{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:38:02Z","timestamp":1725601082648},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642232343"},{"type":"electronic","value":"9783642232350"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23235-0_5","type":"book-chapter","created":{"date-parts":[[2011,8,17]],"date-time":"2011-08-17T08:32:20Z","timestamp":1313569940000},"page":"33-40","source":"Crossref","is-referenced-by-count":2,"title":["Application of Simulated Annealing Algorithm in Fingerprint Matching"],"prefix":"10.1007","author":[{"given":"Xiaofang","family":"Pei","sequence":"first","affiliation":[]},{"given":"Nan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shuiping","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"5_CR1","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/34.587996","volume":"19","author":"A. Jain","year":"1997","unstructured":"Jain, A., Hong, L., Bolle, R.: On-line fingerprint verification. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a019(4), 302\u2013313 (1997)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/83.841531","volume":"9","author":"A.K. Jain","year":"2000","unstructured":"Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: Filterbank-Based Fingerprint Matching. IEEE Transactions on Image Processing\u00a09, 846\u2013859 (2000)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"11","key":"5_CR3","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/34.244676","volume":"15","author":"J.G. Daugman","year":"1993","unstructured":"Daugman, J.G.: High confidence recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Machine Intell.\u00a015(11), 1148\u20131161 (1993)","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"issue":"4","key":"5_CR4","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/34.761265","volume":"21","author":"A.K. Jain","year":"1999","unstructured":"Jain, A.K., Prabhakar, S., Hong, L.: A multichannel approach to fingerprint classification. IEEE Trans. Pattern Anal. Machine Intell.\u00a021(4), 348\u2013359 (1999)","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"issue":"12","key":"5_CR5","first-page":"172","volume":"46","author":"Y. He","year":"2010","unstructured":"He, Y., Pu, X.: Development and implementation of Gabor filterbank-based fingerprint recognition algorithm. Computer Engineering and Applications\u00a046(12), 172\u2013175 (2010)","journal-title":"Computer Engineering and Applications"},{"key":"5_CR6","volume-title":"Modern optimization method","author":"W. Xing","year":"2005","unstructured":"Xing, W., Xie, J.: Modern optimization method. Tsinghua University Press, Beijing (2005) (in Chinese)"},{"issue":"8","key":"5_CR7","first-page":"2153","volume":"4","author":"C. Duan","year":"2008","unstructured":"Duan, C., Chen, B.: Simulated annealing algorithm to solve assignment problem under VB. Computer Knowledge and Technology\u00a04(8), 2153\u20132155 (2008) (in Chinese)","journal-title":"Computer Knowledge and Technology"},{"issue":"4","key":"5_CR8","first-page":"149","volume":"27","author":"Y. Wu","year":"2008","unstructured":"Wu, Y., Dong, P.: A general simulated annealing algorithm for solving large-scale asymmetrical assignment problem. Journal of Lanzhou Jiaotong University\u00a027(4), 149\u2013155 (2008) (in Chinese)","journal-title":"Journal of Lanzhou Jiaotong University"}],"container-title":["Communications in Computer and Information Science","Applied Informatics and Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23235-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,31]],"date-time":"2019-03-31T11:29:40Z","timestamp":1554031780000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23235-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642232343","9783642232350"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23235-0_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}