<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232010000300004</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Computation of the Euler Number of a Binary Image Composed of Hexagonal Cells]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sossa-Azuela]]></surname>
<given-names><![CDATA[J. H.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cuevas-Jiménez]]></surname>
<given-names><![CDATA[E. V.]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Zaldivar-Navarro]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Instituto Politécnico Nacional (IPN) Centro de Investigación ]]></institution>
<addr-line><![CDATA[Mexico ]]></addr-line>
<country>MEXICO</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Universidad de Guadalajara Centro Universitario de Ciencias Exactas e Ingenierías (CUCEI) ]]></institution>
<addr-line><![CDATA[Guadalajara Jal]]></addr-line>
<country>MEXICO</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2010</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2010</year>
</pub-date>
<volume>8</volume>
<numero>3</numero>
<fpage>340</fpage>
<lpage>350</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232010000300004&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232010000300004&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232010000300004&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Most of the proposals to compute the Euler number of a binary image have been designed to work with images composed of squared cells. Only a few of these methods (in the case of images composed of hexagonal cells) have been reported in literature, although it is known that images composed of hexagonal cells do not suffer from the problems of connectivity frequently found in the case of images composed of squared cells. In this paper, a new way to compute the Euler number (E) of a binary image composed of hexagonal cells is presented. For this, the perimeter P of the isolated regions in the image, their contact perimeter Pc and the type T of a cell are used to obtain this important invariant. The proposal can be used alone or in combination with other features to describe any binary planar shape composed of hexagonal pixels for its further recognition.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[El principal objetivo de este trabajo es el presentar una nueva clase de controlador de tipo retroalimentado, el cual contiene en su estructura una forma polinomial del llamado error de control, el controlador propuesto es aplicado a un quimiostato sulfato-reductor, el cual pudiera ser usado para varios fines biotecnológicos, como la remoción de metales pesados en aguas residuales. El comportamiento a lazo cerrado del quimiostato considerado es teóricamente analizado y se prueba convergencia práctica a la trayectoria óptima seleccionada. La metodología propuesta es aplicada a un modelo cinético de una bacteria sulfato-reductora experimentalmente validado y experimentos numéricos complementarios muestran un comportamiento a lazo cerrado satisfactorio en comparación con otros controladores.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Binary image characterization]]></kwd>
<kwd lng="en"><![CDATA[Perimeter]]></kwd>
<kwd lng="en"><![CDATA[Contact Perimeter]]></kwd>
<kwd lng="en"><![CDATA[Euler number or genus]]></kwd>
<kwd lng="en"><![CDATA[Topological descriptor]]></kwd>
<kwd lng="en"><![CDATA[Topological invariant]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="center"><font face="verdana" size="4"><b>Computation of the Euler Number of a Binary Image Composed of Hexagonal Cells</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>J. H. Sossa&#150;Azuela*<sup>1</sup>, E. V. Cuevas&#150;Jim&eacute;nez<sup>2</sup>, D. Zaldivar&#150;Navarro<sup>2</sup></b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>1</sup> Centro de Investigaci&oacute;n en Computaci&oacute;n&#150;IPN, Av. Juan de Dios B&aacute;tiz, esquina con Miguel Oth&oacute;n de Mendiz&aacute;bal, Mexico City, C. P. 07738. MEXICO *E&#150;mail:</i> <a href="mailto:hsossa@cic.ipn.mx">hsossa@cic.ipn.mx</a></font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>2</sup> Centro Universitario de Ciencias Exactas e Ingenier&iacute;as (CUCEI), Universidad de Guadalajara Av. Revoluci&oacute;n 1500 Col. Ol&iacute;mpica C.P. 44430 Guadalajara, Jal, MEXICO.</i></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>ABSTRACT</b></font></p>     <p align="justify"><font face="verdana" size="2">Most of the proposals to compute the Euler number of a binary image have been designed to work with images composed of squared cells. Only a few of these methods (in the case of images composed of hexagonal cells) have been reported in literature, although it is known that images composed of hexagonal cells do not suffer from the problems of connectivity frequently found in the case of images composed of squared cells. In this paper, a new way to compute the Euler number <i>(E) </i>of a binary image composed of hexagonal cells is presented. For this, the perimeter <i>P </i>of the isolated regions in the image, their contact perimeter <i>P<sub>c</sub> </i>and the type <i>T </i>of a cell are used to obtain this important invariant. The proposal can be used alone or in combination with other features to describe any binary planar shape composed of hexagonal pixels for its further recognition.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> Binary image characterization, Perimeter, Contact Perimeter, Euler number or genus, Topological descriptor, Topological invariant.</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>RESUMEN</b></font></p>     <p align="justify"><font face="verdana" size="2">El principal objetivo de este trabajo es el presentar una nueva clase de controlador de tipo retroalimentado, el cual contiene en su estructura una forma polinomial del llamado error de control, el controlador propuesto es aplicado a un quimiostato sulfato&#150;reductor, el cual pudiera ser usado para varios fines biotecnol&oacute;gicos, como la remoci&oacute;n de metales pesados en aguas residuales. El comportamiento a lazo cerrado del quimiostato considerado es te&oacute;ricamente analizado y se prueba convergencia pr&aacute;ctica a la trayectoria &oacute;ptima seleccionada. La metodolog&iacute;a propuesta es aplicada a un modelo cin&eacute;tico de una bacteria sulfato&#150;reductora experimentalmente validado y experimentos num&eacute;ricos complementarios muestran un comportamiento a lazo cerrado satisfactorio en comparaci&oacute;n con otros controladores.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/jart/v8n3/v8n3a4.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b><i>References</i></b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; X. He and W. Jia (2005). Hexagonal Structure for Intelligent Vision, Information and Communication Technologies, ICICT, pp. 52&#150; 64.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824647&pid=S1665-6423201000030000400001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; R. C. Staunton (1989). The design of hexagonal sampling structures for image digitization and their use with local operators, Image Vision Computing, 7(3):162&#150;166.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824649&pid=S1665-6423201000030000400002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; L. Middleton and J. Sivaswamy (2005). Hexagonal Image Processing; A Practical Approach, Springer.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824651&pid=S1665-6423201000030000400003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; L. Middleton and J. Sivaswamy (2001). Edge Detection in a Hexagonal&#150;Image Processing Framework. Image and Vision Computing 19:1071&#150;1081.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824653&pid=S1665-6423201000030000400004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; A. Rosenfeld and A. C. Kak (1982). Digital Picture Processing, Academic Press Inc. New York.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824655&pid=S1665-6423201000030000400005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; R. C. Gonzalez and R. E. Woods (1993). Digital Image Processing, Addison&#150;Wesley, Reading, Massachussets.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824657&pid=S1665-6423201000030000400006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; S. D. Zenzo, L. Cinque and S. Levivaldi (1996). Run&#150;based algorithms for binary image analysis and processing, IEEE Transactions on PAMI, 18(1):83&#150;89.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824659&pid=S1665-6423201000030000400007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; H. S. Yang and S. Sengupta (1988). Intelligent shape recognition for complex industrial tasks, IEEE Control Systems Magazine 8(3):23&#150;29.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824661&pid=S1665-6423201000030000400008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; L. Snidaro and G. L. Foresti (2003). Real&#150;time Thresholding with Euler Numbers. Pattern Recognition Letters 24(9&#150;10):1533&#150;1544.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824663&pid=S1665-6423201000030000400009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; J. Athow, N. Abbasi and A. Amer (2009). A Real&#150;Time FPGA Architecture of a Modified Stable Euler&#150;Number Algorithm for Image Binarization. Technical Report 2009&#150;1&#150;ATHOW Department of Electrical and Computer Engineering, Concordia University. January 2009.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824665&pid=S1665-6423201000030000400010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; M. Vatsa, R, Singh, P. Mitra and A. Noore (2004). Signature Verification using Static and Dynamic Features (2004). ICONIP 2004. LNCS 3316. Springer&#150;Verlag, Pp. 350&#150;355.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824667&pid=S1665-6423201000030000400011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; Ch. Zhang, Z. Qiu and D. Sun and J. Wu (2006). Euclidean Quality Assessment for Binary Images. 18th International Conference on Pattern Recognition, ICPR 2006. Pp. 300&#150;303.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824669&pid=S1665-6423201000030000400012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; L. P. Wong and H. T. Ewe (2007). A Sutdy of Nodule Detection using Opaque Object Filter. Biomed 06. IFMBE Proceedings 15. Pp. 236&#150;240. Springer Verlag.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824671&pid=S1665-6423201000030000400013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; S. Dey, B.B. Bhattacharya, M.K. Kundu, T. Acharya (2000). A fast algorithm for computing the Euler number of an image and its VLSI implementation, in Proc. 13th International Conference on VLSI Design, pp. 330&#150;335.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824673&pid=S1665-6423201000030000400014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;15&#93; A. Bishnu, B. B. Bhattacharya, M. K. Kundu, C.A. Murthy, T. Acharya (2005). A pipeline architecture for computing the Euler number of a binary image. Journal of Systems Architecture 51(8):47&#150;487.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824675&pid=S1665-6423201000030000400015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;16&#93; A. Bishnu, B. B. Bhattacharya, M. K. Kundu, C.A. Murthy, T. Acharya (2001). On chip computation of Euler number of a binary image for efficient database search, Proc. of the International Conference on Image Processing (ICIP), Vol. III, pp. 310&#150;313.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824677&pid=S1665-6423201000030000400016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <p align="justify"><font face="verdana" size="2">&#91;17&#93; T. Acharya, B. B. Bhattacharya, A. Bishnu, M. K. Kundu, Ch. A. Murthy (2006). Computing the Euler Number of a Binary Image.  United States Patent 7027649 B1. April 11, 2006.</font></p>     ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;18&#93; Ch. R. Dyer (1980). Computing the Euler number of an image from its quatree. Comput. Vision, Graphics Image Process. 13, 270&#150;276.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824680&pid=S1665-6423201000030000400017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;19&#93; H. Samet et al. (1985). Computing Geometric Properties of Images Represented by Linear Quadtrees. IEEE Trans. PAMI, 7(2):229&#150;240.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824682&pid=S1665-6423201000030000400018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;20&#93; H. Beri (1987). Computing the Euler characteristic and related additive functionals of digital objects from their beentree representation, Comput. Vision, Graphics Image Process. 40, 115&#150;126.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824684&pid=S1665-6423201000030000400019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;21&#93; H. Beri and W. Nef (1984). Algorithms for the Euler characteristic and related additive functionals of digital objects, Comput. Vision, Graphics Image Process. 28, 166&#150;175.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824686&pid=S1665-6423201000030000400020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;22&#93; M. H. Chen and P. F. Yan (1988). A fast algorithm to calculate the Euler number for binary images, Pattern Recognition Letters 8(12):295&#150;297.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824688&pid=S1665-6423201000030000400021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;23&#93; F. Chiavetta and V. Di Ges&uacute; (1993). Parallel computation of the Euler number via connectivity graph, Pattern Recognition Letters 14(11):849&#150;859.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824690&pid=S1665-6423201000030000400022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;24&#93; W. Nagel, J. Ohser and K. Pischang (2000). An integral&#150;geometric approach for the Euler&#150;Poincare characteristic of spatial images. Journal of Microsc, 189:54&#150;62.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824692&pid=S1665-6423201000030000400023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;25&#93; LIN Xiaozhu, SHA Yun, JI Junwei &amp; WANG Yanmin (2006). A proof of image Euler Number formula. Science in China: Series F Information Sciences 49(3):364&#150;371.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824694&pid=S1665-6423201000030000400024&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;26&#93; J. L. D&iacute;az de Le&oacute;n S. and H. Sossa (1996). On the computation of the Euler number of a binary object. Pattern Recognition, 29(3):471&#150;476.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824696&pid=S1665-6423201000030000400025&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;27&#93; J. Serra (1982). Image Analysis and Mathematical Morphology, Academic Press.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824698&pid=S1665-6423201000030000400026&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;28&#93; E. Bribiesca (1997). Measuring 2&#150;D shape compactness using the contact perimeter, Computers Math. Applic. 33(11):1&#150;9.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4824700&pid=S1665-6423201000030000400027&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Acknowledgments</b></font></p>     <p align="justify"><font face="verdana" size="2">The authors wish to thank SIP&#150;IPN for the economical support under grant number 20100468. The authors also thank the European Union, the European Commission and CONACYT for their economical support. This paper has been prepared by economical support of the European Commission under grant FONCICYT 93829. The content of this paper is an exclusive responsibility of the IPN and the UDEG and it cannot be considered to reflect the position of the European Union. We also thank the reviewers for their comments to improve this paper.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b><a href="/img/revistas/jart/v8n3/html/a4a1.htm" target="_blank">Annex</a></b></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Jia]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hexagonal Structure for Intelligent Vision]]></source>
<year>2005</year>
<page-range>52- 64</page-range><publisher-name><![CDATA[Information and Communication Technologies]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Staunton]]></surname>
<given-names><![CDATA[R. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The design of hexagonal sampling structures for image digitization and their use with local operators]]></article-title>
<source><![CDATA[Image Vision Computing]]></source>
<year>1989</year>
<volume>7</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>162-166</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Middleton]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Sivaswamy]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hexagonal Image Processing; A Practical Approach]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Middleton]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Sivaswamy]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Edge Detection in a Hexagonal-Image Processing Framework]]></article-title>
<source><![CDATA[Image and Vision Computing]]></source>
<year>2001</year>
<volume>19</volume>
<page-range>1071-1081</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kak]]></surname>
<given-names><![CDATA[A. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Picture Processing]]></source>
<year>1982</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Academic Press Inc]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gonzalez]]></surname>
<given-names><![CDATA[R. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Woods]]></surname>
<given-names><![CDATA[R. E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Image Processing]]></source>
<year>1993</year>
<publisher-loc><![CDATA[^eMassachussets Massachussets]]></publisher-loc>
<publisher-name><![CDATA[Addison-Wesley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zenzo]]></surname>
<given-names><![CDATA[S. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Cinque]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Levivaldi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Run-based algorithms for binary image analysis and processing]]></article-title>
<source><![CDATA[IEEE Transactions on PAMI]]></source>
<year>1996</year>
<volume>18</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>83-89</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[H. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sengupta]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Intelligent shape recognition for complex industrial tasks]]></article-title>
<source><![CDATA[IEEE Control Systems Magazine]]></source>
<year>1988</year>
<volume>8</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>23-29</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Snidaro]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Foresti]]></surname>
<given-names><![CDATA[G. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Real-time Thresholding with Euler Numbers]]></article-title>
<source><![CDATA[Pattern Recognition Letters]]></source>
<year>2003</year>
<volume>24</volume>
<numero>9-10</numero>
<issue>9-10</issue>
<page-range>1533-1544</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Athow]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Abbasi]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Amer]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Real-Time FPGA Architecture of a Modified Stable Euler-Number Algorithm for Image Binarization]]></source>
<year>2009</year>
<publisher-name><![CDATA[Department of Electrical and Computer Engineering, Concordia University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vatsa]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Mitra]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Noore]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Signature Verification using Static and Dynamic Features]]></source>
<year>2004</year>
<page-range>350-355</page-range><publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zh]]></surname>
<given-names><![CDATA[Ch.]]></given-names>
</name>
<name>
<surname><![CDATA[Qiu]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Euclidean Quality Assessment for Binary Images]]></source>
<year>2006</year>
<conf-name><![CDATA[18 International Conference on Pattern Recognition]]></conf-name>
<conf-loc> </conf-loc>
<page-range>300-303</page-range><publisher-name><![CDATA[ICPR]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wong]]></surname>
<given-names><![CDATA[L. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Ewe]]></surname>
<given-names><![CDATA[H. T.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Sutdy of Nodule Detection using Opaque Object Filter]]></source>
<year>2007</year>
<page-range>236-240</page-range><publisher-name><![CDATA[Springer Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dey]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhattacharya]]></surname>
<given-names><![CDATA[B.B.]]></given-names>
</name>
<name>
<surname><![CDATA[Kundu]]></surname>
<given-names><![CDATA[M.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Acharya]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[A fast algorithm for computing the Euler number of an image and its VLSI implementation]]></source>
<year>2000</year>
<conf-name><![CDATA[13 International Conference on VLSI Design]]></conf-name>
<conf-loc> </conf-loc>
<page-range>330-335</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bishnu]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhattacharya]]></surname>
<given-names><![CDATA[B. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Kundu]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Murthy]]></surname>
<given-names><![CDATA[C.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Acharya]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A pipeline architecture for computing the Euler number of a binary image]]></article-title>
<source><![CDATA[Journal of Systems Architecture]]></source>
<year>2005</year>
<volume>51</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>47-487</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bishnu]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhattacharya]]></surname>
<given-names><![CDATA[B. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Kundu]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Murthy]]></surname>
<given-names><![CDATA[C.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Acharya]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[On chip computation of Euler number of a binary image for efficient database search]]></source>
<year>2001</year>
<volume>III</volume>
<conf-name><![CDATA[ Proc. of the International Conference on Image Processing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>310-313</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>18</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dyer]]></surname>
<given-names><![CDATA[Ch. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Computing the Euler number of an image from its quatree]]></article-title>
<source><![CDATA[Comput. Vision, Graphics Image Process]]></source>
<year>1980</year>
<volume>13</volume>
<page-range>270-276</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>19</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Samet]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Computing Geometric Properties of Images Represented by Linear Quadtrees]]></article-title>
<source><![CDATA[IEEE Trans. PAMI]]></source>
<year>1985</year>
<volume>7</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>229-240</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>20</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beri]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Computing the Euler characteristic and related additive functionals of digital objects from their beentree representation]]></article-title>
<source><![CDATA[Comput. Vision, Graphics Image Process]]></source>
<year>1987</year>
<volume>40</volume>
<page-range>115-126</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>21</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beri]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Nef]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Algorithms for the Euler characteristic and related additive functionals of digital objects]]></article-title>
<source><![CDATA[Comput. Vision, Graphics Image Process]]></source>
<year>1984</year>
<volume>28</volume>
<page-range>166-175</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[M. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[P. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A fast algorithm to calculate the Euler number for binary images]]></article-title>
<source><![CDATA[Pattern Recognition Letters]]></source>
<year>1988</year>
<volume>8</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>295-297</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>23</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chiavetta]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Di Gesú]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Parallel computation of the Euler number via connectivity graph]]></article-title>
<source><![CDATA[Pattern Recognition Letters]]></source>
<year>1993</year>
<volume>14</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>849-859</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>24</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nagel]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Ohser]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Pischang]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An integral-geometric approach for the Euler-Poincare characteristic of spatial images]]></article-title>
<source><![CDATA[Journal of Microsc]]></source>
<year>2000</year>
<volume>189</volume>
<page-range>54-62</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>25</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xiaozhu]]></surname>
<given-names><![CDATA[LIN]]></given-names>
</name>
<name>
<surname><![CDATA[Yun]]></surname>
<given-names><![CDATA[SHA]]></given-names>
</name>
<name>
<surname><![CDATA[Junwei]]></surname>
<given-names><![CDATA[JI]]></given-names>
</name>
<name>
<surname><![CDATA[Yanmin]]></surname>
<given-names><![CDATA[WANG]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A proof of image Euler Number formula]]></article-title>
<source><![CDATA[Science in China: Series F Information Sciences]]></source>
<year>2006</year>
<volume>49</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>364-371</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>26</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Díaz de León S.]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Sossa]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[On the computation of the Euler number of a binary object]]></article-title>
<source><![CDATA[Pattern Recognition]]></source>
<year>1996</year>
<volume>29</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>471-476</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>27</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Serra]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Image Analysis and Mathematical Morphology]]></source>
<year>1982</year>
<publisher-name><![CDATA[Academic Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<label>28</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bribiesca]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Measuring 2-D shape compactness using the contact perimeter]]></article-title>
<source><![CDATA[Computers Math. Applic.]]></source>
<year>1997</year>
<volume>33</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>1-9</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
