首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 73 毫秒
1.
将空间非局部导数算子引入曲率驱动扩散方程,建立了一个基于非局部曲率驱动扩散的图像修复模型。与原模型的主要差别在于,原模型利用待修复像素的空间局部信息来估计丢失像素,而新模型利用和待修复像素相似的所有像素来估计丢失像素,充分利用了图像的全局信息。数值实验表明,新模型在图像修复,尤其是纹理图像的修复方面非常有效。  相似文献   

2.
采用五速正方格子模型,对各向同性的平衡分布函数进行推导得到了反应扩散方程。在 零流情况下进行计算机数值模拟,模拟出二维Selkov反应扩散模型的非线性波-环状 波和螺旋波。  相似文献   

3.
挠率、曲率及强引力模型   总被引:1,自引:1,他引:0  
李元杰 《中国物理 C》1989,13(11):990-995
本文在Eeinstein方程中,引入曲率和挠率所产生的能-动张量,证明了,曲率修正导致场方程的不相容.而挠率修正强引出一个强引力的模型.这一结果与通常Poincare规范引力论认为曲率与强耦合成正比之观点大不相同.  相似文献   

4.
张大羽  罗建军  郑银环  袁建平 《物理学报》2017,66(11):114501-114501
对二维剪切梁单元进行研究,利用平面旋转场理论推导了精确曲率模型.采用几何精确梁理论构建了剪切梁单元弹性力矩阵.通过绝对节点坐标方法建立了系统的非线性动力学方程,提出基于旋转场曲率的二维剪切梁单元,并分别引入经典二维剪切梁单元和基于位移场曲率的二维剪切梁单元进行比较研究.首先,静力学分析证明了所提模型的正确性;其次,特征频率分析验证了模型可与理论解符合,收敛精度高,并且能准确地预测单元固有频率对应的振型;最后,在非线性动力学问题上,通过与ANSYS结果对比分析,证明了该模型可有效处理柔性大变形问题,并且与经典二维剪切梁单元相比具有缓解剪切闭锁的优势.因此,本文提出的基于旋转场曲率的二维剪切梁单元在处理几何非线性问题中具有较大的应用潜力.  相似文献   

5.
刘金华  余堃 《物理学报》2011,60(12):124203-124203
图像的非线性扩散滤波来源于热方程的思想,其关键在于计算适当的扩散系数和控制扩散方向. 在已有的扩散模型中,由于扩散系数仅依赖于图像的梯度,因而这类模型容易受噪声的干扰;同时,图像的细节信息(如纹理)容易被误认为是噪声而被去除. 为克服这些不足,首先给出了一种采用双树复小波变换计算扩散系数的方法;然后设计了一种用于图像滤波的非线性扩散模型,最后提出了基于双树复小波变换和波原子阈值相结合的图像滤波算法. 仿真结果表明,所提出的算法在对含噪图像滤波的同时,能够较好地保持图像的边缘和纹理等细节信息. 关键词: 图像扩散滤波 非线性扩散 波原子 双树复小波变换  相似文献   

6.
杲东彦  陈振乾 《计算物理》2011,28(3):361-367
建立自然对流作用下融化的格子Boltzmann双分布函数模型,根据非线性对流扩散方程的格子Boltzmann模型理论提出一个新的表征融化温度场的分布函数演化方程,并通过变松弛时间方法处理固液两相变热物性传热问题.应用模型对热传导融化及自然对流融化特别固液变热物的融化过程进行模拟.模拟结果与分析解、经典的关联式结果吻合较...  相似文献   

7.
郑连存  冯志丰  张欣欣 《物理学报》2007,56(3):1549-1554
从理论上研究了一类广义扩散方程的求解问题. 利用相似变换和解析拆分技巧给出了求解该类非线性微分方程近似解的一种有效方法, 方程的解可以表示为一个收敛的幂级数. 近似解结果和数值结果非常符合,证明了所提出的方法的准确性和可靠性, 该方法可以用于解决其他科学和工程技术问题. 关键词: 广义扩散方程 非线性边界值问题 解析拆分 近似解析解  相似文献   

8.
反应扩散方程是一种非线性的抛物型方程,在多种物理模型中有广泛应用.本文考虑了一种类地行星冷却模型,通过对行星内部各层的热传导特性进行合理假设,构造出了一组反应扩散方程.根据实际物理情况,推导了该过程中特殊的边界条件及初始条件.然后基于有限差分法思想,利用计算机程序对该方程组进行数值求解,最终给出了行星内部温度分布随时间的变化情况.  相似文献   

9.
吴俊林  黄新民 《物理学报》2006,55(12):6234-6237
依据非平衡统计及密度算子方程,通过计算概率分布函数的时间变化,得到了非广延反应扩散系统在压力作用时其特征函数满足的广义主方程,其中非广延反应扩散系统的压力在Tsallis统计的框架下给出.与唯象理论中的主方程比较,新得到的方程不仅依赖于非广延参量q而且有更多的非线性项,因此更具有普遍性.当新的方程应用到单分子反应模型时, 非广延性对系统的稳定性将产生重要的作用, 特别是当系统接近临界状态时. 关键词: 主方程 非广延反应扩散系统 涨落  相似文献   

10.
张荣培  蔚喜军  崔霞  冯涛 《计算物理》2012,29(5):647-653
提出一种求解二维非平衡辐射扩散方程的数值方法.空间离散上采用加权间断Galerkin有限元方法,其中数值流量的构造采用一种新的加权平均;时间离散上采用隐-显积分因子方法,将扩散系数线性化,然后用积分因子方法求解间断Galerkin方法离散后的非线性常微分方程组.数值试验中在非结构网格上求解了多介质的辐射扩散方程.结果表明:对于强非线性和强耦合的非线性扩散方程组,该方法是一种非常有效的数值算法.  相似文献   

11.
In recent years, a number of chaos-based image cryptosystems have been proposed to meet the increasing demand for real-time secure image transmission. In this paper, an improved diffusion scheme named continuous diffusion strategy is proposed to promote the efficiency of the conventional permutation–diffusion type image cipher. The new scheme contains a supplementary diffusion procedure after the conventional diffusion process and the control parameters are altered by the cipher image after the first diffusion procedure. As a result, the difference can be introduced at the beginning and spread out to the whole image, and hence the same level of security can be achieved with fewer overall rounds. Moreover, to further enhance the confusion effect of the diffusion operation, an intensive diffusion approach is proposed, using stretched key stream elements to perform a cyclic shift to the cipher pixels. Extensive cryptanalysis has been performed using differential analysis, key space analysis, key sensitivity analysis and various statistical analyses. Experiment results demonstrate that the new scheme has a high level of security and fast encryption speed for practical image encryption.  相似文献   

12.
This paper aims to provide an image encryption scheme with an efficient bit-level permutation and a pixel-level diffusion procedure. In the bit-level permutation, we divide each pixel into 8 bits, and arrange the positions of each bit by the generalized Arnold map in row and column direction. Hence, a significant diffusion effect is happened in the bit-level permutation. In the pixel-level diffusion procedure, we apply affine cipher to change the gray value and the histogram distribution of the permutated image. Various types of security analyses demonstrate that the proposed scheme is competitive with that ordinary permutation–diffusion type image cipher and proper for practical image encryption.  相似文献   

13.
A tensor diffusion level set method is presented to extract infrared (IR) targets contour under a sky-mountain-water complex background. The proposed model combines tensor diffusion operator and the eigenvalues of tensor-image into a common energy minimization level set framework. By incorporating the information of image tensor diffusion operator into the external energy term, the level set function can move in a specific way. And eigenvalues of tensor-image are used for the regularization of zero level curves in order to diminish the influence of image ‘clutter’ and noise. An additional benefit of the proposed method is robust to initial conditions. Experimental results show very good performance of the tensor diffusion level set method for IR targets contours extraction.  相似文献   

14.
郭业才  周林锋 《物理学报》2015,64(19):194204-194204
在图像去噪过程中, 大部分基于偏微分方程的各向异性扩散模型均使用梯度信息检测边缘, 当边缘部分被噪声严重污染时, 这些方法不能有效检测出这些边缘, 因而无法保留边缘特征. 为了较完整的保留图像的区域信息, 用脉冲耦合神经网络(PCNN)能使具有相似输入的神经元同时产生脉冲的性质对噪声图像做处理, 得到图像熵序列, 并将图像熵序列作为边缘检测算子引入到扩散方程中, 不仅能克服仅用梯度作为边缘检测算子易受噪声影响的弊端, 而且能较完整地保留图像的区域信息. 然后, 用最小交叉熵准则搜索使去噪前后图像信息量差异最小的阈值, 设计最佳阈值控制扩散强度, 建立基于脉冲耦合神经网络与图像熵改进的各向异性扩散模型(PCNN-IEAD). 分析与仿真结果表明, 该模型与经典模型相比, 保留了更多的图像信息, 能够兼顾去除图像的噪声和保护图像的边缘纹理等细节信息, 较完整的保留了图像的区域信息, 性能指标同样也证实了新模型的优越性. 另外, 该模型的运行时间较经典模型的短, 因此, 该模型是一个理想的模型.  相似文献   

15.
S. Morfu 《Physics letters. A》2009,373(29):2438-2444
We propose a new algorithm inspired by the properties of diffusion processes for image filtering. We show that purely nonlinear diffusion processes ruled by Fisher equation allows contrast enhancement and noise filtering, but involves a blurry image. By contrast, anisotropic diffusion, described by Perona and Malik algorithm, allows noise filtering and preserves the edges. We show that combining the properties of anisotropic diffusion with those of nonlinear diffusion provides a better processing tool which enables noise filtering, contrast enhancement and edge preserving.  相似文献   

16.
一种基于小波和矩阵型扩散的图像放大   总被引:3,自引:0,他引:3  
郝彬彬  冯象初 《光子学报》2008,37(11):2365-2368
提出了一种基于小波多分辨分析和矩阵型扩散的图像放大方法.该方法把原图像作为放大图像的小波低频子带,初始高频置零小波重构,用矩阵型扩散方程处理后小波分解,得到估计的高频再与原图像重构.在扩散中取矩阵型扩散的扩散系数,选择其特征根,使扩散在垂直于边缘方向梯度较大时为逆扩散以锐化边缘,而沿边缘方向为正向扩散以增强边缘;同时提出了放大图像与原图像的一种相似性标准.该方法在放大图像的同时既去除了噪音又有效保持了边缘.数值实验结果证实,此方法为一个有效地图像放大方法.  相似文献   

17.
Image security is a hot topic in the era of Internet and big data. Hyperchaotic image encryption, which can effectively prevent unauthorized users from accessing image content, has become more and more popular in the community of image security. In general, such approaches conduct encryption on pixel-level, bit-level, DNA-level data or their combinations, lacking diversity of processed data levels and limiting security. This paper proposes a novel hyperchaotic image encryption scheme via multiple bit permutation and diffusion, namely MBPD, to cope with this issue. Specifically, a four-dimensional hyperchaotic system with three positive Lyapunov exponents is firstly proposed. Second, a hyperchaotic sequence is generated from the proposed hyperchaotic system for consequent encryption operations. Third, multiple bit permutation and diffusion (permutation and/or diffusion can be conducted with 1–8 or more bits) determined by the hyperchaotic sequence is designed. Finally, the proposed MBPD is applied to image encryption. We conduct extensive experiments on a couple of public test images to validate the proposed MBPD. The results verify that the MBPD can effectively resist different types of attacks and has better performance than the compared popular encryption methods.  相似文献   

18.

Fluorescence correlation spectroscopy (FCS) has been widely used to investigate molecular diffusion behavior in various samples. The use of the maximum entropy method (MEM) for FCS data analysis provides a unique means to determine multiple distinct diffusion coefficients without a priori assumption of their number. Comparison of the MEM-based FCS method (MEM-FCS) with another method will reveal its utility and advantage as an analytical tool to investigate diffusion dynamics. Herein, we measured diffusion of fluorescent probes doped into nanostructured thin films using MEM-FCS, and validated the results with single molecule tracking (SMT) data. The efficacy of the MEM code employed was first demonstrated by analyzing simulated FCS data for systems incorporating one and two diffusion modes with broadly distributed diffusion coefficients. The MEM analysis accurately afforded the number of distinct diffusion modes and their mean diffusion coefficients. These results contrasted with those obtained by fitting the simulated data to conventional two-component and anomalous diffusion models, which yielded inaccurate estimates of the diffusion coefficients. Subsequently, the MEM analysis was applied to FCS data acquired from hydrophilic dye molecules incorporated into microphase-separated polystyrene-block-poly(ethylene oxide) (PS-b-PEO) thin films characterized under a water-saturated N2 atmosphere. The MEM analysis revealed distinct fast and slow diffusion components attributable to molecules diffusing on the film surface and inside the film, respectively. SMT studies of the same materials yielded trajectories for mobile molecules that appear to follow the curved PEO microdomains. Diffusion coefficients obtained from the SMT data were consistent with those obtained for the slow diffusion component detected by MEM-FCS. These results highlight the utility of MEM-FCS and SMT for gaining complementary information on molecular diffusion processes in heterogeneous material systems.

Graphical Abstract
  相似文献   

19.
Ruisong Ye 《Optics Communications》2011,284(22):5290-5298
This paper proposes a novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, in which permuting the positions of image pixels incorporates with changing the gray values of image pixels to confuse the relationship between cipher-image and plain-image. In the permutation process, a generalized Arnold map is utilized to generate one chaotic orbit used to get two index order sequences for the permutation of image pixel positions; in the diffusion process, a generalized Arnold map and a generalized Bernoulli shift map are employed to yield two pseudo-random gray value sequences for a two-way diffusion of gray values. The yielded gray value sequences are not only sensitive to the control parameters and initial conditions of the considered chaotic maps, but also strongly depend on the plain-image processed, therefore the proposed scheme can resist statistical attack, differential attack, known-plaintext as well as chosen-plaintext attack. Experimental results are carried out with detailed analysis to demonstrate that the proposed image encryption scheme possesses large key space to resist brute-force attack as well.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号