{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:17:20Z","timestamp":1740107840240,"version":"3.37.3"},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T00:00:00Z","timestamp":1631750400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T00:00:00Z","timestamp":1631750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s00500-021-06250-x","type":"journal-article","created":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T13:04:03Z","timestamp":1631797443000},"page":"13277-13286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Smooth approximations by continuous choice-functions"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1627-050X","authenticated-orcid":false,"given":"Mihai","family":"Prunescu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,16]]},"reference":[{"key":"6250_CR1","first-page":"409","volume":"12","author":"B Dawaz","year":"2008","unstructured":"Dawaz B (2008) Approximations in n-ary algebraic systems. Soft Comput 12:409\u2013418","journal-title":"Soft Comput"},{"key":"6250_CR2","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1090\/S0002-9904-1977-14398-X","volume":"83","author":"N Edward","year":"1977","unstructured":"Edward N (1977) Internal Set Theory, a new approach to NSA. Bullet AMS 83:1165\u20131198","journal-title":"Bullet AMS"},{"key":"6250_CR3","doi-asserted-by":"crossref","unstructured":"Ishibuchi Hisao, Yamamoto Takashi, Nakashima Tomoharu (2006) An approach to fuzzy default reasoning for function approximation, Soft Computing 10. Article number 850","DOI":"10.1007\/s00500-005-0005-y"},{"key":"6250_CR4","doi-asserted-by":"publisher","first-page":"9491","DOI":"10.1007\/s00500-019-03800-2","volume":"23","author":"C Lucian","year":"2019","unstructured":"Lucian C, Marek G, Przemyslaw G (2019) Piecewise linear approximation of fuzzy numbers: algorithms, arithmetic operations and stability of characteristics. Soft Comput 23:9491\u20139505","journal-title":"Soft Comput"},{"key":"6250_CR5","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1080\/00029890.2000.12005205","volume":"107","author":"C Neil","year":"2000","unstructured":"Neil C, Herbert W (2000) Recounting the rationals. Am Math Monthly 107:360\u2013363","journal-title":"Am Math Monthly"},{"key":"6250_CR6","doi-asserted-by":"crossref","unstructured":"Prestel Alexander , (1986) Einf\u00fchrung in die Mathematische Logik und Modelltheorie, Vieweg Verlag","DOI":"10.1007\/978-3-663-07641-4"},{"key":"6250_CR7","doi-asserted-by":"publisher","first-page":"3217","DOI":"10.1007\/s00500-018-3197-7","volume":"23","author":"P Wang","year":"2019","unstructured":"Wang P, Li Q (2019) The characterizations of upper approximation operators based on coverings. Soft Comput 23:3217\u20133228","journal-title":"Soft Comput"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-06250-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-021-06250-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-06250-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T04:21:39Z","timestamp":1634098899000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-021-06250-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,16]]},"references-count":7,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["6250"],"URL":"https:\/\/doi.org\/10.1007\/s00500-021-06250-x","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2021,9,16]]},"assertion":[{"value":"8 September 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares that he has no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}},{"value":"This article does not contain any studies with human participants or animals performed by the author.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal participants"}}]}}