{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:18Z","timestamp":1750221078295,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T00:00:00Z","timestamp":1546041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,29]]},"DOI":"10.1145\/3301551.3301601","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"209-213","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Single Biometric Recognition Research"],"prefix":"10.1145","author":[{"given":"Xinman","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Electronics and Information Engineering, MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, Shaanxi, P.R. China"}]},{"given":"Qi","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, Shaanxi, P.R. China"}]},{"given":"Xuebin","family":"Xu","sequence":"additional","affiliation":[{"name":"Guangdong Xi'an Jiaotong University Academy, Foshan, China"}]},{"given":"Zhiyuan","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, P.R. China"}]}],"member":"320","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2015.2412944"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03253248"},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/wearable.yesky.com\/222\/303776722.shtml?qq-pf-to=pcqq.c2c  http:\/\/wearable.yesky.com\/222\/303776722.shtml?qq-pf-to=pcqq.c2c"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.14"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"issue":"9","key":"e_1_3_2_1_6_1","first-page":"134","article-title":"System for Automatic Singing Voice Recognition {J}","volume":"56","year":"2008","unstructured":"PAWEL ZWAN, BOZENA KOSTEK . System for Automatic Singing Voice Recognition {J} . Journal of the Audio Engineering Society , 2008 , 56 ( 9 ): 134 -- 158 . PAWEL ZWAN, BOZENA KOSTEK. System for Automatic Singing Voice Recognition {J}. Journal of the Audio Engineering Society, 2008, 56(9): 134--158.","journal-title":"Journal of the Audio Engineering Society"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.02.155"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012365806338"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01246633"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.668573"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of ACCV'2002","author":"Wang T","year":"2002","unstructured":"Y Wang , T Tan el. Iris recognition using circular symmetric filters . Proceedings of ACCV'2002 , 2002 , I:279--283 Y Wang, T Tan el. Iris recognition using circular symmetric filters. Proceedings of ACCV'2002, 2002, I:279--283"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.01.0101.0203"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(01)00179-9"},{"key":"e_1_3_2_1_15_1","first-page":"869","article-title":"approach to line feature representation and matching for palmprint recognition.","volume":"15","author":"Wu X","year":"2004","unstructured":"Wu X , Wang K , Zhang D. An approach to line feature representation and matching for palmprint recognition. Journal of software , 2004 , 15 : 869 -- 880 . Wu X, Wang K, Zhang D.An approach to line feature representation and matching for palmprint recognition.Journal of software, 2004, 15:869--880.","journal-title":"Journal of software"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"YX Wang.A Method of Line Structure Features Representation and Matching of Palmprint{J}.Journal of Electronics & Information Technology 2008 30 (6):1281--1285  YX Wang.A Method of Line Structure Features Representation and Matching of Palmprint{J}.Journal of Electronics & Information Technology 2008 30 (6):1281--1285","DOI":"10.3724\/SP.J.1146.2006.01871"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00121-3"},{"issue":"5","key":"e_1_3_2_1_18_1","first-page":"90","article-title":"A New Algorithm to Extract Contour Feature Points of Palmprint{J}","volume":"27","author":"Yan WU","year":"2010","unstructured":"LI Yan , WU Gui -fang, etc. A New Algorithm to Extract Contour Feature Points of Palmprint{J} . Microelectronics & Computer , 2010 , 27 ( 5 ): 90 -- 94 LI Yan, WU Gui-fang, etc. A New Algorithm to Extract Contour Feature Points of Palmprint{J}. Microelectronics & Computer, 2010, 27(5):90--94","journal-title":"Microelectronics & Computer"},{"key":"e_1_3_2_1_19_1","first-page":"748","article-title":"of palmprint texture features using combined DWT-DCT and local binary pattern.","volume":"2017","author":"Ramteke A","unstructured":"RJ Ramteke , A Alsubari .Extraction of palmprint texture features using combined DWT-DCT and local binary pattern. International Conference on Next Generation Computing Technologies , 2017 : 748 -- 753 RJ Ramteke, A Alsubari.Extraction of palmprint texture features using combined DWT-DCT and local binary pattern.International Conference on Next Generation Computing Technologies, 2017:748--753","journal-title":"International Conference on Next Generation Computing Technologies"},{"key":"e_1_3_2_1_20_1","volume-title":"Technology & Automation","author":"Gudipati VK","year":"2017","unstructured":"Gudipati VK , Barman OR , Gaffoor M , Efficient facial expression recognition using AdaBoost and haar cascade classifiers{C}\/\/ Industrial Electronics , Technology & Automation , 2017 . Gudipati VK, Barman OR, Gaffoor M, et al. Efficient facial expression recognition using AdaBoost and haar cascade classifiers{C}\/\/ Industrial Electronics, Technology & Automation, 2017."},{"issue":"2","key":"e_1_3_2_1_21_1","first-page":"89","article-title":"Building Domain Specific Languages for Voice Recognition Applications {J}","year":"2008","unstructured":"C ristian IONITA . Building Domain Specific Languages for Voice Recognition Applications {J} . Informatica Economica Journal , 2008 , XII ( 2 ): 89 -- 101 . C ristian IONITA. Building Domain Specific Languages for Voice Recognition Applications {J}. Informatica Economica Journal, 2008, XII (2):89--101.","journal-title":"Informatica Economica Journal"},{"issue":"1","key":"e_1_3_2_1_22_1","article-title":"Vector Quantization Approach for Speaker Recognition using MFCC and Inverted MFCC {J}","volume":"17","author":"Satyanand Singh E G","year":"2011","unstructured":"Satyanand Singh , E G Rajan . Vector Quantization Approach for Speaker Recognition using MFCC and Inverted MFCC {J} . International Journal of Computer Applications , 2011 , 17 ( 1 ). Satyanand Singh, E G Rajan. Vector Quantization Approach for Speaker Recognition using MFCC and Inverted MFCC {J}. International Journal of Computer Applications, 2011, 17 (1).","journal-title":"International Journal of Computer Applications"}],"event":{"name":"ICIT 2018: IoT and Smart City","sponsor":["The Hong Kong Polytechnic The Hong Kong Polytechnic University","TU Tianjin University"],"location":"Hong Kong Hong Kong","acronym":"ICIT 2018"},"container-title":["Proceedings of the 6th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301601","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301551.3301601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:35Z","timestamp":1750208255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301601"}},"subtitle":["A Summary"],"short-title":[],"issued":{"date-parts":[[2018,12,29]]},"references-count":22,"alternative-id":["10.1145\/3301551.3301601","10.1145\/3301551"],"URL":"https:\/\/doi.org\/10.1145\/3301551.3301601","relation":{},"subject":[],"published":{"date-parts":[[2018,12,29]]},"assertion":[{"value":"2018-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}