<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462018000200387</article-id>
<article-id pub-id-type="doi">10.13053/cys-22-2-2944</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Segmentación de imágenes microscópicas con NSGA-II]]></article-title>
<article-title xml:lang="en"><![CDATA[Segmentation of Microscopic Images with NSGA-II]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ochoa-Montiel]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sánchez-López]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Carbajal-Gómez]]></surname>
<given-names><![CDATA[V.H.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Carrasco-Aguilar]]></surname>
<given-names><![CDATA[M.A.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Morales-López]]></surname>
<given-names><![CDATA[F.E.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Juárez-Guerra]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Autónoma de Tlaxcala  ]]></institution>
<addr-line><![CDATA[Apizaco ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2018</year>
</pub-date>
<volume>22</volume>
<numero>2</numero>
<fpage>387</fpage>
<lpage>412</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462018000200387&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462018000200387&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462018000200387&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: El presente trabajo aborda el problema de la segmentación multiobjetivo de imágenes microscópicas utilizando el algoritmo evolutivo NSGA-II. Durante el proceso de optimización se utilizan 2 funciones objetivo: la varianza entre-clase de Otsu y la entropía de Shannon. Un conjunto de 71 imágenes de células sanguíneas se incluyen en la fase de experimentación. A partir de éste conjunto se forman 3 categorías de imágenes: con preprocesamiento, sin preprocesamiento, y con ruido Gaussiano. Los resultados muestran que el uso de técnicas evolutivas multiobjetivo como NSGA-II, brindan resultados satisfactorios en la segmentación de más de una categoría de imágenes.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: This paper addresses the problem of multiobjective segmentation on microscopic images by using the evolutionary algorithm NSGA-II. Two objective functions are used at the optimization process: Otsu&#8217;s inter-class variance and Shannon&#8217;s entropy. A set of 71 images of blood cells are used. From this set, three categories of images are generated: with and without preprocessing, and images with Gaussian noise. Experimental results shown that the use of evolutionary multiobjective techniques like NSGA-II, give satisfactory results in the segmentation for more than one category of images.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Segmentación]]></kwd>
<kwd lng="es"><![CDATA[optimización evolutiva]]></kwd>
<kwd lng="es"><![CDATA[multiobjetivo]]></kwd>
<kwd lng="es"><![CDATA[imágenes microscópicas]]></kwd>
<kwd lng="en"><![CDATA[Segmentation]]></kwd>
<kwd lng="en"><![CDATA[multiobjective evolutionary optimization]]></kwd>
<kwd lng="en"><![CDATA[microscopic images]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Savkare]]></surname>
<given-names><![CDATA[S.S.]]></given-names>
</name>
<name>
<surname><![CDATA[Narote]]></surname>
<given-names><![CDATA[S.P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Blood Cell Segmentation from Microscopic Blood Images]]></source>
<year>2015</year>
<conf-name><![CDATA[ International Conference on Information Processing (ICIP)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>502-5</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castellanos-Beltrán]]></surname>
<given-names><![CDATA[L.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bautista-Rozo]]></surname>
<given-names><![CDATA[L.X.]]></given-names>
</name>
<name>
<surname><![CDATA[Hasbon-Reyes]]></surname>
<given-names><![CDATA[L.E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Computer Detection System for Red Blood Cells in Microscopy Images]]></article-title>
<source><![CDATA[Gerencia Tecnológica Informática]]></source>
<year>2012</year>
<volume>11</volume>
<numero>31</numero>
<issue>31</issue>
<page-range>15-24</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maza-Sastre]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ochoa-Montiel]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez-López]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Pérez-Corona]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Carrasco-Aguilar]]></surname>
<given-names><![CDATA[M.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Morales-López]]></surname>
<given-names><![CDATA[F.E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Identification of Trypanosoma with Digital Image Processing]]></source>
<year>2014</year>
<conf-name><![CDATA[ IEEE Central America and Panamá Convention (CONCAPAN XXXIV)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>134-7</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Coronel-Morán]]></surname>
<given-names><![CDATA[R.C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Importancia del laboratorio en el diagnóstico y pronóstico de leucemia aguda linfoblástica de la infancia]]></article-title>
<source><![CDATA[Acta Pediátrica de México]]></source>
<year>2005</year>
<volume>26</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>129-36</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pavón-Morán V.]]></surname>
<given-names><![CDATA[et al]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Leucemia mieloide crónica. Actualización en Citogenética y Biología Molecular]]></article-title>
<source><![CDATA[Instituto de Hematología e Inmunología]]></source>
<year>2005</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<collab>Guía de Práctica Clínica</collab>
<article-title xml:lang=""><![CDATA[Diagnóstico temprano y oportuno de Leucemia aguda en la infancia y adolescencia en el primer nivel de atención]]></article-title>
<source><![CDATA[Catálogo maestro de guías de práctica clínica]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haralick]]></surname>
<given-names><![CDATA[R.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Shapiro-Linda]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Image Segmentation Techniques]]></article-title>
<source><![CDATA[Computer Vision, Graphics and Image Processing]]></source>
<year>1985</year>
<volume>29</volume>
<page-range>110-32</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mukhopadhyay]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Maulik]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Bandyopadhyay]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multiobjective Genetic Clustering with En-semble Among Pareto Front Solutions: Application to MRI Brain Image Segmentation]]></source>
<year>2009</year>
<volume>51</volume>
<numero>1</numero>
<conf-name><![CDATA[ 2009 Seventh International Conference on Advances in Pattern Recognition]]></conf-name>
<conf-loc> </conf-loc>
<issue>1</issue>
<page-range>236-9</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Faceli]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Souto]]></surname>
<given-names><![CDATA[M.C.P.d.]]></given-names>
</name>
<name>
<surname><![CDATA[Carvalho]]></surname>
<given-names><![CDATA[A.C.P.L.F.d.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Strategy for the Selection of Solutions of the Pareto Front Approximation in Multi-objective Clustering Approaches]]></source>
<year>2008</year>
<conf-name><![CDATA[ 10th Brazilian Symposium on Neural Networks]]></conf-name>
<conf-loc> </conf-loc>
<page-range>27-32</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mishra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Majhi]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Sa]]></surname>
<given-names><![CDATA[P.K.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Survey on Automated Diagnosis on the Detection of Leukemia: A Hematological Disorder]]></source>
<year>2016</year>
<conf-name><![CDATA[ International Conference on Recent Advances in Information Technology (RAIT)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>460-6</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Poornima]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Karthikeyan]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on Image Processing Techniques used for Detection of Leukemic Cells]]></article-title>
<source><![CDATA[International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)]]></source>
<year>2016</year>
<volume>5</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>587-90</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bhattacharjee]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Saini]]></surname>
<given-names><![CDATA[L.M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Robust Technique for the Detection of Acute Lymphoblas-tic Leukemia]]></source>
<year>2015</year>
<conf-name><![CDATA[ IEEE Power, Communication and Information Technology Conference (PCITC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>657-62</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khobragade]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mor]]></surname>
<given-names><![CDATA[D.D.]]></given-names>
</name>
<name>
<surname><![CDATA[Patil]]></surname>
<given-names><![CDATA[C.Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Detection of Leukemia in Microscopic White Blood Cell Images]]></source>
<year>2015</year>
<conf-name><![CDATA[ International Conference on Information Processing (ICIP)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>435-40</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vaghela]]></surname>
<given-names><![CDATA[H.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Modi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Pandya]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Potdar]]></surname>
<given-names><![CDATA[M.B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Leukemia Detection using Digital Image Processing Techniques]]></article-title>
<source><![CDATA[International Journal of Applied Information Systems (IJAIS)]]></source>
<year>2015</year>
<volume>10</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>43-51</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haj-Hassan]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Chaddad]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tanougast]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Harkouss]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Comparison of Segmentation Techniques for Histopathological Images]]></source>
<year>2015</year>
<conf-name><![CDATA[ Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>80-5</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Deshmukh]]></surname>
<given-names><![CDATA[B.S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mankar]]></surname>
<given-names><![CDATA[V.H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Segmentation of Microscopic Images: A survey]]></source>
<year>2014</year>
<conf-name><![CDATA[ International Conference on Electronic Systems, Signal Processing and Computing Technologies (ICESC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>362-4</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Piuri]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Scotti]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Morphological Clasification of Blood Leucocytes by Microscope images]]></source>
<year>2004</year>
<conf-name><![CDATA[ IEEE International Conference on Compu-tational Intelligence for Measurement Systems and Applications (CIMSA)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>103-8</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Halim]]></surname>
<given-names><![CDATA[N.H.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mashor]]></surname>
<given-names><![CDATA[M.Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Nasir]]></surname>
<given-names><![CDATA[A.S.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mokhtar]]></surname>
<given-names><![CDATA[N.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosline]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Nucleus Segmentation Technique for Acute Leukemia]]></source>
<year>2011</year>
<conf-name><![CDATA[ IEEE 7th International Colloquium on Signal Processing and its Applications (CSPA 2011)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>192-7</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mohapatra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Patra]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Satpathi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Kernel Induced Rough c-means Clustering for Lymphocyte Image Segmentation]]></source>
<year>2012</year>
<conf-name><![CDATA[ 4th International Conference on Intelligent Human Computer Interaction (IHCI)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agaian]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Madhukar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Chronopoulos]]></surname>
<given-names><![CDATA[A.T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Automated Screening System for Acute Myelogenous Leukemia Detection in blood microscopic images]]></article-title>
<source><![CDATA[IEEE Systems Journal]]></source>
<year>2014</year>
<volume>8</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>995-1004</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singhal]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Local Binary Pattern for Automatic Detection of Acute Lymphoblastic Leukemia]]></source>
<year>2014</year>
<conf-name><![CDATA[ Twentieth National Conference on Communications (NCC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Raje]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Rangole]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Detection of Leukemia in Microscopic Images Using Image processing]]></source>
<year>2014</year>
<conf-name><![CDATA[ International Conference on Communications and Signal Processing (ICCSP)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>255-9</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Das]]></surname>
<given-names><![CDATA[B.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Jha]]></surname>
<given-names><![CDATA[K.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Dutta]]></surname>
<given-names><![CDATA[H.S.]]></given-names>
</name>
</person-group>
<source><![CDATA[A New Approach for Segmentation and Identification of Disease Affected Blood Cells]]></source>
<year>2014</year>
<conf-name><![CDATA[ International Conference on Intelligent Computing Applications (ICICA)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>208-12</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Subhan-Kaur]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Significant Analysis of Leukemic Cells Extraction and Detection Using KNN and Hough Transform Algorithm]]></article-title>
<source><![CDATA[International Journal of Computer Science Trends and Technology (IJCST)]]></source>
<year>2015</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Putzu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Di-Ruberto]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[White Blood Cells Identification and Classification from Leukemic Blood Image]]></source>
<year>2013</year>
<conf-name><![CDATA[ International Work-Conference on Bioinformatics and Biomedical Engineering (IWB-BIO 2013)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>99-108</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chatap]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Shibu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analysis of Blood Samples for Counting Leukemia Cells using Support Vector Machine and Nearest Neighbour]]></article-title>
<source><![CDATA[Journal of Computer Engineering (IOSR-JCE)]]></source>
<year>2014</year>
<volume>16</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>79-87</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bhamare]]></surname>
<given-names><![CDATA[M.G.]]></given-names>
</name>
<name>
<surname><![CDATA[Patil]]></surname>
<given-names><![CDATA[D.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Automatic Blood Cell Analysis by Using Digital Image Processing: A Preliminary Study]]></article-title>
<source><![CDATA[International Journal of Engineering Research Technology]]></source>
<year>2013</year>
<volume>2</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>3137-41</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chin]]></surname>
<given-names><![CDATA[N.S.]]></given-names>
</name>
<name>
<surname><![CDATA[Srisukkham]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Intelligent Decision Support System for leukaemia Diagnosis using Microscopic Blood Images]]></article-title>
<source><![CDATA[Scientific Reports]]></source>
<year>2015</year>
<volume>5</volume>
<numero>14938</numero>
<issue>14938</issue>
<page-range>1-14</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analysis of Leukemia Development based on Marrow Cell images]]></source>
<year>2011</year>
<conf-name><![CDATA[ 4th International Congress on Image and Signal Processing (CISP)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>95-9</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jabar]]></surname>
<given-names><![CDATA[F.H.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ismail]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Salam]]></surname>
<given-names><![CDATA[R.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hassan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Image Segmentation Using an Adaptive Clustering Technique for the Detection of Acute Leukemia Blood Cells Images]]></source>
<year>2013</year>
<conf-name><![CDATA[ International Conference on Advanced Computer Science Applications and Technologies (ACSAT)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>373-8</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ansha Beevi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Remya]]></surname>
<given-names><![CDATA[R.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Over-view on Acute Lymphocytic Leukemia Detection using Cell Image Segmentation]]></article-title>
<source><![CDATA[IOSR Journal of Computer Engineering (IOSR-JCE)]]></source>
<year>2014</year>
<volume>1</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>22-9</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Deb]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Agrawal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Pratap]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Meyarivan]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Fast and Elitist Multi-Objective Genetic Algorithm: NSGA-II]]></article-title>
<source><![CDATA[IEEE Transactions on Evolutionary Computation]]></source>
<year>2002</year>
<volume>6</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>182-97</page-range></nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Davies]]></surname>
<given-names><![CDATA[E.R]]></given-names>
</name>
</person-group>
<source><![CDATA[Computer &amp; Machine Vision: Theory Algorithms Practicalities]]></source>
<year>2012</year>
<edition>4th</edition>
<publisher-loc><![CDATA[UK ]]></publisher-loc>
<publisher-name><![CDATA[Elsevier]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sezgin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sankur]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Survey over image thresholding techniques and quantitative performance evaluation]]></article-title>
<source><![CDATA[Journal of Electronic Imaging]]></source>
<year>2004</year>
<volume>13</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>146-65</page-range></nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Glasbey]]></surname>
<given-names><![CDATA[C.A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Analysis of Histogram-based Thresholding Algorithm]]></article-title>
<source><![CDATA[CVGIP: Graph Models Image Process]]></source>
<year>1993</year>
<volume>55</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>532-7</page-range></nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pal]]></surname>
<given-names><![CDATA[N.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Pal]]></surname>
<given-names><![CDATA[S.K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Review on Image Segmentation Techniques]]></article-title>
<source><![CDATA[Pattern Recognition]]></source>
<year>1993</year>
<volume>9</volume>
<numero>26</numero>
<issue>26</issue>
<page-range>1277-94</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Otsu]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Threshold Selection Method from Gray-Level Histograms]]></article-title>
<source><![CDATA[IEEE Transactions on Systems Man and Cybernetics]]></source>
<year>1979</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>62-6</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pun]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Entropic Thresholding: A New Approach]]></article-title>
<source><![CDATA[Computer Vision, Graphics and Image Processing]]></source>
<year>1981</year>
<volume>16</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>210-39</page-range></nlm-citation>
</ref>
<ref id="B39">
<label>39</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cattaneo]]></surname>
<given-names><![CDATA[C.A. et al]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Métodos de Umbrali-zación de Imágenes Digitales Basados en Entropía de Shannon y Otros]]></article-title>
<source><![CDATA[Asociación Argentina de Mecánica Computacional]]></source>
<year>2011</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>2785-805</page-range></nlm-citation>
</ref>
<ref id="B40">
<label>40</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kittler]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Minimum Error Thresholding]]></article-title>
<source><![CDATA[Pattern Recognition]]></source>
<year>1986</year>
<volume>19</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>41-7</page-range></nlm-citation>
</ref>
<ref id="B41">
<label>41</label><nlm-citation citation-type="">
<collab>Repository of USC University of Southern California</collab>
<source><![CDATA[Signal and Image Processing Institute]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B42">
<label>42</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abraham]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jain]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Goldberg]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Evolutionary Multiobjective Optimization: Theoretical Advances and Applications]]></source>
<year>2005</year>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<label>43</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chin-Wei]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Rajeswari]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mutiobjective Optimization Approaches in Image Segmentation-The Directions and Challenges]]></article-title>
<source><![CDATA[International Journal of Advances in Soft Computing and its Applications]]></source>
<year>2010</year>
<volume>2</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>40-64</page-range></nlm-citation>
</ref>
<ref id="B44">
<label>44</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nakib]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Oulhadj]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Siarry]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Image Thresholding based on Pareto Multiobjective Optimization]]></article-title>
<source><![CDATA[Engineering Applications of Artificial Intelligence]]></source>
<year>2010</year>
<volume>23</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>313-20</page-range></nlm-citation>
</ref>
<ref id="B45">
<label>45</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Djerou]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Khelil]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Dehimi]]></surname>
<given-names><![CDATA[N.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Batouche]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Automatic Multi-Level Thresholding Segmentation Based on Multi-Objective Optimization]]></article-title>
<source><![CDATA[Journal of Applied Computer Science &amp; Mathematics]]></source>
<year>2012</year>
<volume>13</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B46">
<label>46</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nakib]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Oulhadj]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Siarry]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Image Histogram Threshold based on Multiobjective Optimization]]></article-title>
<source><![CDATA[Signal Processing]]></source>
<year>2007</year>
<volume>87</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>2516-34</page-range></nlm-citation>
</ref>
<ref id="B47">
<label>47</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nakib]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Oulhadj]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Siarry]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Non-Supervised Image Segmentation based on Multiobjective Optimization]]></article-title>
<source><![CDATA[Pattern Recognition Letters]]></source>
<year>2008</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>161-72</page-range></nlm-citation>
</ref>
<ref id="B48">
<label>48</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arulraj]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Nakib]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Cooren]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Siarry]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multicriteria Image Thresholding Based on Multiobjective Particle Swarm Optimization]]></article-title>
<source><![CDATA[Journal of Applied Mathematical Sciences]]></source>
<year>2014</year>
<volume>8</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>131-7</page-range></nlm-citation>
</ref>
<ref id="B49">
<label>49</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Periasamy]]></surname>
<given-names><![CDATA[K.R]]></given-names>
</name>
</person-group>
<source><![CDATA[Multiobjective Optimization Based Image Segmentation: Method and Applications]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Singapour ]]></publisher-loc>
<publisher-name><![CDATA[Dept. Chemical &amp; Biomolec. Eng., Singapour Nat. Univ.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<label>50</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ochoa]]></surname>
<given-names><![CDATA[M.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[L.C.]]></given-names>
</name>
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[B.J.A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Thresholding of Biological Images by using Evolutionary Algorithms]]></source>
<year>2015</year>
<conf-name><![CDATA[ 2nd. Latin-American Congress on Computational Intelligence &amp; 21Âo. Congresso Brasileiro de Inteligencia Computacional. LA-CCI &amp; CBIC 2015]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B51">
<label>51</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reyes-Sierra]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Coello-Coello]]></surname>
<given-names><![CDATA[C.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multi-objective Particle Swarm Optimizers: A Survey of State of the Art.]]></article-title>
<source><![CDATA[International Journal of Computational Intelligence Research]]></source>
<year>2006</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>287-308</page-range></nlm-citation>
</ref>
<ref id="B52">
<label>52</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Santiago]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Fraire]]></surname>
<given-names><![CDATA[H.J. et al.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey of Descomposition Methods for Multi-objective Optimization]]></article-title>
<source><![CDATA[Recent Advances on Hybrid Approaches for Designing Intelligent Systems]]></source>
<year>2014</year>
<volume>547</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>453-65</page-range></nlm-citation>
</ref>
<ref id="B53">
<label>53</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Branke]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Deb]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Miettinen]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Slowi&#324;ski]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multiobjective Optimization: Interactive and Evolutionary Approaches]]></source>
<year>2008</year>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B54">
<label>54</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sudeng]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wattanapongsakorn]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Finding Knee Solutions in Multiobjective Optimization using Extended Angle Dominane Approach]]></article-title>
<source><![CDATA[Information Science and Applications. Lecture Notes in Electrical Engineering]]></source>
<year>2015</year>
<volume>339</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>673-9</page-range><publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B55">
<label>55</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zio]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Bazzo]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A comparison of Methods for Selecting Preferred Solutions in Multiobjective Decision Making]]></article-title>
<source><![CDATA[Computational Intelligence Systems in Industrial Engineering]]></source>
<year>2012</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>23-43</page-range><publisher-name><![CDATA[Atlantis Computational Intelligence Systems]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B56">
<label>56</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haralick]]></surname>
<given-names><![CDATA[R.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Shapiro]]></surname>
<given-names><![CDATA[L.M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Image Seg-mentation Techniques]]></article-title>
<source><![CDATA[Computer Vision, Graphics and Image Processing]]></source>
<year>1985</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>110-32</page-range></nlm-citation>
</ref>
<ref id="B57">
<label>57</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ng]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Automatic thresholding for defect detection]]></article-title>
<source><![CDATA[Pattern Recognition Letters]]></source>
<year>2006</year>
<volume>27</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1644-9</page-range></nlm-citation>
</ref>
<ref id="B58">
<label>58</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Park]]></surname>
<given-names><![CDATA[R.H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comments on an optimal multiple threshold scheme for image segmentation]]></article-title>
<source><![CDATA[IEEE Transactions on Systems, Man, and Cybernetics]]></source>
<year>2002</year>
<volume>20</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>741-2</page-range></nlm-citation>
</ref>
<ref id="B59">
<label>59</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fukunage]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Introduction to Statistical Pattern Recognition]]></source>
<year>1972</year>
<page-range>260-7</page-range><publisher-name><![CDATA[New York Academic]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B60">
<label>60</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shannon]]></surname>
<given-names><![CDATA[C.E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Mathematical Theory of Communication]]></article-title>
<source><![CDATA[The Bell System Technical Journal]]></source>
<year>1948</year>
<volume>27</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>379-623-656</page-range></nlm-citation>
</ref>
<ref id="B61">
<label>61</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pun]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A new method for gray-level picture threshold using the entropy of the histogram]]></article-title>
<source><![CDATA[Signal Processing]]></source>
<year>1980</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>223-37</page-range></nlm-citation>
</ref>
<ref id="B62">
<label>62</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kapur]]></surname>
<given-names><![CDATA[J.N.]]></given-names>
</name>
<name>
<surname><![CDATA[Sahoo]]></surname>
<given-names><![CDATA[P.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Wong]]></surname>
<given-names><![CDATA[A.K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A new method for gray-level picture thresholding using the entropy of the histogram]]></article-title>
<source><![CDATA[Graphics Models Image Process]]></source>
<year>1985</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>273-85</page-range></nlm-citation>
</ref>
<ref id="B63">
<label>63</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yen]]></surname>
<given-names><![CDATA[J.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[F.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A new criterion for automatic multilevel thresholding]]></article-title>
<source><![CDATA[IEEE Transactions on Image Processing]]></source>
<year>1995</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>370-8</page-range></nlm-citation>
</ref>
<ref id="B64">
<label>64</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sahoo]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Wilkins]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Yeager]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Threshold selection using Renyi&#8217;s entropy]]></article-title>
<source><![CDATA[Pattern Recognition]]></source>
<year>1997</year>
<volume>30</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>71-84</page-range></nlm-citation>
</ref>
<ref id="B65">
<label>65</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[C.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[C.K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Minimum cross-entropy thresholding]]></article-title>
<source><![CDATA[Pattern Recognition]]></source>
<year>1993</year>
<volume>26</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>617-25</page-range></nlm-citation>
</ref>
<ref id="B66">
<label>66</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[C.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Tam]]></surname>
<given-names><![CDATA[P.K.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An iterative algorithm for minimum cross-entropy thresholding]]></article-title>
<source><![CDATA[Pattern Recognition Letters]]></source>
<year>1998</year>
<volume>19</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>771-6</page-range></nlm-citation>
</ref>
<ref id="B67">
<label>67</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brink]]></surname>
<given-names><![CDATA[A.D.]]></given-names>
</name>
<name>
<surname><![CDATA[Pendock]]></surname>
<given-names><![CDATA[N.E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Minimum cross entropy threshold selection]]></article-title>
<source><![CDATA[Pattern Recognition]]></source>
<year>1996</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>179-88</page-range></nlm-citation>
</ref>
<ref id="B68">
<label>68</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pal]]></surname>
<given-names><![CDATA[N.R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[On minimum cross-entropy thresholding]]></article-title>
<source><![CDATA[Pattern Recognition]]></source>
<year>1996</year>
<volume>29</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>575-80</page-range></nlm-citation>
</ref>
<ref id="B69">
<label>69</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cheng]]></surname>
<given-names><![CDATA[H.D.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel fuzzy entropy approach to image enhancement and thresholding]]></article-title>
<source><![CDATA[Signal Processing]]></source>
<year>1999</year>
<volume>75</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>277-301</page-range></nlm-citation>
</ref>
<ref id="B70">
<label>70</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shanbag]]></surname>
<given-names><![CDATA[A.G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Utilization of information measure as a means of image thresholding]]></article-title>
<source><![CDATA[Computing Vision on Graphics Image Processing]]></source>
<year>1994</year>
<volume>56</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>414-9</page-range></nlm-citation>
</ref>
<ref id="B71">
<label>71</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Johannsen]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Bille]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[A threshold selection method using information measures]]></source>
<year>1982</year>
<conf-name><![CDATA[ ICPR&#8217;82: Proceedings of the 6th International Conference Pattern Recognition]]></conf-name>
<conf-loc> </conf-loc>
<page-range>140-3</page-range></nlm-citation>
</ref>
<ref id="B72">
<label>72</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pal]]></surname>
<given-names><![CDATA[S.K]]></given-names>
</name>
<name>
<surname><![CDATA[King]]></surname>
<given-names><![CDATA[R.A]]></given-names>
</name>
<name>
<surname><![CDATA[Hashim]]></surname>
<given-names><![CDATA[A.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Automatic gray level thresholding through index of fuzziness and entropy]]></article-title>
<source><![CDATA[Pattern Recognition Letters]]></source>
<year>1980</year>
<volume>1</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>141-6</page-range></nlm-citation>
</ref>
<ref id="B73">
<label>73</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De la Escalera]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Visión por Computador, Fundamentos y Métodos]]></source>
<year>2001</year>
<publisher-name><![CDATA[Prentice Hall]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
