{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:24:23Z","timestamp":1771662263982,"version":"3.50.1"},"reference-count":26,"publisher":"Zhejiang University Press","issue":"12","license":[{"start":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T00:00:00Z","timestamp":1291161600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Zhejiang Univ. - Sci. C"],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1631\/jzus.c0910749","type":"journal-article","created":{"date-parts":[[2010,12,30]],"date-time":"2010-12-30T14:39:04Z","timestamp":1293719944000},"page":"976-988","source":"Crossref","is-referenced-by-count":4,"title":["A Chebyshev\/Legendre polynomial interpolation approach for fingerprint orientation estimation smoothing and prediction"],"prefix":"10.1631","volume":"11","author":[{"given":"Ashkan","family":"Tashk","sequence":"first","affiliation":[]},{"given":"Mohammad Sadegh","family":"Helfroush","sequence":"additional","affiliation":[]},{"given":"Mohammad Javad","family":"Dehghani","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2010,12,11]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2002.1017618"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/34.765653"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1006\/gmip.1995.1040"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00178-X"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/b978-012119792-6\/50131-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/5.628674"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/icpr.2000.906252"},{"key":"ref8","volume-title":"Fingerprint Verification MatlabGUI, Final Year Honors Project for CS Bachelor Degree","author":"Jilli","year":"2003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0734-189x(87)90043-0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.08.010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/34.990140"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/34.566808"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25948-0_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref15","volume-title":"Numerical Optimization","author":"Nocedal","year":"2006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-0392-3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw.2008.4563118"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/34.142908"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.1989.37829"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(93)90006-I"},{"key":"ref21","article-title":"Development and Evalutation of a Reader of Fingerprint Minutiae","author":"Stock","year":"1969","journal-title":"Technical Report, XM-2478-X-1:13\u201317, Cornell Aeronautical Laboratory, New York, USA"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ic4.2009.4909232"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00154-9"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1003"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2003.822608"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/s0031-3203(03)00186-9"}],"container-title":["Journal of Zhejiang University SCIENCE C"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/jzus.C0910749.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1631\/jzus.C0910749\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/jzus.C0910749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:47:47Z","timestamp":1771660067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/jzus.C0910749"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":26,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["1171"],"URL":"https:\/\/doi.org\/10.1631\/jzus.c0910749","relation":{},"ISSN":["1869-1951","1869-196X"],"issn-type":[{"value":"1869-1951","type":"print"},{"value":"1869-196X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12]]}}}