{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T16:24:22Z","timestamp":1764001462112},"reference-count":23,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[1998,7,1]],"date-time":"1998-07-01T00:00:00Z","timestamp":899251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Recognition"],"published-print":{"date-parts":[[1998,7]]},"DOI":"10.1016\/s0031-3203(97)00113-1","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T12:53:29Z","timestamp":1027601609000},"page":"857-870","source":"Crossref","is-referenced-by-count":159,"title":["Threshold selection based on fuzzy c-partition entropy approach"],"prefix":"10.1016","volume":"31","author":[{"given":"H.D.","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Jim-Rong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jiguang","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0031-3203(97)00113-1_BIB1","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/0734-189X(88)90022-9","article-title":"A survey of thresholding techniques","volume":"41","author":"Sahoo","year":"1988","journal-title":"Comput. Vision Graphics Image Process"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB2","series-title":"Digital Image Processing","author":"Gonzalez","year":"1992"},{"issue":"8","key":"10.1016\/S0031-3203(97)00113-1_BIB3","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1109\/TSMC.1978.4310038","article-title":"Threshold evaluation technique","volume":"8","author":"Weszka","year":"1978","journal-title":"IEEE Trans. Systems, Man Cybernet"},{"issue":"1","key":"10.1016\/S0031-3203(97)00113-1_BIB4","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/0031-3203(86)90030-0","article-title":"Minimum error thresholding","volume":"19","author":"Kittler","year":"1986","journal-title":"Pattern Recognition"},{"issue":"5","key":"10.1016\/S0031-3203(97)00113-1_BIB5","first-page":"357","article-title":"A new approach for multilevel threshold selection","volume":"56","author":"Papamarkos","year":"1994","journal-title":"CVGIP"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB6","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/0146-664X(78)90116-8","article-title":"SURVEY","volume":"7","author":"Weszka","year":"1978","journal-title":"Comput. Graphics Image Process"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB7","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/321119.321123","article-title":"Operation useful for similarity-invariant pattern recognition","volume":"9","author":"Doyle","year":"1962","journal-title":"J. Assoc. Comput. Mach"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB8","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1111\/j.1749-6632.1965.tb11715.x","article-title":"The analysis of cell images","volume":"128","author":"Prewitt","year":"1966","journal-title":"Ann. New York Acad. Sci"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB9","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/0146-664X(81)90038-1","article-title":"Entropic thresholding","volume":"16","author":"Pun","year":"1981","journal-title":"Comput. Vision Graphics Image Process"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB10","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/0734-189X(85)90125-2","article-title":"A new method for gray-level picture thresholding using the entropy of the histogram","volume":"29","author":"Kapur","year":"1985","journal-title":"Comput. Vision Graphics Image Process"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB11","series-title":"Fuzzy Sets and Fuzzy Logic","author":"Klir","year":"1995"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB12","series-title":"Fuzzy Mathematical Approach to Pattern Recognition","author":"Pal","year":"1986"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB13","series-title":"Fuzzy Models for Pattern Recognition","author":"Bezdek","year":"1992"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB14","unstructured":"H. D. Cheng, Y. M. Lui and R. I. Freimanis, A fuzzy approach to digital mammographic feature enhancement, Vision Interface \u201996, Toronto, Canada (21\u201324 May 1996)."},{"key":"10.1016\/S0031-3203(97)00113-1_BIB15","unstructured":"H. D. Cheng and R. Desai, Fuzzy moment approach for haracter recognition, Int. Joint Conf. on Information Science, Pinehurst, North Carolina (13\u201316 November 1994)."},{"key":"10.1016\/S0031-3203(97)00113-1_BIB16","doi-asserted-by":"crossref","unstructured":"H. D. Cheng, C. H. Chen and R. I Freimanis, A neural network for breast cancer detection using fuzzy entropy approach, 1995 Int. Conf. on Image Process. Washington, DC (22\u201325 October 1995).","DOI":"10.1109\/ICIP.1995.537600"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB17","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1016\/0022-247X(68)90078-4","article-title":"Probability measures of fuzzy events","volume":"23","author":"Zadeh","year":"1968","journal-title":"J. Math. Anal. Appl"},{"issue":"1","key":"10.1016\/S0031-3203(97)00113-1_BIB18","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/TSMC.1973.5408575","article-title":"Outline of a new approach to the analysis of complex systems and decision processes","volume":"SMC 3","author":"Zadeh","year":"1973","journal-title":"IEEE Trans. System Man Cybernet"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB19","series-title":"Pattern Recognition with Fuzzy Objective Function Algorithms","author":"Bezdek","year":"1981"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB20","first-page":"81","article-title":"Partition Structures","volume":"III","author":"Bezdek","year":"1987"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB21","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/0022-247X(83)90004-5","article-title":"Entropy of a finite partition of fuzzy sets","volume":"94","author":"Kuriyama","year":"1983","journal-title":"J. Math. Anal. Appl"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB22","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","article-title":"Optimization by simulated annealing","volume":"220","author":"Kirkpatrick","year":"1983","journal-title":"Science"},{"key":"10.1016\/S0031-3203(97)00113-1_BIB23","series-title":"Generic Algorithms in Searching, Optimazation, and Machine Learning","author":"Goldberg","year":"1989"}],"container-title":["Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320397001131?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0031320397001131?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T04:20:03Z","timestamp":1556598003000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0031320397001131"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,7]]},"references-count":23,"journal-issue":{"issue":"7","published-print":{"date-parts":[[1998,7]]}},"alternative-id":["S0031320397001131"],"URL":"https:\/\/doi.org\/10.1016\/s0031-3203(97)00113-1","relation":{},"ISSN":["0031-3203"],"issn-type":[{"value":"0031-3203","type":"print"}],"subject":[],"published":{"date-parts":[[1998,7]]}}}