Skip to main content

Image morphological contour interpolation.

Project description

itk-morphologicalcontourinterpolation provides classes to perform image morphological contour interpolation. Please refer to: Zukić Dž., Vicory J., McCormick M., Wisse L., Gerig G., Yushkevich P., Aylward S. “nD Morphological Contour Interpolation”, Insight Journal, January-December 2016, http://hdl.handle.net/10380/3563.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distributions

itk_morphologicalcontourinterpolation-1.0.2-cp39-cp39-win_amd64.whl (339.4 kB view details)

Uploaded CPython 3.9 Windows x86-64

itk_morphologicalcontourinterpolation-1.0.2-cp39-cp39-macosx_10_9_x86_64.whl (1.3 MB view details)

Uploaded CPython 3.9 macOS 10.9+ x86-64

itk_morphologicalcontourinterpolation-1.0.2-cp38-cp38-win_amd64.whl (339.3 kB view details)

Uploaded CPython 3.8 Windows x86-64

itk_morphologicalcontourinterpolation-1.0.2-cp38-cp38-macosx_10_9_x86_64.whl (1.3 MB view details)

Uploaded CPython 3.8 macOS 10.9+ x86-64

itk_morphologicalcontourinterpolation-1.0.2-cp37-cp37m-win_amd64.whl (339.3 kB view details)

Uploaded CPython 3.7m Windows x86-64

itk_morphologicalcontourinterpolation-1.0.2-cp37-cp37m-macosx_10_9_x86_64.whl (1.3 MB view details)

Uploaded CPython 3.7m macOS 10.9+ x86-64

itk_morphologicalcontourinterpolation-1.0.2-cp36-cp36m-win_amd64.whl (339.1 kB view details)

Uploaded CPython 3.6m Windows x86-64

itk_morphologicalcontourinterpolation-1.0.2-cp36-cp36m-macosx_10_9_x86_64.whl (1.3 MB view details)

Uploaded CPython 3.6m macOS 10.9+ x86-64

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.2-cp39-cp39-win_amd64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.2-cp39-cp39-win_amd64.whl
Algorithm Hash digest
SHA256 3a2c42c00512dfa39e78f6549ea724c837a62a474c634e40772e2c0cb2060ab8
MD5 0cec4ecfc3d5eb887fc8982c2a0aa927
BLAKE2b-256 cbcf9faf731cdd261fd07af5c4d4fb9a415a1a04ddc3c4c64c3a694d84a58a27

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.2-cp39-cp39-manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.2-cp39-cp39-manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 f921c12220936ffad58d6a093f02e151c9bfa2653d740bb2de18621c88a04f63
MD5 ceb08fc9ef25e8c210de554781a6dcfa
BLAKE2b-256 6801d294f1b3278a1f38ac6e0e37df8f3027685df605c01b47aab02538ebe27d

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.2-cp39-cp39-macosx_10_9_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.2-cp39-cp39-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 0bd8d2ce400f06d7ef725d036475697a1c9a16a97dd49e457acd78105a3f1452
MD5 dafaf7a31bc0016f2f1e943923b8d5af
BLAKE2b-256 ca31932071cd2bc545c5d8ef8f16a6e337a685a8aa8427b7ee2c474dd32f5e27

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.2-cp38-cp38-win_amd64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.2-cp38-cp38-win_amd64.whl
Algorithm Hash digest
SHA256 c8339c3412e6dac91de6c4fbd06ebea1635ee8f61bb682152565fcd67a58c7eb
MD5 45941b808ec0141d2e4e0ea7dc6afb61
BLAKE2b-256 d3d9830c12c8e9079213878094a7a05b90e83c132ed01b625333d3dfa33fa168

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.2-cp38-cp38-manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.2-cp38-cp38-manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 d62150171b72ab4309b2eded2da009c62e38d8627dea2df7c33a1ec3f43fb29c
MD5 6a3acb124f1ec3423801a7fa3bd11798
BLAKE2b-256 553bb94f496a3bf335a132e2e5ef31e343fc350066d51e5bff1c885329d5f4fc

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.2-cp38-cp38-macosx_10_9_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.2-cp38-cp38-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 09a58b880e11f68100fc43efd65fe3bebb02ebecdcb3540a3d19641dde0a762c
MD5 fbc4444ed4d5bd2c8f28edfd5c0ecd1d
BLAKE2b-256 6208a4933cc4f8eab2677c0a4eb9f4dd3adaeefa616879b0f5c2f33c4a8d06f4

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.2-cp37-cp37m-win_amd64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.2-cp37-cp37m-win_amd64.whl
Algorithm Hash digest
SHA256 ba90ef3b21191904069183c82eaa2a1b05e90f50cb43b50330b0a7c509f76e8b
MD5 500b82240a6cd27e54d4a262312a8eb5
BLAKE2b-256 48054111353e184aa116e3165a251c4b70434d4d614ceda2ca4a726ad81bc0fd

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.2-cp37-cp37m-manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.2-cp37-cp37m-manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 ad57c7016d81bafe61dfc238c8a3beb53aa3e635c8087713fd837fff8f26e28d
MD5 3409869f6214a07ec17b8939af911fb1
BLAKE2b-256 35b8fdf2107b9e0d8664aa2931e604e30ac6f51b7f0493311d19c9738107ef59

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.2-cp37-cp37m-macosx_10_9_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.2-cp37-cp37m-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 95d8b2cd1b11b756e861a951352d838aab9af7f5689194992ba7bd4275496829
MD5 fe8cfef2baab358d2cdd22a324328546
BLAKE2b-256 58cd862096c971ede6a7c6734c1bc897e9a4569b986f44de9b5b7adf5f6869d0

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.2-cp36-cp36m-win_amd64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.2-cp36-cp36m-win_amd64.whl
Algorithm Hash digest
SHA256 2545043ba3405acdc5021bcb4c1bc85f974ef21b4f2d3be2bd8979b1894f8274
MD5 b10fefe53429aca5e83d0f7677d8c60e
BLAKE2b-256 add24becd9fdbd1d335621ed052e0959e902c0513945d772ae6a85ad087c5e75

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.2-cp36-cp36m-manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.2-cp36-cp36m-manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 9d6674d4a9b7385b9a52cac7fa1e1475331a906ea66581e68a45b96a36af8236
MD5 e1fcd93775601d7d667a663fdaa74964
BLAKE2b-256 f88f07f6fe5739f6d424a921b9b176646155897116de52caad66afb546a1555b

See more details on using hashes here.

File details

Details for the file itk_morphologicalcontourinterpolation-1.0.2-cp36-cp36m-macosx_10_9_x86_64.whl.

File metadata

File hashes

Hashes for itk_morphologicalcontourinterpolation-1.0.2-cp36-cp36m-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 554001d69a4474e16490aee8d97f7e3cf6a1c90909ccf98236ab65033f478eb0
MD5 41acbe4aecf822cca500e8137bc18dcd
BLAKE2b-256 46643d8b34b0452a85c50bad6bf71e90115c4ebb9b0b63f63c7d0735328cbb6f

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page