{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:04:08Z","timestamp":1774721048634,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,2,15]],"date-time":"2017-02-15T00:00:00Z","timestamp":1487116800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004919","name":"King Abdulaziz City for Science and Technology","doi-asserted-by":"publisher","award":["12-INF3105-03"],"award-info":[{"award-number":["12-INF3105-03"]}],"id":[{"id":"10.13039\/501100004919","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Fuzzy Syst."],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s40815-017-0299-9","type":"journal-article","created":{"date-parts":[[2017,2,15]],"date-time":"2017-02-15T09:51:37Z","timestamp":1487152297000},"page":"128-140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Development of Multimodal Biometric Systems with Three-Way and Fuzzy Set-Based Decision Mechanisms"],"prefix":"10.1007","volume":"20","author":[{"given":"Rami","family":"Al-Hmouz","sequence":"first","affiliation":[]},{"given":"Witold","family":"Pedrycz","sequence":"additional","affiliation":[]},{"given":"Khaled","family":"Daqrouq","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Morfeq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,15]]},"reference":[{"issue":"2","key":"299_CR1","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","volume":"1","author":"A Jain","year":"2006","unstructured":"Jain, A., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Trans. Inf. Forensics Secur. 1(2), 125\u2013143 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"299_CR2","volume-title":"The Middle Way, Finding Happiness in a World of Extremes","author":"L Marinoff","year":"2007","unstructured":"Marinoff, L.: The Middle Way, Finding Happiness in a World of Extremes. Sterling, New York (2007)"},{"key":"299_CR3","first-page":"481","volume-title":"Selected Works","author":"J \u0141ukasiewicz","year":"1970","unstructured":"\u0141ukasiewicz, J.: Philosophical remarks on many-valued systems of propositional logic. In: Borkowski, L. (ed.) Selected Works, pp. 481\u2013495. North-Holland, Amsterdam (1970)"},{"issue":"3\u20134","key":"299_CR4","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1023\/B:AIRE.0000006608.31990.cd","volume":"20","author":"C Lang","year":"2003","unstructured":"Lang, C., Steinbach, B.: Bi-decomposition of function sets in multiple-valued logic for circuit design and data mining. Artif. Intell. Rev. 20(3\u20134), 233\u2013267 (2003)","journal-title":"Artif. Intell. Rev."},{"issue":"1","key":"299_CR5","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s10844-013-0254-7","volume":"42","author":"Z Bing","year":"2014","unstructured":"Bing, Z., Yiyu, Y., Jigang, L.: Cost-sensitive three-way email spam filtering. Intell. Inf. Syst. 42(1), 19\u201345 (2014)","journal-title":"Intell. Inf. Syst."},{"key":"299_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-79779-8","volume-title":"Multiple Valued Logic: Concepts and Representations. Synthesis Lectures on Digital Circuits and Systems","author":"D Miller","year":"2008","unstructured":"Miller, D., Thornton, M.: Multiple Valued Logic: Concepts and Representations. Synthesis Lectures on Digital Circuits and Systems. Morgan & Claypool Publishers, San Rafael (2008)"},{"key":"299_CR7","doi-asserted-by":"crossref","unstructured":"Vatankhahghadim, A., Sheikholeslami, A.: A multi-level cell for STT-MRAM with biaxial magnetic tunnel junction. In: Proceedings of IEEE International Symposium on Multiple-Valued Logic, pp. 158\u2013163 (2015)","DOI":"10.1109\/ISMVL.2015.38"},{"issue":"9","key":"299_CR8","doi-asserted-by":"crossref","first-page":"1583","DOI":"10.1109\/TVLSI.2010.2051569","volume":"19","author":"J Koob","year":"2011","unstructured":"Koob, J., Ung, S., Cockburn, B., Elliott, D.: Design and characterization of a multilevel DRAM. IEEE Trans. Very Large Scale (VLSI) Syst. 19(9), 1583\u20131596 (2011)","journal-title":"IEEE Trans. Very Large Scale (VLSI) Syst."},{"key":"299_CR9","doi-asserted-by":"crossref","unstructured":"Yao, Y.: Decision-theoretic rough set models. In: Proceedings of RSKT\u201907, LNAI 4481, pp. 1\u201312 (2007)","DOI":"10.1007\/978-3-540-72458-2_1"},{"key":"299_CR10","doi-asserted-by":"crossref","unstructured":"Yao, Y.: Three-way decision: an interpretation of rules in rough set theory. In: Proceedings of RSKT\u201909, LNAI 5589, pp. 642\u2013649 (2009)","DOI":"10.1007\/978-3-642-02962-2_81"},{"issue":"17","key":"299_CR11","doi-asserted-by":"crossref","first-page":"3356","DOI":"10.1016\/j.ins.2008.05.010","volume":"178","author":"Y Yao","year":"2008","unstructured":"Yao, Y., Zhao, Y.: Attribute reduction in decision-theoretic rough set models. Inf. Sci. 178(17), 3356\u20133373 (2008)","journal-title":"Inf. Sci."},{"issue":"3","key":"299_CR12","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/j.ins.2009.09.021","volume":"180","author":"Y Yao","year":"2010","unstructured":"Yao, Y.: Three-way decisions with probabilistic rough sets. Inf. Sci. 180(3), 341\u2013353 (2010)","journal-title":"Inf. Sci."},{"key":"299_CR13","doi-asserted-by":"crossref","first-page":"937","DOI":"10.1109\/TFUZZ.2012.2236843","volume":"21","author":"H Tahayori","year":"2013","unstructured":"Tahayori, H., Sadeghian, A., Pedrycz, W.: Induction of shadowed sets based on the gradual grade of fuzziness. IEEE Trans. Fuzzy Syst. 21, 937\u2013949 (2013)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"299_CR14","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/3477.658584","volume":"28","author":"W Pedrycz","year":"1998","unstructured":"Pedrycz, W.: Shadowed sets: representing and processing fuzzy sets. IEEE Trans. Syst. Man Cybern. Part B 28, 103\u2013109 (1998)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B"},{"issue":"8","key":"299_CR15","doi-asserted-by":"crossref","first-page":"1738","DOI":"10.1016\/j.patcog.2011.01.014","volume":"44","author":"J Zhou","year":"2011","unstructured":"Zhou, J., Pedrycz, W., Miao, D.: Shadowed sets in the characterization of rough-fuzzy clustering. Pattern Recogn. 44(8), 1738\u20131749 (2011)","journal-title":"Pattern Recogn."},{"issue":"1","key":"299_CR16","doi-asserted-by":"crossref","first-page":"54","DOI":"10.4103\/0256-4602.93139","volume":"29","author":"S Sahoo","year":"2012","unstructured":"Sahoo, S., Choubisa, T., Prasanna, S.: Multimodal biometric person authentication: a review. IETE Tech. Rev. 29(1), 54\u201375 (2012)","journal-title":"IETE Tech. Rev."},{"key":"299_CR17","doi-asserted-by":"crossref","unstructured":"Deng, X.F., Yao, Y.Y., Yao, J.T.: On interpreting three-way decisions through two-way decisions. In: ISMIS 2014, LNCS (LNAI), vol. 8502, pp. 73\u201382 (2014)","DOI":"10.1007\/978-3-319-08326-1_8"},{"key":"299_CR18","doi-asserted-by":"crossref","unstructured":"Yao, Y.Y.: An outline of a theory of three-way decisions. In: RSCTC 2012. LNCS (LNAI), vol. 7413, pp. 1\u201317 (2012)","DOI":"10.1007\/978-3-642-32115-3_1"},{"issue":"1","key":"299_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s41066-015-0012-z","volume":"1","author":"G Peters","year":"2016","unstructured":"Peters, G., Weber, R.: DCC: a framework for dynamic granular clustering. Granul. Comput. 1(1), 1\u201311 (2016)","journal-title":"Granul. Comput."},{"issue":"1","key":"299_CR20","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s41066-015-0003-0","volume":"1","author":"L Livi","year":"2016","unstructured":"Livi, L., Sadeghian, A.: Granular computing, computational intelligence, and the analysis of non-geometric input spaces. Granul. Comput. 1(1), 13\u201320 (2016)","journal-title":"Granul. Comput."},{"issue":"1","key":"299_CR21","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s41066-015-0006-x","volume":"1","author":"Z Xu","year":"2016","unstructured":"Xu, Z., Wang, H.: Managing multi-granularity linguistic information in qualitative group decision making: an overview. Granul. Comput. 1(1), 21\u201335 (2016)","journal-title":"Granul. Comput."},{"issue":"1","key":"299_CR22","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s41066-015-0004-z","volume":"1","author":"M Antonelli","year":"2016","unstructured":"Antonelli, M., Ducange, P., Lazzerini, B., Marcelloni, F.: Multi-objective evolutionary design of granular rule-based classifiers. Granul. Comput. 1(1), 37\u201358 (2016)","journal-title":"Granul. Comput."},{"issue":"1","key":"299_CR23","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s41066-015-0009-7","volume":"1","author":"JM Mendel","year":"2016","unstructured":"Mendel, J.M.: A comparison of three approaches for estimating (synthesizing) an interval type-2 fuzzy set model of a linguistic term for computing with words. Granul. Comput. 1(1), 59\u201369 (2016)","journal-title":"Granul. Comput."},{"issue":"1","key":"299_CR24","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s41066-015-0007-9","volume":"1","author":"P Lingras","year":"2016","unstructured":"Lingras, P., Haider, F., Triff, M.: Granular meta-clustering based on hierarchical, network, and temporal connections. Granul. Comput. 1(1), 71\u201392 (2016)","journal-title":"Granul. Comput."},{"issue":"2","key":"299_CR25","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s41066-015-0002-1","volume":"1","author":"A Skowron","year":"2016","unstructured":"Skowron, A., Jankowski, A., Dutta, S.: Interactive granular computing. Granul. Comput. 1(2), 95\u2013113 (2016)","journal-title":"Granul. Comput."},{"issue":"2","key":"299_CR26","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s41066-015-0008-8","volume":"1","author":"D Dubois","year":"2016","unstructured":"Dubois, D., Prade, H.: Bridging gaps between several forms of granular computing. Granul. Comput. 1(2), 115\u2013126 (2016)","journal-title":"Granul. Comput."},{"issue":"2","key":"299_CR27","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s41066-015-0005-y","volume":"1","author":"V Loia","year":"2016","unstructured":"Loia, V., D\u2019Aniello, G., Gaeta, A., Orciuoli, F.: Enforcing situation awareness with granular computing: a systematic overview and new perspectives. Granul. Comput. 1(2), 127\u2013143 (2016)","journal-title":"Granul. Comput."},{"issue":"2","key":"299_CR28","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s41066-015-0011-0","volume":"1","author":"Y Yao","year":"2016","unstructured":"Yao, Y.: A triarchic theory of granular computing. Granul. Comput. 1(2), 145\u2013157 (2016)","journal-title":"Granul. Comput."},{"issue":"3","key":"299_CR29","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/s41066-015-0013-y","volume":"1","author":"D Ciucci","year":"2016","unstructured":"Ciucci, D.: Orthopairs and granular computing. Granul. Comput. 1(3), 159\u2013170 (2016)","journal-title":"Granul. Comput."},{"issue":"3","key":"299_CR30","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s41066-016-0015-4","volume":"1","author":"G Wilke","year":"2016","unstructured":"Wilke, G., Portmann, E.: Granular computing as a basis of human\u2013data interaction: a cognitive cities use case. Granul. Comput. 1(3), 181\u2013197 (2016)","journal-title":"Granul. Comput."},{"issue":"4","key":"299_CR31","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s41066-016-0021-6","volume":"1","author":"H Liu","year":"2016","unstructured":"Liu, H., Gegov, A., Cocea, M.: Rule-based systems: a granular computing perspective. Granul. Comput. 1(4), 259\u2013274 (2016)","journal-title":"Granul. Comput."},{"key":"299_CR32","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1016\/j.ins.2014.04.022","volume":"279","author":"X Deng","year":"2014","unstructured":"Deng, X., Yao, Y.: Decision-theoretic three-way approximations of fuzzy sets. Inf. Sci. 279, 702\u2013715 (2014)","journal-title":"Inf. Sci."},{"issue":"8","key":"299_CR33","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.1016\/j.ijar.2013.03.014","volume":"54","author":"D Liang","year":"2013","unstructured":"Liang, D., Liu, D., Pedrycz, W., Hu, P.: Triangular fuzzy decision-theoretic rough sets. Int. J. Approx. Reason. 54(8), 1087\u20131106 (2013)","journal-title":"Int. J. Approx. Reason."},{"key":"299_CR34","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.knosys.2015.08.001","volume":"91","author":"Y Sang","year":"2016","unstructured":"Sang, Y., Liang, J., Qian, Y.: Decision-theoretic rough sets under dynamic granulation. Knowl. Based Syst. 91, 84\u201392 (2016)","journal-title":"Knowl. Based Syst."},{"key":"299_CR35","first-page":"11","volume":"8","author":"T Bromek","year":"1987","unstructured":"Bromek, T., Niewiadomska-Bugaj, M.: Threshold rules in two-class discrimination problems. Probab. Math. Stat. 8, 11\u201316 (1987)","journal-title":"Probab. Math. Stat."},{"key":"299_CR36","doi-asserted-by":"crossref","unstructured":"Yeung, D.Y., Chang, H., Xiong, Y., George, S., Kashi, R.,Matsumoto, T., Rigoll, G.: SVC 2004: first international signature verification competition. In: Proceedings of the International Conference on Biometric Authentication, LNCS, vol. 3072, pp. 16\u201322 (2004)","DOI":"10.1007\/978-3-540-25948-0_3"},{"key":"299_CR37","volume-title":"Dynamic Programming","author":"R Bellman","year":"1957","unstructured":"Bellman, R.: Dynamic Programming. Princeton University Press, Princeton (1957)"}],"container-title":["International Journal of Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40815-017-0299-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40815-017-0299-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40815-017-0299-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,24]],"date-time":"2022-07-24T05:02:08Z","timestamp":1658638928000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40815-017-0299-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,15]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["299"],"URL":"https:\/\/doi.org\/10.1007\/s40815-017-0299-9","relation":{},"ISSN":["1562-2479","2199-3211"],"issn-type":[{"value":"1562-2479","type":"print"},{"value":"2199-3211","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,15]]}}}