{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T16:38:21Z","timestamp":1768840701543,"version":"3.49.0"},"reference-count":36,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Mathematics and Mathematical Sciences"],"published-print":{"date-parts":[[2012]]},"DOI":"10.1155\/2012\/421419","type":"journal-article","created":{"date-parts":[[2012,7,3]],"date-time":"2012-07-03T17:01:56Z","timestamp":1341334916000},"page":"1-16","source":"Crossref","is-referenced-by-count":13,"title":["Optimal Control of Multiple Transmission of Water-Borne Diseases"],"prefix":"10.1155","volume":"2012","author":[{"given":"G.","family":"Devipriya","sequence":"first","affiliation":[{"name":"P. G. Department of Mathematics, Women's Christian College, Chennai 600006, India"}]},{"given":"K.","family":"Kalaivani","sequence":"additional","affiliation":[{"name":"P. G. Department of Mathematics, Women's Christian College, Chennai 600006, India"}]}],"member":"98","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhydrol.2005.07.003"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1126\/science.1128845"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127291"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tox.2004.01.030"},{"issue":"5","key":"21","doi-asserted-by":"crossref","first-page":"565","DOI":"10.3201\/eid0905.020562","volume":"9","year":"2003","journal-title":"Emerging Infectious Diseases"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1128\/IAI.74.2.904-909.2006"},{"key":"36","volume-title":"Global defense against the infectious disease threat","year":"2002"},{"issue":"2","key":"10","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1093\/wbro\/lkg011","volume":"18","year":"2003","journal-title":"World Bank Research Observer"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1017\/S1355770X0700383X"},{"issue":"4","key":"28","first-page":"883","volume":"27","year":"1997","journal-title":"Biometrics"},{"issue":"1","key":"11","first-page":"1","volume":"2","year":"2002","journal-title":"Topics in Economic Analysis and Policy"},{"key":"27","volume-title":"The optimal treatment of disease under a budget constraint","year":"2006"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.2166\/wh.2006.001"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s11538-008-9384-4"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1038\/nature06599"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1289\/ehp.0800423"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-environ-100809-125342"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.3923\/rjmp.2011.621.626"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/oca.710"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/828509"},{"key":"8","first-page":"1","volume":"125","year":"2006","journal-title":"Electronic Journal of Differential Equations"},{"key":"17","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1090\/conm\/410\/07728","volume":"410","year":"2006","journal-title":"Contemporary Mathematics"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jedc.2007.08.005"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.2507\/IJSIMM07(2)3.103"},{"issue":"1","key":"37","first-page":"81","volume":"30","year":"2008","journal-title":"Journal of Electronics and Telecommunication Research Institute"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.3934\/dcdsb.2009.11.587"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2008.0402"},{"issue":"4","key":"4","first-page":"35","volume":"11","year":"2010","journal-title":"Computational and Mathematical Methods in Medicine"},{"key":"32","doi-asserted-by":"crossref","first-page":"15","DOI":"10.4236\/ica.2010.11002","volume":"1","year":"2010","journal-title":"Intelligent Control and Automation"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2011.8.141"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/s10441-010-9095-8"},{"issue":"10","key":"38","first-page":"1929","volume":"8","year":"2011","journal-title":"Journal of Information and Computational Science"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/s11538-010-9507-6"},{"key":"9","year":"1975"},{"key":"19","year":"1982"},{"key":"22","year":"1986"}],"container-title":["International Journal of Mathematics and Mathematical Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijmms\/2012\/421419.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijmms\/2012\/421419.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijmms\/2012\/421419.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T16:54:01Z","timestamp":1497977641000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/ijmms\/2012\/421419\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":36,"alternative-id":["421419","421419"],"URL":"https:\/\/doi.org\/10.1155\/2012\/421419","relation":{},"ISSN":["0161-1712","1687-0425"],"issn-type":[{"value":"0161-1712","type":"print"},{"value":"1687-0425","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}