{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T09:33:06Z","timestamp":1742635986227,"version":"3.37.3"},"reference-count":12,"publisher":"Wiley","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["FP6-026990"],"award-info":[{"award-number":["FP6-026990"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2012]]},"abstract":"<jats:p>We examine the efficiency of four machine learning algorithms for the fusion of several biometrics modalities to create a multimodal biometrics security system. The algorithms examined are Gaussian Mixture Models (GMMs), Artificial Neural Networks (ANNs), Fuzzy Expert Systems (FESs), and Support Vector Machines (SVMs). The fusion of biometrics leads to security systems that exhibit higher recognition rates and lower false alarms compared to unimodal biometric security systems. Supervised learning was carried out using a number of patterns from a well-known benchmark biometrics database, and the validation\/testing took place with patterns from the same database which were not included in the training dataset. The comparison of the algorithms reveals that the biometrics fusion system is superior to the original unimodal systems and also other fusion schemes found in the literature.<\/jats:p>","DOI":"10.1155\/2012\/242401","type":"journal-article","created":{"date-parts":[[2012,3,18]],"date-time":"2012-03-18T17:00:58Z","timestamp":1332090058000},"page":"1-7","source":"Crossref","is-referenced-by-count":20,"title":["Four Machine Learning Algorithms for Biometrics Fusion: A Comparative Study"],"prefix":"10.1155","volume":"2012","author":[{"given":"I. G.","family":"Damousis","sequence":"first","affiliation":[{"name":"Informatics and Telematics Institute, Centre for Research and Technology Hellas, 57001 Thessaloniki, Greece"}]},{"given":"S.","family":"Argyropoulos","sequence":"additional","affiliation":[{"name":"Informatics and Telematics Institute, Centre for Research and Technology Hellas, 57001 Thessaloniki, Greece"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00079-5"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/962081.962102"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/265767"},{"issue":"2","key":"7","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","year":"1998","journal-title":"Data Mining and Knowledge Discovery"},{"year":"2000","key":"6"},{"issue":"1","key":"19","first-page":"1","volume":"1","year":"2010","journal-title":"Test"},{"key":"18","first-page":"1889","volume":"6","year":"2005","journal-title":"Journal of Machine Learning Research"},{"issue":"1","key":"11","first-page":"116","volume":"15","year":"1985","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2008.928241"},{"year":"1989","key":"12"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/34.990138"},{"year":"1994","key":"9"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2012\/242401.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2012\/242401.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2012\/242401.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T11:47:00Z","timestamp":1497959220000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/acisc\/2012\/242401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":12,"alternative-id":["242401","242401"],"URL":"https:\/\/doi.org\/10.1155\/2012\/242401","relation":{},"ISSN":["1687-9724","1687-9732"],"issn-type":[{"type":"print","value":"1687-9724"},{"type":"electronic","value":"1687-9732"}],"subject":[],"published":{"date-parts":[[2012]]}}}