The indirect effect of predation due to fear has proven to have adverse effects on the reproductive rate of the prey population. Here, we present a deterministic two-species predator-prey model with prey herd behavior, mutual interference, and the effect of fear. We give conditions for the existence of some local and global bifurcations at the coexistence equilibrium. We also show that fear can induce extinction of the prey population from a coexistence zone in finite time. Our numerical simulations reveal that varying the strength of fear of predators with suitable choice of parameters can stabilize and destabilize the coexistence equilibrium solutions of the model. Further, we discuss the outcome of introducing a constant harvesting effort to the predator population in terms of changing the dynamics of the system, in particular, from finite time extinction to stable coexistence.
Citation: Kwadwo Antwi-Fordjour, Rana D. Parshad, Hannah E. Thompson, Stephanie B. Westaway. Fear-driven extinction and (de)stabilization in a predator-prey model incorporating prey herd behavior and mutual interference[J]. AIMS Mathematics, 2023, 8(2): 3353-3377. doi: 10.3934/math.2023173
[1] | Raweerote Suparatulatorn, Wongthawat Liawrungrueang, Thanasak Mouktonglang, Watcharaporn Cholamjiak . An algorithm for variational inclusion problems including quasi-nonexpansive mappings with applications in osteoporosis prediction. AIMS Mathematics, 2025, 10(2): 2541-2561. doi: 10.3934/math.2025118 |
[2] | Salman khan, Muhammad Naeem, Muhammad Qiyas . Deep intelligent predictive model for the identification of diabetes. AIMS Mathematics, 2023, 8(7): 16446-16462. doi: 10.3934/math.2023840 |
[3] | Federico Divina, Miguel García-Torres, Francisco Gómez-Vela, Domingo S. Rodriguez-Baena . A stacking ensemble learning for Iberian pigs activity prediction: a time series forecasting approach. AIMS Mathematics, 2024, 9(5): 13358-13384. doi: 10.3934/math.2024652 |
[4] | Hend Khalid Alkahtani, Nuha Alruwais, Asma Alshuhail, Nadhem NEMRI, Achraf Ben Miled, Ahmed Mahmud . Election-based optimization algorithm with deep learning-enabled false data injection attack detection in cyber-physical systems. AIMS Mathematics, 2024, 9(6): 15076-15096. doi: 10.3934/math.2024731 |
[5] | Turki Althaqafi . Mathematical modeling of a Hybrid Mutated Tunicate Swarm Algorithm for Feature Selection and Global Optimization. AIMS Mathematics, 2024, 9(9): 24336-24358. doi: 10.3934/math.20241184 |
[6] | Olfa Hrizi, Karim Gasmi, Abdulrahman Alyami, Adel Alkhalil, Ibrahim Alrashdi, Ali Alqazzaz, Lassaad Ben Ammar, Manel Mrabet, Alameen E.M. Abdalrahman, Samia Yahyaoui . Federated and ensemble learning framework with optimized feature selection for heart disease detection. AIMS Mathematics, 2025, 10(3): 7290-7318. doi: 10.3934/math.2025334 |
[7] | Mohammed Abdul Kader, Muhammad Ahsan Ullah, Md Saiful Islam, Fermín Ferriol Sánchez, Md Abdus Samad, Imran Ashraf . A real-time air-writing model to recognize Bengali characters. AIMS Mathematics, 2024, 9(3): 6668-6698. doi: 10.3934/math.2024325 |
[8] | Jiawen Ye, Lei Dai, Haiying Wang . Enhancing sewage flow prediction using an integrated improved SSA-CNN-Transformer-BiLSTM model. AIMS Mathematics, 2024, 9(10): 26916-26950. doi: 10.3934/math.20241310 |
[9] | Senyuan Yang, Bo Yu, Jianxin Pan, Wuliang Yin, Hua Wang, Kai Yang, Qingtai Xiao . Application of a hybrid nonlinear algorithm driven by machine learning and feature importance identification for temperature control prediction of the bath smelting process. AIMS Mathematics, 2025, 10(6): 13104-13129. doi: 10.3934/math.2025588 |
[10] | Bao Ma, Yanrong Ma, Jun Ma . Adaptive robust AdaBoost-based kernel-free quadratic surface support vector machine with Universum data. AIMS Mathematics, 2025, 10(4): 8036-8065. doi: 10.3934/math.2025369 |
The indirect effect of predation due to fear has proven to have adverse effects on the reproductive rate of the prey population. Here, we present a deterministic two-species predator-prey model with prey herd behavior, mutual interference, and the effect of fear. We give conditions for the existence of some local and global bifurcations at the coexistence equilibrium. We also show that fear can induce extinction of the prey population from a coexistence zone in finite time. Our numerical simulations reveal that varying the strength of fear of predators with suitable choice of parameters can stabilize and destabilize the coexistence equilibrium solutions of the model. Further, we discuss the outcome of introducing a constant harvesting effort to the predator population in terms of changing the dynamics of the system, in particular, from finite time extinction to stable coexistence.
Error-correcting codes have been a widely studied topic for the past six decades. Among all linear codes, cyclic codes have received significant attention. Boucher et al. [9] generalized the concept of cyclic codes over finite fields to skew cyclic codes. Siap et al. [25] extended their results to skew cyclic codes of arbitrary length. For the last twenty years, scholars have focused on error-correcting codes over finite rings.
There exist a host of studies on skew cyclic codes and double skew cyclic codes over finite commutative rings. Boucher et al. [10] and Jitman et al. [17] considered skew constacyclic codes over Galois rings and finite chain rings, respectively. Abualrub et al. [1] built θ-cyclic codes over F2+vF2. Gao [13] investigated the algebraic structure of skew cyclic codes over Fp+vFp. Gursoy et al. [15] accomplished the construction of skew cyclic codes over Fq+vFq. The algebraic properties of skew cyclic codes over the finite semi-local ring Fpm+vFpm were studied by M. Ashraf [3]. Shi et al. [22,23] established skew cyclic codes over Fq+vFq+v2Fq and Fq+vFq+⋯+vm−1Fq. Bagheri et al. [6] studied skew cyclic codes of length ps over Fpm+uFpm and obtained some torsion codes of skew cyclic codes. Shi et al. [24] proved the structure of skew cyclic codes over a finite non-chain ring. Recently, Prakash [21] studied the structure of skew cyclic codes over Fq[u,v,w]/⟨u2−1,v2−1,w2−1,uv−vu,vw−wv,wu−uw⟩. Gao et al. [14] studied weight distribution of double cyclic codes over Galois rings. Aydogdu et al. [4] characterized the algebraic structure of double skew cyclic codes over Fq.
Since Wood [26] proved that the finite Frobenius rings can serve as the alphabets of coding theory, many papers on cyclic codes over matrix rings have been published (see [2,7,11,16,18,19,20]). However, there are few papers investigating skew and double skew cyclic codes over matrix rings. In this study, we use the F4-cyclic algebra given in [5] to build the algebraic structure of skew cyclic codes over M2(F2). Additionally, we discuss the dual codes of skew cyclic codes and double skew cyclic codes over M2(F2).
This article is organized as follows: Section 2 provides some basic facts, and considers the algebraic structure of skew cyclic codes over M2(F2). We prove that a skew cyclic code C with a polynomial of minimum degree d(x) is a free submodule generated by d(x). We discuss Euclidean and Hermitian dual codes of θ-cyclic codes in Section 3. In Section 4, the spanning sets of double skew cyclic codes over M2(F2) are obtained, and Section 5 concludes this paper.
Let R be a finite ring with identity 1≠0. A left (resp. right) R-module M is denoted by RM (resp. MR). The socle of a module M is defined as the sum of its minimal submodules, denoted by Soc(M). The ring R is called a Frobenius ring if Soc(RR) (resp. Soc(RR)) is a principal left (resp. right) ideal. The ring R is called a local ring if R has a unique left (resp. right) maximal ideal (or equivalently, if R/rad(R) is a division ring). A ring R is called a left (resp. right) chain ring if the set of all left (resp. right) ideals of R is linearly ordered under the set inclusion. Lemma 2.1 describes the equivalence conditions between chain rings, principal ideal rings and local rings (cf. [12,Theorem 2.1]).
Lemma 2.1. For any finite ring R, the following conditions are equivalent:
(i) R is a local principal ideal ring;
(ii) R is a local ring and the unique maximal ideal M of R is principal;
(iii) R is a chain ring whose ideal are ⟨ri⟩, 0≤i≤N(r), where N(r) is the nilpotency index of r.
Moreover, if R is a finite chain ring with the unique maximal ideal ⟨r⟩ and the nilpotency index of r is z, then the cardinality of ⟨ri⟩ is |R/⟨r⟩|z−i for i=0,1,⋯,z−1.
We denote the 2×2 matrix ring over finite field F2 by M2(F2). By [5], we have M2(F2) is isomorphic to the F4-cyclic algebra R=F4⊕eF4 with e2=1 under the map δ,
δ:(0110)↦e,δ:(0111)↦ω, |
where F4=F2[ω] and ω2+ω+1=0. Note that (e+1)2=0, then e+1 is a nilpotent element of order 2. The multiplication in R is given by re=eσ(r) for any r∈R, where σ(r)=r2 is the Frobenius map on F4 and the addition is usual.
The set of the unit elements of R is {1,ω,1+ω,e,eω,e(1+ω)}. It is easy to know that the ring R has the unique maximal ideal ⟨e+1⟩. Since the n×n matrix ring Mn(R) over a Frobenius ring R is also Frobenius, then R is a finite local Frobenius ring.
Define a map θ:R→R by θ(a+eb)=σ(a)+eσ(b), a,b∈F4. One can verify that θ is an automorphism of R with order 2. The set F4,θ={0,1,e,1+e} is the fixed commutative subring of R by θ. Define the skew polynomial ring
R[x,θ]={rnxn+rn−1xn−1+⋯+r1x+r0|ri∈R,n∈N} |
with the usual polynomial addition, and the multiplication is defined by the rule r1xi⋅r2xj=r1θi(r2)xi+j, i,j∈N. Then for every a+eb∈R,
xi(a+eb)={(a+eb)xi,if i is even,(a2+eb2)xi,if i is odd. |
Note that R[x,θ] is non-commutative for multiplication, therefore, the submodules we discussed in this paper are always left. It should be noted also that R[x,θ] is not a unique factorization ring, for instance, x2=x⋅x=ex⋅ex, x3=x⋅x⋅x=x⋅ex⋅ex. In addition, the right division can be defined.
Lemma 2.2. Let f(x), g(x)∈R[x,θ], where the leading coefficient of g(x) is invertible. Then there exist unique q(x), r(x)∈R[x,θ] such that
f(x)=q(x)g(x)+r(x), |
where r(x)=0 or deg(r(x))<deg(g(x)). The polynomials q(x) and r(x) are called the right quotient and right remainder, respectively. The polynomial g(x) is called a right divisor of f(x) if g(x)|f(x).
Proof. The proof is similar to that of Lemma 2.3 of [13].
Proposition 2.3. The center Z(R[x,θ]) of R[x,θ] is F4,θ[x2].
Proof. This proof is similar to that of [13,Theorem 1]. We give the proof briefly. Since |⟨θ⟩|=2, then x2i⋅r=(θ2)i(r)x2i=rx2i with any r∈R. Thus x2i∈Z(R[x,θ]). It implies that f(x)=∑sj=0rjx2j∈Z(R[x,θ]), where rj∈F4,θ. Conversely, for any fz∈Z(R[x,θ]) and r∈R, if rfz=fzr and xfz=fzx, then the coefficients of fz are all in F4,θ and fz∈R[x2,θ]. Therefore fz∈F4,θ[x2].
Corollary 2.4. We have that xn+1∈Z(R[x,θ]) if and only if n is even.
Let Rn be the set of all n-tuples over R. Then a code C of length n over R is a nonempty subset of Rn. If C is a left (resp. right) R-submodule of Rn, then C is called a left (resp. right) linear code of length n over R. Every element c=(c0,c1,⋯,cn−1) in C is called a codeword.
Define the Gray map φ(a+eb)=(b,a+b) from R to F24 following the method in [8]. This map φ is a linear bijection and can be extended to a map from Rn onto F2n4 by concatenating the images of each component. For any element a+eb∈R, Lee weight of a+eb is defined as
wL(a+eb)=wHam(b)+wHam(a+b), |
where wHam(∗) stands for Hamming weight over finite fields. If x=(x0,x1,⋯,xn−1)∈Rn, then Lee weight of x is defined as
wL(x)=wL(x0)+wL(x1)+⋯+wL(xn−1). |
If C is a linear code of length n over R, then Hamming and Lee distance of C are defined as dHam=min{wHam(x)|x∈C} and dL=min{wL(x)|x∈C}, respectively. Analogously to [19,Theorem 7], we get the following result. It is a proposition of the image of the linear code C over R under the Gray map φ.
Proposition 2.5. Let C be a linear code over R of length n with size M and minimum Lee distance dL. Then φ(C) is a linear code over F4 of length 2n with size M and minimum Hamming distance dHam.
We discuss the algebraic structure of skew cyclic codes over R below. Let n be a positive integer. The set Rn=R[x,θ]/⟨xn−1⟩ is a ring if n is even. When n is odd, the set Rn is a left R[x,θ]-module under the multiplication defined by
f1(x)(f2(x)+(xn−1))=f1(x)f2(x)+(xn−1). |
Denote by T the standard shift operator on a linear code C, i.e., T(c)=(cn−1,c0,⋯,cn−2) for any codeword c=(c0,c1,⋯,cn−1)∈C. A linear code C over R is cyclic if any cyclic shift of a codeword c∈C is also a codeword, i.e., T(c)∈C. A linear code over R is called quasi-cyclic of index ℓ (or ℓ-quasi-cyclic) if and only if it is invariant under Tℓ. If ℓ=1, then it is a cyclic code. A linear code C of length n is called a skew cyclic code if and only if
θ(c)=(θ(cn−1),θ(c0),⋯,θ(cn−2))∈C, |
for any codeword c=(c0,c1,⋯,cn−1)∈C.
In a set of polynomials, a polynomial is called the polynomial of minimum degree if and only if it is not a polynomial of lower degree by removing any of its terms. Let d(x)=xn−m+∑n−m−1i=0dixi be a monic right divisor of xn−1. Then a m×n generator matrix G of the skew cyclic code C=⟨d(x)⟩ is given by
G=(d0d1⋯dn−m−110⋯000θ(d0)⋯θ(dn−m−2)θ(dn−m−1)1⋯0000⋯θ2(dn−m−3)θ2(dn−m−2)θ2(dn−m−1)⋯00⋮⋮⋯⋮⋮⋮⋯⋮⋮00⋯θm−2(d0)θm−2(d1)θm−2(d3)⋯1000⋯0θm−1(d0)θm−1(d1)⋯θm−1(dn−m−1)1). |
Proposition 2.6 shows that skew cyclic codes with a polynomial of minimum degree over R are free codes. Proposition 2.9 gives a sufficient and necessary condition for a skew cyclic code over R to become a cyclic code. Propositions 2.7 and 2.8 describe the relationship between skew cyclic codes of length n and cyclic codes, quasi-cyclic codes, respectively.
Proposition 2.6. Let n be a positive integer and C be a skew cyclic code of length n over R with a polynomial of minimum degree d(x), where the leading coefficient of d(x) is a unit. Then C is a free R[x,θ]-submodule of Rn such that C=⟨d(x)⟩, where d(x) is a right divisor of xn−1. Moreover, the code C has a basis B={d(x),xd(x),⋯,xn−deg(d(x))−1d(x)} and the number of codewords in C is |R|n−deg(d(x)).
Proof. By Lemma 2.2, any polynomial in C is divisible by d(x). It implies that d(x)|xn−1 and C=⟨d(x)⟩. For the second statement, let xn−1=q(x)d(x) for some q(x)∈R[x,θ]. Since the leading coefficient of d(x) is a unit, then the leading coefficient of q(x) is also invertible. Let m be the degree of q(x), then the degree of d(x) is n−m. Let q(x)=∑mi=0qixi, where qm is invertible. Therefore ∑mi=0qixid(x)=0 in Rn. It follows that xjd(x) with j≥m can be linearly presented by the elements of the set B={d(x),xd(x),⋯,xm−1d(x)}.
Let ∑m−1i=0ai⋅xid(x)=0, where ai∈R, i=0,1,⋯,m−1. Thus a(x)d(x)=0, where a(x)=∑m−1i=0aixi. The polynomial a(x)d(x) can be represented to a(x)d(x)=ζ(x)(xn−1) for some ζ(x)∈R[x,θ]. The degree of a(x)d(x) is n−1, while the degree of ζ(x)(xn−1) is greater than or equal to n if ζ(x)≠0. This is a contradiction. Therefore, we have ζ(x)=a(x)=0, i.e. ai=0 for i=0,1,⋯,m−1. The set B={d(x),xd(x),⋯,xm−1d(x)} is R-linearly independent. Consequently B is a basis of C and |C|=|R|n−deg(d(x)). This completes the proof.
Proposition 2.7. If C is a skew cyclic code of odd length over R, then C is a cyclic code over R.
Proof. Let n be odd and C be a skew cyclic code of length n over R. There exist two integers s,t such that 2s+nt=1. Thus, we have 2s=1−nt. If c(x)=∑n−1i=0cixi is any codeword in C, then
x2sc(x)=x1−ntc(x)=n−1∑i=0cixi+1−nt. |
Since xn=1, then
x2sc(x)=n−1∑i=0xi+1=xc(x)∈C. |
It follows that (cn−1,c0,⋯,cn−2)∈C for any codeword (c0,c1,⋯,cn−1) in C.
Proposition 2.8. If C is a skew cyclic code of even length over R, then C is a quasi-cyclic code of index 2.
Proof. Let C be a skew cyclic code of length 2t over R and c=(c0,0,c0,1,c1,0,⋯,ct−1,0,ct−1,1)∈C. Since θ(c)∈C and θ2=1, it follows that θ2(c)=(ct−1,0,ct−1,1,c0,0,c0,1,⋯,ct−2,0,ct−2,1)∈C. By the definition of quasi-cyclic codes, the code C is a 2-quasi-cyclic code of length 2t.
Proposition 2.9. Let C be a skew cyclic code generated by d(x) of even length n over R, where d(x) is a monic right divisor of xn−1. Then C is a cyclic code over R if and only if d(x) is fixed by θ.
Proof. Let d(x)=xl+dl−1xl−1+⋯+d1x+d0, where θ(di)=di, i=0,1,2,⋯,l−1. Then xd(x)=d(x)x∈C. It follows that the code C=⟨d(x)⟩ is cyclic over R.
Conversely, if C is a cyclic code of even length n over R, then C is a left ideal of Rn and an ideal of R[x]/⟨xn−1⟩. Therefore, d(x)x is a codeword in C. Since C is linear, we have d(x)x−xd(x)∈C. It implies that ∑l−1i=0(di−θ(di))xi+1 is a left multiple of d(x) such that d(x)x−xd(x)=rd(x) with r∈R. Note that the constant term of d(x)x−xd(x) is 0, then d(x)x−xd(x) must be 0. It shows that θ(di)=di, i=0,1,⋯,l−1. The proof is done.
Example 2.10. There are two examples:
(1) Let C be a skew cyclic code of length 4 over R generated by the following matrix,
(ee+1100ee+11). |
The generated polynomial of C is d(x)=x2+(e+1)x+e. Note that d(x) is a commutative right divisor of x4−1, and all coefficients of d(x) are fixed by θ. By Proposition 2.9, the code C is cyclic.
(2) Let C1 be a skew cyclic code of length 4 generated by the following matrix,
(ω1000ω+11000ω1). |
The generated polynomial of C1 is d1(x)=x+ω, and it is a right divisor of x4−1. The coefficients of d1(x) are not all fixed by θ. By Propositions 2.8 and 2.9, the code C1 is not cyclic but 2-quasi-cyclic.
This section investigates the dual codes of skew cyclic codes over the ring R. For any x=(x0,x1,⋯,xn−1) and y=(y0,y1,⋯,yn−1)∈Rn, the Euclidean inner product on Rn is defined by ⟨x,y⟩=∑n−1i=0xiyi. If the order of the automorphism θ is 2, then the Hermitian inner product of any x,y∈Rn is defined by ⟨x,y⟩H=∑n−1i=0xiθ(yi).
The elements x,y∈Rn are called Euclidean or Hermitian orthogonal if ⟨x,y⟩=0 or ⟨x,y⟩H=0, respectively. Let C be a skew cyclic code over R. Then its Euclidean dual code C⊥ is defined as C⊥={y∈Rn|⟨y,x⟩=0 for all x∈C }. The Hermitian dual code C⊥H of C is defined as C⊥H={z∈Rn|⟨z,x⟩H=0 for all x∈C }. A code C is called Euclidean or Hermitian self-dual if C=C⊥ or C=C⊥H, respectively.
Jitman et al. [17] described the algebraic structure of skew constacyclic codes over finite chain rings, and provided the generators of Euclidean and Hermitian dual codes of such codes. The ring R=F4⊕eF4 can be alternatively represented as F4⊕uF4 with u2=(e+1)2=0. This indicates that R is a finite chain ring under the change of basis.
In this section, Proposition 3.2 delineates a sufficient and necessary condition for Hermitian dual code of a skew cyclic code with length n over R. Proposition 3.3 is the self-dual skew condition of Hermitian dual code. Propositions 3.2 and 3.3 can be seen as corollaries of Theorems 3.7 and 3.8 of [17], respectively. The main work of this section is to depict the structure of Euclidean dual codes of skew cyclic codes over R. Proposition 3.6 illustrates that the Euclidean dual codes of skew cyclic codes of even length generated by a monic polynomial over R are also free and gives their generator polynomials.
By Lemmas 3.1 and 3.5 of [17], we acquire the following statement.
Lemma 3.1. Let C be a linear code of length n over R.
(i) For any integer n, the code C is a skew cyclic code if and only if C⊥ is skew cyclic.
(ii) For even integer n, the code C is a skew cyclic code if and only if C⊥H is skew cyclic.
From [17], the ring automorphism ρ on R[x,θ] is given as
ρ(t∑i=0rixi)=t∑i=0θ(ri)xi. |
By Theorems 3.7 and 3.8 of [17], we have the following results.
Proposition 3.2. Let n be even. If d(x) is a monic right divisor of xn−1 and ˆd(x)=xn−1d(x), then C is a free skew cyclic code generated by d(x) if and only if C⊥H is a skew cyclic code generated by
d⊥(x)=ρ(xdeg(ˆd(x))ϕ(ˆd(x))), |
where ϕ:R[x,θ]→R[x,θ]S−1 is the anti-monomorphism of rings defined by
ϕ(t∑i=0rixi)=t∑i=0x−iri |
with S={xi|i∈N}.
Proposition 3.3. Let n=2k. If d(x)=xk+∑k−1i=0dixi is a right divisor of xn−1, then the skew cyclic code C=⟨d(x)⟩ is a Hermitian self-dual code if and only if
(xk+k−1∑i=0dixi)(θ−k−1(d−10))+k−1∑i=1θi−k−1((d−10dk−i)xi+xk)=xn−1. |
This is called the self-dual skew condition.
Next, we discuss the algebraic properties of Euclidean dual codes of skew cyclic codes over R.
Lemma 3.4. Let d(x),q(x)∈R[x,θ], where the leading coefficient of q(x) is a unit. If d(x)q(x)∈Z(R[x,θ]) is a monic polynomial, then d(x)q(x)=q(x)d(x).
Proof. It is easy to prove by q(x)(d(x)q(x))=(d(x)q(x))q(x) and Lemma 2.2.
Lemma 3.5. Let n be even and xn−1=q(x)d(x), where the leading coefficient of q(x) is a unit. If C=⟨d(x)⟩ is a skew cyclic code of length n over R, then c(x)∈Rn is in C if and only if c(x)q(x)=0 in Rn.
Proof. Let c(x)∈C. Then c(x)=r(x)d(x) for some r(x)∈R[x,θ]. Since xn−1=q(x)d(x)∈Z(R[x,θ]), we have q(x)d(x)=d(x)q(x). Hence c(x)q(x)=r(x)d(x)q(x)=r(x)q(x)d(x)=0 in Rn.
Conversely, if c(x)q(x)=0 in Rn for some c(x)∈R[x,θ], then there exists r(x)∈R[x,θ] such that c(x)q(x)=r(x)(xn−1)=r(x)q(x)d(x)=r(x)d(x)q(x), i.e., c(x)=r(x)d(x)∈C.
Proposition 3.6. Let C=⟨d(x)⟩ be a skew cyclic code of even length n over R, where d(x) is a monic right divisor of xn−1. Let xn−1=q(x)d(x), q(x)=xm+∑m−1j=0qjxj and d(x)=xn−m+∑n−m−1i=0dixi. Then C⊥ is generated by the polynomial q∗(x)=1+∑mi=0θi(qm−i)xi.
Proof. Let c(x)=∑n−1i=0cixi be a codeword in C. Then c(x)q(x)=0 in Rn by Lemma 3.5. The coefficients of xm,xm+1,⋯,xn−1 are all zeros in c(x)q(x). Therefore, we have
c0+c1θ(qm−1)+c2θ2(qm−2)+⋯cmθm(q0)=0,c1+c2θ2(qm−1)+c3θ3(qm−2)+⋯cm+1θm+1(q0)=0,c2+c3θ3(qm−1)+c4θ4(qm−2)+⋯cm+2θm+2(q0)=0,⋮cn−m−1+cn−mθn−m(qm−1)+cn−m−1θn−m(qm−2)+⋯cn−1θn−1(q0)=0. |
We set
Q∗=(1θ(qm−1)θ2(qm−2)…θm−1(q1)θm(q0)…001θ2(qm−1)…θm−1(q2)θm(q1)…0001…θm−1(q3)θm(q2)…0⋮⋮⋮⋮⋮⋮⋮⋮000…1θn−m(qm−1)…θn−1(q0)). |
It is easy to know that each row vector of Q∗ is orthogonal to every codeword in C. Thus, all the row vectors of Q∗ are in C⊥. Since C is a Frobenius ring and deg(d(x))=n−m, then |C||C⊥|=|R|n, |C|=|R|m and |C⊥|=|R|n−m. Note that the rows of Q∗ are linearly independent. Consequently, the cardinality of the row spanning of Q∗ is |R|n−m. It follows that Q∗ is a generator matrix of C⊥. Observe that Q∗ is a circular matrix, then the corresponding polynomial q∗(x)=1+∑mi=0θi(qm−i)xi is a generator polynomial of C⊥. The proof is done.
Example 3.7. Let C1=⟨d1(x)⟩ be a skew cyclic code of length 4 over R. With the same notation as in Example 2.10, by Proposition 3.6, we have that the generated polynomial of dual code C⊥1 of C1 is q∗1(x)=ωx3+x2+ωx. The generated matrix of C⊥1 is
(0ω1ω). |
Both double cyclic codes and double skew cyclic codes are good linear codes because of their specific closure properties under the standard shift and addition operations. Double cyclic codes can be extended to double skew cyclic codes. We investigate double skew cyclic codes over R in this section.
A code C of length n is called double skew linear code if any codeword in C is partitioned into two blocks of lengths n1 and n2 such that the set of the first blocks of n1 symbols and the set of second blocks of n2 symbols form skew linear codes of lengths n1 and n2 over R, respectively.
For any r∈R and c=(u0,u1,⋯,un1−1,v0,v1,⋯,vn2−1)∈Rn1+n2, we define
rc=(ru0,ru1,⋯,run1−1,rv0,rv1,⋯,rvn2−1). |
It implies that Rn1+n2 is an R-module under the multiplication and a double skew linear code is an R-submodule of Rn1+n2.
A double linear code C of length n=n1+n2 over R is called double cyclic code if
(u0,u1,⋯,un1−1,v0,v1,⋯,vn2−1)∈C |
implies
(un1−1,u0,⋯,un1−2,vn2−1,v0,⋯,vn2−2)∈C. |
A double skew linear code C of length n1+n2 over R is called a double skew cyclic code if and only if
(θ(un1−1),θ(u0),⋯,θ(un1−2),θ(vn2−1),θ(v0),⋯,θ(vn2−2))∈C |
for any codeword
c=(u0,u1,⋯,un1−1,v0,v1,⋯,vn2−1)∈C. |
We denote the codeword c=(u0,u1,⋯,un1−1,v0,v1,⋯,vn2−1)∈C by c(x)=(c1(x)|c2(x)), where
c1(x)=n1−1∑i=0uixi∈R[x,θ]/⟨xn1−1⟩ |
and
c2(x)=n2−1∑j=0vjxj∈R[x,θ]/⟨xn2−1⟩. |
It gives a bijection between Rn1+n2 and Rn1,n2=R[x,θ]/⟨xn1−1⟩×R[x,θ]/⟨xn2−1⟩. Define the multiplication of any r(x)∈R[x,θ] and (c1(x)|c2(x))∈Rn1,n2 as
r(x)(c1(x)|c2(x))=(r(x)c1(x)|r(x)c2(x)). |
Under the multiplication, we have that Rn1,n2 is a left R[x,θ]-module. If c(x)=(c1(x)|c2(x)) is a codeword in C, then xc(x) is the standard skew cyclic shift of c.
Propositions 4.1 to 4.3 depict the structural properties of double skew cyclic codes of length n1+n2 over R.
Proposition 4.1. A code C is a double skew cyclic code over R if and only if C is a R[x,θ]-submodule of Rn1,n2.
Proof. Let C be a double skew cyclic code and c=(c1(x)|c2(x))∈C. Notice that xc(x)∈C and C is linear, then r(x)c(x)∈C for any r(x)∈R[x,θ]. Therefore C is a left R[x,θ]-submodule of the left module Rn1,n2. The converse is trivial.
Proposition 4.2. A double skew cyclic code of length n1+n2 is a double cyclic code if n1 and n2 are both odd.
Proof. The proof follows by Proposition 2.7.
Proposition 4.3. Let xn1−1=q1(x)d1(x) and xn2−1=q2(x)d2(x), where d1(x) and d2(x) are two monic polynomials. If C1=⟨d1(x)⟩ and C2=⟨d2(x)⟩ are two free skew cyclic codes of length n1 and n2 over R, respectively, then the code C generated by d(x)=(d1(x)|d2(x)) is a double skew cyclic code. Furthermore, A={d(x),xd(x),⋯,xl−1d(x)} is a spanning set of C, where l=deg(q(x)) and q(x)=lcm{q1(x),q2(x)}=∑li=0qixi.
Proof. By the definition of double skew cyclic codes, it is clear that C=⟨d(x)⟩ is a double skew cyclic code. The first statement follows. For the second statement, since q(x) is the least common multiple of q1(x) and q2(x), we have q(x)d(x)=q(x)(d1(x)|d2(x))=0 and xjd(x) with j≥l can be linearly represented by the elements of the set A={d(x),xd(x),⋯,xl−1d(x)}. Now let c(x)∈C be any non-zero codeword in C. Then c(x)=a(x)d(x) for some a(x)∈R[x,θ]. If deg(a(x))≥l, then a(x)=p(x)q(x)+r(x) by Lemma 2.2, where r(x)=0 or deg(r(x))<deg(q(x)). It follows that c(x)=a(x)d(x)=r(x)d(x). Since r(x)=0 or deg(r(x))≤l−1, then any non-zero codeword in C is a linear combination of the elements in A. The proof is done.
In this paper, we examine the structure of skew cyclic codes over M2(F2). All skew cyclic codes of length n over M2(F2) can be identified as left R[x,θ]-submodules of left module Rn=R[x,θ]/⟨xn−1⟩. Our results show that a skew cyclic code C with a polynomial of minimum degree d(x) is a free submodule ⟨d(x)⟩. We prove that a skew cyclic code of odd or even length over M2(F2) is a cyclic or 2-quasi-cyclic code. We give the self-dual skew condition of the Hermitian dual code and the generator of Euclidean dual code of a skew cyclic code, respectively. Furthermore, a spanning set of a double skew cyclic code over M2(F2) is obtained.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
This work was supported by the Natural Science Foundation of Shandong Province, China (Grant number ZR2019BA011) and by the National Natural Science Foundation of China (Grant number 11401285).
The authors declare no conflicts of interest.
[1] | A. J. Lotka, Elements of physical biology, Williams and Wilkins, Baltimore. Reprinted as Elements of mathematical biology, Dover, New York, 1925. |
[2] | V. Volterra, Variazioni e fluttuazioni del numero d'individui in specie animali conviventi, Mem. R. Accad. Naz. Lincei, 2 (1926), 31–113. |
[3] | G. F. Gause, The struggle for existence, Williams & Wilkins, Baltimore, Maryland, USA, 1934. |
[4] |
J. R. Beddington, Mutual interference between parasites or predators and its effect on searching efficiency, J. Animal Ecol., 44 (1975), 331–340. https://doi.org/10.2307/3866 doi: 10.2307/3866
![]() |
[5] |
D. L. DeAngelis, R. A. Goldstein, R. V. ONeill, A model for trophic interaction, Ecology, 56 (1975), 881–892. https://doi.org/10.2307/1936298 doi: 10.2307/1936298
![]() |
[6] |
C. S. Holling, The components of predation as revealed by a study of small mammal predation of the European pine sawfly, Canad. Entomol., 91 (1959), 293–320. https://doi.org/10.4039/Ent91293-5 doi: 10.4039/Ent91293-5
![]() |
[7] |
P. A. Abrams, Why ratio dependence is (still) a dad model of predation, Biol. Rev., 90 (2015), 794–814. https://doi.org/10.1111/brv.12134 doi: 10.1111/brv.12134
![]() |
[8] |
M. A. Aziz-Alaoui, The study of a Leslie-Gower type tri-tropic population models, Chaos, Solitons & Fractals, 14 (2002), 1275–1293. https://doi.org/10.1016/S0960-0779(02)00079-6 doi: 10.1016/S0960-0779(02)00079-6
![]() |
[9] |
C. S. Holling, The functional response of predators to prey density and its role on mimicry and population regulations, Memoirs of the Entomological Society of Canada, 97 (1965), 5–60. https://doi.org/10.4039/entm9745fv doi: 10.4039/entm9745fv
![]() |
[10] |
K. Antwi-Fordjour, R. D. Parshad, M. A. Beauregard, Dynamics of a predator-prey model with generalized functional response and mutual interference, Math. Biosci., 360 (2020), 108407. https://doi.org/10.1016/j.mbs.2020.108407 doi: 10.1016/j.mbs.2020.108407
![]() |
[11] |
R. K. Upadhyay, V. Rai, Why chaos is rarely observed in natural populations, Chaos, Solitons & Fractals, 8 (1997), 1933–1939. https://doi.org/10.1016/S0960-0779(97)00076-3 doi: 10.1016/S0960-0779(97)00076-3
![]() |
[12] |
A. V. Banerjee, A simple model of herd behavior, Q. J. Econ., 107 (1992), 797–817. https://doi.org/10.2307/2118364 doi: 10.2307/2118364
![]() |
[13] |
L. Rook, An Economic Psychological Approach to Herd Behavior, J. Econ. Issues, 40 (2006), 75–95. https://doi.org/10.1080/00213624.2006.11506883 doi: 10.1080/00213624.2006.11506883
![]() |
[14] |
R. M. Raafat, N. Chater, C. Frith, Herding in Humans, Trends Cogn. Sci., 13 (2009), 420–428. https://doi.org/10.1016/j.tics.2009.08.002 doi: 10.1016/j.tics.2009.08.002
![]() |
[15] | T. B. Veblen, The Theory of the Leisure Class, New York: Dover, 1899. |
[16] | C. W. Cobb, P. H. Douglas, A theory of production, The American Economic Review, 18 (1928), 139–165. |
[17] |
V. Ajraldi, M. Pittavino, E. Venturino, Modeling herd behavior in population systems, Nonlinear Anal. Real World Appl., 12 (2011), 2319–2338. https://doi.org/10.1016/j.nonrwa.2011.02.002 doi: 10.1016/j.nonrwa.2011.02.002
![]() |
[18] |
K. Vilches, E. Gonzalez-Olivares, A Rojas-Palma, Prey herd behavior by a generic non-differentiable functional response, Math. Model. Nat. Phenom., 13 (2018), 26. https://doi.org/10.1051/mmnp/2018038 doi: 10.1051/mmnp/2018038
![]() |
[19] |
M. L. Rosenzweig, Paradox of enrichment: Destabilization of exploitation ecosystem in ecological time, Science, 171 (1971), 385–387. https://doi.org/10.1126/science.171.3969.385 doi: 10.1126/science.171.3969.385
![]() |
[20] |
P. A. Braza, Predator–prey dynamics with square root functional responses, Nonlinear Anal.-Real, 13 (2012), 1837–1843. https://doi.org/10.1016/j.nonrwa.2011.12.014 doi: 10.1016/j.nonrwa.2011.12.014
![]() |
[21] |
B. W. Kooi, E. Venturino, Ecoepidemic predator-prey model with feeding satiation, prey heard behavior and abandoned infected prey, Math. Biosci., 274 (2016), 58–72. https://doi.org/10.1016/j.mbs.2016.02.003 doi: 10.1016/j.mbs.2016.02.003
![]() |
[22] |
R. D. Parshad, K. Antwi-Fordjour, M. E. Takyi, Some Novel results in two species competition, SIAM J. Appl. Math., 81 (2021), 1847–1869. https://doi.org/10.1137/20M1387274 doi: 10.1137/20M1387274
![]() |
[23] |
A. Ardito, P Ricciardi, Lyapunov functions for a generalized Gauss-type model, J. Math. Biol., 33 (1995), 816–828. https://doi.org/10.1007/BF00187283 doi: 10.1007/BF00187283
![]() |
[24] |
E. Saez, I Szanto, A polycycle and limit cycles in a non-differentiable predator-prey model, Proc. Indian Acad. Sci. (Math. Sci.), 117 (2007), 219–231. https://doi.org/10.1007/s12044-007-0018-9 doi: 10.1007/s12044-007-0018-9
![]() |
[25] |
N. Beroual, T. Sari, A predator-prey system with Holling-type functional response, P. Am. Math. Soc., 148 (2020), 5127–5140. https://doi.org/10.1090/proc/15166 doi: 10.1090/proc/15166
![]() |
[26] |
A. P. Farrell, J. P. Collins, A. L. Greer, H. R. Thieme, Do fatal infectious diseases eradicate host species? J. Math. Bio., 77 (2018), 2103–2164. https://doi.org/10.1007/s00285-018-1249-3 doi: 10.1007/s00285-018-1249-3
![]() |
[27] |
H. I. Freedman, Stability analysis of a predator-prey system with mutual interference and density-dependent death rates, B. Math. Biol., 41 (1979), 67–78. https://doi.org/10.1016/S0092-8240(79)80054-3 doi: 10.1016/S0092-8240(79)80054-3
![]() |
[28] |
M. P. Hassell, Mutual interference between searching insect parasites, J. Anim. Ecol., 40 (1971), 473–486. https://doi.org/10.2307/3256 doi: 10.2307/3256
![]() |
[29] |
M. P. Hassell, Density dependence in single species population, J. Anim. Ecol., 44 (1975), 283–295. https://doi.org/10.2307/3863 doi: 10.2307/3863
![]() |
[30] |
M. P. Hassell, G. C. Varley, New inductive population model for insect parasites and its bearing on biological control, Nature, Lond., 223 (1969), 1133–1137. https://doi.org/10.1038/2231133a0 doi: 10.1038/2231133a0
![]() |
[31] |
R. Arditi, J. M. Callois, Y. Tyutyunov, C. Jost, Does mutual interference always stabilize predator–prey dynamics? A comparison of models, CR Biol., 327 (2004), 1037–1057. https://doi.org/10.1016/j.crvi.2004.06.007 doi: 10.1016/j.crvi.2004.06.007
![]() |
[32] |
H. I. Freedman, G. S. K. Wolkowicz, Predator-prey systems with group defence: The paradox of enrichment revisited, B. Math. Biol., 48 (1986), 493–508. https://doi.org/10.1016/S0092-8240(86)90004-2 doi: 10.1016/S0092-8240(86)90004-2
![]() |
[33] |
L. H. Erbe, H. I. Freedman, Modeling persistence and mutual interference among subpopulations of ecological communities, B. Math. Biol., 47 (1985), 295–304. https://doi.org/10.1016/S0092-8240(85)90055-2 doi: 10.1016/S0092-8240(85)90055-2
![]() |
[34] |
K. Wang, Y. Zhu, Periodic solutions, permanence and global attractivity of a delayed impulsive prey–predator system with mutual interference, Nonlinear Anal.-Real, 14 (2013), 1044–1054. https://doi.org/10.1016/j.nonrwa.2012.08.016 doi: 10.1016/j.nonrwa.2012.08.016
![]() |
[35] |
R. K. Upadhyay, R. D. Parshad, K. Antwi-Fordjour, E. Quansah, S. Kumari, Global dynamics of stochastic predator-prey with mutual interference and prey defense, J. Appl. Math. Comput., 60 (2019), 169–190. https://doi.org/10.1007/s12190-018-1207-7 doi: 10.1007/s12190-018-1207-7
![]() |
[36] |
X. Lin, F. D. Chen, Almost periodic solution for a Volterra model with mutual interference and Beddington–DeAngelis functional response, Appl. Math. Comput., 214 (2009), 548–556. https://doi.org/10.1016/j.amc.2009.04.028 doi: 10.1016/j.amc.2009.04.028
![]() |
[37] |
K. Wang, Existence and global asymptotic stability of positive periodic solution for a predator–prey system with mutual interference, Nonlinear Anal.-Real, 12 (2009), 2774–2783. https://doi.org/10.1016/j.nonrwa.2008.08.015 doi: 10.1016/j.nonrwa.2008.08.015
![]() |
[38] |
Z. Ma, F. Chen, C Wu, W Chen, Dynamic behaviors of a Lotka–Volterra predator–prey model incorporating a prey refuge and predator mutual interference, Appl. Math. Comput., 219 (2013), 7945–7953. https://doi.org/10.1016/j.amc.2013.02.033 doi: 10.1016/j.amc.2013.02.033
![]() |
[39] |
L. Zanette, L., A. F. White, M. C. Allen, M. Clinchy, Perceived predation risk reduces the number of offspring songbirds produce per year, Science, 334 (2011), 1398–1401. https://doi.org/10.1126/science.1210908 doi: 10.1126/science.1210908
![]() |
[40] |
J. P. Suraci, M. Clinchy, L. M. Dill, D. Roberts, L. Y. Zanette, Fear of large carnivores causes a trophic cascade, Nat. Commun., 7 (2016), 10698. https://doi.org/10.1038/ncomms10698 doi: 10.1038/ncomms10698
![]() |
[41] |
F. Hua, K. E. Sieving, R. J. Fletcher, C. A. Wright, Increased perception of predation risk to adults and offspring alters avian reproductive strategy and performance, Behav. Ecol., 25 (2014), 509–519. https://doi.org/10.1093/beheco/aru017 doi: 10.1093/beheco/aru017
![]() |
[42] |
A. J. Wirsing, W. J. Ripple, A comparison of shark and wolf research reveals similar behavioral responses by prey, Front. Ecol. Environ., 9 (2011), 335–341. https://doi.org/10.1890/090226 doi: 10.1890/090226
![]() |
[43] |
A. G. Bauman, J. C. L. Seah, F. A. Januchowski-Hartley, J. Fong, P. A. Todd, Fear effects associated with predator presence and habitat structure interact to alter herbivory on coral reefs, Biol. Lett., 15 (2019), 20190409. https://doi.org/10.1098/rsbl.2019.0409 doi: 10.1098/rsbl.2019.0409
![]() |
[44] |
X. Wang, L. Zanette, X. Zou, Modelling the fear effect in predator-prey interactions, J. Math. Bio., 73 (2016), 1179–1204. https://doi.org/10.1007/s00285-016-0989-1 doi: 10.1007/s00285-016-0989-1
![]() |
[45] |
S. Pal, N. Pal, S. Samanta, J. Chattopadhyay, Effect of hunting cooperation and fear in a predator-prey model, Ecol. Complex., 39 (2019), 100770. https://doi.org/10.1016/j.ecocom.2019.100770 doi: 10.1016/j.ecocom.2019.100770
![]() |
[46] |
R. K. Upadhyay, S. Mishra, Population dynamic consequences of fearful prey in a spatiotemporal predator-prey system, Math. Biosci. Eng., 16 (2019), 338–372. https://doi.org/10.3934/mbe.2019017 doi: 10.3934/mbe.2019017
![]() |
[47] |
S. Pal, S. Majhi, S. Mandal, N. Pal, Role of Fear in a Predator–Prey Model with Beddington–DeAngelis Functional Response, Z. Naturforsch., 74 (2019), 581–595. https://doi.org/10.1515/zna-2018-0449 doi: 10.1515/zna-2018-0449
![]() |
[48] |
H. Zhang, Y. Cai, S. Fu, W. Wang, Impact of the fear effect in a prey-predator model incorporating a prey refuge, Appl. Math. Comput., 36 (2019), 328–337. https://doi.org/10.1016/j.amc.2019.03.034 doi: 10.1016/j.amc.2019.03.034
![]() |
[49] | K. Seonguk, K Antwi-Fordjour, Prey group defense to predator aggregated induced fear, Eur. Phys. J. Plus, 137 (2022), 1–17. |
[50] |
H. Verma, K. Antwi-Fordjour, M. Hossain, N Pal, R. D. Parshad, P. Mathur, A "Double" Fear Effect in a Tri-tropic Food Chain Model, Eur. Phys. J. Plus, 136 (2021), 1–17. https://doi.org/10.1140/epjp/s13360-021-01900-3 doi: 10.1140/epjp/s13360-021-01900-3
![]() |
[51] | Z. Xiao, Z. Li, Stability Analysis of a Mutual Interference Predator-prey Model with the Fear Effect, J. Appl. Sci. Eng., 22 (2019), 205–211. |
[52] |
F. Brauer, A. C. Soudack, Stability regions and transition phenomena for harvested predator–prey systems, J. Math. Biol., 7 (1979), 319–337. https://doi.org/10.1007/BF00275152 doi: 10.1007/BF00275152
![]() |
[53] |
T. K. Kar, Modelling and analysis of a harvested prey–predator system incorporating a prey refuge, J. Comput. Appl. Math., 185 (2006), 19–33. https://doi.org/10.1016/j.cam.2005.01.035 doi: 10.1016/j.cam.2005.01.035
![]() |
[54] |
D. Xiao, W. Li, M Han, Dynamics of a ratio-dependent predator–prey model with predator harvesting, J. Math. Anal. Appl., 324 (2006), 14–29. https://doi.org/10.1016/j.jmaa.2005.11.048 doi: 10.1016/j.jmaa.2005.11.048
![]() |
[55] |
G. Dai, M. Tang, Coexistence region and global dynamics of a harvested predator–prey system, SIAM J. Appl. Math., 58 (1998), 193–210. https://doi.org/10.1137/S0036139994275799 doi: 10.1137/S0036139994275799
![]() |
[56] |
J. Liu, L. Zhang, Bifurcation analysis in a prey–predator model with nonlinear predator harvesting, J. Franklin I., 353 (2016), 4701–4714. https://doi.org/10.1016/j.jfranklin.2016.09.005 doi: 10.1016/j.jfranklin.2016.09.005
![]() |
[57] |
H. Fattahpour, W. Nagata, H. R. Z. Zangeneh, Prey–predator dynamics with two predator types and Michaelis–Menten predator harvesting, Differ. Equ. Dyn. Syst., (2019), 1–26. https://doi.org/10.1007/s12591-019-00500-z doi: 10.1007/s12591-019-00500-z
![]() |
[58] |
S. Chakraborty, S. Pal, N. Bairagi, Predator-prey interaction with harvesting: mathematical study with biological ramifications, Appl. Math. Model., 36 (2011), 4044–4059. https://doi.org/10.1016/j.apm.2011.11.029 doi: 10.1016/j.apm.2011.11.029
![]() |
[59] |
X. Gao, S. Ishag, S. Fu, W. Li, W. Wang, Bifurcation and Turing pattern formation in a diffusive ratio-dependent predator–prey model with predator harvesting, Nonlinear Anal.-Real, 51 (2020), 102962. https://doi.org/10.1016/j.nonrwa.2019.102962 doi: 10.1016/j.nonrwa.2019.102962
![]() |
[60] |
N. H. Fakhry, R. K. Naji, The Dynamics of A Square Root Prey-Predator Model with Fear, Iraqi J. Sci., (2020), 139–146. https://doi.org/10.24996/ijs.2020.61.1.15 doi: 10.24996/ijs.2020.61.1.15
![]() |
[61] | Y. Huang, Z. Li, The Stability of a Predator-Prey Model with Fear Effect in Prey and Square Root Functional Responses, Ann. of Appl. Math., 36 (2020), 186–194. |
[62] |
D. Sen, S. Ghorai, S. Sharma, M Banerjee, Allee effect in prey's growth reduces the dynamical complexity in prey-predator model with generalist predator, Appl. Math. Model., 91 (2021), 768–790. https://doi.org/10.1016/j.apm.2020.09.046 doi: 10.1016/j.apm.2020.09.046
![]() |
[63] | L. Perko, Differential equations and dynamical systems, Vol. 7, Springer Science & Business Media, 2013. |
[64] | J. D. Murray, Mathematical biology, Springer, New York, 1993. |
[65] |
A. Dhooge, W. Govaerts, Y. A Kuznetsov, H. G. E. Meijer, B. Sautois, New features of the software MatCont for bifurcation analysis of dynamical systems, Math. Comp. Model. Dyn, 14 (2009), 147–175. https://doi.org/10.1080/13873950701742754 doi: 10.1080/13873950701742754
![]() |
[66] |
P. Panday, N. Pal, S. Samanta, J Chattopadhyay, Stability and bifurcation analysis of a three-species food chain model with fear, Int. J. Bifurcat. Chaos, 28 (2018), 1850009. https://doi.org/10.1142/S0218127418500098 doi: 10.1142/S0218127418500098
![]() |
[67] |
J. Lyu, P. J. Schofield, K. M. Reaver, M. Beauregard, R. D. Parshad, A comparison of the Trojan Y Chromosome strategy to harvesting models for eradication of nonnative species, Nat. Resour. Model., 33 (2020), e12252. https://doi.org/10.1111/nrm.12252 doi: 10.1111/nrm.12252
![]() |
[68] |
J. Sugie, R. Kohno, R. Miyazaki, On a predator-prey system of Holling type, P. Am. Math. Soc., 125 (1997), 2041–2050. https://doi.org/10.1090/S0002-9939-97-03901-4 doi: 10.1090/S0002-9939-97-03901-4
![]() |
[69] |
R. D. Parshad, S. Wickramsooriya, S. Bailey, A remark on "Biological control through provision of additional food to predators: A theoretical study"[Theor. Popul. Biol. 72 (2007) 111–120], Theor. Popul. Biol., 132 (2020), 60–68. https://doi.org/10.1016/j.tpb.2019.11.010 doi: 10.1016/j.tpb.2019.11.010
![]() |