Sarcasm means the opposite of what you desire to express, particularly to insult a person. Sarcasm detection in social networks SNs such as Twitter is a significant task as it has assisted in studying tweets using NLP. Many existing study-related methods have always focused only on the content-based on features in sarcastic words, leaving out the lexical-based features and context-based features knowledge in isolation. This shows a loss of the semantics of terms in a sarcastic expression. This study proposes an improved model to detect sarcasm from SNs. We used three feature set engineering: context-based on features set, Sarcastic based on features, and lexical based on features. Two Novel Algorithms for an effective model to detect sarcasm are divided into two stages. The first used two algorithms one with preprocessing, and the second algorithm with feature sets. To deal with data from SNs. We applied various supervised machine learning (ML) such as k-nearest neighbor classifier (KNN), na?ve Bayes (NB), support vector machine (SVM), and Random Forest (RF) classifiers with TF-IDF feature extraction representation data. To model evaluation metrics, evaluate sarcasm detection model performance in precision, accuracy, recall, and F1 score by 100%. We achieved higher results in Lexical features with KNN 89.19 % accuracy campers to other classifiers. Combining two feature sets (Sarcastic and Lexical) has shown slight improvement with the same classifier KNN; we achieved 90.00% accuracy. When combining three feature sets (Sarcastic, Lexical, and context), the accuracy is shown slight improvement. Also, the same classifier we achieved is a 90.51% KNN classifier. We perform the model differently to see the effect of three feature sets through the experiment individual, combining two feature sets and gradually combining three feature sets. When combining all features set together, achieve the best accuracy with the KNN classifier.
Citation: Abdullah Yahya Abdullah Amer, Tamanna Siddiqu. A novel algorithm for sarcasm detection using supervised machine learning approach[J]. AIMS Electronics and Electrical Engineering, 2022, 6(4): 345-369. doi: 10.3934/electreng.2022021
[1] | Jiang Li, Xiaohui Liu, Chunjin Wei . The impact of fear factor and self-defence on the dynamics of predator-prey model with digestion delay. Mathematical Biosciences and Engineering, 2021, 18(5): 5478-5504. doi: 10.3934/mbe.2021277 |
[2] | Shunyi Li . Hopf bifurcation, stability switches and chaos in a prey-predator system with three stage structure and two time delays. Mathematical Biosciences and Engineering, 2019, 16(6): 6934-6961. doi: 10.3934/mbe.2019348 |
[3] | Fang Liu, Yanfei Du . Spatiotemporal dynamics of a diffusive predator-prey model with delay and Allee effect in predator. Mathematical Biosciences and Engineering, 2023, 20(11): 19372-19400. doi: 10.3934/mbe.2023857 |
[4] | Kawkab Al Amri, Qamar J. A Khan, David Greenhalgh . Combined impact of fear and Allee effect in predator-prey interaction models on their growth. Mathematical Biosciences and Engineering, 2024, 21(10): 7211-7252. doi: 10.3934/mbe.2024319 |
[5] | Honghua Bin, Daifeng Duan, Junjie Wei . Bifurcation analysis of a reaction-diffusion-advection predator-prey system with delay. Mathematical Biosciences and Engineering, 2023, 20(7): 12194-12210. doi: 10.3934/mbe.2023543 |
[6] | Xin-You Meng, Yu-Qian Wu . Bifurcation analysis in a singular Beddington-DeAngelis predator-prey model with two delays and nonlinear predator harvesting. Mathematical Biosciences and Engineering, 2019, 16(4): 2668-2696. doi: 10.3934/mbe.2019133 |
[7] | Yuanfu Shao . Bifurcations of a delayed predator-prey system with fear, refuge for prey and additional food for predator. Mathematical Biosciences and Engineering, 2023, 20(4): 7429-7452. doi: 10.3934/mbe.2023322 |
[8] | Kalyan Manna, Malay Banerjee . Stability of Hopf-bifurcating limit cycles in a diffusion-driven prey-predator system with Allee effect and time delay. Mathematical Biosciences and Engineering, 2019, 16(4): 2411-2446. doi: 10.3934/mbe.2019121 |
[9] | Ting Yu, Qinglong Wang, Shuqi Zhai . Exploration on dynamics in a ratio-dependent predator-prey bioeconomic model with time delay and additional food supply. Mathematical Biosciences and Engineering, 2023, 20(8): 15094-15119. doi: 10.3934/mbe.2023676 |
[10] | Guangxun Sun, Binxiang Dai . Stability and bifurcation of a delayed diffusive predator-prey system with food-limited and nonlinear harvesting. Mathematical Biosciences and Engineering, 2020, 17(4): 3520-3552. doi: 10.3934/mbe.2020199 |
Sarcasm means the opposite of what you desire to express, particularly to insult a person. Sarcasm detection in social networks SNs such as Twitter is a significant task as it has assisted in studying tweets using NLP. Many existing study-related methods have always focused only on the content-based on features in sarcastic words, leaving out the lexical-based features and context-based features knowledge in isolation. This shows a loss of the semantics of terms in a sarcastic expression. This study proposes an improved model to detect sarcasm from SNs. We used three feature set engineering: context-based on features set, Sarcastic based on features, and lexical based on features. Two Novel Algorithms for an effective model to detect sarcasm are divided into two stages. The first used two algorithms one with preprocessing, and the second algorithm with feature sets. To deal with data from SNs. We applied various supervised machine learning (ML) such as k-nearest neighbor classifier (KNN), na?ve Bayes (NB), support vector machine (SVM), and Random Forest (RF) classifiers with TF-IDF feature extraction representation data. To model evaluation metrics, evaluate sarcasm detection model performance in precision, accuracy, recall, and F1 score by 100%. We achieved higher results in Lexical features with KNN 89.19 % accuracy campers to other classifiers. Combining two feature sets (Sarcastic and Lexical) has shown slight improvement with the same classifier KNN; we achieved 90.00% accuracy. When combining three feature sets (Sarcastic, Lexical, and context), the accuracy is shown slight improvement. Also, the same classifier we achieved is a 90.51% KNN classifier. We perform the model differently to see the effect of three feature sets through the experiment individual, combining two feature sets and gradually combining three feature sets. When combining all features set together, achieve the best accuracy with the KNN classifier.
Dynamics of prey-predator systems has been an important research theme in ecology. It is well known that prey-predator interaction is not only one of the basic interspecies relations for ecological and social systems, but also the basic block of more complicated food chains, food webs, and biochemical network structures [21]. In the biological world, there are many examples of precesses that involve significant delays that cannot be ignored [13]. Examples include the time between fertilization and birth in the case of sexual reproduction, the time between initiation of cellular division and effective division in the case of mitosis, and the time required for digestion in the case of consumption of nutrient and its conversion to viable biomass [1]. Time delay plays a vital role in population dynamics of prey-predator, which has been recognized to contribute critically to the stable or unstable outcomes of prey population due to predation [10]. Population systems are exposed to the impact of a large number of random unpredictable factors. Then, environmental noise component is another important factor that affects prey-predator dynamics and, it related to climate, geographical distribution, geological features, disaster, human intervention, and other environmental factors [14]. Thus, a realistic prey-predator model should include both time delays and environmental noise.
For example, it is reasonable to assume that the death of prey is instantaneous when attacked by their predator but its contribution to the growth of predator population must be delayed by some time delay [25]. Kuang [10] mentioned that animals must take time to digest their food before further activities and responses taking place. Samanta [26] argued that the effect of time delay due to the time required in going from the egg stage to the adult stage, gestation period etc, has to be taken into account. Three different ways of incorporating a constant time delay into the prey-predator models were presented by Martin and Ruan [18]. In the first case, a time delay appears in the prey specific growth term, which is based on the assumption that in the absence of predators prey satisfies the Hutchinson's equation
Since the nature is full of uncertainty and random phenomena, the natural growth of species often does not follow strictly deterministic laws but rather oscillate randomly about some average, so that the population density never attains a fixed value with the advancement of time rather exhibits continuous oscillation around some average values [14]. The basic mechanism and factors of population growth like resources and vital rates—birth, death, immigration and emigration, change non-deterministically due to continuous fluctuations in the environment (e.g. variation in intensity of sunlight, temperature, water level, etc.) [20]. It is necessary and important to consider the corresponding stochastic population model, i.e., the effects of environmental noise, which undeniably arise from either environmental variability or internal species. For example, in [3], the authors extended a classical epidemic model from a deterministic framework to a stochastic differential equation one through introducing random fluctuations. Among the various ways of constructing a stochastic model systems for a given deterministic system, Cai et al. [4] propose a stochastic version of the epidemic model with nonlinear incident rate. Mao et al. [16] revealed that given population systems are subject to environmental noise, it can suppress a potential population explosion. That is to say, different structures of environmental noise may have different effects on the population systems. In our work, we would include noise processes in both prey and predator.
As we mentioned earlier, a realistic prey-predator model should include both time delays and environmental noise. There is a considerate amount of work done by many scholars, for instance [17,2,22,11,23,27,6,12,28,24,5]. Of them, Mao et al. considered the effects of environmental noise on the delay Lotka-Volterra in [17]. Vasilova [27] studied a stochastic Gilpin-Ayala predator-prey model with time-dependent delay. He established sufficient conditions for the existence of a global positive solution of the considered system, and proved stochastically ultimate boundedness, the long-time behavior of trajectories and extinction of species. In [6], Han et al. investigated two-species Lotka-Volterra delayed stochastic predator-prey system, with and without pollution, respectively. They revealed that there exists a unique nonnegative solution in each system that is permanent in time average under certain conditions. The convergence of the distributions of the solutions of a stochastic two-predator one-prey model with time delay was considered by Liu, Bai and Jin et al. [12]. Wang et al. [28] investigated the dynamics of a stochastic FIV model with seasonality analytically and numerically and, established sufficient criteria for extinction and weak persistence of the disease in the mean.
Motivated by the works of [17,27,12], we propose to study a delayed Harrison-type predator-prey model with noise terms that is lack in literature. We aim to explore and address the following questions through our analytic and numerical results via comparisons to the corresponding ODE model:
1. What are the dynamical effects of time delay in the functional response term of the predator growth equation on the Harrison-type predator-prey model?
2. What are the joint effects of time delay and noise on the Harrison-type predator-prey model?
The remaining of this paper is organized as follows. In Section 2, we derive our model and provide a summary on the dynamics of the corresponding ODE model. And we analyze the stability of a positive equilibrium under the effect of time delay or noise or both of them, and provide sufficient conditions that guarantee the existence of Hopf bifurcation at a positive equilibrium. In Section 3, numerical simulations are given to verify the theoretic analysis. In Section 4, the paper provides a brief conclusion and remarks. All proofs of our theoretical results are presented in the last section.
The general predator-prey model can be expressed by the model of nonlinear ordinary differential equations [7]:
{dNdt=u(N)−f(N)g(P),dPdt=αf(N)g(P)−v(P), | (1) |
where
f(N)=cN,g(P)=PmP+1,c,m>0, |
and the function
{dNdt=N(1−N)−cNPmP+1,dPdt=P(−d+bNmP+1), | (2) |
where
In this paper, we will study the effects of fluctuating environment on the dynamical behaviors of the Harrison-type predation model (2) with time delay
{dN(t)=N(t)(1−N(t)−cP(t)mP(t)+1)dt+σ1N(t)dB(t),dP(t)=P(t)(−d+bN(t−τ)mP(t−τ)+1)dt+σ2P(t)dB(t), | (3) |
where
Since our proposed model (3) is the population model, we restrict the state space being the closed first quadrant in the
Theorem 2.1. The positive quadrant
Before further studying the dynamics of our full model (3), we provide the following results regarding its corresponding ODE model (2) and the following delayed model
{dN(t)dt=N(t)(1−N(t))−cN(t)P(t)mP(t)+1,dP(t)dt=P(t)(−d+bN(t−τ)mP(t−τ)+1). | (4) |
Model (3) has the trivial constant steady state
Ni=b(m−c)±√4bcdm+b2(m−c)22bm,Pi=bNi−ddm,i=1,2,N1<N2, |
where equilibrium point
Theorem 2.2(Dynamics of the ODE model). The ODE model (2) always has two boundary equilibria: the extinction equilibrium
1. If
2. If
The existence and stability conditions of the equilibrium of the ODE model (2) is listed in Table 1.
Equilibrium | Existence Condition | Stability Condition |
Always exists | Always saddle | |
Always exists | Sink if Saddle if | |
Always sink |
The proof of Theorem 2.2 is rather standard, and detailed investigations relating to the ODE model may be found in Ref. [29], hence is omitted.
Remark 1. We would like to point out that Wang and Cai [29] provided similar results of the ODE model (2). For the ODE model (2), some preliminary results are presented, including dissipativeness, boundedness, permanence of the solutions, and the equilibria stability analysis of the model. Model (2) has two boundary equilibria
For model (3), when
Theorem 2.3. For the DDE model (4),
(i) The nonnegative solution
lim supt→∞P(t)≤(b−d)exp(τ)dm |
for
(ii) If the condition
Remark 2. In the case of
Theorem 2.4. If the condition
b(m+exp(τ)−√(m+exp(τ))2−4mcexp(τ))2m<d<min{b,b(m+exp(τ)+√(m+exp(τ))2−4mcexp(τ))2m} | (5) |
with
Remark 3. Biologically, Theorem 2.4 means that all the species of the DDE model (4) are survivor under
Let
{dN(t)dt=(N∗+N(t))(1−(N∗+N(t)))−c(N∗+N(t))(P∗+P(t))m(P∗+P(t))+1,dP(t)dt=(P∗+P(t))(−d+b(N∗+N(t−τ))m(P∗+P(t−τ))+1), | (6) |
which can be rewritten as an abstract differential equation in the phase space
dU(t)dt=L(U(t))+G(U(t)), | (7) |
where
L(U(t))=(q1N(t)+q2P(t)q3N(t−τ)+q4P(t−τ)), | (8) |
and
G(U(t))=(−N2(t)−cN(t)P(t)(mP∗+1)2+cmN∗P2(t)(mP∗+1)2bN(t−τ)P(t)mP∗+1−bmN∗P(t)P(t−τ)+P∗N(t−τ)P(t−τ)(mP∗+1)2+bm2N∗P∗P2(t−τ)(mP∗+1)3), | (9) |
here,
q1=−N∗,q2=−cN∗(mP∗+1)2,q3=bP∗mP∗+1,q4=−bmN∗P∗(mP∗+1)2. | (10) |
Referring to [10], we can know that given initial data
The characteristic equation of the linearization model
λ2−q1λ+(q1q4−q2q3−q4λ)e−λτ=0, | (11) |
where
ω0=√−(q21−q24)+√(q21−q24)2+4(q1q4−q2q3)22, | (12) |
and the corresponding critical value of delay
τk=1ω0arcsin(−q4ω30+(q1q4−q2q3)q1ω0(q1q4−q2q3)2+q24ω20)+2kπω0,k=0,1,2,… | (13) |
Hence, we have the following theorem.
Theorem 2.5. For the DDE model (4), if
Remark 4. In the absence of delay
Fig. 2 shows the time-series plots of prey
In the following, we turn our focus on the dynamical behaviors of the SDDE model (3) with both time delay and noise effect. Denote
Theorem 2.6. For any given initial value
Remark 5. Theorem 2.6 shows that the solution of the SDDE model (3) will remain in
The property of Theorem 2.6 makes us continue to discuss how the solution varies in
Definition 2.7. The solution of the SDDE model (3) is said to be stochastically ultimately bounded if for any
lim supt→∞P{|(N(t),P(t))|>χ}<ε. | (14) |
Theorem 2.8. For any
lim supt→∞E|(N(t),P(t))|θ≤C. | (15) |
Theorem 2.9. For any
Remark 6. The above analyses show that under certain conditions, the original ODE model (2) and the associated SDDE model (3) behave similarly in the sense that both have positive solutions which will not explode to infinity in a finite time, and actually, will be ultimately bounded. That is to say, under certain conditions the noise will not spoil these nice properties.
The following result gives the almost surely asymptotic property of model (3).
Theorem 2.10. Assume the same conditions of Theorem 2.6 hold. For any given initial value
lim supt→∞ln|Z(t)|t≤1+d+˘C22ˆσ2a.s. |
where
In this section, numerical simulation results of the SDDE model (3) for different values of
c=0.9,b=0.7,d=0.3,m=0.1 | (16) |
and the initial value is set to
Fig. 3 shows the time-series plots of model (3) only with different noise intensities
Fig. 4 shows the evolution of both the prey and predator species of the SDDE model (3) with different noise intensities
Fig. 5 shows the fluctuation in population densities of the prey and predator species of model (3) for different values of
For the stochastic delayed Harrison-type predator-prey model (3), one of our interesting findings is that our proposed delayed predation model can exhibit Hopf bifurcation. And we prove that the positive equilibrium is asymptotically stable when the delay is less than a certain critical value and unstable when the delay is greater than the critical value. These findings have also been reported in the delayed Harrison-type predator-prey system with diffusive effects under Neumann boundary conditions in [31]. The work of [31] shows that the system has a Hopf bifurcation and, the authors analyze the direction of Hopf bifurcation and the stability of bifurcating periodic solution. In addition, we provide the conditions of dissipative, uniformly bounded, and permanent of our proposed delayed model.
We also provide additional results on the case when the Harrison-type predation model is added by both time delay and environmental noise under certain conditions. Our analysis and numerical simulations suggest that large delay could destabilize the model; and the combination of delay and noise could intensify the periodic instability of the SDDE model (3). Complicated analytical conditions for the above results depend upon certain parametric restrictions involving the parameters of model (3) and magnitudes of time delay and environmental noise. Our analytical results partially provide answers to the two questions proposed in the introduction: What are the dynamical effects of time delay in the functional response term of the predator growth equation on the Harrison-type predator-prey model? What are the joint effects of time delay and noise on the Harrison-type predator-prey model? More specifically, we have follows:
1. The effect of delay induces instability: Theorem 2.5 indicates that the large time delay can induce instability and oscillations via Hopf bifurcation whereas the corresponding model without delay is asymptotically stable at the interior equilibrium. Delay induced instability is shown in Figs. 2(b) and 2(c) and cause the populations to fluctuate. If the time delay
2. The synergistic effects of delay and noise: We illustrate some relevant properties of the corresponding stochastic delayed predator-prey model (3) and reveal the effect of environmental noise on the model. The increase of the noise intensity has a drastic impact on the dynamical behavior of both species with or without the delay effect. Theorem 2.6 shows that under some conditions, the stochastically perturbed SDDE model (3) of the delay model (4) will remain to have a positive stable solution, and this theorem gives a result on the robustness of the positive stable solution. Under the conditions of Theorems 2.8 and 2.9, the property of the ultimate boundedness of the SDDE model (3) will not change no matter the environmental noise is large or small. That is to say, the property of this boundedness is very robust under the noise. In short, under certain conditions, the DDE model (4) and the associated SDDE model (3) behave similarly in the sense that both the prey and predator species have positive solutions which will not explode to infinity in a finite time and, in fact, will be ultimately bounded. That is, under certain conditions environmental noise will not spoil these nice properties. Moreover, Theorem 2.10 shows model (3) has almost surely asymptotic property. By fixing the values of
Proof of Theorem 2.1.
Proof. For all
{N(t)=N(0)exp(∫t0(1−N(s)−cP(s)mP(s)+1)ds+∫t0σ1dB(s)),P(t)=P(0)exp(∫t0(bN(s−τ)mP(s−τ)+1−d)ds+∫t0σ2dB(s)). | (17) |
As
{N(t)=N(0)exp(∫t0(1−N(s)−cP(s)mP(s)+1)ds+σ1B(t))≥N(0)exp(−CT),P(t)=P(0)exp(∫t0(bN(s−τ)mP(s−τ)+1−d)ds+σ2B(t))≥P(0)exp(−CT). | (18) |
Taking the limit, as
N(T)≥N(0)exp(−CT)>0,P(T)≥P(0)exp(−CT)>0, |
which contradicts the fact that either
Proof of Theorem 2.3.
Proof. For our full model (3), when
{dN(t)dt=N(t)(1−N(t))−cN(t)P(t)mP(t)+1,dP(t)dt=P(t)(−d+bN(t−τ)mP(t−τ)+1), | (19) |
with initial conditions
From the predator equation of model (19), we get
dP(t)dt<bP(t), |
hence, for
P(t)≤P(t−τ)exp(bτ), |
which is equivalent, for
P(t−τ)≥P(t)exp(−bτ). |
For any
dP(t)dt<P(t)(εb(mP(t)exp(−ετ)+1)−d), |
which implies by the same arguments use for
lim supt→∞P(t)≤(εb−d)exp(ετ)dm. | (20) |
Conclusion of this Theorem holds by letting
In addition, based on the above analysis, if
Proof of Theorem 2.4.
Proof. From Theorem 2.3, there is a
max{lim supt→∞N(t),lim supt→∞P(t)}≤A. |
Then, we will show that there is a
min{lim inft→∞N(t),lim inft→∞P(t)}≥B. |
From model (4), for any
dN(t)dt>N(t)(1−N(t)−cε(b−d)exp(τ)dm). |
Based on the standard comparison arguments, it follows that
lim inft→∞N(t)≥(1−cε(b−d)exp(τ)dm) |
and letting
lim inft→∞N(t)≥(1−c(b−d)exp(τ)dm). | (21) |
Set
dP(t)dt>P(t)(bC1ε(mP(t−τ)+1)−d). | (22) |
On the one hand, for
dP(t)dt>P(t)(C1bdε(ε(b−d)exp(τ)+d)−d), |
which involves, for
P(t−τ)<P(t)exp(−(C1bdε(ε(b−d)exp(τ)+d)−d)τ). | (23) |
On the other hand, from (22) and (23), for
dP(t)dt>P(t)(bC1εmP(t)exp(−(C1bdε(ε(b−d)exp(τ)+d)−d)τ)+ε−d) |
which yields
lim inft→∞P(t)≥bC1−εdεdmexp(−(d−C1bdε2(b−d)exp(τ)+εd)τ). |
When
lim inft→∞P(t)≥bC1−ddmexp(−(d−C1bd(b−d)exp(τ)+d)τ)=C2. |
Let be
Proof of Theorem 2.5.
Proof. In the absence of delay, i.e.,
Assume that for some
−ω2−iq1ω+(q1q4−q2q3−iq4ω)e−iωτ=0. | (24) |
Separating the real and imaginary parts, we have
{ω2=(q1q4−q2q3)cosωτ−q4ωsinωτ,q1ω=−(q1q4−q2q3)sinωτ−q4ωcosωτ, | (25) |
thus,
sinωτ=−q4ω3+(q1q4−q2q3)q1ω(q1q4−q2q3)2+q24ω2,cosωτ=−q2q3ω2(q1q4−q2q3)2+q24ω2, | (26) |
which leads to the following equation
ω4+(q21−q24)ω2−(q1q4−q2q3)2=0. | (27) |
Solving for
ω2=−(q21−q24)±√(q21−q24)2+4(q1q4−q2q3)22. | (28) |
Thus, Eq. (27) has a unique positive root
ω0=√−(q21−q24)+√(q21−q24)2+4(q1q4−q2q3)22, | (29) |
and substituting this value in (25), then the corresponding critical value of delay
τk=1ω0arcsin(−q4ω30+(q1q4−q2q3)q1ω0(q1q4−q2q3)2+q24ω20)+2kπω0,k=0,1,2,… | (30) |
Let
(dλ(τ)dτ)−1=(2λ−q1)eλτ−(q1q4−q2q3)τ−(1+λτ)q4λ(q1q4−q2q3+q4λ)=(2λ−q1)eλτλ(q1q4−q2q3+q4λ)−q4λ(q1q4−q2q3+q4λ)−τλ, | (31) |
which, together with (25), (26) and (29), leads to
sign{Re(dλdτ)}τ=τk=sign{Re(dλdτ)−1}τ=τk=q21+2ω20ω20(q21+ω20)+q24(q1q4−q2q3)2+q24ω20>0. | (32) |
This implies that all the roots cross the imaginary axis at
Proof of Theorem 2.6.
Proof. From the biological meaning, we only consider the positive solution to the SDDE model (3). Taking the change of variables as
{du(t)=(1−eu(t)−cev(t)mev(t)+1−σ212)dt+σ1dB(t),dv(t)=(−d+beu(t−τ)mev(t−τ)+1−σ212)dt+σ2dB(t), | (33) |
the coefficient of (33) satisfy the local Lipschitz condition, then for any given initial values
1l0<min−τ≤t≤0|Z(t)|≤max−τ≤t≤0|Z(t)|<l0. |
For each integer
tl=inf{t∈[0,te):N(t)∉(1l,l),P(t)∉(1l,l)}, |
where we set
If we can show that
V(Z)=(N−logN−1)+(P−logP−1), | (34) |
which is a nonnegative function on
d[∫tt−τ(N(s)+P(s))ds+V(Z(t))]=[N−N(t−τ)+(N−1)(1−N−cPmP+1)+P−P(t−τ)+(P−1)(bN(t−τ)mP(t−τ)+1−d)+σ21+σ222]dt+σ1(N−1)dB(t)+σ2(P−1)dB(t)≤[54+cm+d−N(t−τ)−(N−32)2+(1−d)P−P(t−τ)+bN(t−τ)P+σ21+σ222]dt+σ1(N−1)dB(t)+σ2(P−1)dB(t)≤[54+cm+d−N(t−τ)−(N−32)2−P(t−τ)−(d−1−b|Z(t−τ)|)P+σ21+σ222]dt+σ1(N−1)dB(t)+σ2(P−1)dB(t)≤Cdt+σ1(N−1)dB(t)+σ2(P−1)dB(t), | (35) |
where
E[∫tl∧Ttl∧T−τ(N(s)+P(s))ds+V(N(tl∧T),P(tl∧T))]≤∫0−τ(N(s)+P(s))ds+V(N(0),P(0))+CT, |
thus,
EV(N(tl∧T),P(tl∧T))≤∫0−τ(N(s)+P(s))ds+V(N(0),P(0))+CT. | (36) |
Set
V(N(tl,μ),P(tl,μ))≥min{l−logl−1,1l+logl−1}. | (37) |
It then follows from (36) that
∫0−τ(N(s)+P(s))ds+V(N(0),P(0))+CT≥E[1Ωl(μ)V(N(tl),P(tl))]≥P{tl≤T}min{l−logl−1,1l+logl−1}, | (38) |
where
Proof of Theorem 2.8.
Proof. Define a function by
V(N,P)=Nθ+Pθ,(N,P)∈R2+. | (39) |
For any
LV(N,P)=θNθ(1−N−cPmP+1)+σ212θ(θ−1)Nθ+θPθ(bN(t−τ)mP(t−τ)+1−d)+σ222θ(θ−1)Pθ, | (40) |
as
LV(N,P)≤θNθ(1−N)−σ212θ(1−θ)Nθ+θPθbN(t−τ)mP(t−τ)+1−σ222θ(1−θ)Pθ≤θNθ−σ212θ(1−θ)Nθ+bθ(b−d)exp(τ)dm|Z(t−τ)|2−σ222θ(1−θ)Pθ=F(N,P)−V(N,P)−eτ|Z(t)|2+bθ(b−d)exp(τ)dm|Z(t−τ)|2 | (41) |
where
LV(N,P)≤C0−V(N,P)−eτ|Z(t)|2+bθ(b−d)exp(τ)dm|Z(t−τ)|2. |
Hence, we obtain
dV(N,P)=LV(N,P)dt+σ1θNθdB(t)+σ2θPθdB(t)≤(C0−V(N,P)−eτ|Z(t)|2+bθ(b−d)exp(τ)dm|Z(t−τ)|2)dt+σ1θNθdB(t)+σ2θPθdB(t). | (42) |
Applying It
d(etV(N,P))=etV(N,P)dt+etdV(N,P)≤et(C0−eτ|Z(t)|2+bθ(b−d)exp(τ)dm|Z(t−τ)|2)dt+etσ1θNθdB(t)+etσ2θPθdB(t). | (43) |
If
etEV(N,P)≤V(N(0),P(0))+C0et−E∫t0es+τ|Z(s)|2ds+bθ(b−d)exp(τ)dmE∫t0es|Z(s−τ)|2ds=V(N(0),P(0))+C0et−E∫t0es+τ|Z(s)|2ds+bθ(b−d)dmE∫t−τ−τes+τ|Z(s)|2ds≤V(N(0),P(0))+C0et+bθ(b−d)dmE∫0−τes+τ|Z(s)|2ds, |
which implies that
lim supt→∞EV(N(t),P(t))≤C0. | (44) |
Since
|(N,P)|θ≤√2θmax{Nθ,Pθ}≤√2θV(N,P), | (45) |
we get
lim supt→∞E|(N(t),P(t))|θ≤√2θlim supt→∞EV(N(t),P(t))≤√2θC0=C(θ). | (46) |
The proof is complete.
Proof of Theorem 2.9.
Proof. The solutions of model (3) will remain in
lim supt→∞E|(N(t),P(t))|θ≤C. | (47) |
Then, we choose a constant
P{Nθ+Pθ>ϵ}≤1ϵE[Nθ+Pθ]≤Cϵ:=ε, |
which implies that
1−ε≤P{Nθ+Pθ<ϵ}≤P{1ϵ≤N(t)+P(t)≤ϵ}. |
Noting
P{1√2ϵ≤N(t)+P(t)√2≤|(N(t),P(t))|≤N(t)+P(t)≤ϵ}≥1−ε. | (48) |
According to the Definition 2.7, the SDDE model (3) is stochastically ultimately bounded.
Proof of Theorem 2.10.
Proof. Define a function by
lnV(Z(t))=lnV(Z(0))+∫t0(NV(Z(s))(1−N−cPmP+1)−σ21N22V2(Z(s)))ds+∫t0(PV(Z(s))(bN(s−τ)mP(s−τ)+1)−d)−σ22P22V2(Z(s)))ds+M1(t)+M2(t), | (49) |
where
⟨Mi(t),Mi(t)⟩=∫t0σ2iZ2iV(Z(s))ds,i=1,2. |
Let
P{sup0≤t≤k(Mi(t)−ε2⟨Mi(t),Mi(t)⟩)>θlnkε}≤k−θ. |
Since the series
Mi(t)≤ε2⟨Mi(t),Mi(t)⟩+2εlnk |
for all
lnV(Z(t))≤lnV(Z(0))+∫t0(NV(Z(s))(1−N−cPmP+1)−(1−ε)σ21N22V2(Z(s)))ds+∫t0(PV(Z(s))(bN(s−τ)mP(s−τ)+1)−d)−(1−ε)σ22P22V2(Z(s)))ds+4εlnk | (50) |
for all
NV(Z(s))(1−N−cPmP+1)≤1+cP,PV(Z(s))(bN(s−τ)mP(s−τ)+1)−d)≤bN(s−τ)+d,σ21N22V2(Z(s))≥σ21c21N2,σ22P22V2(Z(s))≥σ22c22P2 | (51) |
where
lnV(Z(t))≤∫t0(1+cP(s)+bN(s−τ)+d−(1−ε)σ21c21N2−(1−ε)σ22c22P2)ds+lnV(Z(0))+4εlnk≤∫t0(1+cP(s)+bN(s−τ)+d−(1−ε)ˆσ2|Z|22)ds+lnV(Z(0))+4εlnk | (52) |
for all
lnV(Z(t))+(1−2ε)ˆσ24∫t0|Z(s)|2ds≤lnV(Z(0))+4εlnk+∫t0(1+cP(s)+bN(s−τ)+d−ˆσ2|Z|22)ds≤C1+∫t0(1+cP(s)+bN(s)+d−ˆσ2|Z|22)ds+4εlnk, |
where
1+d+cP(t)+bN(t)−ˆσ2|Z|22≤1+d+ˇC|Z|−ˆσ2|Z|22≤1+d+ˇC22ˆσ2=C2, |
thus, if
lnV(Z(t))+(1−2ε)ˆσ24∫t0|Z(s)|2ds≤ˇC+4εlnk+C2t |
for all
1t(lnV(Z(t))+(1−2ε)ˆσ24∫t0|Z(s)|2ds)≤1k−1(ˇC+4εlnk)+C2, |
which implies
lim supt→∞1t(lnV(Z(t))+(1−2ε)ˆσ24∫t0|Z(s)|2ds)≤C2. | (53) |
Letting
lim supt→∞1t(lnV(Z(t))+ˆσ24∫t0|Z(s)|2ds)≤C2a.s. | (54) |
and using
lim supt→∞1t(ln|Z(t)|+ˆσ24∫t0|Z(s)|2ds)≤C2a.s. |
The desired assertion is derived.
This research is partially supported by the National Natural Science Foundation of China (Grant Nos. 11601226, 11426132, 71501094), the Natural Science Foundation of Jiangsu Province of China (Grant No. BK20140927, BK20150961), and the research funds from Nanjing Tech University and Jiangsu Government Scholarship for Overseas Studies. The work is also partially supported by NSF-DMS (1313312&1716802); NSF-IOS/DMS (1558127), and The James S. McDonnell Foundation 21st Century Science Initiative in Studying Complex Systems Scholar Award (UHC Scholar Award 220020472). This project has been partially supported by grants from the National Science Foundation (DMS-1263374 and DMS-1261211), and the Offices of the President and the Provost of Arizona State University.
[1] |
Pawar N, Bhingarkar S (2020) Machine Learning based Sarcasm Detection on Twitter Data. 2020 5th International Conference on Communication and Electronics Systems (ICCES), 957‒961. https://doi.org/10.1109/ICCES48766.2020.9137924 doi: 10.1109/ICCES48766.2020.9137924
![]() |
[2] |
Suhaimin MSM, Hijazi MHA, Alfred R, et al. (2017) Natural language processing based features for sarcasm detection: An investigation using bilingual social media texts. 2017 8th International Conference on Information Technology (ICIT), 703‒709. https://doi.org/10.1109/ICITECH.2017.8079931 doi: 10.1109/ICITECH.2017.8079931
![]() |
[3] |
Bharti SK, Babu KS, and Raman R (2017) Context-based Sarcasm Detection in Hindi Tweets. 2017 9th Int. Conf. Adv. Pattern Recognition, ICAPR, 1–6. https://doi.org/10.1109/ICAPR.2017.8593198 doi: 10.1109/ICAPR.2017.8593198
![]() |
[4] | Zhang M, Zhang Y, Fu G (2016) Tweet sarcasm detection using deep neural network. COLING 2016 - 26th Int. Conf. Comput. Linguist. Tech. Pap., 2449–2460. |
[5] |
Athira MR, Chithra C, Anil G, et al. (2020) Sentiment Analysis - Sarcasm Detection in Twitter. Journal of Computer Engineering (IOSR-JCE) 22: 42–46. https://doi.org/10.9790/0661-2204024246 doi: 10.9790/0661-2204024246
![]() |
[6] |
Prasad AG, Sanjana S, Bhat SM, and B. S. Harish (2017) Sentiment analysis for sarcasm detection on streaming short text data. 2017 2nd International Conference on Knowledge Engineering and Applications (ICKEA), 1‒5. https://doi.org/10.1109/ICKEA.2017.8169892 doi: 10.1109/ICKEA.2017.8169892
![]() |
[7] | Bindra KK, Prof A, Gupta A (2016) Tweet Sarcasm : Mechanism of Sarcasm Detection in Twitter. International Journal of Computer Science and Information Technologies 7: 215–217. |
[8] |
Bharti SK, Vachha B, Pradhan RK, et al. (2016) Sarcastic sentiment detection in tweets streamed in real-time: a big data approach. Digit Commun Netw 2: 108–121. https://doi.org/10.1016/j.dcan.2016.06.002 doi: 10.1016/j.dcan.2016.06.002
![]() |
[9] |
Sarsam SM, Al-Samarraie H, Alzahrani AI, et al. (2020) Sarcasm detection using machine learning algorithms in Twitter: A systematic review. Int J Market Res 62: 578–598. https://doi.org/10.1177/1470785320921779 doi: 10.1177/1470785320921779
![]() |
[10] |
Bouazizi M, Ohtsuki T (2015) Sarcasm Detection in Twitter: "All Your Products Are Incredibly Amazing!!!" - Are They Really? 2015 IEEE Global Communications Conference (GLOBECOM), 1‒6. https://doi.org/10.1109/GLOCOM.2015.7417640 doi: 10.1109/GLOCOM.2015.7417640
![]() |
[11] |
Eke CI, Norman AA, Shuib L, et al. (2020) Sarcasm identification in textual data: systematic review, research challenges, and open directions. Artif Intell Rev 53: 4215–4258. https://doi.org/10.1007/s10462-019-09791-8 doi: 10.1007/s10462-019-09791-8
![]() |
[12] |
Saha S, Yadav J, Ranjan P (2017) Proposed Approach for Sarcasm Detection in Twitter. Indian J Sci Technol 10: 1–8. https://doi.org/10.17485/ijst/2017/v10i25/114443 doi: 10.17485/ijst/2017/v10i25/114443
![]() |
[13] | Sharma S, Chakraverty S (2018) SARCASM DETECTION IN ONLINE REVIEW TEXT. 1674–1679. |
[14] |
Wen Z, Gui L, Wang Q, et al. (2022) Sememe knowledge and auxiliary information enhanced approach for sarcasm detection. Inf Process Manag 59: 102883. https://doi.org/10.1016/j.ipm.2022.102883 doi: 10.1016/j.ipm.2022.102883
![]() |
[15] |
Pawar N, Bhingarkar S (2020) Machine learning-based sarcasm detection on Twitter data. Proc 5th Int Conf Commun Electron Syst ICCES 2020, 957–961. https://doi.org/10.1109/ICCES48766.2020.9137924 doi: 10.1109/ICCES48766.2020.9137924
![]() |
[16] |
Halim Z, Waqar M, Tahir M (2020) A machine learning-based investigation utilizing the in-text features for the identification of dominant emotion in an email. Knowledge-Based Syst 208: 106443. https://doi.org/10.1016/j.knosys.2020.106443 doi: 10.1016/j.knosys.2020.106443
![]() |
[17] |
Jain T, Agrawal N, Goyal G, et al. (2017) Sarcasm detection of tweets: A comparative study. 2017 Tenth International Conference on Contemporary Computing (IC3), 1‒6, https://doi.org/10.1109/IC3.2017.8284317 doi: 10.1109/IC3.2017.8284317
![]() |
[18] | Biere S, Bhulai S, Analytics MB (2018) Hate Speech Detection Using Natural Language Processing Techniques. Vrije Univ. Amsterdam. |
[19] | Konduri V, Padathula S, Pamu A, et al. (2020) Hate Speech Classification of social media posts using Text Analysis and Machine Learning. Oklahoma State University. |
[20] |
Panda S, Kusum (2020) Detecting Twitter's Impact on COVID-19 Pandemic in India. Int J Innov Technol Explor Eng 9: 815–819. https://doi.org/10.35940/ijitee.H6718.069820 doi: 10.35940/ijitee.H6718.069820
![]() |
[21] |
Amer AYA, Siddiqui T (2020) Detection of Covid-19 Fake News text data using Random Forest and Decision tree Classifiers. International Journal of Computer Science and Information Security IJCSIS 18: 88–100. https://doi.org/10.5281/zenodo.4427204 doi: 10.5281/zenodo.4427204
![]() |
[22] | Shaalan K, Hassanien AE, Tolba F (2018) Intelligent Natural Language Processing: Trends and Applications. vol. 740, Springer. https://doi.org/10.1007/978-3-319-67056-0 |
[23] |
Salloum SA, Al-Emran M, Monem AA, et al. (2018) Using text mining techniques for extracting information from research articles. Studies in Computational Intelligence 740: 373–397. https://doi.org/10.1007/978-3-319-67056-0_18 doi: 10.1007/978-3-319-67056-0_18
![]() |
[24] |
Kowsari K, Meimandi KJ, Heidarysafa M, et al. (2019) Text classification algorithms: A survey. Information 10: 150. https://doi.org/10.3390/info10040150 doi: 10.3390/info10040150
![]() |
[25] |
Nhlabano VV, Lutu PEN (2018) Impact of Text Preprocessing on the Performance of Sentiment Analysis Models for Social Media Data. 2018 Int Conf Adv Big Data, Comput Data Commun Syst icABCD, 1–6. https://doi.org/10.1109/ICABCD.2018.8465135 doi: 10.1109/ICABCD.2018.8465135
![]() |
[26] |
Dawei W, Alfred R, Obit JH, et al. (2021) A Literature Review on Text Classification and Sentiment Analysis Approaches. Lect Notes Electr Eng 724: 305–323. https://doi.org/10.1007/978-981-33-4069-5_26 doi: 10.1007/978-981-33-4069-5_26
![]() |
[27] |
Zhou Z, Guan H, Bhat MM, et al. (2019) Fake news detection via NLP is vulnerable to adversarial attacks. ICAART 2019 - Proc 11th Int Conf Agents Artif Intell 2: 794–800. https://doi.org/10.5220/0007566307940800 doi: 10.5220/0007566307940800
![]() |
[28] |
Mansour S (2018) Social media analysis of user's responses to terrorism using sentiment analysis and text mining. Procedia Comput Sci 140: 95–103. https://doi.org/10.1016/j.procs.2018.10.297 doi: 10.1016/j.procs.2018.10.297
![]() |
[29] |
Ahmad I, Yousaf M, Yousaf S, et al. (2020) Fake News Detection Using Machine Learning Ensemble Methods. Complexity 2020: 680–685. https://doi.org/10.1155/2020/8885861 doi: 10.1155/2020/8885861
![]() |
[30] |
Sharmin S, Zaman Z (2018) Spam detection in social media employing machine learning tool for text mining. Proc - 13th Int Conf Signal-Image Technol Internet-Based Syst SITIS 2017, 137–142. https://doi.org/10.1109/SITIS.2017.32 doi: 10.1109/SITIS.2017.32
![]() |
[31] |
Neeraja M, Prakash J (2016) Detecting Malicious Posts in Social Networks Using Text Analysis. International Journal of Science and Research (IJSR) 5: 345–347. https://doi.org/10.21275/v5i6.NOV164091 doi: 10.21275/v5i6.NOV164091
![]() |
[32] |
Hussain MG, Hasan MR, Rahman M, et al. (2020) Detection of Bangla Fake News using MNB and SVM Classifier. 2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE). https://doi.org/10.1109/iCCECE49321.2020.9231167 doi: 10.1109/iCCECE49321.2020.9231167
![]() |
[33] |
Neha D, Vidyavathi BM (2015) A Survey on Applications of Data Mining using Clustering Techniques. International Journal of Computer Applications 126: 7–12. https://doi.org/10.5120/ijca2015905986 doi: 10.5120/ijca2015905986
![]() |
[34] |
Kaur R, Singh S (2016) FULL-LENGTH ARTICLE A survey of data mining and social network analysis based anomaly detection techniques. Egypt Informatics J 17: 199–216. https://doi.org/10.1016/j.eij.2015.11.004 doi: 10.1016/j.eij.2015.11.004
![]() |
[35] |
Sharath KA, Singh S (2013) Detection of user cluster with suspicious activity in online social networking sites. Proc - 2nd Int Conf Adv Comput Netw Secur ADCONS 2013, 220–225. https://doi.org/10.1109/ADCONS.2013.17 doi: 10.1109/ADCONS.2013.17
![]() |
[36] |
Al Mansoori S, Almansoori A, Alshamsi M, et al. (2020) Suspicious Activity Detection of Twitter and Facebook using Sentimental Analysis. TEM JOURNAL - Technology, Education, Management, Informatics TEM J 9: 1313–1319. https://doi.org/10.18421/TEM94-01 doi: 10.18421/TEM94-01
![]() |
[37] |
Rajeswari K, Shanthibala P (2018) SARCASM DETECTION USING MACHINE LEARNING TECHNIQUES. Int J Recent Sci Res 9: 26368–26372. http://dx.doi.org/10.24327/ijrsr.2018.0904.2046 doi: 10.24327/ijrsr.2018.0904.2046
![]() |
[38] |
Chen J, Yan S, Wong KC (2018) Verbal aggression detection on Twitter comment : convolutional neural network for short-text sentiment analysis. Neural Comput Appl 32: 10809‒10818. https://doi.org/10.1007/s00521-018-3442-0 doi: 10.1007/s00521-018-3442-0
![]() |
[39] |
Li Y, Li T (2013) Deriving market intelligence from microblogs. Decis Support Syst 55: 206–217. https://doi.org/10.1016/j.dss.2013.01.023 doi: 10.1016/j.dss.2013.01.023
![]() |
[40] |
Kharde VA, Sonawane SS (2016) Sentiment Analysis of Twitter Data: A Survey of Techniques. International Journal of Computer Applications 139: 5–15. https://doi.org/10.5120/ijca2016908625 doi: 10.5120/ijca2016908625
![]() |
[41] |
Joshi S, Deshpande D (2018) Twitter Sentiment Analysis System. International Journal of Computer Applications 180: 35–39. https://doi.org/10.5120/ijca2018917319 doi: 10.5120/ijca2018917319
![]() |
[42] |
Rui H, Liu Y, Whinston A (2013) Whose and what chatter matters? The effect of tweets on movie sales. Decis Support Syst 55: 863–870. https://doi.org/10.1016/j.dss.2012.12.022 doi: 10.1016/j.dss.2012.12.022
![]() |
[43] |
Ghosh D, Guo W, Muresan S (2015) Sarcastic or not: Word embeddings to predict the literal or sarcastic meaning of words. Conf Proc - EMNLP 2015 Conf Empir Methods Nat Lang Process, 1003–1012. https://doi.org/10.18653/v1/D15-1116 doi: 10.18653/v1/D15-1116
![]() |
[44] | Khodak M, Saunshi N, Vodrahalli K (2018) A large self-annotated corpus for sarcasm. Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018). |
[45] |
Rahman AU, Halim Z (2022) Identifying dominant emotional state using handwriting and drawing samples by fusing features. Appl Intell 2022: 1‒17. https://doi.org/10.1007/s10489-022-03552-x doi: 10.1007/s10489-022-03552-x
![]() |
[46] |
Halim Z, Ali O, Khan MG (2021) On the Efficient Representation of Datasets as Graphs to Mine Maximal Frequent Itemsets. IEEE T Knowl Data Eng 33: 1674–1691. https://doi.org/10.1109/TKDE.2019.2945573 doi: 10.1109/TKDE.2019.2945573
![]() |
[47] |
Savini E, Caragea C (2022) Intermediate-Task Transfer Learning with BERT for Sarcasm Detection. Mathematics 10: 844. https://doi.org/10.3390/math10050844. doi: 10.3390/math10050844
![]() |
[48] |
Halim Z, Rehan M (2020) On identification of driving-induced stress using electroencephalogram signals: A framework based on wearable safety-critical scheme and machine learning. Inf Fusion 53: 66–79. https://doi.org/10.1016/j.inffus.2019.06.006 doi: 10.1016/j.inffus.2019.06.006
![]() |
1. | Xin He, Xin Zhao, Tao Feng, Zhipeng Qiu, Dynamical behaviors of a prey-predator model with foraging arena scheme in polluted environments, 2021, 71, 1337-2211, 235, 10.1515/ms-2017-0463 | |
2. | R. Rajaji, M. Pitchaimani, Analysis of stochastic viral infection model with lytic and nonlytic immune responses, 2020, 38, 0736-2994, 490, 10.1080/07362994.2019.1702559 | |
3. | Fathalla A. Rihan, Hebatallah J. Alsakaji, Persistence and extinction for stochastic delay differential model of prey predator system with hunting cooperation in predators, 2020, 2020, 1687-1847, 10.1186/s13662-020-02579-z | |
4. | Yongzhong Lan, Jianping Shi, Hui Fang, Hopf Bifurcation and Control of a Fractional-Order Delay Stage Structure Prey-Predator Model with Two Fear Effects and Prey Refuge, 2022, 14, 2073-8994, 1408, 10.3390/sym14071408 | |
5. | Feng Rao, Yun Kang, Dynamics of a stochastic prey–predator system with prey refuge, predation fear and its carry-over effects, 2023, 175, 09600779, 113935, 10.1016/j.chaos.2023.113935 | |
6. | Subarna Roy, Subhas Khajanchi, Pankaj Kumar Tiwari, Fear and its carry-over effects in a generalist predator–prey system featuring cooperative hunting, 2025, 1598-5865, 10.1007/s12190-024-02346-3 |
Equilibrium | Existence Condition | Stability Condition |
Always exists | Always saddle | |
Always exists | Sink if Saddle if | |
Always sink |