<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Digital Image Segmentation Based on the Persistent Homologies</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In that, the digital image segmentation algorithm is pre-processing for many systems of a machine vision, object detection, etc. and there is no universal of one for any type of digital image, it is necessary to obtain a new approach to it. Topological data analysis is issued not so long ago but its instruments have a universal character. We obtained the algorithm which is based on the persistent homologies as the effective mode of topological data analysis and its implementation in C# (.NET 4.5). A pixel of a digital image is considered as a point of fifth-dimensional space (two coordinates of the location and three color components). Then, we construct the filtration of some complexes and calculate topological invariant at obtained filtration. For this algorithm, there is one parameter which is appeared at a step of filtration. Its testing on different types of images (data of aerial photography, compositions, etc.) was held and the results were compared with the K-means algorithm.</p>
      </abstract>
      <kwd-group>
        <kwd>Digital Image</kwd>
        <kwd>Segmentation</kwd>
        <kwd>Persistent Homology</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The image segmentation is a useful part of a machine vision [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], object detection [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ],
the recognition tasks [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], etc. The term of segmentation means a process of
simplifying or changing the representation of an image into another one which is more
meaningful and easier to analyze. It is used to locate objects and their boundaries (lines,
curves, etc.), for example, see [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], in images. The main goal of image segmentation is
to assign a label to every pixel in an image in such a way that pixels with the same
label share certain characteristics.
      </p>
      <p>A finite set of segments is the result of image segmentation. Each of the segments
covers the entire image or a set of contours extracted from the image. Each of the
pixels in a region is similar according to some characteristic or computed property,
such as color, intensity, or texture. Neighboring regions are significantly different
concerning to the same characteristic or characteristics.</p>
      <p>
        The most of image segmentation methods are based on statistical methods [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]-[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]
or its combination with others [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], which, in fact, leads to some disadvantages. For
example, the K-means algorithm requires knowing the number of segments in
advance that restricts its application.
      </p>
      <p>
        The author proposes the image segmentation algorithm based on the persistent
homologies as the effective mode of topological data analysis [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]-[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], the
authors solved the same problem. To see a difference, we briefly outline their
algorithm. First, for determining the set of edge points some edge detection algorithms
have to be employed in image X. An initial segmentation is generated by topological
splitting which is performed over X. After that, there are three types of regions:
ppersistent regions, p-transient regions, and d-triangles. Such splitting is controlled by
two parameters: the radius of the disks and the persistence. The final segmentation is
generated by the algorithm which merges the p-transient and d-triangle regions with
either the p-persistent regions or each other. This algorithm is a hybrid
split-andmerge segmentation algorithm that uses computational topology and persistent
homology for image splitting and region feature characteristics for region merging.
      </p>
      <p>In this paper, the segmentation means to unite the pixels according to their
characteristic to have a similar intensity.</p>
      <p>In contradistinction to the algorithm described above, our algorithm considers an
image as a set of points in  5 and calculates persistent homology for all points. Also,
it does not need any type of image preprocessing such as, for example, edge detection,
and works with the color image while many segmentation algorithms deal with the
grey-scaled images.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>
        Let formulate the terms of computational topology, see [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>Let K be simplicial complex. A p-chain is a formal sum of p-simplices in K and its
standard notation is c=∑     , where   is p-simplex in K and   is either 1 or 0. The
p-chains together with the additional operation form the group of p-chains denoted as
  . The neutral element is 0=∑ 0  and the inverse of c is -c since c+(-c)=0. For p&lt;0
and p&gt;dim K this group is trivial. To relate these groups, we define the boundary of a
p-simplex as a sum of its (p-1)-dimensional faces.</p>
      <p>For p-chain c=∑     the boundary is the sum of boundaries of its and   :   →
  −1 is a homomorphism. The p-cycle is a p-chain with an empty boundary. The
group of p-cycles is the kernel of the p-th boundary homomorphism,  p=ker   . The
p-boundary is a p-chain that is the boundary of a (p+1)-chain. The group of
pboundaries is the image of the (p+1)-st boundary homomorphism,  p=Im   +1.
Since the boundaries form subgroups of the cycle groups, we can take quotients,
which are the homology groups   = p / p.</p>
      <p>The Vietoris-Rips complex   is the clique complex of  -neighborhood graph.
A filtration of a space X is a nested sequence of subspaces: ∅ ⊆  1 ⊆…⊆   =  .</p>
      <p>The set {   } =1 of Vietoris-Rips complexes is the filtration for any finite set { 1,  2,
…,   }, where   &lt;  , i&lt;j.</p>
      <p>The p-th persistent homology  pi,j is Im  
Let  pi=  (   ), where   be p-th homology, and  
 , for 0≤ i&lt;j ≤ k+1.</p>
      <p>, :  pi →  p, i&lt;j, be a map.</p>
      <p>
        On other words,  pi,j= pi/( pj ∩  pi), where  pi is p-cycles of    and  pj is
pboundaries of    . There is a method of their calculation based on the matrices
algebra, the persistence barcode and the persistence diagrams (see [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]).
      </p>
      <p>It's known that  0=rank  0i,j is the number of connected components of the space. For
the digital image segmentation, it is the same as the number of segments.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Algorithm</title>
      <p>Let consider a digital image D as a set of points M in  5. Denote by L the length of D
and W the width of D. Every pixel P has two parameters of the plane location (x and
y) and three components of color (for example, RGB). Let P (x, y, r, g, b) be a pixel of
D. The digital image segmentation algorithm based on a persistent homology is the
following:
f(y)=  ⁄max{ ,  }</p>
      <p>, f(r)=  ⁄255, f( )=  ⁄255 and f(b)=  ⁄255;
Step 1. Construct a map f: M ⊂  5 →I, where I is a unit cube in  5. For example, for
every P it can be realized by the following formulas f(x)= ⁄max{ ,  }
Step 2. Fix a finite set { 1,  2, …,   } such that   &lt;   for i&lt;j. Construct the filtration

of Vietoris-Rips complexes {   } =1 on the even grid of the set f(M) ⊂I;
Step 3. Construct the matrices of persistent homology  0i,j of {   } =1 ;

Step 4. For every   , i=1,…,k, the rank   of Smith normal form of the persistent
homology matrix is calculated. These numbers are the quantities of segmentation
clusters;
Step 5. For obtaining the quantity N of segments we use the following formula:

N= ∑ =1    

∑ =1  
where   is the rank of Smith normal form of the persistent homology matrix that
corresponds to   (number from step 2).</p>
      <p>We have to remark that (1) is the discrete analog of the center of mass. If there is a
possibility to change  from  1 to  2 in such a way that is approximate to a
continuous one, we have to replace (1) the sign of the sum with the integral sign.</p>
      <p>
        In Step 2 there are several possibilities to construct simplicial complexes, for
example, Cech complexes [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], Delaunay complexes [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and alpha complexes [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
Each of them has own advantages and disadvantages. We have to add that alpha
complexes are popular in many areas of science and engineering, including structural
molecular biology where they serve as an efficient representation of proteins and
other biomolecules [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>Illustrative examples and testing</title>
      <p>The image segmentation algorithm based on the persistent homologies is
implemented in C# (.NET 4.5). This software consists of five parts: the graphical user interface,
the auxiliary functions module, the Vietoris-Rips complexes constructions module,
the homology calculation module, and the segments visualization module.
Its action guide is given below:
Step 1. Downloading of digital image with such extensions: .bmp, .gif,.jpeg, .png,
.tiff;
Step 2. Transformation of the image into a set of points at space  5 using Step 1 of
the algorithm and even grid;
Step 3. Construction of Vietoris-Rips complexes and calculation of  0i,j using Step
2−5 of the algorithm;
Step 4. Visualization of the segmentation in an original digital image with the
possibility to show it for either a range  1 &lt;…&lt;  2 with some accuracy or a fix  .</p>
      <p>It was tested on different types of images. In Fig. 1 there is a colorful digital image
and the result of segmentation where each segment is colored by a certain color.
In Fig. 2, there is a real digital image on the left which is data of aerial photography.
To segment such photo is a complicated task for a person. On the right of Fig. 2 the
result of segmentation is presented which corresponds  =0.101. Remind that  is a
parameter from step 2 of the algorithm.</p>
      <p>In Fig. 3, there is the segmentation of data of aerial photography which corresponds
 =0.127. This result of segmentation is interesting by the fact that such objects as
forest and ground (green grass) belong to the same segment but buildings belong to
others. It can help to solve the problem of automation of recognition of the target
objects.</p>
      <p>During testing, we noticed an effect of the appearance of the small omissible
segments. In Fig. 4 such effect is present in the lower image which is the result of
segmentation. Such small omissible segments are the highlights on the coins. It is
conditioned by non-availability of any type of image preprocessing. We can prevent this
effect by choosing the specific value of  or making some type of postprocessing, for
example, combining areas that are smaller than a fixed number with one of the
neighbors.</p>
      <p>As a generalization, the persistent homology segmentation algorithm (PHSA) has one
parameter  such that the more it is, the smaller number of segments is. It is obvious,
if  =0, then every pixel of a digital image is a separate segment. Whereas, if =
√ 2 +  2⁄max{ ,  } , where L be the length and W be the width of an image, then a
number of segments equals to 1. It means that all pixels belong to the same one.</p>
      <p>PHSA is not sensitive to emissions, as there is no one center of a segment. A result
of its segmentation is close to human perception.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>After testing on real images it becomes obvious that the digital image segmentation
algorithm based on the persistent homologies is more effective than the K-means
algorithm and not sensitive even to high noise levels. Its work time is not sufficient
for real-time processing.</p>
      <p>In further research, the digital image segmentation algorithm based on the persistent
homologies will be adapted for video files with real-time processing and its parameter
value dependence on some characteristics of a digital image (textures, brightness,
etc.) will be obtained.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Meng</surname>
            ,
            <given-names>R.-Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cui</surname>
          </string-name>
          , S.-G.,
          <string-name>
            <surname>Zang</surname>
            ,
            <given-names>Y.-L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>X.-L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>He</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Segmentation of disease image of lettuce leaves based on machine vision</article-title>
          .
          <source>In: Chinese Control and Decision Conference</source>
          <year>2018</year>
          , pp.
          <fpage>6590</fpage>
          -
          <lpage>6594</lpage>
          . IEEE (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1109/CCDC.
          <year>2018</year>
          .8408289
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gao</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>An image-segmentation-based urban DTM generation method using airborne lidar data</article-title>
          .
          <source>In: IEEE Journal of Selected topics in Applied Earth Observation and Remote Sensing</source>
          , vol.
          <volume>9</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>496</fpage>
          -
          <lpage>506</lpage>
          . IEEE (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .1109/JSTARS.
          <year>2015</year>
          . 2512498
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feng</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beautemps</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Automatic temporal segmentation of hand movements for hand positions recognition in French cued speech</article-title>
          .
          <source>In: IEEE International Conference on Acoustics 2018, Speech and Signal Processing</source>
          , pp.
          <fpage>3061</fpage>
          -
          <lpage>3065</lpage>
          . IEEE (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1109/ICASSP.
          <year>2018</year>
          .8462090
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Xia</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gan</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xiong</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
          </string-name>
          , J.:
          <article-title>Crown segmentation from computed tomography images with metal artifacts</article-title>
          .
          <source>In: IEEE Signal Processing Letters</source>
          <year>2016</year>
          , vol.
          <volume>23</volume>
          (
          <issue>5</issue>
          ), pp.
          <fpage>678</fpage>
          -
          <lpage>682</lpage>
          . IEEE (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .1109/LSP.
          <year>2016</year>
          .2545702
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , J.,
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Image segmentation based on 2D Otsu method with histogram analysis</article-title>
          .
          <source>In: International Conference on Computer Science and Software Engineering</source>
          <year>2008</year>
          , pp.
          <fpage>105</fpage>
          -
          <lpage>108</lpage>
          . IEEE (
          <year>2008</year>
          ). doi:
          <volume>10</volume>
          .1109/CSSE.
          <year>2008</year>
          .206
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Mustafa</surname>
            ,
            <given-names>W. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khairunizam</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ibrahim</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shahriman</surname>
            ,
            <given-names>A. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Razlan</surname>
            ,
            <given-names>Z. M.:</given-names>
          </string-name>
          <article-title>A review of different segmentation approach on non uniform images</article-title>
          .
          <source>In: International Conference on Computational Approach in Smart Systems Design and Applications</source>
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . IEEE (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1109/ICASSDA.
          <year>2018</year>
          .8477611
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. Thomas, Kumar,
          <string-name>
            <surname>S.:</surname>
          </string-name>
          <article-title>A review of segmentation and edge detection methods for real time image processing used to detect brain tumour</article-title>
          .
          <source>In: IEEE International Conference on Computational Intelligence and Computing Research</source>
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . IEEE (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .1109/ICCIC.
          <year>2015</year>
          .7435696
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Kang</surname>
            ,
            <given-names>W.-X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>Q.-Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liang</surname>
            ,
            <given-names>R.-P.:</given-names>
          </string-name>
          <article-title>The comparative research on image segmentation algorithms</article-title>
          .
          <source>In: First International Workshop on Education Technology and Computer Science</source>
          <year>2009</year>
          , vol.
          <volume>2</volume>
          , pp.
          <fpage>703</fpage>
          -
          <lpage>707</lpage>
          . IEEE (
          <year>2009</year>
          ). doi:
          <volume>10</volume>
          .1109/ETCS.
          <year>2009</year>
          .417
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Pinto</surname>
            , T. W., de Carvalho,
            <given-names>M. A. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pedronette</surname>
            ,
            <given-names>D. C. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martins</surname>
            ,
            <given-names>P. S.</given-names>
          </string-name>
          :
          <article-title>Image segmentation through combined methods: watershed transform, unsupervised distance learning and normalized cut</article-title>
          .
          <source>In: Southwest Symposium on Image Analysis and Interpretation</source>
          <year>2014</year>
          , pp.
          <fpage>153</fpage>
          -
          <lpage>156</lpage>
          . IEEE (
          <year>2004</year>
          ). doi:
          <volume>10</volume>
          .1109/SSIAI.
          <year>2014</year>
          .6806052
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Beksi</surname>
            ,
            <given-names>W.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Papanikolous</surname>
          </string-name>
          , N.:
          <article-title>3D region segmentation using topological persistence</article-title>
          .
          <source>In: IEEE/RSJ International Conference on Intelligent Robots and Systems</source>
          <year>2016</year>
          , pp.
          <fpage>1079</fpage>
          -
          <lpage>1084</lpage>
          . IEEE (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .1109/IROS.
          <year>2016</year>
          .7759183
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Venkataraman</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramamurthy</surname>
            ,
            <given-names>K. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turaga</surname>
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Persistent homology of attractors for action recognition</article-title>
          .
          <source>In: IEEE International Conference on Image Processing</source>
          <year>2016</year>
          , pp.
          <fpage>4150</fpage>
          -
          <lpage>4154</lpage>
          . IEEE (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .1109/ICIP.
          <year>2016</year>
          .7533141
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Hajij</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Scheidegger</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Visual detection of structural changes in time-varying graphs using persistent homology</article-title>
          .
          <source>In: IEEE Pacific Visualization Symposium</source>
          <year>2018</year>
          , pp.
          <fpage>125</fpage>
          -
          <lpage>134</lpage>
          . IEEE (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1109/PacificVis.
          <year>2018</year>
          .00024
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Fasy</surname>
            ,
            <given-names>B. T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Exploring persistent local homology in topological data analysis</article-title>
          .
          <source>In: IEEE International Conference on Acoustics, Speech and Signal Processing</source>
          <year>2016</year>
          , pp.
          <fpage>6430</fpage>
          -
          <lpage>6434</lpage>
          . IEEE (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .1109/ICASSP.
          <year>2016</year>
          .7472915
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Carlsson</surname>
          </string-name>
          , G.:
          <article-title>Topology and data</article-title>
          .
          <source>Bull.Amer.Math.Soc</source>
          .
          <volume>46</volume>
          (
          <issue>2</issue>
          ),
          <fpage>255</fpage>
          -
          <lpage>308</lpage>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Letscher</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fritts</surname>
          </string-name>
          , J.:
          <article-title>Image segmentation using topological persistence</article-title>
          .
          <source>Computer Analysis of Images and Patterns</source>
          ,
          <volume>587</volume>
          -
          <fpage>595</fpage>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Edelsbrunner</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Letscher</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zomorodian</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Topological persistence and simplification</article-title>
          .
          <source>Disc.Comput.Geom</source>
          .
          <volume>28</volume>
          (
          <issue>4</issue>
          ),
          <fpage>511</fpage>
          -
          <lpage>533</lpage>
          (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Zomorodian</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carlsson</surname>
          </string-name>
          , G.:
          <article-title>Computing persistent homology</article-title>
          .
          <source>Disc.Comput.Geom</source>
          .
          <volume>33</volume>
          (
          <issue>2</issue>
          ),
          <fpage>249</fpage>
          -
          <lpage>274</lpage>
          (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Le</surname>
            ,
            <given-names>N.-K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martins</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Decreusefond</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vergne</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Construction of the generalized Czech complex</article-title>
          .
          <source>In: IEEE 81st Vehicular Technology Conference</source>
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . IEEE (
          <year>2015</year>
          ). doi:
          <volume>10</volume>
          .1109/VTCSpring.
          <year>2015</year>
          .7145759
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Bezdek</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naszódi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Rigidity of ball-polyhedra via truncated Voronoi and Delaunay complexes</article-title>
          .
          <source>In: Ninth International Symposium on Voronoi Diagrams in Science and Engineering</source>
          <year>2012</year>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>79</lpage>
          . IEEE (
          <year>2012</year>
          , DOI: 10.1109/ISVD.
          <year>2012</year>
          .
          <volume>14</volume>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cho</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
          </string-name>
          , D.-S.:
          <article-title>Beta-complex vs. Alpha-complex: similarities and dissimilarities</article-title>
          .
          <source>In: IEEE Transactions on Visualization and Computer Graphics</source>
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . IEEE (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1109/TVCG.
          <year>2018</year>
          .2873633
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Winter</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sterner</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sterner</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Alpha shapes and proteins</article-title>
          .
          <source>In: Sixth International Symposium on Voronoi Diagrams</source>
          <year>2009</year>
          , pp.
          <fpage>217</fpage>
          -
          <lpage>224</lpage>
          . IEEE (
          <year>2009</year>
          ). doi:
          <volume>10</volume>
          .1109/ISVD.
          <year>2009</year>
          .25
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>