{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T14:18:07Z","timestamp":1649168287079},"reference-count":17,"publisher":"International Academy Publishing (IAP)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.6.6.1025-1033","type":"journal-article","created":{"date-parts":[[2011,6,3]],"date-time":"2011-06-03T13:21:48Z","timestamp":1307107308000},"source":"Crossref","is-referenced-by-count":0,"title":["Identity Attributes Mining, Metrics Composition and Information Fusion Implementation Using Fuzzy Inference System"],"prefix":"10.17706","volume":"6","author":[{"given":"Jackson","family":"Phiri","sequence":"first","affiliation":[]},{"given":"Tie-Jun","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jameson","family":"Mbale","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2011,6,3]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.04.030"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IPCC.2005.1494244"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.41","article-title":"Privacy and Identity Management","volume":"6","author":"Hansen","year":"2008","journal-title":"Security & Privacy, IEEE"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.11.018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.006"},{"key":"ref6","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/BROADCOM.2008.52","article-title":"Development of Digital Environment Identity (DEITY) System for Online Access","volume-title":"Third International Conference","author":"Agbinya","year":"2008"},{"key":"ref7","article-title":"Biometrics in Identity Management Systems","volume-title":"Security & Privacy","volume":"6","author":"Wayman","year":"2008"},{"key":"ref8","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/ICNICONSMCL.2006.152","article-title":"J.I, Modelling and Information Fusion in Digital Identity Management Systems, Networking","volume-title":"International Conference on Systems and International Conference on Mobile Communications and Learning Technologies","author":"Phiri","year":"2006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2004.12.004","article-title":"Information Theory, Novelty and Hippocampal Responses: Unpredicted or Unpredictable?","volume":"18","author":"Strange","year":"2005","journal-title":"Elsevier Science Direct Journal, Neural Networks"},{"key":"ref10","volume-title":"Fundamentals of Information Theory and Coding Design","author":"Togneri","year":"2002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.02.021"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.04.002"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"Manning","year":"2008"},{"key":"ref14","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/FUZZ.2002.1006631","article-title":"Granulating Data on Non-Scalar Attribute Values","volume-title":"Proceedings of the 2002 IEEE International Conference","author":"Mazlack","year":"2002"},{"key":"ref15","volume-title":"Artificial Intelligence, \u201cA Guide to Intelligent Systems","author":"Negnevitsky","year":"2004","edition":"Second Edition"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2005.04.003","article-title":"A New Metric Based on Extended Spatial Frequency and its Application to DWT Based Fusion Algorithms","volume":"8","author":"Zheng","year":"2007","journal-title":"Elsevier, Information Fusion."},{"key":"ref17","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/ICASSP.2005.1416346","article-title":"A Two-Level Fusion Approach to Multimodal Biometric Verification","volume-title":"ICASSIP IEEE Conference","author":"Cheung","year":"2005"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T21:07:00Z","timestamp":1497906420000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/4163"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,3]]},"references-count":17,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2011,6,3]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.6.6.1025-1033","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2011,6,3]]}}}