{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:54:54Z","timestamp":1742918094635,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319018539"},{"type":"electronic","value":"9783319018546"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01854-6_20","type":"book-chapter","created":{"date-parts":[[2013,8,8]],"date-time":"2013-08-08T06:47:25Z","timestamp":1375944445000},"page":"191-200","source":"Crossref","is-referenced-by-count":2,"title":["Enhanced Image Segmentation Using Quality Threshold Clustering for Surface Defect Categorisation in High Precision Automotive Castings"],"prefix":"10.1007","author":[{"given":"Iker","family":"Pastor-L\u00f3pez","sequence":"first","affiliation":[]},{"given":"Igor","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"de-la-Pe\u00f1a-Sordo","sequence":"additional","affiliation":[]},{"given":"Iv\u00e1n","family":"Garc\u00eda-Ferreira","sequence":"additional","affiliation":[]},{"given":"Asier G.","family":"Zabala","sequence":"additional","affiliation":[]},{"given":"Pablo Garc\u00eda","family":"Bringas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"20_CR1","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1108\/09576069810238709","volume":"9","author":"A. Mital","year":"1998","unstructured":"Mital, A., Govindaraju, M., Subramani, B.: A comparison between manual and hybrid methods in parts inspection. Integrated Manufacturing Systems\u00a09(6), 344\u2013349 (1998)","journal-title":"Integrated Manufacturing Systems"},{"key":"20_CR2","unstructured":"Watts, K.P.: The effect of visual search strategy and overlays on visual inspection of castings. Master\u2019s thesis, Iowa State University (2011)"},{"issue":"8","key":"20_CR3","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1016\/S0963-8695(03)00081-1","volume":"36","author":"F. Pernkopf","year":"2003","unstructured":"Pernkopf, F., O\u2019Leary, P.: Image acquisition techniques for automatic visual inspection of metallic surfaces. NDT & E International\u00a036(8), 609\u2013617 (2003)","journal-title":"NDT & E International"},{"issue":"3641","key":"20_CR4","first-page":"24","volume":"180","author":"D. vom Stein","year":"2007","unstructured":"vom Stein, D.: Automatic visual 3-d inspection of castings. Foundry Trade Journal\u00a0180(3641), 24\u201327 (2007)","journal-title":"Foundry Trade Journal"},{"key":"20_CR5","unstructured":"Castleman, K.: 2nd edn. Prentice-Hall, Englewood Clliffs, New Jersey (1996)"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Pastor-Lopez, I., Santos, I., Santamaria-Ibirika, A., Salazar, M., de-la Pena-Sordo, J., Bringas, P.: Machine-learning-based surface defect detection and categorisation in high-precision foundry. In: 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 1359\u20131364 (2012)","DOI":"10.1109\/ICIEA.2012.6360934"},{"issue":"11","key":"20_CR7","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1101\/gr.9.11.1106","volume":"9","author":"L.J. Heyer","year":"1999","unstructured":"Heyer, L.J., Kruglyak, S., Yooseph, S.: Exploring expression data: identification and analysis of coexpressed genes. Genome Research\u00a09(11), 1106\u20131115 (1999)","journal-title":"Genome Research"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Ugarte-Pedrero, X., Santos, I., Bringas, P., Gastesi, M., Esparza, J.: Semi-supervised learning for packed executable detection. In: Proceedings of the 5th International Conference on Network and System Security (NSS), pp. 342\u2013346 (2011)","DOI":"10.1109\/ICNSS.2011.6060027"},{"key":"20_CR9","volume-title":"Digital image processing","author":"R. Gonzalez","year":"1992","unstructured":"Gonzalez, R., Woods, R.: Digital image processing, vol.\u00a016(716). Addison-Wesley, Reading (1992)"},{"issue":"2","key":"20_CR10","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"P. Viola","year":"2004","unstructured":"Viola, P., Jones, M.: Robust real-time face detection. International Journal of Computer Vision\u00a057(2), 137\u2013154 (2004)","journal-title":"International Journal of Computer Vision"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Bishop, C.M.: Neural Networks for Pattern Recognition. Oxford University Press (1995)","DOI":"10.1201\/9781420050646.ptb6"},{"issue":"3","key":"20_CR12","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"N. Chawla","year":"2002","unstructured":"Chawla, N., Bowyer, K., Hall, L., Kegelmeyer, W.: SMOTE: synthetic minority over-sampling technique. Journal of Artificial Intelligence Research\u00a016(3), 321\u2013357 (2002)","journal-title":"Journal of Artificial Intelligence Research"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Cooper, G.F., Herskovits, E.: A bayesian method for constructing bayesian belief networks from databases. In: Proceedings of the 1991 Conference on Uncertainty in Artificial Intelligence (1991)","DOI":"10.1016\/B978-1-55860-203-8.50015-2"},{"key":"20_CR14","unstructured":"Geiger, D., Goldszmidt, M., Provan, G., Langley, P., Smyth, P.: Bayesian network classifiers. Machine Learning, 131\u2013163 (1997)"},{"issue":"6","key":"20_CR15","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1016\/S0893-6080(99)00032-5","volume":"12","author":"S. Amari","year":"1999","unstructured":"Amari, S., Wu, S.: Improving support vector machine classifiers by modifying kernel functions. Neural Networks\u00a012(6), 783\u2013789 (1999)","journal-title":"Neural Networks"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Maji, S., Berg, A., Malik, J.: Classification using intersection kernel support vector machines is efficient. In: Proc. CVPR, vol.\u00a01, p. 4 (2008)","DOI":"10.1109\/CVPR.2008.4587630"},{"issue":"1-2","key":"20_CR17","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.aca.2007.03.023","volume":"595","author":"B. \u00dcst\u00fcn","year":"2007","unstructured":"\u00dcst\u00fcn, B., Melssen, W., Buydens, L.: Visualisation and interpretation of support vector regression models. Analytica Chimica Acta\u00a0595(1-2), 299\u2013309 (2007)","journal-title":"Analytica Chimica Acta"},{"issue":"2","key":"20_CR18","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TITB.2007.902300","volume":"12","author":"B. Cho","year":"2008","unstructured":"Cho, B., Yu, H., Lee, J., Chee, Y., Kim, I., Kim, S.: Nonlinear support vector machine visualization for risk factor analysis using nomograms and localized radial basis function kernels. IEEE Transactions on Information Technology in Biomedicine\u00a012(2), 247 (2008)","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"20_CR19","unstructured":"Garner, S.: Weka: The Waikato environment for knowledge analysis. In: Proceedings of the 1995 New Zealand Computer Science Research Students Conference, pp. 57\u201364 (1995)"},{"key":"20_CR20","unstructured":"Quinlan, J.: C4. 5 programs for machine learning. Morgan Kaufmann Publishers (1993)"},{"issue":"1","key":"20_CR21","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L. Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Machine learning\u00a045(1), 5\u201332 (2001)","journal-title":"Machine learning"},{"issue":"2","key":"20_CR22","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1504\/IJCAT.2009.026595","volume":"35","author":"Y. Singh","year":"2009","unstructured":"Singh, Y., Kaur, A., Malhotra, R.: Comparative analysis of regression and machine learning methods for predicting fault proneness models. International Journal of Computer Applications in Technology\u00a035(2), 183\u2013193 (2009)","journal-title":"International Journal of Computer Applications in Technology"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01854-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T15:08:23Z","timestamp":1676819303000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01854-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319018539","9783319018546"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01854-6_20","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}