“Stability Analysis of Three Species Ammensalism Model with Time Delay”
K. V. Murali Mohan1, Lakshmi Narayan. K2, Kondala Rao. K3, Papa Rao. A. V4

1Dr. K. V. Murali Mohan, Professor, Holy Mary Institute of Technology and Sciences, Hydeabad (Telangana), India.
2Dr. Lakshmi Narayan. K, Professor, Department of Mathematics, Vidya Jyothi Institute of Technology, Hyderabad (Telangana), India.
3Dr. Kondala Rao. K, Assistant Professor, Vidya Jyothi Institute of Technology, Hyderabad (Telangana), India.
4Dr. Papa Rao. A. V, Assistant Professor, JNTUK, University College of Engineering, Vizianagaram (Andhra Pradesh), India.
Manuscript received on 19 October 2019 | Revised Manuscript received on 25 October 2019 | Manuscript Published on 02 November 2019 | PP: 3664-3670 | Volume-8 Issue-2S11 September 2019 | Retrieval Number: B14620982S1119/2019©BEIESP | DOI: 10.35940/ijrte.B1462.0982S1119
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The present model is devoted to an analytical study of a three species syn-ecological model which the 1 st species ( ) N1 ammensal on the 2 nd species ( ) N2 and 2 nd species ( ) N2 ammensal on the 3 rd species ( ) N3 . Here 1 st species and 2 nd species are neutral to each other. A time delay is established between 1 st species and 2 nd species and 2 nd species and 3rd species. All attainable equilibrium points of the model are known and native stability for each case is mentioned and also the global stability of co-existing state is discussed by constructing appropriate Lyapunov operate. Further, precise solutions of perturbed equations are derived. The steadiness analysis is supported by numerical simulation victimization MatLab.
Keywords: Ammensalism, Time Delay, Equilibrium Points, Global Stability, Lyapunov Function, MATLAB.
Scope of the Article: Cryptography and Applied Mathematics