n−1) Γ (β) 0 � � t � � n−1 n−1 � 1−β � � A (t) = τ + α α A S A + α I A dτ . n AS AS (n−j−1) j j AI j Γ (β) (n−j−1) j=0 j=0 The above embellishment can be taken up in the succeeding procedure. S (t) = S(0) I (t) = I(0) Input as initial input, R (t) = R(0) 0 A (t) = A(0) j-number terms in the rough computation, S (t) appr I (t) appr Output: the estimated solution. R (t) appr A (t) appr Step 1: S (t) = S(t) S (t) S (t) 0 appr 0 I (t) = I(0) I (t) I (t) 0 appr 0 put and = (31) R (t) = R(0) R (t) R (t) 0 appr 0 A (t) = A(0) A (t) A (t) 0 appr 0 Step 2: For J − 1 to n − 1 do step 3, step 4 and step 5: � � 1−β � { } S (t) = τ + −α S A − βS I + σ R dτ 1 AS 0 0 0 0 0 Γ (β) � � t 1−β 1 I (t) = τ + {βS I − α A I − δI }dτ 1 0 0 AI 0 0 0 Γ (β) (32) � � � 1−β 1 R (t) = τ + {δI − σ R }dτ 1 0 0 Γ (β) � � � 1−β A (t) = τ + {α S A + α A I }dτ 1 AS 0 0 AI 0 0 Γ (β) 0 Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 10 of 15 Step 3: Compute: � � � � t n−1 n−1 1−β � � � 1 B (t) = τ + −α A S A − β I S + σ R dτ n AS (n−j−1) j j j (n−1) n−j−1 Γ (β) ( ) 0 j=0 j=0 � � � � t n−1 n−1 � 1−β � � 1 B (t) = τ + β I S − α I A − δI dτ n j AI j (n−1) (n−j−1) (n−j−1) Γ (β) j=0 j=0 � � 1−β � � � K (t) = τ + δI − σ R dτ n (n−1) (n−1) Γ (β) � � � � t n−1 n−1 1−β � � � 1 K (t) = τ + α α A S A + α I A dτ n AS AS (n−j−1) j j AI j n−j−1 Γ (β) ( ) 0 j=0 j=0 (33) Step 4: Compute: S (t) = B (t) + S (t) (m+1) m (appr) I (t) = B (t) + I (t) (m+1) m (appr) (34) R (t) = K (t) + R (t) (m+1) m (appr) A (t) = K (t) + A (t) (m+1) m (appr) Step 5: Compute: S (t) = S (t) + S (t) (appr) (appr) (m+1) I (t) = I (t) + I (t) (appr) (appr) (m+1) (35) R (t) = R (t) + R (t) (appr) (appr) (m+1) A (t) = A (t) + A (t) (appr) (appr) (m+1) Numerical results We shall employ both Algorithms 1 and 2 to obtain an approximate solution of system (3) via the Caputo fractional derivative and the beta-derivative methods. With the Caputo fractional derivative In this part, Algorithm 1 is applied to obtain an approximation solution of system (3): S (t) = e I (t) = f (36) R (t) = g 0 A (t) = h t −α eh−βef +σ g ( ) AS S (t) = Γ [1+μ] t (βef −α hf −δf ) AI I (t) = Γ [1+μ] (37) t δf −σ g ( ) R (t) = Γ [1+μ] t α eh+α hf ( ) AS AI A (t) = Γ 1+μ [ ] Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 11 of 15 With the beta‑derivative Algorithm 2 is used to derive the following series solutions: −µ −µ 1 1 2 − t + 1 + tΓ µ −α eh − βef + σ g ( [ ]) AS Γ [µ ] Γ [µ ] (38) S (t) = (−2 + µ )Γ [µ ] −µ −µ 1 1 2 − t + (1 + tΓ [µ ]) βef − α hf − δf AI Γ [µ ] Γ [µ ] (39) I (t) = (−2 + µ )Γ [µ ] −µ −µ 1 1 2 − t + (1 + tΓ [µ ]) δf − σ g Γ [µ ] Γ [µ ] (40) R (t) = (−2 + µ )Γ [µ ] −µ −µ 1 1 2 − t + (1 + tΓ µ ) α eh + α hf [ ] AS AI Γ [µ ] Γ [µ ] (41) A (t) = (−2 + µ )Γ µ [ ] Numerical simulations In this section, we use parameters in [10], to obtain numerical simulation on illustration of the approximate solutions based on function of time as well as alpha. The parameter values used are α = 0.6, α = 0.4, β = 0.2, σ = 0.85, δ = 0.40 and with the following AS IA initial conditions S(0) = 100, I(0) = 10, R(0) = 5 and A(0) = 20. Figures 1, 2, 3, 4, 5, 6, 7 and 8 depict the graphical representations of system (3). It is clearly seen from the graph that susceptible class which also represents the total popula- tion get quickly infected due to how fast the virus spread with the system. It is obvious in the above figures that the total number of infected computers decreased as the total number of antidotal increased which is a strategy to reduce the number of susceptible computers. The numerical predictions (Figs. 1, 2, 3, 4, 5, 6, 7, 8) are also attributable to fractional order of beta. Realistically, when the beta is above 0.5, the non-realistic pre- diction is attained. As the beta value increases above 0.5, it appears that anodotal com- puters exceed the entire initial population. Thus, there exists unrealistic prediction. The best option to secure more computers is put anti-virus on both infected and susceptible computers to avoid disaster and huge cost. This is achieved when the beta value is <0.5 as observed in (Figs. 4, 5, 6, 7, 8). It is not surprising, given the potential danger of anti virus in a computer system because the entire initial population ends up in that com- partment. It is remarkable to note that when beta is 1 we obtain the ordinary deriva- tive which implies the model ordinary derivative and hardly give good predictions. The newly introduced beta-calculus, however, has the potential of vividly describing a given physical problem. The obtained Figs. 1, 2, 3, 4, 5, 6, 7 and 8 is far better and accurate as compared to those obtained in [17]. This work has given better predictions as shown in Figs. 1, 2, 3, 4, 5, 6, 7 and 8 which is not the case of integer order in [17]. Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 12 of 15 Fig. 1 Approximate solution for α = 0.105 Fig. 2 Approximate solution for α = 0.105 Fig. 3 Approximate solution for α = 0.105 Conclusions The concept of beta-derivative and Caputo fractional derivative has assisted in investi - gating the spread of computer virus in a system. This computer virus has been found all over the world where computers are available and causing major financial losses to many establishments. It is worthy to note that the definition of fractional derivative is associ - ated with the convolution of the derivative of a given function with its function power. Convolution is applied to many branches of engineering including image processing as a filter. Fractional derivative, however, in epidemiology serves a memory capable of tracing the spread from beginning to the infected individual. For beta-derivative which Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 13 of 15 Fig. 4 Approximate solution for β = 1 Fig. 5 Approximate solution for β = 0.65 Fig. 6 Approximate solution for β = 0.3 ranges between fractional order and local derivative, the spread of computer virus at local level is identified with a given fractional order. In this study, two distinct concepts of derivatives are employed to investigate the spread of computer virus. The proposed model based on the methodology used was solved iteratively. The numerical simulation results depict that the prediction is based on the fractional order of beta. Simply when beta is close to 1, we obtain non-realistic prediction which is not the case in [10] and when beta is ≤0.5, a good prediction is attained. Since it is the desire of any institution to have their computers with virus free, the initial computers at the end of the simula- tion moved into Anodotal section when beta is <0.5 as observed in Figs. 4, 5, 6, 7 and 8. Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 14 of 15 Fig. 7 Approximate solution for β = 0.25 Fig. 8 Approximate solution for β = 0.2 It worthy to notice that when beta is 1, we have ordinary differential derivative cases for both derivatives which do not provide a good prediction. Thus, with the newly intro - duced, beta-calculus has the potential of providing a vivid account of physical problem more precisely. Authors’ contributions All the authors have contributed equally for the production of this study. All authors read and approved the final manuscript. Author details 1 2 Department of Mathematics and Statistics, Kumasi Technical University, Kumasi, Ghana. Institute for Groundwater Studies, University of the Free State, Bloemfontein 9301, South Africa. Department of Mathematics Abdul Wali Khan, University Mardan, Mardan 23200, Pakistan. Acknowledgements The authors are thankful to the editor and reviewers for their careful reading and suggestion that greatly improved the quality of the paper. Competing interests The authors declare that they have no competing interests. Received: 8 September 2016 Accepted: 7 December 2016 References 1. Denning PJ (1990) Computers under attack. Addison-Wesley, New York. http://www.washtech.com/news/ netarch/12267-1.html 2. Forrest S, Hofmayer SA, Somayaj A (1997) Computer immunology. Commun ACM 40(10):88–96 Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 Page 15 of 15 3. Kephart JO, Hogg T, Huberman BA (1989) Dynamics of computational ecosystems. Phys Rev A 40(1):404–421 4. Kephart JO, White SR, Chess DM (1993) Computers and epidemiology. IEEE Spectr 30(5):20–26 5. Kephart JO, Sorkin GB, Swimmer M (1997) An immune system for cyberspace. In: Proceedings of the IEEE interna- tional conference on systems, men, and cybernetics. IEEE, Orlando, p 879–884 6. Mishra BK, Saini D (2007) Mathematical models on computer viruses. Appl Math Comput 187(2):929–936 7. Mishra BK, Jha N (2007) Fixed period of temporary immunity after run of the anti-malicious software on computer nodes. Appl Math Comput 190:1207–1212 8. Draief M, Ganesh A, Massouili L (2008) Thresholds for virus spread on networks. Ann Appl Probab 18(2):359–378 9. Piqueira JRC, Navarro BF, Monteiro LHA (2005) Epidemiological models applied to viruses in computer networks. J Comput Sci 1:31–34 10. Piqueira JRC, Araujo VO (2009) A modified epidemiological model for computer viruses. Appl Math Comput 2(213):355–360 11. Wazwaz AM (2005) Adomian decomposition method for a reliable treatment of the Bratu-type equations. Appl Math Comput 166:652–663 12. Atangana A, Bildik N (2013) The use of fractional order derivative to predict the groundwater flow. Math Probl Eng 2013:9 13. Cloot A, Botha JF (2005) A generalised groundwater flow equation using the concept of non-integer order deriva- tives. Water SA 32(1):1–7 14. Atangana A, Vermeulen PD (2014) Analytical solutions of a space-time fractional derivative of groundwater flow equation. Abstr Appl Anal 2014:11 15. Su W, Baleanu D, Yang X, Jafari H (2013) Damped wave equation and dissipative wave equation in fractal strings within the local fractional variational iteration method. Fixed Point Theory Appl 2013(1):1 16. Miller KS, Ross B (1993) An introduction to the fractional calculus and fractional differential equations. Wiley, New York 17. Podlubny I (2002) Geometric and physical interpretation of fractional integration and fractional differentiation. Fract Calc Appl Anal 5:367–386 18. Hethcote HW (2000) The mathematics of infectious diseases. SIAM Rev 42(4):599–653 19. Ganji DD, Sadighi A (2007) Application of homotopy-perturbation and variational iteration methods to nonlinear heat transfer and porous media equations. J Comput Appl Math 207:24–34 20. Singh J, Devendra Kumar S (2011) Homotopy perturbation Sumudu transform method for nonlinear equations. Adv Appl Mech 4:165–175 21. Adomian G, Rach R (1993) Analytic solution of nonlinear boundary value problems in several dimensions by decom- position. J Math Anal Appl 174:118–137 22. Atangana A, Bildik N (2013) Approximate solution of Tuberculosis disease population dynamics model. Appl Anal 2013:1–8 23. Jafari H, Momani S (2007) Solving fractional diffusion and wave equations by modified homotopy perturbation method. Phys Lett A 370:388–396 24. Khan Y (2009) An effective modification of the Laplace decomposition method for nonlinear equations. Int J Nonlin- ear Sci Num Simul 10:1373–1376 Submit your next manuscript to BioMed Central and take full advantage of: • Convenient online submission • Thorough peer review • No space constraints or color ﬁgure charges • Immediate publication on acceptance • Inclusion in PubMed, CAS, Scopus and Google Scholar • Research which is freely available for redistribution Submit your manuscript at www.biomedcentral.com/submit
Asia Pacific Journal on Computational Engineering – Springer Journals
Published: Jan 3, 2017
You can share this free article with as many people as you like with the url below! We hope you enjoy this feature!
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.