{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T17:37:04Z","timestamp":1769276224197,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T00:00:00Z","timestamp":1568851200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T00:00:00Z","timestamp":1568851200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61601362"],"award-info":[{"award-number":["No. 61601362"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671377"],"award-info":[{"award-number":["61671377"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572361"],"award-info":[{"award-number":["61572361"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"New Star Team of Xi\u2019an  University of Posts & Telecommunications","award":["xyt2016-01"],"award-info":[{"award-number":["xyt2016-01"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s00500-019-04351-2","type":"journal-article","created":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T07:02:45Z","timestamp":1568876565000},"page":"7305-7318","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Adaptive Kaniadakis entropy thresholding segmentation algorithm based on particle swarm optimization"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3050-6240","authenticated-orcid":false,"given":"Bo","family":"Lei","sequence":"first","affiliation":[]},{"given":"Jiu-lun","family":"Fan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,19]]},"reference":[{"key":"4351_CR1","doi-asserted-by":"crossref","unstructured":"Angeline PJ (1998) Evolutionary optimization versus particle swarm optimization: philosophy and performance difference. In: Annual conference on evolutionary programming, San Diego","DOI":"10.1007\/BFb0040811"},{"issue":"3","key":"4351_CR2","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/S0019-9958(71)90065-9","volume":"19","author":"S Arimoto","year":"1971","unstructured":"Arimoto S (1971) Information-theoretical considerations on estimation problems. Inf Control 19(3):181\u2013194","journal-title":"Inf Control"},{"issue":"22","key":"4351_CR3","doi-asserted-by":"publisher","first-page":"8707","DOI":"10.1016\/j.eswa.2015.07.025","volume":"42","author":"AK Bhandari","year":"2015","unstructured":"Bhandari AK, Kumar A, Singh GK (2015) Tsallis entropy based multilevel thresholding for colored satellite image segmentation using evolutionary algorithms. Expert Syst Appl 42(22):8707\u20138730","journal-title":"Expert Syst Appl"},{"key":"4351_CR4","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1016\/j.patrec.2004.03.003","volume":"25","author":"MP de Albuquerque","year":"2004","unstructured":"de Albuquerque MP, Esquef IA, Mello ARG et al (2004) Image thresholding using Tsallis entropy. Pattern Recognit Lett 25:1059\u20131065","journal-title":"Pattern Recognit Lett"},{"key":"4351_CR5","doi-asserted-by":"publisher","first-page":"161","DOI":"10.5334\/aa.06113","volume":"1","author":"H Devi","year":"2006","unstructured":"Devi H (2006) Thresholding: a pixel-level image processing methodology preprocessing technique for an OCR system for the Brabmi script. Ancient Asia 1:161","journal-title":"Ancient Asia"},{"key":"4351_CR6","unstructured":"Ebergart RC, Shi YH (2001) Tracking and optimizing dynamic systems with particle swarms. In: Proceedings of congress on evoluztionary computation 2001, Seoul, Korea. IEEE Service Center, Piscataway, NJ"},{"key":"4351_CR7","unstructured":"Eberhart RC, Kermedy J (1995) A new optimizer using particles swarm theory. In: Proceedings of 6th international symposium on micro machine and human science (Nagoya, Japan). IEEE. Service Center, Piscataway, NJ, pp. 39\u201343"},{"key":"4351_CR8","volume-title":"Digital image processing","author":"RC Gonzalez","year":"2007","unstructured":"Gonzalez RC, Woods RE (2007) Digital image processing, 3rd edn. Prentice-Hall, Englewood Cliffs","edition":"3"},{"key":"4351_CR9","doi-asserted-by":"publisher","first-page":"3983","DOI":"10.3390\/e15103983","volume":"15","author":"G Kaniadakis","year":"2013","unstructured":"Kaniadakis G (2013) Theoretical foundations and mathematical formalism of the power-law tailed statistical distributions. Entropy 15:3983\u20134010","journal-title":"Entropy"},{"key":"4351_CR10","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/0734-189X(85)90125-2","volume":"29","author":"JN Kapur","year":"1985","unstructured":"Kapur JN, Sahoo PK, Wong AKC (1985) A new method for gray-level picture thresholding using the entropy of the histogram. Comput Vis Graph Image Process 29:273\u2013285","journal-title":"Comput Vis Graph Image Process"},{"issue":"4","key":"4351_CR11","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1016\/0031-3203(93)90115-D","volume":"26","author":"CH Li","year":"1993","unstructured":"Li CH, Lee CK (1993) Minimum cross entropy thresholding. Pattern Recognit 26(4):617\u2013625","journal-title":"Pattern Recognit"},{"key":"4351_CR12","doi-asserted-by":"crossref","unstructured":"Liu Y, Li S (2010) Two-dimensional arimoto entropy image thresholding based on ellipsoid region search strategy. In: International conference on multimedia technology. IEEE","DOI":"10.1109\/ICMULT.2010.5631047"},{"issue":"5","key":"4351_CR13","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1007\/s00500-014-1345-2","volume":"19","author":"Y Liu","year":"2015","unstructured":"Liu Y, Mu C, Kou W et al (2015) Modified particle swarm optimization-based multilevel thresholding for image segmentation. Soft Comput 19(5):1311\u20131327","journal-title":"Soft Comput"},{"issue":"14","key":"4351_CR14","doi-asserted-by":"publisher","first-page":"1644","DOI":"10.1016\/j.patrec.2006.03.009","volume":"27","author":"HF Ng","year":"2004","unstructured":"Ng HF (2004) Automatic thresholding for defect detection. Pattern Recognit Lett 27(14):1644\u20131649","journal-title":"Pattern Recognit Lett"},{"issue":"8","key":"4351_CR15","first-page":"1040","volume":"47","author":"F Nie","year":"2017","unstructured":"Nie F, Li J, Zhang P et al (2017) Threshold segmentation method of complex image based on Kaniadakis entropy. Laser Infrared 47(8):1040\u20131045","journal-title":"Laser Infrared"},{"issue":"1","key":"4351_CR16","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N Otsu","year":"1979","unstructured":"Otsu N (1979) A thresholding selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9(1):62\u201366","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"4351_CR17","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/0167-8655(83)90053-3","volume":"1","author":"SK Pal","year":"1980","unstructured":"Pal SK, King RA, Hashim AA (1980) Automatic gray level thresholding through index of fuzziness and entropy. Pattern Recognit Lett 1:141\u2013146","journal-title":"Pattern Recognit Lett"},{"key":"4351_CR18","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/0146-664X(81)90038-1","volume":"16","author":"T Pun","year":"1981","unstructured":"Pun T (1981) Entropic thresholding: a new approach. Comput Graph Image Process 16:210\u2013239","journal-title":"Comput Graph Image Process"},{"issue":"1","key":"4351_CR19","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/S0031-3203(96)00065-9","volume":"30","author":"P Sahoo","year":"1997","unstructured":"Sahoo P, Ilkins CW, Yeage J (1997) Threshold selection using Renyi\u2019s entropy. Pattern Recognit 30(1):71\u201384","journal-title":"Pattern Recognit"},{"issue":"1","key":"4351_CR20","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1117\/1.1631315","volume":"13","author":"M Sezgin","year":"2004","unstructured":"Sezgin M, Sankur B (2004) Survey over image thresholding techniques and quantitative performance evaluation. J Electron Imaging 13(1):146\u2013165","journal-title":"J Electron Imaging"},{"issue":"2","key":"4351_CR21","first-page":"35","volume":"4","author":"AC Sparavigna","year":"2015","unstructured":"Sparavigna AC (2015a) Shannon, Tsallis And Kaniadakis entropies In bi-level image thresholding. Int J Sci 4(2):35\u201343","journal-title":"Int J Sci"},{"issue":"1","key":"4351_CR22","first-page":"41","volume":"4","author":"AC Sparavigna","year":"2015","unstructured":"Sparavigna AC (2015b) Bi-level image thresholding obtained by means of Kaniadakis Entropy. Int J Sci 4(1):41\u201349","journal-title":"Int J Sci"},{"key":"4351_CR23","doi-asserted-by":"publisher","first-page":"2309","DOI":"10.1016\/j.patrec.2005.03.027","volume":"26","author":"S Wang","year":"2005","unstructured":"Wang S, Chung FL (2005) Note on the equivalence relationship between Renyi-entropy based and Tsallis-entropy based image thresholding. Pattern Recognit Lett 26:2309\u20132312","journal-title":"Pattern Recognit Lett"},{"issue":"4","key":"4351_CR24","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"4351_CR25","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1109\/34.85677","volume":"13","author":"XL Xie","year":"1991","unstructured":"Xie XL, Beni G (1991) A validity measure for fuzzy clustering. IEEE Trans Pattern Anal Mach Intell 13(8):841\u2013847","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"4351_CR26","first-page":"1330","volume":"2","author":"FS Xiong","year":"2014","unstructured":"Xiong FS (2014) Survey over image thresholding techniques based on entropy. Int Conf Inf Sci 2:1330\u20131334","journal-title":"Int Conf Inf Sci"},{"issue":"8","key":"4351_CR27","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/TIP.2011.2109730","volume":"20","author":"L Zhang","year":"2011","unstructured":"Zhang L, Zhang L, Mou X et al (2011) Fsim: a feature similarity index for image quality assessment. IEEE Trans. Image Process 20(8):2378\u20132386","journal-title":"IEEE Trans. Image Process"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04351-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-04351-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04351-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,17]],"date-time":"2020-09-17T23:29:19Z","timestamp":1600385359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-04351-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,19]]},"references-count":27,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["4351"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-04351-2","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,19]]},"assertion":[{"value":"19 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors Bo Lei and Jiu-lun Fan declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}