Next Article in Journal
Fractal, Spectral, and Topological Analysis of the Reservoir-Induced Seismicity of Pertusillo Area (Southern Italy)
Previous Article in Journal
Stability Analysis of a Fractional Epidemic Model Involving the Vaccination Effect
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cost-Benefit and Dynamical Investigation of a Fractional-Order Corruption Population Dynamical System

by
Mehmet Gümüş
1 and
Shewafera Wondimagegnhu Teklu
2,*
1
Department of Mathematics, Faculty of Science, Zonguldak Bülent Ecevit University, 67100 Zonguldak, Türkiye
2
Department of Mathematics, College of Natural and Computational Sciences, Debre Berhan University, Debre Berhan P.O. Box 445, Ethiopia
*
Author to whom correspondence should be addressed.
Fractal Fract. 2025, 9(4), 207; https://doi.org/10.3390/fractalfract9040207
Submission received: 18 February 2025 / Revised: 20 March 2025 / Accepted: 21 March 2025 / Published: 27 March 2025
(This article belongs to the Section Mathematical Physics)

Abstract

The main objective of this study was to investigate the effects of control measures on the diffusion of corruption in the population using a fractional order approach with optimal control theory and cost-benefit analysis. The associated fractional order optimal control problem using three time-dependent control measures was reformulated. Qualitative analysis of the model investigated the model solutions that exist uniquely, the equilibrium points and their stabilities, and the corruption threshold number. Furthermore, we utilized Pontryagin’s Maximum Principle to determine the optimal solution’s existence for the fractional order optimal control problem. Through completing numerical simulations, the study also verified the theoretical results and showed that the implementation of all the proposed control measures greatly reduced corruption diffusion in the community. Eventually, the cost-effectiveness investigation proved that strategy 1, which entailed implementing protection control measures, was the most cost-effective control strategy suggested to the stakeholders for reducing and managing the corruption diffusion problem in the population.

1. Introduction

It is difficult to conceptualize corruption from a social science standpoint because it can apply to a wide range of social activities and actions that will or will not be considered morally or even legally repugnant, depending on a specific set of cultural factors or beliefs [1]. However, according to other academics, corruption is an unpleasant and damaging behavior committed by people, such as unlawful gratitude, abusing a public position for personal benefit, or misusing public authority for one’s benefit [2,3]. It is a cancer for political, social, and economic reform and is sometimes referred to as a “worm inside the body of society” [4]. From the beginning of human history to the present time, corruption has been considered one major unavoidable social disease and has been associated with human being interactions [5]. It has been a socio-economic phenomenon or social threat that is rarely visible and is difficult to measure; however, theoretical discussions have tackled this phenomenon with enthusiasm but, due to the lack of firsthand real data, have rarely produced substantial results [6,7]. From minor violations or acts of unlawful remuneration to extensive mass theft by public authorities, corruption is a multifaceted topic and also has a significant negative impact on sustainable development and is known to cause inefficiencies, diversion of basic resources, and inequality as a result of such impacts [8,9]. The historical and cultural backgrounds of nations throughout the world have made great contributions to the intensity of corruption diffusion [10]. Since low corruption levels are related to high levels of institutional and social trust, the terms corruption and institutional quality play a fundamental role in a country’s socioeconomic development and overall welfare [11,12,13].
To develop the data and test their theories, sociologists who investigate the curse of corruption need to have a thorough understanding of history, society, language, and impacts from at least one intricate and detailed illustration [14]. The following conditions can be identified as mechanisms by which to mitigate corruption, even though complete eradication remains unattainable: a strong commitment to governance coupled with a spiritual engagement in the advancement of national and bureaucratic objectives; effective administration, along with suitable structural reforms within governmental frameworks and regulations to minimize the emergence of corruption; favorable historical and sociological contexts; the establishment of a robust anti-corruption value system; leadership from influential groups characterized by high moral and intellectual integrity; and a well-informed public capable of critically evaluating and responding to unfolding events [14].
Numerous scholars have developed and examined mathematical models pertaining to system dynamics in a variety of fields, such as the natural sciences, social sciences, and other fields [15,16]. While some studies have used fractional order derivatives, such as investigations [17,18], others have used integer order modeling, such as studies [19], to study real-world scenarios. Since its initial construction and analysis in 1975, the mathematical modeling of corruption has drawn the attention of numerous scholars due to its detrimental effects on society [5]. The diffusion of corruption has been the subject of numerous mathematical model studies, including [4,20,21]. We reviewed a number of studies in order to develop and evaluate our suggested fractional-order corruption diffusion model.
The rationale behind reviewing these studies was to determine the fundamental ideas of mathematical modeling, theories, methods, and methodologies, as well as to pinpoint any gaps or limitations. A six-compartmental fractional order optimal control problem for corruption diffusion dynamics was developed and examined by Bonyah Ebenezer [5]. The study did not conduct a cost-effectiveness analysis or divide the compromised individuals into two groups: ignorant and aware. Using optimum control strategies, Athithan et al. [21] investigated a corruption dissemination dynamical system. The cost-benefit of their suggested controlling activities was not evaluated, and their model, the standard SIR model, did not consider the different corruption statuses of people, such as their aware and unaware status. Danford, Oscar [22], “Corruption dynamics in Tanzania: Modeling the effects of control strategies”. A deterministic corruption diffusion dynamical system that considered the possible optimal control activities was developed and examined by Fantaye et al. [23]. Both the cost-benefit investigation of their suggested control activities and the different corruption statuses of individuals, such as their aware and unaware status, were not considered by their model. The study’s conclusions demonstrated that the best way to stop corruption from spreading was through prevention and punishment. An epidemiological corruption model with an immunity clause in Nigeria was developed and studied by Gweryina et al. [20]. Although they conducted both qualitative and quantitative analysis, they did not carry out a cost-benefit investigation. To investigate a corruption issue throughout the community, the study carried out by Alemneh et al. [24] investigated a corruption diffusion dynamical system with controlling activities. An investigation of cost-effectiveness was not conducted in their study. Tesfaye et al. [25] developed and examined the diffusion dynamics of stochastic corruption with transient immunity. Their four-class approach omitted cost-effectiveness analysis and optimum control theory. A dynamical system for corruption diffusion that took media coverage into consideration was developed and examined by Birhanu et al. [4]. Since their model took into account the effect of media coverage, it is unique when compared to other studies in the field. It did not, however, carry out cost-effectiveness analysis or optimal control. According to what we learned from the literature evaluation, no other researcher built a corruption diffusion dynamical system that takes into consideration both the conscious and uninformed classes. This study’s distinctiveness is ensured by the fact that it completed the cost-benefit for the proposed control activities investigation.
Our proposed study’s primary goal is to use a fractional order derivative approach in conjunction with the optimum control principle and cost-benefit investigation to examine how the proposed control measures affect the corruption diffusion problem. By taking into account three time-dependent regulating strategies, this paper primarily examines the corruption optimal control dynamical system with a fractional order derivatives approach. Additionally, there are corrupted and unaware and corrupted and aware subgroups within the human population of the corrupted group. Preventing corruption and improving the lives of those who are corrupted, both aware and unaware, are the controlling methods that we took into consideration. In order to investigate the most cost-benefit control activity to reduce and control the corruption diffusion, we numerically simulated the reconstructed control problem and conducted a cost-effectiveness investigation. The following parts comprise the remaining portion of this work: Section 2 defines the basic concepts of fractional calculus; Section 3 formulates and analyzes the fractional order model for corruption diffusion; Section 4 reformulates the fractional order control problem; Section 5 presents the results of the numerical simulation; Section 6 provides the cost-benefit investigation; and Section 7 concludes and provides future directions for the proposed study.

2. Fractional Calculus Concepts

Fundamental ideas in calculus in fractional form: The development of the suggested corruption diffusion dynamical system depends on the following basic definitions.
Definition 1.
Let g C n be a continuous function, then the φ’s Caputo fractional order derivative is defined by C D t φ g t = 1 Γ n φ 0 t g n ( ξ ) ( t ξ ) n φ t ξ d ξ , n 1 < φ n N   [26,27,28], where
D t φ C g t tends   to   g ˙ t as   φ   1 .
Definition 2.
Let  g C n  be a function; consequently, the Caputo integral with a fractional order φ > 0 is defined as C I t φ g t = 1 Γ φ 0 t f ( ξ ) ( t ξ ) ϑ t ξ d ξ ,  0 < φ < 1 ,   t > 0  [5,26].
Definition 3.
Suppose  β 1 > 0 , β 2 > 0 , then the function defined by  E β 1 , β 2 t = m = 1 t m Γ β 1 m + β 2  is known as a Mittag-Leffler approach function [8,25,29].
Definition 4.
Suppose  β 2 = 1 , then the Mittag-Leffler function is represented by  E β 1 , 1 t = m = 1 t m Γ β 1 m + 1 = E β 1 t    [26].
Definition 5.
The stationary point for the Caputo-fractional order dynamical system is described by the constant  θ  such that C D t ϑ θ t = g t , θ t , ϑ [ 0,1 ]  whenever  g t , θ = 0 .
Proposition 1.
Let φ , for k  1 < φ k ,   k N  be the order of the derivative, then the Laplace transform is represented by  L D t φ h s = s φ H s k = 1 n 1 s φ k 1 h k ( 0 )  such that  H s , where  h t   is the function in the Laplace transform approach.
Proposition 2.
For the two constants approach, the Mittag-Leffler case’s Laplace transformation is represented by  L t β 2 1   E β 1 , β 2 ( ± γ t β 1 ) s = s β 1 β 2 s β 1 γ .
Proposition 3.
Let  h ( t ) L [ 0 , T ]  and C D t φ h ( t ) L [ 0 , T ]  for φ   ( 0,1 ] , the Generalized Mean Value condition describes that  h t = h 0 + 1 Γ ( φ ) C D t φ h ( ζ ) t φ  at  ζ [ 0 , t ] , at each point of time  t , which satisfies  0 < t T .
Lemma 1.
From the third proposition mentioned above, we have the following approaches: (a)  h  is not decreasing for all  t [ 0 , T ] , if C D t φ h ( t ) 0 , and (b)  h  is not increasing for all  t [ 0 , T ] , if C D t φ h ( t ) 0 .
Proposition 4.
Let us assume  f ( t ) L ( R ) F ( R )  and  φ R ,  k  1 < φ k ,   k N  then the three criteria listed below are true (a). (C D t φ I φ f ) t = f t , (b).  ( I φ  C D t φ f ) t = f t j = 0 k 1 t j j ! f j ( 0 ) , (c). Particularly, if  0 < φ < 1 , then  ( I φ  C D t φ f ) t = f t f ( 0 ) , and (d). For a constant function  f t = b  then C D t φ b = 0 .

3. Formulation of Corruption Diffusion Fractional Order Model

3.1. Descriptions and Fundamental Assumptions

We divide the total population N ( t ) at any time t   into five different groups in order to formulate the proposed corruption diffusion dynamical system for the corruption diffusion dynamics in the community that are considered in this study. These groups are as follows: people who are at risk for corruption are represented by S ( t ) ; people who are exposed to corruption are represented by E ( t ) ; people who are corrupted but unaware are represented by U ( t ) ;   people who are corrupted and aware are represented by A ( t ) ; and people who are repented (improved) from corruption are represented by R ( t ) .
N t = S t + E   t + U   t + A t + R t .
The susceptible individuals become corrupted at the rate represented by
λ C t = β N ρ 1 M C t + ρ 2 H C t ,
where ρ 1 and ρ 2 are parameters that reveal the corruptness of unaware and aware people, respectively.
A q portion of people who are exposed to corruption moves to the compartment A ( t ) at ϖ , and the remaining part ( 1 q ) enters into U ( t ) with a similar rate.
Some people from the unaware corrupted group U ( t ) and from the A ( t )   group progress into the group   R ( t ) at rates α 1 and α 2 , respectively.
The parameter η is the rate of progression for unaware corrupted people to become aware of corruption.
People in each compartment (group) homogeneously mix; i.e., they have the same corruption status.
The total population is not constant.
Fear of punishment is used as a mechanism for reducing corruption.
Some protection mechanisms of corruption diffusion include: A strong commitment to governance coupled with a spiritual engagement in the advancement of national and bureaucratic objectives; effective administration along with suitable structural reforms within governmental frameworks and regulations to minimize the emergence of corruption; favorable historical and sociological contexts; the establishment of a robust anti-corruption value system; leadership from influential groups characterized by high moral and intellectual integrity; and a well-informed public capable of critically evaluating and responding to unfolding events.
Corrupted individuals improve from corrupted activities due to fear of punishment, education mechanisms, and legal actions taken by the concerned body, etc.
Some of the individuals who are in contact with exposed groups may be unaware they are corrupted, and some of them may be aware they are corrupted.
Using the descriptions, assumptions, and parameter descriptions interpreted in Table 1, the schematic diagram that represents the flow of individuals from one state of corruption diffusion to another state is represented in Figure 1.
The Corruption Diffusion Dynamical System: By considering Figure 1, as described above, the corruption diffusion dynamical system with a fractional order derivative approach is represented by:
D t φ C S = Κ φ λ F + d φ S , D t φ C E = λ F S d φ + ϖ φ E , D t φ C U = q φ ϖ φ E d φ + α 1 φ + η φ U , D t φ C A = 1 q φ ϖ φ E + η φ U d φ + α 2 φ A , D t φ C R = α 1 φ U + α 2 φ A d φ R ,
where λ F t = β φ N ρ 1 φ M C t + ρ 2 φ H C t   with the initial condition described by
S 0 > 0 ,   E 0 0 ,   U 0 0 , A ( 0 ) 0 ,   and   R ( 0 ) 0 .

3.2. Theoretical Approaches

3.2.1. None-Negativity and Boundedness of the Model (3) Solutions

The corruption diffusion dynamical system (3) should be well-posed theoretically and physically, and its solutions should demonstrate boundedness and non-negativity.
Theorem 1.
The region   Ω = S , E , U , A , R R + 5 , N ( t ) Κ φ d φ is bounded and positively invariant for all t [ 0 , T 0 ] where T 0 > 0 .
Proof. 
The inequalities are derived from the fractional order model (3) and represented by
D t φ C S | S = 0 = Κ φ 0 ,
D t φ C E | E = 0 = λ F S 0 ,
D t φ C U | U = 0 = q φ ϖ φ E 0 ,
D t φ C A | A = 0 = 1 q φ ϖ φ E + η φ U 0 ,
D t φ C R | R = 0 = α 1 φ U + α 2 φ A .
Since S ( 0 ) , E ( 0 ) , U ( 0 ) , A ( 0 ) , R ( 0 ) R + 5 and any of the parameters in the dynamical system are positive, and applying Lemma 1 and Proposition 3, the set S ( t ) , E ( t ) , U ( t ) , A ( t ) , R ( t )   enters into   R + 5 . This suggests that R + 5 is a positively invariant region. The result is now obtained by adding together each of the fractional-order differential equations mentioned in (3).
D t φ C N ( t ) = D t φ C S + D t φ C E + D t φ U + D t φ C A + D t φ C R = Κ φ d φ N t d 2 φ A .
D t φ N t Κ φ d φ N ( t ) .
The Laplace transformation conditions described in Propositions 1 and 2 are now applied to calculate L D t φ N t Κ φ S d φ L N t . This is then simplified to ascertain the outcome L N t Κ S 1 S φ + d φ + S φ 1 N ( 0 ) S φ + d φ . We discovered the outcome using definition 5 and the inverse Laplace transformation criteria N t N 0 E φ d φ t φ + Κ φ d φ ( 1 E φ d φ t φ ) . Thus, if N 0 Κ φ d φ , then 0 < N t Κ φ d φ for every time t 0 . Thus, the dynamical system (3) is well-posed and means one can investigate mathematically as well as the biological conditions, since the entire number of humans included in this paper is represented by N ( t ) , bounded by Ω s S , E , U , A , R R + 5 , N ( t ) Κ φ d φ .□

3.2.2. Existence of the Corruption Dynamical System (3) Unique Solution

Assume that J = 0 , T   and T   is a positive real number. Let us use the norm defined by Y = s u p Y ( t ) : t J , and to understand the collection of continuous bounded functions described in the set J by F b 0 J ; when combined with (12), the fractional-order system (3) can be expressed as
D t φ Y t = G t , Y t ,   0 < t < T f < , Y 0 = Y 0 ,
where Y t = S ( t ) , E ( t ) , U ( t ) , A ( t ) , R ( t ) , it symbolizes the five compartments of the proposed dynamical system, and G is defined as
G t , Y t = G 1 t , S ( t ) G 2 t , E t G 3 t , M C ( t ) G 4 t , H C ( t ) G 5 t , R ( t ) = Κ φ λ F + d φ S λ F S d φ + ϖ φ E ( 1 q φ ) ϖ φ E d φ + α 1 φ + η φ U q φ ϖ φ E + η φ U d φ + α 2 φ A α 1 φ U + α 2 φ A d ϑ R .
Using the aforementioned Proposition 4 condition (c), we ascertain the integral equations listed below.
S t S 0 = I t φ ( Κ φ λ F + d φ S ) , E t E 0 = I t φ ( λ F S d φ + ϖ φ E ) , U t U 0 = I t φ ( ( 1 q φ ) ϖ φ E d φ + α 1 φ + η φ U ) , A t A 0 = I t φ ( q φ ϖ φ E + η φ U d φ + α 2 φ A ) , R t R 0 = I t φ ( α 1 φ U + α 2 φ A d φ R ) .
Equation (7) has led us to the following conclusion.
S t = S 0 + 1 Γ φ 0 t t s φ 1 G 1 s , S s d s , E t = E 0 + 1 Γ φ 0 t t s φ 1 G 2 s , E s d s , U t = U 0 + 1 Γ φ 0 t t s φ 1 G 3 s , M C s d s , A t = A 0 + 1 Γ φ 0 t t s φ 1 G 4 s , H C s d s , R t = R 0 + 1 Γ φ 0 t t s φ 1 G 5 s , R s d s .
Furthermore, we have ascertained the following using Picard’s numerical iteration method [30,31]:
S n t = 1 Γ φ 0 t t s φ 1 G 1 s , S n 1 s d s , E n t = 1 Γ φ 0 t t s φ 1 G 2 s , E n 1 s d s , U n t = 1 Γ φ 0 t t s φ 1 G 3 s , U n 1 s d s , A n t = 1 Γ φ 0 t t s φ 1 G 4 s , A n 1 s d s , R n t = 1 Γ φ 0 t t s φ 1 G 5 s , R n 1 s d s .
In the end, the original value described in (5) is modified as
Y t = Y 0 + 1 Γ φ 0 t G ( s , Y s ) t s φ 1 d s . Then, we formulated the lemma described as follows:
Lemma 2.
Suppose G ( t , Y ) , a vector represented in (6), satisfies the conditions of the Lipschitz approach at Y on [ 0 , T ] × R + 5 with constant A = max β α 1 φ + α 2 φ ,   d φ + ϖ φ , d φ + α 1 φ + η φ , d φ + α 2 φ , d φ for the Lipschitz approach [5,32].
Proof. 
Then, we have the following assertions
G 1 t ,   S 1 t G 1 t ,   S 2 t = β φ ρ 1 φ U + ρ 2 φ A N d φ S 1 t S 2 t , ( β φ ρ 1 φ + ρ 2 φ + d ) S 1 S 2 , G 2 t ,   E 1 t G 2 t ,   E 2 t d φ + ϖ φ E 1 E 2 , G 3 t ,   U 1 t G 3 t ,   U 2 t d φ + α 1 φ + η φ U 1 U 2 , G 4 t ,   A 1 t G 4 t ,   A 2 t d φ + d 2 φ + α 2 φ A 1 A 2 , G 5 t ,   R 1 t G 5 t ,   R 2 t d φ R 1 R 2 .
Thus, we conclude that
G t , Y 1 t G t , Y 2 t A Y 1 Y 2
with A = max β α 1 φ + α 2 φ , d φ + ϖ φ , d φ + α 1 φ + η φ , d φ + α 2 φ , d φ .
Lemma 3.
Given Equation (11), there is only one solution to the starting value fractional order equation given in (3) with (4), such that Y t F b 0 J .
Proof. 
Let us combine the Picard-Lindelöf approach and fixed point theory [30,31]; we can demonstrate Lemma 3. Y ( t ) = T ( Y ( t ) ) is the expression for the dynamical system (3) with the conditions provided at (4). In this case, T represents the Picard operator provided by
T :   F b 0 J , R 5 F b 0 J , R 5 ,   T [ Y t ] = Y 0 + 1 Γ φ 0 t G ( s ,   Y s ) t s φ 1 d s .
Moreover, we have T Y 1 t T Y 2 t = 1 Γ φ 0 t t s φ 1 × [ G s , Y 1 s G s , Y 2 s ] 1 Γ φ 0 t t s φ 1 d s × G s , Y 1 s G s , Y 2 s A Γ φ 0 t t s φ 1 d s A ϑ Γ φ T .
Thus, the corruption diffusion dynamical system (3) with the conditions represented by (4) has a solution uniquely determined if we have A ϑ Γ φ T < 1 , as T exhibits a contraction.□

3.2.3. Equilibrium Points and Basic Reproduction Number

We calculate the expression C D t φ S t =  C D t φ E t = C D t φ U t = C D t φ A t = C D t φ R t   = 0 by setting all the numbers of exposed, corrupted, and recovered individuals to zero, since E = U = A = R = 0 . This allows us to find the corruption-free stationary point of the dynamical system (3). Following additional calculations, we identify the suggested corruption-free stationary point of the formulated model (3) as E C 0 = ( S 0 , E 0 , U 0 , A 0 , R 0 ) =   ( Κ φ d φ , 0 , 0 , 0,0 ) .
The corruption diffusion dynamics reproduction number, which can be represented by R 0 φ , is important and plays a key role in real-world scenarios. We utilize a similar criterion outlined in [33] in order to calculate the corruption diffusion reproduction number R 0 φ . We calculate the model’s reproduction number (3) using the same methodology as described in [33] as R 0 φ = 1 ϖ φ + d φ R 1 + R 2 + R 3 where R 1 = β φ ϖ φ ρ 1 φ 1 q φ η φ + α 1 φ + d φ , R 2 = β φ ϖ φ ρ 2 φ q φ α 2 φ + d φ , and R 3 = β φ ϖ φ ρ 2 φ 1 q φ η φ ( η φ + α 1 φ + d φ ) ( α 2 φ + d φ ) .
The dynamical system (11)’s right-hand side is set to zero in order to calculate the corruption persistence stationary point. Assuming that   E C = S , E , U , A , R as the corruption persistence stationary point of dynamical system (3), we find the unique corruption persistence stationary point at R 0 φ > 1 for each of S , E , U , A , R by solving
E C = Κ φ ( R 0 φ 1 ) ϖ φ + d φ R 0 φ 1 + d φ + d φ β φ ρ 1 φ + α 1 φ d φ β φ ρ 1 φ R 1 + 1 β φ ρ 2 φ + α 2 φ d φ β φ ρ 2 φ ( R 2 + R 3 ) , S = 1 + ϖ φ + d φ R 0 φ R 0 φ 1 E ,
U = R 1 β φ ρ 1 φ E ,   A = ( R 2 β φ ρ 2 φ + R 3 β φ ρ 2 φ ) E and   R = α 1 φ d φ β φ ρ 1 φ R 1 + α 2 φ d φ β φ ρ 2 φ R 2 + R 3 E .

3.2.4. Stabilities of the Equilibrium Points

The corruption-free stationary point E C 0 ’s local and global stabilities are examined by demonstrating Theorems 2 and 4 below, while the corruption persistence equilibrium point E C ’s global stability is examined by demonstrating Theorem 5 below.
Theorem 2.
The corruption-free stationary point E C 0 is locally asymptotically stable if R 0 φ < 1 , and unstable if R 0 φ > 1 .
Proof. 
The corruption-free equilibrium point E C 0 = ( S 0 , E 0 , U 0 , A 0 , R 0 ) =  Κ φ d φ , 0 , 0 , 0,0   local stability is proved using the same approach outlined in Theorem 2. The Jacobian matrix at the corruption-free equilibrium point E C 0 is computed and represented by
J E C 0 = d φ 0 β φ ρ 1 φ β φ ρ 2 φ 0 ( ϖ φ + d φ ) β φ ρ 1 φ β φ ρ 2 φ 0 ϖ φ 1 q φ ( η φ + α 1 φ + d φ ) 0 0 ϖ φ q φ η φ ( α 2 φ + d φ ) .
Following the resolution of the Jacobian matrix J E C 0 ’s characteristics equation det J E C 0 λ I 4 = 0 , we are able to ascertain the eigenvalues of J E C 0 , which are provided by
λ 1 = d φ , λ 2 = ( d φ + ϖ φ ) , λ 3 = η φ + α 1 φ + d φ R 1 ,   and   λ 4 = ( α 2 φ + d φ ) 1 R 0 φ 1 R 1 .
Consequently, the corruption-free stationary point E C 0 has local asymptotic stability, since each eigenvalue has a negative real portion whenever R 0 φ < 1 .□
Theorem 3.
(a). Assuming that y ( t ) is a continuous, differentiable, real-valued function, we obtain 1 2 D t φ T C ( y 2 t ) y t D t φ T C y t for all 0 < φ 1   for every t     T [13].
  • (b). For each t     T , we do have D t φ T C y t y y ln y t y 1 y t y D t φ T C y t ,   y R + , f o r   a l l 0 < φ 1 [13] since y ( t ) is a differentiable and real-valued function [13].
Theorem 4.
For model (3), the corruption-free stationary point represented by E C 0 = ( S 0 , E 0 , U 0 , A 0 , R 0 ) =  Κ φ d φ , 0 , 0 , 0,0 is unstable when R 0 φ > 1 stable when R 0 φ < 1 in global sense.
Proof. 
Applying similar criteria as described in the literature [34,35], we construct the Lyapunov function, defined as follows
L t = Γ φ 2 S 0 E 2 ( t ) + β φ ρ 1 φ Γ φ 2 S 0 η φ + α 1 φ + d φ I A 2 ( t ) + β φ ρ 2 φ Γ φ 2 S 0 α 2 φ + d φ I C 2 ( t )
where S 0 = Κ φ d φ ; where L t is positive definite and continuous for all t 0 .
Similar to the use of the statement in Theorem 4 described above, we determine that
D t φ C L t = Γ φ 2 S 0 D t ϑ E 2 ( t ) + β φ ρ 1 φ Γ φ 2 S 0 η φ + α 1 φ + d φ D t φ M C 2 t + β φ ρ 2 φ Γ φ 2 S 0 d 2 φ + α 2 φ + d φ D t φ H C 2 t , Γ ( φ ) S 0 E ( t ) D t φ E ( t ) + β φ ρ 1 φ Γ φ S 0 η φ + α 1 φ + d φ U ( t ) D t φ U t + β φ ρ 2 φ Γ φ S 0 α 2 φ + d φ A t D t φ A t
Since Ω = S , E , U , A , R R + 5 , N ( t ) Κ φ d φ , we have
D t φ C L t Κ φ Γ φ d φ Γ φ S 0 D t φ E t + β φ ρ 1 φ Γ φ S 0 η φ + α 1 φ + d φ D t φ U t + β φ ρ 2 φ Γ ϑ φ S 0 α 2 φ + d φ D t φ A t , D t φ E t + β φ ρ 1 φ η φ + α 1 φ + d φ D t φ U t + + β φ ρ 2 φ α 2 φ + d φ D t φ A t ) , ( β φ ρ 1 φ U + ρ 2 φ A S N ( ϖ φ + d φ ) E ) + β φ ρ 1 φ ( ϖ φ 1 q φ E η φ + α 1 φ + d φ U ) η φ + α 1 φ + d φ + β φ ρ 2 φ ( ϖ φ q φ E + η ϑ A ( α 2 φ + d φ A ) η φ + α 1 φ + d φ , ( β φ ρ 1 φ U + ρ 2 φ A S N 1 + β φ ρ 1 φ η φ + α 1 φ + d φ ϖ φ 1 q φ + β φ ρ 2 φ ϖ φ q φ α 2 φ + d φ ( ϖ φ + d φ ) E + β φ ρ 2 φ η φ U α 2 φ + d φ .
Using the equilibrium point U = ϖ φ 1 q φ η φ + α 1 φ + d φ E , we have
D t φ L t ( β φ ρ 1 φ U + ρ 2 φ A S N 1 + β φ ρ 1 φ η φ + α 1 φ + d φ ϖ φ 1 q φ + β φ ρ 2 φ ϖ φ q φ α 2 φ + d φ ( ϖ φ + d φ ) E + β φ ρ 2 φ η φ A α 2 φ + d φ β φ ρ 1 φ U + ρ 2 φ A S N 1 + ( ϖ ϑ + d φ ) ( β φ ρ 1 φ ϖ φ 1 q φ ( ϖ φ + d φ ) η φ + α 1 φ + d φ + β ϑ ρ 2 φ ϖ φ q φ ( ϖ φ + d φ ) d 2 φ + α 2 φ + d φ + β φ ρ 2 φ ϖ φ 1 q φ ( ϖ ϑ + d ϑ ) η φ + α 1 φ + d φ α 2 φ + d φ ) E , β φ ρ 1 φ U + ρ 2 φ A S N 1 + ( ϖ φ + d φ ) ( R 0 φ 1 ) E .
The last expression suggests that C D t φ L t 0 , since S N and R 0 φ 1 . Furthermore, whenever S , E , U , A , R = E C 0 = S 0 , 0,0 , 0,0 , then C D t φ L t = 0 . Therefore, the singleton set E C 0 = Κ φ d φ , 0,0 , 0,0 is the invariant set S , E , U , A , R R + 5 : D t φ L t = 0   . Therefore, according to LaSalle’s invariance criterion [35], whenever   R 0 φ < 1 , the model (3) corruption-free stationary point has global asymptotic stability.□
Theorem 5.
The fractional order model (3)’s corruption persistence stationary point, illustrated by   E C = ( S , E , U , A , R ), has global asymptotic stability in the area represented by   Ω = S , E , U , A , R R + 5 , N ( t ) Κ φ φ d φ whenever R 0 φ > 1 .
Proof. 
It is necessary to demonstrate that the unique corruption persistence stationary point E C has global asymptotic stability if R 0 φ > 1 , assuming that the fractional order for the corruption diffusion model (3) is   0 < φ 1 . Let us construct the Lyapunov function using the same approach applied in [27] as
G t ) = S S S ln S S + E E E ln E E + β φ ρ 1 φ η φ + α 1 φ + d φ S U U U ln U U + β φ ρ 2 φ α 2 φ + d φ S A A A ln A A .
The following outcome is obtained by using item (b) of Theorem 3.
D t φ C G t 1 S S D t φ S t + 1 E E D t φ E t + β φ ρ 1 φ η φ + α 1 φ + d φ S 1 U U D t φ U t + β φ ρ 2 φ α 2 φ + d φ S 1 A A D t φ A t .
The following formulas can be obtained by using model (3) and the model corruption persistence equilibrium point that was previously calculated:
Κ φ = β φ ρ 1 φ U + ρ 2 φ A S + d φ S , ( ϖ φ + d φ ) = β φ ρ 1 φ U + ρ 2 φ A S E , ϖ φ ( 1 q φ ) = η φ + α 1 φ + d φ U E , ϖ φ q φ = η φ U + α 2 φ + d φ A E .
The inequalities are provided by calculating the results of substituting items from (13) into (12).
D t φ G t 2 d φ S * 2 S S * S * S + β φ ρ 1 φ U * S * 3 S * S E U * E * U S E * U S * E U * + β φ ρ 2 φ A * S * 3 S * S E A * E * A S E * A S * E A * , the inequalities are then derived from the arithmetic-geometric mean requirements as 2 S S * S * S 0 ,   3 S * S E U * E * U S E * U S * E U * 0 and 3 S * S E A * E * A S E * A S * E A * 0 . According to these findings, C D t φ G t 0 . Additionally, whenever { S , E , U , A , R R + 5 : D t φ G t = 0 } , then C D t φ G t = 0 . Thus, only the singleton set { E C * = S * , E * , U * , A * , R * } is the biggest invariant set when the feasibility region meets the criteria { S , E , U , A , R R + 5 : D t φ G t = 0 } . Therefore, whenever R E φ > 1 , the corruption diffusion model corruption persistence stationary point has global asymptotic stability.□

4. Theoretical Investigation of the Control Dynamics

Here, let us modify the corruption diffusion dynamical system (3) by considering three time-based control techniques. To express the control measures incorporated into the corruption diffusion dynamics in the community, we denoted the functions u 1 t as the protection control activity, u 2 t as the improvement activity, and u 3 t as the improvement activity, such that 0 u 1 t h , u 2 t h and u 3 t n are the Lebesgue measurable controlling functions.
Measures to prevent corruption. The degree of the corruption prevention mechanism, or the efforts carried out to stop people from engaging in corrupt practices, is denoted by the control activity u 1 t .
Corruption Improvement Techniques: The time-dependent control measures for unaware and aware corrupted persons are represented by u 2 t and u 3 t , respectively.
The new optimal control dynamical system for the dynamical system (3) is reconstructed as:
D t φ C S = Κ φ ( 1 u 1 t ) β φ ( ρ 1 φ U + ρ 2 φ A ) N + d φ S , D t φ C E = ( 1 u 1 t ) β φ ( ρ 1 φ U + ρ 2 φ A ) M d φ + ϖ φ E , D t φ C U = ( 1 q φ ) ϖ φ E ( d φ + η φ + u 2 ( t ) α 1 φ ) U , D t φ C A = q φ ϖ φ E + η φ U ( d φ + u 3 ( t ) α 2 φ ) A , D t φ C R = u 2 ( t ) α 1 φ U + u 3 ( t ) α 2 φ A d φ R ,
where S 0 > 0 , E 0 0 , U 0 0 , A 0 0 , R 0 0 , and the set Δ C = ( u 1 , u 2 , u 3 ) : 0 u 1 t 1 , u 2 t 1 , u 3 t 1 , t 0 , T f , which contains control techniques where T f is the last moment to put control measures into action. The goal of constructing the control dynamical system is, at the expense of implementing control techniques, to raise the repentant people number and decrease the number of exposed people, unaware corrupted people, and aware corrupted people. In order to reduce the corrupted people, we construct the objective function denoted by
J u 1 ,   u 2 , u 3 = 0 T f χ 1 E + χ 2 U + χ 3 A + Γ 1 2 u 1 2 + Γ 2 2 u 2 2 + Γ 3 2 u 3 2   d t .
System (15) minimizes   u 1 t ,   u 2 t , and u 3 t in order to regulate the corrupted people number and the expense of applying protection and improvement control activities. The final time is represented by the constant T f in this section, the coefficients χ 1 , χ 2   and χ 3   are positive constants, and the costs relative to protection and improvement activities, Γ 1 2 ,   Γ 2 2 , and Γ 3 2 , correspond to the controls u 1 ,   u 2 , and   u 3 , respectively. Additionally, the units of integrand are balanced. The purpose is to minimize the objective function and determine the ideal values U = u 1 ,   u 2 , u 3 of the controls U = u 1 ,   u 2 , u 3 so that the state trajectories S ,   E ,   U ,   A ,   R   are solutions of (15) in the specified time range 0 , T f with starting data. The cost associated with exposed individuals is denoted by the phrase “ χ 1 E ” in the cost functional, the cost associated with moderately corrupted persons by the term “ χ 2 U ”, and the cost associated with severely corrupted individuals by the term “ χ 3 A ”. Additionally, T f   is the last time the control measures are applied, and χ i   and Γ i   are constants that are non-negative and indicate the cost for the triple control activities implementation and the related attempts to reduce the diffusion of corruption, respectively, for i = 1,2 , 3 .
Subject to the dynamical system represented by (14) with the given initial criteria, the goal of the corruption diffusion dynamical system (14) is to find the optimal value of the control activity u ( t ) that minimizes the objective function described as min u ¯   U ¯ J ( u ¯ ) . The controlling vector is u ¯ = { u 1 ,   u 2 ,   u 3 ) , and the acceptable controls are the set U ¯ = { u ¯   ( L ( 0 , T f ) ) 3 ,   0     u i     1 ,   i = 1 ,   2 ,   3 } .
Existence and Suitability of Control Techniques: It is possible to rewrite the corruption diffusion dynamical system (3) with (4) as
D t φ V = M t , V t + H t , V t u ¯ , 0 n t T f , V t = V 0 ,
where V t = ( S t , E t , U t , A t , R t ) symbolizes the variables, u t = ( u 1 t , u 2 t , u 3 t represents control activities of the model (14), and
M t , V t = Κ φ β φ ρ 1 φ U + ρ 2 φ A N + d φ S β φ ρ 1 φ U + ρ 2 φ A N S d φ + ϖ φ E ( 1 q φ ) ϖ φ E d φ + η φ U q φ ϖ φ E + η φ U d φ A d φ R ,
H t , V t = β φ ( ρ 1 φ U + ρ 2 φ A ) N S 0 0 β φ ( ρ 1 φ U + ρ 2 φ A ) N S 0 0 0 α 1 φ U 0 0 0 α 2 φ A 0 α 1 φ U α 1 φ U .
Here, we must demonstrate the existence of the three ideal control techniques by proving the following conditions: the collection of control functions is a convex set, a bounded set, and a closed set, the control trajectories are non-empty, and M t , V t + H t , V t is constrained by the control variables and state variables, and χ 1 E + χ 2 U + χ 3 A + Γ 1 2 u 1 2 + Γ 2 2 u 2 2 + Γ 3 2 u 3 2 on the collection U ¯ is convex.
Note that: The requirements listed below are predicated using definitions from the manuscript: as per the collection, the U ¯ definition is a convex set, a bounded set, and a closed set. Since 0 d u i 1 , for i = 1,2 , 3 , the system dynamics (14) solutions are uniquely constrained based on similar criteria applied in the system dynamics (3). The solution Y = ( S , E , U , A , R ) for the system dynamics (3) with the supplied initial population is non-empty with control functions values of   u 1 = 1 ,   u 2 = 0 , and   u 3 = 0 in the admissible control set U ¯ described above.
Theorem 6.
The function represented by M t , V t + H t , V t u ¯   meets at the corruption diffusion system dynamics solution V ¯ = ( S , E , U , A , R ) , where M t , V ¯ + H t , V ¯ m a x ( k 1 , k 2 ) ( V ¯ + u ¯ ) , k 1 = m a x ( 1 + β φ ρ 1 φ + ρ 2 φ + d φ , d φ + ϖ φ , d φ + η φ + α 1 φ , d φ + α 2 φ , d φ ) , and k 2 = m a x ( β φ ρ 1 φ + ρ 2 φ ,   η φ , 1 ) .
Proof. 
Let us describe M t , V t as
M t , V t = D 0 0 0 0 β φ ( ρ 1 φ U + ρ 2 φ A ) N d φ + ϖ φ 0 0 0 0 ( 1 q φ ) ϖ φ d φ + η φ + α 1 φ 0 0 0 q φ ϖ φ η φ d φ + α 2 φ 0 0 0 α 1 φ α 2 φ d φ S E U A R ,
where D = Κ φ S β φ ( ρ 1 φ U + ρ 2 φ A ) N . Based on the conditions of the matrix M t , V t , we get Κ φ S and, because we have demonstrated that the solution is bounded, M t , V ¯ m a x ( 1 + β φ ρ 1 φ + ρ 2 φ + d φ , d φ + ϖ φ , d φ + η φ + α 1 φ , d φ + α 2 φ , d φ ) V ¯ . With the same approach, one can prove that M t , V ¯ m a x ( β φ ρ 1 φ + ρ 2 φ ,   η φ , 1 ) u ¯ .□
Theorem 7.
We construct a function described by Q t , V ¯ , u ¯ = χ 1 E + χ 2 U + χ 3 A + Γ 1 2 u 1 2 + Γ 2 2 u 2 2 + Γ 3 2 u 3 2 in the admissible control zone U ¯ , which is convex, and k is a non-negative parameter that exists and that satisfies   Q t , V ¯ , u ¯ k u ¯ .
Proof. 
For function Q t , V ¯ , u ¯ one can obtain the matching matrix (Hessian), which is provided as
H = 2 u 1 0 0 0 2 u 2 0 0 0 2 u 3 .
Consequently, Q t , V ¯ , u ¯ is strictly convex in   U , since H described above is a positive definite diagonal matrix in the area U ¯ . Let k = m i n ( Γ 1 2 , Γ 2 2 , Γ 3 2 ) , then V t , Y ¯ , u ¯ = χ 1 E + χ 2 U + χ 3 A + Γ 1 2 u 1 2 + Γ 2 2 u 2 2 + Γ 3 2 u 3 2 Γ 1 2 u 1 2 + Γ 2 2 u 2 2 + Γ 3 2 u 3 2 k ( Γ 1 2 u 1 2 + Γ 2 2 u 2 2 + Γ 3 2 u 3 2 ) . Hence, we establish the required proof.□
Theorem 8.
The model-associated solutions Y ¯ = S , E , U , A , R ,   as well as the optimal control point u ¯ = ( u 1 , u 2 , u 3 ) that minimize J ( u ¯ ) on the collection U ¯ so that min u ¯   U ¯ J ( u ¯ ) = J ( u ¯ ) .
The requirement for optimality is, according to [17], the optimality necessary condition that the optimal control issues (14) and (15) must satisfy comes from Pontryagin’s Maximum Principle. Additionally, it is satisfied by transforming into a function (Hamiltonian function) that minimizes regard to the control activities ( u 1 , u 2 , u 3 ) . The following is the derivation of the equivalent Hamiltonian for (14) and (15):
H Y ¯ , u ¯ ,   Κ φ = χ 1 E + χ 2   U + χ 3   A + Γ 1 2 u 1 2 + Γ 2 2 u 2 2 + Γ 3 2 u 3 2
λ 1 ( Κ φ ( ( 1 u 1 ( t ) ) β φ ( ρ 1 φ U + ρ 2 φ A ) M + d φ ) S ) + λ 2 ( ( 1 u 1 ( t ) ) β φ ( ρ 1 φ U + ρ 2 φ A ) N ( d φ + ϖ φ ) E ) + λ 3 ( ( 1 q φ ) ϖ φ E ( d φ + η φ + u 2 ( t ) α 1 φ ) U ) + λ 4 ( q φ ϖ φ E + η φ U ( d φ + d 2 φ + u 3 ( t ( α 2 φ ) A ) + λ 5 ( u 2 ( t ) α 1 φ U + u 3 t α 2 φ A d φ R ) ,
where the co-state or adjoint variables are λ 1 ,   λ 2 ,   λ 3 ,   λ 4 ,   and   λ 5 at time t.
Theorem 9.
Given solutions u i at i = 1,2 , 3 and solutions of the system dynamics (14) that minimize the function illustrated in (15) in the region U ¯ , there exist adjoints λ 1 ( t ) ,   λ 2 ( t ) , λ 3 ( t ) , λ 4 ( t ) , and λ 5 ( t ) such that s:
D t φ C λ 1 = λ 1 λ 2 1 u 1 β φ ρ 1 φ U + ρ 2 φ A N 1 S N + d φ λ 1 , D t φ C λ 2 = ( λ 2 λ 1 ) ( 1 u 1 ) β φ ( ρ 1 φ U + ρ 2 φ A ) S N 2 + λ 2 ( d φ + ϖ φ ) λ 3 ( 1 q φ ) ϖ φ λ 3 q φ ϖ φ χ 1 , D t φ C λ 3 = λ 2 λ 1 1 u 1 β φ ρ 1 φ U + ρ 2 φ A S N 2 β φ ρ 1 φ S N + λ 3 λ 4 ( η φ + u 2 ) + λ 3 B + λ 4 α 1 φ χ 2 , D t φ C λ 4 = λ 2 λ 1 1 u 1 β φ ρ 1 φ U + ρ 2 φ A S N 2 β φ ρ 2 φ S N + λ 4 λ 5 ( α 2 φ + u 3 ) + λ 4 d φ + d 2 φ χ 3 , D t φ C λ 5 = λ 2 λ 1 1 u 1 β φ ρ 1 φ U + ρ 2 φ A S M 2 + λ 5 d φ ,
where B = d φ + α 1 φ . Then, for previously specified function H system’s transversality criteria, λ i * T f = 0 at i = 1 ,   2 ,   , 5 , and the previously specified function H. Additionally, the best control parameters ( u 1 , u 2 ,   u 3 ) that minimize J u 1 ,   u 2 , u 3 over U are given by:
u 1 t = max 1 ,   m i n [ 0 , λ 1 λ 2 Γ 1 β φ ρ 1 φ U + ρ 2 φ A S N ] , u 2 t = max 1 ,   m i n [ 0 , λ 3 λ 5 Γ 2 U ] , u 3 t = max 1 ,   m i n [ 0 , λ 4 λ 5 Γ 3 A ] ,
where λ 1 t ,   λ 2 t ,   λ 3 t ,   λ 4 t ,   a n d   λ 5 t adjoint variables, satisfying (14)–(16) with the following transversality conditions: λ 1 T f = λ 2 T f , = λ 3 T f = λ 4 T f = λ 5 T f = 0 and
u 1 = 0 ,   i f   u 1 0 , u 1 ,   i f   0 < u 1 < 1 ,   1 ,   i f   u 1 > 0 , and   u 2 = 0 ,   i f   u 2 0 , u 2 ,   i f   0 < u 2 < 1 ,   1 ,   i f   u 2 > 0 .
Proof. 
Using similar approaches used in reference [19,36], applying the Pontryagins Maximum Principle, we can determine that the convexity of the integrand of J with respect to controls   u 1 ,   u 2 ,   and   u 3 , the boundedness of the state solutions, and the Lipschitz property of the state system with respect to the state variables all lead to the existence of an optimal solution with the corresponding optimal control result represented by:
C D T f φ λ 1 = H S , C D T f φ λ 2 = H E , C D T f φ λ 3 = H U , C D T f φ λ 4 = H A and C D T f φ λ 5 = H R . Thus, the optimality conditions are obtained by differentiating the Hamiltonian function H with respect to the control variables u 1 , u 2 , and u 3 : H u 1 = H u 2 = H u 3 = 0 . □

5. Results of Numerical Simulations

For quantitative validation of the theoretical investigation described in the previous sections, particularly the optimal control system dynamics (14), this study carried out simulations using numerical approaches by considering the values for the corruption diffusion system dynamics parameter values represented in Table 2 below.
Performing simulations for the corruption diffusion dynamics optimal control system (14) is fundamental to the vital pictorial view and verifies the qualitative (theoretical) investigation of the proposed dynamical system with optimal control strategies. Therefore, by modeling the execution of the potential strategy combinations of the suggested control measures, we report the simulation results of the study in this section. Considering Table 2 above, the optimal control system dynamics (14) were simulated using MATLAB 2016a and the usual Runge-Kutta numerical approach. Three scenarios, the application of single control activity, dual control activities, and triple control activities with assumed cost weight parameter values, were created from the potential combination strategies of the suggested control measures as χ 1 = χ 2 = χ 3 = 15 , Γ 1 = 38 , Γ 2 = 40 ,   Γ 3 = 42 and with various starting population numbers. We used the fractional order constant φ = 0.82 to numerically simulate the system dynamics variables in the optimum control system dynamics (14) for investigating the effects of the proposed control activities in the following three scenarios and possible methods in each of the scenarios.
Scenario A (Implement single control measure)
Strategy 1: practicing the protection control measures, such as education, media awareness, etc. (i.e., u 1 0 , u 2 = u 3 = 0 ).
Scenario B (Implement double control measures)
Strategy 2: practicing the improvement control measures, such as education, fear of punishments, etc. ( u 1 = 0 , u 2 0 ,   u 3 0 ) for unaware corrupted individuals.
Scenario C (Implement triple control measures)
Strategy 3: practicing the protection control measures, such as education, media awareness, etc. Practicing the improvement control measures, such as education, fear of punishments, etc., for both unaware and aware corrupted people, which means u 1 0 ,     u 2 0 , and u 3 0 .
The effect of the strategy (i.e., u 1 0 ,   u 2 = 0 , and u 3 = 0 ) known as the corruption prevention mechanism, by setting φ = 0.75 , is examined in this subsection through numerical simulations where protection or improvement control strategies were not applied and when the corruption diffusion prevention strategy (strategy 1) was applied. Figure 2a–e each display a graphical interpretation that illustrates how the preventative method affects the dynamics of corruption diffusion. All susceptible, exposed, unaware corrupted, aware corrupted, and enhanced persons are drastically reduced when the protection control strategy u 1   is used, in contrast to the simulation scenario in which no control strategies were used.
In this subsection, we conduct numerical simulations using the improvement strategies ( u 2 0   and   u 3 0 , i.e., strategy 2), and without using the corruption protection control strategy ( u 1 ). According to the simulation revealed in Figure 3 above, Figure 3a indicates that the number of people in the exposed class decreased somewhat in comparison to Figure 2b. Figure 3b,c confirm the effect of using double improvement strategies and show a rapid decline in comparison to the results in Figure 2c and Figure 2d, respectively. The impact of using double improvement control procedures is confirmed in Figure 3d, which also demonstrates that as improvement strategies rise, so does the number of people who are rescued from corrupted activities.
In this subsection, we conduct numerical simulations both with and without the implementation of all suggested regulating techniques ( u 1 0   ,   u 2 0 ,   and   u 3 0 ) (strategy 3) at the same time. We can examine the impacts of various control tactics on the system dynamic variables corruption status based on the results shown in Figure 4. All of the suggested controlling strategies have a significant result in reducing the exposed people by simulating without implementing all of the suggested control strategies, and by implementing any other control strategies, as shown in Figure 4a. Figure 4b illustrates the impact of putting all of the suggested controlling strategies into practice using the number of people who are unaware of corruption. This has a significant result in reducing people who are unaware and corrupted in comparison to the numbers shown in Figure 2c and Figure 3b, respectively. As compared to the corrupted people depicted in Figure 2d and Figure 3c, respectively, Figure 4c illustrates the impact of all suggested controlling strategies on the number of aware corrupted individuals and significantly reduces that number. In contrast to the number of repented persons depicted in Figure 2e and Figure 3d, respectively, Figure 4d illustrates the influence of all suggested control activities on the repented (improved) individuals and significantly increases repented people. Lastly, we can see from Figure 4 that, after ten years, corrupted people in the population significantly decline if all potential regulating activities ( u 1 0 ,   u 2 0 ,   and   u 3 0 , i.e., using strategy 3) are put into practice. Additionally, this approach is the most successful in reducing and controlling the dynamics of corruption dissemination in the population when compared to other approaches.
Figure 5 above reveals that whenever the fractional order constant decreases, the number of unaware and corrupted individuals decreases due to the memory effect of the fractional order derivative.

6. Investigation of Cost-Benefits

In order to compare and contrast possible control activities’ cost-benefits that are included in the fractional order optimum control problem (14), we conducted a cost-benefit investigation for the suggested control activities in this section. Applying the same standards as the study [9], which were established by ICER = Total   cost   Change   between   strategy   A   and   Strategy   B Control   benefit   change   between   strategy   A   and   Strategy   B , where the differences in the costs of corruption avoided, protected case costs, and improvement costs are among the factors included in the numerator of the incremental cost-benefit ratio, or ICER. On the other hand, the denominator of ICER takes into consideration the disparities in social outcomes, such as the aggregate number of corruption instances avoided. By placing the control activities in increasing order of benefit based on corrupted people avoided and leaving the condition with the biggest ICER value, the cost-benefits of various corruption diffusion control measures are assessed. Thus, each of the seven control strategies can be ranked in increasing order according to corrupted people avoided, as shown by Table 3, from the seven control strategies categorized by three scenarios, namely Scenario A, Scenario B, and Scenario C, respectively.

6.1. Investigation of Scenario A Cost-Effectiveness

To compare the two comparable strategies incrementally, the ICER is calculated for the control schemes Strategy 1 and Strategy 3 in Table 3. This is as follows:
ICER   ( Strategy   1 ) = 0.041 × 10 2 4.0015 × 10 5 = 1.0250 × 10 5 ,
ICER   ( Strategy   3 ) = 0.059 × 10 2 0.041 × 10 2 4.0329 × 10 5 4.0015 × 10 5 = 5.7325 × 10 4 ,
ICER   ( Strategy   2 ) = 0.33 × 10 2 0.059 × 10 2 4.1242 × 10 5 4.0329 × 10 5 = 2.9659 × 10 3 ,
According to the analysis in Table 3, Strategy 3’s ICER value is higher than Strategy 1’s, indicating that it is less effective and more expensive than Strategy 1. The ICER for Strategy 1 and Strategy 2 was recalculated since we eliminated other competing strategies for scarce resources because Strategy 3 was too costly and ineffective.
We demonstrated that Strategy 2 should be eliminated since its ICER value was higher than Strategy 1 using comparable criteria and the findings shown in Table 4. Therefore, we removed Strategy 2 from the lists provided in scenario A since it is more expensive than Strategy 1, as seen by the results in Table 4 above, and Strategy 1 has a higher potential cost-effectiveness.

6.2. Investigation of Scenario B Cost-Effectiveness

To compare the two comparison strategies, the ICER value is computed for the control activities (strategies), Strategy 6 and Strategy 4, as shown in Table 5. This value is incrementally determined as follows:
ICER   ( Strategy   6 ) = 0.064 × 10 2 5.0015 × 10 5 = 1.2796 × 10 5 ,
ICER   ( Strategy   4 ) = 0.071 × 10 2 0.064 × 10 2 5.0329 × 10 5 5.0015 × 10 5 = 2.2293 × 10 4 ,
ICER   ( Strategy   5 ) = 0.43 × 10 2 0.071 × 10 2 5.1242 × 10 5 5.0329 × 10 5 = 3.9407 × 10 2 ,
According to the cost analysis presented in Table 5, Strategy 6’s ICER value is greater than Strategy 4’s, indicating that Strategy 4 is less effective and more expensive than Strategy 6. The ICER for Strategy 6 and Strategy 5 was recalculated since we eliminated other competing strategies for scarce resources because Strategy 4 was too costly and ineffective.
We demonstrated that Strategy 5 should be eliminated since its ICER value was higher than Strategy 6 using comparable criteria and the findings shown in Table 6. Therefore, we removed Strategy 5 from the lists provided in Scenario B since it is more cost-effective than Strategy 6, as demonstrated by the results in Table 5 above. Additionally, Strategy 6 has a high potential cost-effectiveness.

6.3. Investigation of Scenario C Cost-Effectiveness

We determined from Table 7 that method 7 is the most economical control method in Scenario C, as it is the only one shown in the above scenario. The combinations of collections of each of the control strategies with high potential cost-effectiveness from Scenarios A, B, and C, respectively, as mentioned above, are shown in the following Table 8 below. This allows one to calculate the control strategy with the greatest potential in comparison to other potential strategies used to reduce and control the corruption diffusion problem in the population.

6.4. Cost-Effectiveness of the Collections

Based on the ICER values calculated in Table 8, we determined that Strategy 6 is more expensive than Strategy 1, as seen by the outcome displayed in Table 8 above. This suggests that Strategy 6 execution is less successful and more expensive than Strategy 1 implementation. The list of alternate control techniques vying for the same scarce resources is thus reduced to exclude Strategy 6. Finally, as seen in Table 9 below, the ICER is recalculated for Strategies 1 and 7.
According to the results shown in Table 9, one can conclude that Strategy 7 is more expensive than Strategy 1 based on the ICER values calculated in that table. This suggests that Strategy 7 execution is less successful and more expensive than Strategy 1 implementation. The list of alternate control techniques vying for the same scarce resources is thus reduced to exclude Strategy 7. In the end, we determined that the most economical control strategy recommended to the stakeholders to lessen and manage the corruption diffusion issue in the population is Strategy 1, which involves implementing protection control measures like education, media awareness, etc. (i.e., u 1 0 , u 2 = u 3 = 0 ).

7. Conclusions and Future Directions

In this study, the authors constructed and analyzed a fractional order model on the diffusion of corruption in the population with optimal control theory and also investigated the cost-benefit for the proposed control strategies. The theoretical part of this study analyzed the basic properties of the formulated model, such as the existence of the model solutions, the uniqueness of the model solutions, positivity, and the boundedness of the model solutions. This study calculated the model threshold number by using the matrix operator method and examined the stability of equilibrium points using the stability criterion for the fractional modeling approach and the model threshold number. This study also analyzed the corresponding fractional-order corruption diffusion control system dynamics with three time-dependent control measures using Pontryagin’s Maximum Principle. Furthermore, this study conducted a cost-benefit investigation for the controlling activities and numerically simulated the model using the parameter values stated in Table 2, the popular Runge-Kutta numerical fourth-order approach in MATLAB, in order to identify which of the three scenarios, such as implementing one control measure, two control measures, and three control measures, respectively. In this study, we have investigated the numerical simulation results of the optimal control problem by implementing each of the three control strategies (Strategy 1, Strategy 2, and Strategy 3) independently, and the results reveal that each of the strategies has a great impact on reducing and managing the corruption diffusion in the community. However, the cost-benefit analysis verified that Strategy 1, which did not incorporate punishment or fear of punishment, is the most cost-effective strategy as compared with the other two strategies. Therefore, the most cost-benefit control strategy recommended to the stakeholders to reduce and manage the corruption diffusion problem in the population is Strategy 1, which is implementing protection control measures like education and media awareness.
Finally, as the fractional order corruption diffusion model constructed in this study is not all-inclusive, potential researchers in the field can modify the model by adding more elements like the stochastic approach, individual age distribution, community roles, and sensitivity analysis, and since this study adopted parameter values from the literature carried out in different geographical locations, any interested researcher can validate the results of this study by collecting real corruption data from the community in the study area.

Author Contributions

Conceptualization, M.G. and S.W.T.; Methodology, M.G.; Software, M.G. and S.W.T.; Validation, S.W.T.; Formal analysis, M.G. and S.W.T.; Investigation, M.G. and S.W.T.; Resources, S.W.T.; Writing—original draft, M.G. and S.W.T.; Writing—review & editing, M.G. and S.W.T. The model was developed, analyzed, and the optimal control issue was simulated by both authors. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Teixeira, M.A.C.; Spinelli, M.V.C. Corruption: A Brief Review of Theoretical Approach. Beijing Law Rev. 2024, 15, 624–637. [Google Scholar] [CrossRef]
  2. Kotola, B.S.; Teklu, S.W. A mathematical modeling analysis of racism and corruption codynamics with numerical simulation as infectious diseases. Comput. Math. Methods Med. 2022, 2022, 9977727. [Google Scholar]
  3. Mokaya, N.O.; Alemmeh, H.T.; Ngari, C.G.; Muthuri, G.G. Mathematical modelling and analysis of corruption of morals amongst adolescents with control measures in Kenya. Discret. Dyn. Nat. Soc. 2021, 2021, 6662185. [Google Scholar]
  4. Birhanu, Z.K.; Fantaye, A.K. Modeling and analysis of corruption dynamics incorporating media coverage. Commun. Math. Biol. Neurosci. 2022, 2022, 94. [Google Scholar]
  5. Bonyah, E. Fractional optimal control for a corruption model. J. Prime Res. Math. 2020, 16, 11–29. [Google Scholar]
  6. Graeff, P. Social mechanisms of corruption: Analytical sociology and its applicability to corruption research. Anal. Krit. 2016, 38, 53–72. [Google Scholar]
  7. Tubanambazi, M.F.; Ruvuna, E. Modeling the Impacts of E-Government Services on Corruption Reduction in Rwanda: A Case Evidence From Nyamasheke District, Rwanda. Eur. J. Soc. Sci. Stud. 2021, 6, 1–24. [Google Scholar] [CrossRef]
  8. Ghahari, S.; Queiroz, C.; Labi, S.; McNeil, S. Cluster forecasting of corruption using nonlinear autoregressive models with exogenous variables (NARX)—An artificial neural network analysis. Sustainability 2021, 13, 11366. [Google Scholar] [CrossRef]
  9. Engida, H.A.; Gathungu, D.K.; Ferede, M.M.; Belay, M.A.; Kawe, P.C.; Mataru, B. Optimal control and cost-effectiveness analysis for the human melioidosis model. Heliyon 2024, 10, e26487. [Google Scholar]
  10. Hassan, H. Social implications of corruption in developing countries: Case study of Pakistan and India. Cent. Eur. J. Public Policy 2022, 16, 1–13. [Google Scholar]
  11. Wittberg, E. Corruption Risks in a Mature Democracy: Mechanisms of Social Advantage and Danger Zones for Corruption. Ph.D. Thesis, Linköping University Electronic Press, Linköping, Sweden, 2023. [Google Scholar]
  12. Turkewitz, J.A.; Chemouni, B.H.; Mkrtchyan, A. Rwanda’s Anti-Corruption Experience: Actions, Accomplishments, and Lessons; World Bank Group: Washington, DC, USA, 2020. [Google Scholar]
  13. Oyamada, E. Combating corruption in Rwanda: Lessons for policy makers. Asian Educ. Dev. Stud. 2017, 6, 249–262. [Google Scholar]
  14. Roesli, M. Corruption Sociology. J. Soc. Political Sci. 2020, 1, 93–101. [Google Scholar]
  15. Alemneh, H.T.; Alemu, N.Y. Mathematical modeling with optimal control analysis of social media addiction. Infect. Dis. Model. 2021, 6, 405–419. [Google Scholar]
  16. Baba, B.A.; Bilgehan, B. Optimal control of a fractional order model for the COVID–19 pandemic. Chaos Solitons Fractals 2021, 144, 110678. [Google Scholar] [PubMed]
  17. Islam, M.; Akbar, M.A. A study on the fractional-order COVID-19 SEIQR model and parameter analysis using homotopy perturbation method. Partial. Differ. Equ. Appl. Math. 2024, 12, 100960. [Google Scholar]
  18. Ogunrinde, R.B.; Nwajeri, U.K.; Fadugba, S.E.; Ogunrinde, R.R.; Oshinubi, K.I. Dynamic model of COVID-19 and citizens reaction using fractional derivative. Alex. Eng. J. 2021, 60, 2001–2012. [Google Scholar]
  19. Teklu, S.W. Analysis of fractional order model on higher institution students’ anxiety towards mathematics with optimal control theory. Sci. Rep. 2023, 13, 6867. [Google Scholar]
  20. Gweryina, R.I.; Kura, M.Y.; Okwu, E. An epidemiological model of corruption with immunity clause in Nigeria. World J. Model. Simul. 2019, 15, 262–275. [Google Scholar]
  21. Athithan, S.; Ghosh, M.; Li, X.-Z. Mathematical modeling and optimal control of corruption dynamics. Asian-Eur. J. Math. 2018, 11, 1850090. [Google Scholar]
  22. Danford, O. Corruption Dynamics in Tanzania: Modeling the Effects of Control Strategies. Ph.D. Thesis, NM-AIST, Arusha, Tanzania, 2021. [Google Scholar]
  23. Fantaye, A.K.; Birhanu, Z.K. Mathematical model and analysis of corruption dynamics with optimal control. J. Appl. Math. 2022, 2022, 8073877. [Google Scholar]
  24. Alemneh, H.T. Mathematical modeling, analysis, and optimal control of corruption dynamics. J. Appl. Math. 2020, 2020, 5109841. [Google Scholar]
  25. Tesfaye, A.W.; Alemneh, H.T. Analysis of a stochastic model of corruption transmission dynamics with temporary immunity. Heliyon 2023, 9, e12752. [Google Scholar]
  26. Balatif, O.; Boujallal, L.; Labzai, A.; Rachik, M. Stability analysis of a fractional-order model for abstinence behavior of registration on the electoral lists. Int. J. Differ. Equ. 2020, 2020, 4325640. [Google Scholar]
  27. Mandal, M.; Jana, S.; Nandi, S.K.; Kar, T.K. Modelling and control of a fractional-order epidemic model with fear effect. Energy Ecol. Environ. 2020, 5, 421–432. [Google Scholar] [CrossRef] [PubMed]
  28. Mekonnen, T.T. Mathematical model analysis and numerical simulation for codynamics of meningitis and pneumonia infection with intervention. Sci. Rep. 2022, 12, 2639. [Google Scholar]
  29. Pontryagin, L.S.; Boltyanskii, V.; Gamkrelidze, R.; Mishchenko, E.; Trirogoff, K.; Neustadt, L.; Pontryagin, L.S. Selected Works: The Mathematical Theory of Optimal Processes; Routledge: London, UK, 2018. [Google Scholar]
  30. Rezapour, S.; Etemad, S.; Mohammadi, H. A mathematical analysis of a system of Caputo–Fabrizio fractional differential equations for the anthrax disease model in animals. Adv. Differ. Equ. 2020, 2020, 481. [Google Scholar]
  31. Baleanu, D.; Mohammadi, H.; Rezapour, S. Analysis of the model of HIV-1 infection of CD 4+ T-cell with a new approach of fractional derivative. Adv. Differ. Equ. 2020, 2020, 71. [Google Scholar]
  32. Rezapour, S.; Mohammadi, H.; Samei, M.E. SEIR epidemic model for COVID-19 transmission by Caputo derivative of fractional order. Adv. Differ. Equ. 2020, 2020, 490. [Google Scholar]
  33. Van den Driessche, P.; Watmough, J. Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. Math. Biosci. 2002, 180, 29–48. [Google Scholar] [CrossRef] [PubMed]
  34. Vargas-De-León, C. Volterra-type Lyapunov functions for fractional-order epidemic systems. Commun. Nonlinear Sci. Numer. Simul. 2015, 24, 75–85. [Google Scholar] [CrossRef]
  35. Sadki, M.; Harroudi, S.; Allali, K. Fractional-order SIR epidemic model with treatment cure rate. Partial. Differ. Equ. Appl. Math. 2023, 8, 100593. [Google Scholar]
  36. Teklu, S.W.; Kotola, B.S.; Alemneh, H.T. Smoking and alcoholism dual addiction dissemination model analysis with optimal control theory and cost-effectiveness. PLoS ONE 2024, 19, e0309356. [Google Scholar]
  37. Yang, Q.; Chen, D.; Zhao, T.; Chen, Y. Fractional calculus in image processing: A review. Fract. Calc. Appl. Anal. 2016, 19, 1222–1249. [Google Scholar]
  38. Yousef, A.M.; Salman, S.M. Backward bifurcation in a fractional-order SIRS epidemic model with a nonlinear incidence rate. Int. J. Nonlinear Sci. Numer. Simul. 2016, 17, 401–412. [Google Scholar]
  39. Petráš, I. Fractional-Order Nonlinear Systems: Modeling, Analysis and Simulation; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
Figure 1. The schematic diagram where λ C is described in Equation (8).
Figure 1. The schematic diagram where λ C is described in Equation (8).
Fractalfract 09 00207 g001
Figure 2. Impact of u 1 on the status of corrupted people with φ = 0.75 .
Figure 2. Impact of u 1 on the status of corrupted people with φ = 0.75 .
Fractalfract 09 00207 g002
Figure 3. How the corruption statuses of various population groups are affected by the corruption improvement strategies ( u 2   and   u 3 ) with φ = 0.75 .
Figure 3. How the corruption statuses of various population groups are affected by the corruption improvement strategies ( u 2   and   u 3 ) with φ = 0.75 .
Fractalfract 09 00207 g003
Figure 4. Effects of Strategy 3 on the level of corruption in various demographic groups with φ = 0.75 .
Figure 4. Effects of Strategy 3 on the level of corruption in various demographic groups with φ = 0.75 .
Fractalfract 09 00207 g004
Figure 5. Effects of fractional orders on unaware and corrupted individuals variable U , whenever φ = 0.5 ,   φ = 0.75 , and φ = 1 .
Figure 5. Effects of fractional orders on unaware and corrupted individuals variable U , whenever φ = 0.5 ,   φ = 0.75 , and φ = 1 .
Fractalfract 09 00207 g005
Table 1. An explanation of model parameters.
Table 1. An explanation of model parameters.
Parameter Interpretations
d Human death rate due to natural condition
Κ Rate of human recruitment
ϖ Rate where people left the exposed class
α 1 Improvement rate of unaware corrupted individuals
η Progression rate of unaware corrupted individuals
α 2 Improvement rate of aware corrupted individuals
β Corruption diffusion rate
q Awareness and corruption increases by some portion of exposure
Table 2. Simulation-related parameters and values.
Table 2. Simulation-related parameters and values.
ValuesSource
d 0.0189[36]
Κ 50.000[19,21]
ϖ 0.2000[37]
α 1 0.4500[38]
η 0.4000[38]
α 2 0.3800[38]
β 0.02340[37]
q 0.5000[39]
ρ 1 0.01Assume
ρ 2 0.2Assume
Table 3. Increasing the Order of Corruptions Averted for Strategies 1–3.
Table 3. Increasing the Order of Corruptions Averted for Strategies 1–3.
StrategyAggregate of Corruptions AvertedAggregate Cost (in US$)ICER Value
Strategy 14.0015 × 10 5 0.041 × 10 2 1.0250 × 10 5
Strategy 34.0329 × 10 5 0.059 × 10 2 5.7325 × 10 4
Strategy 24.1242 × 10 5 0.33 × 10 2 2.9659 × 10 3
Table 4. Strategy 1 and Strategy 2 comparison.
Table 4. Strategy 1 and Strategy 2 comparison.
StrategyAggregate of Corruptions AvertedAggregate Cost (in US$)ICER
Strategy 14.0015 × 10 5 0.041 × 10 2 1.0250 × 10 5
Strategy 24.1242 × 10 5 0.33 × 10 2 2.3553 × 10 3
Table 5. For Strategies 4–6, the number of corruptions avoided increases in order.
Table 5. For Strategies 4–6, the number of corruptions avoided increases in order.
StrategyAggregate of Corruptions AvertedAggregate Cost (in US $)ICER Value
Strategy 65.0015 ×   10 5 0.064 × 10 2 1.2796 × 10 5
Strategy 45.0329 ×   10 5 0.071 × 10 2 2.2293 × 10 4
Strategy 55.1242 ×   10 5 0.43 ×   10 2 3.9407 × 10 2
Table 6. Strategy 6 and Strategy 5 comparison.
Table 6. Strategy 6 and Strategy 5 comparison.
StrategyAggregate of Corruptions AvertedAggregate Cost (in US $)ICER
Strategy 65.0015 ×   10 5 0.064 × 10 2 1.2796 × 10 5
Strategy 55.1242 ×   10 5 0.43 ×   10 2 2.9829 × 10 3
Table 7. Strategy 7.
Table 7. Strategy 7.
StrategyAggregate of Corruptions AvertedAggregate Cost (in US$)ICER
Strategy 76.2341 ×   10 6 1.5213 × 10 3 2.4402 × 10 4
Table 8. Comparison of Strategies 1 and 6 for Control.
Table 8. Comparison of Strategies 1 and 6 for Control.
StrategyAggregate of Corruptions AvertedAggregate Cost (in US$)ICER
Strategy 14.0014 ×   10 5 0.041 × 10 2 1.0250 × 10 5
Strategy 65.0015 ×   10 5 0.064 × 10 2 2.3000 × 10 5
Strategy 76.2341 ×   10 6 1.5213 × 10 3 2.6520 × 10 3
Table 9. Compare Strategy 1 and Strategy 7 for Control.
Table 9. Compare Strategy 1 and Strategy 7 for Control.
StrategyAggregate of Corruptions AvertedAggregate Cost (in US$)ICER
Strategy 14.0014 ×   10 5 0.041 × 10 2 1.0250 × 10 5
Strategy 76.2341 ×   10 6 1.5213 × 10 3 6.6006 × 10 4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gümüş, M.; Teklu, S.W. Cost-Benefit and Dynamical Investigation of a Fractional-Order Corruption Population Dynamical System. Fractal Fract. 2025, 9, 207. https://doi.org/10.3390/fractalfract9040207

AMA Style

Gümüş M, Teklu SW. Cost-Benefit and Dynamical Investigation of a Fractional-Order Corruption Population Dynamical System. Fractal and Fractional. 2025; 9(4):207. https://doi.org/10.3390/fractalfract9040207

Chicago/Turabian Style

Gümüş, Mehmet, and Shewafera Wondimagegnhu Teklu. 2025. "Cost-Benefit and Dynamical Investigation of a Fractional-Order Corruption Population Dynamical System" Fractal and Fractional 9, no. 4: 207. https://doi.org/10.3390/fractalfract9040207

APA Style

Gümüş, M., & Teklu, S. W. (2025). Cost-Benefit and Dynamical Investigation of a Fractional-Order Corruption Population Dynamical System. Fractal and Fractional, 9(4), 207. https://doi.org/10.3390/fractalfract9040207

Article Metrics

Back to TopTop