{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T23:33:11Z","timestamp":1773271991306,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2006,7,18]],"date-time":"2006-07-18T00:00:00Z","timestamp":1153180800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2006,10]]},"DOI":"10.1007\/s10044-006-0031-0","type":"journal-article","created":{"date-parts":[[2006,7,17]],"date-time":"2006-07-17T15:12:32Z","timestamp":1153149152000},"page":"139-153","source":"Crossref","is-referenced-by-count":22,"title":["W-operator window design by minimization of mean conditional entropy"],"prefix":"10.1007","volume":"9","author":[{"suffix":"Jr","given":"David C.","family":"Martins","sequence":"first","affiliation":[]},{"suffix":"Jr","given":"Roberto M.","family":"Cesar","sequence":"additional","affiliation":[]},{"given":"Junior","family":"Barrera","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,7,18]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Barrera J, Terada R, Hirata R Jr, Hirata NST (2000) Automatic programming of morphological machines by pac learning. Fundamenta Informaticae, pp 229\u2013258","DOI":"10.3233\/FI-2000-411208"},{"issue":"2","key":"31_CR2","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/S0262-8856(01)00092-0","volume":"20","author":"C Di Ruberto","year":"2002","unstructured":"Di Ruberto C, Dempster A, Khan S, Jarra B (2002) Analysis of infected blood cell images using morphological operators. Image Vis Comput 20(2):133\u2013146","journal-title":"Image Vis Comput"},{"issue":"3","key":"31_CR3","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1117\/1.1762520","volume":"13","author":"ER Dougherty","year":"2004","unstructured":"Dougherty ER (2004) Automatic design of morphological operators. J Electron Imaging 13(3):486\u2013491","journal-title":"J Electron Imaging"},{"issue":"9","key":"31_CR4","doi-asserted-by":"publisher","first-page":"1961","DOI":"10.1016\/S0165-1684(03)00114-2","volume":"83","author":"AC Green","year":"2003","unstructured":"Green AC, Marshall S, Greenhalgh D, Dougherty ER (2003) Design of multi-mask aperture filters. Signal Processing 83(9):1961\u20131971","journal-title":"Signal Processing"},{"key":"31_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-6017-0","volume-title":"Nonlinear digital filters","author":"I Pitas","year":"1990","unstructured":"Pitas I, Venetsanopoulos AN (1990) Nonlinear digital filters. Kluwer, Dordrecht"},{"issue":"3","key":"31_CR6","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1023\/A:1020325626071","volume":"16","author":"ER Dougherty","year":"2002","unstructured":"Dougherty ER, Barrera J (2002) Pattern recognition theory in nonlinear signal processing. J Math Imaging Vis 16(3):181\u2013197","journal-title":"J Math Imaging Vis"},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1016\/S0031-3203(99)00165-X","volume":"33","author":"NST Hirata","year":"2000","unstructured":"Hirata NST, Dougherty ER, Barrera J (2000) A switching algorithm for design of optimal increasing binary filters over large windows. Pattern Recognit 33:1059\u20131081","journal-title":"Pattern Recognit"},{"issue":"2","key":"31_CR8","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/S0031-3203(01)00047-4","volume":"35","author":"P Soille","year":"2002","unstructured":"Soille P (2002) On morphological operators based on rank filters. Pattern Recognit 35(2):527\u2013535","journal-title":"Pattern Recognit"},{"issue":"2","key":"31_CR9","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/34.574797","volume":"19","author":"A Jain","year":"1997","unstructured":"Jain A, Zongker D (1997) Feature selection\u2014evaluation, application, and small sample performance. IEEE Trans Pattern Anal Mach Intell 19(2):153\u2013158","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"31_CR10","volume-title":"Pattern recognition","author":"S Theodoridis","year":"1999","unstructured":"Theodoridis S, Koutroumbas K (1999) Pattern recognition, 1st edn. Academic, New York","edition":"1"},{"key":"31_CR11","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1016\/0167-8655(94)90127-9","volume":"15","author":"P Pudil","year":"1994","unstructured":"Pudil P, Novovicov\u00e1 J, Kittler J (1994) Floating search methods in feature selection. Pattern Recognit Lett 15:1119\u20131125","journal-title":"Pattern Recognit Lett"},{"key":"31_CR12","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379\u2013423, 623\u2013656","journal-title":"Bell Syst Tech J"},{"key":"31_CR13","volume-title":"In: Wiley series in telecommunications.","author":"TM Cover","year":"1991","unstructured":"Cover TM, Thomas JA (1991) Elements of information theory. In: Wiley series in telecommunications. Wiley, New York"},{"key":"31_CR14","volume-title":"Information theory and statistics","author":"S Kullback","year":"1968","unstructured":"Kullback S (1968) Information theory and statistics. Dover, New York"},{"key":"31_CR15","doi-asserted-by":"publisher","first-page":"1349","DOI":"10.2307\/2669786","volume":"95","author":"ES Soofi","year":"2000","unstructured":"Soofi ES (2000) Principal information theoretic approaches. J Am Stat Assoc 95:1349\u20131353","journal-title":"J Am Stat Assoc"},{"key":"31_CR16","volume-title":"Pattern classification","author":"RO Duda","year":"2000","unstructured":"Duda RO, Hart PE, Stork D (2000) Pattern classification. Wiley, New York"},{"key":"31_CR17","unstructured":"Hall MA, Smith LA (1999) Feature selection for machine learning: comparing a correlation-based filter approach to the wrapper. In: Proceedings of the FLAIRS conference, AAAI Press, pp 235\u2013239"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Lewis DD (1992) Feature selection and feature extraction for text categorization. In: Proceedings of speech and natural language workshop, Morgan Kaufmann, San Mateo, pp 212\u2013217","DOI":"10.3115\/1075527.1075574"},{"key":"31_CR19","unstructured":"Bonnlander BV, Weigend AS (1994) Selecting input variables using mutual information and nonparametric density estimation. In: Proceedings of the 1994 international symposium on artificial neural networks, Tainan, pp 42\u201350"},{"issue":"2","key":"31_CR20","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/A:1007958904918","volume":"24","author":"P Viola","year":"1997","unstructured":"Viola P, Wells WM III (1997) Alignment by maximization of mutual information. Int J Comput Vision 24(2):137\u2013154","journal-title":"Int J Comput Vision"},{"key":"31_CR21","unstructured":"Zaffalon M, Hutter M (2002) Robust feature selection by mutual information distributions. In: 18th international conference on uncertainty in artificial intelligence (UAI), pp 577\u2013584"},{"key":"31_CR22","volume-title":"Shape analysis and classification: theory and practice","author":"LF Costa","year":"2001","unstructured":"Costa LF, Cesar RM Jr (2001) Shape analysis and classification: theory and practice. CRC Press, Boca Raton"},{"key":"31_CR23","doi-asserted-by":"publisher","first-page":"2219","DOI":"10.1016\/S0165-1684(00)00079-7","volume":"80","author":"ER Dougherty","year":"2000","unstructured":"Dougherty ER, Kim S, Chen Y (2000) Coefficient of determination in nonlinear signal processing. Signal Processing 80:2219\u20132235","journal-title":"Signal Processing"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Vaquero DA, Barrera J, Hirata R Jr (2005) A maximum-likelihood approach for multiresolution W-operator design. In: Proceedings of XVIII Brazilian symposium on computer graphics and image processing (SIBGRAPI). IEEE Computer Society Press, pp 71\u201378","DOI":"10.1109\/SIBGRAPI.2005.7"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-006-0031-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10044-006-0031-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-006-0031-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-006-0031-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T22:14:26Z","timestamp":1581977666000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-006-0031-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,18]]},"references-count":24,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2006,10]]}},"alternative-id":["31"],"URL":"https:\/\/doi.org\/10.1007\/s10044-006-0031-0","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,7,18]]}}}