{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:26:30Z","timestamp":1743071190950,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243689"},{"type":"electronic","value":"9783319243696"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24369-6_19","type":"book-chapter","created":{"date-parts":[[2015,9,10]],"date-time":"2015-09-10T18:46:37Z","timestamp":1441910797000},"page":"231-243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Geometrical Approach to Rejecting Option in Pattern Recognition Problem"],"prefix":"10.1007","author":[{"given":"Jakub","family":"Ciecierski","sequence":"first","affiliation":[]},{"given":"Bartomiej","family":"Dybisz","sequence":"additional","affiliation":[]},{"given":"Agnieszka","family":"Jastrzebska","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Pedrycz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,30]]},"reference":[{"issue":"16","key":"19_CR1","doi-asserted-by":"publisher","first-page":"2005","DOI":"10.1016\/j.patrec.2006.06.002","volume":"27","author":"R Bertolami","year":"2006","unstructured":"Bertolami, R., Zimmermann, M., Bunke, H.: Rejection strategies for offline handwritten text line recognition. Pattern Recognition Letters 27(16), 2005\u20132012 (2006)","journal-title":"Pattern Recognition Letters"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1162\/neco.1993.5.3.367","volume":"5","author":"J Bromley","year":"1993","unstructured":"Bromley, J., Denker, J.S.: Improving rejection performance on handwritten digits by training with rubbish. Neural Computing 5, 367\u2013370 (1993)","journal-title":"Neural Computing"},{"issue":"1","key":"19_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TIT.1970.1054406","volume":"16","author":"C Chow","year":"1970","unstructured":"Chow, C.: On optimum recognition error and reject tradeoff. IEEE Transactions on Information Theory 16(1), 41\u201346 (1970)","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45129-3_47","volume-title":"Visual Form 2001","author":"M Elad","year":"2001","unstructured":"Elad, M., Hel-Or, Y., Keshet, R.: Pattern detection using a maximal rejection classifier. In: Arcelli, C., Cordella, L.P., Sanniti di Baja, G. (eds.) IWVF 2001. LNCS, vol. 2059, pp. 514\u2013524. Springer, Heidelberg (2001)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Homenda, W.: Optical music recognition: the case study of pattern recognition. In: Kurzynski, M., Puchala, E., Wozniak, M., et al. (eds.) Computer Recognition Systems. Advances in Soft Computing, pp. 835\u2013842 (2005)","DOI":"10.1007\/3-540-32390-2_98"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1016\/j.ins.2005.12.003","volume":"176","author":"W Homenda","year":"2006","unstructured":"Homenda, W.: Balanced Fuzzy Sets. Information Sciences 176, 2467\u20132506 (2006)","journal-title":"Information Sciences"},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/0165-0114(91)90002-8","volume":"44","author":"W Homenda","year":"1991","unstructured":"Homenda, W., Pedrycz, W.: Processing of uncertain information in linear space of fuzzy sets. Fuzzy Sets & Systems 44, 187\u2013198 (1991)","journal-title":"Fuzzy Sets & Systems"},{"key":"19_CR8","unstructured":"Homenda, W., Lesinski, W.: Optical music recognition: a case of pattern recognition with undesirable and garbage symbols. In: Choras, R., et al. (eds.) Image Processing and Communications Challenges, pp. 120\u2013127 (2009)"},{"key":"19_CR9","unstructured":"Koerich, A.: Rejection strategies for handwritten word recognition. In: Proc. of the 9th International Workshop on Frontiers in Handwriting Recognition (2004)"},{"issue":"1","key":"19_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10957-005-2653-6","volume":"126","author":"P Kumar","year":"2005","unstructured":"Kumar, P., Yildirim, E.A.: Minimum-Volume Enclosing Ellipsoids and Core Sets. Journal of Optimization Theory and Applications 126(1), 1\u201321 (2005)","journal-title":"Journal of Optimization Theory and Applications"},{"issue":"14","key":"19_CR11","doi-asserted-by":"publisher","first-page":"3321","DOI":"10.1021\/ie0206857","volume":"42","author":"A Meel","year":"2003","unstructured":"Meel, A., Venkat, A.N., Gudi, R.D.: Disturbance classification and rejection using pattern recognition methods. Ind. Eng. Chem. Res. 42(14), 3321\u20133333 (2003)","journal-title":"Ind. Eng. Chem. Res."},{"key":"19_CR12","unstructured":"LeCun, Y., Cortes, C., Burges, C.: The MNIST database of handwritten digits (1996). \n                      http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"issue":"13","key":"19_CR13","doi-asserted-by":"publisher","first-page":"1731","DOI":"10.1016\/j.dam.2007.02.013","volume":"155","author":"MJ Todda","year":"2007","unstructured":"Todda, M.J., Yildirim, E.A.: On Khachiyan\u2019s algorithm for the computation of minimum-volume enclosing ellipsoids. Discrete Applied Mathematics 155(13), 1731\u20131744 (2007)","journal-title":"Discrete Applied Mathematics"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24369-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T20:05:15Z","timestamp":1568664315000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24369-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243689","9783319243696"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24369-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}