{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:41:07Z","timestamp":1768423267011,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540881803","type":"print"},{"value":"9783540881810","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88181-0_35","type":"book-chapter","created":{"date-parts":[[2008,10,20]],"date-time":"2008-10-20T07:31:09Z","timestamp":1224487869000},"page":"274-279","source":"Crossref","is-referenced-by-count":5,"title":["The Concept of Application of Fuzzy Logic in Biometric Authentication Systems"],"prefix":"10.1007","author":[{"given":"Anatoly","family":"Sachenko","sequence":"first","affiliation":[]},{"given":"Arkadiusz","family":"Banasik","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Kapczy\u0144ski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Kapczy\u0144ski, A.: Evaluation of the application of the method chosen in the process of biometric authentication of users, Informatica studies. Science series No. 1 (43), vol.\u00a022. Gliwice (2001)"},{"key":"35_CR2","first-page":"135","volume-title":"Fuzzy Systems: Modeling and Control","author":"V. Kreinovich","year":"1998","unstructured":"Kreinovich, V., Mouzouris, G.C., Nguyen, H.T.: Fuzzy rule based modeling as a universal approximation tool. In: Nguyen, H.T., Sugeno, M. (eds.) Fuzzy Systems: Modeling and Control, pp. 135\u2013195. Kluwer, Boston (1998)"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Mendel, J.M., Gang X.: Fast Computation of Centroids for Constant-Width Interval-Valued Fuzzy Sets. In: Fuzzy Information Processing Society. NAFIPS 2006, pp. 621\u2013626. Annual meeting of the North American (2006)","DOI":"10.1109\/NAFIPS.2006.365481"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Zadeh, L.A.: Fuzzy sets. Information and Control 8 (1965)","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"35_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4519-4","volume-title":"Automated biometrics","author":"D. Zhang","year":"2000","unstructured":"Zhang, D.: Automated biometrics. Kluwer Academic Publishers, Dordrecht (2000)"}],"container-title":["Advances in Soft Computing","Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS\u201908"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88181-0_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:57:08Z","timestamp":1619510228000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88181-0_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881803","9783540881810"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88181-0_35","relation":{},"ISSN":["1867-5662","1860-0794"],"issn-type":[{"value":"1867-5662","type":"print"},{"value":"1860-0794","type":"electronic"}],"subject":[]}}