Research article

New solitary wave solutions for the conformable Klein-Gordon equation with quantic nonlinearity

  • We present new exact solutions in the form of solitary waves for the conformable Klein-Gordon equation with quintic nonlinearity. We use functional variable method which converts a conformable PDE to a second-order ordinary differential equation through a traveling wave transformation. We obtain periodic wave and solitary wave solutions including particularly kink-profile and bell-profile type solutions. The present method is a direct and concise technique which has the potential to be applicable to many other conformable PDEs arising in physics and engineering.

    Citation: Mustafa Inc, Hadi Rezazadeh, Javad Vahidi, Mostafa Eslami, Mehmet Ali Akinlar, Muhammad Nasir Ali, Yu-Ming Chu. New solitary wave solutions for the conformable Klein-Gordon equation with quantic nonlinearity[J]. AIMS Mathematics, 2020, 5(6): 6972-6984. doi: 10.3934/math.2020447

    Related Papers:

    [1] Chun Huang, Zhao Li . New soliton solutions of the conformal time derivative generalized -deformed sinh-Gordon equation. AIMS Mathematics, 2024, 9(2): 4194-4204. doi: 10.3934/math.2024206
    [2] Khudhayr A. Rashedi, Musawa Yahya Almusawa, Hassan Almusawa, Tariq S. Alshammari, Adel Almarashi . Lump-type kink wave phenomena of the space-time fractional phi-four equation. AIMS Mathematics, 2024, 9(12): 34372-34386. doi: 10.3934/math.20241637
    [3] Canlin Gan, Weiwei Wang . Existence result for the critical Klein-Gordon-Maxwell system involving steep potential well. AIMS Mathematics, 2023, 8(11): 26665-26681. doi: 10.3934/math.20231364
    [4] Volkan ALA, Ulviye DEMİRBİLEK, Khanlar R. MAMEDOV . An application of improved Bernoulli sub-equation function method to the nonlinear conformable time-fractional SRLW equation. AIMS Mathematics, 2020, 5(4): 3751-3761. doi: 10.3934/math.2020243
    [5] Sayed Saifullah, Amir Ali, Zareen A. Khan . Analysis of nonlinear time-fractional Klein-Gordon equation with power law kernel. AIMS Mathematics, 2022, 7(4): 5275-5290. doi: 10.3934/math.2022293
    [6] M. Hafiz Uddin, M. Ali Akbar, Md. Ashrafuzzaman Khan, Md. Abdul Haque . New exact solitary wave solutions to the space-time fractional differential equations with conformable derivative. AIMS Mathematics, 2019, 4(2): 199-214. doi: 10.3934/math.2019.2.199
    [7] Zeliha Korpinar, Mustafa Inc, Ali S. Alshomrani, Dumitru Baleanu . The deterministic and stochastic solutions of the Schrodinger equation with time conformable derivative in birefrigent fibers. AIMS Mathematics, 2020, 5(3): 2326-2345. doi: 10.3934/math.2020154
    [8] Xiaoli Wang, Lizhen Wang . Traveling wave solutions of conformable time fractional Burgers type equations. AIMS Mathematics, 2021, 6(7): 7266-7284. doi: 10.3934/math.2021426
    [9] Yaojun Ye, Lanlan Li . Global existence and blow-up of solutions for logarithmic Klein-Gordon equation. AIMS Mathematics, 2021, 6(7): 6898-6914. doi: 10.3934/math.2021404
    [10] Safoura Rezaei Aderyani, Reza Saadati, Javad Vahidi, Nabil Mlaiki, Thabet Abdeljawad . The exact solutions of conformable time-fractional modified nonlinear Schrödinger equation by Direct algebraic method and Sine-Gordon expansion method. AIMS Mathematics, 2022, 7(6): 10807-10827. doi: 10.3934/math.2022604
  • We present new exact solutions in the form of solitary waves for the conformable Klein-Gordon equation with quintic nonlinearity. We use functional variable method which converts a conformable PDE to a second-order ordinary differential equation through a traveling wave transformation. We obtain periodic wave and solitary wave solutions including particularly kink-profile and bell-profile type solutions. The present method is a direct and concise technique which has the potential to be applicable to many other conformable PDEs arising in physics and engineering.


    With the increasing demand for supporting mobile device printing, network printers that support mobile functions such as WiFi direct connection, NFC printing and cloud printing have gradually become indispensable electronic devices in people's daily life and office. Schools, government departments, hospitals and other units and institutions all use printers. From a security perspective, as printing devices are deployed on internal networks, they can directly access various sensitive information, so their security is more important. However, due to its unique functionality, people often overlook its security, resulting in many printer security issues and a gradual increase in security incidents [1,2]. For example, a high school hacker from the UK, Stackoverflow, claimed to have used printer vulnerabilities to control over 150,000 printers. He attempted to directly transmit RAW protocol print jobs through port 9100 using printer process daemon (LPD) and Internet Printing Protocol (IPP), bypassing identity authentication. He also revealed that he had discovered an 0Day remote execution vulnerability (RCE) on Xerox's printer web management page. Columbia University researchers have found that a feature called "Remote Firmware Update" on some HP laser printers allows hackers to fully control the printer after installing malicious software on the machine, transmit printed files back to the hacker's computer, stop the printer from working and even cause the fixing device on the printer that heats and pressurizes the toner to continue heating until it catches fire. Now, someone has successfully invaded a printer connected to a public network. Andrew Auernheimer (codenamed "Weev" and previously a well-known hacker who was a member of the Goatse security team) admitted on his blog that he had invaded thousands of network printers and made them print content containing racist and anti-Semitic information. These are all very serious printer security incidents [3,4].

    There have been many achievements in research on the security of data during network printing and the prevention of printing data leakage. First, Li [5] conducted research on network printer security risk analysis and prevention technologies. Li et al. [6] proposed suggestions for network printer security research and protection. Yan et al. [7] designed a security enhanced printer based on Trusted Computing 3.0, Feng et al. [8] evaluated and improved the network printing protocol based on the HCPN model detection method, Sulaiman et al. [9] developed a signature based Suricata network printer for theft prevention on PfSense, Huang et al. [10] designed a cloud based portable IoT inkjet printer, Nguyen et al. [11] designed a deep learning based micro print source printer recognition and Kakade et al. [12] designed an open IoT based real-time online monitoring system for FDM printers, The above achievements have achieved certain results in achieving network printing security.

    This article is different from previous studies. In order to achieve security in data transmission of network printers, a FIB-DH data encryption technology scheme based on edge cloud collaboration is proposed. Network security is achieved through edge cloud collaboration and cryptographic methods. There have also been studies related to this. Cai et al. [13] designed an industrial internet intrusion detection method based on Res-CNN SRU, and Xiang et al. [14] proposed an APT attack detection event extraction method based on BERT BiGRU-CRF, Kimi et al. [15] conducted digital forensics for electronic IoT devices in smart cities, while Almuflih et al. [16] used efficient key exchange using identity-based encryption in a multipath TCP environment. Here, we combine the characteristics of the third-order Fibonacci matrix with Diffie-Hellman to ultimately achieve secure data transmission for network printers.

    The major contributions of this paper include three aspects:

    ● By combining the third-order Fibonacci matrix with Diffie-Hellman through edge cloud collaboration, a FIB-DH data encryption technology architecture is designed.

    ● The process of implementing FIB-DH data encryption technology solution is provided.

    ● The feasibility of the FIB-DH scheme was verified through simulation attack experiments using the PRET tool and compared with normal network printing.

    The paper is organized as follows: The second section of this article introduces the preliminary knowledge for implementing the technical solution of this paper, including the information flow of the printer, the risk of printing data transmission leakage, IPP protocol, the characteristics of the third-order Fibonacci matrix, Diffie-Hellman encryption technology and MQTT protocol; in Section 2, an architecture of FIB-DH encryption technology based on edge cloud collaboration was designed, providing the implementation process of the FIB-DH scheme; Section 3 conducted experiments and comparative analysis on the scheme through simulation; Finally, we summarize the entire article and propose future work.

    The printer mostly consists of three parts: the host part (including driver program and PC storage), the control card part (including the main control chip CPU) and the printer core (including LSU, toner cartridge and mechanical structure) [17]. The laser printer is composed of a mechanical part and an electronic control part, which is a typical mechatronics product. The electronic control part is usually highly integrated on the printer control card. Used to control the mechanical part to complete the entire printing work. The composition structure of the printer is shown in Figure 1.

    Figure 1.  The information flow of the printer.

    In response to the security risks of modules or components such as the printer's main control unit, data transmission unit, external interface, driver, printing protocol, etc., attackers usually use the built-in backdoor program of the printer, control of the printer port, plaintext transmission of printing information, printing business authentication and processing of printing information cache data to attack printer security vulnerabilities.

    Although a printer is only one of the peripheral devices connected to a computer host, it has independent data processing capabilities and can interact with the host for data transmission, thus providing great security [18]. There are three main risks of printing data transmission leakage, as shown in Figure 2.

    Figure 2.  Types of risk of data transmission leakage during printing.

    First, communication interface leaks. Modern printers are generally equipped with rich communication interfaces to meet diverse user needs. These interfaces can be divided into two categories: Wired communication interfaces such as USB, RJ45, RS232 and PCIExpress; the other type is wireless communication interfaces, such as Wi-Fi, GPRS, Bluetooth, infrared, etc. Although these interfaces extend the functionality of the printer, they also increase the avenues for unauthorized users to steal printing data.

    Second, network access leaks. Currently, printers are developing towards comprehensive information management and output terminals, mostly integrating rich network functions. These functions not only improve work efficiency and enhance team collaboration capabilities, but also become a major channel for information leakage. When the printer is connected to an external network (such as the Internet), it will inevitably generate data exchange with the public network; in addition, some open ports can even be exploited by hackers, leading to illegal takeover of printers.

    Third, data transmission leaks. During the process of sending print jobs to the printer, the computer needs to interact with the printer through data transmission media. During this process, if the printed data is not encrypted before transmission, once it is illegally hijacked by an intruder during transmission, the intruder can easily obtain the true printed data through protocol analysis tools.

    IPP is the latest industry standard network printing protocol that can be used for client to server communication and server to printer communication. This protocol provides a basic model that includes printers and jobs, standard attributes of these printers and jobs and a set of standard operations that can be performed on these printers and jobs. Due to the standardization of objects, attributes and operations, IPP is a method used for communication between client and server systems, allowing users to perform remote printing and manage printing work through the internet [19].

    The IPP protocol is based on the client/server mode. Network printers are connected to the internet or intranet through IPP, and users can directly observe the working and physical status of the printers. However, BinaryEdge normal scanning shows that on average, about 80000 printers are discovered through the IPP port every day, and these printers are exposed to the internet every day, which will cause many problems [20].

    Therefore, the IPP protocol is not completely secure and is often exploited by attackers, Conduct an attack.

    People have been interested in studying Fibonacci sequences for hundreds of years. It was an interesting sequence, also known as the golden sequence, introduced by the Italian mathematician Fibonacci in the 13th century to solve the problem of rabbit reproduction, which is a second-order recursive sequence: F0 = 0, F1 = 1, Fn + 1 = Fn + Fn-1, n = 1, 2, 3…. Fibonacci has many unique properties and is widely used in computational mathematics, mathematical statistics, geometry and other fields [21,22]. Previous research has shown that Fibonacci sequences can be represented by Fibonacci matrices, and second-order Fibonacci sequences can be represented by second-order Fibonacci matrix T2 [23], as shown in formula (1).

    (1)

    Third order Fibonacci sequence: F0 = 1, F1 = 1, F2 = 2, Fn + 1 = Fn + Fn-1 + Fn-2, n = 2, 3, 4…, can be represented by the third-order Fibonacci matrix T3 [24] as shown in formula (2).

    (2)

    Due to the determinant |T3| = 1, T3 is reversible, so T3−1 can be calculated, as shown in formula (3).

    (3)

    Calculate T3n and (T3n) −1 using formulas (4) and (5), as shown in formula (6).

    (4)
    (5)
    (6)

    Using n as a parameter and formula (6), taking n = 4, calculate T34 and (T34)−1, as shown in formula (7).

    (7)

    Using formula (6), take n = 5 and calculate T35and (T35)−1, as shown in formula (8).

    (8)

    Similarly, we can easily calculate T3n and (T3n)−1 by taking n = 6, 7, 8, 9, 10.

    Finally, Fn is defined by formula (6), as shown in formula (9). By changing n, a third-order recursive sequence can be calculated.

    (9)

    In this study, we utilized the unique feature of third-order Fibonacci matrices being reversible and easy to calculate. Using n as a parameter and applying Fn and Fn−1 to the printing data transmission process, we achieved anti tampering and encryption effects. The sender sends data to the receiver, and the process is shown in Figure 3.

    Figure 3.  Application process of third-order Fibonacci matrix.

    The specific data communication process is as follows:

    First, the sender and receiver have agreed on n, which is actually the agreement Fn and Fn-1.

    1) Sender: Transform the original text M through a third-order Fibonacci matrix. M is defined as a matrix with the same three columns, M3 = (M, M, M), Calculate G3 = M3 × Fn = (M, M, M) × Fn = (G1, G2, G3) and send G3 to the intermediary.

    2) Middle-party: There are three Middle-partys who receive G1, G2 and G3 and forward them to the receiver.

    3) Receiver: The receiver receives (G1, G2, G3) and transforms G3 through the third-order Fibonacci inverse matrix to generate G3 × Fn−1 = (M1, M2, M3).

    If there is no tampering during the transmission process, it should be: G3 × Fn−1 = (G1, G2, G3) × Fn−1 = (M, M, M) × Fn × Fn−1 = (M1, M2, M3), M1, M2 and M3 should all be equal. Therefore, the receiver can prevent data tampering by comparing whether M1, M2 and M3 are equal, Moreover, due to the change in n, the intermediary receives three different data sets G1, G2 and G3 from the original text, thus serving the purpose of encryption.

    Diffie-Hellman is a key consistency algorithm published by Whitfield Diffie and Martin Hellman in 1976. It is a method of establishing key exchange, aimed at enabling two users to securely exchange a secret key for future message encryption. Its effectiveness depends on the difficulty of calculating discrete logarithms. Diffie-Hellman is an asymmetric encryption algorithm commonly used in blockchain encryption schemes and also a public key algorithm [25,26]. Its working principle is that each communication party generates a private key and a public key, and the private key is not public. After the public key is publicly exchanged, the communication parties can calculate the shared key, which is shared. Therefore, both parties can encrypt and decrypt messages through the shared key, thus achieving encrypted transmission of messages [27,28,29]. Diffie-Hellman can negotiate a shared key through unreliable channels and is widely used in PKI key distribution in many industrial level security protocols.

    Sender sends plaintext M to Receiver for encrypted transmission, as shown in Figure 4.

    Figure 4.  Diffie-Hellman encryption process flow diagram.

    1) Sender and receiver first agree on two parameters g and N, and randomly generate their own private keys x and y, and calculate their respective public keys X and Y using formula (10).

    (10)

    2) Sender and Receiver exchange X and Y

    3) Sender calculates key K through x and Y, while Receiver calculates key G through y and X, as shown in formula (11).

    (11)

    From formula (11), it can be seen that K and G are equal, and therefore can be used as dual shared keys.

    4) Sender encrypts plaintext M through K, with Cm = Ek(M); The receiver decrypts DG(Cm) through G, and since K and G are equal, the receiver can obtain plaintext M = DG(EK(M)).

    Diffie-Hellman is the foundation of authentication key exchange (AKE) schemes in the post quantum computing era [30]. It combines the third-order Fibonacci matrix with Diffie-Hellman encryption algorithm to form a new FIB-DH encryption technology scheme, which is a specific application of Diffie-Hellman in network printer encryption schemes.

    The full name of the MQTT protocol is Message Queuing Telemetry Transport, which means Message Queuing Transport Detection. It is a client server-based message publish/subscribe transport protocol under the ISO standard, based on the TCP/IP protocol cluster, published by IBM in 1999. The biggest advantage of MQTT is that it is lightweight, simple, open and easy to implement. It can provide real-time and reliable messaging services for remote connected devices with minimal code and limited bandwidth. As a low-cost, low bandwidth instant messaging protocol, it has a wide range of applications in the Internet of Things, small devices, mobile applications and other fields [31,32].

    Implementing the MQTT protocol requires communication between the client and server. During the communication process, there are three identities in the MOTT protocol: Publisher, Broker (server) and Subscriber. Both the publisher and subscriber of the message are the client, while the message broker is the server. The message publisher can simultaneously send messages to the subscriber [33,34], as shown in Figure 5.

    Figure 5.  Schematic diagram of MQTT message publish/subscribe.

    From Figure 5, it can be seen that the subscriber has subscribed to topic data1 or data2. As long as the publisher publishes topic data1 or data2, the subscriber can receive it. Therefore, broadcasting transmission and reception can be achieved, which can be one-to-many or many-to-one.

    The messages transmitted by MQTT are mostly divided into two parts: Topic and payload:

    1) Topic: It can be understood as the type of message (the type of data command transmitted). After subscribing to (Subscribe), the subscriber will receive the message content (payload) of the topic.

    2) Payload: Can be understood as the content of the message (transmitted data body content), referring to the specific content that the subscriber needs to use. Payload can contain printed data content.

    The FIB-DH encryption technology scheme based on edge cloud collaboration mostly includes five parts: Client computer (CC), MQTT cloud server (MCS), edge computer (EC), printing computer (PC) and printer (PT). 1) Customer computer is a customer computer that allows users to operate network printing, which can be printed locally on a local area network or remotely on the internet; 2) MQTT cloud server, remote communication management between customers and printing computers, and FIB-DH edge cloud collaboration; 3) Edge computer, at the edge of local area network, mainly realizes FIB-DH edge cloud collaboration; 4) The printing computer is connected to the printer USB in the local LAN to achieve FIB-DH edge cloud collaboration and transmit the verified printing data to the printer; 5) Printer, responsible for printing document data. The scheme architecture is shown in Figure 6.

    Figure 6.  FIB-DH scheme architecture.

    In the FIB-DH encryption technology scheme, users send printed data through the client's computer. When the system is implemented, the major tasks include two types: 1) User connection authentication, and 2) printing document data, as shown in Figure 7.

    Figure 7.  Task implementation flowchart.

    In the connection authentication stage, users use FIB-DH data encryption technology scheme to perform connection authentication. During the document printing phase, users encrypt, transmit and verify printed data through edge cloud collaboration and FIB-DH scheme to avoid man in the middle attacks and prevent leaked printed documents

    By utilizing the characteristics of the third-order Fibonacci matrix and combining it with the Diffie-Hellman encryption algorithm, a new FIB-DH encryption algorithm is formed. In the FIB-DH encryption algorithm, first, due to the fact that each encryption key is random and undergoes Fibonacci transformation, the generated ciphertext is different each time. If the intermediary obtains the ciphertext, it is ambiguous to analyze. Second, due to the use of key vectors, it is necessary to compare and vote on the results to achieve verification purposes. The FIB-DH encryption process in which the user sends plaintext M to the terminal is shown in Figure 8.

    Figure 8.  FIB-DH encryption process flow diagram.

    1) Sender and Receiver first agree on three parameters g, N, n (n is the n in Fn in formula 9) and randomly generate their own private key vectors x = (x1, x2, x3) and y = (y1, y2, y3), and calculate their respective public key vectors X and Y through formula (12).

    (12)

    2) Sender and Receiver exchange X and Y.

    3) Sender calculates the key vector K through x and Y, while Receiver calculates the key vector G through y and X, as shown in formula (13).

    (13)

    From formula (13), it can be seen that K and G are equal and can therefore serve as shared keys for both parties.

    4) Sender encrypts plaintext M through K, with Cm = Ek(M), as shown in formulas (14) and (15); Calculate Em through Fn transformation, as shown in formulas (16) and (17); Then the sender sends {E1, E2, E3} to the intermediate party (Party A, Party B, Party C).

    After receiving the data from the intermediary, the receiver calculates Cm through Fn-1 transformation, as shown in formula (18). Due to formula (19), formula (20) can be derived, and then DG(Cm) can be decrypted through G, as shown in formula (21). Due to the equality of K and G, the three data {M1, M2, M3} in formula (22) should be equal. Therefore, the original M can be obtained through a voting algorithm.

    For example, if the original file M has 5 bytes (if the multi byte principle is the same), M = (m1, m2, m3, m4, m5), (if n bytes, the principle is the same).

    (14)
    (15)
    (16)
    (17)
    (18)
    (19)
    (20)
    (21)
    (22)

    Finally, perform a time complexity analysis of the algorithm:

    In the FIB-DH encryption scheme, due to Em = Cm × Fn and Cm = E × Fn−1, based on the characteristics of the Fibonacci matrix, Fn and Fn−1 can be calculated in advance. Therefore, its time complexity is O(n). The Elliptic Encryption Algorithm (ECC) is a public key encryption system based on Diffie-Hellman and is commonly used on mobile devices to ensure data security. ECC defines (x, y) at a point on G using the elliptic curve [35] equation G: y2 + gxy + hy = x3 + ix2 + jx + k, using key X × G and Y × G transformations for encryption and decryption. Based on this feature, its time complexity is O(n3). Therefore, the FIB-DH encryption method has lower time and complexity compared to the Elliptic Encryption Algorithm (ECC).

    Corresponding to Figure 8 of the FIB-DH scheme, the sender is Client Computer (CC), the receiver is Printer Computer (PC) and the intermediaries (Party A, Party B and Party C) are Edge Computer (EC), MQTT cloud server (MCS) and Printer Computer (PC). According to the FIB-DH encryption scheme in Section 3.1, the specific flowchart for implementing network printing is shown in Figure 9.

    Figure 9.  Flow chart for network printing through FIB-DH scheme.

    The implementation process is as follows:

    Step1. CC set three parameters g, N and n, to randomly generate the private key x, and calculate X = mod N, Fn.

    Step2. CC send three parameters g, N and n, and public key X to PC through the MQTT protocol.

    CC = > PC:{ X, g, N, n}

    Step3. PC randomly generates its own private key y and calculates Y = gen (g, y, N) based on the g, N transmitted by CC, Y serves as the public key of the PC; Simultaneously calculating encryption key G.

    Step4. PC passes the public key Y to CC through the MQTT protocol. PC = > CC:{Y}

    Step5. CC calculates the encryption key based on the Y transmitted from the PC.

    K = mod N = mod N

    Step6. CC input printing data, calculate Em = Ek(M) × Fn through key K and Fn, then send {E1, E2, E3} to PC, EC and MCS respectively.

    CC- > PC:{E1}, CC- > EC:{E2}, CC- > MCS:{E3}

    Step7. PC receives E2 and E3, merges them into Em and calculates Mn = DG (Em × Fn−1) through keys G and Fn, as shown in formula (22), compare M1, M2, M3 and vote for M.

    Step8. Finally, the PC outputs to the PT via USB for printing.

    In order to simulate attacks on network printers, during the testing process, we used the printer intrusion tool kit PRET. PRET is an automated program based on Python language that can simulate various attack tests on the target printer. In actual use, it is necessary to install the PRET third-party components as follows:

    # pip install colorama pysnmp

    # pip install win_unicode_console

    # apt-get install imagemagick ghostscript

    The format of the PRET command is as follows:

    usage: pret.py [-h] [-s] [-q] [-d] [-i file] [-o file] target {ps, pjl, pcl}

    Among them, the PRET command position arguments are shown in Table 1.

    Table 1.  PRET positional arguments.
    Arguments Describe
    Target Printer device or hostname
    {ps, pjl, pcl} Printing language

     | Show Table
    DownLoad: CSV

    The PRET command optional arguments are shown in Table 2.

    Table 2.  PRET optional arguments.
    Arguments Describe
    -h, --help show this help message and exit
    -s, --safe verify if language is supported
    -q, --quiet suppress warnings and chit-chat
    -d, --debug enter debug mode (show traffic)
    -i file, --load file load and run commands from file
    -o file, --log file log raw data sent to the target

     | Show Table
    DownLoad: CSV

    The PRET command can be used to conduct various attacks on network printers, including DoS attacks, authorization, print task control, remote code operation, information leakage, information tampering, etc. These attacks can be used to test the anti-attack ability of remote network printing on network printers.

    Experimental comparison subjects: 1) Group 1: Local Network Printing (LN-PT), 2) Group 2: Remote Network Printing (RN-PT) and Group 3: FIB-DH Scheme Network Printing (FD-PT). Experimental address: In the IoT laboratory of the School of Artificial Intelligence. The system sets two parameters: 1) Set the number of network printing attacks using the PRET tool to simulate six network types of attacks: DoS attacks, authorization, print task control, remote code operation, information leakage and information tampering. The number of attacks for each type is shown in Table 3, with a total of 100 attacks. 2) Number of printing tasks, each task requires printing 10 2-page documents. In the experimental comparison, the number of printing tasks varies, and the accuracy of printing tasks is evaluated as the task burden increases.

    Table 3.  PRET simulation attacks on printers.
    Attack type Number of attacks
    DoS attacks 15
    Authorization 15
    Print task control 15
    Remote code operation 15
    Information leakage 20
    Information tampering 20

     | Show Table
    DownLoad: CSV

    The first group (Group1): Local Network Printing (LN-PT), under the same experimental conditions, achieves document printing through user computers on a local area network. The number of printing tasks is constantly changing, and it also simulates attacks on printers through PRET, ultimately comparing the accuracy of printing.

    The second group (Group2): Remote Network System (RN-PT), under the same experimental conditions, remotely prints documents through user computers on the Internet. The number of printing tasks is constantly changing, and while printing, PRET is also used to simulate attacks on printers, ultimately comparing the accuracy of printing.

    The third group (Group3): FIB-DH scheme network printing (FD-PT), under the same experimental conditions, remotely printing documents through user computers on the Internet. The number of printing tasks is constantly changing, and while printing, PRET simulation is also used to attack the printer, ultimately comparing the accuracy of printing.

    1) Comparison of printing accuracy

    By conducting network printing comparative experiments on three groups of systems, the task size varied from 100 to 300 with an increment level of 20. Finally, the comparative results were obtained as shown in Table 4. From the table, it can be seen that the FIB-DH network printing has the best printing accuracy under the same task.

    Table 4.  Comparison of network printing accuracy with task changes.
    Number of printing tasks Local network printing accuracy (LN-RT)(%) Remote network printing accuracy (RN-PT)(%) FIB-DH network printing accuracy (FD-PT)(%)
    100 92.0 90.1 98.2
    120 92.2 90.3 98.3
    140 92.3 90.4 98.4
    160 92.4 90.6 98.6
    180 92.6 90.7 98.7
    200 92.8 90.9 98.9
    220 92.9 91.1 99.0
    240 93.0 91.3 99.1
    260 93.2 91.6 99.3
    280 93.3 91.8 99.4
    300 93.5 92.1 99.6

     | Show Table
    DownLoad: CSV

    When we set the number of printing tasks to 100,200 and 300, we compared the three groups of network printing. The bar chart is shown in Figure 10, which shows that FIB-DH network printing has more advantages.

    Figure 10.  Comparative histograms of three groups of network printing accuracy.

    The comparison of the printing accuracy of three sets of networks under different tasks is shown in Figure 11. From this line breaking chart, it can be clearly seen that the FIB-DH scheme has the best network printing accuracy under different tasks, with an improvement of about 6%.

    Figure 11.  Network printing accuracy curve comparison with task change.

    2) Comparison of printing time cost

    Similarly, we set the number of printing tasks to 100,200 and 300, and compare the time cost of three sets of network printing, the comparison results are shown in Table 5. Due to the fact that LN-RT is printed on a local network, the printing time cost is obviously lower than RN-PT and FD-PT. Therefore, we focus on comparing FD-PT and RN-PT. From the table, it can be seen that the printing time cost of FD-PT is slightly higher than that of FD-PT, and the difference is not significant, about 3%.

    Table 5.  Comparison of network printing time cost with task changes.
    Number of printing tasks Local network printing accuracy (LN-RT)(Min) Remote network printing accuracy (RN-PT)(Min) FIB-DH network printing accuracy (FD-PT)(Min)
    100 8.4 10.5 11.2
    200 16.6 20.9 21.8
    300 25.8 30.8 31.7

     | Show Table
    DownLoad: CSV

    Summary of the experiment: 1) Compared the important indicator of network printing accuracy under three schemes, the FIB-DH scheme improved the network printing accuracy by about 6% under network attacks, making it more secure. 2) The FIB-DH scheme also has certain shortcomings in network printing. From the perspective of printing time cost, the FIB-DH scheme does not have an advantage in network printing, increasing by about 3% compared to others, but improving the printing accuracy by about 6%. In order to improve the security of network printing, it is inevitable to increase system complexity, and adding some printing time cost is not considered.

    Network printers are a combination of traditional printers and internet applications, which perfectly solves the interconnection and sharing problems in office work and meets the office needs of government agencies. However, network printing poses security risks, and information leakage and network attacks may occur through network printing. In this article, we propose a FIB-DH data encryption technology scheme based on edge cloud collaboration to address the security of network printing, especially the risk of leakage during data transmission. By mining the characteristics of third-order Fibonacci matrices and combining Diffie-Hellman encryption technology, edge cloud collaboration is used to achieve the security of printed data. Through PRET tool simulation experiments, compared with conventional network printing, the accuracy of network printing data has been improved, effectively improving the security of network printing and preventing the leakage and tampering of printing information.

    However, its technical scheme also has certain limitations. While improving network printing security, the complexity of its implementation has also increased. In future work, we will continue to compare and analyze privacy-protecting algorithms to improve their security while reducing the complexity of system implementation. This article can provide some reference for future research on network printing security models.

    The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This study was supported by the Natural Science Foundation Project of China (61976118), the Natural Science Foundation Project of Jiangsu Province (BK20180142), and the key topics of the "13th five-year plan" for Education Science in Jiangsu Province (B-b /2020/01/18).

    All authors declare no conflicts of interest in this paper.



    [1] M. M. Khater, D. Kumar, Implementation of three reliable methods for finding the exact solutions of (2+1) dimensional generalized fractional evolution equations, Opt. Quant. Electron., 50 (2018), 1-16. doi: 10.1007/s11082-017-1266-2
    [2] M. M. Khater, A. R. Seadawy, D. Lu, New optical soliton solutions for nonlinear complex fractional Schrödinger equation via new auxiliary equation method and novel (G'/G)-expansion method, Pramana, 90 (2018), 1-20. doi: 10.1007/s12043-017-1492-y
    [3] M. Eslami, Exact traveling wave solutions to the fractional coupled nonlinear Schrödinger equations, Appl. Math. Comput., 285 (2016), 141-148.
    [4] M. M. A. Khater, D. Lu, R. A. M. Attia, Dispersive long wave of nonlinear fractional Wu-Zhang system via a modified auxiliary equation method, AIP Advances, 9 (2019), 025003.
    [5] H. Qin, R. A. M. Attia, M. Khater, et al. Ample soliton waves for the crystal lattice formation of the conformable time-fractional (N+ 1) Sinh-Gordon equation by the modified Khater method and the Painleve property, J. Intell. Fuzzy Syst., 38 (2020), 2745-2752. doi: 10.3233/JIFS-179560
    [6] F. S. Khodadad, F. Nazari, M. Eslami, et al. Soliton solutions of the conformable fractional Zakharov-Kuznetsov equation with dual-power law nonlinearity, Opt. Quant. Electron., 49 (2017), 1-12. doi: 10.1007/s11082-016-0848-8
    [7] H. Tariq, G. Akram, New traveling wave exact and approximate solutions for the nonlinear CahnAllen equation: Evolution of a nonconserved quantity, Nonlinear Dynam., 88 (2017), 581-594. doi: 10.1007/s11071-016-3262-7
    [8] H. Rezazadeh, S. M. Mirhosseini-Alizamini, M. Eslami, et al. New optical solitons of nonlinear conformable fractional Schrödinger-Hirota equation, Optik, 172 (2018), 545-553. doi: 10.1016/j.ijleo.2018.06.111
    [9] M. Inc, Z. Korpinar, F. Tchier, On optical solitons of the fractional (3+ 1)-dimensional NLSE with conformable derivatives, Front. Phys., 8 (2020), 87.
    [10] Z. Korpinar, F. Tchier, M. Inc, et al. New soliton solutions of the fractional Regularized Long Wave Burger equation by means of conformable derivative, Results Phys., 14 (2019), 1-7.
    [11] Z. Korpinar, F. Tchier, M. Inc, et al. New solutions of the fractional Boussinesq-like equations by means of conformable derivatives, Results Phys., 13 (2019), 1-8.
    [12] A. Korkmaz, O. E. Hepson, K. Hosseini, et al. Sine-Gordon expansion method for exact solutions to conformable time fractional equations in RLW-class, J. King Saud Univ. Sci., 32 (2020), 567-574. doi: 10.1016/j.jksus.2018.08.013
    [13] A. Zafar, H. Rezazadeh, K. K. Ali, On finite series solutions of conformable time-fractional CahnAllen equation, Nonlinear Engineering, 9 (2020), 194-200. doi: 10.1515/nleng-2020-0008
    [14] K. K. Ali, C. Cattani, J. F. Gómez-Aguilar, et al. Analytical and numerical study of the DNA dynamics arising in oscillator-chain of Peyrard-Bishop model, Chaos, Soliton. Fract., 139 (2020), 1-9.
    [15] K. K. Ali, M. S. Osman, M. Abdel-Aty, New optical solitary wave solutions of Fokas-Lenells equation in optical fiber via Sine-Gordon expansion method, Alex. Eng. J., 59 (2020), 1191-1196. doi: 10.1016/j.aej.2020.01.037
    [16] M. S. Osman, K. K. Ali, Optical soliton solutions of perturbing time-fractional nonlinear Schrödinger equations, Optik, 209 (2020), 1-12.
    [17] K. K. Ali, A. R. Hadhoud, New solitary wave solutions of a highly dispersive physical model, Results Phys., 17 (2020), 1-5.
    [18] J. J. Yang, S. F. Tian, W. Q. Peng, et al. The N-coupled higher-order nonlinear Schrödinger equation: Riemann-Hilbert problem and multi-soliton solutions, Math. Method. Appl. Sci., 43 (2020), 2458-2472. doi: 10.1002/mma.6055
    [19] T. Y. Xu, S. F. Tian, W. Q. Peng, Riemann-Hilbert approach for multisoliton solutions of generalized coupled fourth-order nonlinear Schrödinger equations, Math. Method. Appl. Sci., 43 (2020), 865-880. doi: 10.1002/mma.5964
    [20] W. Q. Peng, S. F. Tian, X. B. Wang, et al. Riemann-Hilbert method and multi-soliton solutions for three-component coupled nonlinear Schrödinger equations, J. Geom. Phys., 146 (2019), 1-9.
    [21] S. F. Tian, Lie symmetry analysis, conservation laws and solitary wave solutions to a fourth-order nonlinear generalized Boussinesq water wave equation, Appl. Math. Lett., 100 (2020), 1-8.
    [22] L. D. Zhang, S. F. Tian, W. Q. Peng, et al. The dynamics of lump, lumpoff and rogue wave solutions of (2+ 1)-dimensional Hirota-Satsuma-Ito equations, E. Asian J. Appl. Math., 10 (2020), 243-255.
    [23] W. Q. Peng, S. F. Tian, T. T. Zhang, Initial Value Problem for the Pair Transition Coupled Nonlinear Schrödinger Equations via the Riemann-Hilbert Method, Complex Anal. Oper. Th., 14 (2020), 1- 15.
    [24] X. Wu, S. F. Tian, J. J. Yang, Inverse scattering transform and multi-solition solutions for the sextic nonlinear Schrödinger equation, arXiv:2005.00829, 2020.
    [25] L. Li, F. Yu, C. Duan, A generalized nonlocal Gross-Pitaevskii (NGP) equation with an arbitrary time-dependent linear potential, Appl. Math. Lett., 110 (2020), 1-8.
    [26] F. Yu, Inverse scattering solutions and dynamics for a nonlocal nonlinear Gross-Pitaevskii equation with PT-symmetric external potentials, Appl. Math. Lett., 92 (2019), 108-114. doi: 10.1016/j.aml.2019.01.010
    [27] F. Yu, R. Fan, Nonstandard bilinearization and interaction phenomenon for PT-symmetric coupled nonlocal nonlinear Schrödinger equations, Appl. Math. Lett., 103 (2020), 1-8.
    [28] H. Rezazadeh, J. Manafian, F. S. Khodadad, et al. Traveling wave solutions for density-dependent conformable fractional diffusion-reaction equation by the first integral method and the improved tan(1/2ϕ(ξ))-expansion method, Opt. Quant. Electron., 50 (2018), 1-15. doi: 10.1007/s11082-017-1266-2
    [29] A. Zerarka, S. Ouamane, S., A. Attaf, On the functional variable method for finding exact solutions to a class of wave equations, Appl. Math. Comput., 217 (2010), 2897-2904.
    [30] H. Aminikhaha, A. R. Sheikhanib, H. Rezazadeha, Exact solutions of some nonlinear systems of partial differential equations by using the functional variable method, Mathematica, 56 (2014), 103-116.
    [31] M. Eslami, M. Mirzazadeh,Functional variable method to study nonlinear evolution equations, Open Engineering, 3 (2013), 451-458.
    [32] H. Aminikhah, A. H. R. Sheikhani, H. Rezazadeh, Travelling wave solutions of nonlinear systems of PDEs by using the functional variable method, Bol. Soc. Paran. Mat., 34 (2016), 213-229. doi: 10.5269/bspm.v34i1.26193
    [33] A. Nazarzadeh, M. Eslami, M. Mirzazadeh, Exact solutions of some nonlinear partial differential equations using functional variable method, Pramana, 81 (2013), 225-236. doi: 10.1007/s12043-013-0565-9
    [34] H. Aminikhah, B. P. Ziabary, H. Rezazadeh, Exact traveling wave solutions of partial differential equations with power law nonlinearity, Nonlinear Engineering, 4 (2015), 181-188.
    [35] A. M. Wazwaz, Compactons, solitons and periodic solutions for some forms of nonlinear Klein- Gordon equations, Chaos, Soliton. Fract., 28 (2006), 1005-1013. doi: 10.1016/j.chaos.2005.08.145
    [36] M. Song, Z. Liu, E. Zerrad, et al. Singular soliton solution and bifurcation analysis of Klein-Gordon equation with power law nonlinearity, Front. Math. China, 8 (2013), 191-201. doi: 10.1007/s11464-012-0252-z
    [37] A. Biswas, A. H. Kara, A. H. Bokhari, et al. Solitons and conservation laws of Klein-Gordon equation with power law and log law nonlinearities, Nonlinear Dynam., 73 (2013), 2191-2196. doi: 10.1007/s11071-013-0933-5
    [38] R. Khalil, M. Al Horani, A. Yousef, et al. A new definition of fractional derivative, J. Comput. Appl. Math., 264 (2014), 65-70. doi: 10.1016/j.cam.2014.01.002
    [39] M. Eslami, H. Rezazadeh, The first integral method for Wu-Zhang system with conformable timefractional derivative, Calcolo, 53 (2016), 475-485. doi: 10.1007/s10092-015-0158-8
  • This article has been cited by:

    1. Behzad Ghanbari, Chun-Ku Kuo, Abundant wave solutions to two novel KP-like equations using an effective integration method, 2021, 96, 0031-8949, 045203, 10.1088/1402-4896/abde5a
    2. Jalil Manafian, Onur Alp Ilhan, Sherin Youns Mohyaldeen, Subhiya M. Zeynalli, Gurpreet Singh, New strategic method for fractional mitigating internet bottleneck with quadratic–cubic nonlinearity, 2021, 2008-1359, 10.1007/s40096-020-00373-2
    3. Behzad Ghanbari, Abundant exact solutions to a generalized nonlinear Schrödinger equation with local fractional derivative, 2021, 0170-4214, 10.1002/mma.7302
    4. Nehad Ali Shah, Mustafa Inc, An Analytical View of Fractional-Order Fisher’s Type Equations within Caputo Operator, 2021, 2021, 1563-5147, 1, 10.1155/2021/5516392
    5. M. Akher Chowdhury, M. Mamun Miah, H.M. Shahadat Ali, Yu-Ming Chu, M.S. Osman, An investigation to the nonlinear (2 + 1)-dimensional soliton equation for discovering explicit and periodic wave solutions, 2021, 23, 22113797, 104013, 10.1016/j.rinp.2021.104013
    6. Mostafa M. A. Khater, Behzad Ghanbari, On the solitary wave solutions and physical characterization of gas diffusion in a homogeneous medium via some efficient techniques, 2021, 136, 2190-5444, 10.1140/epjp/s13360-021-01457-1
    7. Kamsing Nonlaopon, Nikita Mann, Sachin Kumar, S. Rezaei, M.A. Abdou, A variety of closed-form solutions, Painlevé analysis, and solitary wave profiles for modified KdV–Zakharov–Kuznetsov equation in (3+1)-dimensions, 2022, 36, 22113797, 105394, 10.1016/j.rinp.2022.105394
    8. Lanre Akinyemi, Mehmet Şenol, Emad Az-Zo’bi, P. Veeresha, Udoh Akpan, Novel soliton solutions of four sets of generalized (2+1)-dimensional Boussinesq–Kadomtsev–Petviashvili-like equations, 2022, 36, 0217-9849, 10.1142/S0217984921505308
    9. N’Gbo N’Gbo, Yonghui Xia, Traveling Wave Solution of Bad and Good Modified Boussinesq Equations with Conformable Fractional-Order Derivative, 2022, 21, 1575-5460, 10.1007/s12346-021-00541-2
    10. Sachin Kumar, Amit Kumar, Dynamical behaviors and abundant optical soliton solutions of the cold bosonic atoms in a zig-zag optical lattice model using two integral schemes, 2022, 201, 03784754, 254, 10.1016/j.matcom.2022.05.009
    11. M. Tantawy, H. I. Abdel-Gawad, Complex physical phenomena of a generalized (3+1)-dimensional Yu-Toda-Sasa-Fukuyama equation in a two-layer heterogeneous liquid, 2022, 137, 2190-5444, 10.1140/epjp/s13360-022-03199-0
    12. Sachin Kumar, Brij Mohan, A novel and efficient method for obtaining Hirota’s bilinear form for the nonlinear evolution equation in (n+1) dimensions, 2022, 5, 26668181, 100274, 10.1016/j.padiff.2022.100274
    13. Yan Cao, Foroud Parvaneh, Sagr Alamri, Ali A. Rajhi, Ali E. Anqi, Some exact wave solutions to a variety of the Schrödinger equation with two nonlinearity laws and conformable derivative, 2021, 31, 22113797, 104929, 10.1016/j.rinp.2021.104929
    14. Sachin Kumar, Brij Mohan, Amit Kumar, Generalized fifth-order nonlinear evolution equation for the Sawada-Kotera, Lax, and Caudrey-Dodd-Gibbon equations in plasma physics: Painlevé analysis and multi-soliton solutions, 2022, 97, 0031-8949, 035201, 10.1088/1402-4896/ac4f9d
    15. Attia Rani, Aniqa Zulfiqar, Jamshad Ahmad, Qazi Mahmod Ul Hassan, New soliton wave structures of fractional Gilson-Pickering equation using tanh-coth method and their applications, 2021, 29, 22113797, 104724, 10.1016/j.rinp.2021.104724
    16. Siyuan Liu, S. Rezaei, S.A. Najati, Mohamed S. Mohamed, Novel wave solutions to a generalized third-order nonlinear Schrödinger’s equation, 2022, 37, 22113797, 105457, 10.1016/j.rinp.2022.105457
    17. Fan Sun, Propagation of solitons in optical fibers with generalized Kudryashov’s refractive index, 2021, 28, 22113797, 104644, 10.1016/j.rinp.2021.104644
    18. Mir Sajjad Hashemi, Hadi Rezazadeh, Hassan Almusawa, Hijaz Ahmad, A Lie group integrator to solve the hydromagnetic stagnation point flow of a second grade fluid over a stretching sheet, 2021, 6, 2473-6988, 13392, 10.3934/math.2021775
    19. Asim Zafar, M. Raheel, M. Asif, Kamyar Hosseini, Mohammad Mirzazadeh, Lanre Akinyemi, Some novel integration techniques to explore the conformable M-fractional Schrödinger-Hirota equation, 2022, 7, 24680133, 337, 10.1016/j.joes.2021.09.007
    20. Arzu Akbulut, S. M. Rayhanul Islam, Hadi Rezazadeh, Filiz Taşcan, Obtaining exact solutions of nonlinear partial differential equations via two different methods, 2022, 36, 0217-9792, 10.1142/S0217979222500412
    21. Nauman Raza, Ziyad A. Alhussain, Extraction of new bright and Kink soliton solutions related to Ginzburg Landau equation incorporating fractal effects, 2022, 54, 0306-8919, 10.1007/s11082-021-03402-z
    22. Guoan Xu, Jibin Li, Yi Zhang, Exact Solutions and Dynamical Behaviors of the Raman Soliton Model with Anti-Cubic Nonlinearity, 2022, 21, 1575-5460, 10.1007/s12346-022-00642-6
    23. Mustafa Inc, Talat Korpinar, Zeliha Korpinar, Spherical traveling wave hypothesis for geometric optical phase with speherical magnetic ferromagnetic system, 2023, 55, 0306-8919, 10.1007/s11082-022-04374-4
    24. Lanre Akinyemi, Mehmet Şenol, Udoh Akpan, Hadi Rezazadeh, An efficient computational technique for class of generalized Boussinesq shallow-water wave equations, 2022, 24680133, 10.1016/j.joes.2022.04.023
    25. Dipankar Kumar, Gour Chandra Paul, Aly R. Seadawy, M.T. Darvishi, A variety of novel closed‐form soliton solutions to the family of Boussinesq‐like equations with different types, 2022, 7, 24680133, 543, 10.1016/j.joes.2021.10.007
    26. Nauman Raza, Amna Batool, Mustafa Inc, New hyperbolic and rational form solutions of (2+1)-dimensional generalized Korteweg-de Vries model, 2022, 24680133, 10.1016/j.joes.2022.04.021
    27. Sayed Allamah Iqbal, Md. Golam Hafez, Yu-Ming Chu, Choonkil Park, DYNAMICAL ANALYSIS OF NONAUTONOMOUS RLC CIRCUIT WITH THE ABSENCE AND PRESENCE OF ATANGANA-BALEANU FRACTIONAL DERIVATIVE, 2022, 12, 2156-907X, 770, 10.11948/20210324
    28. Shoukry El-Ganaini, Sachin Kumar, Symbolic computation to construct new soliton solutions and dynamical behaviors of various wave structures for two different extended and generalized nonlinear Schrödinger equations using the new improved modified generalized sub-ODE proposed method, 2023, 208, 03784754, 28, 10.1016/j.matcom.2023.01.013
    29. Asıf Yokuş, Hatice Taskesen, Mohanad Alaloush, Betül Deniz Demirdaǧ, On the peakon solutions of some stochastic nonlinear evolution equations, 2021, 53, 0306-8919, 10.1007/s11082-021-03240-z
    30. Emad H. M. Zahran, Maha S. M. Shehata, S. M. Mirhosseini-Alizamini, Md Nur Alam, Lanre Akinyemi, Exact propagation of the isolated waves model described by the three coupled nonlinear Maccari’s system with complex structure, 2021, 35, 0217-9792, 2150193, 10.1142/S0217979221501939
    31. S. Kumbinarasaiah, K. R. Raghunatha, Mohammadreza Rezazadeh, Mustafa Inc, A solution of coupled nonlinear differential equations arising in a rotating micropolar nanofluid flow system by Hermite wavelet technique, 2022, 38, 0177-0667, 3351, 10.1007/s00366-021-01462-z
    32. Eric Tala-Tebue, Alper Korkmaz, Hadi Rezazadeh, Nauman Raza, New auxiliary equation approach to derive solutions of fractional resonant Schrödinger equation, 2021, 11, 1664-2368, 10.1007/s13324-021-00519-y
    33. Nur Hasan Mahmud Shahen, Md Habibul Bashar, Tasnim Tahseen, Sakhawat Hossain, Zine El Abiddine Fellah, Solitary and Rogue Wave Solutions to the Conformable Time Fractional Modified Kawahara Equation in Mathematical Physics, 2021, 2021, 1687-9139, 1, 10.1155/2021/6668092
    34. Melike Kaplan, Arzu Akbulut, Barbara Martinucci, A Mathematical Analysis of a Model Involving an Integrable Equation for Wave Packet Envelope, 2022, 2022, 2314-4785, 1, 10.1155/2022/3486780
    35. Shahid Ali, Ahmad Javid, EXPLICIT SOLUTIONS FOR THE CONFORMABLE REGULARIZED LONG WAVE BURGER'S EQUATION, 2023, 13, 2156-907X, 344, 10.11948/20220135
    36. Ziyad A. Alhussain, Nauman Raza, A. M. Nagy, New Optical Solitons with Variational Principle and Collective Variable Strategy for Cold Bosons in Zig-Zag Optical Lattices, 2022, 2022, 2314-4785, 1, 10.1155/2022/3229701
    37. Abdullahi Yusuf, Tukur A. Sulaiman, Mustafa Inc, Sayed Abdel-Khalek, K. H. Mahmoud, truncated optical soliton and their characteristics to a nonlinear equation governing the certain instabilities of modulated wave trains, 2021, 6, 2473-6988, 9207, 10.3934/math.2021535
    38. Hira Tariq, Maasoomah Sadaf, Ghazala Akram, Hadi Rezazadeh, Jamel Baili, Yu-Pei Lv, Hijaz Ahmad, Computational study for the conformable nonlinear Schrödinger equation with cubic–quintic–septic nonlinearities, 2021, 30, 22113797, 104839, 10.1016/j.rinp.2021.104839
    39. Lanre Akinyemi, Mehmet Şenol, Udoh Akpan, Kayode Oluwasegun, The optical soliton solutions of generalized coupled nonlinear Schrödinger-Korteweg-de Vries equations, 2021, 53, 0306-8919, 10.1007/s11082-021-03030-7
    40. J.E. Macías-Díaz, On the nonlinear wave transmission in a nonlinear continuous hyperbolic regime with Caputo-type temporal fractional derivative, 2021, 29, 22113797, 104808, 10.1016/j.rinp.2021.104808
    41. Adivi Sri Venkata Ravi Kanth, Kirubanandam Aruna, Kondooru Raghavendar, Natural transform decomposition method for the numerical treatment of the time fractional Burgers–Huxley equation , 2022, 0749-159X, 10.1002/num.22983
    42. Mustafa Inc, Talat Körpınar, Zeliha Körpınar, Dumitru Baleanu, Rıdvan Cem Demirkol, New approach for propagated light with optical solitons by optical fiber in pseudohyperbolic space ℍ02, 2021, 0170-4214, 10.1002/mma.7738
    43. Yan Cao, Hayder A. Dhahad, Hasanen M. Hussen, Sagr Alamri, Ali A. Rajhi, Ali E. Anqi, Kottakkaran Sooppy Nisar, Roshan Noor Mohamed, Classes of new analytical soliton solutions to some nonlinear evolution equations, 2021, 31, 22113797, 104947, 10.1016/j.rinp.2021.104947
    44. Behzad Ghanbari, Employing Hirota’s bilinear form to find novel lump waves solutions to an important nonlinear model in fluid mechanics, 2021, 29, 22113797, 104689, 10.1016/j.rinp.2021.104689
    45. F. Samsami Khodadad, S. M. Mirhosseini-Alizamini, B. Günay, Lanre Akinyemi, Hadi Rezazadeh, Mustafa Inc, Abundant optical solitons to the Sasa-Satsuma higher-order nonlinear Schrödinger equation, 2021, 53, 0306-8919, 10.1007/s11082-021-03338-4
    46. Syed Tahir Raza Rizvi, Kashif Ali, Ahmet Bekir, Badar Nawaz, M. Younis, Investigation on the Single and Multiple Dromions for Nonlinear Telegraph Equation in Electrical Transmission Line, 2022, 21, 1575-5460, 10.1007/s12346-021-00547-w
    47. Abdulla - Al - Mamun, Samsun Nahar Ananna, Tianqing An, Md. Asaduzzaman, Md. Munnu Miah, Solitary wave structures of a family of 3D fractional WBBM equation via the tanh–coth​ approach, 2022, 5, 26668181, 100237, 10.1016/j.padiff.2021.100237
    48. Arzu Akbulut, Mir Sajjad Hashemi, Hadi Rezazadeh, New conservation laws and exact solutions of coupled Burgers' equation, 2021, 1745-5030, 1, 10.1080/17455030.2021.1979691
    49. Fei Long, Shami A.M. Alsallami, S. Rezaei, Kamsing Nonlaopon, E.M. Khalil, New interaction solutions to the (2+1)-dimensional Hirota–Satsuma–Ito equation, 2022, 37, 22113797, 105475, 10.1016/j.rinp.2022.105475
    50. Mostafa M. A. Khater, Adil Jhangeer, Hadi Rezazadeh, Lanre Akinyemi, M. Ali Akbar, Mustafa Inc, Hijaz Ahmad, New kinds of analytical solitary wave solutions for ionic currents on microtubules equation via two different techniques, 2021, 53, 0306-8919, 10.1007/s11082-021-03267-2
    51. Sachin Kumar, Monika Niwas, New optical soliton solutions and a variety of dynamical wave profiles to the perturbed Chen–Lee–Liu equation in optical fibers, 2023, 55, 0306-8919, 10.1007/s11082-023-04647-6
    52. Manju Kashyap, S. Pratap Singh, Surbhi Gupta, Purnima Lala Mehta, Novel Solution for Time-fractional Klein-Gordon Equation with Different Applications, 2023, 8, 2455-7749, 537, 10.33889/IJMEMS.2023.8.3.030
    53. Y. Long Qiang, Neil G.R. Broderick, C. Martijn de Sterke, Analytic method for finding stationary solutions to generalized nonlinear Schrödinger equations, 2024, 462, 01672789, 134148, 10.1016/j.physd.2024.134148
    54. Kayode Oluwasegun, Samuel Ajibola, Udoh Akpan, Lanre Akinyemi, Mehmet Şenol, Investigation of oceanic wave solutions to a modified (2+1)-dimensional coupled nonlinear Schrödinger system, 2024, 0217-9849, 10.1142/S0217984925500368
    55. Xiaodong Yang, Yuchen Yang, Zhen Luo, Yuanbo Bi, A Survey of Schematic of Vacuum Quantum Structure: General Equation for EBSF (III), 2023, 07, 2424-9424, 10.1142/S2424942423500093
    56. Renfei Luo, Khalida Faisal, Hadi Rezazadeh, Hijaz Ahmad, Soliton solutions of optical pulse envelope
    with
    -time derivative, 2024, 56, 1572-817X, 10.1007/s11082-023-06146-0
    57. K. R. Raghunatha, S. Kumbinarasaiah, Mustafa Inc, Ali Akgül, A Study of Nanofluid Flow with Free Bio-Convection in 3D Nearby Stagnation Point by Hermite Wavelet Technique, 2024, 13, 2169-432X, 231, 10.1166/jon.2024.2146
    58. Zhoujin Cui, Tao Lu, Bo Chen, Ammar Alsinai, Traveling Wave Solutions of the Conformable Fractional Klein–Gordon Equation With Power Law Nonlinearity, 2024, 2024, 2314-4629, 10.1155/2024/8367957
    59. Kennedy C. Onyelowe, Farid Fazel Mojtahedi, Ali Golaghaei Darzi, Denise-Penelope N. Kontoni, Solving large deformation problems in geotechnical and geo-environmental engineering with the smoothed particle hydrodynamics: a state-of-the-art review of constitutive solutions, 2023, 82, 1866-6280, 10.1007/s12665-023-11079-8
    60. K. R. Raghunatha, Y. Vinod, Effects of heat transfer on MHD suction–injection model of viscous fluid flow through differential transformation and Bernoulli wavelet techniques, 2023, 52, 2688-4534, 4914, 10.1002/htj.22911
    61. Alphonse Houwe, Souleymanou Abbagari, Lanre Akinyemi, Youssoufa Saliou, Mibaile Justin, Serge Yamigno Doka, Modulation instability, bifurcation analysis and solitonic waves in nonlinear optical media with odd-order dispersion, 2023, 488, 03759601, 129134, 10.1016/j.physleta.2023.129134
    62. Emmanuel Yomba, Poonam Ramchandra Nair, New Coupled Optical Solitons to Birefringent Fibers for Complex Ginzburg–Landau Equations with Hamiltonian Perturbations and Kerr Law Nonlinearity, 2024, 12, 2227-7390, 3073, 10.3390/math12193073
    63. Emmanuel Yomba, Modulational instability and chirped modulated wave, chirped optical solitons for a generalized (3+1)-dimensional cubic-quintic medium with self-frequency shift and self-steepening nonlinear terms, 2024, 311, 00304026, 171939, 10.1016/j.ijleo.2024.171939
    64. Lanre Akinyemi, Francis Erebholo, Valerio Palamara, Kayode Oluwasegun, A Study of Nonlinear Riccati Equation and Its Applications to Multi-dimensional Nonlinear Evolution Equations, 2024, 23, 1575-5460, 10.1007/s12346-024-01137-2
    65. Abdul S. Awan, Sultan Hussain, Differential–anti-differential equations and their solutions, 2023, 1016-2526, 313, 10.52280/pujm.2023.55(7-8)04
    66. Md. Mamunur Roshid, Mahtab Uddin, Mohamed Abdalla, Md. Ahsan Ullah, Bifurcation analysis, phase portrait, and exploring exact traveling wave propagation of M-fractional (3 + 1) dimensional nonlinear equation in the fluid medium, 2025, 57, 1572-817X, 10.1007/s11082-025-08093-4
  • Reader Comments
  • © 2020 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(5655) PDF downloads(201) Cited by(66)

Figures and Tables

Figures(3)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog