Research article Special Issues

Population persistence under two conservation measures: Paradox of habitat protection in a patchy environment


  • Anthropogenic modification of natural habitats is a growing threat to biodiversity and ecosystem services. The protection of biospecies has become increasingly important. Here, we pay attention to a single species as a conservation target. The species has three processes: reproduction, death and movement. Two different measures of habitat protection are introduced. One is partial protection in a single habitat (patch); the mortality rate of the species is reduced inside a rectangular area. The other is patch protection in a two-patch system, where only the mortality rate in a particular patch is reduced. For the one-patch system, we carry out computer simulations of a stochastic cellular automaton for a "contact process". Individual movements follow random walking. For the two-patch system, we assume an individual migrates into the empty cell in the destination patch. The reaction-diffusion equation (RDE) is derived, whereby the recently developed "swapping migration" is used. It is found that both measures are mostly effective for population persistence. However, comparing the results of the two measures revealed different behaviors. ⅰ) In the case of the one-patch system, the steady-state densities in protected areas are always higher than those in wild areas. However, in the two-patch system, we have found a paradox: the densities in protected areas can be lower than those in wild areas. ⅱ) In the two-patch system, we have found another paradox: the total density in both patches can be lower, even though the proportion of the protected area is larger. Both paradoxes clearly occur for the RDE with swapping migration.

    Citation: Nariyuki Nakagiri, Hiroki Yokoi, Yukio Sakisaka, Kei-ichi Tainaka. Population persistence under two conservation measures: Paradox of habitat protection in a patchy environment[J]. Mathematical Biosciences and Engineering, 2022, 19(9): 9244-9257. doi: 10.3934/mbe.2022429

    Related Papers:

    [1] Jing Zhang, Haoliang Zhang, Ding Lang, Yuguang Xu, Hong-an Li, Xuewen Li . Research on rainy day traffic sign recognition algorithm based on PMRNet. Mathematical Biosciences and Engineering, 2023, 20(7): 12240-12262. doi: 10.3934/mbe.2023545
    [2] Yongmei Ren, Xiaohu Wang, Jie Yang . Maritime ship recognition based on convolutional neural network and linear weighted decision fusion for multimodal images. Mathematical Biosciences and Engineering, 2023, 20(10): 18545-18565. doi: 10.3934/mbe.2023823
    [3] Hong Qi, Guanglei Zhang, Heming Jia, Zhikai Xing . A hybrid equilibrium optimizer algorithm for multi-level image segmentation. Mathematical Biosciences and Engineering, 2021, 18(4): 4648-4678. doi: 10.3934/mbe.2021236
    [4] Shikai Wang, Heming Jia, Xiaoxu Peng . Modified salp swarm algorithm based multilevel thresholding for color image segmentation. Mathematical Biosciences and Engineering, 2020, 17(1): 700-724. doi: 10.3934/mbe.2020036
    [5] Xiao Ma, Xuemei Luo . Finger vein recognition method based on ant colony optimization and improved EfficientNetV2. Mathematical Biosciences and Engineering, 2023, 20(6): 11081-11100. doi: 10.3934/mbe.2023490
    [6] Shuai Cao, Biao Song . Visual attentional-driven deep learning method for flower recognition. Mathematical Biosciences and Engineering, 2021, 18(3): 1981-1991. doi: 10.3934/mbe.2021103
    [7] Sakorn Mekruksavanich, Wikanda Phaphan, Anuchit Jitpattanakul . Epileptic seizure detection in EEG signals via an enhanced hybrid CNN with an integrated attention mechanism. Mathematical Biosciences and Engineering, 2025, 22(1): 73-105. doi: 10.3934/mbe.2025004
    [8] Jinhua Zeng, Xiulian Qiu, Shaopei Shi . Image processing effects on the deep face recognition system. Mathematical Biosciences and Engineering, 2021, 18(2): 1187-1200. doi: 10.3934/mbe.2021064
    [9] Jing Wang, Jiaohua Qin, Xuyu Xiang, Yun Tan, Nan Pan . CAPTCHA recognition based on deep convolutional neural network. Mathematical Biosciences and Engineering, 2019, 16(5): 5851-5861. doi: 10.3934/mbe.2019292
    [10] Basem Assiri, Mohammad Alamgir Hossain . Face emotion recognition based on infrared thermal imagery by applying machine learning and parallelism. Mathematical Biosciences and Engineering, 2023, 20(1): 913-929. doi: 10.3934/mbe.2023042
  • Anthropogenic modification of natural habitats is a growing threat to biodiversity and ecosystem services. The protection of biospecies has become increasingly important. Here, we pay attention to a single species as a conservation target. The species has three processes: reproduction, death and movement. Two different measures of habitat protection are introduced. One is partial protection in a single habitat (patch); the mortality rate of the species is reduced inside a rectangular area. The other is patch protection in a two-patch system, where only the mortality rate in a particular patch is reduced. For the one-patch system, we carry out computer simulations of a stochastic cellular automaton for a "contact process". Individual movements follow random walking. For the two-patch system, we assume an individual migrates into the empty cell in the destination patch. The reaction-diffusion equation (RDE) is derived, whereby the recently developed "swapping migration" is used. It is found that both measures are mostly effective for population persistence. However, comparing the results of the two measures revealed different behaviors. ⅰ) In the case of the one-patch system, the steady-state densities in protected areas are always higher than those in wild areas. However, in the two-patch system, we have found a paradox: the densities in protected areas can be lower than those in wild areas. ⅱ) In the two-patch system, we have found another paradox: the total density in both patches can be lower, even though the proportion of the protected area is larger. Both paradoxes clearly occur for the RDE with swapping migration.



    In recent years, artificial intelligence technique has advanced rapidly [1,2,3]. Biometric recognition [4,5,6], which includes face recognition, voice recognition, fingerprint recognition, iris recognition, eye pattern recognition, etc. will occupy a very important position in the field of artificial intelligence in the future. At present, technologies such as smart cards based on radio frequency identification, second-generation ID cards, and user passwords are mostly used in identification, and biometrics will gradually occupy an important market share.

    Due to the superiority of biometrics, it is widely used in bank payment, securities, transportation, e-commerce, airport subway entrance access control, attendance, and criminal investigation by public security and judicial departments [7,8,9]. Major enterprises, institutions, companies, and government agencies have established their own biometric-based access control systems and attendance systems to improve the informatization and intelligence of management, greatly improve management efficiency, and effectively liberate the labor force [10,11,12,13].

    Face recognition technology started relatively late, but the technology related to face recognition [37] has developed rapidly, and has achieved remarkable results in recognition accuracy, etc., and related technical achievements have attracted worldwide attention. Due to the lack of prior knowledge of face images, large illumination changes, complex backgrounds, and variable face angles, the demand for face images is large, expression changes are large, and face occlusion leads to low accuracy of face recognition.

    Deep learning applications often use convolutional neural networks to achieve image processing and recognition with high efficiency and accuracy [14,15,16,17]. Facial images are highly structured images. Combining with prior facial knowledge is a very popular method in face recognition.

    Dong et al. proposed an image super-resolution method based on deep convolutional neural network [18], which realizes the mapping from the low-resolution end to the high-resolution end of the image, and extends the traditional super-resolution method based on coding coefficients. Since then, the research of neural network combined with image super-resolution has continued to deepen. Kim et al. [19] proposed the use of very deep convolutional neural network on the basis of VGG network to improve the super-resolution accuracy by using multiple filters in the neural network, and realize the use of image context information.

    Yu et al. proposed a transforming and distinguishing neural network [20] for the serious problems of multi-posture and degradation, and solving the problem of multi-posture and image misalignment. As the depth of the network increases, the features gradually disappear during the transmission process. In response to this problem, the multi-scale residual network image super-resolution (MSRN) algorithm [21] uses the combination of local multi-scale features and global features to maximize utilizing the features of low-resolution images; the problem of feature disappearance during transmission is solved. There are various existing algorithms and deep learning models [38,39,40] in which not only can they facilitate face recognition, but also perform human activity recognition and motion prediction.

    In this paper, we propose a face detection and recognition model based on multi-task convolutional neural network (MTCNN) [22,23,24]. The recognition model combined with deep learning has a high accuracy rate, and has a shorter recognition time, which can reduce the waste of human resources.

    MTCNN implements the face area detection and face key point detection together, and its subject framework is similar to cascade. The whole can be divided into a three-layer network structure of Proposal Network (P-Net), Refine Network (R-Net), and Output Network (O-Net) [25,26]. It is a multi-task neural network model for face detection tasks which mainly uses three cascaded networks and the idea of candidate boxes plus classifiers.

    The three cascaded networks are P-Net for quickly generating candidate windows, R-Net for filtering and selecting high-precision candidate windows, and O-Net for generating final bounding boxes and face key points. And many convolutional neural network models that deal with image problems; the model also uses image pyramids, border regression, non-maximum suppression and other technologies. The network structure of P-Net, R-Net and O-Net is shown in Figure 1.

    Figure 1.  Network structure of P-Net, R-Net and O-Net (a) P-Net; (b) R-Net; (c) O-Net.

    To balance computational expenses and performance, MTCNN avoids the huge performance consumption caused by traditional ideas such as sliding windows and classifiers, we first use a small model to generate a candidate frame for the target area with a certain possibility, and then use a more complex model for fine classification. Then we return the higher-precision area box, and let this step be executed recursively. The network structure of MTCNN is presented by Figure 2.

    Figure 2.  Our network pertaining to MTCNN.

    R-CNN [27] draws on the idea of sliding window and adopts the scheme of area recognition. The specific identification scheme is the first step. Given an input image, extract 2000 independent candidate regions from the image; the second step is to use CNN to extract a fixed-length feature vector for each region; the third step, we use SVM to classify each area. Figure 3 shows the process of R-CNN in the recognition of faces.

    Figure 3.  The process of R-CNN in the recognition of faces.

    Faster R-CNN [28,29] creatively uses the convolutional network to generate the suggestion frame by itself, and shares the convolutional network with the target detection network, so that the number of suggestion frames is reduced from about 2000 to 300. This framework can even be combined with nonlinear anisotropic diffusion filtering and other morphological methods to perform denoising of image. To ensure excellent face recognition, the noise and the other unrelated background areas can be removed. The process of Faster R-CNN to recognize faces is shown in Figure 4.

    Figure 4.  The process of Faster R-CNN in the recognition of faces.

    The commonly used kernel functions [30] include linear kernel functions [31,32], Gaussian kernel functions [33,34], and other similar algorithms. One of the most commonly used is the Gaussian kernel function, which can map feature data to infinite dimensions.

    The linear kernel function is mainly used in the case of linear separability, which can achieve a good classification effect. The mathematical expression of the linear kernel function is shown in Eq (1). There are few parameters in the function, so the computation rate is very fast, and the dimension of its input space is the same as the dimension of the feature space, which is suitable for the first attempt in the classification task.

    K(X,Y)=(XTY+C) (1)

    In Eq (1), X and Y represent eigenvectors, and C represents a constant.

    The Gaussian kernel function can map the sample from the input space to the higher-dimensional feature space, and it can achieve good results regardless of the sample size. When the classification task cannot determine which kernel function to use, the Gaussian kernel function is the most widely used one of the kernel functions. The mathematical expression of the Gaussian kernel function is shown in Eq (2).

    K(X,Y)=exp(XY22σ2) (2)

    In particular, σ in Eq (2) is the width parameter of the function, which controls the radial range of the function.

    We collect 2500 face images for our face recognition research in this paper. During the test, the data set is divided into the original image data set and the test data set according to the parity position. The two images at the corresponding positions of the two data sets are the comparison objects, as shown in Figure 5. Then, we apply the algorithm of this paper to these two data sets, and extract the images out in turn. Table 1 show the gender ratio and picture size of the two data sets.

    Figure 5.  Sample images of the original image data set and the test data set.
    Table 1.  Gender ratio and image size of the two data sets.
    Characteristics Original image data set Test data set
    Male: Female 10: 15 13: 12
    Image size 1897×1897 1897×1897

     | Show Table
    DownLoad: CSV

    The high-resolution face image reconstructed after the algorithm processing requires a certain measurement standard to examine the performance of the algorithm. The earlier evaluation standard was subjective evaluation through naked eye observation. This method is simple and direct. The objective evaluation calculates the similarity between the synthesized image and the original image, and has a specific value to measure the reconstruction result of the image. Compared with the subjective evaluation, its advantage is that the comparison result is more concise and accurate. At present, the commonly used objective evaluation methods include Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index Measurement (SSIM) [35,36].

    PSNR is an image quality evaluation method based on the error between corresponding pixels. It is the most common image quality evaluation index, and its expression is as Eq (3).

    PSNR=10log10((2b1)2MSE) (3)

    In Eq (3), b is the number of bits of the pixel, which is usually 8. The unit of PSNR is decibel (dB). The larger the value means higher quality of the reconstructed image. Mean Square Error (MSE) represents the mean square error between images. The symbol h represents the height of the image, and w represents the width of the image. The expression is shown in Eq (4).

    MSE=1h×whi=1wj=1[X1(i,j)X2(i,j)]2 (4)

    However, because the human perception of an area will be affected by the surrounding area and other reasons, this method does not take into account the human visual characteristics, but only calculates the difference between pixels, so the result of the peak signal-to-noise ratio evaluation method will appear to be different from that of humans.

    The value of SSIM is a value between 0 and 1. The larger the value of SSIM, explant the smaller the difference between both photos of the faces. Therefore, the larger the value of SSIM replies the better the image reconstruction quality. The SSIM method measures image similarity from three aspects: brightness (L), contrast (C), and structure (S). The expression of SSIM is shown in Eq (5).

    SSIM(X,Y)=L(X,Y)×C(X,Y)×S(X,Y) (5)

    SSIM simulates the human perception of changes in image information, uses the image average to model the image brightness, the image standard deviation to model the image contrast, and the image covariance to model the image structure, which makes up for the shortcomings of the PSNR method.

    Receiver operating characteristic (ROC) curve is a comprehensive indicator that reflects the sensitivity and specificity of continuous variables. Each point on the ROC curve reflects the susceptibility to the same signal stimulus.

    The abscissa is false positive rate (FPR), that is, the proportion of all negative samples that are predicted to be positive but actually negative. The larger the FPR, the positive prediction the more negative classes in the class. The computational FPR is as Eq (6).

    FPR=FPTN+FN (6)

    The ordinate is true positive rate (TPR), the proportion of all positive samples that are predicted to be positive and actually positive. The larger the TPR stands the more actual positive classes in the predicted positive class. The computational TPR is as Eq (7).

    TPR=TPTP+FP (7)

    In Eqs (6) and (7), True Positive (TP), the prediction is a positive sample and the actual number of features is also a positive sample. False Positive (FP), the number of features predicted to be a positive sample and actually a negative sample. True Negative (TN) is predicted to be a negative sample and is actually the number of features of a negative sample. False Negative (FN), the number of features predicted to be negative samples and actually positive samples.

    In order to better recognize the face image, this paper implements the Gaussian kernel function as the mapping function in the model. In order to achieve the best results, we need to adjust three parameters, which are the local constraint parameter λ, the kernel function similarity parameter σ, and the high resolution layer constraint parameter k.

    We fix the value of k and the kernel function similarity parameter σ, and set the value range of λ to be 0.01 to 0.12. The mean value of PSNR and mean value of SSIM as the evaluation criteria change with the value of λ as shown in Figure 6(a), (b). As shown in the figure, when λ = 0.08, the average PSNR of MTCNN and Faster R-CNN is the largest, and when λ = 0.08, the average PSNR of R-CNN is the largest. The average value of SSIM reaches its peak. Since the difference between the two values is very small, the value of λ is selected here as 0.08.

    Figure 6.  Parameter optimization of λ, σ and k in the face recognition framework based on MTCNN, R-XNN, and Faster R-CNN.

    We fix the values of k and λ, and set the value of the kernel function similarity parameter σ from 200 to 1000. The average value of PSNR and the average value of SSIM as the evaluation criteria change with the value of σ as shown in Figure 6(c), (d). We find that when the σ value is 400, the average PSNR of the three models reaches the maximum, while the average SSIM reaches the peak at σ = 400 and 500. Combining the two objective evaluation criteria, we choose σ = 400.

    We set the values of λ and the kernel function similarity parameter σ, and set the value of the high-resolution layer error term parameter k to 0.01 to 0.10. As the evaluation criteria, the mean value of PSNR and mean value of SSIM change with the value of k as shown in Figure 6(e), (f). It can be clearly seen from the following line chart that both the mean PSNR and the mean SSIM peak when k takes 0.05, so we determine the optimal value of k to be 0.05.

    From the optimization parameters, we know that when our parameters are set to λ as 0.08, σ as 400 and k as 0.05, the three models are in the optimal state. Table 2 shows the average values of PSNR and SSIM of the three models.

    Table 2.  Results of mean PSNR and mean SSIM of the three models.
    Model PSNR (dB) SSIM
    MTCNN 36.245 0.954
    R-CNN 35.005 0.927
    Faster R-CNN 35.305 0.938

     | Show Table
    DownLoad: CSV

    From Table 2, the mean PSNR and SSIM pertaining to the MTCNN are better than R-CNN and Faster R-CNN. The average PSNR of our method is 1.24 dB higher than that of R-CNN and 0.94 dB higher than that of Faster R-CNN. The average SSIM of MTCNN is 10.3% higher than R-CNN and 8.7% higher than Faster R-CNN.

    Figure 7 shows the ROC curves of MTCNN, R-CNN and Faster R-CNN. The Area Under Curve (AUC) of MTCNN is 97.56%, the AUC of R-CNN is 91.24%, and the AUC of Faster R-CNN is 92.01%. MTCNN has the best overall face recognition performance. For detection of faces, MTCNN still has the best effect.

    Figure 7.  ROC curves of MTCNN, R-CNN and Faster R-CNN.

    In actual scenes, the acquired face images are usually of poor resolution and low-quality, which is caused by a variety of reasons: first, the location of the surveillance camera is high, the shooting range is large, and the target face image is small; second, the monitoring The device is limited by storage space and highly compresses video images, so the image loses detailed information; third, external environments such as rainy weather and poor lighting will further reduce the quality of the captured images. In response to these problems, the face recognition technology combined with convolutional neural network realizes its practical application value.

    Although this paper has conducted considerable research worthy of investigation, and performed exploration on learning-based image classification methods, there are still significant limitations that need to be addressed. Despite the sound conclusion of this research in this field, there are still some issues worthy of attention and future implementation of other relevant networks is required for a thorough analysis.

    With the continuous deepening of research on convolutional neural networks, vector-based convolution and pooling processing have been fully studied. In fact, in a network, we can apply the Riemannian manifold geometry to the data in the middle layer for processing. This pooling and iterative process in the form of a matrix can have a positive effect on the final output of the network.

    MTCNN mainly uses three cascaded networks, and uses the idea of candidate box plus classifier to execute fast and efficient face recognition. Among the three evaluation indicators, MTCNN has the best overall face recognition performance, and for defective faces, MTCNN still has the best effect as well as performance.

    The technology based on MTCNN has a good development prospect, which greatly improves the accuracy of face recognition. While improving accuracy, it also improves the security of the image recognition system.

    The authors declare no conflict of interest.

    This research is funded by the National Natural Science Foundation of China (No. 62006102).



    [1] O. H. Frankel, M. E. Soule, Conservation and Evolution, Cambridge Univ. Press, Cambridge, 1981.
    [2] E. O. Wilson, The Diversity of Life, Harvard Univ. Press, Cambridge, 1992.
    [3] K. L. Ryall, L. Fahrig, Habitat loss decreases predator-prey ratios in a pine-bark beetle system, Oikos, 110 (2005), 265–270. https://doi.org/10.1111/j.0030-1299.2005.13691.x doi: 10.1111/j.0030-1299.2005.13691.x
    [4] N. Nakagiri, K. Tainaka, J. Yoshimura, Bond and site percolation and habitat destruction in model ecosystems, J. Phys. Soc. Jpn., 74 (2005), 3163–3166. https://doi.org/10.1143/JPSJ.74.3163 doi: 10.1143/JPSJ.74.3163
    [5] N. Nakagiri, Y. Sakisaka, T. Togashi, S. Morita, K. Tainaka, Effects of habitat destruction in model ecosystems: Parity law depending on species richness, Ecol. Inform., 5 (2010), 241–247. https://doi.org/10.1016/j.ecoinf.2010.05.003 doi: 10.1016/j.ecoinf.2010.05.003
    [6] M. E. Gilpin, M. L. Rosenzweig, Enriched predator–prey systems: Theoretical stability, Science, 177 (1972), 902–904. https://doi.org/10.1126/science.177.4052.902 doi: 10.1126/science.177.4052.902
    [7] N. Nakagiri, K. Tainaka, T. Tao, Indirect relation between species extinction and habitat destruction, Ecol. Model., 137 (2001), 109–118. https://doi.org/10.1016/S0304-3800(00)00417-8 doi: 10.1016/S0304-3800(00)00417-8
    [8] P. P. Avelino, B. F. Oliveira, R. S. Trintin, Predominance of the weakest species in Lotka-Volterra and May-Leonard formulations of the rock-paper-scissors model, Phys. Rev. E, 100 (2019), 042209. https://link.aps.org/doi/10.1103/PhysRevE.100.042209 doi: 10.1103/PhysRevE.100.042209
    [9] K. Tainaka, N. Nakagiri, H. Yokoi, K. Sato, Multi-layered model for rock-paper-scissors game: A swarm intelligence sustains biodiversity, Ecol. Inform., 66 (2021), 101477. https://doi.org/10.1016/j.ecoinf.2021.101477 doi: 10.1016/j.ecoinf.2021.101477
    [10] N. Nakagiri, K. Tainaka, Indirect effects of habitat destruction in model ecosystems, Ecol. Model., 174 (2004), 103–114. https://doi.org/10.1016/j.ecolmodel.2003.12.047 doi: 10.1016/j.ecolmodel.2003.12.047
    [11] Y. Chen, S. J. Wright, H. C. Muller-Landau, S. P. Hubbell, Y. Wang, S. Yu, Positive effects of neighborhood complementarity on tree growth in a Neotropical forest, Ecology, 97 (2016), 776–785. https://doi.org/10.1890/15-0625.1 doi: 10.1890/15-0625.1
    [12] M. Perc, Does strong heterogeneity promote cooperation by group interactions?, New J. Phys., 13 (2011), 123027. https://doi.org/10.1088/1367-2630/13/12/123027 doi: 10.1088/1367-2630/13/12/123027
    [13] G. Szabó, G. Fáth, Evolutionary games on graphs, Phys. Rep., 446 (2007), 97–216. https://doi.org/10.1016/j.physrep.2007.04.004 doi: 10.1016/j.physrep.2007.04.004
    [14] A. Szolnoki, M. Perc, Evolutionary dynamics of cooperation in neutral populations, New J. Phy., 20 (2018), 013031. https://doi.org/10.1088/1367-2630/aa9fd2 doi: 10.1088/1367-2630/aa9fd2
    [15] K. Tainaka, Lattice model for the Lotka-Volterra system, J. Phys. Soc. Jpn., 57 (1988), 2588–2590. https://doi.org/10.1143/JPSJ.57.2588 doi: 10.1143/JPSJ.57.2588
    [16] K. Tainaka, Stationary pattern of vortices or strings in biological systems: lattice version of the Lotka-Volterra model, Phys. Rev. Lett., 63 (1989), 2688–2691. https://doi.org/10.1103/PhysRevLett.63.2688 doi: 10.1103/PhysRevLett.63.2688
    [17] T. E. Harris, Contact interaction on a lattice, Ann. Prob., 2 (1974), 969–988. https://doi.org/10.1214/aop/1176996493 doi: 10.1214/aop/1176996493
    [18] J. Tubay, H. Ito, T. Uehara, S. Kakishima, S. Morita, T. Togashi, et al., The paradox of enrichment in phytoplankton by induced competitive interactions, Sci. Rep., 3 (2013), 2835. https://doi.org/10.1038/srep02835 doi: 10.1038/srep02835
    [19] N. Nakagiri, K. Sato, Y. Sakisaka, K. Tainaka, Serious role of non-quarantined COVID-19 patients for random walk simulations, Sci. Rep., 12 (2022), 738. https://doi.org/10.1038/s41598-021-04629-2 doi: 10.1038/s41598-021-04629-2
    [20] T. Tahara, M. K. A. Gavina, T. Kawano, J. M. Tubay, J. F. Rabajante, H. Ito, et al., Asymptotic stability of a modified Lotka-Volterra model with small immigrations, Sci. Rep., 8 (2018), 7029. https://doi.org/10.1038/s41598-018-25436-2 doi: 10.1038/s41598-018-25436-2
    [21] I. Hanski, Metapopulation Ecology, Oxford University Press, New York, 1999.
    [22] I. Hanski, M. E. Gilpin, Metapopulation Biology: Ecology, Genetics, and Evolution, Academic Press, San Diego, 1997.
    [23] S. A. Levin, Dispersion and population interactions, Am. Nat., 108 (1974), 207–228. https://doi.org/10.1086/282900 doi: 10.1086/282900
    [24] K. M. A. Kabir, J. Tanimoto, Analysis of epidemic outbreaks in two-layer networks with different structures for information spreading and disease diffusion, Commun. Nonlinear Sci. Numer. Simul., 72 (2019), 565–574. https://doi.org/10.1016/j.cnsns.2019.01.020 doi: 10.1016/j.cnsns.2019.01.020
    [25] K. M. A. Kabir, J. Tanimoto, Evolutionary vaccination game approach in metapopulation migration model with information spreading on different graphs, Chaos Solitons Fractals, 120 (2019), 41–55. https://doi.org/10.1016/j.chaos.2019.01.013 doi: 10.1016/j.chaos.2019.01.013
    [26] T. Nagatani, G. Ichinose, K. Tainaka, Heterogeneous network promotes species coexistence: metapopulation model for rock-paper-scissors game, Sci. Rep., 8 (2018), 7094. https://doi.org/10.1038/s41598-018-25353-4 doi: 10.1038/s41598-018-25353-4
    [27] A. Sadykov, K. D. Farnsworth, Model of two competing populations in two habitats with migration: Application to optimal marine protected area size, Theor. Popul. Biol., 142 (2021), 114–122. https://doi.org/10.1016/j.tpb.2021.10.002 doi: 10.1016/j.tpb.2021.10.002
    [28] H. Yokoi, K. Tainaka, K. Sato, Metapopulation model for a prey-predator system: Nonlinear migration due to the finite capacities of patches, J. Theor. Biol., 477 (2019), 24–35. https://doi.org/10.1016/j.jtbi.2019.05.021 doi: 10.1016/j.jtbi.2019.05.021
    [29] H. Yokoi, K. Tainaka, N. Nakagiri, K. Sato, Self-organized habitat segregation in an ambush-predator system: Nonlinear migration of prey between two patches with finite capacities, Ecol. Inform., 55 (2020), 101022. https://doi.org/10.1016/j.ecoinf.2019.101022 doi: 10.1016/j.ecoinf.2019.101022
    [30] T. M. Liggett, Interacting Particle Systems, Springer, New York, 1985. https://doi.org/10.1007/978-1-4613-8542-4
    [31] J. Marro, R. Dickman, Nonequilibrium Phase Transition in Lattice Models, Cambridge University Press, Cambridge, 1999. https://doi.org/10.1017/CBO9780511524288
    [32] N. Konno, Phase Transition of Interacting Particle Systems, World Scientific, Singapore, 1991.
    [33] M. Katori, N. Konno, Upper bounds for survival probability of the contact process, J. Stat. Phys., 63 (1991), 115–130. https://doi.org/10.1007/BF01026595 doi: 10.1007/BF01026595
    [34] W. Cota, A. S. Mata, S. C. Ferreira, Robustness and fragility of the susceptible-infected-susceptible epidemic models on complex networks, Phys. Rev. E, 98 (2018), 012310. https://doi.org/10.1103/PhysRevE.98.012310 doi: 10.1103/PhysRevE.98.012310
    [35] T. Gross, C. J. D'Lima, B. Blasius, Epidemic dynamics on an adaptive network, Phys. Rev. Lett., 96 (2006), 208701. https://doi.org/10.1103/PhysRevLett.96.208701 doi: 10.1103/PhysRevLett.96.208701
    [36] J. Peterson, The contact process on the complete graph with random vertex-dependent infection rates, Stoch. Proc. Their Appl., 121 (2011), 609–629. https://doi.org/10.1016/j.spa.2010.11.003 doi: 10.1016/j.spa.2010.11.003
    [37] Y. Harada, H. Ezoe, Y. Iwasa, H. Matsuda, K. Sato, Population persistence and spatially limited social interaction, Theor. Popul. Biol., 48 (1995), 65–91. https://doi.org/10.1006/tpbi.1995.1022 doi: 10.1006/tpbi.1995.1022
    [38] K. Tainaka, N. Nakagiri, Segregation in an interacting particle system, Phys. Lett. A, 271 (2000), 92–99. https://doi.org/10.1016/S0375-9601(00)00302-9 doi: 10.1016/S0375-9601(00)00302-9
    [39] J. M. Tubay, J. Yoshimura, Resistance of a terrestrial plant community to local microhabitat changes, Ecol. Evol., 8 (2018), 5101–5110. https://doi.org/10.1002/ece3.4093 doi: 10.1002/ece3.4093
    [40] X. Zou, K. Wang, A robustness analysis of biological population models with protection zone, Appl. Math. Model., 35 (2011), 5553–5563. https://doi.org/10.1016/j.apm.2011.05.020 doi: 10.1016/j.apm.2011.05.020
    [41] F. Wei, C. Wang, Survival analysis of a single-species population model with fluctuations and migrations between patches, Appl. Math. Model., 81 (2020), 113–127. https://doi.org/10.1016/j.apm.2019.12.023 doi: 10.1016/j.apm.2019.12.023
  • This article has been cited by:

    1. Manu Shree, Amita Dev, A. K. Mohapatra, 2023, Chapter 56, 978-981-19-6630-9, 807, 10.1007/978-981-19-6631-6_56
    2. Toshiya Akiyama, Kazuyuki Matsumoto, Kyoko Osaka, Ryuichi Tanioka, Feni Betriana, Yueren Zhao, Yoshihiro Kai, Misao Miyagawa, Yuko Yasuhara, Hirokazu Ito, Gil Soriano, Tetsuya Tanioka, Comparison of Subjective Facial Emotion Recognition and “Facial Emotion Recognition Based on Multi-Task Cascaded Convolutional Network Face Detection” between Patients with Schizophrenia and Healthy Participants, 2022, 10, 2227-9032, 2363, 10.3390/healthcare10122363
    3. Chieh-Liang Wu, Shu-Fang Liu, Tian-Li Yu, Sou-Jen Shih, Chih-Hung Chang, Shih-Fang Yang Mao, Yueh-Se Li, Hui-Jiun Chen, Chia-Chen Chen, Wen-Cheng Chao, Deep Learning-Based Pain Classifier Based on the Facial Expression in Critically Ill Patients, 2022, 9, 2296-858X, 10.3389/fmed.2022.851690
    4. Berrimi Fella, Hedli Riadh, Kara-Mohamed Chafia, 2022, Adaptive Diffusion Based Restoration for Noisy Facial Image Recognition, 978-1-7281-8442-5, 487, 10.1109/SETIT54465.2022.9875579
    5. J.A.S.Y. Jayasinghe, Stamos Katsigiannis, Lakmini Malasinghe, 2023, Comparative Study of Face Tracking Algorithms for Remote Photoplethysmography, 979-8-3503-2781-6, 1, 10.1109/ICECET58911.2023.10389182
    6. Jiarui Chen, Wei Li, Peihao Yang, Sheng Li, Baoqin Chen, Fault Diagnosis of Electric Submersible Pumps Using a Three‐Stage Multiscale Feature Transformation Combined with CNN–SVM, 2023, 11, 2194-4288, 10.1002/ente.202201033
    7. Tuotuo Xiong, Ben Wang, Wanyuan Qin, Ling Yang, Yunsheng Ou, Development and validation of a risk prediction model for cage subsidence after instrumented posterior lumbar fusion based on machine learning: a retrospective observational cohort study, 2023, 10, 2296-858X, 10.3389/fmed.2023.1196384
    8. Libo Qiao, Sheng Guan, Wei Wang, 2024, Online learning concentration recognition based on computer vision, 9798400709920, 334, 10.1145/3687311.3687372
    9. Mohamed Gamal, Magdy Shayboub, 2024, Chapter 9, 978-981-97-6713-7, 111, 10.1007/978-981-97-6714-4_9
    10. Arjon Turnip, Adnnia Nafis Qulub Aina, Erwin Sitompul, 2024, Patient Face Recognition for Medical Robots Based on Convolutional Block Attention Module, 979-8-3315-1116-6, 1, 10.1109/CERIA64726.2024.10914760
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1768) PDF downloads(63) Cited by(3)

Figures and Tables

Figures(8)  /  Tables(1)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog