{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T03:56:02Z","timestamp":1769831762994,"version":"3.49.0"},"reference-count":14,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1995,1,1]],"date-time":"1995-01-01T00:00:00Z","timestamp":788918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Recognition"],"published-print":{"date-parts":[[1995,1]]},"DOI":"10.1016\/0031-3203(94)00085-z","type":"journal-article","created":{"date-parts":[[2003,5,12]],"date-time":"2003-05-12T22:21:32Z","timestamp":1052778092000},"page":"59-66","source":"Crossref","is-referenced-by-count":106,"title":["Handwritten numeral recognition using self-organizing maps and fuzzy rules"],"prefix":"10.1016","volume":"28","author":[{"given":"Zheru","family":"Chi","sequence":"first","affiliation":[]},{"given":"Jing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Yan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0031-3203(94)00085-Z_BIB1","first-page":"1162","article-title":"Computer recognition of unconstrained handwritten numerals","volume":"80","author":"Suen","year":"1992"},{"issue":"8","key":"10.1016\/0031-3203(94)00085-Z_BIB2","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1109\/34.57669","article-title":"The state of the art in on-line handwritten recognition","volume":"12","author":"Tappert","year":"1990","journal-title":"IEEE Trans. on Pattern Analysis and Machine Intelligence"},{"issue":"6","key":"10.1016\/0031-3203(94)00085-Z_BIB3","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1016\/0031-3203(86)90040-3","article-title":"An overview of character recognition methodologies","volume":"19","author":"Mantas","year":"1986","journal-title":"Pattern Recognition"},{"key":"10.1016\/0031-3203(94)00085-Z_BIB4","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy sets","volume":"8","author":"Zadeh","year":"1965","journal-title":"Inform. Contr."},{"issue":"1\/2","key":"10.1016\/0031-3203(94)00085-Z_BIB5","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/0031-3203(90)90054-O","article-title":"Fuzzy sets in pattern recognition: methodology and methods","volume":"23","author":"Pedrycz","year":"1990","journal-title":"Pattern Recognition"},{"key":"10.1016\/0031-3203(94)00085-Z_BIB6","first-page":"570","article-title":"Fuzzy logic for handwritten numeral character recognition","author":"Siy","year":"1974","journal-title":"IEEE Trans. on Syst., Man, and Cybern."},{"issue":"2","key":"10.1016\/0031-3203(94)00085-Z_BIB7","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1109\/21.52551","article-title":"Fuzzy logic in control systems: fuzzy logic controller, Part I","volume":"20","author":"Lee","year":"1990","journal-title":"IEEE Trans. on Syst., Man, and Cybern."},{"issue":"2","key":"10.1016\/0031-3203(94)00085-Z_BIB8","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1109\/21.52552","article-title":"Fuzzy logic in control systems: fuzzy logic controller, Part II","volume":"20","author":"Lee","year":"1990","journal-title":"IEEE Trans. on Syst., Man, and Cybern."},{"key":"10.1016\/0031-3203(94)00085-Z_BIB9","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/0165-0114(92)90263-4","article-title":"Fuzzy-connective-based hierarchical aggregation networks for decision making","volume":"46","author":"Krishapuram","year":"1992","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/0031-3203(94)00085-Z_BIB10","first-page":"145","article-title":"A fuzzy approach to handwritten rotation-invariant character recognition","volume":"III","author":"Wang","year":"1992"},{"issue":"21","key":"10.1016\/0031-3203(94)00085-Z_BIB11","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1049\/el:19931225","article-title":"Map image segmentation based on thresholding and fuzzy rules","volume":"29","author":"Chi","year":"1993","journal-title":"Electronics Letters"},{"key":"10.1016\/0031-3203(94)00085-Z_BIB12","series-title":"Proceedings of the 1991 IEEE International Symposium on Intelligent Control","first-page":"263","article-title":"Generating fuzzy rules by learning from examples","author":"Wang","year":"1991"},{"key":"10.1016\/0031-3203(94)00085-Z_BIB13","first-page":"1464","article-title":"The self-organizing map","volume":"78","author":"Kohonen","year":"1990"},{"key":"10.1016\/0031-3203(94)00085-Z_BIB14","first-page":"1162","article-title":"Fuzzy function learning with covariance ellipsoids","author":"Dickerson","year":"1993"}],"container-title":["Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:003132039400085Z?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:003132039400085Z?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T16:56:13Z","timestamp":1557075373000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/003132039400085Z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,1]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1995,1]]}},"alternative-id":["003132039400085Z"],"URL":"https:\/\/doi.org\/10.1016\/0031-3203(94)00085-z","relation":{},"ISSN":["0031-3203"],"issn-type":[{"value":"0031-3203","type":"print"}],"subject":[],"published":{"date-parts":[[1995,1]]}}}