{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:06:22Z","timestamp":1725541582914},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_9","type":"book-chapter","created":{"date-parts":[[2009,11,28]],"date-time":"2009-11-28T03:33:01Z","timestamp":1259379181000},"page":"64-71","source":"Crossref","is-referenced-by-count":0,"title":["Grayscale Image Classification Using Supervised Chromosome Clustering"],"prefix":"10.1007","author":[{"given":"Debnath","family":"Bhattacharyya","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Poulami","family":"Das","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Samir Kumar","family":"Bandyopadhyay","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tai-hoon","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","volume-title":"ASA-SIAM Series on Statistics and Applied Probability","author":"G. Gan","year":"2007","unstructured":"Gan, G., Ma, C., Wo, J.: Data Clustering: Theory, Algorithms and Applications. In: ASA-SIAM Series on Statistics and Applied Probability. SIAM, Philadelphia (2007)"},{"key":"9_CR2","volume-title":"Cluster analysis","author":"B. Everitt","year":"1993","unstructured":"Everitt, B.: Cluster analysis, 3rd edn. Halsted Press, New York (1993)","edition":"3"},{"key":"9_CR3","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/978-3-642-75040-3_2","volume-title":"Conceptual and Numerical Analysis of Data","author":"H. Bock","year":"1989","unstructured":"Bock, H.: Probabilistic aspects in cluster analysis. In: Conceptual and Numerical Analysis of Data, Augsburg, FRG, pp. 12\u201344. Springer, Heidelberg (1989)"},{"issue":"2","key":"9_CR4","doi-asserted-by":"publisher","first-page":"144","DOI":"10.2307\/2412355","volume":"17","author":"J. Carmichael","year":"1968","unstructured":"Carmichael, J., George, J.A., Julius, R.: Finding natural clusters. Systematic Zoology\u00a017(2), 144\u2013150 (1968)","journal-title":"Systematic Zoology"},{"issue":"5","key":"9_CR5","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/34.1000236","volume":"24","author":"D. Comaniciu","year":"2002","unstructured":"Comaniciu, D., Meer, P.: Mean shift: A robust approach toward feature space analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a024(5), 603\u2013619 (2002)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"9_CR6","volume-title":"Mastering Data Mining","author":"M. Berry","year":"2000","unstructured":"Berry, M., Linoff, G.: Mastering Data Mining. John Wiley and Sons, New York (2000)"},{"issue":"1","key":"9_CR7","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/568574.568575","volume":"4","author":"V. Estivill-Castro","year":"2002","unstructured":"Estivill-Castro, V.: Why so many clustering algorithms: a position paper. ACM SIGKDD Explorations Newsletter\u00a04(1), 65\u201375 (2002)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"issue":"6","key":"9_CR8","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1016\/0031-3203(87)90034-3","volume":"20","author":"R. Dubes","year":"1987","unstructured":"Dubes, R.: How many clusters are best? An experiment. Pattern Recognition\u00a020(6), 645\u2013663 (1987)","journal-title":"Pattern Recognition"},{"issue":"8","key":"9_CR9","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1093\/comjnl\/41.8.578","volume":"41","author":"C. Fraley","year":"1998","unstructured":"Fraley, C., Raftery, A.: How many clusters? Which clustering method? Answers via model-based cluster analysis. The Computer Journal\u00a041(8), 578\u2013588 (1998)","journal-title":"The Computer Journal"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/S0167-8655(97)00005-6","volume":"18","author":"S. Bandyopadhyay","year":"1997","unstructured":"Bandyopadhyay, S., Pal, S.K.: Pattern Classification with Genetic Algorithms: Incorporation of Chromosome Differentiation. Pattern Recognition Letters\u00a018, 119\u2013131 (1997)","journal-title":"Pattern Recognition Letters"},{"issue":"2","key":"9_CR11","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/36.905238","volume":"39","author":"S. Bandyopadhyay","year":"2001","unstructured":"Bandyopadhyay, S., Pal, S.K.: Pixel Classification Using Variable String Genetic Algorithms with Chromosome Differentiation. IEEE Transactions on Geoscience and Remote Sensing\u00a039(2), 303\u2013308 (2001)","journal-title":"IEEE Transactions on Geoscience and Remote Sensing"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, D., Bandyopadhyay, S.K., Chaudhury, D.: Handwritten Signature Authentication Scheme using Integrated Statistical Analysis of Bi-Color Images. In: IEEE ICCSA 2007 Conference, Kuala Lumpur, Malaysia, August 26-29, pp. 72\u201377 (2007)","DOI":"10.1109\/ICCSA.2007.15"},{"key":"9_CR13","unstructured":"Bandyopadhyay, S.K., Bhattacharyya, D., Das, P.: Handwritten Signature Verification System using Morphological Image Analysis. In: CATA 2007 International Conference, A publication of International Society for Computers and their Applications, Honolulu, Hawaii, USA, March 28-30, pp. 112\u2013117 (2007)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Bandyopadhyay, S.K., Bhattacharyya, D., Das, P., Debnath, D.: Handwritten Signature Authentication using Statistical Estimation. In: IEEE-CS MUE 2008 Conference, Busan, Korea, April 24-27, pp. 77\u201382 (2008)","DOI":"10.1109\/MUE.2008.12"},{"issue":"1","key":"9_CR15","first-page":"129","volume":"3","author":"P. Das","year":"2009","unstructured":"Das, P., Bhattacharyya, D., Bandyopadhyay, S.K., Kim, T.-h.: Person Identification through IRIS Recognition. IJSIA - International Journal of Security and Its Applications, A publication of Science and Engineering Research Support Center\u00a03(1), 129\u2013148 (2009)","journal-title":"IJSIA - International Journal of Security and Its Applications, A publication of Science and Engineering Research Support Center"},{"key":"9_CR16","series-title":"The Handbook of Brain Theory and Neural Networks","first-page":"308","volume-title":"Data clustering and learning","author":"J. Buhmann","year":"2003","unstructured":"Buhmann, J.: Data clustering and learning. The Handbook of Brain Theory and Neural Networks, pp. 308\u2013312. MIT Press, Cambridge (2003)"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:38:27Z","timestamp":1558402707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}