Research article

The connection between the magical coloring of trees

  • Let f be a set-ordered edge-magic labeling of a graph G from V(G) and E(G) to [0,p1] and [1,p1], respectively; it also satisfies the following conditions: |f(V(G))|=p, maxf(X)<minf(Y), and f(x)+f(y)+f(xy)=C for each edge xyE(G). In this paper, we removed the restriction that the labeling of vertices could not be repeated, and presented the concept of magical colorings including edge-magic coloring, edge-difference coloring, felicitous-difference coloring, and graceful-difference coloring. We studied the magical colorings on the tree and proved the existence of four kinds of magical colorings on the tree from a set-ordered edge-magic labeling. Further, we revealed the transformation relationship between these kinds of colorings.

    Citation: Jing Su, Qiyue Zhang, Bing Yao. The connection between the magical coloring of trees[J]. AIMS Mathematics, 2024, 9(10): 27896-27907. doi: 10.3934/math.20241354

    Related Papers:

    [1] F. A. Mohammed, Mohammed K. Elboree . Soliton solutions and periodic solutions for two models arises in mathematical physics. AIMS Mathematics, 2022, 7(3): 4439-4458. doi: 10.3934/math.2022247
    [2] Abeer S. Khalifa, Hamdy M. Ahmed, Niveen M. Badra, Wafaa B. Rabie, Farah M. Al-Askar, Wael W. Mohammed . New soliton wave structure and modulation instability analysis for nonlinear Schrödinger equation with cubic, quintic, septic, and nonic nonlinearities. AIMS Mathematics, 2024, 9(9): 26166-26181. doi: 10.3934/math.20241278
    [3] Dumitru Baleanu, Kamyar Hosseini, Soheil Salahshour, Khadijeh Sadri, Mohammad Mirzazadeh, Choonkil Park, Ali Ahmadian . The (2+1)-dimensional hyperbolic nonlinear Schrödinger equation and its optical solitons. AIMS Mathematics, 2021, 6(9): 9568-9581. doi: 10.3934/math.2021556
    [4] Ninghe Yang . Exact wave patterns and chaotic dynamical behaviors of the extended (3+1)-dimensional NLSE. AIMS Mathematics, 2024, 9(11): 31274-31294. doi: 10.3934/math.20241508
    [5] Elsayed M. E. Zayed, Mona El-Shater, Khaled A. E. Alurrfi, Ahmed H. Arnous, Nehad Ali Shah, Jae Dong Chung . Dispersive optical soliton solutions with the concatenation model incorporating quintic order dispersion using three distinct schemes. AIMS Mathematics, 2024, 9(4): 8961-8980. doi: 10.3934/math.2024437
    [6] Islam Samir, Hamdy M. Ahmed, Wafaa Rabie, W. Abbas, Ola Mostafa . Construction optical solitons of generalized nonlinear Schrödinger equation with quintuple power-law nonlinearity using Exp-function, projective Riccati, and new generalized methods. AIMS Mathematics, 2025, 10(2): 3392-3407. doi: 10.3934/math.2025157
    [7] Abdul Mateen, Ghulam Hussain Tipu, Loredana Ciurdariu, Fengping Yao . Analytical soliton solutions of the Kairat-Ⅱ equation using the Kumar–Malik and extended hyperbolic function methods. AIMS Mathematics, 2025, 10(4): 8721-8752. doi: 10.3934/math.2025400
    [8] Junjie Li, Gurpreet Singh, Onur Alp İlhan, Jalil Manafian, Yusif S. Gasimov . Modulational instability, multiple Exp-function method, SIVP, solitary and cross-kink solutions for the generalized KP equation. AIMS Mathematics, 2021, 6(7): 7555-7584. doi: 10.3934/math.2021441
    [9] Chun Huang, Zhao Li . New soliton solutions of the conformal time derivative generalized q-deformed sinh-Gordon equation. AIMS Mathematics, 2024, 9(2): 4194-4204. doi: 10.3934/math.2024206
    [10] Muhammad Bilal, Javed Iqbal, Ikram Ullah, Aditi Sharma, Hasim Khan, Sunil Kumar Sharma . Novel optical soliton solutions for the generalized integrable (2+1)- dimensional nonlinear Schrödinger system with conformable derivative. AIMS Mathematics, 2025, 10(5): 10943-10975. doi: 10.3934/math.2025497
  • Let f be a set-ordered edge-magic labeling of a graph G from V(G) and E(G) to [0,p1] and [1,p1], respectively; it also satisfies the following conditions: |f(V(G))|=p, maxf(X)<minf(Y), and f(x)+f(y)+f(xy)=C for each edge xyE(G). In this paper, we removed the restriction that the labeling of vertices could not be repeated, and presented the concept of magical colorings including edge-magic coloring, edge-difference coloring, felicitous-difference coloring, and graceful-difference coloring. We studied the magical colorings on the tree and proved the existence of four kinds of magical colorings on the tree from a set-ordered edge-magic labeling. Further, we revealed the transformation relationship between these kinds of colorings.



    Lotka and Volterra separately proposed two differential equations to provide a description for the relationship between predators and their prey in 1925 and 1926, respectively [1,2]. Because of the importance and practicability of the predator-prey model in most biological problems, researchers have worked to study this dynamical behavior over the past hundred years [1,2,3,4,5]. From the perspective of human social relations, one key goal is to understand the economic benefits in fisheries, forestry and wildlife management, which involves the development and utilization of living and biotic resources, such as the scientific management of reproducible resources and an economic harvest of the population [6,7]. This produces a strong and intense motivation to further study the predator-prey model. Many scholars have extensively studied the depredator model, and the impacted factors on management and re-usability have been consulted [8,9,10,11,12,13]. In 1979, May et al. put forward two types about harvesting systems [14]: (i) constant food production and continuable, uninterrupted harvesting, described as the harvest biomass, where there is no concern with the plant or animal population size, and (ii) continuous efforts that yield benefits (i.e, cations yield benefits), such that the biomass gathered in crops either increases or decreases.

    Continuous crop yield gathering and continuous effort reaping are not very realistic and are worse than nonlinear harvesting from the perspective of biological significance and economic benefits. This mainly has two reasons: on one hand, with a constant yield or constant effort, the harvesting rate is not always constant; on the other hand, some unrealistic characteristics and limitations are reflected in the constant-effort harvesting [15,16,17]. Based on the achievements mentioned above, we will rigorously consider the predator-prey model together with ratio-dependent Holling type III functional response and nonlinear prey harvesting:

    {du(t)dt=u(1u(t))α(1+c)u(t)2v(t)u(t)2+cv(t)2hu(t)β+u(t),dv(t)dt=γv(t)(1v(t)u(t)), (1.1)

    where u(t) represents the prey density, v(t) represent the predator density, α represents the standard good search effort of v(t) versus u(t), c represents the biomass conversion or consumption rate, h represents the maximum harvested rate of the prey species, β represents the number of prey captured, which is the time required to calculate the maximum probability of reaching half time of the maximum probability, and γ is either the conversion or the consumption probability rate of prey to predator.

    Inspired by the literature [6,7,8,9,10,11,12], under the homogeneous Neumann boundary condition and circumstances, we propose to study a sort of predator-prey model with a ratio-dependent Holling type functional response and nonlinear predator-prey harvesting, which has not been performed in the existing literature:

    {u(x,t)t=d1Δu(x,t)+u(x,t)(1u(x,t))α(1+c)u(x,t)2v(x,t)u(x,t)2+cv(x,t)2hu(x,t)β+u(x,t),v(x,t)t=d2Δv(x,t)+γv(x,t)(1v(x,t)u(x,t)),xΩ,t>0,ux(0,t)=ux(π,t)=vx(0,t)=vx(π,t)=0,t0,u(x,t)=ϕ(x,t),v(x,t)=ψ(x,t)0,xΩ, (1.2)

    where u(x,t) represents the prey densities and v(x,t) represents the predator densities at the location x and at time t, d1 and d2 represent the diffusion coefficients of the prey and the predator population, respectively, and Δ is the Laplace operator; we assume that the habitat of the predator and prey is a bounded domain Ω.

    Based on existing research results, a realistic predator-prey model should include a space and time delay. Therefore, we sought to include a time delay, which will lead to more complex dynamical behaviors of the systems, and continue to keep on studying the dynamics of the following systems

    {u(x,t)t=d1Δu(x,t)+u(x,t)(1u(x,t))α(1+c)u(x,t)2v(x,t)u(x,t)2+cv(x,t)2hu(x,t)β+u(x,t),v(x,t)t=d2Δv(x,t)+γv(x,t)(1v(x,tτ)u(x,tτ)),xΩ,t>0,ux(0,t)=ux(π,t)=vx(0,t)=vx(π,t)=0,t0,u(x,θ)=ϕ(x,θ),v(x,θ)=ψ(x,θ)0,xΩ,θ[τ,0], (1.3)

    where the delay effects are represented by a nonnegative or positive parameter τ.

    In this paper, with the right and proper use of the normal form and the use of the center manifold theory, we will consider a delay-induced Hopf bifurcation for the predator-prey system (1.3). This document can be summarized as follows. In Section 2, we consider the Hopf bifurcation of the system (1.1) and extensively investigate the existence of the delay-induced Hopf bifurcation for the predator-prey model with diffusion. In Section 3, we further discuss the dynamical draw near behavior of the Hopf bifurcation value induced by time delay by carefully calculating the normal and regular forms on the central manifold. In Section 4, we present numerical simulations to illustrate and expand our theoretical outcomes and results.

    To better understand the dynamic behavior near the equilibrium points of system (1.1), the zero growth isoclines of the system are given by and endowed with the following formula:

    ug(1)(u,v)=0,vg(2)(u,v)=0.

    The equilibrium scores and points of intersection of these zero growth isoclines. The trivial and worthless equilibrium points for the system (1.1) are as follows:

    (1) The origin E0(0,0);

    (2) The equilibrium points without a predator are EL(uL,0) and EH(uH,0), where uL and uH are the roots of the following quadratic equation:

    u2(1β)u+(hβ)=0.

    If 2h1<β<min{1,h}, or h<β, then

    uL=(1β)(1β)24(hβ)2.

    If 2h1<β<min{1,h}, then

    uH=(1β)+(1β)24(hβ)2.

    Theorem 1. (a) The origin E0(0,0) is a saddle point, if h>β and unstable if h<β;

    (b) The axial equilibrium point EL(uL,0) is all the way and invariably unstable;

    (c) The axial equilibrium point EH(uH,0) is at all time and forever a saddle point.

    The interior and internal equilibria are E1=(u1,v1) and E2=(u2,v2), where u1 and u2 are the roots of the following quadratic equation:

    u2+(β+α1)u+(h+αββ)=0,
    i.e.,u1=(1αβ)(1αβ)24(h+αββ)2,

    and

    u2=(1αβ)+(1αβ)24(h+αββ)2.

    For the system (1.1), if h>β(1α), then

    (1) The two distinct interior equilibrium points E1=(u1,v1) and E2=(u2,v2) exist whenever α+β<1 and h<(1+βα)24;

    (2) If α+β<1 and h=(1+βα)24, then the two interior equilibrium points E1=(u1,v1) and E2=(u2,v2), collide and conflict with each other, and are denoted by the instantaneous and saddle-node equilibrium E=(˜u,˜v), where ˜u=1βα2;

    (3) If h>(1+βα)24, then no interior equilibrium point exist.

    Theorem 2. For the system (1.1), if (1+ηα)24>h>β(1α) and α+β<1, then

    (a) The equilibrium point E1=(u1,v1) is always and forever a saddle point;

    (b) The equilibrium point E2=(u2,v2) is stable and steady when γ>γ0=12u22αc1+cβh(β+u2)2, which is unstable when γ<γ0=12u22αc1+cβh(β+u2)2;

    (c) The system (1.1) undergoes and experiences a Hopf bifurcation with enough respect esteem and value to the bifurcation parameter γ around the equilibrium point E2=(u2,v2) when γ=γ0=12u22αc1+cβh(β+u2)2.

    In an effort to go deeper and investigate the exceedingly intricate dynamical behaviors for the system (1.2), we consider the dynamics of system (1.1) in detail. The accurate linearization of system (1.1) at the positive equilibrium points Ej=(uj,vj) is

    (du(t)dtdv(t)dt)=B(u(t)v(t)),B=(a11a12a21a22), (2.1)

    where

    a11=12uj2αc1+cβh(β+uj)2,a12=α(1c)1+c,a21=γ,a22=γ. (2.2)

    The characteristic equation of (2.1) is

    λ2T0λ+J0=0, (2.3)

    where

    T0=(a11+a22)=[12ujγ2αc1+cβh(β+uj)2],
    J0=a11a22a12a21=γuj[1h(β+uj)2]
    =γujβ+uj[β+ujhβ+uj]=γujβ+uj[2uj(1βα)].

    When the value of J0>0, the equilibria Ej,j=1,2 is unstable. When the value of J0<0, the equilibria Ej,j=1,2 is locally asymptotically stable if T0>0, and the equilibria Ej,j=1,2 is unstable if T0<0. Obviously and apparently, u1<˜u<u2, hence, the equilibrium point E1=(u1,v1) is always and at all time a saddle point, and the equilibrium point E2=(u2,v2) is very steady and stable when γ>γ0=12u22αc1+cβh(β+u2)2, which is unstable when γ<γ0=12u22αc1+cβh(β+u2)2.

    To discuss its fixity, stability, steadiness of the positive equilibrium E2 of system (1.1) more accurately and intuitively, the mathematical relation between γ and h, which appeared and yielded in the previous equation. The Hopf bifurcation line of that system (1.1) is represented as the following:

    γ0(h)=12u22αc1+cβh(β+u2)2.

    Then, the stability region is D={(γ,h)|γ0<γ} of the positive and nonnegative equilibrium E2=(u2,v2) to the system (1.1), and moreover T0(h,γ0(h))=0.

    In the following substance, what taken as the bifurcation parameter, the existence of the Hopf bifurcation at the interior equilibrium E2 is the parameter γ. As a matter of fact, the parameter γ can be looked upon as the percent conversion or the consumption rate of prey to predator, is fully represented by the predator, and plays a necessary role in determining the stability of the interior equilibrium, and in deeply impacting and influencing the existence of the Hopf bifurcation.

    The equation (2.3) will have a pair of opposite and contrary imaginary eigenvalues, ω=±J0, if we choose or select to treat the parameter γ as a bifurcation parameter. Additionally, the parameter γ is γ=γ0. System (1.1) should be a non-constant periodic solution with a very small amplitude that diverges from the positive equilibrium point E2 when the parameter γ crosses through γ0 if the cross-sectional condition is met.

    Let and allow λ(γ)=α(γ)+iω(γ) be the root of (1.1), then

    α(γ)=12T0(γ),ω(γ)=124J0(γ)T20(γ).

    Hence, α(γ0)=0 and

    α(γ0)=12<0. (2.4)

    This may mean that the system (1.1) will undergo and suffer from the Hopf bifurcation at E2 as γ crosses through the γ0 as if the transversal condition (2.4) is content and satisfied.

    Under this circumstance, only one internal equilibrium point exists and is represented by E=(u,v)(u2,v2).

    Theorem 3. For the system (1.1), if hβ(1α), then

    (a) The equilibrium point E=(u,v) is stable and steady when γ>γ0=12u2αc1+cβh(β+u)2, which is unstable when γ<γ0=12u2αc1+cβh(β+u)2;

    (b) Concerning the bifurcation parameter γ, the system (1.1) goes through a Hopf bifurcation around the equilibrium point E=(u,v) when γ=γ0=12u2αc1+cβh(β+u)2.

    In the next Section, we will continue to consider the harvesting rate-induced Turing-Hopf bifurcation and delay-induce Turing-Hopf bifurcation in order to understand the diffusive predator-prey model.

    Let

    g(1)(u,v)=u(x,t)(1u(x,t))α(1+c)u(x,t)2v(x,t)u(x,t)2+cv(x,t)2hu(x,t)β+u(x,t),
    g(2)(u,v)=γv(x,t)(1v(x,tτ)u(x,tτ)).

    The linearization of (1.3) at the positive and nonnegative equilibrium E=(u,v) is

    (u(x,t)tv(x,t)t)=DΔ(u(x,t)v(x,t))+X0(u(x,t)v(x,t))+X1(u(x,tτ)v(x,tτ)), (3.1)

    with

    DΔ=(d1Δ00d2Δ),X0=(a11a1200),X1=(00a21a22),

    where a11,a12,a21 and a22 were already abandoned (2.2).

    Hence, one can see that the characteristic equation of (3.1) is

    det(λI2PkX0X1eλτ)=0, (3.2)

    where I2 is the 2×2 identity matrix and Pk=k2diag{d1,d2},kN0, which can imply that

    λ2+Akλ+Bk+eλτ(Cλ+Dk)=0, (3.3)

    with

    Ak=(d1+d2)k2a11,Bk=d1d2k4a11d2k2,C=a22,Dk=a11a22a12a21a22d1k2.

    When the value of τ is τ=0,

    λ2+Tkλ+Jk=0, (3.4)

    in there

    Tk=(d1+d2)k2(a11+a22),
    Jk=d1d2k4(a11d2+a22d1)k2+(a11a22a12a21). (3.5)

    Consequently, we are able to receive numerous Hopf bifurcation branching lines Hk as follows

    γk(h)=[12u22αc1+cβh(β+u2)2](d1+d2)k2.

    We assume and posit that λ=iω, substitute iω into (3.3), and separating the real part from the imaginary part, fancy and notional part when the parameter τ0, we can get

    {ω2+Bk+ωCsinωτ+Dkcosωτ=0,Akω+ωCcosωτDksinωτ=0, (3.6)

    which is solved by

    {sinωτ=AkωDk(Bkω2)ωC(ωC)2+D2k=Sk(ω),cosωτ=AkCω2+(Bkω2)Dk(ωC)2+D2k=Ck(ω).

    Then, we obtain

    G(ω)=ω4+(A2k2BkC2)ω2+(B2kD2k)=0, (3.7)

    the roots of (3.7) are

    ω±k=(A2k2BkC2)±(A2k2BkC2)24(B2kD2k)2. (3.8)

    We present the following hypothesis and assumptions

    (H1)A2k2BkC2<0,B2kD2k>0, or (A2k2BkC2)24(B2kD2k)<0;

    (H2)B2kD2k<0;

    (H3)A2k2BkC2<0,B2kD2k>0, and (A2k2BkC2)24(B2kD2k)>0.

    Lemma 1. (a) If (H1) is satisfied, the Eq (3.7) has no positive root, then the Eq (3.3) has no purely virtually imaginary root;

    (b) the Eq (3.7) has one positive root, after that the Eq (3.3) has a couple of purely virtual imaginary roots ±iω+k at τj+k, in the event of (H2) is satisfied, with

    τj+k={arccosCk(ω)+2jπω+k,ifSk(ω+k)>0,2πarccosCk(ω)+2jπω+k,ifSk(ω+k)<0; (3.9)

    (c) If (H3) is satisfied, the Eq (3.7) has two positive roots, whereupon the Eq (3.3) has a pair of purely virtually imaginary roots ±iω±k at τj±k, with

    τj±k={arccosCk(ω)+2jπω±k,ifSk(ω±k)>0,2πarccosCk(ω)+2jπω±k,ifSk(ω±k)<0. (3.10)

    Permitting λ(τ)=ν(τ)+iδ(τ) be the roots of the Eq (3.3) near from τ=τj±k which is satisfying ν(τj±k)=0,δ(τj±k)=ω±k. After that, we can get transversality condition as following.

    Lemma 2. dRe(λ)dτ|τ=τj+k>0, and dRe(λ)dτ|τ=τjk<0.

    Proof. It can be proved that after distinguishing the two sides of (3.3), we can chalk up

    Re(dλdτ)1=Re[(2λ+Ak)eλτ+Cλ(λC+Dk)τλ].

    Thus, by (3.6) and (3.8), we pose and have

    Re((dλdτ)1)|τ=τj±k=Re[(2λ+Ak)eλτ+Cλ(λC+Dk)τλ]|τ=τj±k
    =Re[(2iω±k+Ak)eiω±kτj±k+Ciω±k(iω±kC+Dk)τj±kiω±k]=±(A2k2BkC2)24(B2kD2k)(ω±kC)2+D2k.

    Theorem 4. Assume that the conditions hβ(1α) and γ>γ0 hold, ωj±k and τj±k is defined by (3.8) and (3.9), distinctively and respectively, and denote the minimum worth of the critical worth to be delayed and postponed by τ=mink,j{τj±k}.

    (a) The positive equilibrium E(u,v) of system (1.3) is asymptotically and steadily stable for the parameter τ(0,τ);

    (b) System (1.3) is at the receiving end the Hopf bifurcations drawing close to the positive equilibrium E(u,v) at τj+k or τjk (jN0);

    (c) System (1.3) undergoes a Hopf-Hopf bifurcation approaching the positive equilibrium E(u,v) at τj+k=τjk (jN0).

    Consider the system (1.2), fixing d1=0.05,d2=0.5,α=0.3,β=0.5,c=0.2, we can get hold of the Turing-Hopf bifurcation point TH(γ,h)=TH(0.0766,0.3296) in the γh plane, just by a ordinary and casual calculation. (see Figure 1(A)).

    Figure 1.  (A) The Turing-Hopf bifurcation point TH(γ,h)=TH(0.0766,0.3296); (B) The delay-induced Turing-Hopf bifurcation point DTH(γ,τ)=DTH(0.1314,2.4136).

    Consider the system (1.3), fixing d1=0.05,d2=0.5,α=0.3,β=0.5,c=0.2,h=0.335,γ=0.1314, through a simple calculation, we can obtain that τ=2.4136, and the point which the resulting Turing-Hopf bifurcation is delayed and induced at DTH(γ,τ)=DTH(0.1314,2.4136) is presented in the γτ plane. (see Figure 1(B)).

    In the following Section, we are going to put out some accurate and precise numerical simulations together with dynamical analysis why it is that harvesting rate-induce Turing-Hopf bifurcation and delay-induced Turing-Hopf bifurcation of these systems (1.3).

    In the following section, for the sake of supporting and developing our previous analysis outcomes, we use the Matlab mathematical software to perform some meaningful numerical simulations.

    With regard to system (1.2), choosing and selecting the parameters d1=0.05,d2=0.5,α=0.3,β=0.5,c=0.2, after some simple calculations, we can easily gain the critical value h=0.3295,γ=0.0766 for the Turing-hopf bifurcation. The family in its stable spatial nonhomogeneous periodic solutions is divided into the positive equilibrium point E(u,v), which are distinctly expressed as a Figure 2.

    Figure 2.  The positive equilibrium point E(u,v) of system (1.2) what is unstable, there are stable spatially inhomogeneous periodic solutions, at that time, the value of the parameters (ε1,ε2)=(0.0045,0.005), and for the primarily initial worth is u(x,0)=0.2594+0.01cosx,v(x,0)=0.2594+0.01cosx.

    In regard to the system (1.3), we all determined to build up the merit d1=0.05,d2=0.5,α=0.3,β=0.5,h=0.335,c=0.2. Subsequently, a long list for accurate calculations shows and expresses that E(u,v)=(0.4094,0.3517), and the values τ=0.9363,κ01=0.0625,κ02=0.1026. As a consequence, E(u,v)=(0.4094,0.3517) is locally stable at the moment of the parameter τ[0,τ). At the time the parameter τ passed through the critical and primary value τ, E(u,v)=(0.4094,0.3517), loses its stability and steadiness, the Turing-Hopf bifurcation progress, and a kind of stable spatial inhomogeneous periodic solution will be branched from the positive equilibrium point E(u,v)=(0.4094,0.3517), as shown in Figure 3.

    Figure 3.  The positive equilibrium point E(u,v) of system (1.3) is unstable, there are stable spatially inhomogeneous periodic solutions, when the parameter (ε1,ε2)=(0.0084,0.4136), and set the initial values is u(x,0)=0.2581+0.002cosx,v(x,0)=0.2581+0.002cosx.

    Though many researchers have carefully studied the very complex dynamical behavior for a predator-prey model, there was much to discover regarding time and nonlinear harvesting, and given a series of related results, we still need to further study its high codimension bifurcation in this connection. In this subfraction, with ratio dependence and nonlinear predator-prey harvesting, one must study and discuss the spatiotemporal dynamics in the differential Holling-type functional response and the diffusion Leslie-Gower predator-prey model. Concerning this spatial model, we study the characteristics of the roots for the characteristic equation, which is also distributed over an area be equation of the linearized model in the steady-state solution; additionally, we discuss the steadiness of the linear system with the positive and negative roots. Our research shows that under certain conditions, The Turing-Hopf bifurcation is able to emerge in the studied system. We further studied the important dynamic behavior of stable spatial inhomogeneous, where it may be necessary to use the central and major manifold theorem and normal naturally form theory. It showed us that this steadiness and stability or oscillate periodically in this system crossing from the equilibrium between theoretical and numerical results would be controlled and changed by controlling the threshold effect of the nonlinear prey harvesting rate and time delay; therefore, we can easily observe the rich dynamic behavior of the system near the equilibrium point. Some numerical simulation results demonstrated that, a change of the nonlinear prey rate can induce the system to produce spatiotemporal resonance, and the reaction-diffusion system (1.2) will have stable steady spatial inhomogeneous periodic solution (Figure 2). In this reaction-diffusion model with the time delay and postpone equation (1.3), the change about time delay can also trigger the change of system stability, and the system will occur a stable spatial inhomogeneous periodic solution (Figure 3). In future work, we will study the high codimension bifurcation in the reaction-diffusion predator-prey system with time delay and with a nonlinear harvesting rate using the Hopf-Hopf bifurcation and the Turing-Turing bifurcation.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    We would like to thank the reviewers for their valuable comments and suggestions, which can significantly improve the quality of our paper indeed. This work is supported by the National Natural Science Foundation of China (No.11701208), the key Projects of Natural Science Research in Colleges and Universities in the Anhui Province (No.2022AH051948), the general Project of Natural Science Research in Colleges and Universities in Anhui Province (No.KJHS2021B14).

    The authors declare that he has no known competing financial interest or personal relationship that could have appeared to influence the work reported in this paper.



    [1] A. Gheorghiu, T. Kapourniotis, E. Kashefi, Verification of quantum computation: An over view of existing approaches, Theory Math. Syst., 63 (2019), 715–808. https://doi.org/10.1007/s00224-018-9872-3 doi: 10.1007/s00224-018-9872-3
    [2] S. Suhail, R. Hussain, A. Khan, C. S. Hong, On the role of hash-based signatures in quantum-safe internet of things: Current solutions and future directions, IEEE Internet Things, 8 (2021), 1–17. https://doi.org/10.1109/JIOT.2020.3013019 doi: 10.1109/JIOT.2020.3013019
    [3] S. Katsumata, T. Matsuda, A. Takayasu, Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance, Theor. Comput. Sci., 809 (2020), 103–136. https://doi.org/10.1016/j.tcs.2019.12.003 doi: 10.1016/j.tcs.2019.12.003
    [4] Z. R. Zheng, X. Y. Liu, L. Z. Yin, Z. C. Liu, A hybrid password authentication scheme based on shape and text, J. Comput., 5 (2010), 765–772. https://doi.org/10.4304/jcp.5.5.765-772 doi: 10.4304/jcp.5.5.765-772
    [5] Y. Z. Tian, L. X. Li, H. P. Peng, Y. X. Yang, Achieving flatness: Graph labelling can generate graphical honeywords, Comput. Secur., 104 (2021), 102212. https://doi.org/10.1016/j.cose.2021.102212 doi: 10.1016/j.cose.2021.102212
    [6] W. Chen, J. Li, Z. Huang, C. Z. Gao, S. M. Yiu, Lattice-based unidirectional infinite-use proxy resignatures with private re-signature key, J. Comput. Syst. Sci., 120 (2021), 137–148. https://doi.org/10.1016/j.jcss.2021.03.008 doi: 10.1016/j.jcss.2021.03.008
    [7] X. Zhang, C. Ye, S. Zhang, B. Yao, Graph colorings and labelings having multiple restrictive conditions in topological coding, Mathematics, 10 (2022), 1592. https://doi.org/10.3390/math10091592 doi: 10.3390/math10091592
    [8] J. Sedlacek, Problem 27, Theory of graphs and its applications, Proc Symp Smolenice, Praha: Academia, 1963, 163–169.
    [9] G. S. Bloom, S. W. Golomb, Numbered complete graphs, unusual rules, and assorted applications, In: Theory and Applications of Graphs, 2006, 53–65. https://doi.org/10.1007/BFb0070364
    [10] W. D. Wallis, Magic graphs, Berlin: Birkh-auser, 2001.
    [11] H. Y. Wang, J. Xu, B. Yao, Exploring new cryptographical construction of complex network data, In: 2016 IEEE First International Conference on Data Science in Cyberspace(DSC), 2016, 155–160. https://doi.org/10.1109/DSC.2016.76
    [12] H. Y. Wang, J. Xu, B. Yao, The key-models and their lock-models for designing new labellings of networks, In: 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), 2016, 565–568. https://doi.org/10.1109/IMCEC.2016.7867273
    [13] B. Yao, M. M. Zhao, X. H. Zhang, Y. R. Mu, Y. R. Sun, Topological coding and topological matrices toward network overall security, arXiv preprint, 2019. https://doi.org/10.48550/arXiv.1909.01587
    [14] J. A. Bondy, U. S. R. Murty, Graph theory with applications, MacMillan Press Ltd., 1976.
    [15] J. A. Gallian, A dynamic survey of graph labelling, 23 Eds., Electron. J. Comb., 2020.
  • This article has been cited by:

    1. Samina Samina, Maham Munawar, Ali R. Ansari, Adil Jhangeer, Samad Wali, Nonlinear optical dynamics and complex wave structures in nonlinear dispersive media, 2025, 15, 2045-2322, 10.1038/s41598-025-00100-8
    2. Musarat Bibi, Salah Mahmoud Boulaaras, Patricia J.Y. Wong, Muhammad Shoaib Saleem, Exploring families of soliton solutions for the fractional Akbota equation in optical fiber telecommunication systems, 2025, 10, 2473-6988, 12254, 10.3934/math.2025555
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(765) PDF downloads(48) Cited by(0)

Figures and Tables

Figures(3)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog