In order to objectively and accurately evaluate the image fusion algorithms, an evaluation algorithm based on TV-L1 (Total Variation regularization) structure and texture decomposition was proposed. According to the studies on human visual system, human's perception to image quality mainly comes from the underlying visual features of image, and structure features and texture features are the most important features of underlying visual feature of image. However, the existed image fusion quality evaluation algorithms ignore this fact and lead to inaccurate evaluation. To address this problem, a pair of source images and their corresponding fusion results were individually decomposed into structure and texture images with a two-level TV-L1 decomposition. Then, According to the difference of image features between the structure and texture images, the similarity evaluation was carried out from the decomposed structure image and the texture image respectively, and the final evaluation score was obtained by integrating the scores at all levels. Based on the dataset with 30 images and 8 mainstream fusion algorithms, compared with the 11 existing objective evaluation indexes, the Borda counting method and Kendall coefficient were employed to verify the consistency of the proposed evaluation algorithm. Moreover, the consistency between the proposed objective evaluation index and the subjective evaluation is verified on the subjective evaluation image set.
Network vulnerability assessment which intends to safety situation analysis and establishment of defensive measures before attack is a kind of active defense technology, but the traditional quantitative analysis models cannot show the dynamic interactive relationship between entities, and most of them cannot get global results for risk diffusion. With reference to the influence of social network in the process of communication, a new network vulnerability diffusion analysis method based on cumulative effect was proposed. The defined vulnerability diffusion analysis model described subject relation structure in a more detailed level, and the algorithm proposed by using the accumulation characteristics in attack effects described vulnerability diffusion rule more accurately to ensure better influence range. At last, the model and algorithm were verified by a typical example, the horizontal comparison analysis on some aspects such as simplicity of the model description, accuracy of the analysis results, rationality of the safety recommendations were given. The results show that the method has an advantage in visual assessment results and the formulation of the cost minimum security measures.
A method to analyze the grasping and pattern force of Electromyography (EMG) simultaneously was proposed, in order to solve the problem that most myoelectric survey focused only on pattern recognition regardless of the combination of grasping pattern and force. First, surface EMG signals were collected through 4 EMG electrodes. Force data was obtained by Force Sensor Resistor (FSR). Then, the Linear Discriminant Analysis (LDA) method was used to realize pattern recognition and Artificial Neural Networks (ANN) was applied to estimate force. 4 types of EMG-force relationship were built in 4 different grasping modes. Once the grasping pattern identified, the program called the corresponding force model to estimate force value and achieved the combination force decoding and pattern recognition. The experimental results illustrate that when pattern and force are analyzed simultaneously, the average classification accuracy is about 77.8%; meanwhile the force prediction accuracy rate is about 90%. The proposed method can be applied to myoelectric control of the prosthetic hand, not only the user's intension of grasping mode can be decoded, but also the desired force can also be estimated. The stable grasping can be assisted by this approach.
A kind of Energy-efficient Scheduling Algorithm under the Constraint of Reliability (ESACR) for the random tasks in multiprocessor system was proposed. It would choose the processor which might consume the least energy when the task's deadline could be guaranteed. For the signal processor, Earliest Deadline First (EDF) strategy was used to schedule the tasks and all the tasks were made execute in the same voltage/frequency. When the new task could not match the deadline, the non-execution voltage/frequency of former tasks would be raised. At the same time, the recovery time was reserved for the executing task in order to promise that the task could be rescheduled when errors happened. The simulation shows that the ESACR can provide the better energy efficiency with the guarantee of system reliability , compared to Highest Voltage Energy-Aware (HVEA), Minimum Energy Minimum Completion time (ME-MC) and Earliest Finish First (EFF).
Network Performance Testing is an important component in network testing. A distributed test model integrated with centralized control was introduced. The test goal, test method, architecture and working mechanism for the model were discussed thoroughly and the system design and implementation were developed based on them. The final experiment results show that the system is scalable and is suitable for network performance measurement.