{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:23:31Z","timestamp":1730237011862,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,3]]},"DOI":"10.1109\/iccta.2007.48","type":"proceedings-article","created":{"date-parts":[[2007,4,19]],"date-time":"2007-04-19T16:38:58Z","timestamp":1177000738000},"page":"552-562","source":"Crossref","is-referenced-by-count":7,"title":["Development of an Extension of the Otsu Algorithm for Multidimensional Image Segmentation of Thin-Film Blood Slides"],"prefix":"10.1109","author":[{"given":"Bernard F.","family":"Buxton","sequence":"first","affiliation":[]},{"given":"Houari","family":"Abdallahi","sequence":"additional","affiliation":[]},{"given":"Delmiro","family":"Fernandez-Reyes","sequence":"additional","affiliation":[]},{"given":"William","family":"Jarra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Machine Vision","year":"1995","author":"jain","key":"19"},{"key":"17","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1117\/12.467205","article-title":"Analysis of blood and bone marrow smears using digital image processing techniques","volume":"4684","author":"hengen","year":"2002","journal-title":"Proceedings of SPIE"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.5244\/C.12.31"},{"journal-title":"Fundamentals of Digital Image Processing","year":"1989","author":"jain","key":"18"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.mimet.2006.05.017"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/34.917579"},{"key":"33","first-page":"739","article-title":"Morphological image processing for evaluating malaria disease","author":"ruberto","year":"2001","journal-title":"IWVF"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010920819831"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(01)00092-0"},{"journal-title":"Computer Vision A Modern Approach","year":"2003","author":"forsyth","key":"13"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTA.2007.129"},{"journal-title":"Digital Image Processing","year":"1992","author":"gonzalez","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.1938.tb02189.x"},{"article-title":"Differential evolution: A simple and efficient adaptive scheme for global optimization over continuous spaces","year":"1995","author":"storn","key":"37"},{"year":"0","key":"12"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.5244\/C.20.36"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011818912717"},{"journal-title":"Principal Component Analysis","year":"2002","author":"jolliffe","key":"20"},{"key":"43","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/978-3-540-39930-8_7","article-title":"Soma - self organizing migrating algorithm","author":"zelinka","year":"2004","journal-title":"New Optimization Techniques in Engineering"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.10.003"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2004.828354"},{"journal-title":"Introductory Techniques for 3-D Computer Vision","year":"1998","author":"trueco","key":"40"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTA.2007.105"},{"key":"22","first-page":"60","article-title":"Feature selection and extraction","author":"kittler","year":"1986","journal-title":"Handbook of Pattern Recognition and Image Processing"},{"key":"23","article-title":"Multiple classifier systems","volume":"1857","author":"kittler","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"24","first-page":"257","article-title":"Model-based object tracking in monocular image sequences of road traffic scenes","author":"koller","year":"1993","journal-title":"International Journal of Computer Vision"},{"key":"25","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/3-540-48219-9_7","article-title":"Genetic programming for improved receiver operating characteristics","volume":"2096","author":"langdon","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2003.08.010"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1979.4310076"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/34.683777"},{"journal-title":"Digital Image Processing","year":"1991","author":"pratt","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/34.927467"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"2"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0055685","article-title":"Comprehensive colour image normalisation","author":"finlayson","year":"1998","journal-title":"Lecture Notes in Computer Science"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIAP.2003.1234110"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1117\/1.1637364"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/s11517-006-0044-2"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(02)00004-5"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(02)00055-0"},{"key":"32","first-page":"401","article-title":"Segmentation of blood images using morphological operators","author":"ruberto","year":"2000","journal-title":"ICPR"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.5244\/C.9.53"},{"key":"31","first-page":"445","article-title":"Automatic thresholding of infected blood images using granulometry and regional extrema","author":"ruberto","year":"2000","journal-title":"ICPR"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.5244\/C.9.13"},{"year":"0","key":"8"}],"event":{"name":"2007 International Conference on Computing Theory and Applications","start":{"date-parts":[[2007,3,5]]},"location":"Kolkata","end":{"date-parts":[[2007,3,7]]}},"container-title":["2007 International Conference on Computing: Theory and Applications (ICCTA'07)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4127325\/4127326\/04127429.pdf?arnumber=4127429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,20]],"date-time":"2018-12-20T19:17:09Z","timestamp":1545333429000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4127429\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/iccta.2007.48","relation":{},"subject":[],"published":{"date-parts":[[2007,3]]}}}