Next Article in Journal
A New Approach for Dynamic Stochastic Fractal Search with Fuzzy Logic for Parameter Adaptation
Next Article in Special Issue
On a Five-Parameter Mittag-Leffler Function and the Corresponding Bivariate Fractional Operators
Previous Article in Journal
Image Compression Using Fractal Functions
Previous Article in Special Issue
Electrical Circuits RC, LC, and RLC under Generalized Type Non-Local Singular Fractional Operator
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Fractional SAIDR Model in the Frame of Atangana–Baleanu Derivative

Department of Mathematics, Faculty of Arts and Sciences, Balıkesir University, Balıkesir 10145, Turkey
*
Author to whom correspondence should be addressed.
Fractal Fract. 2021, 5(2), 32; https://doi.org/10.3390/fractalfract5020032
Submission received: 27 February 2021 / Revised: 31 March 2021 / Accepted: 9 April 2021 / Published: 15 April 2021
(This article belongs to the Special Issue Fractional Calculus and Special Functions with Applications)

Abstract

:
It is possible to produce mobile phone worms, which are computer viruses with the ability to command the running of cell phones by taking advantage of their flaws, to be transmitted from one device to the other with increasing numbers. In our day, one of the services to gain currency for circulating these malignant worms is SMS. The distinctions of computers from mobile devices render the existing propagation models of computer worms unable to start operating instantaneously in the mobile network, and this is particularly valid for the SMS framework. The susceptible–affected–infectious–suspended–recovered model with a classical derivative (abbreviated as SAIDR) was coined by Xiao et al., (2017) in order to correctly estimate the spread of worms by means of SMS. This study is the first to implement an Atangana–Baleanu (AB) derivative in association with the fractional SAIDR model, depending upon the SAIDR model. The existence and uniqueness of the drinking model solutions together with the stability analysis are shown through the Banach fixed point theorem. The special solution of the model is investigated using the Laplace transformation and then we present a set of numeric graphics by varying the fractional-order θ with the intention of showing the effectiveness of the fractional derivative.

1. Introduction

Although computer worms are collected under the category of computer viruses, they can be treated as a separate group owing to their distinct characteristics. First and foremost, our intervention is not needed for computer worms to transmit whereas it is a must for viruses, as they need a user to have access to an electronic document, directive, or software, etc. In addition, computer worms are able to autonomously transmit themselves and are also capable of producing replicas of themselves; this grants worms the capacity to generate numerous duplicates for being transmitted to and infecting other computers.
Mobile worms have become increasingly contagious in parallel with the immense expansion of the cellular network system and the growing demand on mobile phones. The majority of these worms carry the potential to cause irrepairable damages to the mobile domain; for example, it is quite likely that private information can be seized, collected, or leaked from an infected device by computer worms. Furthermore, the fact that the smart phones available in the market today are open to plenty of security breaches entails probable widespread infections by the mobile malware in question, which carries a significant risk. In the meantime, people employ many diverse means to circulate various electronic documents, participate in a variety of pursuits, or attend gatherings on the Internet with the smart phones at their disposal, and these practices call forth the invasion of mobile devices by worms. Therefore, SMS has also become one of the typical system components via which worms are transmitted. A term called an “SMS-based worm”, which is a variety of mobile worms, has been coined in the literature following the example of Sea [1], Cckun [2], Selfmite [3], and xxShenQi [4], which are the most prominent examples of relevance amongst others.
In order to assess the impact of memory on computer models, fractional calculus rises to prominence, which also yields more accurate outcomes. That is to say, fractional calculus is more versatile compared to classical calculus owing to hereditary features and the definition of memory. Caputo [5], Liouville-Caputo [6], as well as Caputo and Fabrizio [7] set forth a great deal of conceptions concerning fractional order operators and these conceptions have been proven quite efficacious when devising representations of many real-world problems [8,9,10,11,12,13,14,15,16,17,18,19]. In addition, the said derivatives have been proven quite efficient when one adopts numerical methods and examines the relation between distinct problems by means of comparison. It can be seen in a number of studies that employing fractional order derivatives yields more successful outcomes in terms of acquiring real data for distinct worm models [20,21]. Performed according to the principal of a generalised Mittag–Leffler function in the role of a non-singular and non-local kernel, an innovative fractional order derivative was brought into operation for the first time by Atangana and Baleanu [22] in 2016. This newly defined Atangana–Baleanu (AB) derivative obtains better results in many actual problems [22,23,24,25,26,27,28].
The purpose of this work was to delve into a susceptible–affected–infectious–suspended–recovered (SAIDR) model, a type of fractional order model which, for the first time, was put forward in [29] employing a classical derivative aimed at SMS-based worm propagation in mobile networks, on the basis of more favourable fractional calculus theories. As long as susceptible users of mobile devices refrain from opening the links that are harmful, it is not possible for them to instantly enter into the infected state even if the malicious message is delivered to the said devices. This is the reason behind the addition of the affected state into [29] by its authors; abbreviated as state A ( t ) , it delineates the circumstance when a harmful link is delivered to a user but not yet opened. What is more, particularly if the phone is damaged, the harmful message is not invariably circulated by an infected node. Thus, another new state is also instituted, which is the suspended state, going by the abbreviation of state D ( t ) . This is of a unique quality since a harmful message cannot be circulated by an infected smart phone in spite of its existence in the given device. Lastly, the overall quantity of worm nodes are separated as follows: N = S t + A t + I t + D t + R t , i.e., S t susceptible state, A t affected state, I t infected state, D t suspended state, R t recovered state. The integer order differential equation system which puts forth the SAIDR model in [29] can be seen below:
d S t d t = μ N γ S β S I μ S , d A t d t = β S I δ A η A μ A , d I t d t = η A σ I τ I μ I , d D t d t = τ I φ D μ D , d R t d t = γ S + δ A + σ I + φ D μ R .
The variable factors concerning the model alter at time t as follows: the susceptible node is converted into the affected state by β , the ratio of infection, when a harmful electronic message is delivered to it from another point of intersection. The worm is transmitted to the node which is in the affected state by a ratio of η in the event that it is rendered active by the affected node opening the malignant link enclosed in the message. The node shifts into the suspended state from the infected state by a transition ratio of τ . Meanwhile, certain software against malware might be set up in mobile devices in order to block or erase harmful messages. Once the said software are set up, the phone cannot permanently remain in the infected state. These safety software can also be set up in the wake of a maintenance process, provided that the phone stays in the special suspended state. Hence, the node is able to shift into the ultimate recovered state regardless of its current state. The ratios by which the node recovers from states S t , A t , I t , and D t to state R t are denominated as γ , δ , σ , φ in the order given.
The article is further structured with the subdivisions specified below: in order to clarify the remaining body of this work, several fundamental notions are introduced in Section 2. Section 3 substantiates the existence and uniqueness of the solution for the proposed model, while we scrutinize the specific solution for the model along with the Laplace transformation and approach the stability analysis concerning the technique by means of the fixed point principle in Section 4. In Section 5, this fractional order model is numerically depicted so as to review the total effect. Finally, we bring our study to an end by debating the acquired outcomes.

2. Some Preliminaries

Here, we recall some fundamental notions.
Definition 1.
The A B R fractional derivative (R denotes Riemann–Liouville type) is defined by [30]
A B R D a + θ f t = F θ 1 θ d d t a t f x E θ θ 1 θ t x θ d x
for 0 < θ < 1 , a < t < b and f L 1 a , b .
Definition 2.
The A B C fractional derivative (C denotes Caputo type) is defined by [30]
A B C D a + θ f t = F θ 1 θ a t f x E θ θ 1 θ t x θ d x
for 0 < θ < 1 , a < t < b and f a differentiable function on a , b such that f L 1 a , b .
Definition 3.
The A B fractional integral operator A B I a + θ defined by [30]
A B I a + θ f t = 1 θ F θ f t + θ F θ R L I a + θ f t .
In the above definitions, the function E θ is the Mittag–Leffler function given by
E θ = n = 0 x n Γ θ n + 1 .

3. Existence of a Unique Solution

In the present work, we enlarged the model (1) by substituting the time derivative by the Atangana–Baleanu derivative. With this change, the right- and left-hand sides will not have the same dimensions. To overcome this matter, we used an auxiliary parameter κ with the dimension of s, to change the fractional operator so that the sides have the same dimension [31]. Thereby, we give the following fractional system:
1 κ 1 θ 0 A B C D t θ S t = μ N γ S β S I μ S , 1 κ 1 θ 0 A B C D t θ A t = β S I δ A η A μ A , 1 κ 1 θ 0 A B C D t θ I t = η A σ I τ I μ I , 1 κ 1 θ 0 A B C D t θ D t = τ I φ D μ D , 1 κ 1 θ 0 A B C D t θ R t = γ S + δ A + σ I + φ D μ R .
with the initial numbers S 0 = S 0 , A 0 = A 0 , I 0 = I 0 , D 0 = D 0 , R 0 = R 0 where a A B C D t θ is the AB derivative in Caputo type and θ 0 , 1 .
In this part, we prove that the system (6) has a unique solution. Implementing the fractional integral into the system (6) by handling the Corollary 2.3 in [30], we have:
S t S 0 = 1 θ κ 1 ϑ F θ μ N γ S t β S t I t μ S t + θ κ 1 ϑ F θ Γ θ 0 t t λ θ 1 μ N γ S λ β S λ I λ μ S λ d λ , A t A 0 = 1 θ κ 1 ϑ F θ β S t I t δ A t η A t μ A t + θ κ 1 ϑ F θ Γ θ 0 t t λ θ 1 β S λ I λ δ A λ η A λ μ A λ d λ , I t I 0 = 1 θ κ 1 ϑ F θ η A t σ I t τ I t μ I t + θ κ 1 ϑ F θ Γ θ 0 t t λ θ 1 η A λ σ I λ τ I λ μ I λ d λ , D t D 0 = 1 θ κ 1 ϑ F θ τ I t φ D t μ D t + θ κ 1 ϑ F θ Γ θ 0 t t λ θ 1 τ I λ φ D λ μ D λ d λ , R t R 0 = 1 θ κ 1 ϑ F θ γ S t + δ A t + σ I t + φ D t μ R t + θ κ 1 ϑ F θ Γ θ 0 t t λ θ 1 γ S λ + δ A λ + σ I λ + φ D λ μ R λ d λ .
Let:
P 1 t , S = μ N γ S t β S t I t μ S t , P 2 t , A = β S t I t δ A t η A t μ A t , P 3 t , I = η A t σ I t τ I t μ I t , P 4 t , D = τ I t φ D t μ D t , P 5 t , R = γ S t + δ A t + σ I t + φ D t μ R t .
Theorem 1.
The kernel P 1 satisfies the Lipschitz condition and contraction if the following inequality holds:
0 < γ + μ + β c 1 .
Proof of Theorem 1.
Let S and S 1 be two functions, we have:
P 1 t , S P 1 t , S 1 = γ S t S 1 t + β I t S t S 1 t + μ S t S 1 t γ + μ + β I t S t S 1 t .
Taking ε 1 = γ + μ + β c where S t a , A t b , I t c , D t d , R t e are bounded functions. Then, we find:
P 1 t , S P 1 t , S 1 ε 1 S t S 1 t .
Hence, we find that the Lipschitz condition is provided by P 1 and since 0 < γ + μ + β c 1 , P 1 is also a contraction. □
Similarly, the other kernels P 2 , P 3 , P 4 and P 5 satisfy the Lipschitz condition and contraction:
P 2 t , A P 2 t , A 1 ε 2 A t A 1 t , P 3 t , I P 3 t , I 1 ε 3 I t I 1 t , P 4 t , D P 4 t , D 1 ε 4 D t D 1 t , P 5 t , R P 5 t , R 1 ε 5 R t R 1 t .
Regarding kernels P 1 , P 2 , P 3 , P 4 , P 5 , Equation (7) becomes:
S t = S 0 + 1 θ κ 1 θ F θ P 1 t , S + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 1 λ , S d λ , A t = A 0 + 1 θ κ 1 θ F θ P 2 t , A + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 2 λ , A d λ , I t = I 0 + 1 θ κ 1 θ F θ P 3 t , I + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 3 λ , I d λ , D t = D 0 + 1 θ κ 1 θ F θ P 4 t , D + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 4 λ , D d λ , R t = R 0 + 1 θ κ 1 θ F θ P 5 t , R + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 5 λ , R d λ .
Considering Equation (11) for the following recursive formula:
S n t = 1 θ κ 1 θ F θ P 1 t , S n 1 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 1 λ , S n 1 d λ , A n t = 1 θ κ 1 θ F θ P 2 t , A n 1 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 2 λ , A n 1 d λ , I n t = 1 θ κ 1 θ F θ P 3 t , I n 1 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 3 λ , I n 1 d λ , D n t = 1 θ κ 1 θ F θ P 4 t , D n 1 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 4 λ , D n 1 d λ , R n t = 1 θ κ 1 θ F θ P 5 t , R n 1 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 5 λ , R n 1 d λ .
where S 0 t = S 0 , A 0 t = A 0 , I 0 t = I 0 , D 0 t = D 0 , R 0 t = R 0 .
We deal with the difference between successive terms as below:
Φ 1 n t = S n t S n 1 t = 1 θ κ 1 θ F θ P 1 t , S n 1 P 1 t , S n 2 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 1 λ , S n 1 P 1 λ , S n 2 d λ , Φ 2 n t = A n t A n 1 t = 1 θ κ 1 θ F θ P 2 t , A n 1 P 2 t , A n 2 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 2 λ , A n 1 P 2 λ , A n 2 d λ , Φ 3 n t = I n t I n 1 t = 1 θ κ 1 θ F θ P 3 t , I n 1 P 3 t , I n 2 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 3 λ , I n 1 P 3 λ , I n 2 d λ , Φ 4 n t = D n t D n 1 t = 1 θ κ 1 θ F θ P 4 t , D n 1 P 4 t , D n 2 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 4 λ , D n 1 P 4 λ , D n 2 d λ , Φ 5 n t = R n t R n 1 t = 1 θ κ 1 θ F θ P 5 t , R n 1 P 5 t , R n 2 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 5 λ , R n 1 P 5 λ , R n 2 d λ .
Notice that:
S n t = j = 0 n Φ 1 j t , A n t = j = 0 n Φ 2 j t , I n t = j = 0 n Φ 3 j t , D n t = j = 0 n Φ 4 j t , R n t = j = 0 n Φ 5 j t .
In the light of Φ i n i = 1 , 2 , 3 , 4 , 5 definition and benefiting from triangular identity, we obtain:
Φ 1 n t = S n t S n 1 t = 1 θ κ 1 θ F θ P 1 t , S n 1 P 1 t , S n 2 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 1 λ , S n 1 P 1 λ , S n 2 d λ .
Since the kernel P 1 provides a Lipschitz condition, we obtain:
Φ 1 n t = S n t S n 1 t 1 θ κ 1 θ F θ ε 1 S n 1 S n 2 + θ κ 1 θ F θ Γ θ ε 1 0 t t λ θ 1 S n 1 S n 2 d λ .
and:
Φ 1 n t 1 θ κ 1 θ F θ ε 1 Φ 1 n 1 t + θ κ 1 θ F θ Γ θ ε 1 0 t t λ θ 1 Φ 1 n 1 λ d λ .
Analogously, we obtain the following results:
Φ 2 n t 1 θ κ 1 θ F θ ε 2 Φ 2 n 1 t + θ κ 1 θ F θ Γ θ ε 2 0 t t λ θ 1 Φ 2 n 1 λ d λ , Φ 3 n t 1 θ κ 1 θ F θ ε 3 Φ 3 n 1 t + θ κ 1 θ F θ Γ θ ε 3 0 t t λ θ 1 Φ 3 n 1 λ d λ , Φ 4 n t 1 θ κ 1 θ F θ ε 4 Φ 4 n 1 t + θ κ 1 θ F θ Γ θ ε 4 0 t t λ θ 1 Φ 4 n 1 λ d λ Φ 5 n t 1 θ κ 1 θ F θ ε 5 Φ 5 n 1 t + θ κ 1 θ F θ Γ θ ε 5 0 t t λ θ 1 Φ 5 n 1 λ d λ .
According to the results in hand, we determine that the system (6) has a solution.
Theorem 2.
The fractional SAIDR system (6) has a solution, if there exist t i , i = 1 , 2 , 3 , 4 , 5 such that:
1 θ κ 1 θ F θ ε i + t 0 θ κ 1 θ F θ Γ θ ε i < 1 .
Proof of Theorem 2.
We know that S t , A t , I t , D t , R t are bounded functions and the kernels provide a Lipschitz condition. Using Equations (17) and (18), we have:
Φ 1 n t S n 0 1 θ κ 1 θ F θ ε 1 + t θ κ 1 θ F θ Γ θ ε 1 n , Φ 2 n t A n 0 1 θ κ 1 θ F θ ε 2 + t θ κ 1 θ F θ Γ θ ε 2 n Φ 3 n t I n 0 1 θ κ 1 θ F θ ε 3 + t θ κ 1 θ F θ Γ θ ε 3 n Φ 4 n t D n 0 1 θ κ 1 θ F θ ε 4 + t θ κ 1 θ F θ Γ θ ε 4 n , Φ 5 n t R n 0 1 θ κ 1 θ F θ ε 5 + t θ κ 1 θ F θ Γ θ ε 5 n .
Thus, Function (14) exists and is smooth. We aim to show that these functions are the solution of Equation (6), assuming that:
S t S 0 = S n t g ¯ 1 n t , A t A 0 = A n t g ¯ 2 n t , I t I 0 = I n t g ¯ 3 n t D t D 0 = D n t g ¯ 4 n t , R t R 0 = R n t g ¯ 5 n t .
Thus, we have:
g ¯ 1 n t = 1 θ κ 1 θ F θ P 1 t , S P 1 t , S n 1 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 1 λ , S P 1 λ , S n 1 d λ 1 θ κ 1 θ F θ P 1 t , S P 1 t , S n 1 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 1 λ , S P 1 λ , S n 1 d λ 1 θ κ 1 θ F θ ε 1 S S n 1 + t θ κ 1 θ F θ Γ θ ε 1 S S n 1 .
Repeating this method, we obtain at t 0 :
g ¯ 1 n t 1 θ κ 1 θ F θ + t 0 θ κ 1 θ F θ Γ θ n + 1 γ 1 n + 1 M .
As n approaches , g ¯ 1 n t 0 . In the same way, it can be shown that g ¯ i n t 0 i = 2 , 3 , 4 , 5 . □
To show the uniqueness of the solution, we suppose that the system (6) has another solution S 1 t , A 1 t , I 1 t , R 1 t then:
S t S 1 t = 1 θ κ 1 θ F θ P 1 t , S P 1 t , S 1 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 1 λ , S P 1 λ , S 1 d λ 1 θ κ 1 θ F θ P 1 t , S P 1 t , S 1 + θ κ 1 θ F θ Γ θ 0 t t λ θ 1 P 1 λ , S P 1 λ , S 1 d λ .
Regarding the Lipschitz condition of S, we gain:
S t S 1 t 1 θ κ 1 θ F θ ε 1 S t S 1 t + t θ κ 1 θ F θ Γ θ ε 1 S t S 1 t .
This gives:
S t S 1 t 1 1 θ κ 1 θ F θ ε 1 t θ κ 1 θ F θ Γ θ ε 1 0 .
Obviously S t = S 1 t , if the following inequality holds:
1 1 θ κ 1 θ F θ ε 1 t θ κ 1 θ F θ Γ θ ε 1 > 0
then S t S 1 t = 0 . Therefore, we gain:
S t = S 1 t .
In the same way, we find:
A t = A 1 t , I t = I 1 t , D t = D 1 t , R t = R 1 t .

4. Stability Analysis by Fixed Point Theory

In this section, we give a special solution of the fractional SAIDR model (6) with a recursive formula by using Laplace transform. The Laplace transform for the AB fractional derivative was introduced by Atangana and Baleanu [22] as follows:
Theorem 3.
Let θ 0 , 1 , a < b and g H 1 a , b . The Laplace transform for the AB derivative in the Caputo type is presented by:
L 0 A B C D t θ g t p = F θ 1 θ p θ L g t p p θ 1 g 0 p θ + θ 1 θ .
We apply the Laplace transform to the Equation (6), then:
L 1 κ 1 θ 0 A B C D t θ S t p = L μ N γ S t β S t I t μ S t p , L 1 κ 1 θ 0 A B C D t θ A t p = L β S t I t δ A t η A t μ A t p , L 1 κ 1 θ 0 A B C D t θ I t p = L η A t σ I t τ I t μ I t p , L 1 κ 1 θ 0 A B C D t θ D t p = L τ I t φ D t μ D t p , L 1 κ 1 θ 0 A B C D t θ R t p = L γ S t + δ A t + σ I t + φ D t μ R t p .
Benefiting from the Laplace transform definition of the AB derivative, we obtain:
F θ 1 θ 1 p θ + θ 1 θ p θ L S t p p θ 1 S 0 = κ 1 θ L μ N γ S t β S t I t μ S t p ,
F θ 1 θ 1 p θ + θ 1 θ p θ L A t p p θ 1 A 0 = κ 1 θ L β S t I t δ A t η A t μ A t p ,
F θ 1 θ 1 p θ + θ 1 θ p θ L I t p p θ 1 I 0 = κ 1 θ L η A t σ I t τ I t μ I t p ,
F θ 1 θ 1 p θ + θ 1 θ p θ L D t p p θ 1 D 0 = κ 1 θ L τ I t φ D t μ D t p ,
F θ 1 θ 1 p θ + θ 1 θ p θ L R t p p θ 1 R 0 = κ 1 θ L γ S t + δ A t + σ I t + φ D t μ R t p .
Regulating Equation (27), we derive:
L S t p = 1 p S 0 + ψ κ 1 θ × L μ N γ S t β S t I t μ S t p , L A t p = 1 p A 0 + ψ κ 1 θ × L β S t I t δ A t η A t μ A t p , L I t p = 1 p I 0 + ψ κ 1 θ × L η A t σ I t τ I t μ I t p , L D t p = 1 p D 0 + ψ κ 1 θ × L τ I t φ D t μ D t p , L R t p = 1 p R 0 + ψ κ 1 θ × L γ S t + δ A t + σ I t + φ D t μ R t p ,
where:
ψ = 1 θ + θ p θ 1 F θ .
Thus, we have the following iterative formula by taking the inverse Laplace transform both sides of all equations, as follows:
S n + 1 t = S n 0 + L 1 ψ κ 1 θ S T μ N γ S t β S t I t μ S t p , A n + 1 t = A n 0 + L 1 ψ κ 1 θ S T β S t I t δ A t η A t μ A t p , I n + 1 t = I n 0 + L 1 ψ κ 1 θ S T η A t σ I t τ I t μ I t p , D n + 1 t = D n 0 + L 1 ψ κ 1 θ S T τ I t φ D t μ D t p , R n + 1 t = R n 0 + L 1 ψ κ 1 θ S T γ S t + δ A t + σ I t + φ D t μ R t p .
The approximate solution of the model (6) is as below:
S t = lim n S n t , A t = lim n A n t , I t = lim n I n t , D t = lim n D n t , R t = lim n R n t .

Stability Analysis of Iteration Method

Considering the Banach space X , . , a self map T on X and the recursive method q n + 1 = ϕ T , q n . We assume that t n γ is the fixed point set of T which γ T Ø and lim n q n = q γ t . We also suppose that t n γ and r n = t n + 1 ϕ T , t n . If lim n r n = 0 implies that lim n t n = q , then the iteration method q n + 1 = ϕ T , q n is T-stable. We suppose that our sequence t n has an upper boundary. If Picard’s iteration q n + 1 = T q n satisfies all conditions, then q n + 1 = T q n is T-stable.
Theorem 4.
Let X , . be Banach space and T : X X be a map satisfying:
T x T y K x T x + k x y ,
for all x , y X , where 0 K , 0 k < 1 . Then, T is Picard T-stable [32].
Theorem 5.
Assume that T is a self map defined as below:
T S n t = S n + 1 t = S n t + L 1 ψ κ 1 θ × L μ N γ S t β S t I t μ S t p , T A n t = A n + 1 t = A n t + L 1 ψ κ 1 θ × L β S t I t δ A t η A t μ A t p , T I n t = I n + 1 t = I n t + L 1 ψ κ 1 θ × L η A t σ I t τ I t μ I t p , T D n t = D n + 1 t = D n t + L 1 ψ κ 1 θ × L τ I t φ D t μ D t p , T R n t = R n + 1 t = R n t + L 1 ψ κ 1 θ × L γ S t + δ A t + σ I t + φ D t μ R t p .
Then, the iteration is T-stable in L 1 a , b if the following statements are achieved:
1 μ + γ h 1 γ ¯ β M 3 + M 1 h 2 γ ¯ < 1 , 1 β M 3 + M 1 h 3 γ ¯ δ + η + μ h 4 γ ¯ < 1 , 1 + η h 5 γ ¯ σ + τ + μ h 6 γ ¯ < 1 , 1 + τ h 7 γ ¯ φ + μ h 8 γ ¯ < 1 , 1 + γ h 9 γ ¯ + δ h 10 γ ¯ + σ h 11 γ ¯ + φ h 12 γ ¯ μ h 13 γ ¯ < 1 .
Proof. 
To show that T has a fixed point, we evaluated the following for i , j N × N :
T S i t T S j t = S i t S j t + L 1 ψ κ 1 θ × L μ N γ S i t β S i t I i t μ S i t p L 1 ψ κ 1 θ × L μ N γ S j t β S j t I j t μ S j t p .
Taking the norm, Equation (30) is converted to:
T S i t T S j t   =   S i t S j t + L 1 ψ κ 1 θ × L μ N γ S i t β S i t I i t μ S i t p L 1 ψ κ 1 θ × L μ N γ S j t β S j t I j t μ S j t p .
Using norm properties, we obtain:
T S i t T S j t     S i t S j t + L 1 ψ κ 1 θ × L γ + μ S i t S j t β I i t S i t S j t + S j t I i t I j t p
Since the solutions play the same role, we assume that:
S i t S j t A i t A j t I i t I j t     D i t D j t     R i t R j t
From Equations (31) and (32), we find:
T S i t T S j t     S i t S j t + L 1 ψ κ 1 θ × L γ + μ S i t S j t p + L 1 ψ κ 1 θ × L β I i S i t S j t + S j S i t S j t p
Because S i t , A i t , I i t , D i t and R i t are bounded, for all t there exists M i , i = 1 , 2 , 3 , 4 , 5 such that:
S i t M 1 , A i t M 2 , I i t M 3 , D i t M 4 , R i t M 5 .
Here, considering Equations (33) and (34), we have:
T S i t T S j t     S i t S j t × 1 γ + μ h 1 γ ¯ β M 3 + M 1 h 2 γ ¯
where h i are functions from L 1 ψ κ 1 θ L . In an analogous way, we achieve:
T A i t T A j t A i t A j t × 1 β M 3 + M 1 h 3 γ ¯ δ + η + μ h 4 γ ¯ ,
T I i t T I j t I i t I j t × 1 + η h 5 γ ¯ σ + τ + μ h 6 γ ¯ ,
T D i t T D j t D i t D j t × 1 + τ h 7 γ ¯ φ + μ h 8 γ ¯ ,
T R i t T R j t R i t R j t × 1 + γ h 9 γ ¯ + δ h 10 γ ¯ + σ h 11 γ ¯ + φ h 12 γ ¯ μ h 13 γ ¯
where:
1 γ + μ h 1 γ ¯ β M 3 + M 1 h 2 γ ¯ < 1 , 1 β M 3 + M 1 h 3 γ ¯ δ + η + μ h 4 γ ¯ < 1 , 1 + η h 5 γ ¯ σ + τ + μ h 6 γ ¯ < 1 , 1 + τ h 7 γ ¯ φ + μ h 8 γ ¯ < 1 , 1 + γ h 9 γ ¯ + δ h 10 γ ¯ + σ h 11 γ ¯ + φ h 12 γ ¯ μ h 13 γ ¯ < 1 .
Therefore, T has a fixed point. Considering Equations (35) and (36), we assume:
k = 0 , 0 , 0 , 0 , 0 , K = 1 γ + μ h 1 γ ¯ β M 3 + M 1 h 2 γ ¯ , 1 β M 3 + M 1 h 3 γ ¯ δ + η + μ h 4 γ ¯ , 1 + η h 5 γ ¯ σ + τ + μ h 6 γ ¯ , 1 + τ h 7 γ ¯ φ + μ h 8 γ ¯ 1 + γ h 9 γ ¯ + δ h 10 γ ¯ + σ h 11 γ ¯ + φ h 12 γ ¯ μ h 13 γ ¯ .
Thus, all the conditions of Theorem 4 are satisfied. This completes the proof. □

5. Numerical Results

With the aim of obtaining the solution, through some equations of fractional derivatives with a non-local and non-singular kernel, Toufik and Atangana [33] presented a novel numerical scheme based on the fundamental theorem of fractional calculus and a two-step Lagrange polynomial. We give the so-called method for the fractional SMS-based worm propagation model in mobile networks (6). At a point t = t n + 1 , we apply this scheme to Equation (12):
S n + 1 = S 0 + 1 θ κ 1 θ F θ P 1 t n , S t n + θ F θ k = 0 n h θ P 1 t k , S k Γ θ + 2 n k + 1 θ n k + 2 + θ n k θ n k + 2 + 2 θ h θ P 1 t k 1 , S k 1 Γ η + 2 n k + 1 θ + 1 n k θ n k + 1 + θ + 1 L n θ ,
A n + 1 = A 0 + 1 θ κ 1 θ F θ P 2 t n , A t n + θ F θ k = 0 n h θ P 2 t k , A k Γ θ + 2 n k + 1 θ n k + 2 + θ n k θ n k + 2 + 2 θ h θ P 2 t k 1 , A k 1 Γ η + 2 n k + 1 θ + 1 n k θ n k + 1 + θ + 2 L n θ ,
I n + 1 = I 0 + 1 θ κ 1 θ F θ P 3 t n , I t n + θ F θ k = 0 n h θ P 3 t k , I k Γ θ + 2 n k + 1 θ n k + 2 + θ n k θ n k + 2 + 2 θ h θ P 3 t k 1 , I k 1 Γ η + 2 n k + 1 θ + 1 n k θ n k + 1 + θ + 3 L n θ ,
D n + 1 = D 0 + 1 θ κ 1 θ F θ P 4 t n , D t n + θ F θ k = 0 n h θ P 4 t k , D k Γ θ + 2 n k + 1 θ n k + 2 + θ n k θ n k + 2 + 2 θ h θ P 4 t k 1 , D k 1 Γ η + 2 n k + 1 θ + 1 n k θ n k + 1 + θ + 4 L n θ ,
R n + 1 = R 0 + 1 θ κ 1 θ F θ P 5 t n , R t n + θ F θ k = 0 n h θ P 5 t k , R k Γ θ + 2 n k + 1 θ n k + 2 + θ n k θ n k + 2 + 2 θ h θ P 5 t k 1 , R k 1 Γ η + 2 n k + 1 θ + 1 n k θ n k + 1 + θ + 5 L n θ ,
where i L n θ , i = 1 , 2 , 3 , 4 , 5 are remainder terms given by
1 L n θ = θ F θ Γ θ k = 0 n t k t k 1 λ t k λ t k 1 2 ! 2 λ 2 P 1 λ , S λ λ = ε λ t n + 1 λ η 1 d λ , 2 L n θ = θ F θ Γ θ k = 0 n t k t k 1 λ t k λ t k 1 2 ! 2 λ 2 P 2 λ , A λ λ = ε λ t n + 1 λ η 1 d λ , 3 L n θ = θ F θ Γ θ k = 0 n t k t k 1 λ t k λ t k 1 2 ! 2 λ 2 P 3 λ , I λ λ = ε λ t n + 1 λ η 1 d λ , 4 L n θ = θ F θ Γ θ k = 0 n t k t k 1 λ t k λ t k 1 2 ! 2 λ 2 P 4 λ , D λ λ = ε λ t n + 1 λ η 1 d λ , 5 L n θ = θ F θ Γ θ k = 0 n t k t k 1 λ t k λ t k 1 2 ! 2 λ 2 P 5 λ , R λ λ = ε λ t n + 1 λ η 1 d λ .
The numerical productions of the model (6) are hereby displayed by the foregoing method. To this end, the initial conditions are posited as S 0 = 99 , 000 , A 0 = 500 , I 0 = 500 , D 0 = 0 , R 0 = 0 and the variable factors μ = 0.000001 , η = 0.003 , δ = 0.003 , σ = 0.004 , τ = 0.001 , φ = 0.007 , β = 0.000003 are selected as specified in [29]. Any elevation or decline in the susceptible nodes, affected nodes, infected nodes, suspended nodes, or recovered nodes with respect to the distinct fractional order, and the numerical amounts of the chosen variable quantities are displayed by the figures. Figure 1a illustrates the preliminary elevation in the quantity of infected nodes which rises to the highest point, nearly 20% of the overall amount present within the structure at approximately the 300th minute; but afterwards, this number diminishes at a fast pace. It follows from here that SMS is one of the ways that enables the worm to be quickly transmitted throughout the mobile network. Figure 1b–d indicate that the quantity of infected nodes gradually rises while the fractional order declines. Hence, we can assert that SMS is a means for the worm to transmit itself gradually; however, the quantity of infected nodes that continues existing in the system is higher.
In order to illustrate the reasonableness of the fractional SAIDR model, let us herein investigate the ratio of infection and the ratio of transition between infected and suspended states, which are two substantial variables. Figure 2a,b evince that a larger quantity of nodes will be contaminated more quickly as the infection rate scales up. To put it differently, as β for the fractional order θ = 0.95 and θ = 0.65 elevates, the worm circulates more swiftly. For this reason, it is possible to say that reducing the infection ratio results in an acceleration of the duration during which the harmful software is wiped out. It follows from Figure 3a,b that the graph τ = 0.003 hits the lowest point when the graph τ = 0.001 comes to the topmost more or less simultaneously, approximately at the 400th min, reciprocally involving the three graphs’ highest points. A smaller amount of nodes becomes simultaneously contaminated as a consequence of the escalation in transition ratios to the suspended state from the infected state. The reason is that a smaller number of nodes continue staying in the infected state since a greater amount of nodes are able to shift to the suspended state from the infected state with the escalating ratio.

6. Conclusions

A novel fractional order derivative involving a Mittag–Leffler kernel has recently been introduced by Atangana in cooperation with Baleanu. First and foremost, the AB derivative broadens the scope of the model grounding on [29] so that we can consider the additional implementation of the relevant fractional derivative and monitor the propagation of computer worms in mobile networks more comprehensively. We propound a fractional model which carries the probability of not having any closed form solution since it is nonlinear. Hence, the circumstances providing the existence and uniqueness of the solution regarding this fractional SAIDR model become evident, and the special solution is thus reproduced through the Laplace transform. Lastly, we apply numerical simulations of this model so as to reach efficacy with this novel derivative provided with a fractional order. Additionally, we express the impact that infection ratio has on infected nodes numerically, and on the grounds of the relevant graphics, we conclude that diminishing the ratio of infection speeds up the duration during which the malignant software are eliminated.

Author Contributions

Conceptualization, E.U. and S.U.; methodology, S.U., F.E. and N.Ö.; software, F.E.; validation, E.U., S.U., F.E. and N.Ö.; formal analysis, F.E. and N.Ö.; investigation, E.U., S.U., F.E. and N.Ö.; resources, E.U., S.U., F.E. and N.Ö.; writing—original draft preparation, E.U., S.U., F.E. and N.Ö.; writing—review and editing, E.U., S.U., F.E. and N.Ö.; visualization, S.U. and F.E.; supervision, N.Ö.; project administration, S.U. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by Balikesir University Research Grant No. BAP 2020/014.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Abraham, S.; Smith, I.C. An overview of social engineering malware: Trends, tactics, and implications. Technol. Soc. 2010, 32, 183–196. [Google Scholar] [CrossRef]
  2. CNCENT/CC, CCKUN-A Mobile Malware Spreading in Social Relationship Networks by SMS. 2013. Available online: https://www.cert.org.cn/publish/main/8/2013/20130924145326642925406/20130924145326642925406_.html (accessed on 10 February 2021).
  3. Computer World, Android SMS Worm Selfmite Is Back, More Aggressive Than Ever. 2013. Available online: http://www.computerworld.com/article/2824619/android-sms-worm-selfmite-is-back-more-aggressive-than-ever.html (accessed on 10 February 2021).
  4. CNCENT/CC. The Bulletin about the Outbreak and Response of the xxShenQi Malware. 2014. Available online: https://www.cert.org.cn/publish/main/12/2014/20140803174220396365334/20140803174220396365334_.html (accessed on 10 February 2021).
  5. Podlubny, I. Fractional Differential Equations: An Introduction to Fractional Derivatives to Methods of Their Solution and Some of Their Applications; Academic Press: San Diego, CA, USA, 1999. [Google Scholar]
  6. Caputo, M.; Mainardi, F. A new dissipation model based on memory mechanism. Pure Appl. Geophys. 1971, 91, 134–147. [Google Scholar] [CrossRef]
  7. Caputo, M.; Fabrizio, F. A new definition of fractional derivative without singular kerne. Prog. Fract. Differ. Appl. 2015, 1, 73–85. [Google Scholar]
  8. Koca, I. Analysis of rubella disease model with non-local and non-singular fractional derivatives. Int. J. Optim. Control Theor. Appl. 2018, 8, 17–25. [Google Scholar] [CrossRef] [Green Version]
  9. Jajarmi, A.; Baleanu, D. A new fractional analysis on the interaction of HIV with CD4+ T-cells. Chaos Solitons Fractals 2018, 113, 221–229. [Google Scholar] [CrossRef]
  10. Uçar, S.; Özdemir, N.; Koca, I.; Altun, E. Novel analysis of the fractional glucose insulin regulatory system with non-singular kernel derivative. Eur. Phys. J. Plus 2020, 135, 414. [Google Scholar] [CrossRef]
  11. Özdemir, N.; Agrawal, O.P.; İskender, B.B.; Karadeniz, D. Fractional optimal control of a 2-dimensional distributed system using eigenfunctions. Nonlinear Dyn. 2009, 55, 251–260. [Google Scholar] [CrossRef]
  12. Baleanu, D.; Fernandez, A.; Akgül, A. On a fractional operator combining proportional and classical differintegrals. Mathematics 2020, 8, 13. [Google Scholar] [CrossRef] [Green Version]
  13. Uçar, E.; Özdemir, N.; Altun, E. Fractional order model of immune cells influenced by cancer cells. Math. Model. Nat. 2019, 14, 12. [Google Scholar]
  14. Evirgen, F.; Özdemir, N. Multistage adomian decomposition method for solving NLP problems over a nonlinear fractional dynamical system. J. Comput. Nonlinear Dyn. 2011, 6. [Google Scholar] [CrossRef]
  15. Evirgen, F. Conformable Fractional Gradient Based Dynamic System for Constrained Optimization Problem. Acta Phys. Pol. A 2017, 132, 1066–1069. [Google Scholar] [CrossRef]
  16. Uçar, E.; Özdemir, N. A fractional model of cancer-immune system with Caputo and Caputo–Fabrizio derivatives. Eur. Phys. J. Plus 2021, 136, 1–17. [Google Scholar] [CrossRef] [PubMed]
  17. Aljoudi, S.; Ahmad, B.; Alsaedi, A. Existence and uniqueness results for a coupled system of Caputo-Hadamard fractional differential equations with nonlocal Hadamard type integral boundary conditions. Fractal Fract. 2020, 4, 15. [Google Scholar] [CrossRef] [Green Version]
  18. Baleanu, D.; Hakimeh, M.; Shahram, R. A fractional differential equation model for the COVID-19 transmission by using the Caputo–Fabrizio derivative. Adv. Differ. Eq. 2020, 2020, 299. [Google Scholar] [CrossRef] [PubMed]
  19. Aliyu, A.I.; Inc, M.; Yusuf, A.; Baleanu, D. A fractional model of vertical transmission and cure of vector-borne diseases pertaining to the Atangana–Baleanu fractional derivatives. Chaos Solitons Fractals 2018, 116, 268–277. [Google Scholar] [CrossRef]
  20. Uçar, S. Analysis of a basic SEIRA model with Atangana-Baleanu derivative. AIMS Math. 2020, 5, 1411–1424. [Google Scholar] [CrossRef]
  21. Kumar, D.; Singh, J. New aspects of fractional epidemiological model for computer viruses with Mittag–Leffler law. In Mathematical Modelling in Health, Social and Applied Sciences; Dutta, H., Ed.; Springer: Singapore, 2020; pp. 283–301. [Google Scholar]
  22. Atangana, A.; Baleanu, D. New fractional derivatives with nonlocal and non-singular kernel: Theory and application to heat transfer model. Therm. Sci. 2016, 20, 763–769. [Google Scholar] [CrossRef] [Green Version]
  23. Fernandez, A.; Baleanu, D.; Srivastava, H.M. Series representations for fractional-calculus operators involving generalised Mittag-Leffler functions. Commun. Nonlinear Sci. Numer. 2019, 67, 517–527. [Google Scholar] [CrossRef] [Green Version]
  24. Baleanu, D.; Jajarmi, A.; Hajipour, M. On the nonlinear dynamical systems within the generalized fractional derivatives with Mittag-Leffler kernel. Nonlinear Dyn. 2018, 94, 397–414. [Google Scholar] [CrossRef]
  25. Qureshi, S.; Yusuf, A.; Shaikh, A.A.; Inc, M.; Baleanu, D. Fractional modeling of blood ethanol concentration system with real data application. Chaos 2019, 29, 131–143. [Google Scholar] [CrossRef]
  26. Uçar, S.; Uçar, E.; Özdemir, N.; Hammouch, Z. Mathematical analysis and numerical simulation for a smoking model with Atangana-Baleanu derivative. Chaos Solitons Fractals 2019, 118, 300–306. [Google Scholar] [CrossRef]
  27. Yavuz, M.; Özdemir, N.; Başkonuş, H.M. Solutions of partial differential equations using the fractional operator involving Mittag-Leffler kernel. Eur. Phys. J. Plus 2018, 133, 1–11. [Google Scholar] [CrossRef]
  28. Fernandez, A.; Husain, I. Modified Mittag-Leffler functions with applications in complex formulae for fractional calculus. Fractal Fract. 2020, 4, 15. [Google Scholar] [CrossRef]
  29. Xiao, X.; Fu, P.; Hu, G.; Sangiah, A.K.; Zheng, H.; Jiang, Y. SAIDR: A new dynamic model for SMS-based worm propagation in mobile networks. IEEE Access 2017, 5, 9935–9943. [Google Scholar] [CrossRef]
  30. Baleanu, D.; Fernandez, A. On some new properties of fractional derivatives with Mittag-Leffler kernel. Commun. Nonlinear Sci. Numer. Simul. 2018, 59, 444–462. [Google Scholar] [CrossRef] [Green Version]
  31. Gómez-Aguilar, J.F.; Rosales-García, J.J.; Bernal-Alvarado, J.J. Fractional mechanical oscillators. Rev. Mex. FíSica 2012, 58, 348–352. [Google Scholar]
  32. Qing, Y.; Rhoades, B.E. T-stability of Picard iteration in metric spaces. Fixed Point Theory Appl. 2008, 2008. [Google Scholar] [CrossRef] [Green Version]
  33. Mekkaoui, T.; Atangana, A. New numerical approximation of fractional derivative with non-local and non-singular kernel: Application to chaotic models. Eur. Phys. J. Plus 2017, 132, 1–16. [Google Scholar]
Figure 1. Numerical simulation of Equation (6) for (a) θ = 0.95 ; (b) θ = 0.85 ; (c) θ = 0.75 ; and (d) θ = 0.65 .
Figure 1. Numerical simulation of Equation (6) for (a) θ = 0.95 ; (b) θ = 0.85 ; (c) θ = 0.75 ; and (d) θ = 0.65 .
Fractalfract 05 00032 g001
Figure 2. Effect of β on the infected nodes for the fractional order (a) θ = 0.95 and (b) θ = 0.65 , respectively.
Figure 2. Effect of β on the infected nodes for the fractional order (a) θ = 0.95 and (b) θ = 0.65 , respectively.
Fractalfract 05 00032 g002
Figure 3. Relation between τ and infected nodes for the fractional order (a) θ = 0.95 and (b) θ = 0.65 , respectively.
Figure 3. Relation between τ and infected nodes for the fractional order (a) θ = 0.95 and (b) θ = 0.65 , respectively.
Fractalfract 05 00032 g003
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Uçar, E.; Uçar, S.; Evirgen, F.; Özdemir, N. A Fractional SAIDR Model in the Frame of Atangana–Baleanu Derivative. Fractal Fract. 2021, 5, 32. https://doi.org/10.3390/fractalfract5020032

AMA Style

Uçar E, Uçar S, Evirgen F, Özdemir N. A Fractional SAIDR Model in the Frame of Atangana–Baleanu Derivative. Fractal and Fractional. 2021; 5(2):32. https://doi.org/10.3390/fractalfract5020032

Chicago/Turabian Style

Uçar, Esmehan, Sümeyra Uçar, Fırat Evirgen, and Necati Özdemir. 2021. "A Fractional SAIDR Model in the Frame of Atangana–Baleanu Derivative" Fractal and Fractional 5, no. 2: 32. https://doi.org/10.3390/fractalfract5020032

Article Metrics

Back to TopTop