{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:35:42Z","timestamp":1742970942243,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319914459"},{"type":"electronic","value":"9783319914466"}],"license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91446-6_22","type":"book-chapter","created":{"date-parts":[[2018,5,26]],"date-time":"2018-05-26T04:54:03Z","timestamp":1527310443000},"page":"228-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Implementation of an Intelligent Algorithm Hybrid Biometric Identification for the Exemplary Hardware Platforms"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7023-1646","authenticated-orcid":false,"given":"Zbigniew","family":"Gomolka","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5782-0048","authenticated-orcid":false,"given":"Boguslaw","family":"Twarog","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4596-8659","authenticated-orcid":false,"given":"Ewa","family":"Zeslawska","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"22_CR1","unstructured":"Advancing Biometric Federal Bureau of Investigation FBI Biometric Specifications. https:\/\/www.fbibiospecs.cjis.gov . Accessed 20 Apr 2017"},{"key":"22_CR2","doi-asserted-by":"publisher","unstructured":"Jain, A.K., Klare, B.: Unsang park: face recognition: some challenges in forensics. To appear in the 9th IEEE International Conference on Automatic Face and Gesture Recognition, Santa Barbara, CA (2011). https:\/\/doi.org\/10.1109\/fg.2011.5771338","DOI":"10.1109\/fg.2011.5771338"},{"key":"22_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-4402-1","volume-title":"Handbook of Iris Recognition","author":"MJ Burge","year":"2013","unstructured":"Burge, M.J., Bowyer, K.: Handbook of Iris Recognition. Springer, New York (2013)"},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-319-19324-3_48","volume-title":"Artificial Intelligence and Soft Computing","author":"Ewa Dudek-Dyduch","year":"2015","unstructured":"Dudek-Dyduch, E.: Algebraic logical meta-model of decision processes - new metaheuristics. In: Artificial Intelligence and Soft Computing. Lecture Notes in Computer Science, ICAISC 2015, Zakopane, Poland, vol. 9119, pp. 541\u2013554 (2015)"},{"issue":"3","key":"22_CR5","doi-asserted-by":"publisher","first-page":"283","DOI":"10.7763\/IJCCE.2012.V1.73","volume":"1","author":"R Hentati","year":"2012","unstructured":"Hentati, R., Hentati, M., Abid, M.: Development a new algorithm for iris biometric recognition. Int. J. Comput. Commun. Eng. 1(3), 283\u2013286 (2012)","journal-title":"Int. J. Comput. Commun. Eng."},{"issue":"5","key":"22_CR6","first-page":"2341","volume":"7","author":"K Mahesh Naidu","year":"2016","unstructured":"Mahesh Naidu, K., Govindarajulu, P.: Biometrics hybrid system based verification. (IJCSIT) Int. J. Comput. Sci. Inf. Technol. 7(5), 2341\u20132346 (2016)","journal-title":"(IJCSIT) Int. J. Comput. Sci. Inf. Technol."},{"issue":"2","key":"22_CR7","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s10270-011-0215-y","volume":"12","author":"P Kosiuczenko","year":"2013","unstructured":"Kosiuczenko, P.: Specification of invariability in OCL. Softw. Syst. Model. 12(2), 415\u2013434 (2013). https:\/\/doi.org\/10.1007\/s10270-011-0215-y","journal-title":"Softw. Syst. Model."},{"issue":"2","key":"22_CR8","doi-asserted-by":"crossref","first-page":"183","DOI":"10.3233\/FI-2013-859","volume":"125","author":"P Kosiuczenko","year":"2013","unstructured":"Kosiuczenko, P.: On the validation of invariants at runtime. Fundam. Inform. 125(2), 183\u2013222 (2013)","journal-title":"Fundam. Inform."},{"key":"22_CR9","unstructured":"Kulkarni, K., Shet, R., Iyer, N.: Hybrid primary and secondary biometric fusion. International Journal of Computer Applications (0975 \u2013 8887), National Conference on Electronics and Computer Engineering (2016)"},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-319-43606-7_4","volume-title":"Advances in Intelligent Systems and Computing","author":"Lech Madeyski","year":"2016","unstructured":"Madeyski, L., Kawalerowicz, M.: Software engineering needs agile experimentation: a new practice and supporting tool. In: Software Engineering: Challenges and Solutions, pp. 149\u2013162 (2016). https:\/\/doi.org\/10.1007\/978-3-319-43606-7_4"},{"key":"22_CR11","unstructured":"Ochocki, M., Ko\u0142odziej, M., Sawicki, D.: Identity verification algorithm based on image of the iris, Institute of Theory of Electrical Engineering, Measurement and Information Systems, Warsaw University of Technology (2015). (in Polish)"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-319-43606-7_4","volume-title":"Advances in Intelligent Systems and Computing","author":"Ma\u0142gorzata Sadowska","year":"2016","unstructured":"Sadowska, M., Huzar, Z.: Semantic validation of UML class diagrams with the use of domain ontologies expressed in OWL 2. In: Software Engineering: Challenges and Solutions, pp. 47\u201359 (2016). https:\/\/doi.org\/10.1007\/978-3-319-43606-7_4"},{"key":"22_CR13","unstructured":"Neurotechnology. http:\/\/www.neurotechnology.com\/ . Accessed 20 Apr 2017"},{"key":"22_CR14","unstructured":"NIST national Institute of Standards and Technology. NIST Biometric Image Software (NBIS) (2017). https:\/\/www.nist.gov\/services-resources\/software\/nist-biometric-image-software-nbis . Accessed 20 Apr 2017"},{"issue":"1","key":"22_CR15","first-page":"135","volume":"2","author":"S Suganya","year":"2014","unstructured":"Suganya, S., Menaka, D.: Performance evaluation of face recognition algorithms. Int. J. Recent Innov. Trends Comput. Commun. 2(1), 135\u2013140 (2014). ISSN: 2321-8169","journal-title":"Int. J. Recent Innov. Trends Comput. Commun."},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Orandi, S., Libert, J., Garris, M., Byers, F.: JPEG 2000 CODEC Certification Guidance for 1000 ppi Fingerprint Friction Ridge Imagery (2016). http:\/\/dx.doi.org\/10.6028\/NIST.SP.500\u2013300 . Accessed 20 Apr 2017","DOI":"10.6028\/NIST.SP.500-300"},{"issue":"6","key":"22_CR17","first-page":"177","volume":"2","author":"P Verma","year":"2012","unstructured":"Verma, P., Dubey, M., Verma, P., Basu, S.: Daugman\u2019s algorithm method for iris recognition \u2013 a biometric approach. IJETAE 2(6), 177\u2013185 (2012)","journal-title":"IJETAE"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Vishi, K., Yayilgan, S.Y.: Multimodal biometric authentication using fingerprint and iris recognition in identity management. In: 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2013), pp. 334\u2013341 (2013)","DOI":"10.1109\/IIH-MSP.2013.91"},{"issue":"3","key":"22_CR19","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/s11704-014-4070-1","volume":"9","author":"X Li","year":"2015","unstructured":"Li, X., Yin, Y., Ning, Y., Yang, G., Pan, L.: A hybrid biometric identification framework for high security applications. Front. Comput. Sci. 9(3), 392\u2013401 (2015). https:\/\/doi.org\/10.1007\/s11704-014-4070-1","journal-title":"Front. Comput. Sci."},{"key":"22_CR20","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-319-43606-7_4","volume-title":"Advances in Intelligent Systems and Computing","author":"Hubert Zarzycki","year":"2016","unstructured":"Zarzycki, H., Czerniak, J.M., Lakomski, D., Kardasz, P.: Performance comparison of CRM Systems dedicated to reporting failures to IT department. Software Engineering: Challenges and Solutions, pp. 133\u2013146 (2016). https:\/\/doi.org\/10.1007\/978-3-319-43606-7_4"}],"container-title":["Advances in Intelligent Systems and Computing","Contemporary Complex Systems and Their Dependability"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91446-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T15:02:26Z","timestamp":1604329346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91446-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"ISBN":["9783319914459","9783319914466"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91446-6_22","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,5,27]]}}}