
The widespread range of wireless sensor networks (WSNs) has recently increased the possibility of attacks. In the cyber-physical system, WSN is considered a significant component, consisting of several hops that self-organize from moving or stationary sensors. Attackers perform abusive operations to enter, seize, and control the WSN network. In order to stop such attacks on sensor networks in the future, the network traffic data was evaluated, dangerous traffic activity was monitored, and nodes were investigated. In this study, we proposed a new improved bidirectional long-short-term memory (Bi-LSTM) algorithm, which is an enhancement of the LSTM model, to address the issue of intrusion detection in WSN systems, which has four steps. In a preprocessing step, the initial raw data collected from the network can be used to train learning models. Then, the analyzed data was classified according to the types of network traffic, and the attacks were detected in the second step. In the next step, our proposed improved learning models showed results with higher accuracy than traditional detection methods. This study assessed the performance of deep learning algorithms on two different datasets, primarily the 'WSN-DS' and 'KDDCup99' datasets, which were chosen to identify and classify different DoS attacks. The primary common WSN attacks were flooding, scheduling, blackhole, and grayhole, which were included in the data set 'WSN-DS', and (denial-of-service (DoS), user-2-root (U2R), root-2-local (R2L), and Probe) were in the 'KDDCup99' dataset. Our newly improved proposed model based on Bi-LSTM achieved an accuracy of 100% on the 'WSN-DS' dataset and 99.9% on the 'KDDCup99' dataset.
Citation: Ra'ed M. Al-Khatib, Laila Heilat, Wala Qudah, Salem Alhatamleh, Asef Al-Khateeb. A novel improved deep learning model based on Bi-LSTM algorithm for intrusion detection in WSN[J]. Networks and Heterogeneous Media, 2025, 20(2): 532-565. doi: 10.3934/nhm.2025024
[1] | Vaibhav Mehandiratta, Mani Mehra, Günter Leugering . Existence results and stability analysis for a nonlinear fractional boundary value problem on a circular ring with an attached edge : A study of fractional calculus on metric graph. Networks and Heterogeneous Media, 2021, 16(2): 155-185. doi: 10.3934/nhm.2021003 |
[2] | Sergei Avdonin, Julian Edward . An inverse problem for quantum trees with observations at interior vertices. Networks and Heterogeneous Media, 2021, 16(2): 317-339. doi: 10.3934/nhm.2021008 |
[3] | Dilip Sarkar, Shridhar Kumar, Pratibhamoy Das, Higinio Ramos . Higher-order convergence analysis for interior and boundary layers in a semi-linear reaction-diffusion system networked by a k-star graph with non-smooth source terms. Networks and Heterogeneous Media, 2024, 19(3): 1085-1115. doi: 10.3934/nhm.2024048 |
[4] | Leandro M. Del Pezzo, Nicolás Frevenza, Julio D. Rossi . Convex and quasiconvex functions in metric graphs. Networks and Heterogeneous Media, 2021, 16(4): 591-607. doi: 10.3934/nhm.2021019 |
[5] | Ling Zhang, Xuewen Tan, Jia Li, Fan Yang . Dynamic analysis and optimal control of leptospirosis based on Caputo fractional derivative. Networks and Heterogeneous Media, 2024, 19(3): 1262-1285. doi: 10.3934/nhm.2024054 |
[6] | Robert Carlson . Dirichlet to Neumann maps for infinite quantum graphs. Networks and Heterogeneous Media, 2012, 7(3): 483-501. doi: 10.3934/nhm.2012.7.483 |
[7] | Travis G. Draper, Fernando Guevara Vasquez, Justin Cheuk-Lum Tse, Toren E. Wallengren, Kenneth Zheng . Matrix valued inverse problems on graphs with application to mass-spring-damper systems. Networks and Heterogeneous Media, 2020, 15(1): 1-28. doi: 10.3934/nhm.2020001 |
[8] | Linglong Du . Characteristic half space problem for the Broadwell model. Networks and Heterogeneous Media, 2014, 9(1): 97-110. doi: 10.3934/nhm.2014.9.97 |
[9] | Christian Budde, Marjeta Kramar Fijavž . Bi-Continuous semigroups for flows on infinite networks. Networks and Heterogeneous Media, 2021, 16(4): 553-567. doi: 10.3934/nhm.2021017 |
[10] | Bing Feng, Congyin Fan . American call option pricing under the KoBoL model with Poisson jumps. Networks and Heterogeneous Media, 2025, 20(1): 143-164. doi: 10.3934/nhm.2025009 |
The widespread range of wireless sensor networks (WSNs) has recently increased the possibility of attacks. In the cyber-physical system, WSN is considered a significant component, consisting of several hops that self-organize from moving or stationary sensors. Attackers perform abusive operations to enter, seize, and control the WSN network. In order to stop such attacks on sensor networks in the future, the network traffic data was evaluated, dangerous traffic activity was monitored, and nodes were investigated. In this study, we proposed a new improved bidirectional long-short-term memory (Bi-LSTM) algorithm, which is an enhancement of the LSTM model, to address the issue of intrusion detection in WSN systems, which has four steps. In a preprocessing step, the initial raw data collected from the network can be used to train learning models. Then, the analyzed data was classified according to the types of network traffic, and the attacks were detected in the second step. In the next step, our proposed improved learning models showed results with higher accuracy than traditional detection methods. This study assessed the performance of deep learning algorithms on two different datasets, primarily the 'WSN-DS' and 'KDDCup99' datasets, which were chosen to identify and classify different DoS attacks. The primary common WSN attacks were flooding, scheduling, blackhole, and grayhole, which were included in the data set 'WSN-DS', and (denial-of-service (DoS), user-2-root (U2R), root-2-local (R2L), and Probe) were in the 'KDDCup99' dataset. Our newly improved proposed model based on Bi-LSTM achieved an accuracy of 100% on the 'WSN-DS' dataset and 99.9% on the 'KDDCup99' dataset.
The study of differential equation on metric graphs dates back to the 1980s with Lumer's work [32], where he investigated the evolution equations on so-called ramification spaces. Later in [46], Nicaise studied the propagation of nerve impulses in dentrites. This early work triggered a substantial amount of research for boundary value problems, in particular, Sturm-Liouville type problems on metric graphs, see the work by von Below [7] and [48]. In [17], Gordeziani et al. considered classical boundary value problems on metric graphs. They established existence and uniqueness of the solution and also presented a numerical approach for solving such type of equations using a double-sweep method. Leugering [31] considered an optimal control problem on a gas network modeled by the nonlinear isothermal Euler gas equations. Using a non-overlapping domain decomposition method, he converted the considered problem on a general graph into local problems on a small part of the graph, in particular into subgraphs considered here. We refer to [30,8,50,52,27,26,11] for more problems and applications of differential equations on metric graphs including flexible structures consisting of strings, beams and plates, quantum graphs as well as textiles and irrigation systems.
On the other hand, fractional calculus has attracted increasing interest in different fields of science and engineering [20,33,47,53,43,28,29] over the years. Unlike the classical derivatives, fractional derivatives are non-local in nature and thus, fractional operators are a very natural tool to model e.g. memory-dependent phenomena used by engineers and physicists. Moreover, in various phenomena, fractional derivatives have proved to be more flexible in the modeling than classical derivatives. We refer to Almeida et al.[3], where the authors considered real life applictions such as population growth model and blood alcohol level problem and proved (based on experimental data) that fractional differential equations model more efficiently certain problems than ordinary differential equations. The fractional operators that are most frequently used in the literature are the Caputo and Riemann-Liouville fractional derivatives and both have the same kernel, namely,
We may, therefore, classify fractional operators into those with singular and non-singular kernels. Fractional derivatives with singular kernels including Caputo and Riemann-Liouville have been applied in different applications such as the modelling of viscoelastic materials, image processing, control theory etc. On the other hand, fractional derivatives with non-singular kernels (Caputo-Fabrizio and Atangana-Balenau derivatives) have been used e.g in thermal science, material sciences, modelling of the mass-spring-damper system, gas dynamics equation etc. For completeness, we also mention another recently defined fractional operator, namely, the M-fractional derivative and Atangana's conformable derivative. The M-fractional derivative, in turn, has been used to define some physical process such as longitudinal wave equation in a magnetoelectro-elastic circular rod [34,6] and Schrödinger-Hirota equation [36], see also [37,13], while the fractional conformable derivatives have also attracted the researchers in the recent years, see in particular the work of Aguilar et al. [10,39,35,14,38] on the underlying fractional derivatives.
There has been considerable interest in developing the theory of existence of solution for fractional differential equations (FDEs) and it could be considered as one of the most preferable area in the field of FDEs. Various authors have established existence and uniqueness of solution for fractional boundary value problems (FBVPs) on intervals, by applying different fixed point theorems, the variational method, the upper and lower solution method, etc. For detailed analysis, see [1,16,5,58,12] and the references therein. Another emerging area that has recently attracted a lot of attention is the investigation of Ulam-type stability of FDEs. Ulam-type stability, posed by Ulam [55] in 1940, has been of great interest to various researchers since the last two decades. The problem introduced by Ulam was the following: ``Under what conditions does there exists an additive mapping near an approximately additive mapping?'' The problem was solved by Hyers [21] in the subsequent year (1941). Since then, this type of stability has come to be known as Ulam-Hyers stability. Later in 1978, Rassias [51] provided a generalization for the Ulam-Hyers stability of mappings. The mentioned stability analysis has various applications in optimization, physics, biology, etc. where it is difficult to find an analytic solution of the nonlinear problem and it guarantees that there is a close exact solution of the problem. Recently, considerable amount of work has been done on the Ulam-Hyers and Ulam-Hyers-Rassias stability for FBVPs on one-dimensional equations and coupled systems, see in particular [22,23,2,57].
However, in the case of fractional differential equations on metric graphs, not much work has been published until now. It has been initiated by Graef et al. in [18], where the authors established the existence and uniqueness of solution for FBVP on a star graph with only two edges and the fractional derivative was considered in Riemann-Liouville sense. Later in [41], the authors proved the existence and uniqueness of solution for a FBVP on a general star graph (see Figure 1) having
As is obvoius from real world applications, significant networks include cyclic subgraphs. At a first glance, it seems, therefore, astounding that the majority of publications dwell on tree-like networks. A closer look at networks containg cycles, however, reveals that a number of difficulties arise when cycles are involved, in particular when questions of control and observation as well as numerical simulations are in the focus. As already mentioned, there are different types of differential equations used to model physical phenomenon on the networks (or metric graphs), namely, isothermal Euler-gas or Saint Venant equations (for gas and water networks, respectively), Kelvin-Voigt-type models (e.g. for electric circuits), hyperbolic wave equations (for the network of strings and Timoshenko beams), differential-difference equations (network of cells) [44]. In many of these applications, fractional derivatives become more and more important in extending constitutive equations for instance, damping mechanisms to more flexible models. To the best knowldege of the authors, no results are available, however, for the corresponding nonlinear fractional boundary value problems on metric graphs containing cycles. Moreover, there are various chemical compounds such as glucose, ethane, cyclohexane that also have the cyclic graphical structure. In particular, quantum graphs, i.e. Schrödinger equations on graphs with cycles, have been considered in [27,26,11]. More recently, Gnutzmann et al. [15] considered nonlinear quantum graphs including cycles, while Klein et al. in [25] used a fractional nonlinear Schrödinger equation and developed numerical tools for it. The model considered in this article can, thus, be seen as a first study to approach stationary fractional quantum graphs including cycles. In order to reduce the complexity of the presentation, we restrict ourselves to the simplest nontrivial nonlinear fractional boundary value problem on a metric graph with a cycle. In particular, we consider the nonlinear FBVP on a circular ring with an attached edge. The circular graph used in this article is, thus, paradigmatic for networks containing cycles. In order to describe the problem, we consider a graph
CDα0,xui(x)=fi(x,ui(x),CDβ0,xui(x)),i=1,2,0<x<π, | (1) |
CDα0,zu3(z)=f3(z,u3(z),CDβ0,zu3(z)),0<z<l, | (2) |
u1(0)=u2(0)=u3(0),u1(π)=u2(π), | (3) |
u′1(0)+u′2(0)+u′3(0)=0,u′1(π)+u′2(π)=0, | (4) |
u3(l)=0. | (5) |
Here,
As indicated above, this article could be considered as the extension of the above-mentioned results, in particular [41] (with addition to Ulam-type stability results) to metric graphs containing cycles. In contrast to the star graph, where only one junction node
To the best knowledge of the authors, no results have been published so far for FBVPs on metric graphs containing cycles. This paper aims to develop the existence and uniqueness of solution and different kinds of Ulam-type stability for the FBVP
The rest of the paper is organised as follows: In Sec. 2, we recall basic definitions of fractional calculus, introduce lemma (Lemma
In this section, we first provide basic definitions of fractional calculus and then give some known results which will be used throughout this paper.
Definition 2.1. The fractional integral of order
D−αa,tf(t)=1Γ(α)(∫ta(t−s)α−1f(s)ds), | (6) |
where
Definition 2.2. The Riemann-Liouville fractional derivative of order
RLDαa,tf(t)=1Γ(n−α)dndtn(∫ta(t−s)n−α−1f(s)ds), | (7) |
where the function
Definition 2.3. The Caputo fractional derivative of order
CDαa,tf(t)=RLDαa,t[f(t)−n−1∑k=0f(k)(a)k!(t−a)k], | (8) |
where
Remark 1. If
CDαa,tf(t)=1Γ(n−α)(∫ta(t−s)n−α−1f(n)(s)ds) | (9) |
where
Now, we give the following lemma (for the proof see [41]) which results in converting the fractional BVP
Lemma 2.4. Let
(CDα0,xu)(x)=d−α(CDα0,ty)(t). |
In view of the above lemma, BVP
CDα0,tyi(t)=παfi(t,yi(t),π−βCDβ0,tyi(t)),i=1,2,0<t<1, | (10) |
CDα0,ty3(t)=lαf3(t,y3(t),l−βCDβ0,ty3(t)),0<t<1, | (11) |
y1(0)=y2(0)=y3(0),y1(1)=y2(1), | (12) |
π−1y′1(0)+π−1y′2(0)+l−1y′3(0)=0,y′1(1)+y′2(1)=0, | (13) |
y3(1)=0, | (14) |
where
Lemma 2.5. (see [24]) Let
y(t)=c1+c2t+c3t2+…+cntn−1, |
where
From Lemma
D−α0,tCDα0,ty(t)=y(t)+c1+c2t+c3t2+…+cntn−1, | (15) |
for some
Theorem 2.6. [56] Let
(i) The eigenvalues of matrix
(ii) The matrix
(I−A)−1=I+A+…+Am+…. |
Now, we prove the following lemma which solves the linear fractional boundary value problem on the considered metric graph and plays an important role in order to establish the main results of the paper.
Lemma 2.7. Let
CDα0,tyi(t)=σi(t),0<t<1,1<α≤2,i=1,2,3, | (16) |
together with the transmission conditions
yi(t)=1Γ(α)∫t0(t−s)α−1σi(s)ds−1Γ(α)∫10(1−s)α−1σ3(s)ds−lπ−1Γ(α−1)∫10(1−s)α−2(σ1(s)+σ2(s))ds−t[12Γ(α−1)∫10(1−s)α−2(σ1(s)+σ2(s))ds+(−1)i+12Γ(α)∫10(1−s)α−1(σ1(s)−σ2(s))ds],i=1,2 | (17) |
and
y3(t)=1Γ(α)∫t0(t−s)α−1σ3(s)ds−1Γ(α)∫10(1−s)α−1σ3(s)ds+(t−1)[lπ−1Γ(α−1)∫10(1−s)α−2(σ1(s)+σ2(s))ds]. | (18) |
Proof. In view of
yi(t)=D−α0,tσi(t)−c(1)i−c(2)it=1Γ(α)(∫t0(t−s)α−1σi(s)ds)−c(1)i−c(2)it, | (19) |
where
c(1)1=c(1)2=c(1)3and1Γ(α)∫10(1−s)α−1(σ1(s)−σ2(s))ds=c(2)1−c(2)2. | (20) |
Moreover
y′i(t)=α−1Γ(α)∫t0(t−s)α−2σi(s)ds−c(2)i=1Γ(α−1)∫t0(t−s)α−2σi(s)ds−c(2)i. |
Now, the Kirchoff condition
π−1c(2)1+π−1c(2)2+l−1c(2)3=0,1Γ(α−1)(∫10(1−s)α−2(σ1(s)+σ2(s))ds)=c(2)1+c(2)2. | (21) |
Finally, the Dirichlet boundary condition
1Γ(α)∫10(1−s)α−1σ3(s)ds−λ−c(2)3=0,whereλ=c(1)1=c(1)2=c(1)3. | (22) |
After solving
c(2)i=12Γ(α−1)∫10(1−s)α−2(σ1(s)+σ2(s))ds+(−1)i+12Γ(α)∫10(1−s)α−1(σ1(s)−σ2(s))ds,i=1,2,c(2)3=−lπ−1Γ(α−1)∫10(1−s)α−2(σ1(s)+σ2(s))ds |
and
c(1)1=c(1)2=c(1)3=1Γ(α)∫10(1−s)α−1σ3(s)ds+lπ−1Γ(α−1)∫10(1−s)α−2(σ1(s)+σ2(s))ds. |
On substituting the values of
Remark 2. Using the Definition
In this section, Banach's contraction principle and Krasnoselskii's fixed point theorem will be used to establish the existence of solution of BVP
‖y‖X=‖y‖+‖CDβ0,ty‖;‖y‖=supt∈[0,1]|y(t)|,‖CDβ0,ty‖=supt∈[0,1]|CDβ0,ty(t)|. |
Then,
||(y1,y2,y3)||X3=3∑i=1||yi||Xfor(y1,y2,y3)∈X3. |
In view of Lemma
T(y1,y2,y3)(t):=(T1(y1,y2,y3)(t),T2(y1,y2,y3)(t)),T3(y1,y2,y3)(t)), |
where
Ti(y1,y2,y3)(t)=παΓ(α)∫t0(t−s)α−1fi(s,yi(s),π−βCDβ0,syi(s))ds−lαΓ(α)∫10(1−s)α−1f3(s,y3(s),l−βCDβ0,sy3(s))ds−(lπα−1Γ(α−1)+tπα2Γ(α−1))∫10(1−s)α−2[f1(s,y1(s),π−βCDβ0,sy1(s))+f2(s,y2(s),π−βCDβ0,sy2(s))]ds | (23) |
+(−1)i+12Γ(α)tπα∫10(1−s)α−1[f2(s,y2(s),π−βCDβ0,sy2(s))−f1(s,y1(s),π−βCDβ0,sy1(s))]ds,i=1,2 |
and
T3(y1,y2,y3)(t)=lαΓ(α)∫t0(t−s)α−1f3(s,y3(s),l−βCDβ0,sy3(s))ds−lαΓ(α)∫10(1−s)α−1f3(s,y3(s),l−βCDβ0,sy3(s))ds+(t−1)lπα−1Γ(α−1)∫10(1−s)α−2[f1(s,y1(s),π−βCDβ0,sy1(s))+f2(s,y2(s),π−βCDβ0,sy2(s))]ds. | (24) |
Remark 3. In view of Remark
For computational convenience, we set the following quantities:
Rα,β=[1Γ(α)+2Γ(α+1)+1Γ(α−β+1)+1Γ(α)Γ(2−β)+1Γ(α+1)Γ(2−β)]×(πα+πα−β)+(lπα−1+lπα−β−1)[4Γ(α)+1Γ(α)Γ(2−β)]+(lα+lα−β)[4Γ(α+1)+1Γ(α−β+1)]. | (25) |
Pα,β=(πα+πα−β)[1Γ(α)+1Γ(α+1)+1Γ(α)Γ(2−β)+1Γ(α+1)Γ(2−β)]+(lπα−1+lπα−β−1)[4Γ(α)+1Γ(α)Γ(2−β)]+3Γ(α+1)(lα+lα−β). | (26) |
In the following theorem, we prove the existence and uniqueness of solution of the BVP
Theorem 3.1. Let
|fi(t,x,z)−fi(t,x1,z1)|≤Li(|x−x1|+|z−z1|),Li>0,t∈[0,1], | (27) |
then the BVP
Proof. We prove the result by showing that
|Tiy(t)−Tiw(t)|≤παΓ(α)∫t0(t−s)α−1|fi(s,yi(s),π−βCDβ0,syi(s))−fi(s,wi(s),π−βCDβ0,swi(s))|ds+lαΓ(α)∫10(1−s)α−1|f3(s,y3(s),l−βCDβ0,sy3(s))−f3(s,w3(s),l−βCDβ0,sw3(s))|ds+(lπα−1Γ(α−1)+tπα2Γ(α−1))2∑j=1∫10(1−s)α−2[|fj(s,yj(s),π−βCDβ0,syj(s))−fj(s,wj(s),π−βCDβ0,swj(s))|]ds+(−1)i+12Γ(α)tπα2∑j=1∫10(1−s)α−1|fj(s,yj(s),π−βCDβ0,syj(s))−fj(s,wj(s),π−βCDβ0,swj(s))|ds,i=1,2. |
Now, from
|Tiy(t)−Tiw(t)|≤παΓ(α+1)Li||yi−wi||+πα−βΓ(α+1)Li||CDβ0,syi−CDβ0,swi||+lαΓ(α+1)L3||y3−w3||+lα−βΓ(α+1)L3||CDβ0,sy3−CDβ0,sw3||+2∑j=1[(lπα−1Γ(α)+πα2Γ(α))Lj||yj−wj||+(lπα−β−1Γ(α)+πα−β2Γ(α))Lj||CDβ0,syj−CDβ0,swj||]+2∑j=1(πα2Γ(α+1)Lj||yj−wj||+πα−β2Γ(α+1)Lj||CDβ0,syj−CDβ0,swj||)≤1Γ(α+1)(πα+πα−β)Li(||yi−wi||+||CDβ0,syi−CDβ0,swi||)+1Γ(α+1)(lα+lα−β)L3(||y3−w3||+||CDβ0,sy3−CDβ0,sw3||)+2∑j=1[(lπα−1Γ(α)+πα2Γ(α)+πα2Γ(α+1))Lj||yj−wj||+(lπα−β−1Γ(α)+πα−β2Γ(α)+πα−β2Γ(α+1))Lj||CDβ0,syj−CDβ0,swj||]≤[(πα+πα−β)(1Γ(α+1)+12Γ(α)+12Γ(α+1))+1Γ(α)(lπα−1+lπα−β−1)]×Li(||yi−wi||+||CDβ0,syi−CDβ0,swi||) |
+[(πα+πα−β)(12Γ(α)+12Γ(α+1))+1Γ(α)(lπα−1+lπα−β−1)]×Lj(||yj−wj||+||CDβ0,syj−CDβ0,swj||)+1Γ(α+1)(lα+lα−β)L3(||y3−w3||+||CDβ0,sy3−CDβ0,sw3||), |
||Tiy−Tiw||≤[(πα+πα−β)(1Γ(α+1)+12Γ(α)+12Γ(α+1))+1Γ(α)(lπα−1+lπα−β−1)]×Li||yi−wi||X+[(πα+πα−β)(12Γ(α)+12Γ(α+1))+1Γ(α)(lπα−1+lπα−β−1)]×Lj||yj−wj||X+1Γ(α+1)(lα+lα−β)L3||y3−w3||X,i,j=1,2andi≠j. | (28) |
Following a similar analysis as above, one gets from
|T3y(t)−T3w(t)|≤2lαΓ(α+1)L3||y3−w3||+2lα−βΓ(α+1)L3||CDβ0,sy3−CDβ0,sw3||+2∑j=1(2lπα−1Γ(α)Lj||yj−wj||+2lπα−β−1Γ(α)Lj||CDβ0,syj−CDβ0,swj||)≤2Γ(α+1)(lα+lα−β)L3(||y3−w3||+||CDβ0,sy3−CDβ0,sw3||)+2∑j=12Γ(α)(lπα−1+lπα−β−1)Lj(||yj−wj||+||CDβ0,syj−CDβ0,swj||). |
Therefore, we get
||T3y−T3w||≤2Γ(α+1)(lα+lα−β)L3||y3−w3||X+2∑j=12Γ(α)(lπα−1+lπα−β−1)Lj||yj−wj||X. | (29) |
On the other hand, by using the relation [49]
CDβ0,t(tγ)=Γ(γ+1)Γ(γ+1−β)tγ−β,0<β<1 | (30) |
and the fact that the Caputo derivative of a constant function is zero, we get
|CDβ0,tTiy(t)−CDβ0,tTiw(t)|≤παΓ(α−β)∫t0(t−s)α−β−1|fi(s,yi(s),π−βCDβ0,syi(s))−fi(s,wi(s),π−βCDβ0,swi(s))|ds+παt1−β2Γ(α−1)Γ(2−β)2∑j=1∫10(1−s)α−2[|fj(s,yj(s),π−βCDβ0,syj(s))−fj(s,wj(s),π−βCDβ0,swj(s))|ds]+παt1−β2Γ(α)Γ(2−β)2∑j=1∫10(1−s)α−1[|fj(s,yj(s),π−βCDβ0,syj(s))−fj(s,wj(s),π−βCDβ0,swj(s))|ds]. |
Again, by using (27) and
|CDβ0,tTiy(t)−CDβ0,tTiw(t)|≤παΓ(α−β+1)Li||yi−wi||+πα−βΓ(α−β+1)Li||CDβ0,syi−CDβ0,swi||+2∑j=1(πα2Γ(α)Γ(2−β)Lj||yj−wj||+πα−β2Γ(α)Γ(2−β)Lj||CDβ0,syj−CDβ0,swj||)+2∑j=1(πα2Γ(α+1)Γ(2−β)Lj||yj−wj||+πα−β2Γ(α+1)Γ(2−β)Lj||CDβ0,syj−CDβ0,swj||)≤(πα+πα−β)(1Γ(α−β+1)+12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))×Li(||yi−wi||+||CDβ0,syi−CDβ0,swi||)+(πα+πα−β)(12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))×Lj(||yj−wj||+||CDβ0,syj−CDβ0,swj||),i,j=1,2andi≠j. |
Hence, we get
||CDβ0,tTiy−CDβ0,tTiw||≤(πα+πα−β)(1Γ(α−β+1)+12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))×Li||yi−wi||X+(πα+πα−β)(12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))×Lj||yj−wj||X,i,j=1,2andi≠j. | (31) |
Similarly, one gets
|CDβ0,tT3y(t)−CDβ0,tT3w(t)|≤lαΓ(α−β)∫t0(t−s)α−β−1|f3(s,y3(s),π−βCDβ0,sy3(s))−f3(s,w3(s),π−βCDβ0,sw3(s))|ds+lπα−1t1−βΓ(α−1)Γ(2−β)2∑j=1∫10(1−s)α−2[|fj(s,yj(s),π−βCDβ0,syj(s))−fj(s,wj(s),π−βCDβ0,swj(s))|ds]≤lαΓ(α−β+1)L3||y3−w3||+lα−βΓ(α−β+1)L3||CDβ0,sy3−CDβ0,sw3||+2∑j=1(lπα−1Γ(α)Γ(2−β)Lj||yj−wj||+lπα−β−1Γ(α)Γ(2−β)Lj||CDβ0,syj−CDβ0,swj||)≤1Γ(α−β+1)(lα+lα−β)L3(||y3−w3||+||CDβ0,sy3−CDβ0,sw3||)+2∑j=11Γ(α)Γ(2−β)(lπα−1+lπα−β−1)Lj(||yj−wj||+||CDβ0,syj−CDβ0,swj||). |
Hence,
||CDβ0,tT3y−CDβ0,tT3w||≤1Γ(α−β+1)(lα+lα−β)L3||y3−w3||X+2∑j=11Γ(α)Γ(2−β)(lπα−1+lπα−β−1)Lj||yj−wj||X. | (32) |
Finally, using
3∑i=1||Tiy−Tiw||X=2∑i=1(||Tiy−Tiw||+||CDβ0,tTiy−CDβ0,tTiw||)+(||T3y−T3w||+||CDβ0,tT3y−CDβ0,tT3w||)≤[(πα+πα−β)(2Γ(α+1)+1Γ(α)+1Γ(α−β+1)+1Γ(α)Γ(2−β)+1Γ(α+1)Γ(2−β))+2Γ(α)(lπα−1+lπα−β−1)]×2∑i=1Li||yi−wi||X+2Γ(α+1)(lα+lα−β)L3||y3−w3||X |
+(2Γ(α+1)+1Γ(α−β+1))(lα+lα−β)L3||y3−w3||X+(2Γ(α)+1Γ(α)Γ(2−β))(lπα−1+lπα−β−1)2∑i=1Li||yi−wi||X≤[(πα+πα−β)(2Γ(α+1)+1Γ(α)+1Γ(α−β+1)+1Γ(α)Γ(2−β)+1Γ(α+1)Γ(2−β))+(lπα−1+lπα−β−1)(4Γ(α)+1Γ(α)Γ(2−β))]×2∑i=1Li||yi−wi||X+(4Γ(α+1)+1Γ(α−β+1))(lα+lα−β)L3||y3−w3||X. |
Thus,
||Ty−Tw||X3=3∑i=1||Tiy−Tiw||X≤[(πα+πα−β)(1Γ(α)+2Γ(α+1)+1Γ(α−β+1)+1Γ(α)Γ(2−β)+1Γ(α+1)Γ(2−β))+(lπα−1+lπα−β−1)(4Γ(α)+1Γ(α)Γ(2−β))+(lα+lα−β)(4Γ(α+1)+1Γ(α−β+1))]×3∑i=1Li||yi−wi||X≤Rα,β(3∑i=1Li)(3∑i=1||yi−wi||X)=Rα,β(3∑i=1Li)||y−w||X3. |
Since
Now, we prove the existence of solutions of BVP
Lemma 3.2. Let
Theorem 3.3. Let
|fi(t,x,z)|≤Mi,t∈[0,1],x,z∈R,i=1,2,3, | (33) |
then BVP
Proof. Let
r≥[πα(1Γ(α)+2Γ(α+1)+1Γ(α−β+1)+1Γ(α)Γ(2−β)+1Γ(α+1)Γ(2−β))+lπα−1(4Γ(α)+1Γ(α)Γ(2−β))+lα(4Γ(α+1)+1Γ(α−β+1))](3∑i=1Mi), |
then
Ay(t)=(A1y(t),A2y(t),A3y(t))andBy(t)=(B1y(t),B2y(t),B3y(t)), |
where
Aiy(t)=παΓ(α)∫t0(t−s)α−1gi(s)ds,i=1,2,A3y(t)=lαΓ(α)∫t0(t−s)α−1g3(s)ds, |
B1y(t)=B2y(t)=−lαΓ(α)∫10(1−s)α−1g3(s)ds−(lπα−1Γ(α−1)+tπα2Γ(α−1))∫10(1−s)α−2(g1(s)+g2(s))ds+(−1)i+12Γ(α)tπα∫10(1−s)α−1(g2(s)−g1(s))ds,B3y(t)=−lαΓ(α)∫10(1−s)α−1g3(s)ds+(t−1)lπα−1Γ(α−1)∫10(1−s)α−2(g1(s)+g2(s))ds, |
and here,
gi(s):=fi(s,yi(s),π−βCDβ0,syi(s))ds,i=1,2,g3(s):=f3(s,y3(s),l−βCDβ0,sy3(s)). | (34) |
Now using
|Aiy(t)|≤παΓ(α)∫t0(t−s)α−1|fi(s,yi(s),π−βCDβ0,syi(s))|ds≤παΓ(α+1)Mi,i=1,2,|A3y(t)|≤lαΓ(α)∫t0(t−s)α−1|f3(s,yi(s),l−βCDβ0,syi(s))|ds≤lαΓ(α+1)M3. |
Thus,
||Aiy||≤1Γ(α+1)(πα+lα)Mi,i=1,2,3. | (35) |
Moreover, using (30), we get
|CDβ0,tAiy(t)|≤παΓ(α−β)∫t0(t−s)α−β−1|fi(s,yi(s),π−βCDβ0,syi(s))|ds≤παΓ(α−β+1)Mi,i=1,2,|CDβ0,tA3y(t)|≤lαΓ(α−β)∫t0(t−s)α−β−1|f3(s,y3(s),π−βCDβ0,sy3(s))|ds≤lαΓ(α−β+1)M3. |
Hence
||CDβ0,tAiy||≤1Γ(α−β+1)(πα+lα)Mi,i=1,2,3. | (36) |
Therefore, using (35) and (36), we obtain
||Ay||X3=3∑i=1(||Aiy||+||CDβ0,tAiy||)≤[1Γ(α+1)+1Γ(α−β+1)](πα+lα)(3∑i=1Mi). | (37) |
Again using (33), for any
|B1w(t)|=|B2w(t)|≤lαΓ(α+1)M3+(lπα−1Γ(α)+πα2Γ(α)+πα2Γ(α+1))(M1+M2),|B3w(t)|≤lαΓ(α+1)M3+2lπα−1Γ(α)(M1+M2). |
Hence
||Biw||≤[πα(1Γ(α)+1Γ(α+1))+4lπα−1Γ(α)+2lαΓ(α+1)]Mi,i=1,2,3. | (38) |
On the other hand
|CDβ0,tB1w(t)|=|CDβ0,tB2w(t)|≤πα[12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β)](M1+M2),|CDβ0,tB3w(t)|≤lπα−1Γ(α)Γ(2−β)(M1+M2). |
Thus, for
||CDβ0,tBiw||≤[πα(1Γ(α)Γ(2−β)+1Γ(α+1)Γ(2−β))+lπα−1Γ(α)Γ(2−β)]Mi. | (39) |
Finally, using (38) and (39), we obtain
||Bw||X3=3∑i=1(||Biw||+||CDβ0,tBiw||)≤[πα(1Γ(α)+1Γ(α+1)+1Γ(α)Γ(2−β)+1Γ(α+1)Γ(2−β))+3lαΓ(α+1)+lπα−1(4Γ(α)+1Γ(α)Γ(2−β))]×(3∑i=1Mi). | (40) |
Hence, (37) and (40) gives
||Ay+Bw||X3≤||Ay||X3+||Bw||X3≤[πα(1Γ(α)+2Γ(α+1)+1Γ(α−β+1)+1Γ(α)Γ(2−β)+1Γ(α+1)Γ(2−β))+lπα−1(4Γ(α)+1Γ(α)Γ(2−β))+lα(4Γ(α+1)+1Γ(α−β+1))]×(3∑i=1Mi)≤r. |
Therefore,
Also, using similar analysis as in the proof of Theorem
Pα,β(3∑i=1Li)<1. |
The continuity of the functions
Next, we prove that the operator
|Aiy(t2)−Aiy(t1)|≤παΓ(α)∫t10((t2−s)α−1−(t1−s)α−1)|fi(s,yi(s),π−βCDβ0,syi(s))|ds+παΓ(α)∫t2t1(t2−s)α−1|fi(s,yi(s),π−βCDβ0,syi(s))|ds≤παΓ(α+1)Mi(tα2−tα1),i=1,2, |
where we have used (33). Similarly,
|A3y(t2)−A3y(t1)|≤lαΓ(α+1)M3(tα2−tα1). |
Therefore,
|Aiy(t2)−Aiy(t1)|≤1Γ(α+1)(πα+lα)Mi(tα2−tα1),i=1,2,3. | (41) |
Moreover, we have
|CDβ0,tAiy(t2)−CDβ0,tAiy(t1)|≤παΓ(α−β)∫t10((t2−s)α−β−1−(t1−s)α−β−1)|fi(s,yi(s),π−βCDβ0,syi(s))|ds+παΓ(α−β)∫t2t1(t2−s)α−β−1|fi(s,yi(s),π−βCDβ0,syi(s))|ds≤παΓ(α−β+1)Mi(tα−β2−tα−β1),i=1,2 |
and
|CDβ0,tA3(t2)−CDβ0,tA3(t1)|≤lαΓ(α−β+1)Mi(tα−β2−tα−β1). |
Hence
|CDβ0,tAiy(t2)−CDβ0,tAiy(t1)|≤1Γ(α−β+1)(πα+lα)Mi(tα−β2−tα−β1),i=1,2,3. | (42) |
Thus, from (41) and (42), we get
|Aiy(t2)−Aiy(t1)|+|CDβ0,tAiy(t2)−CDβ0,tAiy(t1)|≤(πα+lα)Mi[1Γ(α+1)(tα2−tα1)+1Γ(α−β+1)(tα−β2−tα−β1)]→0ast2→t1,i=1,2,3. |
Hence, we deduce that the operators
In this section, we investigate a different kind of Ulam-type stability analysis for BVP system (10)-(14). Let
|CDα0,twi(t)−aαifi(t,wi(t),a−βiCDβ0,twi(t))|≤ϵi,t∈[0,1],i=1,2,3, | (43) |
|CDα0,twi(t)−aαifi(t,wi(t),a−βiCDβ0,twi(t))|≤ϑi(t)ϵi,t∈[0,1],i=1,2,3, | (44) |
|CDα0,twi(t)−aαifi(t,wi(t),a−βiCDβ0,twi(t))|≤ϑi(t),t∈[0,1],i=1,2,3, | (45) |
where
Definition 4.1. The BVP system (10)-(14) is said to be Ulam-Hyers stable, if there exists a constant
||w−y||X3≤Cϵ,t∈[0,1]. |
Moreover, if there exists a function
||w−y||X3≤Ψ(ϵ),t∈[0,1], |
then BVP system (10)-(14) is called generalized Ulam-Hyers stable.
Definition 4.2. The BVP system (10)-(14) is said to be Ulam-Hyers-Rassias stable with respect to
||w−y||X3≤Cϑϑ(t)ϵ,t∈[0,1]. |
Definition 4.3. The BVP system (10)-(14) is said to be generalized Ulam-Hyers-Rassias stable with respect to
||w−y||X3≤Cϑϑ(t),t∈[0,1]. |
Remark 4. A function
(i)
(ii)
where
Remark 5. A function
(i)
(ii)
where
Lemma 4.4. Let
|wi(t)−mi(t)|≤(1Γ(α+1)+lπ−1Γ(α)+12Γ(α)+12Γ(α+1))ϵi+(lπ−1Γ(α)+12Γ(α)+12Γ(α+1))ϵj+1Γ(α+1)ϵ3,i,j=1,2,i≠j,|w3(t)−m3(t)|≤2lπ−1Γ(α)(ϵ1+ϵ2)+2Γ(α+1)ϵ3 |
and
|CDβ0,twi(t)−CDβ0,tmi(t)|≤(1Γ(α−β+1)+12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))ϵi+(12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))ϵj,i,j=1,2,i≠j,|CDβ0,tw3(t)−CDβ0,tm3(t)|≤1Γ(α−β+1)ϵ3+lπ−1Γ(α)Γ(2−β)(ϵ1+ϵ2), |
where
mi(t)=παΓ(α)∫t0(t−s)α−1pi(s)ds−lαΓ(α)∫10(1−s)α−1p3(s)ds−(lπα−1Γ(α−1)+tπα2Γ(α−1))∫10(1−s)α−2(p1(s)+p2(s))ds+(−1)i+12Γ(α)tπα∫10(1−s)α−1(p1(s)−p2(s))ds,i=1,2,m3(t)=lαΓ(α)∫t0(t−s)α−1p3(s)ds−lαΓ(α)∫10(1−s)α−1p3(s)ds+(t−1)[lπα−1Γ(α−1)∫10(1−s)α−2(p1(s)+p2(s))ds] |
and here,
pi(s):=fi(s,wi(s),π−βCDβ0,swi(s)),i=1,2,p3(s):=f3(s,w3(s),l−βCDβ0,sw3(s)). | (46) |
Proof. Since
{CDα0,twi(t)=παfi(t,wi(t),π−βCDβ0,twi(t))+ϕi(t),i=1,2,0<t<1,CDα0,tw3(t)=lαf3(t,w3(t),l−βCDβ0,tw3(t))+ϕ3(t),0<t<1,w1(0)=w2(0)=w3(0),w1(1)=w2(1),π−1w′1(0)+π−1w′2(0)+l−1w′3(0)=0,w′1(1)+w′2(1)=0,w3(1)=0. | (47) |
In view of Lemma
wi(t)=1Γ(α)∫t0(t−s)α−1(παpi(s)+ϕi(s))ds−1Γ(α)∫10(1−s)α−1(lαp3(s)+ϕ3(s))ds−(lπ−1Γ(α−1)+t2Γ(α−1))∫10(1−s)α−2(παp1(s)+ϕ1(s)+παp2(s)+ϕ2(s))ds+(−1)i+12Γ(α)t∫10(1−s)α−1(παp1(s)+ϕ1(s)−παp2(s)−ϕ2(s))ds,i=1,2, | (48) |
w3(t)=1Γ(α)∫t0(t−s)α−1(lαp3(s)+ϕ3(s))ds−1Γ(α)∫10(1−s)α−1(lαp3(s)+ϕ3(s))ds+(t−1)[lπ−1Γ(α−1)∫10(1−s)α−2(παp1(s)+ϕ1(s)+παp2(s)+ϕ2(s))ds]. | (49) |
From (48), we find that
|wi(t)−mi(t)|≤1Γ(α+1)(ϵi+ϵ3)+[lπ−1Γ(α)+12Γ(α)+12Γ(α+1)](ϵ1+ϵ2)=(1Γ(α+1)+lπ−1Γ(α)+12Γ(α)+12Γ(α+1))ϵi+(lπ−1Γ(α)+12Γ(α)+12Γ(α+1))ϵj+1Γ(α+1)ϵ3,i,j=1,2,i≠j. |
Similarly, using (49), we get
|w3(t)−m3(t)|≤2lπ−1Γ(α)(ϵ1+ϵ2)+2Γ(α+1)ϵ3. |
On the other hand, applying the operator
CDβ0,twi(t)=1Γ(α−β)∫t0(t−s)α−β−1(παpi(s)+ϕi(s))ds−t1−β2Γ(α−1)Γ(2−β)∫10(1−s)α−2(παp1(s)+ϕ1(s)+παp2(s)+ϕ2(s))ds+(−1)i+12Γ(α−β)t1−β∫10(1−s)α−1(παp1(s)+ϕ1(s)−παp2(s)−ϕ2(s))ds. |
Now
|CDβ0,twi(t)−CDβ0,tmi(t)|≤1Γ(α−β+1)ϵi+[12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β)](ϵ1+ϵ2)=(1Γ(α−β+1)+12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))ϵi+(12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))ϵj,i,j=1,2,i≠j. |
Moreover, from (49), we have
|CDβ0,tw3(t)−CDβ0,tm3(t)|≤1Γ(α−β+1)ϵ3+lπ−1Γ(α)Γ(2−β)(ϵ1+ϵ2). |
Therefore, the proof is completed.
Lemma 4.5. Let
|wi(t)−mi(t)|≤1Γ(α+1)(ϵiϑi(t)+ϵ3ϑ3(1))+[lπ−1Γ(α)+12Γ(α)+12Γ(α+1)](ϵ1ϑ1(1)+ϵ2ϑ2(1)),i=1,2,|w3(t)−m3(t)|≤1Γ(α+1)(ϵ3ϑ3(t)+ϵ3ϑ3(1))+2lπ−1Γ(α)(ϵ1ϑ1(1)+ϵ2ϑ2(1)) |
and
|CDβ0,twi(t)−CDβ0,tmi(t)|≤1Γ(α−β+1)ϵiϑi(t)+[12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β)](ϵ1ϑ1(1)+ϵ2ϑ2(1)),i=1,2,|CDβ0,tw3(t)−CDβ0,tm3(t)|≤1Γ(α−β+1)ϵ3ϑ3(t)+lπ−1Γ(α)Γ(2−β)(ϵ1ϑ1(1)+ϵ2ϑ2(1)). |
Proof. The proof can be obtained using a similar analysis as in Lemma
Now, we prove the Ulam-Hyers stability of the BVP system (10)-(14). Again, for convenience, we set the following quantities:
γ1=12Γ(α)+32Γ(α+1)+1Γ(α−β+1)+12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β), |
γ2=12Γ(α)+12Γ(α+1)+12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β), |
ρ1=1Γ(α)(lπα−1+lπα−β−1),ρ2=(2Γ(α+1)+1Γ(α)Γ(2−β))(lπα−1+lπα−β−1) |
and
ρ3=lπ−1(2Γ(α)+1Γ(α)Γ(2−β)). |
Theorem 4.6. Suppose that (27) holds and
A=[{(πα+πα−β)γ1+ρ1}L1{(πα+πα−β)γ2+ρ1}L21Γ(α+1)(lα+lα−β)L3{(πα+πα−β)γ2+ρ1}L1{(πα+πα−β)γ1+ρ1}L21Γ(α+1)(lα+lα−β)L3ρ2L1ρ2L2(2Γ(α+1)+1Γ(α−β+1))(lα+lα−β)L3] |
and
Proof. Let
{CDα0,tyi(t)=παfi(t,yi(t),π−βCDβ0,tyi(t)),i=1,2,0<t<1,CDα0,ty3(t)=lαf3(t,y3(t),l−βCDβ0,ty3(t)),0<t<1,y1(0)=y2(0)=y3(0),y1(1)=y2(1),π−1y′1(0)+π−1y′2(0)+l−1y′3(0)=0,y′1(1)+y′2(1)=0,y3(1)=0. | (50) |
Then, in view of Lemma
yi(t)=παΓ(α)∫t0(t−s)α−1gi(s)ds−lαΓ(α)∫10(1−s)α−1g3(s)ds−(lπα−1Γ(α−1)+tπα2Γ(α−1))∫10(1−s)α−2(g1(s)+g2(s))ds+(−1)i+12Γ(α)tπα∫10(1−s)α−1(g2(s)−g1(s))ds,y3(t)=lαΓ(α)∫t0(t−s)α−1g3(s)ds−lαΓ(α)∫10(1−s)α−1g3(s)ds+(t−1)lπα−1Γ(α−1)∫10(1−s)α−2(g1(s)+g2(s))ds, |
where
|wi(t)−yi(t)|≤|wi(t)−mi(t)|+|mi(t)−yi(t)|≤(1Γ(α+1)+lπ−1Γ(α)+12Γ(α)+12Γ(α+1))ϵi+(lπ−1Γ(α)+12Γ(α)+12Γ(α+1))ϵj+1Γ(α+1)ϵ3+παΓ(α)∫t0(t−s)α−1|ζi(s)|ds+lαΓ(α)∫10(1−s)α−1|ζ3(s)|ds |
+(lπα−1Γ(α−1)+tπα2Γ(α−1))∫10(1−s)α−2(|ζ1(s)|+|ζ2(s)|)ds+(−1)i+12Γαtπα∫10(1−s)α−2(|ζ1(s)|+|ζ2(s)|)ds,i,j=1,2i≠j, |
where
ζi(s):=fi(s,wi(s),π−βCDβ0,swi(s))−fi(s,yi(s),π−βCDβ0,syi(s))=pi(s)−gi(s),i=1,2,ζ3(s):=f3(s,w3(s),l−βCDβ0,sw3(s))−f3(s,y3(s),l−βCDβ0,sy3(s))=p3(s)−g3(s). |
Hence, by (27), we get
|wi(t)−yi(t)|≤(1Γ(α+1)+lπ−1Γ(α)+12Γ(α)+12Γ(α+1))ϵi+(lπ−1Γ(α)+12Γ(α)+12Γ(α+1))ϵj+1Γ(α+1)ϵ3+[(πα+πα−β)(1Γ(α+1)+12Γ(α)+12Γ(α+1))+1Γ(α)(lπα−1+lπα−β−1)]×Li||wi−yi||X+[(πα+πα−β)(12Γ(α)+12Γ(α+1))+1Γ(α)(lπα−1+lπα−β−1)]Lj||wj−yj||X+1Γ(α+1)(lα+lα−β)L3||y3−w3||X,i,j=1,2andi≠j. | (51) |
Further, we have
|CDβ0,twi(t)−CDβ0,tyi(t)|≤|CDβ0,twi(t)−CDβ0,tmi(t)|+|CDβ0,tmi(t)−CDβ0,tyi(t)|≤(1Γ(α−β+1)+12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))ϵi+(12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))ϵj+παΓ(α−β)∫t0(t−s)α−β−1|ζi(s)|ds+παt1−β2Γ(α−1)Γ(2−β)∫10(1−s)α−2(|ζ1(s)+ζ2(s)|)ds+παt1−β2Γ(α)Γ(2−β)∫10(1−s)α−1(|ζ1(s)+ζ2(s)|)ds≤(1Γ(α−β+1)+12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))ϵi+(12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))ϵj | (52) |
+(πα+πα−β)(1Γ(α−β+1)+12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))Li||wi−yi||X+(πα+πα−β)(12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))Lj||wj−yj||X,i,j=1,2andi≠j. |
Therefore, from (51) and (52), we obtain
||wi−yi||X=(||wi−yi||+||CDβ0,twi−CDβ0,tyi||)≤(lπ−1Γ(α)+γ1)ϵi+(lπ−1Γ(α)+γ2)ϵj+1Γ(α+1)ϵ3+[(πα+πα−β)γ1+ρ1]Li||wi−yi||X+[(πα+πα−β)γ2+ρ1]Lj||wi−yi||X+1Γ(α+1)(lα+lα−β)L3||w3−y3||X,i,j=1,2andi≠j. | (53) |
Using similar analysis, one also obtains
||w3−y3||X=(||w3−y3||+||CDβ0,tw3−CDβ0,ty3||)≤ρ3(ϵ1+ϵ2)+(2Γ(α+1)+1Γ(α−β+1))ϵ3+(2Γ(α+1)+1Γ(α−β+1))(lα+lα−β)L3||w3−y3||X+ρ2(L1||w1−y1||X+L2||w2−y2||X). | (54) |
Now, inequalities (53) and (54) together can be rewritten in the matrix form as follows:
[||w1−y1||X||w2−y2||X||w3−y3||X]≤[lπ−1Γ(α)+γ1lπ−1Γ(α)+γ21Γ(α+1)lπ−1Γ(α)+γ2lπ−1Γ(α)+γ11Γ(α+1)ρ3ρ32Γ(α+1)+1Γ(α−β+1)][ϵ1ϵ2ϵ3]+A[||w1−y1||X||w2−y2||X||w3−y3||X]. |
Using the fact that eigenvalues of
[||w1−y1||X||w2−y2||X||w3−y3||X]≤(I−A)−1[lπ−1Γ(α)+γ1lπ−1Γ(α)+γ21Γ(α+1)lπ−1Γ(α)+γ2lπ−1Γ(α)+γ11Γ(α+1)ρ3ρ32Γ(α+1)+1Γ(α−β+1)][ϵ1ϵ2ϵ3]. | (55) |
Further, if we set
B=(I−A)−1[lπ−1Γ(α)+γ1lπ−1Γ(α)+γ21Γ(α+1)lπ−1Γ(α)+γ2lπ−1Γ(α)+γ11Γ(α+1)ρ3ρ32Γ(α+1)+1Γ(α−β+1)]=[b11b12b13b21b22b23b31b32b33] |
and
||w−y||X3≤(3∑j=13∑i=1bi,j)ϵ:=Cϵ. | (56) |
Since
Finally, taking
Theorem 4.7. Let
ϑ(t)=max{h1(t),h2(t),ϑ3(t)}, |
hi(t)=(1Γ(α+1)+1Γ(α−β+1))ϑi(t)+(lπ−1Γ(α)+γ2)ϑi(1),i=1,2. |
Proof. Let
|wi(t)−yi(t)|≤|wi(t)−mi(t)|+|mi(t)−yi(t)|≤1Γ(α+1)(ϵiϑi(t)+ϵ3ϑ3(1))+[lπ−1Γ(α)+12Γ(α)+12Γ(α+1)](ϵ1ϑ1(1)+ϵ2ϑ2(1))+[(πα+πα−β)(1Γ(α+1)+12Γ(α)+12Γ(α+1))+1Γ(α)(lπα−1+lπα−β−1)]×Li||wi−yi||X+[(πα+πα−β)(12Γ(α)+12Γ(α+1))+1Γ(α)(lπα−1+lπα−β−1)]×Lj||wj−yj||X+1Γ(α+1)(lα+lα−β)L3||y3−w3||X,i,j=1,2andi≠j | (57) |
and
|CDβ0,twi(t)−CDβ0,tyi(t)|≤|CDβ0,twi(t)−CDβ0,tmi(t)|+|CDβ0,tmi(t)−CDβ0,tyi(t)|≤1Γ(α−β+1)ϵiϑi(t)+[12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β)](ϵ1ϑ1(1)+ϵ2ϑ2(1))+(πα+πα−β)(1Γ(α−β+1)+12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))Li||wi−yi||X+(πα+πα−β)(12Γ(α)Γ(2−β)+12Γ(α+1)Γ(2−β))Lj||wj−yj||X,i,j=1,2andi≠j. | (58) |
Hence, from (57) and (58), we get
||wi−yi||X=(||wi−yi||+||CDβ0,twi−CDβ0,tyi||)≤(1Γ(α+1)+1Γ(α−β+1))ϵiϑi(t)+(lπ−1Γ(α)+γ2)(ϵ1ϑ1(1)+ϵ2ϑ2(1))+1Γ(α+1)ϵ3ϑ3(1)+[(πα+πα−β)γ1+ρ1]Li||wi−yi||X+[(πα+πα−β)γ2+ρ1]Lj||wi−yi||X+1Γ(α+1)(lα+lα−β)L3||w3−y3||X,i,j=1,2andi≠j. | (59) |
Similarly, one can obtain
||w3−y3||X=(||w3−y3||+||CDβ0,tw3−CDβ0,ty3||)≤(1Γ(α+1)+1Γ(α−β+1))ϵ3ϑ3(t)+ρ3(ϵ1ϑ1(1)+ϵ2ϑ2(1))+1Γ(α+1)ϵ3ϑ3(1)+(2Γ(α+1)+1Γ(α−β+1))(lα+lα−β)L3||w3−y3||X+ρ2(L1||w1−y1||X+L2||w2−y2||X). | (60) |
Now, rewriting the inequalities (59)-(60) toghether in the matrix form as
[||w1−y1||X||w2−y2||X||w3−y3||X]≤[h1(t)(lπ−1Γ(α)+γ2)ϑ2(1)1Γ(α+1)ϑ3(1)(lπ−1Γ(α)+γ2)ϑ1(1)h2(t)1Γ(α+1)ϑ3(1)ρ3ϑ1(1)ρ3ϑ2(1)(1Γ(α+1)+1Γ(α−β+1))ϑ3(t)+1Γ(α+1)ϑ3(1)]×[ϵ1ϵ2ϵ3]+A[||w1−y1||X||w2−y2||X||w3−y3||X].:=B(t)[ϵ1ϵ2ϵ3]+A[||w1−y1||X||w2−y2||X||w3−y3||X]. |
Using the fact that eigenvalues of
[||w1−y1||X||w2−y2||X||w3−y3||X]≤(I−A)−1B(t)[ϵ1ϵ2ϵ3]. |
Further, we define
(I−A)−1B(t)=[c11(t)c12(t)c13(t)c21(t)c22(t)c23(t)c31(t)c32(t)c33(t)]and(I−A)−1=[a11a12a13a21a22a23a31a32a33]. |
It is straightforward to see that
aij≥0,cij(t)≥0,i,j=1,2,3, |
cij(t)=aijhj(t)+(lπ−1Γ(α)+γ2)ϑj(1)2∑r=1,r≠jair+ρ3ai3ϑj(1)≤(aij+(lπ−1Γ(α)+γ2)ϑj(1)hj(0)2∑r=1,r≠jair+ρ3ai3ϑj(1)hj(0))hj(t),i=1,2,3,j=1,2 |
and
ci3(t)=ai3[(1Γ(α+1)+1Γ(α−β+1))ϑ3(t)+1Γ(α+1)ϑ3(1)]+1Γ(α+1)(ai1+ai2)ϑ3(1)≤ai3[(1Γ(α+1)+1Γ(α−β+1))+1Γ(α+1)(1+ai1+ai2)ϑ3(1)ϑ3(0)]ϑ3(t),i=1,2,3. |
Now, by taking
||w−y||X3≤3∑i=1(2∑j=1Mij+Ni)ϑ(t)ϵ, | (61) |
where
Mij=aij+(lπ−1Γ(α)+γ2)ϑj(1)hj(0)2∑r=1,r≠jair+ρ3ai3ϑj(1)hj(0) |
and
Ni=(1Γ(α+1)+1Γ(α−β+1))+1Γ(α+1)(1+ai1+ai2)ϑ3(1)ϑ3(0),i=1,2,3. |
Finally, we assume
C=3∑i=1(2∑j=1Mij+Ni) |
and thus, by Definition
Moreover, taking
Consider the BVP
{f1(t,x,z)=tsin(t2)+1(t+3)4(sinx+|z|1+|z|),(t,x,z)∈[0,π]×R×R,f2(t,x,z)=14(t2+8)2(|x|1+|x|+|z|1+|z|),(t,x,z)∈[0,π]×R×R,f3(t,x,z)=120(t+4)2(x+sin|z|),(t,x,z)∈[0,l]×R×R. | (62) |
Using Lemma
{CD3/20,ty1(t)=π3/2[tsin(t2)+1(t+3)4(sin(y1(t))+π−34|CD3/40,ty1(t)|1+π−34|CD3/40,ty1(t)|)],CD3/20,ty2(t)=π3/2[14(t2+8)2(|y2(t)|1+|y2(t)|+(π)−34|CD3/40,ty2(t)|1+(π)−34|CD3/40,ty2(t)|)],CD3/20,ty3(t)=(14)3/2[120(t+4)2(y3(t)+sin|(1/4)−34CD3/40,ty3(t)|)], | (63) |
subject to the transmission conditions
|f1(t,x,z)−f1(t,x1,z1)|≤1(t+3)4(|x−x1|+|z−z1|), |
|f2(t,x,z)−f2(t,x1,z1)|≤14(t2+8)2(|x−x1|+|z−z1|), |
and
|f3(t,x,z)−f3(t,x1,z1)|≤120(t+4)2(|x−x1|+|z−z1|). |
Therefore, we have
Rα,β=(π√π+π3/4)[2√π+83√π+43Γ(3/4)+8√πΓ(1/4)+163√πΓ(1/4)]+(√π4+14π1/4)[8√π+8√πΓ(1/4)]+(18+12√2)[163√π+43Γ(3/4)]. |
Now, using numerical values
Rα,β(L1+L2+L3)≈.9578<1. |
Therefore, by Theorem
Further, using the given values, we have
γ1≈3.81,γ2≈1.977,ρ1≈.71187,ρ2≈1.734and |
A=[{3.81(π√π+π3/4)+.71187}181{1.977(π√π+π3/4)+.71187}1256.001127{1.977(π√π+π3/4)+.71187}1256{3.81(π√π+π3/4)+.71187}181.001127.0214.00677.00387]. |
The eigenvalues of matrix
λ1=.4453<1,λ2=.3174<1andλ3=.0038<1. |
Hence, we conclude from Theorem
The authors acknowledge the support of this work by the Indo-German exchange program "Multiscale Modelling, Simulation and optimization for energy, Advanced Materials and Manufacturing" funded by UGC (India) and DAAD (Germany) (grant number 1-3/2016 (IC)).
[1] |
I. Almomani, B. Al-Kasasbeh, M. Al-Akhras, Wsn-DS: A dataset for intrusion detection systems in wireless sensor networks, J. Sens., 2016 (2016), 4731953. https://doi.org/10.1155/2016/4731953 doi: 10.1155/2016/4731953
![]() |
[2] |
K. M. Nahar, R. M. Al-Khatib, M. Barhoush, A. A. Halin, Mpf-leach: Modified probability function for cluster head election in leach protocol, Int. J. Comput. Appl. Technol., 60 (2019), 267–280. https://doi.org/10.1504/IJCAT.2019.100295 doi: 10.1504/IJCAT.2019.100295
![]() |
[3] | D. Hemanand, G. V. Reddy, S. S. Babu, K. R. Balmuri, T. Chitra, S. Gopalakrishnan, An intelligent intrusion detection and classification system using csgo-lsvm model for wireless sensor networks (WSNs), Int. J. Intell. Syst. Appl. Eng., 10 (2022), 285–293. |
[4] | M. S. Alsahli, M. M. Almasri, M. Al-Akhras, A. I. Al-Issa, M. Alawairdhi, Evaluation of machine learning algorithms for intrusion detection system in WSN, Int. J. Adv. Comput. Sci. Appl., 12 (2021). |
[5] |
R. M. Al-Khatib, N. E. A. Al-qudah, M. S. Jawarneh, A. Al-Khateeb, A novel improved lemurs optimization algorithm for feature selection problems, J. King Saud. Univ. Comput. Inf. Sci., 35 (2023), 101704. https://doi.org/10.1016/j.jksuci.2023.101704 doi: 10.1016/j.jksuci.2023.101704
![]() |
[6] |
P. Nancy, S. Muthurajkumar, S. Ganapathy, S. Santhosh Kumar, M. Selvi, K. Arputharaj, Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks, IET Commun., 14 (2020), 888–895. https://doi.org/10.1049/iet-com.2019.0172 doi: 10.1049/iet-com.2019.0172
![]() |
[7] | A. Migdady, A. Al-Aiad, R. M. Al-Khatib, Efficientnet deep learning model for pneumothorax disease detection in chest X-rays images, Int. J. Bus. Inf. Syst., 2022. |
[8] | N. K. Mittal, A survey on wireless sensor network for community intrusion detection systems, in 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, (2016), 107–111. https://doi.org/10.1109/RAIT.2016.7507884 |
[9] | K. M. Nahar, R. M. Al-Khatib, M. A. Al-Shannaq, M. M. Barhoush, An efficient holy Quran recitation recognizer based on SVM learning model, Jordanian J. Comput. Inf. Technol., 6 (2020), 395–417. |
[10] |
H. S. Sharma, A. Sarkar, M. M. Singh, An efficient deep learning-based solution for network intrusion detection in wireless sensor network, Int. J. Syst. Assur. Eng. Manage., 14 (2023), 2423–2446. https://doi.org/10.1007/s13198-023-02090-0 doi: 10.1007/s13198-023-02090-0
![]() |
[11] |
M. Lopez-Martin, A. Sanchez-Esguevillas, J. I. Arribas, B. Carro, Supervised contrastive learning over prototype-label embeddings for network intrusion detection, Inf. Fusion, 79 (2022), 200–228. https://doi.org/10.1016/j.inffus.2021.09.014 doi: 10.1016/j.inffus.2021.09.014
![]() |
[12] | M. L. Martin, A. Sanchez-Esguevillas, B. Carro, Review of methods to predict connectivity of iot wireless devices, Novel Appl. Mach. Learn. Network Traffic Anal. Prediction, (2017), 95. |
[13] |
R. M. Al-Khatib, M. A. Al-Betar, M. A. Awadallah, K. M. Nahar, M. M. A. Shquier, A. M. Manasrah, et al., MGA-TSP: Modernised genetic algorithm for the travelling salesman problem, Int. J. Reasoning-based Intell. Syst., 11 (2019), 215–226. https://doi.org/10.1504/IJRIS.2019.102541 doi: 10.1504/IJRIS.2019.102541
![]() |
[14] |
D. Sarkar, S. Kumar, P. Das, H. Ramos, Higher-order convergence analysis for interior and boundary layers in a semi-linear reaction-diffusion system networked by a k-star graph with non-smooth source terms, Networks Heterogen. Media, 19 (2024), 1085–1115. https://doi.org/10.3934/nhm.2024048 doi: 10.3934/nhm.2024048
![]() |
[15] | S. Kumar, P. Das, K. Kumar, Adaptive mesh based efficient approximations for darcy scale precipitation-dissolution models in porous media, Int. J. Numer. Methods Fluids, 96 (2024)a, 1415–1444. https://doi.org/10.1002/fld.5294 |
[16] |
S. Kumar, P. Das, A uniformly convergent analysis for multiple scale parabolic singularly perturbed convection-diffusion coupled systems: Optimal accuracy with less computational time, Appl. Numer. Math., 207 (2025), 534–557. https://doi.org/10.1016/j.apnum.2024.09.020 doi: 10.1016/j.apnum.2024.09.020
![]() |
[17] |
S. Jiang, J. Zhao, X. Xu, Slgbm: An intrusion detection mechanism for wireless sensor networks in smart environments, IEEE Access, 8 (2020), 169548–169558. 10.1109/ACCESS.2020.3024219 doi: 10.1109/ACCESS.2020.3024219
![]() |
[18] |
S. Saini, P. Das, S. Kumar, Parameter uniform higher order numerical treatment for singularly perturbed robin type parabolic reaction diffusion multiple scale problems with large delay in time, Appl. Numer. Math., 196 (2024), 1–21. https://doi.org/10.1016/j.apnum.2023.10.003 doi: 10.1016/j.apnum.2023.10.003
![]() |
[19] |
K. Kumar, P. C. Podila, P. Das, H. Ramos, A graded mesh refinement approach for boundary layer originated singularly perturbed time-delayed parabolic convection diffusion problems, Math. Methods Appl. Sci., 44 (2021), 12332–12350. https://doi.org/10.1002/mma.7358 doi: 10.1002/mma.7358
![]() |
[20] | M. S. Jawarneh, S. M. Shah, M. M. Aljawarneh, R. M. Al-Khatib, M. G. Al-Bashayreh, Rib bone extraction towards liver isolating in ct scans using active contour segmentation methods, Int. J. Adv. Comput. Sci. Appl., 16 (2025). |
[21] |
C. Cai, Y. Tao, T. Zhu, Z. Deng, Short-term load forecasting based on deep learning bidirectional lstm neural network, Appl. Sci., 11 (2021), 8129. https://doi.org/10.3390/app11178129 doi: 10.3390/app11178129
![]() |
[22] |
R. M. Al-Khatib, N. K. T. El-Omari, M. A. Al-Betar, Innovative cloud computing object-oriented model to unify heterogeneous data, Int. J. Oper. Res., 46 (2023), 289–322. https://doi.org/10.1504/IJOR.2023.129410 doi: 10.1504/IJOR.2023.129410
![]() |
[23] |
N. A. Alrajeh, S. Khan, B. Shams, Intrusion detection systems in wireless sensor networks: A review, Int. J. Distrib. Sens. Netw., 9 (2013), 167575. https://doi.org/10.1155/2013/167575 doi: 10.1155/2013/167575
![]() |
[24] | W. Lee, S. J. Stolfo, K. W. Mok, Mining in a data-flow environment: Experience in network intrusion detection, in Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1999), 114–124. |
[25] | W. Lee, S. J. Stolfo, K. W. Mok, A data mining framework for building intrusion detection models, in Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No. 99CB36344), Oakland, CA, USA, (1999), 120–132. https://doi.org/10.1109/SECPRI.1999.766909 |
[26] |
M. Dener, C. Okur, S. Al, A. Orman, WSN-BFSF: A new dataset for attacks detection in wireless sensor networks, IEEE Internet Things J., 11 (2023), 2109–2125. https://doi.org/10.1109/JIOT.2023.329220 doi: 10.1109/JIOT.2023.329220
![]() |
[27] |
S. Salmi, L. Oughdir, Performance evaluation of deep learning techniques for dos attacks detection in wireless sensor network, J. Big Data, 10 (2023), 1–25. https://doi.org/10.1186/s40537-023-00692-w doi: 10.1186/s40537-023-00692-w
![]() |
[28] | H. S. Sharma, M. M. Singh, A. Sarkar, Machine learning-based dos attack detection techniques in wireless sensor network: A review, in Proceedings of the International Conference on Cognitive and Intelligent Computing: ICCIC 2021, Springer Nature Singapore, Singapore, 2 (2023), 583–591. |
[29] | B. J. Santhosh, Kddcup99, 2025. Available from: https://ieee-dataport.org/documents/kddcup99#files. |
[30] |
S. Choudhary, N. Kesswani, Analysis of KDD-Cup'99, NSL-KDD and UNSW-NB15 datasets using deep learning in LoT, Procedia Comput. Sci., 167 (2020), 1561–1573. https://doi.org/10.1016/j.procs.2020.03.367 doi: 10.1016/j.procs.2020.03.367
![]() |
[31] |
H. Rashaideh, A. Sawaie, M. A. Al-Betar, L. M. Abualigah, M. M. Al-Laham, R. M. Al-Khatib, et al., A grey wolf optimizer for text document clustering, Int. J. Intell. Syst., 29 (2020), 814–830. https://doi.org/10.1515/jisys-2018-0194 doi: 10.1515/jisys-2018-0194
![]() |
[32] | S. Overflow, Kdd1999 dataset features exolaination, 2025. Available from: https://stackoverflow.com/questions/17024961/kdd1999-dataset-features-exolaination. |
[33] | K. F, Long-short-term memory (lstmwsn_1), 2023. Available from: https://www.kaggle.com/code/kamalfstudify/lstmwsn-1. |
[34] |
Q. Abuein, M. Ra'ed, A. Migdady, M. S. Jawarneh, A. Al-Khateeb, Arsa-tweets: A novel arabic sarcasm detection system based on deep learning model, Heliyon, 10 (2024), e36892. https://doi.org/10.1016/j.heliyon.2024.e36892 doi: 10.1016/j.heliyon.2024.e36892
![]() |
[35] |
P. Das, An a posteriori based convergence analysis for a nonlinear singularly perturbed system of delay differential equations on an adaptive mesh, Numer. Algorithms, 81 (2019), 465–487. https://doi.org/10.1007/s11075-018-0557-4 doi: 10.1007/s11075-018-0557-4
![]() |
[36] |
K. L. Chiew, B. Hui, An improved network intrusion detection method based on cnn-lstm-sa, J. Adv. Res. Appl. Sci. Eng. Technol., 1 (2025), 225–238. https://doi.org/10.37934/araset.44.1.225238 doi: 10.37934/araset.44.1.225238
![]() |
[37] | S. Kumar, S. Kumar, P. Das, Second-order a priori and a posteriori error estimations for integral boundary value problems of nonlinear singularly perturbed parameterized form, Numer. Algorithms, (2024)b, 1–28. https://doi.org/10.1007/s11075-024-01918-5 |
[38] |
S. Kumar, P. Das, Impact of mixed boundary conditions and nonsmooth data on layer-originated nonpremixed combustion problems: Higher-order convergence analysis, Stud. Appl. Math., 153 (2024), e12763. https://doi.org/10.1111/sapm.12763 doi: 10.1111/sapm.12763
![]() |
[39] |
I. Abu Doush, M. A. Al-Betar, M. A. Awadallah, A. I. Hammouri, R. M. Al-Khatib, S. ElMustafa, et al., Harmony search algorithm for patient admission scheduling problem, Int. J. Intell. Syst., 29 (2019), 540–553. https://doi.org/10.1515/jisys-2018-0094 doi: 10.1515/jisys-2018-0094
![]() |
[40] | S. Siami-Namini, N. Tavakoli, A. S. Namin, The performance of lstm and bilstm in forecasting time series, in 2019 IEEE International Conference on Big Data (Big Data), (2019), 3285–3292. https://doi.org/10.1109/BigData47090.2019.9005997 |
1. | Wei Zhang, Jifeng Zhang, Jinbo Ni, Existence and uniqueness results for fractional Langevin equations on a star graph, 2022, 19, 1551-0018, 9636, 10.3934/mbe.2022448 | |
2. | M. Moumen Bekkouche, I. Mansouri, A. A. Azeb Ahmed, Numerical solution of fractional boundary value problem with caputo-fabrizio and its fractional integral, 2022, 68, 1598-5865, 4305, 10.1007/s12190-022-01708-z | |
3. | Mohamed El Azzouzi, Abdellah Lourini, Mohamed Laabissi, Null Controllability of Networks Systems, 2022, 1079-2724, 10.1007/s10883-022-09623-z | |
4. | Vivek Kumar, Günter Leugering, Convection dominated singularly perturbed problems on a metric graph, 2023, 425, 03770427, 115062, 10.1016/j.cam.2023.115062 | |
5. | Vaibhav Mehandiratta, Mani Mehra, Günter Leugering, 2021, Chapter 2, 978-981-16-4771-0, 25, 10.1007/978-981-16-4772-7_2 | |
6. | Xiaoli Feng, Meixia Zhao, Zhi Qian, A Tikhonov regularization method for solving a backward time–space fractional diffusion problem, 2022, 411, 03770427, 114236, 10.1016/j.cam.2022.114236 | |
7. | Hassan Khan, Umar Farooq, Fairouz Tchier, Qasim Khan, Gurpreet Singh, Poom Kumam, Kanokwan Sitthithakerngkiet, The analytical analysis of fractional order Fokker-Planck equations, 2022, 7, 2473-6988, 11919, 10.3934/math.2022665 | |
8. | Günter Leugering, Gisèle Mophou, Maryse Moutamal, Mahamadi Warma, Optimal control problems of parabolic fractional Sturm-Liouville equations in a star graph, 2023, 13, 2156-8472, 771, 10.3934/mcrf.2022015 | |
9. | Vaibhav Mehandiratta, Mani Mehra, Gunter Leugering, Optimal Control Problems Driven by Time-Fractional Diffusion Equations on Metric Graphs: Optimality System and Finite Difference Approximation, 2021, 59, 0363-0129, 4216, 10.1137/20M1340332 | |
10. | Leijie Qiao, Da Xu, Wenlin Qiu, The formally second-order BDF ADI difference/compact difference scheme for the nonlocal evolution problem in three-dimensional space, 2022, 172, 01689274, 359, 10.1016/j.apnum.2021.10.021 | |
11. | Guotao Wang, Hualei Yuan, Existence, uniqueness, and Ulam stability of solutions of fractional conformable Langevin system on the ethane graph, 2024, 0170-4214, 10.1002/mma.9975 | |
12. | Gang Chen, Jinbo Ni, Xinyu Fu, Existence, and Ulam's types stability of higher-order fractional Langevin equations on a star graph, 2024, 9, 2473-6988, 11877, 10.3934/math.2024581 | |
13. | Jingjia Wang, Yongguang Yu, Jian Hou, Xiangyun Meng, Local error analysis of L1 scheme for time-fractional diffusion equation on a star-shaped pipe network, 2024, 99, 0031-8949, 125274, 10.1088/1402-4896/ad9114 | |
14. | Sergei A. Avdonin, Alexander S. Mikhaylov, Victor S. Mikhaylov, Abdon E. Choque‐Rivero, Discretization of the Wave Equation on a Metric Graph, 2024, 0170-4214, 10.1002/mma.10630 | |
15. | Vaibhav Mehandiratta, Mani Mehra, Space-time fractional parabolic equations on a metric star graph with spatial fractional derivative of Sturm-Liouville type: analysis and discretization, 2025, 1311-0454, 10.1007/s13540-025-00376-7 | |
16. | Barun Singh Katoch, Surjeet Singh Chauhan Gonder, 2025, 3283, 0094-243X, 040003, 10.1063/5.0265023 |