{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T16:46:45Z","timestamp":1694623605313},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[1988,1,1]],"date-time":"1988-01-01T00:00:00Z","timestamp":567993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst., Man, Cybern."],"published-print":{"date-parts":[[1988]]},"DOI":"10.1109\/21.23087","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T22:40:25Z","timestamp":1030228825000},"page":"873-884","source":"Crossref","is-referenced-by-count":2,"title":["Two approximate operators for a data base query language: sounds-like and close-to"],"prefix":"10.1109","volume":"18","author":[{"given":"E.B.","family":"McClelland","sequence":"first","affiliation":[]},{"given":"R.P.","family":"Trueblood","sequence":"additional","affiliation":[]},{"given":"C.M.","family":"Eastman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/6168.6172"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/602259.602286"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(82)90003-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/322234.322239"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/320083.320088"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(85)80018-3"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/42005.42022"},{"key":"ref36","first-page":"376","article-title":"The active information system: a data-driven system for the analysis of imprecise data","author":"montgomery","year":"1981","journal-title":"Proc 7th Int Conf Very Large Databases"},{"key":"ref35","author":"mcclelland","year":"1987","journal-title":"Sounds-like and close-to two approximate operators for the BDB system"},{"key":"ref34","author":"martin","year":"1986","journal-title":"Adv Database Technol"},{"key":"ref60","author":"wilson","year":"1981","journal-title":"Programmed Word Attack for Teachers"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(78)80003-0"},{"key":"ref61","first-page":"458","article-title":"Best-match querying in general database systerns?A language approach","author":"yang","year":"0","journal-title":"Proc COMPSAC 1978"},{"key":"ref63","first-page":"642","article-title":"Approximate reasoning as a basis for an intelligent information systems design","author":"zemankova","year":"1986","journal-title":"Proc NAFIPS '86 1986 Conf North American Fuzzy Information Processing Society"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(85)90013-4"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(85)90008-8"},{"key":"ref27","author":"komisar","year":"1980","journal-title":"Blends and Digraphs"},{"key":"ref65","article-title":"Linguistic relations in knowledge based systems","author":"zhang","year":"1986","journal-title":"Proc 3rd Annu USC Computer Science Symp Knowledge Based Systems Theory and Application"},{"key":"ref66","first-page":"225","article-title":"Fuzzy relational calculus","author":"zvieli","year":"1986","journal-title":"Proc 1st Int Conf Expert Database Systems"},{"key":"ref29","author":"krane","year":"1973","journal-title":"Phonics is Fun Book 3"},{"key":"ref67","first-page":"704","article-title":"On complete fuzzy relational query languages","author":"zvieli","year":"1986","journal-title":"Proc NAFIPS '86 Conf North American Fuzzy Information Processing Society"},{"key":"ref68","first-page":"320","article-title":"Entity-relationship modeling and fuzzy databases","author":"zvieli","year":"1986","journal-title":"Proc Int Conf Data Engineering"},{"key":"ref2","author":"anderberg","year":"1973","journal-title":"Cluster Analysis for Applications"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/588011.588038"},{"key":"ref20","author":"heilman","year":"1981","journal-title":"Discovering Phonics We Use Rook G"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/588111.588133"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312958"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1986.4308982"},{"key":"ref23","first-page":"473","article-title":"Finding words that sound alike?the Soundex algorithm","volume":"7","author":"jacobs","year":"1982","journal-title":"Byte Mag"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1109\/ICDE.1984.7271290","article-title":"Approaches for updating databases with incomplete information and nulls","author":"keller","year":"1984","journal-title":"Proc 1984 Int Conf Data Engineering"},{"key":"ref25","first-page":"296","article-title":"Database querying schemes with fuzzy linguistic quantifiers","author":"kacprzyk","year":"1986","journal-title":"Proc NAFIPS '86 1986 Conf North American Fuzzy Inform Processing Soc"},{"key":"ref50","author":"roberts","year":"1976","journal-title":"Discrete mathematical models with applications to social biological and environmental problems"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(84)80020-6"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(84)80052-8"},{"key":"ref58","author":"van rijsbergen","year":"1979","journal-title":"Information Retrieval"},{"key":"ref57","first-page":"247","article-title":"Adding security to a relational database management system running on a UNISYS B20 microcomputer network","author":"trueblood","year":"1988","journal-title":"Proc SECURICOM 88 6th Worldwide Congress on Computer and Communications Security and Protection"},{"key":"ref56","year":"1987","journal-title":"User s Guide"},{"key":"ref55","first-page":"258","article-title":"A modular relational database management system for teaching courses involving database topics","author":"trueblood","year":"1985","journal-title":"Proc 1st Int Conf Computers in Institutions of Higher Education"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(77)90018-8"},{"key":"ref53","author":"sneath","year":"1973","journal-title":"Numerical Taxonomy The Principles and Practice of Numerical Classification"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(86)90003-7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(82)80070-9"},{"key":"ref11","first-page":"140","article-title":"Approaches to approximate retrieval in database management systems","author":"eastman","year":"1987","journal-title":"NAFIPS 87 Proc North American Fuzzy Inform Processing Soc Workshop"},{"key":"ref40","first-page":"85","article-title":"Supporting goal queries in relational databases","author":"motro","year":"1986","journal-title":"Proc 1st Int Conf Expert Database Syst"},{"key":"ref12","author":"everitt","year":"1980","journal-title":"Cluster Analysis"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1109\/ICDE.1986.7266237","article-title":"A probability model of uncertainty in data bases","author":"gelenbe","year":"1986","journal-title":"1986 Int Conf Data Eng"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(85)90022-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(77)90013-8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(79)90138-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/356827.356830"},{"key":"ref18","author":"hartigan","year":"1975","journal-title":"Clustering Algorithms"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0888-613X(87)90003-X"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(84)90098-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199109)42:8<554::AID-ASI3>3.0.CO;2-J"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(82)90052-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/356789.356797"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1979.4766924"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1978.231464"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(87)90149-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/24820.24823"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(84)90020-3"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(84)90014-0"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/42338.42344"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(198703)38:2<118::AID-ASI5>3.0.CO;2-L"},{"key":"ref42","year":"1918"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1983.6313144"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/12047.13676"},{"key":"ref43","author":"otto","year":"1984","journal-title":"Introduction to Statistical Methods and Data Analysis"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx1\/21\/899\/00023087.pdf?arnumber=23087","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:02:59Z","timestamp":1638216179000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/23087\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988]]},"references-count":68,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/21.23087","relation":{},"ISSN":["0018-9472"],"issn-type":[{"value":"0018-9472","type":"print"}],"subject":[],"published":{"date-parts":[[1988]]}}}