{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T20:26:13Z","timestamp":1750105573020,"version":"3.37.3"},"reference-count":33,"publisher":"World Scientific Pub Co Pte Ltd","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2020,10]]},"abstract":"<jats:p> Threshold segmentation has been widely used in recent years due to its simplicity and efficiency. The method of segmenting images by the two-dimensional maximum entropy is a species of the useful technique of threshold segmentation. However, the efficiency and stability of this technique are still not ideal and the traditional search algorithm cannot meet the needs of engineering problems. To mitigate the above problem, swarm intelligent optimization algorithms have been employed in this field for searching the optimal threshold vector. An effective technique of lightning attachment procedure optimization (LAPO) algorithm based on a two-dimensional maximum entropy criterion is offered in this paper, and besides, a chaotic strategy is embedded into LAPO to develop a new algorithm named CLAPO. In order to confirm the benefits of the method proposed in this paper, the other seven kinds of competitive algorithms, such as Ant\u2013lion Optimizer (ALO) and Grasshopper Optimization Algorithm (GOA), are compared. Experiments are conducted on four different kinds of images and the simulation results are presented in several indexes (such as computational time, maximum fitness, average fitness, variance of fitness and other indexes) at different threshold levels for each test image. By scrutinizing the results of the experiment, the superiority of the introduced method is demonstrated, which can meet the needs of image segmentation excellently. <\/jats:p>","DOI":"10.1142\/s0218001420540300","type":"journal-article","created":{"date-parts":[[2019,11,29]],"date-time":"2019-11-29T07:02:49Z","timestamp":1575010969000},"page":"2054030","source":"Crossref","is-referenced-by-count":9,"title":["An Image Segmentation Method Based on Two-Dimensional Entropy and Chaotic Lightning Attachment Procedure Optimization Algorithm"],"prefix":"10.1142","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2630-6270","authenticated-orcid":false,"given":"Wei","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer Science, Hubei University of Technology, Wuhan, P.\u00a0R.\u00a0China"}]},{"given":"Shuai","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Hubei University of Technology, Wuhan, P.\u00a0R.\u00a0China"}]},{"given":"Zhiwei","family":"Ye","sequence":"additional","affiliation":[{"name":"School of Computer Science, Hubei University of Technology, Wuhan, P.\u00a0R.\u00a0China"}]},{"given":"Qian","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Hubei University of Technology, Wuhan, P.\u00a0R.\u00a0China"}]},{"given":"Yongkun","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Hubei University of Technology, Wuhan, P.\u00a0R.\u00a0China"}]}],"member":"219","published-online":{"date-parts":[[2020,3,11]]},"reference":[{"key":"S0218001420540300BIB001","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/0734-189X(89)90051-0","volume":"47","author":"Abutaleb A. S.","year":"1989","journal-title":"Comput. Vis. Graph. Image Process."},{"key":"S0218001420540300BIB002","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1109\/TBME.2009.2035102","volume":"57","author":"Al-Kofahi Y.","year":"2010","journal-title":"IEEE Trans. Biomed. Eng."},{"key":"S0218001420540300BIB003","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1109\/TPAMI.2010.161","volume":"33","author":"Arbelaez P.","year":"2011","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"S0218001420540300BIB004","doi-asserted-by":"crossref","first-page":"3538","DOI":"10.1016\/j.eswa.2013.10.059","volume":"41","author":"Bhandari A. K.","year":"2014","journal-title":"Expert Syst. Appl."},{"key":"S0218001420540300BIB006","doi-asserted-by":"crossref","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","volume":"40","author":"Chen L.-C.","year":"2018","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"S0218001420540300BIB007","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1007\/s11831-018-9257-4","volume":"26","author":"Chouhan S. S.","year":"2019","journal-title":"Arch. Comput. Method Eng."},{"key":"S0218001420540300BIB008","doi-asserted-by":"crossref","first-page":"5892","DOI":"10.1016\/j.eswa.2014.03.029","volume":"41","author":"de Araujo A. F.","year":"2014","journal-title":"Expert Syst. Appl."},{"journal-title":"Arch Comput. Methods Eng.","year":"2019","author":"Dhal K. G.","key":"S0218001420540300BIB009"},{"key":"S0218001420540300BIB010","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/s42044-018-0022-5","volume":"2","author":"Farshi T. R.","year":"2019","journal-title":"Iran J Comput Sci"},{"key":"S0218001420540300BIB011","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s11771-018-3721-z","volume":"25","author":"Gao Y.","year":"2018","journal-title":"J. Cent. South Univ."},{"key":"S0218001420540300BIB012","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.cviu.2007.09.001","volume":"109","author":"Hammouche K.","year":"2008","journal-title":"Comput. Vision Image Underst."},{"key":"S0218001420540300BIB013","first-page":"1","volume-title":"Proc. 2011 7th Iranian Conf. Machine Vision and Image Processing","author":"Hassanzadeh T.","year":"2011"},{"key":"S0218001420540300BIB014","doi-asserted-by":"publisher","DOI":"10.1142\/S021800141954003X"},{"key":"S0218001420540300BIB015","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1016\/j.asoc.2016.10.034","volume":"52","author":"Ishak A. B.","year":"2017","journal-title":"Appl. Soft Comput."},{"key":"S0218001420540300BIB016","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1504\/IJMIC.2012.046405","volume":"15","author":"Jiang Y.","year":"2012","journal-title":"Int. J. Model. Identif. Control"},{"key":"S0218001420540300BIB017","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001419540193"},{"key":"S0218001420540300BIB018","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/j.eswa.2018.09.008","volume":"116","author":"Merzban M. H.","year":"2019","journal-title":"Expert Syst. Appl."},{"key":"S0218001420540300BIB019","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.eswa.2019.04.050","volume":"133","author":"Mirghasemi S.","year":"2019","journal-title":"Expert Syst. Appl."},{"key":"S0218001420540300BIB020","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.advengsoft.2015.01.010","volume":"83","author":"Mirjalili S.","year":"2015","journal-title":"Adv. Eng. Softw."},{"key":"S0218001420540300BIB021","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"Mirjalili S.","year":"2016","journal-title":"Adv. Eng. Softw."},{"key":"S0218001420540300BIB022","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.knosys.2015.12.022","volume":"96","author":"Mirjalili S.","year":"2016","journal-title":"Knowl.-Based Syst."},{"key":"S0218001420540300BIB023","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1016\/j.asoc.2017.06.033","volume":"59","author":"Nematollahi A. F.","year":"2017","journal-title":"Appl. Soft Comput."},{"key":"S0218001420540300BIB024","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/s11760-017-1170-z","volume":"12","author":"Pare S.","year":"2018","journal-title":"SIViP"},{"key":"S0218001420540300BIB025","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.advengsoft.2017.01.004","volume":"105","author":"Saremi S.","year":"2017","journal-title":"Adv. Eng. Softw."},{"issue":"12","key":"S0218001420540300BIB026","doi-asserted-by":"crossref","first-page":"4788","DOI":"10.1109\/TIP.2013.2277832","volume":"22","author":"Sarkar S.","year":"2013","journal-title":"IEEE Trans. Image Process."},{"key":"S0218001420540300BIB027","doi-asserted-by":"crossref","first-page":"1285","DOI":"10.1007\/s00521-016-2645-5","volume":"29","author":"Satapathy S. C.","year":"2018","journal-title":"Neural Comput. Appl."},{"key":"S0218001420540300BIB028","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.asoc.2015.07.028","volume":"36","author":"Shareef H.","year":"2015","journal-title":"Appl. Soft Comput."},{"key":"S0218001420540300BIB029","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001419540089"},{"key":"S0218001420540300BIB030","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/4235.585893","volume":"1","author":"Wolpert D. H.","year":"1997","journal-title":"IEEE Trans. Evol. Comput."},{"key":"S0218001420540300BIB031","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1587\/transinf.2018EDP7132","volume":"102","author":"Yang L.","year":"2019","journal-title":"IEICE Trans. Inf. Syst."},{"key":"S0218001420540300BIB032","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.asoc.2016.07.016","volume":"48","author":"Zhao X.","year":"2016","journal-title":"Appl. Soft Comput."},{"key":"S0218001420540300BIB033","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s10044-018-00769-w","volume":"22","author":"Zhao L.","year":"2019","journal-title":"Pattern Anal. Appl."},{"key":"S0218001420540300BIB034","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001419570039"}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001420540300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T12:53:05Z","timestamp":1603457585000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218001420540300"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,11]]},"references-count":33,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["10.1142\/S0218001420540300"],"URL":"https:\/\/doi.org\/10.1142\/s0218001420540300","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"type":"print","value":"0218-0014"},{"type":"electronic","value":"1793-6381"}],"subject":[],"published":{"date-parts":[[2020,3,11]]}}}