{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:06:21Z","timestamp":1730207181152,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/cis58238.2022.00013","type":"proceedings-article","created":{"date-parts":[[2023,4,7]],"date-time":"2023-04-07T13:26:14Z","timestamp":1680873974000},"page":"24-27","source":"Crossref","is-referenced-by-count":0,"title":["Near zero fuzzy solution of fully fuzzy linear systems+<\/sup>"],"prefix":"10.1109","author":[{"given":"Xiaobin","family":"Guo","sequence":"first","affiliation":[{"name":"College of Mathematics and Statistics, Northwest Normal University,Lanzhou,China,730070"}]},{"given":"Yimin","family":"Qiao","sequence":"additional","affiliation":[{"name":"College of Mathematics and Statistics, Northwest Normal University,Lanzhou,China,730070"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10598-015-9283-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(98)00102-X"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.07.045"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(78)90011-8"},{"key":"ref11","first-page":"33","article-title":"Solving LR fuzzy linear matrix equation","volume":"16","author":"guo","year":"2019","journal-title":"Iranian Journal of Fuzzy Systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.12.054"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2012.03.037"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.10.045"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2016.08.003"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2006.02.027"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2015.03.042"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(96)00270-9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-022-06861-y"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v19i2.18023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CIS54983.2021.00055"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/00207727808941724"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.03.085"}],"event":{"name":"2022 18th International Conference on Computational Intelligence and Security (CIS)","start":{"date-parts":[[2022,12,16]]},"location":"Chengdu, China","end":{"date-parts":[[2022,12,18]]}},"container-title":["2022 18th International Conference on Computational Intelligence and Security (CIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10091210\/10091169\/10091392.pdf?arnumber=10091392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T14:21:44Z","timestamp":1682950904000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10091392\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cis58238.2022.00013","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]}}}