{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:26:55Z","timestamp":1726759615245},"reference-count":37,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001409","name":"Department of Science and Technology, Ministry of Science and Technology, India","doi-asserted-by":"publisher","award":["SR\/S3\/EECE\/0087\/2009"],"id":[{"id":"10.13039\/501100001409","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1016\/j.eswa.2012.07.042","type":"journal-article","created":{"date-parts":[[2012,8,7]],"date-time":"2012-08-07T02:48:01Z","timestamp":1344307681000},"page":"439-449","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":18,"title":["Ant colony optimization based fuzzy binary decision tree for bimodal hand knuckle verification system"],"prefix":"10.1016","volume":"40","author":[{"given":"Amioy","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Madasu","family":"Hanmandlu","sequence":"additional","affiliation":[]},{"given":"H.M.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.eswa.2012.07.042_b0115","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/0165-0114(80)90011-1","article-title":"Fuzzy decision trees","volume":"4","author":"Adamo","year":"1980","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/j.eswa.2012.07.042_b0165","series-title":"Handbook of evolutionary computation","author":"B\u00e4ck","year":"1997"},{"issue":"5","key":"10.1016\/j.eswa.2012.07.042_b0110","doi-asserted-by":"crossref","DOI":"10.1109\/TSMCB.2008.923529","article-title":"Fuzzy SLIQ decision tree algorithm","volume":"38","author":"Chandra","year":"2008","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics\u2014Part B: Cybernetics"},{"issue":"3","key":"10.1016\/j.eswa.2012.07.042_b0130","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2008.05.020","article-title":"Fuzzy classification systems based on fuzzy information gain measures","volume":"36","author":"Chen","year":"2009","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"10.1016\/j.eswa.2012.07.042_b0170","doi-asserted-by":"crossref","DOI":"10.1109\/4235.585892","article-title":"Ant colony system: A cooperative learning approach to the traveling salesman problem","volume":"1","author":"Dorigo","year":"1997","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"4","key":"10.1016\/j.eswa.2012.07.042_b0030","doi-asserted-by":"crossref","first-page":"1316","DOI":"10.1016\/j.patcog.2007.08.016","article-title":"Palmprint verification based on principal lines","volume":"41","author":"Huang","year":"2008","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.eswa.2012.07.042_b0045","unstructured":"Jain, A. K., Ross, A., & Pankanti, S. (1999). A prototype hand geometry-based verification system. In: Proceedings of the 2nd international conference on audio- and video-based biometric person authentication (pp. 166\u2013171)."},{"key":"10.1016\/j.eswa.2012.07.042_b0005","series-title":"Handbook of biometrics","author":"Jain","year":"2007"},{"issue":"1","key":"10.1016\/j.eswa.2012.07.042_b0145","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","article-title":"An Introduction to biometric recognition","volume":"14","author":"Jain","year":"2004","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"I","key":"10.1016\/j.eswa.2012.07.042_b0120","first-page":"1","article-title":"Fuzzy decision trees: Issues and methods","volume":"28","author":"Janikow","year":"1998","journal-title":"IEEE Transactions on Man, System and Cybernetics"},{"issue":"5","key":"10.1016\/j.eswa.2012.07.042_b0035","doi-asserted-by":"crossref","first-page":"1504","DOI":"10.1016\/j.patcog.2007.10.011","article-title":"Palmprint verification based on robust line orientation code","volume":"41","author":"Jia","year":"2008","journal-title":"Pattern Recognition"},{"issue":"3","key":"10.1016\/j.eswa.2012.07.042_b0025","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1016\/j.patcog.2005.08.014","article-title":"Palmprint identification using feature-level fusion","volume":"39","author":"Kong","year":"2006","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.eswa.2012.07.042_b0070","doi-asserted-by":"crossref","unstructured":"Kumar, A., & Prathyusha, K. V. (2008). Personal authentication using hand vein triangulation. In: Proceedings of SPIE biometric technology for human identification (vol. 6944, pp. 69440E\u201369440E-13).","DOI":"10.1117\/12.779159"},{"key":"10.1016\/j.eswa.2012.07.042_b0175","doi-asserted-by":"crossref","unstructured":"Kumar, Amioy, Hanmandlu, M., & Gupta, H. M. (2010). Decision level biometric fusion using Ant Colony Optimization. In: 17th IEEE international conference on image processing (ICIP) (pp. 3105\u20133108). 26\u201329 September.","DOI":"10.1109\/ICIP.2010.5654019"},{"key":"10.1016\/j.eswa.2012.07.042_b0135","doi-asserted-by":"crossref","unstructured":"Kumar, Amioy, Hanmandlu, Madasu, Das, Attindra, Gupta, H.M. (2012). Biometric based personal authentication using fuzzy binary decision tree, In: 5th IAPR international conference on biometrics (ICB). New Delhi, India (pp. 396\u2013401).","DOI":"10.1109\/ICB.2012.6199783"},{"issue":"1","key":"10.1016\/j.eswa.2012.07.042_b0155","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TIFS.2009.2031892","article-title":"A new framework for adaptive multimodal biometrics management","volume":"5","author":"Kumar","year":"2010","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"10.1016\/j.eswa.2012.07.042_b0085","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/TIFS.2008.2011089","article-title":"Personal authentication using finger knuckle surface","volume":"4","author":"Kumar","year":"2009","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"20","key":"10.1016\/j.eswa.2012.07.042_b0090","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1049\/el.2009.1435","article-title":"Personal identification using finger knuckle orientation features","volume":"45","author":"Kumar","year":"2009","journal-title":"Electronic Letters"},{"key":"10.1016\/j.eswa.2012.07.042_b0095","doi-asserted-by":"crossref","unstructured":"Li, Q., Qiu, Z., Sun, D., & Wu, J. (2004). Personal identification using knuckleprint. In: Proceedings of SinoBiometrics (pp. 680\u2013689).","DOI":"10.1007\/978-3-540-30548-4_78"},{"key":"10.1016\/j.eswa.2012.07.042_b0010","series-title":"Handbook of fingerprint recognition","author":"Maltoni","year":"2003"},{"key":"10.1016\/j.eswa.2012.07.042_b0140","unstructured":"Nandkumar, Karthik. (2002). Integration of multiple cues in biometric systems, M.S. Thesis, Department of Computer Science and Engineering. Michigan State University, 2005."},{"issue":"1","key":"10.1016\/j.eswa.2012.07.042_b0100","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s00521-007-0160-4","article-title":"A multi-matcher system based on knuckle-based features","volume":"18","author":"Nanni","year":"2009","journal-title":"Neural Computing & Applications"},{"key":"10.1016\/j.eswa.2012.07.042_b0160","unstructured":"Peer, E. S., Bergh, van dan F., Engelbrecht, A.P. (2003). Using neighbourhoods with the guaranteed convergence PSO. In: IEEE Proceedings of swarm intelligence (pp. 235\u2013242). USA, April."},{"key":"10.1016\/j.eswa.2012.07.042_b0200","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/BF00116251","article-title":"Induction of decision trees","volume":"1","author":"Quinlan","year":"1986","journal-title":"Machine Learning"},{"key":"10.1016\/j.eswa.2012.07.042_b0015","series-title":"Automatic fingerprint recognition systems","author":"Ratha","year":"2004"},{"issue":"10","key":"10.1016\/j.eswa.2012.07.042_b0050","doi-asserted-by":"crossref","first-page":"1168","DOI":"10.1109\/34.879796","article-title":"Biometric identification through hand geometry measurements","volume":"22","author":"Sanchez-Reillo","year":"2000","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"10.1016\/j.eswa.2012.07.042_b0125","unstructured":"Umanol, M., Okamoto, H., Hatono, I., Tamura, H., Kawachi, F., Umedzu, S., et al. (1994). Fuzzy decision trees by fuzzy ID3 algorithm and its application to diagnosis systems. In: Proceedings of the 3rd IEEE conference on fuzzy systems (vol. 3, pp. 2113\u20132118), June."},{"issue":"3","key":"10.1016\/j.eswa.2012.07.042_b0150","doi-asserted-by":"crossref","DOI":"10.1109\/TSMCC.2005.848191","article-title":"An adaptive multimodal biometric management algorithm","volume":"35","author":"Veeramachaneni","year":"2005","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics\u2014Part C: Applications and Reviews"},{"key":"10.1016\/j.eswa.2012.07.042_b0060","doi-asserted-by":"crossref","unstructured":"Wang, Lingyu, & Leedham, G. (2006). Near- and far-infrared imaging for vein pattern biometrics. In: IEEE international conference on video based surveillance international conference.","DOI":"10.1109\/AVSS.2006.80"},{"issue":"5","key":"10.1016\/j.eswa.2012.07.042_b0065","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1016\/j.patcog.2007.10.021","article-title":"Personal recognition by fusing palmprint and palm vein images based on \u201cLapacianpalm\u201d representation","volume":"41","author":"Wang","year":"2008","journal-title":"Pattern Recognition"},{"issue":"3","key":"10.1016\/j.eswa.2012.07.042_b0075","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.cviu.2005.06.003","article-title":"Finger surface as a biometric identifier","volume":"100","author":"Woodard","year":"2005","journal-title":"Computer Vision and Image Understanding"},{"key":"10.1016\/j.eswa.2012.07.042_b0080","unstructured":"Woodard, D. L., & Flynn, P. J. (2005). Personal identification utilizing finger surface features. In: Proceedings of CVPR\u201905 (vol. 2, pp. 1030\u20131036)."},{"issue":"7","key":"10.1016\/j.eswa.2012.07.042_b0055","doi-asserted-by":"crossref","DOI":"10.1109\/TIP.2006.873439","article-title":"Shape-based hand recognition","volume":"15","author":"Yoruk","year":"2006","journal-title":"IEEE Transactions on Image Processing"},{"issue":"9","key":"10.1016\/j.eswa.2012.07.042_b0020","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1109\/TPAMI.2003.1227981","article-title":"Online palmprint identification","volume":"25","author":"Zhang","year":"2003","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"7","key":"10.1016\/j.eswa.2012.07.042_b0185","doi-asserted-by":"crossref","first-page":"2522","DOI":"10.1016\/j.patcog.2012.01.017","article-title":"Phase congruency induced local features for finger-knuckle-print recognition","volume":"45","author":"Zhang","year":"2012","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.eswa.2012.07.042_b0105","doi-asserted-by":"crossref","first-page":"2560","DOI":"10.1016\/j.patcog.2010.01.020","article-title":"Online finger-knuckle-print verification for personal authentication","volume":"43","author":"Zhang","year":"2010","journal-title":"Pattern Recognition"},{"issue":"9","key":"10.1016\/j.eswa.2012.07.042_b0190","doi-asserted-by":"crossref","first-page":"1990","DOI":"10.1016\/j.patcog.2010.06.007","article-title":"Ensemble of local and global information for finger-knuckle-print recognition","volume":"44","author":"Zhang","year":"2011","journal-title":"Pattern Recognition"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417412008974?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417412008974?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T03:23:46Z","timestamp":1714533826000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417412008974"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,2]]}},"alternative-id":["S0957417412008974"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2012.07.042","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2013,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Ant colony optimization based fuzzy binary decision tree for bimodal hand knuckle verification system","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2012.07.042","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2012 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}