Processing math: 100%
Research article

Pseudo almost periodic solutions for quaternion-valued high-order Hopfield neural networks with time-varying delays and leakage delays on time scales

  • Received: 24 February 2021 Accepted: 05 July 2021 Published: 07 July 2021
  • MSC : 34K14, 34K20, 34N05, 92B20

  • This paper deals with a class of quaternion-valued high-order Hopfield neural networks with time-varying delays and leakage delays on time scales. Based on the Banach fixed point theorem and the theory of calculus on time scales, some sufficient conditions are obtained for the existence and global exponential stability of pseudo almost periodic solutions for the considered networks. The results of this paper are completely new. Finally, an example is presented to illustrate the effectiveness of the obtained results.

    Citation: Xiaofang Meng, Yongkun Li. Pseudo almost periodic solutions for quaternion-valued high-order Hopfield neural networks with time-varying delays and leakage delays on time scales[J]. AIMS Mathematics, 2021, 6(9): 10070-10091. doi: 10.3934/math.2021585

    Related Papers:

    [1] Ahmed M. A. El-Sayed, Wagdy G. El-Sayed, Kheria M. O. Msaik, Hanaa R. Ebead . Riemann-Liouville fractional-order pantograph differential equation constrained by nonlocal and weighted pantograph integral equations. AIMS Mathematics, 2025, 10(3): 4970-4991. doi: 10.3934/math.2025228
    [2] Songkran Pleumpreedaporn, Chanidaporn Pleumpreedaporn, Weerawat Sudsutad, Jutarat Kongson, Chatthai Thaiprayoon, Jehad Alzabut . On a novel impulsive boundary value pantograph problem under Caputo proportional fractional derivative operator with respect to another function. AIMS Mathematics, 2022, 7(5): 7817-7846. doi: 10.3934/math.2022438
    [3] Abdelkader Moumen, Ramsha Shafqat, Zakia Hammouch, Azmat Ullah Khan Niazi, Mdi Begum Jeelani . Stability results for fractional integral pantograph differential equations involving two Caputo operators. AIMS Mathematics, 2023, 8(3): 6009-6025. doi: 10.3934/math.2023303
    [4] Saeed M. Ali, Mohammed S. Abdo, Bhausaheb Sontakke, Kamal Shah, Thabet Abdeljawad . New results on a coupled system for second-order pantograph equations with ABC fractional derivatives. AIMS Mathematics, 2022, 7(10): 19520-19538. doi: 10.3934/math.20221071
    [5] Naimi Abdellouahab, Keltum Bouhali, Loay Alkhalifa, Khaled Zennir . Existence and stability analysis of a problem of the Caputo fractional derivative with mixed conditions. AIMS Mathematics, 2025, 10(3): 6805-6826. doi: 10.3934/math.2025312
    [6] Weerawat Sudsutad, Chatthai Thaiprayoon, Sotiris K. Ntouyas . Existence and stability results for ψ-Hilfer fractional integro-differential equation with mixed nonlocal boundary conditions. AIMS Mathematics, 2021, 6(4): 4119-4141. doi: 10.3934/math.2021244
    [7] Sabri T. M. Thabet, Sa'ud Al-Sa'di, Imed Kedim, Ava Sh. Rafeeq, Shahram Rezapour . Analysis study on multi-order ϱ-Hilfer fractional pantograph implicit differential equation on unbounded domains. AIMS Mathematics, 2023, 8(8): 18455-18473. doi: 10.3934/math.2023938
    [8] Qun Dai, Shidong Liu . Stability of the mixed Caputo fractional integro-differential equation by means of weighted space method. AIMS Mathematics, 2022, 7(2): 2498-2511. doi: 10.3934/math.2022140
    [9] Wedad Albalawi, Muhammad Imran Liaqat, Fahim Ud Din, Kottakkaran Sooppy Nisar, Abdel-Haleem Abdel-Aty . Well-posedness and Ulam-Hyers stability results of solutions to pantograph fractional stochastic differential equations in the sense of conformable derivatives. AIMS Mathematics, 2024, 9(5): 12375-12398. doi: 10.3934/math.2024605
    [10] Fan Wan, Xiping Liu, Mei Jia . Ulam-Hyers stability for conformable fractional integro-differential impulsive equations with the antiperiodic boundary conditions. AIMS Mathematics, 2022, 7(4): 6066-6083. doi: 10.3934/math.2022338
  • This paper deals with a class of quaternion-valued high-order Hopfield neural networks with time-varying delays and leakage delays on time scales. Based on the Banach fixed point theorem and the theory of calculus on time scales, some sufficient conditions are obtained for the existence and global exponential stability of pseudo almost periodic solutions for the considered networks. The results of this paper are completely new. Finally, an example is presented to illustrate the effectiveness of the obtained results.



    The notion of resolving sets (RSs) in networks has been the subject of a great deal of research over the last few years, mostly because of its practical applications in a variety of domains, including pattern recognition, coding theory, error correction, network design, and distance labelling systems. The RSs are basically subsets of nodes in a network with the capacity to differentiate between each node according to their distances from each other. RSs are often referred to as locating sets and metric bases.

    In [1], Slater presents the idea of locating sets, or RSs, first, and he also created the phrase location number to indicate the size of the smallest RS. By following the Slater's work, Melter and Harary expanded on the idea of locating sets and introduced the term metric dimension (MD). They further investigated the MD of trees [2], providing a comprehensive understanding of this idea. The application of the MD problem has gained significant attention in addressing various real-world issues in recent times. Its utilization spans several domains: establishing reliable sensor networks [3], authenticating network intrusions by leveraging the network's metric base, tackling coin weighing challenges [4], and connected joins in networks [5]. Moreover, MD is applied in different branches of navigation [6], and chemistry [7].

    Murtaza et al. [8] estimated the constant MD of cycle-related networks. It was also discovered that finding the MD of a connected network is an NP-hard task [9]. Chartrand et al. calculated the MD of both unicyclic and path networks [7]. Furthermore, they provided a characterization of all connected networks of order p that possess MD 1, p1, and p2. For calculating the MD of networks, Murdiansyah and Adiwijaya [10] presented the particle swarm optimization technique. Fernau et al. [11] introduced an algorithm with linear-time complexity to calculate the MD of chain networks. These networks are bipartite and have vertices that can be arranged based on neighborhood inclusion. In [12], Mulyono et al. focused on establishing the MD for three types of networks: the friendship network Fn, the Petersen network P(n,m), and the lollipop network L(m,n). Moreover, the MD is thought to be paramount for studying many other structures, such as the RS of silicate stars [13], the exact values of MD and domination-related parameters of complete multipartite networks [14], and the sharp bounds on the MD of honeycomb networks studied in [15].

    Determining the fault-tolerant MD of a network poses a complex combinatorial challenge, offering potential implications for sensor networks. In their exploration of the MD and fault-tolerant MD within various interconnection networks [16], Hayat et al. discovered that silicate, Benes, and butterfly networks have infinite fault-tolerant resolvability. Saha et al., in their research outlined in [17], delved into the k-MD of the circulant networks for a range of possible values of n and k, representing the required fault-tolerant MD. Investigations conducted by authors in [18,19] focused on the fault-tolerant MD within recognized families of convex polytope structures. Additionally, Saha et al. tackled the 2-MD problem regarding circulant networks specifically, contributing to the field of network resilience, as discussed in [20]. Raza et al. [21] demonstrate specific lower and upper limits regarding the FTMD for infinite of regular graphs. For more details, see [22].

    Caceres et al. [23] have pioneered the exploration of doubly resolving sets (DRSs) within graph theory, showcasing the strong correlation between the MD of the Cartesian products and these minimal DRSs in network G. DRSs are essential in source localization because they help reduce ambiguity, improve accuracy, enhance robustness, and enable efficient algorithms for determining the locations of multiple sources [24,25]. DRSs are a valuable tool in various applications, including radar, sonar, wireless communication, and more, where source localization is a critical task.

    In [26], Kratica et al. demonstrated that the minimal DRS problem is NP-hard and proposed the utilization of a genetic algorithm to address large-scale instances of the problem. The problem of determining the MDRSs has been investigated for various network families. Notably, prior research has delved into the investigation of minimal DRSs within prisms [27], convex polytopes [28], and Hamming networks [29]. In the work by Chen et al. [30], they established the upper and lower bounds for the DRS problem. Additionally, in the study by Ahmad et al. [31], it was noted that circulant networks in the same family exhibit identical MD and DRS properties.

    Lately, Ahmad et al. have made significant strides in addressing the DRS problem within various network families, as evidenced in their work [32,33]. Jannesari [34] provided a characterization for networks G with a double metric dimension (DMD) of 2, utilizing 2-connected subnetworks within network G. In another recent research endeavor, Ahmad et al. [35] delved into the study of minimal DRSs specifically in the context of chordal ring networks.

    There are many different kinds of network metric generators in use right now, and each kind is the subject of theoretical and practical research based on how useful and well-linked it is (for details see: [36]). However, while defining networks utilizing these metric generators, there are other viewpoints that have not yet been fully considered. Assume a network where vertices are accurately monitored and uniquely identified by a metric generator. However, if an intruder enters the network through its edges rather than its vertices, it is impossible to pinpoint their location, which makes surveillance impossible.

    To address these kinds of issues, Ahmad et al. introduced a novel metric generator called EVDRSs in [37]. For the edge form of DRSs, only a few network families have been studied in the literature. The EVDRSs for the sunlet networks and prisms were found in [37]. The concept of the minimal EVDRSs has also been examined in [38] concerning the family of layer-sun networks. Moreover, the investigation of minimum-ordered EVDRSs in chorded cycles was carried out in [39], where the authors established that the least size of the EVDRSs for the chorded cycles is precisely one more than its edge version of MD. Additionally, the EVDRS problem for cocktail networks, jellyfish networks, and necklace networks has been examined in previous works, such as [40], and [41], respectively. In another study [42], Ahmad et al. tackled the problem of identifying the minimum EVDRSs for kayak paddle networks.

    In this research article, we focus on EVDRSs in circulant networks Cn(1,2). A set is considered an EVDRS in a network if it has the ability to uniquely distinguish between any two edges of the network using any pair of edges from a subset of that network. The study of EVDRSs is relatively new and has gained attention as it provides additional information about the structure of a network. The main objective of this research is to investigate the existence, size, and structure of EVDRSs in circulant networks Cn(1,2). By providing insights into the EVDRSs of circulant networks Cn(1,2), we contribute to the broader understanding of this intriguing class of networks and expand the knowledge base of RSs. The research findings in this study hold implications for real-life situations in various domains; a few of them are as follows:

    Communication Networks: The EVDRSs can help improve error detection and correction mechanisms in communication networks, which will increase the dependability of data transfer.

    Distributed Sensor Networks: The design and optimization of distributed sensor networks, where effective data collection and processing are essential, may find applications from the insights gained from this study.

    Furthermore, these findings may have an impact on the development of network navigation and localization algorithms. The characterization of EVDRSs in circulant networks Cn(1,2) provides the groundwork for the development of location-aware systems that are more reliable and accurate, influencing domains like tracking, surveillance, and autonomous navigation. To summarize, the study of EVDRSs in circulant networks Cn(1,2) has both theoretical and practical implications for enhancing the performance, efficiency, and reliability of different kinds of communication and sensing systems in real-world applications. The key contribution of the article is explained below:

    ● The Section 2 introduces the notation and preliminary definitions required for our study.

    ● Section 3 presents our main results on the existence and structure of EVDRSs in Cn(1,2).

    ● We discuss the implications and applications of these results in Section 4.

    ● Finally, we conclude the article in Section 5 by summarizing our findings, highlighting their significance and limitations, and suggesting directions for future research.

    We take an undirected, connected, and simple network G consisting of the set of vertices V(G) and E(G), which is the set of edges. Let v1,v2 V(G), then the distance d(v1,v2) is the smallest path between v1 and v2. Let an ordered subset R={ri,1il}V(G), and for any v V(G), the representation of v with respect to R is the l-tuple (d(v,r1),d(v,r2),,d(v,rl)) and written as r(v,R). The set R is said to be a RS, when different vertices of G have different representations with respect to R. The minimum number of vertices in subset R is called a basis for G, and the cardinality or size of the basis is known as the MD of G, represented by dim(G). For RV(G), r(x,R) = 0, whenever x=ri, the ith component of R. Therefore, to prove that R is resolvable, we have to demonstrate that r(x,R)r(y,R), whenever xy V(G) R. Let w and x be any two vertices of G, where |V(G)|2. If for the vertices u,vG, d(u,w)d(u,x)d(v,w)d(v,x), i.e., the difference between their distances to w and x is not equal, then we say that u and v are doubly resolved by w and x. A subset D is said to be DRS, if some of its vertices doubly resolve every pair of the vertices in G. A DRS with the smallest possible size is said to be a minimal DRS, and its size is called as the double metric dimension (DMD), denoted by the ψ(G).

    If e1 and e2 are edges of the network G, with the condition that |E(G)|2 and dE(f1,e1)dE(f1,e2)dE(f2,e1)dE(f2,e2), then f1 and f2 are said to be doubly resolved by e1 and e2. If an ordered subset DG={et,1tk} of edges in G doubly resolves any pair of edges f1 and f2 in E(G), then such a subset DG is called an EVDRS of G. The minimum size of an EVDRS of G is denoted as ψE(G). For more research on these basic concepts, see [37].

    The family of circulant network, denoted by Cn(1,2) is the family of networks obtained by constructing a cycle of length n and connecting each vertex vλ with vλ+2 modulo n with a vertex set VCn(1,2)={v1,v2,,vn} and edge set ECn(1,2)=HL, as shown in Figure 1, where H={h1,h2,,hn} and L={l1,l2,,ln}.

    Figure 1.  The family of circulant networks Cn(1,2).

    The edge version of MD for Cn(1,2) was studied in [43], and the result is given below:

    Theorem 3.1. [43] Let Cn(1,2) be the circulant networks, then dimE(Cn(1,2))=4, n6.

    The following proposition will be helpful in calculating the EVDRSs:

    Proposition 3.1. [26] A subset DCn(1,2)={y1,y2,yk}E(Cn(1,2)) is an EVDRS of Cn(1,2) if, and only if, for every v,yE(Cn(1,2)), there exists λ{2,3,,k} such that dE(v,yλ)dE(v,y1) is not equal to dE(y,yλ)dE(y,y1).

    For every edge eE(Cn(1,2)), we define rE(e,DCn(1,2))=(dE(e,y2)dE(e,y1),,dE(e,yk)dE(e,y1)). The above proposition states that DCn(1,2) is a minimal EVDRS if and only if these distance vectors rE(e,DCn(1,2)) are all distinct for every edge eE(Cn(1,2)).

    The statement of the theorem for EVDRSs in circulant networks is as follows:

    Theorem 3.2. Let Cn(1,2) be the circulant networks, then ψE(Cn(1,2))=4, for n6.

    Proof. To compute EVDRSs for circulant networks, we will address the following four scenarios:

    Case 1. When n 0(mod 4) or n=4k, where k2.

    Consider the set of edges RCn(1,2)={h1,h2,hn21,hn2}, then the distance vectors of the edges in relation to RCn(1,2) are shown in Tables 1 and 2 as follows:

    Table 1.  Distance vectors r and r of the edges in Cn(1,2).
    rE(h2λ1,RCn(1,2)) λ
    (0,1,n4,n4)  if λ=1;
    (λ,λ1,n4λ+1,n4λ+1)  if 2λn41;
    (n4,n41,0,1)  if λ=n4;
    (λ,n4,2,1)  if λ=n4+1;
    (n2λ+2,n2λ+2,λn4+1,λn4)  if n4+2λn2.
    rE(h2λ1,RCn(1,2)) λ
    (1,n4,n4)  if λ=1;
    (1,n42λ+1,n42λ+1)  if 2λn41;
    (1,n4,1n4)  if λ=n4;
    (n4λ,2λ,1λ)  if λ=n4+1;
    (0,2λ3n41,2λ3n42)  if n4+2λn2.
    rE(h2λ,RCn(1,2)) λ
    (1,0,n41,n4)  if λ=1;
    (λ,λ,n4λ,n4λ+1)  if 2λn41;
    (n4,n4,1,0)  if λ=n4;
    (n2λ+1,n2λ+2,λn4+1,λn4+1)  if n4+1λn2.
    rE(h2λ,RCn(1,2)) λ
    (1,n42,n41)  if λ=1;
    (0,n42λ,n42λ+1)  if 2λn41;
    (0,1n4,n4)  if λ=n4;
    (1,2λ3n4,2λ3n4)  if n4+1λn2.

     | Show Table
    DownLoad: CSV
    Table 2.  Distance vectors r and r of the edges in Cn(1,2).
    rE(l2λ1,RCn(1,2)) λ
    (1,1,n41,n4)  if λ=1;
    (λ,λ1,n4λ,n4λ+1)  if 2λn41;
    (n4,λn4+4,λn4+1,1)  if n4λn4+1;
    (n2λ+1,n2λ+2,λn4+1,λn4)  if n4+2λn21;
    (1,2,n4,n4)  if λ=n2.
    rE(l2λ1,RCn(1,2)) λ
    (0,n42,n41)  if λ=1;
    (1,n42λ,n42λ+1)  if 2λn41;
    (λn2+4,λn2+1,1n4)  if n4λn4+1;
    (1,2λ3n4,2λ3n41)  if n4+2λn21;
    (1,n41,n41)  if λ=n2.
    rE(l2λ,RCn(1,2)) λ
    (λ,λ,n4λ,n4λ)  if 1λn41;
    (n4,n4,λn4+1,λn4+1)  if n4λn4+1;
    (n2λ+1,n2λ+1,λn4+1,λn4+1)  if n4+2λn21;
    (1,1,n4,n4)  if λ=n2.
    rE(l2λ,RCn(1,2)) λ
    (0,n42λ,n42λ)  if 1λn41;
    (0,λn2+1,λn2+1)  if n4λn4+1;
    (0,2λ3n4,2λ3n4)  if n4+2λn21;
    (0,n41,n41)  if λ=n2.

     | Show Table
    DownLoad: CSV

    Case 2. When n 1(mod 4) or n=4k+1, where k2.

    Consider the set of edges RCn(1,2)={h1,hn2,hn2+1,hn}, then the distance vectors of the edges in relation to RCn(1,2) are shown in Tables 3 and 4 as follows:

    Table 3.  Distance vectors r and r of the edges in Cn(1,2).
    rE(h2λ1,RCn(1,2)) λ
    (0,n14,n14+1,1)  if λ=1;
    (λ,n14λ+1,n14λ+2,λ)  if 2λn14;
    (n14+1,1,0,n14+1)  if λ=n14+1;
    (n12λ+2,λn14,λn14,n12λ+2)  if n14+2λn12;
    (1,n14+1,n14+1,0)  if λ=n12+1.
    rE(h2λ1,RCn(1,2)) λ
    (n14,n14+1,1)  if λ=1;
    (n142λ+1,n142λ+2,0)  if 2λn14;
    (n14,n141,0)  if λ=n14+1;
    (2λ3n342,2λ3n342,0)  if n14+2λn12;
    (n14,n14,1)  if λ=n12+1.
    rE(h2λ,RCn(1,2)) λ
    (λ,n14λ+1,n14λ+1,λ+1)  if 1λn141;
    (n14,0,1,n14+1)  if λ=n14;
    (n12λ+2,λn14+1,λn14,n12λ+1)  if n14+1λn12.
    rE(h2λ,RCn(1,2)) λ
    (n142λ+1,n142λ+1,1)  if 1λn141;
    (n14,1n14,1)  if λ=n14;
    (2λ3n341,2λ3n342,1)  if n14+1λn12.

     | Show Table
    DownLoad: CSV
    Table 4.  Distance vectors r and r of the edges in Cn(1,2).
    rE(l2λ1,RCn(1,2)) λ
    (λ,n14λ+1,n14λ+1,λ)  if 1λn14;
    (n12λ+2,λn14,λn14,n12λ+1)  if n14+1λn12;
    (1,n14,n14+1,1)  if λ=n12+1.
    rE(l2λ1,RCn(1,2)) λ
    (n142λ+1,n142λ+1,0)  if 1λn14;
    (2λ3k2,2λ3k2,1)  if k+1λ2k;
    (n141,n14,0)  if λ=n12+1.
    rE(l2λ,RCn(1,2)) λ
    (λ,n14λ,n14λ+1,λ+1)  if 1λn141;
    (n14,1,1,n14+1)  if λ=n14;
    (n12λ+1,λn14+1,λn14,n12λ+1)  if n14+1λn12.
    rE(l2λ,RCn(1,2)) λ
    (n142λ,n142λ+1,1)  if 1λn141;
    (1n14,1n14,1)  if λ=n14;
    (2λ3n34,2λ3n341,0)  if n14+1λn12.

     | Show Table
    DownLoad: CSV

    Case 3. When n 2(mod 4) or n=4k+2, where k1.

    Consider the set of edges RCn(1,2)={h1,hn21,hn2,hn}, then the distance vectors of the edges in relation to RCn(1,2) are shown in Tables 5 and 6 as follows:

    Table 5.  Distance vectors r and r of the edges in Cn(1,2).
    rE(h2λ1,RCn(1,2)) λ
    (0,n24,n24+1,1)  if λ=1;
    (λ,n24λ+1,n24λ+2,λ)  if 2λn24;
    (n24+1,1,0,n24+1)  if λ=n24+1;
    (n22λ+3,λn24,λn24,n22λ+2)  if n24+2λn22+1.
    rE(h2λ1,RCn(1,2)) λ
    (n24,n24+1,1)  if λ=1;
    (n242i+1,n242λ+2,0)  if 2λn24;
    (n24,n241,0)  if λ=n24+1;
    (2λ3n643,2λ3n643,1)  if n24+2λn22+1.
    rE(h2λ,RCn(1,2)) λ
    (λ,n24λ+1,n24λ+1,λ+1)  if 1λn241;
    (n24,0,1,n24+1)  if λ=n24;
    (n22λ+2,λn24+1,λn24,n22λ+2)  if n24+1λn22;
    (1,n24+1,n24+1,0)  if λ=n22+1.
    rE(h2λ,RCn(1,2)) λ
    (n242λ+1,n242λ+1,1)  if 1λn241;
    (n24,1n24,1)  if λ=n24;
    (2λ3n641,2λ3n642,0)  if n24+1λn22;
    (n24,n24,1)  if λ=n22+1.

     | Show Table
    DownLoad: CSV
    Table 6.  Distance vectors r and r of the edges in Cn(1,2).
    rE(l2λ1,RCn(1,2)) λ
    (λ,n24λ+1,n24λ+1,λ)  if 1λn24;
    (n22λ+2,λn24,λn24,n22λ+2)  if n24+1λn22+1.
    rE(l2λ1,RCn(1,2)) λ
    (n242λ+1,n242λ+1,0)  if 1λn24;
    (2λ3n642,2λ3n642,0)  if n24+1λn22+1.
    rE(l2λ,RCn(1,2)) λ
    (λ,n24λ,n24λ+1,λ+1)  if 1λn241;
    (n24,1,1,n24+1)  if λ=n24;
    (n22λ+2,λn24+1,n24,n22λ+1)  if n24+1λn22;
    (1,n24,n24+1,1)  if λ=n22+1.
    rE(l2λ,RCn(1,2)) λ
    (n242λ,n242λ+1,1)  if 1λn241;
    (1n24,1n24,1)  if λ=n24;
    (2λ3n641,2λ3n642,1)  if n24+1λn22;
    (n241,n24,0)  if λ=n22+1.

     | Show Table
    DownLoad: CSV

    Case 4. When n 3(mod 4) or n=4k+3, where k1.

    Consider the set of edges RCn(1,2)={h1,hn2,ln21,ln2}, then the distance vectors of the edges in relation to RCn(1,2) are shown in Tables 7 and 8 as follows:

    Table 7.  Distance vectors r and r of the edges in Cn(1,2).
    rE(h2λ1,RCn(1,2)) λ
    (0,2,n34,n34+1)  if λ=1;
    (λ,λ+1,n34λ+1,n34λ+2)  if 2λn34;
    (n34+1,n34+1,1,1)  if λ=n34+1;
    (n32λ+3,n32λ+2,λn34,n34λ1)  if n34+2λn32;
    (2,0,n34+1,n34)  if λ=n32+1;
    (1,2,n34+1,n34+1)  if λ=n32+2.
    rE(h2λ1,RCn(1,2)) λ
    (2,n34,n34+1)  if λ=1;
    (1,n342λ+1,n342λ+2)  if 2λn34;
    (0,n34,n34)  if λ=n34+1;
    (1,2λ3n943,n344)  if n34+2λn32;
    (2,n341,n342)  if λ=n32+1;
    (1,n34,n34)  if λ=n32+2.
    rE(h2λ,RCn(1,2)) λ
    (λ,λ+2,n34λ+1,n34λ+1)  if 1λn341;
    (λ,n32λ+1,1,1)  if n34λn34+1;
    (n32λ+3,n32λ+1,λn34,λn34)  if n34+2λn32;
    (2,1,n34+1,n34+1)  if λ=n32+1.
    rE(h2λ,RCn(1,2)) λ
    (2,n342λ+1,n342λ+1)  if 1λn341;
    (n322λ+1,1λ,1λ)  if n34λn34+1;
    (2,2λ3n943,2λ3n943)  if n34+2λn32;
    (1,n34+1,n34+1)  if λ=n32+1.

     | Show Table
    DownLoad: CSV
    Table 8.  Distance vectors r and r of the edges in Cn(1,2).
    rE(l2λ1,RCn(1,2)) λ
    (λ,λ+1,n34λ+1,n34λ+1)  if 1λn341;
    (λ,n32λ+1,2,n34λ+1)  if n34λn34+1;
    (n32λ+3,n32+1,λn34,λn341)  if n34+2λn32;
    (n32+1,λn32,3n94λ+2,n341)  if n32+1λn34+2.
    rE(l2λ1,RCn(1,2)) λ
    (1,n342λ+1,n342λ+1)  if 1λn341;
    (n322λ+1,2λ,n342λ+1)  if n34λn34+1;
    (2,2λ3n943,2λ3n944)  if n34+2λn32;
    (1,5n1542λ1,n342)  if n32+1λn+12.
    rE(l2λ,RCn(1,2)) λ
    (λ,λ+2,n34λ,n34λ+1)  if 1λn341;
    (λ,n32λ+1,λn34,2)  if n34λn34+1;
    (n32λ+2,n32λ+1,λn34,λn34)  if n34+2λn32;
    (1,1,n34+1,n34+1)  if λ=n32+1.
    rE(l2λ,RCn(1,2)) λ
    (2,n342λ,n342λ+1)  if 1λn341;
    (n322λ+1,n34,2λ)  if n34λn34+1;
    (1,2λ3n942,2λ3n942)  if n34+2λn32;
    (0,n34,n34)  if λ=n32+1.

     | Show Table
    DownLoad: CSV

    The distance vectors in the above four cases show that each distance vector rE is unique, resulting in ψE(Cn(1,2)) = 4.

    EVDRSs is a mathematical tool within the field of graph theory. They serve as a tool for locating particular edges inside a graph (network) by recognizing a collection of edges that are capable of precisely locating a different edge or set of related edges. In practical scenarios, this variant of graph theory finds numerous applications, including fault detection in various network types such as computer networks and network security systems, as well as tracing the origins of epidemics within social networks and contagious diseases, among other uses (for further information, see [44]).

    An EVDRS essentially represents a set of measurements or tests that can be helpful in source localization to detect the origin of a viral disease outbreak or a virus source in complex networks. The term "doubly resolving" is used because it possesses the capability to not only identify the existence of contamination but also differentiate between various source categories. Let us explore the following example to better understand how an EVDRS might be used to identify the origins of epidemics during contagious disease outbreaks.

    In a viral disease outbreak scenario, where the city is represented as a circulant network C8(1,2) with edges {h1,h2,h3,h4,h5,h6,h7,h8,l1,l2,l3,l4,l5,l6,l7,l8} as shown in Figure 2, we can employ the minimal EVDRSs to effectively track and control the spread of the virus.

    Figure 2.  Origin of disease outbreak within the city.

    Let us consider the following situation:

    ● The edges h1,h2,h3,h4,h5, and h6 represent residential areas.

    ● The edges l1,l2,l3,l4,l5, and l6 represent commercial areas.

    ● The edges h7,h8,l7, and l8 represent medical facilities.

    A quick solution can be achieved by carefully placing observers across the city and ensuring exact and well-documented distances between these edges. However, executing this comprehensive procedure would incur substantial expenses and consume a significant amount of time. As a result, the question arises: how many observers must be deployed to trace the origin of infection when the initial time of commencement is unknown and transmission delays across edges vary? This demands a system in which each edge is distinguished by its minimal distance from strategically placed observers.

    For this purpose, we need to identify a minimal set of edges (observers) that, when infection spreads, would uniquely determine the source of the infection and help in containing the spread. In the case where a city is represented by the circulant network C8(1,2), we can choose the following minimal EVDRS: RC8(1,2)={h1,h2h3,h4}.

    Let us examine how this works:

    Residential Areas: If anyone from the residential areas gets infected, then the source of infection would be uniquely identified from these residential areas using the information collected by the placed observers. This information can help in implementing targeted measures like quarantine, testing, and contact tracing within the residential areas.

    Commercial Areas: If an infection spreads in any one of these commercial areas, similarly, by employing the collected data by the placed observer, the source of the infection would point to one of these commercial areas. This knowledge can be used to implement measures like temporary closure, sanitation, and testing within commercial areas.

    Medical Facilities: If the infection has reached one of the medical facilities, then by finding the unknown starting time and edge-to-edge transmission delays using EVDRSs, the source of infection would be uniquely identified. This information is crucial for implementing measures to protect healthcare workers and patients and prevent further transmission within medical facilities.

    By means of the careful monitoring and tracking of infection via these basic EVDRSs, health authorities and decision-makers can efficiently allocate resources, identify interventions, and make informed decisions to control the viral disease outbreak in the city.

    There are numerous practical uses for circulant networks, particularly in distributed computing and computer networks. Particularly, circulant networks can be used for task assignments, load balancing, and data spreading in distributed computing systems. Circulant networks are beneficial for efficient routing and resource allocation due to their regular nature. Also, circulant networks offer an effective way to organize the communication architecture in sensor networks, where multiple sensors send data to a central node (or edge) or among one another.

    Moreover, these networks can be utilized in wireless mesh networks, which expand network coverage by using wireless communication among nodes, or edges. Because of their regular structure, circulant networks are suitable for distributing computational workloads among multiple nodes (or edges) in an efficient manner. Moreover, they can be applied in social areas, in which coordination and a communication mechanism between distant units are needed. For instance, a social network or Internet of Things system.

    The present paper has tackled the notion of EVDRSs in circulant networks Cn(1,2), EVDRSs being a set of edges in a network that ascertains that each edge has a unique representation in relation to the elements of an EVDRS. The main goals were to characterize the minimal size of EVDRS for circulant networks Cn(1,2) as well as to understand their structural properties. To sum up, the present study has focused on EVDRSs in circulant networks Cn(1,2) and has made significant advances in comprehending their structural features, determining their minimal size, and highlighting their independence from the parity of n. The results of the above investigations extend the understanding of graph theory and have practical implications in several fields, such as telecommunications and distributed computing, which rely on well-built and efficient networks. Our research findings are important for helping to create more robust and efficient networks, as well as for developing the theory of graph-based communication systems.

    Because the obtained results are specific to circulant networks Cn(1,2), they may not hold true for other network topologies. It could be difficult to convert theoretical results into practical implementations, especially in complex and dynamic networks. Collaborating with specialists in related fields such as network engineering, epidemiology, and computer science may be necessary for fully comprehending the potential impact of the research in several domains. In fact, bridging the gap between theoretical research and practical applications can be greatly aided by disciplinary collaboration. Interdisciplinary collaboration can solve the shortcomings of specific disciplines by combining ideas and techniques from other domains, producing more trustworthy and useful research results. This could then lead to a greater impact from these discoveries in a variety of domains, eventually resulting in useful answers and breakthroughs in various disciplines of research.

    Open Problem 5.1. Investigate the EVDRSs for the Chordal Ring network CRn(1,3,5), even integers n6.

    Ruby Nasir and Muhammad Ahmad conducted the final review and made sure the results were validated at the problem discussion. Zohaib Zahid was helpful in initiating the problem, obtaining necessary information, and offering continuous supervision. Initiating the study's drafting process and contributing significantly to its analysis and computation was Sanaa A. Bajri. In addition to contributing to the methodology, Hamiden Abd El-Wahed Khalifa actively discussed the issue and carefully proofread the final draft.

    The authors declare they have not used artificial intelligence (AI) tools in the creation of this article.

    The Research is funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2024R527), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia

    The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.



    [1] B. Xu, X. Liu, X. Liao, Global asymptonic stability of high-order Hopfield neural networks with time delays, Comput. Math. Appl., 45 (2003), 1729-1737. doi: 10.1016/S0898-1221(03)00151-2
    [2] X. Lou, B. Cui, Novel global stability criteria for high-order Hopfield-type neural networks with time-varying delays, J. Math. Anal. Appl., 330 (2007), 144-158. doi: 10.1016/j.jmaa.2006.07.058
    [3] C. Ou, Anti-periodic solutions for high-order Hopfield neural networks, Comput. Math. Appl., 56 (2008), 1838-1844. doi: 10.1016/j.camwa.2008.04.029
    [4] Y. Yu, M. Cai, Existence and exponential stability of almost-periodic solutions for high-order Hopfield neural networks, Math. Comput. Model., 47 (2008), 943-951. doi: 10.1016/j.mcm.2007.06.014
    [5] B. Xiao, H. Meng, Existence and exponential stability of positive almost periodic solutions for high-order Hopfield neural networks, Appl. Math. Model., 33 (2009), 532-542. doi: 10.1016/j.apm.2007.11.027
    [6] L. Duan, L. Huang, Z. Guo, Stability and almost periodicity for delayed high-order Hopfield neural networks with discontinuous activations, Nonlinear Dynam., 77 (2014), 1469-1484. doi: 10.1007/s11071-014-1392-3
    [7] C. Xu, P. Li, Pseudo almost periodic solutions for high-order Hopfield neural networks with time-varying leakage delays, Neural Process. Lett., 46 (2017), 41-58. doi: 10.1007/s11063-016-9573-3
    [8] C. Xu, P. Li, Y. Pang, Global exponential stability for interval general bidirectional associative memory (BAM) neural networks with proportional delays, Math. Method. Appl. Sci., 39 (2016), 5720-5731. doi: 10.1002/mma.3957
    [9] F. Kong, Q. Zhu, K Wang, J. J. Nieto, Stability analysis of almost periodic solutions of discontinuous BAM neural networks with hybrid time-varying delays and D operator, J. Franklin. I., 356 (2019), 11605-11637. doi: 10.1016/j.jfranklin.2019.09.030
    [10] F. Kong, R. Rajan, Finite-time and fixed-time synchronization control of discontinuous fuzzy Cohen-Grossberg neural networks with uncertain external perturbations and mixed time, Fuzzy Set. Syst., 411 (2021), 105-135. doi: 10.1016/j.fss.2020.07.009
    [11] W. Shen, X. Zhang, Y. Wang, Stability analysis of high order neural networks with proportional delays, Neurocomputing, 372 (2020), 33-39. doi: 10.1016/j.neucom.2019.09.019
    [12] Z. Dong, X. Zhang, X. Wang, State estimation for discrete-time high-order neural networks with time-varying delays, Neurocomputing, 411 (2020), 282-290. doi: 10.1016/j.neucom.2020.06.047
    [13] K. Gopalsamy, Kondalsamy, Leakage delays in BAM, J. Math. Anal. Appl., 325 (2007), 1117-1132. doi: 10.1016/j.jmaa.2006.02.039
    [14] P. Balasubramaniam, V. Vembarasan, R. Rakkiyappan, Leakage delays in T-S fuzzy cellular neural networks, Neural Process. Lett., 33 (2011), 111-136. doi: 10.1007/s11063-010-9168-3
    [15] R. Sakthivel, P. Vadivel, K. Mathiyalagan, A. Arunkumar, M. Sivachitra, Design of state estimator for bidirectional associative memory neural networks with leakage delays, Inform. Sciences, 296 (2015), 263-274. doi: 10.1016/j.ins.2014.10.063
    [16] C. Xu, L. Chen, P. Li, Effect of proportional delays and continuously distributed leakage delays on global exponential convergence of CNNs, Asian J. Control, 21 (2019), 2476-2483. doi: 10.1002/asjc.1942
    [17] S. Hilger, Analysis on measure chains-a unified approach to continuous and discrete calculus, Results Math., 18 (1990), 18-56. doi: 10.1007/BF03323153
    [18] Y. Li, C. Wang, Uniformly almost periodic functions and almost periodic solutions to dynamic equations on time scales, Abstr. Appl. Anal., 2011 (2011), 341520.
    [19] Y. Li, L. Yang, Almost automorphic solution for neutral type high-order Hopfield neural networks with delays in leakage terms on time scales, Appl. Math. Comput., 242 (2014), 679-693.
    [20] W. Yang, W. Yu, J. Cao, F. Alsaadi, T. Hayat, Almost automorphic solution for neutral type high-order Hopfield BAM neural networks with time-varying leakage delays on time scales, Neurocomputing, 267 (2017), 241-260. doi: 10.1016/j.neucom.2017.05.089
    [21] Y. Li, X. Meng, L. Xiong, Pseudo almost periodic solutions for neutral type high-order Hopfield neural networks with mixed time-varying delays and leakage delays on time scales, Int. J. Mach. Learn. Cyb., 8 (2017), 1915-1927. doi: 10.1007/s13042-016-0570-7
    [22] T. Isokawa, T. Kusakabe, N. Matsui, F. Peper, Quaternion neural network and its application, Berlin, Springer, 2003.
    [23] N. Matsui, T. Isokawa, H. Kusamichi, F. Peper, H. Nishimura, Quaternion neural network with geometrical operators, J. Intell. Fuzzy Syst., 15 (2004), 149-164.
    [24] M. Yoshida, Y. Kuroe, T. Mori, Models of hopfield-type quaternion neural networks and their energy functions, Int. J. Neural Syst., 15 (2005), 129-135. doi: 10.1142/S012906570500013X
    [25] Y. Li, J. Qin, B. Li, Existence and global exponential stability of anti-periodic solutions for delayed quaternion-valued cellular neural networks with impulsive effects, Math. Method. Appl. Sci., 42 (2019), 5-23. doi: 10.1002/mma.5318
    [26] N. Huo, B. Li, Y. Li, Existence and exponential stability of anti-periodic solutions for inertial quaternion-valued high-order Hopfield neural networks with state-dependent delays, IEEE Access, 7 (2019), 60010-60019. doi: 10.1109/ACCESS.2019.2915935
    [27] Y. Li, H. Wang, X. Meng, Almost automorphic synchronization of quaternion-valued high-order Hopfield neural networks with time-varying and distributed delays, IMA J. Math. Control I., 36 (2019), 983-1013. doi: 10.1093/imamci/dny015
    [28] Y. Li, J. Xiang, Existence and global exponential stability of almost periodic solution for quaternion-valued high-order Hopfield neural networks with delays via a direct method, Math. Method. Appl. Sci., 43 (2020), 6165-6180. doi: 10.1002/mma.6363
    [29] H. Wang, G. Wei, S. Wen, T, Huang, Impulsive disturbance on stability analysis of delayed quaternion-valued neural networks, Appl. Math. Comput., 390 (2021), 125680.
    [30] C. Zhang, Pseudo almost periodic solutions of some differential equations, J. Math. Anal. Appl., 151 (1994), 62-76.
    [31] T. Diagana, Pseudo almost periodic solutions to some differential equations, Nonlinear Anal. Theor., 60 (2005), 1277-1286. doi: 10.1016/j.na.2004.11.002
    [32] F. Kong, X. Fang, Pseudo almost periodic solutions of discrete-time neutral-type neural networks with delays, Appl. Intell., 48 (2018), 3332-3345. doi: 10.1007/s10489-018-1146-x
    [33] A. Zhang, Almost periodic solutions for SICNNs with neutral type proportional delays and D operators, Neural Process. Lett., 47 (2018), 57-70. doi: 10.1007/s11063-017-9631-5
    [34] A. Zhang, Pseudo almost periodic high-order cellular neural networks with complex deviating arguments, Int. J. Mach. Learn. Cyb., 10 (2019), 301-309. doi: 10.1007/s13042-017-0715-3
    [35] Y. Li, C. Wang, Pseudo almost periodic functions and pseudo almost periodic solutions to dynamic equations on time scales, Adv. Differ. Equ., 2012 (2012), 77. doi: 10.1186/1687-1847-2012-77
    [36] A. Arbi, J. Cao, Pseudo-almost periodic solution on time-space scales for a novel class of competitive neutral-type neural networks with mixed time-varying delays and leakage delays, Neural Process. Lett., 46 (2017), 719-745. doi: 10.1007/s11063-017-9620-8
    [37] A. Zhang, Pseudo almost periodic solutions for neutral type SICNNs with D operator, J. Exp. Theor. Artif. In., 29 (2017), 795-807. doi: 10.1080/0952813X.2016.1259268
    [38] M. Bohner, A. Peterson, Dynamic equations on time scales: An introuduction with applications, Springer Science & Business Media, 2001.
    [39] M. Bohner, A. Peterson, Advances in dynamic equations on time scales, Springer Science & Business Media, 2002.
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2638) PDF downloads(127) Cited by(5)

Figures and Tables

Figures(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog