Loading [MathJax]/jax/output/SVG/jax.js
Research article Topical Sections

Steady-state bifurcation and regularity of nonlinear Burgers equation with mean value constraint

  • Received: 17 February 2025 Revised: 12 April 2025 Accepted: 27 April 2025 Published: 15 May 2025
  • In this paper, we focus on the steady-state bifurcation problem of the nonlinear Burgers equation within a bounded domain, considering both homogeneous Dirichlet boundary conditions and homogeneous Neumann boundary conditions with a mean value constraint. Unlike previous studies, we develop an enhanced turbulence model by incorporating nonlinear higher-order terms (such as u2 and u3) and linear source terms λu into the one-dimensional Burgers equation. Our steady-state bifurcation analysis establishes for the first time how the coupled forward energy cascade and inverse energy transfer mechanisms collectively govern the dynamics of initial flow instability. By combining the spectral theorem for a linear compact operator with the normalized Lyapunov–Schmidt reduction method and the implicit function theorem, we derive the complete criterion for the critical bifurcation condition, the explicit form of the bifurcation solution, and its regularity.

    Citation: Qingming Hao, Wei Chen, Zhigang Pan, Chao Zhu, Yanhua Wang. Steady-state bifurcation and regularity of nonlinear Burgers equation with mean value constraint[J]. Electronic Research Archive, 2025, 33(5): 2972-2988. doi: 10.3934/era.2025130

    Related Papers:

    [1] Makoto Nakakita, Teruo Nakatsuma . Analysis of the trading interval duration for the Bitcoin market using high-frequency transaction data. Quantitative Finance and Economics, 2025, 9(1): 202-241. doi: 10.3934/QFE.2025007
    [2] Per B. Solibakke . Forecasting hourly WTI oil front monthly price volatility densities. Quantitative Finance and Economics, 2024, 8(3): 466-501. doi: 10.3934/QFE.2024018
    [3] Sylvia Gottschalk . Digital currency price formation: A production cost perspective. Quantitative Finance and Economics, 2022, 6(4): 669-695. doi: 10.3934/QFE.2022030
    [4] David Alaminos, M. Belén Salas, Ángela M. Callejón-Gil . Managing extreme cryptocurrency volatility in algorithmic trading: EGARCH via genetic algorithms and neural networks. Quantitative Finance and Economics, 2024, 8(1): 153-209. doi: 10.3934/QFE.2024007
    [5] Nilcan Mert, Mustafa Caner Timur . Bitcoin and money supply relationship: An analysis of selected country economies. Quantitative Finance and Economics, 2023, 7(2): 229-248. doi: 10.3934/QFE.2023012
    [6] Haoyu Wang, Dejun Xie . Optimal profit-making strategies in stock market with algorithmic trading. Quantitative Finance and Economics, 2024, 8(3): 546-572. doi: 10.3934/QFE.2024021
    [7] Samuel Asante Gyamerah . Modelling the volatility of Bitcoin returns using GARCH models. Quantitative Finance and Economics, 2019, 3(4): 739-753. doi: 10.3934/QFE.2019.4.739
    [8] Timotheos Paraskevopoulos, Peter N Posch . A hybrid forecasting algorithm based on SVR and wavelet decomposition. Quantitative Finance and Economics, 2018, 2(3): 525-553. doi: 10.3934/QFE.2018.3.525
    [9] Lukáš Pichl, Taisei Kaizoji . Volatility Analysis of Bitcoin Price Time Series. Quantitative Finance and Economics, 2017, 1(4): 474-485. doi: 10.3934/QFE.2017.4.474
    [10] Zheng Nan, Taisei Kaizoji . Bitcoin-based triangular arbitrage with the Euro/U.S. dollar as a foreign futures hedge: modeling with a bivariate GARCH model. Quantitative Finance and Economics, 2019, 3(2): 347-365. doi: 10.3934/QFE.2019.2.347
  • In this paper, we focus on the steady-state bifurcation problem of the nonlinear Burgers equation within a bounded domain, considering both homogeneous Dirichlet boundary conditions and homogeneous Neumann boundary conditions with a mean value constraint. Unlike previous studies, we develop an enhanced turbulence model by incorporating nonlinear higher-order terms (such as u2 and u3) and linear source terms λu into the one-dimensional Burgers equation. Our steady-state bifurcation analysis establishes for the first time how the coupled forward energy cascade and inverse energy transfer mechanisms collectively govern the dynamics of initial flow instability. By combining the spectral theorem for a linear compact operator with the normalized Lyapunov–Schmidt reduction method and the implicit function theorem, we derive the complete criterion for the critical bifurcation condition, the explicit form of the bifurcation solution, and its regularity.



    Noise is the most difficult task in the field of image processing and computer vision. In this work, we focus on removing additive Gaussian noise. The problem is formulated mathematically as: let u(x,y) be a digital image and u0(x,y) be its observation with random noise η(x,y). For (x,y)Ω s.t.

    u0(x,y)=u(x,y)+η(x,y). (1.1)

    The noise level is approximately known

    uu02L2(Ω)=Ω(uu0)2dxσ2. (1.2)

    The goal of denoising is to filter out high frequency signals, while preserving the important features of the image such as edges. Therefore, we search for an image processing model which removes noise and offers better handling of edges.

    During the last two decades, the method of partial differential equations (PDEs) for image processing has become a major research topic. A classical PDEs model named ROF (Rudin, Osher, Fatemi) model which was based on the total variation (TV), was first introduced by Rudin et al. [18]. The idea in the ROF model is to minimize the the total variation of the image u,

    TV=minuBV(Ω)L2(Ω)Ω|u|dx+λ2Ω(uu0)2dx. (1.3)

    In fact, one of the main advantages of using ROF model for image restoration is that the discontinuities are allowed. However, the main drawback of denoising models based on the TV is that they tend to yield piecewise constant images, a phenomenon known as staircase effects. Strong [19], introduced an adaptive TV functional (TVα)

    TVα=minuBV(Ω)L2(Ω)Ωα(x)|u(x)|dx+λ2Ω(uu0)2dx, (1.4)

    for spatially adaptive image restoration. The function α(x) is an edge detector to control the diffusion. The main idea of edge detector is that edges of an image are associated with location of high gradient in a slightly smooth version of the noisy image.

    In the recent decades, to overcome the staircase effects that caused by second-order variational model, fourth-order PDEs have been introduced in image restoration, [1,2,3,4,9,10,12,14,16,20,22,24,25,26,27,28]. You-Kaveh [26] proposed the following functional

    Ωf(|u|)dxdy, (1.5)

    where denote the Laplacian operator. Based on the gradient descent method, this second order functional yields a fourth-order PDE

    ut=(g((u)2)u), (1.6)

    where g(s)=k2/(k2+s2) and k is an image dependent parameter. This equation does avoid blocky piecewise constant solution. However, it produces speckles in the processed image [16]. Many other authors have considered image denoising models based on the minimizer of high-order functionals. Laysaker et al. [16] proposed the LLT model

    Ω(|uxx|+|uyy|)dxdy, (1.7)

    and

    Ω|uxx|2+|uxy|2+|uyx|2+|uyy|2dxdy, (1.8)

    they try to minimize the TV of u. Minimizing these two functionals is equivalent to solve the following PDEs respectively

    ut=(uxxuxx)xx(uyyuyy)yy (1.9)

    and

    ut=(uxxD2u)xx(uxyD2u)yx(uyxD2u)xy(uyyD2u)yy, (1.10)

    where D2u∣=|uxx|2+|uxy|2+|uyx|2+|uyy|2. These equations have proved to be the improved version of (1.6).

    The theoretical analysis showed that fourth-order equations have advantages over second-order equations in some aspects. Fourth-order PDEs usually produce the smooth image of the observed image. This is believed to be a better approximation in smooth region. Therefore, the staircase effect is suggested to be reduced and the recovery image will look better. It is reasonable to conclude that fourth-order diffusion performs better than the second-order models in the aspect of the recovery of smooth regions.

    In this paper, to address the problem of denoising images contaminated with additive noise, a fourth-order model is suggested. Using the gradient module of the image to design a speed controlling function. This function indicated where is the edge in the image, thus the new model can preserve edge in this region. The motivation for proposing this model is to overcome certain inconsistencies in second order models founded during the process of recovering smooth regions and better preservation of the fine details. The model is based on solving a nonlinear fourth order degenerate equation with the noisy image as its initial data. By use of Roth's method, we proved the existence and uniqueness of the entropy solution. Additionally, the numerical results demonstrate that the proposed model is superior to PM (Perona, Malik) [17] and ROF models.

    The rest of this article is organized as follows. In Section 2, we give some preliminaries that we will use. Section 3 is devoted to the proposed model and the proofs of existence and uniqueness of its solution. The difference schemes are presented in Section 4. Numerical experiments are presented in Section 5 and the conclusion of this paper is given in Section 6.

    In this section, we recall some necessary definitions and notations, [11,13,14]. We begin with some definitions of the space BV2, which consists of functions uW1,1(Ω) s.t uBV(Ω), this space is also denoted by BH(Ω). To know more about space of bounded Hessian, we refer the reader to [4,5,8].

    Definition 2.1. Let ΩRn be a bounded open domain with Lipschitz boundary. Let uL1(Ω). Then the BV2 semi-norm of u is characterized by

    ||D2u||=supϕC20(Ω,Rn×n){Ωni,j=1ujiϕijdx:|ϕ(x)|1,xΩ}<, (2.1)

    where C20(Ω,X) is the space of functions from Ω to X, 2-times continuously differentiable with compact support and ϕ(x)is a vector valued function, with |ϕ(x)|=ni,j=1(ϕij)2. Here we remark that the space BV2 equipped with uBV2(Ω)=||D2u||+uL1(Ω) is a Banach space.

    Definition 2.2. Suppose that ΩRn be a bounded open domain with Lipschitz boundary, uL1(Ω), and α(x)0 is continuous and real function. Then we define the weighted BV2 semi-norm of u as

    ||D2u||α=supϕC20(Ω,Rn×n){Ωni,j=1ujiϕijdx:|ϕ(x)|α,xΩ}< (2.2)

    In this section, we propose a fourth-order image denoising model, with some guidance from previous work [6,14,15,16,26,27]. There are some benefits of fourth-order models. On the one hand, it can remove high frequency oscillation more effectively than second-order models because the evaluation of the second-order becomes weak in the high frequency area. One the other hand, for the fourth-order model, there is flexibility in employing different functional behaviors in the formulation.

    Consider the following boundary value problem

    ut+ D2ij(α(x) D2iju|D2iju|)=0(x,t)ΩT=(0,T)×Ω, (3.1)
    u(x,t)=0,(x,t)(0,T)×Ω, (3.2)
    un=0,(x,t)(0,T)×Ω, (3.3)
    u(x,0)=u0(x),xΩ, (3.4)

    where α(x)=11+|Gσu0|2, Gσ(x) is the Gaussian filter with parameter σ, u0(x) is the original image, Ω is bounded domain of R2 with appropriate smooth boundary, T>0 is fixed, n denote the unit outward normal of the boundary Ω.

    The term α(x) is used to enhance edges. In fact, it controls the speed of the diffusion: in the smooth region where u0 is small, the diffusion is strong. Near possible edges, however, where u0 is large, the diffusion spread is low. The convolution with Gσ should smooth away any large oscillations of noise. Therefore, we can get the smooth image and further preserve the edges in a best way.

    Definition 3.1. A measurable function u:ΩTR is an entropy solution of (3.1)–(3.4) in ΩT if uC([0,T];L2(Ω))L(0,T;BV2(Ω)),utL2(ΩT) and there exist z, such that αzL(ΩT) with αzL(ΩT)1,ut+Dijαzij=0 in D(ΩT) such that

    Ω(u(t)v)utdxΩαz(t)D2vdx||D2u||α, (3.5)

    for every vL(0,T;W2,10(Ω)).

    Before investigating the existence and uniqueness of problem (3.1)–(3.4), let us consider the following approximate evaluation problem: for 1<p2 and u0pW2,p(Ω), we construct the following problem

    upt+ D2ij(α(x)|D2ijup|p2D2ijup)=0,(x,t)ΩT (3.6)
    up(x,t)=0,(x,t)(0,T)×Ω, (3.7)
    upn=0,(x,t)(0,T)×Ω, (3.8)
    up(x,0)=u0p(x),xΩ. (3.9)

    Lemma 3.1. For any fixed p, 1<p2, the above problem (3.6)–(3.9) admits a weak solution upL(0,T;W2,p0(Ω))C([0,T];L2(Ω)) and uptL2(ΩT) such that

    limt0+up(x,t)u0p(x)L2(Ω)=0, (3.10)

    and for any φC0(ΩT) the following integral equality holds

    T0Ωuptφ(x,t)dxdt+T0Ωα(x)| D2ijup|p2 D2ijupD2ijφ(x,t)dxdt=0, (3.11)

    with

    upL(0,T;W2,p0(Ω))+upL(0,T;L2(Ω))+uptL2(ΩT)C, (3.12)

    where C is a constant independent of p.

    Proof. We apply Rothe's method [23], to construct an approximate solution sequence. Divide the interval [0,T] into n equal segments and define h=Tn. For any j: 1jn, for any positive integer n and a function u(x,t), denote

    un,jp(x)=up(x,jh),j=1,2,...,n.

    For fixed j, define the following functional on W2,p0(Ω)

    E(w)=1pΩα(x)|D2ijw|pdx+12hΩ(wun,j1p)2dx. (3.13)

    The idea here is to prove that if un,j1p is known and un,0p=u0p, then there is a minimizer for (3.13).

    Let umW2,p0(Ω)L2(Ω) be a minimizing sequence for E. Since α is bounded below, then the sequence um is bounded in W2,p0(Ω) and L2(Ω). Therefore, there exists a subsequence umiof um and a function un,jpW2,p0(Ω)L2(Ω) such that as i,

    umiun,jpweakly in W2,p0(Ω)andL2(Ω). (3.14)

    From this and the weak lower semicontinuity of the norms, we get

    E(un,jp)lim infiE(umi)=infwW2,p0(Ω)L2(Ω)E(w).

    Then un,jp is the solution of the Euler equation corresponding to E(w)

    D2ij(α(x)|D2ijun.jp|p2D2ijun.jp)+1h(un.jpun,j1p)=0, (3.15)

    which implies

    1hΩ(un,jpun,j1p)η(x)dx+Ωα(x)|D2ijun,jp|p2 D2ijun,jpD2ijη(x)dx=0, (3.16)

    for any η(x)C0(Ω).

    Let χn,j(t) be the indicator function of [h(j1),hj) and

    λn,j(t)={th(j1),if t[h(j1),hj),0,otherwise.

    We construct an approximation function as

    unp(x,t)=nj=1χn,j(t)un,jp, withunp(x,0)=u0p(x)

    and

    wnp(x,t)=nj=1χn,j(t)[un,j1p(x)+λn,j(t)(un,jp(x)un,j1p(x))].

    By (3.16), we have

    Ω(wnptη(x)+α(x)|D2ijunpp2D2ijunpD2ijη(x))dx=0,

    for every η(x)C0(Ω) a.e. t[0,T], which implies that

    T0Ω(wnptφ(x,t)+α(x)|D2ijunp|p2D2ijunpD2ijφ(x,t))dxdt=0, (3.17)

    for every φC0(ΩT).

    Next, we obtain some estimates for unp(x,t) and wnp(x,t). Notice that, we choose η(x)W2,p0(Ω) as the test function in (3.16). Let η(x)=un,jpun,j1p, we have

    1hΩ(un,jpun,j1p)2dx+Ωα(x)|D2ijun,jp|p2 D2ijun,jpD2ij(un,jpun,j1p)dx=0,
    1hΩ(un,jpun,j1p)2dx+Ωα(x)|D2ijun,jp|pdx=Ωα(x)|D2ijun,jp|p2 D2ijun,jpD2ijun,j1pdx.

    Using Young's inequality, we have

    1hΩ(un,jpun,j1p)2dx+Ωα(x)|D2ijun,jp|pdxp1pΩα(x)|D2ijun,jp|pdx+1pΩα(x)|D2ijun,j1p|pdx.

    That is

    1hΩ(un,jpun,j1p)2dx+1pΩα(x)|D2ijun,jp|pdx1pΩα(x)|D2ijun,j1p|pdx. (3.18)

    For any m with 1mn, summing (3.18) for j from 1 to m

    Ωα(x)|D2ijun,mp|pdxΩα(x)|D2iju0p|pdx,

    which implies

    sup0<t<TD2ijunppW2,p0(Ω)C, (3.19)

    where C is a constant independent of p,n.

    Summing (3.18) for j from 1 to n yield

    1hnj=1Ω(un,jpun,j1p)2dx1pΩα(x)|D2iju0p|pdx=C. (3.20)

    By the definition of wnp(x,t), we have

    wnpt=1hnj=1χn,j(t)(un,jpun,j1p).

    Thus

    wnpt2L2(ΩT)=1h2nj=1h(un,jpun,j1p)2L2(Ω)C. (3.21)

    By (3.19), we can obtain

    sup0<t<TΩ| D2ijwnp|pdx=sup0<t<Tnj=1χn,j(t)Ω|(1λn,j(t)) D2ijun,j1p+λn,j(t) D2ijun,jp|pdxsup0<t<T D2ijunppW2,p0(Ω)C. (3.22)

    Choosing η(x)=un,jp in (3.16), we get

    1hΩ(un,jpun,j1p)un,jpdx+Ωα(x)|D2ijun,jp|p2 D2ijun,jpD2ijun,jpdx=0,

    which implies

    1hΩ(un,jpun,j1p)un,jpdx+Ωα(x)|D2ijun,jp|pdx=0.

    By Young's inequality, we have

     hΩα(x)|D2ijun,jp|pdx+12Ω|un,jp|2dx12Ω|un,j1p|2dx. (3.23)

    Thus

    Ω|un,jp|2dxΩ|un,j1p|2dx. (3.24)

    This implies

    sup0<t<TΩ|unp|2dxΩ|u0p|2dx. (3.25)

    Similar to the proof of (3.22), we also see

    sup0<t<TΩ|wnp|2dxΩ|u0p|2dx. (3.26)

    Choosing η(x)=un,j1p in (3.16)

    Ω(un,jpun,j1p)un,j1pdx+hΩα(x)|D2ijun,jp|p2 D2ijun,jpD2ijun,j1pdx=0.

    Applying Hölder's inequality and the estimate (3.19), we have

    Ω(un,j1pun,jp)un,j1pdxCh.

    By Young's inequality again yields

    Ω|un,j1p|2dxCh+12Ω|un,j1p|2dx+12Ω|un,jp|2dx.

    Thus

    ChΩ|un,jp|2dxΩ|un,j1p|2dx. (3.27)

    Define B(unp)=α(x)| D2ijunp|p2 D2ijunp. Combining (3.19), (3.21), (3.22), (3.25) and (3.26), we conclude that there exist subsequences of unp,wnp,wnpt and B(unp), denoted by themselves such that, as n

    unpup,inL(0,T;W2,p0(Ω)),wnpwp,inL(0,T;W2,p0(Ω)),wnptwpt,inL2(ΩT),B(unp)ζ,inL(0,T;Lp(Ω)), (3.28)

    holds for some up,wp,ζ. And we also have

    wppL(0,T;W2,p0(Ω))+wpt2L2(ΩT)+uppL(0,T;W2,p0(Ω))C. (3.29)

    Then let n in (3.17),

    wpt+ D2ijζ=0. (3.30)

    Next, we show that up=wp. By the definition of up and wp, we have

    wnpunp=nj=1χn,j(t)(1λn,j(t))(un,j1pun,jp),

    which combined with (3.20), leads to

    wnpunp2L2(ΩT)nj=1hun,jpun,j1p2L2(ΩT)Ch20,as h0. (3.31)

    Now, it remains to show that ζ=B(up). From (3.17) and the convergence sets (3.28), as n, we can get

    T0Ωuptφ(x,t)dxdt+T0Ωζ.D2ijφ(x,t)dxdt=0. (3.32)

    For any gLp(0,T,W2,p(Ω)) and for j from 1 to n, we can obtain, by the monotonicity condition, the inequality

    Ω(B(un.jp)B(g))(D2ijun.jpD2ijg)dx0. (3.33)

    Letting η=un.jp in (3.16), we obtain

    1hΩ(un,jpun,j1p)un,jpdx+ΩB(un,jp)D2ijun,jpdx=0. (3.34)

    Applying Young's inequality on the first term of (3.34) together with the inequality (3.33) and integrating over ((j1)h,jh), we get

    12Ω[|un,jp|2|un,j1p|2]dx+jh(j1)hΩB(un,jp)D2ijgdxdt+jh(j1)hΩB(g)(D2ijun.jpD2ijg)dxdt0. (3.35)

    Summing up (3.35) for j from 1 to n, we obtain

    12Ω[|unp(T)|2|u0p|2]dx+T0ΩB(unp)D2ijgdxdt+T0ΩB(g)(D2ijunpD2ijg)dxdt0. (3.36)

    Recalling the convergence sets (3.28) and letting n, (3.36) yields

    12Ω[|up(T)|2|u0p|2]dx+T0ΩζD2ijgdxdt+T0ΩB(g)(D2ijupD2ijg)dxdt0. (3.37)

    We can rewrite (3.37) in the form

    T0Ωuptupdxdt+T0ΩζD2ijgdxdt+T0ΩB(g)(D2ijupD2ijg)dxdt0. (3.38)

    Letting φ=up in (3.30), we obtain

    T0Ωuptupdxdt+T0ΩζD2ijupdxdt=0. (3.39)

    Then, substituting (3.39) into (3.38) leads to

    T0Ω(ζB(g))(D2ijupD2ijg)dxdt0. (3.40)

    Choose g=upks where k>0 and D2ijsL(0,T;W2,p(Ω)). We then have

    T0Ω(ζB(upks))D2ijsdxdt0. (3.41)

    Sending k0, we obtain

    T0Ω(ζB(up))D2ijsdxdt0,sL(0,T;W2,p(Ω)). (3.42)

    Since s is arbitrary, we see that ζ=B(up).

    Now, we prove (3.10), we let φ=up(x,t) and φ=up(x,t1) in (3.30), for 0t1tt2T, we obtain

    Ω(u2p(x,t2)u2p(x,t1))dx=2t2t1Ωα(x)| D2ijup|pdxdt,

    and

    Ωup(x,t2)up(x,t1)dxΩu2p(x,t1)dx=t2t1Ωα(x)| D2ijup|p2 D2ijup.D2ijup(x,t1)dxdt.

    Then

    Ω|up(x,t2)up(x,t1)|2dx=Ω(u2p(x,t2)u2p(x,t1))dx+2Ω(u2p(x,t1)up(x,t2)up(x,t1))dx,=2t2t1Ωα(x)| D2ijup|pdxdt+2t2t1Ωα(x)| D2ijup|p2 D2ijup.D2ijup(x,t1)dxdt.

    From the above equation, we deduce that

    limt0+up(x,t)u0p(x)L2(Ω)=0,

    and the proof is completed.

    Theorem 3.1. If u0BV2(Ω) and u0=0,un=0,xΩ in the sense of trace then the problem (3.1)–(3.4) admits one and only one entropy solution.

    Proof. By Lemma 3.1, there exists up, which is a weak solution of the problem (3.6)–(3.9) and a constant C such that

    upL(0,T;W2,p0(Ω))+upL(0,T;L2(Ω))+uptL2(ΩT)C. (3.43)

    So, from (3.43), there exists a subsequence of up, denoted by itself and a function uL(0,T;BV2(Ω))C([0,T];L2(Ω)) with utL2(ΩT) such that, as p1+,

    upu,in  W1,1(Ω),with ||D2u||αlim infp1+D2ijupLp(Ω),a.e. t(0,T)

    and

    uptut, weakly in L2(ΩT).

    We also have upu strongly in L2(ΩT)a.e. t(0,T) and

    limt0+u(x,t)u0(x)L2(Ω)=0.

    Applying the method in [7], we next prove that α(x)|D2ijup|p2 D2ijup is weakly relatively compact in L1(ΩT). Employing (3.43) and Hölder's inequality,

    |T0Ωα(x)|D2ijup|p2D2ijupdxdt|T0Ωα(x)∣∣D2ijupp1dxdtCp1pmeas(ΩT)1p,

    where C is independent of p. Thus, {α(x)|D2ijup|p2D2ijup} is bounded and equi-integrable in L1(ΩT) and is therefore weakly relatively compact in L1(ΩT). Thus we deduce that as p1+,

    {α(x)|D2ijup|p2 D2ijup}αz, weakly in L1(ΩT).

    So we get by Lemma 3.1 and the fact that uptut in L2(ΩT),

    T0Ωutφ(x,t)dxdt+T0ΩαzD2ijφ(x,t)dxdt=0, (3.44)

    for every φ(x,t)C0(ΩT) and ut+Dijαzij=0 in D(ΩT).

    Now, it remains to prove that αzL(ΩT)1.

    For any k>0, setting

    Ap,k={(x,t)ΩT:∣D2ijup∣>k}, we have that

    meas(Ap,k)Ckp, for every p>1,k>0.

    As above, there exists a function gkL1(ΩT) such that

    α(x)|D2ijup|p2 D2ijupχAp,kgk, as p1+ weakly in L1(ΩT),

    where χAp,k is the indicator function of Ap,k. Now for any ϕL(ΩT) with

    ϕL(ΩT)1, by the definition of χAp,k, we see that

    |T0Ωα(x)|D2ijup|p2 D2ijupϕχAp,kdxdt|Ck.

    Letting p1+, we have

    T0ΩgkdxdtCk,for every k>0. (3.45)

    Since we have that

    |T0Ωα(x)|D2ijup|p2 D2ijupχΩT/Ap,k|kp1, for any p>1,

    letting p1+, we obtain that α(x)D2ijupp2 D2ijupχΩT/Ap,k weakly converges in L1(ΩT) to some function fkL1(ΩT) with fkL(ΩT)1. Since, for any k>0, we may write αz=fk+gk with fkL(ΩT)1 and gk satisfies (3.45), it is easily follows that αzL(ΩT)1.

    Next, we verify the solution definition inequality (3.5). For any vnC0(ΩT) and taking φ=(upvn)ξ(t) in (3.11), we have

    T0Ωupt(upvn)ξ(t)dxdt=T0Ωα(x)|D2ijup|p2 D2ijupD2ij((upvn)ξ(t))dxdt.

    Letting p1+,

    T0Ωut(u(t)vn)ξ(t)dxdtT0Ωαz(t)D2ijvnξ(t)dxdtT0||D2u||αξ(t)dt.

    Then for any vL(0,T;W2,10(Ω)), letting n,

    T0Ωut(u(t)v)ξ(t)dxdtT0Ωαz(t)D2ijvξ(t)dxdtT0||D2u||αξ(t)dt.

    Since ξ(t) is arbitrary, we have

    Ωut(u(t)v)dxΩαz(t)D2ijvdx||D2u||α,

    for every vL(0,T;W2,10(Ω)) and a.e. on [0,T].

    Finally, we prove the uniqueness of the entropy solution. Let u1,u2 both be entropy solution with data u10,u20. Then there exists αz1,αz2L(ΩT) such that

    Ωu1t(u1v)dxΩαz1D2ijvdx||D2u1||α, (3.46)

    and

    Ωu2t(u2v)dxΩαz2D2ijvdx||D2u2||α, (3.47)

    for every vL(0,T;W2,10(Ω)) and a.e. on [0,T]. Let u1n,u2nL(0,T;W2,p0(Ω)) be approximates functions, respectively, for u1 and u2, such that

    limn(D2iju1nL1(Ω)||D2u1||α)=0,limnu1nu1L2(Ω)=0,

    and

    limn(D2iju2nL1(Ω)||D2u2||α)=0,limnu2nu2L2(Ω)=0,

    a.e. on[0,T]. Taking v=u2n in (3.46) and v=u1n in (3.47), adding the two equations and rearranging the result, we obtain

    Ω(u1u2)(u1tu2t)dx+Ω(u1u1n)u2tdx+Ω(u2u2n)u1tΩαz1D2iju2ndx||D2u1||α+Ωαz2D2iju1ndx||D2u2||α.

    So integrating from 0 to t and letting n, we get

    Ω(u1u2)2dxΩ(u10u20)2dx.

    The proof is completed.

    In this section, assuming τ to be the time step size and h the space grid size, we discretize time and space as follows:

    t=nτ,n=0,1,2,,x=ih,i=0,1,2,,I,y=jh,j=0,1,2,,J,

    where Ih×Jh is the size of the original image. Let uni,j denote approximations of u(nτ,ih,jh). We define the discrete approximation:

    xuni,j=uni+1,j2uni,j+uni1,jh2,yuni,j=uni,j+12uni,j+uni,j1h2,xyuni,j=uni+1,j+1+uni,juni,j+1uni+1,jh2.

    The discrete explicit scheme of the problem can be written as

    un+1i,j=uni,jτ[x(αijxuni,j|xuni,j|ϵ)+y(αijyuni,j|yuni,j|ϵ)+xy(αijxyuni,j|xyuni,j|ϵ)],αi,j=11+|Gσu0(x)|2i,j,||ϵ=||+ϵ,ϵ>0,u0i,j=u0(ih,jh),0iI,0jJ,uni,0=uni,1,un0,j=un1,j,unI,j=unI1,j,uni,J=uni,J1,uni,0=0,un0,j=0,unI,j=0,uni,J=0.

    Here the MATLAB function "conv2" is used to represent the two-dimensional discrete Convolution Transform of the matrix ui,j.

    In this section, we demonstrate the performance of our model in denoising images involving Gaussian white noise. We applied difference equations discussed in section 4 and compared the results with the results of ROF model [18] and PM model [17]. We used step size τ=0.02, gride size h=1 and λ=0.

    At the end of the denoising process, the peak signal to noise ratio (PSNR), mean absolute-deviation error (MAE) and structure similarity index measure (SSIM) values were recorded to measure the denoising performance. The values are given by the following formulas:

    PSNR(u,u0)=10 log10IJ|maxu0minu0|2uu02L2dB

    and

    MAE(u,u0)=uu0L1IJ,

    where |maxu0minu0| gives the gray-scale range of the original image, u0 and u denote, respectively, the original image and the denoised image, I×J is the dimension of image.

    SSIM, designed by Wang et al.[21], is a quality used to measure the similarity between any two images. Given any two images u and u0, SSIM is given by the formula

    SSIM(u,u0)=L(u,u0)C(u,u0)R(u,u0).

    L(u,u0)=2μuμu0+k1μ2u+μ2u0+k1, compares the two images' mean luminance μu and μu0. The maximal value of L(u,u0)=1, if μu=μu0, C(u,u0)=2σuσu0+k2σ2u+σ2u0+k2, measures the closeness of contrast of the two images u and u0. Contrast is determined in terms of standard deviation, σ. Contrast comparison measure C(u,u0)=1 maximally if and only if σu=σu0; that is, when the images have equal contrast.

    R(u,u0)=σuu0+k3σuσu0+k3, is a structure comparison measure which determines the correlation between the images u and u0, where σuu0 is covariance between u and u0. It attains maximal value of 1 if, structurally, the two images coincide, but its value is equal to zero when there is absolutely no structural coincidence. The quantities k1,k2 and k3 are small positive perturbations that avert the possibility of having zero denominators.

    Two test images of "Cameraman" and "Peppers" are corrupted by white Gaussian noise with standard deviation (SD) of 30, (Figures 1 and 2). Tables 1 and 2, present the numerical results of restoration of Cameraman image, (Figure 1), and those of the Peppers image, (Figure 2). The comparisons are based on PSNR, MAE and SSIM. The proposed method shows the best performance with respect to PSNR, MAE and SSIM.

    Figure 1.  Cameraman image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=30. (c) Our method. (d) ROF model. (e) PM model.
    Figure 2.  Peppers image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=30. (c) Our method. (d) ROF model. (e) PM model.
    Table 1.  Numerical results for Peppers image (251×251) experiment, Figure 2.
    Algorithm σ PSNR MAE SSIM
    PM model 30 27.98 7.06 0.8345
    ROF model 30 28.26 6.80 0.8359
    Our Method 30 28.66 6.44 0.8537

     | Show Table
    DownLoad: CSV
    Table 2.  Numerical results for Cameraman image (251×251) experiment, Figure 3.
    Algorithm σ PSNR MAE SSIM
    PM model 20 28.89 5.83 0.8386
    ROF model 20 28.76 5.85 0.8397
    Our Method 20 29.04 5.62 0.8450

     | Show Table
    DownLoad: CSV

    Our first example is Cameraman image, which is displayed in Figure 1a and 1b is its degraded version. Furthermore, Figure 1c, 1d and 1e, are portions of the recovered images with the proposed model, ROF model and PM model, respectively. It is clear that our method can overcome the staircase effect that caused by the second order method.

    The second example is Peppers image, which is displayed in Figure 2a, its degraded version is showed in Figure 2b. Basically, Figure 2c, 2d and 2e, are portions of the recovered images by the proposed model, ROF model and PM model, respectively. It is evident that, our method yields good results in restoring image since it avoids the staircase effect that caused by the second order method while, at the same time, handle edges in a best way.

    Similarly, the two test images are corrupted by white Gaussian noise with SD of 20, (Figures 3 and 4). Tables 3 and 4, present the numerical results of restoration of Cameraman image, (Figure 3), and those of the Peppers image, (Figure 4). The comparisons are based on PSNR, MAE and SSIM. Here again, the proposed method shows the best performance with respect to PSNR, MAE and SSIM. In Figure 3a and 3b we display Cameraman image and the noisy version. Figure 3c, 3d and 3e, are portions of the recovered images with the proposed model, ROF model and PM model, respectively. We display Peppers image and the degraded version in Figure 4a and 4b. Figure 4c, 4d and 4e, are portions of the recovered images with the proposed model, ROF model and PM model, respectively. Here also, the proposed model yields better results in denoising image while handling edges in a best way.

    Figure 3.  Cameraman image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=20. (c) Our method. (d) ROF model. (e) PM model.
    Figure 4.  Peppers image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=20. (c) Our method. (d) ROF model. (e) PM model.
    Table 3.  Numerical results for Peppers image (251×251) experiment, Figure 4.
    Algorithm σ PSNR MAE SSIM
    PM model 20 29.86 5.70 0.8727
    ROF model 20 29.90 5.64 0.8741
    Our Method 20 30.48 5.18 0.8795

     | Show Table
    DownLoad: CSV
    Table 4.  Numerical results of Barbara and Lena images.
    Image Algorithm σ PSNR MAE SSIM
    YK 30 26.08 8.62 0.7275
    LLT 30 27.10 8.11 0.7554
    Lena Ours 30 27.46 7.11 0.8078
    YK 20 27.73 6.97 0.8082
    LLT 20 29.18 6.39 0.8211
    Ours 20 29.20 5.89 0.8421
    YK 30 25.80 9.31 0.7053
    LLT 30 26.83 8.69 0.7258
    Barbara Ours 30 27.07 8.00 0.7520
    YK 20 27.13 7.98 0.7584
    LLT 20 28.28 7.29 0.7794
    Ours 20 28.46 6.79 0.7945

     | Show Table
    DownLoad: CSV

    Not surprisingly, although the edges are preserved, the staircase effect is visible for the second order models, and there are some speckles in the processed images, with an example given in Figure 2. Comparing the images processed by our model and the original images, we can observed that, the differences are insignificant. The edges are preserved and no speckles appear in the processed images.

    Finally, to illustrate the superiority of the proposed model over other related fourth-order models, we compared our results with YK model [26] and LLT model [16]. Barbara and Lena images have been corrupted by white Gaussian noise with SD of 30 (Figures 5 and 6) and SD of 20 (Figures 7 and 8). Numerical results for the images are tabulated in Table 4. Besides getting better outcomes, as evident from the results (see Figures 5 and 6), the model tackles the speckles caused by YK model at the same time.

    Figure 5.  Barbara image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=30. (c) YK model. (d) LLT model. (e) Our method.
    Figure 6.  Lena image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=30. (c) YK model. (d) LLT model. (e) Our method.
    Figure 7.  Barbara image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=20. (c) YK model. (d) LLT model. (e) Our method.
    Figure 8.  Lena image, a portion of the results achieved with different models, (251×251). (a) Original image. (b) Noisy image corrupted by Gaussian noise for σ=20. (c) YK model. (d) LLT model. (e) Our method.

    In Figures 6 and 8, the results of Lena Image have been displayed. In Figure 6, the test image Lena and its noisy version degraded by Gaussian noise with SD of 30 are shown in the sections (a) and (b), sections (c) to (e) are the results of the YK model, LLT model and the proposed one. Similarly, in Figure 8, the test image Lena and its noisy version degraded by Gaussian noise with SD of 20 are shown with the same order described above. The last image in section (e) of Figures 6 and 8 are the results of our suggested filter in which the extent of the denoising performance is noticeably better than competitor filter.

    In this article, we proposed a fourth-order image denoising model. The model was based on solving a fourth order partial differential equation by defining its corresponding functional. We proved, by use of Rothe's method, the existence and uniqueness of the entropy solution of the equation. Compared with the well known ROF and PM models, numerical results showed that our model perform better image recovery and can overcome staircase effects.

    The authors declare that they have no conflict of interests whatsoever and do approve the publication of this paper.



    [1] H. Bateman, Some recent researches on the motion of fluids, Mon. Weather Rev., 43 (1915), 163–170. https://doi.org/10.1175/1520-0493(1915)43 doi: 10.1175/1520-0493(1915)43
    [2] J. Burgers, A mathematical model illustrating the theory of turbulence, Adv. Appl. Mech., 1 (1948), 171–199. https://doi.org/10.1016/S0065-2156(08)70100-5 doi: 10.1016/S0065-2156(08)70100-5
    [3] J. D. Murray, On Burgers' model equations for turbulence, J. Fluid Mech., 59 (1973), 263–279. https://doi.org/10.1017/S0022112073001564 doi: 10.1017/S0022112073001564
    [4] N. T. Eldabe, E. M. Elghazy, A. Ebaid, Closed form solution to a second order boundary value problem and its application in fluid mechanics, Phys. Lett. A, 363 (2007), 257–259. https://doi.org/10.1016/j.physleta.2006.11.010 doi: 10.1016/j.physleta.2006.11.010
    [5] K. Fujisawa, A. Asada, Nonlinear parametric sound enhancement through different fluid layer and its application to noninvasive measurement, Measurement, 94 (2016), 726–733. https://doi.org/10.1016/j.measurement.2016.09.004 doi: 10.1016/j.measurement.2016.09.004
    [6] Y. L. Chen, T. Zhang, A weak Galerkin finite element method for Burgers' equation, Comput. Appl. Math., 348 (2019), 103–119. https://doi.org/10.1016/j.cam.2018.08.044 doi: 10.1016/j.cam.2018.08.044
    [7] M. A. Shallal, A. H. Taqi, B. F. Jumaa, H. Rezazadeh, M. Inc, Numerical solutions to the 1-D Burgers' equation by a cubic Hermite finite element method, Indian J. Phys., 96 (2022), 3831–3836. https://doi.org/10.1007/s12648-022-02304-4 doi: 10.1007/s12648-022-02304-4
    [8] Y. S. Uçar, N. Yağmurlu, İ. Çelikkaya, Operator splitting for numerical solution of the modified Burgers' equation using finite element method, Numer. Meth. Partial Differ. Equations, 35 (2019), 478–492. https://doi.org/10.1002/num.22309 doi: 10.1002/num.22309
    [9] L. Wang, H. Li, Y. Meng, Numerical solution of coupled Burgers' equation using finite difference and sinc collocation method, Eng. Lett., 29 (2021), 668–674.
    [10] J. Zhang, Q. Yang, The finite volume element method for time fractional generalized Burgers' equation, Fractal Fract., 8 (2024), 1–17. https://doi.org/10.3390/fractalfract8010053 doi: 10.3390/fractalfract8010053
    [11] K. Kaur, G. Singh, An efficient non-standard numerical scheme Coupled with a compact finite difference method to solve the one-dimensional Burgers' equation, Axioms, 12 (2023), 593–609. https://doi.org/10.3390/axioms12060593 doi: 10.3390/axioms12060593
    [12] J. Zhang, J. Yu, A Multi-Quadrics quasi-interpolation scheme for numerical solution of Burgers' equation, Appl. Numer. Math., 208 (2025), 38–44. https://doi.org/10.1016/j.apnum.2024.09.025 doi: 10.1016/j.apnum.2024.09.025
    [13] Y. Shi, X. Yang, A time two-grid difference method for nonlinear generalized viscous Burgers' equation, J. Math. Chem., 62 (2024), 1323–1356.
    [14] R. D. Ortiz, O. M. Nunez, A. M. M. Ramirez, Solving viscous Burgers' equation: Hybrid approach combining Boundary Layer theory and physics-informed neural networks, Mathematics, 12 (2024), 3430. https://doi.org/10.3390/math12213430 doi: 10.3390/math12213430
    [15] T. Mouktonglang, S. Yimnet, N. Sukantamala, B. Wongsaijai, Dynamical behaviors of the solution to a periodic initial-boundary value problem of the generalized Rosenau-RLW-Burgers equation, Math. Comput. Simul., 196 (2022), 114–136. https://doi.org/10.1016/j.matcom.2022.01.004 doi: 10.1016/j.matcom.2022.01.004
    [16] L. Li, K. W. Ong, Dynamic transitions of generalized Burgers equation, J. Math. Fluid Mech., 18 (2016), 89–102. https://doi.org/10.1007/s00021-015-0240-7 doi: 10.1007/s00021-015-0240-7
    [17] Q. Zhang, D. Yan, Z. Pan, Bifurcation from double eigenvalue for nonlinear equation with third-order nondegenerate singularity, Appl. Math. Comput., 220 (2013), 549–559. https://doi.org/10.1016/j.amc.2013.06.024 doi: 10.1016/j.amc.2013.06.024
    [18] D. Wei, S. Guo, Steady-state bifurcation of a nonlinear boundary problem, Appl. Math. Lett., 128 (2022), 107902. https://doi.org/10.1016/j.aml.2021.107902 doi: 10.1016/j.aml.2021.107902
    [19] G. Guo, X. Wang, X. Lin, M. Wei, Steady-state and Hopf bifurcations in the Langford ODE and PDE systems, Nonlinear Anal. Real World Appl., 34 (2017), 343–362. https://doi.org/10.1016/j.nonrwa.2016.09.008 doi: 10.1016/j.nonrwa.2016.09.008
    [20] Z. Pan, L. Jia, Y. Mao, Q. Wang, Transitions and bifurcations in couple stress fluid saturated porous media using a thermal non-equilibrium model, Appl. Math. Comput., 415 (2022), 126727. https://doi.org/10.1016/j.amc.2021.126727 doi: 10.1016/j.amc.2021.126727
    [21] Y. Wang, The Progress of Chemotaxis-fluid Models, Journal of Xihua University (Natural Science Edition), 35 (2016), 30–34, 38. https://doi.org/10.3969/j.issn.1673-159X.2016.04.006
    [22] J. Chen, Y. Han, Global Weak Solvability for a Chemotaxis-Fluid Model with Low Regular Initial Data, Journal of Xihua University (Natural Science Edition), 43 (2024), 97–105. https://doi.org/10.12198/j.issn.1673-159X.5354
    [23] W. Kuang, Y. Dong, Global Well-posedness of 2D Chemotaxis-fluid System, Journal of Xihua University (Natural Science Edition), 43 (2024), 103–108. https://doi.org/10.12198/j.issn.1673-159X.5233
    [24] R. Ma, L. Wei, Z. Chen, Evolution of bifurcation curves for one-dimensional Minkowski-curvature problem, Appl. Math. Lett., 103 (2020), 106176. https://doi.org/10.1016/j.aml.2019.106176 doi: 10.1016/j.aml.2019.106176
    [25] T. Sengul, B. Tiryakioglu, Dynamic transitions and bifurcations of 1D reaction-diffusion equations: The non-self-adjoint case, Math. Anal. Appl., 523 (2023), 127114. https://doi.org/10.1016/j.jmaa.2023.127114 doi: 10.1016/j.jmaa.2023.127114
    [26] Z. Feng, Y. Su, Traveling wave phenomena of inhomogeneous half-wave equation, J. Differ. Equations, 400 (2024), 248–277. https://doi.org/10.1016/j.jde.2024.04.029 doi: 10.1016/j.jde.2024.04.029
    [27] Y. Fan, L. Li, Z. Pan, Q. Wang, On dynamics of double-diffusive magneto-convection in a non-Newtonian fluid layer, Math. Methods Appl. Sci., 46 (2023), 14596–14621. https://doi.org/10.1002/mma.9337 doi: 10.1002/mma.9337
    [28] S. Li, J. Wu, H. Nie, Steady-state bifurcation and Hopf bifurcation for a diffusive Leslie–Gower predator–prey model, Comput. Math. Appl., 70 (2015), 3043–3056. https://doi.org/10.1016/j.camwa.2015.10.017 doi: 10.1016/j.camwa.2015.10.017
    [29] M. Wei, J. Wu, G. Guo, Steady state bifurcations for a glycolysis model in biochemical reaction, Nonlinear Anal. Real World Appl., 22 (2015), 155–175. https://doi.org/10.1016/j.nonrwa.2014.08.003 doi: 10.1016/j.nonrwa.2014.08.003
    [30] L. Ma, Z. Feng, Stability and bifurcation in a two-species reaction–diffusion–advection competition model with time delay, Nonlinear Anal. Real World Appl., 61 (2021), 103327. https://doi.org/10.1016/j.nonrwa.2021.103327 doi: 10.1016/j.nonrwa.2021.103327
    [31] T. Ma, S. Wang, Stability and Bifurcation of Nonlinear Evolution Equations, 1nd edition, Science Press, China, 2007.
    [32] T. Ma, S. Wang, Bifurcation theory and applications, World Sci, Singapore, 2005.
    [33] W. Cao, X. Shan, S. Tang, W. Ouyang, W. Zhang, Solving parametric high-Reynolds-number wall-bounded turbulence around airfoils governed by Reynolds-averaged Navier-Stokes equations using time-stepping-oriented neural network, Phys. Fluids, 37 (2025), 015151. https://doi.org/10.1063/5.0245918 doi: 10.1063/5.0245918
    [34] B. Tripathi, P. W. Terry, A. E. Fraser, E. G. Zweibel, M. J. Pueschel, Three-dimensional shear-flow instability saturation via stable modes, Phys. Fluids, 35 (2023), 105151. https://doi.org/10.1063/5.0167092 doi: 10.1063/5.0167092
    [35] N. Ciola, P. D. Palma, J. C. Robinet, S. Cherubini, Large-scale coherent structures in turbulent channel flow: a detuned instability of wall streaks, Fluid Mech., 997 (2024), A18. https://doi.org/10.1017/jfm.2024.726 doi: 10.1017/jfm.2024.726
    [36] J. Zhu, Y. Peng, W. Zhang, S. Niu, Y. Huang, Y. Li, et al. Research on the high-integration vortex-shape flow channel of a hydraulic servo valve based on additive manufacturing, in CSAA/IET International Conference on Aircraft Utility Systems (AUS 2024), 2024 (2025), 1700–1705. https://doi.org/10.1049/icp.2024.3137
    [37] B. Eckhardt, H. Faisst, A. Schmiegel, T. M. Schneider, Dynamical systems and the transition to turbulence in linearly stable shear flows, Phil. Trans. R. Soc. A, 366 (2008), 1297–1315. https://doi.org/10.1098/rsta.2007.2132 doi: 10.1098/rsta.2007.2132
  • This article has been cited by:

    1. Ahmed Nokrane, Nour Eddine Alaa, Fatima Aqel, Fourth-order nonlinear degenerate problem for image decomposition, 2023, 4, 2662-2963, 10.1007/s42985-023-00251-1
  • Reader Comments
  • © 2025 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(204) PDF downloads(35) Cited by(0)

Figures and Tables

Figures(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog