Image morphological contour interpolation.
Project description
itk-morphologicalcontourinterpolation provides classes to perform image morphological contour interpolation. Please refer to: Zukić Dž., Vicory J., McCormick M., Wisse L., Gerig G., Yushkevich P., Aylward S. “nD Morphological Contour Interpolation”, Insight Journal, January-December 2016, https://hdl.handle.net/10380/3563.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distributions
No source distribution files available for this release.See tutorial on generating distribution archives.
Built Distributions
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp311-cp311-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 416271e7d62103482bae2beb5fb70027c8715ca563564b5fd511cebad9e1658c |
|
MD5 | 3c39e11c2465800bff2cde537623522e |
|
BLAKE2b-256 | 7846fb5c026d3dcba9007dc88d12f82957250f9a7f149e7c62a5c35e38858a8d |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp311-cp311-manylinux_2_28_x86_64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 884d154abdfb85ccfa57661a0f3a3bbaacdf6baadfa525ed263afcb03d5339bf |
|
MD5 | bb02d3fc4ac5a82f310c4a2b96b208a7 |
|
BLAKE2b-256 | 2dd5e4d55930071212b0d9a8f6427ec05af0306b9ac396edeb3cf3a76ca130da |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp311-cp311-macosx_10_9_x86_64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 1de7e1b5b906a337e86a95baebf0a2dd3d0158c60de69187db06d6a0bfd6c866 |
|
MD5 | c4139dcc7696edde452c171cad961794 |
|
BLAKE2b-256 | f432791087ddd14e09adbd2991b5c0ac0efc1146d008181c43b44b51bcfceea0 |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp310-cp310-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 9fdf08d85151aa3e8ae45cc86e7fb219f1e3dc9770c6b4ca76965813e480cc7d |
|
MD5 | 36b7dc4fd53da5efec5b8bb6f950c4e2 |
|
BLAKE2b-256 | 13527ec6efc63d29ccd9740b0c380898cc4de72cf49b2fd585c0d47238cfedaf |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp310-cp310-manylinux_2_28_x86_64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 8b979df4b3ebe7568b376d4575f4724a07a2d53a634ad5ce1ca4dcc19e1e4157 |
|
MD5 | 6136d3b5feaccfd2ed7fa2363628df25 |
|
BLAKE2b-256 | 10ed59d9b06e583dadad1d92d21bee650e46a1537b1b15f7d0bdf2e34ddad3e2 |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp310-cp310-macosx_10_9_x86_64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 71232f88f6434b6d6d129a7dfd671a607fcf6afa4251c1c50d2ce8f9229556a8 |
|
MD5 | 2bbe9286def46f18f18db6cff3a4c160 |
|
BLAKE2b-256 | 18421cbd8926fdcf6286a9d6593ada2a5b8f4d81a5de1d29cfb0c8d47e90eb2a |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp39-cp39-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 44da361a357842751b0ca3fe8b6b3f6bce74ed5c8a5639d73a505369d1a50a71 |
|
MD5 | a5a80109956b189ffd0852a37059a6df |
|
BLAKE2b-256 | 13edbec010226c164568097a7e7dbbd97ff8cc81135649c47822c064923b8ece |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp39-cp39-manylinux_2_28_x86_64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 1de11a2de8282298fc70f3f934a3781f0f53c118e9cf87232a3a6e95dd33c0f6 |
|
MD5 | 2a27388d1d0c726d14b992123e823db3 |
|
BLAKE2b-256 | 09ce22de32906d4b1370ab4292de3aae7a822f06648fba7c64a1ae1d5099dc88 |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp39-cp39-macosx_10_9_x86_64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | be04cf3acc220bbdac4e59f7abfe740d3f9e1b126acf481caf115a554766d2b4 |
|
MD5 | bf083678f855baa902119dafdd3ee659 |
|
BLAKE2b-256 | 3079c2fc58954f51c78283aff190218bafa649c7ee6f68dff1850a8432e31d29 |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp38-cp38-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 6fd7b92106d84a3dea4e0629c216420cbbd9a4dc6dea2fef9b1f1fdeab955e40 |
|
MD5 | c229459051e6d533a2ec76cf871e0646 |
|
BLAKE2b-256 | 4e8ebbc9b0fc70e5935f1b6665a4903280043759d1b925cfb5b2725b3b793045 |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp38-cp38-manylinux_2_28_x86_64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | dc1339c7788c658a4777e55017cd46a76ceee242c93d4655aac764ac8d0cc348 |
|
MD5 | 1d310a3b43ec1ac51213dab42c199e2c |
|
BLAKE2b-256 | 71146965fee53496d02a25d46cc865e228a6114568213cfb2edbb0fb6246be9e |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp38-cp38-macosx_10_9_x86_64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 8fc0e8ceb1dbf9d781ee74a7e5667bcf089b6b4c47841b0b993a21f876989160 |
|
MD5 | 46f2e868566a315ed2a39185072bf43b |
|
BLAKE2b-256 | 081b93563837c6976f9a282a485d1402581a03feee69fcd0a01756be41994e13 |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp37-cp37m-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | c5434200dada9f9d8f2866120a4b16f80fb2b1afb3e820f63a36112e8dda6963 |
|
MD5 | 3383b2af896f7c042ac93349de640db6 |
|
BLAKE2b-256 | 6c8d85bb55cde86d77cf12b894a91c889b8bacfc0ad55e0677a9220de6163574 |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp37-cp37m-manylinux_2_28_x86_64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | d04169d5d98063d2f74bf698c83a62e0e0cb8b8ea5725882040b5b237a35e3f2 |
|
MD5 | f32e181aff381074031b35145fafb294 |
|
BLAKE2b-256 | a6ba7fe320cd8fec185ca5e5ed57c81d024f2db16eb08d9660b32a2cb7df077c |
Close
Hashes for itk_morphologicalcontourinterpolation-1.1.0-cp37-cp37m-macosx_10_9_x86_64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | aa052660eab539aea64553d7ddc2774688f6800492f19c3de42e93cb0bd853cf |
|
MD5 | 3d6411ecdb0200ed884d9ab1b36dca23 |
|
BLAKE2b-256 | c79e121aa490fa31704aba378ef701d04a11375017bf18bae5e870e1f33da4a8 |