Next Article in Journal
Computational Bifurcations Occurring on Red Fixed Components in the λ-Parameter Plane for a Family of Optimal Fourth-Order Multiple-Root Finders under the Möbius Conjugacy Map
Next Article in Special Issue
Correction: Ricceri, B. A Class of Equations with Three Solutions. Mathematics 2020, 8, 478
Previous Article in Journal
Mathematical Modeling Shows That the Response of a Solid Tumor to Antiangiogenic Therapy Depends on the Type of Growth
Previous Article in Special Issue
A Sub-Supersolution Approach for Robin Boundary Value Problems with Full Gradient Dependence
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analysis of a SEIR-KS Mathematical Model For Computer Virus Propagation in a Periodic Environment

1
Departamento de Ciencias Básicas, Facultad de Ciencias, Universidad del Bío-Bío, Campus Fernando May, 3780000 Chillán, Chile
2
Departamento de Matemática, Facultad de Ciencias Naturales, Matemática y del Medio Ambiente, Universidad Tecnológica Metropolitana, Las Palmeras 3360, 8330378 Ñuñoa-Santiago, Chile
3
Departamento de Estadística, Facultad de Ciencias, Universidad del Bío-Bío, 4051381 Concepción, Chile
*
Author to whom correspondence should be addressed.
Mathematics 2020, 8(5), 761; https://doi.org/10.3390/math8050761
Submission received: 16 April 2020 / Revised: 7 May 2020 / Accepted: 7 May 2020 / Published: 11 May 2020
(This article belongs to the Special Issue Nonlinear Functional Analysis and Its Applications)

Abstract

:
In this work we develop a study of positive periodic solutions for a mathematical model of the dynamics of computer virus propagation. We propose a generalized compartment model of SEIR-KS type, since we consider that the population is partitioned in five classes: susceptible (S); exposed (E); infected (I); recovered (R); and kill signals (K), and assume that the rates of virus propagation are time dependent functions. Then, we introduce a sufficient condition for the existence of positive periodic solutions of the generalized SEIR-KS model. The proof of the main results are based on a priori estimates of the SEIR-KS system solutions and the application of coincidence degree theory. Moreover, we present an example of a generalized system satisfying the sufficient condition.

1. Introduction

1.1. Scope

In the last decades, due to its theoretical and practical importance and significance, the mathematical models for dynamics of propagation for epidemics have been extensively studied, see for instance [1,2,3,4,5,6,7,8,9,10] and references in those works. In particular, mathematical models are powerful tools since it permits to explain, estimate and simulate the spread of infectious disease propagation, and consequently help to design and test control strategies like an optimal time of vaccination.
From the historical point of view, the earliest mathematical models in epidemiology were introduced in 1927 [11]. Following the presentation given in [12], we have that the basic idea considered in [11], in order to describe the dynamics of a virus, was the partition of the total population N in three classes: the susceptible class S formed for those individuals capable of contracting the disease and becoming themselves infectives; the infective class I formed for those individuals capable of transmitting the disease to susceptibles; the removed or recovered class R formed for those individuals which having contracted the disease, have died or, are permanently immune, or have been isolated, thus being unable to further transmit the disease. Moreover, they consider the three assumptions: the period of the epidemic is too short such that N is constant, the transfer process from S to I is modeled by the mass action law and the transfer process from I to R is of exponential decay type. Then, the called SIR model is given by the following system
d S ( t ) d t = k I ( t ) S ( t ) , d I ( t ) d t = k I ( t ) S ( t ) λ I ( t ) , d R ( t ) d t = λ I ( t ) ,
where k and λ are some positive constants. A particular case of SIR model is the well known SIS model, which is deduced by considering the partition of the population in two classes of individuals: susceptible and infected. Afterwards, numerous generalizations are given by several authors, who have improved the SIR mathematical model by incorporating for instance the vital dynamics, a generalized transmission forces, other classes of individuals and vaccination.
It is well known that the outbreaks of parasite population, which generate the epidemics occur around the same time of each year. Then becomes natural to study the periodicity or model these diseases by incorporating periodic functions into the epidemic models. For instance, in the case of the SIR model the periodic models are introduced by considering the facts that k and λ are time dependent periodic functions.
On the other hand, the compartmental models were introduced for biological epidemics. However, by the newest observation that the diffusion of biological virus is analogous to several processes in other areas, the ideas have been widely adapted and used to describe other phenomenon. For instance, the computer virus propagation in a network [13,14,15,16,17,18]. In particular, in this paper our aim is to study the periodicity of the mathematical model for virus propagation introduced in [18].

1.2. The Generalized SEIR-KS Mathematical Model

In [18] the authors construct a compartmental model for computer virus propagation. They consider that the population of individuals is given by computers or nodes in a network which are in corresponding communications all the time. The population is partitioned in five classes: the susceptible class S formed by the nodes which are virus-free uninfected; the exposed class E formed by the nodes which are infected, but the virus is latent; the infected class I formed by the nodes which are infected and the virus is breaking out; the recovered class R formed by the nodes which have recovered from virus infection and acquired immunization; and the kill signals class K formed by special nodes, which are a sort of anti-virus epidemic riding on the back of the virus propagation and all of them constitute a new compartment, which is generated among the infectious nodes then they can spontaneously transmit it to their neighboring nodes. The dynamic of computer virus transmission is studied by considering the following list of assumptions:
(A1)
The network at time t is formed by a total of N ( t ) nodes. Then, we have the following relation N ( t ) = S ( t ) + E ( t ) + I ( t ) + R ( t ) + K ( t ) at each time t.
(A2)
There is a behavior similar to vital dynamics of biological virus. More specifically, related with births and deaths, there is two characteristics in the process: (i) the new nodes are connected to the network at constant rate b and a fraction p are of susceptible type and the remaining fraction q = 1 p are of exposed type; and (ii) each node, by system crash or network interruption, are disconnected from the network at constant rate μ .
(A3)
The dynamics of exposed nodes are characterized by three facts: (i) the susceptible nodes are transformed in exposed nodes with probability per unit time β E ( t ) with β a constant; (ii) the exposed nodes are converted into infected ones at constant rate α ; and (iii) the exposed nodes are converted into kill signals ones at constant rate χ .
(A4)
The infected nodes are converted into kill signals nodes or recovered ones at constant rates γ and ε , respectively.
(A5)
The kill signal nodes satisfy two additional premises: (i) the susceptible nodes receive the kill signal and converted into recovered ones with probability ϕ K ( t ) ; and (ii) the infected nodes receives and relays the kill signal nodes with probability δ K ( t ) . Here ϕ and δ are constants.
Then, the following ordinary differential equation system
d S ( t ) d t = p b β S ( t ) E ( t ) ϕ S ( t ) K ( t ) μ S ( t ) ,
d E ( t ) d t = q b + β S ( t ) E ( t ) α E ( t ) χ E ( t ) μ E ( t ) ,
d I ( t ) d t = α E ( t ) δ I ( t ) K ( t ) γ I ( t ) ε I ( t ) μ I ( t ) ,
d K ( t ) d t = δ I ( t ) K ( t ) + γ I ( t ) + χ E ( t ) μ K ( t ) ,
d R ( t ) d t = ϕ S ( t ) K ( t ) + ε I ( t ) μ R ( t ) ,
is introduced as the mathematical model for computer virus propagation.
In this work, with the purpose to study the existence of periodic solutions for systems of Equation (1), we consider a more general model by assuming that constants on the assumptions (A2)–(A5) are time dependent real functions, i.e., the parameters b, p, q , p, α , β , γ , χ , ϕ , δ , μ and ε are time dependent real functions. More precisely, we are motivated by the analysis of the following generalized model:
d S ( t ) d t = p ( t ) b ( t ) β ( t ) S ( t ) E ( t ) ϕ ( t ) S ( t ) K ( t ) μ ( t ) S ( t ) ,
d E ( t ) d t = q ( t ) b ( t ) + β ( t ) S ( t ) E ( t ) α ( t ) E ( t ) χ ( t ) E ( t ) μ ( t ) E ( t ) ,
d I ( t ) d t = α ( t ) E ( t ) δ ( t ) I ( t ) K ( t ) γ ( t ) I ( t ) ε ( t ) I ( t ) μ ( t ) I ( t ) ,
d K ( t ) d t = δ ( t ) I ( t ) K ( t ) + γ ( t ) I ( t ) + χ ( t ) E ( t ) μ ( t ) K ( t ) ,
d R ( t ) d t = ϕ ( t ) S ( t ) K ( t ) + ε ( t ) I ( t ) μ ( t ) R ( t ) .
We observe that the system in Equation (2) can be uncoupled in the study of the system in Equation (2)a–e. Indeed, it is the strategy considered in [18] to analyze the stability. However, to study the existence of periodic solutions is more convenient to consider the full system, since it is not straightforward the fact that the existence of positive periodic solutions for Equation (2)a–d implies the existence of positive periodic solution for Equation (2)e.

1.3. Reformulation of System in Equation (2) as Operator Equation

Firstly, we introduce a change of variable such that the system in Equation (2) is replaced by an equivalent system. Then, we reformulate the new system as seen in Equation (4) as an operator equation which will be analyzed by the topological degree theory.
For S , E , I , K and R satisfying the system in Equation (2), we consider the new functions S * , E * , I * , K * and R * defined explicitly by the relation
( S , E , I , K , R ) ( t ) = exp ( S * ( t ) ) , exp ( E * ( t ) ) , exp ( I * ( t ) ) , exp ( K * ( t ) ) , exp ( R * ( t ) ) .
Then, by differentiation in Equation (3) and using the fact that ( S , E , I , K , R ) satisfy the mathematical model in Equation (2), we deduce that ( S * , E * , I * , K * , R * ) is a solution of the system
d S * ( t ) d t = p ( t ) b ( t ) exp ( S * ( t ) ) β ( t ) exp ( E * ( t ) ) ϕ ( t ) exp ( ( K * S * ) ( t ) ) μ ( t ) ,
d E * ( t ) d t = q ( t ) b ( t ) exp ( E * ( t ) ) + β ( t ) exp ( S * ( t ) ) α ( t ) χ ( t ) μ ( t ) ,
d I * ( t ) d t = α ( t ) exp ( ( E * I * ) ( t ) ) δ ( t ) exp ( K * ( t ) ) γ ( t ) ε ( t ) μ ( t ) ,
d K * ( t ) d t = δ ( t ) exp ( I * ( t ) ) + γ ( t ) exp ( ( I * K * ) ( t ) ) + χ ( t ) exp ( ( E * K * ) ( t ) ) μ ( t ) .
d R * ( t ) d t = ϕ ( t ) exp ( ( K * + S * R * ) ( t ) ) + ε ( t ) exp ( ( I * R * ) ( t ) ) μ ( t ) .
Thus, our aim is to study the positive periodic solutions of Equation (2) equivalently replaced by the analysis of positive periodic solution of the new system (4).
Theorem 1.
Consider the sets of functions { S , E , I , K , R } and { S * , E * , I * , K * , R * } are related by Equation (3). Then, the functions S , E , I , K and R are a solution of the system in Equation (2) if and only if the functions S * , E * , I * , K * and R * are a solution of the system in Equation (4). In particular, we have that the following two assertions are valid: (a) If S * , E * , I * , K * and R * satisfying the system in Equation (4) are ω-periodic functions, then the functions S , E , I , K and R satisfying the system in Equation (2) are ω-periodic; and (b) The existence of a solution for the system in Equation (4) imply the existence of a positive solution for the system in Equation (2).
Proof. 
The proof fact that { S , E , I , K , R } is a solution of the system in Equation (2) if and only if { S * , E * , I * , K * , R * } is straightforward by the change of variable (3), differentiation and algebraic rearrangements. Now, we get the proof of item (a) by using the change of variable (3), for illustration, we consider the case of function S and we have that S ( t + ω ) = exp ( S * ( t + ω ) ) = exp ( S * ( t ) ) = S ( t ) . The item (b) is a straightforward consequence of the definition of the functions S * , E * , I * , K * and R * given in Equation (3). ☐
In order to define the operator equation, we consider the normed vector spaces X and Y and introduce the operators L : Dom L X Y and N : X Y explicitly defined by the relations
L ( x 1 , x 2 , x 3 , x 4 , x 5 ) T = d x 1 d t , d x 2 d t , d x 3 d t , d x 4 d t , d x 5 d t T
N ( x 1 , x 2 , x 3 , x 4 , x 5 ) T = N 1 , N 2 , N 3 , N 4 , , N 5 T ,
where
N 1 ( t ) = p ( t ) b ( t ) exp ( x 1 ( t ) ) β ( t ) exp ( x 2 ( t ) ) ϕ ( t ) exp ( ( x 4 x 1 ) ( t ) ) μ ( t ) ,
N 2 ( t ) = q ( t ) b ( t ) exp ( x 2 ( t ) ) + β ( t ) exp ( x 1 ( t ) ) α ( t ) χ ( t ) μ ( t ) ,
N 3 ( t ) = α ( t ) exp ( ( x 2 x 3 ) ( t ) ) δ ( t ) exp ( x 4 ( t ) ) γ ( t ) ε ( t ) μ ( t ) ,
N 4 ( t ) = δ ( t ) exp ( x 3 ( t ) ) + γ ( t ) exp ( ( x 3 x 4 ) ( t ) ) + χ ( t ) exp ( ( x 2 x 4 ) ( t ) ) μ ( t ) ,
N 5 ( t ) = ϕ ( t ) exp ( ( x 1 + x 4 x 5 ) ( t ) ) + ε ( t ) exp ( ( x 3 x 5 ) ( t ) ) μ ( t ) .
The operator notation implies that the system in Equation (4) can be rewritten as the following operator equation
L ( S * , E * , I * , K * , R * ) T = N ( S * , E * , I * , K * , R * ) T , ( S * , E * , I * , K * , R * ) Dom L X ,
where the appropriate Banach spaces X and Y are defined by
X = Y = x T C ( R , R 5 ) : x ( t + ω ) = x ( t ) , x = i = 1 5 max t [ 0 , ω ] | x i ( t ) | < .
Hereinafter we use the bold notation x T : = ( x 1 , x 2 , x 3 , x 4 , x 5 ) T . We notice that the spaces in Equation (13) are the more convenient, since we are concerned with the analysis of ω -periodic solutions. However, if the interest is to analyze other properties we should be consider a suitable definition of X and Y.

1.4. Main Results

By convenience of presentation, we introduce the notation
f ¯ = 1 ω 0 ω f ( t ) d t , f = min x [ 0 , ω ] f ( x ) , and f = max x [ 0 , ω ] f ( x ) ,
for any positive real valued bounded function f defined on [ 0 , ω ] .
Let us consider the following assumption
The initial condition ( S ( 0 ) , E ( 0 ) , I ( 0 ) , K ( 0 ) , R ( 0 ) ) R + 5 ; the coefficient functions b , p , q , α , β , γ , χ , ϕ , δ , μ and ε are positive , continuous , ω - periodic on [ 0 , ω ] ; and there are the strictly positive constants κ 1 and κ 2 such that ( p b ) ϕ ( ϕ ) 1 b ¯ exp ( 2 ω μ ¯ ) κ 1 > 0 1 ε α b ¯ μ ( γ + ε + μ ) ( α + χ + μ ) exp ω ( γ + ε + μ ) + ϕ ( ϕ ) 1 b ¯ + μ κ 2 > 0
Then, the main result of the paper are given by the following three theorems.
Theorem 2.
Let X and Y the spaces defined on Equation (13); Q : Y Y defined by Q ( x T ) = ω 1 0 ω x ( τ ) T d τ ; and the operators L : X Y and N : X Y defined on Equations (5) and (6), respectively. Moreover, assume that the hypothesis in Equation (15) is satisfied. Then, there are the positive constants ρ 1 , ρ 2 , ρ 3 , d 1 , d 2 , d 3 , δ 1 , δ 2 and δ 3 , such that the following two assertions are valid
(a) 
If λ ] 0 , 1 [ and x Dom L are such that L ( x ) = λ N ( x ) , the following inequalities
x i ( t ) < ln ( ρ i / ω ) + d i , i = 1 , , 5
ln ( δ i ) < x i ( t ) , i = 1 , , 5 ,
holds for all t [ 0 , ω ] .
(b) 
If x Ker L are such that Q N x = 0 , the following inequalities
x i ( t ) < ln ( ρ i / ω ) , i = 1 , , 5 ,
ln ( δ i ) < x i ( t ) , i = 1 , , 5 ,
holds for all t [ 0 , ω ] .
Theorem 3.
If the hypothesis in Equation (15) is satisfied, there exists at least one ω-periodic solution of Equation (4).
Theorem 4.
Consider that the hypothesis in Equation (15) is satisfied. Then, the system in Equation (2) has at least one positive ω-periodic solution.

1.5. Related Works

There are several works where the study of positive periodic solutions is developed, for instance in [13,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33]. In particular, recently in [13] was proved the existence of at one positive periodic solution of the following system modeling the dynamics of a computer virus
d S ( t ) d t = b ( t ) μ 1 ( t ) S ( t ) β 1 ( t ) S ( t ) L ( t ) β 2 ( t ) S ( t ) A ( t ) + γ 1 ( t ) L ( t ) + γ 2 ( t ) A ( t ) , d L ( t ) d t = β 1 ( t ) S ( t ) L ( t ) + β 2 ( t ) S ( t ) A ( t ) + α 2 ( t ) A ( t ) [ μ 2 ( t ) + α 1 ( t ) + γ 1 ( t ) ] L ( t ) , d A ( t ) d t = α 1 ( t ) L ( t ) [ μ 3 ( t ) + α 1 ( t ) + γ 2 ( t ) ] A ( t ) ,
by assuming that S ( 0 ) , L ( 0 ) and A ( 0 ) are strictly positive and the functions b , μ 1 , μ 2 , μ 3 , β 1 , β 2 , γ 1 , γ 2 , α 1 and α 2 are positive, continuous, ω -periodic on [ 0 , ω ] and
α 1 α 1 + μ 2 ( α 2 + γ 2 ) < ( μ 3 + α 2 + γ 2 )
We observe that S , L and A denotes the susceptible computers, the latent computers and the infectious computers, respectively.

1.6. Outline of the Paper

The paper is organized as follows. In Section 2, we introduce some terminology related to the coincidence degree theory and some useful results. In Section 3, Section 4 and Section 5 we develop the proof of Theorems 2–4, respectively. Finally, in Section 6, we present an examples of a system with coefficients satisfying Equation (15).

2. Preliminaries

In this paper, we utilize the standard notation and terminology of topological degree theory. However, for self-contained presentation, we recall some notation, concepts and results related to the statement of of Mawhin’s theorem, [34]. Moreover, we prove some properties for the operators L and N defining on the operator Equation (12).

2.1. The Mawhin’s Continuation Theorem

Definition 1.
Let X and Y be normed vector spaces and L : Dom L X Y a linear operator. Then, L is called a Fredholm operator of index zero, if the following assertions
dim ( Ker L ) = codim ( Im L ) < a n d Im L   i s   c l o s e d   i n   Y ,
are valid.
Proposition 1.
Let X and Y be normed vector spaces and L : Dom L X Y a linear operator. If L is a Fredholm mapping of index zero, then
(i) 
There are two continuous projectors P : X X and Q : Y Y such that Im P = Ker L and Im L = Ker Q = Im ( I Q ) .
(ii) 
L P : = L | Dom L Ker P : ( I P ) X Im L is invertible and its inverse is denoted by K P .
(iii) 
There is an isomorphism J : Im Q Ker L .
Definition 2.
Let X and Y be normed vector spaces and L : Dom L X Y a Fredholm mapping of index zero. Let P : X X and Q : Y Y be two continuous projectors such that Im P = Ker L and Im L = Ker Q = Im ( I Q ) . Let us consider N : X Y a continuous operator and Ω X an open bounded set. Then, N is called L compact on Ω ¯ if Q N ( Ω ¯ ) is a bounded set and the operator K P ( I Q ) N is compact on Ω ¯ .
Definition 3.
Let Ω R n be an open bounded set, f C 1 ( Ω , R n ) C ( Ω ¯ , R n ) and y R n \ f ( Ω N f ) , i.e., y is a regular value of f. Here, N f = { x Ω : J f ( x ) = 0 } the critical set of f and J f the Jacobian of f at x. Then, the degree deg { f , Ω , y } is defined by deg { f , Ω , y } = x f 1 ( y ) sgn J f ( x ) , with the agreement that = 0 .
Theorem 5.
Assume that ( X , . X ) and ( Y , . Y ) are two Banach spaces and Ω is an open bounded set. Consider that L : Dom L X Y be a Fredholm mapping of index zero and N : X Y be L-compact on Ω ¯ . If the following hypotheses
(C1
L x λ N x for each ( λ , x ) ] 0 , 1 [ × ( Ω Dom L ) .
(C2
Q N x 0 for each x Ω Ker L .
(C3
d e g ( J Q N , Ω Ker L , 0 ) 0 .
are valid. Then the operator equation L x = N x has at least one solution in Dom L Ω ¯ .

2.2. L Is a Fredholm Operator of Index Zero

Lemma 1.
The operator L : Dom L X Y defined on Equation (5), with X and Y the Banach spaces given on Equation (13), is a Fredholm operator of index zero. Moreover the sets Ker L and Im L are characterized by Ker L R 5 and Im L = y Y : 0 ω y ( τ ) T d τ = 0 , respectively.
Proof. 
In order to prove the Lemma we apply the Definition 1 or more precisely we prove that L satisfy Equation (20).
The left condition in Equation (20) is proved as follows. Let ( s 0 , l 0 , i 0 , k 0 , r 0 ) R 5 such that x ( t 0 ) = ( s 0 , l 0 , i 0 , k 0 , r 0 ) , we observe that x T Ker L is equivalent to x ( t ) = ( s 0 , l 0 , i 0 , k 0 , r 0 ) for all t t 0 . Then, we have that Ker L R 5 . Now, if we select arbitrarily y T Im L , we have that there is x Dom L such that L x T = y T . Then, from Equation (5) and ω -periodic behavior of x , we deduce that t t + ω y ( τ ) T d τ = 0 for each t t 0 or equivalently Im L = y Y : 0 ω y ( τ ) T d τ = 0 . Now, by linear algebra results, we recall the existence of isomorphisms X Im L ( X / Im L ) , X Ker L ( X / Ker L ) , and Im L X / Ker L . Thus, we have that Ker L X / Im L and we get that dim ( Ker L ) = codim ( Im L ) = 4 .
To prove the left condition in Equation (20) we introduce the linear continuous mapping F : Im L Y R 5 defined by F ( x T ) = 0 ω x T ( τ ) d τ and observe that F 1 ( 0 ) = Im L . Thus, clearly Im L is a closed set of the space Y. ☐

2.3. Construction of the Projectors P , Q and the Operator K P

We remark that the existence of three abstract projectors P , Q and K P associated to L, is guaranteed by Proposition 1. However, by convenience of some calculus in the following sections we introduce explicitly the definitions of P and Q given by
P : X X , Q : Y Y , P x T = Q x T = 1 ω 0 ω x ( τ ) T d τ
and notice that satisfy the relations in Proposition 1. More precisely, we have that
(a)
Ker L = Im P . We prove that Ker L Im P as follows: from the isomorphism Ker L R 5 given on Lemma 1, we observe that x T Ker L is equivalent to the fact that x ( t ) is constant for all t t 0 , which at the same time implies that x Im P , since for x ( t ) constant we have that P x T = x T Conversely, the proof of the inclusion Im P Ker L is deduced by the following facts: for y T Im P there is z X such that P ( z T ) = y T and from Equation (21) we obtain that ω 1 0 ω z ( τ ) T d τ = y T which implies by differentiation the fact that L ( y T ) = 0 or y Ker L .
(b)
Ker Q = Im L . From the definition of Q given in Equation (21) we have that y T Ker Q is equivalent to 0 ω y ( τ ) T d τ = 0 and from the characterization of Im L given on Lemma 1 is at the same time equivalent to y T Im L .
(c)
Im ( I Q ) = Im L . Let y T Im ( I Q ) , then there is z X such that ( I Q ) z T = y T , which implies that
0 ω y ( τ ) T d τ = 0 ω z ( τ ) T 1 ω 0 ω z ( m ) T d m d τ = ( 0 , 0 , 0 , 0 )
and, from the characterization of Im L given on Lemma 1, we get that y ( τ ) T Im L . Thus, we obtain that Im ( I Q ) Im L . By analogous arguments, we can prove the inclusion Im L Im ( I Q ) .
(d)
Operators K P and L P . The notation L P is is introduced for the restriction of L to Dom L Ker P , i.e., L P is the operator defined from Dom L Ker P to Im L and L P = L on Dom L Ker P . The symbol K P is used to denote the inverse of L P , and is precisely defined as the operator such that
K P x T ( t ) = 0 t x ( τ ) T d τ 1 ω 0 ω 0 η x ( m ) T d m d η .
We notice that, we can prove that the operator K P is the inverse of the operator L P by application of the following identity
0 t d d s x ( s ) d s 1 ω 0 ω 0 t d d m x ( m ) d m d t = x ( t ) ,
which is valid only for all x T Dom L Ker P .
Thus, the projectors P and Q defined on Equation (21) satisfy the Proposition 1, since we can follow ( i ) and ( i i ) are satisfied from (a)–(c) and (d), respectively.

2.4. N Defined on Equation (6) Is a Continuous Operator

Lemma 2.
The operator N : X Y defined on Equation (5), with X and Y the Banach spaces given on Equation (13), is a continuous operator.
Proof. 
Let us choose arbitrarily the sequence { x n } X which converges to x ¯ in the norm induced topology of X. By the definition of N given on Equation (6) and applying componentwise the inequality
| exp ( z 2 ) exp ( z 1 ) | = z 2 z 1 exp ( s ) d s max exp ( z 1 ) , exp ( z 2 ) | z 2 z 1 | , z 1 , z 2 R ,
we get the existence of C > 0 depending only on b , μ 1 , β 1 , β 2 , γ 1 , γ 2 , α 1 and α 2 such that N ( x n ) N ( x ¯ ) C x n x ¯ . Thus, the sequence { N ( x n ) } X converges to N ( x ¯ ) in the topology of X induced by the norm. Hence, we can deduce that N is a continuous operator. ☐

2.5. N Defined on Equation (6) Is L-Compact on any Ball of X Centered at ( 0 , 0 , 0 , 0 , 0 ) .

Lemma 3.
Assuming that h R + is an arbitrary and fix number defining the radius h of an open ball of X centered at ( 0 , 0 , 0 , 0 , 0 ) , denoted by Ω X , i.e.,
Ω = ( x 1 , x 2 , x 3 , x 4 , x 5 ) X : ( x 1 , x 2 , x 3 , x 4 , x 5 ) < h .
Moreover, consider L and N defined on Eqautions (5) and (6), respectively. If the assumption in Equation (15) is satisfied, the operator N is L-compact on Ω ¯ .
Proof. 
The proof is focused in the verification of the fact that L satisfy the two requirements of Definition 2: Q N ( Ω ¯ ) is a bounded set and K P ( I Q ) N is a compact operator on Ω ¯ , since Ω is an open bounded set by the its definition given on Equation (23) and L is a Fredholm operator of index zero by application of Lemma 1.
To prove that Q N ( Ω ¯ ) is bounded we proceed as follows. We observe that
Q N ( x T ) = 1 ω 0 ω N ( τ ) T d τ .
Then, for x Ω ¯ we have that Q N ( x T ) 1 ω 0 ω N d τ = N , which implies that Q N ( Ω ¯ ) is bounded.
In order to prove that K P ( I Q ) N is a compact operator on Ω ¯ , we observe that from Equations (6), (21) and (22) we get
( K P ( I Q ) N ) ( x T ) ( t ) = 0 t N ( τ ) T d τ + 1 2 t ω 0 ω N ( τ ) T d τ 1 ω 0 ω 0 η N ( m ) T d m d η .
Then, we deduce that K P ( I Q ) N 2 ω N , as a result we have that ( K P ( I Q ) N ) ( Ω ¯ ) is a bounded, since the operator N is bounded on Ω ¯ . Moreover, we can prove the bound
| ( K P ( I Q ) N ) ( x T ) ( t ) ( K P ( I Q ) N ) ( x T ) ( s ) | 2 N | t s | , t , s [ t 0 , [ ,
i.e., K P ( I Q ) N is an equicontinuous operator. Hence, by Arzela Ascoli’s theorem we get that K P ( I Q ) N is a compact operator on Ω ¯ . ☐

2.6. A Useful Auxiliary Result

Proposition 2.
[13] Let ψ : [ 0 , ω ] R + R be an absolutely continuous function satisfying the differential inequality
d d t ψ ( t ) + m ( t ) ψ ( t ) 0 , t [ 0 , ω ] ,
with m L 1 ( [ 0 , ω ] ) such that 0 < m 1 m ( t ) m 2 for all t [ 0 , ω ] and for some positive constants m 1 and m 2 . Then, if ψ ( 0 ) > 0 we have that ψ ( t ) ψ ( 0 ) exp ( m 2 ω ) > 0 for all t [ 0 , ω ] .

3. Proof of Theorem 2

3.1. Four Useful Lemmata

We introduce four Lemmmata related with some estimates for the operator equation L x = λ N x , which is equivalent to the following system
d x 1 d t = λ p b exp ( x 1 ) β exp ( x 2 ) ϕ exp ( x 4 x 1 ) μ ,
d x 2 d t = λ q b exp ( x 2 ) + β exp ( x 1 ) α χ μ ,
d x 3 d t = λ α exp ( x 2 x 3 ) δ exp ( x 4 ) γ ε μ ,
d x 4 d t = λ δ exp ( x 3 ) + γ exp ( x 3 x 4 ) + χ exp ( x 2 x 4 ) μ ,
d x 5 d t = λ ϕ exp ( x 1 + x 4 x 5 ) + ε exp ( x 3 x 4 ) μ ,
and also can be rewritten as the system
d d t exp ( x 1 ) + λ μ exp ( x 1 ) = λ p b β exp ( x 1 + x 2 ) ϕ exp ( x 4 ) ,
d d t exp ( x 2 ) + λ ( α + χ + μ ) exp ( x 2 ) = λ q b + β exp ( x 1 + x 2 ) ,
d d t exp ( x 3 ) + λ ( γ + ε + μ ) exp ( x 3 ) = λ α exp ( x 2 ) δ exp ( x 3 + x 4 ) ,
d d t exp ( x 4 ) + λ μ exp ( x 4 ) = λ δ exp ( x 3 + x 4 ) + γ exp ( x 3 ) + χ exp ( x 2 ) ,
d d t exp ( x 5 ) + λ μ exp ( x 5 ) = λ ϕ exp ( x 1 + x 4 ) + ε exp ( x 3 x 4 + x 5 ) .
We notice that to deduce Equation (27) we multiply the i-th equation of the system in Equation (26) by exp ( x i ) . Thus, the proof of estimates for L x = λ N x is focused in to get the estimates of the solutions of Equation (26) (or equivalently of Equation (27)).
Lemma 4.
Assume that ( S ( 0 ) , E ( 0 ) , I ( 0 ) , K ( 0 ) , R ( 0 ) ) R + 5 ; the coefficient functions b , p , q , α , β , γ , χ , ϕ , δ , μ and ε are positive, continuous and ω-periodic on [ 0 , ω ] ; and the operators L : Dom L X Y and defined on Equations (5) and (6), with X and Y the Banach spaces given on Equation (13). Then, the solution of the operator equation L x = λ N x with λ ] 0 , 1 [ satisfy the following inequalities
exp ( x 2 ( t ) ) exp E ( 0 ) ( α + χ + μ ) ω ,
exp ( x 4 ( t ) ) exp K ( 0 ) μ ω ,
exp ( x 5 ( t ) ) exp R ( 0 ) μ ω ,
( p b ) μ + β max t [ 0 , ω ] exp ( x 2 ( t ) ) exp ( x 1 ( t ) ) + ϕ max t [ 0 , ω ] exp ( x 4 ( t ) ) ,
α exp E ( 0 ) ( α + χ + μ ) ω ( γ + ε + μ ) + δ max t [ 0 , ω ] exp ( x 4 ( t ) ) exp ( x 3 ( t ) ) ,
for any t [ 0 , ω ] .
Proof. 
By the continuity of the coefficient functions and the fact that λ ] 0 , 1 [ , we have that λ ( α + χ + μ ) ( t ) [ λ ( α + χ + μ ) , ( α + χ + μ ) ] R + and λ μ ( t ) [ λ μ , μ ] R + , for any t [ 0 , ω ] . Then, we can prove Equations (28)–(30), by straightforward application of Proposition 2 to Equations (27)b,d,e, respectively, since we have that
exp ( x 2 ( t ) ) exp ( x 2 ( 0 ) ) exp ( ( α + χ + μ ) ω ) = exp E ( 0 ) ( α + χ + μ ) ω , exp ( x 4 ( t ) ) exp ( x 4 ( 0 ) ) exp ( μ ω ) = exp K ( 0 ) μ ω , exp ( x 5 ( t ) ) exp ( x 5 ( 0 ) ) exp ( μ ω ) = exp R ( 0 ) μ ω ,
for any t [ 0 , ω ] . Now, to prove Equations (31) and (32), for i = 1 , 3 , we introduce the notation τ i [ 0 , ω ] for the points where x i has a minimum. Then, using the notation in Equation (14), from Equations (27)a,c, and (28) we get
( p b ) ( p b ) ( τ 1 ) = μ ( τ 1 ) exp ( x 1 ( τ 1 ) ) + β ( τ 1 ) exp ( ( x 1 + x 2 ) ( τ 1 ) ) + ϕ ( τ 1 ) exp ( x 4 ( τ 1 ) ) = μ ( τ 1 ) + β ( τ 1 ) exp ( x 2 ( τ 1 ) ) exp ( x 1 ( τ 1 ) ) + ϕ ( τ 1 ) exp ( x 4 ( τ 1 ) ) μ + β max t [ 0 , ω ] exp ( x 2 ( t ) ) exp ( x 1 ( t ) ) + ϕ max t [ 0 , ω ] exp ( x 4 ( t ) ) , α exp E ( 0 ) ( α + χ + μ ) ω α ( τ 3 ) exp ( x 2 ( τ 3 ) ) = ( γ + ε + μ ) ( τ 3 ) exp ( x 3 ( τ 3 ) ) + δ ( τ 3 ) exp ( ( x 3 + x 4 ) ( τ 3 ) ) ( γ + ε + μ ) + δ max t [ 0 , ω ] exp ( x 4 ( t ) ) exp ( x 3 ( t ) ) ,
for any t [ 0 , ω ] .
Lemma 5.
Assume that hypotheses of Lemma 4. Then, the solution of the operator equation L x = λ N x with λ ] 0 , 1 [ satisfy the integral inequalities
0 ω exp ( x 1 ( t ) ) d t ω b ¯ μ ,
0 ω exp ( x 2 ( t ) ) d t ω b ¯ ( α + χ + μ ) ,
0 ω exp ( x 3 ( t ) ) d t ω α b ¯ ( α + χ + μ ) ( γ + ε + μ ) ,
0 ω exp ( x 4 ( t ) ) d t ω b ¯ ϕ ,
0 ω exp ( x 5 ( t ) ) d t ω b ¯ ϕ μ ϕ max t [ 0 , ω ] exp ( x 1 ( t ) ) + ε max t [ 0 , ω ] exp ( x 3 ( t ) ) μ exp ( K ( 0 ) μ ω ) 0 ω exp ( x 5 ( t ) ) d t .
Proof. 
We integrate the equations of the system in Equation (27) on [ 0 , ω ] and using the ω -periodicity of x we deduce the following identities
0 ω p ( t ) b ( t ) d t = 0 ω β ( t ) exp ( ( x 1 + x 2 ) ( t ) ) + ϕ ( t ) exp ( x 4 ( t ) ) + μ ( t ) exp ( x 1 ( t ) ) d t ,
0 ω q ( t ) b ( t ) d t = 0 ω β ( t ) exp ( ( x 1 + x 2 ) ( t ) ) + ( α + χ + μ ) ( t ) exp ( x 2 ( t ) ) d t ,
0 ω α ( t ) exp ( x 2 ( t ) ) d t = 0 ω δ ( t ) exp ( ( x 3 + x 4 ) ( t ) ) + ( γ + ε + μ ) ( t ) exp ( x 3 ( t ) ) d t ,
0 ω μ ( t ) exp ( x 4 ( t ) ) d t = 0 ω δ ( t ) exp ( ( x 3 + x 4 ) ( t ) ) + γ ( t ) exp ( x 3 ( t ) ) + χ ( t ) exp ( x 2 ( t ) ) d t ,
0 ω μ ( t ) exp ( x 5 ( t ) ) d t = 0 ω ϕ ( t ) exp ( ( x 1 + x 4 ) ( t ) ) + ε ( t ) exp ( ( x 3 x 4 + x 5 ) ( t ) ) d t .
Then, adding Equation (38)a,b, using the ω -periodicity of x 1 and x 2 , and the fact that p ( t ) + q ( t ) = 1 , we deduce that
0 ω b ( t ) d t = 0 ω μ ( t ) exp ( x 1 ( t ) ) + α ( t ) + χ ( t ) + μ ( t ) exp ( x 2 ( t ) ) + ϕ ( t ) exp ( x 4 ( t ) ) d t ,
which implies Equations (33), (34) and (36), since, by the positivity of α , χ , μ and ϕ and the notation in Equation (14), we get the inequalities
0 ω exp ( x 1 ( t ) ) d t 1 min t [ 0 , ω ] μ ( t ) 0 ω μ ( t ) exp ( x 1 ( t ) ) d t 1 μ 0 ω μ ( t ) exp ( x 1 ( t ) ) + α ( t ) + χ ( t ) + μ ( t ) exp ( x 2 ( t ) ) + ϕ ( t ) exp ( x 4 ( t ) ) d t = 1 μ 0 ω b ( t ) d t = ω b ¯ μ , 0 ω exp ( x 2 ( t ) ) d t 1 min t [ 0 , ω ] ( α + χ + μ ) ( t ) ( t ) 0 ω ( α + χ + μ ) ( t ) exp ( x 2 ( t ) ) d t 1 ( α + χ + μ ) 0 ω μ ( t ) exp ( x 1 ( t ) ) + α ( t ) + χ ( t ) + μ ( t ) exp ( x 2 ( t ) ) + ϕ ( t ) exp ( x 4 ( t ) ) d t = 1 ( α + χ + μ ) 0 ω b ( t ) d t = ω b ¯ ( α + χ + μ ) , 0 ω exp ( x 4 ( t ) ) d t 1 min t [ 0 , ω ] ϕ ( t ) 0 ω ϕ ( t ) exp ( x 4 ( t ) ) d t 1 ϕ 0 ω μ ( t ) exp ( x 1 ( t ) ) + α ( t ) + χ ( t ) + μ ( t ) exp ( x 2 ( t ) ) + ϕ ( t ) exp ( x 4 ( t ) ) d t = 1 ϕ 0 ω b ( t ) d t = ω b ¯ ϕ .
The inequality in Equation (35) is a consequence of Equations (38)c and (34), since
0 ω exp ( x 3 ( t ) ) d t 1 min t [ 0 , ω ] ( γ + ε + μ ) ( t ) 0 ω ( γ + ε + μ ) ( t ) exp ( x 3 ( t ) ) d t 1 ( γ + ε + μ ) 0 ω δ ( t ) exp ( ( x 3 + x 4 ) ( t ) ) + ( γ + ε + μ ) ( t ) exp ( x 3 ( t ) ) d t = 1 ( γ + ε + μ ) 0 ω α ( t ) exp ( x 2 ( t ) ) d t ω α b ¯ ( γ + ε + μ ) ( α + χ + μ ) ·
Now, from Equations (38)e, (36) and (32), we deduce the following estimate
μ 0 ω exp ( x 5 ( t ) ) d t 0 ω μ ( t ) exp ( x 5 ( t ) ) d t = 0 ω ϕ ( t ) exp ( ( x 1 + x 4 ) ( t ) ) + ε ( t ) exp ( ( x 3 x 4 + x 5 ) ( t ) ) d t ω b ¯ ϕ ϕ max t [ 0 , ω ] exp ( x 1 ( t ) ) + ε max t [ 0 , ω ] exp ( x 3 ( t ) ) min t [ 0 , ω ] exp ( x 4 ( t ) ) 0 ω exp ( x 5 ( t ) ) d t ω b ¯ ϕ ϕ max t [ 0 , ω ] exp ( x 1 ( t ) ) + ε max t [ 0 , ω ] exp ( x 3 ( t ) ) exp ( K ( 0 ) μ ω ) 0 ω exp ( x 5 ( t ) ) d t ,
which implies Equation (37). ☐
Lemma 6.
Assume that hypotheses of Lemma 4. Then, the solution of the operator equation L x = λ N x with λ ] 0 , 1 [ satisfy the integral inequalities
0 ω d x 1 d t ( t ) d t 2 ω b ¯ max t [ 0 , ω ] exp ( x 1 ( t ) ) ,
0 ω d x 2 d t ( t ) d t < 2 ω ( α + χ + μ ) ,
0 ω d x 3 d t ( t ) d t < 2 ω ( γ + ε + μ ) + δ b ¯ ( ϕ ) 1 ,
0 ω d x 4 d t ( t ) d t < 2 ω μ ¯ ,
0 ω d x 5 d t ( t ) d t < 2 ω μ ¯ max t [ 0 , ω ] exp ( x 4 ( t ) x 5 ( t ) ) .
Proof. 
We integrate the system in Equation (26) on [ 0 , ω ] and by using the ω -periodicity behavior of x , we have that
0 ω p ( t ) b ( t ) exp ( x 1 ( t ) ) d t = 0 ω β ( t ) exp ( x 2 ( t ) ) ϕ ( t ) exp ( x 4 ( t ) x 1 ( t ) ) μ ( t ) d t ,
0 ω q ( t ) b ( t ) exp ( x 2 ( t ) ) + β ( t ) exp ( x 1 ( t ) ) d t = 0 ω α ( t ) + χ ( t ) + μ ( t ) d t ,
0 ω α ( t ) exp x 2 ( t ) x 3 ( t ) δ ( t ) exp ( x 4 ( t ) ) d t = 0 ω γ ( t ) + ε ( t ) + μ ( t ) d t ,
0 ω δ ( t ) exp ( x 3 ( t ) ) + γ ( t ) exp ( x 3 ( t ) x 4 ( t ) ) + χ ( t ) exp ( x 2 ( t ) x 4 ( t ) ) d t = 0 ω μ ( t ) d t ,
0 ω ϕ ( t ) exp ( x 1 ( t ) + x 4 ( t ) x 5 ( t ) ) + ε ( t ) exp ( x 3 ( t ) x 4 ( t ) ) μ ( t ) exp ( x 4 ( t ) x 5 ( t ) ) d t = 0 .
Then, taking the modulus of the each equations defining the system in Equation (26); integrating each resulting equations on [ 0 , ω ] ; using the information that λ ] 0 , 1 [ ; employing the relations of Equation (44); and applying the inequalities on Lemmas 4 and 5, we obtain the following estimates
0 ω d x 1 d t ( t ) d t < 2 0 ω p ( t ) b ( t ) exp ( x 1 ( t ) ) d t 2 ω b ¯ max t [ 0 , ω ] exp ( x 1 ( t ) ) , 0 ω d x 2 d t ( t ) d t < 2 0 ω ( α + χ + μ ) ( t ) d t 2 ω ( α + χ + μ ) , 0 ω d x 3 d t ( t ) d t < 2 0 ω ( γ + ε + μ ) ( t ) + δ ( t ) exp ( x 4 ( t ) ) d t 2 ω ( γ + ε + μ ) + δ b ¯ ( ϕ ) 1 , 0 ω d x 4 d t ( t ) d t < 2 0 ω μ ( t ) d t = 2 ω μ ¯ , 0 ω d x 5 d t ( t ) d t < 2 0 ω μ ( t ) exp ( x 4 ( t ) x 5 ( t ) ) d t 2 ω μ ¯ max t [ 0 , ω ] exp ( x 4 ( t ) x 5 ( t ) ) ,
which conclude the proof of lemma. ☐
Lemma 7.
Assume that hypotheses of Lemma 4. Moreover consider that the hypotheses (15) and x is the solution of the operator equation L x = λ N x with λ ] 0 , 1 [ the following estimates
t h e r e   e x i s t s   δ i > 0   s u c h   t h a t   exp ( x i ( t ) ) > δ i ,   t [ 0 , ω ] ,   i = 1 , , 5 ,
t h e r e   e x i s t s   ρ i > 0   s u c h   t h a t   0 ω exp ( x i ( t ) ) d t < ρ i ,   i = 1 , , 5 ,
t h e r e   e x i s t s   d i > 0   s u c h   t h a t   0 ω d x i d t ( t ) d t < d i ,   i = 1 , , 5 ,
are satisfied. In particular, max t [ 0 , ω ] exp ( x i ( t ) ) ρ i ( ω ) 1 exp ( d i ) and x i ( t ) < ln ( ρ i / ω ) + d i for t [ 0 , ω ] and i = 1 , , 5 .
Proof. 
We get the proof by application of Lemmas 4, 5 and 6, and the hypotheses in Equation (15). We notice that we can prove some relations in Equations (45)–(47) by a straightforward consequence of Lemmas 4, 5 and 6. More precisely, we can deduce
( 45 ) for i = 2 , 4 , 5 , with δ 2 = exp ( α + χ + μ ) ω , δ 4 = exp μ ω , δ 5 = δ 4 ;
( 46 ) for i = 1 , 2 , 3 , 4 , with ρ 1 = ω b ¯ μ , ρ 2 = ω b ¯ ( α + χ + μ ) , ρ 3 = α ρ 2 ( γ + ε + μ ) , ρ 4 = ω b ¯ ϕ ;
( 47 ) for i = 2 , 3 , 4 , with d 2 = 2 ω ( α + χ + μ ) , d 3 = 2 ω ( γ + ε + μ ) + δ ρ 4 , d 4 = 2 ω μ ¯ ;
from Equations (28)–(30); (33)–(36); and (40)–(42); respectively. Meanwhile, to prove the remaining inequalities we proceed as follows:
(i) 
we prove that max t [ 0 , ω ] exp ( x i ( t ) ) ρ i ( ω ) 1 exp ( d i ) for i = 2 , 3 , 4 ;
(ii) 
we prove Equation (45) for i = 1 , 3 ;
(iii) 
we prove Equation (47) for i = 1 ;
(iv) 
we prove Equation (46) for i = 5 ;
(v) 
we prove Equation (47) for i = 5 .
Proof of (i). From Equation (49) and the intermediate value for integrals we can deduce that there exist ξ i [ 0 , ω ] satisfying the inequality x i ( ξ i ) < ln ( ρ i / ω ) for i = 2 , 3 , 4 . Then, by the fundamental theorem of calculus and Equation (50), we deduce that
x i ( t ) = x i ( ξ i ) + ξ i t d x i d t ( t ) d t < ln ( ρ i / ω ) + ξ i t d x i d t ( t ) d t < ln ( ρ i / ω ) + d i , i = 2 , 3 , 4 ,
for any t [ 0 , ω ] , which clearly implies (i).
Proof of (ii). We notice that the assertion proved in (i) for i = 2 , 4 and Equation (31) imply that
( p b ) μ + β ρ 2 ( ω ) 1 exp ( d 2 ) exp ( x 1 ( t ) ) + ϕ ρ 4 ( ω ) 1 exp ( d 4 ) ,
for any t [ 0 , ω ] . By hypotheses in Equation (15) we have that ( p b ) ϕ ρ 4 ( ω ) 1 exp ( d 4 ) κ 1 , then Equation (51) implies Equation (45) for i = 1 with δ 1 = κ 1 [ μ + β ρ 2 ( ω ) 1 exp ( d 2 ) ] 1 . Now, from the assertion proved in (i) for i = 4 and Equation (32) we can deduce Equation (45) for i = 3 with δ 3 = α ( γ + ε + μ ) + δ ρ 4 ( ω ) 1 exp ( d 4 ) 1 .
Proof of (iii). From Equation (48) and Lemma 6, we can follow that Equation (47) for i = 1 is satisfied with d 1 = 2 ω b ¯ / δ 1 .
Proof of (iv). Form similar arguments and notation to the proof of step (i), Equation (47) and Equation (47) for i = 1 , we can deduce that
x 1 ( t ) = x 1 ( ξ 1 ) + ξ 1 t d x 1 d t ( t ) d t < ln ( ρ 1 / ω ) + ξ 1 t d x 1 d t ( t ) d t < ln ( ρ 1 / ω ) + d 1 ,
for some ξ 1 [ 0 , ω ] and any t [ 0 , ω ] . Then, max t [ 0 , ω ] exp ( x 1 ( t ) ) ρ 1 ( ω ) 1 exp ( d 1 ) . Now, from Equation (37) and the assertion proved in (i) for i = 3 we deduce that
0 ω exp ( x 5 ( t ) ) d t ω b ¯ ϕ μ ϕ max t [ 0 , ω ] exp ( x 1 ( t ) ) + ε max t [ 0 , ω ] exp ( x 3 ( t ) ) μ exp ( K ( 0 ) μ ω ) 0 ω exp ( x 5 ( t ) ) d t ω b ¯ ϕ ρ 1 μ ϕ ω exp ( d 1 ) + ε ρ 3 exp ( d 3 ) μ ω exp ( μ ω ) 0 ω exp ( x 5 ( t ) ) d t .
Thus, the hypotheses in Equation (15) implies
κ 2 0 ω exp ( x 5 ( t ) ) d t 1 ε ρ 3 exp ( d 3 ) μ ω exp ( μ ω ) 0 ω exp ( x 5 ( t ) ) d t
ω b ¯ ϕ ρ 1 μ ϕ ω exp ( d 1 ) ,
which implies Equation (46) for i = 5 with ρ 5 = ω b ¯ ϕ ρ 1 exp ( d 1 ) μ ϕ ω κ 2 1 .
Proof of (iv). From (i) with i = 4 and Equation (48)
0 ω d x 5 d t ( t ) d t < 2 ω μ ¯ max t [ 0 , ω ] exp ( x 4 ( t ) x 5 ( t ) ) 2 μ ¯ ρ exp ( d 4 ) d 5 : = d 5 .
Then, Equation (47) for i = 5 is satisfied.
Summarizing we have that Equation (45) is followed by Equation (48) and (ii); Equation (46) is a consequence of Equation (49) and (iv); and Equation (47) is proved from Equation (50), and (iii) and (v). Moreover, we observe that a sequence of similar arguments and notation to the proof of step (i), Equations (47) and (47) for i = 5 , implies that
x 5 ( t ) = x 5 ( ξ 5 ) + ξ 5 t d x 5 d t ( t ) d t < ln ( ρ 5 / ω ) + ξ 5 t d x 5 d t ( t ) d t < ln ( ρ 5 / ω ) + d 5 ,
for some ξ 5 [ 0 , ω ] and any t [ 0 , ω ] . Then, max t [ 0 , ω ] exp ( x 5 ( t ) ) ρ 5 ( ω ) 1 exp ( d 5 ) . Then, we get the additional and particular inequalities are followed from (i) and (iv). ☐

3.2. Proof of (a)

We can prove the estimate in Equation (17) by application of Lemma (7).

3.3. Proof of (b)

If x Ker L , then by the results of Section 2.3, we have that x ( t ) R 5 is constant for any t [ 0 , ω ] . By notational convenience we consider that x ( t ) = ( S 0 , E 0 , I 0 , K 0 , R 0 ) . Then, from Equation (24) the condition Q N ( x T ) = Q N ( ( S 0 , E 0 , I 0 , K 0 , R 0 ) T ) = 0 implies that
0 = p b ¯ exp ( S 0 ) β ¯ exp ( E 0 ) ϕ ¯ exp ( K 0 S 0 ) μ ¯ ,
0 = q b ¯ exp ( E 0 ) + β ¯ exp ( S 0 ) α ¯ χ ¯ μ ¯ ,
0 = α ¯ exp ( E 0 I 0 ) δ ¯ exp ( K 0 ) γ ¯ ε ¯ μ ¯ ,
0 = δ ¯ exp ( I 0 ) + γ ¯ exp ( I 0 K 0 ) + χ ¯ exp ( E 0 K 0 ) μ ¯ ,
0 = ϕ ¯ exp ( S 0 + K 0 R 0 ) + ε ¯ exp ( I 0 R 0 ) μ ¯ .
Then, from Equation (55) and following similar arguments to the proof of Lemma 7, we can deduce that in this case an inequality of the type in Equation (46) is also valid, i.e.,
exp ( S 0 ) < ρ 1 ω , exp ( E 0 ) < ρ 2 ω exp ( I 0 ) < ρ 3 ω , exp ( K 0 ) < ρ 4 ω and exp ( R 0 ) < ρ 5 ω ·
which implies Equation (18). Moreover, from Lemma 7 and the fact that Ker L Dom L , we can deduce that
exp ( S 0 ) > δ 1 , exp ( E 0 ) > δ 2 , exp ( I 0 ) > δ 3 , exp ( K 0 ) > δ 4 , and exp ( R 0 ) > δ 5 ·
Thus, the inequality in Equation (19) is also satisfied.

4. Proof of Theorem 3

4.1. A Previous Lemma

Lemma 8.
Let X and Y be the spaces defined on Equation (13); Ω X the open ball centered at ( 0 , 0 , 0 , 0 , 0 ) with radius
h = i = 1 3 max | ln ( δ i ) | , ln ρ i ω i + d i ,
where δ i , ρ i and d i are defined in the proof of Lemma 7; and L , N and Q the operators defined on Equations (5), (6) and (21), respectively. If Equation (15) is satisfied, the operators L and N satisfy the properties (C1)–(C3) of Theorem 5.
Proof. 
We prove (C1) and (C2) by contradiction argument and we prove (C3) by application of invariance property of the topological degree. Indeed, we have that
(C1)
Let us assume that there are δ ] 0 , 1 [ and x Ω Dom L such that L x = δ N x . Then, by application of Theorem 2-(a) we deduce that x Int Ω which is a contradiction to the assumption that x Ω .
(C2)
Let us assume that there is x Ω Ker L such that Q N x = 0 . Then, by application of Theorem 2-(b) we deduce that x Int Ω which is a contradiction to the assumption that x Ω .
(C3)
Let us define the mapping Φ : Dom L × [ 0 , 1 ] X by the following relation
Φ ( x , υ ) = p b ¯ exp ( x 1 ) β ¯ exp ( x 2 ) ϕ ¯ exp ( x 4 x 1 ) μ ¯ q b ¯ exp ( x 2 ) α + χ + μ ¯ α ¯ exp ( x 2 x 3 ) δ ¯ exp ( x 4 ) γ + ε + μ ¯ δ ¯ exp ( x 3 ) + χ ¯ exp ( x 2 x 4 ) μ ¯ exp ( x 1 + x 4 x 5 ) μ ¯ + υ 0 β ¯ exp ( x 1 ) 0 γ ¯ exp ( x 3 x 4 ) ε ¯ exp ( x 3 x 5 ) .
We prove that Φ ( x , υ ) 0 when x T Ω Ker L and υ [ 0 , 1 ] . From Lemma 1 we recall that x T ( t ) = ( S 0 , E 0 , I 0 , K 0 , R 0 ) R 5 is a constant. Let us consider that the conclusion is false, then the constant vector ( S 0 , E 0 , I 0 , K 0 , R 0 ) T with ( S 0 , E 0 , I 0 , K 0 , R 0 ) = h satisfies Φ ( S 0 , E 0 , I 0 , K 0 , R 0 , υ ) = 0 , that is,
0 = p b ¯ exp ( S 0 ) β ¯ exp ( E 0 ) ϕ ¯ exp ( K 0 S 0 ) μ ¯ , 0 = q b ¯ exp ( E 0 ) α + χ + μ ¯ + υ β ¯ exp ( S 0 ) , 0 = α ¯ exp ( E 0 I 0 ) δ ¯ exp ( K 0 ) γ + ε + μ ¯ , 0 = δ ¯ exp ( I 0 ) + χ ¯ exp ( E 0 K 0 ) μ ¯ + υ γ ¯ exp ( I 0 K 0 ) , 0 = ϕ ¯ exp ( S 0 + K 0 R 0 ) μ ¯ + υ ε ¯ exp ( I 0 R 0 ) .
Then, by following similar reasoning steps to the proof of Theorem 2-(a) we get that ( S 0 , E 0 , I 0 , K 0 , R 0 ) T < h , which contradicts to the assumption that ( S 0 , E 0 , I 0 , K 0 , R 0 ) T = h .
Let us consider J = I : Im Q Ker L such that x T x T , then by applying the Homotopy Invariance Theorem of Topology Degree, using the fact that the system
0 = p b ¯ exp ( x 1 ( t ) ) β ¯ exp ( x 2 ( t ) ) ϕ ¯ exp ( x 4 ( t ) x 1 ( t ) ) μ ¯ , 0 = q b ¯ exp ( x 2 ( t ) ) + β ¯ exp ( x 1 ( t ) ) α + χ + μ ¯ , 0 = α ¯ exp ( x 2 ( t ) x 3 ( t ) ) δ ¯ exp ( x 4 ( t ) ) γ + ε + μ ¯ , 0 = δ ¯ exp ( x 3 ( t ) ) + χ ¯ exp ( x 2 ( t ) x 4 ( t ) ) + γ ¯ exp ( x 3 ( t ) x 4 ( t ) ) μ ¯ , 0 = ϕ ¯ exp ( x 1 ( t ) + x 4 ( t ) x 5 ( t ) ) + ε ¯ exp ( x 3 ( t ) x 5 ( t ) ) μ ¯ .
has a unique solution x T Ω Ker L , noticing that the determinant of the Jacobian of Φ at x T is given by
| J Φ ( x T ) | = ϕ ¯ exp ( x 1 + x 4 x 5 ) + ε ¯ exp ( x 3 x 5 ) ( Π 1 + Π 2 ) ,
with Π 1 and Π 2 the positive functions
Π 1 = β ¯ exp ( x 2 ) μ q b ¯ exp ( x 2 ) [ α ¯ exp ( x 2 x 3 ) χ ¯ exp ( x 2 x 4 ) + γ ¯ exp ( x 3 x 4 ) + δ ¯ exp ( x 4 ) δ ¯ exp ( x 3 ) + γ ¯ exp ( x 3 x 4 ) ] Π 2 = β ¯ exp ( x 1 ) { β ¯ exp ( x 2 ) [ α ¯ exp ( x 2 x 3 ) χ ¯ exp ( x 2 x 4 ) + γ ¯ exp ( x 3 x 4 ) + δ ¯ exp ( x 4 ) δ ¯ exp ( x 3 ) + γ ¯ exp ( x 3 x 4 ) ] + ϕ ¯ exp ( x 2 x 1 ) α ¯ exp ( x 2 x 3 ) δ ¯ exp ( x 3 ) + γ ¯ exp ( x 3 x 4 ) + χ ¯ α ¯ exp ( 2 x 2 x 3 x 4 ) ] } ,
and by Definition 3, we have that
deg J Q N ( x T , Ω Ker L , 0 T = deg Φ ( x , 1 ) , Ω Ker L , 0 T = sgn | J Φ ( x T ) | = 1 .
Hence, we get that deg ( J Q N , Ω Ker L , 0 ) 0 and prove that (C3) is valid.
Therefore, the assertions on items (C1)–(C3) of the Theorem 5 are valid for the given operators. ☐

4.2. Proof of Theorem 3

By Lemmata 7 and 8, we notice that the assumptions of the Theorem 5 are satisfied. Thus, there exist at least one solution of operator equation in Equation (12) belong Dom L Ω ¯ X , which implies the existence of at least one ω periodic solution of the system in Equation (4).

5. Proof of Theorem 4

The proof of Theorem 4 is a consequence of Theorems 3 and 1. Indeed, from Theorem 3 we deduce that there exists at least one ω periodic solution of Equation (4). Then, we get the proof of Theorem 4 by application of Theorem 1.

6. An Example

Let us consider that
b ( t ) = 100 + cos ( π t ) , p ( t ) = 2 3 1 + 1 2 sin ( π t ) , q ( t ) = 1 p ( t ) , α ( t ) = 1.1960 e 90 sin 2 π 2 t , β ( t ) = cos 2 π 2 t , ϕ ( t ) = 1.1 + 1.0 e 10 sin ( π t ) , μ ( t ) = 1.0 e 15 ( 1 + sin ( π t ) ) , γ ( t ) = 1 2 ( 1 . 1 + 1 . 0 e 10 sin ( π t ) ) , χ ( t ) = 1 4 ( 1 . 1 + 1 . 0 e 10 sin ( π t ) ) , δ ( t ) = 3 4 ( 1 . 1 + 1 . 0 e 10 sin ( π t ) ) , ϵ ( t ) = 1 . 0 e 15 4 ( 1 + sin ( π t ) ) ,
which are 2-periodic functions. We notice that
( p b ) ϕ ( ϕ ) 1 b ¯ exp ( 2 ω μ ¯ ) 0.15 , 1 ε α b ¯ μ ( γ + ε + μ ) ( α + χ + μ ) exp ω ( γ + ε + μ ) + ϕ ( ϕ ) 1 b ¯ + μ 0.857 ,
and we have that the hypothesis in Equation (15) is satisfied by selecting κ 1 ] 0 , 0.15 [ and κ 2 ] 0 , 0.857 [ . Thus, by application of Theorem 4, we deduce that the system in Equation (2) with coefficients defined by Equation (57) has at least one positive 2-periodic solution.

Author Contributions

Conceptualization, A.C. and F.H.; methodology, A.C.; investigation, all authors; writing—original draft preparation, F.N.-M. and E.L.; writing—review and editing, E.L.; funding acquisition, I.H. and F.N.-M. All authors have read and agreed to the published version of the manuscript.

Funding

A.C. and F.N.-M. thanks the support of research by projects DIUBB GI 172409/C, DIUBB 183309 4/R and DIUBB 192408 2/R at Universidad del Bío-Bío, Chile.

Acknowledgments

A.C. and E.L. thank the suggestions of colleges at Ciencias Básicas of Universidad del Bío-Bío. I.H. thanks to the grants program “Becas de doctorado” of ANID-Chile, 2017-Fol. 21171196.

Conflicts of Interest

The authors declare that they have no competing interests.

References

  1. Anderson, R.M.; May, R.M. Population biology of infectious diseases I. Nature 1979, 280, 361–367. [Google Scholar] [CrossRef]
  2. Hethcote, H. Qualitative analyses of communicable disease models. Math. Biosci. 1976, 28, 335–356. [Google Scholar] [CrossRef]
  3. Hethcote, H.W. The mathematics of infectious diseases. SIAM Rev. 2000, 42, 599–653. [Google Scholar] [CrossRef] [Green Version]
  4. Kuznetsov, Y.A.; Piccardi, C. Bifurcation analysis of periodic SEIR and SIR epidemic models. J. Math. Biol. 1994, 32, 109–121. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Li, F.; Zhao, X.Q. A periodic SEIRS epidemic model with a time-dependent latent period. J. Math. Biol. 2019, 78, 1553–1579. [Google Scholar] [CrossRef]
  6. Ma, W.; Song, M.; Takeuchi, Y. Global stability of an SIR epidemic model with time delay. Appl. Math. Lett. 2004, 17, 1141–1145. [Google Scholar] [CrossRef] [Green Version]
  7. Martcheva, M. An Introduction to Mathematical Epidemiology; Texts in Applied Mathematics, 61; Springer: New York, NY, USA, 2015. [Google Scholar]
  8. Smith, R. (Ed.) Mathematical Modelling of Zombies; University of Ottawa Press: Ottawa, ON, Canada, 2014. [Google Scholar]
  9. Smith, R. Modelling Disease Ecology with Mathematics, 2nd ed.; AIMS Series on Differential Equations & Dynamical Systems, 5; American Institute of Mathematical Sciences (AIMS): Springfield, MO, USA, 2017. [Google Scholar]
  10. Brauer, F.; Castillo-Chavez, C. Mathematical Models in Population Biology and Epidemiology, 2nd ed.; Texts in Applied Mathematics, 40; Springer: New York, NY, USA, 2012. [Google Scholar]
  11. Kermack, W.O.; McKendrick, A.G. Contributions to the mathematical theory of epidemics: Part I. Proc. R. Soc. A. 1927, 115, 700–721. [Google Scholar]
  12. Capasso, V. Mathematical Structures of Epidemic Systems; Lecture Notes in Biomathematics, 97; Springer: Berlin, Germany, 2008. [Google Scholar]
  13. Coronel, A.; Huancas, F.; Pinto, M. Sufficient conditions for the existence of positive periodic solutions of a generalized nonresident computer virus model. Quaest. Math. 2019. [Google Scholar] [CrossRef]
  14. Muroya, Y.; Enatsu, Y.; Li, H. Global stability of a delayed SIRS computer virus propagation model. Int. J. Comput. Math. 2014, 91, 347–367. [Google Scholar] [CrossRef]
  15. Muroya, Y.; Kuniya, T. Global stability of nonresident computer virus models. Math. Methods Appl. Sci. 2015, 38, 281–295. [Google Scholar] [CrossRef]
  16. Muroya, Y.; Li, H.; Kuniya, T. On global stability of a nonresident computer virus model. Acta Math. Sci. Ser. B Engl. Ed. 2014, 34, 1427–1445. [Google Scholar] [CrossRef]
  17. Murray, W.H. The application of epidemiology to computer viruses. Comput. Secur. 1988, 7, 130–150. [Google Scholar] [CrossRef]
  18. Ren, J.; Yang, X.; Zhu, Q.; Yang, L.-X.; Zhang, C. A novel computer virus model and its dynamics. Nonlinear Anal. Real World Appl. 2012, 13, 376–384. [Google Scholar] [CrossRef]
  19. Alonso-Quesada, S.; De la Sen, M.; Ibeas, A. On the discretization and control of an SEIR epidemic model with a periodic impulsive vaccination. Commun. Nonlinear Sci. Numer. Simul. 2017, 42, 247–274. [Google Scholar] [CrossRef]
  20. Ávila-Vales, E.; Rivero-Esquivel, E.; García-Almeida, G.E. Global dynamics of a periodic SEIRS model with general incidence rate. Int. J. Differ. Equ. 2017. [Google Scholar] [CrossRef] [Green Version]
  21. Bai, Z.; Zhou, Y. Global dynamics of an SEIRS epidemic model with periodic vaccination and seasonal contact rate. Nonlinear Anal. Real World Appl. 2012, 13, 1060–1068. [Google Scholar] [CrossRef]
  22. Cooke, K.L.; van den Driessche, P. Analysis of an SEIRS epidemic model with two delays. J. Math. Biol. 1996, 35, 240–260. [Google Scholar] [CrossRef]
  23. Du, Y.; Guo, Y.; Xiao, P. Freely-moving delay induces periodic oscillations in a structured SEIR model. Internat. J. Bifur. Chaos Appl. Sci. Engrg. 2017, 27, 1750122. [Google Scholar] [CrossRef]
  24. Fang, H.; Wang, M.; Zhou, T. Existence of positive periodic solution of a hepatitis B virus infection model. Math. Meth. Appl. Sci. 2014, 38, 188–196. [Google Scholar] [CrossRef]
  25. Gao, L.Q.; Mena-Lorca, J.; Hethcote, H.W. Four SEI endemic models with periodicity and separatrices. Math. Biosci. 1995, 128, 157–184. [Google Scholar] [CrossRef]
  26. Huang, G.; Takeuchi, Y.; Maw, W.D. Global stability for delay SIR and SEIR epidemic models with nonlinear incidence rate. Bull. Math. Biol. 2010, 72, 1192–1207. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  27. Mateus, J.P.; Silva, C.M. Existence of periodic solutions of a periodic SEIRS model with general incidence. Nonlinear Anal. Real World Appl. 2017, 34, 379–402. [Google Scholar] [CrossRef] [Green Version]
  28. Nakata, Y.; Kuniya, T. Global dynamics of a class of SEIRS epidemic models in a periodic environment. J. Math. Anal. Appl. 2010, 363, 230–237. [Google Scholar] [CrossRef] [Green Version]
  29. Nistal, R.; de la Sen, M.; Alonso-Quesada, S.; Ibeas, A. Limit periodic solutions of a SEIR mathematical model for non-lethal infectious disease. Appl. Math. Sci. 2013, 7, 773–789. [Google Scholar] [CrossRef]
  30. Yan, M.; Xiang, Z. Dynamic behaviors of an SEIR epidemic model in a periodic environment with impulse vaccination. Discrete Dyn. Nat. Soc. 2014. [Google Scholar] [CrossRef]
  31. Zhang, T.; Liu, J.; Teng, Z. Existence of positive periodic solutions of an SEIR model with periodic coefficients. Appl. Math. 2012, 57, 601–616. [Google Scholar] [CrossRef]
  32. Zhang, Y.; Zhu, J. Dynamic behavior of an I2S2R rumor propagation model on weighted contract networks. Phys. A 2019, 536, 120981. [Google Scholar] [CrossRef]
  33. Zhu, L.; Liu, M.; Li, Y. The dynamics analysis of a rumor propagation model in online social networks. Phys. A 2019, 520, 118–137. [Google Scholar] [CrossRef]
  34. Gaines, R.; Mawhin, J. Coincidence Degree and Nonlinear Diffrential Equations; Springer: Berlin, Germany, 1977. [Google Scholar]

Share and Cite

MDPI and ACS Style

Coronel, A.; Huancas, F.; Hess, I.; Lozada, E.; Novoa-Muñoz, F. Analysis of a SEIR-KS Mathematical Model For Computer Virus Propagation in a Periodic Environment. Mathematics 2020, 8, 761. https://doi.org/10.3390/math8050761

AMA Style

Coronel A, Huancas F, Hess I, Lozada E, Novoa-Muñoz F. Analysis of a SEIR-KS Mathematical Model For Computer Virus Propagation in a Periodic Environment. Mathematics. 2020; 8(5):761. https://doi.org/10.3390/math8050761

Chicago/Turabian Style

Coronel, Aníbal, Fernando Huancas, Ian Hess, Esperanza Lozada, and Francisco Novoa-Muñoz. 2020. "Analysis of a SEIR-KS Mathematical Model For Computer Virus Propagation in a Periodic Environment" Mathematics 8, no. 5: 761. https://doi.org/10.3390/math8050761

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop