Research Article Stability and Permanence of a Pest Management Model with

advertisement
Hindawi Publishing Corporation
Abstract and Applied Analysis
Volume 2013, Article ID 832701, 18 pages
http://dx.doi.org/10.1155/2013/832701
Research Article
Stability and Permanence of a Pest Management Model with
Impulsive Releasing and Harvesting
Jiangtao Yang and Zhichun Yang
Department of Mathematics, Chongqing Normal University, Chongqing 400047, China
Correspondence should be addressed to Zhichun Yang; zhichy@yahoo.com.cn
Received 16 January 2013; Accepted 27 February 2013
Academic Editor: Chuangxia Huang
Copyright © 2013 J. Yang and Z. Yang. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
We formulate a pest management model with periodically releasing infective pests, immature and mature natural enemies, and
harvesting pests and crops at two different fixed moments. Sufficient conditions ensuring the locally and globally asymptotical
stability of the susceptible pest-eradication period solution are found by means of Floquet theory, small amplitude perturbation
techniques, and multicomparison results. Furthermore, the permanence of system is also derived. By numerical analysis, we also
show that impulsive releasing and harvesting at two different fixed moments can bring obvious effects on the dynamics of system,
which also corroborates our theoretical results.
1. Introduction
As is known to all, pest outbreaks often cause serious ecological and economic problems. Therefore, how to effectively
control insects and other arthropods has become an increasingly complex issue. Usually, chemical pesticides were taken
as a relatively simple way to solve the pest-related problems,
and some mathematical models on pest management with
toxin (pesticide) input were studied in [1–4]. However, the
overuse of chemical pesticides may create new ecological and
sociological harm such as pesticide pollution and pesticideresistant pest varieties and inflicts harmful effects on humans
and so forth. Therefore, nonchemical use instead for pest
control has become a hot topic in order to reduce pest density
to tolerable levels and minimize the damage caused. For
instance, biological control methods by periodically releasing
infective pests or their natural enemies are often taken due to
their advantage in the aspects of self-sustainable mechanism,
lower environmental impact, and cost effectiveness.
Recently, some biocontrol models on pest management
described by impulsive differential equation were proposed
and the dynamics such as stability, permanence, periodicity,
and bifurcation are deeply investigated (see also, e.g., [2–12]).
In [5], an impulsive system to model the process of periodic
releasing natural enemies and harvesting pest at different
fixed time for pest control is considered, and the sufficient
conditions on the existence and global stability of the periodic
solution are derived for the given model. Georgescu et al.
[6, 7] construct an integrated pest management model which
relies on the simultaneous periodic release of infective pest
individuals and of natural predators with age structure and
obtain some sufficient conditions on the local and global stability, permanence, and bifurcation of the systems. However,
most of the existing models on pest management scarcely take
into account the factor on the relation between pest and its
food (e.g., crop). In fact, farmers may harvest crops several
times in process of its growth, which should cause a great
impact on the density of the pest.
Motived by the above discussion, we construct a model
of pest control by periodically releasing infective pests,
immature and mature natural enemies, and harvesting pests
and crops. To account for the discontinuity of release and
harvest at different fixed moments, our model is based on
impulsive differential equations. We analyze the dynamical
behavior of the system by using the theory of impulsive
differential equation introduced in [13–15].
The rest of this paper is organized as follows. A pest
management model with impulsive releasing and harvesting
is introduced in Section 2 and some useful preliminaries
are given in Section 3. Section 4 deals with stability and
permanence analysis of system. In this section, two sufficient
conditions are deduced including the locally and globally
asymptotical stability of the susceptible pest-eradication
2
Abstract and Applied Analysis
period solution, the permanence of system is also discussed.
A simple example and conclusions are given in Section 5.
Δπ‘₯ (𝑑) = 0,
2. Model Description
Δ𝐼 (𝑑) = 𝛿𝐼 ,
In the following, to establish our pest management model, we
rely on the following biological assumptions.
Δ𝑦𝐽 (𝑑) = 𝛿𝐽 ,
(𝐴1) The pest population is divided into two classes, the
susceptible and infective. The infective pests neither
recover nor reproduce and infective pests cannot
damage crops. The disease is transmitted from infective pests to susceptible pests and does not propagate
to predators.
(𝐴2) In the absence of susceptible pests, the crops have
a logistic growth rate with intrinsic birth rate π‘Ÿ and
carrying capacity 𝐾.
(𝐴3) The predators (natural enemies) have an age structure, that is, immature and mature. Only the mature
predators have the ability to feed on susceptible pests,
but do not prey on infective pests and crops.
(𝐴4) The functional response of the susceptible pest is
described by the abstract function 𝑃1 , the functional
response of the mature predator is described by
the abstract function 𝑃2 , and the infection rate is
described by the abstract function 𝑔, where 𝑃1 , 𝑃2 , and
𝑔 satisfy certain assumptions outlined below.
On the basis of the above assumptions, we establish the
following impulsively controlled system:
π‘₯σΈ€  (𝑑) = π‘Ÿπ‘₯ (𝑑) (1 −
π‘₯ (𝑑)
) − 𝑃1 (π‘₯ (𝑑)) 𝑆 (𝑑) ,
𝐾
𝑆󸀠 (𝑑) = 𝛽𝑃1 (π‘₯ (𝑑)) 𝑆 (𝑑) − 𝑔 (𝐼 (𝑑)) 𝑆 (𝑑)
− 𝑃2 (𝑆 (𝑑)) 𝑦𝑀 (𝑑) − 𝑑𝑆 𝑆 (𝑑) ,
Δ𝑆 (𝑑) = 0,
Δ𝑦𝑀 (𝑑) = 𝛿𝑀,
𝑑 = 𝑛𝑇, 𝑛 ∈ N,
(1)
where π‘₯(𝑑) represents the density of the crop at time 𝑑, 𝑆(𝑑)
represents the density of the susceptible pest at time 𝑑, 𝐼(𝑑)
represents the density of the infective pest at time 𝑑, 𝑦𝐽 (𝑑)
and 𝑦𝑀(𝑑) represent the density of the immature and mature
predator at time 𝑑, respectively; π‘Ÿ is the logistic intrinsic
growth rate of the crop in the absence of the susceptible
pest, 𝐾 is its carrying capacity; 0 < 𝛽, πœ† ≤ 1 represent
the conversion rate at which ingested preys in excess of
what is needed for maintenance is translated into predator
population increase; π‘š is the rate at which the immature
predators become the mature predators. 𝑑𝑆 , 𝑑𝐼 , 𝑑𝐽 , 𝑑𝑀 > 0
are the death rates of the susceptible pest population, infective
pest population, and of the immature and mature predator
population, respectively; Δπ‘₯(𝑑) = π‘₯(𝑑+ ) − π‘₯(𝑑), Δ𝑆(𝑑) =
𝑆(𝑑+ ) − 𝑆(𝑑), Δ𝐼(𝑑) = 𝐼(𝑑+ ) − 𝐼(𝑑), Δ𝑦𝐽 (𝑑) = 𝑦𝐽 (𝑑+ ) − 𝑦𝐽 (𝑑),
Δ𝑦𝑀(𝑑) = 𝑦𝑀(𝑑+ ) − 𝑦𝑀(𝑑); 𝑇 is the period of the impulsive
effect; 𝛿 (0 ≤ 𝛿 < (1 − 𝑒−π‘Ÿπ‘‡ )/2) is the harvesting rate of
crop population; 0 ≤ 𝑃𝑆 , 𝑃𝐼 , 𝑃𝐽 , 𝑃𝑀 < 1 denote the transfer
rate of susceptible pest population, infective pest population,
immature and mature predator population at every impulsive
period (𝑛 + 𝜏 − 1)𝑇 (𝑛 ∈ N, 0 < 𝜏 < 1), respectively; 𝛿𝐼 , 𝛿𝐽 ,
𝛿𝑀 > 0 represents the amount of infective pests, immature
and mature predators, respectively, which are released at
every impulsive period 𝑛𝑇 (𝑛 ∈ N), respectively; Also, 𝑃1 (⋅),
𝑃2 (⋅), 𝑔(⋅) ∈ 𝐻, here 𝐻 = {𝑓 : 𝑅 → 𝑅 | 𝑓(0) = 0, 𝑓󸀠 (π‘₯) > 0
and 𝑓󸀠󸀠 (π‘₯) ≤ 0 for all π‘₯ > 0}.
Some familiar examples of functions 𝑓 ∈ 𝐻 in the
biological literature include
𝐼󸀠 (𝑑) = 𝑔 (𝐼 (𝑑)) 𝑆 (𝑑) − 𝑑𝐼 𝐼 (𝑑) ,
(𝐹1) 𝑓1 (π‘₯) = π‘Žπ‘₯, with π‘Ž > 0;
𝑦𝐽󸀠 (𝑑) = πœ†π‘ƒ2 (𝑆 (𝑑)) 𝑦𝑀 (𝑑) − 𝑑𝐽 𝑦𝐽 (𝑑) − π‘šπ‘¦π½ (𝑑) ,
(𝐹2) 𝑓2 (π‘₯) = π‘Žπ‘₯/(1 + 𝑏π‘₯), with π‘Ž, 𝑏 > 0;
σΈ€ 
𝑦𝑀
(𝑑) = π‘šπ‘¦π½ (𝑑) − 𝑑𝑀𝑦𝑀 (𝑑) ,
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇,
𝑑 =ΜΈ 𝑛𝑇,
Δπ‘₯ (𝑑) = −𝛿π‘₯ (𝑑) ,
Δ𝑆 (𝑑) = −𝑃𝑆 𝑆 (𝑑) ,
Δ𝐼 (𝑑) = −𝑃𝐼 𝐼 (𝑑) ,
Δ𝑦𝐽 (𝑑) = −𝑃𝐽 𝑦𝐽 (𝑑) ,
Δ𝑦𝑀 (𝑑) = −𝑃𝑀𝑦𝑀 (𝑑) ,
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
(𝐹3) 𝑓3 (π‘₯) = π‘Ž(1 − 𝑒−𝑏π‘₯ ), with π‘Ž, 𝑏 > 0,
where functions (𝐹1) and (𝐹2) are known as Holling type
functional responses (see, [16–26]), and (𝐹3) belongs to Ivlev
type functional responses (see, [27–30]).
3. Preliminaries
In this section, we will give some definitions and lemmas,
which will be useful for our main results. Let R+ =
[0, ∞) and R5+ = {𝑋 = (π‘₯(𝑑), 𝑆(𝑑), 𝐼(𝑑), 𝑦𝐽 (𝑑), 𝑦𝑀(𝑑)) ∈
R5 | π‘₯(𝑑), 𝑆(𝑑), 𝐼(𝑑), 𝑦𝐽 (𝑑), 𝑦𝑀(𝑑) ≥ 0}. Denote 𝑓 =
(𝑓π‘₯ , 𝑓𝑆 , 𝑓𝐼 , 𝑓𝐽 , 𝑓𝑀)𝑇 the map defined by the right hand of the
first five equations in system (1). Let 𝑉 : R+ × R5+ → R+ ,
then 𝑉 ∈ 𝑉0 if
Abstract and Applied Analysis
3
(1) 𝑉 is continuous in ((𝑛 − 1)𝑇, (𝑛 + 𝜏 − 1)𝑇] × R5+ ,
((𝑛 + 𝜏 − 1)𝑇, 𝑛𝑇] × R5+ and for each π‘₯ ∈ 𝑅+5 , 𝑛 ∈ N,
lim(𝑑,𝑦) → ((𝑛+𝜏−1)𝑇+ ,π‘₯) 𝑉(𝑑, 𝑦) = 𝑉((𝑛 + 𝜏 − 1)𝑇+ , π‘₯) and
lim(𝑑,𝑦) → (𝑛𝑇+ ,π‘₯) 𝑉(𝑑, 𝑦) = 𝑉(𝑛𝑇+ , π‘₯) exist.
(2) 𝑉 is locally Lipschitzian π‘₯.
Definition 1. Letting 𝑉 ∈ 𝑉0 , one defines the upper right
derivative of 𝑉 with respect to the impulsive differential
system (1) at (𝑑, π‘₯) ∈ ((𝑛 − 1)𝑇, (𝑛 + 𝜏 − 1)𝑇] × R5+ and
((𝑛 + 𝜏 − 1)𝑇, 𝑛𝑇] × R5+ by
1
𝐷+ 𝑉 (𝑑, π‘₯) = lim sup [𝑉 (𝑑 + β„Ž, π‘₯ + β„Žπ‘“ (𝑑, π‘₯)) − 𝑉 (𝑑, π‘₯)] .
+
β„Ž→0 β„Ž
(2)
Definition 2. The system (1) is said to be permanent if there
are positive constants π‘š, 𝑀 > 0 and a finite time 𝑇0 such
that all solutions of (1) with initial values π‘₯(0+ ), 𝑆(0+ ), 𝐼(0+ ),
𝑦𝐽 (0+ ), 𝑦𝑀(0+ ), π‘š ≤ π‘₯(𝑑), 𝑆(𝑑), 𝐼(𝑑), 𝑦𝐽 (𝑑), 𝑦𝑀(𝑑) ≤ 𝑀 hold for
all 𝑑 ≥ 𝑇0 , where π‘š and 𝑀 are independent of initial value,
𝑇0 may depend on initial value.
Lemma 5 (see [13, 15]). Consider the following system:
VσΈ€  (𝑑) ≤ (≥) 𝑝 (𝑑) V (𝑑) + π‘ž (𝑑) ,
V (π‘‘π‘˜+ ) ≤ (≥) π‘‘π‘˜ V (π‘‘π‘˜ ) + π‘π‘˜ ,
𝑑 =ΜΈ π‘‘π‘˜ ,
𝑑 = π‘‘π‘˜ , π‘˜ ∈ N,
V (0+ ) ≤ (≥) V0 ,
where 𝑝, π‘ž ∈ 𝑃𝐢(R+ , R) and π‘‘π‘˜ ≥ 0, V0 and π‘π‘˜ are constants.
Suppose that
(𝐴1) the sequence π‘‘π‘˜ satisfies 0 ≤ 𝑑1 ≤ 𝑑2 < ⋅ ⋅ ⋅ , with
lim𝑑 → ∞ π‘‘π‘˜ = ∞;
(𝐴2) V ∈ 𝑃𝐢󸀠 (R+ , R) and V(𝑑) is left-continuous at π‘‘π‘˜ , π‘˜ ∈
N.
Then, for 𝑑 > 0,
𝑑
V (𝑑) ≤ (≥) V0 𝑒∫0 𝑝(𝑠)𝑑𝑠 ∏ π‘‘π‘˜
0<π‘‘π‘˜ <𝑑
Remark 3. The global existence and uniqueness of system (1)
is guaranteed by the smoothness properties of 𝑓 (for details,
see [13, 14]).
+ ∑ ( ∏ 𝑑𝑗 𝑒 π‘‘π‘˜
Lemma 4 (see [15]). Let 𝑉 : R+ × R𝑛 → Rπ‘š
+ satisfy 𝑉𝑖 ∈
𝑉0 , 𝑖 = 1, 2, . . . , π‘š, and assume that
+ ∫ ( ∏ π‘‘π‘˜ ) 𝑒∫𝑠 𝑝(𝜏)π‘‘πœ π‘ž (𝑠) 𝑑𝑠.
𝐷+ 𝑉 (𝑑, π‘₯ (𝑑)) ≤ (≥) 𝑔 (𝑑, 𝑉 (𝑑, π‘₯ (𝑑))) ,
+
𝑉 (𝑑, π‘₯ (𝑑 )) ≤
(≥) πœ“π‘˜πœ
(𝑉 (𝑑, π‘₯ (𝑑))) ,
𝑉 (𝑑, π‘₯ (𝑑+ )) ≤ (≥) πœ“π‘˜ (𝑉 (𝑑, π‘₯ (𝑑))) ,
𝑑=ΜΈ (π‘˜ + 𝜏 − 1) 𝑇, π‘˜π‘‡,
𝑑 = (π‘˜ + 𝜏 − 1) 𝑇,
𝑑 = π‘˜π‘‡, π‘˜ ∈ N,
+
π‘₯ (0 ) = π‘₯0 ,
(3)
π‘š
where 𝑔 : R+ × Rπ‘š
+ → R+ is continuous in ((π‘˜ − 1)𝑇, (π‘˜ +
π‘š
𝜏 − 1)𝑇] × R and ((π‘˜ + 𝜏 − 1)𝑇, π‘˜π‘‡] × Rπ‘š , for each 𝑝 ∈
Rπ‘š , π‘˜ = 1, 2, . . ., the limit lim(𝑑,π‘ž) → ((π‘˜+𝜏−1)𝑇+ ,𝑝) 𝑔(𝑑, π‘ž) = 𝑔((π‘˜+
𝜏 − 1)𝑇+ , 𝑝) and lim(𝑑,π‘ž) → ((π‘˜−1)𝑇+ ,𝑝) 𝑔(𝑑, π‘ž) = 𝑔((π‘˜ − 1)𝑇+ , 𝑝)
exists. 𝑔(𝑑, π‘ž) is quasimonotone nondecreasing in π‘ž. πœ“π‘˜πœ , πœ“π‘˜ :
→ Rπ‘š
Rπ‘š
+
+ is nondecreasing for all π‘˜ ∈ N. Let πœƒ(𝑑) be
the maximal (π‘šπ‘–π‘›π‘–π‘šπ‘Žπ‘™) solution of the following impulsive
differential equation on [0, ∞):
𝑀󸀠 (𝑑) = 𝑔 (𝑑, 𝑀 (𝑑)) ,
𝑑 =ΜΈ (π‘˜ + 𝜏 − 1) 𝑇, π‘˜π‘‡,
𝑀 (𝑑+ ) = πœ“π‘˜πœ (𝑀 (𝑑)) ,
𝑀 (𝑑+ ) = πœ“π‘˜ (𝑀 (𝑑)) ,
𝑑 = (π‘˜ + 𝜏 − 1) 𝑇,
𝑑 = π‘˜π‘‡, π‘˜ ∈ N,
(4)
(5)
𝑑
∫ 𝑝(𝑠)𝑑𝑠
0<π‘‘π‘˜ <𝑑
π‘‘π‘˜ <𝑑𝑗 <𝑑
𝑑
0
) π‘π‘˜
(6)
𝑑
𝑠<π‘‘π‘˜ <𝑑
Lemma 6. There exists a constant 𝑀 = max{(1/πœ†)((𝐿/𝑑) +
(πœŒπ‘’π‘‘π‘‡ /(𝑒𝑑𝑇 − 1))), 𝐾} > 0, such that π‘₯(𝑑), 𝑆(𝑑), 𝐼(𝑑), 𝑦𝐽 (𝑑),
𝑦𝑀(𝑑) ≤ 𝑀 for each solution of (1) with 𝑑 large enough.
Proof. Since π‘₯σΈ€  (𝑑) ≤ π‘Ÿπ‘₯(1 − (π‘₯(𝑑)/𝐾)), then π‘₯σΈ€  (𝑑)|π‘₯(𝑑)=𝐾 ≤ 0,
and π‘₯((𝑛 + 𝜏 − 1)𝑇+ ) ≤ π‘₯((𝑛 + 𝜏 − 1)𝑇) (0 < 𝛿 < 1), so
π‘₯(𝑑) ≤ 𝐾 for 𝑑 large enough. Let us define 𝑉(𝑑) ∈ 𝑉0 by
𝑉(𝑑) = πœ†π›½π‘₯(𝑑) + πœ†π‘†(𝑑) + πœ†πΌ(𝑑) + 𝑦𝐽 (𝑑) + 𝑦𝑀(𝑑) and denote
𝑑 = min{𝑑𝑆 , 𝑑𝐼 , 𝑑𝐽 , 𝑑𝑀}. Then, it is obvious that
πœ†π›½π‘Ÿπ‘₯2 (𝑑)
𝑑𝑉 (𝑑)
+ 𝑑𝑉 (𝑑) ≤ πœ†π›½ (π‘Ÿ + 𝑑) π‘₯ (𝑑) −
,
𝑑𝑑
𝐾
(7)
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇, 𝑑 =ΜΈ 𝑛𝑇.
Since the right-hand side (7) is bounded from above by 𝐿 =
πΎπœ†π›½(π‘Ÿ + 𝑑)2 /4π‘Ÿ, it follows that
𝑑𝑉 (𝑑)
+ 𝑑𝑉 (𝑑) ≤ 𝐿,
𝑑𝑑
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇, 𝑑 =ΜΈ 𝑛𝑇.
(8)
When 𝑑 = (𝑛 + 𝜏 − 1)𝑇 and 𝑑 = 𝑛𝑇, it is easy to obtain that
𝑀 (0+ ) = 𝑀0 .
+
Then for any solution π‘₯(𝑑) of the system (3), 𝑉(0 ,
π‘₯0 ) ≤ (≥)𝑀0 implies that 𝑉(𝑑, π‘₯(𝑑)) ≤ (≥)πœƒ(𝑑) for all 𝑑 ≥ 0.
𝑉 ((𝑛 + 𝜏 − 1) 𝑇+ ) ≤ 𝑉 ((𝑛 + 𝜏 − 1) 𝑇) ,
𝑉 (𝑛𝑇+ ) = 𝑉 (𝑛𝑇) + (πœ†π›ΏπΌ + 𝛿𝐽 + 𝛿𝑀) .
(9)
4
Abstract and Applied Analysis
Lemma 9. Let one consider the following impulsive control
subsystem:
Then, by Lemma 5, we can obtain that
𝑑
𝑉 (𝑑) ≤ 𝑉 (0) 𝑒−𝑑𝑑 + ∫ 𝐿𝑒−𝑑(𝑑−𝑠) 𝑑𝑠
𝑧󸀠 (𝑑) = π‘Ž (𝑑) − 𝑑𝑧 (𝑑) ,
0
+ ∑ πœŒπ‘’−𝑑(𝑑−π‘˜π‘‡) 󳨀→
0<π‘˜π‘‡<𝑑
𝑑𝑇
πœŒπ‘’
𝐿
,
+ 𝑑𝑇
𝑑 𝑒 −1
Δ𝑧 (𝑑) = −𝑝𝑧 (𝑑) ,
𝑑 󳨀→ ∞,
Δ𝑧 (𝑑) = 𝛿,
(10)
where 𝜌 = πœ†π›ΏπΌ + 𝛿𝐽 + 𝛿𝑀. So it follows that 𝑉(𝑑) is uniformly
bounded on [0, ∞). The proof is completed.
Lemma 7 (see [31]). Let one consider the following impulsive
control subsystem:
π‘₯σΈ€  (𝑑) = π‘Ÿπ‘₯ (𝑑) (1 −
π‘₯ (𝑑)
),
𝐾
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇,
(11)
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇, 𝑑 =ΜΈ 𝑛𝑇,
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
𝑧 (0+ ) = 𝑧0 ,
where π‘Ž(𝑑) is a 𝑇-periodic 𝑃𝐢(R+ , R) function. 𝑝, 𝑑 are the
positive real constants and 𝑝 < 1. Then system (14) has a unique
T-periodic solution 𝑧∗ (𝑑), and for each solution 𝑧(𝑑) of (14),
𝑧(𝑑) → 𝑧∗ (𝑑) as 𝑑 → ∞, where
𝑧∗ (𝑑) = 𝑒−𝑑(𝑑−(𝑛−1)𝑇) (𝑧∗ (0+ ) + ∫
𝑑−(𝑛−1)𝑇
0
Δπ‘₯ (𝑑) = −𝛿π‘₯ (𝑑) , 𝑑 = (𝑛 + 𝜏 − 1) 𝑇.
𝑧∗ (𝑑) = 𝑒−𝑑(𝑑−(𝑛−1)𝑇) (𝑧∗ (πœπ‘‡+ ) π‘’π‘‘πœπ‘‡ + ∫
(2) If 𝛿 < 𝛿0∗ , then the system (11) has a unique positive
periodic solution π‘₯∗ (𝑑), which is globally asymptotically
stable, where
𝐾 (1 − 𝛿 − 𝑒−π‘Ÿπ‘‡ )
𝐾 ((1 − 𝛿) 𝑒
(π‘’π‘Ÿπœπ‘‡
− 1) + (1 −
𝑧∗ (0+ )
πœπ‘‡
=
=
− 1)
𝛿) (π‘’π‘Ÿπ‘‡
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] ,
𝑇
[(1 − 𝑝) ∫0 π‘Ž (𝑠) 𝑒𝑑𝑠 𝑑𝑠 + ∫πœπ‘‡ π‘Ž (𝑠) 𝑒𝑑𝑠 𝑑𝑠] 𝑒−𝑑𝑇 + 𝛿
1 − (1 − 𝑝) 𝑒−𝑑𝑇
πœπ‘‡
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, (𝑛 + 𝜏) 𝑇] , 𝑛 ∈ N,
π‘₯∗ (0+ ) = π‘₯∗ (𝑛𝑇+ ) =
π‘Ž (𝑠) 𝑒𝑑𝑠 𝑑𝑠) ,
,
𝑧∗ (πœπ‘‡+ )
,
1 − 𝛿 − 𝑒−π‘Ÿπ‘‡ + 𝛿𝑒−π‘Ÿ(𝑑−(𝑛+𝜏−1)𝑇)
π‘Ÿπ‘‡
𝑑−(𝑛−1)𝑇
πœπ‘‡
(1) If 𝛿 > 𝛿0∗ , then the trivial periodic solution of system
(11) is locally asymptotically stable.
π‘₯ (𝑑) =
π‘Ž (𝑠) 𝑒𝑑𝑠 𝑑𝑠) ,
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
Suppose 𝛿0∗ = 1 − 𝑒−π‘Ÿπ‘‡ . Then one has the following results.
∗
(14)
𝑑 = 𝑛𝑇, 𝑛 ∈ N,
−
π‘’π‘Ÿπœπ‘‡)
𝑇
(1 − 𝑝) [∫0 π‘Ž (𝑠) 𝑒𝑑𝑠 𝑑𝑠 + 𝑒−𝑑𝑇 ∫πœπ‘‡ π‘Ž (𝑠) 𝑒𝑑𝑠 𝑑𝑠 + 𝛿] 𝑒−π‘‘πœπ‘‡
1 − (1 − 𝑝) 𝑒−𝑑𝑇
(15)
.
(12)
Proof. First, it is easy to obtain that
𝑑
𝑧 (𝑑) = 𝑒−𝑑𝑑 (𝑧 (0+ ) + ∫ π‘Ž (𝑠) 𝑒𝑑𝑠 𝑑𝑠) ,
Remark 8. From Lemma 7, we have
0
(1π‘Ž) if 𝛿0∗ > 2𝛿, then π‘₯∗ (𝑑) > 𝐾/2 for all 𝑑 ≥ 0;
𝑑 ∈ (0, πœπ‘‡] ,
𝑑
𝑧 (𝑑) = 𝑒−𝑑(𝑑−πœπ‘‡) 𝑧 (πœπ‘‡+ ) + 𝑒−𝑑𝑑 ∫ π‘Ž (𝑠) 𝑒𝑑𝑠 𝑑𝑠,
πœπ‘‡
(2π‘Ž) if 𝑑 ∈ ((𝑛 − 1)𝑇, 𝑛𝑇], 𝑛 ∈ N, then the periodic solution
π‘₯∗ (𝑑) can be rewritten in the form
𝐾 (1 − 𝛿 − 𝑒−π‘Ÿπ‘‡ )
{
{
,
{
{
{
1 − 𝛿 − 𝑒−π‘Ÿπ‘‡ + 𝛿𝑒−π‘Ÿ(𝑇−πœπ‘‡) 𝑒−π‘Ÿ(𝑑−(𝑛−1)𝑇)
{
{
{
{
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
π‘₯∗ (𝑑) = {
{
𝐾 (1 − 𝛿 − 𝑒−π‘Ÿπ‘‡ )
{
{
{
,
{
{
{ 1 − 𝛿 − 𝑒−π‘Ÿπ‘‡ + 𝛿𝑒−π‘Ÿ(𝑑−(𝑛+𝜏−1)𝑇)
{
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] , 𝑛 ∈ N.
{
.
𝑑 ∈ (πœπ‘‡, 𝑇] .
(16)
Since the T-periodicity requirement, we have
(13)
𝑧∗ (πœπ‘‡+ ) = 𝑒−π‘‘πœπ‘‡ (𝑧∗ (0+ ) + ∫
πœπ‘‡
0
∗
+
−𝑑(𝑇−πœπ‘‡) ∗
𝑧 (0 ) = 𝑒
+
π‘Ž (𝑠) 𝑒𝑑𝑠 𝑑𝑠) (1 − 𝑝) ,
−𝑑𝑇
𝑧 (πœπ‘‡ ) + 𝑒
𝑇
(17)
𝑑𝑠
∫ π‘Ž (𝑠) 𝑒 𝑑𝑠 + 𝛿.
πœπ‘‡
Abstract and Applied Analysis
5
π‘₯σΈ€  (𝑑) = π‘Ÿπ‘₯ (𝑑) (1 −
By (17), we can obtain that
𝐼󸀠 (𝑑) = −𝑑𝐼 𝐼 (𝑑) ,
𝑧∗ (0+ )
πœπ‘‡
=
𝑦𝐽󸀠 (𝑑) = − (𝑑𝐽 + π‘š) 𝑦𝐽 (𝑑) ,
𝑇
[(1 − 𝑝) ∫0 π‘Ž (𝑠) 𝑒𝑑𝑠 𝑑𝑠 + ∫πœπ‘‡ π‘Ž (𝑠) 𝑒𝑑𝑠 𝑑𝑠] 𝑒−𝑑𝑇 + 𝛿
1 − (1 −
𝑝) 𝑒−𝑑𝑇
σΈ€ 
𝑦𝑀
(𝑑) = π‘šπ‘¦π½ (𝑑) − 𝑑𝑀𝑦𝑀 (𝑑) ,
,
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇,
𝑧∗ (πœπ‘‡+ )
𝑑 =ΜΈ 𝑛𝑇,
πœπ‘‡
=
π‘₯ (𝑑)
),
𝐾
𝑑𝑠
−𝑑𝑇
(1 − 𝑝) [∫0 π‘Ž (𝑠) 𝑒 𝑑𝑠 + 𝑒
1 − (1 −
𝑇
𝑑𝑠
−π‘‘πœπ‘‡
∫πœπ‘‡ π‘Ž (𝑠) 𝑒 𝑑𝑠 + 𝛿] 𝑒
.
𝑝) 𝑒−𝑑𝑇
(18)
Δπ‘₯ (𝑑) = −𝛿π‘₯ (𝑑) ,
Δ𝐼 (𝑑) = −𝑃𝐼 𝐼 (𝑑) ,
Δ𝑦𝐽 (𝑑) = −𝑃𝐽 𝑦𝐽 (𝑑) ,
Δ𝑦𝑀 (𝑑) = −𝑃𝑀𝑦𝑀 (𝑑) ,
So, we will obtain the T-periodic solution of (14):
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
Δπ‘₯ (𝑑) = 0,
𝑧∗ (𝑑) = 𝑒−𝑑(𝑑−(𝑛−1)𝑇) (𝑧∗ (0+ ) + ∫
𝑑−(𝑛−1)𝑇
0
Δ𝐼 (𝑑) = 𝛿𝐼 ,
π‘Ž (𝑠) 𝑒𝑑𝑠 𝑑𝑠) ,
Δ𝑦𝐽 (𝑑) = 𝛿𝐽 ,
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
𝑧∗ (𝑑) = 𝑒−𝑑(𝑑−(𝑛−1)𝑇) (𝑧∗ (πœπ‘‡+ ) π‘’π‘‘πœπ‘‡ + ∫
𝑑−(𝑛−1)𝑇
πœπ‘‡
π‘Ž (𝑠) 𝑒𝑑𝑠 𝑑𝑠) ,
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] .
(19)
Let 𝑍(𝑑) = 𝑧(𝑑) − 𝑧∗ (𝑑). Substituting 𝑍(𝑑) into (14), we have
𝑍󸀠 (𝑑) = −𝑑𝑍 (𝑑) ,
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇, 𝑑 =ΜΈ 𝑛𝑇,
Δ𝑍 (𝑑) = −𝑝𝑍 (𝑑) ,
Δ𝑍 (𝑑) = 0,
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
𝑑 = 𝑛𝑇, 𝑛 ∈ N,
(20)
𝑍 (0+ ) = 𝑧0 − 𝑧∗ (0+ ) .
+
−𝑑𝑑
Then, 𝑍(𝑑) = 𝑍(0 )𝑒 ∏0<(𝑛+𝜏−1)𝑇<𝑑 (1−𝑝) → 0, as 𝑑 → ∞.
The proof is completed.
4. Main Results
4.1. Local and Global Stability. In this section, we will study
the existence and stability of the system (1) susceptible pest∗
(𝑑)).
eradication periodic solution (π‘₯∗ (𝑑), 0, 𝐼∗ (𝑑), 𝑦𝐽∗ (𝑑), 𝑦𝑀
To this purpose, it is seen first that when 𝑆(𝑑) = 0, system
(1) can be rewritten in the form
Δ𝑦𝑀 (𝑑) = 𝛿𝑀,
𝑑 = 𝑛𝑇,
(21)
which describes the dynamics of system (1) in the absence
of the susceptible pest population. So, when 𝑑 ∈ ((𝑛 −
1)𝑇, 𝑛𝑇](𝑛 ∈ N), we can calculate the T-periodic solution of
(21) by Lemmas 7 and 9. It is seen that
𝐾 (1 − 𝛿 − 𝑒−π‘Ÿπ‘‡ )
{
{
{
,
{
{
1 − 𝛿 − 𝑒−π‘Ÿπ‘‡ + 𝛿𝑒−π‘Ÿ(𝑇−πœπ‘‡) 𝑒−π‘Ÿ(𝑑−(𝑛−1)𝑇)
{
{
{
{
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
π‘₯∗ (𝑑) = {
{
𝐾
(1 − 𝛿 − 𝑒−π‘Ÿπ‘‡ )
{
{
{
,
{
−π‘Ÿπ‘‡
−π‘Ÿ(𝑑−(𝑛+𝜏−1)𝑇)
{
{
{ 1 − 𝛿 − 𝑒 + 𝛿𝑒
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] ,
{
(22)
𝛿𝐼 𝑒−𝑑𝐼 (𝑑−(𝑛−1)𝑇)
{
{
,
{
{
1 − (1 − 𝑃𝐼 ) 𝑒−𝑑𝐼 𝑇
{
{
{
{
{
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
𝐼∗ (𝑑) = {
{ 𝛿𝐼 (1 − 𝑃𝐼 ) 𝑒−𝑑𝐼 (𝑑−(𝑛−1)𝑇)
{
{
,
{
{
−𝑑𝐼 𝑇
{
{
{ 1 − (1 − 𝑃𝐼 ) 𝑒
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] ,
{
(23)
𝛿𝐽 𝑒−(π‘š+𝑑𝐽 )(𝑑−(𝑛−1)𝑇)
{
{
{
,
{
{
{ 1 − (1 − 𝑃𝐽 ) 𝑒−(π‘š+𝑑𝐽 )𝑇
{
{
{
{
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
𝑦𝐽∗ (𝑑) = {
{
𝛿
(1
− 𝑃𝐽 ) 𝑒−(π‘š+𝑑𝐽 )(𝑑−(𝑛−1)𝑇)
{
𝐽
{
{
,
{
{ 1 − (1 − 𝑃𝐽 ) 𝑒−(π‘š+𝑑𝐽 )𝑇
{
{
{
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] ,
{
(24)
6
Abstract and Applied Analysis
∗
𝑦𝑀
(𝑑)
−𝑑𝑀 (𝑑−(𝑛−1)𝑇)
∗
(𝑦𝑀
(0+ ) + 𝐴 (𝑑 − (𝑛 − 1) 𝑇)) ,
{𝑒
{
{
{
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
= { −𝑑𝑀 (𝑑−(𝑛−1)𝑇) ∗
{
𝑒
(𝑦𝑀 (πœπ‘‡+ ) 𝑒𝑑𝑀 πœπ‘‡ + 𝐡 (𝑑 − (𝑛 − 1) 𝑇)) ,
{
{
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] ,
{
(25)
∗
𝑦𝑀
(0+ ) =
∗
(πœπ‘‡+ ) =
𝑦𝑀
[(1 − 𝑃𝑀) 𝐴 (πœπ‘‡) + 𝐡 (𝑇)] 𝑒−𝑑𝑀 𝑇 + 𝛿𝑀
,
1 − (1 − 𝑃𝑀) 𝑒−𝑑𝑀 𝑇
(26)
(1 − 𝑃𝑀) [𝐴 (πœπ‘‡) + 𝑒−𝑑𝑀 𝑇 𝐡 (𝑇) + 𝛿𝑀] 𝑒−𝑑𝑀 πœπ‘‡
1 − (1 − 𝑃𝑀) 𝑒−𝑑𝑀 𝑇
In the following, we present two main results with the
locally and globally asymptotical stability of the susceptible
pest-eradication periodic solution (π‘₯∗ (𝑑), 0, 𝐼∗ (𝑑), 𝑃𝐽∗ (𝑑),
∗
𝑃𝑀
(𝑑)).
,
(27)
𝑇
𝑇
0
0
𝛽 ∫ 𝑃1 (π‘₯∗ (𝑑)) 𝑑𝑑 − ∫ 𝑔 (𝐼∗ (𝑑)) 𝑑𝑑
−
(𝑑𝑀 −(π‘š+𝑑𝐽 ))𝑑
π‘šπ›Ώπ½ (𝑒
− 1)
(1 − (1 − 𝑃𝐽 ) 𝑒−(π‘š+𝑑𝐽 )𝑇 ) (𝑑𝑀 − (π‘š + 𝑑𝐽 ))
,
π‘šπ›Ώπ½ (1 − 𝑃𝐽 ) (𝑒(𝑑𝑀 −(π‘š+𝑑𝐽 ))𝑑 − 𝑒(𝑑𝑀 −(π‘š+𝑑𝐽 ))πœπ‘‡ )
(1 − (1 − 𝑃𝐽 ) 𝑒−(π‘š+𝑑𝐽 )𝑇 ) (𝑑𝑀 − (π‘š + 𝑑𝐽 ))
𝑃2σΈ€ 
(0) ∫
𝑇
0
∗
𝑦𝑀
(𝑑) 𝑑𝑑
1
,
− 𝑑𝑆 𝑇 < ln
1 − 𝑃𝑆
(30)
then the susceptible pest-eradication periodic solution (π‘₯∗ (𝑑), 0,
∗
(𝑑)) of system (1) is locally asymptotically stable.
𝐼∗ (𝑑), 𝑦𝐽∗ (𝑑), 𝑦𝑀
𝑑 ∈ (0, πœπ‘‡] ,
𝐡 (𝑑) =
(3) unstable if there is a Floquet multipliers πœ† 𝑖 (1 ≤ 𝑖 ≤ 𝑛)
of (29) such that |πœ† 𝑖 | > 1.
Theorem 11. If
where
𝐴 (𝑑) =
(2) asymptotically stable if and only if all Floquet multipliers πœ† 𝑖 (1 ≤ 𝑖 ≤ 𝑛) of (29) satisfy |πœ† 𝑖 | < 1;
Proof. Let (π‘₯(𝑑), 𝑆(𝑑), 𝐼(𝑑), 𝑦𝐽 (𝑑), 𝑦𝑀(𝑑)) be any solution of
system (1). We define error 𝑒1 (𝑑) = π‘₯(𝑑) − π‘₯∗ (𝑑), 𝑒2 (𝑑) =
𝑆(𝑑), 𝑒3 (𝑑) = 𝐼(𝑑) − 𝐼∗ (𝑑), 𝑒4 (𝑑) = 𝑦𝐽 (𝑑) − 𝑦𝐽∗ (𝑑), 𝑒5 (𝑑) =
∗
𝑦𝑀(𝑑) − 𝑦𝑀
(𝑑). The linearized system of (1) at (π‘₯∗ (𝑑),
∗
∗
∗
(𝑑)) is
0, 𝐼 (𝑑), 𝑦𝐽 (𝑑), 𝑦𝑀
,
𝑑 ∈ (πœπ‘‡, 𝑇] .
(28)
To discuss the locally asymptotical stability of the susceptible
pest-eradication periodic solution, we now introduce the
Floquet theory for a linear impulsive control system:
πœ”σΈ€  (𝑑) = 𝐴 (𝑑) πœ” (𝑑) ,
Δπœ” (𝑑) = π΅π‘˜ πœ” (𝑑) ,
𝑑 =ΜΈ πœπ‘˜ ,
𝑑 = πœπ‘˜ , π‘˜ ∈ N,
(29)
under the following conditions:
𝑒1σΈ€  (𝑑) = (π‘Ÿ − 2π‘Ÿ
π‘₯∗ (𝑑)
) 𝑒1 (𝑑) − 𝑃1 (π‘₯∗ (𝑑)) 𝑒2 (𝑑) ,
𝐾
∗
𝑒2σΈ€  (𝑑) = (𝛽𝑃1 (π‘₯∗ (𝑑)) − 𝑔 (𝐼∗ (𝑑)) − 𝑃2σΈ€  (0) 𝑦𝑀
(𝑑) − 𝑑𝑆 ) 𝑒2 (𝑑) ,
𝑒3σΈ€  (𝑑) = 𝑔 (𝐼∗ (𝑑)) 𝑒2 (𝑑) − 𝑑𝐼 𝑒3 (𝑑) ,
∗
𝑒4σΈ€  (𝑑) = πœ†π‘ƒ2σΈ€  (0) 𝑦𝑀
(𝑑) 𝑒2 (𝑑) − (𝑑𝐽 + π‘š) 𝑒4 (𝑑) ,
𝑒5σΈ€  (𝑑) = π‘šπ‘’4 (𝑑) − 𝑑𝑀𝑒5 (𝑑) ,
H1: 𝐴(⋅) ∈ PC(R, 𝑀𝑛 (R)) and 𝐴(𝑑 + 𝑇) = 𝐴(𝑑) for 𝑑 ≥ 0.
𝑑=ΜΈ (𝑛 + 𝜏 − 1) 𝑇,
H2: π΅π‘˜ ∈ 𝑀𝑛 , det(𝐼𝑛 + π΅π‘˜ ) =ΜΈ 0, πœπ‘˜ < πœπ‘˜+1 for π‘˜ ∈ N, and 𝐼𝑛
denotes the 𝑛 × π‘› real identity matrix.
H3: There is a π‘ž ∈ N such that π΅π‘˜+π‘ž = π΅π‘˜ , πœπ‘˜+π‘ž = πœπ‘˜ + 𝑇
for π‘˜ ∈ N.
Let Ψ(𝑑) be a fundamental matrix of (29), then there is a
unique reversible matrix 𝑀 ∈ 𝑀𝑛 (R) such that Ψ(𝑑 + 𝑇) =
Ψ(𝑑)𝑀 for all 𝑑 ∈ R, which is called the monodromy matrix
of (29) corresponding to Ψ. All monodromy matrices of (29)
are similar and they have the same eigenvalues πœ† 1 , πœ† 2 , . . . , πœ† 𝑛 ,
which are called the Floquet multipliers of (29).
Lemma 10 (see [13] (Floquet theory)). Let the conditions H1–
H3 hold. Then system (29) have the following properties
(1) stable if and only if all Floquet multipliers πœ† 𝑖 (1 ≤ 𝑖 ≤
𝑛) of (29) satisfy |πœ† 𝑖 | ≤ 1 and moreover, to those πœ† 𝑖
for which |πœ† 𝑖 | = 1, there correspond simple elementary
divisors;
𝑑 =ΜΈ 𝑛𝑇,
Δ𝑒1 (𝑑) = −𝛿𝑒1 (𝑑) ,
Δ𝑒2 (𝑑) = −𝑃𝑆 𝑒2 (𝑑) ,
Δ𝑒3 (𝑑) = −𝑃𝐼 𝑒3 (𝑑) ,
Δ𝑒4 (𝑑) = −𝑃𝐽 𝑒4 (𝑑) ,
Δ𝑒5 (𝑑) = −𝑃𝑀𝑒5 (𝑑) ,
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
Δ𝑒1 (𝑑) = Δ𝑒2 (𝑑) = Δ𝑒3 (𝑑) = Δ𝑒4 (𝑑) = Δ𝑒5 (𝑑) = 0,
𝑑 = 𝑛𝑇.
(31)
Let Ψ(𝑑) be the fundamental matrix of (31), then Ψ(𝑑) satisfies
Abstract and Applied Analysis
7
π‘₯∗ (𝑑)
𝑃1 (π‘₯∗ (𝑑))
𝐾
∗
0
𝛽𝑃1 (π‘₯∗ (𝑑)) − 𝑔 (𝐼∗ (𝑑)) − 𝑃2σΈ€  (0) 𝑦𝑀
(𝑑) − 𝑑𝑆
0
0
0
0
0
0
−𝑑𝐼
0
0
− (𝑑𝐽 + π‘š)
0
π‘š
π‘Ÿ − 2π‘Ÿ
π‘‘Ψ (𝑑) (
=(
(
𝑑𝑑
∗
0
𝑔 (𝐼 (𝑑))
πœ†π‘ƒ2σΈ€ 
0
∗
(0) 𝑦𝑀
(𝑑)
0
(
0
)
)
0 ) Ψ (𝑑) .
(32)
0
−𝑑𝑀)
Then, a fundamental matrix Ψ(𝑑) (Ψ(0) = 𝐼4 ) of (31) is
𝑑
𝑒∫0 (π‘Ÿ−2π‘Ÿ(π‘₯
∗
(𝑠)/𝐾))𝑑𝑠
0
(
(
Ψ (𝑑) = (
(
(
πœ™12 (𝑑)
𝑑
∗
∫0 (𝛽𝑃1 (π‘₯∗ (𝑠))−𝑔(𝐼∗ (𝑠))−𝑃2σΈ€  (0)𝑦𝑀
(𝑠)−𝑑𝑆 )𝑑𝑠
𝑒
0
0
0
0 )
)
,
0 )
)
0
0
0
−𝑑𝐼 𝑑
0
0
πœ™32 (𝑑)
0
πœ™42 (𝑑)
0
𝑒−(𝑑𝐽 +π‘š)𝑑
0
πœ™52 (𝑑)
0
πœ™54 (𝑑)
where
𝑒
(33)
𝑒−𝑑𝑀 𝑑 )
The resetting impulsive condition of (31) becomes
𝑑
πœ™12 (𝑑) = − 𝑒− ∫0 (π‘Ÿ−2π‘Ÿ(π‘₯
𝑑
∗
∗
𝑒1 ((𝑛 + 𝜏 − 1) 𝑇+ )
𝑒2 ((𝑛 + 𝜏 − 1) 𝑇+ )
(𝑒3 ((𝑛 + 𝜏 − 1) 𝑇+ ))
𝑒4 ((𝑛 + 𝜏 − 1) 𝑇+ )
𝑒5 ((𝑛 + 𝜏 − 1) 𝑇+ )
(𝑠)/𝐾))𝑑𝑠
1−𝛿
0
0
0
0
0
0
0
0 1 − 𝑃𝑆
0
0 )
0
1 − 𝑃𝐼
=( 0
0
0
0
0
1 − 𝑃𝐽
0
0
0
0
1 − 𝑃𝑀
𝑠
∗
∫0 (𝛽𝑃1 (π‘₯∗ (πœ‰))−𝑔(𝐼∗ (πœ‰))−𝑃2σΈ€  (0)𝑦𝑀
(πœ‰)−𝑑𝑆 )π‘‘πœ‰
× ∫ 𝑃1 (π‘₯ (𝑠)) 𝑒
0
𝑠
× π‘’∫0 (π‘Ÿ−2π‘Ÿ(π‘₯
∗
(πœ‰)/𝐾))π‘‘πœ‰
𝑑𝑠,
πœ™32 (𝑑)
𝑑
𝑠
= 𝑒−𝑑𝐼 𝑑 ∫ 𝑔 (𝐼∗ (𝑠)) 𝑒∫0 (𝛽𝑃1 (π‘₯
∗
∗
(πœ‰))−𝑔(𝐼∗ (πœ‰))−𝑃2σΈ€  (0)𝑦𝑀
(πœ‰)−𝑑𝑆 )π‘‘πœ‰
0
× π‘’π‘‘πΌ 𝑠 𝑑𝑠,
πœ™42 (𝑑)
𝑑
𝑠
∗
= 𝑒−𝑑𝐽 𝑑 ∫ πœ†π‘ƒ2σΈ€  (0) 𝑦𝑀
(𝑠) 𝑒∫0 (𝛽𝑃1 (π‘₯
∗
∗
(πœ‰))−𝑔(𝐼∗ (πœ‰))−𝑃2σΈ€  (0)𝑦𝑀
(πœ‰)−𝑑𝑆 )π‘‘πœ‰
𝑒1 ((𝑛 + 𝜏 − 1) 𝑇)
𝑒2 ((𝑛 + 𝜏 − 1) 𝑇)
× (𝑒3 ((𝑛 + 𝜏 − 1) 𝑇)) ,
𝑒4 ((𝑛 + 𝜏 − 1) 𝑇)
𝑒5 ((𝑛 + 𝜏 − 1) 𝑇)
𝑒1 (𝑛𝑇+ )
1
𝑒2 (𝑛𝑇+ )
0
(𝑒3 (𝑛𝑇+ )) = (0
0
𝑒4 (𝑛𝑇+ )
0
𝑒5 (𝑛𝑇+ )
0
1
0
0
0
0
0
1
0
0
0
0
0
1
0
0
𝑒1 (𝑛𝑇)
𝑒2 (𝑛𝑇)
0
0) (𝑒3 (𝑛𝑇)) .
𝑒4 (𝑛𝑇)
0
𝑒5 (𝑛𝑇)
1
0
𝑑𝐽 𝑠
× π‘’ 𝑑𝑠,
Then, it is easy to obtain all eigenvalues of
𝑑
πœ™52 (𝑑) = 𝑒−𝑑𝑀 𝑑 ∫ π‘šπœ™42 (𝑠) 𝑒𝑑𝑀 𝑠 𝑑𝑠,
0
−(𝑑𝐽 +π‘š)𝑑
πœ™54 (𝑑) =
π‘š (𝑒
−𝑑𝑀 𝑑
−𝑒
𝑑𝑀 − (𝑑𝐽 + π‘š)
)
.
(34)
1−𝛿
0
0
0
0
0
0
0
0 1 − 𝑃𝑆
0
0 )
0
1 − 𝑃𝐼
𝑀= ( 0
0
0
0
0
1 − 𝑃𝐽
0
0
0
0
1 − 𝑃𝑀
(35)
8
Abstract and Applied Analysis
1
0
× (0
0
0
0
1
0
0
0
0
0
1
0
0
0
0
0
1
0
σΈ€ 
𝑦𝑀
(𝑑) = π‘šπ‘¦π½ (𝑑) − 𝑑𝑀𝑦𝑀 (𝑑) ,
0
0
0) Ψ (𝑇) .
0
1
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇,
𝑑 =ΜΈ 𝑛𝑇,
Δπ‘₯ (𝑑) = −𝛿π‘₯ (𝑑) ,
(36)
𝑇
We have πœ† 1 = (1 − 𝛿)𝑒∫0 (π‘Ÿ−2π‘Ÿ(π‘₯
𝑇
∗
∗
σΈ€ 
∗
(𝑠)/𝐾))𝑑𝑠
∗
Δ𝐼 (𝑑) = −𝑃𝐼 𝐼 (𝑑) ,
, πœ† 2 = (1 − 𝑃𝑆 )
Δ𝑦𝐽 (𝑑) = −𝑃𝐽 𝑦𝐽 (𝑑) ,
𝑒∫0 (𝛽𝑃1 (π‘₯ (𝑠))−𝑔(𝐼 (𝑠))−𝑃2 (0)𝑦𝑀 (𝑠)−𝑑𝑆 )𝑑𝑠 , πœ† 3 = (1 − 𝑃𝐼 )𝑒−𝑑𝐼 𝑇 < 1,
πœ† 4 = (1 − 𝑃𝐽 )𝑒−(𝑑𝐽 +π‘š)𝑇 < 1 and πœ† 5 = (1 − 𝑃𝑀)𝑒−𝑑𝑀 𝑇 < 1. Since
π‘₯∗ (𝑑) > (𝐾/2), so πœ† 1 < 1. By the condition (30), we have πœ† 2 <
1. Therefore, according to Lemma 10, the susceptible pest∗
(𝑑)) of
eradication periodic solution (π‘₯∗ (𝑑), 0, 𝐼∗ (𝑑), 𝑦𝐽∗ (𝑑), 𝑦𝑀
system (1) is locally asymptotically stable. The proof is
completed.
Δ𝑦𝑀 (𝑑) = −𝑃𝑀𝑦𝑀 (𝑑) ,
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
Δπ‘₯ (𝑑) = 0,
Δ𝐼 (𝑑) = 𝛿𝐼 ,
Δ𝑦𝐽 (𝑑) = 𝛿𝐽 ,
Theorem 12. If
𝑇
Δ𝑦𝑀 (𝑑) = 𝛿𝑀,
𝑇
𝛽 ∫ 𝑃1 (π‘₯∗ (𝑑)) 𝑑𝑑 − ∫ 𝑔 (𝐼∗ (𝑑)) 𝑑𝑑
0
0
𝑇
∗
− min 𝑃2σΈ€  (πœ›) ∫ 𝑦𝑀
(𝑑) 𝑑𝑑 − 𝑑𝑆 𝑇 < ln
0≤πœ›≤π‘ˆπ‘†
0
1
,
1 − 𝑃𝑆
where π‘ˆπ‘† is an ultimate boundedness constant for S, then
the susceptible pest-eradication periodic solution (π‘₯∗ (𝑑), 0,
∗
(𝑑)) of system (1) is globally asymptotically
𝐼∗ (𝑑), 𝑦𝐽∗ (𝑑), 𝑦𝑀
stable.
(40)
From the first equation of system (40), we obtain the
following comparison system:
]σΈ€  (𝑑) = π‘Ÿ] (𝑑) (1 −
] (𝑑)
),
𝐾
Δ] (𝑑) = −𝛿] (𝑑) ,
Proof. Since
𝑇
𝑇
𝛽 ∫ 𝑃1 (π‘₯∗ (𝑑)) 𝑑𝑑 − ∫ 𝑔 (𝐼∗ (𝑑)) 𝑑𝑑
0
−
𝑑 = 𝑛𝑇, 𝑛 ∈ N.
(37)
0
min 𝑃󸀠
0≤πœ›≤π‘ˆπ‘† 2
(πœ›) ∫
𝑇
0
∗
𝑦𝑀
(𝑑) 𝑑𝑑
1
− 𝑑𝑆 𝑇 < ln
,
1 − 𝑃𝑆
(38)
π‘₯ (𝑑) ≤ π‘₯∗ (𝑑) + πœ€.
0
𝑇
∗ (𝑑) − πœ€) 𝑑𝑑 − 𝑑 𝑇
− min 𝑃2σΈ€  (πœ›) ∫ (𝑦𝑀
𝑆
0≤πœ›≤π‘ˆπ‘†
− ln
0
(39)
1
= πœ– < 0,
1 − 𝑃𝑆
∗ (𝑑) is defined in the following. According to system
where 𝑦𝑀
(1), we have
π‘₯σΈ€  (𝑑) ≤ π‘Ÿπ‘₯ (𝑑) (1 −
π‘₯ (𝑑)
),
𝐾
𝐼󸀠 (𝑑) ≥ −𝑑𝐼 𝐼 (𝑑) ,
𝑦𝐽󸀠 (𝑑) ≥ −𝑑𝐽 𝑦𝐽 (𝑑) − π‘šπ‘¦π½ (𝑑) ,
(42)
Let us define 𝑉(𝑑) = (𝑉1 (𝑑), 𝑉2 (𝑑))𝑇 ∈ 𝐢[R+ × R2 , R2+ ] and
𝑉𝑖 (𝑑) ∈ 𝑉0 , (𝑖 = 1, 2), where 𝑉1 (𝑑) = 𝐼(𝑑), 𝑉2 (𝑑) = 𝑦𝐽 (𝑑). Then,
we have
𝑇
𝛽 ∫ 𝑃1 (π‘₯∗ (𝑑) + πœ€) 𝑑𝑑 − ∫ 𝑔 (𝐼∗ (𝑑) − πœ€) 𝑑𝑑
0
(41)
𝑑 = (𝑛 + 𝜏 − 1) 𝑇.
By Lemma 7, system (41) has a positive periodic solution
]∗ (𝑑), and for any solution ](𝑑) of (41), ](𝑑) → ]∗ (𝑑) as 𝑑 large
enough, where ]∗ (𝑑) = π‘₯∗ (𝑑). Then, according to Lemmas
4 and 7, there exists a positive constant 𝑛∗ such that for all
𝑑 ≥ 𝑛∗ 𝑇
we can choose an πœ€ small enough such that
𝑇
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇,
𝑉󸀠 (𝑑) ≥ (
−𝑑𝐼 𝐼 (𝑑)
−𝑑
0
)=( 𝐼
) 𝑉 (𝑑) ,
− (𝑑𝐽 + π‘š) 𝑦𝐽 (𝑑)
0 − (𝑑𝐽 + π‘š)
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇, 𝑑 =ΜΈ 𝑛𝑇,
(43)
0
1 − 𝑃𝐼
) 𝑉 ((𝑛 + 𝜏 − 1) 𝑇) ,
𝑉 ((𝑛 + 𝜏 − 1) 𝑇+ ) = (
0
1 − 𝑃𝐽
𝛿
1 0
𝑉 (𝑛𝑇+ ) = (
) 𝑉 (𝑛𝑇) + ( 𝐼 ) ,
𝛿𝐽
0 1
𝑉 (0+ ) = (𝐼 (0+ ) , 𝑦𝐽 (0+ )) .
(44)
Abstract and Applied Analysis
9
Then, the multicomparison system of (43) is
𝑀󸀠 (𝑑) = 𝐴𝑀 (𝑑) ,
Therefore,
𝑆󸀠 (𝑑) ≤ [𝛽𝑃1 (π‘₯∗ (𝑑) + πœ€) − 𝑔 (𝐼∗ (𝑑) − πœ€)
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇,
𝑀 (𝑑+ ) = 𝐡𝑀 (𝑑) ,
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
+
𝑀 (𝑑 ) = 𝐼2 𝑀 (𝑑) + 𝐢,
∗
− min 𝑃2σΈ€  (πœ›) (𝑦𝑀
(𝑑) − πœ€) − 𝑑𝑆 ] 𝑆 (𝑑) ,
(45)
𝑑 = 𝑛𝑇,
0≤πœ›≤π‘ˆπ‘†
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇,
𝑀 (0+ ) = 𝑉 (0+ ) ,
−𝑑
0
1−𝑃
0
𝑑 =ΜΈ 𝑛𝑇,
𝛿
where 𝐴 = ( 0 𝐼 −(𝑑𝐽 +π‘š) ) , 𝐡 = ( 0 𝐼 1−𝑃𝐽 ), and 𝐢 = ( 𝛿𝐽𝐼 ).
By Lemma 9, it is easy to obtain a periodic solution
(𝐼∗ (𝑑), 𝑦𝐽∗ (𝑑))𝑇 of system (45). Then, according to Lemmas 4
and 9, one may find 𝑛0∗ (𝑛0∗ > 𝑛∗ ) such that for all 𝑑 ≥ 𝑛0∗ 𝑇
∗
𝐼 (𝑑) ≥ 𝐼 (𝑑) − πœ€,
𝑦𝐽 (𝑑) ≥
𝑦𝐽∗
(𝑑) − πœ€.
(46)
σΈ€ 
(𝑑) ≥
From the fourth equation of system (40), we have 𝑦𝑀
∗
π‘š(𝑦𝐽 (𝑑) − πœ€) − 𝑑𝑀𝑦𝑀(𝑑), by Lemmas 4 and 9, there exists
𝑛1∗ (𝑛1∗ > 𝑛0∗ ) such that for all 𝑑 ≥ 𝑛1∗ 𝑇
∗ (𝑑) − πœ€,
𝑦𝑀 (𝑑) ≥ 𝑦𝑀
(50)
(47)
where
Δ𝑆 (𝑑) = −𝑃𝑆 𝑆 (𝑑) ,
Δ𝑆 (𝑑) = 0,
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
𝑑 = 𝑛𝑇,
for 𝑑 ≥ 𝑛1∗ 𝑇. Let 𝑁 ∈ N and (𝑁 + 𝜏 − 1) ≥ 𝑛1∗ . Integrating (50)
on ((𝑛 + 𝜏 − 1)𝑇, (𝑛 + 𝜏)𝑇], 𝑛 ≥ 𝑁, we have
𝑆 ((𝑛 + 𝜏) 𝑇)
≤ 𝑆 ((𝑛 + 𝜏 − 1) 𝑇) (1 − 𝑃𝑆 )
(𝑛+𝜏)𝑇
∗
∗ (𝑑)−πœ€)−𝑔(𝐼̃
∗ (𝑑)+πœ€)− min 𝑃󸀠 (πœ›)(𝑦
Μƒ
Μƒ
∫(𝑛+𝜏−1)𝑇 (𝛽𝑃1 (π‘₯
2
𝑀 (𝑑)+πœ€)−𝑑𝑆 )𝑑𝑑
×𝑒
0≤πœ›≤π‘ˆπ‘†
= 𝑆 ((𝑛 + 𝜏 − 1) 𝑇) π‘’πœ– .
−𝑑𝑀 (𝑑−(𝑛−1)𝑇)
𝑒
{
{
{
∗ (0+ )
{
× (𝑦𝑀
{
{
{
𝑑−(𝑛−1)𝑇
{
{
{
{ +π‘š ∫
(𝑦𝐽∗ (𝑑) − πœ€) 𝑒𝑑𝑀 𝑠 𝑑𝑠) ,
{
{
{
0
{
{
{
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
∗
𝑦𝑀
(𝑑) = { −𝑑𝑀 (𝑑−(𝑛−1)𝑇)
{𝑒
{
{
{
{× (𝑦∗ (πœπ‘‡+ )𝑒𝑑𝑀 πœπ‘‡
{
{
𝑀
{
{
𝑑−(𝑛−1)𝑇
{
{
{
+π‘š ∫
(𝑦𝐽∗ (𝑑) − πœ€) 𝑒𝑑𝑀 𝑠 𝑑𝑠) ,
{
{
{
πœπ‘‡
{
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] ,
{
∗ (0+ ) = (π‘š [(1 − 𝑃 ) ∫
𝑦𝑀
𝑀
πœπ‘‡
0
(51)
(48)
π‘₯σΈ€  (𝑑) ≥ (π‘Ÿ − 𝑃1σΈ€  (0) πœ€0 ) π‘₯ (𝑑) (1 −
(𝑦𝐽∗ (𝑑) − πœ€) 𝑒𝑑𝑀 𝑠 𝑑𝑠
π‘Ÿπ‘₯ (𝑑)
),
𝐾 (π‘Ÿ − 𝑃1σΈ€  (0) πœ€0 )
𝐼󸀠 (𝑑) ≤ − (𝑑𝐼 − 𝑔󸀠 (0) πœ€0 ) 𝐼 (𝑑) ,
𝑇
+ ∫ (𝑦𝐽∗ (𝑑) − πœ€) 𝑒𝑑𝑀 𝑠 𝑑𝑠] 𝑒−𝑑𝑀 𝑇 + 𝛿𝑀)
πœπ‘‡
−𝑑𝑀 𝑇 −1
× (1 − (1 − 𝑃𝑀) 𝑒
Then 𝑆(𝑑) ≤ 𝑆((𝑛+𝜏)𝑇)π‘’π‘˜πœ– for 𝑑 ∈ ((𝑛+𝜏+π‘˜)𝑇, (𝑛+𝜏+π‘˜+1)𝑇].
Since πœ– < 0, we can easily get 𝑆(𝑑) → 0, as 𝑑 → ∞. In the
following, we prove π‘₯(𝑑) → π‘₯∗ (𝑑), 𝐼(𝑑) → 𝐼∗ (𝑑), 𝑦𝐽 (𝑑) →
∗
(𝑑), as 𝑑 → ∞. Give πœ€0 > 0 small enough
𝑦𝐽∗ (𝑑), 𝑦𝑀(𝑑) → 𝑦𝑀
σΈ€ 
(πœ€0 < (π‘Ÿ/𝑃 1 (0))), there must exist 𝑛2∗ (𝑛2∗ > 𝑛1∗ ) such that
𝑆(𝑑) < πœ€0 , for 𝑑 ≥ 𝑛2∗ 𝑇. Then, we have
) ,
𝑦𝐽󸀠 (𝑑) ≤ πœ†π‘ƒ2 (πœ€0 ) 𝑀 − (𝑑𝐽 + π‘š) 𝑦𝐽 (𝑑) ,
σΈ€ 
𝑦𝑀
(𝑑) = π‘šπ‘¦π½ (𝑑) − 𝑑𝑀𝑦𝑀 (𝑑) ,
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇,
∗ (πœπ‘‡+ )
𝑦𝑀
𝑑 =ΜΈ 𝑛𝑇,
= ((1 − 𝑃𝑀) [π‘š ∫
πœπ‘‡
0
Δπ‘₯ (𝑑) = −𝛿π‘₯ (𝑑) ,
(𝑦𝐽∗ (𝑑) − πœ€) 𝑒𝑑𝑀 𝑠 𝑑𝑠
Δ𝐼 (𝑑) = −𝑃𝐼 𝐼 (𝑑) ,
𝑇
+ π‘šπ‘’−𝑑𝑀 𝑇 ∫ (𝑦𝐽∗ (𝑑) − πœ€) 𝑒𝑑𝑀 𝑠 𝑑𝑠 + 𝛿𝑀]
πœπ‘‡
Δ𝑦𝐽 (𝑑) = −𝑃𝐽 𝑦𝐽 (𝑑) ,
Δ𝑦𝑀 (𝑑) = −𝑃𝑀𝑦𝑀 (𝑑) ,
× π‘’−𝑑𝑀 πœπ‘‡ )
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
−1
Δπ‘₯ (𝑑) = 0,
× (1 − (1 − 𝑃𝑀) 𝑒−𝑑𝑀 𝑇 ) .
(49)
Δ𝐼 (𝑑) = 𝛿𝐼 ,
10
Abstract and Applied Analysis
∗
+
𝑦̂
𝐽 (πœπ‘‡ )
Δ𝑦𝐽 (𝑑) = 𝛿𝐽 ,
Δ𝑦𝑀 (𝑑) = 𝛿𝑀,
πœπ‘‡
= ((1 − 𝑃𝐽 ) [πœ†π‘ƒ2 (πœ€0 ) 𝑀 ∫
0
𝑑 = 𝑛𝑇.
𝑇
(52)
Analyzing (52) with similarity as (40), there exists 𝑛3∗ (𝑛3∗ >
𝑛2∗ ) such that for all 𝑑 ≥ 𝑛3∗ 𝑇
∗ (𝑑) − πœ€,
Μ‚
π‘₯ (𝑑) ≥ π‘₯
∗ (𝑑) + πœ€,
𝐼 (𝑑) ≤ 𝐼̂
∗
Μ‚
𝑦𝐽 (𝑑) ≤ 𝑦
𝐽 (𝑑) + πœ€,
∗
𝑦𝑀 (𝑑) ≤ 𝑦̂
𝑀 (𝑑) + πœ€,
(53)
where
∗ (𝑑)
Μ‚
π‘₯
σΈ€ 
𝐾 (π‘Ÿ − 𝑃1σΈ€  (0) πœ€0 ) (1 − 𝛿 − 𝑒−(π‘Ÿ−𝑃1 (0)πœ€0 )𝑇 )
{
{
{
σΈ€ 
{
{
× (π‘Ÿ [1 − 𝛿 − 𝑒−(π‘Ÿ−𝑃1 (0)πœ€0 )𝑇
{
{
{
{
−1
σΈ€ 
σΈ€ 
{
{
{
+𝛿𝑒−(π‘Ÿ−𝑃1 (0)πœ€0 )(𝑇−πœπ‘‡) 𝑒−(π‘Ÿ−𝑃1 (0)πœ€0 )(𝑑−(𝑛−1)𝑇) ]) ,
{
{
={
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
{
{
{
σΈ€ 
−(π‘Ÿ−𝑃1σΈ€  (0)πœ€0 )𝑇
{
𝐾
(π‘Ÿ
−
𝑃
)
)
πœ€
(0)
{
0 (1 − 𝛿 − 𝑒
1
{
{
{
,
{
{
−(π‘Ÿ−𝑃1σΈ€  (0)πœ€0 )𝑇 + 𝛿𝑒−(π‘Ÿ−𝑃1σΈ€  (0)πœ€0 )(𝑑−(𝑛+𝜏−1)𝑇) ]
{
{
{ π‘Ÿ [1 − 𝛿 − 𝑒
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] ,
{
∗ (𝑑)
𝐼̂
+𝑒−(π‘š+𝑑𝐽 )𝑇 πœ†π‘ƒ2 (πœ€0 ) 𝑀 ∫ 𝑒(π‘š+𝑑𝐽 )𝑠 𝑑𝑠 + 𝛿𝐽 ]
πœπ‘‡
−1
×𝑒−(π‘š+𝑑𝐽 )πœπ‘‡ ) (1 − (1 − 𝑃𝐽 )𝑒−(π‘š+𝑑𝐽 )𝑇 ) ,
∗
𝑦̂
𝑀 (𝑑)
−𝑑𝑀 (𝑑−(𝑛−1)𝑇)
𝑒
{
{
{
{
∗
+
{
× (𝑦̂
{
𝑀 (0 )
{
{
{
𝑑−(𝑛−1)𝑇
{
{
𝑑𝑀 𝑠
∗
{
(𝑦̂
𝑑𝑠) ,
+
π‘š
∫
{
𝐽 (𝑑) + πœ€) 𝑒
{
{
0
{
{
{
{
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
= { −𝑑𝑀 (𝑑−(𝑛−1)𝑇)
{
𝑒
{
{
{
{
∗Μ‚+ 𝑑𝑀 πœπ‘‡
{ × (𝑦𝑀
(πœπ‘‡ )𝑒
{
{
{
{
𝑑−(𝑛−1)𝑇
{
{
𝑑𝑀 𝑠
∗
{
+π‘š ∫
(𝑦̂
𝑑𝑠) ,
{
𝐽 (𝑑) + πœ€) 𝑒
{
{
πœπ‘‡
{
{
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] ,
{
∗
+
𝑦̂
𝑀 (0 )
= (π‘š [(1 − 𝑃𝑀) ∫
πœπ‘‡
0
𝑇
𝛿𝐼 𝑒
{
{
,
{
σΈ€ 
{
{
1 − (1 − 𝑃𝐼 ) 𝑒−(𝑑𝐼 −𝑔 (0)πœ€0 )𝑇
{
{
{
{
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
={
−(𝑑𝐼 −𝑔󸀠 (0)πœ€0 )(𝑑−(𝑛−1)𝑇)
{
𝛿
(1
−
𝑃
{
𝐼
𝐼) 𝑒
{
{
,
{
{ 1 − (1 − 𝑃𝐼 ) 𝑒−(𝑑𝐼 −𝑔󸀠 (0)πœ€0 )𝑇
{
{
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] ,
{
πœπ‘‡
−1
× (1 − (1 − 𝑃𝑀)𝑒−𝑑𝑀 𝑇 ) ,
∗
Μ‚
(πœπ‘‡+ )
𝑦𝑀
= ( (1 − 𝑃𝑀)
∗
Μ‚
𝑦
𝐽 (𝑑)
πœπ‘‡
−(π‘š+𝑑𝐽 )(𝑑−(𝑛−1)𝑇)
𝑒
{
{
𝑑−(𝑛−1)𝑇 (π‘š+𝑑 )𝑠
{
∗ +
{
𝐽
{
× (𝑦̂
𝑒
𝑑𝑠) ,
{
𝐽 (0 ) + πœ†π‘ƒ2 (πœ€0 ) 𝑀 ∫0
{
{
{
{
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
{
{
{
{𝑒−(π‘š+𝑑𝐽 )(𝑑−(𝑛−1)𝑇)
={
{
Μ‚
{
{
× (𝑦𝐽∗ (πœπ‘‡+ )𝑒(π‘š+𝑑𝐽 )πœπ‘‡
{
{
{
{
{
𝑑−(𝑛−1)𝑇 (π‘š+𝑑 )𝑠
{
𝐽
{
+πœ†π‘ƒ2 (πœ€0 ) 𝑀 ∫πœπ‘‡
𝑒
𝑑𝑠) ,
{
{
{
𝑑
∈
+
𝜏
−
1)
𝑇,
𝑛𝑇] ,
((𝑛
{
∗ +
𝑦̂
𝐽 (0 )
πœπ‘‡
0
𝑑𝑀 𝑠
∗
Μ‚
(𝑦
𝑑𝑠
𝐽 (𝑑) + πœ€) 𝑒
𝑑𝑀 𝑠
∗
Μƒ
𝑑𝑠] 𝑒−𝑑𝑀 𝑇 + 𝛿𝑀)
+ ∫ (𝑦
𝐽 (𝑑) + πœ€) 𝑒
−(𝑑𝐼 −𝑔󸀠 (0)πœ€0 )(𝑑−(𝑛−1)𝑇)
= (πœ†π‘ƒ2 (πœ€0 ) 𝑀 [(1 − 𝑃𝐽 ) ∫
𝑒(π‘š+𝑑𝐽 )𝑠 𝑑𝑠
𝑇
𝑒(π‘š+𝑑𝐽 )𝑠 𝑑𝑠 + ∫ 𝑒(π‘š+𝑑𝐽 )𝑠 𝑑𝑠]
πœπ‘‡
−1
× π‘’−(π‘š+𝑑𝐽 )𝑇 + 𝛿𝐽 ) (1 − (1 − 𝑃𝐽 )𝑒−(π‘š+𝑑𝐽 )𝑇 ) ,
× [π‘š ∫
0
𝑑𝑀 𝑠
∗
(𝑦̂
𝑑𝑠 + π‘šπ‘’−𝑑𝑀 𝑇
𝐽 (𝑑) + πœ€) 𝑒
𝑇
𝑑𝑀 𝑠
∗
Μƒ
× ∫ (𝑦
𝑑𝑠 + 𝛿𝑀] 𝑒−𝑑𝑀 πœπ‘‡ )
𝐽 (𝑑) + πœ€) 𝑒
πœπ‘‡
−1
× (1 − (1 − 𝑃𝑀)𝑒−𝑑𝑀 𝑇 ) .
(54)
∗ (𝑑) → 𝑦∗ (𝑑), π‘₯
∗ (𝑑) → π‘₯∗ (𝑑),
Μ‚
Letting πœ€, πœ€0 → 0, we have 𝑦𝑀
𝑀
∗
∗
∗
∗
∗ (𝑑) → 𝐼∗ (𝑑), 𝑦
Μ‚
Μ‚
𝐼̂
𝐽 (𝑑) → 𝑦𝐽 (𝑑), 𝑦𝑀 (𝑑) → 𝑦𝑀 (𝑑). Together
with (42), (46), (47), and (53), we get π‘₯(𝑑) → π‘₯∗ (𝑑), 𝐼(𝑑) →
∗
(𝑑) as 𝑑 → ∞.
𝐼∗ (𝑑), 𝑦𝐽 (𝑑) → 𝑦𝐽∗ (𝑑), 𝑦𝑀(𝑑) → 𝑦𝑀
Therefore, the susceptible pest-eradication periodic solution
∗
(𝑑)) is globally attractive. Since (37)
(π‘₯∗ (𝑑), 0, 𝐼∗ (𝑑), 𝑦𝐽∗ (𝑑), 𝑦𝑀
implies (30), it follows from Theorem 11 that (π‘₯∗ (𝑑), 0, 𝐼∗ (𝑑),
Abstract and Applied Analysis
11
𝑦𝐽∗ (𝑑)) is locally asymptotically stable. So, the susceptible pest∗
eradication periodic solution (π‘₯∗ (𝑑), 0, 𝐼∗ (𝑑), 𝑦𝐽∗ (𝑑), 𝑦𝑀
(𝑑)) of
system (1) is globally asymptotically stable. The proof is
completed.
4.2. Permanence. Next, we will discuss the permanence of
system (1). In order to facilitate discussion, we give one
lemma.
Lemma 13. There exists a constant π‘š4 > 0, such that π‘₯(𝑑),
𝐼(𝑑), 𝑦𝐽 (𝑑), 𝑦𝑀(𝑑) ≥ π‘š4 for each solution of (1) with 𝑑 large
enough.
so π‘₯(𝑑) ≥ π‘š0 for 𝑑 ≥ 𝑛4∗ 𝑇. Next, we will discuss the rest of
parts.
From (46) and (47), we know that there exists 𝑛5∗ (𝑛5∗ >
max{𝑛1∗ , 𝑛4∗ }) such that 𝐼(𝑑) ≥ 𝐼∗ (𝑑) − πœ€, 𝑦𝐽 (𝑑) ≥ 𝑦𝐽∗ (𝑑) − πœ€, and
∗ (𝑑) − πœ€ for all 𝑑 ≥ 𝑛∗ 𝑇. By (22), (23), and (48), we
𝑦𝑀(𝑑) ≥ 𝑦𝑀
5
have 𝐼(𝑑) ≥ (𝛿𝐼 (1 − 𝑃𝐼 )𝑒−𝑑𝐼 𝑇 /(1 − (1 − 𝑃𝐼 )𝑒−𝑑𝐼 𝑇 )) − πœ€ = π‘š1 > 0,
𝑦𝐽 (𝑑) ≥ (𝛿𝐽 (1 − 𝑃𝐽 )𝑒−(π‘š+𝑑𝐽 )𝑇 /(1 − (1 − 𝑃𝐽 )𝑒−(π‘š+𝑑𝐽 )𝑇 )) − πœ€ = π‘š2 >
∗ (𝑑).
0, and 𝑦𝑀(𝑑) ≥ π‘šπ‘€ −πœ€ = π‘š3 > 0, where π‘šπ‘€ = min0<𝑑≤𝑇 𝑦𝑀
Let π‘š4 = min{π‘š0 , π‘š1 , π‘š2 , π‘š3 }, then π‘₯(𝑑), 𝐼(𝑑), 𝑦𝐽 (𝑑), 𝑦𝑀(𝑑) ≥
π‘š4 for 𝑑 ≥ 𝑛5∗ 𝑇. The proof is completed.
Theorem 14. If
Proof . First, we discuss π‘₯(𝑑). Since 𝑆(𝑑) ≤ 𝑀, by the first
equation of system (1), we have
π‘₯σΈ€  (𝑑) ≥ (π‘Ÿ − 𝑃1σΈ€  (0) 𝑀) π‘₯ (𝑑) (1 −
Δπ‘₯ (𝑑) = 0,
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
𝑑 = 𝑛𝑇.
(55)
Then, we obtain the following comparison system:
πœ’σΈ€  (𝑑) = (π‘Ÿ − 𝑃1σΈ€  (0) 𝑀) πœ’ (𝑑) (1 −
π‘Ÿπœ’ (𝑑)
),
𝐾 (π‘Ÿ − 𝑃1σΈ€  (0) 𝑀)
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇, 𝑑 =ΜΈ 𝑛𝑇,
Δπœ’ (𝑑) = −π›Ώπœ’ (𝑑) ,
Δπœ’ (𝑑) = 0,
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
×∫
0
1
− 𝑑𝑆 𝑇 > ln
,
1 − 𝑃𝑆
∗
𝑦𝑀
(𝑑) 𝑑𝑑
(π‘Ÿ−𝑃1σΈ€  (0)𝑀)𝑇
and (1 − 𝛿)𝑒
> 1, by Lemma 7,
Letting π‘Ÿ >
the system (56) has a positive periodic solution πœ’∗ (𝑑), and for
any solution πœ’(𝑑) of (56), πœ’(𝑑) → πœ’∗ (𝑑) as 𝑑 large enough,
where
σΈ€ 
(57)
According to Lemmas 4 and 7, one may find 𝑛4∗ ∈ N such
that π‘₯(𝑑) ≥ πœ’∗ (𝑑) − πœ€ for 𝑑 ≥ 𝑛4∗ 𝑇. Since πœ’∗ (𝑑) − πœ€ ≥ (𝐾(π‘Ÿ −
σΈ€ 
σΈ€ 
𝑃1σΈ€  (0)𝑀)(1−𝛿−𝑒−(π‘Ÿ−𝑃1 (0)𝑀)𝑇 )/π‘Ÿ(1−𝑒−(π‘Ÿ−𝑃1 (0)𝑀)𝑇 ))−πœ€ = π‘š0 > 0,
(58)
then system (1) is permanent.
Proof. By Lemmas 6 and 13, we have already known
that there exist two constants π‘š4 , 𝑀 > 0, such that
π‘₯(𝑑), 𝐼(𝑑), 𝑦𝐽 (𝑑), 𝑦𝑀(𝑑) ≥ π‘š4 and π‘₯(𝑑), 𝑆(𝑑), 𝐼(𝑑), 𝑦𝐽 (𝑑), 𝑦𝑀(𝑑) ≤
𝑀 for 𝑑 large enough. Thus, we only need to find π‘š∗ > 0
such that 𝑆(𝑑) ≥ π‘š∗ for 𝑑 large enough. We will do this in the
following two steps.
Step 1. Let π‘š5 > 0 and πœ€1 > 0 small enough, so that π‘š5 <
min{(π‘Ÿ/𝑃1σΈ€  (0)), (𝑑𝐼 /𝑔󸀠 (0)), 𝑀} and
𝑇
𝑇
0
0
∗ (𝑑) − πœ€ ) 𝑑𝑑 − ∫ 𝑔 (𝐼̃
∗ (𝑑) + πœ€ ) 𝑑𝑑 − 𝑃󸀠 (0)
Μƒ
𝛽 ∫ 𝑃1 (π‘₯
1
1
2
1
∗
× ∫ (𝑦̃
= πœ‚ > 0,
𝑀 (𝑑) + πœ€1 ) 𝑑𝑑 − 𝑑𝑆 𝑇 − ln
1 − 𝑃𝑆
0
𝑑 = 𝑛𝑇.
𝐾 (π‘Ÿ − 𝑃1σΈ€  (0) 𝑀) (1 − 𝛿 − 𝑒−(π‘Ÿ−𝑃1 (0)𝑀)𝑇 )
{
{
{
σΈ€ 
{
{
{
× (π‘Ÿ [1 − 𝛿 − 𝑒−(π‘Ÿ−𝑃1 (0)𝑀)𝑇
{
{
{
σΈ€ 
{
{
+ 𝛿𝑒−(π‘Ÿ−𝑃1 (0)𝑀)(𝑇−πœπ‘‡)
{
{
{
−1
σΈ€ 
{
{
{
× π‘’−(π‘Ÿ−𝑃1 (0)𝑀)(𝑑−(𝑛−1)𝑇) ]) ,
{
{
πœ’∗ (𝑑) = {
𝑑 ∈ ((𝑛−1) 𝑇, (𝑛+𝜏 − 1)𝑇] ,
{
σΈ€ 
{
σΈ€ 
{
{
𝐾 (π‘Ÿ − 𝑃1 (0) 𝑀) (1 − 𝛿 − 𝑒−(π‘Ÿ−𝑃1 (0)𝑀)𝑇 )
{
{
{
σΈ€ 
{
{
× (π‘Ÿ [1 − 𝛿 − 𝑒−(π‘Ÿ−𝑃1 (0)𝑀)𝑇
{
{
{
{
−1
σΈ€ 
{
{
{
+𝛿𝑒−(π‘Ÿ−𝑃1 (0)𝑀)(𝑑−(𝑛+𝜏−1)𝑇) ]) ,
{
{
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] .
{
0
𝑇
𝑇
(56)
𝑃1σΈ€  (0)𝑀
𝑇
0
π‘Ÿπ‘₯ (𝑑)
),
𝐾 (π‘Ÿ − 𝑃1σΈ€  (0) 𝑀)
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇, 𝑑 =ΜΈ 𝑛𝑇,
Δπ‘₯ (𝑑) = −𝛿π‘₯ (𝑑) ,
𝑇
𝛽 ∫ 𝑃1 (π‘₯∗ (𝑑)) 𝑑𝑑 − ∫ 𝑔 (𝐼∗ (𝑑)) 𝑑𝑑 − 𝑃2σΈ€  (0)
where
σΈ€ 
𝐾 (π‘Ÿ − 𝑃1σΈ€  (0) π‘š5 ) (1 − 𝛿 − 𝑒−(π‘Ÿ−𝑃1 (0)π‘š5 )𝑇 )
{
{
{
{
σΈ€ 
{
{ × (π‘Ÿ [1 − 𝛿 − 𝑒−(π‘Ÿ−𝑃 1 (0)π‘š5 )𝑇
{
{
{
σΈ€ 
{
{
{
+𝛿𝑒−(π‘Ÿ−𝑃1 (0)π‘š5 )(𝑇−πœπ‘‡)
{
{
{
−1
σΈ€ 
{
{
{
× π‘’−(π‘Ÿ−𝑃1 (0)π‘š5 )(𝑑−(𝑛−1)𝑇)]) ,
{
{
{
∗ (𝑑) =
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
π‘₯Μƒ
{
{
{
{
σΈ€ 
−(π‘Ÿ−𝑃1σΈ€  (0)π‘š5 )𝑇
{
)
{
{𝐾 (π‘Ÿ − 𝑃1 (0) π‘š5 ) (1 − 𝛿 − 𝑒
{
σΈ€ 
{
{
−(π‘Ÿ−𝑃
(0)π‘š
)𝑇
5
1
{
× (π‘Ÿ [1 − 𝛿 − 𝑒
{
{
{
{
−1
σΈ€ 
{
{
{
+𝛿𝑒−(π‘Ÿ−𝑃1 (0)π‘š5 )(𝑑−(𝑛+𝜏−1)𝑇) ]) ,
{
{
{
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] ,
{
σΈ€ 
𝛿𝐼 𝑒−(𝑑𝐼 −𝑔 (0)π‘š5 )(𝑑−(𝑛−1)𝑇)
{
{
,
{
σΈ€ 
{
{
1 − (1 − 𝑃𝐼 ) 𝑒−(𝑑𝐼 −𝑔 (0)π‘š5 )𝑇
{
{
{
{
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
{
∗ (𝑑) =
𝐼̃
σΈ€ 
{
{
{ 𝛿𝐼 (1 − 𝑃𝐼 ) 𝑒−(𝑑𝐼 −𝑔 (0)π‘š5 )(𝑑−(𝑛−1)𝑇)
{
{
{
{ 1 − (1 − 𝑃 ) 𝑒−(𝑑𝐼 −𝑔󸀠 (0)π‘š5 )𝑇 ,
{
{
𝐼
{
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] ,
{
(59)
12
Abstract and Applied Analysis
∗
𝑦̃
𝐽 (𝑑)
−1
×𝑒−𝑑𝑀 𝑇 + 𝛿𝑀) (1 − (1 − 𝑃𝑀) 𝑒−𝑑𝑀 𝑇 ) ,
−(π‘š+𝑑𝐽 )(𝑑−(𝑛−1)𝑇)
𝑒
{
{
𝑑−(𝑛−1)𝑇
{
{
{
∗ +
{
× (𝑦̃
𝑒(π‘š+𝑑𝐽 )𝑠 𝑑𝑠) ,
{
𝐽 (0 ) + πœ†π‘ƒ2 (π‘š5 ) 𝑀 ∫
{
{
0
{
{
{
{
{
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
{
{
{
{𝑒−(π‘š+𝑑𝐽 )(𝑑−(𝑛−1)𝑇)
={
{
{
{
× (𝑦𝐽∗Μƒ
(πœπ‘‡+ )𝑒(π‘š+𝑑𝐽 )πœπ‘‡
{
{
{
{
𝑑−(𝑛−1)𝑇
{
{
{
{
+πœ†π‘ƒ
(π‘š
)
𝑀
𝑒(π‘š+𝑑𝐽 )𝑠 𝑑𝑠) ,
∫
{
2
5
{
{
πœπ‘‡
{
{
{
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] ,
{
∗Μƒ+
𝑦𝑀
(πœπ‘‡ )
= ( (1 − 𝑃𝑀)
× [π‘š ∫
0
= (πœ†π‘ƒ2 (π‘š5 ) 𝑀[(1 − 𝑃𝐽 )∫
0
(π‘š+𝑑𝐽 )𝑠
𝑒
𝑑𝑀 𝑠
∗
(𝑦̃
𝑑𝑠
𝐽 (𝑑) + πœ€1 ) 𝑒
𝑇
𝑑𝑀 𝑠
∗
𝑑𝑠 + 𝛿𝑀]
+ π‘šπ‘’−𝑑𝑀 𝑇 ∫ (𝑦̃
𝐽 (𝑑) + πœ€1 ) 𝑒
πœπ‘‡
−1
×𝑒−𝑑𝑀 πœπ‘‡ ) (1 − (1 − 𝑃𝑀) 𝑒−𝑑𝑀 𝑇 ) .
∗ +
𝑦̃
𝐽 (0 )
πœπ‘‡
πœπ‘‡
(60)
𝑇
(π‘š+𝑑𝐽 )𝑠
𝑑𝑠 +∫ 𝑒
πœπ‘‡
−1
× π‘’−(π‘š+𝑑𝐽 )𝑇 + 𝛿𝐽 ) (1 − (1 − 𝑃𝐽 )𝑒−(π‘š+𝑑𝐽 )𝑇 ) ,
𝑦𝐽∗Μƒ
(πœπ‘‡+ )
𝑑𝑠]
We shall prove that one cannot have 𝑆(𝑑) < π‘š5 for all 𝑑 > 0,
otherwise
π‘₯σΈ€  (𝑑) ≥ (π‘Ÿ − 𝑃1σΈ€  (0) π‘š5 ) π‘₯ (𝑑) (1 −
π‘Ÿπ‘₯ (𝑑)
),
𝐾 (π‘Ÿ − 𝑃1σΈ€  (0) π‘š5 )
𝐼󸀠 (𝑑) ≤ − (𝑑𝐼 − 𝑔󸀠 (0) π‘š5 ) 𝐼 (𝑑) ,
= ( (1 − 𝑃𝐽 )
𝑦𝐽󸀠 (𝑑) ≤ πœ†π‘ƒ2 (π‘š5 ) 𝑀 − (𝑑𝐽 + π‘š) 𝑦𝐽 (𝑑) ,
× [πœ†π‘ƒ2 (π‘š5 ) 𝑀 ∫
πœπ‘‡
0
𝑒(π‘š+𝑑𝐽 )𝑠 𝑑𝑠 + 𝑒−(π‘š+𝑑𝐽 )𝑇
𝑇
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇,
(π‘š+𝑑𝐽 )𝑠
× πœ†π‘ƒ2 (π‘š5 ) 𝑀 ∫ 𝑒
πœπ‘‡
σΈ€ 
𝑦𝑀
(𝑑) = π‘šπ‘¦π½ (𝑑) − 𝑑𝑀𝑦𝑀 (𝑑) ,
𝑑𝑠 + 𝛿𝐽 ]
−1
×𝑒−(π‘š+𝑑𝐽 )πœπ‘‡ ) (1 − (1 − 𝑃𝐽 )𝑒−(π‘š+𝑑𝐽 )𝑇 ) ,
∗
Μƒ
𝑦
𝑀 (𝑑)
𝑑 =ΜΈ 𝑛𝑇,
Δπ‘₯ (𝑑) = −𝛿π‘₯ (𝑑) ,
Δ𝐼 (𝑑) = −𝑃𝐼 𝐼 (𝑑) ,
(61)
Δ𝑦𝐽 (𝑑) = −𝑃𝐽 𝑦𝐽 (𝑑) ,
−𝑑𝑀 (𝑑−(𝑛−1)𝑇)
𝑒
{
{
{
𝑑−(𝑛−1)𝑇
{
{
{
∗
+) + π‘š ∫
Μƒ
{
×
(
𝑦
(0
{
𝑀
{
{
0
{
{
{
{
𝑑𝑀 𝑠
∗
{
× (𝑦̃
𝑑𝑠) ,
{
𝐽 (𝑑) + πœ€1 ) 𝑒
{
{
{
{
{
{
𝑑 ∈ ((𝑛 − 1) 𝑇, (𝑛 + 𝜏 − 1) 𝑇] ,
={
−𝑑
(𝑑−(𝑛−1)𝑇)
{𝑒 𝑀
{
{
{
{
∗
{
Μƒ
× (𝑦𝑀
(πœπ‘‡+ )𝑒𝑑𝑀 πœπ‘‡
{
{
{
{
{
𝑑−(𝑛−1)𝑇
{
{
𝑑𝑀 𝑠
{
∗
Μƒ
{
+
π‘š
(𝑦
𝑑𝑠) ,
∫
{
𝐽 (𝑑) + πœ€1 ) 𝑒
{
{
πœπ‘‡
{
{
{
𝑑 ∈ ((𝑛 + 𝜏 − 1) 𝑇, 𝑛𝑇] ,
{
∗
+
𝑦̃
𝑀 (0 )
πœπ‘‡
= (π‘š [(1 − 𝑃𝑀) ∫
0
𝑇
𝑑𝑀 𝑠
∗
(𝑦̃
𝑑𝑠
𝐽 (𝑑) + πœ€1 ) 𝑒
𝑑𝑀 𝑠
∗
𝑑𝑠]
+ ∫ (𝑦̃
𝐽 (𝑑) + πœ€1 ) 𝑒
πœπ‘‡
Δ𝑦𝑀 (𝑑) = −𝑃𝑀𝑦𝑀 (𝑑) ,
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
Δπ‘₯ (𝑑) = 0,
Δ𝐼 (𝑑) = 𝛿𝐼 ,
Δ𝑦𝐽 (𝑑) = 𝛿𝐽 ,
Δ𝑦𝑀 (𝑑) = 𝛿𝑀,
𝑑 = 𝑛𝑇.
Analyzing (61) with similarity as (40), it is easy to obtain that
∗ (𝑑) −
Μƒ
there exists a positive constant 𝑛6∗ , such that π‘₯(𝑑) ≥ π‘₯
∗
∗
∗
Μƒ
Μƒ
(𝑑) + πœ€1 , 𝑦𝐽 (𝑑) ≤ 𝑦
πœ€1 , 𝐼(𝑑) ≤ 𝐼̃
𝐽 (𝑑) + πœ€1 , 𝑦𝑀 (𝑑) ≤ 𝑦𝑀 (𝑑) + πœ€1 for
𝑑 ≥ 𝑛6∗ 𝑇. Therefore,
∗ (𝑑) − πœ€ ) 𝑆 (𝑑) − 𝑔 (𝐼̃
∗ (𝑑) + πœ€ ) 𝑆 (𝑑)
Μƒ
𝑆󸀠 (𝑑) ≥ 𝛽𝑃1 (π‘₯
1
1
∗
− 𝑃2σΈ€  (0) (𝑦̃
𝑀 (𝑑) + πœ€1 ) 𝑆 (𝑑) − 𝑑𝑆 𝑆 (𝑑) ,
Abstract and Applied Analysis
13
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇, 𝑑 =ΜΈ 𝑛𝑇,
Δ𝑆 (𝑑) = −𝑃𝑆 𝑆 (𝑑) , 𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
Δ𝑆 (𝑑) = 0, 𝑑 = 𝑛𝑇,
𝑛6∗ 𝑇.
for 𝑑 ∈ [𝑑2 , 𝑑2 +𝑛2 𝑇]. Integrating (66) on [𝑑2 , 𝑑2 +𝑛2 𝑇], we have
𝑆 (𝑑2 + 𝑛2 𝑇) ≥ 𝑆 (𝑑2+ ) 𝑒𝑛2 πœŽπ‘‡
= (1 − 𝑃𝑆 ) π‘š5 𝑒𝑛2 πœŽπ‘‡
(62)
𝑛6∗ .
for 𝑑 ≥
Let 𝑁0 ∈ N and (𝑁0 + 𝜏 − 1) ≥
Integrating
(62) on ((𝑛 + 𝜏 − 1)𝑇, (𝑛 + 𝜏)𝑇], 𝑛 ≥ 𝑁0 , we have
𝑆 ((𝑛 + 𝜏) 𝑇)
≥ 𝑆 ((𝑛 + 𝜏 − 1) 𝑇) (1 − 𝑃𝑆 )
(𝑛+𝜏)𝑇
∗
∗ (𝑑)−πœ€ )−𝑔(𝐼̃
∗ (𝑑)+πœ€ )−𝑃󸀠 (0)(𝑦
Μƒ
Μƒ
1
1
2
𝑀 (𝑑)+πœ€1 )−𝑑𝑆 )𝑑𝑑
× π‘’∫(𝑛+𝜏−1)𝑇 (𝛽𝑃1 (π‘₯
(63)
= 𝑆 ((𝑛 + 𝜏 − 1) 𝑇) π‘’πœ‚ .
Then 𝑆((𝑁0 + 𝜏 + π‘˜)𝑇) ≥ 𝑆((𝑁0 + 𝜏)𝑇)π‘’π‘˜πœ‚ → ∞ as π‘˜ → ∞,
which is a contradiction. So there exists a 𝑑1 (𝑑1 > 𝑛6∗ 𝑇) such
that 𝑆(𝑑1 ) ≥ π‘š5 .
Step 2. If 𝑆(𝑑) ≥ π‘š5 for all 𝑑 ≥ 𝑑1 , then Our purpose is
obtained. If not, let 𝑑2 = inf{𝑑 > 𝑑1 | 𝑆(𝑑) < π‘š5 }. Then
𝑆(𝑑) ≥ π‘š5 for 𝑑 ∈ [𝑑1 , 𝑑2 ) and 𝑆(𝑑2 ) = π‘š5 . In this step, we
consider two possible cases for 𝑑2 .
Case 1. 𝑑2 = (𝑛1 + 𝜏 − 1)𝑇, 𝑛1 ∈ N. Then 𝑆(𝑑2+ ) = (1 −
𝑃𝑆 )𝑆(𝑑2 ) < π‘š5 . Select 𝑛2 , 𝑛3 ∈ N such that (𝑛2 − 1) ≥ 𝑛6∗
and (1 − 𝑃𝑆 )𝑛2 𝑒𝑛3 πœ‚+𝑛2 πœŽπ‘‡ > (1 − 𝑃𝑆 )𝑛2 𝑒𝑛3 πœ‚+(𝑛2 +1)πœŽπ‘‡ > 1, where
Μƒ = (𝑛2 + 𝑛3 )𝑇,
𝜎 = 𝛽𝑃1 (π‘š4 ) − 𝑔(𝑀) − 𝑃2σΈ€  (0)𝑀 − 𝑑𝑆 < 0. Let 𝑇
Μƒ such that
then we have the claim: there exists 𝑑3 ∈ (𝑑2 , 𝑑2 + 𝑇]
𝑆(𝑑3 ) ≥ π‘š5 . If the claim is false, we will get a contradiction in
the following.
∗ (𝑑) − πœ€ , 𝐼(𝑑) ≤
Μƒ
According to Step 1, we have π‘₯(𝑑) ≥ π‘₯
1
∗
∗
∗
Μƒ
Μƒ
(𝑑) + πœ€1 , 𝑦𝐽 (𝑑) ≤ 𝑦
(𝑑)
+
πœ€
,
𝑦
(𝑑)
≤
𝑦
(𝑑)
+
πœ€
𝐼̃
1 𝑀
1 for 𝑑 ≥
𝐽
𝑀
(𝑛1 + 𝑛2 − 1)𝑇. Then, we have
∗ (𝑑) − πœ€ ) 𝑆 (𝑑) − 𝑔 (𝐼̃
∗ (𝑑) + πœ€ ) 𝑆 (𝑑)
Μƒ
𝑆󸀠 (𝑑) ≥ 𝛽𝑃1 (π‘₯
1
1
∗
− 𝑃2σΈ€  (0) (𝑦̃
𝑀 (𝑑) + πœ€1 ) 𝑆 (𝑑) − 𝑑𝑆 𝑆 (𝑑) ,
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇, 𝑑 =ΜΈ 𝑛𝑇,
Δ𝑆 (𝑑) = −𝑃𝑆 𝑆 (𝑑) ,
(64)
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
Δ𝑆 (𝑑) = 0,
𝑑 = 𝑛𝑇,
Μƒ As in Step 1, we have
for 𝑑 ∈ [𝑑2 + 𝑛2 𝑇, 𝑑2 + 𝑇].
Μƒ ≥ 𝑆 (𝑑2 + 𝑛2 𝑇) 𝑒𝑛3 πœ‚ .
𝑆 (𝑑2 + 𝑇)
(65)
Since π‘₯(𝑑) ≥ π‘š4 , 𝐼(𝑑) ≤ 𝑀, 𝑦𝑀(𝑑) ≤ 𝑀 and 𝑃2 (𝑆(𝑑)) <
𝑃2σΈ€  (0)𝑆(𝑑), we have
σΈ€ 
𝑆 (𝑑)
≥ (𝛽𝑃1 (π‘š4 ) − 𝑔 (𝑀) −
𝑃2σΈ€ 
(0) 𝑀 − 𝑑𝑆 ) 𝑆 (𝑑) = πœŽπ‘† (𝑑) ,
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇,
Δ𝑆 (𝑑) = −𝑃𝑆 𝑆 (𝑑) ,
Δ𝑆 (𝑑) = 0,
𝑑 =ΜΈ 𝑛𝑇,
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
(67)
𝑛
≥ (1 − 𝑃𝑆 ) 2 π‘š5 𝑒𝑛2 πœŽπ‘‡ .
Μƒ
Thus, by (65) and (67), we have 𝑆(𝑑2 + 𝑇)
≥ (1 −
𝑛2
𝑛3 πœ‚+𝑛2 πœŽπ‘‡
𝑃𝑆 ) π‘š5 𝑒
> π‘š5 , which is a contradiction. Let 𝑑4 =
inf{𝑑 > 𝑑2 | 𝑆(𝑑) ≥ π‘š5 }, then for 𝑑 ∈ [𝑑2 , 𝑑4 ), 𝑆(𝑑) < π‘š5 and
𝑆(𝑑4 ) = π‘š5 . So, 𝑆(𝑑) ≥ 𝑆(𝑑2+ )π‘’πœŽ(𝑑−𝑑2 ) = (1 − 𝑃𝑆 )π‘š5 π‘’πœŽ(𝑑−𝑑2 ) ≥
Μƒ1 for 𝑑 ∈ [𝑑2 , 𝑑4 ).
(1 − 𝑃𝑆 )𝑛2 +𝑛3 π‘š5 π‘’πœŽ(𝑛2 +𝑛3 )𝑇 = π‘š
Case 2 (𝑑2 =ΜΈ (𝑛1 + 𝜏 − 1)𝑇, 𝑛1 ∈ N). Suppose that 𝑑2 ∈ ((𝑛1σΈ€  +
𝜏 − 1)𝑇, (𝑛1σΈ€  + 𝜏)𝑇), 𝑛1σΈ€  ∈ N. 𝑆(𝑑) ≥ π‘š5 for 𝑑 ∈ [𝑑1 , 𝑑2 ) and
𝑆(𝑑2 ) = π‘š5 . There are two possible cases for 𝑑 ∈ (𝑑2 , (𝑛1σΈ€  + 𝜏)𝑇).
Case 2a. If 𝑆(𝑑) ≤ π‘š5 for all 𝑑 ∈ (𝑑2 , (𝑛1σΈ€  + 𝜏)𝑇), similar to Case
Μƒ
1, we can prove there exists a 𝑑3σΈ€  ∈ ((𝑛1σΈ€  + 𝜏)𝑇, (𝑛1σΈ€  + 𝜏)𝑇 + 𝑇]
such that 𝑆(𝑑3σΈ€  ) ≥ π‘š5 . Let 𝑑4σΈ€  = inf{𝑑 > 𝑑2 | 𝑆(𝑑) ≥ π‘š5 }, then for
𝑑 ∈ [𝑑2 , 𝑑4σΈ€  ), 𝑆(𝑑) < π‘š5 and 𝑆(𝑑4σΈ€  ) = π‘š5 . So, 𝑆(𝑑) ≥ 𝑆(𝑑2 )π‘’πœŽ(𝑑−𝑑2 ) =
Μƒ1 for all
π‘š5 π‘’πœŽ(𝑑−𝑑2 ) ≥ (1 − 𝑃𝑆 )𝑛2 +𝑛3 π‘š5 π‘’πœŽ(𝑛2 +𝑛3 +1)𝑇 = π‘š∗ < π‘š
𝑑 ∈ [𝑑2 , 𝑑4σΈ€  ).
Case 2b. If there exists a 𝑑 ∈ (𝑑2 , (𝑛1σΈ€  +𝜏)𝑇) such that 𝑆(𝑑) ≥ π‘š5 .
Let 𝑑4σΈ€  = inf{𝑑 > 𝑑2 | 𝑆(𝑑) ≥ π‘š5 }, then for 𝑑 ∈ [𝑑2 , 𝑑4σΈ€  ), 𝑆(𝑑) <
π‘š5 and 𝑆(𝑑4σΈ€  ) = π‘š5 . So, 𝑆(𝑑) ≥ 𝑆(𝑑2 )π‘’πœŽ(𝑑−𝑑2 ) = π‘š5 π‘’πœŽ(𝑑−𝑑2 ) ≥
π‘š5 π‘’πœŽπ‘‡ > π‘š∗ for all 𝑑 ∈ [𝑑2 , 𝑑4σΈ€  ).
Since 𝑆(𝑑) ≥ π‘š5 for some 𝑑 ≥ 𝑑1 , in both cases a similar
discussion can be continued. The proof is completed.
5. Numerical Simulations and Conclusions
In this section, we will give an example and its simulations to
show the efficiency of the criteria derived in Section 4.
In system (1), let 𝑃1 (π‘₯(𝑑)) = π‘Žπ‘₯(𝑑), 𝑔(𝐼(𝑑)) = 𝑏𝐼(𝑑),
and 𝑃2 (𝑆(𝑑)) = β„Ž(1 − 𝑒−𝑐𝑆(𝑑) ), π‘Ž, 𝑏, 𝑐, β„Ž > 0. Namely,
𝑃1 (π‘₯(𝑑)) describes an Holling type-I functional response of
the pest, 𝑃2 (𝑆(𝑑)) describes a Ivlev-type functional response
of the pest ’s natural predator. Therefore, we consider the pest
management model with impulsive releasing and harvesting
at two different fixed moments:
π‘₯σΈ€  (𝑑) = π‘Ÿπ‘₯ (𝑑) (1 −
π‘₯ (𝑑)
) − π‘Žπ‘₯ (𝑑) 𝑆 (𝑑) ,
𝐾
𝑆󸀠 (𝑑) = π›½π‘Žπ‘₯ (𝑑) 𝑆 (𝑑) − 𝑏𝐼 (𝑑) 𝑆 (𝑑)
− β„Ž (1 − 𝑒−𝑐𝑆(𝑑) ) 𝑦𝑀 (𝑑) − 𝑑𝑆 𝑆 (𝑑) ,
𝐼󸀠 (𝑑) = 𝑏𝐼 (𝑑) 𝑆 (𝑑) − 𝑑𝐼 𝐼 (𝑑) ,
𝑦𝐽󸀠 (𝑑) = πœ†β„Ž (1 − 𝑒−𝑐𝑆(𝑑) ) 𝑦𝑀 (𝑑) − 𝑑𝐽 𝑦𝐽 (𝑑) − π‘šπ‘¦π½ (𝑑) ,
σΈ€ 
𝑦𝑀
(𝑑) = π‘šπ‘¦π½ (𝑑) − 𝑑𝑀𝑦𝑀 (𝑑) ,
𝑑 =ΜΈ (𝑛 + 𝜏 − 1) 𝑇,
𝑑 = 𝑛𝑇,
(66)
𝑑 =ΜΈ 𝑛𝑇,
14
Abstract and Applied Analysis
20
6
15
4
𝑆
π‘₯ 10
2
5
0
0
10
20
30
0
40
0
10
20
𝑑
40
30
40
𝑑
(a)
(b)
3
2
1.5
2
π‘Œπ½
𝐼
1
0
30
1
0.5
0
10
20
30
0
40
0
10
20
𝑑
𝑑
(c)
(d)
4
π‘Œπ‘€
3
2
1
0
0
10
20
30
40
𝑑
(e)
Figure 1: Time series of the system (68) with π‘Ÿ = 8, 𝐾 = 10, π‘Ž = 0.8, 𝛽 = 0.5, 𝑏 = 0.3, β„Ž = 8, 𝑐 = 0.2, πœ† = 0.6, π‘š = 2, 𝑑𝑆 = 0.2, 𝑑𝐼 = 0.5,
𝑑𝐽 = 0.4, 𝑑𝑀 = 0.2, 𝛿 = 0.4, 𝑃𝑆 = 𝑃𝐼 = 𝑃𝐽 = 𝑃𝑀 = 0.2, 𝛿𝐼 = 0.2, 𝛿𝐽 = 0.3, 𝛿𝑀 = 0.5, 𝜏 = 0.3, 𝑇 = 0.5, π‘₯(0) = 20, 𝑆(0) = 2, 𝐼(0) = 2, 𝑦𝐽 (0) = 0.5,
𝑦𝑀 (0) = 0.5.
Δπ‘₯ (𝑑) = −𝛿π‘₯ (𝑑) ,
Δ𝑦𝑀 (𝑑) = 𝛿𝑀,
Δ𝑆 (𝑑) = −𝑃𝑆 𝑆 (𝑑) ,
𝑑 = 𝑛𝑇.
(68)
Δ𝐼 (𝑑) = −𝑃𝐼 𝐼 (𝑑) ,
Δ𝑦𝐽 (𝑑) = −𝑃𝐽 𝑦𝐽 (𝑑) ,
Δ𝑦𝑀 (𝑑) = −𝑃𝑀𝑦𝑀 (𝑑) ,
𝑑 = (𝑛 + 𝜏 − 1) 𝑇,
Δπ‘₯ (𝑑) = 0,
Δ𝑆 (𝑑) = 0,
Δ𝐼 (𝑑) = 𝛿𝐼 ,
Δ𝑦𝐽 (𝑑) = 𝛿𝐽 ,
So, by (22), (23), and (25), we have
𝑇
𝛽 ∫ 𝑃1 (π‘₯∗ (𝑑)) 𝑑𝑑 =
0
π›½π‘ŽπΎ
(π‘Ÿπ‘‡ + ln (1 − 𝛿)) = πœƒ1 ,
π‘Ÿ
𝑇
∫ 𝑔 (𝐼∗ (𝑑)) 𝑑𝑑
0
=
𝑏𝛿𝐼 [1 − 𝑒−𝑑𝐼 πœπ‘‡ + (1 − 𝑃𝐼 ) (𝑒−𝑑𝐼 πœπ‘‡ − 𝑒−𝑑𝐼 𝑇 )]
= πœƒ2 ,
𝑑𝐼 (1 − (1 − 𝑃𝐼 ) 𝑒−𝑑𝐼 𝑇 )
Abstract and Applied Analysis
15
4
1.6
3.8
3.6
1.4
3.4
1.2
1
π‘Œπ‘€
𝐼
3.2
3
2.8
0.8
2.6
2.4
0.6
2.2
0.4
2
5
6
7
8
9
10
0
0.2
0.4
0.6
π‘Œπ½
π‘₯
(a)
(b)
Figure 2: Phase portrait of the system (68) with π‘Ÿ = 8, 𝐾 = 10, π‘Ž = 0.8, 𝛽 = 0.5, 𝑏 = 0.3, β„Ž = 8, 𝑐 = 0.2, πœ† = 0.6, π‘š = 2, 𝑑𝑆 = 0.2, 𝑑𝐼 = 0.5,
𝑑𝐽 = 0.4, 𝑑𝑀 = 0.2, 𝛿 = 0.4, 𝑃𝑆 = 𝑃𝐼 = 𝑃𝐽 = 𝑃𝑀 = 0.2, 𝛿𝐼 = 0.2, 𝛿𝐽 = 0.3, 𝛿𝑀 = 0.5, 𝜏 = 0.3, 𝑇 = 0.5, π‘₯(0) = 20, 𝑆(0) = 2, 𝐼(0) = 2, 𝑦𝐽 (0) = 0.5,
𝑦𝑀 (0) = 0.5.
where
𝑇
∗
∫ 𝑦𝑀
(𝑑) 𝑑𝑑
∗
(0+ ) =
𝑦𝑀
0
=
∗
(0+ )
𝑦𝑀
(1 − 𝑒−𝑑𝑀 πœπ‘‡)
𝑑𝑀
+
∗
𝑦𝑀
(πœπ‘‡+ ) =
π‘šπ›Ώπ½
𝐴 (πœπ‘‡) =
(1 − (1 − 𝑃𝐽 ) 𝑒−(π‘š+𝑑𝐽 )𝑇 ) (𝑑𝑀 − (π‘š + 𝑑𝐽 ))
×(
1 − 𝑒−(π‘š+𝑑𝐽 )πœπ‘‡ 1 − 𝑒−𝑑𝑀 πœπ‘‡
−
)
π‘š + 𝑑𝐽
𝑑𝑀
𝐡 (𝑇) =
(1 − (1 − 𝑃𝐽 ) 𝑒−(π‘š+𝑑𝐽 )𝑇 ) (𝑑𝑀 − (π‘š + 𝑑𝐽 ))
π‘šπ›Ώπ½ (𝑒(𝑑𝑀 −(π‘š+𝑑𝐽 ))πœπ‘‡ − 1)
(1 − (1 − 𝑃𝐽 ) 𝑒−(π‘š+𝑑𝐽 )𝑇 ) (𝑑𝑀 − (π‘š + 𝑑𝐽 ))
,
π‘šπ›Ώπ½ (1 − 𝑃𝐽 ) (𝑒(𝑑𝑀 −(π‘š+𝑑𝐽 ))𝑇 − 𝑒(𝑑𝑀 −(π‘š+𝑑𝐽 ))πœπ‘‡ )
(1 − (1 − 𝑃𝐽 ) 𝑒−(π‘š+𝑑𝐽 )𝑇 ) (𝑑𝑀 − (π‘š + 𝑑𝐽 ))
,
.
(𝑇2) If πœƒ1 − πœƒ2 − β„Žπ‘π‘’−π‘π‘€πœƒ3 − 𝑑𝑆 𝑇 < ln(1/(1 − 𝑃𝑆 )),
then the susceptible pest-eradication periodic solu∗
(𝑑)) of system (68) is
tion (π‘₯∗ (𝑑), 0, 𝐼∗ (𝑑), 𝑦𝐽∗ (𝑑), 𝑦𝑀
globally asymptotically stable, where 𝑀 is defined in
Lemma 6.
(𝑇3) If πœƒ1 − πœƒ2 − β„Žπ‘πœƒ3 − 𝑑𝑆 𝑇 > ln(1/(1 − 𝑃𝑆 ), then system
(68) is permanent.
𝑒−(π‘š+𝑑𝐽 )πœπ‘‡ − 𝑒−(π‘š+𝑑𝐽 )𝑇
π‘š + 𝑑𝐽
−
1 − (1 − 𝑃𝑀) 𝑒−𝑑𝑀 𝑇
(𝑇1) If πœƒ1 − πœƒ2 − πœƒ3 − 𝑑𝑆 𝑇 < ln(1/(1 − 𝑃𝑆 )), then the
susceptible pest-eradication periodic solution (π‘₯∗ (𝑑),
∗
(𝑑)) of system (68) is locally asymp0, 𝐼∗ (𝑑), 𝑦𝐽∗ (𝑑), 𝑦𝑀
totically stable.
π‘šπ›Ώπ½ (1 − 𝑃𝐽 )
×(
(1 − 𝑃𝑀) [𝐴 (πœπ‘‡) + 𝑒−𝑑𝑀 𝑇 𝐡 (𝑇) + 𝛿𝑀] 𝑒−𝑑𝑀 πœπ‘‡
Then, by Theorems 11 and 14, we have the following.
𝑦∗ (πœπ‘‡+ ) 𝑒𝑑𝑀 πœπ‘‡ −𝑑𝑀 πœπ‘‡ 𝑑𝑀 𝑇
(𝑒
−𝑒 )
+ 𝑀
𝑑𝑀
+
[(1 − 𝑃𝑀) 𝐴 (πœπ‘‡) + 𝐡 (𝑇)] 𝑒−𝑑𝑀 𝑇 + 𝛿𝑀
,
1 − (1 − 𝑃𝑀) 𝑒−𝑑𝑀 𝑇
𝑒−𝑑𝑀 πœπ‘‡ − 𝑒−𝑑𝑀 𝑇 (𝑑𝑀 −(π‘š+𝑑𝐽 ))πœπ‘‡
𝑒
)
𝑑𝑀
= πœƒ3 ,
(69)
In the following, we analyze the locally asymptotical
stability of the susceptible pest-eradication periodic solution
and permanence of system (68).
16
Abstract and Applied Analysis
0.4
20
0.3
15
π‘₯
0.2
𝑆
10
5
0.1
0
20
40
60
0
80
0
20
40
(a)
2
1.5
1.5
1
1
0.5
0.5
0
80
(b)
2
π‘Œπ½
𝐼
60
𝑑
𝑑
0
20
40
60
0
80
0
20
40
𝑑
60
80
𝑑
(c)
(d)
3.5
π‘Œπ‘€
3
2.5
2
1.5
0
20
40
60
80
𝑑
(e)
Figure 3: Time series of the system (68) with π‘Ÿ = 8, 𝐾 = 10, π‘Ž = 0.8, 𝛽 = 0.5, 𝑏 = 0.3, β„Ž = 8, 𝑐 = 0.2, πœ† = 0.6, π‘š = 2, 𝑑𝑆 = 0.2, 𝑑𝐼 = 0.5,
𝑑𝐽 = 0.4, 𝑑𝑀 = 0.2, 𝛿 = 0.4, 𝑃𝑆 = 𝑃𝐼 = 𝑃𝐽 = 𝑃𝑀 = 0.2, 𝛿𝐼 = 0.2, 𝛿𝐽 = 0.3, 𝛿𝑀 = 0.5, 𝜏 = 0.3, 𝑇 = 1, π‘₯(0) = 20, 𝑆(0) = 0.2, 𝐼(0) = 2, 𝑦𝐽 (0) = 2,
𝑦𝑀 (0) = 2.
Assume that π‘₯(0) = 20, 𝑆(0) = 2, 𝐼(0) = 2, 𝑦𝐽 (0) = 0.5,
𝑦𝑀(0) = 0.5, π‘Ÿ = 8, 𝐾 = 10, π‘Ž = 0.8, 𝛽 = 0.5, 𝑏 = 0.3, β„Ž = 8,
𝑐 = 0.2, πœ† = 0.6, π‘š = 2, 𝑑𝑆 = 0.2, 𝑑𝐼 = 0.5, 𝑑𝐽 = 0.4, 𝑑𝑀 = 0.2,
𝛿 = 0.4, 𝑃𝑆 = 𝑃𝐼 = 𝑃𝐽 = 𝑃𝑀 = 0.2, 𝛿𝐼 = 0.2, 𝛿𝐽 = 0.3,
𝛿𝑀 = 0.5, 𝜏 = 0.3, 𝑇 = 0.5. Obviously, the condition of (T1)
is satisfied, then the susceptible pest-eradication periodic
solution of system (68) is locally asymptotically stable, which
can be seen from the numerical simulation in Figures 1 and 2.
Assume that π‘₯(0) = 20, 𝑆(0) = 0.2, 𝐼(0) = 2, 𝑦𝐽 (0) = 2,
𝑦𝑀(0) = 2, π‘Ÿ = 8, 𝐾 = 10, π‘Ž = 0.8, 𝛽 = 0.5, 𝑏 = 0.3, β„Ž = 8,
𝑐 = 0.2, πœ† = 0.6, π‘š = 2, 𝑑𝑆 = 0.2, 𝑑𝐼 = 0.5, 𝑑𝐽 = 0.4, 𝑑𝑀 = 0.2,
𝛿 = 0.4, 𝑃𝑆 = 𝑃𝐼 = 𝑃𝐽 = 𝑃𝑀 = 0.2, 𝛿𝐼 = 0.2, 𝛿𝐽 = 0.3,
𝛿𝑀 = 0.5, 𝜏 = 0.3, 𝑇 = 1. Obviously, the condition of (T3) is
satisfied. Then, system (68) is permanent, which can also be
seen from Figures 3 and 4.
From results of the numerical simulation, we know that
there exists an impulsive harvesting(or releasing) periodic
threshold 𝑇∗ , which satisfies 0.5 < 𝑇∗ < 1. If 𝑇 < 𝑇∗ and
the other parameters are fixed (π‘Ÿ = 8, 𝐾 = 10, π‘Ž = 0.8,
𝛽 = 0.5, 𝑏 = 0.3, β„Ž = 8, 𝑐 = 0.2, πœ† = 0.6, π‘š = 2,
𝑑𝑆 = 0.2, 𝑑𝐼 = 0.5, 𝑑𝐽 = 0.4, 𝑑𝑀 = 0.2, 𝛿 = 0.4, 𝑃𝑆 =
𝑃𝐼 = 𝑃𝐽 = 𝑃𝑀 = 0.2, 𝛿𝐼 = 0.2, 𝛿𝐽 = 0.3, 𝛿𝑀 = 0.5, 𝜏 =
0.3, 𝑇 = 0.5.), then the susceptible pest-eradication periodic
∗
(𝑑)) of system (68) is locally
solution (π‘₯∗ (𝑑), 0, 𝐼∗ (𝑑), 𝑦𝐽∗ (𝑑), 𝑦𝑀
∗
asymptotically stable. If 𝑇 > 𝑇 and the other parameters are
fixed (π‘Ÿ = 8, 𝐾 = 10, π‘Ž = 0.8, 𝛽 = 0.5, 𝑏 = 0.3, β„Ž = 8, 𝑐 = 0.2,
πœ† = 0.6, π‘š = 2, 𝑑𝑆 = 0.2, 𝑑𝐼 = 0.5, 𝑑𝐽 = 0.4, 𝑑𝑀 = 0.2,
𝛿 = 0.4, 𝑃𝑆 = 𝑃𝐼 = 𝑃𝐽 = 𝑃𝑀 = 0.2, 𝛿𝐼 = 0.2, 𝛿𝐽 = 0.3,
𝛿𝑀 = 0.5, 𝜏 = 0.3, 𝑇 = 0.5.), then system (68) is permanent.
The same discussion can be applied to other parameters.
In this paper, we proposed a pest management model with
impulsive releasing (periodic infective pests, immature and
mature natural enemies releasing) and harvesting (periodic
crops harvesting) at two different fixed moments. By means
Abstract and Applied Analysis
17
0.16
𝑆
3.2
0.18
3
0.16
2.8
0.14
0.14
0.12
0.12
𝑆
0.1
2.6
π‘Œπ‘€
0.18
0.2
0.1
2.4
2.2
0.08
0.08
0.06
0.06
2
0.04
0.04
1.8
0.02
0.02
1.6
6
8
π‘₯
10
0.2
(a)
0.4
0.6
0
0.2
𝐼
(b)
0.4
0.6
π‘Œπ½
(c)
Figure 4: Phase portrait of the system (68) with π‘Ÿ = 8, 𝐾 = 10, π‘Ž = 0.8, 𝛽 = 0.5, 𝑏 = 0.3, β„Ž = 8, 𝑐 = 0.2, πœ† = 0.6, π‘š = 2, 𝑑𝑆 = 0.2, 𝑑𝐼 = 0.5,
𝑑𝐽 = 0.4, 𝑑𝑀 = 0.2, 𝛿 = 0.4, 𝑃𝑆 = 𝑃𝐼 = 𝑃𝐽 = 𝑃𝑀 = 0.2, 𝛿𝐼 = 0.2, 𝛿𝐽 = 0.3, 𝛿𝑀 = 0.5, 𝜏 = 0.3, 𝑇 = 1, π‘₯(0) = 20, 𝑆(0) = 0.2, 𝐼(0) = 2, 𝑦𝐽 (0) = 2,
𝑦𝑀 (0) = 2.
of Floquet theory and multicomparison results for impulsive
differential equations, two sufficient conditions ensuring the
locally and globally asymptotical stability of the susceptible
pest-eradication period solution and permanence of the
system are derived.
Acknowledgments
This work is supported partially by National Natural Science
Foundation of China under Grant no. 10971240 and no.
61004042, Key Project of Chinese Education Ministry under
Grant no. 212138, Natural Science Foundation of Chongqing
under Grant CQ CSTC 2011BB0117, and Foundation of
Science and Technology Project of Chongqing Education
Commission under Grant KJ120630.
References
[1] P. Georgescu and G. MorosΜ§anu, “Pest regulation by means of
impulsive controls,” Applied Mathematics and Computation, vol.
190, no. 1, pp. 790–803, 2007.
[2] T. Zhang, X. Meng, and Y. Song, “The dynamics of a highdimensional delayed pest management model with impulsive
pesticide input and harvesting prey at different fixed moments,”
Nonlinear Dynamics, vol. 64, no. 1-2, pp. 1–12, 2011.
[3] Y. Ma, B. Liu, and W. Feng, “Dynamics of a birth-pulse singlespecies model with restricted toxin input and pulse harvesting,”
Discrete Dynamics in Nature and Society, vol. 2010, Article ID
142534, 20 pages, 2010.
[4] S. Cai, “A stage-structured single species model with pulse input
in a polluted environment,” Nonlinear Dynamics, vol. 57, no. 3,
pp. 375–382, 2009.
[5] B. Liu, L. Chen, and Y. Zhang, “The dynamics of a preydependent consumption model concerning impulsive control
strategy,” Applied Mathematics and Computation, vol. 169, no. 1,
pp. 305–320, 2005.
[6] P. Georgescu, H. Zhang, and L. Chen, “Bifurcation of nontrivial
periodic solutions for an impulsively controlled pest management model,” Applied Mathematics and Computation, vol. 202,
no. 2, pp. 675–687, 2008.
[7] P. Georgescu and H. Zhang, “An impulsively controlled
predator-pest model with disease in the pest,” Nonlinear Analysis. Real World Applications, vol. 11, no. 1, pp. 270–287, 2010.
[8] C. Wei and L. Chen, “Eco-epidemiology model with age structure and prey-dependent consumption for pest management,”
Applied Mathematical Modelling, vol. 33, no. 12, pp. 4354–4363,
2009.
[9] J. Jiao, S. Cai, and L. Chen, “Analysis of a stage-structured
predatory-prey system with birth pulse and impulsive harvesting at different moments,” Nonlinear Analysis. Real World
Applications, vol. 12, no. 4, pp. 2232–2244, 2011.
[10] J. Jiao, G. Pang, L. Chen, and G. Luo, “A delayed stage-structured
predator-prey model with impulsive stocking on prey and
continuous harvesting on predator,” Applied Mathematics and
Computation, vol. 195, no. 1, pp. 316–325, 2008.
[11] Z. Liu and R. Tan, “Impulsive harvesting and stocking in a
Monod-Haldane functional response predator-prey system,”
Chaos, Solitons and Fractals, vol. 34, no. 2, pp. 454–464, 2007.
[12] L. Nie, Z. Teng, L. Hu, and J. Peng, “The dynamics of a LotkaVolterra predator-prey model with state dependent impulsive
harvest for predator,” Biosystems, vol. 98, no. 2, pp. 67–72, 2009.
[13] D. BaΔ±Μ†nov and P. Simeonov, Impulsive Differential Equations:
Periodic Solutions and Applications, John Wiley & Sons, New
York, NY, USA, 1993.
18
[14] V. Lakshmikantham, D. D. BaΔ±Μ†nov, and P. S. Simeonov, Theory
of Impulsive Differential Equations, World Scientific, Singapore,
1989.
[15] T. Yang, Impulsive Control Theory, vol. 272, Springer, Berlin,
Germany, 2001.
[16] C. S. Holling, “The functional response of predators to prey
density and its role in mimicry and population regulation,”
Memoirs of the Entomological Society of Canada, vol. 45, pp. 5–
60, 1965.
[17] Y. Wang and M. Zhao, “Dynamic analysis of an impulsively
controlled predator-prey model with Holling type IV functional
response,” Discrete Dynamics in Nature and Society, vol. 2012,
Article ID 141272, 18 pages, 2012.
[18] C. Shen, “Permanence and global attractivity of the foodchain system with Holling IV type functional response,” Applied
Mathematics and Computation, vol. 194, no. 1, pp. 179–185, 2007.
[19] X. Song and Y. Li, “Dynamic behaviors of the periodic
predator-prey model with modified Leslie-Gower Holling-type
II schemes and impulsive effect,” Nonlinear Analysis. Real World
Applications, vol. 9, no. 1, pp. 64–79, 2008.
[20] B. Liu, Z. Teng, and L. Chen, “Analysis of a predator-prey
model with Holling II functional response concerning impulsive control strategy,” Journal of Computational and Applied
Mathematics, vol. 193, no. 1, pp. 347–362, 2006.
[21] B. Liu, Y. Zhang, and L. Chen, “Dynamic complexities of a
Holling I predator-prey model concerning periodic biological
and chemical control,” Chaos, Solitons and Fractals, vol. 22, no.
1, pp. 123–134, 2004.
[22] X. Liu and L. Chen, “Complex dynamics of Holling type II
Lotka-Volterra predator-prey system with impulsive perturbations on the predator,” Chaos, Solitons and Fractals, vol. 16, no.
2, pp. 311–320, 2003.
[23] X. Song and Y. Li, “Dynamic complexities of a Holling II twoprey one-predator system with impulsive effect,” Chaos, Solitons
& Fractals, vol. 33, no. 2, pp. 463–478, 2007.
[24] S. Zhang, D. Tan, and L. Chen, “Chaos in periodically forced
Holling type IV predator-prey system with impulsive perturbations,” Chaos, Solitons and Fractals, vol. 27, no. 4, pp. 980–990,
2006.
[25] S. Zhang, F. Wang, and L. Chen, “A food chain model with
impulsive perturbations and Holling IV functional response,”
Chaos, Solitons and Fractals, vol. 26, no. 3, pp. 855–866, 2005.
[26] L.-L. Wang and W.-T. Li, “Periodic solutions and permanence
for a delayed nonautonomous ratio-dependent predator-prey
model with Holling type functional response,” Journal of Computational and Applied Mathematics, vol. 162, no. 2, pp. 341–357,
2004.
[27] V. S. Ivlev, Experimental Ecology of the Feeding of Fishes, Yale
University Press, New Haven, Conn, USA, 1961.
[28] H. K. Baek, S. D. Kim, and P. Kim, “Permanence and stability
of an Ivlev-type predator-prey system with impulsive control
strategies,” Mathematical and Computer Modelling, vol. 50, no.
9-10, pp. 1385–1393, 2009.
[29] H. Wang and W. Wang, “The dynamical complexity of a
Ivlev-type prey-predator system with impulsive effect,” Chaos,
Solitons & Fractals, vol. 38, no. 4, pp. 1168–1176, 2008.
[30] Z. Xiang and X. Song, “The dynamical behaviors of a food chain
model with impulsive effect and Ivlev functional response,”
Chaos, Solitons & Fractals, vol. 39, no. 5, pp. 2282–2293, 2009.
[31] X. Song, M. Hao, and X. Meng, “A stage-structured predatorprey model with disturbing pulse and time delays,” Applied
Mathematical Modelling, vol. 33, no. 1, pp. 211–223, 2009.
Abstract and Applied Analysis
Advances in
Operations Research
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Advances in
Decision Sciences
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Mathematical Problems
in Engineering
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Journal of
Algebra
Hindawi Publishing Corporation
http://www.hindawi.com
Probability and Statistics
Volume 2014
The Scientific
World Journal
Hindawi Publishing Corporation
http://www.hindawi.com
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
International Journal of
Differential Equations
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Volume 2014
Submit your manuscripts at
http://www.hindawi.com
International Journal of
Advances in
Combinatorics
Hindawi Publishing Corporation
http://www.hindawi.com
Mathematical Physics
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Journal of
Complex Analysis
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
International
Journal of
Mathematics and
Mathematical
Sciences
Journal of
Hindawi Publishing Corporation
http://www.hindawi.com
Stochastic Analysis
Abstract and
Applied Analysis
Hindawi Publishing Corporation
http://www.hindawi.com
Hindawi Publishing Corporation
http://www.hindawi.com
International Journal of
Mathematics
Volume 2014
Volume 2014
Discrete Dynamics in
Nature and Society
Volume 2014
Volume 2014
Journal of
Journal of
Discrete Mathematics
Journal of
Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com
Applied Mathematics
Journal of
Function Spaces
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Optimization
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Hindawi Publishing Corporation
http://www.hindawi.com
Volume 2014
Download