{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:31:33Z","timestamp":1749195093206,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,26]]},"DOI":"10.1109\/acit54803.2022.9913107","type":"proceedings-article","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T19:53:28Z","timestamp":1665604408000},"page":"564-567","source":"Crossref","is-referenced-by-count":1,"title":["Access Distribution to the Evaluation System Based on Fuzzy Logic"],"prefix":"10.1109","author":[{"given":"Lesia","family":"Dubchak","sequence":"first","affiliation":[{"name":"West Ukrainian National University,Department of Computer Engineering,Ternopil,Ukraine"}]},{"given":"Nadiia","family":"Vasylkiv","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Information Computer Systems and Control,Ternopil,Ukraine"}]},{"given":"Iryna","family":"Turchenko","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Information Computer Systems and Control,Ternopil,Ukraine"}]},{"given":"Myroslav","family":"Komar","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Information Computer Systems and Control,Ternopil,Ukraine"}]},{"given":"Tetiana","family":"Nadvynychna","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Subdepartment of Psyhology and Social Work,Ternopil,Ukraine"}]},{"given":"Rudolf","family":"Volner","sequence":"additional","affiliation":[{"name":"Catholic University in Ruzomberok,Department of Informatic,Ruzomberok,Slovakia"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSCA53499.2021.9650103"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IS.2018.8710469"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095043"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39020-8_3"},{"key":"ref14","first-page":"101","article-title":"Network intrusion detection system using fuzzy logic \/ Indian","volume":"2","author":"shanmugavadivu","year":"2011","journal-title":"Journal of computer science and engineering (JCSE)"},{"key":"ref15","article-title":"Khilar Development of trust based access control models using fuzzy logic in cloud computing Journal of King Saud University - Computer and Information Sciences","author":"kesarwani","year":"2019","journal-title":"Elsevier"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2688349"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3021097"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.1994.343624"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2018.8566479"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SCM.2017.7970623"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT49673.2020.9208914"},{"key":"ref7","first-page":"138","article-title":"Fuzzy Logic System for IT Project Management CEUR Workshop","author":"vasylkiv","year":"2020","journal-title":"Proceedings (CEUR-WS org) 2nd International Workshop on Information-communication Technologies & Embedded Systems (ICT & ES- 2020)"},{"first-page":"20171765","article-title":"Fuzzy Systems: Concepts, Methodologies, Tools, and Applications (3 Volumes)Information Resources Management Association(USA)","year":"0","key":"ref2"},{"key":"ref1","first-page":"356","article-title":"An Introduction to Fuzzy Logic Applications in Intelligent Systems","author":"yager","year":"2012","journal-title":"Springer Science + Business Media"},{"key":"ref9","first-page":"40","article-title":"Estimation Method of Information System Functioning Quality Based on the Fuzzy Logic","author":"vasylkiv","year":"0","journal-title":"CEUR Workshop Proceedings (CEUR-WS org) MoMLeT + DS 2020 Modern Machine Learning Technologies and Data Science Workshop 2020"}],"event":{"name":"2022 12th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2022,9,26]]},"location":"Ruzomberok, Slovakia","end":{"date-parts":[[2022,9,28]]}},"container-title":["2022 12th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9912736\/9912739\/09913107.pdf?arnumber=9913107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:30:53Z","timestamp":1667525453000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9913107\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,26]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/acit54803.2022.9913107","relation":{},"subject":[],"published":{"date-parts":[[2022,9,26]]}}}