{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:52:05Z","timestamp":1725486725460},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540412229"},{"type":"electronic","value":"9783540409533"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-40953-x_6","type":"book-chapter","created":{"date-parts":[[2007,6,18]],"date-time":"2007-06-18T09:35:56Z","timestamp":1182159356000},"page":"58-68","source":"Crossref","is-referenced-by-count":0,"title":["Compound Regulated Morphological Operations and Their Application to the Analysis of Line-Drawings"],"prefix":"10.1007","author":[{"given":"Gady","family":"Agam","sequence":"first","affiliation":[]},{"given":"Its\u2019hak","family":"Dinstein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,4,6]]},"reference":[{"key":"6_CR1","unstructured":"C. Ronse,\u201cFourier analysis, mathematical morphology, and vision \u201d,Technical Report WD54,Philips Research Laboratory, Brussels, Belgium,1989. 59"},{"issue":"3","key":"6_CR2","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/1047-3203(92)90024-N","volume":"3","author":"D. Sinha","year":"1992","unstructured":"D. Sinha and E. R. Dougherty,\u201cFuzzy mathematical morphology \u201d, J. of Visual Communications and Image Representation Vol. 3, No. 3, pp.286\u2013302,1992. 59","journal-title":"J. of Visual Communications and Image Representation"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/BF01530944","volume":"10","author":"J. Bloch","year":"1994","unstructured":"J. Bloch and H. Maitre,\u201cFuzzy mathematical morphology \u201d,Annals of Mathematics and Artificial Intelligence Vol. 10, pp.55\u201384, 1994. 59","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/BF01248374","volume":"5","author":"P. Kuosmanen","year":"1995","unstructured":"P. Kuosmanen and J. Astola,\u201cSoft morphological filtering \u201d, J. of Mathematical imaging and Vision Vol. 5, pp. 231\u2013262, 1995. 59","journal-title":"J. of Mathematical imaging and Vision"},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1109\/78.348137","volume":"43","author":"F. Y. Shih","year":"1995","unstructured":"F. Y. Shih and C. C. Pu,\u201cAnalysis of the properties of soft morphological filtering using threshold de omposition \u201d,IEEE Trans. on Signal Processing Vol. 43, No.2, pp.539\u2013544, 1995. 59","journal-title":"IEEE Trans. on Signal Processing"},{"key":"6_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1007\/3-540-61577-6_7","volume-title":"Advances in Structural and Syntactical Pattern Recognition","author":"G. Agam","year":"1996","unstructured":"G. Agam and I. Dinstein,\u201cGeneralized morphological operators applied to mapanalysis \u201d, in Advances in Structural and Syntactical Pattern Recognition P. Perner, P. Wang, A. Rosenfeld eds.,LNCS Vol. 1121, pp.60\u201369, 1996. 59"},{"issue":"11","key":"6_CR7","doi-asserted-by":"crossref","first-page":"1142","DOI":"10.1109\/34.544086","volume":"18","author":"M. A. Zmuda","year":"1996","unstructured":"M. A. Zmuda and L. A. Tamburino,\u201cEffiient algorithms for the soft morphological operators \u201d, IEEE Trans. PAMI Vol. 18, No.11, pp.1142\u20131147, 1996. 59","journal-title":"IEEE Trans. PAMI"},{"issue":"6","key":"6_CR8","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1016\/S0031-3203(98)00120-4","volume":"32","author":"G. Agam","year":"1999","unstructured":"G. Agam and I. Dinstein,\u201cRegulated morphological operations \u201d,Pattern Recog-nition Vol. 32, No.6, pp.947\u2013971, May, 1999. 59","journal-title":"Pattern Recog-nition"},{"key":"6_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/3-540-61226-2_9","volume-title":"Graphics Recognition: Methods and Applications","author":"G. Agam","year":"1996","unstructured":"G. Agam, H. Luo, and I. Dinstein,\u201cMorphological approach for dashed lines detection \u201d, in Graphics Recognition: Methods and Applications R. Kasturi, K. Tombre eds.,LNCS Vol.1072, pp.92\u2013105, 1996. 59"},{"key":"6_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/3-540-64381-8_36","volume-title":"Graphics Recognition: Algorithms and Systems","author":"G. Agam","year":"1998","unstructured":"G. Agam and I. Dinstein,\u201cDirectional decomposition of line-drawing images based on regulated morphological operations \u201d, in Graphics Recognition: Algorithms and Systems K. Tombre and A. K. Chhabra eds.,LNCS Vol.1389, pp.21\u201334, 1998. 59,64"},{"key":"6_CR11","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1109\/TPAMI.1987.4767941","volume":"9","author":"R. M. Haralick","year":"1987","unstructured":"R. M. Haralick, S. R. Sternberg, and X. Zhuang,\u201cImage analysis using mathematical morphology \u201d, IEEE Trans. PAMI Vol. 9, No.4, pp.532\u2013550, 1987. 60","journal-title":"IEEE Trans. PAMI"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"G. Agam and I. Dinstein,\u201cEffient implementation of regulated morphological operations based on directional interval coding \u201d, in Proc. SSPR\u201998 Sydney, Australia,1998. 64","DOI":"10.1007\/BFb0033259"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"C. Ronse,\u201cWhy mathematical morphology needs omplete lattices \u201d, Signal Pro-cessing Vol.21, No.2, pp.129\u2013154, 1990. 66","DOI":"10.1016\/0165-1684(90)90046-2"},{"key":"6_CR14","unstructured":"J. Serra, Image Analysis and Mathematical Morphology Academi Press, 1982. 67"}],"container-title":["Lecture Notes in Computer Science","Graphics Recognition Recent Advances"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-40953-X_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T03:55:15Z","timestamp":1556510115000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-40953-X_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540412229","9783540409533"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-40953-x_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}