Survey Special Issues

Toward the Internet of Medical Things: Architecture, trends and challenges


  • In recent years, the growing pervasiveness of wearable technology has created new opportunities for medical and emergency rescue operations to protect users' health and safety, such as cost-effective medical solutions, more convenient healthcare and quick hospital treatments, which make it easier for the Internet of Medical Things (IoMT) to evolve. The study first presents an overview of the IoMT before introducing the IoMT architecture. Later, it portrays an overview of the core technologies of the IoMT, including cloud computing, big data and artificial intelligence, and it elucidates their utilization within the healthcare system. Further, several emerging challenges, such as cost-effectiveness, security, privacy, accuracy and power consumption, are discussed, and potential solutions for these challenges are also suggested.

    Citation: Qinwang Niu, Haoyue Li, Yu Liu, Zhibo Qin, Li-bo Zhang, Junxin Chen, Zhihan Lyu. Toward the Internet of Medical Things: Architecture, trends and challenges[J]. Mathematical Biosciences and Engineering, 2024, 21(1): 650-678. doi: 10.3934/mbe.2024028

    Related Papers:

    [1] Ardak Kashkynbayev, Daiana Koptleuova . Global dynamics of tick-borne diseases. Mathematical Biosciences and Engineering, 2020, 17(4): 4064-4079. doi: 10.3934/mbe.2020225
    [2] Holly Gaff, Robyn Nadolny . Identifying requirements for the invasion of a tick species and tick-borne pathogen through TICKSIM. Mathematical Biosciences and Engineering, 2013, 10(3): 625-635. doi: 10.3934/mbe.2013.10.625
    [3] Holly Gaff . Preliminary analysis of an agent-based model for a tick-borne disease. Mathematical Biosciences and Engineering, 2011, 8(2): 463-473. doi: 10.3934/mbe.2011.8.463
    [4] Marco Tosato, Xue Zhang, Jianhong Wu . A patchy model for tick population dynamics with patch-specific developmental delays. Mathematical Biosciences and Engineering, 2022, 19(5): 5329-5360. doi: 10.3934/mbe.2022250
    [5] Shangbing Ai . Global stability of equilibria in a tick-borne disease model. Mathematical Biosciences and Engineering, 2007, 4(4): 567-572. doi: 10.3934/mbe.2007.4.567
    [6] Maeve L. McCarthy, Dorothy I. Wallace . Optimal control of a tick population with a view to control of Rocky Mountain Spotted Fever. Mathematical Biosciences and Engineering, 2023, 20(10): 18916-18938. doi: 10.3934/mbe.2023837
    [7] Yijun Lou, Li Liu, Daozhou Gao . Modeling co-infection of Ixodes tick-borne pathogens. Mathematical Biosciences and Engineering, 2017, 14(5&6): 1301-1316. doi: 10.3934/mbe.2017067
    [8] Muntaser Safan, Bayan Humadi . An SIS sex-structured influenza A model with positive case fatality in an open population with varying size. Mathematical Biosciences and Engineering, 2024, 21(8): 6975-7011. doi: 10.3934/mbe.2024306
    [9] Wandi Ding . Optimal control on hybrid ODE Systems with application to a tick disease model. Mathematical Biosciences and Engineering, 2007, 4(4): 633-659. doi: 10.3934/mbe.2007.4.633
    [10] Jianquan Li, Zuren Feng, Juan Zhang, Jie Lou . A competition model of the chemostat with an external inhibitor. Mathematical Biosciences and Engineering, 2006, 3(1): 111-123. doi: 10.3934/mbe.2006.3.111
  • In recent years, the growing pervasiveness of wearable technology has created new opportunities for medical and emergency rescue operations to protect users' health and safety, such as cost-effective medical solutions, more convenient healthcare and quick hospital treatments, which make it easier for the Internet of Medical Things (IoMT) to evolve. The study first presents an overview of the IoMT before introducing the IoMT architecture. Later, it portrays an overview of the core technologies of the IoMT, including cloud computing, big data and artificial intelligence, and it elucidates their utilization within the healthcare system. Further, several emerging challenges, such as cost-effectiveness, security, privacy, accuracy and power consumption, are discussed, and potential solutions for these challenges are also suggested.



    Ehrlichiosis, formally known as human monocytic ehrlichiosis, was recognized as a human disease in the late 1980s; however, official reporting by the CDC on the disease began in 2000 [1,2]. Canine ehrlichiosis, a disease caused by the Ehrlichia bacteria, has received particular attention due to its influence on the health of domesticated dogs. These illnesses, which are transmitted to people by tick bites, pose a substantial danger to world health due to their potential for broad transmission and complex ecological dynamics. Ehrlichia ewingii, Ehrlichia muris eauclairensis, and Ehrlichia chaffeensis are bacterial species belonging to the class Ehrlichiosis. Among these, Ehrlichia chaffeensis is the most prevalent in the United States [2]. The bacterium responsible for ehrlichiosis is transmitted to humans primarily by Amblyomma americanum, which is of significant concern in the United States not only due to its extremely aggressive and somewhat indiscriminate biting behavior throughout all three life stages, but also because of its potential to transmit several bacteria known to cause diseases in humans [3].

    Amblyomma americanum, commonly known as the lone star tick, is widely distributed across the eastern and central United States, with a range that has expanded due to climate change and habitat alterations [4,5]. It thrives in wooded areas, grasslands, and dense brush, where it can easily find hosts. The tick's life cycle consists of four stages, egg, larva, nymph, and adult, each requiring a blood meal to progress to the next stage [6]. A. americanum feeds on a variety of animals, including mammals, birds, and reptiles. Larvae and nymphs feed on small mammals such as rodents and rabbits [7], while adult ticks feed on large mammals such as foxes and coyotes but they primarily rely on white-tailed deer as their main hosts [8]. Coyotes, foxes, and owl are predatory animals that feed on small animals such as rabbits and rodents [9].

    Extensive research has been conducted on the role of host abundance and tick ecology in disease transmission (see [10,11,12,13] and references therein); however, the impact of predation — both lethal (direct consumption of hosts) and non-lethal (behavioral and physiological changes in host populations due to predation risk) — remains less explored in mathematical models. Fear of predation can lead to a range of behavioral, physiological, and ecological responses in prey populations. The effect of these responses on the prey population and disease dynamics can be as significant as direct predation itself [14]. For instance, the fear of predators can alter host behavior, leading to reduced foraging and movement, which may decrease tick-host contact rates [15,16]. Chronic stress from predation risk can suppress host immune responses, potentially increasing their susceptibility to infection [17].

    Changes in habitat use due to predator presence may modify tick-host encounter rates, either reducing or amplifying disease transmission [16]. Prey-predator interactions are fundamental drivers of ecosystem dynamics, with cascading effects that can ripple through entire food webs [18,19]. Wang et al. [20] explore the fear effect in prey-predator interactions, revealing how the perception of predation risk can influence prey behavior and, by extension, disease transmission dynamics. This insight broadens our understanding of the non-lethal effects of predation.

    Some recent studies have shed light on how the non-lethal effects of predation affect disease dynamics. In this context, Hossain et al. [21] observed that fear can eliminate chaotic oscillations of their proposed system by either making the endemic equilibrium regular (stable equilibium point or stable limit cycle) or moving it towards the disease-free state. Recently, Zhang [22] investigated the effect of the fear factor on an eco-epidemiological system with a standard incidence rate and found that an increase in the level of fear changed a disease-free equilibrium from unstable to stable. Moreover, the study by Pribadi and Chalasani [23] delves into fear conditioning in invertebrates, opening up new avenues for understanding the psychological and behavioral aspects of prey species when confronted with predation threats. However, the intricate relationship between prey-predator interactions, fear, and tick-borne diseases has not been comprehensively explored. This gap in our knowledge highlights the critical need for further investigation on how ecological factors like prey-predator interactions and fear responses influence disease dynamics. To effectively mitigate tick-borne diseases, we must understand how prey-predator interactions, mediated by fear, impact disease prevalence in ticks.

    The goal of this study is to understand the complex interplay between lethal and non-lethal predation on the dynamics of tick-borne diseases with the aim of addressing the following specific research questions:

    1. What are the cascading effects of fear within ecosystems, and how do they influence tick abundance, prey behavior, and ultimately, disease transmission dynamics?

    2. Can fear-induced changes in host behavior and predator dynamics serve as effective tools in managing tick-borne disease risk within a given ecosystem?

    The rest of the paper is organized as follows: in Section 2, we begin by formulating the ticks-prey-predator dynamics with disease.

    In order to capture the intricacies of Amblyomma Americanum ticks' life cycle, we classify the ticks into their different life stages and explore stability analysis and sensitivity analyzes of the resulting model. Moving into Section 3, we use a reduced version of the disease model following some stated assumption and subsequently carry out the stability. In Section 5, we carry out extensive simulations using results from the sensitivity analysis. These simulations offer a glimpse into the practical implications of our findings, bridging the gap between theoretical insights and practical applications. We discuss and summarize our findings in Section 6.

    To formulate the ticks-prey-predator dynamics with disease, we adapt some of the approaches used in earlier modeling of ticks dynamics in [24,25,26]. We assume that transovarial transmission is very unlikely for ehrlichiosis, so all eggs laid are without infection. The eggs hatch into susceptible larvae (LS) which progresses into infectious larvae (LI) after acquiring infection from feeding on an infected prey (MI) at the rate λLM expressed as

    λLM=βLMMIM,

    where βLM is the effective transmission probability and M is the total prey population (susceptible and infected). The susceptible and infected larvae mature at the rate σL or die in a density dependent manner (μL(LS,LI,M)) express as

    μL(LS,LI,M)=0.25+[0.015ln(1.01+LS+LIM)].

    Thus, we have the following equations for susceptible and infected larvae:

    dLSdt=σEEλLMLSσLLSμL(LS,LI,M)LS,dLIdt=λLMLSσLLIμL(LS,LI,M)LI,

    Regardless of whether or not larvae are susceptible or infectious (LS and LI, respectively), they molt into nymphs at the rate σL once fully engorged from a blood meal, or die at the density dependent rate, μN(NS,NI,M,P) given as

    μN(NS,NI,M,P)=0.45+[0.02ln(1.01+NS+NIM+P)],

    The nymph life-stage is the least discriminant when it comes to host preference and as such, we incorporate the potential for nymphs to feed on both prey and predator which are small and large hosts respectively. At this stage the susceptible nymphs may become infected if feeding on an infectious host. The force of infection, λNM, is defined as:

    λNM=βNMMIM+βNPPIP,

    where βNM is the probability that a susceptible nymph becomes infected after feeding on an infectious host. M, and P are the number of susceptible and infectious prey and predator hosts. The susceptible and infectious nymphs mature to become adult ticks at the rates σN. The equations describing the rates of change for susceptible and infectious nymph populations (NS and NI, respectively) are:

    dNSdt=σLLSλNMNSσNNSμN(NS,NI,M,P)NS,dNIdt=σLLI+λNMNSσNNIμN(NS,NI,M,P)NI,

    The susceptible and infectious adult ticks quest for hosts, especially larger hosts like the predator population. At this point, there is the possibility of a susceptible tick becoming infected if feeding on an infectious host. The force of infection for feeding adult ticks is:

    λAP=βAPPIP,

    where βAP is the probability that a susceptible adult becomes infected after feeding on an infectious host. The susceptible and infectious populations are reduced by natural death at the rates (μA(AS,AI,P)AS), expressed as

    μA(AS,AI,P)=0.35+[0.03ln(1.01+AS+AIP)].

    With these, we have the following equations for susceptible and infectious feeding adults, given as AS and AI:

    dASdt=σNNSλAPASμA(AS,AI,P)AS,dAIdt=σNNI+λAPASμA(AS,AI,P)AI,

    Note that once a larvae (or nymph or adult) becomes infectious, it remains so for the rest of its life.

    Like the expression for the susceptible and infected tick populations we can express the susceptible and infected in the prey and predator systems as

    dMSdt=(πM1+τP)(1MKM)M(αMPa+M)MSλMTMSμMMS,dMIdt=λMTMSμMMI(αMPa+M)MI,dPSdt=πP(MS+MI)(PS+PI)a+MλPAPSμPPS,dPIdt=λPAPSμPPI,

    where the forces of infection for the prey and predator λMT and λPA are express as:

    λMT=βMT(LI+NI)M,λPA=βPA(NI+AI)P,

    where βMT and βPA are the probability that a susceptible prey and predator becomes infected after been fed on by an infectious tick.

    Furthermore, we assume that the host do not recover from the infection, see [27,28]. With these assumptions we have the following system of equations for the eggs and the larvae, nymphs, and adults:

    dEdt=fπE(A,P)(1EKE)(AS+AI)σEEμEE,dLSdt=σEEλLMLSσLLSμL(LS,LI,M)LS,dLIdt=λLMLSσLLIμL(LS,LI,M)LI,dNSdt=σLLSλNMNSσNNSμN(NS,NI,M,P)NS,dNIdt=σLLI+λNMNSσNNIμN(NS,NI,M,P)NI,dASdt=σNNSλAPASμA(AS,AI,P)AS,dAIdt=σNNI+λAPASμA(AS,AI,P)AI,dMSdt=(πM1+τP)(1MKM)MλMTMS(αMPa+M)MSμMMS,dMIdt=λMTMSμMMI(αMPa+M)MI,dPSdt=πP(MS+MIa+M)(PS+PI)λPAPSμPPS,dPIdt=λPAPSμPPI, (2.1)

    The model flow diagram is given in Figure 1.

    Figure 1.  Flow diagram of ticks-prey-predator model (2.1) with disease.

    Following the results in subsection 3.1 and the approach in Guo and Agusto [29] we can prove the following lemmas for model positivity and boundedness of solutions.

    Lemma 1. Let the initial data F(0)0, where F(t)=(E(t),LS(t),LI(t),NS(t),NI(t), AS(t),AI(t),MS(t),MI(t),PS(t),PI(t)). Then the solutions F(t) of the system are non-negative for all t>0.

    Lemma 2. The region Ω=ΩTΩMPR7+×R4+ is positively-invariant for the system with non-negative initial conditions in R11+.

    where,

    ΩT={(E(t),LS(t),LI(t),NS(t),NI(t),AS(t),AI(t))R7+:E(t)KE,NT(t)σEKEμT},with,μT=min(μL(LS,LI,M),μN(NS,NI,M,P),μA(AS,AI,P)),

    NT=LS(t)+LI(t)+NS(t)+NI(t)+AS(t)+AI, and E(t)<KE.

    ΩMP={(MS(t),MI(t),PS(t),PI(t))R4+:(MS(t),MI(t),PS(t),PI(t))rη},

    where r=KM(πMμM+η)24πM>0.

    Proof. The first seven equations of model (2.1) give the following after summing the equations representing the larvae, nymphs, and adult stages

    dE(t)dt=fπE(A,P)(1EKE)(AS+AI)(σE+μE)E (2.2)
    dNT(t)dt=σEEμTNT, (2.3)

    where μT=min{μL(LS,LI,M),μN(NS,NI,M,P),μA(AS,AI,P)}, Since KE is the carrying capacity, it follows that EKE. Hence, equation (2.3) becomes

    dNT(t)dtσEKEμTNT,

    Thus,

    NT(t)σEKEμT+(NT(0)σEKEμT)eμTt, (2.4)

    If NT(0)=σEKEμT, then NT(t)=σEKEμT. Hence, equation (2.4) implies that NT(t) is bounded. Furthermore, in Section 3.1 below, we show that the domain ΩMP is bounded. Thus, all solutions starting in the region Ω remain in Ω. Hence, the region is positively-invariant and hence, the region Ω attracts all solutions in R11+.

    The tick-prey-predator model has a disease-free equilibrium (DFE) denoted by E0. The DFE is obtained by setting the right-hand sides of the equations in the model (2.1) to zero, which is given by

    E0=(E,LS,0,NS,0,AS,0,MS,0,PS,0),

    The analytical expression of the DFE is difficult to obtain due to the nonlinearity of the density-dependent fecundity and mortality functions in the tick population, see subseection 3.1.2 above. To establish the stability of disease-free equilibrium (E0) we use the reproduction number R0 which is obtained using the next generation operator method on system (2.1). Taking LI,NI,AI,MI, and PI as the infected compartments and then using the notation in [30], the Jacobian F and V matrices for new infectious terms and the remaining transfer terms are defined as:

    F=(0000βPA00βMTβMT00βLMLSMS000βNPNSPSβNMNSMS000βAPASPSβAPASPS000),V=(μP00000k100000k20000σLk30000σNμAI(P)),

    where k1=αMPa+M+μM,k2=σL+0.25+0.015ln(1.01MS),k3=σN+0.45+0.02ln(1.01MS+PS), and μAI(P)=0.35+0.03ln(1.01PS).

    Therefore, the reproduction is given as R0=ρ(FV1), where ρ is the spectra radius is given as

    R0=22MSμAI(P)PSk1k2k3μp×{MSμAI(P)PSk1k2k3μp×[k1k2βPA(ASk3βAP+NSβNPσN)MS+μAI(P)βMTμp(LSk3βLM+LSβLMσL+NSk2βNM)PS+([k1k2βPA(ASk3βAP+NSβNPσN)MS]22k1k2βPAμAI(P)βMTμp[ASk3βAP(LSk3βLM+LSβLMσL+NSk2βNM)+NSβNPσN(LSk3βLMLSβLMσLNSk2βNM)]MSPS+[μAI(P)βMTμp(LSk3βLM+LSβLMσL+NSk2βNM)PS]2+4AS(MS)2NSμAI(P)k1k22k3βAPβMTβNPβPAμp)12]}12,

    It is worth mentioning that R0>0 provided

    [k1k2βPA(ASk3βAP+NSβNPσN)MS]2+[μaI(aI,p)βMTμp(LSk3βLM+LSβLMσL+NSk2βNM)PS]2+4AS(MS)2NSμaI(aI,p)k1k22k3βAPβMTβNPβPAμp>2k1k2βPAμaI(aI,p)βMTμp[ASk3βAP(LSk3βLM+LSβLMσL+NSk2βNM)+NSβNPσN(LSk3βLMLSβLMσLNSk2βNM)]MSPS,

    Thus, the following result is established using Theorem 2 in [30].

    Lemma 3. The DFE of ticks-prey-predator model (2.1) with disease, given by E0, is locally asymptotically stable (LAS) if R0<1, and unstable if R0>1.

    The basic reproduction number (R0) measures the average number of new infections generated by a single infected individual (tick, prey or predator) in a completely susceptible population [30,31,32,33]. Thus, Lemma 3 implies that malaria can be eliminated from the human population (when R0<1) if the initial sizes of the sub-populations are in the basin of attraction of the DFE, E0.

    To formulate the ticks-prey-predator dynamics, we classified the Amblyomma Americanum ticks into the following life stages: egg E, larvae L, nymph N, and adult A while P and M are predator and prey populations respectively.

    The number of eggs are determined, in part, by the number of egg-laying adults. The fecundity of egg-laying adults is reduced in a density-dependent manner by the factor πE(A,P), with a female having the capacity to lay a maximum of f = 6000 eggs if πE(A,P)=1. The function is given as:

    πE(A,P)=1{0.25+[0.045ln(1.01+AP)]},

    where P is the population of the predator. The egg hatch into larvae at the rate σE or the decay at a fixed daily, per-capita rate (μE). The equation for the eggs (E) is given by:

    dEdt=fπE(A,P)(1EKE)A(σE+μE)E,

    The larvae population (L) increases depending on the egg developmental rate or hatching rate (σE). The population decreases via maturation by a fixed rate σL as well as via death in a density dependent manner described as:

    μL(L,M)=0.25+[0.0155ln(1.01+LM)],

    Thus, the equation for the larvae (L) population is given by:

    dLdt=σEE[σL+μL(L,M)]L,

    The population of the nymphs increase following the maturation of the larvae. Nymphs that survive feeding on a host then become engorged, once engorged, they either molt into adult ticks at the rate σN, or die in a density-dependent manner described as:

    μN(N,M,P)=0.45+[0.025ln(1.01+NM+P)],

    where M is population of the prey. Hence, the equations describing the rates of change for the nymph population (N) is given as:

    dNdt=σLL[σN+μN(N,M,P)]N,

    Once attached to a host, the adult ticks can take up to several days to finish feeding. They may also die in a density dependent manner:

    μA(A,P)=0.35+[0.035ln(1.01+AP)],

    All of these components lead to the following equations for adult ticks, given as:

    dAdt=σNNμA(A,P)A,

    We assume that the prey population grew logistically; however, the population is also limited due to the fear of the predator at the rate (πM1+τP), where πM is the preys birth rate and τ regulates the strength of fear incited by the predator. This decreasing fear function (11+τP) was first introduced by Wang et al. [20]. The function has gained widespread acceptance within the research community, as evidenced by its adoption and application in various studies. For more information, see [21,34,35] and references therein. Biologically meaningful properties are embedded within the fear function, which dictate its behavior within the model framework.

    (i) In the absence of fear (τ=0), the fear function yields:

    11+0P=1,

    (ii) When there are no predators (P=0), the fear function becomes:

    11+τ0=1,

    (iii) As the fear level increases (τ), the fear function approaches zero:

    limτ11+τP=0,

    (iv) When the predator population is abundant (P), the fear function tends to zero, causing the birthrate or disease transmission rate to decline:

    limP11+τP=0,

    The properties of the fear function represent biological and epidemiological factors such as fear intensity, predator presence, and population dynamics, all of which impact disease transmission.

    The prey population is reduced by predation by a Holling type 2 functional response at the rate (αMMa+M), where αM is the attack rate of the predator. We note that μM represents the death rate of the prey that is not influenced by fear of predators and thus is isolated from the logistic equation for the prey population. This novel phenomenon of splitting the natural death rate into two in prey dynamics involving fear of predation was recently introduced by Antwi-Fordjour et al. [36]. Thus, the rate of change of the prey population is expressed as:

    dMdt=(πM1+τP)(1MKM)M(αMPa+M)MμMM,

    The predator population increases after predation of the prey population at the rate (πPMa+M), where πP is the energy conversion rate due to predation of the prey. The energy conversion rate from prey to predator measures how efficiently a predator converts the energy from its prey into its own growth and reproduction. The predator population is reduced due to mortality at the rate μP. Thus the equation of the predator population is given as:

    dPdt=(πPMa+M)PμPP,

    Combining the above description and assumptions we have the following system of equations for the ticks-prey-predator system:

    dEdt=fπE(A,P)(1EKE)A(σE+μE)EdLdt=σEEσLLμL(L,M)LdNdt=σLLσNNμN(M,N,P)NdAdt=σNNμA(A,P)AdMdt=(πM1+τP)(1MKM)M(αMPa+M)MμMMdPdt=(πPMa+M)PμPP, (3.1)

    The model flow diagram is given in Figure 2 and the description of the parameters and the values used in simulations are given in Table 1.

    Figure 2.  Flow diagram of ticks-prey-predator model (3.1).
    Table 1.  Description of the parameters of the ticks-prey-predator model (3.1). Tick related parameter values and estimates are taken from [24,25] and the varied prey-predator related parameter values are biologically feasible.
    Parameter/Variable Description Value References
    πE Growth rate of eggs dependent on A and P [24,25]
    μL Larva death rate as a function of L and M [24,25]
    μN Nymphs death rate as a function of M,N and P [24,25]
    μA Adults ticks death rate as a function of A and P [24,25]
    f Birthrate of tick eggs 6000 [25]
    KE Carrying capacity of eggs 15000 Variable
    σE Eggs maturation rate 1/5 [25]
    μE Eggs in-viability rate 0.008 [25]
    σL Larva maturation rate 1/5 [25]
    σN Nymphs maturation rate 1/7 [25]
    πM Preys birth rate 0.8 Variable
    τ Strength of fear of predators 1 [37]
    KM Carrying capacity of preys 1 [38]
    μM Preys natural death rate 0.1 [39]
    αM Predators attack rate 0.5 [39]
    a Half saturation constant 0.4 Variable
    πP Predator biomass conversion efficiency 1.5 Variable
    μP Predators natural death rate 0.3 Variable

     | Show Table
    DownLoad: CSV

    We shall investigate the positivity and boundedness of the prey and predator populations of system (3.1). From an ecological standpoint, the biomass of a population cannot exhibit negativity at any point in time, thereby necessitating the persistence of non-negative solutions. Boundedness guarantees that these populations will not undergo exponential growth over an extended duration.

    Theorem 1. For all t0, the solutions (M(t),P(t)) of the system (3.1) with initial conditions M(0)0 and P(0)0 remain non-negative.

    Proof. Since the functions on the right-hand side of system (3.1) are continuous and locally Lipschitz in the positive octant R2+, the system has a unique solution that exists for all t[0,).

    The predator (P) and prey (M) equations of system (3.1) can be rewritten as

    dMdt=Mg1(M,P)dPdt=Pg2(M,P), (3.2)

    where

    g1(M,P)=(πM1+τP)(1MKM)(αMPa+M)μMg2(M,P)=(πPMa+M)μP,

    We apply the integrating factor technique to system (3.2), a fundamental method for solving differential equations, to find the solutions of the system (3.1);

    M(t)=M(0)exp(t0g1(M,P)ds),P(t)=P(0)exp(t0g2(M,P)ds),

    From the expressions above, it is clear that M(t) and P(t) remain non-negative for all future time if they initiate from an interior initial point of

    R2+={(M(t),P(t)):M(t)0,P(t)0},

    Theorem 2. The solutions (M(t),P(t)) of system (3.1) with initial conditions M(0)>0,P(0)>0 are ultimately bounded.

    Proof. Consider the function W(M(t),P(t))=M(t)+P(t). Thus

    dW(M(t),P(t))dt=dMdt+dPdt=(πM1+τP)(1MKM)M(αMPa+M)MμMM+(πPPa+M)MμPP=(πM1+τP)(1MKM)M+((πPαM)Pa+M)MμMMμPP,

    Assume πP<αM, and ηR+ such that ημP and πM+η>μM. Due to the positivity of the solutions, it is obvious that M(t)KM by comparison to the logistic equation.

    Then,

    dWdt+ηW=(πM1+τP)(1MKM)M+((πPαM)Pa+M)MμMMμPP+η(M+P)(πM1+τP)(1MKM)MμMMμPP+η(M+P)πM(1MKM)MμMMμPP+η(M+P)=πMMπMKMM2μMMμPP+ηM+ηP=(πMμM+η)MπMKMM2(μPη)P(πMμM+η)MπMKMM2KM(πMμM+η)24πM=r,

    where r=KM(πMμM+η)24πM>0. By solving the differential inequality above, we obtain the solution

    0W(M(t),P(t))rη(1eηt)+W(M(0),P(0))eηt,

    Thus,

    0W(M(t),P(t))rη,ast,

    Therefore, the solutions (M(t),P(t)) to the system (3.1) with positive initial conditions are ultimately bounded.

    To find equilibrium points, we need to set the derivatives of all variables to zero and solve the resulting equations simultaneously.

    fπE(P)(1EKE)AσEEμEE=0σEEσLLμL(M)L=0σLLσNNμN(M,P)N=0σNNμA(P)A=0(πMM1+τP)(1MKM)(αMPa+M)MμMM=0(πPMa+M)PμPP=0,

    Denote the equilibrium values as follows:

    P=P,M=M,E=E,L=L,N=N,A=A

    Since the equations are highly nonlinear in nature due to the density-dependent fecundity and mortality in the tick population, making it difficult to find analytical solutions. As a result, it may not be feasible to solve them explicitly. Instead, it may be necessary to employ numerical methods or utilize software tools to obtain approximate values for the equilibrium points.

    However, it is biologically feasible to assume that the number of larvae, nymphs, and adult ticks are smaller than the number of eggs (that is, A<N<L<KE), since most ticks die if they are unable to find a host to fed on [40]; from subsection 3.1 above we have that the prey and predator population are bounded, that is |M|C1 and |P|C2, where C1 and C2 are non-negative constants; then we can assume that the tick fecundity and mortality are constant rates (that is πE,μE,μL,μN, and μA). Thus model (3.1) reduces to the following simple system

    dTdt=πTμTTdMdt=(πMM1+τP)(1MKM)(αMPa+M)MμMMdPdt=(πPMa+M)PμPP, (3.3)

    where πT=fπE, and T denotes the total tick population from eggs to adult. The reduced system (3.3) has three non-negative steady states namely:

    (i) Tick-only equilibrium (T,M,P)=(πTμT,0,0).

    (ii) Predator-free equilibrium (T,M,P)=(πTμT,KM(1μMπM),0) for πM>μM.

    (iii) The coexistence equilibrium (T,M,P)=(πTμT,aμPπPμP,w1w22αMKMτ(πPμP)), where πP>μP,w2>w21, and

    w1=KM(aμMτπP+αM(πPμP)),w2=KM[(α1aμMτ)2+4aαMτπM]π2P2αMμP[KM(αMaμMτ)+α2MKMμ2P+2aτπM(a+KM)]πP,

    Thus, the following Theorem gives the conditions for the stability of equilibrium points obtained from system (3.3).

    Theorem 3. Consider the system given by system (3.3). Then the following statements hold:

    (i) The tick-only equilibrium is locally asymptotically stable if μM>πM,

    (ii) The predator-free equilibrium point is locally asymptotically stable if μP>KMπP(μMπM)KMμMπM(a+KM),

    (iii) The coexistence equilibrium is locally asymptotically stable provided the signs of w3 and w4 given in (3.6) are positive.

    Proof. The Jacobain matrix for the system (3.3) at any equilibrium point is given as

    J=(μT000aαMP(a+M)2+πM(KM2M)KM(τP+1)μMτπMM(MKM)KM(τP+1)2αMMa+M0aπPP(a+M)2πPMa+MμP), (3.4)

    (i) To analyze the stability of the equilibrium where only ticks are present, we begin by evaluating the Jacobian matrix at the tick-only equilibrium point.

    J=(μT000πMμM000μP),

    The eigenvalues associated with the Jacobian matrix J are λ1=μT<0,λ2=πMμM and λ3=μP<0. Thus the tick-only equilibrium is locally asymptotically stable if μM>πM.

    (ii) To investigate the stability of predator-free equilibrium, we evaluate the Jacobian matrix at the predator-free equilibrium point,

    J=(μT000πM+μMKM(μMπM)(πM(μMτ(a+KM)+αM(Pτ+1)2)KMμ2Mτ)πM(Pτ+1)2(πM(a+KM)KMμM)00KMπP(μMπM)KMμMπM(a+KM)μP), (3.5)

    The eigenvalues associated with the Jacobian matrix J are λ1=μT<0,λ2=πM+μM<0 and λ3=KMπP(μMπM)KMμMπM(a+KM)μP. Thus the predator-free equilibrium is locally asymptotically stable if μP>KMπP(μMπM)KMμMπM(a+KM),

    (iii) From the Jacobian matrix (3.4), we derive the following characteristic equation

    (μTλ)(λ2+w3λ+w4)=0, (3.6)

    where

    w3=aαMP(a+M)2πPMa+M+2πMMKM(τP+1)+μM+μPπMτP+1,

    note that w3>0, if

    μM+μP>πPMa+M+πMτP+1aαMP(a+M)22πMMKM(τP+1),

    and

    w4=2πMπPM2KM(a+M)(τP+1)aτπMπPM2PKM(a+M)2(τP+1)2μMπPMa+M+aαMμPP(a+M)2+πMπPM(a+M)(τP+1)+aτπMπPMP(a+M)2(τP+1)2+2μPπMMKM(τP+1)+μMμPμPπMτP+1,

    Additionally, w4>0 if

    μMμP>2πMπPM2KM(a+M)(τP+1)+aτπMπPM2PKM(a+M)2(τP+1)2+μMπPMa+MaαMμPP(a+M)2πMπPM(a+M)(τP+1)aτπMπPMP(a+M)2(τP+1)22μPπMMKM(τP+1)+μPπMτP+1,

    The eigenvalues associated with the equation in (3.6) are λ1=μT<0 and other two roots (i.e., λ2 and λ3) of the quadratic equation in λ2+w3λ+w4=0. The other roots are given as λ2+λ3=w3>0 and λ2λ3=w4>0. Thus the stability of the coexistence equilibrium point depend on sign of w3 and w4.

    Deterministic model outputs are governed by its input parameters, which exhibit some uncertainty in the process of their selection. Exploration of the ticks-prey-predator models (2.1) and (3.1) above requires determination of which parameters most strongly affect key model outputs (such as the number of infected individuals). A global sensitivity analysis was carried out using Latin Hypercube Sampling (LHS) and partial rank correlation coefficients (PRCC) to assess the impact of parameter uncertainty and the sensitivity of these key model outputs of the numerical simulations to variations in each parameter. LHS is a stratified sampling without replacement technique which allows for an efficient analysis of parameter variations across simultaneous uncertainty ranges in each parameter [41,42,43,44]. To generate the LHS matrices, we assume that all the model parameters are uniformly distributed. PRCC measures the strength of the relationship between the model outcome and the parameters, stating the degree of the effect that each parameter has on the outcome [41,42,43,44]. It is a reliable sensitivity measure for nonlinear yet monotonic relationships between the model input and output, provided that the inputs have minimal or no correlation [42].

    We start by exploring first the sensitivity analysis of model(3.1) without disease and then model (2.1) with disease.

    For the ticks-prey-predator model (3.1), a total of 1,000 runs were then carried out for the model using parameter values sampled from the LHS matrix and the outcome were ranked using the PRCC method. The parameter values used are given in Tables 1 (with ranges varying from ±20% the stated baseline values). The response functions in this case are the sum of the ticks L+N+A, the preys (M), and the predators (P).

    The outcomes of the global sensitivity analysis are shown in Figure 3 and given in Table 2.

    Figure 3.  PRCC values for the ticks-prey-predator model (3.1) using as response functions (a) sum of ticks L+N+A; (b) prey (M); and (c) predator (P). Parameter values used are as given in Table 1.
    Table 2.  PRCC and p-values of the ticks-prey-predator model (2.1) using the sum of ticks L+N+A, prey (M), and predator (P) as response functions.
    Response function L+N+A M P
    Parameters PRCC p-value PRCC p-value PRCC p-value
    KE 0.9471 0 0.0022 0.9439 0.0345 0.2784
    μE -0.1706 0.0001 0.0245 0.4423 -0.0277 0.3845
    σE 0.9920 0 -0.0184 0.5642 -0.0337 0.2895
    σL 0.2118 0.0001 -0.0137 0.6668 0.0130 0.6822
    σN 0.1685 0.0001 -0.0091 0.7744 -0.0274 0.3888
    KM -0.2504 0.0001 -0.5105 0.0001 0.6927 0.0001
    πM -0.0250 0.4327 -0.2162 0.0001 0.6557 0.0001
    μM 0.0326 0.3064 0.1229 0.0001 -0.4581 0.0001
    τ -0.0521 0.1019 0.1014 0.0014 -0.4550 0.0001
    πP -0.8651 0.0001 -0.9615 0 0.9453 0
    μP 0.4262 0.0001 0.7504 0.0001 -0.9239 0
    αM -0.6624 0.0001 -0.6895 0.0001 -0.9727 0
    a 0.9073 0 0.9671 0 0.4524 0.0001

     | Show Table
    DownLoad: CSV

    The parameters with the most significant impact on the sum of ticks (L+N+A) are tick eggs maturation rate (σE), the egg carrying capacity (KE), the predator birth and natural death rates (πP, and μP), the predator's attack rate (αM), and the half saturation constant (a). Details are shown in Figure 3(a).

    The significant parameters for prey (M) response function are shown in Figure 3(b); these parameters are the carrying capacity (KM) of the prey, the predator birth and natural death rates (πP, and μP), the predators attack rate (αM), and the half saturation constant (a).

    For the predators (P) response function, the significant parameters are the predators birth and natural death rate (πP and μP). Other parameters are the preys' birth and natural death rate (πM and μM) and their carrying capacity (KM). The predators attack rate (αM), the half saturation constant (a), and the fear of predators (τ) are equally significant, see Figure 3(c).

    Note that the fear factor τ have a variable sensitivity indices for the three response function. It has a negative impact on the sum of the infected ticks, and the predator, and a positive significant impact on the prey population; however, the magnitude of the index is small.

    The sensitivity indices are either positive or negative indicating the direction of the impact on the response functions, and the values of the indices indicate the magnitude of the response functions, see Table 2.

    For ticks-prey-predator model (2.1) a total of 1,000 simulations (runs) of the model for the LHS matrix were also carried out, using the parameter values given in Tables 1 (with ranges also varying from ±20% the stated baseline values) and the same response functions namely the sum of infected ticks LI+NI+AI, infected preys (MI), and infected predators (PI). The PRCC method was then used to rank the parameter after the simulation runs were completed. The outcomes of the global sensitivity analysis are shown in Figure 4 and given in Table 3.

    Figure 4.  PRCC values for the ticks-prey-predator model (2.1) using as response functions (a) sum of infected ticks LI+NI+AI; (b) infected prey (MI); and (c) infected predator (PI). Parameter values used are as given in Table 1.
    Table 3.  PRCC and p-values of the ticks-prey-predator model (2.1) using the sum of infected ticks LI+NI+AI, infected prey (MI), and infected predator (PI) as response functions.
    Response function LI+NI+AI MI PI
    Parameters PRCC p-value PRCC p-value PRCC p-value
    KE 0.6749 0.0001 -0.0100 0.7546 0.0111 0.7280
    μE -0.0105 0.7436 -0.0032 0.9198 0.0528 0.0985
    σE 0.8561 0.0001 -0.0335 0.2938 0.0070 0.8261
    σL -0.0144 0.6513 0.0257 0.4205 0.0116 0.7162
    σN 0.0611 0.0557 -0.0750 0.0187 0.0323 0.3118
    βLM 0.0064 0.8411 -0.0366 0.2521 0.0183 0.5672
    βNM -0.0031 0.9234 0.0131 0.6814 0.0535 0.0936
    βNP 0.0103 0.7474 -0.0338 0.2898 -0.0377 0.2384
    βAP -0.0003 0.9929 -0.0275 0.3887 -0.0153 0.6321
    βMT -0.0280 0.3810 -0.0001 0.9974 0.0476 0.1359
    βPA 0.0508 0.1113 -0.0177 0.5786 -0.0070 0.8263
    KM -0.0812 0.0109 0.0289 0.3651 0.5860 0.0001
    πM -0.0108 0.7359 -0.0313 0.3269 0.3033 0.0001
    μM 0.0087 0.7849 0.0361 0.2579 -0.3583 0.0001
    τ -0.0421 0.1875 0.0201 0.5287 -0.1858 0.0001
    πP -0.4257 0.0001 0.0685 0.0319 0.9502 0
    μP 0.1660 0.0001 -0.0251 0.4327 -0.9229 0
    αM -0.1864 0.0001 -0.0205 0.5213 -0.9606 0
    a 0.4577 0.0001 -0.0905 0.0045 0.1729 0.0001

     | Show Table
    DownLoad: CSV

    Figure 4(a) depict the parameters with the most significant impact on the sum of infected ticks (LI+NI+AI), these are tick eggs maturation rate (σE), the egg carrying capacity (KE), the predators birth rate (πP), the predators attack rate (αM), and the half saturation constant (a).

    The impact of the model parameters on the infected preys (MI) are shown in Figure 4(c). The impact of the parameters on the response function MI are small, however, some of the effect of these parameters significant on MI. The significant parameters are the nymphs maturation rate (σN), the predator birth rates (πP), and the half saturation constant (a).

    Lastly for the infected predators (PI) depicted in Figure 4(c), the significant parameters are the egg carrying capacity (KE), the probability that a susceptible prey becomes infected from an infectious larvae tick (βLM), the prey carrying capacity (KM), preys birth and natural death rate (πM and μM). Other parameters are the fear of the predator (τ), predator biomass conversion efficiency (πP), predators natural death rate (μP), the predators attack rate (αM), and the half saturation constant (a).

    The fear term τ as for model (3.1) have a variable sensitivity indices for the three response function. It has a negative impact on the sum of the infected ticks, and the predator, and a positive significant impact on the prey population; however, the magnitude of the index is small.

    It is interesting to note that the infection transmission probabilities have mostly non-significant impact on all the response functions LI+NI+AI, MI, and PI except for the probability that a susceptible prey becomes infected from an infectious larvae tick (βLM).

    Parameters with the largest partial rank correlation coefficient (PRCC) values have the largest impact on each of the response functions. The parameters with positive PRCC values have a positive impact on the response function and lead to increase in their values. While the parameters with negative PRCC values will reduce the response function values.

    In this section, we simulate models (2.1) and (3.1) using initial conditions and parameter values that lead to unstable and stable dynamics, see Section 3.1. We start with the tick-prey-predator model (3.1) without disease and choose the unstable equilibrium due to the interesting dynamics exhibited by this equilibrium point. We also simulate the model (3.1) to show the impact of the attack rate and fear of the predator following the result of the sensitivity analysis in Section 4. Lastly, we simulate the ticks-prey-predator model (2.1) with disease to show the disease transmission dynamics given the interactions between the ticks, prey, and predator.

    We simulate the ticks-prey-predator model (3.1) using initial conditions and parameters values that lead to unstable and stable dynamics and focus on the prey-predator interaction. Figure 5(a) shows the dynamics when the equilibrium is unstable; while Figure 5(b) shows the dynamics when the equilibrium is stable. We see in Figure 5(a) an oscillatory dynamics as the prey and predator interact. This oscillatory behavior dissipates in a stable environment; see Figure 5(b). A stable attractor is observed in Figure 5(c). Here, the trajectory of the initial condition (IC) converges toward a stable limit cycle.

    Figure 5.  Numerical simulations of the ticks-prey-predator model (3.1) showing the prey-predator interaction when (a) the equilibrium is unstable; (b) the equilibrium is stable; (c) a stable limit cycle is observed from the phase portrait.

    Next, we simulate the ticks-prey-predator model (3.1) for the unstable prey-predator equilibrium to see the effect of the prey-predator interaction on the tick dynamics. Figure 6(a) shows the prey-predator interaction as in Figure 5. In Figure 6(b) we plot the simulation result of larvae and prey together. The figure shows the larvae population following the trajectory to the prey population. Similarly, we plot the simulation results of the eggs, nymphs, adults, along with predator. We also observed in Figure 6(c) the nymphs and the adult population following, in this case, the trajectory of the predator population, but that is not the case with the eggs.

    Figure 6.  Dynamics of the model (3.1) showing the impact of the prey-predator interactions on the tick population. (a) the prey-predator interactions; (b) effect of prey dynamics on larvae population; (c) effect of predator dynamics on the eggs, the nymphs, and adult population; (d) effect of prey-predator dynamics on ticks population.

    We simulate the ticks-prey-predator model (2.1) with disease using initial conditions and parameters values that lead to unstable dynamics and show the disease transmission dynamics given the interactions between the ticks, prey, and predator. We observed oscillatory dynamics in susceptible and infected populations as prey and predator interact (see Figure 7). These oscillatory dynamics are similar to the dynamics observed in model (3.1) without disease. Figure 7(a) shows the dynamics among the susceptible ticks, and prey population while Figure 7(b) shows the dynamics of the infected ticks and the prey population.

    Figure 7.  Dynamics of model (2.1) showing the effect of the prey-predator interactions on the tick populations; (a) effect of susceptible prey dynamics on susceptible larvae population; (b) effect of infected prey dynamics on infected larvae population; (c) effect of susceptible prey-predator dynamics on susceptible ticks population; (d) effect of infected prey-predator dynamics on infected ticks population.

    We observed in Figure 7(a) the trajectory of the susceptible larvae population follow the trajectory of the susceptible prey population as the model without disease. While susceptible nymphs and adults follow the trajectories of susceptible predators, see Figure 7(c). For the infected larvae in Figure 7(b), we observed more infected larvae when the infected prey population are low and few infected larvae when there are more infected prey. We also observed in Figures 7(c) and 7(d) the trajectories of the nymphs and adult population either susceptible or infected follow the trajectory of the predator population (susceptible or infected).

    Next, we run some simulation scenario using the results from the sensitivity analysis varying the prey-predator parameters αM (predator attack rate), τ (strength of fear of predators). The parameter αM have significant negative impact on the response functions for the sum of infected ticks LI+NI+AI, infected prey (MI) and infected predator PI; while the impact of τ is minimal and positive on the sum of infected ticks LI+NI+AI, and infected prey (MI). It is however, has negative impact on PI. Although the impact of this parameter is low and insignificant, we include this in our simulation because of it's biological importance.

    We set the predator attack rate αM to 0.5, 0.75, 0.95 and simulate model (3.1) to explore the effect of predator attack rate (αM) on the system. We observed from Figure 8(a) a significant decrease in the susceptible predator population (P) as the attack rate αM increases with a slight increase in the prey population (M) during the times the prey population increases following a decrease in the predator population. Figure 8(b) show the infected populations. We observed a decrease in both prey and predator populations with increasing attack rate; however, there are more infected prey when the predator are low. Furthermore, we observed in Figures 8(c) and 8(d) the cascading effect of the predator attack on prey who are the hosts to the larvae and nymph tick populations; thus as the attack rate increases we observed a decrease in the tick populations namely the larvae, nymphs, and adults.

    Figure 8.  Numerical simulations of the ticks-prey-predator model (3.1) varying predator attack rate (αM=0.5,0.75,0.95): (a) susceptible prey and predator; (b) infected prey and predators; (c) susceptible ticks (larvae, nymphs, and adults) (d) infected ticks. Green are larvae, cyan are nymphs, and red are adults. Solid lines represent αM=0.5, dash lines are αM=0.75, and dash dot lines represent αM=0.95.

    Next, we vary the fear of the predator and set the fear parameter τ to 1.50, 2.50, 4.50, and simulate model (2.1) to explore the effect of the predator fear rate (τ) on the system. We observed from Figure 9(a) a decrease in the susceptible predator population (PS) as τ increases with a horizontal shift to the right in the prey population (MS) when the prey population increases following a decrease in the predator population. Figure 9(b) show the infected populations (PI,MI). Both the prey and predator populations decrease with increasing attack rate; however, there are more infected prey when the predator are low. Figures 9(c) and 9(d) shows the cascading effect of the fear of predator on susceptible and infected tick populations; thus as the fear rate increases, we observed a decrease in larvae, nymphs, and adults tick populations; although this decrease is not as much as what we observed in Figure 8(b) above.

    Figure 9.  Numerical simulations of the ticks-prey-predator model (3.1) varying the fear of the predator (τ) setting τ=1.50,2.50,4.50: (a) susceptible prey and predator; (b) infected prey and predators; (c) susceptible ticks (larvae, nymphs, and adults) (d) infected ticks. Solid lines represent τ=1.50, dash lines are τ=2.50, and dash dot lines represent τ=4.50.

    Lastly, we vary together the predator attack rate (αM) and the fear of the predator (τ) and simulate model (2.1) to explore the joint effect of the predator attack rate (αM) and prey fear rate (τ) on the system. We observed a significant decrease in the susceptible predator population (PS) in Figure 10(a) as τ increases with a horizontal shift to the right in the susceptible prey population (MS) at the times the prey population increases following a decrease in the predator population. Figure 10(b) show the infected populations. We observed a decrease in both prey and predator populations with increasing attack rate; however, there are more infected prey when the predator when the prey are low. We also observed a strong cascading effect of the fear of predator on ticks in Figure 10(c) and 10(d); thus leading to a decrease in the larvae, nymphs, and adults tick populations as the attack and fear rates increases.

    Figure 10.  Numerical simulations of the ticks-prey-predator model (3.1) varying predators attack rate (αM) and fear of the predators (τ) setting αM=0.5,0.75,0.95 and τ=1.50,2.50,4.50 : (a) infected prey and predators; (b) infected ticks (larvae, nymphs, and adults). Solid lines represent αM=0.5,τ=1.50, dash lines are αM=0.75,τ=2.50, and dash dot lines represent αM=0.95,τ=4.50.

    Next, we vary the probability that a susceptible prey becomes infected from an infectious larvae tick (βLM) and set βLM=0.018,2×0.018,3×0.0.18 in Figure 11. We also vary the probability that a susceptible prey and predator becomes infected from an infectious nymphs and adult tick, and vice versa. We then double and triple βLM,βNM,βNP,βAP,βPA,βMT. Although these parameters have low sensitivities index from the sensitivity analysis results. We observed that as the transmission probabilities increases the susceptible populations (host and ticks) decreases and the infected populations increases.

    Figure 11.  Numerical simulations of the ticks-prey-predator model (3.1) varying predator attack rate (αM): (a) infected prey and predators; (b) infected ticks (larvae, nymphs, and adults). Solid lines represent βM=0.018, dash lines are βM=0.018×2, and dash dot lines represent βM=0.18×3.

    In this section we ran some simulation scenarios using some of the parameters with the most impact from the sensitivity analysis, specifically we varied the prey-predator parameters αM (predator attack rate), τ (strength of fear of predators). We also varied the transmission probabilitiesβLM,βNM,βNP,βAP,βPA,βMT, although these parameters had minimal effect on the response functions used in the sensitivity analysis. We observed a cascading effect of the predator's attack and fear on the prey and the tick populations, since the prey are hosts of the larvae and nymphs. We summarized below the findings from the simulations

    (i) Varying predator attack rate (αM): As the attack rate on the prey increased the tick populations namely the larvae, nymphs, and adults we decreased;

    (ii) Varying the fear of the predator (τ): As the fear rate increased, the larvae, nymphs, and adults tick populations decreased;

    (iii) Varying transmission probability: As the transmission probabilities increased the infected populations increased leading to a decrease in the susceptible populations both host and ticks alike.

    The implications of these results are discussed next in the section below.

    In this paper we developed and analyzed two mathematical models involving ticks-prey-predator interactions model (2.1) with disease and model (3.1) without disease. We use Erhlichiosis as our model disease transmitted by ticks, see Erhlichiosis model in [24]. The quantitative analysis of model (2.1) with disease transmission, indicate that the disease-free equilibrium is locally asymptotically stable when the reproduction number is less than one and unstable otherwise.

    To carry out the quantitative analysis of ticks-prey-predator model (3.1), we first simplify the model. The quantitative analysis of the simplified form using boundedness of the prey and predator indicates that the model has three equilibrium points: tick-only equilibrium, predator-free equilibrium, and coexistence ticks-prey-predator equilibrium. These three equilibrium points are locally asymptotically stable given the conditions in Theorem 3.

    Next we carried out a global sensitivity analysis using LHS/PRCC method to determine the parameter with the most influence on the response functions obtained from the ticks-prey-predator model (3.1) without disease. The parameters with the most significant impact on the sum of ticks (L+N+A), the prey (M), and the predators (P) are the tick eggs maturation rate (σE), the egg carrying capacity (KE). Other significant parameters are the preys' birth and natural death rate (πM and μM) and their carrying capacity (KM). The parameter denoting the fear of predators (τ) is equally significant. The last sets of significant parameters are the predator birth and natural death rates (πP, and μP), the predator's attack rate (αM), and the half saturation constant (a).

    We also carried out a global sensitivity analysis using LHS/PRCC method to determine the parameters of the ticks-prey-predator disease model (2.1) with the most influence on the response functions namely the sum of infected ticks (LI+NI+AI), infected prey (MI), and the infected predators (PI). The most significant parameters for these functions shown in Figure 4 and given in Table 3. These parameters are tick eggs maturation rate (σE), the egg carrying capacity (KE), the probability that a susceptible prey becomes infected from an infectious larvae tick (βLM). The other significant parameters are the preys birth and natural death rate (πM and μM), and their carrying capacity (KM). The other equally significant parameters are the predator biomass conversion efficiency (πP) or predators birth rate, the natural death rate (μP), the attack rate (αM), and the half saturation constant (a). The other parameters are the fear of the predator (τ).

    The ticks-prey-predator interactions models (2.1) and (3.1) with and without disease have several significant parameters (like σE,KE,πM,μM,KM,πP,μP,αM, and τ) that are common given the three response functions under consideration. The parameter βLM from model (2.1) is the only parameter not common to both models.

    The fear term τ in models (2.1) and (3.1) have variable sensitivity indices for the three response functions. It has a negative impact on the sum of the infected ticks, and the predator, and a positive significant impact on the prey population, although their magnitude if small. This indicate that the effect of fear is negative on the ticks and predator and positive on the prey. This positive effect on the prey we expect is in the short term because studies have show that fear can affect the birth rate of prey population [45], limit foraging activities [46]. For instance, mule deer limit their forage due lion attacks [46]. Thus, in the long run that effect on the prey would be negative since the fear of the predator would prevent them from foraging for food and even mating leading to a decrease in their population over time [45,46,47].

    In Figure 6, we focus on the simulation of the ticks-prey-predator model (3.1) for the unstable prey-predator equilibrium shown in Figure 5(a) to see the effect of the prey-predator interaction on the ticks dynamics. Figure 6(a) shows the prey-predator dynamics. In Figure 6(b), we see that the larvae population follows the trajectory of the prey population, this is due to a number of factors: for instance, the larvae feeds on the prey. Furthermore, the larvae mortality which is density dependent is also dependent on the prey population; hence, the larvae population decreases with the prey population and increases when the prey population increases. We also observed in Figure 6(c) that the nymphs and the adult follow the predator population trajectory since the egg laying rate, nymph, and adult mortality both depends on the predator population. Additionally, the nymph population also depends on the prey population. However, from our numerical simulations, we observed dominance by the predator population in terms of following the trajectory. This is quite interesting and worthy of further investigation to ascertain the true cause of dominance by the predator population. This observation substantiate the results obtained in [48]. Although this interactions is between coral reef fishes; however, the authors emphasized the importance of predation and competition within hierarchies between two coral reef fishes.

    Considering the effect of varying the predators attack rate (αM) is crucial in understanding disease outbreaks within the populations. In Figure 8, we investigate how changes in the predators attack rate impact disease transmission. By adjusting αM from 0.5 to 0.95, we observed distinct outcomes. We observed in Figure 8(a) a decline in the populations of infected larvae, nymphs, and adult ticks as the predators attack rate on the prey increases. This decline indicates that the infected predators play a significant role in reducing the prevalence of tick-borne diseases by preying on the infected ticks. Consequently, the overall tick burden decreases, leading to a potential reduction in disease transmission to hosts. This observation from our numerical simulations substantiate experimental results in ecology where predators and competitors of vertebrates can in theory reduce the density of infected nymphs [18], and thus may have a cascading impacts on the tick-borne disease risk. However, in Figure 8(b), we observe a different trend. Here, despite the increase in predator activity, we notice a decrease in the predator population and a marginal rise in the prey population. This unexpected outcome suggests a possible trade-off between predator survival and prey control efficiency. The decline in the infected predator population might be attributed to the additional time and energy expended in intensifying attacks on infected prey individuals. As a result, while predator activity may initially reduce disease prevalence, sustained high attack rates could lead to a decline in predator fitness, potentially impacting long-term disease regulation dynamics.

    The non-lethal effect of predation due to fear (τ) is further explored in Figure 9. We observed a decline and shift in the dynamics of the infected ticks populations, i.e., larvae, nymphs, and adult ticks as the strength of fear parameter increases, see Figure 9(a). This observation indicates that intensifying the strength of fear of infected predators among infected prey populations lead to a decrease in tick burden within the ecosystem, thus a cascading effects on the tick-borne disease risks. Also, in Figure 9(b), we observed a decrease and shift in the infected predator populations and a slight decrease in the population of the infected prey. These could be due to several factors. Intensifying the strength fear of predators may have resulted in reduced encounter rates between infected predators and infected prey, limiting opportunities for predation and thus impacting the infected predator populations. In a related study [49], researchers found similar results. They noticed that as the fear of predation increased, the predator population decreased, and in some cases, high levels of fear even caused the predators to become extinct. Additionally, an increase in the strength of fear (τ) could lead to changes in infected predator behavior, such as decreased hunting efficiency. Conversely, the slight decrease in infected prey populations may be as a result from a combination of reduced predation pressure and altered prey behavior in response to fear. The infected prey populations may exhibit avoidance behaviors or alter their habitat use patterns to reduce encounters with infected predators, leading to a decrease in infected prey densities over time [50].

    In Figure 10, we carried out numerical simulations where we simultaneously increased both the infected predators' attack rate (αM) and the strength of infected predators fear (τ) to observe their combined impact on the dynamics of the system. Our observations revealed a trend consistent with the findings from individual parameter variations. As we increased both αM and τ simultaneously, we observed a decrease in the populations of infected larvae, nymphs, and adult ticks, see Figure 10(a). Similarly, we observed a decline and a shift in the predators population. Therefore, the combined effect of predators attack rate and the intensity of fear can have intricate consequences on populations of infected prey and predators, consequently influencing the risk of tick-borne diseases.

    To conclude, in this study we developed a deterministic model of ordinary differential equations to gain insight on the effect of prey-predator interaction and the cascading effect of fear of the predators on ticks population and disease prevalence. We found that tick host predator and fear of the predators reduces the tick populations and disease prevalence. We summarize the other results as follows:

    (i) The results of the Sensitivity analyzes was implemented using three response or output functions namely the sum of infected ticks (LI+NI+AI), infected predators (MI), and the infected predators (PI) to identify the parameters with the most impact on these functions in no particular order. The most significant common parameters among these functions are the eggs maturation rates (σE), and carrying capacity (KE). Other significant parameters are the preys birth and natural death rates (πM,μM). The last sets of significant common parameters are the predator birth and natural death rates (πP, and μP), the predator's attack rate (αM), and the half saturation constant (a). The probability that a susceptible prey becomes infected from an infectious larvae tick (βLM) is also a significant parameter.

    (ii) The trajectory of the susceptible larvae population follow the trajectory of the susceptible prey population. While susceptible nymphs and adults follow the trajectories of susceptible predator. The trajectories of the nymphs and adult population either susceptible or infected follow the trajectory of the predator population (susceptible or infected).

    (iii) There are more infected larvae when infected prey population are low and few infected larvae when there are more infected prey. Similar dynamics was observed for the infected nymphs and adult ticks and infected predator population.

    (iv) Prey predation and fear of predator have cascading effect on tick populations and disease prevalence. As prey attack rate increases, there is corresponding reduction in the prey and ticks population; furthermore as the fear of the predator increases we observed a reduction in the prey population which subsequently lead to a decrease in the ticks populations.

    In this study, we have used mathematical models to investigate the cascading effect of prey-predator interaction and predator fear tick populations and disease prevalence. One of the limitations of this study is not including additional source of food for the predator. We know that often times, the predator have other sources of food aside from the prey populations, see [51] and references therein. Another limitation of the study is that we were not specific as to the kind of prey population we are interested in; however, tick larvae and nymphs are known to feed on small mammals while the adult ticks feed on much larger mammals including the predators which we capture in the two models in this study. Another major drawback was the availability of data. Although, we have off set this drawback by using parameter estimates from literature; we are confident in our conclusions since are results are backed up by the outcomes obtained from the sensitivity analysis we carried out.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This material is based upon work supported by the National Science Foundation (NSF) under Grant No. DMS-1928930, National Security Agency (NSA) under Grant No. H98230-23-1-0012 and the Sloan Foundation under Grant G-2020-14104 while the author participated in ADJOINT hosted by the Mathematical Sciences Research Institute in Berkeley, California, in [2023-2024]. FBA had additional support from the National Science Foundation under the EPSCOR Track 2 grant number 1920946.

    The authors declare there is no conflict of interest.



    [1] W. Hou, Z. Ning, L. Guo, X. Zhang, Temporal, functional and spatial big data computing framework for large-scale smart grid, IEEE Trans. Emerging Top. Comput., 7 (2019), 369–379. https://doi.org/10.1109/TETC.2017.2681113 doi: 10.1109/TETC.2017.2681113
    [2] B. V. Vishakh, M. K. Khwaja, Wearable device for hearing impaired individuals using ZigBee protocol, in 2015 9th Asia Modelling Symposium (AMS), (2015), 181–184. https://doi.org/10.1109/AMS.2015.37
    [3] A. I. Hussein, Wearable computing: Challenges of implementation and itsfuture, in 2015 12th Learning and Technology Conference, (2015), 14–19. https://doi.org/10.1109/LT.2015.7587224
    [4] L. M. Koonin, B. Hoots, C. A. Tsang, Z. Leroy, K. Farris, B. T. Jolly, et al., Trends in the use of telehealth during the emergence of the COVID-19 pandemic-United States, January–March 2020, Morb. Mortal. Wkly. Rep., 69 (2020), 1595–1599. https://doi.org/10.15585%2Fmmwr.mm6943a3
    [5] Y. Mehmood, F. Ahmad, I. Yaqoob, A. Adnane, M. Imran, S. Guizani, Internet-of-things-based smart cities: Recent advances and challenges, IEEE Commun. Mag., 55 (2017), 16–24. https://doi.org/10.1109/MCOM.2017.1600514 doi: 10.1109/MCOM.2017.1600514
    [6] O. AlShorman, B. AlShorman, M. Al-khassaweneh, F. Alkahtani, A review of internet of medical things (iomt)-based remote health monitoring through wearable sensors: a case study for diabetic patients, Indones. J. Electr. Eng. Comput. Sci., 20 (2020), 414–422. https://doi.org/10.11591/IJEECS.V20.I1.PP414-422 doi: 10.11591/IJEECS.V20.I1.PP414-422
    [7] M. A. U. Khalid, S. H. Chang, Flexible strain sensors for wearable applications fabricated using novel functional nanocomposites: A review, Compos. Struct., 284 (2022), 115214. https://doi.org/10.1016/j.compstruct.2022.115214 doi: 10.1016/j.compstruct.2022.115214
    [8] F. J. Tovar-Lopez, Recent progress in micro-and nanotechnology-enabled sensors for biomedical and environmental challenges, Sensors, 23 (2023), 5406. https://doi.org/10.3390/s23125406 doi: 10.3390/s23125406
    [9] F. Ju, Y. Wang, B. Yin, M. Zhao, Y. Zhang, Y. Gong, et al., Microfluidic wearable devices for sports applications, Micromachines, 14 (2023), 1792. https://doi.org/10.3390/mi14091792 doi: 10.3390/mi14091792
    [10] W. Wang, Fusion application of cloud computing technology in the field of artificial intelligence, in 2021 3rd International Conference on Artificial Intelligence and Advanced Manufacture, (2021), 289–292. https://doi.org/10.1145/3495018.3495067
    [11] K. Ahmed, M. Gregory, Integrating wireless sensor networks with cloud computing, in 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks, (2011), 364–366. https://doi.org/10.1109/MSN.2011.86
    [12] M. Kumar, An incorporation of artificial intelligence capabilities in cloud computing, Int. J. Eng. Comput. Sci., 5 (2016), 19070–19073. https://doi.org/10.18535/ijecs/v5i11.63 doi: 10.18535/ijecs/v5i11.63
    [13] S. Razdan, S. Sharma, Internet of medical things (IoMT): Overview, emerging technologies, and case studies, IETE Tech. Rev., 39 (2022), 775-788. https://doi.org/10.1080/02564602.2021.1927863 doi: 10.1080/02564602.2021.1927863
    [14] X. Jin, B. W. Wah, X. Cheng, Y. Wang, Significance and challenges of big data research, Big Data Res., 2 (2015), 59–64. https://doi.org/10.1016/j.bdr.2015.01.006 doi: 10.1016/j.bdr.2015.01.006
    [15] A. Katal, M. Wazid, R. H. Goudar, Big data: issues, challenges, tools and good practices, in 2013 Sixth International Conference on Contemporary Computing (IC3), (2013), 404–409. https://doi.org/10.1109/IC3.2013.6612229
    [16] W. Hu, Big Data Management, Technologies, and Applications, IGI Global, Pennsylvania, 2013.
    [17] N. Shakhovska, N. Boyko, Y. Zasoba, E. Benova, Big data processing technologies in distributed information systems, Proc. Comput. Sci., 160 (2019), 561–566. https://doi.org/10.1016/j.procs.2019.11.047 doi: 10.1016/j.procs.2019.11.047
    [18] V. Storey, I. Song, Big data technologies and management: What conceptual modeling can do, Data Knowl. Eng., 108 (2017), 50–67. https://doi.org/10.1016/j.datak.2017.01.001 doi: 10.1016/j.datak.2017.01.001
    [19] C. Yang, Q. Huang, Z. Li, K. Liu, F. Hu, Big data and cloud computing: Innovation opportunities and challenges, Int. J. Digital Earth, 10 (2017), 13–53. https://doi.org/10.1080/17538947.2016.1239771 doi: 10.1080/17538947.2016.1239771
    [20] M. Hajibaba, S. Gorgin, A review on modern distributed computing paradigms: Cloud computing, jungle computing and fog computing, J. Comput. Inf. Technol., 22 (2014), 69–84. https://doi.org/10.2498/cit.1002381 doi: 10.2498/cit.1002381
    [21] S. Goyal, Public vs private vs hybrid vs community-cloud computing: a critical review, Int. J. Comput. Network Inf. Secur., 6 (2014), 20–29. https://doi.org/10.5815/ijcnis.2014.03.03 doi: 10.5815/ijcnis.2014.03.03
    [22] X. He, G. Qi, Z. Zhu, Y. Li, B. Cong, L. Bai, Medical image segmentation method based on multi-feature interaction and fusion over cloud computing, Simul. Modell. Pract. Theory, 126 (2023), 102769. https://doi.org/10.1016/j.simpat.2023.102769 doi: 10.1016/j.simpat.2023.102769
    [23] M. N. O. Sadiku, S. M. Musa, O. D. Momoh, Cloud computing: opportunities and challenges, IEEE Potentials, 33 (2014), 34–36. https://doi.org/10.1109/MPOT.2013.2279684 doi: 10.1109/MPOT.2013.2279684
    [24] S. Zhang, H. Yan, X. Chen, Research on key technologies of cloud computing, Phys. Proc., 33 (2012), 1791–1797. https://doi.org/10.1016/j.phpro.2012.05.286 doi: 10.1016/j.phpro.2012.05.286
    [25] P. Kalagiakos, P. Karampelas, Cloud computing learning, in 2011 5th International Conference on Application of Information and Communication Technologies (AICT), (2011), 1–4. https://doi.org/10.1109/ICAICT.2011.6110925
    [26] T. Hu, H. Chen, L. Huang, X. Zhu, A survey of mass data mining based on cloud-computing, Anti-counterfeiting Secur. Identif., (2012), 1–4. https://doi.org/10.1109/ICASID.2012.6325353 doi: 10.1109/ICASID.2012.6325353
    [27] H. Nashaat, N. Ashry, R. Rizk, Smart elastic scheduling algorithm for virtual machine migration in cloud computing, J. Supercomput., 75 (2019), 3842–3865. https://doi.org/10.1007/s11227-019-02748-2 doi: 10.1007/s11227-019-02748-2
    [28] Statista, Amazon Maintains Lead in the Cloud Market, 2023. Available from: https://www.statista.com/chart/18819/worldwide-market-share-of-leading-cloud-infrastructure-service-providers/.
    [29] R. Hammad, M. Barhoush, B. H. Abed-Alguni, A semantic-based approach for managing healthcare big data: A survey, J. Healthcare Eng., 2020 (2020), 8865808. https://doi.org/10.1155/2020/8865808 doi: 10.1155/2020/8865808
    [30] R. Lin, Z. Ye, H. Wang, B. Wu, Chronic diseases and health monitoring big data: A survey, IEEE Rev. Biomed. Eng., 11 (2018), 275–288. https://doi.org/10.1109/RBME.2018.2829704 doi: 10.1109/RBME.2018.2829704
    [31] L. Sun, X. Jiang, H. Ren, Y. Guo, Edge-cloud computing and artificial intelligence in internet of medical things: architecture, technology and application, IEEE Access, 8 (2020), 101079–101092. https://doi.org/10.1109/ACCESS.2020.2997831 doi: 10.1109/ACCESS.2020.2997831
    [32] H. V. Jagadish, J. Gehrke, A. Labrinidis, Y. Papakonstantinou, J. M. Patel, R. Ramakrishnan, et al., Big data and its technical challenges, Commun. ACM, 57 (2014), 86–94. https://doi.org/10.1145/2611567 doi: 10.1145/2611567
    [33] C. H. Lee, H. Yoon, Medical big data: promise and challenges, Kidney Res. Clin. Pract., 36 (2017), 3–11. https://doi.org/10.23876/j.krcp.2017.36.1.3 doi: 10.23876/j.krcp.2017.36.1.3
    [34] P. Langkafel, Big Data in Medical Science and Healthcare Management: Diagnosis, Therapy, Side Effects, De Gruyter, Boston, 2016. https://doi.org/10.1515/9783110445749
    [35] X. Xu, C. Li, X. Lan, X. Fan, X. Lv, X. Ye, et al., A lightweight and robust framework for circulating genetically abnormal cells (CACs) identification using 4-color fluorescence in situ hybridization (FISH) image and deep refined learning, J. Digit. Imaging, 36 (2023), 1687–1700. https://doi.org/10.1007/s10278-023-00843-8 doi: 10.1007/s10278-023-00843-8
    [36] X. Xu, C. Li, X. Fan, X. Lan, X. Lu, X. Ye, et al., Attention mask r-cnn with edge refinement algorithm for identifying circulating genetically abnormal cells, Cytom. Part A, 103 (2023), 227–239. https://doi.org/10.1002/cyto.a.24682 doi: 10.1002/cyto.a.24682
    [37] W. Wang, J. Chen, J. Wang, J. Chen, Z. Gong, Geography-aware inductive matrix completion for personalized point of interest recommendation in smart cities, IEEE Internet Things J., 7 (2020), 4361–4370. https://doi.org/10.1109/JIOT.2019.2950418 doi: 10.1109/JIOT.2019.2950418
    [38] W. Wang, J. Chen, J. Wang, J. Chen, J. Liu, Z. Gong, Trust-enhanced collaborative filtering for personalized point of interests recommendation, IEEE Trans. Ind. Inf., 16 (2020), 6124–6132. https://doi.org/10.1109/TII.2019.2958696 doi: 10.1109/TII.2019.2958696
    [39] W. Wang, N. Kumar, J. Chen, Z. Gong, X. Kong, W. Wei, et al., Realizing the potential of the internet of things for smart tourism with 5G and AI, IEEE Network, 34 (2020), 295–301. https://doi.org/10.1109/MNET.011.2000250 doi: 10.1109/MNET.011.2000250
    [40] W. Wang, X. Yu, B. Fang, Y. Zhao, Y. Chen, W. Wei, et al., Cross-modality LGE-CMR segmentation using image-to-image translation based data augmentation, IEEE/ACM Trans. Comput. Biol. Bioinf., 20 (2023), 2367–2375. https://doi.org/10.1109/TCBB.2022.3140306 doi: 10.1109/TCBB.2022.3140306
    [41] J. Chen, Z. Guo, X. Xu, L. Zhang, Y. Teng, Y. Chen, et al., A robust deep learning framework based on spectrograms for heart sound classification, IEEE/ACM Trans. Comput. Biol. Bioinf., (2023), 1–12. https://doi.org/10.1109/TCBB.2023.3247433 doi: 10.1109/TCBB.2023.3247433
    [42] P. Manickam, S. A. Mariappan, S. M. Murugesan, S. Hansda, A. Kaushik, R. Shinde, et al., Artificial intelligence (AI) and internet of medical things (IoMT) assisted biomedical systems for intelligent healthcare, Biosensors, 12 (2022), 562. https://doi.org/10.3390/bios12080562 doi: 10.3390/bios12080562
    [43] Z. Ning, P. Dong, X. Wang, J. J. Rodrigues, F. Xia, Deep reinforcement learning for vehicular edge computing: An intelligent offloading system, ACM Trans. Intell. Syst. Technol., 10 (2019), 1–24. https://doi.org/10.1145/3317572 doi: 10.1145/3317572
    [44] Z. Ning, P. Dong, X. Wang, M. S. Obaidat, X. Hu, L. Guo, et al., When deep reinforcement learning meets 5G-enabled vehicular networks: A distributed offloading framework for traffic big data, IEEE Trans. Ind. Inf., 16 (2020), 1352–1361. https://doi.org/10.1109/TII.2019.2937079 doi: 10.1109/TII.2019.2937079
    [45] M. N. Hossen, V. Panneerselvam, D. Koundal, K. Ahmed, F. M. Bui, S. M. Ibrahim, Federated machine learning for detection of skin diseases and enhancement of internet of medical things (IoMT) security, IEEE J. Biomed. Health. Inf., 27 (2022), 835–841. https://doi.org/10.1109/JBHI.2022.3149288 doi: 10.1109/JBHI.2022.3149288
    [46] A. Cuevas-Chávez, Y. Hernández, J. Ortiz-Hernandez, E. Sánchez-Jiménez, G. Ochoa-Ruiz, J. Pérez, et al., A systematic review of machine learning and IoT applied to the prediction and monitoring of cardiovascular diseases, Healthcare, 11 (2023), 2240. https://doi.org/10.3390/healthcare11162240 doi: 10.3390/healthcare11162240
    [47] A. E. Hassanien, A. Khamparia, D. Gupta, K. Shankar, A. Slowik, Cognitive Internet of Medical Things for Smart Healthcare, Springer, Cham, 2021. https://doi.org/10.1007/978-3-030-55833-8_9
    [48] A. L. N. Al-Hajjar, A. K. M. Al-Qurabat, An overview of machine learning methods in enabling iomt-based epileptic seizure detection, J. Supercomput., 79 (2023), 16017–16064. https://doi.org/10.1007/s11227-023-05299-9 doi: 10.1007/s11227-023-05299-9
    [49] W. Zhao, Y. Wang, X. Sun, S. Zhang, X. Li, IoMT-based seizure detection system leveraging edge machine learning, IEEE Sens. J., 23 (2023), 21474–21483. https://doi.org/10.1109/JSEN.2023.3300743 doi: 10.1109/JSEN.2023.3300743
    [50] T. M. Ghazal, S. Abbas, M. Ahmad, S. Aftab, An IoMT based ensemble classification framework to predict treatment response in hepatitis C patients, in 2022 International Conference on Business Analytics for Technology and Security (ICBATS), (2022), 1–4. https://doi.org/10.1109/ICBATS54253.2022.9759059
    [51] A. S. Rajawat, S. Goyal, P. Bedi, T. Jan, M. Whaiduzzaman, M. Prasad, Quantum machine learning for security assessment in the internet of medical things (IoMT), Future Internet, 15 (2023), 271. https://doi.org/10.3390/fi15080271 doi: 10.3390/fi15080271
    [52] A. Si-Ahmed, M. A. Al-Garadi, N. Boustia, Survey of machine learning based intrusion detection methods for internet of medical things, Appl. Soft Comput., 140 (2023), 110227. https://doi.org/10.1016/j.asoc.2023.110227 doi: 10.1016/j.asoc.2023.110227
    [53] V. Chang, J. Bailey, Q. A. Xu, Z. Sun, Pima indians diabetes mellitus classification based on machine learning (ML) algorithms, Neural Comput. Appl., 35 (2023), 16157–16173. https://doi.org/10.1007/s00521-022-07049-z doi: 10.1007/s00521-022-07049-z
    [54] C. Iwendi, S. Khan, J. H. Anajemba, A. K. Bashir, F. Noor, Realizing an efficient iomt-assisted patient diet recommendation system through machine learning model, IEEE Access, 8 (2020), 28462–28474. https://doi.org/10.1109/ACCESS.2020.2968537 doi: 10.1109/ACCESS.2020.2968537
    [55] T. Mishra, M. Wang, A. A. Metwally, G. K. Bogu, A. W. Brooks, A. Bahmani, et al., Pre-symptomatic detection of COVID-19 from smartwatch data, Nat. Biomed. Eng., 4 (2020), 1208–1220. https://doi.org/10.1038/s41551-020-00640-6 doi: 10.1038/s41551-020-00640-6
    [56] F. Li, M. Valero, H. Shahriar, R. A. Khan, S. I. Ahamed, Wi-COVID: A COVID-19 symptom detection and patient monitoring framework using WiFi, Smart Health, 19 (2021), 100147. https://doi.org/10.1016/j.smhl.2020.100147 doi: 10.1016/j.smhl.2020.100147
    [57] M. Otoom, N. Otoum, M. A. Alzubaidi, Y. Etoom, R. Banihani, An IoT-based framework for early identification and monitoring of COVID-19 cases, Biomed. Signal Process. Control, 62 (2020), 102149. https://doi.org/10.1016/j.bspc.2020.102149 doi: 10.1016/j.bspc.2020.102149
    [58] S. Venkatasubramanian, Ambulatory monitoring of maternal and fetal using deep convolution generative adversarial network for smart health care IoT system, Int. J. Adv. Comput. Sci. Appl., 13 (2022), 214–222. https://doi.org/10.14569/IJACSA.2022.0130126 doi: 10.14569/IJACSA.2022.0130126
    [59] P. K. Vemuri, A. Kunta, R. Challagulla, S. Bodiga, S. Veeravilli, V. L. Bodiga, et al., Artificial intelligence and internet of medical things based health-care system for real-time maternal stress-strategies to reduce maternal mortality rate, Drug Invent. Today, 13 (2020), 1126–1129. http://dx.doi.org/10.6084/m9.figshare.13213631 doi: 10.6084/m9.figshare.13213631
    [60] X. Li, Y. Lu, X. Fu, Y. Qi, Building the Internet of Things platform for smart maternal healthcare services with wearable devices and cloud computing, Future Gener. Comput. Syst., 118 (2021), 282–296. https://doi.org/10.1016/j.future.2021.01.016 doi: 10.1016/j.future.2021.01.016
    [61] Y. Hao, R. Foster, Wireless body sensor networks for health-monitoring applications, Physiol. Meas., 29 (2008), 27. https://doi.org/10.1088/0967-3334/29/11/R01 doi: 10.1088/0967-3334/29/11/R01
    [62] S. Li, B. Zhang, P. Fei, P. M. Shakeel, R. D. J. Samuel, WITHDRAWN: Computational efficient wearable sensor network health monitoring system for sports athletics using IoT, Aggress Violent Behav., (2020), 101541. https://doi.org/10.1016/j.avb.2020.101541 doi: 10.1016/j.avb.2020.101541
    [63] X. Shi, Z. Huang, Wearable device monitoring exercise energy consumption based on Internet of things, Complexity, 2021 (2021), 8836723. https://doi.org/10.1155/2021/8836723 doi: 10.1155/2021/8836723
    [64] J. Chen, S. Sun, L. Zhang, B. Yang, W. Wang, Compressed sensing framework for heart sound acquisition in internet of medical things, IEEE Trans. Ind. Inf., 18 (2022), 2000–2009. https://doi.org/10.1109/TII.2021.3088465 doi: 10.1109/TII.2021.3088465
    [65] Y. Yao, H. Wu, L. Shu, C. Lu, Developing a multifunctional heating pad based on fuzzy-edge computations and IoMT approach, J. Internet Technol., 23 (2022), 1519–1525. https://doi.org/10.53106/160792642022122307007 doi: 10.53106/160792642022122307007
    [66] A. N. Trunov, I. M. Dronyuk, V. S. Martynenko, S. I. Maltsev, I. V. Skopenko, M. Y. Skoroid, Formation of a recurrent neural network for the description of IoMT processes in restorative medicine for post-stroke patients, in AI Models for Blockchain-Based Intelligent Networks in IoT Systems, 6 (2023), 185–202. https://doi.org/10.1007/978-3-031-31952-5_9
    [67] S. Shaji, R. Sankaran, R. Guntha, R. K. Pathinarupothi, A real-time IoMT enabled remote cardiac rehabilitation framework, in 2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS), (2023), 153–158. https://doi.org/10.1109/COMSNETS56262.2023.10041272
    [68] A. Buzachis, G. M. Bernava, M. Busa, G. Pioggia, M. Villari, Towards the basic principles of osmotic computing: a closed-loop gamified cognitive rehabilitation flow model, in 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), (2018), 446–452. https://doi.org/10.1109/CIC.2018.00067
    [69] N. Yadav, F. Keshtkar, C. Schweikert, G. Crocetti, Cradle: An IoMT psychophysiological analytics platform, in Proceedings of the Workshop on Human-Habitat for Health (H3): Human-Habitat Multimodal Interaction for Promoting Health and Well-Being in the Internet of Things Era, (2018), 1–7. https://doi.org/10.1145/3279963.3279970
    [70] N. Yadav, Y. Jin, L. J. Stevano, AR-IoMT mental health rehabilitation applications for smart cities, in 2019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT), (2019), 166–170. https://doi.org/10.1109/HONET.2019.8907997
    [71] J. Chen, L. Chen, Y. Zhou, Cryptanalysis of a dna-based image encryption scheme, Inf. Sci., 520 (2020), 130–141. https://doi.org/10.1016/j.ins.2020.02.024 doi: 10.1016/j.ins.2020.02.024
    [72] J. Chen, Z. Zhu, L. Zhang, Y. Zhang, B. Yang, Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption, Signal Process., 142 (2018), 340–353. https://doi.org/10.1016/j.sigpro.2017.07.034 doi: 10.1016/j.sigpro.2017.07.034
    [73] L. Liu, B. Xu, Research on information security technology based on blockchain, in 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), (2018), 380–384. https://doi.org/10.1109/ICCCBDA.2018.8386546
    [74] C. Zhang, C. Wu, X. Wang, Overview of blockchain consensus mechanism, in Proceedings of the 2020 2nd International Conference on Big Data Engineering, (2020), 7–12. https://doi.org/10.1145/3404512.3404522
    [75] S. Kaur, S. Chaturvedi, A. Sharma, J. Kar, A research survey on applications of consensus protocols in blockchain, Secur. Commun. Networks, 2021 (2021), 6693731. https://doi.org/10.1155/2021/6693731 doi: 10.1155/2021/6693731
    [76] P. Chinnasamy, P. Deepalakshmi, V. Praveena, K. Rajakumari, P. Hamsagayathri, Blockchain technology: A step towards sustainable development, Int. J. Innovative Technol. Explor. Eng., 9 (2019), 1034–1040. https://doi.org/10.35940/ijitee.b1109.1292s219 doi: 10.35940/ijitee.b1109.1292s219
    [77] Y. Cui, B. Pan, Y. Sun, A survey of privacy-preserving techniques for blockchain, in International Conference on Artificial Intelligence and Security, 11635 (2019), 225–234. https://doi.org/10.1007/978-3-030-24268-8_21
    [78] A. Ghosh, S. Gupta, A. Dua, N. Kumar, Security of cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects, J. Network Comput. Appl., 163 (2020), 102635. https://doi.org/10.1016/j.jnca.2020.102635 doi: 10.1016/j.jnca.2020.102635
    [79] B. A. Tama, B. J. Kweka, Y. Park, K. Rhee, A critical review of blockchain and its current applications, in 2017 International Conference on Electrical Engineering and Computer Science (ICECOS), (2017), 109–113. https://doi.org/10.1109/ICECOS.2017.8167115
    [80] P. Ratta, A. Kaur, S. Sharma, M. Shabaz, G. Dhiman, Application of blockchain and internet of things in healthcare and medical sector: Applications, challenges, and future perspectives, J. Food Qual., 2021 (2021), 7608296. https://doi.org/10.1155/2021/7608296 doi: 10.1155/2021/7608296
    [81] I. Yaqoob, K. Salah, R. Jayaraman, Y. Al-Hammadi, Blockchain for healthcare data management: Opportunities, challenges, and future recommendations, Neural Comput. Appl., 34 (2022), 11475–11490. https://doi.org/10.1007/s00521-020-05519-w doi: 10.1007/s00521-020-05519-w
    [82] Z. Zhang, L. Zhao, A design of digital rights management mechanism based on blockchain technology, in International Conference on Blockchain, 10974 (2018), 32–46. https://doi.org/10.1007/978-3-319-94478-4_3
    [83] W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, A. Ahmed, Edge computing: A survey, Future Gener. Comput. Syst., 97 (2019), 219–235. https://doi.org/10.1016/j.future.2019.02.050 doi: 10.1016/j.future.2019.02.050
    [84] W. Shi, J. Cao, Q. Zhang, Y. Li, L. Xu, Edge computing: Vision and challenges, IEEE Internet Things J., 3 (2016), 637–646. https://doi.org/10.1109/JIOT.2016.2579198 doi: 10.1109/JIOT.2016.2579198
    [85] S. Wang, Edge computing: Applications, state-of-the-art and challenges, Adv. Networks, 7 (2019), 8–15. https://doi.org/10.11648/j.net.20190701.12 doi: 10.11648/j.net.20190701.12
    [86] W. Shi, S. Dustdar, The promise of edge computing, Computer, 49 (2016), 78–81. https://doi.org/10.1109/MC.2016.145 doi: 10.1109/MC.2016.145
    [87] A. A. Abdellatif, A. Mohamed, C. F. Chiasserini, M. Tlili, A. Erbad, Edge computing for smart health: Context-aware approaches, opportunities, and challenges, IEEE Networks, 33 (2019), 196–203. https://doi.org/10.1109/MNET.2019.1800083 doi: 10.1109/MNET.2019.1800083
    [88] P. P. Ray, D. Dash, D. De, Edge computing for internet of things: A survey, e-healthcare case study and future direction, J. Network Comput. Appl., 140 (2019), 1–22. https://doi.org/10.1016/j.jnca.2019.05.005 doi: 10.1016/j.jnca.2019.05.005
    [89] S. M. Kumar, D. Majumder, Healthcare solution based on machine learning applications in IoT and edge computing, Int. J. Pure Appl. Math., 119 (2018), 1473–1484.
    [90] K. Subramanian, Digital twin for drug discovery and development-The virtual liver, J. Indian Inst. Sci., 100 (2020), 653–662. https://doi.org/10.1007/s41745-020-00185-2 doi: 10.1007/s41745-020-00185-2
    [91] B. Björnsson, C. Borrebaeck, N. Elander, T. Gasslander, D. R. Gawel, M. Gustafsson, et al., Digital twins to personalize medicine, Genome Med., 12 (2020). https://doi.org/10.1186/s13073-019-0701-3 doi: 10.1186/s13073-019-0701-3
    [92] Y. Tai, L. Zhang, Q. Li, C. Zhu, V. Chang, J. J. P. C. Rodrigues, et al., Digital-twin-enabled IoMT system for surgical simulation using rAC-GAN, IEEE Internet Things J., 9 (2022), 20918–20931. https://doi.org/10.1109/JIOT.2022.3176300 doi: 10.1109/JIOT.2022.3176300
    [93] Q. Qu, H. Sun, Y. Chen, Light-weight real-time senior safety monitoring using digital twins, in Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, (2023), 450–451. https://doi.org/10.1145/3576842.3589163
    [94] O. Moztarzadeh, M. Jamshidi, S. Sargolzaei, A. Jamshidi, N. Baghalipour, M. M. Moghani, et al., Metaverse and healthcare: Machine learning-enabled digital twins of cancer, Bioengineering, 10 (2023), 455. https://doi.org/10.3390/bioengineering10040455 doi: 10.3390/bioengineering10040455
    [95] Z. Qu, Y. Li, B. Liu, D. Gupta, P. Tiwari, Dtqfl: A digital twin-assisted quantum federated learning algorithm for intelligent diagnosis in 5G mobile network, IEEE J. Biomed. Health Inf., (2023), 1–10. https://doi.org/10.1109/JBHI.2023.3303401 doi: 10.1109/JBHI.2023.3303401
    [96] Y. Liu, L. Zhang, Y. Yang, L. Zhou, L. Ren, F. Wang, et al., A novel cloud-based framework for the elderly healthcare services using digital twin, IEEE Access, 7 (2019), 49088–49101. https://doi.org/10.1109/ACCESS.2019.2909828 doi: 10.1109/ACCESS.2019.2909828
    [97] Z. Lou, L. Wang, K. Jiang, Z. Wei, G. Shen, Reviews of wearable healthcare systems: Materials, devices and system integration, Mater. Sci. Eng. R Rep., 140 (2020), 100523. https://doi.org/10.1016/j.mser.2019.100523 doi: 10.1016/j.mser.2019.100523
    [98] G. Medic, M. Wille, M. E. Hemels, Short-and long-term health consequences of sleep disruption, Nat. Sci. Sleep, 9 (2017), 151–161. https://doi.org/10.2147/NSS.S134864 doi: 10.2147/NSS.S134864
    [99] V. P. Tran, A. A. Al-Jumaily, S. M. S. Islam, Doppler radar-based non-contact health monitoring for obstructive sleep apnea diagnosis: A comprehensive review, Big Data Cognit. Comput., 3 (2019), 3. https://doi.org/10.3390/bdcc3010003 doi: 10.3390/bdcc3010003
    [100] L. Ismail, R. Buyya, Artificial intelligence applications and self-learning 6G networks for smart cities digital ecosystems: Taxonomy, challenges, and future directions, Sensors, 22 (2022), 5750. https://doi.org/10.3390/s22155750 doi: 10.3390/s22155750
    [101] X. Lin, J. Wu, A. K. Bashir, W. Yang, A. Singh, A. A. AlZubi, Fairhealth: Long-term proportional fairness-driven 5G edge healthcare in internet of medical things, IEEE Trans. Ind. Inf., 18 (2022), 8905–8915. https://doi.org/10.1109/TII.2022.3183000 doi: 10.1109/TII.2022.3183000
    [102] L. Kouhalvandi, L. Matekovits, I. Peter, Magic of 5G technology and optimization methods applied to biomedical devices: A survey, Appl. Sci., 12 (2022), 7096. https://doi.org/10.3390/app12147096 doi: 10.3390/app12147096
    [103] M. Malik, S. K. Garg, Towards 6G: Network evolution beyond 5G & indian scenario, in 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), (2022), 123–127. https://doi.org/10.1109/ICIPTM54933.2022.9753847
    [104] S. T. Ahmed, V. V. Kumar, K. K. Singh, A. Singh, V. Muthukumaran, D. Gupta, 6G enabled federated learning for secure IoMT resource recommendation and propagation analysis, Comput. Electr. Eng., 102 (2022), 108210. https://doi.org/10.1016/j.compeleceng.2022.108210 doi: 10.1016/j.compeleceng.2022.108210
    [105] P. N. Srinivasu, M. F. Ijaz, J. Shafi, M.Woźniak, R. Sujatha, 6G driven fast computational networking framework for healthcare applications, IEEE Access, 10 (2022), 94235–94248. https://doi.org/10.1109/ACCESS.2022.3203061 doi: 10.1109/ACCESS.2022.3203061
    [106] A. Koren, R. Prasad, IoT health data in electronic health records (EHR): Security and privacy issues in era of 6G, J. ICT Stand., 10 (2022), 63–84. https://doi.org/10.13052/jicts2245-800X.1014 doi: 10.13052/jicts2245-800X.1014
    [107] I. U. Din, M. Guizani, S. Hassan, B. Kim, M. K. Khan, M. Atiquzzaman, et al., The Internet of Things: A review of enabled technologies and future challenges, IEEE Access, 7 (2018), 7606–7640. https://doi.org/10.1109/ACCESS.2018.2886601 doi: 10.1109/ACCESS.2018.2886601
    [108] S. Nasiri, F. Sadoughi, M. H. Tadayon, A. Dehnad, Security requirements of internet of things-based healthcare system: A survey study, Acta Inf. Med., 27 (2019), 253–258. https://doi.org/10.5455/aim.2019.27.253-258 doi: 10.5455/aim.2019.27.253-258
    [109] J. Granjal, E. Monteiro, J. S. Silva, Security for the internet of things: A survey of existing protocols and open research issues, IEEE Commun. Surv. Tutorials, 17 (2015), 1294–1312. https://doi.org/10.1109/COMST.2015.2388550 doi: 10.1109/COMST.2015.2388550
    [110] S. Alasmari, M. Anwar, Security & privacy challenges in IoT-based health cloud, in 2016 International Conference on Computational Science and Computational Intelligence (CSCI), (2016), 198–201. https://doi.org/10.1109/CSCI.2016.0044
    [111] S. Agrawal, K. Sharma, Software defined millimeter wave 5th generation communications system, Appl. Theory Comput. Technol., 2 (2017), 46–56.
    [112] T. Lin, C. Hsu, T. Le, C. Lu, B. Huang, A smartcard-based user-controlled single sign-on for privacy preservation in 5G-IoT telemedicine systems, Sensors, 21 (2021), 2880. https://doi.org/10.3390/s21082880 doi: 10.3390/s21082880
    [113] S. H. Alsamhi, B. Lee, Blockchain-empowered multi-robot collaboration to fight COVID-19 and future pandemics, IEEE Access, 9 (2020), 44173–44197. https://doi.org/10.1109/ACCESS.2020.3032450 doi: 10.1109/ACCESS.2020.3032450
    [114] T. Zhang, J. Zhao, L. An, D. Liu, Energy efficiency of base station deployment in ultra dense HetNets: A stochastic geometry analysis, IEEE Wireless Commun. Lett., 5 (2016), 184–187. https://doi.org/10.1109/LWC.2016.2516010 doi: 10.1109/LWC.2016.2516010
    [115] A. P. C. Da Silva, M. Meo, M. A. Marsan, Energy-performance trade-off in dense WLANs: A queuing study, Comput. Networks, 56 (2012), 2522–2537. https://doi.org/10.1016/j.comnet.2012.03.017 doi: 10.1016/j.comnet.2012.03.017
    [116] P. K. Sadhu, V. P. Yanambaka, A. Abdelgawad, Physical unclonable function and machine learning based group authentication and data masking for in-hospital segments, Electronics, 11 (2022), 4155. https://doi.org/10.3390/electronics11244155 doi: 10.3390/electronics11244155
    [117] P. K. Sadhu, A. Baul, V. P. Yanambaka, A. Abdelgawad, Machine learning and puf based authentication framework for internet of medical things, in 2022 International Conference on Microelectronics (ICM), (2022), 160–163. https://doi.org/10.1109/ICM56065.2022.10005380
    [118] A. Darwish, A. E. Hassanien, M. Elhoseny, A. K. Sangaiah, K. Muhammad, The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems, J. Ambient Intell. Human. Comput., 10 (2019), 4151–4166. https://doi.org/10.1007/s12652-017-0659-1 doi: 10.1007/s12652-017-0659-1
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(3458) PDF downloads(201) Cited by(7)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog