{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T06:29:00Z","timestamp":1742797740281},"reference-count":22,"publisher":"Elsevier BV","issue":"11","license":[{"start":{"date-parts":[[1996,11,1]],"date-time":"1996-11-01T00:00:00Z","timestamp":846806400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Recognition"],"published-print":{"date-parts":[[1996,11]]},"DOI":"10.1016\/0031-3203(96)00040-4","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T11:01:39Z","timestamp":1027594899000},"page":"1821-1833","source":"Crossref","is-referenced-by-count":7,"title":["Handwritten digit recognition using combined ID3-derived fuzzy rules and Markov chains"],"prefix":"10.1016","volume":"29","author":[{"given":"Zheru","family":"Chi","sequence":"first","affiliation":[]},{"given":"Mark","family":"Suters","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Yan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0031-3203(96)00040-4_BIB1","first-page":"570","article-title":"Fuzzy logic for handwritten numeral character recognition","author":"Siy","year":"1974","journal-title":"IEEE Trans. on Syst., Man Cybern."},{"issue":"12","key":"10.1016\/0031-3203(96)00040-4_BIB2","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1109\/TSMC.1980.4308414","article-title":"Attributed grammar-a tool for combining syntactic and statistical approaches to pattern recognition","volume":"SMC10","author":"Tsai","year":"1980","journal-title":"IEEE Trans. Syst., Man Cybern."},{"issue":"4","key":"10.1016\/0031-3203(96)00040-4_BIB3","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1109\/TPAMI.1985.4767684","article-title":"Attributed string matching with merging for shape recognition","volume":"PAMI-7","author":"Tsai","year":"1985","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/0031-3203(96)00040-4_BIB4","series-title":"Proc. Eighth Int. Conf. Pattern Recognition","first-page":"1063","article-title":"Attributed string matching with statistical constraints for character recognition","author":"Kurosawa","year":"1986"},{"key":"10.1016\/0031-3203(96)00040-4_BIB5","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/BF00116251","article-title":"Induction of decision trees","volume":"1","author":"Quinlan","year":"1986","journal-title":"Machine Learning"},{"key":"10.1016\/0031-3203(96)00040-4_BIB6","series-title":"Proc. Second Australian Conf. Neural Networks","first-page":"263","article-title":"A comparison of MLP and ID3derived approaches for ECG classification","author":"Chi","year":"1991"},{"key":"10.1016\/0031-3203(96)00040-4_BIB7","unstructured":"T. G. Dietterich, H. Hild and G. Bakiri, A comparison of ID3 and backpropagation for English text-to-speech mapping, Technical Report, Department of Computer Science, Oregon State University, Corvallis, OR 9733-13102, U.S.A."},{"issue":"1","key":"10.1016\/0031-3203(96)00040-4_BIB8","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/91.481842","article-title":"ID3-derived fuzzy rules and optimized defuzzification for hand-written numeral recognition","volume":"4","author":"Chi","year":"1996","journal-title":"IEEE Trans. Fuzzy Systems"},{"key":"10.1016\/0031-3203(96)00040-4_BIB9","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/0167-8655(94)90050-7","article-title":"Handwritten digit recognition using optimized nearest neighbor classifiers","volume":"15","author":"Yan","year":"1994","journal-title":"Pattern Recognition Lett."},{"key":"10.1016\/0031-3203(96)00040-4_BIB10","first-page":"491","article-title":"Digital Image Processing","author":"Gonzalez","year":"1992"},{"key":"10.1016\/0031-3203(96)00040-4_BIB11","series-title":"NIST special database 3 handwritten segmented characters","author":"Garris","year":"1992"},{"key":"10.1016\/0031-3203(96)00040-4_BIB12","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/S0020-7373(87)80053-6","article-title":"Simplifying decision trees","volume":"27","author":"Quinlan","year":"1987","journal-title":"Int. J. ManMachine Studies"},{"issue":"2","key":"10.1016\/0031-3203(96)00040-4_BIB13","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1109\/21.52551","article-title":"Fuzzy logic in control systems: fuzzy logic controller, Part 1","volume":"20","author":"Lee","year":"1990","journal-title":"IEEE Trans. Syst., Man Cybern."},{"issue":"2","key":"10.1016\/0031-3203(96)00040-4_BIB14","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1109\/21.52552","article-title":"Fuzzy logic in control systems: fuzzy logic controller, Part 11","volume":"20","author":"Lee","year":"1990","journal-title":"IEEE Trans. on Syst., Man Cybern."},{"key":"10.1016\/0031-3203(96)00040-4_BIB15","series-title":"Fuzzy Models for Pattern Recognition","author":"Bezdek","year":"1992"},{"issue":"21","key":"10.1016\/0031-3203(96)00040-4_BIB16","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1049\/el:19931225","article-title":"Map image segmentation based on thresholding and fuzzy rules","volume":"29","author":"Chi","year":"1993","journal-title":"Electronics Lett."},{"issue":"5","key":"10.1016\/0031-3203(96)00040-4_BIB17","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1016\/0893-6080(94)00109-Y","article-title":"Handwritten numeral recognition using a small number of fuzzy rules with optimized defuzzification parameters","volume":"8","author":"Chi","year":"1995","journal-title":"Neural Networks"},{"key":"10.1016\/0031-3203(96)00040-4_BIB18","series-title":"Proc. Second IEEE Int. Conf. Fuzzy Systems","first-page":"7","article-title":"Uncertain reasoning in an ID3 machine learning framework","author":"Maher","year":"1993"},{"issue":"2","key":"10.1016\/0031-3203(96)00040-4_BIB19","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/TC.1979.1675310","article-title":"Word-level recognition of cursive script","volume":"28","author":"Farag","year":"1979","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"10.1016\/0031-3203(96)00040-4_BIB20","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/21.155943","article-title":"Methods of combining multiple classifiers and their applications to handwriting recognition","volume":"22","author":"Xu","year":"1992","journal-title":"IEEE Trans. Systems, Man Cybern."},{"key":"10.1016\/0031-3203(96)00040-4_BIB21","series-title":"Nearest Neighbor (NN) Norms: NN Pattern Classification Techniques","year":"1991"},{"key":"10.1016\/0031-3203(96)00040-4_BIB22","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/0031-3203(93)90040-4","article-title":"Prototype optimization for nearest neighbor classifiers using a two-layer neural network","volume":"26","author":"Yan","year":"1993","journal-title":"Pattern Recognition"}],"container-title":["Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0031320396000404?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0031320396000404?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T13:22:43Z","timestamp":1556371363000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0031320396000404"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,11]]},"references-count":22,"journal-issue":{"issue":"11","published-print":{"date-parts":[[1996,11]]}},"alternative-id":["0031320396000404"],"URL":"https:\/\/doi.org\/10.1016\/0031-3203(96)00040-4","relation":{},"ISSN":["0031-3203"],"issn-type":[{"value":"0031-3203","type":"print"}],"subject":[],"published":{"date-parts":[[1996,11]]}}}