Processing math: 73%
Research article Special Issues

Evading obscure communication from spam emails


  • Spam is any form of annoying and unsought digital communication sent in bulk and may contain offensive content feasting viruses and cyber-attacks. The voluminous increase in spam has necessitated developing more reliable and vigorous artificial intelligence-based anti-spam filters. Besides text, an email sometimes contains multimedia content such as audio, video, and images. However, text-centric email spam filtering employing text classification techniques remains today's preferred choice. In this paper, we show that text pre-processing techniques nullify the detection of malicious contents in an obscure communication framework. We use Spamassassin corpus with and without text pre-processing and examined it using machine learning (ML) and deep learning (DL) algorithms to classify these as ham or spam emails. The proposed DL-based approach consistently outperforms ML models. In the first stage, using pre-processing techniques, the long-short-term memory (LSTM) model achieves the highest results of 93.46% precision, 96.81% recall, and 95% F1-score. In the second stage, without using pre-processing techniques, LSTM achieves the best results of 95.26% precision, 97.18% recall, and 96% F1-score. Results show the supremacy of DL algorithms over the standard ones in filtering spam. However, the effects are unsatisfactory for detecting encrypted communication for both forms of ML algorithms.

    Citation: Khan Farhan Rafat, Qin Xin, Abdul Rehman Javed, Zunera Jalil, Rana Zeeshan Ahmad. Evading obscure communication from spam emails[J]. Mathematical Biosciences and Engineering, 2022, 19(2): 1926-1943. doi: 10.3934/mbe.2022091

    Related Papers:

    [1] Feng Li, Mingfeng Jiang, Hongzeng Xu, Yi Chen, Feng Chen, Wei Nie, Li Wang . Data governance and Gensini score automatic calculation for coronary angiography with deep-learning-based natural language extraction. Mathematical Biosciences and Engineering, 2024, 21(3): 4085-4103. doi: 10.3934/mbe.2024180
    [2] Anastasia-Maria Leventi-Peetz, Kai Weber . Probabilistic machine learning for breast cancer classification. Mathematical Biosciences and Engineering, 2023, 20(1): 624-655. doi: 10.3934/mbe.2023029
    [3] Yufeng Qian . Exploration of machine algorithms based on deep learning model and feature extraction. Mathematical Biosciences and Engineering, 2021, 18(6): 7602-7618. doi: 10.3934/mbe.2021376
    [4] Mubashir Ahmad, Saira, Omar Alfandi, Asad Masood Khattak, Syed Furqan Qadri, Iftikhar Ahmed Saeed, Salabat Khan, Bashir Hayat, Arshad Ahmad . Facial expression recognition using lightweight deep learning modeling. Mathematical Biosciences and Engineering, 2023, 20(5): 8208-8225. doi: 10.3934/mbe.2023357
    [5] Yufeng Li, Chengcheng Liu, Weiping Zhao, Yufeng Huang . Multi-spectral remote sensing images feature coverage classification based on improved convolutional neural network. Mathematical Biosciences and Engineering, 2020, 17(5): 4443-4456. doi: 10.3934/mbe.2020245
    [6] Chaofan Li, Qiong Liu, Kai Ma . DCCL: Dual-channel hybrid neural network combined with self-attention for text classification. Mathematical Biosciences and Engineering, 2023, 20(2): 1981-1992. doi: 10.3934/mbe.2023091
    [7] Xianli Liu, Yongquan Zhou, Weiping Meng, Qifang Luo . Functional extreme learning machine for regression and classification. Mathematical Biosciences and Engineering, 2023, 20(2): 3768-3792. doi: 10.3934/mbe.2023177
    [8] Ruirui Han, Zhichang Zhang, Hao Wei, Deyue Yin . Chinese medical event detection based on event frequency distribution ratio and document consistency. Mathematical Biosciences and Engineering, 2023, 20(6): 11063-11080. doi: 10.3934/mbe.2023489
    [9] Hang Yu, Jiarui Shi, Jin Qian, Shi Wang, Sheng Li . Single dendritic neural classification with an effective spherical search-based whale learning algorithm. Mathematical Biosciences and Engineering, 2023, 20(4): 7594-7632. doi: 10.3934/mbe.2023328
    [10] Jian-xue Tian, Jue Zhang . Breast cancer diagnosis using feature extraction and boosted C5.0 decision tree algorithm with penalty factor. Mathematical Biosciences and Engineering, 2022, 19(3): 2193-2205. doi: 10.3934/mbe.2022102
  • Spam is any form of annoying and unsought digital communication sent in bulk and may contain offensive content feasting viruses and cyber-attacks. The voluminous increase in spam has necessitated developing more reliable and vigorous artificial intelligence-based anti-spam filters. Besides text, an email sometimes contains multimedia content such as audio, video, and images. However, text-centric email spam filtering employing text classification techniques remains today's preferred choice. In this paper, we show that text pre-processing techniques nullify the detection of malicious contents in an obscure communication framework. We use Spamassassin corpus with and without text pre-processing and examined it using machine learning (ML) and deep learning (DL) algorithms to classify these as ham or spam emails. The proposed DL-based approach consistently outperforms ML models. In the first stage, using pre-processing techniques, the long-short-term memory (LSTM) model achieves the highest results of 93.46% precision, 96.81% recall, and 95% F1-score. In the second stage, without using pre-processing techniques, LSTM achieves the best results of 95.26% precision, 97.18% recall, and 96% F1-score. Results show the supremacy of DL algorithms over the standard ones in filtering spam. However, the effects are unsatisfactory for detecting encrypted communication for both forms of ML algorithms.



    Diverse viral outbreaks, including those engendered by the human immune compromised virus (HIV) [1], ebola virus [2], acute respiratory syndrome Coronavirus‐2 (SARS‐CoV‐2) [3], dengue virus [4], nipah virus [5], HBV [6], etc., have been researched utilizing mathematical formulas to describe the within-host nonlinear versatile tendencies. In typical latent infection systems, uncontrolled infections, vulnerable tissues, and attacked cellular responses interact. Additionally, several researchers highlight the phenomenon of incubation by mentioning persistent contamination. The recipient defensive mechanism responds to viral infestation via inherent and monoclonal antibody immunogenicity. Both kinds of reactions can be roughly classified into lytic and nonlytic parts. While nonlytic responder processes prevent viremia by aqueous molecules, lytic responder strategies eliminate afflicted organisms. Innate mechanisms include the ability of autonomous assassin systems to destroy intracellular pathogens and the nonlytic inhibition of viral multiplication by cytokines released by cellular functions. Cytotoxic T lymphocytes (CTLs), which are allergen antibodies, destroy intracellular pathogens while autoantibodies deactivate dispersed viral proteins and prevent the transmission of bacteria to infected macrophages. Furthermore, CD4+ and CD8+ T lymphocytes can produce chemicals that inhibit infectious proliferation (e.g., IFN- and TNF-), (see Figure 1).

    Figure 1.  Life cycle of CD4+ and CD8+ T cells.

    These discrepancies are not necessarily easy to make, though. For instance, cytokines like interferon and tumour necrotic signal have been shown to promote apoptosis in some circumstances, in addition to inhibiting infectious multiplication [7]. Eichelberger et al. [8] investigated whether the pathogen can be eradicated by the CD4+ T-cell-dependent antigen reaction in the absence of CD8+ T cells, (see Figure 2). Topham et al. [9] demonstrated that CD8+ T lymphocytes can eliminate the pathogen by a lytic process that is either regulated by complement activation or Fas. In terms of explaining the four distinct HCV scenarios quantitatively, Pan et al. [10] addressed the HCV infectious system, which incorporates the pathways of contamination and propagation, such as infectious agent and cell-to-cell dissemination patterns.

    Figure 2.  Aging and respiratory viral infection: from acute morbidity to chronic.

    Chronic infestations result when the pathogen weakens and suppresses the innate immunity. An immunological reaction has occurred whereby, upon a bacteria's penetration into the system, the immunological mechanism identifies the onslaught and communicates this information to the defensive components, which then generate lymphocytes to eradicate the infection. Additionally, the responsive immunological mechanism is very important in regulating the virus replication. When an infection propagates in a person, the cells respond in two ways: first, a host antibody immune reaction is triggered by the B-cell, and then a cytotoxic immunological reaction is induced by the Cytotoxic T Lymphocyte (CTL). According to earlier investigations, the autoimmune disease seems to be more robust than the intracellular immunological defences. Elaiw et al. [11] addressed the production of antibodies, particular nonlinear prevalence rate expression, and behavioural features of viral transmission scenarios, including insidiously viral particles. Luo et al. [12] analyzed a nonlinear prevalence, cell-to-cell dissemination, and host immune protection framework for diffusive pathogen infectious diseases. Wang et al. [13] investigated the infectious patterns of a system of persistent HIV transmission that included multiple latencies, B-cell immunological responses, and the Beddington-DeAngelis occurrence criterion. Hattaf [14] presented a generalised virus-induced framework with several delayed and immune regulatory components that exhibit global stability and Hopf bifurcation. Rajivganthi and Rihan [15] presented the stochastic analysis of viral infection model involving latently infected cells. Olaide et al. [16] presented a novel metaheuristic algorithm named ebola optimization search algorithm (EOSA) based on the propagation mechanism of the ebola virus disease. For further investigations on optimization and epidemics, we refer the readers [17,18,19,20,21,22,23,24,25].

    Fractional calculus (FC) is a subfield of mathematics that was created by applying integer derivatives to differential equations (DEs) involving fractional-orders [26,27,28,29,30,31]. Since many considerable anomalies in digital circuits, phonics, physio-chemical processes, special relativity, photo-catalysis, transport phenomena, stretchability, and optoelectronics can be characterized by fractional DEs, this field, which deals with classical derivatives and fractional-order, has gained popularity in the last three decades. Additionally, FC is currently an essential strategy for simulating complicated events as well as electron mobility that occurs in permeable heterogeneity environments [32,33,34,35,36]. In order to analyze FDEs, scientists require a powerful toolset, yet it might be challenging to identify precise alternatives to these kinds of computations. Therefore, it is vital to designing appropriate quantitative strategies to address these issues [37]. However, quantitative approaches for FDEs create mathematical challenges that are not present in the evaluation of integer-order models. Because certain of the advantageous aspects of the conventional approximation operators are compromised, there are certain systemic problems in performing simulations of the fractional derivatives. During the last decade, the Atangana-Baleanu fractional operator has made recent advancements in fractional DEs approximation, [38]. Atangana [39] proposed a revolutionary nonlocal formulation that combines fractional-order and fractal-dimension: fractal-fractional (FF) differential and integral operators. To examine intricate real-world situations that can never be modelled using classical and fractional derivative/integral formulations of single order, the F-F technique has been expounded as a valuable technique in numerous scientific and epidemiological fields. Versaci et al. [40] presented a fuzzy similarity-based approach to classify numerically simulated and experimentally detected carbon fiber-reinforced polymer plate defects. The present scheme can be further formulated with the method proposed by [40].

    However, the fractional-order and integer-order mathematical models have been developed to analyze a large number of randomized order derivatives, providing an additional level of flexibility in selecting; see [41,42,43,44]. The stochastic DEs might offer a significant level of reliability, and when linked to deterministic systems, they encompass the comprehensive spectra of an individual cohort and produce a highly precise result as compared to a classical model. We need to execute the simulations repeatedly and detect commonalities in the projected scenarios because the results of every inquiry in a stochastic procedure differ from the preceding [46,47,48]. According to several researchers, a non-linear recurrence projection for stochastic processes is one of the epidemiological techniques that has been examined for stability evaluation. In fact, random events are prevalent worldwide. Systems frequently experience random disturbances. Various studies have been conducted on stochastic dynamics; for example, a wide range of scientific theories, including meteorology, accounting, biology, and telecommunication systems, frequently exhibit randomized fluctuations with long-term dependency. In order to analyze fractional stochastic processes, fractional Brownian motion (BM) employing the Hurst index H(1/2,1) has been proposed as an alternative to classical BM [49]. Kerboua et al. [50] looked into stochastic fractional DEs with perturbed regulatory frameworks that involved fractional BM. Pei and Xu [51] investigated the non-Lipschitz stochastic DEs driven by fractional BM. In 2021, authors [52] presented a novel notion for analyzing and predicting the transmission of COVID-19 throughout Africa and Europe using stochastic and deterministic methods. Alkahtani and Koca [53] contemplated the fractional stochastic SIR system within the fractional calculus technique. Rashid et al. [54] contemplated the stochastic fractal-fractional tuberculosis model via a non-singular kernel with random densities.

    Owing to the aforesaid propensity, we intend to suggest a novel fractal-fractional stochastic immune effector response to viral infections while taking the notion of a fluctuating population with white noise into consideration. We intend to divide the entire population into five distinct groups based on the severity of viral infection. Furthermore, several qualitative analyses are conducted, such as the existence and distinctiveness of the positive solution in the stochastic immune effector responses considering a Holling type II functionality reaction. Perceptions from these systems are distilled in this assessment, which also contrasts them with test findings. Numerical results are presented by employing the revolutionary technique proposed by Atangana and Araz [52] in the fractal-fractional derivative sense. Graphical illustrations are presented with low random densities, incorporating the fractal-dimension and fractional-order. In a nutshell, we presented the simulation findings with and without control.

    The rest of this paper is structured as follows. Section 2 gives some foundational information on F-F operators in the ABC sense, formulations of stochastic perturbation and the fractional viral infection model construction. In Section 3, we demonstrate the model's configuration. Section 4 exhibits the solution's existence-uniqueness, as well as ergodicity and conducts a stationary distribution study on the proposed model. The unique result for the F-F viral model is established utilizing the Atangana-Baleanu sense and standard Brownian motion in Section 5. Furthermore, the discussion of numerical simulations utilizing the novel numerical scheme is provided to analyze the behaviors of the considered model. Finally, we give the conclusion of our paper in the last section.

    Before advancing on to the formal description, it is imperative to study certain fundamental F-F operator concepts. Take into account the parameters provided in [39] as well as the functional v(t1), which is continuous and fractal differentiable on [c,d] with fractal-dimension and fractional-order α.

    Definition 2.1. ([39]) The FF operator of v(ˉt) involving the index law kernel in the perspective of Riemann–Liouville (RL) can be described as follows for ˉt[0,1]:

    FFPDα,0,ˉt(v(ˉt))=1Γ(uα)ddˉtˉt0(ˉtw)uα1v(w)dw, (2.1)

    where dv(w)dw=limˉtϰv(ˉt)v(ϰ)ˉtϰ and u1<α,uN.

    Definition 2.2. ([39]) The FF operator of v(ˉt) involving the exponential decay kernel in the terms of RL can be described as follows for α[0,1]:

    FFEDα,0,ˉt(v(ˉt))=M(α)1αddˉtˉt0exp(α1α(ˉtϰ))v(ϰ)dϰ, (2.2)

    such that M(0)=M(1)=1 containing α>0,uN.

    Definition 2.3. ([39]) The FF operator of v(ˉt) involving the generalized Mittag-Leffler kernel in the perspective of RL can be described as follows for α[0,1]:

    FFMDα,0,ˉt(v(ˉt))=ABC(α)1αddˉtˉt0Eα(α1α(ˉtϰ))v(ϰ)dϰ, (2.3)

    such that ABC(α)=1α+αΓ(α) involving α>0,1N.

    Definition 2.4. ([39]) The corresponding F-F integral formulae of (2.1) is described as:

    FFPJα0,ˉt(v(ˉt))=Γ(α)ˉt0(ˉtϰ)α1ϰ1v(ϰ)dϰ. (2.4)

    Definition 2.5. ([39]) The corresponding F-F integral formulae of (2.2) is described as:

    FFEJα0,ˉt(v(ˉt))=αM(α)ˉt0ϰ1v(ϰ)dϰ+(1α)ˉt1v(ˉt)M(α). (2.5)

    Definition 2.6. ([39]) The corresponding F-F integral formulae of (2.3) is described as:

    FFMJα0,ˉt(v(ˉt))=αABC(α)ˉt0ϰ1(ˉtϰ)α1v(ϰ)dϰ+(1α)ˉt1v(ˉt)ABC(α). (2.6)

    Definition 2.7. ([38]) Let vH1(c,d),c<d and the Atangana-Baleanu fractional derivative operator is described as:

    ABCcDαˉt(v(ˉt))=ABC(α)1αˉtcv(ϰ)Eα(α(ˉtϰ)α1α)dϰ,α[0,1], (2.7)

    where ABC(α) represents the normalization function.

    Definition 2.8. ([55]) The Gaussian hypergeometric function 2F1, characterized as

    2F1(y1,y2;y3,y4)=1B(y2,y3y2)11ˉty21(1ˉt)y3y21(1y4ˉt)y1dˉt,(y3>y2>0,|y1|<1), (2.8)

    where B(y1,y2)=Γ(y1)Γ(y2)Γ(y1+y2) and Γ(y1)=0exp(ˉt)ˉty1dˉt is the Gamma function.

    Here, the immunological mechanism is necessary for the highly contagious viral replication. If infectious processes are adequately described, the infection and the therapeutic medications employed to address it can be comprehended. Lymphocytes are vicariously liable for specialization and retention in responsive immunological systems. B cells and T cells are the two primary categories of lymphocytes. T cells have the ability to identify and eliminate contaminated organisms, whereas B cells are responsible for producing antigens that can neutralize pathogens. Immune systems, including CTL and antigen-response, have been examined in terms of their impact [56,57]. The impact of CTL reactions and cytoplasmic latencies has been considered by a few other scientists as well [58]. Murase et al. [59] presented the mathematical framework that shows how adaptive immunity affects viral transmission as follows:

    {U(ˉt)dˉt=ΛςU(ˉt)λ11U(ˉt)F(ˉt)λ22U(ˉt)A(ˉt),A(ˉt)dˉt=λ1U(ˉt)F(ˉt)+λ2U(ˉt)A(ˉt)δA(ˉt),F(ˉt)dˉt=φA(ˉt)ν2F(ˉt)ξF(ˉt)Q(ˉt),Q(ˉt)dˉt=χF(ˉt)Q(ˉt)ζQ(ˉt)A(ˉt)δA(ˉt), (3.1)

    The system (3.1) based on unrestricted infections F(ˉt), unaffected target cells U(ˉt), productively infectious specific cells A(ˉt) and antibodies/B tissue Q(ˉt). The productivity Λ of the infectious organisms U(ˉt) and fatality rate ς are both constant. The incidence of the disease by uncontrolled pathogen is λ11, and uncontrolled bacteria become constructively contaminated at a rate of λ22 for each of the two individuals. The percentage of viral components that died at δ,ν2 and ζ released pathogens, antibodies, and B tissues, respectively. When tissues are actively infested, individual viral particles are created at a speed of φ, where is the ratio ξ at which responses can eliminate the pathogen. The frequency of responses that are active versus the pathogen is χ.

    However, the persistent infectious factor is applied to framework (3.1) in this article as an improvement. We suppose that the incidence at which a Holling type II functioning reaction develops is that the unaffected cell U(ˉt) becomes contaminated by a neutral pathogen F(ˉt) or by virus is transmitted organism A(ˉt) at the rate λ1U(ˉt)F(ˉt)1+F(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt) response. The rates of pathogen to tissue infection and tissue to cell propagation are indicated by λ1>0 and λ2>0,, respectively, see [60]. We further estimate that the amounts of contamination that result in response times and efficiency are 1ϕ and ϕ(0,1), respectively. In addition, we included the effect of unpredictability within the host by injecting nonlinear disturbances on the spontaneous mortality rate, employing white noise throughout each expression in an attempt to depict a more accurate state of pathogen progression. As a result, the modified framework is specified:

    {dU(ˉt)=(ΛςU(ˉt)λ1U(ˉt)S(ˉt)1+S(ˉt)λ2U(ˉt)A(ˉt)1+A(ˉt))dˉt+ρ1U(ˉt)dB1(ˉt),dS(ˉt)=((1ϕ)(λ1U(ˉt)S(ˉt)1+S(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt))(ν1+σ)S(ˉt))dˉt+ρ2S(ˉt)dB2(ˉt),dA(ˉt)=(ϕ(λ1U(ˉt)S(ˉt)1+S(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt))+σS(ˉt)δA(ˉt))dˉt+ρ3A(ˉt)dB3(ˉt),dF(ˉt)=(φA(ˉt)ν2F(ˉt)ξF(ˉt)Q(ˉt))dˉt+ρ4F(ˉt)dB4(ˉt),dQ(ˉt)=(χF(ˉt)Q(ˉt)ζQ(ˉt))dˉt+ρ5Q(ˉt)dB5(ˉt), (3.2)

    subject to initial conditions (ICs) U(0)>0,S(0)>0,A(0)>0,F(0)>0,Q(0)>0. Moreover, the term S(ˉt) stands for the concentrations of contaminated tissues in the predictive phase at time ˉt. ν1 be the death rate of S(ˉt), the underlying contamination becomes prolific at the rate σ. Also, ρ2ι,ι=1,...,5 are intensities of standard Gaussian white noise and Bι,ι=1,...,5 are independent standard Brownian motion (BM). The underlying ideas of probability theory and stochastic differential equations are described as: let (Ω,F,{F}ˉt0,P) be a complete probability space using filtration such that {F}ˉt0 admits the basic requirements. For further information on Itô's technique, see [61]. However, the deterministic model has certain limitations because it cannot consider demographic stochasticity, which are important features of any natural system. Due to the influence of environmental noise, population density usually does not stabilize at a fixed value, but fluctuates around a certain average value. Nowadays, stochastic biological modeling has attracted great interest from researchers all over the world [20,21,22].

    In what follows, we provide the accompanying result to identify the stochastic model's (3.2) existence and uniqueness.

    Theorem 4.1. For χ<ξ<ζ,λ1φ<ν2+χ,1+λ2<δφ, the solution of the system (3.2)  (U(0),S(0),A(0),F(0),Q(0)) is unique for ˉt0 underlying ICs (U(0),S(0),A(0),F(0),Q(0))R5+. Also, the solution will probably stay in R5+ having unit probability, i, e., (U(0),S(0),A(0),F(0),Q(0))R5+,ˉt>0 almost surely (a.s).

    Proof. Briefly, if the local Lipschitz criterion is fulfilled by the components of the scheme (3.2). Thus, (3.2) has an unique local solution (U(ˉt),S(ˉt),A(ˉt),F(ˉt),Q(ˉt)) on [0,τe], where τe is the exposition duration. Then, we illustrate that τe=. Let us apply the same methodology used in [48] to prove the result. Our intention is to define a non-negative mapping C2 as H:R5+R+ such that limη(U(ˉt),S(ˉt),A(ˉt),F(ˉt),Q(ˉt))R5+ΥηinfH(U,S,A,F,Q)= and LH(U,S,A,F,Q)k, where Υη=(1/η,η)×(1/η,η)×(1/η,η)×(1/η,η)×(1/η,η) and k is non-negative constant.

    Now, considering two positive constants values ϵ from (0,1) and T must exist such that

    P[Tτ]>ϵ. (4.1)

    Introducing a mapping H:R5+R+ as:

    H(U,S,A,F,Q)=U+S+A+F+Q5(lnU+lnS+lnA+lnF+lnQ). (4.2)

    This stored procedure non-negativity is shown by examining at ϱ1lnϱ,ϱ>0. Suppose that k0k and T>0. The Itô's formula can be used to acquire

    dH(U,S,A,F,Q)=LH(U,S,A,F,Q)dˉt+ρ1(U1)dB1(ˉt)+ρ2(S1)dB2(ˉt)+ρ3(A1)dB3(ˉt)+ρ4(F1)dB4(ˉt)+ρ5(Q1)dB5(ˉt). (4.3)

    It follows that

    LH(U,S,A,F,Q)=(11U)(ΛςU(ˉt)λ1U(ˉt)S(ˉt)1+S(ˉt)λ2U(ˉt)A(ˉt)1+A(ˉt))+(11S)((1ϕ)(λ1U(ˉt)S(ˉt)1+S(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt))(ν1+σ)S(ˉt))+(11A)(ϕ(λ1U(ˉt)S(ˉt)1+S(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt))+(11F)(φA(ˉt)ν2F(ˉt)ξF(ˉt)Q(ˉt))+(11Q)(χF(ˉt)Q(ˉt)ζQ(ˉt))12(ρ21+ρ22+ρ23+ρ24+ρ25)+Λ+ς+ν1+σ1+δ+ν2+ζ+((ξζ)+(χξ)F)Q+(λφ(ν2+χ))F+((λ2+1)φδ)A. (4.4)

    Utilizing the given hypothesis, there exists a non-negative constant η such that LH<η.

    Therefore,

    U[H(U(τηT),S(τηT),A(τηT),F(τηT),Q(τηT))]H(U(0),S(0),A(0),F(0),Q(0))+U[τηT0ηdˉt]H(U(0),S(0),A(0),F(0),Q(0))+ηT. (4.5)

    Inserting Ωη={τηT} for ηη1 and by (4.1) we have P(Ωη)ϵ. Observe that for every ω from Ωη there exist at least one U(τη,ω),S(τη,ω),A(τη,ω),F(τη,ω),Q(τη,ω) that yields 1/ηorη. Consequently, H(U(τη),S(τη),A(τη),F(τη),Q(τη))(1/η1+lnη)U(η1lnη).

    In view of (4.1) and (4.5), we can express

    H(U(0),S(0),A(0),F(0),Q(0))+ηTU[1Ω(ω)H(U(τη),S(τη),A(τη),F(τη),Q(τη))]ϵ(1/η1+lnη)U(η1lnη). (4.6)

    The indicating mapping of ω is denoted as 1Ω(ω) that approaches to , the contradiction

    >H(U(0),S(0),A(0),F(0),Q(0))+ηT=

    reveals itself, proving that τ=.

    Now, we review and examine the model's (3.2) stationary distribution outcomes, which show that the infections are eliminated or enduring.

    Suppose there be a regular Markov technique in Rn+ for which the behaviour is as below:

    dΦ(ˉt)=b1(Φ)dˉt+ur1ζr1dΨr1(ˉt).

    The diffusion matrix takes the form

    A(Φ)=[aij(ϕ)],aij(ϕ)=ur1=1ζir1(ϕ)ζr1j(ϕ).

    Lemma 4.1. ([62]) Suppose there is a unique stationary distribution technique Φ(ˉt). If there is a bounded region involving regular boundary such that S,ˉSRdˉS closure ˉSRd satisfies the following:

    (a) The smallest eigenvalue for A(ˉt) is bounded away from (0,0) for the open region S having neighbourhood.

    (b) For ψRdS, the mean time τ is bounded and for every compact subset KRn,supψkSψτ<. Therefore, f1(.) is an integrable mapping containing measure π, then

    P(limT1TT0f1(Φψ(ˉt))dˉt=Rdf1(ψ)π(dψ))=1,ψRd.

    Theorem 4.2. For ˆσ=ν1+σ+ρ222,ˆδ=δ+ρ232,^ν2=ν2+ρ242, then assume that Rs0:=Λσφλ1(1ϕ)ςˆδˆσ>1, then for any ICs exists in R5+, the system has a unique ESD π(.).

    Proof. The diffusive matrix for system (3.2) is computed as follows:

    A=[ρ21U200000ρ22S200000ρ23A200000ρ24F200000ρ25U2].

    This proves that the criteria (a) in Lemma 4.1 is applicable for any compact subset of R5+. In view of mapping C2 defined as H:R5+R+. Thus, we have

    H(U,S,A,F,Q):=M(ln1U+1ln1S+2ln1A+3ln1F+ln1Q)+ln1U+ln1S+ln1A+ln1F+(U+S+A+F+Q)θ+1θ+1=MH1+H2+H3+H4+H5+H6,

    where θ[0,1],1=Λλ1σφ(1ϕ)ˆσ2ˆa^ν2,2=Λλ1σφ(1ϕ)ˆσ2ˆa2^ν2,3=Λλ1σφˆσˆa^ν22 fulfilling cθ2(ρ21ρ22ρ23ρ24ρ25)>0 and M>0, admitting the assumption Mν2+N12 and ν2=ς(Rs01)>0.

    This shows that H(U,S,A,F,Q) is continuous as well as it tends to . So that (U,S,A,F,Q) approaches to R5+ and (U,S,A,F,Q). Also, H have ICs that lies in R5+.

    Again, in view of mapping C2 defined as H:R5+R+. Thus, we have

    ˉH(U,S,A,F,Q)=HU,S,A,F,QH(U(0),S(0),A(0),F(0),Q(0)).

    Considering Itô's technique L on the mappings H1,...,H6 and utilizing the given hypothesis such that c=max{ς,ν1,δ,ν2,ζ}, we have

    LH1ΛU1S(1ϕ)λ1UFσ2SAφA3F+ς+λ2A+1(ν1+σ)+δ2+ν23+ξQ3(χλ1)F+ζ+12(ρ21+1ρ22+2ρ23+3ρ24+ρ24)F+ρ212+ζ+ρ25+λ2A+ξ3Q. (4.7)

    Analogously, we have

    LH2ΛU+ς+λ1F+λ2A+ρ212,LH3=1S(1ϕ)(λ1UF1+F+λ2UA1+A)+ν1+σ+ρ222,LH4=ϕλ1UFA(1+F)ϕλ2U1+AσSA+δ+ρ232,LH5=φAF+ν2+ξQ+ρ242,LH5N212(c1θ2(ρ21ρ22ρ23ρ24ρ25))(Uθ+1,Sθ+1,Aθ+1,Fθ+1,Qθ+1), (4.8)

    where N2=sup(U,S,A,F,Q)R5+{Λ(U+S+A+F+Q)θ12(c1θ2(ρ21ρ22ρ23ρ24ρ25))(U+S+A+F+Q)θ+1}<.

    Utilizing (4.7) and (4.8), we have

    LˉHΛUMF+(M3+1)ξQ1S(1ϕ)λ1UFϕλ2U1+AφAF12(c1θ2(ρ21ρ22ρ23ρ24ρ25))(Uϑ+1+Sϑ+1+Aϑ+1+Fϑ+1+Qϑ+1)+ς+(M+1)ρ212+Mζ+Mρ252+(M+1)λ2A+δ+ν2+λ1F+N2+ν1+σ+ρ222+ρ232+ρ242. (4.9)

    For ϵ>0, we construct the following set

    D={(U,S,A,F,Q)R5+:U[ϵ,1/ϵ],S[ϵ5,1/ϵ5],A[ϵ2,1/ϵ2],F[ϵ3,1/ϵ3],Q[ϵ,1/ϵ]}. (4.10)

    We can validate Lemma 4.1 in order to demonstrate that LˉH1 for (U,S,A,F,Q)R5+DandR5+D=10ι=1Dι, where

    D1={(U,S,A,F,Q)R5+:U(0,ϵ)},D2={(U,S,A,F,Q)R5+:A(0,ϵ5),Uϵ,Fϵ3},D3={(U,S,A,F,Q)R5+:A(0,ϵ2),Uϵ},D4={(U,S,A,F,Q)R5+:F(0,ϵ3),Aϵ2},D5={(U,S,A,F,Q)R5+:Q(0,ϵ)},D6={(U,S,A,F,Q)R5+:U>1/ϵ},D7={(U,S,A,F,Q)R5+:S>1/ϵ5},D8={(U,S,A,F,Q)R5+:A>1/ϵ2},D9={(U,S,A,F,Q)R5+:F>1/ϵ3},D10={(U,S,A,F,Q)R5+:Q>1/ϵ}. (4.11)

    Case (a) If (U,S,A,F,Q)D1, then by (4.9), we find

    LˉHΛU+(M3+1)ξQ14(c1θ2(ρ21ρ22ρ23ρ24ρ25))(Uϑ+1+Sϑ+1+Aϑ+1+Fϑ+1+Qϑ+1)+ς+(M+1)ρ212+Mζ+Mρ252+(M+1)λ2A+δ+ν2+λ1F+N2+ν1+σ+ρ222+ρ232+ρ242Λϵ+M1 (4.12)

    If we choose a sufficiently small ϵ>0, then we get LˉH<0 for each (U,S,A,F,Q)D1.

    Case (b) If (U,S,A,F,Q)D2, then by (4.9), we find

    LˉH1S(1ϕ)λ1UF+M11ϵ(1ϕ)λ1+M1

    If we choose a sufficiently small ϵ5>0, then we get LˉH<0 for each (U,S,A,F,Q)D2.

    Case (c) If (U,S,A,F,Q)D3, then by (4.9), we find

    LˉHϕλ2U1+A+M1ϕλ2ϵ1+ϵ2+M1.

    If we choose a sufficiently small ϵ2>0, then we get LˉH<0 for each (U,S,A,F,Q)D3.

    Case (d) If (U,S,A,F,Q)D4, then by (4.9), we find

    LˉHφAF+M1φϵ+M1.

    If we choose a sufficiently small ϵ>0, then we get LˉH<0 for each (U,S,A,F,Q)D4.

    Case (e) If (U,S,A,F,Q)D5, then by (4.9), we find

    LˉHMF+(M3+1)ξQ+N1MF+(M3+1)ξϵ+N1.

    If we choose a sufficiently small ϵ>0, then we get LˉH<0 for each (U,S,A,F,Q)D4.

    Case (f) If (U,S,A,F,Q)D6, then by (4.9), we find

    LˉH14(c1θ2(ρ21ρ22ρ23ρ24ρ25))(U)θ+1+M114(c1θ2(ρ21ρ22ρ23ρ24ρ25))1ϵ(θ+1)+M1.

    If we choose a sufficiently small ϵ>0, then we get LˉH<0 for each (U,S,A,F,Q)D6.

    Case (g) If (U,S,A,F,Q)D7, then by (4.9), we find

    LˉH14(c1θ2(ρ21ρ22ρ23ρ24ρ25))(S)θ+1+M114(c1θ2(ρ21ρ22ρ23ρ24ρ25))1ϵ5(θ+1)+M1.

    If we choose a sufficiently small 1/ϵ5>0, then we get LˉH<0 for each (U,S,A,F,Q)D7.

    Case (h) If (U,S,A,F,Q)D8, then by (4.9), we find

    LˉH14(c1θ2(ρ21ρ22ρ23ρ24ρ25))(A)θ+1+M114(c1θ2(ρ21ρ22ρ23ρ24ρ25))1ϵ2(θ+1)+M1.

    If we choose a sufficiently small 1/ϵ2>0, then we get LˉH<0 for each (U,S,A,F,Q)D8.

    Case (i) If (U,S,A,F,Q)D9, then by (4.9), we find

    LˉH14(c1θ2(ρ21ρ22ρ23ρ24ρ25))(F)θ+1+M114(c1θ2(ρ21ρ22ρ23ρ24ρ25))1ϵ3(θ+1)+M1.

    If we choose a sufficiently small 1/ϵ3>0, then we get LˉH<0 for each (U,S,A,F,Q)D9.

    Case (j) If (U,S,A,F,Q)D10, then by (4.9), we find

    LˉH14(c1θ2(ρ21ρ22ρ23ρ24ρ25))(Q)θ+1+M114(c1θ2(ρ21ρ22ρ23ρ24ρ25))1ϵ(θ+1)+M1.

    If we choose a sufficiently small 1/ϵ>0, then we get LˉH<0 for each (U,S,A,F,Q)D10.\\As a result of the foregoing explanation, a ϵ>0 exists such that LˉH(U,S,A,F,Q)<0 (U,S,A,F,Q)R5+. The unique ESD of the system (3.2) is predicated on Lemma 4.1. This completes the proof.

    This part defines the objectives for a virus's systemic elimination (3.1). Before proving the key findings, let's take a closer look at a key premise. Suppose

    Φ(ˉt)=1ˉtˉt0ϕ(r1)dr1. (4.13)

    Theorem 4.3. Suppose there is a solution of the system (3.1)  (U(ˉt),S(ˉt),A(ˉt),F(ˉt),Q(ˉt)) having ICs lies in R5+. If

    ˜Rs0:=3(λ1+λ2)Λς((ν1+ρ222)((δφ)+ρ232)(ν2+ρ242))<1
    limˉt1ˉtˉt0U(ϖ)dϖΛς,limˉtS(ˉt)=0,limˉtA(ˉt)=0,limˉtF(ˉt)=0

    almost surely.

    Proof. Under the hypothesis of Theorem 4.1, model (3.2) has non-negative solution,

    dU(ˉt)(ΛςU)dˉt+ρ1UdB1(ˉt).

    Assume the stochastic DE of the aforementioned system

    dU1(ˉt)(ΛςU1)dˉt+ρ1U1dB1(ˉt),U1(0)=U(0)>0,

    we have limˉt1ˉtˉt0U(ϖ)dϖΛς(a.s).

    Applying the result of [48], gives U(ˉt)U1(ˉt)(a.s). Then

    limˉt1ˉtˉt0U(ϖ)dϖlimˉt1ˉtˉt0U1(ϖ)dϖ=Λς(a.s).

    For φ<δ and introducing ln(S(ˉt)+A(ˉt)+F(ˉt)) and implement the Itô's technique, we have

    d(ln(S(ˉt)+A(ˉt)+F(ˉt)))=1S(ˉt)+A(ˉt)+F(ˉt)(λ1UF1+F+λ2UA1+Aν1S(δφ)Aν2FξFQ)dˉt+ρ2SS+A+FdB2(ˉt)+ρ3AS+A+FdB3(ˉt)+ρ4FS+A+FdB2(ˉt)12(S+A+F)2(ρ22S2+ρ23A2+ρ24F2)dˉtρ2SS+A+FdB2(ˉt)+ρ3AS+A+FdB3(ˉt)+ρ4FS+A+FdB2(ˉt)+(λ1+λ2)Udˉt13(((ν1+ρ222)((δφ)+ρ232)(ν2+ρ242)))dˉt. (4.14)

    Applying integration from 0 to ˉt and dividing by ˉt, we have

    ln(S(ˉt)+A(ˉt)+F(ˉt))ˉtln(S(0)+A(0)+F(0))ˉtλ1+λ2ˉtˉt0U(ϱ)dϱ13(((ν1+ρ222)((δφ)+ρ232)(ν2+ρ242)))+ρ2ˉtˉt0dB2(ϱ)S+A+F+ρ3ˉtˉt0dB3(ϱ)S+A+F+ρ4ˉtˉt0dB4(ϱ)S+A+F13(((ν1+ρ222)((δφ)+ρ232)(ν2+ρ242)))(˜Rs01)<0(a.s)

    that yields limˉtS(ˉt)=0,limˉtA(ˉt)=0,limˉtF(ˉt)(a.s).

    The modeling framework helps us understand and interpret experimental data on immune responses against viral infection model (5.1). The role of the fractal-fractional operator in the Atangana-Baleanu fractional derivative sense and antibodies for the resolution of viral infection is debated by utilizing the scheme proposed in [52]. Studies of the acute phase of the infection showed that humans who cleared the virus from their blood developed strong and sustained CTL responses [57]. Here, we illustrate the fractal-fractional derivative for the classical derivative formulation stated in (3.1). The fractal-fractional version in the sense of a generalized Mittag-Leffler function is described as

    {FFM0Dα,ˉtU(ˉt)=(ΛςU(ˉt)λ1U(ˉt)S(ˉt)1+S(ˉt)λ2U(ˉt)A(ˉt)1+A(t1))dt1+ρ1G1(t1,U)dB1(ˉt),FFM0Dα,ˉtS(ˉt)=((1ϕ)(λ1U(ˉt)S(ˉt)1+S(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt))(ν1+σ)S(ˉt))dˉt+ρ2G2(ˉt,S)dB2(ˉt),FFM0Dα,ˉtA(ˉt)=(ϕ(λ1U(ˉt)S(ˉt)1+S(ˉt)+λ2U(ˉt)A(ˉt)1+A(ˉt))+σS(ˉt)δA(ˉt))dˉt+ρ3G3(ˉt,A)dB3(ˉt),FFM0Dα,ˉtF(ˉt)=(φA(ˉt)ν2F(ˉt)ξF(ˉt)Q(ˉt))dˉt+ρ4G4(ˉt,F)dB4(ˉt),FFM0Dα,ˉtQ(ˉt)=(χF(ˉt)Q(ˉt)ζQ(ˉt))dˉt+ρ5G5(ˉt,Q)dB5(ˉt). (5.1)

    For tn+1=(n+1)Δˉt, then we transform these mappings by their polynomials as follows:

    Un+1=U0+(1α)ABC(α)ˉt1n+1[{U(ˉtn+1,Upn+1,Apn+1,Fpn+1)+ρ1G1(ˉtn+1,Upn+1)(B1(ˉtn+2)B1(ˉtn+1))]+αABC(α)Γ(α)n1κ=0[{U(ˉtκ+1,Uκ+1,Aκ+1,Fκ+1)Jα,1,κ+U(ˉtκ+1,Uκ+1,Aκ+1,Fκ+1)U(ˉtκ,Uκ,Aκ,Fκ)Jα,2,κ+U(ˉtκ+1,Uκ+1,Aκ+1,Fκ+1)2U(ˉtκ,Uκ,Aκ,Fκ)+U(ˉtκ1,Uκ1,Aκ1,Fκ1)Jα,3,κ]
    +αABC(α)Γ(α)n1κ=0[{ρ1G1(ˉtκ+1,Uκ+1)(B1(ˉtκ+1)B1(ˉtκ))Jα,1,κ+{ρ1G1(ˉtκ+1,Uκ+1)(B1(ˉtκ+1)B1(ˉtκ))ρ1G1(ˉtκ,Uκ)(B1(ˉtκ)B1(ˉtκ1))}Jα,2,κ+{ρ1G1(ˉtκ+1,Uκ+1)(B1(ˉtκ+1)B1(ˉtκ))2ρ1G1(ˉtκ,Uκ)(B1(ˉtκ)B1(ˉtκ1))ρ1G1(ˉtκ1,Uκ1)(B1(ˉtκ1)B1(ˉtκ2))}Jα,3,κ]
    +αABC(α)Γ(α)[{U(ˉtn+1,Upn+1,Apn+1,Fpn+1)Jα,1,n+U(ˉtn+1,Upn+1,Apn+1,Fpn+1)Jα,2,nU(ˉtn,Un,An,Fn)Jα,2,n+{U(ˉtn+1,Upn+1,Apn+1,Fpn+1)2U(ˉtn,Un,An,Fn)2}Jα,3,n+U(ˉtn1,Un1,An1,Fn1)22Jα,3,n+ρ1G1(ˉtn+1,Up1n+1)(B1(ˉtn+1)B1(ˉtn))Jα,1,n+ρ1G1(ˉtn+1,Up1n+1)(B1(ˉtn+1)B1(ˉtn))Jα,2,nρ1G1(ˉtn,Up1n)(B1(ˉtn)B1(ˉtn1))Jα,2,n+ρ1G1(ˉtn+1,Up1n+1)(B1(ˉtn+1)B1(ˉtn))2Jα,3,n2ρ1G1(ˉtn,Up1n)(B1(ˉtn)B1(ˉtn1))2Jα,3,n+ρ1G1(ˉtn1,Up1n1)(B1(ˉtn2)B1(ˉtn2))2Jα,3,n],
    Sn+1=S0+(1α)ABC(α)ˉt1n+1[{S(ˉtn+1,Upn+1,Spn+1,Apn+1,Fpn+1)+ρ2G2(ˉtn+1,Spn+1)(B2(ˉtn+2)B2(ˉtn+1))]
    +αABC(α)Γ(α)n1κ=0[{S(ˉtκ+1,Uκ+1,Sκ+1,Aκ+1,Fκ+1)Jα,1,κ+S(ˉtκ+1,Uκ+1,Sκ+1,Aκ+1,Fκ+1)S(ˉtκ,Uκ,Sκ,Aκ,Fκ)Jα,2,κ+(S(ˉtκ+1,Uκ+1,Sκ+1,Aκ+1,Fκ+1)2S(ˉtκ,Uκ,Sκ,Aκ,Fκ)+S(ˉtκ1,Uκ1,Sκ1,Aκ1,Fκ1))Jα,3,κ]
    +αABC(α)Γ(α)n1κ=0[{ρ2G2(ˉtκ+1,Sκ+1)(B2(ˉtκ+1)B2(ˉtκ))Jα,1,κ+{ρ2G2(ˉtκ+1,Sκ+1)(B2(ˉtκ+1)B2(ˉtκ))ρ2G2(ˉtκ,Sκ)(B2(ˉtκ)B2(ˉtκ1))}Jα,2,κ+{ρ2G2(ˉtκ+1,Sκ+1)(B2(ˉtκ+1)B2(ˉtκ))2ρ2G2(ˉtκ,Sκ)(B2(ˉtκ)B2(ˉtκ1))ρ2G2(ˉtκ1,Sκ1)(B2(ˉtκ1)B2(ˉtκ2))}Jα,3,κ]
    \begin{array}{l} \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\left[ \begin{cases} \mathbf{S}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{U}_{\mathfrak{n}+1}^{p}, \mathbf{S}_{\mathfrak{n}+1}^{p}, \mathbf{A}_{\mathfrak{n}+1}^{p}, \mathbf{F}_{\mathfrak{n}+1}^{p}\big)\mathcal{J}_{1, \mathfrak{n}}^{\alpha, \wp}\cr+\mathbf{S}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{U}_{\mathfrak{n}+1}^{p}, \mathbf{S}_{\mathfrak{n}+1}^{p}, \mathbf{A}_{\mathfrak{n}+1}^{p}, \mathbf{F}_{\mathfrak{n}+1}^{p}\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr-\mathbf{S}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{U}_{\mathfrak{n}}, \mathbf{S}_{\mathfrak{n}}, \mathbf{A}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr+\bigg\{\frac{\mathbf{S}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{U}_{\mathfrak{n}+1}^{p}, \mathbf{S}_{\mathfrak{n}+1}^{p}, \mathbf{A}_{\mathfrak{n}+1}^{p}, \mathbf{F}_{\mathfrak{n}+1}^{p}\big)-2\mathbf{S}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{U}_{\mathfrak{n}}, \mathbf{S}_{\mathfrak{n}}, \mathbf{A}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}\big)}{2\hbar}\bigg\}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr+\frac{\mathbf{S}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}-1}, \mathbf{U}_{\mathfrak{n}-1}, \mathbf{S}_{\mathfrak{n}-1}, \mathbf{A}_{\mathfrak{n}-1}, \mathbf{F}_{\mathfrak{n}-1}\big)}{2\hbar^{2}}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr+\rho_{2}\mathcal{G}_{2}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{S}_{\mathfrak{n}+1}^{p_{1}}\big)\big(\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})-\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}})\big)\mathcal{J}_{1, \mathfrak{n}}^{\alpha, \wp}\cr+\rho_{2}\mathcal{G}_{2}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{S}_{\mathfrak{n}+1}^{p_{1}}\big)\big(\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})-\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}})\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr-\rho_{2}\mathcal{G}_{2}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{S}_{\mathfrak{n}}^{p_{1}}\big)\big(\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}})-\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}-1})\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr+\frac{\rho_{2}\mathcal{G}_{2}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{S}_{\mathfrak{n}+1}^{p_{1}}\big)\big(\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})-\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}})\big)}{2\hbar}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr-2\frac{\rho_{2}\mathcal{G}_{2}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{S}_{\mathfrak{n}}^{p_{1}}\big)\big(\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}})-\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}-1})\big)}{2\hbar}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr+\frac{\rho_{2}\mathcal{G}_{2}\big({\bar{\mathbf{t}}}_{\mathfrak{n}-1}, \mathbf{S}_{\mathfrak{n}-1}^{p_{1}}\big)\big(\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}-2})-\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}-2})\big)}{2\hbar}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp} \end{cases} \right], \end{array}
    \begin{array}{l} \mathbf{A}_{\mathfrak{n}+1} = \mathbf{A}_{0}+\frac{(1-\alpha)}{\mathbf{ABC}(\alpha)}\wp{\bar{\mathbf{t}}}_{\mathfrak{n}+1}^{\wp-1}\left[ \begin{cases}\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{U}_{\mathfrak{n}+1}^{p}, \mathbf{S}_{\mathfrak{n}+1}^{p}, \mathbf{A}_{\mathfrak{n}+1}^{p}, \mathbf{F}_{\mathfrak{n}+1}^{p}\big)\cr+\rho_{3}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{A}_{\mathfrak{n}+1}^{p}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}+2})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})\big)\end{cases}\right]\nonumber\\\end{array}
    \begin{array}{l} \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\sum\limits_{\kappa = 0}^{\mathfrak{n}-1}\left[\begin{cases} \mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{U}_{\kappa+1}, \mathbf{S}_{\kappa+1}, \mathbf{A}_{\kappa+1}, \mathbf{F}_{\kappa+1}\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\cr+ \frac{\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{U}_{\kappa+1}, \mathbf{S}_{\kappa+1}, \mathbf{A}_{\kappa+1}, \mathbf{F}_{\kappa+1}\big)-\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{U}_{\kappa}, \mathbf{S}_{\kappa}, \mathbf{A}_{\kappa}, \mathbf{F}_{\kappa}\big)}{\hbar}\mathcal{J}_{2, \kappa}^{\alpha, \wp}\cr+\bigg(\frac{\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{U}_{\kappa+1}, \mathbf{S}_{\kappa+1}, \mathbf{A}_{\kappa+1}, \mathbf{F}_{\kappa+1}\big)-2\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{U}_{\kappa}, \mathbf{S}_{\kappa}, \mathbf{A}_{\kappa}, \mathbf{F}_{\kappa}\big)}{\hbar}\cr+\frac{\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa-1}, \mathbf{U}_{\kappa-1}, \mathbf{S}_{\kappa-1}, \mathbf{A}_{\kappa-1}, \mathbf{F}_{\kappa-1}\big)}{\hbar}\bigg)\mathcal{J}_{3, \kappa}^{\alpha, \wp} \end{cases}\right]\nonumber\\ \end{array}
    \begin{array}{l} \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\sum\limits_{\kappa = 0}^{\mathfrak{n}-1}\left[\begin{cases} \rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{A}_{\kappa+1}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa+1})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa})\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\cr+ \bigg\{\rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{A}_{\kappa+1}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa+1})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa})\big)\cr- \rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{A}_{\kappa}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa-1})\big) \bigg\}\mathcal{J}_{2, \kappa}^{\alpha, \wp}\cr+\bigg\{\frac{\rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{A}_{\kappa+1}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa+1})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa})\big)-2\rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{A}_{\kappa}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa-1})\big)}{\hbar}\cr-\frac{\rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\kappa-1}, \mathbf{A}_{\kappa-1}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa-1})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa-2})\big)}{\hbar}\bigg\}\mathcal{J}_{3, \kappa}^{\alpha, \wp} \end{cases}\right]\nonumber\\ \end{array}
    \begin{array}{l} \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\left[ \begin{cases} \mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{U}_{\mathfrak{n}+1}^{p}, \mathbf{S}_{\mathfrak{n}+1}^{p}, \mathbf{A}_{\mathfrak{n}+1}^{p}, \mathbf{F}_{\mathfrak{n}+1}^{p}\big)\mathcal{J}_{1, \mathfrak{n}}^{\alpha, \wp}\cr+\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{U}_{\mathfrak{n}+1}^{p}, \mathbf{S}_{\mathfrak{n}+1}^{p}, \mathbf{A}_{\mathfrak{n}+1}^{p}, \mathbf{F}_{\mathfrak{n}+1}^{p}\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr-\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{U}_{\mathfrak{n}}, \mathbf{S}_{\mathfrak{n}}, \mathbf{A}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr+\bigg\{\frac{\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{U}_{\mathfrak{n}+1}^{p}, \mathbf{S}_{\mathfrak{n}+1}^{p}, \mathbf{A}_{\mathfrak{n}+1}^{p}, \mathbf{F}_{\mathfrak{n}+1}^{p}\big)-2\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{U}_{\mathfrak{n}}, \mathbf{S}_{\mathfrak{n}}, \mathbf{A}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}\big)}{2\hbar}\bigg\}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr+\frac{\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}-1}, \mathbf{U}_{\mathfrak{n}-1}, \mathbf{A}_{\mathfrak{n}-1}, \mathbf{F}_{\mathfrak{n}-1}\big)}{2\hbar^{2}}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr+\rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{A}_{\mathfrak{n}+1}^{p_{1}}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}})\big)\mathcal{J}_{1, \mathfrak{n}}^{\alpha, \wp}\cr+\rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{A}_{\mathfrak{n}+1}^{p_{1}}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}})\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr-\rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{A}_{\mathfrak{n}}^{p_{1}}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}-1})\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr+\frac{\rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{A}_{\mathfrak{n}+1}^{p_{1}}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}})\big)}{2\hbar}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr-2\frac{\rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{A}_{\mathfrak{n}}^{p_{1}}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}-1})\big)}{2\hbar}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr+\frac{\rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\mathfrak{n}-1}, \mathbf{A}_{\mathfrak{n}-1}^{p_{1}}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}-2})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}-2})\big)}{2\hbar}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp} \end{cases} \right], \end{array}
    \begin{array}{l} \mathbf{F}_{\mathfrak{n}+1} = \mathbf{F}_{0}+\frac{(1-\alpha)}{\mathbf{ABC}(\alpha)}\wp{\bar{\mathbf{t}}}_{\mathfrak{n}+1}^{\wp-1}\left[ \begin{cases}\mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{A}_{\mathfrak{n}+1}^{p}, \mathbf{F}_{\mathfrak{n}+1}^{p}, \mathbf{Q}_{\mathfrak{n}+1}^{p}\big)\cr+\rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{F}_{\mathfrak{n}+1}^{p}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}+2})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})\big)\end{cases}\right]\nonumber\\ \end{array}
    \begin{array}{l} \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\sum\limits_{\kappa = 0}^{\mathfrak{n}-1}\left[\begin{cases} \mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{A}_{\kappa+1}, \mathbf{F}_{\kappa+1}, \mathbf{Q}_{\kappa+1}\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\cr+ \frac{\mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{A}_{\kappa+1}, \mathbf{F}_{\kappa+1}, \mathbf{Q}_{\kappa+1}\big)-\mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{A}_{\kappa}, \mathbf{F}_{\kappa}, \mathbf{Q}_{\kappa}\big)}{\hbar}\mathcal{J}_{2, \kappa}^{\alpha, \wp}\cr+\frac{\mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{A}_{\kappa+1}, \mathbf{F}_{\kappa+1}, \mathbf{Q}_{\kappa+1}\big)-2\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{A}_{\kappa}, \mathbf{F}_{\kappa}, \mathbf{Q}_{\kappa}\big)+\mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa-1}, \mathbf{A}_{\kappa-1}, \mathbf{F}_{\kappa-1}, \mathbf{Q}_{\kappa-1}\big)}{\hbar}\mathcal{J}_{3, \kappa}^{\alpha, \wp} \end{cases}\right]\nonumber \end{array}
    \begin{array}{l} \\ \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\sum\limits_{\kappa = 0}^{\mathfrak{n}-1}\left[\begin{cases} \rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{F}_{\kappa+1}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa+1})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa})\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\cr+ \bigg\{\rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{F}_{\kappa+1}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa+1})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa})\big)\cr- \rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{F}_{\kappa}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa-1})\big) \bigg\}\mathcal{J}_{2, \kappa}^{\alpha, \wp}\cr+\bigg\{\frac{\rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{F}_{\kappa+1}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa+1})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa})\big)-2\rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{F}_{\kappa}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa-1})\big)}{\hbar}\cr-\frac{\rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\kappa-1}, \mathbf{F}_{\kappa-1}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa-1})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa-2})\big)}{\hbar}\bigg\}\mathcal{J}_{3, \kappa}^{\alpha, \wp} \end{cases}\right]\nonumber\\ \end{array}
    \begin{array}{l} \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\left[ \begin{cases} \mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{A}_{\mathfrak{n}+1}^{p}, \mathbf{F}_{\mathfrak{n}+1}^{p}, \mathbf{Q}_{\mathfrak{n}+1}^{p}\big)\mathcal{J}_{1, \mathfrak{n}}^{\alpha, \wp}\cr+\mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{A}_{\mathfrak{n}+1}^{p}, \mathbf{F}_{\mathfrak{n}+1}^{p}, \mathbf{Q}_{\mathfrak{n}+1}^{p}\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr-\mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{A}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}, \mathbf{Q}_{\mathfrak{n}}\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr+\bigg\{\frac{\mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{A}_{\mathfrak{n}+1}^{p}, \mathbf{F}_{\mathfrak{n}+1}^{p}, \mathbf{Q}_{\mathfrak{n}+1}^{p}\big)-2\mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{A}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}, \mathbf{Q}_{\mathfrak{n}}\big)}{2\hbar}\bigg\}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr+\frac{\mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}-1}, \mathbf{A}_{\mathfrak{n}-1}, \mathbf{F}_{\mathfrak{n}-1}, \mathbf{Q}_{\mathfrak{n}-1}\big)}{2\hbar^{2}}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr+\rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{F}_{\mathfrak{n}+1}^{p_{1}}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}})\big)\mathcal{J}_{1, \mathfrak{n}}^{\alpha, \wp}\cr+\rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{F}_{\mathfrak{n}+1}^{p_{1}}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}})\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr-\rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}^{p_{1}}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}-1})\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr+\frac{\rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{F}_{\mathfrak{n}+1}^{p_{1}}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}})\big)}{2\hbar}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr-2\frac{\rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}^{p_{1}}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}-1})\big)}{2\hbar}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr+\frac{\rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\mathfrak{n}-1}, \mathbf{F}_{\mathfrak{n}-1}^{p_{1}}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}-2})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}-2})\big)}{2\hbar}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp} \end{cases} \right], \end{array}
    \begin{array}{l} \mathbf{Q}_{\mathfrak{n}+1} = \mathbf{Q}_{0}+\frac{(1-\alpha)}{\mathbf{ABC}(\alpha)}\wp{\bar{\mathbf{t}}}_{\mathfrak{n}+1}^{\wp-1}\left[ \begin{cases}\mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{F}_{\mathfrak{n}+1}^{p}, \mathbf{Q}_{\mathfrak{n}+1}^{p}\big)\cr+\rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{Q}_{\mathfrak{n}+1}^{p}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}+2})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})\big)\end{cases}\right]\nonumber\\ \end{array}
    \begin{array}{l} \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\sum\limits_{\kappa = 0}^{\mathfrak{n}-1}\left[\begin{cases} \mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{F}_{\kappa+1}, \mathbf{Q}_{\kappa+1}\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\cr+ \frac{\mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{F}_{\kappa+1}, \mathbf{Q}_{\kappa+1}\big)-\mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{F}_{\kappa}, \mathbf{Q}_{\kappa}\big)}{\hbar}\mathcal{J}_{2, \kappa}^{\alpha, \wp}\cr+\frac{\mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{F}_{\kappa+1}, \mathbf{Q}_{\kappa+1}\big)-2\mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{F}_{\kappa}, \mathbf{Q}_{\kappa}\big)+\mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa-1}, \mathbf{F}_{\kappa-1}, \mathbf{Q}_{\kappa-1}\big)}{\hbar}\mathcal{J}_{3, \kappa}^{\alpha, \wp} \end{cases}\right]\nonumber\\ \end{array}
    \begin{array}{l} \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\sum\limits_{\kappa = 0}^{\mathfrak{n}-1}\left[\begin{cases} \rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{Q}_{\kappa+1}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa+1})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa})\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\cr+ \bigg\{\rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{Q}_{\kappa+1}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa+1})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa})\big)\cr- \rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{Q}_{\kappa}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa-1})\big) \bigg\}\mathcal{J}_{2, \kappa}^{\alpha, \wp}\cr+\bigg\{\frac{\rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\kappa+1}, \mathbf{Q}_{\kappa+1}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa+1})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa})\big)-2\rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{Q}_{\kappa}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa-1})\big)}{\hbar}\cr-\frac{\rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\kappa-1}, \mathbf{Q}_{\kappa-1}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa-1})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa-2})\big)}{\hbar}\bigg\}\mathcal{J}_{3, \kappa}^{\alpha, \wp} \end{cases}\right]\nonumber\\ \end{array}
    \begin{array}{l} \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\left[ \begin{cases} \mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{F}_{\mathfrak{n}+1}^{p}, \mathbf{Q}_{\mathfrak{n}+1}^{p}\big)\mathcal{J}_{1, \mathfrak{n}}^{\alpha, \wp}\cr+\mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{F}_{\mathfrak{n}+1}^{p}, \mathbf{Q}_{\mathfrak{n}+1}^{p}\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr-\mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}, \mathbf{Q}_{\mathfrak{n}}\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr+\bigg\{\frac{\mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{F}_{\mathfrak{n}+1}^{p}, \mathbf{Q}_{\mathfrak{n}+1}^{p}\big)-2\mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}, \mathbf{Q}_{\mathfrak{n}}\big)}{2\hbar}\bigg\}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr+\frac{\mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}-1}, \mathbf{F}_{\mathfrak{n}-1}, \mathbf{Q}_{\mathfrak{n}-1}\big)}{2\hbar^{2}}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr+\rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{Q}_{\mathfrak{n}+1}^{p_{1}}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}})\big)\mathcal{J}_{1, \mathfrak{n}}^{\alpha, \wp}\cr+\rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{Q}_{\mathfrak{n}+1}^{p_{1}}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}})\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr-\rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{Q}_{\mathfrak{n}}^{p_{1}}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}-1})\big)\mathcal{J}_{2, \mathfrak{n}}^{\alpha, \wp}\cr+\frac{\rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\mathfrak{n}+1}, \mathbf{Q}_{\mathfrak{n}+1}^{p_{1}}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}+1})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}})\big)}{2\hbar}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr-2\frac{\rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{Q}_{\mathfrak{n}}^{p_{1}}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}-1})\big)}{2\hbar}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp}\cr+\frac{\rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\mathfrak{n}-1}, \mathbf{Q}_{\mathfrak{n}-1}^{p_{1}}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}-2})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}-2})\big)}{2\hbar}\mathcal{J}_{3, \mathfrak{n}}^{\alpha, \wp} \end{cases} \right], \end{array}

    where

    \begin{array}{l} \mathbf{U}_{\mathfrak{n}+1}^{p_{1}} = \mathbf{U}_{0}+\frac{1-\alpha}{\mathbf{ABC}(\alpha)}\wp{\bar{\mathbf{t}}}_{\mathfrak{n}+1}^{\wp-1}\left[ \begin{cases}\mathbf{U}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{U}_{\mathfrak{n}}, \mathbf{A}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}\big)\cr+\wp\rho_{1}\mathcal{G}_{1}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{U}_{\mathfrak{n}}\big)\big(\mathbf{B}_{1}({\bar{\mathbf{t}}}_{\mathfrak{n}})-\mathbf{B}_{1}({\bar{\mathbf{t}}}_{\mathfrak{n}-1})\big)\end{cases}\right]\nonumber\\ \end{array}
    \begin{array}{l} \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\sum\limits_{\kappa = 0}^{\mathfrak{n}}\left[\begin{cases}\mathbf{U}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{U}_{\kappa}, \mathbf{A}_{\kappa}, \mathbf{F}_{\kappa}\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\cr+\rho_{1}\mathcal{G}_{1}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{U}_{\kappa}\big)\big(\mathbf{B}_{1}({\bar{\mathbf{t}}}_{\kappa})-\mathbf{B}_{1}({\bar{\mathbf{t}}}_{\kappa-1})\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\end{cases}\right], \nonumber\\ \mathbf{S}_{\mathfrak{n}+1}^{p_{1}} = \mathbf{S}_{0}+\frac{1-\alpha}{\mathbf{ABC}(\alpha)}\wp{\bar{\mathbf{t}}}_{\mathfrak{n}+1}^{\wp-1}\left[ \begin{cases}\mathbf{S}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{U}_{\mathfrak{n}}, \mathbf{S}_{\mathfrak{n}}, \mathbf{A}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}\big)\cr+\wp\rho_{2}\mathcal{G}_{2}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{S}_{\mathfrak{n}}\big)\big(\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}})-\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\mathfrak{n}-1})\big)\end{cases}\right]\nonumber\\ \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\sum\limits_{\kappa = 0}^{\mathfrak{n}}\left[\begin{cases}\mathbf{S}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{U}_{\kappa}, \mathbf{S}_{\kappa}, \mathbf{A}_{\kappa}, \mathbf{F}_{\kappa}\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\cr+\rho_{2}\mathcal{G}_{2}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{S}_{\kappa}\big)\big(\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\kappa})-\mathbf{B}_{2}({\bar{\mathbf{t}}}_{\kappa-1})\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\end{cases}\right], \nonumber\\ \end{array}
    \begin{array}{l} \mathbf{A}_{\mathfrak{n}+1}^{p_{1}} = \mathbf{A}_{0}+\frac{1-\alpha}{\mathbf{ABC}(\alpha)}\wp{\bar{\mathbf{t}}}_{\mathfrak{n}+1}^{\wp-1}\left[ \begin{cases}\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{U}_{\mathfrak{n}}, \mathbf{S}_{\mathfrak{n}}, \mathbf{A}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}\big)\cr+\wp\rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{A}_{\mathfrak{n}}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\mathfrak{n}-1})\big)\end{cases}\right]\nonumber\\ \end{array}
    \begin{array}{l} \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\sum\limits_{\kappa = 0}^{\mathfrak{n}}\left[\begin{cases}\mathbf{A}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{U}_{\kappa}, \mathbf{S}_{\kappa}, \mathbf{A}_{\kappa}, \mathbf{F}_{\kappa}\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\cr+\rho_{3}\mathcal{G}_{3}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{A}_{\kappa}\big)\big(\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa})-\mathbf{B}_{3}({\bar{\mathbf{t}}}_{\kappa-1})\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\end{cases}\right], \nonumber\\\mathbf{F}_{\mathfrak{n}+1}^{p_{1}} = \mathbf{F}_{0}+\frac{1-\alpha}{\mathbf{ABC}(\alpha)}\wp{\bar{\mathbf{t}}}_{\mathfrak{n}+1}^{\wp-1}\left[ \begin{cases}\mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{A}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}, \mathbf{Q}_{\mathfrak{n}}\big)\cr+\wp\rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\mathfrak{n}-1})\big)\end{cases}\right]\nonumber\\ \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\sum\limits_{\kappa = 0}^{\mathfrak{n}}\left[\begin{cases}\mathbf{F}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{A}_{\kappa}, \mathbf{F}_{\kappa}, \mathbf{Q}_{\kappa}\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\cr+\rho_{4}\mathcal{G}_{4}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{F}_{\kappa}\big)\big(\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa})-\mathbf{B}_{4}({\bar{\mathbf{t}}}_{\kappa-1})\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\end{cases}\right], \nonumber\\\mathbf{Q}_{\mathfrak{n}+1}^{p_{1}} = \mathbf{Q}_{0}+\frac{1-\alpha}{\mathbf{ABC}(\alpha)}\wp{\bar{\mathbf{t}}}_{\mathfrak{n}+1}^{\wp-1}\left[ \begin{cases}\mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{F}_{\mathfrak{n}}, \mathbf{Q}_{\mathfrak{n}}\big)\cr+\wp\rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\mathfrak{n}}, \mathbf{Q}_{\mathfrak{n}}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\mathfrak{n}-1})\big)\end{cases}\right]\nonumber\\ \quad+ \frac{\alpha\wp}{\mathbf{ABC}(\alpha)\Gamma(\alpha)}\sum\limits_{\kappa = 0}^{\mathfrak{n}}\left[\begin{cases}\mathbf{Q}^{\ast}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{F}_{\kappa}, \mathbf{Q}_{\kappa}\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\cr+\rho_{5}\mathcal{G}_{5}\big({\bar{\mathbf{t}}}_{\kappa}, \mathbf{Q}_{\kappa}\big)\big(\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa})-\mathbf{B}_{5}({\bar{\mathbf{t}}}_{\kappa-1})\big)\mathcal{J}_{1, \kappa}^{\alpha, \wp}\end{cases}\right]. \end{array}

    Also,

    \begin{array}{l} \mathcal{J}_{1, \kappa}^{\alpha, \wp} = \frac{((\mathfrak{n}+1)\hbar)^{\alpha-1}}{\wp}\left[\begin{cases} ((\kappa+1)\hbar)^{\wp}\, _{2}\mathcal{F}_{1}\Big(\big[\wp, 1-\alpha\big], \big[1+\wp\big], \frac{\kappa+1}{\mathfrak{n}+1}\Big)\cr-(\kappa\hbar)^{\wp}\, _{2}\mathcal{F}_{1}\Big(\big[\wp, 1-\alpha\big], \big[1+\wp\big], \frac{\kappa}{\mathfrak{n}}\Big) \end{cases}\right], \nonumber\\ \mathcal{J}_{2, \kappa}^{\alpha, \wp} = \frac{((\mathfrak{n}+1)\hbar)^{\alpha-1}}{\wp(\wp+1)}\left[\begin{cases} \wp((\kappa+1)\hbar)^{\wp+1}\, _{2}\mathcal{F}_{1}\Big(\big[1+\wp, 1-\alpha\big], \big[2+\wp\big], \frac{\kappa+1}{\mathfrak{n}+1}\Big)\cr-(1+\wp)((\kappa+1)\hbar)^{\wp+1}\, _{2}\mathcal{F}_{1}\Big(\big[\wp, 1-\alpha\big], \big[1+\wp\big], \frac{\kappa+1}{\mathfrak{n}}\Big)\cr- \wp((\kappa)\hbar)^{\wp+1}\, _{2}\mathcal{F}_{1}\Big(\big[1+\wp, 1-\alpha\big], \big[2+\wp\big], \frac{\kappa}{\mathfrak{n}+1}\Big)\cr+ \hbar((\kappa)\hbar)^{\wp}(1+\wp)(1+\kappa)\, _{2}\mathcal{F}_{1}\Big(\big[\wp, 1-\alpha\big], \big[1+\wp\big], \frac{\kappa}{\mathfrak{n}}\Big)\end{cases}\right] , \nonumber\\ \mathcal{J}_{3, \kappa}^{\alpha, \wp} = \frac{((\kappa+1)\hbar)^{\alpha-1}}{\wp(\wp+1)(\wp+2)}\left[\begin{cases} \wp(\wp+1)((\kappa+1)\hbar)^{\wp+2}\, _{2}\mathcal{F}_{1}\Big(\big[2+\wp, 1-\alpha\big], \big[3+\wp\big], \frac{\kappa+1}{\mathfrak{n}+1}\Big)\cr- 2\wp(\wp+2)\Big(\kappa+\frac{1}{2}\Big)\hbar((\kappa+1)\hbar)^{\wp+1}\, _{2}\mathcal{F}_{1}\Big(\big[1+\wp, 1-\alpha\big], \big[2+\wp\big], \frac{\kappa+1}{\mathfrak{n}+1}\Big)\cr + \kappa\hbar(\wp+1)(\wp+2)((\kappa+1)\hbar)^{\wp+1}\, _{2}\mathcal{F}_{1}\Big(\big[\wp, 1-\alpha\big], \big[1+\wp\big], \frac{\kappa+1}{\mathfrak{n}}\Big)\cr + 2\wp(\wp+2)\Big(\kappa+\frac{1}{2}\Big)\hbar((\hbar\kappa))^{\wp+1}\, _{2}\mathcal{F}_{1}\Big(\big[1+\wp, 1-\alpha\big], \big[2+\wp\big], \frac{\kappa}{\mathfrak{n}+1}\Big)\cr -\wp(\wp+1)(\kappa\hbar)^{\wp+2}\, _{2}\mathcal{F}_{1}\Big(\big[2+\wp, 1-\alpha\big], \big[3+\wp\big], \frac{\kappa}{\mathfrak{n}}\Big)\cr -\hbar(\wp+1)(\wp+2)(\kappa+1)(\kappa\hbar)^{\wp+1}\, _{2}\mathcal{F}_{1}\Big(\big[\wp, 1-\alpha\big], \big[1+\wp\big], \frac{\kappa}{\mathfrak{n}+1}\Big)\end{cases}\right]. \end{array}

    To exemplify the theoretical outcomes of the suggested framework, numerical computations were performed in this part. We accomplish this using the stochastic complete numerical technique proposed by Atangana and Araz [52]. Moreover, we compute the fractal-fractional model (3.2) for Atangana-Baleanu-Caputo sense when both fractional-order \alpha and fractal-dimension \wp are distinct.

    Figures 35 illustrate the effects of uninfected \mathbf{U}(\bar{\mathbf{t}}) , latently infected \mathbf{S}(\bar{\mathbf{t}}) , actively infected \mathbf{A}(\bar{\mathbf{t}}) , free virus \mathbf{F}(\bar{\mathbf{t}}) , and antibodies \mathbf{Q}(\bar{\mathbf{t}}) at various fractional-orders and fixed fractal-dimensions. We assign the following parameter values: \Lambda = 10, \; \varsigma = 0.1, \; \lambda_{1} = 2, \; \lambda_{2} = 2, \; \phi = 0.5, \; \nu_{1} = 0.5, \; \sigma = 5, \; \delta = 10, \; \varphi = 2, \; \nu_{2} = 10, \; \xi = 3, \; \chi = 2, \; \zeta = 4. To demonstrate the system's dynamical behaviour, we input various white noise levels (5.1). We first take into account the white noise components \rho_{1} = 0.9, \; \rho_{2} = 0.9, \; \rho_{3} = 0.7, \; \rho_{4} = 0.9 and \rho_{5} = 0.8, where the distinctive stationary distribution sensitivity criterion \mathbb{R}_{0}^{s} > 1 is attained. As the virus spreads through the community, the class diminishes over time and eventually affects all other categories in the structure. This classification corresponds rapidly at low orders and slowly at higher orders, which displays a consistent tendency.

    Figure 3.  Graphical display of uninfected cells \mathbf{U}(\bar{\mathbf{t}}) and latently infected cells \mathbf{S}(\bar{\mathbf{t}}) of the model (5.1) considering the fractal-fractional derivative with generalized Mittag-Leffler kernel and varying fractional-order with fixed fractal-dimension.
    Figure 4.  Graphical display of actively infected cells \mathbf{A}(\bar{\mathbf{t}}) and free virus \mathbf{F}(\bar{\mathbf{t}}) of the model (5.1) considering the fractal-fractional derivative with generalized Mittag-Leffler kernel and varying fractional-order with fixed fractal-dimension.
    Figure 5.  Graphical display of antibodies \mathbf{Q}(\bar{\mathbf{t}}) of the model (5.1) considering the fractal-fractional derivative with generalized Mittag-Leffler kernel and varying fractional-order with fixed fractal-dimension.

    Figures 68 display the temporal patterns of (\mathbf{U}(\bar{\mathbf{t}}), \mathbf{S}(\bar{\mathbf{t}}), \mathbf{A}(\bar{\mathbf{t}}), \mathbf{F}(\bar{\mathbf{t}}), \mathbf{Q}(\bar{\mathbf{t}})) of the stochastic system (5.1) involving white noise \rho_{1} = 0.9, \; \rho_{2} = 0.9, \; \rho_{3} = 0.7, \; \rho_{4} = 0.9 and \rho_{5} = 0.8, respectively. The solution varies at white noises, having a corresponding stochastic mean. The affected cells \mathbf{S}(\bar{\mathbf{t}}) exhibit a rapid decline in behaviour over time, similar to the behaviour of uninfected cells \mathbf{U}(\bar{\mathbf{t}}) at various fractal-fractional orders.

    Figure 6.  Graphical display of uninfected cells \mathbf{U}(\bar{\mathbf{t}}) and latently infected cells \mathbf{S}(\bar{\mathbf{t}}) of the model (5.1) considering the fractal-fractional derivative with generalized Mittag-Leffler kernel and varying both fractional-order with fractal-dimension.
    Figure 7.  Graphical display of actively infected cells \mathbf{A}(\bar{\mathbf{t}}) and free virus \mathbf{F}(\bar{\mathbf{t}}) of the model (5.1) considering the fractal-fractional derivative with generalized Mittag-Leffler kernel and varying both fractional-order with fractal-dimension.
    Figure 8.  Graphical display of antibodies \mathbf{Q}(\bar{\mathbf{t}}) of the model (5.1) considering the fractal-fractional derivative with generalized Mittag-Leffler kernel and varying both fractional-order with fractal-dimension.

    Figures 911 show the impacts of uninfected \mathbf{U}(\bar{\mathbf{t}}) , latently infected \mathbf{S}(\bar{\mathbf{t}}) , actively infected \mathbf{A}(\bar{\mathbf{t}}) , free virus \mathbf{F}(\bar{\mathbf{t}}) , and antibodies \mathbf{Q}(\bar{\mathbf{t}}) at various fractal-dimension and fixed fractional-orders. The corresponding attributed values: \Lambda = 10, \; \varsigma = 0.1, \; \lambda_{1} = 2, \; \lambda_{2} = 2, \; \phi = 0.5, \; \nu_{1} = 0.5, \; \sigma = 5, \; \delta = 10, \; \varphi = 2, \; \nu_{2} = 10, \; \xi = 3, \; \chi = 2, \; \zeta = 4. Then, by increasing the white noise intensities to \rho_{1} = 3.9, \; \rho_{2} = 3.7, \; \rho_{3} = 3.9, \; \rho_{4} = 3.9 and \rho_{5} = 3.8, we are able to satisfy the elimination criterion \tilde{\mathbb{R}}_{0}^{s} < 1 in Theorem 4.3 and validate the findings. Figures 911 demonstrate that as the white noise intensity escalates, contaminated lymphocytes \mathbf{S}(\bar{\mathbf{t}}) , productively infested cells \mathbf{A}(\bar{\mathbf{t}}) , and uncontrolled pathogen \mathbf{A}(\bar{\mathbf{t}}) can all perish and settle at a variety of fractal dimensions and fixed fractional-order. This shows that white noise concentration can effectively eradicate all insidiously, proactively, and freely virally infested cells, dramatically reduce the quantity of virally affected cells, and prevent the proliferation of contaminated nuclei.

    Figure 9.  Graphical display of uninfected cells \mathbf{U}(\bar{\mathbf{t}}) and latently infected cells \mathbf{S}(\bar{\mathbf{t}}) of the model (5.1) considering the fractal-fractional derivative with generalized Mittag-Leffler kernel and varying fractal-dimension with fixed fractional-order.
    Figure 10.  Graphical display of actively infected cells \mathbf{A}(\bar{\mathbf{t}}) and free virus \mathbf{F}(\bar{\mathbf{t}}) of the model (5.1) considering the fractal-fractional derivative with generalized Mittag-Leffler kernel and varying fractal-dimension with fixed fractional-order.
    Figure 11.  Graphical display of antibodies \mathbf{Q}(\bar{\mathbf{t}}) of the model (5.1) considering the fractal-fractional derivative with generalized Mittag-Leffler kernel and varying fractal-dimension with fixed fractional-order.

    Figures 1214 predict the behaviour of uninfected \mathbf{U}(\bar{\mathbf{t}}) , latently infected \mathbf{S}(\bar{\mathbf{t}}) , actively infected \mathbf{A}(\bar{\mathbf{t}}) , free virus \mathbf{F}(\bar{\mathbf{t}}) , and antibodies \mathbf{Q}(\bar{\mathbf{t}}) at various fractal-dimension and fractional-orders. The corresponding attributed values: \Lambda = 10, \; \varsigma = 0.1, \; \lambda_{1} = 2, \; \lambda_{2} = 2, \; \phi = 0.5, \; \nu_{1} = 0.5, \; \sigma = 5, \; \delta = 10, \; \varphi = 2, \; \nu_{2} = 10, \; \xi = 3, \; \chi = 2, \; \zeta = 4. Then, by increasing the white noise intensities to \rho_{1} = 3.9, \; \rho_{2} = 3.7, \; \rho_{3} = 3.9, \; \rho_{4} = 3.9 and \rho_{5} = 3.8, and \tilde{\mathbb{R}}_{0}^{s} < 1. This shows that the stochastic noise is demonstrated to be suppressed by the massive boom. The infectious populace is disappearing more significantly when both fractional-order and fractal-dimension are changed simultaneously in an infectious system in comparison to fractional systems, which leads to fascinating and biologically more plausible findings.

    Figure 12.  Graphical display of uninfected cells \mathbf{U}(\bar{\mathbf{t}}) and latently infected cells \mathbf{S}(\bar{\mathbf{t}}) of the model (5.1) considering the fractal-fractional derivative with generalized Mittag-Leffler kernel and both varying fractal-dimension with fractional-order.
    Figure 13.  Graphical display of actively infected cells \mathbf{A}(\bar{\mathbf{t}}) and free virus \mathbf{F}(\bar{\mathbf{t}}) of the model (5.1) considering the fractal-fractional derivative with generalized Mittag-Leffler kernel and both varying fractal-dimension with fractional-order.
    Figure 14.  Graphical display of antibodies \mathbf{Q}(\bar{\mathbf{t}}) of the model (5.1) considering the fractal-fractional derivative with generalized Mittag-Leffler kernel and both varying fractal-dimension with fractional-order.

    Figures 1517 demonstrate the effect of uninfected \mathbf{U}(\bar{\mathbf{t}}) , latently infected \mathbf{S}(\bar{\mathbf{t}}) , actively infected \mathbf{A}(\bar{\mathbf{t}}) , free virus \mathbf{F}(\bar{\mathbf{t}}) , and antibodies \mathbf{Q}(\bar{\mathbf{t}}) at fixed fractal-dimension and fractional-orders with and without control, respectively. Considering an inadequate CTL reaction, we examine how virus replication affects the patterns of HCV and immunological reactions from acute infection through the chronic stage. This is accomplished using a mix of analytical and numerical techniques. Since the target cell restriction prevents the penetration of new viral variations in the case of severe liver damage, virus development is predicted to come to an end.

    Figure 15.  Graphical display of uninfected cells \mathbf{U}(\bar{\mathbf{t}}) and latently infected cells \mathbf{S}(\bar{\mathbf{t}}) of the model (5.1) with and without control when \alpha = 0.98 considering the fractal-fractional derivative with generalized Mittag-Leffler kernel.
    Figure 16.  Graphical display of actively infected cells \mathbf{A}(\bar{\mathbf{t}}) and free virus \mathbf{F}(\bar{\mathbf{t}}) of the model (5.1) with and without control when \alpha = 0.98 considering the fractal-fractional derivative with generalized Mittag-Leffler kernel.
    Figure 17.  Graphical display of antibodies \mathbf{Q}(\bar{\mathbf{t}}) of the model (5.1) with and without control when \alpha = 0.98 considering the fractal-fractional derivative with generalized Mittag-Leffler kernel.

    As a result of these pictorial outcomes, we draw the conclusion that by using this novel fractal-fractional operator concept, it is possible to detect more precise outcomes and to offer a wider insight of problems that arise in engineering and science as well as in the reality.

    In this article, we examined the variations in cellular complexities of a novel randomized fractal-fractional virus transmission system considering latently diseased tissues and a Holling type II functionality reaction. We discovered the existence of non-negative solutions to the examined system by accounting for environmental noise and the fractal effects of vaccination. In view of Itô's technique and Lyapunov candidate, we established the necessary assumptions of the stochastically permanence of the virus transmission scenario and the elimination of chronically diseased, productively contaminated cells and independent pathogen fragments. Ultimately, in order to create the suggested system, we employed the F-F calculus notion in the ABC context. Additionally, numerical simulations are provided to understand the tendencies of our theoretical model's analysis. We determine that increasing the noise strength will eventually render the virus obsolete. The illustration analysis shows that the fractal-fractional notion outperforms the integer-order and classical derivatives in terms of effectiveness and biological dependability. Upcoming research on viral infections, particularly the novel COVID-19, monkey pox and lumpy virus can confidently implement the revolutionary modelling methodology termed as the fractal-fractional operator.

    The authors declare there is no conflict of interest.



    [1] C. M. Habito, A. Morgan, C. Vaughan, 'direct'and 'instant': the role of digital technology and social media in young filipinos' intimate relationships, Cult., Health & Sexual., 1–19. doi: 10.1080/13691058.2021.1877825.
    [2] M. U. Khan, A. R. Javed, M. Ihsan, U. Tariq, A novel category detection of social media reviews in the restaurant industry, Multimedia Syst., 1–14. doi: 10.1007/s00530-020-00704-2.
    [3] M. Hina, M. Ali, A. R. Javed, F. Ghabban, L. A. Khan, Z. Jalil, Sefaced: Semantic-based forensic analysis and classification of e-mail data using deep learning, IEEE Access, 9 (2021), 98398–98411. doi: 10.1109/ACCESS.2021.3095730. doi: 10.1109/ACCESS.2021.3095730
    [4] R. Kong, H. Zhu, J. A. Konstan, Learning to ignore: A case study of organization-wide bulk email effectiveness, in Proceedings of the ACM on Human-Computer Interaction, 5 (2021), 1–23. doi: 10.1145/3479861.
    [5] E. Kiselev, Trends and features of russian business email: Contrastive analysis based on materials from business communication textbooks, Jpn. Sl. East Eur. Stud., 41 (2021), 18–41.
    [6] M. Hina, M. Ali, A. R. Javed, G. Srivastava, T. R. Gadekallu, Z. Jalil, Email classification and forensics analysis using ML, in 2021 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computing, Scalable Computing Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), 2021,630–635. doi: 10.1109/SWC50871.2021.00093.
    [7] W. Ahmed, A. Rasool, A. R. Javed, N. Kumar, T. R. Gadekallu, Z. Jalil, et al., Security in next generation mobile payment systems: A comprehensive survey, IEEE Access, 9 (2021), 115932–115950. doi: 10.1109/ACCESS.2021.3105450. doi: 10.1109/ACCESS.2021.3105450
    [8] A. R. Javed, S. U. Rehman, M. U. Khan, M. Alazab, H. U. Khan, Betalogger: Smartphone sensor-based side-channel attack detection and text inference using language modeling and dense multilayer neural network, Trans. Asian Low-Res. Lang. Inf. Process., 20 (2021), 1–17. doi: 10.1145/3460392. doi: 10.1145/3460392
    [9] A. R. Javed, M. O. Beg, M. Asim, T. Baker, A. H. Al-Bayatti, Alphalogger: Detecting motion-based side-channel attack using smartphone keystrokes, J. Ambient Intell. Human. Comput., 1–14. doi: 10.1007/s12652-020-01770-0.
    [10] A. Basit, M. Zafar, A. R. Javed, Z. Jalil, A novel ensemble machine learning method to detect phishing attack, in 2020 IEEE 23rd International Multitopic Conference (INMIC), IEEE, 2020, 1–5. doi: 10.1109/INMIC50486.2020.9318210.
    [11] A. Basit, M. Zafar, X. Liu, A. R. Javed, Z. Jalil, K. Kifayat, A comprehensive survey of ai-enabled phishing attacks detection techniques, Telecommun. Syst., 76 (2021), 139–154. doi: 10.1007/s11235-020-00733-2. doi: 10.1007/s11235-020-00733-2
    [12] S. ur Rehman, M. Khaliq, S. I. Imtiaz, A. Rasool, M. Shafiq, A. R. Javed, et al., Diddos: An approach for detection and identification of distributed denial of service (ddos) cyberattacks using gated recurrent units (gru), Future Gener. Comput. Syst., 118 (2021), 453–466. doi: 10.1016/j.future.2021.01.022. doi: 10.1016/j.future.2021.01.022
    [13] S. I. Imtiaz, S. ur Rehman, A. R. Javed, Z. Jalil, X. Liu, W. S. Alnumay, Deepamd: Detection and identification of android malware using high-efficient deep artificial neural network, Future Gener. Comput. Syst., 115 (2021), 844–856. doi: 10.1016/j.future.2020.10.008. doi: 10.1016/j.future.2020.10.008
    [14] T. Conley, J. Kalita, Language model metrics and procrustes analysis for improved vector transformation of nlp embeddings, preprint, arXiv: 2106.02490.
    [15] L. Kumar, A secure communication with one-time pad encryption and steganography method in cloud, Turk. J. Comput. Math. Educ. (TURCOMAT), 12 (2021), 2567–2576. doi: 10.1007/s00779-021-01607-3. doi: 10.1007/s00779-021-01607-3
    [16] R. Abid, C. Iwendi, A. R. Javed, M. Rizwan, Z. Jalil, J. H. Anajemba, et al., An optimised homomorphic crt-rsa algorithm for secure and efficient communication, Pers. Ubiquitous Comput., 1–14. doi: 10.1007/s00779-021-01607-3.
    [17] B. Ahuja, R. Doriya, Visual chaos steganography with fractional transform, in Soft Computing and Signal Processing, Springer, 2021,295–304.
    [18] Q. Li, X. Wang, B. Ma, X. Wang, C. Wang, Z. Xia, Y. Shi, Image steganography based on style transfer and quaternion exponent moments, Appl. Soft Comput., 107618. doi: 10.1016/j.asoc.2021.107618.
    [19] L. Serpa-Andrade, R. Garcia-Velez, E. Pinos-Velez, C. Flores-Urgilez, Analysis of the application of steganography applied in the field of cybersecurity, in International Conference on Applied Human Factors and Ergonomics, Springer, 2021,366–371.
    [20] C. Iwendi, Z. Jalil, A. R. Javed, T. Reddy, R. Kaluri, G. Srivastava, et al., Keysplitwatermark: Zero watermarking algorithm for software protection against cyber-attacks, IEEE Access, 8 (2020), 72650–72660. doi: 10.1109/ACCESS.2020.2988160. doi: 10.1109/ACCESS.2020.2988160
    [21] D. A. Putri, D. A. Kristiyanti, E. Indrayuni, A. Nurhadi and D. R. Hadinata, Comparison of naive bayes algorithm and support vector machine using pso feature selection for sentiment analysis on e-wallet review, in Journal of Physics: Conference Series, 1641 (2020), 012085. doi: 10.1088/1742-6596/1641/1/012085.
    [22] A. Mishra, J. A. Latorre, J. Pool, D. Stosic, D. Stosic, G. Venkatesh, et al., Accelerating sparse deep neural networks, preprint, arXiv: 2104.08378.
    [23] M. Ramprasad, N. H. Chowdary, K. J. Reddy, V. Gaurav, Email spam detection using python & machine learning, Turk. J. Phys. Rehabil., 32 (2019), 3.
    [24] M. Eriksson, G. Heuguet, Genealogies of online content identification-an introduction, Int. Hist., 5 (2021), 1–7. doi: 10.1080/24701475.2021.1878649. doi: 10.1080/24701475.2021.1878649
    [25] M. Neha, M. S. Nair, A novel twitter spam detection technique by integrating inception network with attention based lstm, in 2021 5th International Conference on Trends in Electronics and Informatics (ICOEI), IEEE, 2021, 1009–1014. doi: 10.1109/ICOEI51242.2021.9452825.
    [26] F. Iqbal, R. Batool, B. C. Fung, S. Aleem, A. Abbasi, A. R. Javed, Toward tweet-mining framework for extracting terrorist attack-related information and reporting, IEEE Access, 9 (2021), 115535–115547. doi: 10.1109/ACCESS.2021.3102040. doi: 10.1109/ACCESS.2021.3102040
    [27] S. E. Rahman, S. Ullah, Email spam detection using bidirectional long short term memory with convolutional neural network, in 2020 IEEE Region 10 Symposium (TENSYMP), IEEE, 2020, 1307–1311. doi: 10.1109/TENSYMP50017.2020.9230769.
    [28] N. Garba, S. Rakshit, C. D. Maa, N. R. Vajjhala, An email content-based insider threat detection model using anomaly detection algorithms, in Proceedings of the International Conference on Innovative Computing Communication (ICICC) 2021, 2021. doi: 10.2139/ssrn.3833744.
    [29] T. Sharma, P. Ferronato, M. Bashir, Phishing email detection method: Leveraging data across different organizations, 2020.
    [30] S. Afzal, M. Asim, A. R. Javed, M. O. Beg, T. Baker, Urldeepdetect: A deep learning approach for detecting malicious urls using semantic vector models, J. Network Syst. Manage., 29 (2021), 1–27. doi: 10.1007/s10922-021-09587-8. doi: 10.1007/s10922-021-09587-8
    [31] R. Chiramdasu, G. Srivastava, S. Bhattacharya, P. K. Reddy, T. R. Gadekallu, Malicious url detection using logistic regression, in 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), IEEE, 2021, 1–6. doi: 10.1109/COINS51742.2021.9524269.
    [32] C. Rupa, G. Srivastava, S. Bhattacharya, P. Reddy, T. R. Gadekallu, A machine learning driven threat intelligence system for malicious url detection, in The 16th International Conference on Availability, Reliability and Security, 2021, 1–7. doi: 10.1145/3465481.3470029.
    [33] B. Aguirre, Steganography in Contemporary Cyberattacks and the Link to Child Pornography, PhD thesis, Utica College, 2020.
    [34] R. Singh, Analysis of spam email filtering through naive bayes algorithm across different datasets.
    [35] S. Srinivasan, V. Ravi, M. Alazab, S. Ketha, A. Z. Ala'M, S. K. Padannayil, Spam emails detection based on distributed word embedding with deep learning, in Machine Intelligence and Big Data Analytics for Cybersecurity Applications, Springer, 2021,161–189. doi: 10.1002/9781119701859.ch6.
    [36] A. N. Soni, Spam-e-mail-detection-using-advanced-deep-convolution-neuralnetwork-algorithms, J. Innovative Dev. Pharm. Tech. Sci., 2 (2019), 74–80. doi: 10.1007/s35146-018-0155-y. doi: 10.1007/s35146-018-0155-y
    [37] J. Rastenis, S. Ramanauskaitė, I. Suzdalev, K. Tunaitytė, J. Janulevičius, A. Čenys, Multi-language spam/phishing classification by email body text: Toward automated security incident investigation, Electronics, 10 (2021), 668. doi: 10.3390/electronics10060668. doi: 10.3390/electronics10060668
    [38] S. Manjula, M. Shivamurthaiah, Identification of languages from the text document using natural language processing system, Turk. J. Comput. Math. Educ. (TURCOMAT), 12 (2021), 2465–2472.
    [39] M. Mukhanova, Text normalization and spelling correction in kazakh language.
    [40] A. M. Alhassan, W. M. N. W. Zainon, Review of feature selection, dimensionality reduction and classification for chronic disease diagnosis, IEEE Access. 9 (2021), 87310–87317. doi: 10.1109/ACCESS.2021.3088613. doi: 10.1109/ACCESS.2021.3088613
    [41] M. Ontivero-Ortega, A. Lage-Castellanos, G. Valente, R. Goebel, M. Valdes-Sosa, Fast gaussian naïve bayes for searchlight classification analysis, Neuroimage, 163 (2017), 471–479. doi: 10.1016/j.neuroimage.2017.09.001. doi: 10.1016/j.neuroimage.2017.09.001
    [42] A. R. Javed, Z. Jalil, W. Zehra, T. R. Gadekallu, D. Y. Suh, M. J. Piran, A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions, Eng. Appl. Artif. Intell., 106 (2021), 104456. doi: 10.1016/j.engappai.2021.104456. doi: 10.1016/j.engappai.2021.104456
    [43] S. Visa, B. Ramsay, A. L. Ralescu, E. Van Der Knaap, Confusion matrix-based feature selection, MAICS, 710 (2011), 120–127. doi: 10.3917/trans.120.0127. doi: 10.3917/trans.120.0127
    [44] A. Mann, O. Höft, Categorization of swedish e-mails using supervised machine learning, 2021.
    [45] V. Karunakaran, V. Rajasekar, S. I. T. Joseph, Exploring a filter and wrapper feature selection techniques in machine learning, in Computational Vision and Bio-Inspired Computing, Springer, 2021,497–506.
    [46] N. P. Wosah, T. Win, Phishing mitigation techniques: A literature survey, preprint, arXiv: 2104.06989. doi: 10.5121/ijnsa.2021.13205.
    [47] A. El Kah, I. Zeroual, The effects of pre-processing techniques on arabic text classification, Int. J., 10.
    [48] T. Mehrotra, G. K. Rajput, M. Verma, B. Lakhani, N. Singh, Email spam filtering technique from various perspectives using machine learning algorithms, in Data Driven Approach Towards Disruptive Technologies: Proceedings of MIDAS 2020, Springer Singapore, 2021,423–432. doi: 10.1007/978-981-15-9873-9-33.
    [49] S. P. Shyry, Y. B. Jinila, Detection and prevention of spam mail with semantics-based text classification of collaborative and content filtering, in Journal of Physics: Conference Series, 1770 (2021), 012031. doi: 10.1088/1742-6596/1770/1/012031.
  • This article has been cited by:

    1. Sanaa A. A. Ghaleb, Mumtazimah Mohamad, Waheed Ali H. M. Ghanem, Abdullah B. Nasser, Mohamed Ghetas, Akibu Mahmoud Abdullahi, Sami Abdulla Mohsen Saleh, Humaira Arshad, Abiodun Esther Omolara, Oludare Isaac Abiodun, Feature Selection by Multiobjective Optimization: Application to Spam Detection System by Neural Networks and Grasshopper Optimization Algorithm, 2022, 10, 2169-3536, 98475, 10.1109/ACCESS.2022.3204593
    2. Abdullah Alqahtani, Habib Ullah Khan, Shtwai Alsubai, Mohemmed Sha, Ahmad Almadhor, Tayyab Iqbal, Sidra Abbas, An efficient approach for textual data classification using deep learning, 2022, 16, 1662-5188, 10.3389/fncom.2022.992296
    3. S. S. R. Subramanya Hemant Konduri, Kalyan Netti, 2024, Chapter 23, 978-981-97-6677-2, 263, 10.1007/978-981-97-6678-9_23
    4. Pradip Dhal, Chandrashekhar Azad, Hybrid momentum accelerated bat algorithm with GWO based optimization approach for spam classification, 2023, 83, 1573-7721, 26929, 10.1007/s11042-023-16448-w
    5. Kutub Thakur, Md Liakat Ali, Muath A. Obaidat, Abu Kamruzzaman, A Systematic Review on Deep-Learning-Based Phishing Email Detection, 2023, 12, 2079-9292, 4545, 10.3390/electronics12214545
    6. Farkhund Iqbal, Abdul Rehman Javed, Rutvij H. Jhaveri, Ahmad Almadhor, Umar Farooq, Transfer Learning-based Forensic Analysis and Classification of E-Mail Content, 2023, 2375-4699, 10.1145/3604592
    7. Subba Reddy Borra, Muppaneni Yukthika, Murari Bhargavi, Musku Samskruthi, Putchakayala Varsha Saisri, Yeleti Akhila, Sooram Alekhya, OEC Net: Optimal feature selection-based email classification network using unsupervised learning with deep CNN model, 2024, 7, 27726711, 100415, 10.1016/j.prime.2023.100415
    8. Ekramul Haque Tusher, Mohd Arfian Ismail, Md Arafatur Rahman, Ali H. Alenezi, Mueen Uddin, Email Spam: A Comprehensive Review of Optimize Detection Methods, Challenges, and Open Research Problems, 2024, 12, 2169-3536, 143627, 10.1109/ACCESS.2024.3467996
    9. Qingwu Fan, Xinyuan Song, 2024, Text Classification of Long-tailed Complaints and Reports based on Rebalanced Loss Function, 979-8-3503-3916-1, 1901, 10.1109/IAEAC59436.2024.10503677
    10. Abeer Alhuzali, Ahad Alloqmani, Manar Aljabri, Fatemah Alharbi, In-Depth Analysis of Phishing Email Detection: Evaluating the Performance of Machine Learning and Deep Learning Models Across Multiple Datasets, 2025, 15, 2076-3417, 3396, 10.3390/app15063396
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4623) PDF downloads(125) Cited by(10)

Figures and Tables

Figures(10)  /  Tables(5)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog