Skip to main content

Interslice interpolations of label images based on their morphology .

Project description

ITK is an open-source, cross-platform library that provides developers with an extensive suite of software tools for image analysis. This package implements morphological contour interpolation. For more information, see Zukić D., Vicory J., McCormick M., Wisse L., Gerig G., Yushkevich P., Aylward S. “ND Morphological Contour Interpolation” http://insight-journal.org/browse/publication/977 http://hdl.handle.net/10380/3563

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distributions

itk_morphologicalcontourinterpolation-1.0.0-cp36-cp36m-win_amd64.whl (366.1 kB view details)

Uploaded CPython 3.6m Windows x86-64

itk_morphologicalcontourinterpolation-1.0.0-cp36-cp36m-macosx_10_6_x86_64.whl (604.2 kB view details)

Uploaded CPython 3.6m macOS 10.6+ x86-64

itk_morphologicalcontourinterpolation-1.0.0-cp35-cp35m-win_amd64.whl (366.2 kB view details)

Uploaded CPython 3.5m Windows x86-64

itk_morphologicalcontourinterpolation-1.0.0-cp35-cp35m-macosx_10_6_x86_64.whl (604.2 kB view details)

Uploaded CPython 3.5m macOS 10.6+ x86-64

itk_morphologicalcontourinterpolation-1.0.0-cp34-cp34m-macosx_10_6_x86_64.whl (604.2 kB view details)

Uploaded CPython 3.4m macOS 10.6+ x86-64

itk_morphologicalcontourinterpolation-1.0.0-cp27-cp27m-win_amd64.whl (382.7 kB view details)

Uploaded CPython 2.7m Windows x86-64

itk_morphologicalcontourinterpolation-1.0.0-cp27-cp27m-macosx_10_6_x86_64.whl (604.6 kB view details)

Uploaded CPython 2.7m macOS 10.6+ x86-64

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.0-cp36-cp36m-win_amd64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.0-cp36-cp36m-win_amd64.whl
Algorithm Hash digest
SHA256 156abed0c8584c7b4ddb1f125b83d1510032ea83aa3d559e7d20c6b5d6f0b96b
MD5 4c3542f97518c00c890a085718692e90
BLAKE2b-256 c17390b1ee831d984b4a71fb67f96a0a402491d83094b5272b326b9d94c50b15

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.0-cp36-cp36m-manylinux1_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.0-cp36-cp36m-manylinux1_x86_64.whl
Algorithm Hash digest
SHA256 a9e90a611ca97b551a27cd3390fa65cf794b25ae99057f8b7a92b900da9e4ae0
MD5 7dfab493b870af71062e5e30c5137a8c
BLAKE2b-256 0c237bc5391d294088735a3ec1d79e31cc5770c2bd507de832a3fa2b80e673ad

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.0-cp36-cp36m-macosx_10_6_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.0-cp36-cp36m-macosx_10_6_x86_64.whl
Algorithm Hash digest
SHA256 5f26e455e703d868953d4d3aae6d8f8fd7a876fc4a221b877238ad25199fc69e
MD5 769852d879d982d769871a866688a565
BLAKE2b-256 402ad2b91947d237a198095163fe0cfc36d1bbb7fb733d4f103cb001be23b3b7

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.0-cp35-cp35m-win_amd64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.0-cp35-cp35m-win_amd64.whl
Algorithm Hash digest
SHA256 b782960e0a66427f8e401c006046dd24c2f11badc0ea9e7750aa536d46a46671
MD5 3f280c05217d7a9b42400921f8320e9d
BLAKE2b-256 cac35ff6bafb6edecaa4328deca6f50eb05a61dafb31bf569b80186c83a0576b

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.0-cp35-cp35m-manylinux1_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.0-cp35-cp35m-manylinux1_x86_64.whl
Algorithm Hash digest
SHA256 767b30bcbde96905e623d762ffe702a5bb78b47cafaf0b3ce2fbd78845039f77
MD5 f4941b373b0b1d4e08f0398c10941a74
BLAKE2b-256 f48a57debea01b2c1055a9db6d293b07b0710e720cb2acc5393ff61c5663f6d6

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.0-cp35-cp35m-macosx_10_6_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.0-cp35-cp35m-macosx_10_6_x86_64.whl
Algorithm Hash digest
SHA256 dba25e13513bd9929abb0609b0f44702cf677c1bf9a6916f5148c6bddca62c16
MD5 572b11a0aa830d22e5557db39b781601
BLAKE2b-256 e78b727604fc09339cf192fe37ce2e831729d1c2df68b0dfd1fbaa3e42f118a5

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.0-cp34-cp34m-manylinux1_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.0-cp34-cp34m-manylinux1_x86_64.whl
Algorithm Hash digest
SHA256 633b16a5938791fbed12b1efbf0b5504025b66be5c7b6563404eedbf3f659289
MD5 b29f94cc2ed8b00e6ff0f4235ed3a76f
BLAKE2b-256 27d1152208a4739b843f995d633ef439bae4d680b8b679aa90bfb4b885e8df2f

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.0-cp34-cp34m-macosx_10_6_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.0-cp34-cp34m-macosx_10_6_x86_64.whl
Algorithm Hash digest
SHA256 98f7f7d80d5bcb6e432e49ddf6e62fde41def2cb41d8a7db9f82da6746d01b4b
MD5 bcf520b341b7602491051e801395358e
BLAKE2b-256 0bb8ff47b54f020f1c2c571c3432c735f76a2222dcd3d8a19cf53f82d2a1d8b2

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.0-cp27-cp27mu-manylinux1_x86_64.whl
Algorithm Hash digest
SHA256 feffec088faa9ab72fee5bf2c8b7f8c007fb026d8aebad92fa9952456729e2df
MD5 7cdcc79665ce60627b484805e75a3dab
BLAKE2b-256 8ae962c73892d474f75a1a85a510129aeaeedf91a0283072be319edcf183256d

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.0-cp27-cp27m-win_amd64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.0-cp27-cp27m-win_amd64.whl
Algorithm Hash digest
SHA256 44f2295814829e8a85171e2d9ffeafabcae983bb3596dc1af3ed73300259a3ee
MD5 29adbf369e4afe0b5daf4701c1a19371
BLAKE2b-256 3ea80d9f711d996ea53dc5b7d36431bb5bb04b4b57d54ed0121f56203099a58f

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.0-cp27-cp27m-manylinux1_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.0-cp27-cp27m-manylinux1_x86_64.whl
Algorithm Hash digest
SHA256 33a46798d6650adb9ffbbf893d8b62ee7a1c0173030a9f3e65d50dd830048f13
MD5 904ec7444e347ba5b74a7432120ee1c4
BLAKE2b-256 6a78cae2d00ab1d61dac31464b23a1fad780e46f8cc994fe042da42c2b06bac1

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.0-cp27-cp27m-macosx_10_6_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.0-cp27-cp27m-macosx_10_6_x86_64.whl
Algorithm Hash digest
SHA256 09a70348c0140a142e8607b758e3501355049244785158b09b279c235df7a5d4
MD5 2c5184b7c6a15ea9bc5b54708bd7ed9b
BLAKE2b-256 409be45d1c078ff18bddb9a40eb2feaebc55ffcd4e49a062528928de071ecb0d

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page