Research article Special Issues

A survival tree for interval-censored failure time data

  • Interval-censored failure time data as a general type of survival data often arises in medicine and other applied fields. Survival tree is a flexible predictive method for survival data because no specific assumptions are required.

    Generalized Log-Rank Test have good power with parameters for interval-censored failure time data. We construct a special test statistic of Generalized Log-Rank Tests, and propose a new survival tree with hyper-parameter by combining the test statistic with Conditional Inference Framework for interval-censored failure time data. The effect of tuning hyper-parameter are discussed and hyper-parameter tuning allows the tree method to be more general and flexible. Thus the tree method either improve upon or remain competitive with existing tree method for interval-censored failure time data-ICtree, which is a special case of ours. An extensive simulation is executed to assess the predictive performance of our tree methods. Finally, the tree methods are applied to a tooth emergence data.

    Citation: Jia Chen, Renato De Leone. A survival tree for interval-censored failure time data[J]. AIMS Mathematics, 2022, 7(10): 18099-18126. doi: 10.3934/math.2022996

    Related Papers:

    [1] Shoude Huang, Xin-Jiang He . An analytical approximation formula for European option prices under a liquidity-adjusted non-affine stochastic volatility model. AIMS Mathematics, 2022, 7(6): 10364-10377. doi: 10.3934/math.2022577
    [2] Min-Ku Lee, Jeong-Hoon Kim . Pricing vanilla, barrier, and lookback options under two-scale stochastic volatility driven by two approximate fractional Brownian motions. AIMS Mathematics, 2024, 9(9): 25545-25576. doi: 10.3934/math.20241248
    [3] Shoude Huang, Xinjiang He, Shuqu Qian . An analytical approximation of European option prices under a hybrid GARCH-Vasicek model with double exponential jump in the bid-ask price economy. AIMS Mathematics, 2024, 9(5): 11833-11850. doi: 10.3934/math.2024579
    [4] Min-Ku Lee, Jeong-Hoon Kim . Closed-form approximate solutions for stop-loss and Russian options with multiscale stochastic volatility. AIMS Mathematics, 2023, 8(10): 25164-25194. doi: 10.3934/math.20231284
    [5] Weiwei Shen, Yan Zhang . Strong convergence of the Euler-Maruyama method for the stochastic volatility jump-diffusion model and financial applications. AIMS Mathematics, 2025, 10(5): 12032-12054. doi: 10.3934/math.2025545
    [6] Hijaz Ahmad, Muhammad Nawaz Khan, Imtiaz Ahmad, Mohamed Omri, Maged F. Alotaibi . A meshless method for numerical solutions of linear and nonlinear time-fractional Black-Scholes models. AIMS Mathematics, 2023, 8(8): 19677-19698. doi: 10.3934/math.20231003
    [7] Jiajia Zhao, Zuoliang Xu . Calibration of time-dependent volatility for European options under the fractional Vasicek model. AIMS Mathematics, 2022, 7(6): 11053-11069. doi: 10.3934/math.2022617
    [8] Yao Fu, Sisi Zhou, Xin Li, Feng Rao . Multi-assets Asian rainbow options pricing with stochastic interest rates obeying the Vasicek model. AIMS Mathematics, 2023, 8(5): 10685-10710. doi: 10.3934/math.2023542
    [9] Guiwen Lv, Ping Xu, Yanxue Zhang . Pricing of vulnerable options based on an uncertain CIR interest rate model. AIMS Mathematics, 2023, 8(5): 11113-11130. doi: 10.3934/math.2023563
    [10] Wuyuan Jiang, Zechao Miao, Jun Liu . Optimal investment and reinsurance for the insurer and reinsurer with the joint exponential utility. AIMS Mathematics, 2024, 9(12): 35181-35217. doi: 10.3934/math.20241672
  • Interval-censored failure time data as a general type of survival data often arises in medicine and other applied fields. Survival tree is a flexible predictive method for survival data because no specific assumptions are required.

    Generalized Log-Rank Test have good power with parameters for interval-censored failure time data. We construct a special test statistic of Generalized Log-Rank Tests, and propose a new survival tree with hyper-parameter by combining the test statistic with Conditional Inference Framework for interval-censored failure time data. The effect of tuning hyper-parameter are discussed and hyper-parameter tuning allows the tree method to be more general and flexible. Thus the tree method either improve upon or remain competitive with existing tree method for interval-censored failure time data-ICtree, which is a special case of ours. An extensive simulation is executed to assess the predictive performance of our tree methods. Finally, the tree methods are applied to a tooth emergence data.



    A great deal of attention has been paid to the use of mathematical tools in recent years to better describe phenomena in the world, such as nonlinear optics [1], network analysis [2], biomedical signal processing [3], mathematical modelling of human liver [4], medical imaging [5,6], neural networks [7], optimal control [8], a diffusive epidemic model [9], chemical signal concentration [10], attraction-repulsion [11], control theory [12], signal advancement [13], computational approaches in medicine [14], nanoscience [15], artificial intelligence [16], fractional mathematical model [17], wave propagation [18], and applied mathematical analysis [19]. These eras of research have attracted the attention of many scholars in both science and engineering disciplines and led to the development of many efficient numerical methods. For example, deep learning technique in [20], the Lyapunov functional approach in [21], convolutional neural network in [22], interpretive structural modeling in [23], variational methods in [24], fractal concepts in [25], the Monte Carlo analysis in [26], wave filters in [27,28]. Other methodologies include optical waveguides in [29], optimization methods in [30], high-frequency measurements in [31], quantitative evaluations in [32], carbon nanotubes computations in [33], microfluidics in [34,35], classification algorithms in [36]. For more applications, please refer to [37,38,39].

    The purpose of this article is to examine an eco-epidemiological model that simulates how diseases spread in a natural environment under the influence of several factors. Recently, these types of models have gained increasing attention due to the spread and epidemic of infectious diseases. For instance, the authors of [40] have considered the following eco-epidemiological model:

    dH1(t)dt=rH1(t)bH21(t)cH1(t)H2(t)α1H1(t)H3(t)e+H1(t)βH1(t)H2(t)a+H1(t),dH2(t)dt=βH1(t)H2(t)a+H1(t)α2H3(t)H2(t)d+H2(t)μH2(t),dH3(t)dt=α1c1H1(t)H3(t)e+H1(t)+c2α2H3(t)H2(t)d+H2(t)mH3(t), (1.1)

    where H1(t),H2(t) and H3(t) are three state variables that denote susceptible and infected prey and predator, respectively. In [41], the following prey-predator model with Atangana-Baleanu derivative model has been investigated:

    dH1(t)dt=H1(t)[1H1(t)β12H2(t)]+δH1(t)H3(t),dH2(t)dt=rH2(t)[1H2(t)β21H1(t)](1p)H2(t)H3(t)m1+(1p)H2(t),dH3(t)dt=H3(t)[m2+m3(1p)H2(t)m1+(1p)H2(t)]. (1.2)

    More details of the model can be found in [41].

    In [42], a three-species predator-prey model in the presence of prey social behavior given by

    dH1(t)dt=rH1(t)(1H1(t)k)βHα1(t)H2(t)aHα1(t)H3(t),dH2(t)dt=βHα1(t)H2(t)cH3(t)H2(t)mH2(t),dH3(t)dt=cH3(t)H2(t)+aHα1(t)H3(t)μH3(t), (1.3)

    has been studied.

    Research on infectious diseases has recently attracted a great deal of attention. For instance, the outbreak of vector-host diseases is modeled mathematically in [43] using a fractional model with Caputo-Fabrizio derivative. Other studies include the model for hepatitis B virus (HBV) and hepatitis C virus (HCV) co-infection in [44], prevalence of an infectious disease in a prey and predator system in [45], food chain model in [46], and hand-foot-mouth disease in [47]. During the past few decades, fractional calculus operators have become one of the effective tools for modeling various mathematical, physical and engineering problems. Probably the key reason for the increase in popularity of these operators is that they benefit from memory features as one of their main properties. Considering this valuable attribute of the operators, they are invaluable in biological modeling, since what happens in the present will be heavily influenced by what happened in the past with those variables.

    In this paper, we incorporate two fractional operators, the Atangana-Baleanu-Caputo and Caputo-Fabrizio-Caputo, into a novel biological system [48]. These kinds of operators have been employed in many studies so far. However, their use should be accompanied by caution and compliance with some necessary conditions as outlined in [49].

    Below is a breakdown of the remaining sections. First, some prerequisites are presented in the second part of this paper, including definitions and properties of fractional operators. The main system of the article is introduced in Section 3. A theoretical analysis of the model is presented in Section 4. The basic ideas for obtaining the numerical techniques for the model are presented in Section 5. In Section 6, we discuss the approximate solutions corresponding to the numerical methods used, as well as their implications. In the last section, we discuss several concluding remarks.

    In this section, first, it is necessary to have a brief overview of some useful preliminary theorems in the field of differential calculus of fractional order.

    Definition 2.1. The derivative and integral Caputo type (Cap) operators are respectively given by [50]

    CapDH(t)=1Γ(k)t0(tζ)m1ω(k)(ζ)dζ,k1<k,kN, (2.1)

    and

    CapIH(t)=1Γ()t0(tζ)1ω(ζ)dζ,0<<1. (2.2)

    Definition 2.2. The derivative and integral Atangana-Baleanu-Caputo (ABC) operators are respectively given by [48]

    ABCDH(t)=W()1t0M[1(tζ)]ω(ζ)dζ,(0,1), (2.3)
    ABCIH(t)=1W()H(t)+W()Γ()tt0(tμ)1ω(ζ)dζ, (2.4)

    where

    W()=1+Γ(),

    and M(ζ) is the Mittag-Leffler function given by

    M(t)=j=0tjΓ(1+j). (2.5)

    After applying the integral operator ABC defined in (2.4) to the differential operator (2.3), one concludes that

    ABCI(ABCDH(t))=H(t)H(0). (2.6)

    The Laplace transform corresponding to the ABC operator defined by (2.3) is obtained as

    L[ABCDH(t)]=W()1sL[H(t)]s1H(0)s+1. (2.7)

    Definition 2.3. The derivative and integral Caputo-Fabrizio-Caputo (CFC) operators are respectively given by [51]

    CFCDH(t)=Q()kt0dkω(ζ)dζkexp[n(tζ)]dζ,k1<k, (2.8)
    CFCIH(t)=2(1)(2)Q()H(t)+2(2)Q()t0ω(ζ)dζ, (2.9)

    where

    Q()=22. (2.10)

    The Laplace transform corresponding to the CFC operator defined by (2.8) is obtained as [41]

    L[CFCDH(t)]=sn+1L[H(t)]snH(0)sn1H(0)H(n)(0)s+(1s),n1<n. (2.11)

    The main focus of this paper is to study the mathematical description of interactions between the populations of susceptible and infected prey given by H1(t) and H2(t), respectively. Moreover, H3(t) denotes the predator population. The mathematical description of the interactions of these components is expressed by the following nonlinear system [52]:

    dH1(t)dt=aH1(t)1+κH3(t)dH1(t)bH1(t)(H1(t)+H2(t))βH1(t)H2(t),dH2(t)dt=βH1(t)H2(t)pH2(t)H3(t)δH2(t),dH3(t)dt=cpH2(t)H3(t)μH3(t). (3.1)

    In this model, it is assumed that the only population that is infected by infectious disease is that of the prey. Moreover, infected prey are consumed by predators, while susceptible prey do not fall under their diet. The parameters of the model are as follows: a represents the birth rate of the susceptible prey, d is used to explain the rate of natural death in susceptible prey, b stands for the density-dependent death rate based on intra-species competition, and β describes the contact rate between the susceptible and the infected prey. Moreover, p shows the attack rate on the infected prey, and the death rate of the infected prey is presented by δ, c demonstrates the conversion coefficient. Also, μ shows the corresponding natural rate of the death for predator populations, and finally, the parameter κ denotes the level of fear which drives anti-predator behavior of the prey [40]. A comprehensive explanation of the formation of this non-linear model can be found in [40].

    In this paper, we will apply two more recent definitions of fractional differential calculus in the model presented by (3.1). First, let us replace standard derivatives in the model with the ABC fractional derivative (2.3) to get the following fractional model:

    ABCDH1(t)=aH1(t)1+κH3(t)dH1(t)b(H12(t)+H1(t)H2(t))βH1(t)H2(t),ABCDH2(t)=βH1(t)H2(t)pH2(t)H3(t)δH2(t),ABCDH3(t)=cpH2(t)H3(t)μH3(t), (3.2)

    subject to initial conditions

    (H1(t=0),H2(t=0),H3(t=0))=(H1,0,H2,0,H3,0)0.

    Moreover, by applying the CFC fractional derivative (2.8) in the model, we arrive at the following fractional model:

    CFCDH1(t)=aH1(t)1+κH3(t)dH1(t)b(H12(t)+H1(t)H2(t))βH1(t)H2(t),CFCDH2(t)=βH1(t)H2(t)pH2(t)H3(t)δH2(t),CFCDH3(t)=cpH2(t)H3(t)μH3(t). (3.3)

    In order to find more analytical intuition of the model (3.2), some related mathematical analyses are collected in this section.

    In this model, the basic reproduction number R0 for system (3.2) is calculated as [52]

    R0=aβbδ. (4.1)

    The following positive equilibrium points can be calculated for the model (3.2).

    ● The trivial point of P0=(0,0,0).

    ● The axial point of P1=(adb,0,0). This point exists if we have a>d.

    ● The axial equilibrium point of P2=(δβ,aβbδdββ(b+β),0). This point exists if we have aβbδ>dβ.

    ● Other equilibrium points Pi=(H1,H2,H3) of the system can be evaluated by determining the positive solutions of the following nonlinear algebraic system:

    aH11+κH3dH1bH1(H1+H2)βH1H2=0,βH1H2pH2H3δH2=0,cpH2H3μH3=0. (4.2)

    The local stability for these equilibrium points Pi=(H1,H2,H3) can be explored using the Jacobian matrix as

    J(H1,H2,H3)=[aκH3+1db(2H1+H2)βH2bH1βH1aH1κ(κH3+1)2βH2βH1pH3δpH20cpH3cpH2μ]. (4.3)

    To this end, let us employ the ABC integral operator (2.4) on the system (3.2). Then, we get

    H1(t)H1(0)=1W()Q1(H(t))+W()Γ()t0(tζ)1Q1(H(ζ))dζ,H2(t)H2(0)=1W()Q2(H(t))+W()Γ()t0(tζ)1Q2(H(ζ))dζ,H3(t)H3(0)=1W()Q3(H(t))+W()Γ()t0(tζ)1Q3(H(ζ))dζ, (4.4)

    where H(t)=[H1(t),H2(t),H3(t)], and also we define

    Q1(H(t))=aH1(t)1+κH3(t)H1(t)dbH1(t)(H1(t)+H2(t))βH1(t)H2(t),Q2(H(t))=βH1(t)H2(t)pH2(t)H3(t)δH2(t),Q3(H(t))=cpH2(t)H3(t)μH3(t). (4.5)

    Define

    M(H(t))=[Q1(H(t)),Q2(H(t)),Q3(H(t))],

    and moreover

    H0=[H1(0),H2(0),H3(0)].

    Using these assumptions, Eq (4.4) can be rewritten as

    H(t)H0=1W()M(H(t))+W()Γ()t0(tζ)1M(H(ζ))dζ. (4.6)

    Then, from (4.6) along with H0(t)=H0, the following recursive structure is conceivable:

    Hn(t)H0=1W()M(Hn1(t))+W()Γ()t0(tζ)1M(Hn1(ζ))dζ. (4.7)

    Considering Eq (4.7), we will have

    Hn(t)Hn1(t)=1W()[M(Hn1(t))M(Hn2(t))] (4.8)
    +W()Γ()t0(tζ)1[M(Hn1(ζ))M(Hn2(ζ))]dζ. (4.9)

    In this position, we define

    ϱn(t)=Hn(t)Hn1(t).

    Then, it follows that

    Hn(t)=ni=0ϱi(t). (4.10)

    As a result, one gets

    ϱn(t)=Hn(t)Hn1(t),ϱn(t)=1W()[M(Hn1(t))M(Hn2(t))]+W()Γ()t0(tζ)1[M(Hn1(ζ))M(Hn2(ζ))]dζ. (4.11)

    Hence, we have

    ϱn(t)1W()M(Hn1(t))M(Hn2(t))+W()Γ()t0(tζ)1M(Hn1(ζ))M(Hn2(ζ))dζ. (4.12)

    Now, our main assumption will be that the nonlinear operator M has the Leibniz condition, so we can write

    ϱn(t)1W()LHn1(t)Hn2(t)+LW()Γ()t0(tζ)1Hn1(t)Hn2(t)dζ.

    Consequently, we derive the following inequality:

    ϱn(t)1W()Lϱn1(t)+LW()Γ()t0(tζ)1ϱn1(t)dζ.

    Further, replacing ϱn1(t), one arrives at

    ϱn(t)(1W()L+LtW()Γ(+1))2ϱn2(t).

    Also, it reads

    ϱn(t)(1W()L+LtW()Γ(+1))3ϱn3(t).

    And, finally, we obtain

    ϱn(t)(1W()L+LtW()Γ(+1))nϱ0(t)(1W()+tW()Γ(+1))nLnmaxt[0,T]H0(t). (4.13)

    Now, let us define

    H(t)=ni=0ϱi(t). (4.14)

    In addition, according to the H(t) structure, it holds that

    H(t)=Hn(t)+θn(t), (4.15)

    where θn(t)0 when n(t). Thus,

    H(t)Hn(t)=1W()M(H(t)θn(t))+W()Γ()t0(tζ)1M(H(ζ)μn(ζ))dζ. (4.16)

    Now, we can write

    H(t)H01W()M(H(t)θn(t))W()Γ()t0(tζ)1M(H(ζ)μn(ζ))dζ=θn(t)+1W()[M(H(t)θn(t))M(H(t))]W()Γ()t0(tζ)1[M(H(ζ)μn(ζ))M(H(ζ))]dζ. (4.17)

    After applying the norm of the above equation, we will have

    H(t)H0(t)1W()M(H(t))+W()Γ()t0(tζ)1M(H(ζ)dζθn(t)+1W()M(H(ζ)μn(ζ))M(H(ζ))+W()Γ()t0(tζ)1M(H(ζ)μn(ζ))M(H(ζ))dζθn(t)+1W()Lθn1(t)+tW()Γ(+1)Lθn1(t).

    For n, we have

    H(t)H0=1W()M(H(t))+W()Γ()t0(tζ)1M(H(ζ))dζ. (4.18)

    This will be the result for the existence of the solution.

    In order to prove the uniqueness of the solution, let us assume that H1(t) and H2(t) are two solutions to the problem. So, we have

    H1(t)H2(t)1W()LH1(t)H2(t)+LtW()Γ(+1)H1(t)H2(t)(1W()L+LtΘ(1+)Γ())H1(t)H2(t)(1W()L+LtΘ(1+)Γ())nH1(t)H2(t).

    So, if we have

    1W()L+LtΘ(1+)Γ()<1,

    then by taking n, we obtain

    (1W()L+LtΘ(1+)Γ())n0.

    Thus, H1(t)H2(t)=0 holds. Therefore, H1(t)=H2(t) results.

    Along with providing new differential operators in fractional calculus, the most important concern will always be the design of efficient approximate algorithms for solving those problems numerically. Thus, there is always a numerical method that needs to be developed for each new definition of an operator. There are advantages, limitations, and requirements associated with each of these numerical methods. Our objective in this section is to design two numerical techniques using the definition of the product integration rule (PI), as outlined in [53].

    To extract an efficient numerical technique for ABC fractional problems, we take the following fractional Cauchy problem:

    ABCDH(t)=N(t,H(t)). (5.1)

    Based on the application of the ABC fractional integral definition in Eq (2.4) on Eq (5.1), we derive the integral equation as follows:

    H(t)H(t0)=1W()N(t,H(t))+W()Γ()tt0(tζ)1N(ζ,H(ζ))dζ. (5.2)

    Setting t=tn=t0+nΔt in Eq (5.2) yields

    H(tn)=H(t0)+1W()N(tn,H(tn))+W()Γ()n1i=0ti+1ti(tnζ)1N(ζ,H(ζ))dζ. (5.3)

    Now, a linearized form of N(ζ,H(ζ)) is considered as follows:

    N(ζ,H(ζ))N(ti+1,Hi+1)+ζti+1Δt(N(ti+1,Hi+1)N(ti,Hi)),ζ[ti,ti+1], (5.4)

    where Hi=H(ti).

    Using (5.4) in (5.3), and also by doing some algebraic calculations, we obtain [54,55,56]:

    Hn=H0+ΔtW()(νnN(t0,H0)+ni=1ζniN(ti,Hi)),n1, (5.5)

    where

    σn=(1+n)+1n(1+n)Γ(+2),ζi={1Δt+1Γ(+2),i=0,(i1)+12i+1+(i+1)+1Γ(+2),i=1,2,,n1. (5.6)

    As a result of (5.5) and (5.6), one can effectively assess the approximate solution to the fractional system (5.1). In particular, to approximate the problem (3.2), we will have

    H1,n=H1,0+ΔtW()[σn(aH1,01+κH3,0H1,0dbH1,0(H1,0+H2,0)βH1,0H2,0)+ni=0ζni(aH1,i1+κH3,iH1,idbH1,i(H1,i+H2,i)βH1,iH2,i)],H2,n=H2,0+ΔtW()[σn(βH1,0H2,0pH2,0H3,0δH2,0)+ni=0ζni(βH1,iH2,ipH2,iH3,iδH2,i)],H3,n=H3,0+ΔtW()[σn(cpH2,0H3,0μH3,0)+ni=0ζni(cpH2,iH3,iμH3,i)]. (5.7)

    These resulting schemes have implicit structures which can be solved utilizing efficient techniques in solving systems of nonlinear algebraic equations like Newton's method.

    In this part, to extract a numerical scheme for CFC fractional problem (3.3), we study the following fractional system:

    CFCDH(t)=N(t,H(t)). (5.8)

    Utilizing the corresponding fractional integral operator (2.9) on both sides of (2.8) yields

    H(t)H(0)=1Q()N(t,H(t))+Q()t0N(ζ,H(ζ))dζ. (5.9)

    Taking t=tn+1 in (5.9), one has

    H(tn+1)H(0)=(2)(1)2N(tn,H(tn))+(2)2tn+10N(ζ,H(ζ))dζ, (5.10)

    and

    H(tn)H(0)=(2)(1)2N(tn1,H(tn1))+(2)2tn0N(ζ,H(ζ))dζ. (5.11)

    Inserting Eq (5.11) into Eq (5.10), we obtain

    H(tn+1)=H(tn)+(2)(1)2[N(tn,H(tn))N(tn1,H(tn1))]+(2)2tn+1tnN(ζ,H(ζ))dζ, (5.12)

    where

    tn+1tnN(ζ,H(ζ))dζ=3Δt2N(tn,Hn)Δt2N(tn1,Hn1). (5.13)

    Thus, we get

    Hn+1=Hn+[(2)(1)2+3Δt4(2)]N(tn,Hn)[(2)(1)2+Δt4(2)]N(tn1,Hn1). (5.14)

    Accordingly, the following iterative schemes are determined in order to approximate the problem (3.3) in the following manner [57]:

    H1,n+1=H1,n+[(2)(1)2+3Δt4(2)](aH1,n1+κH3,nH1,ndβH1,nH2,nbH1,n(H1,n+H2,n))[(2)(1)2+Δt4(2)](aH1,n1+κH3,nH1,n1dβH1,n1H2,n1bH1,n1(H1,n1+H2,n1)),H2,n+1=H2,n+[(2)(1)2+3Δt4(2)](βH1,nH2,npH2,nH3,nδH2,n)[(2)(1)2+Δt4(2)](βH1,n1H2,n1pH2,n1H3,n1δH2,n1),H3,n+1=H3,n+[(2)(1)2+3Δt4(2)](cpH2,nH3,nμH3,n)[(2)(1)2+Δt4(2)](cpH2,n1H3,n1μH3,n1). (5.15)

    The results of scheme model (3.3) will be obtained using these explicit iterative schemes.

    A description of the numerical properties of the system is presented in this section. To this end, it is imperative to examine the equilibrium points for the model in more detail.

    As mentioned earlier, the positive equilibrium point of

    Pi=(H1,H2,H3)

    for the model is a positive solution for the following system:

    aH11+κH3dH1bH1(H1+H2)βH1H2=0,βH1H2pH2H3δH2=0,cpH2H3μH3=0. (6.1)

    From the last equation of (6.1), we immediately conclude that

    H2=μcp. (6.2)

    Considering this result in the second equation of the system, it reads

    H1=pH3+δβ. (6.3)

    Taking these results into account in the first equation of the system along with some simplifications, a quadratic equation for H3 is obtained as

    C2H32+C1H3+C0=0, (6.4)

    where

    C2=bcκp2,C1=bcδκp+βcdκp+bβκμ+bcp2+β2κμ,C0=aβcp+bδcp+dβcp+bμβ+β2μ.

    The performed numerical simulations in this paper are based on the following parameters:

    a=0.5, d=0.1, b=0.1, p=1, δ=0.2, c=0.8, μ=0.3, β=0.5, κ=0.4. (6.5)

    For these particular choices, the equilibrium point for the model will be determined as follows:

    (H1,H2,H3)=(1.120356776,0.375,0.3601783881). (6.6)

    In what will come later in this section, the level of sensitivity of the model to the existing parameters will be checked. These results can be considered a confirmation of the theoretical results related to the model.

    Figures 1 and 2 demonstrate the model's sensitivity to the changes of the parameter in the two approximate methods of the article. Convergence of the model to equilibrium point (H1,H2,H3) is evident in these graphs.

    Figure 1.  The results of schemes (5.5) and (5.6) obtained from different values of .
    Figure 2.  The results of scheme (5.15) obtained from different values of .

    It seems that in Figure 1, for smaller values of , the speed of convergence to the balanced point of the system occurs faster, and with its increase, the results will be more unstable and accompanied by fluctuating behavior.

    It seems that in Figure 2, the oscillatory behavior increases in the model, and as a result the speed of convergence is very slow.

    The fear parameter (κ) is one of the most important components defined in the model, and it strongly influences the type of system behavior. In [52], a detailed analysis of the effect of this parameter on the results is presented and can be considered a good benchmark for comparing our results. Figures 3 and 4 demonstrate the model's sensitivity with respect to the changes of parameter κ in the two approximate methods of the article.

    Figure 3.  The results of schemes (5.5) and (5.6) obtained from different values of κ together with =0.98.
    Figure 4.  The results of scheme (5.15) obtained from different values of κ together with =0.98.

    In this case, the positive equilibrium point is (pH3+δβ,μcp,H3) where H3 is determined from

    0.08κH32+(0.146κ+0.08)H30.054=0. (6.7)

    In Figures 3 and 4, for κ=0, with no fear factor, the equilibrium point of the system is obtained

    (H1,H2,H3)=(1.75,0.375,0.675),

    whose Jacobian matrix is

    J(H1,H2,H3)=[74021200316038027500], (6.8)

    with the following eigenvalues:

    [0.090464663450.04226766828+0.6244525470i0.042267668280.6244525470i].

    This is a clear proof of the stability of this equilibrium point.

    Also, for κ=0.4, the equilibrium point of the system is obtained

    (H1,H2,H3)=(1.120356778,0.375,0.360178389),

    whose Jacobian matrix is

    J(H1,H2,H3)=[3649+1692411080+52024147120039241200314002600241(27+13241)23160380173100+132411000], (6.9)

    with the following eigenvalues:

    [0.01004360203+0.4818151018i0.010043602030.4818151018i0.09194847354].

    With the increase of the real negative parts of the eigenvalues, the instability of the system is gradually increased, which is also clearly evident in the graphs. Finally, for κ=1, we have a unique positive equilibrium

    (H1,H2,H3)=(0.843122550,0.375,0.221561275),

    whose Jacobian matrix is

    J(H1,H2,H3)=[2029+13170891320+401708929120031708920077608017089(33+17089)23160380113100+170891000], (6.10)

    with the following eigenvalues:

    [0.004096458172+0.4025677279i0.0040964581720.4025677279i0.09250517127].

    So, a clear proof of the instability of this equilibrium point is observed.

    The numerical results obtained in this case are completely consistent with the numerical properties reported in [52].

    Figures 5 and 6 demonstrate the model's sensitivity with respect to the changes of parameter β in the two approximate methods of the article. In these diagrams, it can be seen that as β increases, the equilibrium type changes from an interior point to a planar point. For these situations, the infected predator population is on the way to extinction. For example, for β=1.2, we have a unique positive equilibrium

    (H1,H2,H3)=(0.1666666667,0.2948717949,0),
    Figure 5.  The results of schemes (5.5) and (5.6) obtained from different values of β together with =0.98.
    Figure 6.  The results of scheme (5.15) obtained from different values of β together with =0.98.

    whose Jacobian matrix is

    J(H1,H2,H3)=[0.01666666670.21666666670.033333333340.35384615390.00.294871794900.00.0641025641], (6.11)

    with the following eigenvalues:

    [0.008333333350+0.2767620318i0.0083333333500.2767620318i0.06410256410].

    Figures 7 and 8 demonstrate the model's sensitivity with respect to the changes of the attack rate on the infected prey in the two approximate methods of the article. The important thing that can be seen from the results is that with the increase of the value for the parameter, the type of equilibrium point in the problem changes completely.

    Figure 7.  The results of schemes (5.5) and (5.6) obtained from different values of p together with =0.98.
    Figure 8.  The results of scheme (5.15) obtained from different values of p together with =0.98.

    The models in eco-epidemiology are computational tools that describe ecology and epidemiology problems in a meaningful way. The use of novel mathematical definitions in modeling eco-epidemiological scenarios can be very helpful and lead to significant results in real-world problems. The aim of this paper is to study a nonlinear predator-prey system where the prey growth rate is reduced due to anti-predator behavior. This paper employs two new definitions in fractional calculus called the ABC and CFC fractional derivatives. These two definitions are useful tools that can be used for solving the model. Our research results may be of great value to scholars in the future, when they want to apply our employed techniques to model real problems related to the epidemic and control it more efficiently.

    The authors extend their appreciation to Prince Sattam bin Abdulaziz University for funding this research work through the project number (PSAU/2023/01/23035).

    The authors declare that they have no competing interests.



    [1] D. Chen, J. Sun, K. E. Peace, Interval-censored time-to-event data: Methods and Applications, 1 Eds., Florida: Chapman and Hall/CRC, 2013. https://doi.org/10.13140/2.1.3493.2169
    [2] D. R. Cox, Regression models and life-tables, J. R. Sta. Soc. B, 34 (1972), 187–220. http://dx.doi.org/10.1111/j.2517-6161.1972.tb00899.x doi: 10.1111/j.2517-6161.1972.tb00899.x
    [3] D. M. Finkelstein, A proportional hazards model for interval-censored failure time data, Biometrics, 42 (1986), 845–854. http://dx.doi.org/10.2307/2530698 doi: 10.2307/2530698
    [4] J. Sun, The statistical analysis of interval-censored failure time data, 1 Eds., New York: Springer Press, 2006. http://dx.doi.org/10.1007/0-387-37119-2
    [5] L. Breiman, J. H. Friedman, R. A. Olshen, C. J. Stone, Classification and regression trees, Biometrics, 40 (1984), 358. http://dx.doi.org/10.2307/2530946 doi: 10.2307/2530946
    [6] I. Bou-Hamad, D. Larocque, H. Ben-Ameur, A review of survival trees, Stat. Surv., 5 (2011), 44–71. http://dx.doi.org/10.1214/09-SS047 doi: 10.1214/09-SS047
    [7] L. Gordon, R. A. Olshen, Tree-structured Survival Analysis, Cancer Treat. Rep. 69 (1985), 1065–1069. https://pubmed.ncbi.nlm.nih.gov/4042086/
    [8] M. R. Segal, Regression trees for censored data, Biometrics, 44 (1988), 35–47. http://www.jstor.org/stable/2531894
    [9] A. Ciampi, S. A. Hogg, S. McKinney, J. Thiffault, RECPAM: A computer program for recursive partition and amalgamation for censored survival data and other situations frequently occurring in biostatistics.Ⅰ. Methods and program features, Comput. Meth. Prog. Bio., 26 (1988), 239–256. http://dx.doi.org/10.1016/0169-2607(88)90004-1 doi: 10.1016/0169-2607(88)90004-1
    [10] A. Ciampi, S. A. Hogg, S. McKinney, J. Thiffault, RECPAM: A computer program for recursive partition and amalgamation for censored survival data and other situations frequently occurring in biostatistics.Ⅱ. Applications to data on small cell carcinoma of the lung (SCCL), Comput. Meth. Prog. Bio., 30 (1989), 283–296. http://dx.doi.org/10.1016/0169-2607(89)90099-0 doi: 10.1016/0169-2607(89)90099-0
    [11] G. V. Kass, An exploratory technique for investigating large quantities of categorical data, Appl. Stat., 29 (1980), 119–127. http://dx.doi.org/10.2307/2986296 doi: 10.2307/2986296
    [12] T. Hothorn, K. Hornik, A. Zeileis, Unbiased recursive partitioning: A conditional inference framework, J. Comput. Graph. Stat., 15 (2006), 651–674. https://doi.org/10.1198/106186006X133933 doi: 10.1198/106186006X133933
    [13] H. Strasser, C. Weber, On the asymptotic theory of permutation statistics, Math. Methods Stat., 8 (1999), 220–250. http://epub.wu.ac.at/102/1/document.pdf
    [14] W. Fu, J. S. Simonoff, Survival trees for left-truncated and right-censored data with application to time-varying covariate data, Biostatistics, 18 (2017), 352–369. http://dx.doi.org/10.1093/biostatistics/kxw047 doi: 10.1093/biostatistics/kxw047
    [15] L. Breiman, Random forests, Mach. Learn., 45 (2001), 5–32. http://dx.doi.org/10.1023/A:1010933404324 doi: 10.1023/A:1010933404324
    [16] H. Ishwaran, U. B. Kogalur, E. H. Blackstone, M. S. Lauer, Random survival forests, Ann. Appl. Stat., 2 (2008), 841–860. http://dx.doi.org/10.1214/08-AOAS169 doi: 10.1214/08-AOAS169
    [17] J. A. Steingrimsson, L. Diao, R. L. Strawderman, Censoring unbiased regression trees and ensembles, J. Am. Stat. Assoc., 114 (2019), 370–383. http://dx.doi.org/10.1080/01621459.2017.140777 doi: 10.1080/01621459.2017.140777
    [18] Y. M. Yin, S. J. Anderson, Tree-structured modeling for interval-censored survival data, Joint Statistical Meetings, (2002), 3877–3882. https://www.researchgate.net/publication/265027875
    [19] W. Fu, J. S. Simonoff, Survival trees for interval-censored survival data, Stat. Med., 36 (2017), 4831–4842. http://dx.doi.org/10.1002/sim.7450 doi: 10.1002/sim.7450
    [20] W. Pan, Rank invariant tests with left truncated and interval censored data, J. Stat. Comput. Sim., 61 (1998), 163–174. http://dx.doi.org/10.1080/00949659808811907 doi: 10.1080/00949659808811907
    [21] H. Y. Cho, N. P. Jewell, M. R. Kosorok, Interval censored recursive forests, J. Comput. Graph. Stat., (2021), in press. https://doi.org/10.1080/10618600.2021.1987253
    [22] J. G. Sun, Q. Zhao, X. Q. Zhao, Generalized log-rank tests for interval-censored failure time data, Scand. J. Stats., 32 (2005), 49–57. http://dx.doi.org/https://doi.org/10.1002/bimj.200710419 doi: 10.1002/bimj.200710419
    [23] J. Vanobbergen, L. Martens, E. Lesaffre, D. Declerck, The Signal-Tandmobiel project a longitudinal intervention health promotion study in Flanders (Belgium): baseline and first year results, Eur. J. Paediatr. Dent., 2 (2000), 87–96. http://hdl.handle.net/1854/LU-127864
    [24] C. Anderson-Bergman, An efficient implementation of the EMICM algorithm for the interval censored NPMLE, J. Comput. Graph. Stat., 26 (2017), 463–467. http://dx.doi.org/10.1080/10618600.2016.1208616 doi: 10.1080/10618600.2016.1208616
    [25] C. Anderson-Bergman, icenReg: Regression models for interval censored data. Version 2.0.15., (2020). https://cran.r-project.org/web/packages/icenReg/index.html.
    [26] Y. Benoist, P. Foulon, F. Labourie, On Convergence of convex minorant algorithms for distribution estimation with interval-censored data, J. Comput. Graph. Stat., 1 (1992), 129–140. http://dx.doi.org/10.1080/10618600.1992.10477009 doi: 10.1080/10618600.1992.10477009
    [27] G. Gomez, R. O. Pique, A new class of rank tests for interval-censored data, Harvard University Biostatistics Working Paper Series, (2008), unpublished work. http://biostats.bepress.com/harvardbiostat/paper93
    [28] P. Wei, A comparison of some two-sample tests with interval censored data, J. Nonparametr. Stat., 12 (1999), 133–146. https://doi.org/10.1080/10485259908832801 doi: 10.1080/10485259908832801
    [29] D. Krstajic, L. J. Buturovic, D. E. Leahy, S. Thomas, Cross-validation pitfalls when selecting and assessing regression and classification models, J. Cheminformatics, 6 (2014), 1–15. http://www.jcheminf.com/content/6/1/10
    [30] T. R. Tsai, S. H. Wu, Y. Shen, Model selection methods for reliability assessment based on interval-censored field failure samples, Int. J. Reliab. Qual. Sa., 27 (2020), 1–19. http://dx.doi.org/10.1142/S0218539320500187 doi: 10.1142/S0218539320500187
    [31] E. Graf, C. Schmoor, W. Sauerbrei, M. Schumacher, Assessment and comparison of prognostic classification schemes for survival data, Stat. Med., 18 (1999), 2529–2545. https://doi.org/10.1002/(SICI)1097-0258(19990915/30)18:17/18<2529::AID-SIM274>3.0.CO; 2-5 doi: 10.1002/(SICI)1097-0258(19990915/30)18:17/18<2529::AID-SIM274>3.0.CO;2-5
    [32] S. Tsouprou, Measures of discrimination and predictive accuracy for interval censored survival data, MA. D. thesis, University Leiden, 2015. https://www.universiteitleiden.nl/binaries/content/assets/science/mi/scripties/mastertsouprou.pdf
    [33] T. Hothorn, B. Lausen, A. Benner, M. Radespiel-Tro¨ger, Bagging survival trees, Stat.Med., 23 (2004), 77–91. https://doi.org/10.1002/sim.1593 doi: 10.1002/sim.1593
    [34] A. Komárek, bayesSurv: Bayesian survival regression with flexible error and random effects distributions, R package version3.3, 2020. https://cran.r-project.org/web/packages/bayesSurv/index.html
    [35] E. Lesaffre, A. Komárek, D. Declerck, An overview of methods for interval-censored data with an emphasis on applications in dentistry, Stat. Methods Med. Res., 14 (2005), 539–552. https://doi.org/10.1191/0962280205sm417oa doi: 10.1191/0962280205sm417oa
    [36] W. C. Yao, H. Frydman, J. S. Simonoff, An ensemble method for interval-censored time-to-event data, Biostatistics, 22 (2021), 198–213. http://dx.doi.org/10.1093/biostatistics/kxz025 doi: 10.1093/biostatistics/kxz025
  • This article has been cited by:

    1. Sha Lin, Xin-Jiang He, Analytically pricing variance and volatility swaps with stochastic volatility, stochastic equilibrium level and regime switching, 2023, 217, 09574174, 119592, 10.1016/j.eswa.2023.119592
    2. Shubin Ou, Guohe Deng, Petr H. Jek, Extremum Options Pricing of Two Assets under a Double Nonaffine Stochastic Volatility Model, 2023, 2023, 1563-5147, 1, 10.1155/2023/1165629
    3. Xu Chen, Xin-Xin Gong, Youfa Sun, Siu-Long Lei, A Preconditioned Policy–Krylov Subspace Method for Fractional Partial Integro-Differential HJB Equations in Finance, 2024, 8, 2504-3110, 316, 10.3390/fractalfract8060316
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2174) PDF downloads(90) Cited by(0)

Figures and Tables

Figures(8)  /  Tables(11)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog