Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

The impact of network delay on Nakamoto consensus mechanism

  • Received: 30 May 2022 Revised: 19 July 2022 Accepted: 27 July 2022 Published: 10 August 2022
  • Nakamoto consensus is prevailing in the world largest blockchain-based cryptocurrency systems, such as Bitcoin and Ethereum. Since then, various attempts have been studied to attack Nakamoto consensus worldwide. In recent years, network delay has won more attention for making inconsistent ledgers in blockchain-based applications by virtue of attacking Nakamoto consensus. However, so far as we know, most of the existing works mainly focus on constructing inconsistent ledgers for blockchain systems, but not offering fine-grained theoretical analysis for how to optimize the success probability by flexibly dividing computational power and network delay from the viewpoint of adversary. The paper first utilizes network delay and the partition of controlled computation power of honest miners for making forks as long as possible. Then, formally analysis is provided to show the success probability of the proposed attack, and compute the optimal network delay and splitting for adversarial computation power in theory. Finally, simulation experiments validate the correctness of the formal analysis.

    Citation: Shaochen Lin, Xuyang Liu, Xiujuan Ma, Hongliang Mao, Zijian Zhang, Salabat Khan, Liehuang Zhu. The impact of network delay on Nakamoto consensus mechanism[J]. Electronic Research Archive, 2022, 30(10): 3735-3754. doi: 10.3934/era.2022191

    Related Papers:

    [1] Ilse Domínguez-Alemán, Itzel Domínguez-Alemán, Juan Carlos Hernández-Gómez, Francisco J. Ariza-Hernández . A predator-prey fractional model with disease in the prey species. Mathematical Biosciences and Engineering, 2024, 21(3): 3713-3741. doi: 10.3934/mbe.2024164
    [2] Saheb Pal, Nikhil Pal, Sudip Samanta, Joydev Chattopadhyay . Fear effect in prey and hunting cooperation among predators in a Leslie-Gower model. Mathematical Biosciences and Engineering, 2019, 16(5): 5146-5179. doi: 10.3934/mbe.2019258
    [3] Lazarus Kalvein Beay, Agus Suryanto, Isnani Darti, Trisilowati . Hopf bifurcation and stability analysis of the Rosenzweig-MacArthur predator-prey model with stage-structure in prey. Mathematical Biosciences and Engineering, 2020, 17(4): 4080-4097. doi: 10.3934/mbe.2020226
    [4] Xin-You Meng, Yu-Qian Wu . Bifurcation analysis in a singular Beddington-DeAngelis predator-prey model with two delays and nonlinear predator harvesting. Mathematical Biosciences and Engineering, 2019, 16(4): 2668-2696. doi: 10.3934/mbe.2019133
    [5] Xiaoyuan Chang, Junjie Wei . Stability and Hopf bifurcation in a diffusivepredator-prey system incorporating a prey refuge. Mathematical Biosciences and Engineering, 2013, 10(4): 979-996. doi: 10.3934/mbe.2013.10.979
    [6] Ceyu Lei, Xiaoling Han, Weiming Wang . Bifurcation analysis and chaos control of a discrete-time prey-predator model with fear factor. Mathematical Biosciences and Engineering, 2022, 19(7): 6659-6679. doi: 10.3934/mbe.2022313
    [7] Shuo Yao, Jingen Yang, Sanling Yuan . Bifurcation analysis in a modified Leslie-Gower predator-prey model with fear effect and multiple delays. Mathematical Biosciences and Engineering, 2024, 21(4): 5658-5685. doi: 10.3934/mbe.2024249
    [8] Gunog Seo, Mark Kot . The dynamics of a simple Laissez-Faire model with two predators. Mathematical Biosciences and Engineering, 2009, 6(1): 145-172. doi: 10.3934/mbe.2009.6.145
    [9] Christian Cortés García, Jasmidt Vera Cuenca . Impact of alternative food on predator diet in a Leslie-Gower model with prey refuge and Holling Ⅱ functional response. Mathematical Biosciences and Engineering, 2023, 20(8): 13681-13703. doi: 10.3934/mbe.2023610
    [10] Kawkab Al Amri, Qamar J. A Khan, David Greenhalgh . Combined impact of fear and Allee effect in predator-prey interaction models on their growth. Mathematical Biosciences and Engineering, 2024, 21(10): 7211-7252. doi: 10.3934/mbe.2024319
  • Nakamoto consensus is prevailing in the world largest blockchain-based cryptocurrency systems, such as Bitcoin and Ethereum. Since then, various attempts have been studied to attack Nakamoto consensus worldwide. In recent years, network delay has won more attention for making inconsistent ledgers in blockchain-based applications by virtue of attacking Nakamoto consensus. However, so far as we know, most of the existing works mainly focus on constructing inconsistent ledgers for blockchain systems, but not offering fine-grained theoretical analysis for how to optimize the success probability by flexibly dividing computational power and network delay from the viewpoint of adversary. The paper first utilizes network delay and the partition of controlled computation power of honest miners for making forks as long as possible. Then, formally analysis is provided to show the success probability of the proposed attack, and compute the optimal network delay and splitting for adversarial computation power in theory. Finally, simulation experiments validate the correctness of the formal analysis.



    Since Lotka and Volterra [1,2] proposed the classical Lotka-Volterra predator-prey model, it has received much attention in studying the relationships between the predator and prey [3,4,5,6,7]. In the meaning of biology, the population cannot grow unrestrictedly. However, the prey grows infinitely in the absence of the predator for the original Lotka-Volterra predator-prey model. To correct this unrealistic defect, the modified Lotka-Volterra predator-prey model with the finite environment carrying capacity for prey is considered and studied (refer to May [8] for a detailed model construction), which is in the form

    dxdτ=Rx(1xK)hxy,dydτ=hxydy, (1.1)

    where R and K are the per capita growth rate and the carrying capacity of the prey x, h and d are the hunting ability and the death rate of the predator y, respectively. As part of the subsystem of the proposed model in this article, more specific analysis and results for model (1.1) will be given in Section 3.

    Recently, Mobilia et al. [9] expanded Lotka-Volterra predator-prey model and studied the effects of the spatial constraints and stochastic noise on the properties of the predator-prey systems. Considering the spatial constraints and stochastic noise, Mobilia et al. [9] formulated a predator-prey model similar to model (1.1), and a stochastic lattice Lotka-Volterra model (SLLVM). They obtained a lot of important and interesting results differing from those of the classical (unrestricted) deterministic Lotka-Volterra predator-prey model by a suitable mean-field approach, field-theoretic arguments and Monte Carlo simulations. In the topical review [10], from the historical overview of population dynamics to the stochastic lattice Lotka-Volterra predator-prey models, Dobramysl et al. focused on spatially extended population dynamics models and the role of fluctuations and correlations in biological systems induced by the demographic noise. Also, they demonstrated the cyclic dominance of three-species populations and multiple species competition networks. The models in the above two articles are the improvements of the Lotka-Volterra predator-prey by considering the finite carrying capacity and incorporating the stochastic noise, spatial constraints and spatial extension.

    The Lotka-Volterra predator-prey models have been explored and expanded widely in the aspects of the diffusion, time delay, harvesting, switching and herd behavior [11,12,13,14,15,16,17,18,19,20,21], etc. However, considering the effect of the population interactions for different genotypes on the ecosystem is a research hotspot that has only been developed in recent years.

    Taking into account the fact that the prey is genetically distinguishable and assuming that the prey is divided into two subpopulations with two different genotypes x and y, Venturino [22] proposed an ecogenetic model

    dxdτ=(Rpax)(x+y)hxz,dydτ=(Rqby)(x+y)gyz,dzdτ=z[e(hx+gy)m], (1.2)

    where z represents the predator, R is the reproduction rate of the prey, p and q=1p are the fractions of the newborns for the two genotypes x and y, a and b are the population pressures of the two genotypes of the prey, h and g are the predators' different hunting ability to prey on the two genotypes of food, respectively; m is the mortality rate of the predator, 0<e<1 is the conversion rates of the prey into the predator's newborns. The author showed that if the predator invasion number is greater than 1 then the predator is permanent and the model is persistent. Furthermore, model (1.2) could be persistent oscillatory under some conditions. Reference [23] also proposed an eco-genetic model with distinguishable genotypes happened in the prey. Supposed that the genetically distinguishable species are the predator with two different genotypes y and z, Viberti and Venturino [24] introduced a model

    dxdτ=R(1xK)xhxygxz,dydτ=pe(hy+gz)xmy,dzdτ=qe(hy+gz)xnz, (1.3)

    where R and K are the reproduction rate and the environment's carrying capacity of the prey x, respectively, and all other parameters have the similar meaning to those in model (1.2). Then authors investigated the extinction of the predator, the permanence of the prey and the coexistence of the two species. However, model (1.3) does not allow persistent oscillation, which is the main difference between models (1.2) and (1.3). Similar to model (1.3), Viberti and Venturino [25] proposed a predator-prey model with Holling Ⅱ response function in describing the dynamics of two different genotypes predator.

    Motivated by [22,24,25], we propose a predator-prey model in which the genetic differentiation both happened in the predator and prey. The model is presented in the form as follows

    dxdτ=(Rp1ax)(x+y)mxunxv,dydτ=(Rq1by)(x+y)myunyv,dudτ=p2e(mxu+myu+nxv+nyv)ku,dvdτ=q2e(mxu+myu+nxv+nyv)lv, (1.4)

    where the two genotypes population x and y of the prey have the same reproduction rate R, the two genotypes population u and v of the predator have the same conversion rates 0<e<1; p1 and q1=1p1 are the fractions of the newborns of the prey x and y respectively, p2 and q2=1p2 are the fractions of the newborns of the predator u and v respectively, a and b are the different pressures felt by the two types of prey population, k and l are the mortality rates of u and v respectively; we also assume that the predator u has the same hunting ability to prey x and prey y, which is denoted by m; Similarly, the hunting ability of predator v to prey x and prey y is denoted by n. All coefficients in model (1.4) are positive. Assuming that both the two types of predators have different hunting abilities to the two types of the prey, Castellino et al. [26] gave a more general predator-prey model with both species genetically distinguishable. However, they only roughly analyzed the stability of the boundary equilibria and showed some results by numerical simulations. In this paper, we shall give a detailed analysis of the model (1.4).

    In order to simplify calculations, we first nondimensionalize model (1.4) by letting t=eτ, x(τ)=αX(t), y(τ)=αY(t), u(τ)=γU(t), v(τ)=γV(t). Then it becomes

    dXdt=1αe(Rp1aαX)(αX+αY)1αemαγXU1αenαγXV,dYdt=1αe(Rq1bαY)(αX+αY)1αemαγYU1αenαγYV,dUdt=1γep2e(mαγXU+mαγYU+nαγXV+nαγYV)1γekγU,dVdt=1γeq2e(mαγXU+mαγYU+nαγXV+nαγYV)1γelγV.

    Let α=Rp1a, γ=em, and define new parameters r=Rp1e, c=nm, w=q1p1, s=ba, p=p2mRp1a, q=q2mRp1a, g=ke, d=le. Then the above model can be further simplified into

    dXdt=r(1X)(X+Y)XUcXV,dYdt=r(wsY)(X+Y)YUcYV,dUdt=p[(X+Y)U+c(X+Y)V]gU,dVdt=q[(X+Y)U+c(X+Y)V]dV. (1.5)

    It is clear that all of models (1.2), (1.3), (1.4), and (1.5) have more than one predator or one prey, and are generalizations of Lotka-Volterra predator-prey model apparently.

    Azzali et al. [27] studied a competitive model with genetically distinguishable species. In fact, model (1.4) is similar to the ecoepidemiology model, i.e., the population model with diseases spreading in the species. Earlier researches on the ecoepidemiology models can be found from [28,29], and influences of diseases on the predator-prey models and competitive models can refer to the articles [30,31,32,33,34,35,36,37,38,39,40].

    The rest of this paper is organised as follows. In Sections 2 and 3, we shall analyze model (1.5) without predators and model (1.5) with one genotype in both the predator and prey, respectively. The full model of (1.5) will be discussed in Section 4. Some examples to illustrate our main results will be given in Section 5. In Section 6, we shall give our conclusions and discussions.

    Without the predators, model (1.5) becomes

    dXdt=r(1X)(X+Y),dYdt=r(wsY)(X+Y). (2.1)

    It is easy to know that (0,0) and (1,ws) are two equilibria of the model. And we can obtain the following two lemmas.

    Lemma 2.1. For model (2.1), the boundary equilibrium (0,0) is unstable, and the positive equilibrium (1,ws) is locally stable.

    Proof. The Jacobian matrix of (2.1) is

    J1=[r2rXrYrrXrwrsYrwrsX2rsY].

    Then the characteristic polynomial of J1 at (0,0) is λ2(r+wr)λ, which has two eigenvalues λ1=0, λ2=r(1+w)>0. So, the origin (0,0) is unstable.

    Similarly, at (1,ws) the characteristic polynomial is (λ+r+wrs)(λ+wr+sr), resulting in two negative eigenvalues λ1=r(1+ws), λ2=r(s+w). Therefore, equilibrium (1,ws) is locally stable.

    Lemma 2.2. Model (2.1) does not admit any periodic solution.

    Proof. Let

    B1(X,Y)=1r(X+Y), W1(X,Y)=r(1X)(X+Y), W2(X,Y)=r(wsY)(X+Y),

    it is easy to know that B1(X,Y) is a continuously differentiable function in the first quadrant. We get that

    [W1(X,Y)B1(X,Y)]X+[W2(X,Y)B1(X,Y)]Y=1s<0.

    Then the Bendixson-Dulac criterion ([41], Proposition 1.195) implies our result here.

    Then, Lemmas 2.1 and 2.2 yield the following global behavior of model (2.1).

    Theorem 2.1. Positive equilibrium (1,ws) of model (2.1) is globally asymptotically stable.

    Remark 2.1. In the biological sense, Theorem 2.1 means that two genotypes of the prey will always coexist without the predators. This is consistent with the Hardy-Weinberg law [42], which shows that the gene and genotype frequencies in a species will remain constant from the first daughter generation onwards.

    When both the predator and prey have only one genotype, model (1.5) becomes the nondimensionalization of the Lotka-Volterra predator-prey model (1.1), which is in the following form

    dXdt=r(1X)XXU,dUdt=pXUgU. (3.1)

    It is easy to obtain that the model always has two boundary equilibria (0,0) and (1,0), and has a positive equilibrium (gp,r(pg)p) if p>g. The positive equilibrium (gp,r(pg)p) approaches to the boundary equilibrium (1,0) as pg.

    Next, by using Jacobin matrix and center manifold theory, we have Lemma 3.1 and 3.2 as shown in the following.

    Lemma 3.1. For model (3.1), boundary equilibrium (0,0) is always unstable, and the other boundary equilibrium (1,0)

    (a) is stable when p<g;

    (b) is unstable when p>g;

    (c) has a local center manifold

    Wlocc={(x2,u2)R2:u2K,x2=pru22+(3p2r2+pr)u32+O(u42)}

    when p=g, where K is a small neighborhood of the origin, and

    [x2u2]=P1[X1U], P=[110r].

    Proof. The Jacobian matrix of (3.1) is

    J2=[r2rXUXpUpXg].

    The characteristic polynomial of matrix J2 at (0,0) is (λr)(λ+g), which has two eigenvalues λ1=r, λ2=g. Therefore, equilibrium (0,0) is a saddle point.

    The characteristic polynomial of matrix J2 at (1,0) is (λ+r)(λ+gp), which has two eigenvalues λ1=r<0, λ2=pg. We have the following three cases.

    (a) If p<g, then λ2<0, implying equilibrium (1,0) is locally stable.

    (b) If p>g, then λ2>0. Thus, equilibrium (1,0) is a saddle point. Hence, unstable accordingly.

    (c) If p=g, then λ2=0. By the center manifold theory [43,44], there is a local center manifold at equilibrium (1,0), which is calculated as follows. Let x1=X1, u1=U. Model (3.1) becomes

    [x1u1]=A[x1u1]+[rx21x1u1px1u1], (3.2)

    where

    A=[r100].

    Equilibrium (1,0) of model (1.5) becomes equilibrium (0,0) of (3.2). The eigenvalues of A are the same as those of matrix J2 at(1,0), which are λ1=r, λ2=0. By the center manifold theory, equilibrium (0,0) has a one-dimensional center subspace and a one-dimensional stable subspace. The eigenvectors of A with respect to λ1 and λ2 are

    e1=[10], e2=[1r],

    respectively. Let P=(e1,e2), then P1AP=B, where B=diag(λ1,λ2). Therefore, Let

    [x1u1]=P[x2u2]=[x2+u2ru2],

    then

    [x2u2]=P1AP[x2u2]+P1[rx2(x2+u2)rpu2(x2+u2)]=B[x2u2]+[(x2+u2)(rx2+pu2)p(x2+u2)u2].

    The local center manifold at (0,0) is described by an approximation function ψ:span{e2}span{e1}. Since ψ(0)=Dψ(0)=0, we set the Taylor expansion near (0,0) as

    x2=ψ(u2)=β2u22+β3u33+.

    By the center manifold approximation theorem, we have

    rψ(u2)(ψ(u2)+u2)(rψ(x2)+pu2)=(2β2u2+3β3u23+)p(ψ(u2)+u2)u2.

    Simplifying the above equation and comparing the coefficients of the two sides, we get

    β2=pr, β3=3p2r2+pr.

    Thus, the center manifold at (0,0) is

    Wlocc={(x2,u2)R2:u2K,x2=pru22+(3p2r2+pr)u32+O(u42)},

    where K is a small neighborhood of the origin, and

    [x2u2]=P1[X1U].

    Lemma 3.2. If p>g, then model (3.1) has a stable positive equilibrium (gp,r(pg)p).

    Proof. From the above discussion, the positive equilibrium (gp,r(pg)p) exists if and only if p>g. For model (3.1), the characteristic polynomial of Jacobian matrix at (gp,r(pg)p) is f(λ)=λ2+θ1λ+σ1, where θ1=rgp, σ1=rgpgp. It is clear that σ1>0. Let Δ1=θ214σ1, then Δ1<θ21. The roots of f(λ) are λ1,2=θ1±Δ12. Then, we only need to discuss the real parts of λ1,2.

    1. If Δ10, then both λ1,2 are negative, and positive equilibrium (gp,r(pg)p) is stable accordingly.

    2. If Δ1<0, then λ1,2 are two conjugate complex numbers with negative real part, and positive equilibrium (gp,r(pg)p) is stable accordingly.

    Above discussion indicates the local behavior of equilibria in model (3.1), next we illustrate the global dynamical behaviors of these equilibria. First, we need to discuss the existence of periodic solution in model (3.1).

    Lemma 3.3. For model (3.1), there is no periodic solution.

    Proof. Let

    B2(X,U)=1XU, H1(X,U)=r(1X)XXU, H2(X,U)=pXUgU.

    It is easy to know that B2(X,U) is a continuous differentiable function in the first quadrant. Then, in the first quadrant

    [H1(X,U)B2(X,U)]X+[H2(X,U)B2(X,U)]X=rU<0.

    By the Bendixson-Dulac criterion, model (3.1) has no periodic solution.

    From Lemmas 3.1, 3.2 and 3.3, we know the global behavior of model (3.1).

    Theorem 3.1. For model (3.1), boundary equilibrium (0,0) is always unstable, and

    (a) if p>g, then boundary equilibrium (1,0) is unstable and positive equilibrium (gp,r(pg)p) is globally asymptotically stable;

    (b) if p<g, then boundary equilibrium (1,0) is globally asymptotically stable and there is no positive equilibrium.

    From Theorem 3.1, we know that if the death rate of predator is bigger than its conversion rate, then the predator will be extinct while the prey will be permanent; if the death rate of predators is smaller than the conversion rate, then the predator and the prey will coexist permanently.

    It is easy to find that the origin E0(0,0,0,0) and E1(1,ws,0,0) are two boundary equilibria of model (1.5). If

    r(1X)(X+Y)X(U+cV)=0,r(wsY)(X+Y)Y(U+cV)=0,p(X+Y)(U+cV)gU=0,q(X+Y)(U+cV)dV=0, (4.1)

    has a positive solution, then it is the positive equilibrium of model (1.5). Let (X,Y,U,V) is a solution of Eq (4.1), then

    1XX=wsYY, X+Y=h, U=ph2rg(1X)X, V=qh2rd(1X)X, (4.2)

    where h=gdpd+cqg.

    If 0<X<1, 0<Y<ws, U>0, V>0, then (X,Y,U,V) is a positive solution of (4.1), which means it is the positive equilibrium of model (1.5).

    From the first two equations of (4.2), we get

    (1s)Y2+[w+1(1s)h]Ywh=0. (4.3)

    Let Δ2=[w+1(1s)h]2+4wh(1s), then Δ2=[w1+(1s)h]2+4w>0. Let

    f(Y)=(1s)Y2+[w+1(1s)h]Ywh, (4.4)

    then f(ws)>0 if h<1+ws, and f(ws)0 if h1+ws.

    Next, we shall prove that h<1+ws is the necessary and sufficient condition for the existence of positive equilibrium of model (1.5). First, we shall prove that if h<1+ws then 0<X<1, 0<Y<ws, U>0, V>0, and model (1.5) has a positive equilibrium E(X,Y,U,V) accordingly. Three cases are considered.

    Case 1. When s=1, we get Y=whw+1 from (4.3). So, by (4.2),

    X=hw+1, U=phrg(w+1h), V=qhrd(w+1h).

    If h<1+w, then 0<X<1, 0<Y=whw+1<w1+w(1+w)=w, U>0, V>0.

    Case 2. When s<1, i.e., 1s>0, it is easy to find that the parabola f(Y) is opening up and the curve intersects vertical axis at point (0,wh). Thus, (4.3) has one positive root

    Y=h2+(w+1)+Δ22(1s).

    By (4.2) and the above equation, we get

    X=h2+w+1Δ22(1s), U=ph2rg[2(1s)w+1+(1s)hΔ21],
    V=qh2rd[2(1s)w+1+(1s)hΔ21].

    If h<1+ws, then f(ws)>0. From the image of parabola f(Y), we know that f(Y)=0 and f(Y)<0 as Y(0,Y). So 0<Y<ws. By the first equation of (4.2), we have 0<X<1. Accordingly, U>0 and V>0.

    Case 3. When s>1, i.e., 1s<0, the parabola f(Y) is opening down and the curve intersects vertical axis at point (0,wh). Since 1s<0 and w+1(1s)h>0, we know the center shaft of the parabola is positive. So, f(Y) has two positive roots

    Y1,2=h2+(w+1)±Δ22(1s),

    which means

    X1,2=h2+(w+1)Δ22(1s), U1,2=ph2rg[2(1s)w+1+(1s)hΔ21],
    V1,2=qh2rd[2(1s)w+1+(1s)hΔ21]

    from Eq (4.2). By f(ws)>0 as h<1+ws, f(Y)>0 as Y(Y1,Y2) and f(Y)<0 as Y[Y1,Y2], we get that ws(Y1,Y2), which means 0<Y1<ws<Y2. The same reason as that of Case 2 gives 0<X1<1. Accordingly, U1>0, V1>0.

    By the same analysis as the above three cases, we have that if h1+ws then Yws for Case 1 and 2, and both Y2>Y1>ws for Case 3. From the second equation of (4.1), we know that Eqs (4.1) have no positive solutions. Therefore, model (1.5) has no positive equilibria.

    From the above discussion, we get the following results.

    Theorem 4.1. Model (1.5) always has two boundary equilibria E0(0,0,0,0) and E1(1,ws,0,0). Furthermore, h<1+ws is the necessary and sufficient condition for the existence of an unique positive equilibrium E(X,Y,U,V) of model (1.5), where 0<X<1, 0<Y<ws, U>0 and V>0.

    The Jacobian matrix of model (1.5) at E0 is

    J(E0)=[rr00rwrw0000g0000d].

    The characteristic polynomial of J(E0) is λ(λrwr)(λ+g)(λ+d), which has four eigenvalues λ1=0, λ2=r+rw, λ3=g and λ4=d. Since λ2>0, E0 is unstable.

    Theorem 4.2. The boundary equilibrium E0 of (1.5) is unstable.

    The Jacobian matrix of model (1.5) at E1 is

    J(E1)=[rrws01c0rwrswscws00p(1+ws)gcp(1+ws)00q(1+ws)cq(1+ws)d].

    The characteristic polynomial of J(E1) is

    (λ+r+rws)(λ+rw+rs){λ2+[g+d(p+cq)(1+ws)]λ+gd(pd+cqg)(1+ws)}.

    J(E1) has two negative eigenvalues λ1=rrws and λ2=rwrs. The other two eigenvalues of J(E1) are the roots of polynomial f1(λ)=λ2θλ+σ, where

    θ=(p+cq)(1+ws)(g+d), σ=gd(dp+cqg)(1+ws).

    The two roots of f1(λ) are

    λ3,4=θ±θ24σ2. (4.5)

    Let Δ3=θ24σ, then

    Δ3=[gd+(pcq)(1+ws)]2+4cqp(1+ws)2>0.

    It is easy to find that

    g+dp+cqh=cqg2+d2p(p+cq)(dp+cqg)>0,

    so,

    g+dp+cq>h. (4.6)

    Now, we discuss the stability of E1 from three cases.

    Case 1. If h>1+ws, then

    σ=gd(dp+cqg)(1+ws)=(dp+cqg)[gddp+cqg(1+ws)]=(dp+cqg)[h(1+ws)]>0,
    θ=(p+cq)(1+ws)(g+d)=[(1+ws)g+dp+cq](p+cq)<[hg+dp+cq](p+cq).

    By (4.6) and σ>0, we have θ<0 and Δ3=θ24σ<θ2, respectively. Therefore, both λ3,4 have negative real parts, E1 is stable accordingly.

    Case 2. If h<1+ws, then

    σ=(dp+cqg)[h(1+ws)]<0,

    and Δ3=θ24σ>θ2 accordingly. For any θ, (4.5) shows that one of λ3,4 is negative and the other is positive. Therefore, E1 is unstable.

    Case 3. If h=1+ws, then

    σ=(dp+cqg)[h(1+ws)]=0, θ=[hg+dp+cq](p+cq).

    So, Δ3=θ24σ=θ2. Because (4.6) means θ<0, (4.5) shows that one of λ3,4 is θ and the other is 0. Thus, the Jacobian matrix J(E1) has one zero eigenvalue and three negative eigenvalues. By the center manifold theory, there exist a one-dimensional center manifold and a three-dimensional stable subspace at E1.

    From the above discussion, we get the following results.

    Theorem 4.3. Equilibrium E1 of model (1.5) is stable if h>1+ws, and unstable if h<1+ws.

    By Theorems 4.2 and 4.3, we know that if h>1+ws then model (1.5) has no positive equilibrium and E1 is stable. Since the axes are invariant sets of model (1.5), boundary equilibrium E1 is globally stable when h>1+ws.

    Theorem 4.4. If h>1+ws, then the boundary equilibrium E1 is globally stable.

    Theorem 4.5 gives a local center manifold at E1 for Case 3 of the above discussion.

    Theorem 4.5. For boundary equilibrium E1, if h=1+ws, then there is a local center manifold

    Wlocc(E1)={(x2,y2,u2,v2)R4:v2K1,x2=β1v22+0(v32),y2=β2v22+0(v32),u2=β3v22+0(v32)},

    where K1 is a small neighborhood of the origin,

    [x2y2u2v2]=P1[X1YwsUV], P=[10i1i301i2i400p(d+θ)pd00q(g+θ)qg],

    and

    β1=s(pd+cqg)r(s+w)[(ss+w+i3i1θ)(1+ws2)1]i3,
    β2=pd+cqgr(s+w)[(ws+w+wi3s2i2s2θ)(1+ws2)ws2]i3,
    β3=1θ2(1+ws2)i3(pd+cqg),

    with

    i1=p(d+θ)+cq(g+θ)θ+r(1+ws), i2=wsp(d+θ)+cq(g+θ)θ+rs(1+ws), i3=pd+cqgr(1+ws).

    Proof. First, we take a matrix transformation. Let x1=X1, y1=Yws, u1=U and v1=V, then model (1.5) becomes

    [x1y1u1v1]=J(E1)[x1y1u1v1]+[f1(x1,y1,u1,v1)f2(x1,y1,u1,v1)f3(x1,y1,u1,v1)f4(x1,y1,u1,v1)],

    where

    f1(x1,y1,u1,v1)=x1(rx1ry1u1cv1), f2(x1,y1,u1,v1)=y1(srx1sry1u1cv1),
    f3(x1,y1,u1,v1)=p(x1+y1)(u1+cvx), f4(x1,y1,u1,v1)=q(x1+y1)(u1+cvx).

    The eigenvalues of J(E1) are λ1=r(1+ws), λ2=rs(1+ws), λ3=θ, λ4=0. By the center manifold theory, (0,0,0,0) has a one-dimensional center subspace and a three-dimensional stable subspace. The eigenvectors of J(E1) with respect to λ1, λ2, λ3 and λ4 are

    e1=[1000], e2=[0100], e3=[i1i2p(d+θ)q(g+θ)], e4=[i3i4pdqg],

    respectively, where

    i1=p(d+θ)+cq(g+θ)θ+r(1+ws), i2=wsp(d+θ)+cq(g+θ)θ+rs(1+ws), i3=pd+cqgr(1+ws), i4=ws2i3.

    Let P=(e1,e2,e3,e4), then P1J(E1)P=B, where B=diag(λ1,λ2,λ3,λ4). Let

    [x1y1u1v1]=P[x2y2u2v2]=[x2+i1u2+i3v2y2+i2u2+i4v2p(d+θ)u2+pdv2q(g+θ)u2+qgv2],

    then,

    [x2y2u2v2]=P1J(E1)P[x2y2u2v2]+P1[f1(x2,y2,u2,v2)f2(x2,y2,u2,v2)f3(x2,y2,u2,v2)f4(x2,y2,u2,v2)]=B[x2y2u2v2]+[g1(x2,y2,u2,v2)g2(x2,y2,u2,v2)g3(x2,y2,u2,v2)g4(x2,y2,u2,v2)],

    where

    g1(x2,y2,u2,v2)=f1(x2,y2,u2,v2)+i3i1pθf3(x2,y2,u2,v2),
    g2(x2,y2,u2,v2)=f2(x2,y2,u2,v2)+i4i2pθf3(x2,y2,u2,v2),
    g3(x2,y2,u2,v2)=1pθf3(x2,y2,u2,v2), g4(x2,y2,u2,v2)=1pθf3(x2,y2,u2,v2),

    and

    f1(x2,y2,u2,v2)=(x2+i1u2+i3v2)[rx2ry2(rm1+m3+m4)u2(rm2+m3)v2],
    f2(x2,y2,u2,v2)=(y2+i2u2+i4v2)[srx2sry2(srm1+m3+m4)u2(srm2+m3)v2],
    f3(x2,y2,u2,v2)=p[x2+y2+(i1+i2)u2+(i3+i4)v2][(m3+m4)u2+m3v2],
    f4(x2,y2,u2,v2)=q[x2+y2+(i1+i2)u2+(i3+i4)v2][(m3+m4)u2+m3v2],

    with

    m1=i1+i2, m2=i3+i4, m3=pd+cqg, m4=dθ+cqθ.

    The local center manifold is described by a approximation function η:span{e4}span{e1,e2,e3}, which we set

    η(v2)e4=η1(v2)e1+η2(v2)e2+η3(v2)e3.

    Since η(0)=Dη(0)=0, the Taylor expansion at the origin is

    x2=η1(v2)=β1v22+, y2=η2(v2)=β2v22+, u2=η3(v2)=β3v22+.

    By the center manifold approximation theory, we have

    r(1+ws)x2+g1=(2β1v2+)g4,
    rs(1+ws)y2+g2=(2β2v2+)g4,
    θu2+g3=(2β3v2+)g4.

    Simplifying the above equations and comparing the coefficients of the the same order terms in both sides, we get

    β1=s(pd+cqg)r(s+w)[(ss+w+i3i1θ)(1+ws2)1]i3,
    β2=pd+cqgr(s+w)[(ws+w+wi3s2i2s2θ)(1+ws2)ws2]i3,
    β3=1θ2(i3+i4)(pd+cqg).

    Thus, we get the center manifold as follow

    Wlocc(E1)={(x2,y2,u2,v2)R4:v2K1,x2=β1v22+O(v32),y2=β2v22+O(v32),u2=β3v22+O(v32)},

    where K1 is a small neighborhood of the origin, and

    [x2y2u2v2]=P1[X1YwsUV].

    In this section, we consider the stability of E.

    Theorem 4.6. If h<1+ws, then the unique positive equilibrium E of model (1.5) is stable.

    Proof. The Jacobian matrix of model (1.5) at E is

    J=[r2rXrYUcVrrXXcXrwrsYrwrsX2rsYUcVYcYp(U+cV)p(U+cV)p(X+Y)gcp(X+Y)q(U+cV)q(U+cV)q(X+Y)cq(X+Y)d].

    Let j=cqg2+pd2pd+cqg, the characteristic polynomial of J is

    f(λ)=λ4+a3λ3+a2λ2+a1λ+a0, (4.7)

    where

    a3=r(s+1)(X+Y)+(U+cV)+j,

    a2=r2s(X+Y)2+r2(X+Y)[s(wsY)+(1X)]+(d+g)(U+cV)+r(s+1)j(X+Y),

    a1=r(p+cq)(sX+Y)(X+Y)(U+cV)+r2(X+Y)j[s(wsY+(1X))]+gd(U+cV)+(p+cq)(X+Y)(U+cV)2+r2sj(X+Y)2,

    a0=gd[(U+cV)+r(sX+Y)](U+cV).

    For 0<X<1, 0<Y<ws, we know a3>0, a2>0, a1>0 and a0>0. According to the Routh-Hurwitz stability criterion, if

    a2a3a1>0 (4.8)

    also holds, then positive equilibrium E is stable.

    Next, we prove that (4.8) is satisfied. Let g(r)=a2a3a1. Substituting the values of U and V into g(r), we get that g(r)=b2r3+b1r2+b0r, where

    b2=(X+Y)(sX+Y+w+1)[s(wsY)+(1X)+s(X+Y)],

    b1=(s+1)2(X+Y)2j+(wsY+1X)(2sX+2Y+1+w)j,

    b0=(s+1)(X+Y)j2+(wsY+1X)[(d+g)jdg].

    From (4.2), we know that X and Y do not depend on r, and b2>0, b1>0. Since

    (d+g)jdg=pd3+cqg3pd+cqg>0,

    we have b0>0. So, g(r)>0, i.e., (4.8) holds. Therefore, (4.8) and Theorem 4.1 mean that E is stable.

    Remark 4.1. Theorem 4.1 and 4.6 mean h<1+ws is the necessary and sufficient condition for the existence and stability of the unique positive equilibrium E of model (1.5).

    Remark 4.2. By Theorems 4.1, 4.3 and 4.6, we know that if h>1+ws then model (1.5) has no positive equilibrium and E1 is stable, and if h<1+ws then the unique positive equilibrium of model (1.5) is stable and E1 is unstable. Therefore, there is a transcritical bifurcation in model (1.5).

    In this section, some examples are given to illustrate our main results. Furthermore, we get some strategies for species protection by insight into the examples.

    From the discussion in Section 4, we know that the boundary equilibrium E1 is stable when h>1+ws, and the positive equilibrium E appears and becomes stable when h<1+ws. In order to testify our analyzed results, we take some examples by simulation. For convenience, fix

    r=1,c=1/4,w=1/2,p=1/3,q=2/7,g=3/4,d=1/4,

    and the initial condition (0.3,0.5,0.4,0.8). Next, we observe the time series diagrams of the four populations with four different values of s (see Figure 1). In this figure, the red dotted line represents the size of prey X, the blue dotted line represents the size of prey Y, the red solid line represents the size of predator U, the blue solid line represents the size of predator V.

    Figure 1.  Time series diagrams of solutions for model (1.5) with four different values of s. Fixing r=1, c=1/4, w=1/2, p=1/3, q=2/7, g=3/4, d=1/4, and the same initial value (0.3,0.5,0.4,0.8).

    In Figure 1(a), we choose s=27/17 which satisfies the equality h>1+ws. According to Theorem 4.3 and Remark 4.1, in this case the boundary equilibrium E1(1,1754,0,0) is stable while the positive equilibrium doesn't exist. In the figure, the size of two prey populations X and Y approach to 1 and 0.311754 respectively as the time increases, while the two predator populations U and V both tend to zero. This shows that E1 is stable, which verify our results.

    In Figure 1(b), we choose s=1.1 which satisfies the equality h<1+ws. According to Theorem 4.3 and Remark 4.1, in this case the boundary equilibrium E1(1,511,0,0) is unstable while the positive equilibrium E(0.96,0.41,0.04,0.09) is stable. In the figure, the size of two prey populations X and Y approach to 0.96 and 0.41, and the two predator populations U and V both tend to 0.04 and 0.09 respectively as the time increases. This shows that E is stable, which verify our results.

    In Figure 1(c), we choose s=1 which satisfies the equality h<1+ws. According to Theorem 4.3 and Remark 4.1, in this case the boundary equilibrium E1(1,12,0,0) is unstable while the positive equilibrium E(0.91,0.46,0.08,0.20) is stable. In the figure, the size of two prey populations X and Y approach to 0.91 and 0.46, and the two predator populations U and V both tend to 0.08 and 0.20 respectively as the time increases. This verifies our results.

    In Figure 1(d), we choose s=0.8 which satisfies the equality h<1+ws. According to Theorem 4.3 and Remark 4.1, in this case the boundary equilibrium E1(1,58,0,0) is unstable while the positive equilibrium E(0.86,0.51,0.14,0.35) is stable. In the figure, the size of two prey populations X and Y approach to 0.86 and 0.51, and the two predator populations U and V both tend to 0.14 and 0.35 respectively as the time increases. This verifies our results.

    From the biological point of view, the decrease of s can be regarded as the decrease in the ratio of the survival pressure of population Y to the survival pressure of population X. In the process of decreasing, the population Y has more advantages in survival than population X, which leads to an increase in the population density. Conversely, the density of population X decreases due to the stronger stress in the same environment. At the same time, both the densities of predator U and V are increased. It is worth noting that, with the change of s in the above examples, the total amount of two prey populations remains unchanged, while the total density of two predator populations expands. This result gives us two implications for model (1.5): First, the balance of two prey groups can be adjusted by controlling the environmental pressure experienced by one of the prey population; Second, endangered predator populations can be saved by controlling the survival pressure of the prey population.

    In this paper, a predator-prey model with genetic differentiation both happened in the predator and prey is studied, and some interesting results are obtained.

    For model (1.5) without the predators, by the qualitative analysis and the Bendixson-Dulac criterion, we get that the boundary equilibrium (0,0) is unstable, and the positive equilibrium (1,ws) is global asymptotical stability. These indicate that the two genotypes of the prey will be permanent.

    Model (1.5) with one genotype of the predator and prey has two boundary equilibria (0,0) and (1,0), and a positive equilibrium (gp,r(pg)p) when p>g. The boundary equilibrium (0,0) is always unstable. The boundary equilibrium (1,0) is stable when p<g, unstable when p>g, and there is a stable local center manifold at (1,0) when p=g. The positive equilibrium (gp,r(pg)p) is always stable if it exists. We also show that there is no periodic solution in the model by using Bendixson-Dulac criterion. Therefore, the global dynamics of the model is clear as follows: boundary equilibrium (1,0) is globally stable when p<g, positive equilibrium (gp,r(pg)p) is globally stable when p>g, and there is a transcritical bifurcation in the model when p=g.

    Model (1.5) has two boundary equilibria E0(0,0,0,0), E1(1,ws,0,0), and a positive equilibrium E if and only if h<1+ws. The boundary equilibrium E0 is always unstable. Another boundary equilibrium E1 is stable when h>1+ws, unstable when h<1+ws, and there is a stable local center manifold at (1,0) when h=1+ws. The positive equilibrium E is stable if it exists. Furthermore, there is a transcritical bifurcation in the model when h=1+ws.

    If h>1+ws, then model (1.5) has no positive equilibrium, an unstable E0 and a stable E1. Since the axes are invariant with respect to model (1.5), boundary equilibrium E1 is globally stable when h>1+ws. This means that the prey will be permanent and the predators will be extinct, which is similar to the principle of competitive exclusion for two competitive species [45]. However, if h<1+ws then model (1.5) has a local positive equilibrium and two unstable boundary equilibria. The global stability of the positive equilibrium needs to be further analyzed.

    The authors would like to thank the referees for their valuable comments and helpful suggestions.

    The research was supported by the Visiting Scholar Program of Ludong University. The corresponding author would like to thank Department of Mathematics and Statistics at Memorial University of Newfoundland for kindly hosting during his visiting.

    The authors declare that they have no conflict of interest.



    [1] S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, Decentralized Bus. Rev., (2008), 21260. Available from: https://people.eecs.berkeley.edu/raluca/cs261-f15/readings/bitcoin.pdf.
    [2] J. Garay, A. Kiayias, N. Leonardos, The bitcoin backbone protocol: Analysis and applications, in Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, 9057 (2015), 281–310. https://doi.org/10.1007/978-3-662-46803-6_10
    [3] C. Dwork, N. Lynch, L. Stockmeyer, Consensus in the presence of partial synchrony, J. ACM, 35 (1988), 288–323. https://doi.org/10.1145/42282.42283 doi: 10.1145/42282.42283
    [4] C. Decker, R. Wattenhofer, Information propagation in the bitcoin network, in IEEE P2P 2013 Proceedings, IEEE, (2013), 1–10. https://doi.org/10.1109/P2P.2013.6688704
    [5] R. Pass, L. Seeman, A. Shelat, Analysis of the blockchain protocol in asynchronous networks, in Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, 10211 (2017), 643–673. https://doi.org/10.1007/978-3-319-56614-6_22
    [6] P. Wei, Q. Yuan, Y. Zheng, Security of the blockchain against long delay attack, in International Conference on the Theory and Application of Cryptology and Information Security, Springer, 11274 (2018), 250–275. https://doi.org/10.1007/978-3-030-03332-3_10
    [7] Q. Yuan, P. Wei, K. Jia, H. Xue, Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers, Sci. China Inf. Sci., 63 (2020), 1–15. https://doi.org/10.1007/s11432-019-9916-5 doi: 10.1007/s11432-019-9916-5
    [8] L. Shi, T. Wang, J. Li, S. Zhang, Pooling is not favorable: Decentralize mining power of pow blockchain using age-of-work, preprint, arXiv: 2104.01918.
    [9] C. Li, B. Palanisamy, Comparison of decentralization in dpos and pow blockchains, Lect. Notes Comput. Sci., 12404 (2020). https://doi.org/10.1007/978-3-030-59638-5_2 doi: 10.1007/978-3-030-59638-5_2
    [10] J. Bhosale, S. Mavale, Volatility of select crypto-currencies: A comparison of bitcoin, ethereum and litecoin, Annu. Res. J. SCMS, Pune, 6 (2018). Available from: https://www.scmspune.ac.in/journal/pdf/current/Paper%2010%20-%20Jaysing%20Bhosale.pdf.
    [11] H. Chen, M. Pendleton, L. Njilla, S. Xu, A survey on ethereum systems security: Vulnerabilities, attacks, and defenses, ACM Comput. Surv., 53 (2020), 1–43. https://doi.org/10.1145/3391195 doi: 10.1145/3391195
    [12] R. Pass, A. Shelat, Micropayments for decentralized currencies, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (2015), 207–218. https://doi.org/10.1145/2810103.2813713
    [13] J. Poon, T. Dryja, The bitcoin lightning network: Scalable off-chain instant payments, 2016. Available from: https://lightning.network/lightning-network-paper.pdf.
    [14] K. Gai, Y. Wu, L. Zhu, M. Qiu, M. Shen, Privacy-preserving energy trading using consortium blockchain in smart grid, IEEE Trans. Ind. Inf., 15 (2019), 3548–3558. https://doi.org/10.1109/TII.2019.2893433 doi: 10.1109/TII.2019.2893433
    [15] L. Zhu, Y. Wu, K. Gai, K. Choo, Controllable and trustworthy blockchain-based cloud data management, Future Gener. Comput. Syst., 91 (2018), 527–535. https://doi.org/10.1016/j.future.2018.09.019 doi: 10.1016/j.future.2018.09.019
    [16] K. Gai, Y. Wu, L. Zhu, Z. Zhang, M. Qiu, Differential privacy-based blockchain for industrial internet-of-things, IEEE Trans. Ind. Inf., 16 (2020), 4156–4165. https://doi.org/10.1109/TII.2019.2948094 doi: 10.1109/TII.2019.2948094
    [17] G. Xu, J. Dong, C. Ma, J. Liu, U. G. O. Cliff, A certificateless signcryption mechanism based on blockchain for edge computing, IEEE Internet Things J., 2022 (2022). https://doi.org/10.1109/JIOT.2022.3151359 doi: 10.1109/JIOT.2022.3151359
    [18] I. Bentov, R. Kumaresan, How to use bitcoin to design fair protocols, Lect. Notes Comput. Sci., Springer, Berlin, Heidelberg, 8617 (2014), 421–439. https://doi.org/10.1007/978-3-662-44381-1_24
    [19] K. Gai, J. Guo, L. Zhu, S. Yu, Blockchain meets cloud computing: A survey, IEEE Commun. Surv. Tutorials, 22 (2020), 2009–2030. https://doi.org/10.1109/COMST.2020.2989392 doi: 10.1109/COMST.2020.2989392
    [20] F. Yang, J. Tian, T. Feng, F. Xu, C. Qiu, C. Zhao, Blockchain-enabled parallel learning in industrial edge-cloud network: A fuzzy dpost-pbft approach, in 2021 IEEE Globecom Workshops (GC Wkshps), (2021), 1–6. https://doi.org/10.1109/GCWkshps52748.2021.9681977
    [21] G. Xu, Y. Liu, P. W. Khan, Improvement of the dpos consensus mechanism in blockchain based on vague sets, IEEE Trans. Ind. Inf., 16 (2020), 4252–4259. https://doi.org/10.1109/TII.2019.2955719 doi: 10.1109/TII.2019.2955719
    [22] Y. Liu, G. Xu, Fixed degree of decentralization dpos consensus mechanism in blockchain based on adjacency vote and the average fuzziness of vague value, Comput. Networks, 199 (2021), 108432. https://doi.org/10.1016/j.comnet.2021.108432 doi: 10.1016/j.comnet.2021.108432
    [23] K. M. Elleithy, D. Blagovic, W. Cheng, P. Sideleau, Denial of service attack techniques: Analysis, implementation and comparison, J. Syst. Cybern. Inf., 3 (2005), 66–71. Available from: https://www.researchgate.net/publication/242497142.
    [24] E. Heilman, A. Kendler, A. Zohar, S. Goldberg, Eclipse attacks on bitcoin's peer-to-peer network, in Proceedings of the 24th USENIX Conference on Security Symposium, (2015), 129–144. Available from: https://eprint.iacr.org/2015/263.pdf.
    [25] M. Apostolaki, A. Zohar, L. Vanbever, Hijacking bitcoin: Routing attacks on cryptocurrencies, in 2017 IEEE Symposium on Security and Privacy (SP), IEEE, 2017 (2017), 375–392. https://doi.org/10.1109/SP.2017.29
    [26] J. Bonneau, E. W. Felten, S. Goldfeder, J. A. Kroll, A. Narayanan, Why buy when you can rent? Bribery attacks on bitcoin consensus. Available from: https://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=C77871712694860A06EFCEC0665234B6?doi=10.1.1.698.738&rep=rep1&type=pdf.
    [27] G. O. Karame, E. Androulaki, S. Capkun, Double-spending fast payments in bitcoin, in Proceedings of the 2012 ACM Conference on Computer and Communications Security, (2012), 906–917. https://doi.org/10.1145/2382196.2382292
    [28] I. Eyal, E. G. Sirer, Majority is not enough: Bitcoin mining is vulnerable, Lect. Notes Comput. Sci., Springer, Berlin, Heidelberg, 8437 (2013). https://doi.org/10.1007/978-3-662-45472-5_28
    [29] J. Göbel, H. P. Keeler, A. E. Krzesinski, P. G. Taylor, Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay, Perform. Eval., 104 (2016), 23–41. https://doi.org/10.1016/j.peva.2016.07.001 doi: 10.1016/j.peva.2016.07.001
    [30] Y. Sompolinsky, A. Zohar, Secure high-rate transaction processing in bitcoin, in International Conference on Financial Cryptography and Data Security, Springer, Berlin, Heidelberg, 8975 (2015), 507–527. https://doi.org/10.1007/978-3-662-47854-7_32
  • This article has been cited by:

    1. Jiandong Zhao, Tonghua Zhang, Zhixia Han, Dynamic behavior of a stochastic SIRS model with two viruses, 2020, 0, 2191-0294, 10.1515/ijnsns-2019-0208
    2. Eric Planas, Jordi Mill, Andy L. Olivares, Xabier Morales, Maria Isabel Pons, Xavier Iriart, Hubert Cochet, Oscar Camara, 2022, Chapter 18, 978-3-030-93721-8, 160, 10.1007/978-3-030-93722-5_18
    3. G. P. Neverova, O. L. Zhdanova, E. Ya. Frisman, Evolutionary dynamics of predator in a community of interacting species, 2022, 108, 0924-090X, 4557, 10.1007/s11071-022-07372-z
    4. O. L. Zhdanova, G. P. Neverova, E. Ya. Frisman, Predator Evolution in a Model of Interacting Species: To the Question about Maintaining Polymorphism by Litter Size in Natural Populations of Arctic Fox, 2022, 58, 1022-7954, 94, 10.1134/S1022795422010136
    5. Li Li, Dongshen Fang, Qiyao Ye, Tan Hu, Shaobo Shi, An ensemble framework for risk prediction of left atrial thrombus based on undersampling with replacement, 2024, 36, 0941-0643, 18613, 10.1007/s00521-024-10166-6
    6. G. Santhosh Kumar, C. Gunasundari, Salah Mahmoud Boulaaras, M. Aakash, N.B. Sharmila, Genetic differentiation of prey predator interaction model along with an Holling type-II functional response, 2024, 9, 26668181, 100649, 10.1016/j.padiff.2024.100649
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2314) PDF downloads(85) Cited by(0)

Figures and Tables

Figures(2)  /  Tables(3)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog