
Adaptive immune responses can be activated by harmful stimuli. Upon activation, a cascade of biochemical events ensues the proliferation and the differentiation of T cells, which can remove the stimuli and undergo cell death to maintain immune cell homeostasis. However, normal immune processes can be disrupted by certain dysregulations, leading to pathological responses, such as cytokine storms and immune escape. In this paper, a qualitative mathematical model, composed of key feedback loops within the immune system, was developed to study the dynamics of various response behaviors. First, simulation results of the model well reproduce the results of several immune response processes, particularly pathological immune responses. Next, we demonstrated how the interaction of positive and negative feedback loops leads to irreversible bistable, reversible bistable and monostable, which characterize different immune response processes: cytokine storm, normal immune response, immune escape. The stability analyses suggest that the switch-like behavior is the basis of rapid activation of the immune system, and a balance between positive and negative regulation loops is necessary to prevent pathological responses. Furthermore, we have shown how the treatment moves the system back to a healthy state from the pathological immune response. The bistable mechanism that revealed in this work is helpful to understand the dynamics of different immune response processes.
Citation: Lingli Zhou, Fengqing Fu, Yao Wang, Ling Yang. Interlocked feedback loops balance the adaptive immune response[J]. Mathematical Biosciences and Engineering, 2022, 19(4): 4084-4100. doi: 10.3934/mbe.2022188
[1] | Makoto Nakakita, Teruo Nakatsuma . Analysis of the trading interval duration for the Bitcoin market using high-frequency transaction data. Quantitative Finance and Economics, 2025, 9(1): 202-241. doi: 10.3934/QFE.2025007 |
[2] | Per B. Solibakke . Forecasting hourly WTI oil front monthly price volatility densities. Quantitative Finance and Economics, 2024, 8(3): 466-501. doi: 10.3934/QFE.2024018 |
[3] | Sylvia Gottschalk . Digital currency price formation: A production cost perspective. Quantitative Finance and Economics, 2022, 6(4): 669-695. doi: 10.3934/QFE.2022030 |
[4] | David Alaminos, M. Belén Salas, Ángela M. Callejón-Gil . Managing extreme cryptocurrency volatility in algorithmic trading: EGARCH via genetic algorithms and neural networks. Quantitative Finance and Economics, 2024, 8(1): 153-209. doi: 10.3934/QFE.2024007 |
[5] | Nilcan Mert, Mustafa Caner Timur . Bitcoin and money supply relationship: An analysis of selected country economies. Quantitative Finance and Economics, 2023, 7(2): 229-248. doi: 10.3934/QFE.2023012 |
[6] | Haoyu Wang, Dejun Xie . Optimal profit-making strategies in stock market with algorithmic trading. Quantitative Finance and Economics, 2024, 8(3): 546-572. doi: 10.3934/QFE.2024021 |
[7] | Samuel Asante Gyamerah . Modelling the volatility of Bitcoin returns using GARCH models. Quantitative Finance and Economics, 2019, 3(4): 739-753. doi: 10.3934/QFE.2019.4.739 |
[8] | Timotheos Paraskevopoulos, Peter N Posch . A hybrid forecasting algorithm based on SVR and wavelet decomposition. Quantitative Finance and Economics, 2018, 2(3): 525-553. doi: 10.3934/QFE.2018.3.525 |
[9] | Lukáš Pichl, Taisei Kaizoji . Volatility Analysis of Bitcoin Price Time Series. Quantitative Finance and Economics, 2017, 1(4): 474-485. doi: 10.3934/QFE.2017.4.474 |
[10] | Zheng Nan, Taisei Kaizoji . Bitcoin-based triangular arbitrage with the Euro/U.S. dollar as a foreign futures hedge: modeling with a bivariate GARCH model. Quantitative Finance and Economics, 2019, 3(2): 347-365. doi: 10.3934/QFE.2019.2.347 |
Adaptive immune responses can be activated by harmful stimuli. Upon activation, a cascade of biochemical events ensues the proliferation and the differentiation of T cells, which can remove the stimuli and undergo cell death to maintain immune cell homeostasis. However, normal immune processes can be disrupted by certain dysregulations, leading to pathological responses, such as cytokine storms and immune escape. In this paper, a qualitative mathematical model, composed of key feedback loops within the immune system, was developed to study the dynamics of various response behaviors. First, simulation results of the model well reproduce the results of several immune response processes, particularly pathological immune responses. Next, we demonstrated how the interaction of positive and negative feedback loops leads to irreversible bistable, reversible bistable and monostable, which characterize different immune response processes: cytokine storm, normal immune response, immune escape. The stability analyses suggest that the switch-like behavior is the basis of rapid activation of the immune system, and a balance between positive and negative regulation loops is necessary to prevent pathological responses. Furthermore, we have shown how the treatment moves the system back to a healthy state from the pathological immune response. The bistable mechanism that revealed in this work is helpful to understand the dynamics of different immune response processes.
Noise is the most difficult task in the field of image processing and computer vision. In this work, we focus on removing additive Gaussian noise. The problem is formulated mathematically as: let u(x,y) be a digital image and u0(x,y) be its observation with random noise η(x,y). For (x,y)∈Ω s.t.
u0(x,y)=u(x,y)+η(x,y). | (1.1) |
The noise level is approximately known
‖u−u0‖2L2(Ω)=∫Ω(u−u0)2dx≈σ2. | (1.2) |
The goal of denoising is to filter out high frequency signals, while preserving the important features of the image such as edges. Therefore, we search for an image processing model which removes noise and offers better handling of edges.
During the last two decades, the method of partial differential equations (PDEs) for image processing has become a major research topic. A classical PDEs model named ROF (Rudin, Osher, Fatemi) model which was based on the total variation (TV), was first introduced by Rudin et al. [18]. The idea in the ROF model is to minimize the the total variation of the image u,
TV=minu∈BV(Ω)∩L2(Ω)∫Ω|∇u|dx+λ2∫Ω(u−u0)2dx. | (1.3) |
In fact, one of the main advantages of using ROF model for image restoration is that the discontinuities are allowed. However, the main drawback of denoising models based on the TV is that they tend to yield piecewise constant images, a phenomenon known as staircase effects. Strong [19], introduced an adaptive TV functional (TVα)
TVα=minu∈BV(Ω)∩L2(Ω)∫Ωα(x)|∇u(x)|dx+λ2∫Ω(u−u0)2dx, | (1.4) |
for spatially adaptive image restoration. The function α(x) is an edge detector to control the diffusion. The main idea of edge detector is that edges of an image are associated with location of high gradient in a slightly smooth version of the noisy image.
In the recent decades, to overcome the staircase effects that caused by second-order variational model, fourth-order PDEs have been introduced in image restoration, [1,2,3,4,9,10,12,14,16,20,22,24,25,26,27,28]. You-Kaveh [26] proposed the following functional
∫Ωf(|△u|)dxdy, | (1.5) |
where △ denote the Laplacian operator. Based on the gradient descent method, this second order functional yields a fourth-order PDE
ut=−△(g((△u)2)△u), | (1.6) |
where g(s)=k2/(k2+s2) and k is an image dependent parameter. This equation does avoid blocky piecewise constant solution. However, it produces speckles in the processed image [16]. Many other authors have considered image denoising models based on the minimizer of high-order functionals. Laysaker et al. [16] proposed the LLT model
∫Ω(|uxx|+|uyy|)dxdy, | (1.7) |
and
∫Ω√|uxx|2+|uxy|2+|uyx|2+|uyy|2dxdy, | (1.8) |
they try to minimize the TV of ∇u. Minimizing these two functionals is equivalent to solve the following PDEs respectively
ut=−(uxx∣uxx∣)xx−(uyy∣uyy∣)yy | (1.9) |
and
ut=−(uxx∣D2u∣)xx−(uxy∣D2u∣)yx−(uyx∣D2u∣)xy−(uyy∣D2u∣)yy, | (1.10) |
where ∣D2u∣=√|uxx|2+|uxy|2+|uyx|2+|uyy|2. These equations have proved to be the improved version of (1.6).
The theoretical analysis showed that fourth-order equations have advantages over second-order equations in some aspects. Fourth-order PDEs usually produce the smooth image of the observed image. This is believed to be a better approximation in smooth region. Therefore, the staircase effect is suggested to be reduced and the recovery image will look better. It is reasonable to conclude that fourth-order diffusion performs better than the second-order models in the aspect of the recovery of smooth regions.
In this paper, to address the problem of denoising images contaminated with additive noise, a fourth-order model is suggested. Using the gradient module of the image to design a speed controlling function. This function indicated where is the edge in the image, thus the new model can preserve edge in this region. The motivation for proposing this model is to overcome certain inconsistencies in second order models founded during the process of recovering smooth regions and better preservation of the fine details. The model is based on solving a nonlinear fourth order degenerate equation with the noisy image as its initial data. By use of Roth's method, we proved the existence and uniqueness of the entropy solution. Additionally, the numerical results demonstrate that the proposed model is superior to PM (Perona, Malik) [17] and ROF models.
The rest of this article is organized as follows. In Section 2, we give some preliminaries that we will use. Section 3 is devoted to the proposed model and the proofs of existence and uniqueness of its solution. The difference schemes are presented in Section 4. Numerical experiments are presented in Section 5 and the conclusion of this paper is given in Section 6.
In this section, we recall some necessary definitions and notations, [11,13,14]. We begin with some definitions of the space BV2, which consists of functions u∈W1,1(Ω) s.t ∇u∈BV(Ω), this space is also denoted by BH(Ω). To know more about space of bounded Hessian, we refer the reader to [4,5,8].
Definition 2.1. Let Ω⊆Rn be a bounded open domain with Lipschitz boundary. Let u∈L1(Ω). Then the BV2 semi-norm of u is characterized by
||D2u||=supϕ∈C20(Ω,Rn×n){∫Ωn∑i,j=1u∂j∂iϕijdx:|ϕ(x)|≤1,∀x∈Ω}<∞, | (2.1) |
where C20(Ω,X) is the space of functions from Ω to X, 2-times continuously differentiable with compact support and ϕ(x)is a vector valued function, with |ϕ(x)|=√∑ni,j=1(ϕij)2. Here we remark that the space BV2 equipped with ‖u‖BV2(Ω)=||D2u||+‖u‖L1(Ω) is a Banach space.
Definition 2.2. Suppose that Ω⊆Rn be a bounded open domain with Lipschitz boundary, u∈L1(Ω), and α(x)≥0 is continuous and real function. Then we define the weighted BV2 semi-norm of u as
||D2u||α=supϕ∈C20(Ω,Rn×n){∫Ωn∑i,j=1u∂j∂iϕijdx:|ϕ(x)|≤α,∀x∈Ω}<∞ | (2.2) |
In this section, we propose a fourth-order image denoising model, with some guidance from previous work [6,14,15,16,26,27]. There are some benefits of fourth-order models. On the one hand, it can remove high frequency oscillation more effectively than second-order models because the evaluation of the second-order becomes weak in the high frequency area. One the other hand, for the fourth-order model, there is flexibility in employing different functional behaviors in the formulation.
Consider the following boundary value problem
∂u∂t+ D2ij(α(x) D2iju|D2iju|)=0(x,t)∈ΩT=(0,T)×Ω, | (3.1) |
u(x,t)=0,(x,t)∈(0,T)×∂Ω, | (3.2) |
∂u∂→n=0,(x,t)∈(0,T)×∂Ω, | (3.3) |
u(x,0)=u0(x),x∈Ω, | (3.4) |
where α(x)=1√1+|Gσ∗∇u0|2, Gσ(x) is the Gaussian filter with parameter σ, u0(x) is the original image, Ω is bounded domain of R2 with appropriate smooth boundary, T>0 is fixed, →n denote the unit outward normal of the boundary ∂Ω.
The term α(x) is used to enhance edges. In fact, it controls the speed of the diffusion: in the smooth region where ∇u0 is small, the diffusion is strong. Near possible edges, however, where ∇u0 is large, the diffusion spread is low. The convolution with Gσ should smooth away any large oscillations of noise. Therefore, we can get the smooth image and further preserve the edges in a best way.
Definition 3.1. A measurable function u:ΩT→R is an entropy solution of (3.1)–(3.4) in ΩT if u∈C([0,T];L2(Ω))∩L∞(0,T;BV2(Ω)),∂u∂t∈L2(ΩT) and there exist z, such that αz∈L∞(ΩT) with ∥αz∥L∞(ΩT)≤1,ut+Dijαzij=0 in D′(ΩT) such that
∫Ω(u(t)−v)utdx≤∫Ωαz(t)⋅D2vdx−||D2u||α, | (3.5) |
for every v∈L∞(0,T;W2,10(Ω)).
Before investigating the existence and uniqueness of problem (3.1)–(3.4), let us consider the following approximate evaluation problem: for 1<p≤2 and u0p∈W2,p(Ω), we construct the following problem
∂up∂t+ D2ij(α(x)|D2ijup|p−2D2ijup)=0,(x,t)∈ΩT | (3.6) |
up(x,t)=0,(x,t)∈(0,T)×∂Ω, | (3.7) |
∂up∂→n=0,(x,t)∈(0,T)×∂Ω, | (3.8) |
up(x,0)=u0p(x),x∈Ω. | (3.9) |
Lemma 3.1. For any fixed p, 1<p≤2, the above problem (3.6)–(3.9) admits a weak solution up∈L∞(0,T;W2,p0(Ω))∩C([0,T];L2(Ω)) and ∂up∂t∈L2(ΩT) such that
limt→0+∥up(x,t)−u0p(x)∥L2(Ω)=0, | (3.10) |
and for any φ∈C∞0(ΩT) the following integral equality holds
∫T0∫Ω∂up∂tφ(x,t)dxdt+∫T0∫Ωα(x)| D2ijup|p−2 D2ijup⋅D2ijφ(x,t)dxdt=0, | (3.11) |
with
∥up∥L∞(0,T;W2,p0(Ω))+∥up∥L∞(0,T;L2(Ω))+‖∂up∂t‖L2(ΩT)≤C, | (3.12) |
where C is a constant independent of p.
Proof. We apply Rothe's method [23], to construct an approximate solution sequence. Divide the interval [0,T] into n equal segments and define h=Tn. For any j: 1≤j≤n, for any positive integer n and a function u(x,t), denote
un,jp(x)=up(x,jh),j=1,2,...,n. |
For fixed j, define the following functional on W2,p0(Ω)
E(w)=1p∫Ωα(x)|D2ijw|pdx+12h∫Ω(w−un,j−1p)2dx. | (3.13) |
The idea here is to prove that if un,j−1p is known and un,0p=u0p, then there is a minimizer for (3.13).
Let um∈W2,p0(Ω)∩L2(Ω) be a minimizing sequence for E. Since α is bounded below, then the sequence um is bounded in W2,p0(Ω) and L2(Ω). Therefore, there exists a subsequence umiof um and a function un,jp∈W2,p0(Ω)∩L2(Ω) such that as i→∞,
umi→un,jpweakly in W2,p0(Ω)andL2(Ω). | (3.14) |
From this and the weak lower semicontinuity of the norms, we get
E(un,jp)≤lim infi→∞E(umi)=infw∈W2,p0(Ω)∩L2(Ω)E(w). |
Then un,jp is the solution of the Euler equation corresponding to E(w)
D2ij(α(x)|D2ijun.jp|p−2D2ijun.jp)+1h(un.jp−un,j−1p)=0, | (3.15) |
which implies
1h∫Ω(un,jp−un,j−1p)η(x)dx+∫Ωα(x)|D2ijun,jp|p−2 D2ijun,jp⋅D2ijη(x)dx=0, | (3.16) |
for any η(x)∈C∞0(Ω).
Let χn,j(t) be the indicator function of [h(j−1),hj) and
λn,j(t)={th−(j−1),if t∈[h(j−1),hj),0,otherwise. |
We construct an approximation function as
unp(x,t)=n∑j=1χn,j(t)un,jp, withunp(x,0)=u0p(x) |
and
wnp(x,t)=n∑j=1χn,j(t)[un,j−1p(x)+λn,j(t)(un,jp(x)−un,j−1p(x))]. |
By (3.16), we have
∫Ω(∂wnp∂tη(x)+α(x)|D2ijunp∣p−2D2ijunp⋅D2ijη(x))dx=0, |
for every η(x)∈C∞0(Ω) a.e. t∈[0,T], which implies that
∫T0∫Ω(∂wnp∂tφ(x,t)+α(x)|D2ijunp|p−2D2ijunp⋅D2ijφ(x,t))dxdt=0, | (3.17) |
for every φ∈C∞0(ΩT).
Next, we obtain some estimates for unp(x,t) and wnp(x,t). Notice that, we choose η(x)∈W2,p0(Ω) as the test function in (3.16). Let η(x)=un,jp−un,j−1p, we have
1h∫Ω(un,jp−un,j−1p)2dx+∫Ωα(x)|D2ijun,jp|p−2 D2ijun,jp⋅D2ij(un,jp−un,j−1p)dx=0, |
1h∫Ω(un,jp−un,j−1p)2dx+∫Ωα(x)|D2ijun,jp|pdx=∫Ωα(x)|D2ijun,jp|p−2 D2ijun,jp⋅D2ijun,j−1pdx. |
Using Young's inequality, we have
1h∫Ω(un,jp−un,j−1p)2dx+∫Ωα(x)|D2ijun,jp|pdx≤p−1p∫Ωα(x)|D2ijun,jp|pdx+1p∫Ωα(x)|D2ijun,j−1p|pdx. |
That is
1h∫Ω(un,jp−un,j−1p)2dx+1p∫Ωα(x)|D2ijun,jp|pdx≤1p∫Ωα(x)|D2ijun,j−1p|pdx. | (3.18) |
For any m with 1≤m≤n, summing (3.18) for j from 1 to m
∫Ωα(x)|D2ijun,mp|pdx≤∫Ωα(x)|D2iju0p|pdx, |
which implies
sup0<t<T‖D2ijunp‖pW2,p0(Ω)≤C, | (3.19) |
where C is a constant independent of p,n.
Summing (3.18) for j from 1 to n yield
1hn∑j=1∫Ω(un,jp−un,j−1p)2dx≤1p∫Ωα(x)|D2iju0p|pdx=C. | (3.20) |
By the definition of wnp(x,t), we have
∂wnp∂t=1hn∑j=1χn,j(t)(un,jp−un,j−1p). |
Thus
‖∂wnp∂t‖2L2(ΩT)=1h2n∑j=1h‖(un,jp−un,j−1p)‖2L2(Ω)≤C. | (3.21) |
By (3.19), we can obtain
sup0<t<T∫Ω| D2ijwnp|pdx=sup0<t<Tn∑j=1χn,j(t)∫Ω|(1−λn,j(t)) D2ijun,j−1p+λn,j(t) D2ijun,jp|pdx≤sup0<t<T‖ D2ijunp‖pW2,p0(Ω)≤C. | (3.22) |
Choosing η(x)=un,jp in (3.16), we get
1h∫Ω(un,jp−un,j−1p)un,jpdx+∫Ωα(x)|D2ijun,jp|p−2 D2ijun,jp⋅D2ijun,jpdx=0, |
which implies
1h∫Ω(un,jp−un,j−1p)un,jpdx+∫Ωα(x)|D2ijun,jp|pdx=0. |
By Young's inequality, we have
h∫Ωα(x)|D2ijun,jp|pdx+12∫Ω|un,jp|2dx≤12∫Ω|un,j−1p|2dx. | (3.23) |
Thus
∫Ω|un,jp|2dx≤∫Ω|un,j−1p|2dx. | (3.24) |
This implies
sup0<t<T∫Ω|unp|2dx≤∫Ω|u0p|2dx. | (3.25) |
Similar to the proof of (3.22), we also see
sup0<t<T∫Ω|wnp|2dx≤∫Ω|u0p|2dx. | (3.26) |
Choosing η(x)=un,j−1p in (3.16)
∫Ω(un,jp−un,j−1p)un,j−1pdx+h∫Ωα(x)|D2ijun,jp|p−2 D2ijun,jp⋅D2ijun,j−1pdx=0.′ |
Applying Hölder's inequality and the estimate (3.19), we have
∫Ω(un,j−1p−un,jp)un,j−1pdx≤Ch. |
By Young's inequality again yields
∫Ω|un,j−1p|2dx≤Ch+12∫Ω|un,j−1p|2dx+12∫Ω|un,jp|2dx. |
Thus
−Ch≤∫Ω|un,jp|2dx−∫Ω|un,j−1p|2dx. | (3.27) |
Define B(unp)=α(x)| D2ijunp|p−2 D2ijunp. Combining (3.19), (3.21), (3.22), (3.25) and (3.26), we conclude that there exist subsequences of unp,wnp,∂wnp∂t and B(unp), denoted by themselves such that, as n→∞
unp∗⇀up,inL∞(0,T;W2,p0(Ω)),wnp∗⇀wp,inL∞(0,T;W2,p0(Ω)),∂wnp∂t⇀∂wp∂t,inL2(ΩT),B(unp)∗⇀ζ,inL∞(0,T;Lp′(Ω)), | (3.28) |
holds for some up,wp,ζ. And we also have
‖wp‖pL∞(0,T;W2,p0(Ω))+‖∂wp∂t‖2L2(ΩT)+‖up‖pL∞(0,T;W2,p0(Ω))≤C. | (3.29) |
Then let n→∞ in (3.17),
∂wp∂t+ D2ijζ=0. | (3.30) |
Next, we show that up=wp. By the definition of up and wp, we have
wnp−unp=n∑j=1χn,j(t)(1−λn,j(t))(un,j−1p−un,jp), |
which combined with (3.20), leads to
‖wnp−unp‖2L2(ΩT)≤n∑j=1h‖un,jp−un,j−1p‖2L2(ΩT)≤Ch2→0,as h→0. | (3.31) |
Now, it remains to show that ζ=B(up). From (3.17) and the convergence sets (3.28), as n→∞, we can get
∫T0∫Ω∂up∂tφ(x,t)dxdt+∫T0∫Ωζ.D2ijφ(x,t)dxdt=0. | (3.32) |
For any g∈Lp(0,T,W2,p(Ω)) and for j from 1 to n, we can obtain, by the monotonicity condition, the inequality
∫Ω(B(un.jp)−B(g))(D2ijun.jp−D2ijg)dx≥0. | (3.33) |
Letting η=un.jp in (3.16), we obtain
1h∫Ω(un,jp−un,j−1p)un,jpdx+∫ΩB(un,jp)⋅D2ijun,jpdx=0. | (3.34) |
Applying Young's inequality on the first term of (3.34) together with the inequality (3.33) and integrating over ((j−1)h,jh), we get
12∫Ω[|un,jp|2−|un,j−1p|2]dx+∫jh(j−1)h∫ΩB(un,jp)⋅D2ijgdxdt+∫jh(j−1)h∫ΩB(g)(D2ijun.jp−D2ijg)dxdt≤0. | (3.35) |
Summing up (3.35) for j from 1 to n, we obtain
12∫Ω[|unp(T)|2−|u0p|2]dx+∫T0∫ΩB(unp)⋅D2ijgdxdt+∫T0∫ΩB(g)(D2ijunp−D2ijg)dxdt≤0. | (3.36) |
Recalling the convergence sets (3.28) and letting n→∞, (3.36) yields
12∫Ω[|up(T)|2−|u0p|2]dx+∫T0∫Ωζ⋅D2ijgdxdt+∫T0∫ΩB(g)(D2ijup−D2ijg)dxdt≤0. | (3.37) |
We can rewrite (3.37) in the form
∫T0∫Ω∂up∂tupdxdt+∫T0∫Ωζ⋅D2ijgdxdt+∫T0∫ΩB(g)(D2ijup−D2ijg)dxdt≤0. | (3.38) |
Letting φ=up in (3.30), we obtain
∫T0∫Ω∂up∂tupdxdt+∫T0∫Ωζ⋅D2ijupdxdt=0. | (3.39) |
Then, substituting (3.39) into (3.38) leads to
∫T0∫Ω(ζ−B(g))(D2ijup−D2ijg)dxdt≥0. | (3.40) |
Choose g=up−ks where k>0 and D2ijs∈L∞(0,T;W2,p(Ω)). We then have
∫T0∫Ω(ζ−B(up−ks))D2ijsdxdt≥0. | (3.41) |
Sending k→0, we obtain
∫T0∫Ω(ζ−B(up))D2ijsdxdt≥0,∀s∈L∞(0,T;W2,p(Ω)). | (3.42) |
Since s is arbitrary, we see that ζ=B(up).
Now, we prove (3.10), we let φ=up(x,t) and φ=up(x,t1) in (3.30), for 0≤t1≤t≤t2≤T, we obtain
∫Ω(u2p(x,t2)−u2p(x,t1))dx=−2∫t2t1∫Ωα(x)| D2ijup|pdxdt, |
and
∫Ωup(x,t2)up(x,t1)dx−∫Ωu2p(x,t1)dx=−∫t2t1∫Ωα(x)| D2ijup|p−2 D2ijup.D2ijup(x,t1)dxdt. |
Then
∫Ω|up(x,t2)−up(x,t1)|2dx=∫Ω(u2p(x,t2)−u2p(x,t1))dx+2∫Ω(u2p(x,t1)−up(x,t2)up(x,t1))dx,=−2∫t2t1∫Ωα(x)| D2ijup|pdxdt+2∫t2t1∫Ωα(x)| D2ijup|p−2 D2ijup.D2ijup(x,t1)dxdt. |
From the above equation, we deduce that
limt→0+∥up(x,t)−u0p(x)∥L2(Ω)=0, |
and the proof is completed.
Theorem 3.1. If u0∈BV2(Ω) and u0=0,∂u∂n=0,x∈∂Ω in the sense of trace then the problem (3.1)–(3.4) admits one and only one entropy solution.
Proof. By Lemma 3.1, there exists up, which is a weak solution of the problem (3.6)–(3.9) and a constant C such that
∥up∥L∞(0,T;W2,p0(Ω))+∥up∥L∞(0,T;L2(Ω))+‖∂up∂t‖L2(ΩT)≤C. | (3.43) |
So, from (3.43), there exists a subsequence of up, denoted by itself and a function u∈L∞(0,T;BV2(Ω))∩C([0,T];L2(Ω)) with ∂u∂t∈L2(ΩT) such that, as p→1+,
up→u,in W1,1(Ω),with ||D2u||α≤lim infp→1+‖D2ijup‖Lp(Ω),a.e. t∈(0,T) |
and
∂up∂t⇀∂u∂t, weakly in L2(ΩT).
We also have up→u strongly in L2(ΩT)a.e. t∈(0,T) and
limt→0+‖u(x,t)−u0(x)‖L2(Ω)=0. |
Applying the method in [7], we next prove that α(x)|D2ijup|p−2 D2ijup is weakly relatively compact in L1(ΩT). Employing (3.43) and Hölder's inequality,
|∫T0∫Ωα(x)|D2ijup|p−2D2ijupdxdt|≤∫T0∫Ω∣α(x)∣∣D2ijup∣p−1dxdt≤Cp−1pmeas(ΩT)1p, |
where C is independent of p. Thus, {α(x)|D2ijup|p−2D2ijup} is bounded and equi-integrable in L1(ΩT) and is therefore weakly relatively compact in L1(ΩT). Thus we deduce that as p→1+,
{α(x)|D2ijup|p−2 D2ijup}⇀αz, weakly in L1(ΩT).
So we get by Lemma 3.1 and the fact that ∂up∂t⇀∂u∂t in L2(ΩT),
∫T0∫Ω∂u∂tφ(x,t)dxdt+∫T0∫Ωαz⋅D2ijφ(x,t)dxdt=0, | (3.44) |
for every φ(x,t)∈C∞0(ΩT) and ut+Dijαzij=0 in D′(ΩT).
Now, it remains to prove that ∥αz∥L∞(ΩT)≤1.
For any k>0, setting
Ap,k={(x,t)∈ΩT:∣D2ijup∣>k}, we have that
meas(Ap,k)≤Ckp, for every p>1,k>0. |
As above, there exists a function gk∈L1(ΩT) such that
α(x)|D2ijup|p−2 D2ijupχAp,k⇀gk, as p→1+ weakly in L1(ΩT),
where χAp,k is the indicator function of Ap,k. Now for any ϕ∈L∞(ΩT) with
‖ϕ‖L∞(ΩT)≤1, by the definition of χAp,k, we see that
|∫T0∫Ωα(x)|D2ijup|p−2 D2ijupϕχAp,kdxdt|≤Ck. |
Letting p→1+, we have
∫T0∫Ω∣gk∣dxdt≤Ck,for every k>0. | (3.45) |
Since we have that
|∫T0∫Ωα(x)|D2ijup|p−2 D2ijupχΩT/Ap,k|≤kp−1, for any p>1, |
letting p→1+, we obtain that α(x)∣D2ijup∣p−2 D2ijupχΩT/Ap,k weakly converges in L1(ΩT) to some function fk∈L1(ΩT) with ‖fk‖L∞(ΩT)≤1. Since, for any k>0, we may write αz=fk+gk with ‖fk‖L∞(ΩT)≤1 and gk satisfies (3.45), it is easily follows that ‖αz‖L∞(ΩT)≤1.
Next, we verify the solution definition inequality (3.5). For any vn∈C∞0(ΩT) and taking φ=(up−vn)ξ(t) in (3.11), we have
∫T0∫Ω∂up∂t(up−vn)ξ(t)dxdt=−∫T0∫Ωα(x)|D2ijup|p−2 D2ijup⋅D2ij((up−vn)ξ(t))dxdt. |
Letting p→1+,
∫T0∫Ω∂u∂t(u(t)−vn)ξ(t)dxdt≤∫T0∫Ωαz(t)⋅D2ijvnξ(t)dxdt−∫T0||D2u||αξ(t)dt. |
Then for any v∈L∞(0,T;W2,10(Ω)), letting n→∞,
∫T0∫Ω∂u∂t(u(t)−v)ξ(t)dxdt≤∫T0∫Ωαz(t)⋅D2ijvξ(t)dxdt−∫T0||D2u||αξ(t)dt. |
Since ξ(t) is arbitrary, we have
∫Ω∂u∂t(u(t)−v)dx≤∫Ωαz(t)⋅D2ijvdx−||D2u||α, |
for every v∈L∞(0,T;W2,10(Ω)) and a.e. on [0,T].
Finally, we prove the uniqueness of the entropy solution. Let u1,u2 both be entropy solution with data u10,u20. Then there exists αz1,αz2∈L∞(ΩT) such that
∫Ω∂u1∂t(u1−v)dx≤∫Ωαz1⋅D2ijvdx−||D2u1||α, | (3.46) |
and
∫Ω∂u2∂t(u2−v)dx≤∫Ωαz2⋅D2ijvdx−||D2u2||α, | (3.47) |
for every v∈L∞(0,T;W2,10(Ω)) and a.e. on [0,T]. Let u1n,u2n∈L∞(0,T;W2,p0(Ω)) be approximates functions, respectively, for u1 and u2, such that
limn→∞(‖D2iju1n‖L1(Ω)−||D2u1||α)=0,limn→∞∥u1n−u1∥L2(Ω)=0, |
and
limn→∞(‖D2iju2n‖L1(Ω)−||D2u2||α)=0,limn→∞∥u2n−u2∥L2(Ω)=0, |
a.e. on[0,T]. Taking v=u2n in (3.46) and v=u1n in (3.47), adding the two equations and rearranging the result, we obtain
∫Ω(u1−u2)(∂u1∂t−∂u2∂t)dx+∫Ω(u1−u1n)∂u2∂tdx+∫Ω(u2−u2n)∂u1∂t≤∫Ωαz1⋅D2iju2ndx−||D2u1||α+∫Ωαz2⋅D2iju1ndx−||D2u2||α. |
So integrating from 0 to t and letting n→∞, we get
∫Ω(u1−u2)2dx≤∫Ω(u10−u20)2dx. |
The proof is completed.
In this section, assuming τ to be the time step size and h the space grid size, we discretize time and space as follows:
t=nτ,n=0,1,2,⋯,x=ih,i=0,1,2,⋯,I,y=jh,j=0,1,2,⋯,J, |
where Ih×Jh is the size of the original image. Let uni,j denote approximations of u(nτ,ih,jh). We define the discrete approximation:
△xuni,j=uni+1,j−2uni,j+uni−1,jh2,△yuni,j=uni,j+1−2uni,j+uni,j−1h2,△xyuni,j=uni+1,j+1+uni,j−uni,j+1−uni+1,jh2. |
The discrete explicit scheme of the problem can be written as
un+1i,j=uni,j−τ[△x(αij△xuni,j|△xuni,j|ϵ)+△y(αij△yuni,j|△yuni,j|ϵ)+△xy(αij△xyuni,j|△xyuni,j|ϵ)],αi,j=1√1+|Gσ∗∇u0(x)|2i,j,|⋅|ϵ=|⋅|+ϵ,ϵ>0,u0i,j=u0(ih,jh),0≤i≤I,0≤j≤J,uni,0=uni,1,un0,j=un1,j,unI,j=unI−1,j,uni,J=uni,J−1,uni,0=0,un0,j=0,unI,j=0,uni,J=0. |
Here the MATLAB function "conv2" is used to represent the two-dimensional discrete Convolution Transform of the matrix ui,j.
In this section, we demonstrate the performance of our model in denoising images involving Gaussian white noise. We applied difference equations discussed in section 4 and compared the results with the results of ROF model [18] and PM model [17]. We used step size τ=0.02, gride size h=1 and λ=0.
At the end of the denoising process, the peak signal to noise ratio (PSNR), mean absolute-deviation error (MAE) and structure similarity index measure (SSIM) values were recorded to measure the denoising performance. The values are given by the following formulas:
PSNR(u,u0)=10 log10IJ|maxu0−minu0|2‖u−u0‖2L2dB |
and
MAE(u,u0)=‖u−u0‖L1IJ, |
where |maxu0−minu0| gives the gray-scale range of the original image, u0 and u denote, respectively, the original image and the denoised image, I×J is the dimension of image.
SSIM, designed by Wang et al.[21], is a quality used to measure the similarity between any two images. Given any two images u and u0, SSIM is given by the formula
SSIM(u,u0)=L(u,u0)⋅C(u,u0)⋅R(u,u0). |
L(u,u0)=2μuμu0+k1μ2u+μ2u0+k1, compares the two images' mean luminance μu and μu0. The maximal value of L(u,u0)=1, if μu=μu0, C(u,u0)=2σuσu0+k2σ2u+σ2u0+k2, measures the closeness of contrast of the two images u and u0. Contrast is determined in terms of standard deviation, σ. Contrast comparison measure C(u,u0)=1 maximally if and only if σu=σu0; that is, when the images have equal contrast.
R(u,u0)=σuu0+k3σuσu0+k3, is a structure comparison measure which determines the correlation between the images u and u0, where σuu0 is covariance between u and u0. It attains maximal value of 1 if, structurally, the two images coincide, but its value is equal to zero when there is absolutely no structural coincidence. The quantities k1,k2 and k3 are small positive perturbations that avert the possibility of having zero denominators.
Two test images of "Cameraman" and "Peppers" are corrupted by white Gaussian noise with standard deviation (SD) of 30, (Figures 1 and 2). Tables 1 and 2, present the numerical results of restoration of Cameraman image, (Figure 1), and those of the Peppers image, (Figure 2). The comparisons are based on PSNR, MAE and SSIM. The proposed method shows the best performance with respect to PSNR, MAE and SSIM.
Algorithm | σ | PSNR | MAE | SSIM |
PM model | 30 | 27.98 | 7.06 | 0.8345 |
ROF model | 30 | 28.26 | 6.80 | 0.8359 |
Our Method | 30 | 28.66 | 6.44 | 0.8537 |
Algorithm | σ | PSNR | MAE | SSIM |
PM model | 20 | 28.89 | 5.83 | 0.8386 |
ROF model | 20 | 28.76 | 5.85 | 0.8397 |
Our Method | 20 | 29.04 | 5.62 | 0.8450 |
Our first example is Cameraman image, which is displayed in Figure 1a and 1b is its degraded version. Furthermore, Figure 1c, 1d and 1e, are portions of the recovered images with the proposed model, ROF model and PM model, respectively. It is clear that our method can overcome the staircase effect that caused by the second order method.
The second example is Peppers image, which is displayed in Figure 2a, its degraded version is showed in Figure 2b. Basically, Figure 2c, 2d and 2e, are portions of the recovered images by the proposed model, ROF model and PM model, respectively. It is evident that, our method yields good results in restoring image since it avoids the staircase effect that caused by the second order method while, at the same time, handle edges in a best way.
Similarly, the two test images are corrupted by white Gaussian noise with SD of 20, (Figures 3 and 4). Tables 3 and 4, present the numerical results of restoration of Cameraman image, (Figure 3), and those of the Peppers image, (Figure 4). The comparisons are based on PSNR, MAE and SSIM. Here again, the proposed method shows the best performance with respect to PSNR, MAE and SSIM. In Figure 3a and 3b we display Cameraman image and the noisy version. Figure 3c, 3d and 3e, are portions of the recovered images with the proposed model, ROF model and PM model, respectively. We display Peppers image and the degraded version in Figure 4a and 4b. Figure 4c, 4d and 4e, are portions of the recovered images with the proposed model, ROF model and PM model, respectively. Here also, the proposed model yields better results in denoising image while handling edges in a best way.
Algorithm | σ | PSNR | MAE | SSIM |
PM model | 20 | 29.86 | 5.70 | 0.8727 |
ROF model | 20 | 29.90 | 5.64 | 0.8741 |
Our Method | 20 | 30.48 | 5.18 | 0.8795 |
Image | Algorithm | σ | PSNR | MAE | SSIM |
YK | 30 | 26.08 | 8.62 | 0.7275 | |
LLT | 30 | 27.10 | 8.11 | 0.7554 | |
Lena | Ours | 30 | 27.46 | 7.11 | 0.8078 |
YK | 20 | 27.73 | 6.97 | 0.8082 | |
LLT | 20 | 29.18 | 6.39 | 0.8211 | |
Ours | 20 | 29.20 | 5.89 | 0.8421 | |
YK | 30 | 25.80 | 9.31 | 0.7053 | |
LLT | 30 | 26.83 | 8.69 | 0.7258 | |
Barbara | Ours | 30 | 27.07 | 8.00 | 0.7520 |
YK | 20 | 27.13 | 7.98 | 0.7584 | |
LLT | 20 | 28.28 | 7.29 | 0.7794 | |
Ours | 20 | 28.46 | 6.79 | 0.7945 |
Not surprisingly, although the edges are preserved, the staircase effect is visible for the second order models, and there are some speckles in the processed images, with an example given in Figure 2. Comparing the images processed by our model and the original images, we can observed that, the differences are insignificant. The edges are preserved and no speckles appear in the processed images.
Finally, to illustrate the superiority of the proposed model over other related fourth-order models, we compared our results with YK model [26] and LLT model [16]. Barbara and Lena images have been corrupted by white Gaussian noise with SD of 30 (Figures 5 and 6) and SD of 20 (Figures 7 and 8). Numerical results for the images are tabulated in Table 4. Besides getting better outcomes, as evident from the results (see Figures 5 and 6), the model tackles the speckles caused by YK model at the same time.
In Figures 6 and 8, the results of Lena Image have been displayed. In Figure 6, the test image Lena and its noisy version degraded by Gaussian noise with SD of 30 are shown in the sections (a) and (b), sections (c) to (e) are the results of the YK model, LLT model and the proposed one. Similarly, in Figure 8, the test image Lena and its noisy version degraded by Gaussian noise with SD of 20 are shown with the same order described above. The last image in section (e) of Figures 6 and 8 are the results of our suggested filter in which the extent of the denoising performance is noticeably better than competitor filter.
In this article, we proposed a fourth-order image denoising model. The model was based on solving a fourth order partial differential equation by defining its corresponding functional. We proved, by use of Rothe's method, the existence and uniqueness of the entropy solution of the equation. Compared with the well known ROF and PM models, numerical results showed that our model perform better image recovery and can overcome staircase effects.
The authors declare that they have no conflict of interests whatsoever and do approve the publication of this paper.
[1] |
C. A. Janeway, How the immune system works to protect the host from infection: A personal view, Proc. Natl. Acad. Sci., 98 (2001), 7461–7468. https://doi.org/10.1073/pnas.131202998 doi: 10.1073/pnas.131202998
![]() |
[2] |
R. D. Michalek, J. C. Rathmell, The metabolic life and times of a T‐cell, Immunol. Rev., 236 (2010), 190–202. https://doi.org/10.1111/j.1600-065X.2010.00911.x doi: 10.1111/j.1600-065X.2010.00911.x
![]() |
[3] |
K. C. Mccullough, A. Summerfield, Basic concepts of immune response and defense development, ILAR J., 46 (2005), 230–240. https://doi.org/10.1093/ilar.46.3.230 doi: 10.1093/ilar.46.3.230
![]() |
[4] |
A. Rahman, A. Tiwari, J. Narula, T. Hickling, Importance of feedback and feedforward loops to adaptive immune response modeling, CPT: Pharmacometrics Syst. Pharmacol., 7 (2018), 621–628. https://doi.org/10.1002/psp4.12352 doi: 10.1002/psp4.12352
![]() |
[5] |
C. C. Mok, C. S. Lau, Pathogenesis of systemic lupus erythematosus, J. Clin. Pathol., 56 (2003), 481–490. https://doi.org/10.1136/jcp.56.7.481 doi: 10.1136/jcp.56.7.481
![]() |
[6] |
A. Bhatia, Y. Kumar, Cellular and molecular mechanisms in cancer immune escape: a comprehensive review, Expert Rev. Clin. Immunol., 10 (2013), 41–62. https://doi.org/10.1586/1744666X.2014.865519 doi: 10.1586/1744666X.2014.865519
![]() |
[7] |
D. S. Vinay, E. P. Ryan, G. Pawelec, W. H. Tallib, J. Stagg, E. Elkord, et al., Immune evasion in cancer: Mechanistic basis and therapeutic strategies, Semin. Cancer Biol., 35 (2015), 185–198. https://doi.org/10.1016/j.semcancer.2015.03.004 doi: 10.1016/j.semcancer.2015.03.004
![]() |
[8] |
K. A. Abdel-Sater, Physiological positive feedback mechanisms, Am. J. Biomed. Sci., 3 (2011), 145–155. https://doi.org/10.5099/aj110200145 doi: 10.5099/aj110200145
![]() |
[9] |
N. Rapin, E. Mosekilde, O. Lund, Bistability in autoimmune diseases, Autoimmunity, 44 (2011), 256–260. https://doi.org/10.3109/08916934.2010.523233 doi: 10.3109/08916934.2010.523233
![]() |
[10] |
S. Wang, F. Xu F, L. Rong, Bistability analysis of an HIV model with immune response, J. Biol. Syst., 25 (2017), 677–695. https://doi.org/10.1142/S021833901740006X doi: 10.1142/S021833901740006X
![]() |
[11] |
C. Long, H. Qi, S. Huang, Mathematical modeling of cytotoxic lymphocyte-mediated immune response to hepatitis B virus infection, J. Biomed. Biotechnol., 2008 (2008), 743690. https://doi.org/10.1155/2008/743690 doi: 10.1155/2008/743690
![]() |
[12] |
K. León, A. Lage, J. Carneiro, Tolerance and immunity in a mathematical model of T-cell mediated suppression, J. Theor. Biol., 225 (2003), 107–126. https://doi.org/10.1016/S0022-5193(03)00226-1 doi: 10.1016/S0022-5193(03)00226-1
![]() |
[13] |
M. Robertson-Tessi, A. El-Kareh, A. Goriely, A mathematical model of tumor-immune interactions, J. Theor. Biol., 294 (2011), 56–73. https://doi.org/10.1016/j.jtbi.2011.10.027 doi: 10.1016/j.jtbi.2011.10.027
![]() |
[14] |
M. A. Vogelbaum, B. Otvos, B. Raychaudhuri, D. Hambardzumyan, J. Finke, J. Lathia, The role of Myeloid derived suppressor cells (MDSCs) in tumor-induced immunosuppression in human and murine gliomas, Neuro-Oncology, 16 (2014), 44–44. https://doi.org/10.1093/neuonc/nou209.10 doi: 10.1093/neuonc/nou209.10
![]() |
[15] |
X. Lai, A. Stiff, M. Duggan, R. Wesolowski, W. E. Carson Ⅲ, A. Friedman, Modeling combination therapy for breast cancer with BET and immune checkpoint inhibitors, Proc. Natl. Acad. Sci., 115 (2018), 5534–5539. https://doi.org/10.1073/pnas.1721559115 doi: 10.1073/pnas.1721559115
![]() |
[16] |
X. Lai, A. Friedman, How to schedule VEGF and PD-1 inhibitors in combination cancer therapy, BMC Syst. Biol., 13 (2019), 30. https://doi.org/10.1186/s12918-019-0706-y doi: 10.1186/s12918-019-0706-y
![]() |
[17] |
X. L. Lai, A. Friedman, Combination therapy for melanoma with BRAF/MEK inhibitor and immune checkpoint inhibitor: a mathematical model, BMC Syst. Biol., 11 (2017), 70. https://doi.org/10.1186/s12918-017-0446-9 doi: 10.1186/s12918-017-0446-9
![]() |
[18] |
A. Friedman, X. Lai, Combination therapy for cancer with oncolytic virus and checkpoint inhibitor: A mathematical model, PLoS ONE, 13 (2018), e0192449. https://doi.org/10.1371/journal.pone.0192449 doi: 10.1371/journal.pone.0192449
![]() |
[19] |
T. Kamada, Y. Togasjhi, C. Tay, D. Ha, A. Sasaki, Y. Nakamura, et al., PD-1+ regulatory T cells amplified by PD-1 blockade promote hyperprogression of cancer, Proc. Natl. Acad. Sci., 116 (2019), 9999–10008. https://doi.org/10.1073/pnas.1822001116 doi: 10.1073/pnas.1822001116
![]() |
[20] |
S. J. Rotz, D. Leino, S. Szabo, J. L. Mangino, B. K. Turpin, J. G. Pressey, Severe cytokine release syndrome in a patient receiving PD-1-directed therapy, Pediatr. Blood Cancer, 64 (2017), e26642. https://doi.org/10.1002/pbc.26642 doi: 10.1002/pbc.26642
![]() |
[21] |
N. L. Komarova, E. Barnes, P. Klenerman, D. Wodarz, Boosting immunity by antiviral drug therapy: A simple relationship among timing, efficacy, and success, Proc. Natl. Acad. Sci., , 100 (2003), 1855–1860. https://doi.org/10.1073/pnas.0337483100 doi: 10.1073/pnas.0337483100
![]() |
[22] |
N. L. Komarova, D. Wodarz, ODE models for oncolytic virus dynamics, J. Theor. Biol., 263 (2010), 530–543. https://doi.org/10.1016/j.jtbi.2010.01.009 doi: 10.1016/j.jtbi.2010.01.009
![]() |
[23] |
G. Mahlbacher, L. T. Curtis, J. Lowengrub, H. B. Frieboes, Mathematical modeling of tumor-associated macrophage interactions with the cancer microenvironment, J. Immunother. Cancer, 6 (2018), 10. https://doi.org/10.1186/s40425-017-0313-7 doi: 10.1186/s40425-017-0313-7
![]() |
[24] |
L. J. Carreno, P. A. González, A. M. Kalergis, Modulation of T cell function by TCR/pMHC binding kinetics, Immunobiology, 211 (2006), 47–64. https://doi.org/10.1016/j.imbio.2005.09.003 doi: 10.1016/j.imbio.2005.09.003
![]() |
[25] |
K. Li, R. William, Z. Yuan, C. Zhu, Single-molecule investigations of T-cell activation, Curr. Opin. Biomed. Eng., 12 (2019), 102–110. https://doi.org/10.1016/j.cobme.2019.10.005 doi: 10.1016/j.cobme.2019.10.005
![]() |
[26] |
P. Rozman, U. Svajger, The tolerogenic role of IFN-γ, Cytokine Growth Factor Rev., 41 (2018), 40–53. https://doi.org/10.1016/j.cytogfr.2018.04.001 doi: 10.1016/j.cytogfr.2018.04.001
![]() |
[27] |
J. D. Burke, H. A. Young, IFN-γ: A cytokine at the right time, is in the right place, Semin. Immunol., 43 (2019), 101280. https://doi.org/10.1016/j.smim.2019.05.002 doi: 10.1016/j.smim.2019.05.002
![]() |
[28] |
J. H. Esensten, Y. A. Helou, G. Chopra, A. Weiss, J. A. Bluestone, CD28 costimulation: from mechanism to therapy, Immunity, 44 (2016), 973–988. https://doi.org/10.1016/j.immuni.2016.04.020. doi: 10.1016/j.immuni.2016.04.020
![]() |
[29] |
M. Mandai, J. Hamamishi, K. Abiko, N. Matsumura, T. Baba, I. Konnishi, Dual faces of IFNγ in cancer progression: a role of PD-L1 induction in the determination of pro-and antitumor immunity, Clin. Cancer Res., 22 (2016), 2329–2334. https://doi.org/10.1158/1078-0432.CCR-16-0224 doi: 10.1158/1078-0432.CCR-16-0224
![]() |
[30] |
L. M. Francisco, V. H. Salinas, K. E. Brown, V. K. Vangugri, G. J. Freeman, V. K. Kuchroo, et al., PD-L1 regulates the development, maintenance, and function of induced regulatory T cells, J. Exp. Med., 206 (2009), 3015–3029. https://doi.org/10.1084/jem.20090847 doi: 10.1084/jem.20090847
![]() |
[31] |
E. Batlle, J. Massagué, Transforming growth factor-β signaling in immunity and cancer, Immunity, 50 (2019), 924–940. https://doi.org/10.1016/j.immuni.2019.03.024 doi: 10.1016/j.immuni.2019.03.024
![]() |
[32] |
P. Pandiyan, L. Zheng, S. Ishiharam, J. Reed, M. J. Lenardo, CD4+CD25+Foxp3+ regulatory T cells induce cytokine deprivation-mediated apoptosis of effector CD4+ T cells, Nat. Immunol., 8 (2007), 1353–1362. https://doi.org/10.1038/ni1536 doi: 10.1038/ni1536
![]() |
[33] |
P. Trzonkowski, E. Szmit, J. Myliwska, A. Mysliwski, CD4+CD25+ T regulatory cells inhibit cytotoxic activity of CTL and NK cells in humans-impact of immunosenescence, Clin. Immunol., 119 (2006), 307–316. https://doi.org/10.1016/j.clim.2006.02.002 doi: 10.1016/j.clim.2006.02.002
![]() |
[34] |
L. Sewalt, K. Harley, P. V. Heijster, S. Balasuriya, Influences of Allee effects in the spreading of malignant tumours, J. Theor. Biol., 394 (2016), 77–92. https://doi.org/10.1016/j.jtbi.2015.12.024 doi: 10.1016/j.jtbi.2015.12.024
![]() |
[35] |
Y. V. Tyutyunov, S. Sen, L. I. Titova, M. Banerjee, Predator overcomes the Allee effect due to indirect prey-taxis, Ecol. Complexity, 39 (2019), 100772. https://doi.org/10.1016/j.ecocom.2019.100772 doi: 10.1016/j.ecocom.2019.100772
![]() |
[36] |
Y. Yu, J. J. Nieto, A. Torres, K. Wang, A viral infection model with a nonlinear infection rate, Boundary Value Probl., 2009 (2009), 958016. https://doi.org/10.1155/2009/958016 doi: 10.1155/2009/958016
![]() |
[37] |
S. Halle, O. Halle, R. Förster, Mechanisms and dynamics of T cell-mediated cytotoxicity in vivo, Trends Immunol., 38 (2017), 432–443. https://doi.org/10.1016/j.it.2017.04.002 doi: 10.1016/j.it.2017.04.002
![]() |
[38] |
B. Weigelin, M. Krause, P. Friedl, Cytotoxic T lymphocyte migration and effector function in the tumor microenvironment, Immunol. Lett., 138 (2011), 19–21. https://doi.org/10.1016/j.imlet.2011.02.016 doi: 10.1016/j.imlet.2011.02.016
![]() |
[39] |
J. R. Schoenborn, C. B. Wilson, Regulation of interferon-gamma during innate and adaptive immune responses, Adv. Immunol., 96 (2007), 41. https://doi.org/10.1016/S0065-2776(07)96002-2 doi: 10.1016/S0065-2776(07)96002-2
![]() |
[40] |
K. Abiko, N. Matsumura, J. Hamanishi, N. Horikawa, R. Murakami, K. Yamaguchi, et al., IFN-γ from lymphocytes induces PD-L1 expression and promotes progression of ovarian cancer, Br. J. Cancer, 112 (2015), 1501–1509. https://doi.org/10.1038/bjc.2015.101 doi: 10.1038/bjc.2015.101
![]() |
[41] |
H. Miao, J. A. Hollenbaugh, M. S. Zand, J. Holden-Wiltse, T. R. Mosmann, A. S. Perelson, et al., Quantifying the early immune response and adaptive immune response kinetics in mice infected with influenza A virus, J. Virol., 13 (2010), 6687–6698. https://doi.org/10.1128/JVI.00266-10 doi: 10.1128/JVI.00266-10
![]() |
[42] |
T. L. Hackett, R. Holloway, S. T. Holgate, J. A. Warner, Dynamics of pro-inflammatory and anti-inflammatory cytokine release during acute inflammation in chronic obstructive pulmonary disease: an ex vivo study, Respir Res., 9 (2008), 47. https://doi.org/10.1186/1465-9921-9-47 doi: 10.1186/1465-9921-9-47
![]() |
[43] |
K. A. Hay, L. A. Hanafi, D. Li, J. Gust, W. C. Liles, M. M. Wurfel, et al., Kinetics and biomarkers of severe cytokine release syndrome after CD19 chimeric antigen receptor-modified T-cell therapy, Blood, 130 (2017), 2295–2306. https://doi.org/10.1182/blood-2017-06-793141 doi: 10.1182/blood-2017-06-793141
![]() |
[44] |
X. Jiang, J, Wang, X. Deng, F. Xiong, J. Ge, B. Xiang, et al., Role of the tumor microenvironment in PD-L1/PD-1-mediated tumor immune escape, Mol. Cancer, 18 (2019), 10. https://doi.org/10.1186/s12943-018-0928-4. doi: 10.1186/s12943-018-0928-4
![]() |
[45] |
H. Dong, S. E. Strome, D. R. Salomao, H. Tamura, F. Hirano, D. B. Flies, et al., Tumor-associated B7-H1 promotes T-cell apoptosis: A potential mechanism of immune evasion, Nat. Med., 8 (2002), 793–800. https://doi.org/10.1038/nm730 doi: 10.1038/nm730
![]() |
[46] |
N. Patsoukis, J. Brown, V. Petkova, F. Liu, L. Li, V. A Boussiotis, Selective effects of PD-1 on Akt and Ras pathways regulate molecular components of the cell cycle and inhibit T cell proliferation, Sci. Signaling, 5 (2012). https://doi.org/10.1126/scisignal.2002796 doi: 10.1126/scisignal.2002796
![]() |
[47] |
T. Noguchi, J. P. Ward, M. M. Gubin, C. D. Arthur, S. H. Lee, J. Hundal, et al., Temporally distinct PD-L1 expression by tumor and host cells contributes to immune escape, Cancer Immunol. Res., 5 (2017), 106–117. https://doi.org/10.1158/2326-6066.CIR-16-0391 doi: 10.1158/2326-6066.CIR-16-0391
![]() |
1. | Ahmed Nokrane, Nour Eddine Alaa, Fatima Aqel, Fourth-order nonlinear degenerate problem for image decomposition, 2023, 4, 2662-2963, 10.1007/s42985-023-00251-1 |
Algorithm | σ | PSNR | MAE | SSIM |
PM model | 30 | 27.98 | 7.06 | 0.8345 |
ROF model | 30 | 28.26 | 6.80 | 0.8359 |
Our Method | 30 | 28.66 | 6.44 | 0.8537 |
Algorithm | σ | PSNR | MAE | SSIM |
PM model | 20 | 28.89 | 5.83 | 0.8386 |
ROF model | 20 | 28.76 | 5.85 | 0.8397 |
Our Method | 20 | 29.04 | 5.62 | 0.8450 |
Algorithm | σ | PSNR | MAE | SSIM |
PM model | 20 | 29.86 | 5.70 | 0.8727 |
ROF model | 20 | 29.90 | 5.64 | 0.8741 |
Our Method | 20 | 30.48 | 5.18 | 0.8795 |
Image | Algorithm | σ | PSNR | MAE | SSIM |
YK | 30 | 26.08 | 8.62 | 0.7275 | |
LLT | 30 | 27.10 | 8.11 | 0.7554 | |
Lena | Ours | 30 | 27.46 | 7.11 | 0.8078 |
YK | 20 | 27.73 | 6.97 | 0.8082 | |
LLT | 20 | 29.18 | 6.39 | 0.8211 | |
Ours | 20 | 29.20 | 5.89 | 0.8421 | |
YK | 30 | 25.80 | 9.31 | 0.7053 | |
LLT | 30 | 26.83 | 8.69 | 0.7258 | |
Barbara | Ours | 30 | 27.07 | 8.00 | 0.7520 |
YK | 20 | 27.13 | 7.98 | 0.7584 | |
LLT | 20 | 28.28 | 7.29 | 0.7794 | |
Ours | 20 | 28.46 | 6.79 | 0.7945 |
Algorithm | σ | PSNR | MAE | SSIM |
PM model | 30 | 27.98 | 7.06 | 0.8345 |
ROF model | 30 | 28.26 | 6.80 | 0.8359 |
Our Method | 30 | 28.66 | 6.44 | 0.8537 |
Algorithm | σ | PSNR | MAE | SSIM |
PM model | 20 | 28.89 | 5.83 | 0.8386 |
ROF model | 20 | 28.76 | 5.85 | 0.8397 |
Our Method | 20 | 29.04 | 5.62 | 0.8450 |
Algorithm | σ | PSNR | MAE | SSIM |
PM model | 20 | 29.86 | 5.70 | 0.8727 |
ROF model | 20 | 29.90 | 5.64 | 0.8741 |
Our Method | 20 | 30.48 | 5.18 | 0.8795 |
Image | Algorithm | σ | PSNR | MAE | SSIM |
YK | 30 | 26.08 | 8.62 | 0.7275 | |
LLT | 30 | 27.10 | 8.11 | 0.7554 | |
Lena | Ours | 30 | 27.46 | 7.11 | 0.8078 |
YK | 20 | 27.73 | 6.97 | 0.8082 | |
LLT | 20 | 29.18 | 6.39 | 0.8211 | |
Ours | 20 | 29.20 | 5.89 | 0.8421 | |
YK | 30 | 25.80 | 9.31 | 0.7053 | |
LLT | 30 | 26.83 | 8.69 | 0.7258 | |
Barbara | Ours | 30 | 27.07 | 8.00 | 0.7520 |
YK | 20 | 27.13 | 7.98 | 0.7584 | |
LLT | 20 | 28.28 | 7.29 | 0.7794 | |
Ours | 20 | 28.46 | 6.79 | 0.7945 |