期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
非饱和入渗方程三大变换的联解计算
1
作者 朱悦璐 肖紫俊 曾杨 《中国农村水利水电》 北大核心 2025年第6期68-72,共5页
针对传统非饱和入渗理论中,扩散系数D(θ)测定装置复杂、实验次数多、普适性差的现状,研究在第一类入渗边界条件下,通过Laplace变换计算t时刻湿润锋位置,联解Boltzmann变换和变分变换,反解出湿润锋内扩散系数、含水率、入渗距离之间的... 针对传统非饱和入渗理论中,扩散系数D(θ)测定装置复杂、实验次数多、普适性差的现状,研究在第一类入渗边界条件下,通过Laplace变换计算t时刻湿润锋位置,联解Boltzmann变换和变分变换,反解出湿润锋内扩散系数、含水率、入渗距离之间的显式表达式。计算结果表明,当Laplace变换路径假设扩散系数为常数时,Boltzmann变换路径扩散系数与距离具有二次函数关系,扩散系数与含水率具有三次函数关系;变分变换路径扩散系数与距离具有一次函数关系;所有回归方程均通过L2范数残差检验,结果真实有效;扩散系数实测值与本文理论值对比验证结果表明,水平土柱实验求得的扩散系数实测值与Boltzmann变换路径计算的扩散系数理论值最大相对误差为8.2%,扩散系数实测值与变分变换路径计算的扩散系数理论值最大相对误差为7.7%,均小于10%,满足工程要求。所提出的联解计算方案,仅取决于经典变换本身的数学背景和路径联系,不增加额外假设,无外业实验,可为非饱和入渗参数计算提供一种新的参考。 展开更多
关键词 非饱和扩散系数 LAPLACE变换 Boltzmann变换 变分变换 解析解
在线阅读 下载PDF
Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain 被引量:1
2
作者 Ramadan Noha Ahmed HossamEldin H +1 位作者 El-khamy Said E Abd El-Samie Fathi E 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第9期2049-2057,共9页
A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomizat... A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks. 展开更多
关键词 Backer map chaotic encryption fractional Fourier transform (FRFT) modified Logistic map
在线阅读 下载PDF
A new image watermarking framework based on levels-directions decomposition in contourlet representation
3
作者 M.F.Kazemi M.A.Pourmina A.H.Mazinan 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第3期521-532,共12页
With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its u... With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its utilities in a number of academic and real environments.There are a wide range of solutions to provide image watermarking frameworks,while each one of them is attempted to address an efficient and applicable idea.In reality,the traditional techniques do not have sufficient merit to realize an accurate application.Due to the fact that the main idea behind the approach is organized based on contourlet representation,the only state-of-the-art materials that are investigated along with an integration of the aforementioned contourlet representation in line with watermarking framework are concentrated to be able to propose the novel and skilled technique.In a word,the main process of the proposed robust watermarking framework is organized to deal with both new embedding and de-embedding processes in the area of contourlet transform to generate watermarked image and the corresponding extracted logo image with high accuracy.In fact,the motivation of the approach is that the suggested complexity can be of novelty,which consists of the contourlet representation,the embedding and the corresponding de-embedding modules and the performance monitoring including an analysis of the watermarked image as well as the extracted logo image.There is also a scrambling module that is working in association with levels-directions decomposition in contourlet embedding mechanism,while a decision maker system is designed to deal with the appropriate number of sub-bands to be embedded in the presence of a series of simulated attacks.The required performance is tangibly considered through an integration of the peak signal-to-noise ratio and the structural similarity indices that are related to watermarked image.And the bit error rate and the normal correlation are considered that are related to the extracted logo analysis,as well.Subsequently,the outcomes are fully analyzed to be competitive with respect to the potential techniques in the image colour models including hue or tint in terms of their shade,saturation or amount of gray and their brightness via value or luminance and also hue,saturation and intensity representations,as long as the performance of the whole of channels are concentrated to be presented.The performance monitoring outcomes indicate that the proposed framework is of significance to be verified. 展开更多
关键词 contourlet based watermarking framework levels-directions decomposition embedding process de-embedding process peak signal-to-noise ratio structural similarity indices normal correlation bit error rate
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部