{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:26:05Z","timestamp":1759134365262},"reference-count":15,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1999,3,1]],"date-time":"1999-03-01T00:00:00Z","timestamp":920246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Recognition Letters"],"published-print":{"date-parts":[[1999,3]]},"DOI":"10.1016\/s0167-8655(98)00148-2","type":"journal-article","created":{"date-parts":[[2003,4,25]],"date-time":"2003-04-25T08:06:40Z","timestamp":1051258000000},"page":"293-303","source":"Crossref","is-referenced-by-count":5,"title":["Construction of partitioning paths for touching handwritten characters"],"prefix":"10.1016","volume":"20","author":[{"given":"Jianming","family":"Hu","sequence":"first","affiliation":[]},{"given":"Donggang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Yan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-8655(98)00148-2_BIB1","doi-asserted-by":"crossref","first-page":"690","DOI":"10.1109\/34.506792","article-title":"A survey of methods and strategies in character segmentation","volume":"18","author":"Casey","year":"1996","journal-title":"IEEE Trans. Anal. and Mach. Intell."},{"key":"10.1016\/S0167-8655(98)00148-2_BIB2","doi-asserted-by":"crossref","unstructured":"Cheriet, M., Huang, Y.S., Suen, C.Y., 1992. Background region-based algorithm for the segmentation of connected digits. In: Proceedings of the International Conference on Pattern Recognition 92, pp. 619\u2013622","DOI":"10.1109\/ICPR.1992.201853"},{"key":"10.1016\/S0167-8655(98)00148-2_BIB3","unstructured":"Fenrich, R., 1992. Segmentation of automatically located handwritten numeric strings. In: Impedovo, S., Simon, J.C. (Eds.), From Pixels to Features III: Frontiers in Handwriting Recognition. pp. 47\u201359"},{"key":"10.1016\/S0167-8655(98)00148-2_BIB4","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1109\/5.156471","article-title":"Segmentation methods for character recognition: From segmentation to document structure analysis","volume":"80","author":"Fujisawa","year":"1992","journal-title":"Proceedings of the IEEE"},{"key":"10.1016\/S0167-8655(98)00148-2_BIB5","unstructured":"Garris, M.D., Wilkinson, R.A., 1992. Handwritten segmented characters database. Technical Report Special Database 3, HWSC, National Institute of Standards and Technology (NIST)"},{"key":"10.1016\/S0167-8655(98)00148-2_BIB6","doi-asserted-by":"crossref","unstructured":"Hu, J., Yan, H., 1997. A model-based segmentation method for handwritten numeral strings. Computer Vision and Image Understanding, accepted","DOI":"10.1006\/cviu.1998.0689"},{"key":"10.1016\/S0167-8655(98)00148-2_BIB7","doi-asserted-by":"crossref","first-page":"2221","DOI":"10.1049\/el:19961501","article-title":"Algorithm for stroke width compensation of handwritten characters","volume":"32","author":"Hu","year":"1996","journal-title":"Electronics Letters"},{"key":"10.1016\/S0167-8655(98)00148-2_BIB8","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1016\/S0167-8655(98)00043-9","article-title":"A multiple point boundary smoothing algorithm","volume":"19","author":"Hu","year":"1997","journal-title":"Pattern Recognition Letters"},{"key":"10.1016\/S0167-8655(98)00148-2_BIB9","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/BF02626998","article-title":"Segmentation-recognition algorithm for zip code field recognition","volume":"5","author":"Kimura","year":"1992","journal-title":"Mach. Vision Applic."},{"key":"10.1016\/S0167-8655(98)00148-2_BIB10","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/0031-3203(95)00072-0","article-title":"Character segmentation in handwritten words \u2013 an overview","volume":"29","author":"Lu","year":"1996","journal-title":"Pattern Recognition"},{"key":"10.1016\/S0167-8655(98)00148-2_BIB11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0031-3203(86)90025-7","article-title":"Recognition of isolated and simply connected handwritten numerals","volume":"19","author":"Shridhar","year":"1986","journal-title":"Pattern Recognition"},{"key":"10.1016\/S0167-8655(98)00148-2_BIB12","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/0262-8856(87)90071-0","article-title":"Context-directed segmentation algorithm for handwritten numeral strings","volume":"5","author":"Shridhar","year":"1987","journal-title":"Image and Vision Computer"},{"key":"10.1016\/S0167-8655(98)00148-2_BIB13","doi-asserted-by":"crossref","unstructured":"Strathy, N.W., Suen, C.Y., Krzyzak, A., 1993. Segmentation of handwritten digits using contour features. In: Proceedings of the Second International Conference on Document Analysis and Recognition, pp. 577\u2013580","DOI":"10.1109\/ICDAR.1993.395669"},{"issue":"1","key":"10.1016\/S0167-8655(98)00148-2_BIB14","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/S0031-3203(96)00055-6","article-title":"An efficient algorithm for smoothing, linearization and detection of structural feature points of binary image contours","volume":"30","author":"Yu","year":"1997","journal-title":"Pattern Recognition"},{"key":"10.1016\/S0167-8655(98)00148-2_BIB15","doi-asserted-by":"crossref","first-page":"1473","DOI":"10.1016\/0031-3203(93)90153-N","article-title":"Vertex directed segmentation of handwritten numerals","volume":"26","author":"Westall","year":"1993","journal-title":"Pattern Recognition"}],"container-title":["Pattern Recognition Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167865598001482?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167865598001482?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T05:01:02Z","timestamp":1580274062000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167865598001482"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,3]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1999,3]]}},"alternative-id":["S0167865598001482"],"URL":"https:\/\/doi.org\/10.1016\/s0167-8655(98)00148-2","relation":{},"ISSN":["0167-8655"],"issn-type":[{"value":"0167-8655","type":"print"}],"subject":[],"published":{"date-parts":[[1999,3]]}}}