Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Efficient method for solving nonlinear weakly singular kernel fractional integro-differential equations

  • This paper introduced an efficient method to obtain the solution of linear and nonlinear weakly singular kernel fractional integro-differential equations (WSKFIDEs). It used Riemann-Liouville fractional integration (R-LFI) to remove singularities and approximated the regularized problem with a combined approach using the generalized fractional step-Mittag-Leffler function (GFSMLF) and operational integral fractional Mittag matrix (OIFMM) method. The resulting algebraic equations were turned into an optimization problem. We also proved the method's accuracy in approximating any function, as well as its fractional differentiation and integration within WSKFIDEs. The proposed method was performed on some attractive examples in order to show how their solutions behave at various values of the fractional order ϝ. The paper provided a valuable contribution to the field of fractional calculus (FC) by presenting a novel method for solving WSKFIDEs. Additionally, the accuracy of this method was verified by comparing its results with those obtained using other methods.

    Citation: Ismail Gad Ameen, Dumitru Baleanu, Hussien Shafei Hussien. Efficient method for solving nonlinear weakly singular kernel fractional integro-differential equations[J]. AIMS Mathematics, 2024, 9(6): 15819-15836. doi: 10.3934/math.2024764

    Related Papers:

    [1] Mohamed Gamal, Tahair Rasham, Watcharaporn Cholamjiak, Fu-Gui Shi, Choonkil Park . New iterative scheme for fixed point results of weakly compatible maps in multiplicative GMmetric space via various contractions with application. AIMS Mathematics, 2022, 7(8): 13681-13703. doi: 10.3934/math.2022754
    [2] Tatjana Došenović, Dušan Rakić, Stojan Radenović, Biljana Carić . Ćirić type nonunique fixed point theorems in the frame of fuzzy metric spaces. AIMS Mathematics, 2023, 8(1): 2154-2167. doi: 10.3934/math.2023111
    [3] Yunpeng Zhao, Fei He, Shumin Lu . Several fixed-point theorems for generalized Ćirić-type contraction in Gb-metric spaces. AIMS Mathematics, 2024, 9(8): 22393-22413. doi: 10.3934/math.20241089
    [4] Huaping Huang, Bessem Samet . Two fixed point theorems in complete metric spaces. AIMS Mathematics, 2024, 9(11): 30612-30637. doi: 10.3934/math.20241478
    [5] Muhammad Tariq, Mujahid Abbas, Aftab Hussain, Muhammad Arshad, Amjad Ali, Hamid Al-Sulami . Fixed points of non-linear set-valued (α,ϕM)-contraction mappings and related applications. AIMS Mathematics, 2022, 7(5): 8861-8878. doi: 10.3934/math.2022494
    [6] Xionghui Xu, Jijiang Sun . Ground state solutions for periodic Discrete nonlinear Schrödinger equations. AIMS Mathematics, 2021, 6(12): 13057-13071. doi: 10.3934/math.2021755
    [7] Muhammad Waseem Asghar, Mujahid Abbas, Cyril Dennis Enyi, McSylvester Ejighikeme Omaba . Iterative approximation of fixed points of generalized αm-nonexpansive mappings in modular spaces. AIMS Mathematics, 2023, 8(11): 26922-26944. doi: 10.3934/math.20231378
    [8] Muhammad Nazam, Aftab Hussain, Asim Asiri . On a common fixed point theorem in vector-valued b-metric spaces: Its consequences and application. AIMS Mathematics, 2023, 8(11): 26021-26044. doi: 10.3934/math.20231326
    [9] Muhammad Tariq, Muhammad Arshad, Mujahid Abbas, Eskandar Ameer, Saber Mansour, Hassen Aydi . A relation theoretic m-metric fixed point algorithm and related applications. AIMS Mathematics, 2023, 8(8): 19504-19525. doi: 10.3934/math.2023995
    [10] Amjad Ali, Muhammad Arshad, Eskandar Ameer, Asim Asiri . Certain new iteration of hybrid operators with contractive M -dynamic relations. AIMS Mathematics, 2023, 8(9): 20576-20596. doi: 10.3934/math.20231049
  • This paper introduced an efficient method to obtain the solution of linear and nonlinear weakly singular kernel fractional integro-differential equations (WSKFIDEs). It used Riemann-Liouville fractional integration (R-LFI) to remove singularities and approximated the regularized problem with a combined approach using the generalized fractional step-Mittag-Leffler function (GFSMLF) and operational integral fractional Mittag matrix (OIFMM) method. The resulting algebraic equations were turned into an optimization problem. We also proved the method's accuracy in approximating any function, as well as its fractional differentiation and integration within WSKFIDEs. The proposed method was performed on some attractive examples in order to show how their solutions behave at various values of the fractional order ϝ. The paper provided a valuable contribution to the field of fractional calculus (FC) by presenting a novel method for solving WSKFIDEs. Additionally, the accuracy of this method was verified by comparing its results with those obtained using other methods.



    An IoT-based cloud infrastructure is a wide network that contains many IoT-assisted devices and applications [1]. An IoT-based cloud structure also contains services and standards vital for safeguarding, handling, and linking dissimilar IoT devices and uses. Cloud computing (CC) delivers scalability and steady upgrades on hardware and software for huge amounts of industrial uses [2]. Furthermore, the cloud allows the consumer to make effective use of network resources and offers a variety of safety performances. Of these benefits, it can be obvious that the viewpoint of CC is an effective perspective [3]. CC and basic technologies offer numerous possible chances for businesses, and it has a huge array of uses, platforms, services, and solutions, with more likely in the future. The achievement of some cloud-based performance is greatly dependent on delivering the best experience to software developers, cloud managers, and users [4]. There are exact features to the assumption of clouds like compliance, complexity, privacy, reliance, control, security, and price. Safety in CC is measured as a vital obstacle, and so data and uses can exist at many layers reliant on the preferred cloud service method [5]. Furthermore, IoT devices can effortlessly be affected by DDoS and Mirai botnet attacks, and both of these attacks are dangerous when compared to other attacks. Besides, the occurrence of DDoS attacks can affect the data link layer because it can close all the web pages, which is in the present procedure [6]. Attackers who launch the bots to corrupt or damage the method are termed a Mirai botnet, performing like a robot and taking control of the entire system.

    Intrusion detection systems (IDS) have resulted in increased attention from researchers toward safe IoT devices, along with commenced attacks from challengers [7]. Most of the researchers often chose machine learning (ML) models to identify network traffic anomalies produced by recognized and recently presented assaults and to caution the suitable system control nodes to block such traffic [8]. ML has been considered by computing resources during all its stages. For IDS, extracting features from connection packets is an essential action for running, testing, and building the network. Composed data models need scaling and cleaning. Constructing a technique needs feature classification, and validation. All those actions must be implemented in time order or else slipping risky packets invisible is predictable [9]. Combining ML within an embedded system process must regard the computing resources range like CPU design, the graphical processing unit (GPU), network connectivity, and the physical memory size [10]. Those kinds of features simulate the operational possibility of ML-IDS on IoT devices concerning packet miss rate, forecast output, and computing resource application.

    Present methods for DL-based botnet recognition in the IoT-cloud face important challenges, including the collection of related features from varied and dynamic IoT data sources, the combination of numerous DL methods over ensemble learning to improve recognition accuracy and flexibility, and the optimization of hyperparameters to strike a balance between recognition efficacy and computational efficiency. These represent the difficulties related to managing varied IoT data streams, and are essential for strong feature extractor models personalized to the unique features of the IoT devices. Also, the efficiency and scalability of the DL method in handling massive quantities of streaming data presents important hurdles, compounded by the dynamic nature of botnet behaviors and the developing threat landscape. Hyperparameter tuning requires careful optimization to strike a balance between model performance and computational efficiency, a challenge impaired by the dynamic nature of IoT atmospheres. Solving these challenges efficiently is vital to understanding the complete potential of DL-based botnet recognition methods in the maintenance of IoT-cloud organizations besides sophisticated cyber dangers.

    There is a persistent need to develop effective DL-based solutions personalized to the exclusive tasks of identifying botnets within IoT-cloud settings. This involves developing models proficient in precisely categorizing malicious actions while minimalizing false positives, and familiarizing them with the dynamic nature of IoT systems. Furthermore, safeguarding scalability, real-time observing, and compatibility with resource-constrained IoT strategies pose additional challenges. Thus, the problem consists of inventing strong DL-based botnet recognition devices that determine the details of IoT-cloud organizations, eventually improving cybersecurity and safeguarding crucial methods and data.

    Therefore, this study presents an evolutionary algorithm with an ensemble DL-based botnet detection and classification (EAEDL-BDC) approach. In the EAEDL-BDC algorithm, the primary stage of data normalization using Z-score normalization is performed. For the feature selection (FS) process, the EAEDL-BDC technique uses a binary pendulum search algorithm (BPSA). Moreover, a weighted average ensemble of three models, including the modified Elman recurrent neural network (MERNN), gated recurrent unit (GRU), and long short-term memory (LSTM), are used. Furthermore, the hyperparameter selection of the DL models takes place using the reptile search algorithm (RSA). The experimental value of the EAEDL-BDC approach can be examined on the N-BaIoT dataset.

    The remaining sections of the article are arranged as follows: Section 2 offers a literature review, and Section 3 presents the proposed method. Then, Section 4 evaluates the results, and Section 5 concludes the work.

    The authors of [11] established the IoT with Cloud-Aided Botnet Detection and Classification employing Rat Swarm Optimizer with DL (BDC-RSODL) technique. Mainly, the system data was pre-processed to generate it well-suited for advanced processes. Also, the RSO technique was developed for effectual FS. In addition, the LSTM technique was employed for the detection and identification of botnets. Lastly, SCA was implemented for perfecting the parameters connected to the LSTM method. In [12], an intelligent and safe edge-enabled computing (ISEC) technique was developed for maintainable towns utilizing Green IoT. The developed technique creates optimum features utilizing DL for data routes, which aids in training the sensors to forecast the best routes near edge servers (ES). Additionally, the combination of dispersed hashing with a chaining plan benefits safety and results in an effective computing method. Prabhu et al. [13] proposed a new DL plan named Modified Learning-based CAD (MLCAD) which adjusts the features from the conventional safety handle system termed IAIS. The projected MLCAD technique classifies the DDoS assaults over the cloud atmosphere by analyzing the authentication and authorization reasons of the particular consumer.

    Alrowais et al. [14] presented a Botnet Recognition employing the Chaotic Binary Pelican Optimizer Algorithm with DL (BNT-CBPOADL) model. In this technique, the Z-score normalized was functional for pre-processed. The convolutional VAE (CVAE) technique has been useful for the recognition of botnets. Finally, the arithmetical optimizer algorithm (AOA) has been used for optimum hyperparameter tuning. In [15], a united structure for Leveraging the Safety of IoT Application (LSITA) with a Remote Patient Monitoring System (RPMS) was developed. It permits cloud-aided authentication, safe communications between gatherings involved in IoT use, and an enhanced main distribution technique for multiple user data analytics atmosphere. Dissimilar safety systems work composed with a unified combination. Aljebreen et al. [16] developed a Political Optimizer Algorithm by an HDL Aided Malicious URL Detection and Classification for Cybersecurity (POAHDL-MDC) method. This method executes a pre-processing step to convert the information to a well-matched setup, and a Fast Text word embedded procedure is involved. For mischievous URL recognition, an HDL method incorporates the features of stacked AE (SAE) and BiLSTM. Lastly, POA can be demoralized for boosting parameter tuning.

    Wang et al. [17] developed a privacy-enhanced retrieval technology (PERT) for cloud-aided IoT. This structure has been intended over a hidden index sustained by ES and a graded retrieval method that conserves data confidentiality by hiding the info of data communication among the cloud and ES. For the categorized retrieval method, the technique aimed for a data partition plan. The ES stocks partial data. In [18], a novel Lightweight Hybrid Encryption (LHE) technique was developed. Primarily, the input medical images are encoded over effective substitution box (S-box) elliptic curves and a block cipher. An optimum block has been nominated by employing an adaptive COOT optimizer approach. Lastly, the encoded medical image information is safely kept in the cloud storage platform.

    Despite the potential of DL in boosting the cybersecurity of cloud-assisted IoT, there is a prominent research gap about the addition of vital optimizer models. FS is vital for classifying the most related data features that contribute to precise threat recognition, yet its application in DL-based cybersecurity for cloud-assisted IoT remains underexplored. Likewise, effectual hyperparameter tuning is vital for enhancing the performance of DL techniques in managing various cyber threats professionally. Also, the application of EL models, which fuse manifold methods for improved predictive robustness and accuracy, remains unexplored in the situation of cloud-assisted IoT cybersecurity. Connecting these research gaps is vital for developing more effective and strong defense devices against cyberattacks directing cloud-aided IoT infrastructure. The summery of the existing work is illustrated in Table 1.

    Table 1.  Summary of existing works.
    Reference No. Objective Method Dataset Measures
    Alshahrani et al. [11] To detect and classify IoT-assisted botnet activities RSO feature selection, LSTM classification, and SCA-based hyperparameter tuning Bot-IoT database Accuracy, Precision, Recall, F-Score, and AUC-Score
    Haseeb et al. [12] To establish intellectual and safe edge-enabled computing for sustainable cities employing Green IoT ISEC model Real-time data Energy consumption, throughput, delay, and route interruption
    Prabhu, Prema, and Perumal [13] To construct a DL model to detect DDoS attacks in the cloud atmosphere MLCAD Standard dataset Accuracy, Precision, Recall, F-Score, and AUC-Score
    Alrowais et al. [14] The objective of the BNT-CBPOADL technique is in the precise recognition and classification of botnet attacks in the IoT atmosphere CBPOA, CVAE, and AOA Bot-IoT database Accuracy, Precision, Recall, F-Score, and AUC-Score
    Ahmed, Kannan, and Polamuri [15] To improve the security and privacy of IoT applications, specifically in the context of a Remote Patient Monitoring System (RPMS) LSITA Standard dataset Accuracy, Precision, Recall, F-Score, and AUC-Score
    Aljebreen et al. [16] To develop a Hybrid Deep Learning Assisted Malicious URL Detection and Classification for Cybersecurity SAE-BiLSTM, POA memory (Bi-LSTM)
    POA
    Malicious URL dataset Accuracy, Sensitivity, Specificity, and F-Score
    Wang et al. [17] To improve privacy in cloud-assisted IoT retrieval PERT - Accuracy, Precision, Recall, F-Score, and AUC-Score
    Padma Vijetha Dev, and Venkata Prasad [18] To improve the security of medical images in IoT utilizing a Lightweight Hybrid Encryption (LHE) approach FEC, adaptive COOT optimization model - Accuracy, Precision, Recall, F-Score, and AUC-Score

     | Show Table
    DownLoad: CSV

    In this manuscript, the EAEDL-BDC technique is introduced. The goal of the study is to enhance cybersecurity in cloud-assisted IoT platforms via a botnet detection process. The EAEDL-BDC technique comprises data normalization using Z-score normalization, BPSA-based FS, ensemble learning, and RSA-based parameter tuning. Figure 1 demonstrates the workflow of the EAEDL-BDC approach.

    Figure 1.  Workflow of EAEDL-BDC technique.

    The primary stage of data normalization using Z-score normalization can be performed in this step. Z-score normalization, a.k.a. standardization, is a statistical approach used to center and rescale datasets dividing by standard deviation (SD) and subtracting by mean [19]. Z-score normalization transforms the data distribution into a uniform distribution with a mean of zero and an SD of one. This process is especially suitable in statistical analyses and ML as it ensures that variables with varying scales can equally contribute to the analysis, facilitating better model performance and preventing dominance by variables with larger magnitudes.

    For the feature selection process, the EAEDL-BDC technique uses the BPSA algorithm. In 2022, Ab. Aziz, N.A. and Ab. Aziz, K. introduced PSA, a new population‐based metaheuristic algorithm based on the harmonic motion of a simple pendulum to resolve continuous optimization problems [20]. The equation of motion is related to the one suggested in SCA. This study incorporates an exponential function that enhances the balance between exploitation and exploration.

    The search agent is initialized at random and their location is upgraded by the next expression.

    Xti,j=Xti,j+pendti,j(BestjXti,j) (1)

    Where the location of ith solution in the jth dimension at the tth iteration is expressed as Xti,j, pendti,j shows the parameter that can be evaluated by Eq (2), and Bestj refers to the location of the optimum solution in jth dimension at the tth iteration:

    pendti,j=2e(t/tmax)cos(2πrand) (2)

    In Eq (2), t stands for the current iteration, tmax denotes the maximum iteration counts, and rand denotes a uniformly distributed random integer between zero and one. The pseudocode of PSA is given in Algorithm 1.

    Algorithm 1: Pseudocode of PSA
    Input: The population X={X1,X2,,Xi}
    Output: The updated population X={X1,X2,,Xi} and Best
    Initialize X random population
    Assess the objective function of all the individuals from the X population
    Recognize the fittest individual from the population (Best)
    For iteration (t) do
    For performance (i) do
    For dimensional (j) do
    Upgrade pendti.j using Eq (2)
    Upgrade the location of Xti,j by Eq (1)
    End for
    End for
    Calculate the objective function of all the individuals within the X population
    Upgrade Best
    End for
    Return X the upgraded population whereas Best is an optimum outcome

    PSA is a recent meta-heuristic algorithm intended to resolve continuous optimizer problems. It can be essential to convert the solution into the binary domain for resolving the FS. In addition, the classical Two‐Step algorithm is used to binarize the continuous metaheuristic. This study presents five binarization rules, and eight different transfer functions are used. Equation (4) represents the binarization rule, and Eq (3) represents the transfer function.

    T(djw)=|2πarctan(π2djw)| (3)
    Xjnew={1ifrandT(djw)0otherwise (4)

    Thus, the Binary PSA (B‐PSA) is constructed. First, the solution in the binary domain is initialized, and the following steps are performed in all the iterations: (1) perturbing the binary solution with Eqs (1) and (2), the equation of movement of PSA. (2) After perturbing each solution, it can leave the binary domain and use Eqs (3) and (4), and binarization will be applied. This procedure is reiterated until the end of the iterations. Then, perform a feasibility test and solution repair after the binarization and solution generation steps. Here, we verify that all the solutions have a minimum of one activated feature. A new binary random solution is produced if this condition is not met, and then the feasibility test is repeated. This procedure is reiterated until each feasible solution is attained. The pseudocode of B‐PSA is demonstrated in Algorithm 3.

    Algorithm 2: Feasibility test and repair solution
    Input: The population X={X1,X2,,Xi}
    Output: The feasible population X={X1,X2,,Xi}
    Repeat
    for solution(i) do
    If solutioni has only 0 then
    Produce a new random binary solution 5:
    Else
    Possible result
    End if
    End for
    Until all the results are possible
    Return the X possible population

    Algorithm 3: Pseudocode of BPSA
    Input: The population X={X1,X2,,Xi}
    Output: The updated population X={X1,X2,,Xi} and Best
    Initialize X binary random population
    Implement a possibility test based on Algorithm 2
    Estimate the objective function of all the individuals in X population
    Detect the fittest individual from the population (Best)
    For iteration (t) do
    For performance (i) do
    For dimensional (j) do
    Upgrade pendti.j by using Eq (2)
    Upgrade the place of Xti,j by utilizing Eq (1)
    End for
    End for
    Binarization of population X
    Execute possibility test based on Algorithm 2
    Estimate the objective function of all the individuals within X population
    Upgrade Best
    End for
    Return the X upgraded population whereas Best is an optimum solution

    A weighted AE is an extension of the average ensemble model, which describes the weight of every member's impact to the last estimate [21]. When compared to the lowest performing technique, the highest performing method will get large weights. The formula to unite the prediction of the base-learners can be given as:

    P(t)=wipj(t) (5)

    In Eq (5), N represents the overall count of the models, pi indicates the probability for i, and wi represents each model's weight.

    MERNN has a unique learning strategy and is derived from the backpropagation neural network (BPNN) model [22]. This technique has successfully classified a long distance of crucial data. The architecture of MERNN multiple different layers to accomplish classification. The layers presented in the MERNN model are a recurrent or context, input, output, and hidden layer (HL). Each neuron has an activation function, a biased input, and one output. The input layer fetches the information and allows the next HL to transfer data to the output layer. This HL is given at the last moment in the Elman neural network (ENN). Later, the output of the HL is kept in the recurrent layer. Figure 2 depicts the framework of the MERNN technique.

    Figure 2.  MERNN architecture.

    Consider the hidden neuron counts as j=1,2..m, the input counts as i=1,2.n, the network's weights as Wij,Wrj, and Wjo, and the recurrent neuron count s as r=1,2..m.

    The output of the HL at t is formulated as

    Oj(t)=ni=1mj=1(Wij×i(t))+mr=1mj=1(Wrj×Oj(t1))+bj, (6)

    In Eq (6), b denotes the bias term.

    Yj(t)=g(Oj(t)), (7)

    In Eq (7), g represents the tangent hyperbolic function.

    The GRU is a NN that is adapted depending on the LSTM [23]. The GRU combines forget and input gates in the LSTM and exploits them into an update gate. Moreover, it establishes a reset gate. The appropriate computational formula of GRU is

    rt=σ(XtWxr+ht1Whr+Br) (8)
    zt=σ(XtWxz+ht1Whz+Bz) (9)
    ˜ht=tanh(XtWxh+rtht1Whh+Bh) (10)
    ht=ztht1+(1zt)˜ht (11)

    where Xt signifies the input numbers, rt stands for the outcomes of the update gate, Whr represents the weights among the HL at the preceding moment ht1 and the reset gate, Br is the bias of the reset gate, Wxr defines the weights among Xt and the reset gate, zt stands for the result of the update gate, Wxh stands for the weights among Xt and ht, Whh signifies the weights among ht1 and ht, Wxz signifies the weights among Xt and the update gate, Whz defines the weights among ht1 and the update gate, ht indicates the existing HL, Bh refers to the bias of ht, Bz illustrates the bias of the update gate, ht defines the candidate layer attained by the compound function of Xt and ht1, σ() signifies the Sigmoid function, and stands for the point multiplication operation.

    By comparison with conventional RNNs, the advance of LSTM models has included 3 control parts ("cells"), namely the output gate, input gate, and forget gate [24]. The functions of the gates will be explained as given below:

    Forget gate: This gate resolves anything from prior data that can be disregarded. The existing stage's HL ht1 and input xt at the previous component are incorporated into a new vector. Increasing the weight parameter Wf of the gate, every component value of the resultant vector ft is scaled from 0 to 1 over the unit-wise sigmoidal function a. A 0 module permits the related data in Ct1 to be removed, where a 1 represents consistent data that can be allowed to be accepted. The output ft of the gate is generated according to Eq (12).

    ft=σ(Wfht1,xt+bf) (12)

    Input gate: It evaluates how many of the input xt of the network will be kept in the cell state Ct. The achievement of the input gate's operation needs support among 2 parallel layers. The tangent state outputs candidate data Ct for collection, but the sigmoidal layer works as ft as well as chooses which candidate data could be preferred by the decision vector it outputs. Next, the unit-wise increase of candidate data by the decision vector Ct×it can be carried out along with the last upgrade data, which will be comprised of the unit state to be calculated. The function of 2 layers can be represented as Eqs (13) and (14).

    it=σ(Wiht1,xt+bi) (13)
    ¯Ct=tan(Wcht1,xt+bc) (14)

    Consequently, the cell layer Ct of the present chain can be incorporated into the previously saved data ofCt1, and upgrading data is preferred in Ct (Eq (15)).

    Ct=Ct1×ft+¯Ct×it (15)

    Output gate: It selects HL ht from the present chain to outcome by multiplication of the decision vector 0t via the candidate data elected at Ct, as denoted in Eqs (16) and (17).

    ot=σ(Woht1,xt+bo) (16)
    ht=tan(Ct)×ot (17)

    Eventually, the hyperparameter selection of the DL models takes place using RSA. Similar to other metaheuristic optimization algorithms, RSA exploits local and global search to effectively locate potential areas in the search range [25]. The original RSA is nature-inspired, mathematically modeling the hunting strategy of crocodiles. It can efficiently address complex challenges since it can be a gradient‐free population‐based technique. Based on the stochastic technique, a population of agents can be created in the initialization process. Then, the population is estimated and the optimum performance is considered near‐optimum:

    P=[x11x1nxN1xNn] (18)

    In Eq (18), N denotes P size, n is the dimension problem, and χ is a promising solution. The set population is generated according to Eq (19):

    xi,j=rand(BlowerBupper)+Blower,j=1,2,,n (19)

    In Eq (19), Blower and Bupper are the lower and upper boundaries of the search range, and rand denotes a random number.

    The algorithm can make progress with optimization once the population is established. The strategy used is largely based on the number of residual iterations. Two behaviors are distinctly simulated for the exploration mechanism, namely the crocodile high walking and belly walking:

    xi,j={Bj(t)(ηi,j(t))βRi,j(t).rand,tT4Bj(t)xr1,jEX(t).rand,t2T4andt>T4 (20)

    In Eq (20), Bj(t) stands for the jth component of the better candidate, rand denotes a random number from [0,1], t and T are the existing and maximum iterations, and β denotes the sensitivity. R and ES are specialized values described as follows:

    ηi,j=Bj(t)PDi,j (21)
    Ri,j=Bj(t)xr2jBj(t)+ϵ (22)
    ES(t)=2r3(11T) (23)

    Here, the η parameter denotes the hunter operator. The role of R is to decrease the searching range, ES represents the evolutionary sense, r2 and r3 are random integers, and PD defines the percentage deviation among the existing and optimum solutions. Also, a smaller value can be added by ϵ to avoid a mathematical error.

    Similarly, exploitation exploits 2 different hunting approaches: hunting coordination and cooperation.

    xi,j={Bj(t)PDi,j(t).rand,t3T4andt>2T4Bj(t)ηi,jϵRi,j.randtTandt>3T4 (24)

    The RSA method produces a fitness function (FF) to acquire a better solution of the classifier. This specifies a positive integer to label the best outcomes of the candidate outcome. In this study, the decreasing classifier error rate is defined as FF:

    fitness(xi)=ClassifierErrorRate(xi)=No.ofmisclassifiedinstancesTotalno.ofinstances100 (25)

    This section observes the performance of the EAEDL-BDC algorithm on the N-BaIoT Database [26]. The database encompasses 17,001 instances with 3 class labels, as defined in Table 2.

    Table 2.  Details on database.
    Classes No. of Instances
    Benign 5000
    Mirai 7001
    Gafgyt 5000
    Total Instances 17001

     | Show Table
    DownLoad: CSV

    Figure 3 illustrates the confusion matrices produced by the EAEDL-BDC system on 80:20 and 70:30 of TRPH/TSPH. The experimental outcome specifies the efficient recognition of the benign, Mirai, and Gafavt classes.

    Figure 3.  Confusion matrices of (a-b) 70:30 of TRPH/TSPH and (c-d) 80:20 of TRPH/TSPH.

    An overall detection result of the EAEDL-BDC technique is 80% of TRPH and 20% of TSPH, as shown in Table 3. Figure 4 demonstrates an overall detection result of the EAEDL-BDC technique with 80% of TRPH. These obtained outcomes specify that the EAEDL-BDC system properly identifies benign, Mirai, and Gafavt classes. The EAEDL-BDC technique recognizes the benign class with accuy of 99.26%, precn of 98.55%, recal of 98.92%, Fscore of 98.73%, and AUCscore of 99.16%. Additionally, the EAEDL-BDC system identifies the Mirai class with accuy of 99.39%, precn of 99.26%, recal of 99.25%, Fscore of 99.25%, and AUCscore of 99.37%. The EAEDL-BDC algorithm recognizes the Gafavt class with accuy of 99.29%, precn of 98.98%, recal of 98.64%, Fscore of 98.81%, and AUCscore of 99.11%.

    Table 3.  Detection outcome of EAEDL-BDC system at 80:20 of TRPH/TSPH.
    Classes Accuy Precn Recal FScore AUCScore
    TRPH (80%)
    Benign 99.26 98.55 98.92 98.73 99.16
    Mirai 99.39 99.26 99.25 99.25 99.37
    Gafavt 99.29 98.98 98.64 98.81 99.11
    Average 99.31 98.93 98.94 98.93 99.21
    TSPH (20%)
    Benign 99.32 98.73 99.02 98.88 99.24
    Mirai 99.35 99.51 98.95 99.23 99.30
    Gafavt 99.38 98.64 99.16 98.90 99.31
    Average 99.35 98.96 99.04 99.00 99.28

     | Show Table
    DownLoad: CSV
    Figure 4.  Average analysis of EAEDL-BDC system at 80% of TRPH.

    Figure 5 displays an overall detection analysis of the EAEDL-BDC system with 20% of TSPH. These outcomes inferred that the EAEDL-BDC methodology properly recognizes benign, mirai, and Gafavt classes. The EAEDL-BDC method identifies the benign class with accuy of 99.32%, precn of 98.73%, recal of 99.02%, Fscore of 98.88%, and AUCscore of 99.24%. In addition, the EAEDL-BDC algorithm identifies the Mirai class with accuy of 99.35%, precn of 99.51%, recal of 98.95%, Fscore of 99.23%, and AUCscore of 99.30%. Last, the EAEDL-BDC algorithm detects the Gafavt class with anaccuy of 99.38%, precn of 98.64%, recal of 99.16%, Fscore of 98.90%, and AUCscore of 99.31%.

    Figure 5.  Average analysis of EAEDL-BDC method at 20% of TSPH.

    In Table 4, a detailed detection investigation of the EAEDL-BDC algorithm can be provided with 70% of TRPH and 30% of TSPH.

    Table 4.  Detection analysis of the EAEDL-BDC model under 70:30 of TRPH/TSPH.
    Classes Accuy Precn Recal FScore AUCScore
    70% of TRPH
    Benign 99.32 98.66 99.03 98.84 99.23
    Mirai 99.36 99.29 99.17 99.23 99.33
    Gafavt 99.55 99.33 99.13 99.23 99.43
    Average 99.41 99.09 99.11 99.10 99.33
    30% of TSPH
    Benign 99.55 99.08 99.40 99.24 99.51
    Mirai 99.55 99.27 99.61 99.44 99.56
    Gafavt 99.49 99.54 98.77 99.16 99.29
    Average 99.53 99.30 99.26 99.28 99.45

     | Show Table
    DownLoad: CSV

    Figure 6 exhibits an overall detection outcome of the EAEDL-BDC system with 70% of TRPH. These results specify that the EAEDL-BDC technique suitably recognizes benign, Mirai, and Gafavt classes. The EAEDL-BDC method recognizes the benign class with accuy of 99.32%, precn of 98.66%, recal of 99.03%, Fscore of 98.84%, and AUCscore of 99.23%. Moreover, the EAEDL-BDC system finds the Mirai class with accuy of 99.36%, precn of 99.29%, recal of 99.17%, Fscore of 99.23%, and AUCscore of 99.33%. Also, the EAEDL-BDC algorithm recognizes the Gafavt class with accuy of 99.55%, precn of 99.33%, recal of 99.13%, Fscore of 99.23%, and AUCscore of 99.43% respectively.

    Figure 6.  Average of EAEDL-BDC technique at 70% of TRPH.

    Figure 7 shows an overall detection outcome of the EAEDL-BDC method with 30% of TSPH. The achieved outcome represents that the EAEDL-BDC technique accurately recognizes benign, Mirai, and Gafavt classes. The EAEDL-BDC system recognizes the benign class with anaccuy of 99.55%, precn of 99.08%, recal of 99.40%, Fscore of 99.24%, and AUCscore of 99.51%. Next, the EAEDL-BDC algorithm finds the Mirai class with accuy of 99.55%, precn of 99.27%, recal of 99.61%, Fscore of 99.44%, and AUCscore of 99.56%. Lastly, the EAEDL-BDC methodology recognizes the Gafavt class with accuy of 99.49%, precn of 99.54%, recal of 98.77%, Fscore of 99.160%, and AUCscore of 99.29% respectively.

    Figure 7.  Average of EAEDL-BDC system at 30% of TSPH.

    The accuy curves for training (TR) and validation (VL) illustrated in Figure 8 for the EAEDL-BDC system under 70:30 of TRPH/TSPH offer valued insights into its effectiveness in several epochs. Mainly, it can be a consistent upgrade in both TR and TS accuy with increased epochs, specifying the proficiency of the model in learning and recognizing patterns with both data of TR and TS. The increasing trend in TS accuy underscores the adaptability model to the TR dataset and the ability to produce exact predictions on unnoticed data, emphasizing the capabilities of robust generalization.

    Figure 8.  Accuy curve of EAEDL-BDC technique at 70:30 of TRPH/TSPH.

    Figure 9 displays a wide-ranging overview of the TR and TS loss values for the EAEDL-BDC technique under 70:30 of TRPH/TSPH through several epochs. The TR loss consistently minimizes as the model refines weights for decreasing classification errors under both datasets. The loss curves show the alignment of the model with the TR data, underscoring its ability to capture patterns efficiently. Significant is the continuing refinement of parameters in the EAEDL-BDC algorithm, aimed at reducing discrepancies among forecasts and actual TR labels.

    Figure 9.  Loss curve of EAEDL-BDC algorithm at 70:30 of TRPH/TSPH.

    In regard to the PR curve exhibited in Figure 10, the findings affirm that the EAEDL-BDC technique with 70:30 of TRPH/TSPH reliably accomplishes increased PR values in each class. These performances underline the methodologies' active capability to discriminate amongst distinct class labels, highlighting its ability in accurately detecting classes.

    Figure 10.  PR curve of EAEDL-BDC algorithm at 70:30 of TRPH/TSPH.

    Likewise, in Figure 11, we illustrate ROC outcomes made by the EAEDL-BDC system at 70:30 of TRPH/TSPH, suggesting its abilities in unique amongst class labels. These curves provide appreciated perceptions of how the trade-off between FPR and TPR varied by diverse classification thresholds and epochs. These outcomes underscore the model's exact classification effectiveness on diverse class labels, underscoring its efficiency in overcoming several classification challenges.

    Figure 11.  ROC curve of EAEDL-BDC technique at 70:30 of TRPH/TSPH.

    In Table 5, a comparison analysis of the EAEDL-BDC method is provided in terms of distinct measures [27]. In Figure 12, a comparative accuy investigation of the EAEDL-BDC approach is provided. The outcome demonstrates that the EAEDL-BDC methodology has better results. Based on accuy, the EAEDL-BDC technique exhibits an increased accuy of 99.53%, whereas the HMMLB-BND, BND-BMOML, DNN-LSTM, LSTM, CNN-RNN, LSTM-CNN, and DNN techniques obtain decreased accuy values of 99.44%, 99.05%, 98.85%, 96.90%, 96.20%, 98.61%, and 98.53%, respectively.

    Table 5.  Comparison analysis of the EAEDL-BDC model with other algorithms.
    Methods Accuy Precn Recal FScore
    EAEDL-BDC 99.53 99.3 99.26 99.28
    HMMLB-BND 99.44 99.14 99.13 99.14
    BND-BMOML 99.05 98.68 98.67 98.71
    DNN-LSTM 98.85 98.11 98.00 97.87
    LSTM 96.90 95.71 94.36 94.96
    CNN-RNN 96.20 93.74 97.36 93.82
    LSTM-CNN 98.61 96.75 97.43 95.91
    DNN Algorithm 98.53 96.75 96.17 94.52

     | Show Table
    DownLoad: CSV
    Figure 12.  Accuy outcome of EAEDL-BDC technique with other approaches.

    An extensive comparative precn, recal, and Fscore analysis of the EAEDL-BDC system can be provided in Figure 13. These achieved outcomes indicate that the EAEDL-BDC technique acquires enhanced performance. According to precn, the EAEDL-BDC method exhibits boosted precn of 99.3% while the HMMLB-BND, BND-BMOML, DNN-LSTM, LSTM, CNN-RNN, LSTM-CNN, and DNN algorithms get reduced precn values of 99.14%, 98.68%, 98.11%, 95.71%, 93.74%, 96.75%, and 96.75%. Additionally, with recal, the EAEDL-BDC method exhibits raised recal of 99.26%, but the HMMLB-BND, BND-BMOML, DNN-LSTM, LSTM, CNN-RNN, LSTM-CNN, and DNN methods get reduced recal values of 99.13%, 98.67%, 98%, 94.36%, 97.36%, 97.43%, and 96.17%, correspondingly. Lastly, based on theFscore, the EAEDL-BDC system offers an improved Fscore of 99.28%, while the HMMLB-BND, BND-BMOML, DNN-LSTM, LSTM, CNN-RNN, LSTM-CNN, and DNN techniques get diminished Fscore values of 99.14%, 98.71%, 97.87%, 94.96%, 93.82%, 95.91%, and 94.52%, correspondingly.

    Figure 13.  Comparative outcome of EAEDL-BDC technique with other approaches.

    These experimental outcomes show that the EAEDL-BDC system gains excellent performance compared to other systems.

    In this study, the EAEDL-BDC technique is presented. The goal of the study is to enhance cybersecurity in the cloud-assisted IoT environment via a botnet detection process. The EAEDL-BDC technique comprises data normalization using Z-score normalization, BPSA-based FS, ensemble learning, and RSA-based parameter tuning. For the FS process, the EAEDL-BDC technique uses BPSA. Moreover, a weighted average ensemble of three models, such as MERNN, GRU, and LSTM, can be employed. Furthermore, the hyperparameter choice of the DL approaches takes place using RSA. The simulation value of the EAEDL-BDC algorithm can be examined on the N-BaIoT database. The extensive comparison study demonstrated that the EAEDL-BDC technique researched a superior accuracy value of 99.53%, along with other approaches concerning distinct evaluation metrics. The EAEDL-BDC model may face threats in real-time scalability due to the computational complexity of ensemble DL methods. Future research may concentrate on optimizing the model for edge computing atmospheres and exploring dynamic adaptation mechanisms for evolving cyber threats in the cloud-based IoT context.

    The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through large group Research Project under grant number (RGP2/112/44). Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2024R114), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. Research Supporting Project number (RSP2024R459), King Saud University, Riyadh, Saudi Arabia. The authors extend their appreciation to the Deanship of Scientific Research at Northern Border University, Arar, KSA for funding this research work through the project number "NBU-FPEJ-2024-2913-01". This study is partially funded by the Future University in Egypt (FUE).

    The authors declare that they have no conflict of interest. The manuscript was written through the contributions of all authors. All authors have approved the final version of the manuscript.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.



    [1] G. S. Teodoro, J. A. T. Machado, E. C. de Oliveira, A review of definitions of fractional derivatives and other operators, J. Comput. Phys., 388 (2019), 195–208. https://doi.org/10.1016/j.jcp.2019.03.008 doi: 10.1016/j.jcp.2019.03.008
    [2] H. G. Sun, Y. Zhang, D. Baleanu, W. Chen, Y. Q. Chen, A new collection of real world applications of fractional calculus in science and engineering, Commun. Nonlinear Sci. Numer. Simul., 64 (2018), 213–231. https://doi.org/10.1016/j.cnsns.2018.04.019 doi: 10.1016/j.cnsns.2018.04.019
    [3] J. F. Gómez-Aguilar, A. Atangana, Applications of fractional calculus to modeling in dynamics and chaos, Boca Raton: Chapman & Hall/CRC Press, 2022. https://doi.org/10.1201/9781003006244
    [4] J. A. T. Machado, Fractional calculus: fundamentals and applications, In: Acoustics and vibration of mechanical structures—AVMS-2017: Proceedings of the 14th AVMS Conference, 2018, 3–11. https://doi.org/10.1007/978-3-319-69823-6_1
    [5] S. Chakraverty, R. M. Jena, S. K. Jena, Computational fractional dynamical systems: fractional differential equations and applications, John Wiley & Sons, 2023.
    [6] C. Ionescu, A. Lopes, D. Copot, J. A. T. Machado, J. H. T. Bates, The role of fractional calculus in modeling biological phenomena: a review, Commun. Nonlinear Sci. Numer. Simul., 51 (2017), 141–159. https://doi.org/10.1016/j.cnsns.2017.04.001 doi: 10.1016/j.cnsns.2017.04.001
    [7] J. A. T. Machado, M. F. Silva, R. S. Barbosa, I. S. Jesus, C. M. Reis, M. G. Marcos, et al., Some applications of fractional calculus in engineering, Math. Probl. Eng., 2010 (2010), 1–34. https://doi.org/10.1155/2010/639801 doi: 10.1155/2010/639801
    [8] S. Das, Observation of fractional calculus in physical system description, In: Functional fractional calculus, Berlin, Heidelberg: Springer, 2011. https://doi.org/10.1007/978-3-642-20545-3_3
    [9] R. Hilfer, Applications of fractional calculus in physics, World Scientific, 2000.
    [10] H. Jafari, B. Mehdinejadiani, D. Baleanu, Fractional calculus for modeling unconfined groundwater, Berlin, Boston: De Gruyter, 2019. https://doi.org/10.1515/9783110571905-007
    [11] N. Su, Fractional calculus for hydrology, soil science and geomechanics, Boca Raton: CRC Press, 2020. https://doi.org/10.1201/9781351032421
    [12] C. P. Li, Y. Q. Chen, J. Kurths, Fractional calculus and its applications, Phil. Trans. R. Soc. A, 371 (2013), 20130037. http://dx.doi.org/10.1098/rsta.2013.0037 doi: 10.1098/rsta.2013.0037
    [13] Z. J. Meng, L. F. Wang, H. Li, W. Zhang, Legendre wavelets method for solving fractional integro-differential equations, Int. J. Comput. Math., 92 (2015), 1275–1291. https://doi.org/10.1080/00207160.2014.932909 doi: 10.1080/00207160.2014.932909
    [14] K. Kumar, R. K. Pandey, S. Sharma, Comparative study of three numerical schemes for fractional integro-differential equations, J. Comput. Appl. Math., 315 (2017), 287–302. https://doi.org/10.1016/j.cam.2016.11.013 doi: 10.1016/j.cam.2016.11.013
    [15] M. B. Almatrafi, A. R. Alharbi, A. R. Seadawy, Structure of analytical and numerical wave solutions for the Ito integro-differential equation arising in shallow water waves, J. King Saud Univ. Sci., 33 (2021), 101375. https://doi.org/10.1016/j.jksus.2021.101375 doi: 10.1016/j.jksus.2021.101375
    [16] K. Agilan, V. Parthiban, Initial and boundary value problem of fuzzy fractional-order nonlinear Volterra integro-differential equations, J. Appl. Math. Comput., 69 (2023), 1765–1793. https://doi.org/10.1007/s12190-022-01810-2 doi: 10.1007/s12190-022-01810-2
    [17] M. Derakhshan, M. Jahanshahi, H. K. demneh, Investigation the boundary and initial value problems including fractional integro-differential equations with singular kernels, J. Adv. Math. Model., 11 (2021), 97–108. https://doi.org/10.22055/JAMM.2021.34670.1848 doi: 10.22055/JAMM.2021.34670.1848
    [18] X. H. Yang, Z. M. Zhang, On conservative, positivity preserving, nonlinear FV scheme on distorted meshes for the multi-term nonlocal Nagumo-type equations, Appl. Math. Lett., 150 (2024), 108972. https://doi.org/10.1016/j.aml.2023.108972 doi: 10.1016/j.aml.2023.108972
    [19] J. W. Wang, X. X. Jiang, X. H. Yang, H. X. Zhang, A nonlinear compact method based on double reduction order scheme for the nonlocal fourth-order PDEs with Burgers' type nonlinearity, J. Appl. Math. Comput., 70 (2024), 489–511. https://doi.org/10.1007/s12190-023-01975-4 doi: 10.1007/s12190-023-01975-4
    [20] J. W. Wang, X. X. Jiang, H. X. Zhang, A BDF3 and new nonlinear fourth-order difference scheme for the generalized viscous Burgers' equation, Appl. Math. Lett., 151 (2024), 109002. https://doi.org/10.1016/j.aml.2024.109002 doi: 10.1016/j.aml.2024.109002
    [21] L. J. Wu, H. X. Zhang, X. H. Yang, F. R. Wang, A second-order finite difference method for the multi-term fourth-order integral-differential equations on graded meshes, Comput. Appl. Math., 41 (2022), 313. https://doi.org/10.1007/s40314-022-02026-7 doi: 10.1007/s40314-022-02026-7
    [22] X. H. Yang, W. L. Qiu, H. F. Chen, H. X. Zhang, Second-order BDF ADI Galerkin finite element method for the evolutionary equation with a nonlocal term in three-dimensional space, Appl. Numer. Math., 172 (2022), 497–513. https://doi.org/10.1016/j.apnum.2021.11.004 doi: 10.1016/j.apnum.2021.11.004
    [23] F. R. Wang, X. H. Yang, H. X. Zhang, L. J. Wu, A time two-grid algorithm for the two dimensional nonlinear fractional PIDE with a weakly singular kernel, Math. Comput. Simul., 199 (2022), 38–59. https://doi.org/10.1016/j.matcom.2022.03.004 doi: 10.1016/j.matcom.2022.03.004
    [24] H. X. Zhang, X. X. Jiang, F. R. Wang, X. H. Yang, The time two-grid algorithm combined with difference scheme for 2D nonlocal nonlinear wave equation, J. Appl. Math. Comput., 2024, 1–25. https://doi.org/10.1007/s12190-024-02000-y
    [25] F. Safari, An accurate RBF-based meshless technique for the inverse multi-term time-fractional integro-differential equation, Eng. Anal. Bound. Elem., 153 (2023), 116–125. https://doi.org/10.1016/j.enganabound.2023.05.015 doi: 10.1016/j.enganabound.2023.05.015
    [26] S. Z. Rida, H. S. Hussien, Efficient Mittag-Leffler collocation method for solving linear and nonlinear fractional differential equations, Mediterr. J. Math., 15 (2018), 1–15. https://doi.org/10.1007/s00009-018-1174-0 doi: 10.1007/s00009-018-1174-0
    [27] S. Z. Rida, H. S. Hussien, A. H. Noreldeen, M. M. Farag, Effective fractional technical for some fractional initial value problems, Int. J. Appl. Comput. Math., 8 (2022), 149. https://doi.org/10.1007/s40819-022-01346-w doi: 10.1007/s40819-022-01346-w
    [28] M. S. Akel, H. S. Hussein, Numerical treatment of solving singular integral equations by using Sinc approximations, Appl. Math. Comput., 218 (2011), 3565–3573. https://doi.org/10.1016/j.amc.2011.08.102 doi: 10.1016/j.amc.2011.08.102
    [29] S. Behera, S. S. Ray, On a wavelet-based numerical method for linear and nonlinear fractional Volterra integro-differential equations with weakly singular kernels, Comput. Appl. Math., 41 (2022), 211. https://doi.org/10.1007/s40314-022-01897-0 doi: 10.1007/s40314-022-01897-0
    [30] G. D. Shi, Y. L. Gong, M. X. Yi, Alternative Legendre polynomials method for nonlinear fractional integro-differential equations with weakly singular kernel, J. Math., 2021 (2021), 1–13. https://doi.org/10.1155/2021/9968237 doi: 10.1155/2021/9968237
    [31] A. A. Kilbas, H. M. Srivastava, J. J. Trujillo, Theory and applications of fractional differential equations, Elsevier, 2006.
    [32] D. Baleanu, Z. B. Guvenc, J. A. T. Machado, New trends in nanotechnology and fractional calculus applications, Dordrecht: Springer, 2010. https://doi.org/10.1007/978-90-481-3293-5
    [33] M. Bahmanpour, M. T. Kajani, M. Maleki, Solving Fredholm integral equations of the first kind using Muntz wavelets, Appl. Numer. Math., 143 (2019), 159–171. https://doi.org/10.1016/j.apnum.2019.04.007 doi: 10.1016/j.apnum.2019.04.007
    [34] S. C. Shiralashetti, S. Kumbinarasaiah, Laguerre wavelets exact Parseval frame-based numerical method for the solution of system of differential equations, Int. J. Comput. Math., 6 (2020), 101. https://doi.org/10.1007/s40819-020-00848-9 doi: 10.1007/s40819-020-00848-9
    [35] B. B. Tavasani, A. H. R. Sheikhani, H. Aminikhah, Numerical scheme to solve a class of variable-order Hilfer-Prabhakar fractional differential equations with Jacobi wavelets polynomials, Appl. Math. J. Chinese Univ., 37 (2022), 35–51. https://doi.org/10.1007/s11766-022-4241-z doi: 10.1007/s11766-022-4241-z
    [36] D. Hong, J. Z. Wang, R. Gardner, Real analysis with an introduction to wavelets and applications, Elsevier, 2005.
    [37] A. M. Mathai, H. J. Haubold, Special functions for applied scientists, New York: Springer, 2008. https://doi.org/10.1007/978-0-387-75894-7
    [38] J. Shahni, R. Singh, Laguerre wavelet method for solving Thomas-Fermi type equations, Eng. Comput., 38 (2022), 2925–2935. https://doi.org/10.1007/s00366-021-01309-7 doi: 10.1007/s00366-021-01309-7
    [39] B. Q. Tang, X. F. Li, Solution of a class of Volterra integral equations with singular and weakly singular kernels, Appl. Math. Comput., 199 (2008), 406–413. https://doi.org/10.1016/j.amc.2007.09.058 doi: 10.1016/j.amc.2007.09.058
    [40] P. K. Kythe, P. Puri, Computational methods for linear integral equations, Boston: Birkhauser, 2002.
    [41] M. X. Yi, J. Huang, CAS wavelet method for solving the fractional integro-differential equation with a weakly singular kernel, Int. J. Comput. Math., 92 (2015), 1715–1728. https://doi.org/10.1080/00207160.2014.964692 doi: 10.1080/00207160.2014.964692
    [42] V. V. Zozulya, P. I. Gonzalez-Chi, Weakly singular, singular and hypersingular integrals in 3-D elasticity and fracture mechanics, J. Chin. Inst. Eng., 22 (1999), 763–775. https://doi.org/10.1080/02533839.1999.9670512 doi: 10.1080/02533839.1999.9670512
    [43] S. Nemati, S. Sedaghat, I. Mohammadi, A fast numerical algorithm based on the second kind Chebyshev polynomials for fractional integro-differential equations with weakly singular kernels, J. Comput. Appl. Math., 308 (2016), 231–242. https://doi.org/10.1016/j.cam.2016.06.012 doi: 10.1016/j.cam.2016.06.012
    [44] Y. X. Wang, L. Zhu, Z. Wang, Fractional-order Euler functions for solving fractional integro-differential equations with weakly singular kernel, Adv. Differ. Equ., 2018 (2018), 1–13. https://doi.org/10.1186/s13662-018-1699-3 doi: 10.1186/s13662-018-1699-3
    [45] S. Nemati, P. M. Lima, Numerical solution of nonlinear fractional integro-differential equations with weakly singular kernels via a modification of hat functions, Appl. Math. Comput., 327 (2018), 79–92. https://doi.org/10.1016/j.amc.2018.01.030 doi: 10.1016/j.amc.2018.01.030
  • This article has been cited by:

    1. Tayyab Kamran, Umar Ishtiaq, Khaleel Ahmad, Ghulam Murtaza, Ioannis Argyros, Certain Fixed Point Results via Contraction Mappings in Neutrosophic Semi-Metric Spaces, 2024, 11, 2409-5761, 30, 10.15377/2409-5761.2024.11.3
    2. Sadia Farooq, Naeem Saleem, Maggie Aphane, Ali Althobaiti, Common φ-Fixed Point Results for S-Operator Pair in Symmetric M-Metric Spaces, 2025, 17, 2073-8994, 254, 10.3390/sym17020254
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1011) PDF downloads(72) Cited by(0)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog