
A computer network can detect potential viruses through the use of kill signals, thereby minimizing the risk of virus propagation. In the realm of computer security and defensive strategies, computer viruses play a significant role. Understanding of their spread and extension is a crucial component. To address this issue of computer virus spread, we employ a fractional epidemiological SIRA model by utilizing the Caputo derivative. To solve the fractional-order computer virus model, we employ a computational technique known as the Jacobi collocation operational matrix method. This operational matrix transforms the problem of arbitrary order into a system of nonlinear algebraic equations. To analyze this system of arbitrary order, we derive an approximate solution for the fractional computer virus model, also considering the Vieta Lucas polynomials. Numerical simulations are performed and graphical representations are provided to illustrate the impact of order of the fractional derivative on different profiles.
Citation: Jagdev Singh, Jitendra Kumar, Devendra kumar, Dumitru Baleanu. A reliable numerical algorithm based on an operational matrix method for treatment of a fractional order computer virus model[J]. AIMS Mathematics, 2024, 9(2): 3195-3210. doi: 10.3934/math.2024155
[1] | Devendra Kumar, Hunney Nama, Dumitru Baleanu . Computational analysis of fractional Michaelis-Menten enzymatic reaction model. AIMS Mathematics, 2024, 9(1): 625-641. doi: 10.3934/math.2024033 |
[2] | Imran Talib, Md. Nur Alam, Dumitru Baleanu, Danish Zaidi, Ammarah Marriyam . A new integral operational matrix with applications to multi-order fractional differential equations. AIMS Mathematics, 2021, 6(8): 8742-8771. doi: 10.3934/math.2021508 |
[3] | Kamal Shah, Hafsa Naz, Muhammad Sarwar, Thabet Abdeljawad . On spectral numerical method for variable-order partial differential equations. AIMS Mathematics, 2022, 7(6): 10422-10438. doi: 10.3934/math.2022581 |
[4] | Zahra Pirouzeh, Mohammad Hadi Noori Skandari, Kamele Nassiri Pirbazari, Stanford Shateyi . A pseudo-spectral approach for optimal control problems of variable-order fractional integro-differential equations. AIMS Mathematics, 2024, 9(9): 23692-23710. doi: 10.3934/math.20241151 |
[5] | Jagdev Singh, Jitendra Kumar, Devendra Kumar, Dumitru Baleanu . A reliable numerical algorithm for fractional Lienard equation arising in oscillating circuits. AIMS Mathematics, 2024, 9(7): 19557-19568. doi: 10.3934/math.2024954 |
[6] | Hailun Wang, Fei Wu, Dongge Lei . A novel numerical approach for solving fractional order differential equations using hybrid functions. AIMS Mathematics, 2021, 6(6): 5596-5611. doi: 10.3934/math.2021331 |
[7] | Younes Talaei, Sanda Micula, Hasan Hosseinzadeh, Samad Noeiaghdam . A novel algorithm to solve nonlinear fractional quadratic integral equations. AIMS Mathematics, 2022, 7(7): 13237-13257. doi: 10.3934/math.2022730 |
[8] | Chang Phang, Abdulnasir Isah, Yoke Teng Toh . Poly-Genocchi polynomials and its applications. AIMS Mathematics, 2021, 6(8): 8221-8238. doi: 10.3934/math.2021476 |
[9] | Samia Bushnaq, Kamal Shah, Sana Tahir, Khursheed J. Ansari, Muhammad Sarwar, Thabet Abdeljawad . Computation of numerical solutions to variable order fractional differential equations by using non-orthogonal basis. AIMS Mathematics, 2022, 7(6): 10917-10938. doi: 10.3934/math.2022610 |
[10] | Zhi-Yuan Li, Mei-Chun Wang, Yu-Lan Wang . Solving a class of variable order nonlinear fractional integral differential equations by using reproducing kernel function. AIMS Mathematics, 2022, 7(7): 12935-12951. doi: 10.3934/math.2022716 |
A computer network can detect potential viruses through the use of kill signals, thereby minimizing the risk of virus propagation. In the realm of computer security and defensive strategies, computer viruses play a significant role. Understanding of their spread and extension is a crucial component. To address this issue of computer virus spread, we employ a fractional epidemiological SIRA model by utilizing the Caputo derivative. To solve the fractional-order computer virus model, we employ a computational technique known as the Jacobi collocation operational matrix method. This operational matrix transforms the problem of arbitrary order into a system of nonlinear algebraic equations. To analyze this system of arbitrary order, we derive an approximate solution for the fractional computer virus model, also considering the Vieta Lucas polynomials. Numerical simulations are performed and graphical representations are provided to illustrate the impact of order of the fractional derivative on different profiles.
Computer viruses are diminutive software programs clandestinely infiltrating computers, operating surreptitiously to dismantle software and hardware components. Their proliferation accelerated, particularly with rapid strains during the 1990s, they marked a notable surge post-mid-1980s. By the close of the 1990s, the viral landscape had metamorphosed dramatically, boasting hundreds of thousands of distinct strains, perpetually adapting and morphing to evade detection and countermeasures. During the 1980s, computer viruses introduced various forms of malicious code, inflicting harm upon small entities within systems unbeknownst to their operators. The detrimental impacts of these agents were relatively mild at the time, and their propagation occurred at a slower pace. In today's interconnected global society, the proliferation of viruses has accelerated significantly. Their unfair activities encompass a range of malicious actions, such as infiltrating email addresses and bank accounts, stealing passwords, manipulating data, causing financial loss and disrupting the basic operation of machines [1,2,3].
Computer virus epidemiological models utilize computational methods to simulate the propagation of computer viruses within interconnected networks. These models incorporate factors such as network topology, user behavior and virus characteristics to predict how malware spreads. By running simulations, the models aid in understanding virus dynamics, evaluating the impact of cybersecurity measures and guiding strategies for virus containment and prevention. These models are crucial tools for cybersecurity experts, helping them anticipate and respond to evolving cyber threats, safeguarding digital systems and data integrity. Kephart et al. [4] were pioneers in the initial exploration of modeling analogies between computer viruses and biological diseases, incorporating topological aspects. Billings et al. [5] examined the uniform prediction of computer virus propagation within interconnected networks. To obtain more information on virus propagation, various epidemiological models have been examined, such as SLBS [6,7], SIRA [8,9], SIRS [10,11] and SIERS [12]. Han and Tan [1] examined the dynamic behavior of computer viruses on the Internet. In exploring the relationship between epidemiology and computer viruses, Murray [13] appears to be among the early contributors and while he did not delve into specific models, his work focused on drawing analogies between computer virus dynamics and epidemiological defense strategies employed in public health. Nonlinear equations and systems find diverse applications across science and engineering, from modeling physical phenomena to optimizing complex systems. The richness of approaches for extracting solitary solutions, including numerical methods, analytical techniques and artificial intelligence algorithms, underscores the versatility and importance of nonlinear systems in various fields such as the KdV system [14], resonant wave equation [15], plasma [16], fuzzy fractional PDEs [17] and Schrodinger model [18]. Chen et al. [19,20] investigated a species interaction model and spatiotemporal SI model.
Fractional calculus and fractional differential equations have garnered significant attention in recent decades, owing to their promising applications in the realms of science and engineering. Fractional derivatives enable the accurate representation of physical phenomena, incorporating both present and past time dependencies. Furthermore, fractional calculus finds practical utility across various scientific and engineering domains, offering versatile solutions and insights for real-world challenges in these fields [21,22,23,24]. These fractional operators, characterized by their non-local nature, inherently encapsulate the system's historical information, leading to more realistic mathematical simulations. Additional information on daily life implementation of fractional calculus can be acquired [25,26,27,28].
The operational matrix collocation techniques are a numerical scheme employed for solving differential equations, particularly those of fractional order. This scheme offers an efficient approach by transforming fractional differential equations into algebraic systems through the use of operational matrices. These methods are known for their accuracy and versatility in modeling complex phenomena, making it valuable in several areas such as physics, finance and engineering. By discretizing fractional differential equations, the operational matrix collocation method facilitates the solution of problems that involve fractional derivatives, contributing to a better understanding of intricate processes. For a deeper understanding of the operational matrix collocation methods, one can refer to its application with various orthogonal polynomials such as Bernoulli polynomials [29], Genocchi polynomials [30], Laguerre polynomials [31] and Jacobi polynomials [32,33]. These polynomial functions play a significant role in the operational matrix collocation, helping to solve differential equations efficiently and accurately by transforming them into algebraic systems.
The novelty of this article lies in the transformation of the conventional ordinary differential equations into a fractional differential equation of a computer virus model and finds the solution of governing model with the help of the Jacobi operational matrix with the collocation method. The utilization of the operational matrix collocation method for solving these fractional differential equations represents a significant enhancement to the existing SIRA model [8,34], especially in the context of countering computer virus propagation. This innovative approach opens new avenues for understanding and addressing the dynamics of virus spread, contributing to the field of computer security and virus containment strategies. In this paper, we use the advantages of the aforementioned numerical algorithm to approximate solutions for our fractional SIRA model. By doing so, we aim to analyze the dynamics of the model with the utmost precision, minimizing errors in our analysis. The recommended approach combines the collocation method with the operational matrix of differentiation method for Jacobi polynomials. We obtain a system of nonlinear algebraic equations (NLAEs) whose approximate solutions provide results to combining the collocation approach with the operational matrix of fractional differentiations. Behavior of the solution is presented for the distinct fractional orders for the SIRA fractional model. We provide a comparative study with solutions obtained by the Vieta Lucas polynomial. The organization of this study is as follows: In Section 1, we describe the antidotal computer virus model. The basic definition of the calculus of fractional order and properties of Jacobi and Vieta Lucas polynomial are discussed in Section 3. In Section 4, we introduce the fractional SIRA model. In Section 5, a numerical scheme is discussed. we demonstrate the Jacobi collocation method to find a solution of the arbitrary order SIRA model in Section 6. Section 7 is dedicated to error and convergence analysis of the scheme. Numerical results are discussed in Section 8. Concluding remarks are given in Section 9.
In this section, we introduce a key component designed to prevent the propagation of computer viruses across networks. Within our considered model, the total population N consists of four distinct types of computers at time ξ, S(ξ) defines the numbers of susceptible computers but not those infected, the numbers of infected computers and those removed from a network at time ξ, represented by I(ξ), and R(ξ) is the number of removed computers but not those infected at ξ in the network and computers that equipped with antivirus programs denoted by A(ξ).
Our system modeling is predicated on the following assumptions[34]:
. The network expands by Ξ through the addition of new computers.
. The mortality rate for each group, excluding those attributed to virus causes, is represented as μ.
. Susceptible individuals represented by S(ξ) become infected as determined by the probability of infection during interactions with infected individuals and the rate is proportional to S(ξ)I(ξ), by a factor of β.
. At a rate α, the transfer of S(ξ) to antidotes occurs proportional to S(ξ)A(ξ). This implies that susceptible computers establish effective communication with the antivirus, which subsequently installs its protective software on the susceptible machine.
. An infected computer equipped with an antivirus program, effective against known viruses, undergoes a transformation process. It either transitions to an antidotal state at a rate γ proportional to A(ξ)I(ξ) or it becomes susceptible to additional infections at a rate δ.
. Because viruses are periodically detected and eliminated, infected computers are constantly reverting to a susceptible state at a consistent rate denoted as c. However, it is important to note that certain antivirus softwares may not possess the capability to completely eradicate all forms of malware.
. At a rate of ε, machines that have been removed from the network can be restored and transformed into a vulnerable ones.
Khanh [34] introduced the conventional SIRA computer virus propagation model with four types of computers for a total population N expressed as follows:
dSdξ=Ξ−αS(ξ)A(ξ)−βS(ξ)I(ξ)+cI(ξ)+εR(ξ)−μS(ξ), | (2.1) |
dIdξ=βS(ξ)I(ξ)−γA(ξ)I(ξ)−(c+δ−μ)I(ξ), | (2.2) |
dRdξ=δI(ξ)−(ε+μ)R(ξ), | (2.3) |
dAdξ=αS(ξ)A(ξ)+γA(ξ)I(ξ)−μA(ξ). | (2.4) |
Also, at time ξ, N(ξ) = S(ξ) + I(ξ) + R(ξ) + A(ξ) and N(ξ) is constant and equal to N.
We applied the Caputo type derivative of arbitrary order in this research paper. The Caputo derivative of fractional order ρ≥0 is provided [27] as
(Dρg(ξ))={1Γ(l−ρ)∫ξ0(ξ−t)l−ρ−1dldtlg(t)dt,l−1<ρ<l,dldξlg(ξ),ρ=l∈N. | (3.1) |
The analytical form of the shifted Jacobi polynomials on [0,1] [35] is given as
Mk(z)=k∑l=0(−1)k−lΓ(k+b+1)Γ(1+k+a+l+b)Γ(l+b+1)Γ(k+a+b+1)(k−l)!l!zl, |
where a and b are Jacobi polynomial parameters[35].
The orthogonal property of Jacobi polynomials:
∫10M(a,b)u(z)μ(a,b)(z)M(a,b)v(z)dz=δuvϕa,bu, |
where δuv is the Kronecker delta function and μ(a,b)(z) is the weight function defined as
μ(a,b)(z)=(1−z)azb, |
and
ϕa,bu=Γ(u+a+1)Γ(u+b+1)(2u+a+b+1)u!Γ(u+a+b+1). |
The function g defined in L2[0,1], having |g″(ξ)|≤K, can be expanded as an infinite sum of the shifted Jacobi polynomials:
g(ξ)=limq→∞q∑i=0ciMi(ξ), | (3.2) |
where
ci=1ϕ(a,b)i∫10g(ξ)Mi(ξ)μ(a,b)idξ;i=0,1,2,…,. | (3.3) |
Taking finite dimension approximations in Eq (3.2), we find
g(ξ)≅n∑i=0ciMi(ξ)=ΠTMn(ξ), | (3.4) |
where Π and Mn(ξ) are (n+1)×1 matrices represented by
Π=[Π0,Π1,….,Πn]T and Mn(ξ)=[M0(ξ),M1(ξ),….Mn(ξ)]T. | (3.5) |
Theorem 3.1. If Mn(ξ)=[M0(ξ),M1(ξ),…….,Mn(ξ)]T is Jacobi polynomials vector and ρ>0, then
DρMi(ξ)=D(ρ)Mn(ξ), | (3.6) |
where D(ρ) is (n+1)×(n+1) operational matrix of Caputo derivative of fractional order ρ and is specified as [33,35,36]:
D(ρ)=k∑l=[ρ](−1)k−lΓ(1+k+b)Γ(1+a+k+b+l)(k−l)!Γ(b+1+l)Γ(a+k+b+1)Γ(1−ρ+l) |
∗i∑m=0(−1)i−mi!Γ(1+a)Γ(a+i+b+m+1)Γ(1+l−ρ++mb)(2i+a+b+1)(i−m)!Γ(1+i+a)Γ(a+m+1)(m)!Γ(2+l−ρ+a+b+m). |
The analytical form of the shifted Vieta Lucas polynomials on [0,1] [37] is given as
Yn(τ)=2nn∑J=0(−1)J4n−J(2n−J−1)!J!(2n−2J)!τn−J;n≥1, | (3.7) |
with Y0(τ)=2. The function f defined in L2[0,1], having |f″(τ)|≤A, can be expanded as an infinite sum of the shifted Vieta Lucas polynomials:
f(τ)=limr→∞r∑i=0piYi(τ), | (3.8) |
where
pi=1θiπ∫10f(τ)yi(τ)u(τ)dτ;i=0,1,2,…,u(τ)=1√τ−τ2,θ0=4andθi=2(i≥1). | (3.9) |
Taking finite dimension approximations in Eq (3.8), we find
f(τ)≅n∑i=0aiYi(τ)=QTYn(τ), | (3.10) |
where Q and Yn(τ) are (n+1)×1 matrices represented by
Q=[q0,q1,….,qn]T and Yn(τ)=[Y0(τ),Y1(τ),….Yn(τ)]T. | (3.11) |
Theorem 3.2. If Yn(τ)=[Y0(τ),Y1(τ),…….,Yn(τ)]T is Vieta Lucas polynomials vector and γ>0, then
DγYi(τ)=D(γ)Yn(τ), | (3.12) |
where D(γ) is (n+1)×(n+1) operational matrix of Caputo derivative of fractional order γ and is specified as [37]:
D(γ)=(00⋯0⋮⋮⋯⋮00⋯0∑i−⌈γ⌉k=0Ωi,0,k∑i−⌈γ⌉k=0Ωi,1,k⋯∑i−⌈γ⌉k=0Ωi,m,k⋮⋮⋯⋮∑m−⌈γ⌉k=0Ωm,0,k∑m−⌈γ⌉k=0Ωm,1,k⋯∑m−⌈γ⌉k=0Ωm,m,k) and Ωi,j,k is given byΩi,j,k={i∑i−⌈γ⌉k=0(−1)k4i−kΓ(2i−k)Γ(i−k+1)Γ(i−k−γ+1/2)√πΓ(k+1)Γ(2i−2k+1)Γ(i−k−γ+1)2,j=0,2i∑i−⌈γ⌉k=0∑jr=0(−1)k+r√π4i−kΓ(2i−k)Γ(i−k+1)Γ(k+1)Γ(2i−2k+1)Γ(i−k−γ+1)×4j−rΓ(2j−r)Γ(i+j−k−r−γ+1/2)Γ(r+1)Γ(2j−2r+1)Γ(i+j+k−r−γ+1),j=1,2,3,… |
Proof. Please see [37].
The fractional SIRA model in the Caputo sense [8,34] with the arbitrary order ρ is expressed as
DρS(ξ)=Ξ−αS(ξ)A(ξ)−βS(ξ)I(ξ)+cI(ξ)+εR(ξ)−μS(ξ), | (4.1) |
DρI(ξ)=βS(ξ)I(ξ)−γA(ξ)I(ξ)−(c+δ−μ)I(ξ), | (4.2) |
DρR(ξ)=δI(ξ)−(ε+μ)R(ξ), | (4.3) |
DρA(ξ)=αS(ξ)A(ξ)+γA(ξ)I(ξ)−μA(ξ). | (4.4) |
Let S(ξ), I(ξ), R(ξ) and A(ξ) be defined as square summable function in L2[0,1]. Thus, by Eq (3.4), they can be approximated subsequently:
S(ξ)=n∑i=0ciMi(ξ)=ΠT1Mn(ξ), | (5.1) |
I(ξ)=n∑i=0ciMi(ξ)=ΠT2Mn(ξ), | (5.2) |
R(ξ)=n∑i=0ciMi(ξ)=ΠT3Mn(ξ), | (5.3) |
A(ξ)=n∑i=0ciMi(ξ)=ΠT4Mn(ξ). | (5.4) |
Now, by applying ρ order Caputo derivative in Eqs (5.1)–(5.4), we get
DρS(ξ)=ΠT1DρMn(ξ)≅ΠT1D(ρ)Mn(ξ), | (5.5) |
DρI(ξ)=ΠT2DρMn(ξ)≅ΠT2D(ρ)Mn(ξ), | (5.6) |
DρR(ξ)=ΠT3DρMn(ξ)≅ΠT3D(ρ)Mn(ξ), | (5.7) |
DρA(ξ)=ΠT4DρMn(ξ)≅ΠT4D(ρ)Mn(ξ), | (5.8) |
where D(ρ) is an operational matrix of the Caputo derivative for the Jacobi polynomial of arbitrary order ρ.
Also, from Eqs (5.1) to (5.4), we obtain
S(0)=ΠT1Mn(0), | (5.9) |
I(0)=ΠT2Mn(0), | (5.10) |
R(0)=ΠT3Mn(0), | (5.11) |
A(0)=ΠT4Mn(0). | (5.12) |
Grouping Eqs (4.1) and (5.5) with use of Eqs (5.1)–(5.4), we obtain
ΠT1D(ρ)Mn(ξ)−Ξ+α[(ΠT1Mn(ξ))(ΠT4Mn(ξ))]+β[(ΠT1Mn(ξ))ΠT2Mn(ξ)]−c(ΠT2Mn(ξ))−ε(ΠT4Mn(ξ))+μ(ΠT1Mn(ξ))=0. | (6.1) |
Grouping Eqs (4.2) and (5.6) with use of Eqs (5.1)–(5.4), we get
ΠT2D(ρ)Mn(ξ)−β[(ΠT1Mn(ξ))(ΠT2Mn(ξ))]+γ[(ΠT4Mn(ξ))(ΠT2Mn(ξ))]+(c+δ−μ)ΠT2Mn(ξ)=0. | (6.2) |
Grouping Eqs (4.3) and (5.7) with use of Eqs (5.1)–(5.4), we obtain
ΠT3D(ρ)Mn(ξ)−δ(ΠT2Mn(ξ))+(ε+μ)ΠT3Mn(ξ)=0. | (6.3) |
Grouping Eqs (4.4) and (5.8) with use of Eqs (5.1)–(5.4), we obtain
ΠT4D(ρ)Mn(ξ)−α[(ΠT1Mn(ξ))(ΠT4Mn(ξ))]−γ[(ΠT4Mn(ξ))(ΠT2Mn(ξ))]+μ(ΠT4Mn(ξ))=0. | (6.4) |
The residual for Eqs (6.1)–(6.4) are given as
R1n(ξ)=ΠT1D(ρ)Mn(ξ)−Ξ+α[(ΠT1Mn(ξ))(ΠT4Mn(ξ))]+β[(ΠT1Mn(ξ))ΠT2Mn(ξ)]−c(ΠT2Mn(ξ))−ε(ΠT4Mn(ξ))+μ(ΠT1Mn(ξ)), | (6.5) |
R2n(ξ)=ΠT2D(ρ)Mn(ξ)−β[(ΠT1Mn(ξ))(ΠT2Mn(ξ))]+γ[(ΠT4Mn(ξ))(ΠT2Mn(ξ))]+(c+δ−μ)ΠT2Mn(ξ), | (6.6) |
R3n(ξ)=ΠT3D(ρ)Mn(ξ)−δ(ΠT2Mn(ξ))+(ε+μ)ΠT3Mn(ξ), | (6.7) |
R4n(ξ)=ΠT4D(ρ)Mn(ξ)−α[(ΠT1Mn(ξ))(ΠT4Mn(ξ))]−γ[(ΠT4Mn(ξ))(ΠT2Mn(ξ))]+μ(ΠT4Mn(ξ)). | (6.8) |
Now, we collocate at n−1 points presented as ξi=in, i=0,1,...,n−2; in Eqs (6.5)–(6.8), we obtain
R1n(ξi)=ΠT1D(ρ)Mn(ξi)−Ξ+α[(ΠT1Mn(ξi))(ΠT4Mn(ξi))]+β[(ΠT1Mn(ξi))ΠT2Mn(ξi)]−c(ΠT2Mn(ξi))−ε(ΠT4Mn(ξi))+μ(ΠT1Mn(ξi)), | (6.9) |
R2n(ξi)=ΠT2D(ρ)Mn(ξi)−β[(ΠT1Mn(ξi))(ΠT2Mn(ξi))]+γ[(ΠT4Mn(ξi))(ΠT2Mn(ξi))]+(c+δ−μ)ΠT2Mn(ξi), | (6.10) |
R3n(ξi)=ΠT3D(ρ)Mn(ξi)−δ(ΠT2Mn(ξi))+(ε+μ)ΠT3Mn(ξi), | (6.11) |
R4n(ξi)=ΠT4D(ρ)Mn(ξi)−α[(ΠT1Mn(ξi))(ΠT4Mn(ξi))]−γ[(ΠT4Mn(ξi))(ΠT2Mn(ξi))]+μ(ΠT4Mn(ξi)). | (6.12) |
Furthermore, we can write from Eqs (5.1) to (5.4)
ΠT1Mn(0)−S(0)=0, | (6.13) |
ΠT2Mn(0)−I(0)=0, | (6.14) |
ΠT3Mn(0)−R(0)=0, | (6.15) |
ΠT4Mn(0)−A(0)=0. | (6.16) |
Using the collocation points in Eqs (6.9)–(6.12) along with Eqs (6.13)–(6.16), we obtain a set of equations with a similar number of unknowns. The approximated solution of the fractional SIRA model is obtained by solving this system.
Theorem 7.1. Consider the functions Ψ:[0,1]→R and Ψ∈C(n+1)[0,1], where Ψn(t) is the nth approximation acquired by utilizing Jacobi polynomials. Then, we have
FhΨ,n=‖Ψ−Ψn‖L2δ[0,1], | (7.1) |
and the error vector in Eq (7.1) tending to 0 as n→∞.
Proof. Please refer the work [38,39].
Theorem 7.2. If Fρ,hD,n is the error vector for the ρ order operational matrix of differentiation, that is acquired by utilizing (n+1) Jacobi polynomials. in this situation, we have
Fρ,hD,n=D(ρ)Mn(ξ)−DρMn(ξ), | (7.2) |
tending to 0 as n→∞.
Proof. Please see [40].
Suppose that Vn is the n-dimensional subspace generated by (Mi)0≤i≤n for L2h[0,1]. Consider ψn as infimum of the functional on the space Vn. Then, it can be written as
Vn⊂Vn+1 and ψn+1≥ψn. |
Theorem 7.3. Suppose the functional L. Then,
limn→∞ψn(ξ)=ψ(ξ)=infξ∈[0,1]L(ξ). |
Proof. See [41].
Functional for Eq (4.1) is
L(ξ)=DρS(ξ)−Ξ+αS(ξ)A(ξ)+βS(ξ)I(ξ)−cI(ξ)−εR(ξ)+μS(ξ)=0. | (7.3) |
using Eqs (5.1) and (5.4), we get
L(E)(ξ)=ΠT1D(ρ)(Mn(ξ)+Fρ,hD,n)−Ξ+α[(ΠT1(Mn(ξ)+FhD,n))(ΠT4(Mn(ξ)+FhD,n0)]+β[(ΠT1(Mn(ξ)+FhD,n)ΠT2(Mn(ξ)+FhD,n)−c(ΠT2Mn(ξ)+FhD,n)−ε(ΠT4Mn(ξ)+FhD,n)+μ(ΠT1Mn(ξ)+FhD,n), | (7.4) |
where
FhD,n=ΠTM(ξ)−ΠTMn(ξ), | (7.5) |
Fρ,hD,n=D(ρ)Mn(ξ)−DρSn(ξ). | (7.6) |
Residual for Eq (7.4)
R1n(E)(ξ)=ΠT1D(ρ)(Mn(ξ)+Fρ,hD,n)−Ξ+α[(ΠT1(Mn(ξ)+FhD,n))(ΠT4(Mn(ξ)+FhD,n0)]+β[(ΠT1(Mn(ξ)+FhD,n)ΠT2(Mn(ξ)+FhD,n)−c(ΠT2Mn(ξ)+FhD,n)−ε(ΠT4Mn(ξ)+FhD,n)+μ(ΠT1Mn(ξ)+FhD,n). | (7.7) |
Now, colocating n−1 points in Eq (7.7) by ξi=in,i=0,1,2,…,n−2, we find
R(E)n(ξi)=0. | (7.8) |
Combining Eqs (6.13) to (6.16) and the collocation points in Eq (7.8), we attain a system of NLAEs. The result for SIRA of the fractional order is provided by this system's solution. Consider this solution to be presented by ψ∗n(ξ). With the help of results 7.1, 7.2 and n→∞,
ψ∗n(ξ)→ψn(ξ). | (7.9) |
From result 7.3 and Eq (7.9), we obtain
limn→∞ψ∗n(ξ)=ψ(ξ). |
The same proof can be formed for Eqs (4.2)–(4.4).
In this part, we applied our suggested technique to a numerical simulation of the arbitrary order antidotal computer virus model with a starting value as S(0)=0.15, I(0)=0.25, A(0)=0.5 and R(0)=0.5 with value of various parameters Ξ=0.5, α=0.1, γ=0.01, β=0.5, δ=0.1, μ=0.035 and ε=0.009. We obtained results for the Jacobi Collocation method (JCM) as well as the Vieta Lucas collocation method (VLCM) for arbitrary order ρ=0.7, ρ=0.8, ρ=0.9 and ρ=1. From Figures 1–4, it is observed that the solution changes regularly from arbitrary order to classical order. For ρ=1, obtained results for S(ξ), I(ξ), R(ξ) and (ξ) are presented by tabular form for various values of ξ. The behavior of the solution S(ξ) is shown in Figure 1 at various values of different parameters and ρ. From Figure 1, we observe that the suspected machine S(ξ) decreases as the time derivative order ρ increases and as time ξ increases, suspected computer increases. The comparative analysis of the obtained results for S(ξ) by utilizing distinct techniques is shown in Table 1. From Table 1, we can observe that outcomes from the presented techniques are in a good agreement for practical implementations. The response of the solution I(ξ) is shown in Figure 2 at various values of the parameters and ρ. From Figure 2, we observe that infected machines I(ξ) enhance as the time derivative order ρ increases and as time ξ increases, the infected computers decrease. The comparative analysis of the acquired results for I(ξ) by utilizing both techniques is shown in Table 2, which are in good agreement. The behavior of the solution R(ξ) is shown in Figure 3 at distinct value of ρ. From Figure 3, we observe that the removed machine R(ξ) increases as the time derivative order ρ increases and when time ξ increases, the removed computers decreases. The comparative analysis of the obtained results for R(ξ) by utilizing JCM and VLCM is shown in Table 3. The response of the solution A(ξ) is shown in Figure 4 at distinct values of various parameters and ρ. From Figure 4, we observe that A(ξ) decreases as the time derivative order ρ increases. As time ξ increases, A(ξ) decreases initially and increases after some time. The comparative analysis of the acquired results for A(ξ) by utilizing distinct techniques is shown in Table 4.
ξ | JCM | VLCM |
0.0 | 0.15 | 0.15 |
0.1 | 0.1990325248 | 0.1975906395 |
0.2 | 0.2470553771 | 0.2446003537 |
0.3 | 0.2940870100 | 0.2910559541 |
0.4 | 0.3401301272 | 0.3369814909 |
0.5 | 0.3851731501 | 0.3823973678 |
0.6 | 0.4291925157 | 0.4273203404 |
0.7 | 0.4721548196 | 0.4717635179 |
0.8 | 0.5140188299 | 0.5157363618 |
0.9 | 0.5547373901 | 0.5592446871 |
1.0 | 0.5942592167 | 0.6022906612 |
ξ | JCM | VLCM |
0.0 | 0.25 | 0.25 |
0.1 | 0.2402530314 | 0.2412089787 |
0.2 | 0.2314469362 | 0.2330196999 |
0.3 | 0.2234947441 | 0.2253965391 |
0.4 | 0.2163200810 | 0.2183060971 |
0.5 | 0.2098559901 | 0.2117171136 |
0.6 | 0.2040436907 | 0.2056004677 |
0.7 | 0.1988315292 | 0.1999291775 |
0.8 | 0.1941740904 | 0.1946784005 |
0.9 | 0.1900314437 | 0.1898254336 |
1.0 | 0.1863684903 | 0.1853497128 |
ξ | JCM | VLCM |
0.0 | 0.5 | 0.5 |
0.1 | 0.4981759351 | 0.4981771325 |
0.2 | 0.4963571199 | 0.4963492400 |
0.3 | 0.4945469086 | 0.4945170834 |
0.4 | 0.4927486700 | 0.4926811502 |
0.5 | 0.4909655233 | 0.4908419282 |
0.6 | 0.4892003515 | 0.4889999050 |
0.7 | 0.4874558102 | 0.4871555681 |
0.8 | 0.4857343370 | 0.4853094055 |
0.9 | 0.4840381578 | 0.4834619045 |
1.0 | 0.4823692952 | 0.4816135528 |
ξ | JCM | VLCM |
0.0 | 0.5 | 0.5 |
0.1 | 0.4992475202 | 0.4997353336 |
0.2 | 0.4987372610 | 0.4995822083 |
0.3 | 0.4984644860 | 0.4995398331 |
0.4 | 0.4984251515 | 0.4996084505 |
0.5 | 0.4986153142 | 0.4997892670 |
0.6 | 0.4990311170 | 0.5000844538 |
0.7 | 0.4996687841 | 0.5004971474 |
0.8 | 0.5005246269 | 0.5010314475 |
0.9 | 0.5005246269 | 0.5016924198 |
1.0 | 0.5028766090 | 0.5024860939 |
In this study, our primary objective is to explore the potential advantages of fractional derivatives in enhancing memory and addressing computer virus-related issues and computing the numerical results for a fractional model. Mathematical models serve as pivotal tools in computer network security, offering valuable insights and early detection capabilities for viruses. In this context, the concept of kill signals becomes invaluable as it empowers users to pro actively safeguard their systems against virus threats. We have suggested a computational scheme for the fractional model of a computer virus model. The arbitrary order SIRA model is solved using the collocation operational matrix method of Jacobi polynomials. The obtained solution is also compared by the results computed using Vieta Lucas polynomials. Also, it is noticeable that the implemented techniques are much easier and user friendly in comparison to other methods. The numerical simulation for S(ξ), I(ξ), R(ξ) and A(ξ) are shown graphically. We obtaine the behavior of S(ξ), I(ξ), R(ξ) and A(ξ) for different arbitrary orders ρ=0.7, ρ=0.8, ρ=0.9 and ρ=1. We observe that at ρ=1, the solutions of the computer virus model by applying both operational matrix techniques with collocation are in a great agreement. The outcomes indicate that proposed techniques are quite suitable and accurate to examine arbitrary order models with the Caputo operator.
The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.
The authors declare no conflicts of interest in this manuscript.
[1] |
X. Han, Q. Tan, Dynamical behavior of computer virus on Internet, Appl. Math. Comput., 217 (2010), 2520–2526. https://doi.org/10.1016/j.amc.2010.07.064 doi: 10.1016/j.amc.2010.07.064
![]() |
[2] |
J. Kim, S. Radhakrishnan, J. Jang, Cost optimization in SIS model of worm infection, ETRI J., 28 (2006), 692–695. https://doi.org/10.4218/etrij.06.0206.0026 doi: 10.4218/etrij.06.0206.0026
![]() |
[3] |
J. R. C. Piqueira, V. O. Araujo, A modified epidemiological model for computer viruses, Appl. Math. Comput., 213 (2009), 355–360. https://doi.org/10.1016/j.amc.2009.03.023 doi: 10.1016/j.amc.2009.03.023
![]() |
[4] |
J. O. Kephart, S. R. White, D. M. Chess, Computers and epidemiology, IEEE Spectr., 30 (1993), 20–26. https://doi.org/10.1109/6.275061 doi: 10.1109/6.275061
![]() |
[5] |
L. Billings, W. M. Spears, I. B. Schwartz, A unified prediction of computer virus spread in connected networks, Phys. Lett. A, 297 (2002), 261–266. https://doi.org/10.1016/S0375-9601(02)00152-4 doi: 10.1016/S0375-9601(02)00152-4
![]() |
[6] |
J. Ren, X. Yang, Q. Zhu, L. X. Yang, C. Zhang, A novel computer virus model and its dynamics, Nonlinear Anal. Real, 13 (2012), 376–384. https://doi.org/10.1016/j.nonrwa.2011.07.048 doi: 10.1016/j.nonrwa.2011.07.048
![]() |
[7] |
L. X. Yang, X. Yang, The spread of computer viruses under the influence of removable storage devices, Appl. Math. Comput., 219 (2012), 3914–3922. https://doi.org/10.1016/j.amc.2012.10.027 doi: 10.1016/j.amc.2012.10.027
![]() |
[8] |
R. Zarin, H. Khaliq, A. Khan, I. Ahmed, U. W. Humphries, A numerical study based on haar wavelet collocation methods of fractional-order antidotal computer virus model, Symmetry, 15 (2023), 621. https://doi.org/10.3390/sym15030621 doi: 10.3390/sym15030621
![]() |
[9] |
J. Singh, D. Kumar, Z. Hammouch, A. Atangana, A fractional epidemiological model for computer viruses pertaining to a new fractional derivative, Appl. Math. Comput., 316 (2018), 504–515. https://doi.org/10.1016/j.amc.2017.08.048 doi: 10.1016/j.amc.2017.08.048
![]() |
[10] |
C. Gan, X. Yang, W. Liu, Q. Zhu, A propagation model of computer virus with nonlinear vaccination probability, Commun. Nonlinear Sci., 19 (2014), 92–100. https://doi.org/10.1016/j.cnsns.2013.06.018 doi: 10.1016/j.cnsns.2013.06.018
![]() |
[11] |
Y. Muroya, Y. Enatsu, H. Li, Global stability of a delayed SIRS computer virus propagation model, Int. J. Comput. Math., 91 (2014), 347–367. https://doi.org/10.1080/00207160.2013.790534 doi: 10.1080/00207160.2013.790534
![]() |
[12] |
B. K. Mishra, S. K. Pandey, Dynamic model of worms with vertical transmission in computer network, Appl. Math. Comput., 217 (2011), 8438–8446. https://doi.org/10.1016/j.amc.2011.03.041 doi: 10.1016/j.amc.2011.03.041
![]() |
[13] |
W. H. Murray, The application of epidemiology to computer viruses, Comput. Secur., 7 (1988), 139–145. https://doi.org/10.1016/0167-4048(88)90327-6 doi: 10.1016/0167-4048(88)90327-6
![]() |
[14] |
J. Wang, K. Shehzad, A. R. Seadawy, M. Arshad, F. Asmat, Dynamic study of multi-peak solitons and other wave solutions of new coupled KdV and new coupled Zakharov-Kuznetsov systems with their stability, J. Taibah Univ. Sci., 17 (2023), 2163872. https://doi.org/10.1080/16583655.2022.2163872 doi: 10.1080/16583655.2022.2163872
![]() |
[15] | U. Younas, A. R. Seadawy, M. Younis, S. T. R. Rizvi, Optical solitons and closed form solutions to the (3+1)-dimensional resonant Schrödinger dynamical wave equation, Int. J. Mod. Phys. B, 34 (2020), 2050291. |
[16] |
A. R. Seadawy, Stability analysis for Zakharov-Kuznetsov equation of weakly nonlinear ion-acoustic waves in a plasma, Comput. Math. Appl., 67 (2014), 172–180. https://doi.org/10.1016/j.camwa.2013.11.001 doi: 10.1016/j.camwa.2013.11.001
![]() |
[17] |
K. Shah, A. R. Seadawy, M. Arfan, Evaluation of one dimensional fuzzy fractional partial differential equations, Alex. Eng. J., 59 (2020), 3347–3353. https://doi.org/10.1016/j.aej.2020.05.003 doi: 10.1016/j.aej.2020.05.003
![]() |
[18] |
R. A. El-Nabulsi, W. Anukool, A family of nonlinear Schrodinger equations and their solitons solutions, Chaos Soliton. Fract., 166 (2023), 112907. https://doi.org/10.1016/j.chaos.2022.112907 doi: 10.1016/j.chaos.2022.112907
![]() |
[19] |
M. Chen, R. Wu, X. Wang, Non-constant steady states and Hopf bifurcation of a species interaction model, Commun. Nonlinear Sci., 116 (2023), 106846. https://doi.org/10.1016/j.cnsns.2022.106846 doi: 10.1016/j.cnsns.2022.106846
![]() |
[20] |
M. Chen, Z. Hu, Q. Zheng, H. M. Srivastava, Dynamics analysis of a spatiotemporal SI model, Alex. Eng. J., 74 (2023), 705–714. https://doi.org/10.1016/j.aej.2023.05.044 doi: 10.1016/j.aej.2023.05.044
![]() |
[21] |
S. Kumar, A. Ahmadian, R. Kumar, D. Kumar, J. Singh, D. Baleanu, et al., An efficient numerical method for fractional SIR epidemic model of infectious disease by using Bernstein wavelets, Mathematics, 8 (2020), 558. https://doi.org/10.3390/math8040558 doi: 10.3390/math8040558
![]() |
[22] |
J. Singh, A. M. Alshehri, Sushila, D. Kumar, Computational analysis of fractional Liénard's equation with exponential memory, J. Comput. Nonlinear Dynam., 18 (2023), 041004. https://doi.org/10.1115/1.4056858 doi: 10.1115/1.4056858
![]() |
[23] |
H. M. Srivastava, D. Kumar, J. Singh, An efficient analytical technique for fractional model of vibration equation, Appl. Math. Model., 45 (2017), 192–204. https://doi.org/10.1016/j.apm.2016.12.008 doi: 10.1016/j.apm.2016.12.008
![]() |
[24] |
J. Singh, A. Gupta, D. Kumar, Computational analysis of the fractional Riccati differential equation with Prabhakar-type memory, Mathematics, 11 (2023), 644. https://doi.org/10.3390/math11030644 doi: 10.3390/math11030644
![]() |
[25] | D. Kumar, J. Singh, D. Baleanu, A fractional model of convective radial fins with temperature-dependent thermal conductivity, Rom. Rep. Phys., 69 (2017), 103. |
[26] | I. Podlubny, Fractional differential equations, mathematics in science and engineering, Academic Press, 1993. |
[27] | K. S. Miller, B. Ross, An introduction to the fractional calculus and fractional differential equations, John Wiley Sons, 1993. |
[28] |
D. L. Suthar, S. D. Purohit, A. M. Khan, S. Dave, Impacts of environmental pollution on the growth and conception of biological populations involving incomplete I-function, Intell. Learn. Comput. Vision, 2020,567–575. https://doi.org/10.1007/978-981-33-4582-9_44 doi: 10.1007/978-981-33-4582-9_44
![]() |
[29] |
E. Tohidi, A. H. Bhrawy, K. Erfani, A collocation method based on Bernoulli operational matrix for numerical solution of generalized pantograph equation, Appl. Math. Modell., 37 (2013), 4283–4294. https://doi.org/10.1016/j.apm.2012.09.032 doi: 10.1016/j.apm.2012.09.032
![]() |
[30] |
A. Isah, C. Phang, P. Phang, Collocation method based on Genocchi operational matrix for solving generalized fractional pantograph equations, Int. J. Differ. Equ., (2017), 1–10. https://doi.org/10.1155/2017/2097317 doi: 10.1155/2017/2097317
![]() |
[31] | P. Pandey, S. Kumar, H. Jafari, S. Das, An operational matrix for solving time-fractional order Cahn-Hilliard equation, Serb. Soc. Heat Transf. Eng., 2019. |
[32] |
A. H. Bhrawy, A Jacobi spectral collocation method for solving multi-dimensional nonlinear fractional sub-diffusion equations, Numer. Algorithms, 73 (2016), 91–113. https://doi.org/10.1007/s11075-015-0087-2 doi: 10.1007/s11075-015-0087-2
![]() |
[33] | A. H. Bhrawy, M. M. Tharwat, M. A. Alghamdi, A new operational matrix of fractional integration for shifted Jacobi polynomials, Bull. Malays. Math. Sci. Soc., 37 (2014), 983–995. |
[34] |
N. H. Khanh, Dynamical analysis and approximate iterative solutions of an antidotal computer virus model, Int. J. Appl. Comput. Math., 3 (2017), 829–841. https://doi.org/10.1007/s40819-017-0385-6 doi: 10.1007/s40819-017-0385-6
![]() |
[35] |
E. H. Doha, A. H. Bhrawy, D. Baleanu, S. S. Ezz-Eldien, The operational matrix formulation of the Jacobi tau approximation for space fractional diffusion equation, Adv. Differ. Equ., (2014), 1–14. https://doi.org/10.1186/1687-1847-2014-231 doi: 10.1186/1687-1847-2014-231
![]() |
[36] |
A. Ahmadian, M. Suleiman, S. Salahshour, D. Baleanu, A Jacobi operational matrix for solving a fuzzy linear fractional differential equation, Adv. Differ. Equ., (2013), 1–29. https://doi.org/10.1186/1687-1847-2013-104 doi: 10.1186/1687-1847-2013-104
![]() |
[37] |
Z. A. Noor, I. Talib, T. Abdeljawad, M. A. Alqudah, Numerical study of caputo Fractional-Order differential equations by developing new operational matrices of Vieta-Lucas polynomials, Fractal Fract., 6 (2022), 79. https://doi.org/10.3390/fractalfract6020079 doi: 10.3390/fractalfract6020079
![]() |
[38] | E. Kreyszig, Introductory functional analysis with applications, New York: JohnWiley Sons Inc., 1991. |
[39] | T. J. Rivlin, An introduction to the approximation of functions, Courier Corporation, 1981. |
[40] |
S. S. Ezz-Eldien, A. A. El-Kalaawy, Numerical simulation and convergence analysis of fractional optimization problems with right-si ded Caputo fractional derivative, J. Comput. Nonlin. Dyn., 13 (2018). https://doi.org/10.1115/1.4037597 doi: 10.1115/1.4037597
![]() |
[41] |
S. S. Ezz-Eldien, New quadrature approach based on operational matrix for solving a class of fractional variational problems, J. Comput. Phys., 317 (2017), 362–381. https://doi.org/10.1016/j.jcp.2016.04.045 doi: 10.1016/j.jcp.2016.04.045
![]() |
1. | Anil Kumar, Pawan Kumar Shaw, Sunil Kumar, Numerical investigation of pine wilt disease using fractal–fractional operator, 2024, 0973-1458, 10.1007/s12648-024-03298-x | |
2. | N.H. Sweilam, S.M. Al-Mekhlafi, W.S. Abdel Kareem, G. Alqurishi, A new crossover dynamics mathematical model of monkeypox disease based on fractional differential equations and the Ψ-Caputo derivative: Numerical treatments, 2025, 111, 11100168, 181, 10.1016/j.aej.2024.10.019 | |
3. | Devendra Kumar, Hunney Nama, Dumitru Baleanu, Dynamical and computational analysis of fractional order mathematical model for oscillatory chemical reaction in closed vessels, 2024, 180, 09600779, 114560, 10.1016/j.chaos.2024.114560 | |
4. | Jagdev Singh, Jitendra Kumar, Devendra Kumar, Dumitru Baleanu, A reliable numerical algorithm for fractional Lienard equation arising in oscillating circuits, 2024, 9, 2473-6988, 19557, 10.3934/math.2024954 | |
5. | Jagdev Singh, Arpita Gupta, Dumitru Baleanu, A novel efficient analytical technique and its application to fractional Cauchy reaction–diffusion equations, 2024, 0217-9849, 10.1142/S0217984925500381 | |
6. | Muner M. Abou Hasan, Ahlam M. Alghanmi, Hannah Al Ali, Zindoga Mukandavire, Improved numerical schemes to solve general fractional diabetes models, 2024, 109, 11100168, 29, 10.1016/j.aej.2024.08.095 | |
7. | Devendra Kumar, Hunney Nama, Dumitru Baleanu, An efficient numerical method for fractional order nonlinear two-point boundary value problem occurring in chemical reactor theory, 2025, 118, 11100168, 125, 10.1016/j.aej.2025.01.027 | |
8. | Octavian Postavaru, Antonela Toma, A fractional hybrid function composed of block-pulses and fractional Fibonacci polynomials for solving multiterm fractional variable-order differential equations, 2025, 44, 2238-3603, 10.1007/s40314-025-03110-4 |
ξ | JCM | VLCM |
0.0 | 0.15 | 0.15 |
0.1 | 0.1990325248 | 0.1975906395 |
0.2 | 0.2470553771 | 0.2446003537 |
0.3 | 0.2940870100 | 0.2910559541 |
0.4 | 0.3401301272 | 0.3369814909 |
0.5 | 0.3851731501 | 0.3823973678 |
0.6 | 0.4291925157 | 0.4273203404 |
0.7 | 0.4721548196 | 0.4717635179 |
0.8 | 0.5140188299 | 0.5157363618 |
0.9 | 0.5547373901 | 0.5592446871 |
1.0 | 0.5942592167 | 0.6022906612 |
ξ | JCM | VLCM |
0.0 | 0.25 | 0.25 |
0.1 | 0.2402530314 | 0.2412089787 |
0.2 | 0.2314469362 | 0.2330196999 |
0.3 | 0.2234947441 | 0.2253965391 |
0.4 | 0.2163200810 | 0.2183060971 |
0.5 | 0.2098559901 | 0.2117171136 |
0.6 | 0.2040436907 | 0.2056004677 |
0.7 | 0.1988315292 | 0.1999291775 |
0.8 | 0.1941740904 | 0.1946784005 |
0.9 | 0.1900314437 | 0.1898254336 |
1.0 | 0.1863684903 | 0.1853497128 |
ξ | JCM | VLCM |
0.0 | 0.5 | 0.5 |
0.1 | 0.4981759351 | 0.4981771325 |
0.2 | 0.4963571199 | 0.4963492400 |
0.3 | 0.4945469086 | 0.4945170834 |
0.4 | 0.4927486700 | 0.4926811502 |
0.5 | 0.4909655233 | 0.4908419282 |
0.6 | 0.4892003515 | 0.4889999050 |
0.7 | 0.4874558102 | 0.4871555681 |
0.8 | 0.4857343370 | 0.4853094055 |
0.9 | 0.4840381578 | 0.4834619045 |
1.0 | 0.4823692952 | 0.4816135528 |
ξ | JCM | VLCM |
0.0 | 0.5 | 0.5 |
0.1 | 0.4992475202 | 0.4997353336 |
0.2 | 0.4987372610 | 0.4995822083 |
0.3 | 0.4984644860 | 0.4995398331 |
0.4 | 0.4984251515 | 0.4996084505 |
0.5 | 0.4986153142 | 0.4997892670 |
0.6 | 0.4990311170 | 0.5000844538 |
0.7 | 0.4996687841 | 0.5004971474 |
0.8 | 0.5005246269 | 0.5010314475 |
0.9 | 0.5005246269 | 0.5016924198 |
1.0 | 0.5028766090 | 0.5024860939 |
ξ | JCM | VLCM |
0.0 | 0.15 | 0.15 |
0.1 | 0.1990325248 | 0.1975906395 |
0.2 | 0.2470553771 | 0.2446003537 |
0.3 | 0.2940870100 | 0.2910559541 |
0.4 | 0.3401301272 | 0.3369814909 |
0.5 | 0.3851731501 | 0.3823973678 |
0.6 | 0.4291925157 | 0.4273203404 |
0.7 | 0.4721548196 | 0.4717635179 |
0.8 | 0.5140188299 | 0.5157363618 |
0.9 | 0.5547373901 | 0.5592446871 |
1.0 | 0.5942592167 | 0.6022906612 |
ξ | JCM | VLCM |
0.0 | 0.25 | 0.25 |
0.1 | 0.2402530314 | 0.2412089787 |
0.2 | 0.2314469362 | 0.2330196999 |
0.3 | 0.2234947441 | 0.2253965391 |
0.4 | 0.2163200810 | 0.2183060971 |
0.5 | 0.2098559901 | 0.2117171136 |
0.6 | 0.2040436907 | 0.2056004677 |
0.7 | 0.1988315292 | 0.1999291775 |
0.8 | 0.1941740904 | 0.1946784005 |
0.9 | 0.1900314437 | 0.1898254336 |
1.0 | 0.1863684903 | 0.1853497128 |
ξ | JCM | VLCM |
0.0 | 0.5 | 0.5 |
0.1 | 0.4981759351 | 0.4981771325 |
0.2 | 0.4963571199 | 0.4963492400 |
0.3 | 0.4945469086 | 0.4945170834 |
0.4 | 0.4927486700 | 0.4926811502 |
0.5 | 0.4909655233 | 0.4908419282 |
0.6 | 0.4892003515 | 0.4889999050 |
0.7 | 0.4874558102 | 0.4871555681 |
0.8 | 0.4857343370 | 0.4853094055 |
0.9 | 0.4840381578 | 0.4834619045 |
1.0 | 0.4823692952 | 0.4816135528 |
ξ | JCM | VLCM |
0.0 | 0.5 | 0.5 |
0.1 | 0.4992475202 | 0.4997353336 |
0.2 | 0.4987372610 | 0.4995822083 |
0.3 | 0.4984644860 | 0.4995398331 |
0.4 | 0.4984251515 | 0.4996084505 |
0.5 | 0.4986153142 | 0.4997892670 |
0.6 | 0.4990311170 | 0.5000844538 |
0.7 | 0.4996687841 | 0.5004971474 |
0.8 | 0.5005246269 | 0.5010314475 |
0.9 | 0.5005246269 | 0.5016924198 |
1.0 | 0.5028766090 | 0.5024860939 |