{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T08:53:52Z","timestamp":1762160032363},"reference-count":16,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1986,1,1]],"date-time":"1986-01-01T00:00:00Z","timestamp":504921600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Recognition"],"published-print":{"date-parts":[[1986,1]]},"DOI":"10.1016\/0031-3203(86)90027-0","type":"journal-article","created":{"date-parts":[[2003,6,30]],"date-time":"2003-06-30T14:41:01Z","timestamp":1056984061000},"page":"15-19","source":"Crossref","is-referenced-by-count":28,"title":["Heuristic approach to handwritten numeral recognition"],"prefix":"10.1016","volume":"19","author":[{"given":"Jun S.","family":"Huang","sequence":"first","affiliation":[]},{"given":"Keren","family":"Chuang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0031-3203(86)90027-0_BIB1","series-title":"Pattern Recognition Principles","author":"Tou","year":"1979"},{"key":"10.1016\/0031-3203(86)90027-0_BIB2","series-title":"Syntactic Pattern Recognition and Applications","author":"Fu","year":"1982"},{"key":"10.1016\/0031-3203(86)90027-0_BIB3","first-page":"200","article-title":"A step towards unification of syntactic and statistical pattern recognition","author":"Fu","year":"1983","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell. PAMI-5"},{"key":"10.1016\/0031-3203(86)90027-0_BIB4","first-page":"845","article-title":"Recent developments in pattern recognition","author":"Fu","year":"1980","journal-title":"IEEE Trans. Comput. C-29"},{"key":"10.1016\/0031-3203(86)90027-0_BIB5","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/TPAMI.1979.4766905","article-title":"Problem solving models and search strategies for pattern recognition","author":"Kanal","year":"1979","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell. PAMI-1"},{"key":"10.1016\/0031-3203(86)90027-0_BIB6","series-title":"A variable-valued logic system as applied to picture description and recognition, Graphic Languages","author":"Michalski","year":"1972"},{"key":"10.1016\/0031-3203(86)90027-0_BIB7","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1016\/0031-3203(84)90049-9","article-title":"High accuracy character recognition algorithm using Fourier and topological descriptors","volume":"17","author":"Shridhar","year":"1984","journal-title":"Pattern Recognition"},{"key":"10.1016\/0031-3203(86)90027-0_BIB8","first-page":"640","article-title":"A Fourier discriptor set for recognizing nonstylized numerals","author":"Impedovo","year":"1978","journal-title":"IEEE Trans. Syst. Man Cybernet. SMC-8"},{"key":"10.1016\/0031-3203(86)90027-0_BIB9","first-page":"331","article-title":"Experiments on handwritten numeral classification","author":"David","year":"1971","journal-title":"IEEE Trans. Syst. Man Cybernet. SMC-1"},{"key":"10.1016\/0031-3203(86)90027-0_BIB10","first-page":"195","article-title":"A handwritten numeral recognition machine for automatic mail-sorting, Signal Process","author":"Hu","year":"1982","journal-title":"Theor. Applic."},{"key":"10.1016\/0031-3203(86)90027-0_BIB11","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/0031-3203(80)90043-6","article-title":"A combination of statistical and syntactical pattern recognition applied to classification of unconstrained handwritten numerals","volume":"12","author":"Dueer","year":"1980","journal-title":"Pattern Recognition"},{"key":"10.1016\/0031-3203(86)90027-0_BIB12","first-page":"1292","article-title":"Recognition of handwritten numerical characters for automatic letter sorting","volume":"56","author":"Genchi","year":"1968"},{"key":"10.1016\/0031-3203(86)90027-0_BIB13","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1109\/TSMC.1975.4309402","article-title":"Computer recognition of handwritten numerals by polygonal approximations","author":"Pavlidis","year":"1975","journal-title":"IEEE Trans. Syst. Man Cybernet. SMC-5"},{"key":"10.1016\/0031-3203(86)90027-0_BIB14","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1109\/TSMC.1977.4309763","article-title":"Syntactic recognition of handwritten numerals","author":"Ali","year":"1977","journal-title":"IEEE Trans. Syst. Man Cybernet. SMC-7"},{"key":"10.1016\/0031-3203(86)90027-0_BIB15","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","article-title":"A threshold selection method from gray-level histograms","author":"Otsu","year":"1979","journal-title":"IEEE Trans. Syst. Man Cybernet. SMC-9"},{"key":"10.1016\/0031-3203(86)90027-0_BIB16","first-page":"471","article-title":"A new thinning algorithm: removing noisespurs and retaining endpoints","author":"Huang","year":"1983"}],"container-title":["Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0031320386900270?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0031320386900270?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T06:21:51Z","timestamp":1552890111000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0031320386900270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1986,1]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1986,1]]}},"alternative-id":["0031320386900270"],"URL":"https:\/\/doi.org\/10.1016\/0031-3203(86)90027-0","relation":{},"ISSN":["0031-3203"],"issn-type":[{"value":"0031-3203","type":"print"}],"subject":[],"published":{"date-parts":[[1986,1]]}}}