{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:51:15Z","timestamp":1770277875134,"version":"3.49.0"},"reference-count":16,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T00:00:00Z","timestamp":1561680000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2019,10,25]]},"abstract":"<jats:p>This paper reprocesses the information of the boundary intelligent contour so as to effectively extract the codes of image contour features. The algorithm based on the coordinates of contour extracted through the level set evolution algorithm is used to obtain several 2D contour matrixes with the same size after repeated conversions. Moreover, the matrixes are diagonally, column-wise and horizontally coded to obtain new coded features. The anti-interference analysis of algorithm indicates that the algorithm of extracting feature code has variable and flexible extraction schemes and high stability. Distinguishable information can be obtained in similar images more easily. In order to prove the validity of the proposed algorithm, feature code exaction algorithm is used to facial expression recognition, and a facial expression recognition model on the basis of facial part contour code exaction is established. According to the experimental results, this facial expression recognition system can eliminate the interference with recognition resulted from the similarity of samples. The comprehensive recognition rate of facial expression is up to 97.20%.<\/jats:p>","DOI":"10.3233\/jifs-179314","type":"journal-article","created":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T10:43:25Z","timestamp":1562064205000},"page":"4785-4795","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["A study on the intelligent application of the code and the contour of the image feature"],"prefix":"10.1177","volume":"37","author":[{"given":"Yongfen","family":"Wu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China"},{"name":"College of Command Information and System, PLA University of Science and Technology, Nanjing, China"},{"name":"International Riphah University, Islamabad, Pakistan"}]}],"member":"179","published-online":{"date-parts":[[2019,6,28]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.02.013"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.3732\/apps.1200005"},{"key":"e_1_3_1_4_2","first-page":"2048","article-title":"Coronal loop detection from solar images and extraction of salient contour groups from cluttered[J]","volume":"87","author":"Durak","year":"2015","unstructured":"Durak, Nurcan, Coronal loop detection from solar images and extraction of salient contour groups from cluttered[J], Journal of Medical Virology 87 (2015), 2048\u20132053.","journal-title":"Journal of Medical Virology"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00224-3"},{"key":"e_1_3_1_6_2","first-page":"509","article-title":"An Extended Phase Field Higher-Order Active Contour Model for Networks and Its Application to Road Network Extraction from VHR Satellite Images[J]","volume":"88","author":"Peng Ting","year":"2009","unstructured":"PengTing, IanH., PrinetV\u00e9ronique et al., An Extended Phase Field Higher-Order Active Contour Model for Networks and Its Application to Road Network Extraction from VHR Satellite Images[J], International Journal of Computer Vision 88 (2009), 509\u2013520.","journal-title":"International Journal of Computer Vision"},{"key":"e_1_3_1_7_2","first-page":"573","article-title":"Method for extraction of a characteristic feature of a contour image[J]","volume":"29","author":"Niedziela T.","year":"1999","unstructured":"NiedzielaT., Method for extraction of a characteristic feature of a contour image[J], Optica Applicata 29 (1999), 573\u2013581.","journal-title":"Optica Applicata"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.09.008"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-002-1483-z"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/42.585762"},{"key":"e_1_3_1_11_2","first-page":"482","article-title":"Contour Extraction of Skin Tumors Using Visual Attention and GVF-Snake Model[J]","volume":"10","author":"Ma L.","year":"2015","unstructured":"MaL., SuT., Contour Extraction of Skin Tumors Using Visual Attention and GVF-Snake Model[J], Engineering 10 (2015), 482\u2013486.","journal-title":"Engineering"},{"key":"e_1_3_1_12_2","first-page":"22","article-title":"Automatic Lip-Contour Extraction and Mouth-Structure Segmentation in Images[J]","volume":"13","author":"G\u00f3mezmendoza J.B.","year":"2011","unstructured":"G\u00f3mezmendozaJ.B., PrietoF., RedarceT., Automatic Lip-Contour Extraction and Mouth-Structure Segmentation in Images[J], Computing in Science & Engineering 13 (2011), 22\u201330.","journal-title":"Computing in Science"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2012.07.005"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6416(19980730)124:2<29::AID-EEJ4>3.0.CO;2-Q"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9596-7"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1186\/2192-1962-3-12"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.11.011"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179314","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-179314","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:54:22Z","timestamp":1770231262000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-179314"}},"subtitle":[],"editor":[{"given":"Valentina E.","family":"Balas","sequence":"additional","affiliation":[]},{"given":"Jer Lang","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Tsung-Chih","family":"Lin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,6,28]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,10,25]]}},"alternative-id":["10.3233\/JIFS-179314"],"URL":"https:\/\/doi.org\/10.3233\/jifs-179314","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,28]]}}}