1550 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 (a) (b) (c) (d) (e) (f) (g) (h) (i) (j) Figure 9. Fusion results of pepsi: (a) our method, (b) Gradient, (c) DWT, (d) Curvelet, (e) NSCT and (f)-(j) are partial enlargements of (a)-(e), respectively. results with relatively lower contrast, and the results of the NSCT and especially the DWT methods have heavy r<strong>in</strong>g<strong>in</strong>g artifacts; whereas our proposed method produces a result with the highest contrast and the fewest r<strong>in</strong>g<strong>in</strong>g artifacts. Visually, the advantage of our proposed method is prom<strong>in</strong>ent. Table Ⅳ shows the fusion <strong>in</strong>dices of results by us<strong>in</strong>g the above five image fusion methods for pepsi. The result of our proposed method has the largest mutual <strong>in</strong>formation, Q AB/F , and the universal image quality <strong>in</strong>dex, except that, it has lower average gradient and spatial frequency than those of the DWT and the NSCT methods. This is because that, for pepsi, severe r<strong>in</strong>g<strong>in</strong>g artifacts <strong>in</strong> the results of the DWT (Fig. 9(h)) and the NSCT (Fig. 9(j)) may cause larger values <strong>in</strong> the average gradient and the spatial frequency. Experimental results demonstrate that, the superiority of the proposed method, <strong>in</strong> the field of visual quality and objective evaluations, is prom<strong>in</strong>ent. This ma<strong>in</strong>ly benefits from the global coupl<strong>in</strong>g characteristics of the ULPCNNs model. By us<strong>in</strong>g the features extracted from the output pulses of the ULPCNNs, the biological activity of the HVS to detailed <strong>in</strong>formation of images can be reflected very well. VI. CONCLUSION In this paper, we provide a new image fusion algorithm based on the ULPCNNs <strong>in</strong> the contourlet doma<strong>in</strong>. Directional contrast is fed <strong>in</strong>to the ULPCNNs to imitate the biological activity of HVS to directional <strong>in</strong>formation. L<strong>in</strong>k<strong>in</strong>g range is also determ<strong>in</strong>ed by the contrast, flexibly mak<strong>in</strong>g good use of global features of images. Experimental results illum<strong>in</strong>ate that, the CT- ULPCNN method outperforms the other methods <strong>in</strong> both the visual and the objective fields. ACKNOWLEDGMENT This work was supported by the Fundamental Research Funds for the Central Universities (N110323004) and the Natural Science Foundation of Hebei Prov<strong>in</strong>ce under Grant No.F2012501001. Method TABLE I. FUSION INDICES FOR PEPSI Metrics AG SF MI Q AB/F UIQI CT-ULPCNN 5.6722 13.986 6.7704 0.74015 0.89467 CT-Miao 5.5759 13.923 6.4653 0.73644 0.85769 CT-Zheng 5.4912 13.833 6.2256 0.71153 0.84454 CT-Yang 5.5684 13.933 6.4987 0.73185 0.85492 Method TABLE II. FUSION INDICES FOR REMOTE Metrics AG SF MI Q AB/F UIQI CT-ULPCNN 7.0993 15.362 1.6673 0.56055 0.69729 CT-Miao 6.6244 14.646 1.4599 0.53364 0.64608 CT-Zheng 6.6965 14.526 1.4182 0.49636 0.63166 CT-Yang 7.0883 15.037 1.1027 0.46923 0.50629 Method TABLE III. FUSION INDICES FOR CAMP Metrics AG SF MI Q AB/F UIQI CT-ULPCNN 7.2227 13.506 1.5600 0.46466 0.63175 CT-Miao 6.8137 12.747 1.3814 0.4067 0.56411 CT-Zheng 6.7682 12.529 1.3594 0.38244 0.55494 CT-Yang 7.0183 13.064 1.5026 0.38959 0.51602 TABLE IV. FUSION INDICES FOR PEPSI © 2013 ACADEMY PUBLISHER
JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1551 Method Metrics AG SF MI Q AB/F UIQI CT-ULPCNN 5.6722 13.986 6.7704 0.74015 0.89467 Gradient 4.7795 11.987 6.135 0.73947 0.88898 DWT 5.8093 14.173 6.3616 0.72958 0.86539 Curvelet 5.6215 13.977 6.5344 0.73633 0.88186 NSCT 7.7004 18.99 6.7607 0.68791 0.78435 REFERENCES [1] Y. F. Li, X. Y. Feng, and Y. Fan, “Investigation of Shift Dependency Effects on Multiresolution-Based Image Fusion Performance,” Journal of Software., vol. 6, no. 3, pp. 475–482, March 2011. [2] X. B. J<strong>in</strong>, J. Bao, and J. J. Du, “Image Enhancement Based on Selective - Ret<strong>in</strong>ex Fusion Algorithm,” Journal of Software, vol. 7, no. 6, pp. 1187–1194, June 2012. [3] M. Xu, H. Chen, and P. K. Varshney, “An image fusion approach based on Markov random fields,” IEEE Trans. Geosci. Remote Sens., vol. 49, pp. 5116–5127, December 2011. [4] W. Yao and M. Han, “Improved GIHSA for image fusion based on parameter optimization,” Int. J. Remote Sens., vol. 31, pp. 2717–2728, 2010. [5] Z. Zhang and R. S. Blum, “A categorization of multiscaledecomposition-based image fusion schems with a performance study for a digital camera application,” Proc. IEEE, vol. 87, pp. 1315–1326, August 1999. [6] S. Li, B. Yang, and J. Hu, “Performance comparison of different multi-resolution transforms for image fusion,” Inf. Fusion, vol. 12, pp. 74–84, April 2011. [7] X. Cai and G. Han, “Improved Statistical Image Fusion Method Us<strong>in</strong>g a Cont<strong>in</strong>uous-Valued Blur Factor,” Opt. Eng., vol. 51, pp. 047004-1–047004-10, 2012. [8] M. Chandana, S. Amutha, and N. Kumar, “A Hybrid Multi-focus Medical Image Fusion Based on Wavelet Transform,” Int. J. Res. Rev. Comput. Sci., vol. 2, pp. 948– 953, August 2011. [9] B. Zhang, “Study on image fusion based on different fusion rules of wavelet transform,” <strong>in</strong> 3rd Int. Conf. Adv. Comput. Theory Eng.,Proc., 2010, pp. 649–653. [10] M. N. Do and M. Vetterli, “The Contourlet Transform: An Efficient Directional Multiresolution Image Representation,” IEEE Trans. Image Process., vol. 14, pp. 2091–2106, December 2005. [11] X. Cai and W. Zhao, “Discussion upon Effects of Contourlet Lowpass Filter on Contourlet-Based Image Fusion Algorithms,” Acta Autom. S<strong>in</strong>., vol. 35, pp. 258– 266, March 2009. [12] Q. G. Miao and B. S. Wang, “A Novel Image Fusion Method Us<strong>in</strong>g Contourlet Transform,” <strong>in</strong> IEEE Int. Conf. Commun. Circuits Sys., 2006, pp. 548–552. [13] Y. A. Zheng, C. S. Zhu, J. S. Song, and X. H. Zhao, “Fusion of Multi-band SAR Images Based on Contourlet Transform.” <strong>in</strong> IEEE Int. Conf. on Inf. Acquis., 2006, pp. 420–424. [14] L. Yang, B. L. Guo, and W. Ni, “Multifocus Image Fusion Algorithm Based on Region Statistics <strong>in</strong> Contourlet Doma<strong>in</strong>,” J. Xi'an Jiaotong Univ., vol. 41, pp. 448–452, April 2007. [15] Z. B. Wang, Y. D. Ma, F. Y. Cheng, and L. Z. Yang, “Review of Pulse-Coupled Neural Networks,” Image Vis. Comput., vol. 28, pp. 5–13, January 2010. [16] X. D. Gu, “A New Approach to Image Authentication us<strong>in</strong>g Local Image Icon of Unit-l<strong>in</strong>k<strong>in</strong>g PCNN,” <strong>in</strong> IEEE Int. Conf. Neural. Netw., 2006, pp. 1036–1041. [17] S. Wei, Q. Hong, and M. S. Hou, “Automatic image segmentation based on PCNN with adaptive threshold time constant,” Neurocomput., vol. 74, pp. 1485–1491, April 2011. [18] J. C. Fu, C. C. Chen, J. W. Chai, S. T. C. Wong, and I. C. Li, “Image segmentation by EM-based adaptive pulse coupled neural networks <strong>in</strong> bra<strong>in</strong> magnetic resonance imag<strong>in</strong>g,” Comput. Med. Imag<strong>in</strong>g Graph., vol. 34, pp. 308–320, June 2010. [19] D. Agrawal and J. S<strong>in</strong>ghai, “Multifocus image fusion us<strong>in</strong>g modified pulse coupled neural network for improved image quality,” IET Image Process., vol. 4, pp. 443–451, December 2010. [20] P. J. Burt and R. J. Kolczynski, “Enhanced image capture through fusion,” <strong>in</strong> Proc. of 4 th Int. Conf. Comput. Vision, 1993, pp. 173–182. [21] F. Hassa<strong>in</strong>ia, M. I. Magana, F. Langev<strong>in</strong>, and J. P. Kernevez, “Image fusion by an orthogonal wavelet transform and comparison with other methods,” <strong>in</strong> 14 th Annu. Int. Conf. IEEE, 1992, pp. 1246–1247. [22] H. H. Li, L. Guo, and H. Liu, “Research on image fusion based on the second generation curvelet transform,” Acta Opt. S<strong>in</strong>., vol. 26, pp. 657–662, May 2006. [23] X. B. Qu, G. F. Xie, J. W. Yan, Z. Q. Zhu, and B. G. Chen, “Image fusion algorithm based on neighbors and cous<strong>in</strong>s <strong>in</strong>formation <strong>in</strong> nonsubsampled contourlet transform doma<strong>in</strong>,” <strong>in</strong> Proc. Int. Conf. Wavelet Anal. Pattern Recognit., 2007, pp. 1797−1802. [24] V. Petrovic and C. S. Xydeas, “Objective evaluation of signal-level image fusion performance,” Opt. Eng., vol. 44, pp. 087003-1–087003-8, August 2005. [25] G. Piella and H. Heijmans, “A New Quality Metric for Image Fusion,” <strong>in</strong> IEEE Int. Conf. Image Process., 2003, pp. 173−176. Xi Cai received her B.S. and Ph.D. degrees from the School of Electronic and Information Eng<strong>in</strong>eer<strong>in</strong>g, Beihang University, Ch<strong>in</strong>a, <strong>in</strong> 2005 and 2011, respectively. Now she is a teacher at Eng<strong>in</strong>eer<strong>in</strong>g Optimization and Smart Antenna Institute, Northeastern University at Q<strong>in</strong>huangdao, Ch<strong>in</strong>a. Her research <strong>in</strong>terests <strong>in</strong>clude image fusion, image registration and object detection. Guang Han received his B. Eng. and M. Eng. degrees from the School of Electronic and Information Eng<strong>in</strong>eer<strong>in</strong>g, Beihang University, Ch<strong>in</strong>a, <strong>in</strong> 2005 and 2008, respectively. Now he is a Ph.D. candidate at College of Information Science and Eng<strong>in</strong>eer<strong>in</strong>g, Northeastern University. His research <strong>in</strong>terests <strong>in</strong>clude object detection and object track<strong>in</strong>g based on video sequences. J<strong>in</strong>kuan Wang received the M.Eng. degree from Northeastern University, Shenyang, Ch<strong>in</strong>a, <strong>in</strong> 1985, and the Ph.D. degree from the University of Electro-Communications, Chofu, Japan, <strong>in</strong> 1993. In 1990, he jo<strong>in</strong>ed the Institute of Space and Astronautical Science, Sagamihara, Japan, as a special member. He was an Eng<strong>in</strong>eer with the Research Department, COSEL Company, <strong>in</strong> 1994. He is currently the President of the Northeastern University at Q<strong>in</strong>huangdao, Hebei, Ch<strong>in</strong>a, where he has been a Professor s<strong>in</strong>ce 1998. He has been a ma<strong>in</strong> researcher <strong>in</strong> several National Natural Science Foundation research projects of Ch<strong>in</strong>a. His ma<strong>in</strong> <strong>in</strong>terests are <strong>in</strong> the areas of <strong>in</strong>telligent control, adaptive array, wireless sensor networks and image process<strong>in</strong>g. © 2013 ACADEMY PUBLISHER
- Page 1 and 2:
Journal of Computers ISSN 1796-203X
- Page 3:
Corn Moisture Measurement using a C
- Page 6 and 7:
1378 JOURNAL OF COMPUTERS, VOL. 8,
- Page 8 and 9:
1380 JOURNAL OF COMPUTERS, VOL. 8,
- Page 10 and 11:
1382 JOURNAL OF COMPUTERS, VOL. 8,
- Page 12 and 13:
1384 JOURNAL OF COMPUTERS, VOL. 8,
- Page 14 and 15:
1386 JOURNAL OF COMPUTERS, VOL. 8,
- Page 16 and 17:
1388 JOURNAL OF COMPUTERS, VOL. 8,
- Page 18 and 19:
1390 JOURNAL OF COMPUTERS, VOL. 8,
- Page 20 and 21:
1392 JOURNAL OF COMPUTERS, VOL. 8,
- Page 22 and 23:
1394 JOURNAL OF COMPUTERS, VOL. 8,
- Page 24 and 25:
1396 JOURNAL OF COMPUTERS, VOL. 8,
- Page 26 and 27:
1398 JOURNAL OF COMPUTERS, VOL. 8,
- Page 28 and 29:
1400 JOURNAL OF COMPUTERS, VOL. 8,
- Page 30 and 31:
1402 JOURNAL OF COMPUTERS, VOL. 8,
- Page 32 and 33:
1404 JOURNAL OF COMPUTERS, VOL. 8,
- Page 34 and 35:
1406 JOURNAL OF COMPUTERS, VOL. 8,
- Page 36 and 37:
1408 JOURNAL OF COMPUTERS, VOL. 8,
- Page 38 and 39:
1410 JOURNAL OF COMPUTERS, VOL. 8,
- Page 40 and 41:
1412 JOURNAL OF COMPUTERS, VOL. 8,
- Page 42 and 43:
1414 JOURNAL OF COMPUTERS, VOL. 8,
- Page 44 and 45:
1416 JOURNAL OF COMPUTERS, VOL. 8,
- Page 46 and 47:
1418 JOURNAL OF COMPUTERS, VOL. 8,
- Page 48 and 49:
1420 JOURNAL OF COMPUTERS, VOL. 8,
- Page 50 and 51:
1422 JOURNAL OF COMPUTERS, VOL. 8,
- Page 52 and 53:
1424 JOURNAL OF COMPUTERS, VOL. 8,
- Page 54 and 55:
1426 JOURNAL OF COMPUTERS, VOL. 8,
- Page 56 and 57:
1428 JOURNAL OF COMPUTERS, VOL. 8,
- Page 58 and 59:
1430 JOURNAL OF COMPUTERS, VOL. 8,
- Page 60 and 61:
1432 JOURNAL OF COMPUTERS, VOL. 8,
- Page 62 and 63:
1434 JOURNAL OF COMPUTERS, VOL. 8,
- Page 64 and 65:
1436 JOURNAL OF COMPUTERS, VOL. 8,
- Page 66 and 67:
1438 JOURNAL OF COMPUTERS, VOL. 8,
- Page 68 and 69:
1440 JOURNAL OF COMPUTERS, VOL. 8,
- Page 70 and 71:
1442 JOURNAL OF COMPUTERS, VOL. 8,
- Page 72 and 73:
1444 JOURNAL OF COMPUTERS, VOL. 8,
- Page 74 and 75:
1446 JOURNAL OF COMPUTERS, VOL. 8,
- Page 76 and 77:
1448 JOURNAL OF COMPUTERS, VOL. 8,
- Page 78 and 79:
1450 JOURNAL OF COMPUTERS, VOL. 8,
- Page 80 and 81:
1452 JOURNAL OF COMPUTERS, VOL. 8,
- Page 82 and 83:
1454 JOURNAL OF COMPUTERS, VOL. 8,
- Page 84 and 85:
1456 JOURNAL OF COMPUTERS, VOL. 8,
- Page 86 and 87:
1458 JOURNAL OF COMPUTERS, VOL. 8,
- Page 88 and 89:
1460 JOURNAL OF COMPUTERS, VOL. 8,
- Page 90 and 91:
1462 JOURNAL OF COMPUTERS, VOL. 8,
- Page 92 and 93:
1464 JOURNAL OF COMPUTERS, VOL. 8,
- Page 94 and 95:
1466 JOURNAL OF COMPUTERS, VOL. 8,
- Page 96 and 97:
1468 JOURNAL OF COMPUTERS, VOL. 8,
- Page 98 and 99:
1470 JOURNAL OF COMPUTERS, VOL. 8,
- Page 100 and 101:
1472 JOURNAL OF COMPUTERS, VOL. 8,
- Page 102 and 103:
1474 JOURNAL OF COMPUTERS, VOL. 8,
- Page 104 and 105:
1476 JOURNAL OF COMPUTERS, VOL. 8,
- Page 106 and 107:
1478 JOURNAL OF COMPUTERS, VOL. 8,
- Page 108 and 109:
1480 JOURNAL OF COMPUTERS, VOL. 8,
- Page 110 and 111:
1482 JOURNAL OF COMPUTERS, VOL. 8,
- Page 112 and 113:
1484 JOURNAL OF COMPUTERS, VOL. 8,
- Page 114 and 115:
1486 JOURNAL OF COMPUTERS, VOL. 8,
- Page 116 and 117:
1488 JOURNAL OF COMPUTERS, VOL. 8,
- Page 118 and 119:
1490 JOURNAL OF COMPUTERS, VOL. 8,
- Page 120 and 121:
1492 JOURNAL OF COMPUTERS, VOL. 8,
- Page 122 and 123:
1494 JOURNAL OF COMPUTERS, VOL. 8,
- Page 124 and 125:
1496 JOURNAL OF COMPUTERS, VOL. 8,
- Page 126 and 127:
1498 JOURNAL OF COMPUTERS, VOL. 8,
- Page 128 and 129: 1500 JOURNAL OF COMPUTERS, VOL. 8,
- Page 130 and 131: 1502 JOURNAL OF COMPUTERS, VOL. 8,
- Page 132 and 133: 1504 JOURNAL OF COMPUTERS, VOL. 8,
- Page 134 and 135: 1506 JOURNAL OF COMPUTERS, VOL. 8,
- Page 136 and 137: 1508 JOURNAL OF COMPUTERS, VOL. 8,
- Page 138 and 139: 1510 JOURNAL OF COMPUTERS, VOL. 8,
- Page 140 and 141: 1512 JOURNAL OF COMPUTERS, VOL. 8,
- Page 142 and 143: 1514 JOURNAL OF COMPUTERS, VOL. 8,
- Page 144 and 145: 1516 JOURNAL OF COMPUTERS, VOL. 8,
- Page 146 and 147: 1518 JOURNAL OF COMPUTERS, VOL. 8,
- Page 148 and 149: 1520 JOURNAL OF COMPUTERS, VOL. 8,
- Page 150 and 151: 1522 JOURNAL OF COMPUTERS, VOL. 8,
- Page 152 and 153: 1524 JOURNAL OF COMPUTERS, VOL. 8,
- Page 154 and 155: 1526 JOURNAL OF COMPUTERS, VOL. 8,
- Page 156 and 157: 1528 JOURNAL OF COMPUTERS, VOL. 8,
- Page 158 and 159: 1530 JOURNAL OF COMPUTERS, VOL. 8,
- Page 160 and 161: 1532 JOURNAL OF COMPUTERS, VOL. 8,
- Page 162 and 163: 1534 JOURNAL OF COMPUTERS, VOL. 8,
- Page 164 and 165: 1536 JOURNAL OF COMPUTERS, VOL. 8,
- Page 166 and 167: 1538 JOURNAL OF COMPUTERS, VOL. 8,
- Page 168 and 169: 1540 JOURNAL OF COMPUTERS, VOL. 8,
- Page 170 and 171: 1542 JOURNAL OF COMPUTERS, VOL. 8,
- Page 172 and 173: 1544 JOURNAL OF COMPUTERS, VOL. 8,
- Page 174 and 175: 1546 JOURNAL OF COMPUTERS, VOL. 8,
- Page 176 and 177: 1548 JOURNAL OF COMPUTERS, VOL. 8,
- Page 180 and 181: 1552 JOURNAL OF COMPUTERS, VOL. 8,
- Page 182 and 183: 1554 JOURNAL OF COMPUTERS, VOL. 8,
- Page 184 and 185: 1556 JOURNAL OF COMPUTERS, VOL. 8,
- Page 186 and 187: 1558 JOURNAL OF COMPUTERS, VOL. 8,
- Page 188 and 189: 1560 JOURNAL OF COMPUTERS, VOL. 8,
- Page 190 and 191: 1562 JOURNAL OF COMPUTERS, VOL. 8,
- Page 192 and 193: 1564 JOURNAL OF COMPUTERS, VOL. 8,
- Page 194 and 195: 1566 JOURNAL OF COMPUTERS, VOL. 8,
- Page 196 and 197: 1568 JOURNAL OF COMPUTERS, VOL. 8,
- Page 198 and 199: 1570 JOURNAL OF COMPUTERS, VOL. 8,
- Page 200 and 201: 1572 JOURNAL OF COMPUTERS, VOL. 8,
- Page 202 and 203: 1574 JOURNAL OF COMPUTERS, VOL. 8,
- Page 204 and 205: 1576 JOURNAL OF COMPUTERS, VOL. 8,
- Page 206 and 207: 1578 JOURNAL OF COMPUTERS, VOL. 8,
- Page 208 and 209: 1580 JOURNAL OF COMPUTERS, VOL. 8,
- Page 210 and 211: 1582 JOURNAL OF COMPUTERS, VOL. 8,
- Page 212 and 213: 1584 JOURNAL OF COMPUTERS, VOL. 8,
- Page 214 and 215: 1586 JOURNAL OF COMPUTERS, VOL. 8,
- Page 216 and 217: 1588 JOURNAL OF COMPUTERS, VOL. 8,
- Page 218 and 219: 1590 JOURNAL OF COMPUTERS, VOL. 8,
- Page 220 and 221: 1592 JOURNAL OF COMPUTERS, VOL. 8,
- Page 222 and 223: 1594 JOURNAL OF COMPUTERS, VOL. 8,
- Page 224 and 225: 1596 JOURNAL OF COMPUTERS, VOL. 8,
- Page 226 and 227: 1598 JOURNAL OF COMPUTERS, VOL. 8,
- Page 228 and 229:
1600 JOURNAL OF COMPUTERS, VOL. 8,
- Page 230 and 231:
1602 JOURNAL OF COMPUTERS, VOL. 8,
- Page 232 and 233:
1604 JOURNAL OF COMPUTERS, VOL. 8,
- Page 234 and 235:
1606 JOURNAL OF COMPUTERS, VOL. 8,
- Page 236 and 237:
1608 JOURNAL OF COMPUTERS, VOL. 8,
- Page 238 and 239:
1610 JOURNAL OF COMPUTERS, VOL. 8,
- Page 240 and 241:
1612 JOURNAL OF COMPUTERS, VOL. 8,
- Page 242 and 243:
1614 JOURNAL OF COMPUTERS, VOL. 8,
- Page 244 and 245:
1616 JOURNAL OF COMPUTERS, VOL. 8,
- Page 246 and 247:
1618 JOURNAL OF COMPUTERS, VOL. 8,
- Page 248 and 249:
1620 JOURNAL OF COMPUTERS, VOL. 8,
- Page 250 and 251:
1622 JOURNAL OF COMPUTERS, VOL. 8,
- Page 252 and 253:
1624 JOURNAL OF COMPUTERS, VOL. 8,
- Page 254 and 255:
1626 JOURNAL OF COMPUTERS, VOL. 8,
- Page 256 and 257:
1628 JOURNAL OF COMPUTERS, VOL. 8,
- Page 258 and 259:
1630 JOURNAL OF COMPUTERS, VOL. 8,
- Page 261:
Call for Papers and Special Issues
- Page 264:
(Contents Continued from Back Cover