{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:01:41Z","timestamp":1754161301158,"version":"3.41.2"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/iccp48234.2019.8959658","type":"proceedings-article","created":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T21:23:10Z","timestamp":1579209790000},"page":"351-358","source":"Crossref","is-referenced-by-count":0,"title":["Evolved Cellular Automata for Edge Detection in Binary Images"],"prefix":"10.1109","author":[{"given":"Alina","family":"Enescu","sequence":"first","affiliation":[{"name":"Babe&#x015F;&#x2013;Bolyai University,Cluj&#x2013;Napoca,Romania"}]},{"given":"Anca","family":"Andreica","sequence":"additional","affiliation":[{"name":"Babe&#x015F;&#x2013;Bolyai University,Cluj&#x2013;Napoca,Romania"}]},{"given":"Laura","family":"Dio\u015fan","sequence":"additional","affiliation":[{"name":"Babe&#x015F;&#x2013;Bolyai University,Cluj&#x2013;Napoca,Romania"}]}],"member":"263","reference":[{"key":"ref10","first-page":"140","article-title":"Edge detection","volume":"5","author":"jain","year":"1995","journal-title":"Machine Vision"},{"year":"1966","author":"neumann","journal-title":"Theory of Self-Reproducing Automata","key":"ref11"},{"key":"ref12","article-title":"Theory and applications of two-dimensional, null-boundary, nine-neighborhood, cellular automata linear rules","volume":"abs 804 2346","author":"choudhury","year":"2008","journal-title":"CoRR"},{"key":"ref13","first-page":"12","article-title":"Article: Ultra sound kidney image retrieval using time efficient one dimensional glcm texture feature","volume":"accthpca","author":"christiyana","year":"2012","journal-title":"IJCA Special Issue on Advanced Computing and Communication Technologies for HPC Applications"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICACCI.2013.6637146"},{"key":"ref15","first-page":"2050","article-title":"Efficient edge detection methods for diagnosis of lung cancer based on two dimensional cellular automata","volume":"4","author":"qadir","year":"2012","journal-title":"Advances in Applied Science Research"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.5772\/15852"},{"key":"ref17","article-title":"A cellular automata based optimal edge detection technique using twenty-five neighborhood model","volume":"abs 1402 1348","author":"nayak","year":"2014","journal-title":"CoRR"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ICICES.2014.7033847"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.5815\/ijigsp.2014.10.07"},{"key":"ref4","first-page":"78","article-title":"A survey on two dimensional cellular automata and its application in image processing","volume":"etcc","author":"nayak","year":"2014","journal-title":"IJCA Proceedings on International Conference on Emergent Trends in Computing and Communication (ETCC-2014)"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-1-4471-0709-5_4"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/11779568_86"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-3-319-06431-4_5"},{"key":"ref8","article-title":"Evolutionary cellular automata for image segmentation and noise filtering using genetic algorithms","author":"kazar","year":"2011","journal-title":"Journal of Applied Computer Science & Mathematics"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-540-73400-0_51"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1051\/jp1:1992277"},{"key":"ref1","first-page":"429","article-title":"Cryptography with cellular automata","author":"wolfram","year":"1985","journal-title":"Conference on the Theory and Application of Cryptographic Techniques"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3319619.3322043"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1109\/ICCV.2001.937655","article-title":"A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics","volume":"2","author":"martin","year":"2001","journal-title":"Computer Vision 2001 ICCV 2001 Proceedings Eighth IEEE International Conference on"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1016\/j.aeue.2015.05.010"}],"event":{"name":"2019 IEEE 15th International Conference on Intelligent Computer Communication and Processing (ICCP)","start":{"date-parts":[[2019,9,5]]},"location":"Cluj-Napoca, Romania","end":{"date-parts":[[2019,9,7]]}},"container-title":["2019 IEEE 15th International Conference on Intelligent Computer Communication and Processing (ICCP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8954839\/8959442\/08959658.pdf?arnumber=8959658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:39:24Z","timestamp":1753731564000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8959658\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iccp48234.2019.8959658","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}