{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:39:05Z","timestamp":1763642345790},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T00:00:00Z","timestamp":1518048000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s00500-018-3059-3","type":"journal-article","created":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T10:58:01Z","timestamp":1518087481000},"page":"4097-4112","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Bayesian genetic programming for edge detection"],"prefix":"10.1007","volume":"23","author":[{"given":"Wenlong","family":"Fu","sequence":"first","affiliation":[]},{"given":"Mengjie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Johnston","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,8]]},"reference":[{"issue":"5","key":"3059_CR1","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TPAMI.2010.161","volume":"33","author":"P Arbel\u00e1ez","year":"2011","unstructured":"Arbel\u00e1ez P, Maire M, Fowlkes C, Malik J (2011) Contour detection and hierarchical image segmentation. IEEE Trans Pattern Anal Mach Intell 33(5):898\u2013916","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3059_CR2","volume-title":"Computer vision: principles and practice","author":"P Azad","year":"2008","unstructured":"Azad P, Gockel T, Dillmann R (2008) Computer vision: principles and practice. Elektor, Susteren"},{"issue":"3","key":"3059_CR3","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/TSMCC.2002.804448","volume":"32","author":"M Basu","year":"2002","unstructured":"Basu M (2002) Gaussian-based edge-detection methods: a survey. IEEE Trans Syst Man Cybern Part C Appl Rev 32(3):252\u2013260","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"key":"3059_CR4","doi-asserted-by":"crossref","unstructured":"Bolis E, Zerbi C, Collet P, Louchet J, Lutton E (2001) A GP artificial ant for image processing: preliminary experiments with EASEA. In: Proceedings of the 4th European conference on genetic programming, pp 246\u2013255","DOI":"10.1007\/3-540-45355-5_19"},{"issue":"6","key":"3059_CR5","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/TPAMI.1986.4767851","volume":"8","author":"J Canny","year":"1986","unstructured":"Canny J (1986) A computational approach to edge detection. IEEE Trans Pattern Anal Mach Intell 8(6):679\u2013698","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3059_CR6","doi-asserted-by":"crossref","unstructured":"Dollar P, Tu Z, Belongie S (2006) Supervised learning of edges and object boundaries. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition vol 2, pp 1964\u20131971","DOI":"10.1109\/CVPR.2006.298"},{"key":"3059_CR7","volume-title":"Pattern classification","author":"RO Duda","year":"2000","unstructured":"Duda RO, Hart PE, Stork DG (2000) Pattern classification, 2nd edn. Wiley, New York","edition":"2"},{"key":"3059_CR8","unstructured":"Ebner M (1997) On the edge detectors for robot vision using genetic programming. In: Proceedings of Horst-Michael Gro\n                    \n                      \n                    \n                    $$\\beta $$\n                    \n                      \n                        \u03b2\n                      \n                    \n                  , Workshop SOAVE 97\u2014Selbstorganisation von Adaptivem Verhalten, pp 127\u2013134"},{"issue":"4","key":"3059_CR9","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1016\/j.imavis.2007.06.009","volume":"26","author":"N Fern\u00e1ndez-Garc\u00eda","year":"2008","unstructured":"Fern\u00e1ndez-Garc\u00eda N, Carmona-Poyato A, Medina-Carnicer R, Madrid-Cuevas F (2008) Automatic generation of consensus ground truth for the comparison of edge detection techniques. Image Vision Comput 26(4):496\u2013511","journal-title":"Image Vision Comput"},{"key":"3059_CR10","doi-asserted-by":"crossref","unstructured":"Fu W, Johnston M, Zhang M (2011) Genetic programming for edge detection: a global approach. In: Proceedings of the IEEE Congress on evolutionary computation, pp 254\u2013261","DOI":"10.1109\/CEC.2011.5949626"},{"key":"3059_CR11","doi-asserted-by":"crossref","unstructured":"Fu W, Johnston M, Zhang M (2012a) Automatic construction of invariant features using genetic programming for edge detection. In: Proceedings of the Australasian joint conference on artificial intelligence, pp 144\u2013155","DOI":"10.1007\/978-3-642-35101-3_13"},{"key":"3059_CR12","doi-asserted-by":"crossref","unstructured":"Fu W, Johnston M, Zhang M (2012b) Genetic programming for edge detection using blocks to extract features. In: Proceedings of the genetic and evolutionary computation conference, pp 855\u2013862","DOI":"10.1145\/2330163.2330282"},{"key":"3059_CR13","doi-asserted-by":"crossref","unstructured":"Fu W, Johnston M, Zhang M (2012c) Soft edge maps from edge detectors evolved by genetic programming. In: Proceedings of the IEEE Congress on evolutionary computation, pp 24\u201331","DOI":"10.1109\/CEC.2012.6256105"},{"key":"3059_CR14","doi-asserted-by":"crossref","unstructured":"Fu W, Johnston M, Zhang M (2013) Genetic programming for edge detection using multivariate density. In: Proceedings of the genetic and evolutionary computation conference, pp 917\u2013924","DOI":"10.1145\/2463372.2463485"},{"issue":"5","key":"3059_CR15","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1109\/3477.623235","volume":"27","author":"L Ganesan","year":"1997","unstructured":"Ganesan L, Bhattacharyya P (1997) Edge detection in untextured and textured images: a common computational framework. IEEE Trans Syst Man Cybern Part B Cybern 27(5):823\u2013834","journal-title":"IEEE Trans Syst Man Cybern Part B Cybern"},{"key":"3059_CR16","doi-asserted-by":"crossref","unstructured":"Golonek T, Grzechca D, Rutkowski J (2006) Application of genetic programming to edge detector design. In: Proceedings of the international symposium on circuits and systems, pp 4683\u20134686","DOI":"10.1109\/ISCAS.2006.1693675"},{"issue":"8","key":"3059_CR17","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1016\/j.imavis.2003.12.004","volume":"22","author":"C Grigorescu","year":"2004","unstructured":"Grigorescu C, Petkov N, Westenberg MA (2004) Contour and boundary detection improved by surround suppression of texture edges. Image Vision Comput 22(8):609\u2013622","journal-title":"Image Vision Comput"},{"issue":"4","key":"3059_CR18","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1504\/IJHPSA.2008.024207","volume":"1","author":"S Harding","year":"2008","unstructured":"Harding S, Banzhaf W (2008) Genetic programming on GPUs for image processing. Int J High Perform Syst Archit 1(4):231\u2013240","journal-title":"Int J High Perform Syst Archit"},{"key":"3059_CR19","unstructured":"Harris C, Buxton B (1996) Evolving edge detectors with genetic programming. In: Proceedings of the first annual conference on genetic programming, pp 309\u2013314"},{"key":"3059_CR20","doi-asserted-by":"crossref","unstructured":"Hollingworth G, Smith S, Tyrrell A (1999) Design of highly parallel edge detection nodes using evolutionary techniques. In: Proceedings of the seventh Euromicro workshop on parallel and distributed processing, pp 35\u201342","DOI":"10.1109\/EMPDP.1999.746642"},{"key":"3059_CR21","doi-asserted-by":"crossref","unstructured":"Jiang L, Wang D, Cai Z, Yan X (2007) Survey of improving naive bayes for classification. In: Proceedings of the 3rd international conference on advanced data mining and applications, pp 134\u2013145","DOI":"10.1007\/978-3-540-73871-8_14"},{"key":"3059_CR22","doi-asserted-by":"crossref","unstructured":"Kadar I, Ben-Shahar O, Sipper M (2009) Evolution of a local boundary detector for natural images via genetic programming and texture cues. In: Proceedings of the 11th annual conference on genetic and evolutionary computation, pp 1887\u20131888","DOI":"10.1145\/1569901.1570218"},{"issue":"11","key":"3059_CR23","doi-asserted-by":"publisher","first-page":"2649","DOI":"10.1016\/S0031-3203(03)00174-2","volume":"36","author":"M Kokare","year":"2003","unstructured":"Kokare M, Biswas PK, Chatterji BN (2003) Edge based features for content based image retrieval. Pattern Recognit 36(11):2649\u20132661","journal-title":"Pattern Recognit"},{"key":"3059_CR24","doi-asserted-by":"crossref","unstructured":"Kokkinos I (2010) Boundary detection using F-measure-, filter- and feature- (F3) boost. In: Proceedings of the 11th European conference on computer vision: part II, pp 650\u2013663","DOI":"10.1007\/978-3-642-15552-9_47"},{"issue":"279","key":"3059_CR25","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1080\/01621459.1957.10501395","volume":"52","author":"WH Kruskal","year":"1957","unstructured":"Kruskal WH (1957) Historical notes on the Wilcoxon unpaired two-sample test. J Am Stat Assoc 52(279):356\u2013360","journal-title":"J Am Stat Assoc"},{"issue":"9","key":"3059_CR26","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1109\/34.161346","volume":"14","author":"L Lam","year":"1992","unstructured":"Lam L, Lee SW, Suen C (1992) Thinning methodologies-a comprehensive survey. IEEE Trans Pattern Anal Mach Intell 14(9):869\u2013885","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3059_CR27","doi-asserted-by":"crossref","unstructured":"Martin D, Fowlkes C, Tal D, Malik J (2001) A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. In: Proceedings of the 8th international conference on computer vision, vol 2, pp 416\u2013423","DOI":"10.1109\/ICCV.2001.937655"},{"issue":"5","key":"3059_CR28","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TPAMI.2004.1273918","volume":"26","author":"D Martin","year":"2004","unstructured":"Martin D, Fowlkes C, Malik J (2004) Learning to detect natural image boundaries using local brightness, color, and texture cues. IEEE Trans Pattern Anal Mach Intell 26(5):530\u2013549","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3059_CR29","doi-asserted-by":"crossref","unstructured":"Moreno R, Puig D, Julia C, Garcia M (2009) A new methodology for evaluation of edge detectors. In: Proceedings of the 16th IEEE international conference on image processing (ICIP), pp 2157\u20132160","DOI":"10.1109\/ICIP.2009.5414086"},{"key":"3059_CR30","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.imavis.2010.08.009","volume":"29","author":"G Papari","year":"2011","unstructured":"Papari G, Petkov N (2011) Edge and line oriented contour detection: state of the art. Image Vision Comput 29:79\u2013103","journal-title":"Image Vision Comput"},{"key":"3059_CR31","unstructured":"Poli R (1996) Genetic programming for image analysis. In: Proceedings of the first annual conference on genetic programming, pp 363\u2013368"},{"key":"3059_CR32","doi-asserted-by":"crossref","unstructured":"Rezai-Rad G, Larijani HH (2007) A new investigation on edge detection filters operation for feature extraction under histogram equalization effect. In: Proceedings of the geometric modelling and imaging, pp 149\u2013153","DOI":"10.1109\/GMAI.2007.5"},{"issue":"11","key":"3059_CR33","doi-asserted-by":"publisher","first-page":"1439","DOI":"10.1016\/0031-3203(94)90123-6","volume":"27","author":"C Shyi-Chyi","year":"1994","unstructured":"Shyi-Chyi C, Wen-Hsiang T (1994) Image compression by moment-preserving edge detection. Pattern Recognit 27(11):1439\u20131449","journal-title":"Pattern Recognit"},{"key":"3059_CR34","first-page":"1","volume":"2006","author":"W Song","year":"2006","unstructured":"Song W, Feng G, Tiecheng L (2006) Evaluating edge detection through boundary detection. EURASIP J Appl Signal Process 2006:1\u201315","journal-title":"EURASIP J Appl Signal Process"},{"key":"3059_CR35","doi-asserted-by":"crossref","unstructured":"Sullivan J, Carlsson S (2002) Recognizing and tracking human action. In: Proceedings of the 7th European conference on computer vision-part I, pp 629\u2013644","DOI":"10.1007\/3-540-47969-4_42"},{"key":"3059_CR36","doi-asserted-by":"crossref","unstructured":"Wang J, Tan Y (2010) A novel genetic programming based morphological image analysis algorithm. In: Proceedings of the 12th annual conference on genetic and evolutionary computation, pp 979\u2013980","DOI":"10.1145\/1830483.1830659"},{"key":"3059_CR37","doi-asserted-by":"crossref","unstructured":"Zhang Y, Rockett PI (2005) Evolving optimal feature extraction using multi-objective genetic programming: a methodology and preliminary study on edge detection. In: Proceedings of the genetic and evolutionary computation conference, pp 795\u2013802","DOI":"10.1145\/1068009.1068143"},{"key":"3059_CR38","doi-asserted-by":"crossref","unstructured":"Zhang M, Cagnoni S, Olague G (2009) Gecco 2009 tutorial: evolutionary computer vision. In: Proceedings of the 11th annual conference companion on genetic and evolutionary computation conference, pp 3355\u20133380","DOI":"10.1145\/1570256.1570423"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3059-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3059-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3059-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T13:03:32Z","timestamp":1557147812000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3059-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,8]]},"references-count":38,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["3059"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3059-3","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,8]]},"assertion":[{"value":"8 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The author declares that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}