
In this paper, a delayed mathematical model for the P53-Mdm2 network is developed. The P53-Mdm2 network we study is triggered by growth factor instead of DNA damage and the amount of DNA damage is regarded as zero. We study the influences of time delays, growth factor and other important chemical reaction rates on the dynamic behaviors in the system. It is shown that the time delay is a critical factor and its length determines the period, amplitude and stability of the P53 oscillation. Furthermore, as for some important chemical reaction rates, we also obtain some interesting results through numerical simulation. Especially, S (growth factor), k3 (rate constant for Mdm2p dephosphorylation), k10 (basal expression of PTEN) and k14 (Rate constant for PTEN-induced Akt dephosphorylation) could undermine the dynamic behavior of the system in different degree. These findings are expected to understand the mechanisms of action of several carcinogenic and tumor suppressor factors in humans under normal conditions.
Citation: Changyong Dai, Haihong Liu, Fang Yan. The role of time delays in P53 gene regulatory network stimulated by growth factor[J]. Mathematical Biosciences and Engineering, 2020, 17(4): 3794-3835. doi: 10.3934/mbe.2020213
[1] | Deniz Sevinç . Volatility spillovers among MIST stock markets. Data Science in Finance and Economics, 2022, 2(2): 80-95. doi: 10.3934/DSFE.2022004 |
[2] | Nurun Najwa Bahari, Hafizah Bahaludin, Munira Ismail, Fatimah Abdul Razak . Network, correlation, and community structure of the financial sector of Bursa Malaysia before, during, and after COVID-19. Data Science in Finance and Economics, 2024, 4(3): 362-387. doi: 10.3934/DSFE.2024016 |
[3] | Moses Khumalo, Hopolang Mashele, Modisane Seitshiro . Quantification of the stock market value at risk by using FIAPARCH, HYGARCH and FIGARCH models. Data Science in Finance and Economics, 2023, 3(4): 380-400. doi: 10.3934/DSFE.2023022 |
[4] | Jiamin Cheng, Yuanying Jiang . How can carbon markets drive the development of renewable energy sector? Empirical evidence from China. Data Science in Finance and Economics, 2024, 4(2): 249-269. doi: 10.3934/DSFE.2024010 |
[5] | Kuo-Shing Chen . Interlinkages between Bitcoin, green financial assets, oil, and emerging stock markets. Data Science in Finance and Economics, 2024, 4(1): 160-187. doi: 10.3934/DSFE.2024006 |
[6] | Dachen Sheng, Opale Guyot . Market power, internal and external monitoring, and firm distress in the Chinese market. Data Science in Finance and Economics, 2024, 4(2): 285-308. doi: 10.3934/DSFE.2024012 |
[7] | Zimei Huang, Zhenghui Li . What reflects investor sentiment? Empirical evidence from China. Data Science in Finance and Economics, 2021, 1(3): 235-252. doi: 10.3934/DSFE.2021013 |
[8] | Katleho Makatjane, Ntebogang Moroke . Examining stylized facts and trends of FTSE/JSE TOP40: a parametric and Non-Parametric approach. Data Science in Finance and Economics, 2022, 2(3): 294-320. doi: 10.3934/DSFE.2022015 |
[9] | Samuel Asante Gyamerah, Collins Abaitey . Modelling and forecasting the volatility of bitcoin futures: the role of distributional assumption in GARCH models. Data Science in Finance and Economics, 2022, 2(3): 321-334. doi: 10.3934/DSFE.2022016 |
[10] | Nitesha Dwarika . The risk-return relationship in South Africa: tail optimization of the GARCH-M approach. Data Science in Finance and Economics, 2022, 2(4): 391-415. doi: 10.3934/DSFE.2022020 |
In this paper, a delayed mathematical model for the P53-Mdm2 network is developed. The P53-Mdm2 network we study is triggered by growth factor instead of DNA damage and the amount of DNA damage is regarded as zero. We study the influences of time delays, growth factor and other important chemical reaction rates on the dynamic behaviors in the system. It is shown that the time delay is a critical factor and its length determines the period, amplitude and stability of the P53 oscillation. Furthermore, as for some important chemical reaction rates, we also obtain some interesting results through numerical simulation. Especially, S (growth factor), k3 (rate constant for Mdm2p dephosphorylation), k10 (basal expression of PTEN) and k14 (Rate constant for PTEN-induced Akt dephosphorylation) could undermine the dynamic behavior of the system in different degree. These findings are expected to understand the mechanisms of action of several carcinogenic and tumor suppressor factors in humans under normal conditions.
When searching the literature, we noticed that several propositions have been made by several researchers to find kernels that can be used to obtain fractional differential operators. The main reason for this is that, real world problems show signs of processes resembling behaviors of some mathematical functions. Riemann, Liouville, Cauchy and Abel works have led to a fractional calculus with a power law kernel. Their work was later modified by Caputo; this version has been used in many fields of science because of its ability to allow classical initial conditions [1]. Prabhakar suggested a different kernel as a product of power-law and the generalized Mittag-Leffler function with three parameters. This version has also attracted the attention of many researchers, studies have been done on theory as well as on applications. Indeed, the two kernels have their specific values, for example, power-law helps only to replicate processes exhibiting power-law behavior, while the product of the power-law and the generalized three-parameters Mittag-Leffler has also its field of application [2]. As nature is complex, a new kernel was suggested by Caputo and Fabrizio, a special exponential kernel with Delta Dirac properties. A differential operator that is in fashion nowadays due to its ability to replicate processes following fading memory. Indeed, this kernel brought a new shift into fractional calculus, as the concept of the fractional derivative with a non-singular kernel was introduced [3]. A point made by some researcher about the non-fractionality of the kernel led to a new kernel, the generalized Mittag-Leffler function with one parameter. This version was suggested by Atangana and Baleanu, constituting another new step forward in the field of fractional calculus. The operators have been used in several fields of studies with great success [4]. In [5], the basic theory of fractional differentiation, existence-uniqueness theorems and analytical numerical methods of solution of fractional differential equations are presented. In [6], the authors examined Noether's theorems of fractional generalized Birkhoffian systems in terms of classical and combined Caputo derivatives. The development of the time-fractional damage model for hyperelastic body is considered in [7]. While looking at nature and its complexities, one can with no doubt conclude that these suggested kernels are not enough to predict all complex behaviors of our universe. On this note, one will proceed to search for a different kernel or modified kernel, or a class of functions that will be used to introduce new differential operators. Sabatier recently presented some variants of kernels that will also open new doors for investigation [8]. In addition to these outstanding contributions, several other ideas have been suggested, for example the concept of short memory was suggested and a fractional derivative in the Caputo sense has been defined for different values of fractional orders. The idea is to have a different type of variable-order derivative unlike the well-known version that considers a fractional orders. The idea is initiated to have a different type of variable order derivative unlike the well-known version that considers a fractional-order to be a function of time. This case was suggested by Wu et al. [9] and applied in chaos. On the other hand, researchers have noticed that several real-world problems exhibit processes with different behaviors as a function of time and space. A particular case is a passage from deterministic to stochastic, or from power law to exponential decay. It was noted that existing differential operators may not be able to account for these behaviors, thus piecewise differential and integral operators were introduced to deal with problems exhibiting crossover behaviors [10]. The main aim of this note is to provide a critical analysis of the possible applications, advantages, and disadvantages of these two concepts.
We will illustrate the motivation with some examples.
Death body decay in different temperatures. Consider a corpse found in a snowy place, and assume that such body has been found after 20 days. The corpse is taken and brought to the house and kept in a normal temperature for a few days and later put in a mortuary and buried. The main aim here is to replicate the process of decay. The first part will provide a very low decay. The second part will provide a fast decay, the third part will again be a fast process and finally, a slow process. Indeed, slow and fast processes can be characterized by some mathematical functions. The power-law function is
t−α. | (2.1) |
The exponential decay function with a Dirac delta property is
11−αexp[−α1−αt]. | (2.2) |
However, a crossover from fast to slow decay processes can be modeled using the following Mittag-Leffler function with Delta-Dirac property
11−αEα[−α1−αtα]. | (2.3) |
The process can be divided into several intervals to capture each behavior. In the first part, one can have
C0Dαty(t)=−λ1y(t)if0<t≤T1. | (2.4) |
The second processes can be
CFT1Dαty(t)=−λ2y(t)ifT1<t≤T2. | (2.5) |
The two last parts will be characterized by
ABCT2Dαty(t)=−λ3y(t)ifT2<t≤T. | (2.6) |
Thus the whole process will be a system with the following crossover behaviors
{C0Dαty(t)=−λ1y(t)if0<t≤T1,CFT1Dαty(t)=−λ2y(t)ifT1<t≤T2,ABCT2Dαty(t)=−λ3y(t)ifT2<t≤T. | (2.7) |
Therefore in general the concept of piecewise derivative has been introduced.
In this section, we present the definitions of both short memory and piecewise differentiation. For the short memory case, the idea has already been discussed; for example a paper published by Deng in 2007 has already discussed the short memory principle [11], which has also been called the fixed memory principle and logarithmic memory principle. Wu et al. [9] presented the concept of a fractional variable-order derivative where the fractional order changes within an interval. The suggested definition is given below as:
{Ct0Dα0ty(t)=f(y,t) for t∈[t0,t1],Ct1Dα1ty(t)=f(y,t) for t∈[t1,t2],Ct2Dα2ty(t)=f(y,t) for t∈[t2,t3]. | (3.1) |
Here Caputo power law derivative is used, which is known to have a singularity at the origin for a class of functions. The author did not give explicitly space of the functions as the derivative was defined in general, therefore, if we assume a class of the functions for which dydt is continuous then at each t=ti, f(y,t) should be zero.
On the other hand, the piecewise concept is defined as follows.
1) A piecewise derivative of f with classical, power-law and stochastic processes is given by
{Dy(t)=f(t,y(t))if0<t≤t1,Ct1Dαty(t)=f(t,y(t))ift1<t≤t2,dy(t)=f(t,y(t))dt+σy(t)dB(t)ift2<t≤t3. | (3.2) |
2) A piecewise derivative of f with power, exponential and Mittag-Leffler laws is given as
{C0Dαty(t)=f(t,y(t))if0<t≤t1,CFt1Dαty(t)=f(t,y(t))ift1<t≤t2,ABCt1Dαty(t)=f(t,y(t))ift2<t≤t3. | (3.3) |
Several definitions can be found in [10].
In the next section, we will provide a deep analysis of these concepts.The aim of the section is to present advantages and disadvantages of these two independent concepts. We note that
C0Dαtf(t)=1Γ(1−α)t∫0ddτf(τ)(t−τ)−αdτ, | (3.4) |
CF0Dαtf(t)=11−αt∫0ddτf(τ)exp[−α1−α(t−τ)]dτ, | (3.5) |
ABC0Dαtf(t)=11−αt∫0ddτf(τ)Eα[−α1−α(t−τ)α]dτ. | (3.6) |
Here, we present a deep analysis that will help the readers to see the difference between the two concepts. Let us start with short memory. A deep look inside the short memory concept defined by gives the following:
1) The short memory principle considers a change in constant variable order; however, it uses a single kernel. Indeed, this can be viewed as variable order where the order is changed within shorter intervals. Nonetheless, it describes some process and in the case of Caputo derivation, this process will only describe a power-law process that is, this process will not have crossover behavior.
2) The concept is unable to capture classical processes because the fractional order should change in each interval.
On a serious note, however, if we have f(t,y(t))≠0,∀t∈[0,T]. So at each tj
limt→tjCtjDαty(t)=f(t,y(t))∣t=tj. | (4.1) |
Sincedydt is continuous,
limt→tjCtjDαty(t)=f(tj,y(tj))≠0. | (4.2) |
However the right hand side produces f(t,y(t))≠0, which is a contradiction. It infers that f(tj,y(tj))=0. This may be used to explain the process with a renewal force that follows the power-law process. For example, the trajectory of a flea with a constant jump. There are fewest real world problems that present these behaviors. However, due to the power-law singularity the definition suggested by Wu may have some problems at the boundaries. Nonetheless, as a result of using non-singular kernels, the concept of short memory will be well-posed since the conditions at the boundaries will be well controlled and the renewal processes would be well-posed
On the other hand, however, the concept of piecewise was introduced for different purposes. The following example will give light to the situation. We consider evaluating the velocity of water within a geological formation with fractures. We record the velocity as a function of time. The velocity will obviously be low in the rock's matrix; however as the water reaches the fracture, there will be a crossover behavior because the velocity will suddenly increase. The first part of this process follows behaviors resembling a declining process and, later, an almost constant high velocity. Now if one was to withdraw water from such a geological formation and record the water level, one will observe a fading groundwater level in earlier times; then when water is being taken from the fracture, we observe a steady groundwater level. Thus, there is a crossover behavior from the fading process to long range, which can be captured using an exponential function, then the power law. Therefore, the differential operator able to replicate this process is
{C0Dαth(r,t)=f(t,r,h(r,t))if0<t≤T1,CFT1Dαth(r,t)=f1(t,r,h(r,t))ifT1<t≤T. | (4.3) |
Therefore, one can see a clear difference and objectives of both concepts. Piecewise differential operators are thus conceived to capture processes exhibiting different patterns, or crossover behaviors. Here the order does not change within an interval as changing order does not change the process but only the memory with the same pattern, rather, the kernels change to bring into the mathematical formulation the crossover behaviors by each kernel.
For example, using the piecewise derivative the decay equation
{y′(t)=−λy(t)if0<t≤T1,CT1Dαty(t)=−λy(t)ifT1<t≤T2,dy(t)=−λy(t)dt+σy(t)dB(t)ifT2<t≤T | (4.4) |
which will lead to decay with crossover behaviors. From 0<t<T1, we shall observe a normal decay process. From T1<t<T2, we shall observe power-law decay or the Mittag-Leffler decay. From T2<t<T, we shall observe decay with randomness. On the other hand, with the short memory
{C0Dα1ty(t)=−λy(t)if0<t≤T1,CT1Dα2ty(t)=−λy(t)ifT1<t≤T2,CT2Dα3ty(t)=−λy(t)ifT2<t≤T | (4.5) |
which leads only to a power-law process or the Mittag-Leffler process.
In this section, we shall present clearly the difference between the two concepts by applying them to some problems. We shall start with a simple problem about the decay problem with two intervals.
Example 1. We consider a simple decay model within [0,T1] and [T1,T2]. In the case of short memory, we have
{C0Dα1ty(t)=−λy(t)ift∈[0,T1],CT1Dα2ty(t)=−λy(t)ift∈[T1,T2]. | (5.1) |
In the case of piecewise, we can consider the following
{dy(t)dt=−λy(t)ift∈[0,T1],CT1Dαty(t)=−λy(t)ift∈[T1,T2] | (5.2) |
or
{ABC0Dαty(t)=−λy(t)ift∈[0,T1],dy(t)dt=−λy(t)ift∈[T1,T2] | (5.3) |
or
{CF0Dαty(t)=−λy(t)ift∈[0,T1],CT1Dαty(t)=−λy(t)ift∈[T1,T2]. | (5.4) |
Using the Laplace transform on the above system yields in the case of short memory
{y(t)=y(0)Eα1[−λtα1]ift∈[0,T1],y(t)=y(T1)Eα2[−λ(t−T1)α2]ift∈[T1,T2]. | (5.5) |
In the case of piecewise, we have the following solution
{y(t)=y(0)exp[−λt]ift∈[0,T1],y(t)=y(T1)Eα[−λ(t−T1)α]ift∈[T1,T2] | (5.6) |
or
{y(t)=y(0)ift=0,y(t)=y(0)1+λ(1−α)Eα[−λα1+λ(1−α)tα]bift∈]0,T1],y(t)=y(T1)exp[−λ(t−T1)]ift∈[T1,T2] | (5.7) |
or
{y(t)=y(0)ift=0,y(t)=y(0)1+λ(1−α)exp[−λα1+λ(1−α)tα]bift∈]0,T1],y(t)=y(T1)Eα[−λ(t−T1)α]ift∈[T1,T2]. | (5.8) |
T1=1 where the crossover occurs and T2=2.4 is the final time. The numerical simulations are presented in Figures 1–4 below.
Example 2. We consider the spread of an infectious disease. We consider a Susceptible, Exposed, Infected and Recovered (SEIR) model. It was proven by Atangana and Seda that such a model may not be able to predict waves [12]. Thus to introduce waves, in particular two waves, we consider the spread to be in the periods [0,T1] and [T1,T2]. In the case of short memory, we have
{C0DαtS=μN−μS−βSINC0DαtE=βSIN−(μ+a)EC0DαtI=aE−(γ+μ)IC0DαtR=γI−μRift∈[0,T1],{CT1DβtS=μN−μS−βSINCT1DβtE=βSIN−(μ+a)ECT1DβtI=aE−(γ+μ)ICT1DβtR=γI−μRift∈[T1,T2]. | (5.9) |
In the case of piecewise several scenarios can be obtained. So we can have
{⋅S=μN−μS−βSIN⋅E=βSIN−(μ+a)E⋅I=aE−(γ+μ)I⋅R=γI−μRift∈[0,T1],{dS=(μN−μS−βSIN)dt+σ1SdB1(t)dE=(βSIN−(μ+a)E)dt+σ2EdB2(t)dI=(aE−(γ+μ)I)dt+σ3IdB3(t)dR=(γI−μR)dt+σ4RdB4(t)ift∈[T1,T2] | (5.10) |
or
{dS=(μN−μS−βSIN)dt+σ1SdB1(t)dE=(βSIN−(μ+a)E)dt+σ2EdB2(t)dI=(aE−(γ+μ)I)dt+σ3IdB3(t)dR=(γI−μR)dt+σ4RdB4(t)ift∈[0,T1],{CT1DαtS=μN−μS−βSINCT1DαtE=βSIN−(μ+a)ECT1DαtI=aE−(γ+μ)ICT1DαtR=γI−μRift∈[T1,T2]. | (5.11) |
Noting that several more scenarios can be considered, however, we will only consider these two in the case of piecewise. Before proceeding with the analysis of these models, we shall first provide an interpolation of each case in terms of wave behaviors. In the case of short memory, the first and second waves show the non-Gaussian distribution associated to the power-law variables t−α1 and t−α2. Therefore, one will observe different long tails for t−α1 and t−α2. On the other hand, however, the first considered model shows that the first wave has a normal distribution, while the second wave has random behavior. The second model shows that the first wave has a long tail spread while the second has random behavior.
We now present the numerical solutions of the considered models. We shall consider the numerical scheme suggested by Ghanbari et al. [13] for fractional cases. The short memory case can be simplified to
{C0Dαtyi(t)=Fi(t,yi(t))ift∈[0,T1],CT1Dβtyi(t)=Fi(t,yi(t))ift∈[T1,T2]. | (5.12) |
Applying the Ghanbari method yields
{yn1i=yi(0)+hα(˜a(α)n1Fi(t0,yi(t0))+n1∑k=2˜a(α)n1−kFi(tk,yi(tk)))ift∈[0,T1],yn2i=yi(T1)+hβ(˜a(β)n2Fi(T1,yi(T1))+n2∑j=n1+2a(β)n2−jFi(tj,yi(tj)))ift∈[T1,T2] | (5.13) |
where
˜a(α)n1=(n1−1)α+1−nα1(n1−α−1)Γ(α+2),a(β)n2={1Γ(β+2)ifn=0,(n2−1)β+1−2nβ+12+(n2+1)β+1Γ(β+2)ifn≥1. | (5.14) |
and
˜a(β)n2=(n2−1)β+1−nβ2(n2−β−1)Γ(β+2),θ(β)k=(k−1)β+1−2kβ+1+(k+1)β+1Γ(β+2) if k=n1+1,,..,n2−1. | (5.15) |
In the case of the piecewise first model, we have
{yn1i=yi(0)+∑n1j=2[2312Fi(tj,yi(tj))Δt−43Fi(tj−1,yi(tj−1))Δt+512Fi(tj−2,yi(tj−2))Δt] if t∈[0,T1],{yn2i=y(T1)+∑n2j=n1+3[2312Fi(tj,yi(tj))Δt−43Fi(tj−1,yi(tj−1))Δt+512Fi(tj−2,yi(tj−2))Δt] if t∈[T1,T2].+σiyi(Bn2+1i−Bn2i) | (5.16) |
For Case 2, we obtain
{{yn1i=yi(0)+∑n1j=2[2312Fi(tj,yi(tj))Δt−43Fi(tj−1,yi(tj−1))Δt+512Fi(tj−2,yi(tj−2))Δt]+σi∑n1j=1yj(Bji−Bj−1i)ift∈[0,T1],yn2i=yi(T1)+hα(˜a(α)n1Fi(tn1,yi(tn1))+∑n2k=0˜a(α)n1+kFi(tk,yi(tk)))ift∈[T1,T2]. | (5.17) |
The numerical solutions for short memory are depicted in Figure 5 with the following parameters
N=1000,μ=0.01,β=0.6,a=0.2,γ=0.03, | (5.18) |
and the following initial conditions
S(0)=1000,E(0)=25,I(50)=22,R(50)=5,S(50)=39E(50)=67,I(50)=505,R(50)=390 | (5.19) |
The numerical solutions for Cases 1 and 2 are respectively depicted in Figures 6 and 7 with the following parameters
N=1000,μ=0.01,β=0.6,a=0.2,γ=0.03, | (5.20) |
and the following initial conditions
S(0)=1000,E(0)=25,I(50)=22,R(50)=5,S(50)=35E(50)=44,I(50)=424,R(50)=527,α=0.7 | (5.21) |
Figure 5 demonstrates the short memory effect, where the first and second parts present different long tails behaviors characterized by α1 and α2; however, both clearly depict the same process which is the power law process. On the other hand, Figures 6 and 7 show the clear effects of the piecewise differential operators; the first part in Figure 6 shows normal distribution, which is characteristic of the classical differential operator, while the second part clearly shows the effect of randomness. The complete model therefore shows crossover behavior from deterministic to stochastic with no steady state. In Figure 6, the process is different. We start with randomness then end up with long tail behaviors as a result of the power law kernel.
Example 3. We now consider a chaotic problem in particular the 8-wing attractor [14]. This model has been studied by several researchers [15], the model is given as
⋅x=a(y−x)+f(t)yz⋅y=cx+dy−xz⋅z=−bz+xy | (5.22) |
where the function f(t)=M sgn(sin(wt))+K. The constant w is known to be a switch frequency and M and K are constant parameters.
In the case of short memory, we have
{C0Dα1tx=a(y−x)+f(t)yzC0Dα1ty=cx+dy−xzC0Dα1tz=−bz+xyift∈[0,T1],{CT1Dα2tx=a(y−x)+f(t)yzCT1Dα2ty=cx+dy−xzCT1Dα2tz=−bz+xyift∈[T1,T2]. | (5.23) |
In the case of piecewise, we can consider three cases. For Case 1, we can write
{ABC0Dαtx=a(y−x)+f(t)yzABC0Dαty=cx+dy−xzABC0Dαtz=−bz+xyift∈[0,T1],{dx=(a(y−x)+f(t)yz)dt+σ1xdB1(t)dy=(cx+dy−xz)dt+σ2ydB2(t)dz=(−bz+xy)dt+σ3zdB3(t)ift∈[T1,T2]. | (5.24) |
For Case 2, we have
{C0Dαtx=a(y−x)+f(t)yzC0Dαty=cx+dy−xzC0Dαtz=−bz+xyift∈[0,T1],{dx=(a(y−x)+f(t)yz)dt+σ1xdB1(t)dy=(cx+dy−xz)dt+σ2ydB2(t)dz=(−bz+xy)dt+σ3zdB3(t)ift∈[T1,T2]. | (5.25) |
For Case 3, we can get
{⋅x=a(y−x)+f(t)yz⋅y=cx+dy−xz⋅z=−bz+xyift∈[0,T1],{dx=(a(y−x)+f(t)yz)dt+σ1xdB1(t)dy=(cx+dy−xz)dt+σ2ydB2(t)dz=(−bz+xy)dt+σ3zdB3(t)ift∈[T1,T2]. | (5.26) |
We shall now present the numerical solution of each case. In the case of short memory, one can use the numerical method based on Lagrange interpolation [16]. We can first simplify the model as follows.
{C0Dα1tMi(t)=Π(t,Mi(t))ift∈[0,T1],CT1Dα2tMi(t)=Π(t,Mi(t))ift∈[T1,T2]. | (5.27) |
Thus, applying such method to the above system yields
{Mn1i=Mi(0)+[(Δt)α1Γ(α1+2)n1∑q=0Π(tq,Mqi)×[(n1−q+1)α1(n1−q+2+α1)−(n1−q)α1(n1−q+2+2α1)]−(Δt)α1Γ(α1+2)n1∑q=1Π(tq−1,Mq−1i)×[(n1−q+1)α1+1−(n1−q)α1(n1−q+1+α1)]]ift∈[0,T1],Mn2i=Mi(T1)+[(Δt)α2Γ(α2+2)n2∑k=n1+1Π(tk,Mki)×[(n2−q+1)α2(n2−q+2+α2)−(n2−q)α2(n2−q+2+2α2)]−(Δt)α2Γ(α2+2)n2∑k=n1+2Π(tk−1,Mk−1i)×[(n2−q+1)α2+1−(n2−q)α2(n2−q+1+α2)]]ift∈[T1,T2]. | (5.28) |
With the piecewise case, we obtain the following numerical solution by using a scheme based on Newton polynomial interpolation [17]. Also, we simplify the model as follows.
{ABC0Dα1tMi(t)=Π(t,Mi(t))ift∈[0,T1],dMi(t)=Π(t,Mi(t))dt+σiMidBi(t)ift∈[T1,T2]. | (5.29) |
Then applying this method yields
Mn1i=Mi(0)+1−αAB(α)Π(tn1,Mn1i)+α(Δt)αAB(α)Γ(α+1)n1∑k=2Π(tk−2,Mk−2i)×{(n1−k+1)α−(n1−k)α}+α(Δt)αAB(α)Γ(α+2)n1∑k=2[Π(tk−1,Mk−1i)−Π(tk−2,Mk−2i)]×{(n1−k+1)α(n1−k+3+2α)−(n1−k)α(n1−k+3+3α)}+α(Δt)α2AB(α)Γ(α+3)n1∑k=2[Π(tk,Mki)−2Π(tk−1,Mk−1i)+Π(tk−2,Mk−2i)]×{(n1−k+1)α[2(n1−k)2+(3α+10)(n1−k)+2α2+9α+12]−(n1−k)α[2(n1−k)2+(5α+10)(n1−k)+6α2+18α+12]},0≤t≤T1Mn2+4i=Mn2+3i+n3∑j3=n1+3[2312Π(tn2+3,Mn2+3i)−43Π(tn2+2,Mn2+2i)+512Π(tn2+1,Mn2+1i)]Δt+σiMn2i(Bn2+1i−Bn2+1i),T1≤t≤T2 | (5.30) |
For Case 2, we again apply the scheme with the Newton polynomial to obtain
{Mn1i=Mi(0)+(Δt)αΓ(α+1)n1∑k=2Π(tk−2,Mk−2i)×{(n1−k+1)α−(n1−k)α}+(Δt)αΓ(α+2)n1∑k=2[Π(tk−1,Mk−1i)−Π(tk−2,Mk−2i)],×{(n1−k+1)α(n1−k+3+2α)−(n1−k)α(n1−k+3+3α)}+(Δt)α2Γ(α+3)n1∑k=2[Π(tk,Mki)−2Π(tk−1,Mk−1i)+Π(tk−2,Mk−2i)]×{(n1−k+1)α[2(n1−k)2+(3α+10)(n1−k)+2α2+9α+12]−(n1−k)α[2(n1−k)2+(5α+10)(n1−k)+6α2+18α+12]},0≤t≤T1Mn2+4i=Mn2+3i+n3∑j3=n2+3[2312Π(tn2+3,Mn2+3i)−43Π(tn2+2,Mn2+2i)+512Π(tn2+1,Mn2+1i)]Δt+σiMi(Cn2)(Bn2+1i−Bn2+1i),T1≤t≤T2 | (5.31) |
where Cn2∈[tn2+4,tn2+3]. For Case 3, we use the simple Adams-Bashforth methods as follows
{Mn2+3i=Mn2+2i+[2312Π(tn2+2,Mn2+2i)−43Π(tn2+1,Mn2+1i)+512Π(tn2,Mn2i)]Δt,0≤t≤T1Mn2+4i=Mn2+3i+[2312Π(tn2+3,Mn2+3i)−43Π(tn2+2,Mn2+2i)+512Π(tn2+1,Mn2+1i)]Δt+σiMi(Cn2)(Bn2+1i−Bn2i),T1≤t≤T2 | (5.32) |
where Cn2∈[tn2+4,tn2+3].
Numerical solutions are obtained for the following parameters
a=14,b=43,c=−1,d=16,M=9,K=10,w=2π50. | (5.33) |
The numerical solutions for short memory are depicted in Figure 8 for the initial data x(0)=22.3,y(0)=4.9 and z(0)=2.6.
For piecewise, we consider the following stochastic-deterministic problem with power-law and Mittag-Leffler kernels:
{C0Dαtx=a(y−x)+f(t)yz+σ1xB′1(t)C0Dαty=cx+dy−xz+σ2yB′2(t)C0Dαtz=−bz+xy+σ3zB′3(t)ift∈[0,T1],{ABCT1Dαtx=a(y−x)+f(t)yzABCT1Dαty=cx+dy−xzABCT1Dαtz=−bz+xyift∈[T1,T2] | (5.34) |
with the stochastic constants
σ1=0.031;σ2=0.035;σ3=0.032. | (5.35) |
The numerical simulation for such a problem can be performed as illustrated in Figure 9 by using the same initial data and parameters.
For piecewise, we consider the following stochastic-deterministic problem with power-law and Mittag-Leffler kernels:
{ABC0Dαtx=a(y−x)+f(t)yz+σ1xB′1(t)ABC0Dαty=cx+dy−xz+σ2yB′2(t)ABC0Dαtz=−bz+xy+σ3zB′3(t)ift∈[0,T1],{CT1Dαtx=a(y−x)+f(t)yzCT1Dαty=cx+dy−xzCT1Dαtz=−bz+xyift∈[T1,T2] | (5.36) |
with the following stochastic constants
σ1=0.031;σ2=0.035;σ3=0.032. | (5.37) |
The numerical simulation for such a problem can be performed as shown in Figure 10 by using the same initial data and parameters.
Also, we consider the following deterministic-stochastic problem with power-law and Mittag-Leffler kernels:
{C0Dαtx=a(y−x)+f(t)yzC0Dαty=cx+dy−xzC0Dαtz=−bz+xyift∈[0,T1],{ABCT1Dαtx=a(y−x)+f(t)yz+σ1xB′1(t)ABCT1Dαty=cx+dy−xz+σ2yB′2(t)ABCT1Dαtz=−bz+xy+σ3zB′3(t)ift∈[T1,T2] | (5.38) |
with the following stochastic constants:
σ1=0.02;σ2=0.012;σ3=0.021. | (5.39) |
The numerical solutions for the above problem can be depicted as shown in Figure 11 using same initial data and parameters.
Figure 7 shows the results obtained by applying the power-law short memory concept. To show the difference within the interval, we have opted to consider the first part of the interval to be in blue and the second to be in red. However, a quick look at the results shows clearly the effect of a power law, no great change from one interval to another is observed since both depict long-tail behaviors as results of the power-law kernel. In this case, there is no crossover behavior, just a repetition of different long tail behaviors. On the other hand, in Figures 8 and 9, there is a clear change in patterns where the first patterns show deterministic behaviors in particular, long-tails due to power law in Figure 8, and the second part shows randomness, there is, therefore, a clear crossover from power law to randomness. While, in Figure 9, we have two crossovers, the first is due to the Mittag-Leffler kernel that shows a change from stretched exponential to power law and the second is stochastic.
Also, we consider deterministic-stochastic problem with power-law and Mittag-Leffler kernel
{ABC0Dαtx=a(y−x)+f(t)yzABC0Dαty=cx+dy−xzABC0Dαtz=−bz+xyift∈[0,T1],{CT1Dαtx=a(y−x)+f(t)yz+σ1xB′1(t)CT1Dαty=cx+dy−xz+σ2yB′2(t)CT1Dαtz=−bz+xy+σ3zB′3(t)ift∈[T1,T2] | (5.40) |
with the following stochastic constants:
σ1=0.02;σ2=0.012;σ3=0.021. | (5.41) |
The numerical solutions for the above problem can be depicted as shown in Figure 12 by using the same initial data and parameters.
In the last decades, researchers have devoted their attention to better understanding complex realworld problems even on a small scale. They have therefore developed several methods, different differential, and integral operators. To understand the process by which different long tails occur in different intervals, the concept of short memory was introduced. This concept defines power-law derivatives in different intervals and each interval has its own order. This order accounts for the long tail associated with that interval. However, the process is scale-invariant in terms of patterns. On the other hand, because there are many real-world problems that exhibit passages from one process to another, for example, a passage from power law to randomness, the concept of piecewise was introduced. In this work, a detailed analysis was given to show their different fields of applications and show also, when short memory and piecewise concepts can be applied. This paper thus helps researchers to identify what problem is suitable for short memory and piecewise.
The authors declare there is no conflict of interest.
[1] |
D. W. Meek, Tumour suppression by P53: A role for the DNA damage response, Nat. Rev. Cancer, 9 (2009), 714-723. doi: 10.1038/nrc2716
![]() |
[2] |
V. Rotter, p53, a transformation-related cellular-encoded protein, can be used as a biochemical marker for the detection of primary mouse tumor cells, P Natl. Acad. Sci. USA, 80 (1983), 2613-2617. doi: 10.1073/pnas.80.9.2613
![]() |
[3] |
F. Mantovani, L. Collavin, G. Del Sal, Mutant p53 as a guardian of the cancer cell, Cell Death Differ., 26 (2019), 199-212. doi: 10.1038/s41418-018-0246-9
![]() |
[4] | J. Bartek, J. Bartkova, B. Vojtesek, Z. Staskova, J. Lukas, A. Rejthar, et al., Aberrant expression of thep53 oncoprotein is a common feature of a wide spectrum of human malignancies, Oncogene, 6 (1991), 1699-1703. |
[5] |
R. Iggo, J. Bartek, D. Lane, K. Gatter, A. L. Harris, J. Bartek, Increased expression of mutant forms of p53 oncogene in primary lung cancer, Lancet, 335 (1990), 675-679. doi: 10.1016/0140-6736(90)90801-B
![]() |
[6] |
A. J. Levine, P53, the cellular gatekeeper for growth and division, Cell, 88 (1997), 323-331. doi: 10.1016/S0092-8674(00)81871-1
![]() |
[7] |
J. E. Purvis, K. W. Karhohs, C. Mock, E. Batchelor, A. Loewer, G. Lahav, P53 dynamics control cell fate, Science, 336 (2012), 1440-1444. doi: 10.1126/science.1218351
![]() |
[8] |
K. H. Vousden, X. Lu, Live or let die: The cell's response to P53, Nat. Rev. Cancer, 2 (2002), 594-604. doi: 10.1038/nrc864
![]() |
[9] |
B. Vogelstein, D. Lane, A. Levine, Surfing the P53 network, Nature, 408 (2000), 307-310. doi: 10.1038/35042675
![]() |
[10] |
J. D. Oliner, K. W. Kinzler, P. S. Meltzer, D. L. George, B. Vogelstein, Amplification of a gene encoding a P53-associated protein in human sarcomas, Nature, 358 (1992), 80-83. doi: 10.1038/358080a0
![]() |
[11] |
M. H. G. Kubbutat, S. N. Jones, K. H. Vousden, Regulation of P53 stability by Mdm2, Nature, 387 (1997), 299-303. doi: 10.1038/42342-c1
![]() |
[12] |
J. H. Park, S. W. Yang, J. M. Park, S. H. Ka, J. Kim, Y. Kong, et al., Positive feedback regulation of P53 transactivity by DNA damage-induced ISG15 modification, Nat. Commun., 7 (2016), 12513. doi: 10.1038/ncomms12513
![]() |
[13] |
K. H. Vousden, D. P. Lane, P53 in health and disease, Nat. Rev. Mol. Cell Biol., 8 (2007), 275-283. doi: 10.1038/nrm2147
![]() |
[14] |
N. D. Lakin, S. P. Jackson, Regulation of P53 in response to DNA damage, Oncogene, 18 (1999), 7644-7655. doi: 10.1038/sj.onc.1203015
![]() |
[15] | U. M. Moll, O. Petrenko, The MDM2-P53 interaction, Mol. Cancer Res., 1 (2004), 1001-1008. |
[16] |
Y. Haupt, R. Maya, A. Kazaz, M. Oren, Mdm2 promotes the rapid degradation of P53, Nature, 387 (1997), 296-299. doi: 10.1038/387296a0
![]() |
[17] |
G. Liao, D. Yang, L. Ma, W. Li, L. Hu, L, Zeng, et al., The development of piperidinones as potent MDM2-P53 protein-protein interaction inhibitors for cancer therapy, Eur. J. Med. Chem., 159 (2018), 1-9. doi: 10.1016/j.ejmech.2018.09.044
![]() |
[18] |
D. Cao, T. K. Ng, Y. W. Y. Yip, A. L. Young, C. P. Pang, W. K. Chu, et al., P53 inhibition by MDM2 in human pterygium, Exp. Eye Res., 175 (2018), 142-147. doi: 10.1016/j.exer.2018.06.021
![]() |
[19] |
R. Li, P. D. Sutphin, D. Schwartz, D. Matas, N. Almog, R. Wolkowicz, et al., Mutant p53 protein expression interferes with p53-independent apoptotic pathways, Oncogene, 16 (1998), 3269-3277. doi: 10.1038/sj.onc.1201867
![]() |
[20] |
G. Blandino, A. J Levine, M. Oren, Mutant p53 gain of function: Differential effects of different p53 mutants on resistance of cultured cells to chemotherapy, Oncogene, 18 (1999), 477-485. doi: 10.1038/sj.onc.1202314
![]() |
[21] |
G. Bossi, E. Lapi, S. Strano, C. Rinaldo, G. Blandino, A. Sacchi, Mutant p53 gain of function: Reduction of tumor malignancy of human cancer cell lines through abrogation of mutant p53 expression, Oncogene, 25 (2006), 304-309. doi: 10.1038/sj.onc.1209026
![]() |
[22] |
M. S. Irwin, K. Kondo, M. C. Marin, L. S. Cheng, W. C. Hahn, W. G. Kaelin, Chemosensitivity linked to p73 function, Cancer Cell, 3 (2003), 403-410. doi: 10.1016/S1535-6108(03)00078-3
![]() |
[23] |
R. Maya, R. Segel, U. Alon, A. J. Levine, Generation of oscillations by the P53-Mdm2 feedback loop: A theoretical and experimental study, P Natl. Acad. Sci. USA, 97 (2000), 11250-11255. doi: 10.1073/pnas.210171597
![]() |
[24] |
L. Ma, J. Wagner, J. Rice, W. Hu, A. Levine, G. Stolovitzky, A plausible model for the digital response of P53 to DNA damage, P Natl. Acad. Sci. USA, 102 (2005), 14266-14271. doi: 10.1073/pnas.0501352102
![]() |
[25] |
T. Zhang, P. Brazhnik, J. J. Tyson, Exploring mechanisms of the DNA-damage response: P53 pulses and their possible relevance to apoptosis, Cell Cycle, 6 (2007), 85-94. doi: 10.4161/cc.6.1.3705
![]() |
[26] |
X. P. Zhang, F. Liu, Z. Cheng, W. Wang, Cell fate decision mediated by P53 pulses, P Natl. Acad. Sci. USA., 106 (2009), 12245-12250. doi: 10.1073/pnas.0813088106
![]() |
[27] |
X. P. Zhang, F. Liu, W. Wang, Two-phase dynamics of P53 in the DNA damage response, P Natl. Acad. Sci. USA, 108 (2011), 8990-8995. doi: 10.1073/pnas.1100600108
![]() |
[28] |
T. Sun, W. Yang, J. Liu, P. Shen, Modeling the basal dynamics of P53 system, PLoS ONE, 6 (2011), e27882. doi: 10.1371/journal.pone.0027882
![]() |
[29] |
B. C. Torrico, M. P. d. A. Filho, T. A. Lima, M. D. D. N. Forte, R. C. Sa, F. G. Nogueira, Tuning of a dead-time compensator focusing on industrial processes, Isa Transact., 83 (2018), 189-198. doi: 10.1016/j.isatra.2018.09.003
![]() |
[30] |
T. Zhang, P. Brazhnik, J. J. Tyson, Computational Analysis of Dynamical Responses to the Intrinsic Pathway of Programmed Cell Death, Biophys J., 97 (2009), 415-434. doi: 10.1016/j.bpj.2009.04.053
![]() |
[31] |
K. H. Chong, S. Samarasinghe, D. Kulasiri, J. Zheng, Mathematical modelling of core regulatory mechanism in P53 protein that activates apoptotic switch, J. Theor. Biol., 462 (2019), 134-147. doi: 10.1016/j.jtbi.2018.11.008
![]() |
[32] |
Y. Zhang, Y. Xiong, W. G. Yarbrough, ARF promotes MDM2 degradation and stabilizes P53: ARF-INK4a locus deletion impairs both the Rb and P53 tumor suppression pathways, Cell, 92 (1998), 725-735. doi: 10.1016/S0092-8674(00)81401-4
![]() |
[33] |
E. Shaulian, D. Resnitzky, O. Shifman, G. Blandino, A. Amsterdam, A. Yayon, et al., Induction of Mdm2 and enhancement of cell survival by bFGF, Oncogene, 15 (1997), 2717-2725. doi: 10.1038/sj.onc.1201453
![]() |
[34] |
Y. Ogawara, S. Kishishita, T. Obata, Y. Isazawa, T. Suzuki, K. Tanaka, et al, Akt enhances Mdm2- mediated ubiquitination and degradation of P53, J. Biol. Chem., 277 (2002), 21843-21850. doi: 10.1074/jbc.M109745200
![]() |
[35] |
A. Carnero, C. Blanco-Aparicio, O. Renner, W. Link, The PTEN/PI3K/Akt signalling pathway in cancer, therapeutic implications, Curr. Cancer Drug Tar., 8 (2008), 187-198. doi: 10.2174/156800908784293659
![]() |
[36] |
X. Tian, B. Huang, X. P. Zhang, M. Lu, W. Wang, Modeling the response of a tumor-suppressive network to mitogenic and oncogenic signals, P Natl. Acad. Sci. USA, 114 (2017), 5337-5342. doi: 10.1073/pnas.1702412114
![]() |
[37] |
B. Novak, J. J. Tyson, Design principles of biochemical oscillators, Nat. Rev. Mol. Cell Biol., 9 (2008), 981-991. doi: 10.1038/nrm2530
![]() |
[38] |
J. R. Pomerening, S. Y. Kim, J. E. Ferrell, Systems-level dissection of the cell-cycle oscillator: Bypassing positive feedback produces damped oscillations, Cell, 122 (2005), 565-578. doi: 10.1016/j.cell.2005.06.016
![]() |
[39] |
K. Jonak, M. Kurpas, K. Szoltysek, J. Patryk, A. Abramowicz, K. Puszynski, A novel mathematical model of ATM/P53/NF-kB pathways points to the importance of the DDR switch-off mechanisms, BMC Syst. Biol., 10 (2016), 75. doi: 10.1186/s12918-016-0293-0
![]() |
[40] |
A. Honkela, J. Peltonen, H. Topa, I. Charapitsa, F. Matarese, Genome-wide modeling of transcription kinetics reveals patterns of RNA production delays, P Natl. Acad. Sci. USA, 112 (2015), 13115-13120. doi: 10.1073/pnas.1420404112
![]() |
[41] |
A. Prindle, J. Selimkhanov, H. Li, I. Razinkov, L. S. Tsimring, J. Hasty, Rapid and tunable post-translational coupling of genetic circuits, Nature, 508 (2014), 387-391. doi: 10.1038/nature13238
![]() |
[42] |
H. K. Yalamanchili, B. Yan, M. J. Li, J. Qin, Z. Zhao, F. Y. L. Chin, et al., DDGni: Dynamic delay gene-network inference from high-temporal data using gapped local alignment, Bioinformatics, 30 (2014), 377-383. doi: 10.1093/bioinformatics/btt692
![]() |
[43] |
V. Stambolic, D. Macpherson, D. Sas, Y. Lin, B. Snow, Regulation of PTEN transcription by P53, Mol. Cell, 8 (2001), 317-325. doi: 10.1016/S1097-2765(01)00323-9
![]() |
[44] |
Y. Barak, E. Gottlieb, T. Juven-Gershon, M. Oren, Regulation of mdm2 expression by P53: Alternative promoters produce transcripts with nonidentical translation potential, Gene Dev., 8 (1994), 1739-1749. doi: 10.1101/gad.8.15.1739
![]() |
[45] |
K. B. Wee, B. D. Aguda, Akt versus P53 in a network of oncogenes and tumor suppressor genes regulating cell survival and death, Biophys J., 91 (2006), 857-865. doi: 10.1529/biophysj.105.077693
![]() |
[46] |
D. Qiu, L. Mao, S. Kikuchi, M. Tomita, Sustained MAPK activation is dependent on continual NGF receptor regeneration, Dev. Growth Differ., 46 (2004), 393-403. doi: 10.1111/j.1440-169x.2004.00756.x
![]() |
[47] |
B. N. Kholodenko, Negative feedback and ultrasensitivity can bring about oscillations in the mitogen-activated protein kinase cascades, Eur. J. Biochem., 267 (2000), 1583-1588. doi: 10.1046/j.1432-1327.2000.01197.x
![]() |
[48] |
Y. Zhang, H. Liu, F. Yan, J. Zhou, Oscillatory dynamics of p38 activity with transcriptional and translational time delays, Sci. Rep. 7, (2017), 11495. doi: 10.1038/s41598-017-11149-5
![]() |
[49] |
Y. Harima, Y. Takashima, Y. Ueda, T. Ohtsuka, R. Kageyama, Accelerating the tempo of the segmentation clock by reducing the number of introns in the Hes7 gene, Cell Rep., 3, (2013), 1-7. doi: 10.1016/j.celrep.2012.11.012
![]() |
[50] | Y. Takashima, T. Ohtsuka, A. Gonzalez, H. Miyachi, R. Kageyama, Intronic delay is essential for oscillatory expression in the segmentation clock, P Natl. Acad. Sci. USA, 108, (2011), 3300-3305. |
[51] |
J. Lewis, Autoinhibition with transcriptional delay: A simple mechanism for the zebrafish somitogenesis oscillator, Curr. Biol., 13, (2003), 1398-1408. doi: 10.1016/S0960-9822(03)00534-7
![]() |
[52] |
A. Audibert, D. Weil, F. Dautry, In vivo kinetics of mrna splicing and transport in mammalian cells, Mol. Cell Biol., 22, (2002), 6706-6718. doi: 10.1128/MCB.22.19.6706-6718.2002
![]() |
[53] | J. Fruth, New methods for the sensitivity analysis of black-box functions with an application to sheet metal forming, TU Dortmund University, 2015. |
[54] |
B. P. Zhou, Y. Liao, W. Xia, Y. Zou, B. Spohn, M.C. Hung, HER-2/neu induces P53 ubiquitination via Akt-mediated MDM2 phosphorylation, Nat. Cell Biol., 3 (2001), 973-982. doi: 10.1038/ncb1101-973
![]() |
[55] | S. Ruan, J. Wei, On the zeros of transcendental functions with applications to stability of delay differential equations with two delays, Dynam. Cont. Dis. Ser. A, 10 (2003), 863-874. |
[56] | B. D. Hassard, N. D. Kazarinoff, Y. H. Wan, Theory and applications of Hopf bifurcation, Cambridge University Press, 1981. |
1. | Rodrigo Moreira, Larissa Ferreira Rodrigues Moreira, Flávio de Oliveira Silva, Brazilian Selic Rate Forecasting with Deep Neural Networks, 2024, 0927-7099, 10.1007/s10614-024-10597-2 | |
2. | Michele Bufalo, Claudia Ceci, Giuseppe Orlando, Addressing the financial impact of natural disasters in the era of climate change, 2024, 73, 10629408, 102152, 10.1016/j.najef.2024.102152 | |
3. | Guo-Hui Yang, Si-Qi Ma, Xiao-Dong Bian, Jiang-Cheng Li, Pierluigi Vellucci, The roles of liquidity and delay in financial markets based on an optimal forecasting model, 2023, 18, 1932-6203, e0290869, 10.1371/journal.pone.0290869 | |
4. | Giacomo Ascione, Michele Bufalo, Giuseppe Orlando, Modeling volatility of disaster-affected populations: A non-homogeneous geometric-skew Brownian motion approach, 2024, 130, 10075704, 107761, 10.1016/j.cnsns.2023.107761 |