{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:45:37Z","timestamp":1729673137648,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/saci.2015.7208224","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T17:52:02Z","timestamp":1440093122000},"page":"335-340","source":"Crossref","is-referenced-by-count":0,"title":["Fuzzy logic adapted controller system for biometrical identification in highly-secured critical infrastructures"],"prefix":"10.1109","author":[{"given":"Gabor A.","family":"Werner","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Soft-Biometrics: Soft-Computing for Biometric-Applications","author":"1","year":"0","journal-title":"Dept of Pattern Recognition Fraunhofer IPK Berlin Germany and Dept of Electrical Engeneering"},{"year":"2007","author":"k\u00f3czy","journal-title":"Intelligent systems (Intelligens rendszerek)","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.neucom.2012.06.016"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"525","DOI":"10.15837\/ijccc.2010.4.2510","article-title":"Fingerprints Identification using a Fuzzy Logic System, Department of Informatics, University of Craiova","volume":"v","author":"iancu","year":"2010","journal-title":"J Comput Commun Control"},{"key":"ref8","first-page":"1262","article-title":"Fuzzy hierarchial control of an unmanned helicopter","author":"sugano","year":"1993","journal-title":"Proc 5th IFSA World Congr (IFSA 93)"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1049\/piee.1974.0328"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/s005000050030"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/SP.2007.21","article-title":"Fuzzy Multi-Level Security: An Experimenton Quantified Risk-Adaptive Access Control","author":"cheng","year":"2007","journal-title":"IEEE Symposium on Security & Privacy 2007"},{"key":"ref1","first-page":"9","article-title":"The first five decades of soft-computing methods (A l&#x00E1;gy sz&#x00E1;mit&#x00E1;si m&#x00F3;dszerek els&#x00F6; &#x00F6;t &#x00E9;vtizede)","author":"takacs","year":"0","journal-title":"L&#x00E9;t&#x00FC;nk 2012\/2"}],"event":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (SACI)","start":{"date-parts":[[2015,5,21]]},"location":"Timisoara, Romania","end":{"date-parts":[[2015,5,23]]}},"container-title":["2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7165000\/7208165\/07208224.pdf?arnumber=7208224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T14:01:40Z","timestamp":1498226500000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7208224\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/saci.2015.7208224","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}