Skip to main content

Image morphological contour interpolation.

Project description

itk-morphologicalcontourinterpolation provides classes to perform image morphological contour interpolation. Please refer to: Zukić Dž., Vicory J., McCormick M., Wisse L., Gerig G., Yushkevich P., Aylward S. “nD Morphological Contour Interpolation”, Insight Journal, January-December 2016, http://hdl.handle.net/10380/3563.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distributions

itk_morphologicalcontourinterpolation-1.0.1-cp39-cp39-win_amd64.whl (336.1 kB view details)

Uploaded CPython 3.9 Windows x86-64

itk_morphologicalcontourinterpolation-1.0.1-cp39-cp39-macosx_10_9_x86_64.whl (1.3 MB view details)

Uploaded CPython 3.9 macOS 10.9+ x86-64

itk_morphologicalcontourinterpolation-1.0.1-cp38-cp38-win_amd64.whl (336.0 kB view details)

Uploaded CPython 3.8 Windows x86-64

itk_morphologicalcontourinterpolation-1.0.1-cp38-cp38-macosx_10_9_x86_64.whl (1.3 MB view details)

Uploaded CPython 3.8 macOS 10.9+ x86-64

itk_morphologicalcontourinterpolation-1.0.1-cp37-cp37m-win_amd64.whl (336.0 kB view details)

Uploaded CPython 3.7m Windows x86-64

itk_morphologicalcontourinterpolation-1.0.1-cp37-cp37m-macosx_10_9_x86_64.whl (1.3 MB view details)

Uploaded CPython 3.7m macOS 10.9+ x86-64

itk_morphologicalcontourinterpolation-1.0.1-cp36-cp36m-win_amd64.whl (335.7 kB view details)

Uploaded CPython 3.6m Windows x86-64

itk_morphologicalcontourinterpolation-1.0.1-cp36-cp36m-macosx_10_9_x86_64.whl (1.3 MB view details)

Uploaded CPython 3.6m macOS 10.9+ x86-64

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.1-cp39-cp39-win_amd64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.1-cp39-cp39-win_amd64.whl
Algorithm Hash digest
SHA256 3a5c860e85285b0a0acfef65c755d1d69b197ba39dc935bee354d18df2cc4351
MD5 a962cfe0f1510b0a9b756b5834e2c6b4
BLAKE2b-256 9c23e87a51644b89d9b7e2d54a1efde36e2ffc2f9f594f9117214a397238091f

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.1-cp39-cp39-manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.1-cp39-cp39-manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 be91d8b663ff455d6df6c56456fd97990fb818807f2aa63a32def52a27837f25
MD5 26e7bebc3b6009f6278ad39afd00ab4b
BLAKE2b-256 95b07cdab031c3b0b56b1ceb75b2aa0a00d754954374bf6b41e71dbc3a6ce036

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.1-cp39-cp39-macosx_10_9_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.1-cp39-cp39-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 f970437cf78db7fae063372c24b312ffde81e8ec90bb4e52834d10b1046c4564
MD5 6699c2b0c021feb8baed0e9ea91916e1
BLAKE2b-256 6276a799f4a456ca75a6dc6e181d222eef6cb42fb09e5c0e8927d2fc99b5d924

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.1-cp38-cp38-win_amd64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.1-cp38-cp38-win_amd64.whl
Algorithm Hash digest
SHA256 5e0363828a5e74e5e724bbfeb6fd465f602caa95ae4d476a3167ca0a0df06ca7
MD5 c93587eb7f851e0f00f32a4a3b130954
BLAKE2b-256 00d02a253dc4479f21d4211accbab635571ca31b4d0c27fec4dc230a0ec8f8a7

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.1-cp38-cp38-manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.1-cp38-cp38-manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 8b170d9a6e27291b181bd11700ec16379a57c0ff849aa0cb9595035cbebcd622
MD5 9f12ebada8feec39e1bf1f76e5ed33c3
BLAKE2b-256 23cfaf7d64bbeec7fec7ad6058ec5f3c870774561435dc22fec687f028aaeb82

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.1-cp38-cp38-macosx_10_9_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.1-cp38-cp38-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 5246905524a9486eda78527612621b181dc41c5cc55fd9d0d9c204145f5ca30d
MD5 9072410ff4017693e4faa71048654148
BLAKE2b-256 41cf135f120e844c9ff760612978db6b05e4d66b7d636a4eff36d366d615a9aa

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.1-cp37-cp37m-win_amd64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.1-cp37-cp37m-win_amd64.whl
Algorithm Hash digest
SHA256 ddae0c53d30c44a19fe852c025858ab678b477307b8fa110790e01a57108a1f2
MD5 4ce0d89d01f00a933469791acdd46e28
BLAKE2b-256 a0a97abcc7f2193d0e5cfca5b044e3e5b6a0e67cd5ff06bec282eadd5d239bee

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.1-cp37-cp37m-manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.1-cp37-cp37m-manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 94de590491a577cd4d49fdac31d6665303e49e68de66cd7ea136ad8b57bc1188
MD5 66f36140a5f3208783400d57f7b90929
BLAKE2b-256 400220615d0c1d48a95f79a5949ca14246e80a7660100e449b5c12068e218ca9

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.1-cp37-cp37m-macosx_10_9_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.1-cp37-cp37m-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 b134482e22d4b65e9274b6befc2c24c399ba72bb28b9c2ba62b0c05eff4c36d9
MD5 70159925808cb227afc8ebb30635fd5a
BLAKE2b-256 ca55f15ba432b7db9cce30379bd9822db067f3651a88ec1b9ac3a59bbecf8dd1

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.1-cp36-cp36m-win_amd64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.1-cp36-cp36m-win_amd64.whl
Algorithm Hash digest
SHA256 c8bcfefc62d6345254139775e5d1f063256e819bb72785e962ce3e5f494c541c
MD5 eef65617d5e8e5866baceae43906b426
BLAKE2b-256 31a6e145e250998f92b114a638bba2a2b0fc012b3257f6d4e9634f5e577af54b

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.1-cp36-cp36m-manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.1-cp36-cp36m-manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 e3f11477e0020f0f1f4ff64e67bd2469473672dba467c5cb628f5ed2ef9daa86
MD5 df72d6cd98b05574aa171fe707f693db
BLAKE2b-256 983356f0c581c187896e186eed1910f9bf304a8909f99c3ab726374f47f3bd78

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.1-cp36-cp36m-macosx_10_9_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.1-cp36-cp36m-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 bc516ff58ec743904a7d92881836238ae56c08cfa0df9f8665e011bce01c881e
MD5 88b53fc29afa47ec20bbfaf51c522754
BLAKE2b-256 f16bff84e6324ed1c67b2f44d09afd708fe1cd8ef094b5038758027de4110144

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page