
Citation: Qiaokang Liang, Jianyong Long, Yang Nan, Gianmarc Coppola, Kunlin Zou, Dan Zhang, Wei Sun. Angle aided circle detection based on randomized Hough transform and its application in welding spots detection[J]. Mathematical Biosciences and Engineering, 2019, 16(3): 1244-1257. doi: 10.3934/mbe.2019060
[1] | Zhenjun Tang, Yongzheng Yu, Hanyun Zhang, Mengzhu Yu, Chunqiang Yu, Xianquan Zhang . Robust image hashing via visual attention model and ring partition. Mathematical Biosciences and Engineering, 2019, 16(5): 6103-6120. doi: 10.3934/mbe.2019305 |
[2] | Xue Li, Huibo Zhou, Ming Zhao . Transformer-based cascade networks with spatial and channel reconstruction convolution for deepfake detection. Mathematical Biosciences and Engineering, 2024, 21(3): 4142-4164. doi: 10.3934/mbe.2024183 |
[3] | Naigong Yu, Hongzheng Li, Qiao Xu . A full-flow inspection method based on machine vision to detect wafer surface defects. Mathematical Biosciences and Engineering, 2023, 20(7): 11821-11846. doi: 10.3934/mbe.2023526 |
[4] | Wang Cai, Jianzhuang Wang, Longchao Cao, Gaoyang Mi, Leshi Shu, Qi Zhou, Ping Jiang . Predicting the weld width from high-speed successive images of the weld zone using different machine learning algorithms during laser welding. Mathematical Biosciences and Engineering, 2019, 16(5): 5595-5612. doi: 10.3934/mbe.2019278 |
[5] | Jun Gao, Qian Jiang, Bo Zhou, Daozheng Chen . Convolutional neural networks for computer-aided detection or diagnosis in medical image analysis: An overview. Mathematical Biosciences and Engineering, 2019, 16(6): 6536-6561. doi: 10.3934/mbe.2019326 |
[6] | Brandy Rapatski, Petra Klepac, Stephen Dueck, Maoxing Liu, Leda Ivic Weiss . Mathematical epidemiology of HIV/AIDS in cuba during the period 1986-2000. Mathematical Biosciences and Engineering, 2006, 3(3): 545-556. doi: 10.3934/mbe.2006.3.545 |
[7] | Xiaowen Jia, Jingxia Chen, Kexin Liu, Qian Wang, Jialing He . Multimodal depression detection based on an attention graph convolution and transformer. Mathematical Biosciences and Engineering, 2025, 22(3): 652-676. doi: 10.3934/mbe.2025024 |
[8] | Qichao Ying, Jingzhi Lin, Zhenxing Qian, Haisheng Xu, Xinpeng Zhang . Robust digital watermarking for color images in combined DFT and DT-CWT domains. Mathematical Biosciences and Engineering, 2019, 16(5): 4788-4801. doi: 10.3934/mbe.2019241 |
[9] | Amsa Shabbir, Aqsa Rasheed, Huma Shehraz, Aliya Saleem, Bushra Zafar, Muhammad Sajid, Nouman Ali, Saadat Hanif Dar, Tehmina Shehryar . Detection of glaucoma using retinal fundus images: A comprehensive review. Mathematical Biosciences and Engineering, 2021, 18(3): 2033-2076. doi: 10.3934/mbe.2021106 |
[10] | Hongyan Xu . Digital media zero watermark copyright protection algorithm based on embedded intelligent edge computing detection. Mathematical Biosciences and Engineering, 2021, 18(5): 6771-6789. doi: 10.3934/mbe.2021336 |
Diverse viral outbreaks, including those engendered by the human immune compromised virus (HIV) [1], ebola virus [2], acute respiratory syndrome Coronavirus‐2 (SARS‐CoV‐2) [3], dengue virus [4], nipah virus [5], HBV [6], etc., have been researched utilizing mathematical formulas to describe the within-host nonlinear versatile tendencies. In typical latent infection systems, uncontrolled infections, vulnerable tissues, and attacked cellular responses interact. Additionally, several researchers highlight the phenomenon of incubation by mentioning persistent contamination. The recipient defensive mechanism responds to viral infestation via inherent and monoclonal antibody immunogenicity. Both kinds of reactions can be roughly classified into lytic and nonlytic parts. While nonlytic responder processes prevent viremia by aqueous molecules, lytic responder strategies eliminate afflicted organisms. Innate mechanisms include the ability of autonomous assassin systems to destroy intracellular pathogens and the nonlytic inhibition of viral multiplication by cytokines released by cellular functions. Cytotoxic T lymphocytes (CTLs), which are allergen antibodies, destroy intracellular pathogens while autoantibodies deactivate dispersed viral proteins and prevent the transmission of bacteria to infected macrophages. Furthermore, CD4+ and CD8+ T lymphocytes can produce chemicals that inhibit infectious proliferation (e.g., IFN- and TNF-), (see Figure 1).
These discrepancies are not necessarily easy to make, though. For instance, cytokines like interferon and tumour necrotic signal have been shown to promote apoptosis in some circumstances, in addition to inhibiting infectious multiplication [7]. Eichelberger et al. [8] investigated whether the pathogen can be eradicated by the CD4+ T-cell-dependent antigen reaction in the absence of CD8+ T cells, (see Figure 2). Topham et al. [9] demonstrated that CD8+ T lymphocytes can eliminate the pathogen by a lytic process that is either regulated by complement activation or Fas. In terms of explaining the four distinct HCV scenarios quantitatively, Pan et al. [10] addressed the HCV infectious system, which incorporates the pathways of contamination and propagation, such as infectious agent and cell-to-cell dissemination patterns.
Chronic infestations result when the pathogen weakens and suppresses the innate immunity. An immunological reaction has occurred whereby, upon a bacteria's penetration into the system, the immunological mechanism identifies the onslaught and communicates this information to the defensive components, which then generate lymphocytes to eradicate the infection. Additionally, the responsive immunological mechanism is very important in regulating the virus replication. When an infection propagates in a person, the cells respond in two ways: first, a host antibody immune reaction is triggered by the B-cell, and then a cytotoxic immunological reaction is induced by the Cytotoxic T Lymphocyte (CTL). According to earlier investigations, the autoimmune disease seems to be more robust than the intracellular immunological defences. Elaiw et al. [11] addressed the production of antibodies, particular nonlinear prevalence rate expression, and behavioural features of viral transmission scenarios, including insidiously viral particles. Luo et al. [12] analyzed a nonlinear prevalence, cell-to-cell dissemination, and host immune protection framework for diffusive pathogen infectious diseases. Wang et al. [13] investigated the infectious patterns of a system of persistent HIV transmission that included multiple latencies, B-cell immunological responses, and the Beddington-DeAngelis occurrence criterion. Hattaf [14] presented a generalised virus-induced framework with several delayed and immune regulatory components that exhibit global stability and Hopf bifurcation. Rajivganthi and Rihan [15] presented the stochastic analysis of viral infection model involving latently infected cells. Olaide et al. [16] presented a novel metaheuristic algorithm named ebola optimization search algorithm (EOSA) based on the propagation mechanism of the ebola virus disease. For further investigations on optimization and epidemics, we refer the readers [17,18,19,20,21,22,23,24,25].
Fractional calculus (FC) is a subfield of mathematics that was created by applying integer derivatives to differential equations (DEs) involving fractional-orders [26,27,28,29,30,31]. Since many considerable anomalies in digital circuits, phonics, physio-chemical processes, special relativity, photo-catalysis, transport phenomena, stretchability, and optoelectronics can be characterized by fractional DEs, this field, which deals with classical derivatives and fractional-order, has gained popularity in the last three decades. Additionally, FC is currently an essential strategy for simulating complicated events as well as electron mobility that occurs in permeable heterogeneity environments [32,33,34,35,36]. In order to analyze FDEs, scientists require a powerful toolset, yet it might be challenging to identify precise alternatives to these kinds of computations. Therefore, it is vital to designing appropriate quantitative strategies to address these issues [37]. However, quantitative approaches for FDEs create mathematical challenges that are not present in the evaluation of integer-order models. Because certain of the advantageous aspects of the conventional approximation operators are compromised, there are certain systemic problems in performing simulations of the fractional derivatives. During the last decade, the Atangana-Baleanu fractional operator has made recent advancements in fractional DEs approximation, [38]. Atangana [39] proposed a revolutionary nonlocal formulation that combines fractional-order and fractal-dimension: fractal-fractional (FF) differential and integral operators. To examine intricate real-world situations that can never be modelled using classical and fractional derivative/integral formulations of single order, the F-F technique has been expounded as a valuable technique in numerous scientific and epidemiological fields. Versaci et al. [40] presented a fuzzy similarity-based approach to classify numerically simulated and experimentally detected carbon fiber-reinforced polymer plate defects. The present scheme can be further formulated with the method proposed by [40].
However, the fractional-order and integer-order mathematical models have been developed to analyze a large number of randomized order derivatives, providing an additional level of flexibility in selecting; see [41,42,43,44]. The stochastic DEs might offer a significant level of reliability, and when linked to deterministic systems, they encompass the comprehensive spectra of an individual cohort and produce a highly precise result as compared to a classical model. We need to execute the simulations repeatedly and detect commonalities in the projected scenarios because the results of every inquiry in a stochastic procedure differ from the preceding [46,47,48]. According to several researchers, a non-linear recurrence projection for stochastic processes is one of the epidemiological techniques that has been examined for stability evaluation. In fact, random events are prevalent worldwide. Systems frequently experience random disturbances. Various studies have been conducted on stochastic dynamics; for example, a wide range of scientific theories, including meteorology, accounting, biology, and telecommunication systems, frequently exhibit randomized fluctuations with long-term dependency. In order to analyze fractional stochastic processes, fractional Brownian motion (BM) employing the Hurst index H(1/2,1) has been proposed as an alternative to classical BM [49]. Kerboua et al. [50] looked into stochastic fractional DEs with perturbed regulatory frameworks that involved fractional BM. Pei and Xu [51] investigated the non-Lipschitz stochastic DEs driven by fractional BM. In 2021, authors [52] presented a novel notion for analyzing and predicting the transmission of COVID-19 throughout Africa and Europe using stochastic and deterministic methods. Alkahtani and Koca [53] contemplated the fractional stochastic SIR system within the fractional calculus technique. Rashid et al. [54] contemplated the stochastic fractal-fractional tuberculosis model via a non-singular kernel with random densities.
Owing to the aforesaid propensity, we intend to suggest a novel fractal-fractional stochastic immune effector response to viral infections while taking the notion of a fluctuating population with white noise into consideration. We intend to divide the entire population into five distinct groups based on the severity of viral infection. Furthermore, several qualitative analyses are conducted, such as the existence and distinctiveness of the positive solution in the stochastic immune effector responses considering a Holling type II functionality reaction. Perceptions from these systems are distilled in this assessment, which also contrasts them with test findings. Numerical results are presented by employing the revolutionary technique proposed by Atangana and Araz [52] in the fractal-fractional derivative sense. Graphical illustrations are presented with low random densities, incorporating the fractal-dimension and fractional-order. In a nutshell, we presented the simulation findings with and without control.
The rest of this paper is structured as follows. Section 2 gives some foundational information on F-F operators in the ABC sense, formulations of stochastic perturbation and the fractional viral infection model construction. In Section 3, we demonstrate the model's configuration. Section 4 exhibits the solution's existence-uniqueness, as well as ergodicity and conducts a stationary distribution study on the proposed model. The unique result for the F-F viral model is established utilizing the Atangana-Baleanu sense and standard Brownian motion in Section 5. Furthermore, the discussion of numerical simulations utilizing the novel numerical scheme is provided to analyze the behaviors of the considered model. Finally, we give the conclusion of our paper in the last section.
Before advancing on to the formal description, it is imperative to study certain fundamental F-F operator concepts. Take into account the parameters provided in [39] as well as the functional v(t1), which is continuous and fractal differentiable on [c,d] with fractal-dimension ℘ and fractional-order α.
Definition 2.1. ([39]) The FF operator of v(ˉt) involving the index law kernel in the perspective of Riemann–Liouville (RL) can be described as follows for ˉt∈[0,1]:
FFPDα,℘0,ˉt(v(ˉt))=1Γ(u−α)ddˉt℘ˉt∫0(ˉt−w)u−α−1v(w)dw, | (2.1) |
where dv(w)dw℘=limˉt↦ϰv(ˉt)−v(ϰ)ˉt℘−ϰ℘ and u−1<α,℘≤u∈N.
Definition 2.2. ([39]) The FF operator of v(ˉt) involving the exponential decay kernel in the terms of RL can be described as follows for α∈[0,1]:
FFEDα,℘0,ˉt(v(ˉt))=M(α)1−αddˉt℘ˉt∫0exp(−α1−α(ˉt−ϰ))v(ϰ)dϰ, | (2.2) |
such that M(0)=M(1)=1 containing α>0,℘≤u∈N.
Definition 2.3. ([39]) The FF operator of v(ˉt) involving the generalized Mittag-Leffler kernel in the perspective of RL can be described as follows for α∈[0,1]:
FFMDα,℘0,ˉt(v(ˉt))=ABC(α)1−αddˉt℘ˉt∫0Eα(−α1−α(ˉt−ϰ))v(ϰ)dϰ, | (2.3) |
such that ABC(α)=1−α+αΓ(α) involving α>0,℘≤1∈N.
Definition 2.4. ([39]) The corresponding F-F integral formulae of (2.1) is described as:
FFPJα0,ˉt(v(ˉt))=℘Γ(α)ˉt∫0(ˉt−ϰ)α−1ϰ℘−1v(ϰ)dϰ. | (2.4) |
Definition 2.5. ([39]) The corresponding F-F integral formulae of (2.2) is described as:
FFEJα0,ˉt(v(ˉt))=α℘M(α)ˉt∫0ϰ℘−1v(ϰ)dϰ+℘(1−α)ˉt℘−1v(ˉt)M(α). | (2.5) |
Definition 2.6. ([39]) The corresponding F-F integral formulae of (2.3) is described as:
FFMJα0,ˉt(v(ˉt))=α℘ABC(α)ˉt∫0ϰ℘−1(ˉt−ϰ)α−1v(ϰ)dϰ+℘(1−α)ˉt℘−1v(ˉt)ABC(α). | (2.6) |
Definition 2.7. ([38]) Let v∈H1(c,d),c<d and the Atangana-Baleanu fractional derivative operator is described as:
ABCcDαˉt(v(ˉt))=ABC(α)1−αˉt∫cv′(ϰ)Eα(−α(ˉt−ϰ)α1−α)dϰ,α∈[0,1], | (2.7) |
where ABC(α) represents the normalization function.
Definition 2.8. ([55]) The Gaussian hypergeometric function 2F1, characterized as
2F1(y1,y2;y3,y4)=1B(y2,y3−y2)1∫1ˉty2−1(1−ˉt)y3−y2−1(1−y4ˉt)−y1dˉt,(y3>y2>0,|y1|<1), | (2.8) |
where B(y1,y2)=Γ(y1)Γ(y2)Γ(y1+y2) and Γ(y1)=∞∫0exp(−ˉt)ˉty1dˉt is the Gamma function.
Here, the immunological mechanism is necessary for the highly contagious viral replication. If infectious processes are adequately described, the infection and the therapeutic medications employed to address it can be comprehended. Lymphocytes are vicariously liable for specialization and retention in responsive immunological systems. B cells and T cells are the two primary categories of lymphocytes. T cells have the ability to identify and eliminate contaminated organisms, whereas B cells are responsible for producing antigens that can neutralize pathogens. Immune systems, including CTL and antigen-response, have been examined in terms of their impact [56,57]. The impact of CTL reactions and cytoplasmic latencies has been considered by a few other scientists as well [58]. Murase et al. [59] presented the mathematical framework that shows how adaptive immunity affects viral transmission as follows:
{U(ˉt)dˉt=Λ−ςU(ˉt)−λ11U(ˉt)F(ˉt)−λ22U(ˉt)A(ˉt),A(ˉt)dˉt=λ1U(ˉt)F(ˉt)+λ2U(ˉt)A(ˉt)−δA(ˉt),F(ˉt)dˉt=φA(ˉt)−ν2F(ˉt)−ξF(ˉt)Q(ˉt),Q(ˉt)dˉt=χF(ˉt)Q(ˉt)−ζQ(ˉt)A(ˉt)−δA(ˉt), | (3.1) |
The system (3.1) based on unrestricted infections F(ˉt), unaffected target cells U(ˉt), productively infectious specific cells A(ˉt) and antibodies/B tissue Q(ˉt). The productivity Λ of the infectious organisms U(ˉt) and fatality rate ς are both constant. The incidence of the disease by uncontrolled pathogen is λ11, and uncontrolled bacteria become constructively contaminated at a rate of λ22 for each of the two individuals. The percentage of viral components that died at δ,ν2 and ζ released pathogens, antibodies, and B tissues, respectively. When tissues are actively infested, individual viral particles are created at a speed of φ, where is the ratio ξ at which responses can eliminate the pathogen. The frequency of responses that are active versus the pathogen is χ.
However, the persistent infectious factor is applied to framework (3.1) in this article as an improvement. We suppose that the incidence at which a Holling type II functioning reaction develops is that the unaffected cell U(ˉt) becomes contaminated by a neutral pathogen F(ˉt) or by virus is transmitted organism A(ˉt) at the rate λ1U(ˉt)F(ˉt)1+F(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt) response. The rates of pathogen to tissue infection and tissue to cell propagation are indicated by λ1>0 and λ2>0,, respectively, see [60]. We further estimate that the amounts of contamination that result in response times and efficiency are 1−ϕ and ϕ∈(0,1), respectively. In addition, we included the effect of unpredictability within the host by injecting nonlinear disturbances on the spontaneous mortality rate, employing white noise throughout each expression in an attempt to depict a more accurate state of pathogen progression. As a result, the modified framework is specified:
{dU(ˉt)=(Λ−ςU(ˉt)−λ1U(ˉt)S(ˉt)1+S(ˉt)−λ2U(ˉt)A(ˉt)1+A(ˉt))dˉt+ρ1U(ˉt)dB1(ˉt),dS(ˉt)=((1−ϕ)(λ1U(ˉt)S(ˉt)1+S(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt))−(ν1+σ)S(ˉt))dˉt+ρ2S(ˉt)dB2(ˉt),dA(ˉt)=(ϕ(λ1U(ˉt)S(ˉt)1+S(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt))+σS(ˉt)−δA(ˉt))dˉt+ρ3A(ˉt)dB3(ˉt),dF(ˉt)=(φA(ˉt)−ν2F(ˉt)−ξF(ˉt)Q(ˉt))dˉt+ρ4F(ˉt)dB4(ˉt),dQ(ˉt)=(χF(ˉt)Q(ˉt)−ζQ(ˉt))dˉt+ρ5Q(ˉt)dB5(ˉt), | (3.2) |
subject to initial conditions (ICs) U(0)>0,S(0)>0,A(0)>0,F(0)>0,Q(0)>0. Moreover, the term S(ˉt) stands for the concentrations of contaminated tissues in the predictive phase at time ˉt. ν1 be the death rate of S(ˉt), the underlying contamination becomes prolific at the rate σ. Also, ρ2ι,ι=1,...,5 are intensities of standard Gaussian white noise and Bι,ι=1,...,5 are independent standard Brownian motion (BM). The underlying ideas of probability theory and stochastic differential equations are described as: let (Ω,F,{F}ˉt≥0,P) be a complete probability space using filtration such that {F}ˉt≥0 admits the basic requirements. For further information on Itô's technique, see [61]. However, the deterministic model has certain limitations because it cannot consider demographic stochasticity, which are important features of any natural system. Due to the influence of environmental noise, population density usually does not stabilize at a fixed value, but fluctuates around a certain average value. Nowadays, stochastic biological modeling has attracted great interest from researchers all over the world [20,21,22].
In what follows, we provide the accompanying result to identify the stochastic model's (3.2) existence and uniqueness.
Theorem 4.1. For χ<ξ<ζ,λ1φ<ν2+χ,1+λ2<δφ, the solution of the system (3.2) (U(0),S(0),A(0),F(0),Q(0)) is unique for ˉt≥0 underlying ICs (U(0),S(0),A(0),F(0),Q(0))∈R5+. Also, the solution will probably stay in R5+ having unit probability, i, e., (U(0),S(0),A(0),F(0),Q(0))∈R5+,∀ˉt>0 almost surely (a.s).
Proof. Briefly, if the local Lipschitz criterion is fulfilled by the components of the scheme (3.2). Thus, (3.2) has an unique local solution (U(ˉt),S(ˉt),A(ˉt),F(ˉt),Q(ˉt)) on [0,τe], where τe is the exposition duration. Then, we illustrate that τe=∞. Let us apply the same methodology used in [48] to prove the result. Our intention is to define a non-negative mapping C2 as H:R5+↦R+ such that limη↦∞(U(ˉt),S(ˉt),A(ˉt),F(ˉt),Q(ˉt))∈R5+∖ΥηinfH(U,S,A,F,Q)=∞ and LH(U,S,A,F,Q)≤k, where Υη=(1/η,η)×(1/η,η)×(1/η,η)×(1/η,η)×(1/η,η) and k is non-negative constant.
Now, considering two positive constants values ϵ from (0,1) and T must exist such that
P[T≥τ∞]>ϵ. | (4.1) |
Introducing a mapping H:R5+↦R+ as:
H(U,S,A,F,Q)=U+S+A+F+Q−5−(lnU+lnS+lnA+lnF+lnQ). | (4.2) |
This stored procedure non-negativity is shown by examining at ϱ−1lnϱ,∀ϱ>0. Suppose that k0≤k and T>0. The Itô's formula can be used to acquire
dH(U,S,A,F,Q)=LH(U,S,A,F,Q)dˉt+ρ1(U−1)dB1(ˉt)+ρ2(S−1)dB2(ˉt)+ρ3(A−1)dB3(ˉt)+ρ4(F−1)dB4(ˉt)+ρ5(Q−1)dB5(ˉt). | (4.3) |
It follows that
LH(U,S,A,F,Q)=(1−1U)(Λ−ςU(ˉt)−λ1U(ˉt)S(ˉt)1+S(ˉt)−λ2U(ˉt)A(ˉt)1+A(ˉt))+(1−1S)((1−ϕ)(λ1U(ˉt)S(ˉt)1+S(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt))−(ν1+σ)S(ˉt))+(1−1A)(ϕ(λ1U(ˉt)S(ˉt)1+S(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt))+(1−1F)(φA(ˉt)−ν2F(ˉt)−ξF(ˉt)Q(ˉt))+(1−1Q)(χF(ˉt)Q(ˉt)−ζQ(ˉt))≤12(ρ21+ρ22+ρ23+ρ24+ρ25)+Λ+ς+ν1+σ1+δ+ν2+ζ+((ξ−ζ)+(χ−ξ)F)Q+(λφ−(ν2+χ))F+((λ2+1)φ−δ)A. | (4.4) |
Utilizing the given hypothesis, there exists a non-negative constant η such that LH<η.
Therefore,
U[H(U(τη∧T),S(τη∧T),A(τη∧T),F(τη∧T),Q(τη∧T))]≤H(U(0),S(0),A(0),F(0),Q(0))+U[∫τη∧T0ηdˉt]≤H(U(0),S(0),A(0),F(0),Q(0))+ηT. | (4.5) |
Inserting Ωη={τη≤T} for η≥η1 and by (4.1) we have P(Ωη)≥ϵ. Observe that for every ω from Ωη there exist at least one U(τη,ω),S(τη,ω),A(τη,ω),F(τη,ω),Q(τη,ω) that yields 1/ηorη. Consequently, H(U(τη),S(τη),A(τη),F(τη),Q(τη))≥(1/η−1+lnη)∧U(η−1−lnη).
In view of (4.1) and (4.5), we can express
H(U(0),S(0),A(0),F(0),Q(0))+ηT≥U[1Ω(ω)H(U(τη),S(τη),A(τη),F(τη),Q(τη))]≥ϵ(1/η−1+lnη)∧U(η−1−lnη). | (4.6) |
The indicating mapping of ω is denoted as 1Ω(ω) that approaches to ∞, the contradiction
∞>H(U(0),S(0),A(0),F(0),Q(0))+ηT=∞ |
reveals itself, proving that τ∞=∞.
Now, we review and examine the model's (3.2) stationary distribution outcomes, which show that the infections are eliminated or enduring.
Suppose there be a regular Markov technique in Rn+ for which the behaviour is as below:
dΦ(ˉt)=b1(Φ)dˉt+u∑r1ζr1dΨr1(ˉt). |
The diffusion matrix takes the form
A(Φ)=[aij(ϕ)],aij(ϕ)=u∑r1=1ζir1(ϕ)ζr1j(ϕ). |
Lemma 4.1. ([62]) Suppose there is a unique stationary distribution technique Φ(ˉt). If there is a bounded region involving regular boundary such that S,ˉS∈RdˉS closure ˉS∈Rd satisfies the following:
(a) The smallest eigenvalue for A(ˉt) is bounded away from (0,0) for the open region S having neighbourhood.
(b) For ψ∈RdS, the mean time τ is bounded and for every compact subset K⊂Rn,supψ∈kSψτ<∞. Therefore, f1(.) is an integrable mapping containing measure π, then
P(limT↦∞1TT∫0f1(Φψ(ˉt))dˉt=∫Rdf1(ψ)π(dψ))=1,∀ψ∈Rd. |
Theorem 4.2. For ˆσ=ν1+σ+ρ222,ˆδ=δ+ρ232,^ν2=ν2+ρ242, then assume that Rs0:=Λσφλ1(1−ϕ)ςˆδˆσ>1, then for any ICs exists in R5+, the system has a unique ESD π(.).
Proof. The diffusive matrix for system (3.2) is computed as follows:
A=[ρ21U200000ρ22S200000ρ23A200000ρ24F200000ρ25U2]. |
This proves that the criteria (a) in Lemma 4.1 is applicable for any compact subset of R5+. In view of mapping C2 defined as H:R5+↦R+. Thus, we have
H(U,S,A,F,Q):=M(ln1U+ℓ1ln1S+ℓ2ln1A+ℓ3ln1F+ln1Q)+ln1U+ln1S+ln1A+ln1F+(U+S+A+F+Q)θ+1θ+1=MH1+H2+H3+H4+H5+H6, |
where θ∈[0,1],ℓ1=Λλ1σφ(1−ϕ)ˆσ2ˆa^ν2,ℓ2=Λλ1σφ(1−ϕ)ˆσ2ˆa2^ν2,ℓ3=Λλ1σφˆσˆa^ν22 fulfilling c−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25)>0 and M>0, admitting the assumption −Mν2+N1≤−2 and ν2=ς(Rs0−1)>0.
This shows that H(U,S,A,F,Q) is continuous as well as it tends to ∞. So that (U,S,A,F,Q) approaches to R5+ and ‖(U,S,A,F,Q)‖↦∞. Also, H have ICs that lies in R5+.
Again, in view of mapping C2 defined as H:R5+↦R+. Thus, we have
ˉH(U,S,A,F,Q)=HU,S,A,F,Q−H(U(0),S(0),A(0),F(0),Q(0)). |
Considering Itô's technique L on the mappings H1,...,H6 and utilizing the given hypothesis such that c=max{ς,ν1,δ,ν2,ζ}, we have
LH1≤−ΛU−ℓ1S(1−ϕ)λ1UF−σℓ2SA−φAℓ3F+ς+λ2A+ℓ1(ν1+σ)+δℓ2+ν2ℓ3+ξQℓ3−(χ−λ1)F+ζ+12(ρ21+ℓ1ρ22+ℓ2ρ23+ℓ3ρ24+ρ24)≤−F+ρ212+ζ+ρ25+λ2A+ξℓ3Q. | (4.7) |
Analogously, we have
LH2≤−ΛU+ς+λ1F+λ2A+ρ212,LH3=−1S(1−ϕ)(λ1UF1+F+λ2UA1+A)+ν1+σ+ρ222,LH4=−ϕλ1UFA(1+F)−ϕλ2U1+A−σSA+δ+ρ232,LH5=−φAF+ν2+ξQ+ρ242,LH5≤N2−12(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))(Uθ+1,Sθ+1,Aθ+1,Fθ+1,Qθ+1), | (4.8) |
where N2=sup(U,S,A,F,Q)∈R5+{Λ(U+S+A+F+Q)θ−12(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))(U+S+A+F+Q)θ+1}<∞.
Utilizing (4.7) and (4.8), we have
LˉH≤−ΛU−MF+(Mℓ3+1)ξQ−1S(1−ϕ)λ1UF−ϕλ2U1+A−φAF−12(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))(Uϑ+1+Sϑ+1+Aϑ+1+Fϑ+1+Qϑ+1)+ς+(M+1)ρ212+Mζ+Mρ252+(M+1)λ2A+δ+ν2+λ1F+N2+ν1+σ+ρ222+ρ232+ρ242. | (4.9) |
For ϵ>0, we construct the following set
D={(U,S,A,F,Q)∈R5+:U∈[ϵ,1/ϵ],S∈[ϵ5,1/ϵ5],A∈[ϵ2,1/ϵ2],F∈[ϵ3,1/ϵ3],Q∈[ϵ,1/ϵ]}. | (4.10) |
We can validate Lemma 4.1 in order to demonstrate that LˉH≤−1 for (U,S,A,F,Q)∈R5+∖DandR5+∖D=⋃10ι=1Dι, where
D1={(U,S,A,F,Q)∈R5+:U∈(0,ϵ)},D2={(U,S,A,F,Q)∈R5+:A∈(0,ϵ5),U≥ϵ,F≥ϵ3},D3={(U,S,A,F,Q)∈R5+:A∈(0,ϵ2),U≥ϵ},D4={(U,S,A,F,Q)∈R5+:F∈(0,ϵ3),A≥ϵ2},D5={(U,S,A,F,Q)∈R5+:Q∈(0,ϵ)},D6={(U,S,A,F,Q)∈R5+:U>1/ϵ},D7={(U,S,A,F,Q)∈R5+:S>1/ϵ5},D8={(U,S,A,F,Q)∈R5+:A>1/ϵ2},D9={(U,S,A,F,Q)∈R5+:F>1/ϵ3},D10={(U,S,A,F,Q)∈R5+:Q>1/ϵ}. | (4.11) |
Case (a) If (U,S,A,F,Q)∈D1, then by (4.9), we find
LˉH≤−ΛU+(Mℓ3+1)ξQ−14(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))(Uϑ+1+Sϑ+1+Aϑ+1+Fϑ+1+Qϑ+1)+ς+(M+1)ρ212+Mζ+Mρ252+(M+1)λ2A+δ+ν2+λ1F+N2+ν1+σ+ρ222+ρ232+ρ242≤−Λϵ+M1 | (4.12) |
If we choose a sufficiently small ϵ>0, then we get LˉH<0 for each (U,S,A,F,Q)∈D1.
Case (b) If (U,S,A,F,Q)∈D2, then by (4.9), we find
LˉH≤−1S(1−ϕ)λ1UF+M1≤−1ϵ(1−ϕ)λ1+M1 |
If we choose a sufficiently small ϵ5>0, then we get LˉH<0 for each (U,S,A,F,Q)∈D2.
Case (c) If (U,S,A,F,Q)∈D3, then by (4.9), we find
LˉH≤−ϕλ2U1+A+M1≤−ϕλ2ϵ1+ϵ2+M1. |
If we choose a sufficiently small ϵ2>0, then we get LˉH<0 for each (U,S,A,F,Q)∈D3.
Case (d) If (U,S,A,F,Q)∈D4, then by (4.9), we find
LˉH≤−φAF+M1≤−φϵ+M1. |
If we choose a sufficiently small ϵ>0, then we get LˉH<0 for each (U,S,A,F,Q)∈D4.
Case (e) If (U,S,A,F,Q)∈D5, then by (4.9), we find
LˉH≤−MF+(Mℓ3+1)ξQ+N1≤−MF+(Mℓ3+1)ξϵ+N1. |
If we choose a sufficiently small ϵ>0, then we get LˉH<0 for each (U,S,A,F,Q)∈D4.
Case (f) If (U,S,A,F,Q)∈D6, then by (4.9), we find
LˉH≤−14(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))(U)θ+1+M1≤−14(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))1ϵ(θ+1)+M1. |
If we choose a sufficiently small ϵ>0, then we get LˉH<0 for each (U,S,A,F,Q)∈D6.
Case (g) If (U,S,A,F,Q)∈D7, then by (4.9), we find
LˉH≤−14(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))(S)θ+1+M1≤−14(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))1ϵ5(θ+1)+M1. |
If we choose a sufficiently small 1/ϵ5>0, then we get LˉH<0 for each (U,S,A,F,Q)∈D7.
Case (h) If (U,S,A,F,Q)∈D8, then by (4.9), we find
LˉH≤−14(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))(A)θ+1+M1≤−14(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))1ϵ2(θ+1)+M1. |
If we choose a sufficiently small 1/ϵ2>0, then we get LˉH<0 for each (U,S,A,F,Q)∈D8.
Case (i) If (U,S,A,F,Q)∈D9, then by (4.9), we find
LˉH≤−14(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))(F)θ+1+M1≤−14(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))1ϵ3(θ+1)+M1. |
If we choose a sufficiently small 1/ϵ3>0, then we get LˉH<0 for each (U,S,A,F,Q)∈D9.
Case (j) If (U,S,A,F,Q)∈D10, then by (4.9), we find
LˉH≤−14(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))(Q)θ+1+M1≤−14(c1−θ2(ρ21∨ρ22∨ρ23∨ρ24∨ρ25))1ϵ(θ+1)+M1. |
If we choose a sufficiently small 1/ϵ>0, then we get LˉH<0 for each (U,S,A,F,Q)∈D10.\\As a result of the foregoing explanation, a ϵ>0 exists such that LˉH(U,S,A,F,Q)<0 ∀ (U,S,A,F,Q)∈R5+. The unique ESD of the system (3.2) is predicated on Lemma 4.1. This completes the proof.
This part defines the objectives for a virus's systemic elimination (3.1). Before proving the key findings, let's take a closer look at a key premise. Suppose
⟨Φ(ˉt)⟩=1ˉtˉt∫0ϕ(r1)dr1. | (4.13) |
Theorem 4.3. Suppose there is a solution of the system (3.1) (U(ˉt),S(ˉt),A(ˉt),F(ˉt),Q(ˉt)) having ICs lies in R5+. If
˜Rs0:=3(λ1+λ2)Λς((ν1+ρ222)∧((δ−φ)+ρ232)∧(ν2+ρ242))<1 |
⟹limˉt↦∞1ˉtˉt∫0U(ϖ)dϖ≤Λς,limˉt↦∞S(ˉt)=0,limˉt↦∞A(ˉt)=0,limˉt↦∞F(ˉt)=0 |
almost surely.
Proof. Under the hypothesis of Theorem 4.1, model (3.2) has non-negative solution,
dU(ˉt)≤(Λ−ςU)dˉt+ρ1UdB1(ˉt). |
Assume the stochastic DE of the aforementioned system
dU1(ˉt)≤(Λ−ςU1)dˉt+ρ1U1dB1(ˉt),U1(0)=U(0)>0, |
we have limˉt↦∞1ˉtˉt∫0U(ϖ)dϖ≤Λς(a.s).
Applying the result of [48], gives U(ˉt)≤U1(ˉt)(a.s). Then
limˉt↦∞1ˉtˉt∫0U(ϖ)dϖ≤limˉt↦∞1ˉtˉt∫0U1(ϖ)dϖ=Λς(a.s). |
For φ<δ and introducing ln(S(ˉt)+A(ˉt)+F(ˉt)) and implement the Itô's technique, we have
d(ln(S(ˉt)+A(ˉt)+F(ˉt)))=1S(ˉt)+A(ˉt)+F(ˉt)(λ1UF1+F+λ2UA1+A−ν1S−(δ−φ)A−ν2F−ξFQ)dˉt+ρ2SS+A+FdB2(ˉt)+ρ3AS+A+FdB3(ˉt)+ρ4FS+A+FdB2(ˉt)−12(S+A+F)2(ρ22S2+ρ23A2+ρ24F2)dˉt≤ρ2SS+A+FdB2(ˉt)+ρ3AS+A+FdB3(ˉt)+ρ4FS+A+FdB2(ˉt)+(λ1+λ2)Udˉt−13(((ν1+ρ222)∧((δ−φ)+ρ232)∧(ν2+ρ242)))dˉt. | (4.14) |
Applying integration from 0 to ˉt and dividing by ˉt, we have
ln(S(ˉt)+A(ˉt)+F(ˉt))ˉt−ln(S(0)+A(0)+F(0))ˉt≤λ1+λ2ˉtˉt∫0U(ϱ)dϱ−13(((ν1+ρ222)∧((δ−φ)+ρ232)∧(ν2+ρ242)))+ρ2ˉtˉt∫0dB2(ϱ)S+A+F+ρ3ˉtˉt∫0dB3(ϱ)S+A+F+ρ4ˉtˉt∫0dB4(ϱ)S+A+F≤13(((ν1+ρ222)∧((δ−φ)+ρ232)∧(ν2+ρ242)))(˜Rs0−1)<0(a.s) |
that yields limˉt↦∞S(ˉt)=0,limˉt↦∞A(ˉt)=0,limˉt↦∞F(ˉt)(a.s).
The modeling framework helps us understand and interpret experimental data on immune responses against viral infection model (5.1). The role of the fractal-fractional operator in the Atangana-Baleanu fractional derivative sense and antibodies for the resolution of viral infection is debated by utilizing the scheme proposed in [52]. Studies of the acute phase of the infection showed that humans who cleared the virus from their blood developed strong and sustained CTL responses [57]. Here, we illustrate the fractal-fractional derivative for the classical derivative formulation stated in (3.1). The fractal-fractional version in the sense of a generalized Mittag-Leffler function is described as
{FFM0Dα,℘ˉtU(ˉt)=(Λ−ςU(ˉt)−λ1U(ˉt)S(ˉt)1+S(ˉt)−λ2U(ˉt)A(ˉt)1+A(t1))dt1+ρ1G1(t1,U)dB1(ˉt),FFM0Dα,℘ˉtS(ˉt)=((1−ϕ)(λ1U(ˉt)S(ˉt)1+S(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt))−(ν1+σ)S(ˉt))dˉt+ρ2G2(ˉt,S)dB2(ˉt),FFM0Dα,℘ˉtA(ˉt)=(ϕ(λ1U(ˉt)S(ˉt)1+S(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt))+σS(ˉt)−δA(ˉt))dˉt+ρ3G3(ˉt,A)dB3(ˉt),FFM0Dα,℘ˉtF(ˉt)=(φA(ˉt)−ν2F(ˉt)−ξF(ˉt)Q(ˉt))dˉt+ρ4G4(ˉt,F)dB4(ˉt),FFM0Dα,℘ˉtQ(ˉt)=(χF(ˉt)Q(ˉt)−ζQ(ˉt))dˉt+ρ5G5(ˉt,Q)dB5(ˉt). | (5.1) |
For tn+1=(n+1)Δˉt, then we transform these mappings by their polynomials as follows:
Un+1=U0+(1−α)ABC(α)℘ˉt℘−1n+1[{U∗(ˉtn+1,Upn+1,Apn+1,Fpn+1)+ρ1G1(ˉtn+1,Upn+1)(B1(ˉtn+2)−B1(ˉtn+1))]+α℘ABC(α)Γ(α)n−1∑κ=0[{U∗(ˉtκ+1,Uκ+1,Aκ+1,Fκ+1)Jα,℘1,κ+U∗(ˉtκ+1,Uκ+1,Aκ+1,Fκ+1)−U∗(ˉtκ,Uκ,Aκ,Fκ)ℏJα,℘2,κ+U∗(ˉtκ+1,Uκ+1,Aκ+1,Fκ+1)−2U∗(ˉtκ,Uκ,Aκ,Fκ)+U∗(ˉtκ−1,Uκ−1,Aκ−1,Fκ−1)ℏJα,℘3,κ] |
+α℘ABC(α)Γ(α)n−1∑κ=0[{ρ1G1(ˉtκ+1,Uκ+1)(B1(ˉtκ+1)−B1(ˉtκ))Jα,℘1,κ+{ρ1G1(ˉtκ+1,Uκ+1)(B1(ˉtκ+1)−B1(ˉtκ))−ρ1G1(ˉtκ,Uκ)(B1(ˉtκ)−B1(ˉtκ−1))}Jα,℘2,κ+{ρ1G1(ˉtκ+1,Uκ+1)(B1(ˉtκ+1)−B1(ˉtκ))−2ρ1G1(ˉtκ,Uκ)(B1(ˉtκ)−B1(ˉtκ−1))ℏ−ρ1G1(ˉtκ−1,Uκ−1)(B1(ˉtκ−1)−B1(ˉtκ−2))ℏ}Jα,℘3,κ] |
+α℘ABC(α)Γ(α)[{U∗(ˉtn+1,Upn+1,Apn+1,Fpn+1)Jα,℘1,n+U∗(ˉtn+1,Upn+1,Apn+1,Fpn+1)Jα,℘2,n−U∗(ˉtn,Un,An,Fn)Jα,℘2,n+{U∗(ˉtn+1,Upn+1,Apn+1,Fpn+1)−2U∗(ˉtn,Un,An,Fn)2ℏ}Jα,℘3,n+U∗(ˉtn−1,Un−1,An−1,Fn−1)2ℏ2Jα,℘3,n+ρ1G1(ˉtn+1,Up1n+1)(B1(ˉtn+1)−B1(ˉtn))Jα,℘1,n+ρ1G1(ˉtn+1,Up1n+1)(B1(ˉtn+1)−B1(ˉtn))Jα,℘2,n−ρ1G1(ˉtn,Up1n)(B1(ˉtn)−B1(ˉtn−1))Jα,℘2,n+ρ1G1(ˉtn+1,Up1n+1)(B1(ˉtn+1)−B1(ˉtn))2ℏJα,℘3,n−2ρ1G1(ˉtn,Up1n)(B1(ˉtn)−B1(ˉtn−1))2ℏJα,℘3,n+ρ1G1(ˉtn−1,Up1n−1)(B1(ˉtn−2)−B1(ˉtn−2))2ℏJα,℘3,n], |
Sn+1=S0+(1−α)ABC(α)℘ˉt℘−1n+1[{S∗(ˉtn+1,Upn+1,Spn+1,Apn+1,Fpn+1)+ρ2G2(ˉtn+1,Spn+1)(B2(ˉtn+2)−B2(ˉtn+1))] |
+α℘ABC(α)Γ(α)n−1∑κ=0[{S∗(ˉtκ+1,Uκ+1,Sκ+1,Aκ+1,Fκ+1)Jα,℘1,κ+S∗(ˉtκ+1,Uκ+1,Sκ+1,Aκ+1,Fκ+1)−S∗(ˉtκ,Uκ,Sκ,Aκ,Fκ)ℏJα,℘2,κ+(S∗(ˉtκ+1,Uκ+1,Sκ+1,Aκ+1,Fκ+1)−2S∗(ˉtκ,Uκ,Sκ,Aκ,Fκ)ℏ+S∗(ˉtκ−1,Uκ−1,Sκ−1,Aκ−1,Fκ−1)ℏ)Jα,℘3,κ] |
+α℘ABC(α)Γ(α)n−1∑κ=0[{ρ2G2(ˉtκ+1,Sκ+1)(B2(ˉtκ+1)−B2(ˉtκ))Jα,℘1,κ+{ρ2G2(ˉtκ+1,Sκ+1)(B2(ˉtκ+1)−B2(ˉtκ))−ρ2G2(ˉtκ,Sκ)(B2(ˉtκ)−B2(ˉtκ−1))}Jα,℘2,κ+{ρ2G2(ˉtκ+1,Sκ+1)(B2(ˉtκ+1)−B2(ˉtκ))−2ρ2G2(ˉtκ,Sκ)(B2(ˉtκ)−B2(ˉtκ−1))ℏ−ρ2G2(ˉtκ−1,Sκ−1)(B2(ˉtκ−1)−B2(ˉtκ−2))ℏ}Jα,℘3,κ] |
+α℘ABC(α)Γ(α)[{S∗(ˉtn+1,Upn+1,Spn+1,Apn+1,Fpn+1)Jα,℘1,n+S∗(ˉtn+1,Upn+1,Spn+1,Apn+1,Fpn+1)Jα,℘2,n−S∗(ˉtn,Un,Sn,An,Fn)Jα,℘2,n+{S∗(ˉtn+1,Upn+1,Spn+1,Apn+1,Fpn+1)−2S∗(ˉtn,Un,Sn,An,Fn)2ℏ}Jα,℘3,n+S∗(ˉtn−1,Un−1,Sn−1,An−1,Fn−1)2ℏ2Jα,℘3,n+ρ2G2(ˉtn+1,Sp1n+1)(B2(ˉtn+1)−B2(ˉtn))Jα,℘1,n+ρ2G2(ˉtn+1,Sp1n+1)(B2(ˉtn+1)−B2(ˉtn))Jα,℘2,n−ρ2G2(ˉtn,Sp1n)(B2(ˉtn)−B2(ˉtn−1))Jα,℘2,n+ρ2G2(ˉtn+1,Sp1n+1)(B2(ˉtn+1)−B2(ˉtn))2ℏJα,℘3,n−2ρ2G2(ˉtn,Sp1n)(B2(ˉtn)−B2(ˉtn−1))2ℏJα,℘3,n+ρ2G2(ˉtn−1,Sp1n−1)(B2(ˉtn−2)−B2(ˉtn−2))2ℏJα,℘3,n], |
An+1=A0+(1−α)ABC(α)℘ˉt℘−1n+1[{A∗(ˉtn+1,Upn+1,Spn+1,Apn+1,Fpn+1)+ρ3G4(ˉtn+1,Apn+1)(B3(ˉtn+2)−B3(ˉtn+1))] |
+α℘ABC(α)Γ(α)n−1∑κ=0[{A∗(ˉtκ+1,Uκ+1,Sκ+1,Aκ+1,Fκ+1)Jα,℘1,κ+A∗(ˉtκ+1,Uκ+1,Sκ+1,Aκ+1,Fκ+1)−A∗(ˉtκ,Uκ,Sκ,Aκ,Fκ)ℏJα,℘2,κ+(A∗(ˉtκ+1,Uκ+1,Sκ+1,Aκ+1,Fκ+1)−2A∗(ˉtκ,Uκ,Sκ,Aκ,Fκ)ℏ+A∗(ˉtκ−1,Uκ−1,Sκ−1,Aκ−1,Fκ−1)ℏ)Jα,℘3,κ] |
+α℘ABC(α)Γ(α)n−1∑κ=0[{ρ3G3(ˉtκ+1,Aκ+1)(B3(ˉtκ+1)−B3(ˉtκ))Jα,℘1,κ+{ρ3G3(ˉtκ+1,Aκ+1)(B3(ˉtκ+1)−B3(ˉtκ))−ρ3G3(ˉtκ,Aκ)(B3(ˉtκ)−B3(ˉtκ−1))}Jα,℘2,κ+{ρ3G3(ˉtκ+1,Aκ+1)(B3(ˉtκ+1)−B3(ˉtκ))−2ρ3G3(ˉtκ,Aκ)(B3(ˉtκ)−B3(ˉtκ−1))ℏ−ρ3G3(ˉtκ−1,Aκ−1)(B3(ˉtκ−1)−B3(ˉtκ−2))ℏ}Jα,℘3,κ] |
+α℘ABC(α)Γ(α)[{A∗(ˉtn+1,Upn+1,Spn+1,Apn+1,Fpn+1)Jα,℘1,n+A∗(ˉtn+1,Upn+1,Spn+1,Apn+1,Fpn+1)Jα,℘2,n−A∗(ˉtn,Un,Sn,An,Fn)Jα,℘2,n+{A∗(ˉtn+1,Upn+1,Spn+1,Apn+1,Fpn+1)−2A∗(ˉtn,Un,Sn,An,Fn)2ℏ}Jα,℘3,n+A∗(ˉtn−1,Un−1,An−1,Fn−1)2ℏ2Jα,℘3,n+ρ3G3(ˉtn+1,Ap1n+1)(B3(ˉtn+1)−B3(ˉtn))Jα,℘1,n+ρ3G3(ˉtn+1,Ap1n+1)(B3(ˉtn+1)−B3(ˉtn))Jα,℘2,n−ρ3G3(ˉtn,Ap1n)(B3(ˉtn)−B3(ˉtn−1))Jα,℘2,n+ρ3G3(ˉtn+1,Ap1n+1)(B3(ˉtn+1)−B3(ˉtn))2ℏJα,℘3,n−2ρ3G3(ˉtn,Ap1n)(B3(ˉtn)−B3(ˉtn−1))2ℏJα,℘3,n+ρ3G3(ˉtn−1,Ap1n−1)(B3(ˉtn−2)−B3(ˉtn−2))2ℏJα,℘3,n], |
Fn+1=F0+(1−α)ABC(α)℘ˉt℘−1n+1[{F∗(ˉtn+1,Apn+1,Fpn+1,Qpn+1)+ρ4G4(ˉtn+1,Fpn+1)(B4(ˉtn+2)−B4(ˉtn+1))] |
+α℘ABC(α)Γ(α)n−1∑κ=0[{F∗(ˉtκ+1,Aκ+1,Fκ+1,Qκ+1)Jα,℘1,κ+F∗(ˉtκ+1,Aκ+1,Fκ+1,Qκ+1)−F∗(ˉtκ,Aκ,Fκ,Qκ)ℏJα,℘2,κ+F∗(ˉtκ+1,Aκ+1,Fκ+1,Qκ+1)−2A∗(ˉtκ,Aκ,Fκ,Qκ)+F∗(ˉtκ−1,Aκ−1,Fκ−1,Qκ−1)ℏJα,℘3,κ] |
+α℘ABC(α)Γ(α)n−1∑κ=0[{ρ4G4(ˉtκ+1,Fκ+1)(B4(ˉtκ+1)−B4(ˉtκ))Jα,℘1,κ+{ρ4G4(ˉtκ+1,Fκ+1)(B4(ˉtκ+1)−B4(ˉtκ))−ρ4G4(ˉtκ,Fκ)(B4(ˉtκ)−B4(ˉtκ−1))}Jα,℘2,κ+{ρ4G4(ˉtκ+1,Fκ+1)(B4(ˉtκ+1)−B4(ˉtκ))−2ρ4G4(ˉtκ,Fκ)(B4(ˉtκ)−B4(ˉtκ−1))ℏ−ρ4G4(ˉtκ−1,Fκ−1)(B4(ˉtκ−1)−B4(ˉtκ−2))ℏ}Jα,℘3,κ] |
+α℘ABC(α)Γ(α)[{F∗(ˉtn+1,Apn+1,Fpn+1,Qpn+1)Jα,℘1,n+F∗(ˉtn+1,Apn+1,Fpn+1,Qpn+1)Jα,℘2,n−F∗(ˉtn,An,Fn,Qn)Jα,℘2,n+{F∗(ˉtn+1,Apn+1,Fpn+1,Qpn+1)−2F∗(ˉtn,An,Fn,Qn)2ℏ}Jα,℘3,n+F∗(ˉtn−1,An−1,Fn−1,Qn−1)2ℏ2Jα,℘3,n+ρ4G4(ˉtn+1,Fp1n+1)(B4(ˉtn+1)−B4(ˉtn))Jα,℘1,n+ρ4G4(ˉtn+1,Fp1n+1)(B4(ˉtn+1)−B4(ˉtn))Jα,℘2,n−ρ4G4(ˉtn,Fp1n)(B4(ˉtn)−B4(ˉtn−1))Jα,℘2,n+ρ4G4(ˉtn+1,Fp1n+1)(B4(ˉtn+1)−B4(ˉtn))2ℏJα,℘3,n−2ρ4G4(ˉtn,Fp1n)(B4(ˉtn)−B4(ˉtn−1))2ℏJα,℘3,n+ρ4G4(ˉtn−1,Fp1n−1)(B4(ˉtn−2)−B4(ˉtn−2))2ℏJα,℘3,n], |
Qn+1=Q0+(1−α)ABC(α)℘ˉt℘−1n+1[{Q∗(ˉtn+1,Fpn+1,Qpn+1)+ρ5G5(ˉtn+1,Qpn+1)(B5(ˉtn+2)−B5(ˉtn+1))] |
+α℘ABC(α)Γ(α)n−1∑κ=0[{Q∗(ˉtκ+1,Fκ+1,Qκ+1)Jα,℘1,κ+Q∗(ˉtκ+1,Fκ+1,Qκ+1)−Q∗(ˉtκ,Fκ,Qκ)ℏJα,℘2,κ+Q∗(ˉtκ+1,Fκ+1,Qκ+1)−2Q∗(ˉtκ,Fκ,Qκ)+Q∗(ˉtκ−1,Fκ−1,Qκ−1)ℏJα,℘3,κ] |
+α℘ABC(α)Γ(α)n−1∑κ=0[{ρ5G5(ˉtκ+1,Qκ+1)(B5(ˉtκ+1)−B5(ˉtκ))Jα,℘1,κ+{ρ5G5(ˉtκ+1,Qκ+1)(B5(ˉtκ+1)−B5(ˉtκ))−ρ5G5(ˉtκ,Qκ)(B5(ˉtκ)−B5(ˉtκ−1))}Jα,℘2,κ+{ρ5G5(ˉtκ+1,Qκ+1)(B5(ˉtκ+1)−B5(ˉtκ))−2ρ5G5(ˉtκ,Qκ)(B5(ˉtκ)−B5(ˉtκ−1))ℏ−ρ5G5(ˉtκ−1,Qκ−1)(B5(ˉtκ−1)−B5(ˉtκ−2))ℏ}Jα,℘3,κ] |
+α℘ABC(α)Γ(α)[{Q∗(ˉtn+1,Fpn+1,Qpn+1)Jα,℘1,n+Q∗(ˉtn+1,Fpn+1,Qpn+1)Jα,℘2,n−Q∗(ˉtn,Fn,Qn)Jα,℘2,n+{Q∗(ˉtn+1,Fpn+1,Qpn+1)−2Q∗(ˉtn,Fn,Qn)2ℏ}Jα,℘3,n+Q∗(ˉtn−1,Fn−1,Qn−1)2ℏ2Jα,℘3,n+ρ5G5(ˉtn+1,Qp1n+1)(B5(ˉtn+1)−B5(ˉtn))Jα,℘1,n+ρ5G5(ˉtn+1,Qp1n+1)(B5(ˉtn+1)−B5(ˉtn))Jα,℘2,n−ρ5G5(ˉtn,Qp1n)(B5(ˉtn)−B5(ˉtn−1))Jα,℘2,n+ρ5G5(ˉtn+1,Qp1n+1)(B5(ˉtn+1)−B5(ˉtn))2ℏJα,℘3,n−2ρ5G5(ˉtn,Qp1n)(B5(ˉtn)−B5(ˉtn−1))2ℏJα,℘3,n+ρ5G5(ˉtn−1,Qp1n−1)(B5(ˉtn−2)−B5(ˉtn−2))2ℏJα,℘3,n], |
where
Up1n+1=U0+1−αABC(α)℘ˉt℘−1n+1[{U∗(ˉtn,Un,An,Fn)+℘ρ1G1(ˉtn,Un)(B1(ˉtn)−B1(ˉtn−1))] |
+α℘ABC(α)Γ(α)n∑κ=0[{U∗(ˉtκ,Uκ,Aκ,Fκ)Jα,℘1,κ+ρ1G1(ˉtκ,Uκ)(B1(ˉtκ)−B1(ˉtκ−1))Jα,℘1,κ],Sp1n+1=S0+1−αABC(α)℘ˉt℘−1n+1[{S∗(ˉtn,Un,Sn,An,Fn)+℘ρ2G2(ˉtn,Sn)(B2(ˉtn)−B2(ˉtn−1))]+α℘ABC(α)Γ(α)n∑κ=0[{S∗(ˉtκ,Uκ,Sκ,Aκ,Fκ)Jα,℘1,κ+ρ2G2(ˉtκ,Sκ)(B2(ˉtκ)−B2(ˉtκ−1))Jα,℘1,κ], |
Ap1n+1=A0+1−αABC(α)℘ˉt℘−1n+1[{A∗(ˉtn,Un,Sn,An,Fn)+℘ρ3G3(ˉtn,An)(B3(ˉtn)−B3(ˉtn−1))] |
+α℘ABC(α)Γ(α)n∑κ=0[{A∗(ˉtκ,Uκ,Sκ,Aκ,Fκ)Jα,℘1,κ+ρ3G3(ˉtκ,Aκ)(B3(ˉtκ)−B3(ˉtκ−1))Jα,℘1,κ],Fp1n+1=F0+1−αABC(α)℘ˉt℘−1n+1[{F∗(ˉtn,An,Fn,Qn)+℘ρ4G4(ˉtn,Fn)(B4(ˉtn)−B4(ˉtn−1))]+α℘ABC(α)Γ(α)n∑κ=0[{F∗(ˉtκ,Aκ,Fκ,Qκ)Jα,℘1,κ+ρ4G4(ˉtκ,Fκ)(B4(ˉtκ)−B4(ˉtκ−1))Jα,℘1,κ],Qp1n+1=Q0+1−αABC(α)℘ˉt℘−1n+1[{Q∗(ˉtn,Fn,Qn)+℘ρ5G5(ˉtn,Qn)(B5(ˉtn)−B5(ˉtn−1))]+α℘ABC(α)Γ(α)n∑κ=0[{Q∗(ˉtκ,Fκ,Qκ)Jα,℘1,κ+ρ5G5(ˉtκ,Qκ)(B5(ˉtκ)−B5(ˉtκ−1))Jα,℘1,κ]. |
Also,
Jα,℘1,κ=((n+1)ℏ)α−1℘[{((κ+1)ℏ)℘2F1([℘,1−α],[1+℘],κ+1n+1)−(κℏ)℘2F1([℘,1−α],[1+℘],κn)],Jα,℘2,κ=((n+1)ℏ)α−1℘(℘+1)[{℘((κ+1)ℏ)℘+12F1([1+℘,1−α],[2+℘],κ+1n+1)−(1+℘)((κ+1)ℏ)℘+12F1([℘,1−α],[1+℘],κ+1n)−℘((κ)ℏ)℘+12F1([1+℘,1−α],[2+℘],κn+1)+ℏ((κ)ℏ)℘(1+℘)(1+κ)2F1([℘,1−α],[1+℘],κn)],Jα,℘3,κ=((κ+1)ℏ)α−1℘(℘+1)(℘+2)[{℘(℘+1)((κ+1)ℏ)℘+22F1([2+℘,1−α],[3+℘],κ+1n+1)−2℘(℘+2)(κ+12)ℏ((κ+1)ℏ)℘+12F1([1+℘,1−α],[2+℘],κ+1n+1)+κℏ(℘+1)(℘+2)((κ+1)ℏ)℘+12F1([℘,1−α],[1+℘],κ+1n)+2℘(℘+2)(κ+12)ℏ((ℏκ))℘+12F1([1+℘,1−α],[2+℘],κn+1)−℘(℘+1)(κℏ)℘+22F1([2+℘,1−α],[3+℘],κn)−ℏ(℘+1)(℘+2)(κ+1)(κℏ)℘+12F1([℘,1−α],[1+℘],κn+1)]. |
To exemplify the theoretical outcomes of the suggested framework, numerical computations were performed in this part. We accomplish this using the stochastic complete numerical technique proposed by Atangana and Araz [52]. Moreover, we compute the fractal-fractional model (3.2) for Atangana-Baleanu-Caputo sense when both fractional-order α and fractal-dimension ℘ are distinct.
Figures 3–5 illustrate the effects of uninfected U(ˉt), latently infected S(ˉt), actively infected A(ˉt), free virus F(ˉt), and antibodies Q(ˉt) at various fractional-orders and fixed fractal-dimensions. We assign the following parameter values: Λ=10,ς=0.1,λ1=2,λ2=2,ϕ=0.5,ν1=0.5,σ=5,δ=10,φ=2,ν2=10,ξ=3,χ=2,ζ=4. To demonstrate the system's dynamical behaviour, we input various white noise levels (5.1). We first take into account the white noise components ρ1=0.9,ρ2=0.9,ρ3=0.7,ρ4=0.9 and ρ5=0.8, where the distinctive stationary distribution sensitivity criterion Rs0>1 is attained. As the virus spreads through the community, the class diminishes over time and eventually affects all other categories in the structure. This classification corresponds rapidly at low orders and slowly at higher orders, which displays a consistent tendency.
Figures 6–8 display the temporal patterns of (U(ˉt),S(ˉt),A(ˉt),F(ˉt),Q(ˉt)) of the stochastic system (5.1) involving white noise ρ1=0.9,ρ2=0.9,ρ3=0.7,ρ4=0.9 and ρ5=0.8, respectively. The solution varies at white noises, having a corresponding stochastic mean. The affected cells S(ˉt) exhibit a rapid decline in behaviour over time, similar to the behaviour of uninfected cells U(ˉt) at various fractal-fractional orders.
Figures 9–11 show the impacts of uninfected U(ˉt), latently infected S(ˉt), actively infected A(ˉt), free virus F(ˉt), and antibodies Q(ˉt) at various fractal-dimension and fixed fractional-orders. The corresponding attributed values: Λ=10,ς=0.1,λ1=2,λ2=2,ϕ=0.5,ν1=0.5,σ=5,δ=10,φ=2,ν2=10,ξ=3,χ=2,ζ=4. Then, by increasing the white noise intensities to ρ1=3.9,ρ2=3.7,ρ3=3.9,ρ4=3.9 and ρ5=3.8, we are able to satisfy the elimination criterion ˜Rs0<1 in Theorem 4.3 and validate the findings. Figures 9–11 demonstrate that as the white noise intensity escalates, contaminated lymphocytes S(ˉt), productively infested cells A(ˉt), and uncontrolled pathogen A(ˉt) can all perish and settle at a variety of fractal dimensions and fixed fractional-order. This shows that white noise concentration can effectively eradicate all insidiously, proactively, and freely virally infested cells, dramatically reduce the quantity of virally affected cells, and prevent the proliferation of contaminated nuclei.
Figures 12–14 predict the behaviour of uninfected U(ˉt), latently infected S(ˉt), actively infected A(ˉt), free virus F(ˉt), and antibodies Q(ˉt) at various fractal-dimension and fractional-orders. The corresponding attributed values: Λ=10,ς=0.1,λ1=2,λ2=2,ϕ=0.5,ν1=0.5,σ=5,δ=10,φ=2,ν2=10,ξ=3,χ=2,ζ=4. Then, by increasing the white noise intensities to ρ1=3.9,ρ2=3.7,ρ3=3.9,ρ4=3.9 and ρ5=3.8, and ˜Rs0<1. This shows that the stochastic noise is demonstrated to be suppressed by the massive boom. The infectious populace is disappearing more significantly when both fractional-order and fractal-dimension are changed simultaneously in an infectious system in comparison to fractional systems, which leads to fascinating and biologically more plausible findings.
Figures 15–17 demonstrate the effect of uninfected U(ˉt), latently infected S(ˉt), actively infected A(ˉt), free virus F(ˉt), and antibodies Q(ˉt) at fixed fractal-dimension and fractional-orders with and without control, respectively. Considering an inadequate CTL reaction, we examine how virus replication affects the patterns of HCV and immunological reactions from acute infection through the chronic stage. This is accomplished using a mix of analytical and numerical techniques. Since the target cell restriction prevents the penetration of new viral variations in the case of severe liver damage, virus development is predicted to come to an end.
As a result of these pictorial outcomes, we draw the conclusion that by using this novel fractal-fractional operator concept, it is possible to detect more precise outcomes and to offer a wider insight of problems that arise in engineering and science as well as in the reality.
In this article, we examined the variations in cellular complexities of a novel randomized fractal-fractional virus transmission system considering latently diseased tissues and a Holling type II functionality reaction. We discovered the existence of non-negative solutions to the examined system by accounting for environmental noise and the fractal effects of vaccination. In view of Itô's technique and Lyapunov candidate, we established the necessary assumptions of the stochastically permanence of the virus transmission scenario and the elimination of chronically diseased, productively contaminated cells and independent pathogen fragments. Ultimately, in order to create the suggested system, we employed the F-F calculus notion in the ABC context. Additionally, numerical simulations are provided to understand the tendencies of our theoretical model's analysis. We determine that increasing the noise strength will eventually render the virus obsolete. The illustration analysis shows that the fractal-fractional notion outperforms the integer-order and classical derivatives in terms of effectiveness and biological dependability. Upcoming research on viral infections, particularly the novel COVID-19, monkey pox and lumpy virus can confidently implement the revolutionary modelling methodology termed as the fractal-fractional operator.
The authors declare there is no conflict of interest.
[1] | H. Zhang, K. Wiklund and M. Andersson, A fast and robust circle detection method using isosceles triangles sampling, Pattern. Recogn., 54 (2016), 218–228. |
[2] | B. Yuan and M. Liu, Power histogram for circle detection on images, Pattern. Recogn., 48 (2015) 3268–3280. |
[3] | R. O. Duda and P. E. Hart, Use of the Hough transformation to detect lines and curves in pictures, Commun. ACM, 15 (1972), 11–15. |
[4] | Y. J. Cha, K. You and W. Choi, Vision-based detection of loosened bolts using the Hough transform and support vector machines, Automat. Constr., 71 (2016), 181–188. |
[5] | L. Xu, E. Oja and P. Kultanen, A new curve detection method: Randomized Hough transform (RHT), Pattern. Recogn. Lett., 11 (1990), 331–338. |
[6] | Z. Yao and W. Yi, Curvature aided Hough transform for circle detection, Expert. Syst. Appl., 51 (2015), 26–33. |
[7] | A. Yao, J. Gall and L. Van Gool, A hough transform-based voting framework for action recognition, Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on IEEE, (2010), 2061–2068. |
[8] | J. Xavier, M. Pacheco and D. Castro, et al., Fast line, arc/circle and leg detection from laser scan data in a player driver, Robotics and Automation, 2005. ICRA 2005. Proceedings of the 2005 IEEE International Conference on. IEEE, (2005), 3930–3935. |
[9] | R. Scitovski and T. Marošević, Multiple circle detection based on center-based clustering, Pattern. Recogn. Lett., 52 (2015), 9–16. |
[10] | T. C. Chen and K. L. Chung, An efficient randomized algorithm for detecting circles, Comput. Vis. Image. Und., 83 (2001), 172–191. |
[11] | J. Wu, J. Li and C. Xiao, et al., Real-time robust algorithm for circle object detection, Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for. IEEE, (2008), 1722–1727. |
[12] | L. Shen, X. Song and M. Iguchi, et al., A method for recognizing particles in overlapped particle images, Pattern. Recogn. Lett., 21 (2000), 21–30. |
[13] | P. Soille, Morphological image analysis: Principles and applications, Springer-Verlag, (1999), 173–174. |
[14] | B. Alexe, T. Deselaers and V. Ferrari, Measuring the objectness of image windows, IEEE T. Pattern. Anal., 34 (2012), 2189–2202. |
[15] | J. R. R. Uijlings, K. E. A. Van De Sande and T. Gevers, et al., Selective search for object recognition, Int. J. Comput. Vision., 104 (2013), 154–171. |
[16] | I. Endres and D. Hoiem, Category independent object proposals, Comput. Vision. ECCV 2010, (2010), 575–588. |
[17] | C. L. Zitnick and P. Dollár, Edge boxes: Locating object proposals from edges, European Conference on Computer Vision, Springer International Publishing, (2014), 391–405. |
[18] | J. Canny, A computational approach to edge detection, IEEE T. Pattern. Anal., 8 (1986), 679–698. |
[19] | Y. J. Cha, Choi W and O. Büyüköztürk, Deep learning-based crack damage detection using convolutional neural networks, Comput-Aided. Civ. Inf., 32 (2017), 361–378. |
[20] | Y. J. Cha, W. Choi and G. Suh, et al., Autonomous Structural visual inspection using region-based deep learning for detecting multiple damage types, Comput-Aided. Civ. Inf., 33 (2018), 731–747. |
1. | Guojun Wang, A sub-pixel circle detection algorithm combined with improved RHT and fitting, 2020, 79, 1380-7501, 29825, 10.1007/s11042-020-09514-0 | |
2. | Chen Liu, Yude Dong, Yanli Wei, Jiangtao Wang, Hongling Li, Image detection and parameterization for different components in cross-sections of radial tires, 2022, 236, 0954-4070, 287, 10.1177/09544070211023628 | |
3. | Ziyin Wang, Kai Yang, Haisong Huang, Resistance spot welding nugget cross-sectional contour extraction and geometric modeling based on the improved Gabor filter, 2022, 199, 02632241, 111448, 10.1016/j.measurement.2022.111448 | |
4. | Lianyuan Jiang, A fast and accurate circle detection algorithm based on random sampling, 2021, 123, 0167739X, 245, 10.1016/j.future.2021.05.010 | |
5. | Zhengqiang Li, Enyong Xu, Jinlai Zhang, Yanmei Meng, Jin Wei, Zhen Dong, Hejun Wei, AdaHC: Adaptive hedge horizontal cross-section center detection algorithm, 2022, 192, 01681699, 106582, 10.1016/j.compag.2021.106582 | |
6. | Jiajian Chen, Yuwei Zu, Jiapeng Yang, Palanivel Velmurugan, Detection Method of Compound Chemical Material Hole Based on Deep Learning Image, 2022, 2022, 1687-4129, 1, 10.1155/2022/9966145 | |
7. | Zhuotong Li, 2020, A Detecting Approach for Misplaced Packages during Palletization Based on Machine Vision, 978-1-6654-2314-4, 1334, 10.1109/ICMCCE51767.2020.00292 | |
8. | Lu Siqi, Luo Jiaxiang, Liang Guoheng, 2021, Circle detection method based on contour extraction and rule verification, 978-1-6654-3712-7, 815, 10.1109/YAC53711.2021.9486654 | |
9. | Yong He, Xiya Zhang, Zeqing Zhang, Hui Fang, Automated detection of boundary line in paddy field using MobileV2-UNet and RANSAC, 2022, 194, 01681699, 106697, 10.1016/j.compag.2022.106697 | |
10. | Shuanglong Liu, Xiaoyi Jin, 2022, Chapter 84, 978-981-16-7380-1, 1361, 10.1007/978-981-16-7381-8_84 | |
11. | Thiago Sousa, Ugo Ibusuki, Erik Gustavo Del Conte, Development of a digital twin for spot welding quality inspection in an industry 4.0 testbed of a Brazilian University, 2022, 1556-5068, 10.2139/ssrn.4075189 | |
12. | En-Yu Lin, Ching-Ting Tu, Jenn-Jier James Lien, Nut Geometry Inspection Using Improved Hough Line and Circle Methods, 2023, 23, 1424-8220, 3961, 10.3390/s23083961 | |
13. | Lukas Zabulis, Rytis Augustauskas, Dominykas Lelešius, Arūnas Lipnickas, 2023, YOLO-based Detection of Drilled Blind Holes in Laminated Panels with Template Similarity Assessment, 979-8-3503-5805-6, 205, 10.1109/IDAACS58523.2023.10348673 | |
14. | Min Lai, Yuankai Zhang, Yong Jiang, Yusen Geng, Xincheng Tian, An automatic riveting method for robots based on the improved EDCircles algorithm, 2024, 86, 07365845, 102648, 10.1016/j.rcim.2023.102648 | |
15. | Yong Cai, XueRui Zhang, ShengQuan Wang, Guangyao Li, Circle Detection by an Improved Edge Drawing Algorithm, 2022, 1556-5068, 10.2139/ssrn.4165901 | |
16. | Fendi Achmad, Agus Wiyono, Edv Sulistivo, Arif Kurniawan, Vincentius Septian, M. Syariffuddien Z, 2023, Design and Development of AUDI'S AUV as an Underwater Robot Prototype, 979-8-3503-5834-6, 301, 10.1109/ISRITI60336.2023.10467937 | |
17. | Yanhui Li, Xiangchao Gan, An Integrated Fast Hough Transform for Multidimensional Data, 2023, 45, 0162-8828, 11365, 10.1109/TPAMI.2023.3269202 | |
18. | Jianan Cao, Yue Gao, Chuanyang Wang, A Novel Four-Step Algorithm for Detecting a Single Circle in Complex Images, 2023, 23, 1424-8220, 9030, 10.3390/s23229030 | |
19. | Leandro Ruiz, Sebastián Díaz, José M. González, Francisco Cavas, Improving the competitiveness of aircraft manufacturing automated processes by a deep neural network, 2023, 30, 10692509, 341, 10.3233/ICA-230711 | |
20. | Yuang Han, Honglong Cao, 2024, Application of Gauss Fitting Method in Quality Assessment of Afterloader System, 979-8-3503-6360-9, 989, 10.1109/ICIBA62489.2024.10869186 | |
21. | Moïse Ouedraogo, Abdoulaye Sere, 2025, Chapter 16, 978-3-031-86492-6, 197, 10.1007/978-3-031-86493-3_16 |