The Internet of Things (IoT) market is experiencing exponential growth, with projections increasing from 15 billion dollars to an estimated 75 billion dollars by 2025. Quantum computing has emerged as a key enabler for managing the rapid expansion of IoT technology, serving as the foundation for quantum computing support. However, the adoption of quantum computing also introduces numerous privacy and security challenges. We delve into the critical realm of quantum-level security within a typical quantum IoT. To achieve this objective, we identified and precisely analyzed security attributes at various levels integral to quantum computing. A hierarchical tree of quantum computing security attributes was envisioned, providing a structured approach for systematic and efficient security considerations. To assess the impact of security on the quantum-IoT landscape, we employed a unified computational model based on Multi-Criteria Decision-Making (MCDM), incorporating the Analytical Hierarchy Process (AHP) and the Technique for Ordering Preferences by Similarity to Ideal Solutions (TOPSIS) within a fuzzy environment. Fuzzy sets were used to provide practical solutions that can accommodate the nuances of diverse and ambiguous opinions, ultimately yielding precise alternatives and factors. The projected undertaking was poised to empower practitioners in the quantum-IoT realm by aiding in the identification, selection, and prioritization of optimal security factors through the lens of quantum computing.
Citation: Wael Alosaimi, Abdullah Alharbi, Hashem Alyami, Bader Alouffi, Ahmed Almulihi, Mohd Nadeem, Rajeev Kumar, Alka Agrawal. Analyzing the impact of quantum computing on IoT security using computational based data analytics techniques[J]. AIMS Mathematics, 2024, 9(3): 7017-7039. doi: 10.3934/math.2024342
[1] | A. Q. Khan, Ibraheem M. Alsulami . Discrete Leslie's model with bifurcations and control. AIMS Mathematics, 2023, 8(10): 22483-22506. doi: 10.3934/math.20231146 |
[2] | Xiongxiong Du, Xiaoling Han, Ceyu Lei . Dynamics of a nonlinear discrete predator-prey system with fear effect. AIMS Mathematics, 2023, 8(10): 23953-23973. doi: 10.3934/math.20231221 |
[3] | Fatao Wang, Ruizhi Yang, Yining Xie, Jing Zhao . Hopf bifurcation in a delayed reaction diffusion predator-prey model with weak Allee effect on prey and fear effect on predator. AIMS Mathematics, 2023, 8(8): 17719-17743. doi: 10.3934/math.2023905 |
[4] | Abdul Qadeer Khan, Ayesha Yaqoob, Ateq Alsaadi . Neimark-Sacker bifurcation, chaos, and local stability of a discrete Hepatitis C virus model. AIMS Mathematics, 2024, 9(11): 31985-32013. doi: 10.3934/math.20241537 |
[5] | Xiaoming Su, Jiahui Wang, Adiya Bao . Stability analysis and chaos control in a discrete predator-prey system with Allee effect, fear effect, and refuge. AIMS Mathematics, 2024, 9(5): 13462-13491. doi: 10.3934/math.2024656 |
[6] | Ahmad Suleman, Rizwan Ahmed, Fehaid Salem Alshammari, Nehad Ali Shah . Dynamic complexity of a slow-fast predator-prey model with herd behavior. AIMS Mathematics, 2023, 8(10): 24446-24472. doi: 10.3934/math.20231247 |
[7] | Weili Kong, Yuanfu Shao . Bifurcations of a Leslie-Gower predator-prey model with fear, strong Allee effect and hunting cooperation. AIMS Mathematics, 2024, 9(11): 31607-31635. doi: 10.3934/math.20241520 |
[8] | Ali Al Khabyah, Rizwan Ahmed, Muhammad Saeed Akram, Shehraz Akhtar . Stability, bifurcation, and chaos control in a discrete predator-prey model with strong Allee effect. AIMS Mathematics, 2023, 8(4): 8060-8081. doi: 10.3934/math.2023408 |
[9] | Abdul Qadeer Khan, Ayesha Yaqoob, Ateq Alsaadi . Discrete Hepatitis C virus model with local dynamics, chaos and bifurcations. AIMS Mathematics, 2024, 9(10): 28643-28670. doi: 10.3934/math.20241390 |
[10] | Fethi Souna, Salih Djilali, Sultan Alyobi, Anwar Zeb, Nadia Gul, Suliman Alsaeed, Kottakkaran Sooppy Nisar . Spatiotemporal dynamics of a diffusive predator-prey system incorporating social behavior. AIMS Mathematics, 2023, 8(7): 15723-15748. doi: 10.3934/math.2023803 |
The Internet of Things (IoT) market is experiencing exponential growth, with projections increasing from 15 billion dollars to an estimated 75 billion dollars by 2025. Quantum computing has emerged as a key enabler for managing the rapid expansion of IoT technology, serving as the foundation for quantum computing support. However, the adoption of quantum computing also introduces numerous privacy and security challenges. We delve into the critical realm of quantum-level security within a typical quantum IoT. To achieve this objective, we identified and precisely analyzed security attributes at various levels integral to quantum computing. A hierarchical tree of quantum computing security attributes was envisioned, providing a structured approach for systematic and efficient security considerations. To assess the impact of security on the quantum-IoT landscape, we employed a unified computational model based on Multi-Criteria Decision-Making (MCDM), incorporating the Analytical Hierarchy Process (AHP) and the Technique for Ordering Preferences by Similarity to Ideal Solutions (TOPSIS) within a fuzzy environment. Fuzzy sets were used to provide practical solutions that can accommodate the nuances of diverse and ambiguous opinions, ultimately yielding precise alternatives and factors. The projected undertaking was poised to empower practitioners in the quantum-IoT realm by aiding in the identification, selection, and prioritization of optimal security factors through the lens of quantum computing.
The topic of boundary value problems is an interesting area of research in view of its applications in applied and technical sciences. In the recent years, the class of nonlocal fractional order boundary value problems involving different fractional derivatives (such as Riemann-Liouville, Caputo, etc.) received an overwhelming interest from many researchers. For the details of a variety of nonlocal single-valued and multivalued boundary value problems involving different types of fractional order derivative operators, we refer the reader to the text [1], articles [2,3,4,5,6,7] and the references cited therein. There has been shown a great enthusiasm in developing the existence theory for Hilfer, ψ-Hilfer and (k,ψ) Hilfer type fractional differential equations equipped with different types of boundary conditions, for instance, see [8,9,10,11,12,13,14,15,16].
Nonlocal boundary conditions are found to be more plausible and practical in contrast to the classical boundary conditions in view of their applicability to describe the changes happening within the given domain. Closed boundary conditions are found to be of great help in describing the situation when there is no fluid flow along the boundary or through it. The free slip condition is also a type of the closed boundary conditions which describes the situation when there is a flow along the boundary, but there is no flow perpendicular to it. Such conditions are also useful in the study of sandpile model [17,18], honeycomb lattice [19], deblurring problems [20], closed-aperture wavefield decomposition in solid media [21], vibration analysis of magneto-electro-elastic cylindrical composite panel [22], etc.
Now we review some works on the boundary value problems with closed boundary conditions. In [23], the authors studied the single-valued and multivalued fractional boundary value problems with open and closed boundary conditions. A three-dimensional Neumann boundary value problem with a generalized boundary condition in a domain with a smooth closed boundary was discussed in [24]. For some interesting results on impulsive fractional differential equations with closed boundary conditions, see the articles [25,26].
The objective of the present work is to investigate a new class of mixed nonlinear boundary value problems involving a right Caputo fractional derivative, mixed Riemann-Liouville fractional integral operators, and multipoint variant of closed boundary conditions. In precise terms, we consider the following fractional order nonlocal and nonlinear problem:
CDαT−y(t)+λIρT−Iσ0+h(t,y(t))=f(t,y(t)),t∈J:=[0,T], | (1.1) |
y(T)=m∑ı=1(piy(ξi)+Tqiy′(ξi)),Ty′(T)=m∑ı=1(riy(ξi)+Tviy′(ξi)), | (1.2) |
where CDαT− denote the right Caputo fractional derivative of order α∈(1,2], IρT− and Iσ0+ represent the right and left Riemann-Liouville fractional integral operators of orders ρ,σ>0 respectively, f,h:[0,T]×R→R are given continuous functions and λ,pi,qi,ri,vi∈R,i∈{1,2,3,...,m}, and ξi∈(0,T). Notice that the integro-differential Eq (1.1) contains the usual and mixed Riemann-Liouville integrals type nonlinearities. The boundary conditions (1.2) can be interpreted as the values of the unknown function and its derivative at the right end-point T of the interval [0,T] are proportional to a linear combination of these values at arbitrary nonlocal positions ξi∈(0,T). Physically, the nonlocal multipoint closed boundary conditions provide a flexible mechanism to close the boundary at arbitrary positions in the given domain instead of the left end-point of the domain.
Here we emphasize that much of the literature on fractional differential equations contains the left-sided fractional derivatives and there are a few works dealing with the right-sided fractional derivatives. For instance, the authors in [27,28] studied the problems involving the right-handed Riemann–Liouville fractional derivative operators, while a problem containing the right-handed Caputo fractional derivative was considered in [29]. The problem studied in the present paper is novel in the sense that it solves an integro-differential equation with a right Caputo fractional derivative and mixed nonlinearities complemented with a new concept of nonlocal multipoint closed boundary conditions. The results accomplished for the problems (1.1) and (1.2) will enrich the literature on boundary value problems involving the right-sided fractional derivative operators. The present work is also significant as it produces several new results as special cases as indicated in the last section.
The rest of the paper is arranged as follows. In Section 2, we present an auxiliary lemma which is used to transform the given nonlinear problem into a fixed-point problem. Section 3 contains the main results and illustrative examples. Some interesting observations are presented in the last Section 4.
Let us begin this section with some definitions [30].
Definition 2.1. The left and right Riemann-Liouville fractional integrals of order β>0 for g∈L1[a,b], existing almost everywhere on [a,b], are respectively defined by
Iβa+g(t)=∫ta(t−s)β−1Γ(β)g(s)dsandIβb−g(t)=∫bt(s−t)β−1Γ(β)g(s)ds. |
Definition 2.2. For g∈ACn[a,b], the right Caputo fractional derivative of order β∈(n−1,n],n∈N, existing almost everywhere on [a,b], is defined by
CDβb−g(t)=(−1)n∫bt(s−t)n−β−1Γ(n−β)g(n)(s)ds. |
In the following lemma, we solve a linear variant of the fractional integro-differential equation (1.1) supplemented with multipoint closed boundary conditions (1.2).
Lemma 2.1. Let H,F∈C[0,T] and Δ≠0. Then the linear problem
{CDαT−y(t)+λIρT−Iσ0+H(t)=F(t),t∈J:=[0,T],y(T)=m∑ı=1(piy(ξi)+Tqiy′(ξi)),Ty′(T)=m∑ı=1(riy(ξi)+Tviy′(ξi)),0<ξi<T, | (2.1) |
is equivalent to the integral equation
y(t)=∫Tt(s−t)α−1Γ(α)[F(s)−λIρT−Iσ0+H(s)]ds+b1(t){m∑ı=1pi∫Tξi(s−ξi)α−1Γ(α)[F(s)−λIρT−Iσ0+H(s)]ds−Tm∑ı=1qi∫Tξi(s−ξ)α−2Γ(α−1)[F(s)−λIρT−Iσ0+H(s)]ds}+b2(t){m∑ı=1ri∫Tξi(s−ξi)α−1Γ(α)[F(s)−λIρT−Iσ0+H(s)]ds−Tm∑i=1vi∫Tξi(s−ξi)α−2Γ(α−1)[F(s)−λIρT−Iσ0+H(s)]ds}, | (2.2) |
where
b1(t)=1Δ(tS6−S7−TS9+T),b2(t)=1Δ[(1−S1)t+S2+TS4−T],Δ=(S1−1)(S7+TS9−T)−S6(S2+TS4−T),S1=m∑ı=1pi,S2=m∑ı=1piξi,S3=m∑ı=1piAi,S4=m∑ı=1qi,S5=m∑ı=1qiBi,S6=m∑ı=1ri,S7=m∑ı=1riξi,S8=m∑ı=1riAi,S9=m∑ı=1vi,S10=m∑ı=1viBi,Ai=IαT−[F(ξi)−λIρT−Iσ0+H(ξi)],Bi=−Iα−1T−[F(ξi)−λIρT−Iσ0+H(ξi)]. | (2.3) |
Proof. Applying the right fractional integral operator IαT− to the integro-differential equation in (2.1), we get
y(t)=IαT−F(t)−λIα+ρT−Iσ0+H(t)−c0−c1t, | (2.4) |
where c0 and c1 are unknown arbitrary constants. Using (2.4) in the nonlocal closed boundary conditions of (2.1), we obtain
{(S1−1)c0+(S2+TS4−T)c1=S3+TS5,S6c0+(S7+TS9−T)c1=S8+TS10, | (2.5) |
where Si,i=1,…,10, are given in (2.3).
Solving the system (2.5) for c0 and c1, we find that
c0=1Δ[(S7+TS9−T)(S3+TS5)−(S2+TS4−T)(S8+TS10)],c1=1Δ[−S6(S3+TS5)+(S1−1)(S8+TS10)], |
where Δ is given in (2.3). Substituting the above values of c0 and c1 in (2.4) together with the notation (2.3), we obtain the solution (2.2). The converse of this lemma can be obtained by direct computation. This completes the proof.
This section is devoted to our main results concerning the existence and uniqueness of solutions for the problems (1.1) and (1.2).
In order to convert the problems (1.1) and (1.2) into a fixed point problem, we define an operator V:X→X by using Lemma 2.1 as follows:
Vy(t)=∫Tt(s−t)α−1Γ(α)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds+b1(t){m∑ı=1pi∫Tξi(s−ξi)α−1Γ(α)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds−Tm∑ı=1qi∫Tξi(s−ξ)α−2Γ(α−1)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds}+b2(t){m∑ı=1ri∫Tξi(s−ξi)α−1Γ(α)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds−Tm∑i=1vi∫Tξi(s−ξi)α−2Γ(α−1)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds},t∈J, | (3.1) |
where X=C([0,T],R) denotes the Banach space of all continuous functions from [0,T]→R equipped with the norm ‖y‖=sup{|y(t)|:t∈[0,T]}. Notice that the fixed point problem Vy(t)=y(t) is equivalent to the boundary value problems (1.1) and (1.2) and the fixed points of the operator V are its solutions.
In the forthcoming analysis, we use the following estimates:
∫Tt(s−t)α+ρ−1Γ(α+ρ)Iσ0+ds=∫Tt(s−t)α+ρ−1Γ(α+ρ)∫s0(s−u)σ−1Γ(σ)duds≤Tσ(T−t)α+ρΓ(σ+1)Γ(α+ρ+1),∫Tξi(s−ξi)α+ρ−1Γ(α+ρ)Iσ0+ds=∫Tξi(s−ξi)α+ρ−1Γ(α+ρ)∫s0(s−u)σ−1Γ(σ)duds≤Tσ(T−ξi)α+ρΓ(σ+1)Γ(α+ρ+1), |
where we have used uσ≤Tσ,ρ,σ>0.
In the sequel, we set
Ω1=1Γ(α+1){Tα+¯b1[m∑ı=1|pi|(T−ξi)α+αTm∑ı=1|qi|(T−ξi)α−1]+¯b2[m∑ı=1|ri|(T−ξi)α+αTm∑ı=1|vi|(T−ξi)α−1]},Ω2=|λ|TσΓ(σ+1)Γ(α+ρ+1){Tα+ρ+¯b1[m∑ı=1|pi|(T−ξi)α+ρ+(α+ρ)Tm∑ı=1|qi|(T−ξi)α+ρ−1]+¯b2[m∑ı=1|ri|(T−ξi)α+ρ+(α+ρ)Tm∑ı=1|vi|(T−ξi)α+ρ−1]}, | (3.2) |
where
¯b1=maxt∈[0,T]|b1(t)|,¯b2=maxt∈[0,T]|b2(t)|. |
In the following, Krasnosel'ski∨i's fixed point theorem [31] is applied to prove our first existence result for the problems (1.1) and (1.2).
Theorem 3.1. Assume that:
(H1) There exists L>0 such that |f(t,x)−f(t,y)|≤L|x−y|,∀t∈[0,T],x,y∈R;
(H2) There exists K>0 such that |h(t,x)−h(t,y)|≤K|x−y|,∀t∈[0,T],x,y∈R;
(H3) |f(t,y)|≤δ(t) and |h(t,y)|≤θ(t), where δ,θ∈C([0,T],R+).
Then, the problems (1.1) and (1.2) has at least one solution on [0,T] if Lγ1+Kγ2<1, where
γ1=TαΓ(α+1),γ2=|λ|Tα+ρ+σΓ(σ+1)Γ(α+ρ+1). | (3.3) |
Proof. Introduce the ball Bη={y∈X:‖y‖≤η}, with
η≥‖δ‖Ω1+‖θ‖Ω2. | (3.4) |
Now we verify the hypotheses of Krasnosel'ski∨i's fixed point theorem in three steps by splitting the operator V:X→X defined by (3.1) on Bη as V=V1+V2, where
V1y(t)=∫Tt(s−t)α−1Γ(α)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds,t∈J,V2y(t)=b1(t){m∑ı=1pi∫Tξi(s−ξi)α−1Γ(α)[f(s,y(s))ds−λIρT−Iσ0+h(s,y(s))]ds−Tm∑ı=1qi∫Tξi(s−ξ)α−2Γ(α−1)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds}+b2(t){m∑ı=1ri∫Tξi(s−ξi)α−1Γ(α)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds−Tm∑i=1vi∫Tξi(s−ξi)α−2Γ(α−1)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds},t∈J. |
(i) For y,x∈Bη, we have
‖V1y+V2x‖≤supt∈[0,T]{∫Tt(s−t)α−1Γ(α)[|f(s,y(s))|+|λ|IρT−Iσ0+|h(s,y(s))|]ds+|b1(t)|{m∑ı=1|pi|∫Tξi(s−ξi)α−1Γ(α)[|f(s,x(s))|+|λ|IρT−Iσ0+|h(s,x(s))|]ds+Tm∑ı=1|qi|∫Tξi(s−ξi)α−2Γ(α−1)[|f(s,x(s))|+|λ|IρT−Iσ0+|h(s,x(s))|]ds}+|b2(t)|{m∑ı=1|ri|∫Tξi(s−ξi)α−1Γ(α)[|f(s,x(s))|+|λ|IρT−Iσ0+|h(s,x(s))|]ds+Tm∑ı=1|vi|∫Tξi(s−ξi)α−2Γ(α−1)[|f(s,x(s))|+|λ|IρT−Iσ0+|h(s,x(s))|]ds}}≤‖δ‖supt∈[0,T]{∫Tt(s−t)α−1Γ(α)ds+|b1(t)|[m∑ı=1|pi|∫Tξi(s−ξi)α−1Γ(α)ds+Tm∑ı=1|qi|∫Tξi(s−ξi)α−2Γ(α−1)ds]+|b2(t)|[m∑ı=1|ri|∫Tξi(s−ξi)α−1Γ(α)ds+Tm∑ı=1|vi|∫Tξi(s−ξi)α−2Γ(α−1)ds]}+‖θ‖|λ|supt∈[0,T]{∫Tt(s−t)α+ρ−1Γ(α+ρ)Iσ0+ds+|b1(t)|[m∑ı=1∫Tξi(s−ξi)α+ρ−1Γ(α+ρ)Iσ0+ds+Tm∑ı=1|qi|∫Tξi(s−ξi)α+ρ−2Γ(α+ρ−1)Iσ0+ds]+|b2(t)|[m∑ı=1|ri|∫Tξi(s−ξi)α+ρ−1Γ(α+ρ)Iσ0+ds+Tm∑ı=1|vi|∫Tξi(s−ξi)α+ρ−2Γ(α+ρ−1)Iσ0+ds]}≤‖δ‖supt∈[0,T]{(T−t)αΓ(α+1)+|b1(t)|[m∑ı=1|pi|(T−ξi)αΓ(α+1)+Tm∑ı=1|qi|(T−ξi)α−1Γ(α)]+|b2(t)|[m∑ı=1|ri|(T−ξi)αΓ(α+1)+Tm∑ı=1|vi|(T−ξi)α−1Γ(α)]}+‖θ‖|λ|TσΓ(σ+1)supt∈[0,T]{(T−t)α+ρΓ(α+ρ+1)ds+|b1(t)|[m∑ı=1(T−ξi)α+ρΓ(α+ρ+1)+Tm∑ı=1|qi|(T−ξi)α+ρ−1Γ(α+ρ)]+|b2(t)|[m∑ı=1|ri|(T−ξi)α+ρΓ(α+ρ+1)+Tm∑ı=1|vi|(T−ξi)α+ρ−1Γ(α+ρ)]}≤‖δ‖Γ(α+1){Tα+¯b1[m∑ı=1|pi|(T−ξi)α+αTm∑ı=1|qi|(T−ξi)α−1]+¯b2[m∑ı=1|ri|(T−ξi)α+αTm∑ı=1|vi|(T−ξi)α−1]}+‖θ‖|λ|TσΓ(σ+1)Γ(α+ρ+1){Tα+ρ+¯b1[m∑ı=1|pi|(T−ξi)α+ρ+(α+ρ)Tm∑ı=1|qi|(T−ξi)α+ρ−1]+¯b2[m∑ı=1|ri|(T−ξi)α+ρ+(α+ρ)Tm∑ı=1|vi|(T−ξi)α+ρ−1]}≤‖β‖Ω1+‖θ‖Ω2<η, |
where we used (3.4). Thus V1y+V2x∈Bη.
(ii) Using (H1) and (H2), it is easy to show that
‖V1y−V1x‖≤supt∈[0,T]{∫Tt(s−t)α−1Γ(α)|f(s,y(s))−f(s,x(s))|ds+|λ|∫Tt(s−t)α+ρ−1Γ(α+ρ)Iσ0+|h(s,y(s))−h(s,x(s))|ds}≤(Lγ1+Kγ2)‖y−x‖, |
which, in view of the condition Lγ1+Kγ2<1, implies that the operator V1 is a contraction.
(iii) Continuity of the functions f,h implies that the operator V2 is continuous. In addition, V2 is uniformly bounded on Bη as
‖V2y‖≤supt∈[0,T]{|b1(t)|[m∑ı=1|pi|∫Tξi(s−ξi)α−1Γ(α)|f(s,y(s))|ds+|λ|m∑ı=1|pi|∫Tξi(s−ξi)α+ρ−1Γ(α+ρ)Iσ0+|h(s,y(s))|ds+Tm∑ı=1|qi|∫Tξi(s−ξi)α−2Γ(α−1)|f(s,y(s))|ds+|λ|Tm∑ı=1|qi|∫Tξi(s−ξi)α+ρ−2Γ(α+ρ−1)Iσ0+|h(s,y(s))|ds]+|b2(t)|[m∑ı=1|ri|∫Tξi(s−ξi)α−1Γ(α)|f(s,y(s))|+|λ|m∑ı=1|ri|∫Tξi(s−ξi)α+ρ1(α+ρ)Iσ0+|h(s,y(s))|ds+Tm∑ı=1|vi|∫Tξi(s−ξi)α−2Γ(α−1)|f(s,y(s))|ds+|λ|Tm∑ı=1|vi|∫Tξi(s−ξi)α+ρ−2)Γ(α+ρ−1)|h(s,y(s))|ds]}≤‖δ‖supt∈[0,T]{|b1(t)|[m∑ı=1|pi|∫Tξi(s−ξi)α−1Γ(α)ds+Tm∑ı=1|qi|∫Tξi(s−ξi)α−2Γ(α−1)ds]+|b2(t)|[m∑ı=1|ri|∫Tξi(s−ξi)α−1Γ(α)ds+Tm∑ı=1|vi|∫Tξi(s−ξi)α−2Γ(α−1)ds]}+|λ|‖θ‖supt∈[0,T]{|b1(t)|[m∑ı=1|pi|∫Tξi(s−ξi)α+ρ−1Γ(α+ρ)Iσ0+ds+Tm∑ı=1|qi|∫Tξi(s−ξi)α+ρ−2Γ(α+ρ−1)Iσ0+ds]+|b2(t)|[m∑ı=1|ri|∫Tξi(s−ξi)α+ρ−1Γ(α+ρ)Iσ0+ds+Tm∑ı=1|vi|∫Tξi(s−ξi)α+ρ−2)Γ(α+ρ−1)Iσ0+ds]}≤‖δ‖supt∈[0,T]{|b1(t)|[m∑ı=1|pi|(T−ξi)αΓ(α+1)+Tm∑ı=1|qi|(T−ξi)α−1Γ(α)]+|b2(t)|[m∑ı=1|ri|(T−ξi)αΓ(α+1)+Tm∑ı=1|vi|(T−ξi)α−1Γ(α)]+|λ|‖θ‖TσΓ(σ+1)supt∈[0,T]{|b1(t)|[m∑ı=1|pi|(T−ξi)α+ρΓ(α+ρ+1)+Tm∑ı=1|qi|(T−ξi)α+ρ−1Γ(α+ρ)]+|b2(t)|[m∑ı=1|ri|(T−ξi)α+ρΓ(α+ρ+1)+Tm∑ı=1|vi|(T−ξi)α+ρ−1)Γ(α+ρ)]}≤‖δ‖(Ω1−γ1)+‖θ‖(Ω2−γ2), |
where Ωi, and γi, i=1,2, are defined in (3.2) and (3.3), respectively. To show the compactness of V2, we fix sup(t,y)∈[0,T]×Bη|f(t,y)|=¯f, sup(t,y)∈[0,T]×Bη|h(t,y)|=¯h. Then, for 0<t1<t2<T, we have
|(V2y)(t2)−(V2y)(t1)|≤|b1(t2)−b1(t1)|{m∑ı=1|pi|∫Tξi(s−ξi)α−1Γ(α)[|f(s,y(s))|+|λ|IρT−Iσ0+|h(s,y(s))|]ds+Tm∑ı=1|qi|∫Tξi(s−ξi)α−2Γ(α−1)[|f(s,y(s))|+|λ|IρT−Iσ0+|h(s,y(s))|]ds}+|b2(t2)−b2(t1)|{m∑ı=1|ri|∫Tξ(s−ξ)α−1Γ(α)[|f(s,y(s))|+λ|IρT−Iσ0+|h(s,y(s))|ds]+Tm∑ı=1|vi|∫Tξi(s−ξi)α−2Γ(α−1)[|f(s,y(s))|+|λ|IρT−Iσ0+|h(s,y(s))|]ds}≤|S6||t2−t1||Δ|{¯fΓ(α+1)[m∑ı=1|pi|(T−ξi)α+αTm∑i=1|qi|(T−ξi)α−1]+¯h|λ|TσΓ(σ+1)Γ(α+ρ+1)[m∑ı=1|pi|(T−ξi)α+ρ+(α+ρ)Tm∑i=1|qi|(T−ξi)α+ρ−1]}+|S1−1||t2−t1||Δ|{¯fΓ(α+1)[m∑ı=1|ri|(T−ξi)α+αTm∑i=1|vi|(T−ξi)α−1]+¯h|λ|TσΓ(σ+1)Γ(α+ρ+1)[m∑ı=1|ri|(T−ξi)α+ρ+(α+ρ)Tm∑i=1|vi|(T−ξi)α+ρ−1]}, |
which tends to zero, independent of y, as t2→t1. This shows that V2 is equicontinuous. It is clear from the foregoing arguments that the operator V2 is relatively compact on Bη. Hence, by the Arzelá-Ascoli theorem, V2 is compact on Bη.
In view of the foregoing arguments (i)–(iii), the hypotheses of the Krasnosel'ski∨i's fixed point theorem [31] are satisfied. Hence, the operator V1+V2=V has a fixed point, which implies that the problems (1.1) and (1.2) has at least one solution on [0,T]. The proof is finished.
Remark 3.1. Interchanging the roles of the operators V1 and V2 in the previous result, the condition Lγ1+Kγ2<1 changes to the following one:
L(Ω1−γ1)+K(Ω2−γ2)<1, |
where Ω1,Ω2 and γ1,γ2 are defined in (3.2) and (3.3) respectively.
The following existence result relies on Leray-Schauder nonlinear alternative [32].
Theorem 3.2. Suppose that the following conditions hold:
(H4) There exist continuous nondecreasing functions ϕ1,ϕ2:[0,∞)→(0,∞) such that ∀(t,y)∈[0,1]×R, |f(t,y)|≤ω1(t)ϕ1(‖y‖) and |h(t,y)|≤ω2(t)ϕ2(‖y‖), where ω1,ω2∈C([0,T],R+);
(H5)There exists a constant M>0 such that
M‖ω1‖ϕ1(M)Ω1+‖ω2‖ϕ2(M)Ω2>1. |
Then, the problems (1.1) and (1.2) has at least one solution on [0,T].
Proof. We firstly show that the operator V:X→X defined by (3.1) is completely continuous.
(i) V maps bounded sets into bounded sets in X.
Let y∈Br={y∈X:‖y‖≤r}, where r is a fixed number. Then, using the strategy employed in the proof of Theorem 3.1, we obtain
‖Vy‖≤‖ω1‖ϕ1(r)Γ(α+1){Tα+¯b1[m∑ı=1|pi|(T−ξi)α+αTm∑ı=1|qi|(T−ξi)α−1]+¯b2[m∑ı=1|ri|(T−ξi)α+αTm∑ı=1|vi|(T−ξi)α−1]}+|λ|Tσ‖ω2‖ϕ2(r)Γ(σ+1)Γ(α+ρ+1){Tα+ρ+¯b1[m∑ı=1|pi|(T−ξi)α+ρ+(α+ρ)Tm∑ı=1|qi|(T−ξi)α+ρ−1]+¯b2[m∑ı=1|ri|(T−ξi)α+ρ+(α+ρ)Tm∑ı=1|vi|(T−ξi)α+ρ−1]}=‖ω1‖ϕ1(r)Ω1+‖ω2‖ϕ2(r)Ω2<∞. |
(ii) V maps bounded sets into equicontinuous sets.
Let 0<t1<t2<T and y∈Br. Then, we obtain
|Vy(t2)−Vy(t1)|≤|∫Tt2(s−t2)α−1−(s−t1)α−1Γ(α)f(s,y(s))ds+∫t2t1(s−t1)α−1Γ(α)f(s,y(s))ds−λ∫Tt2(s−t2)α+ρ−1−(s−t1)α+ρ−1Γ(α+ρ)Iσ0+h(s,y(s))ds−λ∫t2t1(s−t1)α+ρ−1Γ(α+ρ)Iσ0+h(s,y(s))ds|+|b1(t2)−b1(t1)|{|m∑ı=1pi∫Tξi(s−ξ)α−1Γ(α)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds|+|Tm∑ı=1qi∫Tξi(s−ξi)α−2Γ(α−1)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds|}+|b2(t2)−b2(t1)|{|m∑ı=1ri∫Tξi(s−ξ)α−1Γ(α)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds|+|Tm∑ı=1vi∫Tξi(s−ξi)α−2Γ(α−1)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds|}≤|∫Tt2(s−t2)α−1−(s−t1)α−1Γ(α)f(s,y(s))ds+∫t2t1(s−t1)α−1Γ(α)f(s,y(s))ds|+|λ∫Tt2(s−t2)α+ρ−1−(s−t1)α+ρ−1Γ(α+ρ)Iσ0+h(s,y(s))ds+λ∫t2t1(s−t1)α+ρ−1Γ(α+ρ)Iσ0+h(s,y(s))ds|+|S6||t2−t1|Δ|{|m∑ı=1pi∫Tξi(s−ξi)α−1Γ(α)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds|+|Tm∑ı=1qi∫Tξi(s−ξi)α−2Γ(α−1)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds|}+|S1−1||t2−t1|Δ{|m∑ı=1ri∫Tξi(s−ξi)α−1Γ(α)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds|+|Tm∑ı=1vi∫Tξi(s−ξi)α−2Γ(α−1)[f(s,y(s))−λIρT−Iσ0+h(s,y(s))]ds|}≤ω1(t)Φ1(r)Γ(α+1){|(T−t2)α−(T−t1)α|+2|(t2−t1)α|+|t2−t1||Δ|[|S6|(m∑ı=1|pi|(T−ξi)α+αTm∑ı=1|qi|(T−ξi)α−1)+|S1−1|(m∑ı=1|ri|(T−ξi)α+αTm∑ı=1|vi|(T−ξi)α−1)]}+|λ|Tσω2(t)ϕ2(r)Γ(σ+1)Γ(α+ρ+1){|(T−t2)α+ρ−(T−t1)α+ρ+2|t2−t1|α+ρ+|t2−t1||Δ|[|S6|(m∑ı=1|pi|(T−ξi)α+ρ+(α+ρ)Tm∑ı=1|qi|(T−ξi)α+ρ−1)+|S1−1|(m∑ı=1|ri|(T−ξi)α+ρ+(α+ρ)Tm∑ı=1|vi|(T−ξi)α+ρ−1)]}. |
Notice that the right-hand side of the above inequality tends to 0 as t2→t1, independent of y∈Br. Thus, it follows by the Arzelá–Ascoli theorem that the operator V:X→X is completely continuous.
The conclusion of the Leray-Schauder nonlinear alternative [32] will be applicable once it is shown that there exists an open set U⊂C([0,T],R) with y≠νVy for ν∈(0,1) and y∈∂U. Let y∈C([0,T],R) be such that y=νVy for ν∈(0,1). As argued in proving that the operator V is bounded, one can obtain that
|y(t)|=|νVy(t)|≤|ω1(t)|ϕ(‖y‖)Ω1+|ω2(t)|ψ(‖y‖)Ω2, |
which can be written as
‖y‖‖ω1‖ϕ(‖y‖)Ω1+‖ω2‖ψ(‖y‖)Ω2≤1. |
On the other hand, we can find a positive number M such that ‖y‖≠M by assumption (H5). Let us set
W={y∈X:‖y‖<M}. |
Clearly, ∂W contains a solution only when ‖y‖=M. In other words, we cannot find a solution y∈∂W satisfying y=νVy for some ν∈(0,1). In consequence, the operator V has a fixed point y∈¯W, which is a solution of the problems (1.1) and (1.2). The proof is finished.
Here we apply Banach contraction mapping principle to establish the uniqueness of solutions for the problems (1.1) and (1.2).
Theorem 3.3. If the conditions (H1) and (H2) hold, then the problems (1.1) and (1.2) has a unique solution on [0,T] if
LΩ1+KΩ2<1, | (3.5) |
where Ω1 and Ω2 are defined in (3.2).
Proof. In the first step, we show that VBκ⊂Bκ, where Bκ={y∈X:‖y‖≤κ} with
κ≥f0Ω1+h0Ω21−(LΩ1+KΩ2),f0=supt∈[0,T]|f(t,0)|,h0=supt∈[0,T]|h(t,0)|. |
For y∈Bκ and using the condition (H1), we have
|f(t,y)|=|f(t,y)−f(t,0)+f(t,0)|≤|f(t,y)−f(t,0)|+|f(t,0)|≤L‖y‖+f0≤Lr+f0. | (3.6) |
Similarly, using (H2), we get
|h(t,y)|≤Kr+h0. | (3.7) |
In view of (3.6) and (3.7), we obtain
‖Vy‖≤supt∈[0,T]|Vy(t)|≤supt∈[0,T]{∫Tt(s−t)α−1Γ(α)[|f(s,y(s))|+|λ|IρT−Iσ0+|h(s,y(s))|]ds+|b1(t)|{m∑ı=1pi∫Tξi(s−ξi)α−1Γ(α)[|f(s,y(s))|+|λ|IρT−Iσ0+|h(s,y(s))|]ds+Tm∑ı=1|qi|∫Tξi(s−ξi)α−2Γ(α−1)[|f(s,y(s))|+|λ|IρT−Iσ0+|h(s,y(s))|]ds}+|b2(t)|{m∑ı=1ri∫Tξi(s−ξi)α−1Γ(α)[|f(s,y(s))|+|λ|IρT−Iσ0+|h(s,y(s))|]ds+Tm∑i=1|vi|∫Tξi(s−ξi)α−2Γ(α−1)[|f(s,y(s))|+|λ|IρT−Iσ0+|h(s,y(s))|]ds}}≤(Lr+f0)supt∈[0,T]{∫Tt(s−t)α−1Γ(α)ds+|b1(t)|[m∑i=1|pi|∫Tξi(s−ξi)α−1Γ(α)ds+Tm∑ı=1|qi|∫Tξi(s−ξi)α−2Γ(α−1)ds]+|b2(t)|[m∑i=1|ri|∫Tξi(s−ξi)α−1Γ(α)ds+Tm∑ı=1|vi|∫Tξi(s−ξi)α−2Γ(α−1)ds]}+|λ|(Kr+h0)supt∈[0,T]{∫Tt(s−t)α+ρ−1Γ(α+ρ)Iσ0+ds+|b1(t)|[m∑i=1|pi|∫Tξi(s−ξi)α+ρ−1Γ(α+ρ)Iσ0+ds+Tm∑ı=1|qi|∫Tξi(s−ξi)α+ρ−2Γ(α+ρ−1)Iσ0+ds]+|b2(t)|[m∑i=1|ri|∫Tξi(s−ξi)α+ρ−1Γ(α+ρ)Iσ0+ds+Tm∑ı=1|vi|∫Tξi(s−ξi)α+ρ−2Γ(α+ρ−1)Iσ0+ds]}≤(Lr+f0)Γ(α+1){Tα+¯b1[m∑ı=1|pi|(T−ξi)α+αTm∑ı=1|qi|(T−ξi)α−1]+¯b2[m∑ı=1|ri|(T−ξi)α+αTm∑ı=1|vi|(T−ξi)α−1]}+Tσ|λ|(Kr+h0)Γ(σ)Γ(α+ρ+1){Tα+ρ+¯b1[m∑ı=1|pi|(T−ξi)α+ρ+(α+ρ)Tm∑ı=1|qi|(T−ξi)α+ρ−1]+¯b2[m∑ı=1|ri|(T−ξi)α+ρ+(α+ρ)Tm∑ı=1|vi|(T−ξi)α+ρ−1]}=(Lr+f0)Ω1+(Kr+h0)Ω2<κ, |
which implies that Vy∈Bκ, for any y∈Bκ. Therefore, VBκ⊂Bκ.
Next, we prove that V is a contraction. For that, let x, y \in \mathcal{X} and t\in[0, T] . Then, by the conditions (H_1) and (H_2) , we obtain
\begin{eqnarray*} &&\|\mathcal{V}y-\mathcal{V}x\| = \sup\limits_{t\in [0,T]}\big|(\mathcal{V}y)(t)-(\mathcal{V}x)(t)\big| \\&\leq& \sup\limits_{t\in [0,T]}\bigg\{\int_t^T\frac{(s-t)^{\alpha-1}}{\Gamma (\alpha)}|f(s,y(s))-f(s,x(s))|ds \\&& +|\lambda|\int_t^T \frac{(s-t)^{\alpha+\rho-1}}{\Gamma (\alpha+\rho)}I^{\sigma}_{0+}|h(s,y(s))-h(s,x(s))|ds\\&& +|b_1(t)|\bigg[\sum\limits_{ı = 1}^m|p_i|\bigg(\int_{\xi_i}^T\frac{(s-\xi_i)^{\alpha-1}}{\Gamma(\alpha)}|f(s,y(s))-f(s,x(s))|ds\\&& +|\lambda|\int_{\xi_i}^T\frac{(s-\xi_i)^{\alpha+\rho-1}}{\Gamma(\alpha+\rho)}I^{\sigma}_{0+}|h(s,y(s))-h(s,x(s))|ds\bigg)\\&& +T\sum\limits_{ı = 1}^m|q_i|\bigg(\int_{\xi_i}^T\frac{(s-\xi_i)^{\alpha-2}}{\Gamma(\alpha-1)}|f(s,y(s))-f(s,x(s))|ds\\&& +|\lambda|\int_{\xi_i}^T\frac{(s-\xi_i)^{\alpha+\rho-2}}{\Gamma(\alpha+\rho-1)}I^{\sigma}_{0+}|h(s,y(s))-h(s,x(s))|ds\bigg)\bigg]\\&& +|b_2(t)|\bigg[\sum\limits_{ı = 1}^m|r_i|\bigg(\int_{\xi_i}^T\frac{(s-\xi_i)^{\alpha-1}}{\Gamma(\alpha)}|f(s,y(s))-f(s,x(s))|ds\\&& +|\lambda|\int_{\xi_i}^T\frac{(s-\xi_i)^{\alpha+\rho-1}}{\Gamma(\alpha+\rho)}I^{\sigma}_{0+}|h(s,y(s))-h(s,x(s))|ds\bigg)\\&& +T\sum\limits_{ı = 1}^m|v_i|\bigg(\int_{\xi_i}^T\frac{(s-\xi_i)^{\alpha-2}}{\Gamma(\alpha-1)}|f(s,y(s))-f(s,x(s))|ds\\&& +|\lambda|\int_{\xi_i}^T\frac{(s-\xi_i)^{\alpha+\rho-2}}{\Gamma(\alpha+\rho-1)}I^{\sigma}_{0+}|h(s,y(s))-h(s,x(s))|ds\bigg)\bigg]\Bigg\} \\&\leq&\; \frac{\mathcal{L} }{\Gamma (\alpha+1)}\bigg\{T^{\alpha}+\overline{b}_1\Big[\sum\limits_{ı = 1}^m |p_i|(T-\xi_i)^{\alpha}+\alpha T\sum\limits_{ı = 1}^m|q_i|(T-\xi_i)^{\alpha-1}\Big]\\&& +\overline{b}_2\Big[\sum\limits_{ı = 1}^m|r_i|(T-\xi_i)^{\alpha}+\alpha T\sum\limits_{ı = 1}^m|v_i|(T-\xi_i)^{\alpha-1}\Big] \bigg\}\\&& +\frac{T^\sigma|\lambda|\mathcal{K}}{\Gamma(\sigma+1)\Gamma(\alpha+\rho+1)}\bigg\{T^{\alpha+\rho}+\overline{b}_1\Big[\sum\limits_{ı = 1}^m |p_i|(T-\xi_i)^{\alpha+\rho}+(\alpha+\rho) T\sum\limits_{ı = 1}^m|q_i|(T-\xi_i)^{\alpha+\rho-1}\Big]\\&& +\overline{b}_2\Big[\sum\limits_{ı = 1}^m|r_i|(T-\xi_i)^{\alpha+\rho}+(\alpha+\rho) T\sum\limits_{ı = 1}^m|v_i|(T-\xi_i)^{\alpha+\rho-1}\Big] \bigg\} \|y-x\|\\ \\& = &(\mathcal{L}\Omega_1+\mathcal{K}\Omega_2)\|y-x\|, \end{eqnarray*} |
which shows that \mathcal{V} is a contraction in view of the condition (3.5). Therefore, we deduce by Banach contraction mapping principle that there exists a unique fixed point for the operator \mathcal{V} , which corresponds to a unique solution for the problems (1.1) and (1.2) on [0, T] . The proof is completed.
In this subsection, we construct examples for illustrating the abstract results derived in the last two subsections. Let us consider the following problem:
\begin{equation} \left\{\begin{array} {ll} &D^{9/8}_{1-}y(t)+3I^{7/3}_{1-}I^{3/4}_{0+}h(t,y(t)) = f(t,y(t)),\ t\in J: = [0,1],\\ & y(T) = \sum\limits_{ı = 1}^3 p_iy(\xi_i)+\sum\limits_{ı = 1}^3 q_iy'(\xi_i), \, y'(T) = \sum\limits_{ı = 1}^3 r_i y(\xi_i)+\sum\limits_{ı = 1}^3 v_iy'(\xi_i),\; ,\; 0 < \xi_i < 1. \end{array} \right. \end{equation} | (3.8) |
Here \alpha = 9/8, \rho = 7/3, \sigma = 3/4, \lambda = 3, \xi_1 = 3/7, \xi_2 = 2/3, \xi_3 = 4/5, p_1 = 1/2, p_2 = 1/3, p_3 = 1/4, q_1 = -2, q_2 = -3, q_3 = -4, r_1 = 1, r_2 = -1, r_3 = 3, v_1 = -2/7, v_2 = -3/7, v_3 = -4/7. Using the given data, it is found that
\overline{b}_1 = \max\limits_{t\in [0,1]}|b_1(t)| = |b_1(t)|_{t = 1} \approx 0.1112461491, \; \; \; \overline{b}_2 = \max\limits_{t\in [0,1]}|b_2(t)| = |b_2(t)|_{t = 1}\approx 0.3364235041. |
In consequence, we get \Omega_1\approx 2.517580993, \Omega_2\approx 0.3543113654 ( \Omega_1 , \Omega_2 are defined in (3.2)).
(i) For illustrating Theorem 3.1, we consider the functions
\begin{equation} f(t,y) = \frac{m_1}{2t+25}\Big(\frac{y^2}{1+y^2}+\cos 3t+1\Big), \; \; h(t,y) = \frac{m_2}{3\sqrt{t^2+64}}\bigg(2\tan^{-1}y+\sin t+e^{-t/2}\bigg), \end{equation} | (3.9) |
where m_1 and m_2 are finite positive real numbers. Observe that
|f(t,y)|\leq \delta(t) = \frac{m_1(2+\cos 3t)}{2t+25}, \; \; \; \; \; |h(t,y)|\leq \theta(t) = \frac{m_2(\pi+\sin t+e^{-t/2})}{3\sqrt{t^2+64}}, |
and f(t, y) and h(t, y) respectively satisfy the conditions (H_1) and (H_2) with \mathcal{L} = 2m_1/25 and \mathcal{K} = m_2/24. Moreover, \gamma_1 \approx0.9438765902 and \gamma_2 \approx 0.2972831604. By the condition \mathcal{L}\gamma_1+\mathcal{K}\gamma_2 < 1 , we get
\begin{equation} 0.0755101272 m_1+0.0123867984 m_2 < 1 \end{equation} | (3.10) |
For the values of m_1 and m_2 satisfying the inequality (3.10), the hypothesis of Theorem 3.1 is satisfied. Hence, it follows by the conclusion of Theorem 3.1 that the problem (3.8) with f(t, y) and h(t, y) given in (3.9) has at least one solution on [0, 1]. If the values m_1 and m_2 do not satisfy the inequality (3.10), then Theorem 3.1 does not guarantee the existence of at least one solution to the problem (3.8) with f(t, y) and h(t, y) given in (3.9) for such values of m_1 and m_2 .
(ii) In order to illustrate Theorem 3.2, we take the following functions (instead of (3.9)) in the problem (3.8):
\begin{equation} f(t,y) = \frac{e^{-3t}}{t^2+3}\big[\sin y+1/5\big], \; \; \; \; \; h(t,y) = \frac{2}{7\sqrt{t^3+1}}\Big(\frac{|y|}{1+|y|}|y|+\pi/4\Big). \end{equation} | (3.11) |
Observe that the assumption (H_4) is satisfied as |f(t, y)| \le \omega_1(t) \phi_1(\|y\|) and |h(t, y)| \le \omega_2(t) \phi_2(\|y\|), where \omega_1(t) = e^{-3t}/(t^2+3) , \phi_1(\|y\|) = (\|y\|+1/5), \omega_2(t) = 2/(7\sqrt{t^3+1}) , \phi_2(\|y\|) = (\|y\|+\pi/4). It is easy to see that \| \omega_1\| = 1/3 and \omega_2\| = 2/7. By the condition ( H_5 ), we find that M > 4.151876169 . Thus, all the conditions of Theorem 3.2 are satisfied and hence the problem (3.8) with f(t, y) and h(t, y) given by (3.11) has at least one solution on [0, 1].
(iii) The conditions (H_1) and (H_2) are respectively satisfied by f(t, y) and h(t, y) defined in (3.9) with \mathcal{L} = 2m_1/25 and \mathcal{K} = m_2/24. By the condition (3.5), we have
\begin{equation} 0.20140647944 m_1+0.0147629736 m_2 < 1. \end{equation} | (3.12) |
Clearly, all the assumptions of Theorem 3.3 hold true with the values of m_1 and m_2 satisfying the inequality (3.12). In consequence, the problem (3.8) with f(t, y) and h(t, y) given in (3.11) has a unique solution on [0, 1]. In case, we take m_1 = m_2 = m in (3.9), then the condition (3.12) implies the existence of a unique solution for the problem at hand for m < 4.62600051. One can notice that Theorem 3.1 does not guarantee the existence of a unique solution to the problem (3.8) with f(t, y) and h(t, y) given in (3.9) for the values of m_1 and m_2, which do not satisfy the inequality (3.12).
In this study, we discussed the existence and uniqueness of solutions under different assumptions for a boundary value problem involving a right Caputo fractional derivative with usual and mixed Riemann-Liouville integrals type nonlinearities, equipped with nonlocal multipoint version of the closed boundary conditions. Our results are not only new in the given configuration, but also yield some new results as special cases. Here are some examples.
● If \lambda = 0 in (1.1), then our results correspond to the fractional differential equation {^CD^{\alpha}_{T-}}y(t) = f(t, y(t)) with the boundary conditions (1.2).
● In case, we take q_i = 0, r_i = 0, \forall i = 1, \dots, m in the results of this paper, we obtain the ones for the Eq (1.1) supplemented with boundary conditions: y(T) = \sum\limits_{ı = 1}^m p_iy(\xi_i), \; \; y'(T) = \sum\limits_{ı = 1}^m v_iy'(\xi_i).
● We get the results for the Eq (1.1) complemented with boundary conditions: y(T) = T\sum\limits_{ı = 1}^m q_iy'(\xi_i), \; \; Ty'(T) = \sum\limits_{ı = 1}^m r_i y(\xi_i) by taking p_i = 0, v_i = 0, \, \forall i = 1, \dots, m in the obtained results.
The Deanship of Scientific Research (DSR) at King Abdulaziz University (KAU), Jeddah, Saudi Arabia, has funded this project under grant No. (KEP-PhD: 35-130-1443).
The authors declare no conflict of interest.
[1] | R. Kaewpuang, M. Xu, D. Niyato, H. Yu, Z. Xiong, J. Kang, Stochastic Qubit Resource Allocation for Quantum Cloud Computing, NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium, Miami, FL, USA, 2023, 1–5. https://doi.org/10.1109/NOMS56928.2023.10154430 |
[2] |
H. Alyami, M. Nadeem, A. Alharbi, W. Alosaimi, M. T. J. Ansari, D. Pandey, et al., The evaluation of software security through quantum computing techniques: A durability perspective, Appl. Sci., 11 (2021), 11784. https://doi.org/10.3390/app112411784 doi: 10.3390/app112411784
![]() |
[3] |
S. H. Almotiri, M. Nadeem, M. A. Al Ghamdi, R. A. Khan, Analytic review of healthcare software by using quantum computing security techniques, IJFIS, 23 (2023), 336–352. https://doi.org/10.5391/IJFIS.2023.23.3.336 doi: 10.5391/IJFIS.2023.23.3.336
![]() |
[4] | D. Koo, Y. Shin, J. Yun, J. Hur, A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg, 2016,285–293. https://doi.org/10.1109/CloudCom.2016.0054 |
[5] |
L. Zhao, Privacy-preserving distributed analytics in Fog-Enabled IoT systems, Sensors, 20 (2020), 6153. https://doi.org/10.3390/s20216153 doi: 10.3390/s20216153
![]() |
[6] |
K. Xue, J. Hong, Y. Ma, D. S. L. Wei, P. Hong, N. Yu, Fog-Aided verifiable privacy preserving access control for latency-sensitive data sharing in vehicular cloud computing, IEEE Network, 32 (2018), 7–13. https://doi.org/10.1109/MNET.2018.1700341 doi: 10.1109/MNET.2018.1700341
![]() |
[7] |
H. Wang, Z. Wang, J. D. Ferrer, Anonymous and secure aggregation scheme in fog-based public cloud computing, Future Gener. Comp. Sy., 78 (2018), 712–719. https://doi.org/10.1016/j.future.2017.02.032 doi: 10.1016/j.future.2017.02.032
![]() |
[8] |
J. Zhao, F. Huang, L. Liao, Q. Zhang, Blockchain-based trust management model for vehicular Ad Hoc networks, IEEE Internet Things, 1, (2023), 1–10. https://doi.org/10.1109/JIOT.2023.3318597 doi: 10.1109/JIOT.2023.3318597
![]() |
[9] |
J. Zhao, H. Hu, F. Huang, Y. Guo, L. Liao, Authentication technology in internet of things and privacy security issues in typical application scenarios, Electronics, 12 (2023), 1812. https://doi.org/10.3390/electronics12081812 doi: 10.3390/electronics12081812
![]() |
[10] |
L. Liao, J. Zhao, H. Hu, X. Sun, Secure and efficient message authentication scheme for 6G-Enabled VANETs, Electronics, 11 (2022), 2385. https://doi.org/10.3390/electronics11152385 doi: 10.3390/electronics11152385
![]() |
[11] |
R. Lu, K. Heung, A. H. Lashkari, A. A. Ghorbani, A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT, IEEE Access, 5 (2017), 3302–3312. https://doi.org/10.1109/ACCESS.2017.2677520 doi: 10.1109/ACCESS.2017.2677520
![]() |
[12] | A. Rauf, R. A. Shaikh, A. Shah, Security and privacy for IoT and fog computing paradigm, 2018 15th Learning and Technology Conference (L & T), Jeddah, Saudi Arabia, 2018, 96–101. https://doi.org/10.1109/LT.2018.8368491 |
[13] | T. D. Dang, D. Hoang, A data protection model for fog computing, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), Valencia, Spain, 2017, 32–38. https://doi.org/10.1109/FMEC.2017.7946404 |
[14] |
P. Zhang, Z. Chen, J. K. Liu, K. Liang, H. Liu, An efficient access control scheme with outsourcing capability and attribute update for fog computing, Future Gener. Comp. Sy., 78 (2018), 753–762. https://doi.org/10.1016/j.future.2016.12.015 doi: 10.1016/j.future.2016.12.015
![]() |
[15] |
K. Vohra, M. Dave, Multi-authority attribute-based data access control in fog computing, Procedia Comput. Sci., 132 (2018), 1449–1457. https://doi.org/10.1016/j.procs.2018.05.078 doi: 10.1016/j.procs.2018.05.078
![]() |
[16] |
M. Xiao, J. Zhou, X. Liu, M. Jiang, A hybrid scheme for Fine-Grained search and access authorization in fog computing environment, Sensors, 17 (2017), 1423. https://doi.org/10.3390/s17061423 doi: 10.3390/s17061423
![]() |
[17] |
I. Stojmenovic, S. Wen, X. Huang, H. Luan, An overview of Fog computing and its security issues, Concurr. Comput. Pract. Exp., 28 (2016), 2991–3005. https://doi.org/10.1002/cpe.3485 doi: 10.1002/cpe.3485
![]() |
[18] |
S. Homayoun, A. Dehghantanha, M. Ahmadzadeh, S. Hashemi, R. Khayami, K. Raymond Choo, DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer, Future Gener. Comp. Sy., 90 (2019), 94–104. https://doi.org/10.1016/j.future.2018.07.045 doi: 10.1016/j.future.2018.07.045
![]() |
[19] |
K. Sahu, F. A. Alzahrani, R. K. Srivastava, R. Kumar, Hesitant fuzzy sets based symmetrical model of decision-making for estimating the durability of web application, Symmetry, 12 (2020), 1770. https://doi.org/10.3390/sym12111770 doi: 10.3390/sym12111770
![]() |
[20] |
S. A. Khan, M. Alenezi, A. Agrawal, R. Kumar, R. A. Khan, Evaluating performance of software durability through an integrated fuzzy-based symmetrical method of ANP and TOPSIS, Symmetry, 12 (2020), 493. https://doi.org/10.3390/sym12040493 doi: 10.3390/sym12040493
![]() |
[21] |
P. C. Pathak, M. Nadeem, S. A. Ansar, Security assessment of operating system by using decision making algorithms, Int. J. Inf. Tecnol., 9 (2024), 1–11. https://doi.org/10.1007/s41870-023-01706-9 doi: 10.1007/s41870-023-01706-9
![]() |
[22] |
B. A. Mozzaquatro, C. Agostinho, D Goncalves, J. Martins, R. Jardim-Goncalves, An ontology-based cybersecurity framework for the internet of things, Sensors, 18 (2018), 3053. https://doi.org/10.3390/s18093053 doi: 10.3390/s18093053
![]() |
[23] | J. Kaur, A. Agrawal, R. A. Khan, Security assessment in Foggy Era through analytical hierarchy process, 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India, 2020, 1–6. https://doi.org/10.1109/ICCCNT49239.2020.9225308 |
[24] |
R. Verma, S. Chandra, Interval-valued intuitionistic fuzzy-analytic hierarchy process for evaluating the impact of security attributes in fog-based internet of things paradigm, Comput. Commun., 175 (2021), 35–46. https://doi.org/10.1016/j.comcom.2021.04.019 doi: 10.1016/j.comcom.2021.04.019
![]() |
[25] |
J. Kaur, A. Agrawal, R. A. Khan, Security Issues in Fog Environment: A Systematic Literature Review, Int. J. Wireless Inf. Networks, 27 (2020), 467–483. https://doi.org/10.1007/s10776-020-00491-7 doi: 10.1007/s10776-020-00491-7
![]() |
[26] |
J. Kaur, A. I. Khan, Y. B. Abushark, M. M. Alam, S. A. Khan, A. Agrawal, et al., Security risk assessment of healthcare web application through adaptive neuro-fuzzy inference system: A design perspective, Risk Manag. Healthc. P., 13 (2020), 1–21. https://doi.org/10.2147/RMHP.S233706 doi: 10.2147/RMHP.S233706
![]() |
[27] |
J. Kaur, R. Verma, N. Alharbe, A. Agrawal, R. A. Khan, Importance of fog computing in healthcare 4.0, Signals Commun. Technol., 4 (2021) 79–101. https://doi.org/10.1007/978-3-030-46197-3_4 doi: 10.1007/978-3-030-46197-3_4
![]() |
[28] |
R. Verma, S. Chandra, A systematic survey on fog steered IoT: Architecture, prevalent threats and trust models, Int. J. Wireless Inf. Networks, 28 (2021), 116–133. https://doi.org/10.1007/s10776-020-00499-z doi: 10.1007/s10776-020-00499-z
![]() |
[29] |
S. A. Khan, M. Nadeem, A. Agrawal, R. A. Khan, R. Kumar, Quantitative analysis of software security through fuzzy PROMETHEE-Ⅱ methodology: A design perspective, IJMECS, 13 (2021), 30–41. https://doi.org/10.5815/ijmecs.2021.06.04 doi: 10.5815/ijmecs.2021.06.04
![]() |
[30] |
R. Verma, S. Chandra, Security and privacy issues in fog driven IoT environment, Int. J. Comput. Sci. Eng., 7 (2019), 367–370. https://doi.org/10.26438/ijcse/v7i5.367370 doi: 10.26438/ijcse/v7i5.367370
![]() |
[31] | R. Verma, S. Chandra, A Fuzzy AHP approach for ranking security attributes in Fog-IoT environment, 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India, 2020, 1–5. https://doi.org/10.1109/ICCCNT49239.2020.9225513 |
[32] |
M. Ahmad, J. F. Al-Amri, A. F. Subahi, S. Khatri, A. H. Seh, M. Nadeem, et al., Healthcare device security assessment through computational methodology, Comput. Syst. Sci. Eng., 41 (2022), 811–828. https://doi.org/10.32604/csse.2022.020097 doi: 10.32604/csse.2022.020097
![]() |
[33] |
A. Attaallah, M. Ahmad, M. T. J. Ansari, A. K. Pandey, R. Kumar, R. A. Khan, et al., Device security assessment of internet of healthcare things, Intell. Autom. Soft Co., 27 (2021), 593–603. https://doi.org/10.32604/iasc.2021.015092 doi: 10.32604/iasc.2021.015092
![]() |
[34] |
M. T. J. Ansari, A. Baz, H. Alhakami et al., P-STORE: Extension of STORE Methodology to Elicit Privacy Requirements, Arab. J. Sci. Eng., 46 (2021), 8287–8310. https://doi.org/10.1007/s13369-021-05476-z doi: 10.1007/s13369-021-05476-z
![]() |
[35] |
F. A. Alzahrani, M. Ahmad, M. Nadeem, R. Kumar, R. A. Khan, Integrity assessment of medical devices for improving hospital services, Comput. Mater. Con., 67 (2021), 3619–3633. https://doi.org/10.32604/cmc.2021.014869 doi: 10.32604/cmc.2021.014869
![]() |
[36] |
K. Sahu, F. A. Alzahrani, R. K. Srivastava, R. Kumar, Evaluating the impact of prediction techniques: software reliability perspective, Comput. Mater. Con., 67 (2021), 1471–1488. https://doi.org/10.32604/cmc.2021.014868 doi: 10.32604/cmc.2021.014868
![]() |
[37] |
R. Kumar, M. T. J. Ansari, A. Baz, H. Alhakami, A. Agrawal, et al., A multi-perspective benchmarking framework for estimating usable-security of hospital management system software based on fuzzy logic, ANP and TOPSIS methods, KSⅡ T. Internet Inf., 15 (2021), 240–263. https://doi.org/10.3837/tiis.2021.01.014 doi: 10.3837/tiis.2021.01.014
![]() |
[38] |
F. A. Al-Zahrani, Evaluating the Usable-Security of healthcare software through unified technique of fuzzy logic, ANP and TOPSIS, IEEE Access, 8 (2020), 109905–109916. https://doi.org/10.1109/ACCESS.2020.3001996 doi: 10.1109/ACCESS.2020.3001996
![]() |
[39] |
M. T. J. Ansari, D. Pandey, M. Alenezi, STORE: security threat oriented requirements engineering methodology, J. King Saud Univ.-Com., 34 (2022), 191–203. https://doi.org/10.1016/j.jksuci.2018.12.005 doi: 10.1016/j.jksuci.2018.12.005
![]() |
[40] |
W. Alosaimi, A. Alharbi, H. Alyami, M. Ahmad, A. K. Pandey, R. Kumar, et al., Impact of tools and techniques for securing consultancy services, Comput. Syst. Sci. Eng., 37 (2021), 347–360. https://doi.org/10.32604/csse.2021.015284 doi: 10.32604/csse.2021.015284
![]() |
[41] |
K. Sahu, R. K. Srivastava, Predicting software bugs of newly and large datasets through a unified neuro-fuzzy approach: Reliability perspective, Adv. Math. Sci. J., 10 (2021), 543–555. https://doi.org/10.37418/amsj.10.1.54 doi: 10.37418/amsj.10.1.54
![]() |
1. | Bashir Ahmad, Muhammed Aldhuain, Ahmed Alsaedi, Existence Results for a Right-Caputo Type Fractional Differential Equation with Mixed Nonlinearities and Nonlocal Multipoint Sub-strips Type Closed Boundary Conditions, 2024, 45, 1995-0802, 6457, 10.1134/S1995080224606969 |