The dynamics of discrete-time prey-predator model are investigated. The result indicates that the
model undergo a flip bifurcation which found by using center manifold theorem and bifurcation theory.
Numerical simulation not only illustrate our results, but also exhibit the complex dynamic behavior, such as the
periodic doubling in period-2, -4 -8, quasi- periodic orbits and chaotic set. Finally, the feedback control method
is used to stabilize chaotic orbits at an unstable interior point.
In this paper we consider the initial-boundary value problem for a nonlinear equation induced with respect to the mathematical models in mass production process with the one sided spring boundary condition by boundary feedback control. We establish the asymptotic behavior of solutions to this problem in time, and give an example and simulation to illustrate our results. Results of this paper are able to apply industrial parts such as a typical model widely used to represent threads, wires, magnetic tapes, belts, band saws, and so on.
NONSTATIONARY RELAXED MULTISPLITTING METHODS FOR SOLVING LINEAR COMPLEMENTARI...ijcsa
Β
In this paper we consider some non stationary relaxed synchronous and asynchronous
multisplitting methods for solving the linear complementarity problems with their coefficient
matrices being Hβmatrices. The convergence theorems of the methods are given,and the efficiency
is shown by numerical tests.
Matrix Transformations on Some Difference Sequence SpacesIOSR Journals
Β
The sequence spaces πβ(π’,π£,Ξ), π0(π’,π£,Ξ) and π(π’,π£,Ξ) were recently introduced. The matrix classes (π π’,π£,Ξ :π) and (π π’,π£,Ξ :πβ) were characterized. The object of this paper is to further determine the necessary and sufficient conditions on an infinite matrix to characterize the matrix classes (π π’,π£,Ξ βΆππ ) and (π π’,π£,Ξ βΆ ππ). It is observed that the later characterizations are additions to the existing ones
We disclose a simple and straightforward method of solving ordinary or linear partial differential equations of any order and apply it to solve the generalized Euler-Tricomi equation. The method is easier than classical methods and also didactic.
Date: Jan, 10, 202
PROBABILITY DISTRIBUTION OF SUM OF TWO CONTINUOUS VARIABLES AND CONVOLUTIONJournal For Research
Β
All physical subjects, involving random phenomena, something depending upon chance, naturally find their own way to theory of Statistics. Hence there arise relations between the results derived for hose random phenomena in different physical subjects and the concepts of Statistics. Convolution theorem has a variety of applications in field of Fourier transforms and many other situations, but it bears beautiful applications in field of statistics also .Here in this paper authors want to discuss some notions of Electrical Engineering in terms of convolution of some probability distributions.
This section define a level subring or level ideals obtain a set of necessary and sufficient condition for the
equality of two ideals and characterizes field in terms of its fuzzy ideals. It also presents a procedure to construct
a fuzzy subrings (fuzzy ideals) from any given ascending chain of subring ideal. We prove that the lattice of
fuzzy congruence of group G (respectively ring R) is isomorphic to the lattice of fuzzy normal subgroup of G
(respectively fuzzy ideals of R).In Yuan Boond Wu wangrning investigated the relationship between the fuzzy
ideals and the fuzzy congruences on a distributive lattice and obtained that the lattice of fuzzy ideals is
isomorphic to the lattice of fuzzy congruences on a generalized Boolean algebra. Fuzzy group theory can be
used to describe, symmetries and permutation in nature and mathematics. The fuzzy group is one of the oldest
branches of abstract algebra. For example group can be used is classify to all of the forms chemical crystal can
take. Group can be used to count the number of non-equivalent objects and permutation or symmetries. For
example, the number of different is switching functions of n, variable when permutation of the input are
allowed. Beside crystallography and combinatory group have application of quantum mechanics.
In this paper we consider the initial-boundary value problem for a nonlinear equation induced with respect to the mathematical models in mass production process with the one sided spring boundary condition by boundary feedback control. We establish the asymptotic behavior of solutions to this problem in time, and give an example and simulation to illustrate our results. Results of this paper are able to apply industrial parts such as a typical model widely used to represent threads, wires, magnetic tapes, belts, band saws, and so on.
NONSTATIONARY RELAXED MULTISPLITTING METHODS FOR SOLVING LINEAR COMPLEMENTARI...ijcsa
Β
In this paper we consider some non stationary relaxed synchronous and asynchronous
multisplitting methods for solving the linear complementarity problems with their coefficient
matrices being Hβmatrices. The convergence theorems of the methods are given,and the efficiency
is shown by numerical tests.
Matrix Transformations on Some Difference Sequence SpacesIOSR Journals
Β
The sequence spaces πβ(π’,π£,Ξ), π0(π’,π£,Ξ) and π(π’,π£,Ξ) were recently introduced. The matrix classes (π π’,π£,Ξ :π) and (π π’,π£,Ξ :πβ) were characterized. The object of this paper is to further determine the necessary and sufficient conditions on an infinite matrix to characterize the matrix classes (π π’,π£,Ξ βΆππ ) and (π π’,π£,Ξ βΆ ππ). It is observed that the later characterizations are additions to the existing ones
We disclose a simple and straightforward method of solving ordinary or linear partial differential equations of any order and apply it to solve the generalized Euler-Tricomi equation. The method is easier than classical methods and also didactic.
Date: Jan, 10, 202
PROBABILITY DISTRIBUTION OF SUM OF TWO CONTINUOUS VARIABLES AND CONVOLUTIONJournal For Research
Β
All physical subjects, involving random phenomena, something depending upon chance, naturally find their own way to theory of Statistics. Hence there arise relations between the results derived for hose random phenomena in different physical subjects and the concepts of Statistics. Convolution theorem has a variety of applications in field of Fourier transforms and many other situations, but it bears beautiful applications in field of statistics also .Here in this paper authors want to discuss some notions of Electrical Engineering in terms of convolution of some probability distributions.
This section define a level subring or level ideals obtain a set of necessary and sufficient condition for the
equality of two ideals and characterizes field in terms of its fuzzy ideals. It also presents a procedure to construct
a fuzzy subrings (fuzzy ideals) from any given ascending chain of subring ideal. We prove that the lattice of
fuzzy congruence of group G (respectively ring R) is isomorphic to the lattice of fuzzy normal subgroup of G
(respectively fuzzy ideals of R).In Yuan Boond Wu wangrning investigated the relationship between the fuzzy
ideals and the fuzzy congruences on a distributive lattice and obtained that the lattice of fuzzy ideals is
isomorphic to the lattice of fuzzy congruences on a generalized Boolean algebra. Fuzzy group theory can be
used to describe, symmetries and permutation in nature and mathematics. The fuzzy group is one of the oldest
branches of abstract algebra. For example group can be used is classify to all of the forms chemical crystal can
take. Group can be used to count the number of non-equivalent objects and permutation or symmetries. For
example, the number of different is switching functions of n, variable when permutation of the input are
allowed. Beside crystallography and combinatory group have application of quantum mechanics.
On The Distribution of Non - Zero Zeros of Generalized Mittag β Leffler Funct...IJERA Editor
Β
In this work, we derive some theorems involving distribution of non β zero zeros of generalized Mittag β Leffler functions of one and two variables. Mathematics Subject Classification 2010: Primary; 33E12. Secondary; 33C65, 26A33, 44A20
DISCRETIZATION OF A MATHEMATICAL MODEL FOR TUMOR-IMMUNE SYSTEM INTERACTION WI...mathsjournal
Β
The present study deals with the analysis of a Lotka-Volterra model describing competition between tumor and immune cells. The model consists of differential equations with piecewise constant arguments and based on metamodel constructed by Stepanova. Using the method of reduction to discrete equations, it is obtained a system of difference equations from the system of differential equations. In order to get local and global stability conditions of the positive equilibrium point of the system, we use Schur-Cohn criterion and Lyapunov function that is constructed. Moreover, it is shown that periodic solutions occur as a consequence of Neimark-Sacker bifurcation.
constant strain triangular which is used in analysis of triangular in finite element method with the help of shape function and natural coordinate system.
How to Solve a Partial Differential Equation on a surfacetr1987
Β
Familiar techniques of separation of variables and Fourier series can be used to solve a variety of pde based on domains in the plane, however these techniques do not extend naturally to surface problems. Instead we look to take a computational approach. The talk will cover the basics of finite difference and finite element approximations of the one dimensional heat equation and show how to extend these ideas on to surfaces. If time allows, we will show numerical results of an optimal partition problem based on a sphere. No background knowledge of pde or computation is required.
Second part of Matrices at undergraduate in science (math, physics, engineering) level.
Please send comments and suggestions to solo.hermelin@gmail.com.
For more presentations visit my website at
http://www.solohermelin.com.
Errors in the Discretized Solution of a Differential Equationijtsrd
Β
We study the error in the derivatives of an unknown function. We construct the discretized problem. The local truncation and global errors are discussed. The solution of discretized problem is constructed. The analytical and discretized solutions are compared. The two solution graphs are described by using MATLAB software. Wai Mar Lwin | Khaing Khaing Wai "Errors in the Discretized Solution of a Differential Equation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27937.pdfPaper URL: https://www.ijtsrd.com/mathemetics/applied-mathamatics/27937/errors-in-the-discretized-solution-of-a-differential-equation/wai-mar-lwin
Numerical Methods was a core subject for Electrical & Electronics Engineering, Based On Anna University Syllabus. The Whole Subject was there in this document.
Share with it ur friends & Follow me for more updates.!
On The Distribution of Non - Zero Zeros of Generalized Mittag β Leffler Funct...IJERA Editor
Β
In this work, we derive some theorems involving distribution of non β zero zeros of generalized Mittag β Leffler functions of one and two variables. Mathematics Subject Classification 2010: Primary; 33E12. Secondary; 33C65, 26A33, 44A20
DISCRETIZATION OF A MATHEMATICAL MODEL FOR TUMOR-IMMUNE SYSTEM INTERACTION WI...mathsjournal
Β
The present study deals with the analysis of a Lotka-Volterra model describing competition between tumor and immune cells. The model consists of differential equations with piecewise constant arguments and based on metamodel constructed by Stepanova. Using the method of reduction to discrete equations, it is obtained a system of difference equations from the system of differential equations. In order to get local and global stability conditions of the positive equilibrium point of the system, we use Schur-Cohn criterion and Lyapunov function that is constructed. Moreover, it is shown that periodic solutions occur as a consequence of Neimark-Sacker bifurcation.
constant strain triangular which is used in analysis of triangular in finite element method with the help of shape function and natural coordinate system.
How to Solve a Partial Differential Equation on a surfacetr1987
Β
Familiar techniques of separation of variables and Fourier series can be used to solve a variety of pde based on domains in the plane, however these techniques do not extend naturally to surface problems. Instead we look to take a computational approach. The talk will cover the basics of finite difference and finite element approximations of the one dimensional heat equation and show how to extend these ideas on to surfaces. If time allows, we will show numerical results of an optimal partition problem based on a sphere. No background knowledge of pde or computation is required.
Second part of Matrices at undergraduate in science (math, physics, engineering) level.
Please send comments and suggestions to solo.hermelin@gmail.com.
For more presentations visit my website at
http://www.solohermelin.com.
Errors in the Discretized Solution of a Differential Equationijtsrd
Β
We study the error in the derivatives of an unknown function. We construct the discretized problem. The local truncation and global errors are discussed. The solution of discretized problem is constructed. The analytical and discretized solutions are compared. The two solution graphs are described by using MATLAB software. Wai Mar Lwin | Khaing Khaing Wai "Errors in the Discretized Solution of a Differential Equation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27937.pdfPaper URL: https://www.ijtsrd.com/mathemetics/applied-mathamatics/27937/errors-in-the-discretized-solution-of-a-differential-equation/wai-mar-lwin
Numerical Methods was a core subject for Electrical & Electronics Engineering, Based On Anna University Syllabus. The Whole Subject was there in this document.
Share with it ur friends & Follow me for more updates.!
CNIT 127 Ch 4: Introduction to format string bugs (rev. 2-9-17)Sam Bowne
Β
Slides for a college course at City College San Francisco. Based on "The Shellcoder's Handbook: Discovering and Exploiting Security Holes ", by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte; ASIN: B004P5O38Q.
Instructor: Sam Bowne
Class website: https://samsclass.info/127/127_S17.shtml
Discretization of a Mathematical Model for Tumor-Immune System Interaction wi...mathsjournal
Β
The present study deals with the analysis of a Lotka-Volterra model describing competition between tumor and immune cells. The model consists of differential equations with piecewise constant arguments and based on metamodel constructed by Stepanova. Using the method of reduction to discrete equations, it is obtained a system of difference equations from the system of differential equations. In order to get local and global stability conditions of the positive equilibrium point of the system, we use Schur-Cohn criterion and Lyapunov function that is constructed. Moreover, it is shown that periodic solutions occur as a consequence of Neimark-Sacker bifurcation.
DISCRETIZATION OF A MATHEMATICAL MODEL FOR TUMOR-IMMUNE SYSTEM INTERACTION WI...mathsjournal
Β
The present study deals with the analysis of a Lotka-Volterra model describing competition between tumor
and immune cells. The model consists of differential equations with piecewise constant arguments and
based on metamodel constructed by Stepanova. Using the method of reduction to discrete equations, it is
obtained a system of difference equations from the system of differential equations. In order to get local
and global stability conditions of the positive equilibrium point of the system, we use Schur-Cohn criterion
and Lyapunov function that is constructed. Moreover, it is shown that periodic solutions occur as a
consequence of Neimark-Sacker bifurcation.
DISCRETIZATION OF A MATHEMATICAL MODEL FOR TUMOR-IMMUNE SYSTEM INTERACTION WI...mathsjournal
Β
The present study deals with the analysis of a Lotka-Volterra model describing competition between tumor
and immune cells. The model consists of differential equations with piecewise constant arguments and
based on metamodel constructed by Stepanova. Using the method of reduction to discrete equations, it is
obtained a system of difference equations from the system of differential equations. In order to get local
and global stability conditions of the positive equilibrium point of the system, we use Schur-Cohn criterion
and Lyapunov function that is constructed. Moreover, it is shown that periodic solutions occur as a
consequence of Neimark-Sacker bifurcation.
DISCRETIZATION OF A MATHEMATICAL MODEL FOR TUMOR-IMMUNE SYSTEM INTERACTION WI...mathsjournal
Β
The present study deals with the analysis of a Lotka-Volterra model describing competition between tumor
and immune cells. The model consists of differential equations with piecewise constant arguments and
based on metamodel constructed by Stepanova. Using the method of reduction to discrete equations, it is
obtained a system of difference equations from the system of differential equations. In order to get local
and global stability conditions of the positive equilibrium point of the system, we use Schur-Cohn criterion
and Lyapunov function that is constructed. Moreover, it is shown that periodic solutions occur as a
consequence of Neimark-Sacker bifurcation.
DISCRETIZATION OF A MATHEMATICAL MODEL FOR TUMOR-IMMUNE SYSTEM INTERACTION WI...mathsjournal
Β
The present study deals with the analysis of a Lotka-Volterra model describing competition between tumor
and immune cells. The model consists of differential equations with piecewise constant arguments and
based on metamodel constructed by Stepanova. Using the method of reduction to discrete equations, it is
obtained a system of difference equations from the system of differential equations. In order to get local
and global stability conditions of the positive equilibrium point of the system, we use Schur-Cohn criterion
and Lyapunov function that is constructed. Moreover, it is shown that periodic solutions occur as a
consequence of Neimark-Sacker bifurcation.
DISCRETIZATION OF A MATHEMATICAL MODEL FOR TUMOR-IMMUNE SYSTEM INTERACTION WI...mathsjournal
Β
The present study deals with the analysis of a Lotka-Volterra model describing competition between tumor
and immune cells. The model consists of differential equations with piecewise constant arguments and
based on metamodel constructed by Stepanova. Using the method of reduction to discrete equations, it is
obtained a system of difference equations from the system of differential equations. In order to get local
and global stability conditions of the positive equilibrium point of the system, we use Schur-Cohn criterion
and Lyapunov function that is constructed. Moreover, it is shown that periodic solutions occur as a
consequence of Neimark-Sacker bifurcation.
DISCRETIZATION OF A MATHEMATICAL MODEL FOR TUMOR-IMMUNE SYSTEM INTERACTION WI...mathsjournal
Β
The present study deals with the analysis of a Lotka-Volterra model describing competition between tumor
and immune cells. The model consists of differential equations with piecewise constant arguments and
based on metamodel constructed by Stepanova. Using the method of reduction to discrete equations, it is
obtained a system of difference equations from the system of differential equations. In order to get local
and global stability conditions of the positive equilibrium point of the system, we use Schur-Cohn criterion
and Lyapunov function that is constructed. Moreover, it is shown that periodic solutions occur as a
consequence of Neimark-Sacker bifurcation.
Generalised Statistical Convergence For Double SequencesIOSR Journals
Β
Recently, the concept of π½-statistical Convergence was introduced considering a sequence of infinite
matrices π½ = (πππ π ). Later, it was used to define and study π½-statistical limit point, π½-statistical cluster point,
π π‘π½ β πππππ‘ inferior and π π‘π½ β πππππ‘ superior. In this paper we analogously define and study 2π½-statistical
limit, 2π½-statistical cluster point, π π‘2π½ β πππππ‘ inferior and π π‘2π½ β πππππ‘ superior for double sequences.
We disclose a simple and straightforward method of solving single-order linear partial differential equations. The advantage of the method is that it is applicable to any orders and the big disadvantage is that it is restricted to a single order at a time. As it is very easy compared to classical methods, it has didactic value.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Dual Spaces of Generalized Cesaro Sequence Space and Related Matrix Mappinginventionjournals
Β
In this paper we define the generalized Cesaro sequence spaces ννν (ν, ν, ν ). We prove the space ννν (ν, ν, ν ) is a complete paranorm space. In section-2 we determine its Kothe-Toeplitz dual. In section-3 we establish necessary and sufficient conditions for a matrix A to map ννν ν, ν, ν to νβ and ννν (ν, ν, ν ) to c, where νβ is the space of all bounded sequences and c is the space of all convergent sequences. We also get some known and unknown results as remarks.
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...mathsjournal
Β
In the earlier work, Knuth present an algorithm to decrease the coefficient growth in the Euclidean algorithm of polynomials called subresultant algorithm. However, the output polynomials may have a small factor which can be removed. Then later, Brown of Bell Telephone Laboratories showed the subresultant in another way by adding a variant called π and gave a way to compute the variant. Nevertheless, the way failed to determine every π correctly.
In this paper, we will give a probabilistic algorithm to determine the variant π correctly in most cases by adding a few steps instead of computing π‘(π₯) when given π(π₯) andπ(π₯) β β€[π₯], where π‘(π₯) satisfies that π (π₯)π(π₯) + π‘(π₯)π(π₯) = π(π₯), here π‘(π₯), π (π₯) β β€[π₯]
Fixed Point Results for Weakly Compatible Mappings in Convex G-Metric Spaceinventionjournals
Β
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IOSR Journal of Mathematics(IOSR-JM) is an open access international journal that provides rapid publication (within a month) of articles in all areas of mathemetics and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mathematics. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Similar to Flip bifurcation and chaos control in discrete-time Prey-predator model (20)
Cars are a very important part of this modern world because they give luxury and comfort. Even
though they are comfortable, some problems always keep arising on the safety side. After a lot of research they
rectified certain problems using air bags, auto parking, turbo charger, pedal shiftβ¦, etc.
And now we are going to discuss about one such problem that arises on the safety side. An unsuspected
accident occurs when people smash their fingers in between the car doors. Due to this kind of accident around
120,000 people are injured every year. But this was not taken as a very major safety concern for the customer.
To avoid this kind accident due to car doors, we are introducing βSAFETY DOOR LOCK SYSTEMβ
with the help of βHYDRAULIC PISTON AND IR SENSORSβ.
The major working process of the βSAFETY DOOR LOCK SYSTEMβis, when a person places his/her
hand or fingers in the gap between the door and the outer panel, at the time when the closing action of the door
takes place, the Sensors start to transmit the Infra Red Rays to the Receivers at the
other end, and so even if someone closes the door without anybodyβs knowledge the hydraulic piston will
automatically come out and stop the door from closing and prevent the person from the unsuspected accident
and minor injuries by the car door and ensure maximum safety to the customer.
Extrusion can be defined as the process of subjecting a material to compression so that it is forced to
flow through an opening of a die and takes the shape of the hole. Multi-hole extrusion is the process of
extruding the products through a die having more than one hole. Multi-hole extrusion increases the production
rate and reduces the cost of production. In this study the ram force has calculated experimentally for single hole
and multi-hole extrusion. The comparison of ram forces between the single hole and multi-hole extrusion
provides the inverse relation between the numbers of holes in a die and ram force. The experimental lengths of
the extruded products through the various holes of multi-hole die are different. It indicates that the flow pattern
is dependent on the material behavior. The micro-hardness test has done for the extruded products of lead
through multi-hole die. It is observed that the hardness of the extruded lead products from the central hole is
found to be more than that of the products extruded from other holes. The study suggests that multi-hole
extrusion can be used for obtaining the extruded products of lead with varying hardness. The micro-structure
study has done for the lead material before and after extrusion. It is observed that the size of grains of lead
material after extrusion is smaller than the original lead.
Analysis of Agile and Multi-Agent Based Process Scheduling Modelirjes
Β
As an answer of long growing frustration of waterfall Software development life cycle concepts,
agile software development concept was evolved in 90βs. The most popular agile methodologies is the Extreme
Programming (XP). Most software companies nowadays aim to produce efficient, flexible and valuable
Software in short time period with minimal costs, and within unstable, changing environments. This complex
problem can be modeled as a multi-agent based system, where agents negotiate resources. Agents can be used to
represent projects and resources. Crucial for the multi-agent based system in project scheduling model, is the
availability of an effective algorithm for prioritizing and scheduling of task. To evaluate the models, simulations
were carried out with real life and several generated data sets. The developed model (Multi-agent based System)
provides an optimized and flexible agile process scheduling and reduces overheads in the software process as it
responds quickly to changing requirements without excessive work in project scheduling.
Effects of Cutting Tool Parameters on Surface Roughnessirjes
Β
This paper presents of the influence on surface roughness of Co28Cr6Mo medical alloy machined
on a CNC lathe based on cutting parameters (rotational speed, feed rate, depth of cut and nose radius).The
influences of cutting parameters have been presented in graphical form for understanding. To achieve the
minimum surface roughness, the optimum values obtained for rpm, feed rate, depth of cut and nose radius were
respectively, 318 rpm, 0,1 mm/rev, 0,7 mm and 0,8 mm. Maximum surface roughness has been revealed the
values obtained for rpm, feed rate, depth of cut and nose radius were respectively, 318 rpm, 0,25 mm/rev, 0,9
mm and 0,4 mm.
Possible limits of accuracy in measurement of fundamental physical constantsirjes
Β
The measurement uncertainties of Fundamental Physical Constants should take into account all
possible and most influencing factors. One from them is the finiteness of the model that causes the existence of
a-priori error. The proposed formula for calculation of this error provides a comparison of its value with the
actual experimental measurement error that cannot be done an arbitrarily small. According to the suggested
approach, the error of the researched Fundamental Physical Constant, measured in conventional field studies,
will always be higher than the error caused by the finite number of dimensional recorded variables of physicalmathematical
models. Examples of practical application of the considered concept for measurement of fine
structure constant, speed of light and Newtonian constant of gravitation are discussed.
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...irjes
Β
With the rapid deployment of new wireless devices and applications, the last decade has witnessed a growing
demand for wireless radio spectrum. However, the policy of fixed spectrum assignment produces a bottleneck for more
efficient spectrum utilization, such that a great portion of the licensed spectrum is severely under-utilized. So the concept of
cognitive radio was introduced to address this issue.The inefficient usage of the limited spectrum necessitates the
development of dynamic spectrum access techniques, where users who have no spectrum licenses, also known as secondary
users, are allowed to use the temporarily unused licensed spectrum. For this purpose we have to know the presence or
absence of primary users for spectrum usage. So spectrums sensing is one of the major requirements of cognitive radio.Many
spectrum sensing techniques have been developed to sense the presence or absence of a licensed user. This paper evaluates
the performance of the energy detection based spectrum sensing technique in noisy and fading environments.The
performance of the energy detection technique will be evaluated by use of Receiver Operating Characteristics (ROC) curves
over additive white Gaussian noise (AWGN) and fading channels.
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...irjes
Β
In this paper, the conventional steel frames having triangular Pratt truss as a roofing system of 60 m
length, span 30m and varying bay spacing 4m, 5m and 6m respectively having eaves level for all the portals is at
10m and the EOT crane is supported at the height of 8m from ground level and pre-engineered steel frames of
same dimensions are analyzed and designed for wind zones (wind zone 2, wind zone 3, wind zone 4 and wind
zone 5) by using STAAD Pro V8i. The study deals with the comparative study of both conventional and preengineered
with respect to the amount of structural steel required, reduction in dead load of the structure.
Energy Awareness and the Role of βCritical Massβ In Smart Citiesirjes
Β
A Smart City could be depicted as a place, logical and physical, in which a crowd of heterogeneous
entities is related in time and space through different types of interactions. Any type of entity, whether it is a
device or a person, clustered in communities, becomes a source of context-based data.
Energy awareness is able to drive the process of bringing our society to limit energy waste and to optimize
usage of available resources, causing a strong environmental and social impact. Then, following social network
analysis methodologies related to the dynamics of complex systems, it is possible to find out, emergent and
sometimes hidden new habits of electricity usage. Through an initial Critical Mass, involving a multitude of
consumers, each related to more contexts, we evaluate the triggering and spreading of a collective attitude. To
this aim, in this paper, we propose a novel analytical model defining a new concept of critical mass, which
includes centrality measures both in a single layer and in a multilayer social network.
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...irjes
Β
Firefly algorithm is one of the emerging evolutionary approaches for complex and non-linear
optimization problems. It is inspired by natural fireflyβs behavior such as movement of fireflies based on
brightness and by overcoming the constraints such as light absorption, obstacles, distance, etc. In this research,
fireflyβs movement had been simulated computationally to identify the best parameters for spur gear pair by
considering the design and manufacturing constraints. The proposed algorithm was tested with the traditional
design parameters and found the results are at par in less computational time by satisfying the constraints.
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...irjes
Β
One of the main reasons for the aerodynamic drag in automotive vehicles is the flow separation
near the vehicleβs rear end. To delay this flow separation, vortex generators are used in recent vehicles. The
vortex generators are commonly used in aircrafts to prevent flow separation. Even though vortex generators
themselves create drag, but they also reduce drag by delaying flow separation at downstream. The overall effect
of vortex generators is more beneficial and proved by experimentation. The effect depends on the shape,size and
orientation of vortex generators. Hence optimized shape with proper orientation is essential for getting better
results.This paper presents the effect of vortex generators at different orientation to the flow field and the
mechanism by which these effects takes place.
An Assessment of The Relationship Between The Availability of Financial Resou...irjes
Β
The availability of financial resources is an important element in impacting the success of a planning
process for an effective physical planning. The extent to which however, they are articulated in the process
remained elusive both in scholarly and public discourse. The objective of this study wastherefore, to examine
the extent to which financial resources affect physical planning. In doing so, the study examinedwhether
financial resources were adequate or not to facilitate planning processes in Paidha. According to the study
findings,budget prioritization and ceilings are still a challenge in Paidha Town Council. This is partly due
limited level of knowledge of physical planning among the officials of Paidha Town Council. As a result, there
were no dedicated budget line for routine inspection of physical development plan compliance and enforcement
tools in Paidha. In conclusion, in addressing uncoordinated patterns of physical development that characterize
Ugandaβs urban centres, a critical starting point ought to be the analysis of physical planning process. The
research of this kind is not only significant to other emerging urban centres facing poor a road network,
mushrooming informal settlements and poor social services including poor pattern of residential and commercial
developments but also to all institutions that are involved in planning these towns. Knowing the extent of need
for financial influences in planning may assist local authorities to take the processes of planning seriously which
will help enhance the sustainable development of emerging urban centres including Paidha.
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...irjes
Β
- Person's desire to do a pregnancy examination is determined by the service place that suits the tastes
and facilities owned by it. Until now, the utilization of antenatal care by pregnant women is still low (Mardiana,
2014). The purpose of the study is to analyze factors affecting the utilization of antenatal care and delivery place
in Surabaya city based on the preferences and choice theory.
Type of survey research is cross sectional approach, the population is mothers who have children aged 1-
12 months in Surabaya. The large sample of 250 mothers who have children aged 1-12 months in 2013 is taken
by simple random sampling technique. Variables of the research are the preference elements and steps, choice
elements and steps, utilization of antenatal care and delivery place. Data were collected through questionnaires
and secondary data were then analyzed with descriptive statistics in the form of a frequency distribution, shown
by the schematic diagram.
The result showed that the preference elements and steps showed almost half (42.9%) desire to give birth
in a health care because of information got from someone else, while the choice element and step shows the
bulk (57.1%) of the criteria of delivery place chosen is a safe, comfortable and cheap delivery place, the labor
place which is the main choice most (57.1%) is cheap, comfortable, close.
Conclusion of the research based on the preferences and choice theory can be found three (3) new
theories, they are preferences become choice, preferences do not become choice, choice is preceded by
preferences
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Β
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overviewβ
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Β
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
Β
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Β
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
Β
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Β
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Β
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Β
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Β
Flip bifurcation and chaos control in discrete-time Prey-predator model
1. International Refereed Journal of Engineering and Science (IRJES)
ISSN (Online) 2319-183X, (Print) 2319-1821
Volume 4, Issue 7 (July 2015), PP.44-50
www.irjes.com 44 | Page
Flip bifurcation and chaos control in discrete-time
Prey-predator model
Alaa Hussein Lafta1,2
and V. C. Borkar2
1
Department of Mathematics, College of Science, University of Baghdad, Baghdad, Iraq.
2
Department of Mathematics & Statistics, Yeshwant Mahavidyalaya,
Swami Ramamnand Teerth Marthwada University, Nanded, India.
.
Abstract:- The dynamics of discrete-time prey-predator model are investigated. The result indicates that the
model undergo a flip bifurcation which found by using center manifold theorem and bifurcation theory.
Numerical simulation not only illustrate our results, but also exhibit the complex dynamic behavior, such as the
periodic doubling in period-2, -4 -8, quasi- periodic orbits and chaotic set. Finally, the feedback control method
is used to stabilize chaotic orbits at an unstable interior point.
Keywords:- Discrete model, bifurcation theory, manifold theorem, feedback control.
I. INTRODUCTION
The mathematical modeling of ecological problems has a long and successful history. It is well known
that the mathematical model has system of differential difference equations that describing the dynamics of the
interacting of species [1-3]. One of the following pioneering examples in mathematical ecology is the following
continuous-time population model with two equations:
π₯ = π₯ π β ππ¦ β ππ₯
π¦ = π¦(βπ + ππ₯ β ππ¦)
(1.1)
Where π₯(π‘) and π¦(π‘) are denoted to the population of two species at timeπ‘. If the parameters π, π, π, π, π and π
are all positive then these differential equations are used to describe two species with limit growth called
competing species [4-6]. If π = π = 0 with the positive parameters π, π, π and π then these differential
equations called the predator-prey model of Volterra and Lotka, (see [7-9] and their references).
Obviously, if π = π then the first equation in the model (1.1) represents the reproduction rate per
individual. A different equation holds for the second population, so we can see the system of ordinary
differential equations as in:
π₯ = ππ₯ 1 β π₯ β ππ₯π¦
π¦ = ππ¦ 1 β π¦ + ππ₯π¦
(1.2)
Where π, π and π are positive parameters such that π and π are the intrinsic growth rate of prey and predator
densities, respectively. If π = 0 then each population growth expontialy [6].
By applying the forward Eulerβs scheme to the model (1.2) we obtain the discrete-time prey-predator model as
follows:
π π+1 = π π + β[ππ π 1 β π π β ππ π ππ ]
ππ+1 = ππ + β[πππ 1 β ππ + ππ π ππ ]
(1.3)
Where β is the step size.
The following is the organization of this paper: In the second section, we discuss the existence and
local stability of possible fixed points of model(1.3). In the third section, we show that the model (1.3) undergo
flip bifurcation with choosing β as a bifurcation parameter. In the next section, we present the numerical
simulation which not only illustrate our results with theoretical analysis but also exhibit the complex dynamic
behavior in the model(1.3). In the fifth section, the feedback control method is used to control chaotic orbits at
an unstable positive fixed point. The conclusion is given in the last section.
II. ANALYSIS OF FIXED POINTS
In this section, the possible fixed points are obtained. The local stability conditions are organized and
proposed with some propositions as follow:
Let the model (1.3) equations equal to the vector (π, π) π
then with simple computation we get the following
fixed points:
1) π, π = (0,0) is the origin which always exists.
2) π, π = (1,0) is the first axial fixed point which means the prey population exist with absence of
predator one.
2. Flip bifurcation and chaos control in discrete-time prey-predator model
www.irjes.com 45 | Page
3) π, π = (0,1) is the second axial fixed point which means the predator population exist with absence
of prey one.
4) π, π = (π₯β
, π¦β
) is the unique positive fixed point which exist if and only if π > π, where π₯β
=
ππ βππ
ππ +π2
and π¦β
=
ππ +ππ
ππ +π2.
In the model(1.3), we have got two axial fixed points (1,0) and (0,1) becouse each prey and predator
population has no overlap between successive generations. So, their population evolves in discrete-time steps
and can be models by the logistic equation [9].
Now, to study the stability of each fixed point we shall obtain the variation matrix and its characteristic
equation. In general with (π, π) fixed point we get the following Jacobian matrix:
π½((π, π)) = 1+β π 1β2π βππ ββππ
βππ 1+β[π 1β2π +ππ]
(2.1)
And characteristic equation of π½((π, π)) is:
πΉ π = π2
+ ππ π½((π, π)) π + π·ππ‘(π½((π, π))) (2.2)
Where
ππ π½((π, π)) = 2 + β[π 1 β 2π + ππ β ππ]
and
π·ππ‘ π½((π, π)) = 1 + β π 1 β 2π + π 1 β 2π + ππ β ππ + β2
[π 1 β 2π β ππ][π 1 β 2π + ππ]
Hence the model (1.3) is a dissipative dynamical system if 1 + β π 1 β 2π + π 1 β 2π + ππ β ππ +
β2[π1β2πβ ππ][π1β2π+ππ]<1 [10].
The next propositions provide the local stability conditions near each fixed point with respect to the
Lemma in [9].
Proposition 2.1: The origin fixed point (0,0) is source.
Obviously, the roots of the originβs characteristic equation are π1 = 1 + βπ and π2 = 1 + βπ which are both
greater than one, i.e. ππ > 1 for all π = 1,2.
Proposition 2.2: The prey axial fixed point (1,0) is saddle if0 < β <
2
π
, source β >
2
π
and non-hyperbolic
ifβ =
2
π
.
We can see that ifβ =
2
π
, one of the eigenvalues of the fixed point (1,0) is β1 and other is not one with module.
Thus, the flip bifurcation may occur when the parameters vary in the neighborhood ofβ =
2
π
.
Proposition 2.3: There exist at least four different topological types of the predator axial fixed point (0,1) for
all values of parameters, which means (0,1) is:
a) Sink if π < π and 0 < β < minβ‘{
2
π
,
2
πβπ
};
b) Source if π < π and β > maxβ‘{
2
π
,
2
πβπ
} (or π > π and β >
2
π
);
c) Non-hyperbolic if π = π, β =
2
π
or β =
2
πβπ
;
d) Saddle otherwise.
We can easily see that one of the eigenvalues of the predator axial fixed point(0,1) is β1 and other is neither 1
nor β1 if the topological type (3) of proposition (2.3) holdes. Thus, the fixed point (0,1) can undergo flip
bifurcation because the system (1.3) restricted to logistic equation [8].
Proposition 2.4: if π > π then the unique positive fixed point(π₯β
, π¦β
) is:
1. Sink if one of the following conditions holds:
A. ββ₯ 0 and 0 < β < ββ;
B. β< 0 and 0 < β < ββββ;
2. Source if one of the following conditions holds:
A. ββ₯ 0 and β > βββ;
B. β< 0 and β > ββββ;
3. Non-hyperbolic if one of the following conditions holds:
A. ββ₯ 0 and β = ββ or βββ;
B. β< 0 and β = ββββ;
4. Saddle if the following conditions holds:
ββ₯ 0 andββ < β < βββ.
Where
ββ =
ππ π + ππ + ππ β π + β
ππ + π2
βββ =
ππ π + ππ + ππ β π β β
ππ + π2
4. Flip bifurcation and chaos control in discrete-time prey-predator model
www.irjes.com 47 | Page
Now, we determine the center manifold π€ π
(0,0) of model (3.4) at the fixed point (0,0) in small neighborhood
of ββ
= 0. By the center manifold theory we can obtain the approximate representation of the center manifold
π€ π
(0,0) as follow:
π€ π
0,0 = { ππ , π π : π π = π1ββ
+ π2ββ2
+ π3 ππ ββ
+ π4 ππ
2
+ π(( ππ + ββ 2
))}
Where
π1 = π2 = 0,
π3 =
1+π11 [π12 1+π11 +π22 π12]
π12(π2+1)2 β
π11 1+π11 +π21 π12
(π2+1)2 ,
π4 =
1+π11 [π14 π12+π24 1+π11 βπ13 1+π11 βπ23 π12]
1βπ2
2 .
Furthermore, we have
ππ+1 = βππ + πΉ ππ , ππ , ββ
= βππ + π1 ππ
2
+ π2 ππ ββ
+ π3 ππ
2
ββ
+ π4 ππ ββ2
+ π5 ππ
3
+ π(( ππ + ββ 3
))
Where
π1 =
1
π2 + 1
{π12 π14 π2 β π11 β 1 + π11 π13 π2 β π11 β π12 π23 β π24 π2 β π11
2
}
π2 =
1
π12 π2 + 1
{π12 π11 π2 β π11 β π21 π12 β [π12 π2 β π11 β π22 π12] 1 + π11 }
π3 =
π2
π12 π2 + 1
π12 π13 π2 β π11 β π23 π12 π2 β 2π11 β 1 + π12
2
π14 1 + π11
+ 2π12 π24 1 + π11 π2 + 1 +
π1
π12 π2 + 1
{π12 π11 π2 β π11 β π21 π12
+ π12
2
π14 π2 + 1 β π12 π2 β π11 β π22 π12 1 + π11 β π12 π24 1 + π11
2
}
π4 =
π3
π12 π2 + 1
π12 π13 π2 β π11 β π23 π12 π2 β 2π11 β 1 + π12
2
π14 1 + π11
+ 2π12 π24 1 + π11 π2 + 1
+
π2
π12 π2 + 1
π12 π11 π2 β π11 β π21 π12 β π12 π2 β π11 β π22 π12 = 0
π5 =
π4
π12 π2 + 1
{ π13 π2 β π11 β π23 π12 π2 β 2π11 β 1 + π12 π14 1 + π11 + 2π24[ 1 + π11 π2 + 1 ]}
There for, when model(3.4) is restricted to the center manifold π€ π
(0,0) we obtain the map πΊβ
as follows:
πΊβ
ππ = βππ + π1 ππ
2
+ π2 ππ ββ
+ π3 ππ
2
ββ
+ π4 ππ ββ2
+ π5 ππ
3
+ π(( ππ + ββ 3
)) β¦(3.5)
In order to undergo a flip bifurcation for a map, we require that two discriminatory quantities β1 and
β2 πππ πππ‘ π§πππ.
Where
β1= (πΊβ
π π ββ +
1
2
πΊβ
ββ πΊβ
π π π π
)
(0,0)
= π2
β2= (
1
6
πΊβ
π π π π π π
+ (
1
2
πΊβ
ββ πΊβ
π π π π
)2
)
(0,0)
= π1
2
+ π5
There for by the above analysis and the theorem in [11], we obtain the following result.
Theorem 3.1: if πΌ2 β 0 then model (3.2) undergo a flip bifurcation at the fixed point(π₯β
, π¦β
) when the
parameter ββ
varies in small neighborhood of the origin. Moreover, if πΌ2 > 0(resp. πΌ2 < 0), then the periodic
point which bifurcation from (π₯β
, π¦β
) are stable (resp. unstable).
IV. NUMERICAL SIMULATION
In this paper, we give the bifurcation diagram and phase portraits of model (1.3) to confirm the above
theoretical analysis and show the new interesting complex dynamical behaviors by using numerical simulation.
We will choose π = 2.5, π = 0.3, π = 0.2, (π₯0, π¦0) = (0.85, 0.55) and β β [1, 1.5] in model (1.3) as an
example.
Due to above parameter values and the control parameter range we have got that π₯β
, π¦β
=
0.7457, 2.1186 , ββ = 3.2054, β1= β1.8403 andβ2= 2.7747. Obviously, we have(π, π, π, ββ, β) β π1. The
figures (1) and(2) will show the correctness of theorem3.1.
From figure(1), we will see that the fixed point π₯β
, π¦β
= 0.7457, 2.1186 is stable for β < 1.3782 and loses
its stability with β = 1.3782 ; when β > 1.3782 the periodic doubling and chaos will appear with increasing
ofβ.
Due to bifurcation diagram (A) in figure (1), we see that the model (1.3) changes from stable to periodic
doubling, period-4, -8, quasi-periodic then chaotic when β = 1.03, 1.22, 1.37, 1.4, 1.448 and1.47, respectively.
5. Flip bifurcation and chaos control in discrete-time prey-predator model
www.irjes.com 48 | Page
The last but not at least, noted that if the control parameter β = 1.22 then β2= 2.7747 > 0 which means the
periodic double is stable due to the theorem (3.1) and this is good numerical example to confirm theoretical
analysis part(see figure(3)).
Figureπ: Phase portrait corresponding to figure π(π¨) here π = π. ππ, π. ππ, π. ππ, π. π, π. πππ
andπ. ππ, respectively.
6. Flip bifurcation and chaos control in discrete-time prey-predator model
www.irjes.com 49 | Page
Figure3: The phase portrait of stable periodic double when π = π. ππ
V. CONTROL CHAOS
In this section, the feedback control method [13-14] is used to stabilize chaotic orbits at an unstable
positive fixed point of model(1.3).
Consider the following controlled form of model(1.3) :
π π+1 = π π + β ππ π 1 β π π β ππ π ππ + π π
ππ+1 = ππ + β πππ 1 β ππ + ππ π ππ
(5.1)
with the following feedback control law as the control force:
π π = βπ1 π π β πβ
βπ2(ππ β πβ
) (5.2)
where π1,2 is the feedback gain and (πβ
, πβ
) is a positive fixed point of model(1.3).
The Jacobian matrix of model 5.1 at a fixed point (πβ
, πβ
) is
π½((πβ
, πβ
)) = π11βπ1 π12βπ2
π21 π22
where π11, π12, π21 and π22 are given in model (3.3).
The corresponding characteristic equation of matrix π½((πβ
, πβ
)) is:
π2
β π11 + π22βπ1 π + π22 π11βπ1 β π21(π12βπ2 ) = 0 (5.3)
Let π1,2 are the eigenvalues of (5.3) , then
π1 + π2 = π11 + π22βπ1 (5.4)
and
π1 π2 = π22 π11βπ1 β π21(π12βπ2 ) (5.5)
The lines of marginal stability are determined by solving the equationπ1 = Β±1 andπ1 π2 = 1. These conditions
guarantee that the eigenvalues π1 and π2 have modulus less than 1.
Supposeπ1 π2 = 1; from(5.5) we have line π1 as follows:
π22 π1 β π21 π2 = π11 π22 β 1 (5.6)
Supposeπ1 = 1, β1; from(5.5) and (5.6) we have lines π2 and π3as follows:
(1 β π22)π1 + π21 π2 = π11 + π22 β 1 β π11 π22 + π12 π21 (5.7)
and
(1 + π22)π1 β π21 π2 = π11 + π22 + 1 + π11 π22 β π12 π21 (5.8)
The stable eigenvalues lie within a triangular region by line π1 π2 and π3 .Therefore, some numerical
simulations can be made to control the unstable fixed point (πβ
, πβ
) by the state feedback method.
The parameters are selected as a = 0.79, π = 0.3, π = 0.2, β = 4 , (π, π) = (0.85, 0.55) and the feedback
gain π1 = β 1.17502, π2 = 0.18334. A chaotic trajectory is stabilized at the fixed point (0.395161, 1.592742)
(see Figure (4)).
7. Flip bifurcation and chaos control in discrete-time prey-predator model
www.irjes.com 50 | Page
Figure 4: The time responses for the state X, Y of the controlled model (5.1) in the (n, X), (n, Y) plane.
VI. CONCLUSION
In this paper, the dynamical behavior of model (1.3) is discussed. Ifπ > π, then the unique positive
fixed point (π₯β
, π¦β
) arise beside the fixed points (0,0), (1,0) and(0,1). The model (1.3) exhibit complex and
interesting dynamical behavior when the control parameter β is varying. That is if (π, π, π, β) β π1or π2 and
taking β as bifurcation parameter, then the flip bifurcation appears for the model(1.3). Moreover, the chaos
control in model (1.3) is obtained.
ACKNOWLEDGMENT
The authors are thankful the ICCR-India and the Iraqi Government for the financial support.
REFERENCES
[1]. A. J. Lotka, Elements of mathematical biology, Dover, New York, 1962.
[2]. E. C. Piolou, An introduction to mathematical ecology, Wiley-inter science, New-York, 1969.
[3]. R. M. May, Stability and complexity model eco-system, Princeton, NJ: Princeton university press,
1973.
[4]. M. W. Hirsch and S. Smale, Differential equations, dynamical systems and linear algebra, Academic
press, 1974.
[5]. K. T. Alligood, T. D. Sauer and J. A. York, Chaos: An introduction to dynamical systems, 1996.
[6]. W. E. Boyce and R. C. Diprima, Elementary differential equations and boundary value problems, 7th
edition, John- wily and sons, New- York, 2001.
[7]. M. J. Smith, Modeling in ecology, Cambridge university press, Cambridge, 1974.
[8]. J. D Murray, Mathematical biology, 3rd
edition, Springer-Verlage, Berlin, 2004.
[9]. X. Liu and D. Xiao, Complex dynamics behavior of discrete-time predator- prey system, Chaos,
solutions and fractals, 32(2007), 80-94.
[10]. H. N. Agiza, E. M. Elabbasy, H. E. Metwally and A. A. Elsadany, Chaotic dynamics of discrete prey-
predator model with Holling type II, Non-linear analyses, Real world applications, 10(2009), 116-124.
[11]. C. Robinson, Dynamical systems, stability, symbolic dynamics and chaos, 2nd
edtion, London, New
York, Washinton(DC), Boca Raton, 1999.
[12]. J. Guchenheimer and P. Holmos, Nonlinear oscillation, dynamical system and bifurcation of vector
field, New York: Springer- Verlage, P.P.(160-165)1983.
[13]. Z. Hu, Z. Teng, C. Jia1, C. Zhang and L. Zhang, Dynamical analysis and chaos control of a discrete
SIS epidemic model, Advances in Difference Equations, 58 (2014), 1-20.
[14]. J. C. Doyle, B. Francis and A. Tannenbaum, Feedback Control Theory, Macmillan Publishing
Company, New York, 1992.