{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:36:43Z","timestamp":1729625803653,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/icb.2012.6199783","type":"proceedings-article","created":{"date-parts":[[2012,8,8]],"date-time":"2012-08-08T17:11:43Z","timestamp":1344445903000},"page":"396-401","source":"Crossref","is-referenced-by-count":5,"title":["Biometric based personal authentication using fuzzy binary decision tree"],"prefix":"10.1109","author":[{"given":"Amioy","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Madasu","family":"Hanmandlu","sequence":"additional","affiliation":[]},{"given":"Attindra","family":"Das","sequence":"additional","affiliation":[]},{"given":"H. M.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4563110"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1227981"},{"year":"0","author":"kumar","key":"11"},{"year":"0","author":"kumar","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/34.954606"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00079-5"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"10","first-page":"234","article-title":"Can a machine frobnicate?","volume":"14","author":"alpher","year":"2004","journal-title":"Journal of Foo"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.875214"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1109\/TSMCB.2005.846648","article-title":"A parallel decision tree-based method for user authentication based on keystroke patterns","volume":"35","author":"sheng","year":"2005","journal-title":"IEEE Transactions on Systems Man and Cybernetics-Part B Cybernetics"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2009.02.007"},{"key":"4","article-title":"Face recognition with decision tree-based local binary patterns","volume":"4","author":"maturana","year":"2010","journal-title":"Proc ACC"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"}],"event":{"name":"2012 5th IAPR International Conference on Biometrics (ICB)","start":{"date-parts":[[2012,3,29]]},"location":"New Delhi, India","end":{"date-parts":[[2012,4,1]]}},"container-title":["2012 5th IAPR International Conference on Biometrics (ICB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6195082\/6199747\/06199783.pdf?arnumber=6199783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T22:37:20Z","timestamp":1497998240000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6199783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icb.2012.6199783","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}