{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T22:21:46Z","timestamp":1751322106410,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/ntms.2012.6208758","type":"proceedings-article","created":{"date-parts":[[2012,6,6]],"date-time":"2012-06-06T21:14:34Z","timestamp":1339017274000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["Automatic Identification Based on Hand Geometry and Probabilistic Neural Networks"],"prefix":"10.1109","author":[{"given":"El-Sayed M.","family":"El-Alfy","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1992.287095"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2009.5335545"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(90)90049-Q"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCE.2008.4580798"},{"key":"16","doi-asserted-by":"crossref","first-page":"134","DOI":"10.37936\/ecti-cit.200512.51842","article-title":"Personal verification and identification using hand geometry","volume":"1","author":"covavisaruch","year":"2005","journal-title":"ECTI Transactions on Computer and Information Technology"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCE.2008.4580792"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2003.1297573"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2006.02.021"},{"key":"12","article-title":"Personal verification using palmprint and hand geometry biometric","author":"kumar","year":"0","journal-title":"Proc of 4th Int Conf on Audio- and Video-Based Biometric Person Authentication 2003"},{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques","year":"2011","author":"witten","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71041-9_5"},{"journal-title":"DTREG predictive modeling software","year":"2011","author":"sherrod","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-47044-6_4"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SoCPaR.2009.78"},{"key":"10","article-title":"A contactless hand shape identification system","author":"xin","year":"0","journal-title":"Proc of 3rd Int Conf on Advanced Computer Control (ICACC) 2011"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.823019"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2000.906228"},{"key":"5","article-title":"Personal authentication using handgeometry and palmprint features: The state of the art","author":"pavesic","year":"0","journal-title":"Proc of the Workshop on Biometrics 2004"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.02.007"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.5772\/7447"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.155"}],"event":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2012,5,7]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2012,5,10]]}},"container-title":["2012 5th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6203453\/6203739\/06208758.pdf?arnumber=6208758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T13:42:52Z","timestamp":1594215772000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6208758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ntms.2012.6208758","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}