Research article Special Issues

Bifurcation analysis of a food chain chemostat model with Michaelis-Menten functional response and double delays

  • In this paper, we study a food chain chemostat model with Michaelis-Menten function response and double delays. Applying the stability theory of functional differential equations, we discuss the conditions for the stability of three equilibria, respectively. Furthermore, we analyze the sufficient conditions for the Hopf bifurcation of the system at the positive equilibrium. Finally, we present some numerical examples to verify the correctness of the theoretical analysis and give some valuable conclusions and further discussions at the end of the paper.

    Citation: Xin Xu, Yanhong Qiu, Xingzhi Chen, Hailan Zhang, Zhiyuan Liang, Baodan Tian. Bifurcation analysis of a food chain chemostat model with Michaelis-Menten functional response and double delays[J]. AIMS Mathematics, 2022, 7(7): 12154-12176. doi: 10.3934/math.2022676

    Related Papers:

    [1] Najmeddine Attia . Some remarks on recursive sequence of fibonacci type. AIMS Mathematics, 2024, 9(9): 25834-25848. doi: 10.3934/math.20241262
    [2] A. S. Mohamed . Fibonacci collocation pseudo-spectral method of variable-order space-fractional diffusion equations with error analysis. AIMS Mathematics, 2022, 7(8): 14323-14337. doi: 10.3934/math.2022789
    [3] Can Kızılateş, Halit Öztürk . On parametric types of Apostol Bernoulli-Fibonacci, Apostol Euler-Fibonacci, and Apostol Genocchi-Fibonacci polynomials via Golden calculus. AIMS Mathematics, 2023, 8(4): 8386-8402. doi: 10.3934/math.2023423
    [4] Waleed Mohamed Abd-Elhameed, Omar Mazen Alqubori . New expressions for certain polynomials combining Fibonacci and Lucas polynomials. AIMS Mathematics, 2025, 10(2): 2930-2957. doi: 10.3934/math.2025136
    [5] Haoyang Ji, Wenxiu Ma . Phase transition for piecewise linear fibonacci bimodal map. AIMS Mathematics, 2023, 8(4): 8403-8430. doi: 10.3934/math.2023424
    [6] Tingting Du, Li Wang . On the power sums problem of bi-periodic Fibonacci and Lucas polynomials. AIMS Mathematics, 2024, 9(4): 7810-7818. doi: 10.3934/math.2024379
    [7] Majid Khan, Hafiz Muhammad Waseem . An efficient confidentiality scheme based on quadratic chaotic map and Fibonacci sequence. AIMS Mathematics, 2024, 9(10): 27220-27246. doi: 10.3934/math.20241323
    [8] Man Chen, Huaifeng Chen . On ideal matrices whose entries are the generalized kHoradam numbers. AIMS Mathematics, 2025, 10(2): 1981-1997. doi: 10.3934/math.2025093
    [9] Taja Yaying, S. A. Mohiuddine, Jabr Aljedani . Exploring the q-analogue of Fibonacci sequence spaces associated with c and c0. AIMS Mathematics, 2025, 10(1): 634-653. doi: 10.3934/math.2025028
    [10] Utkal Keshari Dutta, Prasanta Kumar Ray . On the finite reciprocal sums of Fibonacci and Lucas polynomials. AIMS Mathematics, 2019, 4(6): 1569-1581. doi: 10.3934/math.2019.6.1569
  • In this paper, we study a food chain chemostat model with Michaelis-Menten function response and double delays. Applying the stability theory of functional differential equations, we discuss the conditions for the stability of three equilibria, respectively. Furthermore, we analyze the sufficient conditions for the Hopf bifurcation of the system at the positive equilibrium. Finally, we present some numerical examples to verify the correctness of the theoretical analysis and give some valuable conclusions and further discussions at the end of the paper.



    Fractional calculus is a subdivision of classical calculus that concerns itself with derivatives as well as integrals of nearly any fractional order. This mathematical field has gained significant attention due to its ability to model complex phenomena more accurately than integer-order calculus. Fractional calculus offers robust methods for characterizing memory and hereditary features of different materials and processes, rendering it essential in disciplines such as control theory [14], signal processing [4], and differential equations [11,12,13]. The foundations of fractional calculus were laid by early mathematicians such as Leibniz, Liouville, and Riemann, who explored the concept of generalizing the order of differentiation and integration beyond integers [3,7]. Modern advancements have further developed these ideas, leading to a robust theoretical framework and numerous practical applications.

    The nabla difference operator is a discrete counterpart of the continuous derivative, employed in discrete calculus, specifically in the context of time-scale calculus. This operator, often denoted by , operates on functions defined on discrete domains, such as sequences or time scales. The nabla difference operator plays a crucial role in various fields, including exact analysis, discrete dynamic systems, and operational calculus in [9,21,22]. It facilitates the formulation and solution of difference equations, which are the discrete counterparts of differential equations. The papers "On the definitions of nabla fractional operators" and "Discrete fractional calculus includes the nabla operator" go into great detail about what nabla fractional operators are and how they can be used in real life. They stress how important they are in the field of discrete mathematics [1,2]. Recently, the nabla difference operator has been seen in sequential differences in the nabla fractional calculus, the combined delta-nabla sum operator in discrete fractional calculus, and discrete fractional calculus consisting of the nabla operator in [2,20]. These studies contribute to a deeper understanding of the interplay between discrete and continuous analysis. In research [15], such as on K¨othe-Toeplitz duals of generalized difference sequence spaces and Laplace transforms for the nabla-difference operator, investigations into the theoretical underpinnings and applications of these operators in discrete calculus [6].

    The Fibonacci sequence is a widely recognized integer sequence defined by the recurrence relation Fr=Fr1+Fr2, where F0 is 0 and F1 is 1. This sequence appears in various natural phenomena and has numerous applications in computer science, mathematics, and financial modeling. The study of sequence spaces derived from difference operators has gained significant attention, particularly with generalized Fibonacci difference operators. The derivation of sequence spaces arising from triple-band generalized Fibonacci difference operator [18,24], investigates the structural properties of these spaces, while generalized Fibonacci difference sequence spaces and compact operators [17,23] explores their impact on the boundedness and compactness of sequences. These works extend classical sequence space theory by integrating the recursive properties of Fibonacci sequences, highlighting new connections in functional analysis.

    The motivation for this study arises from the need to further explore and expand the theoretical systems and applications of the nabla difference operator in generating and analyzing Fibonacci sequences. We present the trigonometric nabla difference operator of order 2 and its discrete integral, analyzing the ¯θ(t)-sequences, their summation, and the proportional derivative of the ¯θ(t)-polynomials.

    The contributions of the research are delineated as follows:

    1. By utilizing various trigonometric coefficients in the ¯θ(t)-Fibonacci equation and its inverses, we formulate new sequences and analyze their characteristics.

    2. The nabla difference operator of order 2 facilitates the generation of ¯θ(t)-Fibonacci sequences and their exact and numerical solutions.

    3. We provide chaotic behavior of the generating function of the second-order Fibonacci sequence with the coefficients of trigonometric functions.

    4. The study includes MATLAB examples to demonstrate the practical applications of our theoretical findings.

    Throughout this article, we make use of the notations and elucidations from the following Table 1.

    Table 1.  The notations and elucidations.
    ξ Shift (translation) value (i.e., ξ[0,))
    t(x) t(tξ)(t2ξ)(t3ξ)...(t(x1)ξ)
    t(n+r)ξ tn,r, where n, r are integers and t(,).
    E-solution Exact solution
    N-solution Numerical solution
    ¯θ(t)-sequence Fibonacci sequence derived from general difference equation (Nabla) with trigonometric coefficients of order 2.
    ¯θ(t)-equation General difference equation (Nabla) with trigonometric coefficients of order 2.

     | Show Table
    DownLoad: CSV

    Here, we formulate a generic nabla-difference operator that includes a trigonometric co-efficient ¯θ(t)v(t)=v(t)α1sin(b1t)v(t0,1)α2sin(b2t)v(t0,2) which generates second-order ¯θ(t)-Fibonacci sequence and its sum.

    Definition 2.1. Let t be any positive real number and n2; a second-order generic ¯θ(t)-sequence is defined recurrently as Ft,0=1,  Ft,1=α1sin(b1t), and

    Ft,n=α1sin(b1tn,1)Ft,n1+α2sin(b2tn,2)Ft,n2. (2.1)

    Definition 2.2. For any positive real number t, a generic nabla difference operator of order two using sine (any trigonometric) function coefficients on v(t), denoted as ¯θ(t)v(t), is defined as

    ¯θ(t)v(t)=v(t)α1sin(b1t)v(t0,1)α2sin(b2t)v(t0,2), (2.2)

    and the inverse of ¯θ(t)v(t)=u(t) is defined as

    v(t)=¯θ(t)1u(t). (2.3)

    Definition 2.3. [16] A proportional α- derivative is defined by

    Dαf(t)=αf(t)+(1α)f(t), α[0,1], (2.4)

    is the proportional α-derivative of f(t). Here Dα is proportional α- provided the function f(t) is differentiable at t.

    Lemma 2.1. For any real number t,v(t) is a function. Then it leads

    ¯θ(t)1ast[1α1sin(b1t)asξα2sin(b2t)a2sξ]=ast. (2.5)

    Proof: By doing v(t)=at0,0 in (2.2), we observe that

    ¯θ(t)ast=ast[1α1sin(b1t)asξα2sin(b2t)a2sξ].

    Now, the function v(t) follows from the Definition 2.2.

    Remark 2.1. When α1=1=α2 in lemma 2.1, then we observe that

    ¯θ(t)1ast[1sin(b1t)asξsin(b2t)a2sξ]=ast. (2.6)

    Corollary 2.1. For any real number t, est is a function. Then we observe

    ¯θ(t)1est[1α1sin(b1t)esξα2sin(b2t)e2sξ]=est. (2.7)

    Proof: By doing a=e in (2.5), we conclude the proof.

    Corollary 2.2. For any real number t, {est} is a function. Then we observe

    ¯θ(t)1est[1α1sin(b1t)esξα2sin(b2t)e2sξ]=est. (2.8)

    Proof: By doing a=e1 in (2.5), we conclude the proof.

    Corollary 2.3. For any real number t, {est} is a function. Then we observe

    ¯θ(t)1est[1sin(b1t)esξsin(b2t)e2sξ]=est. (2.9)

    Proof: By doing α1=α2=1 in (2.8), we conclude the proof.

    Propsition 2.1. If the function v(t)=1¯θ(t)u(t) is a E-solution of (2.2), Ft,0=1,Ft,1=α1sin(b1t) and

    Ft,n+1=α1sin(b1tn,0)Ft,n+α2sin(b2tn,1)Ft,n1, for i=0,1,2,... then, the E-solution is equal to a N-solution, which is given by

    v(t)Ft,n+1v(tn,1)α2sin(b2tn,0)Ft,nv(tn,2)=ni=0Ft,iu(t0,i). (2.10)

    Proof: For the function v(t), the Definition 2.2 yields

    v(t)=u(t)+α1sin(b1t)v(t0,1)+α2sin(b2t)v(t0,2). (2.11)

    By changing k by k0,1 and then put the value of v(t0,1) into (2.11), we get

    v(t)=u(t)+Ft,1u(t0,1)+[Ft,1α1sin(b1t0,1)+

    α2sin(b2t)]v(t0,2)+Ft,1α2sin(b2t0,1)v(t0,3), (2.12)

    which leads to v(t)=Ft,0u(t)+Ft,1u(t0,1)+

    Ft,2v(t0,2)+α2sin(b2t0,1)Ft,1v(t0,3), (2.13)

    where Ft,0=0, Ft,1=α1sin(b1t) and Ft,2=Ft,n+1=α1sin(b1t1,0)Ft,1+α2sin(b2t1,1)Ft,0. By changing k by k0,2 in (2.11) and then putting the value of v(t0,2) into (2.13), we observe

    v(t)=Ft,0u(t)+Ft,1u(t0,1)+Ft,2u(t0,2)+Ft,3v(t0,3)+α2sin(b2t0,2)Ft,2v(t0,4),

    where Ft,3=Ft,3=α1sin(b1t2,0)Ft,2+α2sin(b2t2,1)Ft,1.

    By carrying out this procedure repeatedly (2.10).

    Corollary 2.4. If the function 1¯θ(t)u(t)=v(t), Ft,0=1,Ft,1=sin(b1t) and

    Ft,n+1=sin(b1tn,0)Ft,n+sin(b2tn,1)Ft,n1, for i=0,1,2,... then

    v(t)Ft,n+1v(t0,1)sin(b2tn,0)Ft,nv(t0,2)=ni=0Ft,iu(t0,i). (2.14)

    Proof: The proof follows by doing α1=1=α2 in Theorem 2.1.

    Corollary 2.5. Let v(t) be any function and

    ¯θ(t)v(t)=ast[1α1sin(b1t)asξα2sin(b2t)a2sξ],

    then we observe that

    astFt,n+1as(tn,1)α2sin(b2tn,0)Ft,nas(tn,2)

    =ni=0Ft,iast0,i[1α1sin(b1t0,i)asξα2sin(b2t0,i)a2sξ]. (2.15)

    Proof: By doing v(t)=ast and applying (2.5) in (2.10), we observed the proof.

    The following illustration proves the significance of corollary 2.5.

    Corollary 2.6. Let α1=α2=1 in (2.15). Then we have

    at0,0Ft,n+1atn,1sin(b2tn,0)Ft,natn,2

    =ni=0Ft,iat0,i[1sin(b1t0,i)aξsin(b2t0,i)a2ξ]. (2.16)

    Proof: By doing v(t)=at0,0 and putting (2.5) in (2.10), we complete the proof.

    The following illustration proves the significance of corollary 2.6.

    Corollary 2.7. Let est be a function of t(,). Then

    estFt,n+1es(tn,1)α2sin(b2tn,0)Ft,nes(tn,2)

    =ni=0Ft,iest0,i[1α1sin(b1t0,i)eξα2sin(b2t0,i)e2ξ]. (2.17)

    Proof: By doing v(t)=est and applying (2.8) in (2.5), we obtain (2.17).

    Propsition 2.2. Let xN(0). Then, the E-solution of ¯θ(t)-equation

    v(t)α1sin(b1t)v(t0,1)α2sin(b2t)v(t0,2)=[tx0,0α1sin(b1t)tx0,1α2sin(b2t)tx0,2] is

    1¯θ(t)[tx0,0α1sin(b1t)tx0,1α2sin(b2t)tx0,2]=tx0,0 (2.18)

    Proof: By doing v(t)=tx0,0 with the equation (2.2) and using (2.3), we obtain (2.18).

    Corollary 2.8. By doing x=2 with the Theorem 2.2, we observed

    1¯θ(t)[t20,0α1sin(b1t)t20,1α2sin(b2t)t20,2]=t20,0, (2.19)

    which is the E-solution of the nabla difference equation of order two

    ¯θ(t)v(t)=t20,0α1sin(b1t)t20,1α2sin(b2t)t20,2.

    Proof: From (2.18), replacing x=2, we obtain (2.19).

    Corollary 2.9. If v(t)=1¯θ(t)[tx0,0α1sin(b1t)tx0,1α2sin(b2t)tx0,2] is a E-solution of the equation (2.18), then

    v(t)Ft,n+1v(t0,1)α2sin(b2tn,0)Ft,nv(t0,2)

    =ni=0Ft,i[tx0,iα1sin(b1t0,i)txi,1α1sin(b2t0,i)txi,2]. (2.20)

    Proof: Taking u(t)=tx0,0α1sin(b1t)tx0,1α2sin(b2t)tx0,2 in (2.10), we have (2.20).

    Propsition 2.3. If v(t) is a E-solution of sine-coefficients ¯θ(t)-equation

    v(t)α1sin(b1t)v(t0,1)α2sin(b2t)v(t0,2)=tx0,0at0,0α1sin(b1t)tx0,1at0,1α2sin(b2t)tx0,2at0,2,

    then we have

    v(t)Ft,n+1(tn,1)α2sin(b2tn,0)v(tn,2)

    =ni=0Ft,itx0,iat0,i[1α1sin(b1t0,i)txi,1aξα2sin(b2t0,i)txi,2a2ξ]. (2.21)

    Proof: By doing u(t)=[tx0,0at0,0α1sin(b1t)tx0,1at0,1α2sin(b2t)tx0,2at0,2] in (2.10) and using (2.5), we get (2.21).

    Corollary 2.10. A E-solution of ¯θ(t)-equation is

    ¯θ(t)v(t)=t30,0at0,0α1sin(b1t)t30,1at0,1α2sin(b2t)t30,2at0,2  is  t3at0,0

    and hence we have

    t30,0at0,0Ft,n+1t3n,1atn,1α2sin(b2tn,0)t3n,2atn,2

    =ni=0Ft,it30,iat0,iα1sin(b1t0,i)t3i,1ati,1α2sin(b2t0,i)t3i,2ati,2. (2.22)

    Proof: The proof is completed by doing x=3 in Theorem 2.3.

    Propsition 2.4. Let v(t) be a solution of ¯θ(t)-equation

    v(t)α1sin(b1t)v(t0,1)α2sin(b2t)v(t0,2)=t(x)at0,0α1sin(b1t)t(x)0,1at0,1α2sin(b2t)t(x)0,2at0,2, then we have

    v(t)Ft,n+1v(tn,1)α2sin(b2tn,0)v(tn,2)

    =ni=0Ft,iat0,i[t(x)0,iα1sin(b1t0,i)t(x)i,1aξα2sin(b2t0,i)t(x)i,2a2ξ]. (2.23)

    Proof: By doing v(t)=t(x)0,0at0,0 in (2.10) and using (2.5), we get (2.23).

    Corollary 2.11. Let v(t) be a solution of ¯θ(t)-equation

    v(t)sin(b1t)v(t0,1)sin(b2t)v(t0,2)=t(x)at0,0sin(b1t)t(x)0,1at0,1sin(b2t)t(x)0,2at0,2, then we have

    v(t)Ft,n+1v(tn,1)sin(b2tn,0)v(tn,2)

    =ni=0Ft,iat0,i[t(x)0,isin(b1t0,i)t(x)i,1aξsin(b2t0,i)t(x)i,2a2ξ]. (2.24)

    Proof: By doing α1=α2=1 in (2.23), we obtain (2.24).

    The objective of this section is to demonstrate the efficacy of the primary findings presented in this paper by employing precise examples from the literature. Also, we have investigated graphical representations of Fibonacci sequences with the co-efficients of the Sine, Cosine and Co-secant functions for different values of t in the following Figures 13.

    Figure 1.  Sine and Cosine-Fibonacci Sequences for t=10, ξ=0.4, and t=15, ξ=0.5, respectively.
    Figure 2.  Sine and Cosine-Fibonacci Sequences for t=11, ξ=0.3.
    Figure 3.  Sine and Co-secant-Fibonacci Sequences for t=10, ξ=0.4, and t=0.2, ξ=1.8, respectively.

    The validity of the definition 2.1 is confirmed by the subsequent illustrative example 3.1.

    Example 3.1. (i) By doing t=10, b1=2, b2=1, ξ=0.4, α1=2, and α2=1 in (2.1), we obtain a Sine-Fibonacci sequence {1,1.8259,0.7097,0.9351,1.9327,3.9778,}.

    (ii) When t=15, ξ=0.5, α1=0.2, α2=0.1, r1=3, and r2=1 in (2.1), we have a Cosine-Fibonacci sequence {1.0000,1.5194,1.9182,3.9008,3.4203,0.8856,5.1684,}.

    Also, the sine Fibonacci polynomials are observed by

    F0(t)=1,

    F1(t)=2sin(2t),

    F2(t)=4sin(2t)sin(2t0.8)+sin(t),

    F3(t)=8sin(2t)sin(2t1.6)sin(2t0.8)+2sin(t)sin(2t1.6)+2sin(t0.4)sin(2t), etc.

    Furthermore, using (2.4), we have the following proportional α-derivative of the sine Fibonacci polynomials;

    Fα0(t)=0,

    Fα1(t)=4αcos(2t)+2(1α)sin(2t),

    Fα2(t)=8α[sin(2t0.8)cos2t+cos(2t0.8)sin2t+cost]

    +(1α)[4sin(2t0.8)sin2t+sint],

    Fα3(t)=α[16cos(2t1.6)sin(2t0.8)sin(2t)+16sin(2t1.6)cos(2t0.8)sin(2t)+

    16sin(2t1.6)sin(2t0.8)cos(2t)2cos(t)sin(2t1.6)+2sin(t)cos(2t1.6)+2cos(t0.4)sin(2t)+4sin(t0.4)cos(2t)]+(1α)[8sin(2t1.6)sin(2t0.8)sin(2t)+2sin(t)sin(2t1.6)],and etc.

    One can derive second-order Fibonacci polynomials and sequences for each pair ¯θ(t)R2. The validity of the result 2.5 is confirmed by the subsequent illustrative example 3.2.

    Example 3.2. Setting t=11, b1=2, α1=3, s=2, α2=2, n=2, ξ=0.3, b2=1, and a=3 in (2.15), we obtain the following:

    (i) The sum of the sine-Fibonacci series

    322Ft,3310.12Ft,2sin(10.4)319.6=2i=0Ft,i3(220.6i)[1sin(220.6i)30.6sin(330.9i)31.2]=48298205761.12,

    where Ft,0=1, Ft,1=0.03, Ft,2=2.04, Ft,3=5.65.

    (ii) The sum of the cosine-Fibonacci series

    322Ft,3310.12Ft,2cos(10.4)319.6=2i=0Ft,i3(220.6i)[1cos(220.6i)30.6cos(330.9i)31.2]=78777462484.69,

    where Ft,0=1, Ft,1=3.00, Ft,2=7.48,Ft,3=6.57,

    and the cosine Fibonacci polynomials are given by

    F0(t)=1,

    F1(t)=3cos(2t),

    F2(t)=9cos(2t0.6)cos(2t)+2cos(t)

    F3(t)=27cos(2t1.2)cos(2t0.6)cos(2t)+6cos(2t1.2)cos(t)+2cos(t0.4)cos(2t), etc. Furthermore, using (2.4), we have the following proportional α-derivative of the co-secant Fibonacci polynomials;

    Fα0(t)=0,Fα1(t)=α[6sin(2t)]+3(1α)cos(2t),

    Fα2t)=α[18sin(2t0.6)cos(2t)18cos(2t0.6)

    sin(2t)2sint]+(1α)9cos(2t0.6)cos(2t)+2cos(t)], and etc.

    The validity of the definition 2.7 is confirmed by the subsequent illustrative example 3.3.

    Example 3.3. By doing α1=2, t=10, α2=1, ξ=0.4, b1=2, n=2, and b2=1 in (2.16), we have the following:

    (i) The sine-Fibonacci sum of the series is

    e9F4e5(0.3)62Ft,3e4=3i=0Ft,ie(9i)[1(0.8)(9i)3e(0.3)(9i)2e2]

    =523194317.45, where Ft,0=1, Ft,1=1.83, Ft,2=0.71, and Ft,3=0.23.

    (ii) The co-secant-Fibonacci sum of the series is

    e9F4e5(0.3)62Ft,3e4=3i=0Ft,ie(9i)[1(0.8)(9i)3e(0.3)(9i)2e2]=1.49, where Ft,0=1, Ft,1=5.31, Ft,2=0.71 and Ft,3=0.94.

    Also, taking α1=1, b1=1, ξ=0.5, α2=2, and b3=1 in (2.16), we have the following co-secant Fibonacci polynomials:

    F0(t)=1,  F1(t)=cosec(2t),  F2(t)=cosec(t0.5)cosec(2t)+cosec(3t)

    F3(t)=cosec(t1)cosec(t0.5)cosec(2t)+cosec(t1)cosec(3t)+cosec(t0.5)cosec(2t), etc. Further-more, using (2.4), we have the following proportional α-derivative of the co-secant Fibonacci polynomials;

    Fα0(t)=0,  Fα1(t)=α[2cosec(2t)cot(2t)]+(1α)cosec(2t),

    Fα2(t)=α[2cosec(t0.5)cot(t0.5)cosec(2t)2cosec(t0.5)cosec(2t)cot(2t)3cosec(3t)cot(3t)]+(1α)[cosec(t0.5)cosec(2t)+cosec(3t)], and etc.

    The objective of this section is to demonstrate the efficacy of the bifurcation analysis of the ¯θ(t)-Fibonacci generating function and primary findings presented in this paper by employing analysis from the following precise examples.

    A discrete one-dimensional dynamical system is a system subjected to a single equation of this type

    x(t+1)=f(t) (4.1)

    where xZ and f is a function of x. The variable t is in general considered as the time, but in discrete systems the time takes only discrete values, so that it is possible to take tZ.

    A generalized discrete two-dimensional dynamical system is a system subjected to a single equation of this type

    x(t+2ξ)=x(t+ξ)+x(t) (4.2)

    where tR. When we reformulate Eq (4.2), we obtain a two-dimensional discrete system

    x(t+ξ)=x1(t)+x2(t)x2(t+ξ)=x1(t).

    A trajectory is a set {x(t)}t=0 of points satisfying the above equation (4.1). It is evident that the initial point x0=x(0) determines the entire trajectory. The behaviour of the dynamical system is therefore given by all the trajectories {x(t):x(0)=x0} for all initial values x0I. When the value of the parameter changes continuously, the behaviour of the system may change in a discontinuous way. One says that a bifurcation occurs for an isolate value of the parameter at which the type of dynamic changes. In bifurcation analysis, the region of stable operation is determined through the search of Hopf bifurcation points. This gives an insight into how the variations in the system parameters influence region of stable operation. This knowledge can be effectively used by the system designers to ensure the stability of the actual system.

    A bifurcation diagram is a traditional and visual way to look into how dynamical systems, difference equations, and differential equations change over time [10]. This tool is excellent for looking at how the system reacts to changes in parameters [19]. This diagram illustrates the system's different dynamic patterns and phase transitions by plotting the link between the system reaction and parameters [5,8]. This section employs bifurcation theory to determine the existence of the period-doubling (flip) bifurcation. We discuss the ¯θ(t)-Fibonacci generating function and investigate the bifurcation analysis of the ¯θ(t)-Fibonacci sequences.

    ¯θ(t)-Fibonacci sequences are generated by

    f(t)=11θ1(t)tθ2(t)t2, (4.3)

    where θ1(t) and θ2(t) are any trigonometric and hyperbolic functions. If θ1(t)=sin(b1t) and θ2(t)=sin(b2t) in (4.3), then we have the Fibonacci generating function

    f(t)=11sin(b1t)tsin(b2t)t2. (4.4)

    (ii). If θ1(t)=cos(b1t) and θ2(t)=cos(b2t) in (4.3), then we have the Fibonacci generating function

    f(t)=11cos(b1t)tcos(b2t)t2. (4.5)

    In dynamical systems theory, a period-doubling bifurcation occurs when a slight change in a system's parameters causes a new periodic trajectory to emerge from an existing periodic trajectory. With the doubled period, it takes twice as long (or, in a discrete dynamical system, twice as many iterations) for the numerical values visited by the system to repeat themselves. A period-halving bifurcation occurs when a system switches to a new behavior with half the period of the original system. A period-doubling cascade is an infinite sequence of period-doubling bifurcations. Such cascades are a common route by which dynamical systems develop chaos.

    Now, we consider the recurrent form of (4.3)

    tr=11θ1(tr1)tr1θ2(tr1)t2r1, (4.6)

    and we consider the recurrent form of (4.4)

    tr=11sin(b1tr1)tr1sin(b2tr1)t2r1. (4.7)

    We consider the recurrent form of (4.5)

    tn=11cos(b1tn1)tn1cos(b2tn1)t2n1. (4.8)

    We examine the orbit {tr}r=0 for any point t0 within the domain of the map.

    Figure 4(a) displays a periodic doubling bifurcation diagram of the Fibonacci generating function of the co-efficient of the sine function with the initial condition t0=0.8 at the intrinsic growth bifurcation parameter b2=2 and b1[8,11]. Figure 4(b) displays periodic doubling bifurcation diagram of the Fibonacci generating function of the co-efficient of the cosine function with the initial condition t0=0.8 at the intrinsic growth bifurcation parameter b2=2 and b1[5,5]. Figure 4(c) displays periodic doubling bifurcation diagram of the Fibonacci generating function of the co-efficient of the tangent function with the initial condition t0=0.8 at the intrinsic growth bifurcation parameter b2=1 and b1[5,1]. Figure 4(d) displays periodic doubling bifurcation diagram of the Fibonacci generating function of the co-efficient of the cosine function with the initial condition t0=0.8 at the intrinsic growth bifurcation parameter b2=1 and b1[10,5].

    Figure 4.  Period doubling bifurcation diagram for ¯θ(t) -Fibonacci generating function.

    Figure 5(a) displays sub periodic doubling bifurcation diagram of the Fibonacci generating function of the co-efficient of the sine function with the initial condition t0=0.8 at the intrinsic growth bifurcation parameter b=2 and b1[0,0.3]. Figure 5(b) displays sub periodic doubling bifurcation diagram of the Fibonacci generating function of the co-efficient of the cosine function with the initial condition t0=0.8 at the intrinsic growth bifurcation parameter b2=2 and b1[0.58,2]. Figure 5(c) displays sub periodic doubling bifurcation diagram of the Fibonacci generating function of the co-efficient of the tangent function with the initial condition t0=0.8 at the intrinsic growth bifurcation parameter b2=1 and b1[2.2,1.8]. Figure 5(d) displays sub periodic doubling bifurcation diagram of the Fibonacci generating function of the co-efficient of the cosine function with the initial condition t0=0.8 at the intrinsic growth bifurcation parameter b2=1 and b1[3,2.1].

    Figure 5.  Sub period doubling cascade for ¯θ(t) -Fibonacci generating function.

    This paper deduced an inverse formula for the ¯θ(t)-Fibonacci sequence. The inverse of a generic difference (nabla) operator with trigonometric coefficients of order 2 was used to derive this formula. The results we have obtained regarding the E and N solutions, Fibonacci polynomials, and the proportional derivative of the generic difference equation with trigonometric coefficients of order 2 will be applied to our future research. Additionally, we have conducted a bifurcation analysis of the ¯θ(t)-Fibonacci generating function.

    R.P: Conceptualization; R.P, S.T.M.T, and I.K.: Data curation; R.P, S.T.M.T, I.K, and M.V.C.: Formal analysis; P.R, I.K, and M.V.C.: Investigation; R.P, S.T.M.T, and I.K.: Methodology; R.P and S.T.M.T.: Writing-original draft; R.P, I.K and M.V.C.: Writing-review and editing. All authors have read and agreed to the published version of the article.

    The authors declare they have not used artificial intelligence (AI) tools in the creation of this article.

    "La derivada fraccional generalizada, nuevos resultados y aplicaciones a desigualdades integrales" Cod UIO-077-2024. This study is supported via funding from Prince Sattam bin Abdulaziz University project number (PSAU/2025/R/1446).

    The authors declare that they have no conflicts of interest.



    [1] H. L. Smith, P. Waltman, The theory of the chemostat: dynamics of microbial competition, Cambridge University Press, 1995.
    [2] V. Sree Hari Rao, P. Raja Sekhara Rao, Basic chemostat model revisited, Differ. Equ. Dyn. Syst., 17 (2009), 3–16. http://dx.doi.org/10.1007/s12591-009-0001-2 doi: 10.1007/s12591-009-0001-2
    [3] H. Veldkamp, Ecological studies with the chemostat, In: Advances in microbial ecology, Boston, MA: Springer, 1977: 59–94. http://dx.doi.org/10.1007/978-1-4615-8219-9_2
    [4] P. Praveen, D. T. T. Nguyen, K. C. Loh, Biodegradation of phenol from saline wastewater using forward osmotic hollow fiber membrane bioreactor coupled chemostat, Biochem. Eng. J., 94 (2015), 125–133. https://doi.org/10.1016/j.bej.2014.11.014 doi: 10.1016/j.bej.2014.11.014
    [5] D. H. Nguyen, N. N. Nguyen, G. Yin, General nonlinear stochastic systems motivated by chemostat models: Complete characterization of long-time behavior, optimal controls, and applications to wastewater treatment, Stoch. Proc. Appl., 130 (2020), 4608–4642. https://doi.org/10.1016/j.spa.2020.01.010 doi: 10.1016/j.spa.2020.01.010
    [6] M. Ahmed, A. Mydlarczyk, A. Abusam, Kinetic modeling of GAC-IFAS chemostat for petrochemical wastewater treatment, Journal of Water Resource and Hydraulic Engineering, 6 (2017), 27–33. https://doi.org/10.5963/JWRHE0602002 doi: 10.5963/JWRHE0602002
    [7] A. Novick, L. Szilard, Description of the chemostat, Science, 112 (1950), 715–716. https://doi.org/10.1126/science.112.2920.715 doi: 10.1126/science.112.2920.715
    [8] Z. P. Qiu, J. Yu, Y. Zou, The asymptotic behavior of a chemostat model with the Beddington-DeAngelis functional response, Math. Biosci., 187 (2004), 175–187. https://doi.org/10.1016/j.mbs.2003.10.001 doi: 10.1016/j.mbs.2003.10.001
    [9] L. Imhof, S. Walcher, Exclusion and persistence in deterministic and stochastic chemostat models, J. Differ. Equations, 217 (2005), 26–53. https://doi.org/10.1016/j.jde.2005.06.017 doi: 10.1016/j.jde.2005.06.017
    [10] H. Nie, J. H. Wu, Coexistence of an unstirred chemostat model with Beddington-DeAngelis functional response and inhibitor, Nonlinear Anal. Real, 11 (2010), 3639–3652. https://doi.org/10.1016/j.nonrwa.2010.01.010 doi: 10.1016/j.nonrwa.2010.01.010
    [11] L. Zou, X. W. Chen, S. G. Ruan, W. N. Zhang, Dynamics of a model of allelopathy and bacteriocin with a single mutation, Nonlinear Anal. Real, 12 (2011), 658–670. https://doi.org/10.1016/j.nonrwa.2010.07.008 doi: 10.1016/j.nonrwa.2010.07.008
    [12] C. Q. Xu, S. L. Yuan, An analogue of break-even concentration in a simple stochastic chemostat model, Appl. Math. Lett., 48 (2015), 62–68. https://doi.org/10.1016/j.aml.2015.03.012 doi: 10.1016/j.aml.2015.03.012
    [13] D. Herbert, R. Elsworth, R. C. Telling, The continuous culture of bacteria; a theoretical and experimental study, Journal of General Microbiology, 14 (1956), 601–622. https://doi.org/10.1099/00221287-14-3-601 doi: 10.1099/00221287-14-3-601
    [14] L. Michaelis, M. L. Menten, Die kinetik der invertinwirkung, Biochemische Zeitschrift, 49 (1913), 333–369.
    [15] C. P. L. Grady Jr, G. T. Daigger, N. G. Love, C. D. M. Filipe, Biological wastewater treatment, CRC press, 2011.
    [16] B. Li, Y. Kuang, Simple food chain in a chemostat with distinct removal rates, J. Math. Anal. Appl., 242 (2000), 75–92. https://doi.org/10.1006/jmaa.1999.6655 doi: 10.1006/jmaa.1999.6655
    [17] L. Wang, D. Jiang, Ergodicity and threshold behaviors of a predator-prey model in stochastic chemostat driven by regime switching, Math. Method. Appl. Sci., 44 (2021), 325–344. https://doi.org/10.1002/mma.6738 doi: 10.1002/mma.6738
    [18] E. Ali, M. Asif, A. H. Ajbar, Study of chaotic behavior in predator–prey interactions in a chemostat, Ecol. Model., 259 (2013), 10–15. https://doi.org/10.1016/j.ecolmodel.2013.02.029 doi: 10.1016/j.ecolmodel.2013.02.029
    [19] G. Rajchakit, R. Sriraman, C. P. Lim, B. Unyong, Existence, uniqueness and global stability of clifford-valued neutral-type neural networks with time delays, Math. Comput. Simulat., in press. https://doi.org/10.1016/j.matcom.2021.02.023
    [20] R. Xu, Global dynamics of an SEIRI epidemiological model with time delay, Appl. Math. Comput., 232 (2014), 436–444. https://doi.org/10.1016/j.amc.2014.01.100 doi: 10.1016/j.amc.2014.01.100
    [21] C. Huang, H. Zhang, J. Cao, H. Hu, Stability and Hopf bifurcation of a delayed prey-predator model with disease in the predator, Int. J. Bifurcat. Chaos, 29 (2019), 1950091. https://doi.org/10.1142/S0218127419500913 doi: 10.1142/S0218127419500913
    [22] X. W. Jiang, X. Y. Chen, M. Chi, J. Chen, On Hopf bifurcation and control for a delay systems, Appl. Math. Comput., 370 (2020), 124906. https://doi.org/10.1016/j.amc.2019.124906 doi: 10.1016/j.amc.2019.124906
    [23] W. Qi, G. Zong, H. R. Karimi, L control for positive delay systems with semi-Markov process and application to a communication network model, IEEE Trans. Ind. Electron., 66 (2018), 2081–2091. https://doi.org/10.1109/TIE.2018.2838113 doi: 10.1109/TIE.2018.2838113
    [24] H. Y. Zhao, N. Ding, Dynamic analysis of stochastic Cohen-Grossberg neural networks with time delays, Appl. Math. Comput., 183 (2006), 464–470. https://doi.org/10.1016/j.amc.2006.05.087 doi: 10.1016/j.amc.2006.05.087
    [25] Q. K. Song, Z. D. Wang, An analysis on existence and global exponential stability of periodic solutions for BAM neural networks with time-varying delays, Nonlinear Anal. Real, 8 (2007), 1224–1234. https://doi.org/10.1016/j.nonrwa.2006.07.002 doi: 10.1016/j.nonrwa.2006.07.002
    [26] C. Huang, J. Cao, M. Xiao, A. Alsaedi, T. Hayat, Bifurcations in a delayed fractional complex-valued neural network, Appl. Math. Comput., 292 (2016), 210–227. https://doi.org/10.1016/j.amc.2016.07.029 doi: 10.1016/j.amc.2016.07.029
    [27] Y. Xiao, L. Chen, An SIS epidemic model with stage structure and a delay, Acta Mathematicae Applicatae Sinica, English Series, 18 (2002), 607–618. https://doi.org/10.1007/s102550200063 doi: 10.1007/s102550200063
    [28] T. Zhang, J. Liu, Z. Teng, Stability of Hopf bifurcation of a delayed SIRS epidemic model with stage structure, Nonlinear Anal. Real, 11 (2010), 293–306. https://doi.org/10.1016/j.nonrwa.2008.10.059 doi: 10.1016/j.nonrwa.2008.10.059
    [29] L. Zhu, G. Guan, Y. Li, Nonlinear dynamical analysis and control strategies of a network-based SIS epidemic model with time delay, Appl. Math. Model., 70 (2019), 512–531. https://doi.org/10.1016/j.apm.2019.01.037 doi: 10.1016/j.apm.2019.01.037
    [30] Y. Song, J. Wei, Local Hopf bifurcation and global periodic solutions in a delayed predator-prey system, J. Math. Anal. Appl., 301 (2005), 1–21. https://doi.org/10.1016/j.jmaa.2004.06.056 doi: 10.1016/j.jmaa.2004.06.056
    [31] F. Li, H. Li, Hopf bifurcation of a predator-prey model with time delay and stage structure for the prey, Math. Comput. Model., 55 (2012), 672–679. https://doi.org/10.1016/j.mcm.2011.08.041 doi: 10.1016/j.mcm.2011.08.041
    [32] X. Jiang, X. Chen, T. Huang, H. Yan, Bifurcation and control for a predator-prey system with two delays, IEEE Trans. Circuits Syst. II, 68 (2020), 376–380. https://doi.org/10.1109/TCSII.2020.2987392 doi: 10.1109/TCSII.2020.2987392
    [33] S. Ruan, G. S. K. Wolkowicz, Bifurcation analysis of a chemostat model with a distributed delay, J. Math. Anal. Appl., 204 (1996), 786–812. https://doi.org/10.1006/jmaa.1996.0468 doi: 10.1006/jmaa.1996.0468
    [34] G. S. K. Wolkowicz, H. Xia, Global asymptotic behavior of a chemostat model with discrete delays, SIAM J. Appl. Math., 57 (1997), 1019–1043. https://doi.org/10.1137/S0036139995287314 doi: 10.1137/S0036139995287314
    [35] B. Tian, S. Zhong, N. Chen, X. Liu, Impulsive control strategy for a chemostat model with nutrient recycling and distributed time-delay, Math. Method. Appl. Sci., 37 (2018), 496–507. https://doi.org/10.1002/mma.2807 doi: 10.1002/mma.2807
    [36] S. Sun, C. Guo, X. Liu, Hopf bifurcation of a delayed chemostat model with general monotone response functions, Comp. Appl. Math., 37 (2018), 2714–2737. https://doi.org/10.1007/s40314-017-0476-3 doi: 10.1007/s40314-017-0476-3
    [37] X. Yu, S. Yuan, Asymptotic properties of a stochastic chemostat model with two distributed delays and nonlinear perturbation, Discrete Cont. Dyn. Syst. B, 25 (2020), 2373–2390. https://doi.org/10.3934/dcdsb.2020014 doi: 10.3934/dcdsb.2020014
    [38] J. K. Hale, S. M. Verduyn Lunel, Introduction of functional differential equations, New York: Springer, 1993. https://doi.org/10.1007/978-1-4612-4342-7
    [39] S. B. Hsu, Ordinary differential equations with applications, 2 Eds., World Scientific Publishing Company, 2013. https://doi.org/10.1142/8744
    [40] S. Ruan, J. Wei, On the zeros of transcendental functions with applications to stability of delay differential equations with two delays, Dynamics of Continuous, Discrete and Impulsive Systems Series A: Mathematical Analysis, 10 (2003), 863–874.
    [41] B. D. Hassard, N. D. Kazarinoff, Y. H. Wan, Theory and applications of Hopf bifurcation, Cambridge: Cambridge University Press, 1981.
    [42] H. I. Freedman, Y. Kuang, Stability switches in linear scalar neutral delay equations, Funkc. Ekvacioj, 34 (1991), 187–209.
    [43] O. Tagashira, T. Hara, Delayed feedback control for a chemostat model, Math. Biosci., 201 (2006), 101–112. https://doi.org/10.1016/j.mbs.2005.12.014 doi: 10.1016/j.mbs.2005.12.014
    [44] Y. Kuang, Delay differential equations with applications in population dynamics, Boston: Academic Press, 1993.
    [45] F. A. Rihan, C. Rajivganthi, Dynamics of fractional-order delay differential model of prey-predator system with Holling-type Ⅲ and infection among predators, Chaos Soliton. Fract., 141 (2020), 110365. https://doi.org/10.1016/j.chaos.2020.110365 doi: 10.1016/j.chaos.2020.110365
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2014) PDF downloads(99) Cited by(5)

Figures and Tables

Figures(6)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog