{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:36:42Z","timestamp":1729647402135,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/coginf.2011.6016128","type":"proceedings-article","created":{"date-parts":[[2011,9,20]],"date-time":"2011-09-20T18:40:43Z","timestamp":1316544043000},"page":"112-119","source":"Crossref","is-referenced-by-count":32,"title":["A novel fuzzy multimodal information fusion technology for human biometric traits identification"],"prefix":"10.1109","author":[{"given":"Md. Maruf","family":"Monwar","sequence":"first","affiliation":[]},{"given":"Marina","family":"Gavrilova","sequence":"additional","affiliation":[]},{"given":"Yingxu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/34.598228"},{"key":"15","first-page":"458","article-title":"Secured access control through Markov chain based rank level fusion method","author":"monwar","year":"0","journal-title":"Proc 5th VISAPP Angers France 2010"},{"journal-title":"Fuzzy Logic Intelligence Control and Information","year":"1999","author":"yen","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74827-4_101"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383387"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2009.01.010"},{"key":"12","first-page":"1","article-title":"Fuzzy logic decision fusion in a multimodal biometric system","author":"lau","year":"0","journal-title":"Proc of 8th ICSLP Jeju Island Korea 2004"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICIAP.1999.797683"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/5.628669"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/11919629_21"},{"key":"23","doi-asserted-by":"crossref","first-page":"1233","DOI":"10.1152\/jn.1987.58.6.1233","article-title":"An evaluation of the two-dimensional gabor filter model of simple receptive fields in cat striate cortex","volume":"58","author":"jones","year":"1987","journal-title":"J Neurophysiology"},{"journal-title":"CASIA CASIA Iris Image Database","year":"2004","key":"24"},{"journal-title":"USTB Ear Database China","year":"0","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/9780470997949"},{"journal-title":"Handbook of Multibiometrics","year":"2006","author":"ross","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77627-9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2005.05.035"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.2009071"},{"journal-title":"Me?moire Sur Les E?lections Au Scrutiny","year":"1781","author":"borda","key":"6"},{"key":"5","doi-asserted-by":"crossref","first-page":"2115","DOI":"10.1016\/S0167-8655(03)00079-5","article-title":"Information fusion \"Information fusion in biometrics","volume":"24","author":"ross","year":"2003","journal-title":"Pattern Recognition Letters"},{"key":"4","first-page":"196","article-title":"Feature level fusion using hand and face biometrics","author":"ross","year":"0","journal-title":"Proc SPIE Conf Biometric Tech for Human Identification II Orlando USA 2005"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/COGINF.2009.5250736"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"}],"event":{"name":"Cognitive Computing (ICCI-CC)","start":{"date-parts":[[2011,8,18]]},"location":"Banff, AB, Canada","end":{"date-parts":[[2011,8,20]]}},"container-title":["IEEE 10th International Conference on Cognitive Informatics and Cognitive Computing (ICCI-CC'11)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6005105\/6016112\/06016128.pdf?arnumber=6016128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T03:11:28Z","timestamp":1560654688000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6016128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/coginf.2011.6016128","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}