﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051922</doi_batch_id><timestamp>20260519223105</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>6</month><day>21</day><year>2009</year></publication_date><journal_volume><volume>7</volume></journal_volume><issue>2</issue></journal_issue><journal_article publication_type="full_text"><titles><title>An Approach to Increase Internet Traffic Transmission Rate in All-Optical OPS Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>اکبر</given_name><surname>غفارپور رهبر</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2009</year></publication_date><pages><first_page>103</first_page><last_page>113</last_page></pages><doi_data><doi>10.66224/ijece.27941.7.2.103</doi><resource>http://ijece.org/en/Article/27941</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/27941</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/27941</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/27941</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/27941</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/27941</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/27941</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/27941</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. Papazoglou, G. Papadimitriou, and A. Pomportsis, "Design alternatives for optical-packet-interconnection network architectures," J. of Optical Networking, vol. 3, no. 11, pp. 810-825, Nov. 2004.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. Yao, S. Yoo, and B. Mukherjee, "A comparison study between slotted and unslotted all-optical packet-switched network with priority-based routing," in Proc. IEEE OSA Optical Fiber Conf., vol. 2, pp. TuK2-1-TuK2-3, 2001.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	C. Develder, "Node architectures for optical packet and burst switching," in Proc. In. Conf. on Optical Internet, COIN-PS’2002, Cheju Island, Korea, Jul. 2002.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. O’Mahony, D. Simeonidou, D. Hunter, and A. Tzanakaki, "The application of optical packet switching in future communications networks," IEEE Communications Magazine, vol. 39, no. 3, pp. 128-135, Mar. 2001.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. G. P. Rahbar and O. Yang, "Contention avoidance and resolution schemes in bufferless all-optical packet-switched networks: a survey," IEEE Communications Surveys and Tutorials Magazine, vol. 10, no. 4, pp. 94-107, Dec. 2008.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Z. Lu, D. K. Hunter, and I. D. Henning, "Congestion control scheme in optical packet switched networks," in Proc. Optical Fiber Communication Conf., paper OTHM4, 5 Mar. 2006.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	C. Raffaelli and P. Zaffoni, "TCP performance in optical packet-switched networks," Photonic Network Communications, vol. 11, no. 3, pp. 243-252, May 2006.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	F. Xue, Z. Pan, Y. Bansal, and J. Cao, "End-to-end contention resolution schemes for an optical packet switching network with enhanced edge routers," J. of Lightwave Tech., vol. 21, no. 11, pp. 2595-2604, Nov. 2003.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Jingyi and S. H. G. Chan, "TCP and UDP performance for internet over optical packet - switched networks," in Proc. IEEE Int. Conf. Communications, ICC 2003, vol. 2, pp. 1350-1354, May 2003.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. G. P. Rahbar and O. Yang, "Fiber-channel trade off for reducing collisions in slotted single-hop optical packet-switched (OPS) networks," OSA J. of Optical Networking, vol. 6, no. 7, pp. 897-912, Jul. 2007.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	F. Xue, Z. Pan, Y. Bansal, and J. Cao, "End-to-end contention resolution schemes for an optical packet switching network with enhanced edge routers," J of Lightwave Tech., vol. 21, no. 11, pp. 2595-2604, Nov. 2003.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. G. P. Rahbar and O. Yang, "A new bandwidth access framework in slotted-OPS networks," in Proc. IEEE Conf. on Local Computer Networks (LCN), pp. 559-560, Tampa, Florida, USA, Nov. 2006.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. G. P. Rahbar and O. Yang, "Distribution-based bandwidth access scheme in slotted all-optical packet-switched networks," Elsevier Computer Networks J., vol. 53, no. 5, pp. 744-758, Apr. 2009.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. Yao, B. Mukherjee, S. J. B. Yoo, and S. Dixit, "A unified study of contention - resolution schemes in optical packet - switched networks," J. of Lightwave Technology, vol. 21, no. 3, pp. 2595-2604, Mar. 2003.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. G. P. Rahbar and O. Yang, "Prioritized retransmission in slotted all-optical packet-switched networks," OSA J. of Optical Networking, vol. 5, no. 12, pp. 1056-1070, Dec. 2006.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	D. K. Hunter, M. C. Chia, and I. Andonovic, "Buffering in optical packet switches," J. of Lightwave Technology, vol. 16, no. 12, pp. 2081-2094, Dec. 1998.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	V. Eramo, M. Listanti, and P. Pacifici, "A comparison study on the number of wavelength converters needed in synchronous and asynchronous all - optical switching architectures," IEEE/OSA J. of Lightwave Technology, vol. 21, no. 2, pp. 340- 355, Feb. 2003.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Nord, S. Bjørnstad, and C. M. Gauger, "OPS or OBS in the core network," COST 266/IST - OPTIMIST, Budapest, Hungary, Feb. 2003.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	I. Chlamtac and A. Fumagalli, "QUADRO-star: a high performance optical WDM star network," IEEE Trans. on Comm., vol. 42, no. 8, pp. 2582-2590, Aug. 1994.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	E. Modiano, "Random algorithms for scheduling multicast traffic in WDM broadcast - and - select networks," IEEE/ACM Trans. on Networking, vol. 7, no. 3, pp. 425-434, Jun. 1999.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	K. Samaras, D. C. O'Brien, and D. J. Edwards, "Analytical calculation of throughput of ALOHA based protocols in optical wireless data networks," in IEE Proc. Part J - Optoelectronics, vol. 147, no. 4, pp. 322-328, Aug. 2000.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	L. Wang, M. Ma, and M. Hamdi, "Efficient protocols for multimedia streams on WDMA networks," J. of Lightwave Technology, vol. 21, no. 10, pp. 2123-2144, Oct. 2003.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Q. Zhang, V. M. Vokkarane, Y. Wang, and J. P. Jue, "Analysis of TCP over optical burst-switched networks with burst retransmission," in Proc. IEEE Globecom, vol. 4, 1978-1983, St. Louis, MO, ,USA, Nov. 2005.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	W. R. Stevens, TCP/IP Illustrated, Volume 1: The Protocols, Addison-Wesley, 1994.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	OPNET, http://www.opnet.com/products/modeler/home.html, accessed May 2006.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	B. Bostica, M. Burzio, P. Gambini, and L. Zucchelli, "Synchronization issues in optical packet switched networks," Photonic Networks, G. Prati, Ed., UK, Springer-Verlag, pp. 362-376, 1997.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	J. Ramamirtham and J. Turner, "Design of time sliced optical burst routers," in Proc. IEEE/OSA Optical Fiber Communication, paper MF101, Los Angeles, US, Feb. 2004.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	S. Yao, B. Mukherjee, and A. Dixit, "Advances in photonic packet switching: an overview," IEEE Communications Magazine, vol. 38, no. 2, pp. 84-94, Feb. 2000.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	J. R. Feehrer and L. H. Ramfelt, "Packet synchronization for synchronous optical deflection-routed interconnection networks," IEEE Trans. on Parallel and Distributed Systems, vol. 7, no. 6, pp. 605-611, Jun. 1996.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>NGN Management Model and Utility Networks’ Estimated Capital Investment in Operation  Support Systems for the Next Years</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Jahanbeigi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. E.</given_name><surname>Kalantari</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2009</year></publication_date><pages><first_page>114</first_page><last_page>124</last_page></pages><doi_data><doi>10.66224/ijece.27942.7.2.114</doi><resource>http://ijece.org/en/Article/27942</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/27942</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/27942</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/27942</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/27942</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/27942</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/27942</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/27942</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Eurescom P1117 Project Report, Future Access Networks (FAN), IP-Based access technologies and QoS, May 2003.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	ITU-T Draft Recommendation M.3060, Principles for the Management of Next Generation Networks, 2005.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	ITU-T Recommendation M.3050.0, Enhanced Telecom Operations Map (eTOM) – Introduction, 2004.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	ITU-T Recommendation M.3050.1, Enhanced Telecom Operations Map (eTOM) – The Business Process Framework, 2004.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	ITU-T Recommendation M.3050.2, Enhanced Telecom Operations Map (eTOM) – Process Decompositions and Descriptions, 2004.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	ITU-T Recommendation M.3050.3, Enhanced Telecom Operations Map (eTOM) – Representative Process Flows, 2004.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	ITU-T Recommendation M.3050.4, Enhanced Telecom Operations Map (eTOM) – Using B2B Inter-Enterprise Integration with the eTOM, 2004.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	ITU-T Recommendation M.3400, TMN Management Functions, 2000.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. W. Hong, C. F. Imparato, D. L. Becker, and J. H. Malinowski, "Integrated support systems for electric utility operations," Computer Applications in Power, vol. 5, no. 1, pp. 15-20, Jan. 1992.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Q. Feng, X. Bai, C. Yijia, and Y. Jin, "Model of electric market operation support system based on UML," in Proc. Int. Conf. on Computer Networks and Mobile Computing, vol. 1, pp. 13-18, 16-19 Oct. 2001.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	T. Sueyoshi and G. R. Tadiparthi, "An agent - based decision support system for wholesale electricity market," Decision Support System, vol. 44, no. 2, pp. 425-446, Jan. 2008.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	ITU-T Recommendation Y.110, Global Information Infrastructure Principles and Framework Architecture, 1998.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	ITU-T Recommendation X.805, Security Architecture for Systems Providing End-to-End Communications, 2003.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	ITU-T Recommendation M.3016.0, Security for the Management Plane- Overview, 2005.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	ITU-T Recommendation M.3016.1, Security for the Management Plane- Security Requirements, 2005.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	ITU-T Recommendation M.3016.2, Security for the Management Plane- Security Services, 2005.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	ITU-T Recommendation M.3016.3, Security for the Management Plane- Security Mechanism, 2005.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	ITU-T Recommendation M.3016.4, Security for the Management Plane- Profile Proforma, 2005.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	ITU-T Recommendation Y.2011, General Principles and General Reference Model for Next Generation Networks, 2004.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	C. Freeman, Diffusion of Technologies and Social Behavior, N. Nakicenovic &amp; A. Grubler (eds.), Springer - Verlag, 1991.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	V. Mahajan, E. Muller, and F. M. Bass, "New product diffusion models," in Marketing, North-Holland, pp. 349-408, 1993.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	N. Meade and T. Islam, "Technological forecasting - model selection, model stability and combining models," Management Science, vol. 44, no. 8, pp. 1115-1130, Aug. 1998.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	N. Meade and T. Islam, Principles of Forecasting: A Handbook 
for Researchers and Practitioners, Kluwer Academic, pp. 577-
595, 2001.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	R. Venkatesan and V. Kumar, "A genetic algorithm approach to growth phase forecasting of wireless subscribers," Int. J. Forecasting, vol. 18, no. 4, pp. 625-646, Dec. 2002.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	P. S. Meyer, J. W. Yung, and J. H. Ausubel, "A primer on logistic growth and substitution: the mathematics of the Loglet Lab software," Technological Forecasting and Social Change, vol. 61, no. 3, pp. 247-271, Jul. 1999.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	J. W. Yung, P. S. Meyer, and J. H. Ausubel, "The Loglet Lab software: a tutorial," Technological Forecasting and Social Change, vol. 61, no. 3, pp. 273-295, Jul. 1999.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	M. Hamoudia and T. Islam, "Modelling and forecasting the growth of wireless messaging," Telektronikk, vol. 4, no. 4, pp. 64-69, Dec. 2004.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Eurescom P901 Project Report, Investment Analysis Modelling, Deliverable 2, Annex B (Market Modelling), Aug. 2000.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	سالنامه‌های آماری کشور، مرکز آمار ايران، 1385-1376.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	آمار، "تعداد مشترکين و تعرفه‌ها،" شرکت مخابرات ايران، معاونت برنامه‌ريزی و توسعه، اداره اطلاعات و آمار، 1386-1376.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	قانون برنامه چهارم توسعه اقتصادی، اجتماعی و فرهنگی جمهوری اسلامی ایران، سازمان مدیریت و برنامه‌ریزی، 1383 
(www.mporg.ir/barnameh4/ghanon-b4-26mehr.pdf).</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	منصور شیخان و محمد اسماعيل کلانتری، "تخمين تعداد مشترکين سرويس‌های مخابراتی در کشور برای سال‌های آتی،" نشریه مهندسی برق و مهندسی کامپیوتر ایران، سال 6، شماره 2، صص. 118-111، تابستان 1386.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	آمار، "تعداد انشعاب آب در نقاط شهري و روستايي تحت پوشش شركت‌هاي آب و فاضلاب شهري و روستايي،" شركت مهندسي آب و فاضلاب كشور، معاونت برنامه‌ريزي و بهبود مديريت، دفتر خدمات مديريت و انفورماتيك، 1386.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	آمار، "تعداد انواع مشتركان بر حسب شركت‌هاي برق منطقه‌اي و استان‌هاي تحت پوشش،" وزارت نيرو، شركت مادر تخصصي توانير، معاونت منابع انساني و بهبود بهره‌وري، مركز اطلاع‌رساني، 1386.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	آمار، "تعداد مصرف‌كنندگان گاز طبيعي به تفكيك نوع،" شركت ملي گاز ايران، مديريت برنامه‌ريزي تلفيقي، 1386.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	www.intec-telecom-systems.com.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	www.csgsystems.com.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	www.convergys.com.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	www.cbossgroup.com.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	www.oracle.com/corporate/press/2006_oct.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	www.adc.com.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	www.bercut.com.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	OSS Market Perception Study, vol. 3, no. 6, pp. 1-11, Mar. 2005 (www.micromuse.com).</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	www.micromuse.com/demos.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	www.portalsoftware.com.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	www.asiainfo.com.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	www.sofrecom.com.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	www.ushamartin.com.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	www.ushacomm.com.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50]	www.axiomventures.com.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51]	www.acecomm.com.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52]	www.comptel.com.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53]	www.mindcti.com.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[54]	www.amdocs.com.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[55]	www.comarch.com.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[56]	www.cramer.com.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[57]	www.netcracker.com.</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[58]	www.sun.com/servers/midrange/v890/benchmarks.jsp?display=3-.</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[59]	www.sun.com/servers/midrange/v890/features.xml.</unstructured_citation></citation><citation key="ref60"><unstructured_citation>
[60]	www.mcasun.com/sun-fire-v890.html.</unstructured_citation></citation><citation key="ref61"><unstructured_citation>
[61]	www.repton.co.uk/newsletter/repton_pages/docs/v490_v890_wp.pdf</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Estimation of the Required Capital Investment in Mobile Telephony Network's Equipments Based on Cobb-Douglas Demand Forecasting Model</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Jahanbeigi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. E.</given_name><surname>Kalantari</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2009</year></publication_date><pages><first_page>125</first_page><last_page>135</last_page></pages><doi_data><doi>10.66224/ijece.27943.7.2.125</doi><resource>http://ijece.org/en/Article/27943</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/27943</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/27943</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/27943</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/27943</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/27943</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/27943</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/27943</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K. T. Duffy - Deno, "Demand for additional telephone lines: an empirical note," Information Economics and Policy, vol. 13, no. 3, pp. 283-299, Jul. 2001.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Hamoudia and T. Islam, "Modelling and forecasting the growth of wireless messaging," Telektronikk, vol. 4, no. 4, pp. 64-69, Dec. 2004.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	C. Freeman, Diffusion of Technologies and Social Behavior, N. Nakicenovic and A. Grubler (eds.), Springer-Verlag, 1991.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	V. Mahajan, E. Muller, and F. M. Bass, "New product diffusion models," in Marketing, pp. 349-408, North-Holland, 1993.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	N. Meade and T. Islam, "Technological forecasting-model selection, model stability and combining models," Management Science, vol. 44, no. 8, pp. 1115-1130, Aug. 1998.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	N. Meade and T. Islam, Principles of Forecasting: A Handbook for Researchers and Practitioners, Kluwer Academic, pp. 577-595, 2001.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Venkatesan and V. Kumar, "A genetic algorithm approach to growth phase forecasting of wireless subscribers," Int. J. Forecasting, vol. 18, no. 4, pp. 625-646, Dec. 2002.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	P. S. Meyer, J. W. Yung, and J. H. Ausubel, "A primer on logistic growth and substitution: the mathematics of the Loglet Lab software," Technological Forecasting and Social Change, vol. 61, no. 3, pp. 247-271, Jul. 1999.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	J. W. Yung, P. S. Meyer, and J. H. Ausubel, "The Loglet Lab software: a tutorial," Technological Forecasting and Social Change, vol. 61, no. 3, pp. 273-295, Jul. 1999.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	European Institute for Research and Strategic Studies in Telecommunications (Eurescom), P901 Project Report: Investment Analysis Modelling, Deliverable 2, Annex B (Market Modelling), Aug. 2000 (www.eurescom.eu/~pub/about-eurescom/message02.../message02_2001.pdf).</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Ericsson Corp., TEMS Optimization Solutions, 2005 (http://www.ericsson.com/solutions/tems/downloads/tems_brochure.pdf), 2005.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Delphius Company, GSM Communications Planning and Design: PicoPlan and Power Plan Tools (http://www.delphius.co.za/prodserv/gsm.html), 2007.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Awardsolutions Inc., Network Design and Optimization: PlanetEV, DBPlanner and Asset Tools (http://www.awardsolutions.com/forms/professionalServices/ networkDesignOptimization.aspx), 2007.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	W. Mende, E. Oppermann, and L. Heitzer, "Mobile radio network management supported by a planning tool," in Proc. IEEE Network Operations and Management Symposium (NOMS'98), vol. 2, pp. 483-492, 15-20 Feb.  1998.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Motorola Corp., Intelligent Design for Growth Planning, 2006 (www.motorola.com/mot/ doc/5/5670_MotDoc.pdf).</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. S. Armstrong, Long-Range Forecasting, From Crystal Ball to Computer, John Wiley, 1985.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	G. P. Zhang, Neural Networks in Business Forecasting, Idea Group Publishing Company, 2004.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Scientific Software Services, Forecast Pro XE and Forecast Pro Basic, 2008 (http://www.sciencedownload.com/product.php?productid=124&amp;cat=62&amp;bestseller).</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	N. Economides, "The economics of networks," In. J. of Industrial Organisation, vol. 16, no. 4, pp. 673-699, Oct. 1996.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	مرکز آمار ايران، "آمار تعداد تلفن‌های همراه و آمار متوسط درآمد خانوارها،" سالنامه‌های آماری کشور، 1385-1376.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	شرکت مخابرات ايران، معاونت برنامه‌ريزی و توسعه، ادارة اطلاعات و آمار، آمار تعداد مشترکين و تعرفه‌ها، 1386-1376.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	سازمان مدیریت و برنامه‌ریزی، قانون برنامه چهارم توسعه اقتصادی، اجتماعی و فرهنگی جمهوری اسلامی ایران، 1383 (www.mporg.ir/barnameh4/ghanon-b4-26mehr.pdf).</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	آ دفتر روابط عمومی و امور بین‌الملل شرکت مخابرات ایران، آمار شاخص‌های مخابراتی کل کشور (سال‌های 1375 تا 1385)، 1386 (www.irantelecom.ir/pdfs/amar/shakhes_1375_1385.pdf).</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	L. Krank and H. Orlamunder, "Future telecommunication traffic-a methodology for estimation," in Proc. 10th International Telecommunication Network Strategy and Planning Symposium, vol. 1, pp. 139-144, Jun. 2002.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	م. شيخان، م. ا. کلانتري، م. عباس‌خاني، م. غيناقي، ر. طالبی و م. دارابيگی، "طرح توسعه شبکه تلفني همراه کشور و برآورد بازار تجهيزات مربوط،" مجموعه گزارش‌های طرح پژوهشی ارزيابي بازار داخلي صنعت مخابرات، وزارت صنايع و معادن، مرکز صنايع نوين، 1384.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Westbay Engineers Limited, Free Erlang B Calculator for Dimensioning (Sizing) Telecommunication Trunk Groups, 2008 (www.erlang.com/calculator/erlb/)..</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Ericsson Corp., Ericsson GSM Radio Access Network Products, 2007,  (http://www.ericsson.com/products/hp/GSM_Radio_Access_
Network_ Products_pa.shtml).</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Nokia Siemens Networks Inc., Maximize Profit with Multi-Radio Solutions, 2007 (http://www.nokiasiemensnetworks.com/
global/SSP/Radio+access/?languagecode=en).</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	Ericsson Corp., Sustainable Energy Use in Mobile Communications, 2007 (http://www.ericsson.com/technology/whitepapers/).</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	شرکت مخابرات ایران، گزارش اطلاعات مالی و قراردادها، 1385.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	شرکت ارتباطات سیار، گزارش‌های ترافیک‌سنجی مراکز سوئیچ موبایل، 1385.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	R. Passerini, "Signalling network computer aided planning and dimensioning," in Soft Proc. Seminar on Network Planning 
Strategy for Evolving Network Architectures, 6-10 Oct. 2003. (www.itu.int/ITU-D/tech/network-infrastructure/Warsaw-03/Day%203/4.4_Passerini.pdf), </unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	F. Hartleb and W. Urmoneit, "Dimensioning GPRS backbone 
links with analytical methods," in Proc. 10th International Telecommunication Network Strategy and Planning Symposium, vol. 1, pp. 15-22, Jun. 2002.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	P. R. Pinheiro and A. B. de Aguiar, "A model for GSM mobile network design," in Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications, T. Sobh, K. Elleithy, A. Mahmood, and M. Karim (eds.), pp. 365-368, Springer Netherlands, 2007.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	Atesio Inc., Radio Network Planning: Location Area Planning and Simulation of GPRS Traffic: DISCNET Tool, 2006 (http://www.atesio.de/solutions/index.html), 2006.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	Ericsson Corp., Ericsson Announces Prices for its 
Bond Exchange Offer, 2003 (http://www.ericsson.com/ericsson/press/releases/20031121-925916.shtml).</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Novel Wavelet Based Method for Improvement of Power Transformer Differential Relay against Magnetizing Inrush Current and CT Saturation</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Rahmati</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Sanaye-Pasand</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2009</year></publication_date><pages><first_page>136</first_page><last_page>144</last_page></pages><doi_data><doi>10.66224/ijece.27944.7.2.136</doi><resource>http://ijece.org/en/Article/27944</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/27944</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/27944</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/27944</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/27944</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/27944</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/27944</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/27944</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	م. خدرزاده، ا. صفرنورالله، م. مرتجایي و م. ا. همداني گلشن، حفاظت سیستم‌هاي قدرت، چاپ اول، دانشگاه صنعت آب و برق، .١٣٨٢</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	T. S. Sidhu, M. S. Sachdev, H. C. Wood, and M. Nagpal, "Design, implementation, and testing of a micro-processor- based high-speed relay for detecting transformer winding faults," IEEE Trans. Power Del., vol. 7, no. 1, pp. 108-117, Jan. 1992.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	P. Liu, O. P. Malik, C. Chen, G. S. Hope, and Y. Guo, "Improved operation of differential protection of power transformers for internal faults," IEEE Trans. Power Del., vol. 7, no. 4, pp. 1912-1919, Oct. 1992.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	K. Yabe, "Power differential method for discrimination between fault and magnetizing inrush current in transformers," IEEE Trans. Power Delivery, vol. 12, no. 3, pp. 1109-1117, Jul. 1997.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	T. S. Sidhu and M. S. Sachdev, "Online identification of magnetizing inrush and internal faults in three phase transformers," IEEE Trans. Power Delivery, vol. 7, no. 4, pp. 1885-1890, Oct. 1992.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	G. D. Rockefeller, "Fault protection with a digital computer," IEEE Trans. on Power Apparatus and Systems, vol. 88, no. 4, pp. 438-464, Apr. 1969.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Giuliante and G. Clough, "Advances in the design of differential protection for power transformers," in Proc. Georgia Technical Protective Relaying Conf., pp. 1-12, Atlanta, Georgia, May 1991.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	P. Bastard, M. Meunier, and H. Regal, "Neural network based algorithm for power transformer differential relays," IEEE Processings Generation, Transmission, and Distribution, vol. 142, no. 4, pp. 386-392, Jul. 1995.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. V. Ribeiro, J. M. T. Romano, and C. A. Duqe, "An improved method for signal processing and compression in power quality evalution," IEEE Trans. on Power Delivery, vol. 19, no. 2, pp. 464-471, Apr. 2004.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	T. M. Lai, L. A. Snider, E. Lo, and D. Sutanto, "High - impedance fault detection using discrete wavelet transform and frequency range and RMS conversion," IEEE Trans. on. Power Delivery, vol. 20, 
no. 1, pp. 397-407, Jan. 2005.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	H. Mortazavi and H. Khorashadi-Zadeh, "A new inrush restraint algorithm for transformer differential relay using wavelet transform," in Int. Conf. on Power System Technology, Powercon’04, vol. 2, pp. 1705-1709, Singapore, Nov. 2004.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. A. Saleh and M. A. Rahman, "Modeling and protection of a three - phase power transformer using wavelet packet transform," IEEE Trans. on Power Delivery, vol. 20, no. 2, pp. 1273-1282, Apr. 2005.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	O. A. S. Youssef, "A wavelet - based technique for discrimination between faults and magnetizing inrush currents in transformers," IEEE Trans. Power Del., vol. 18, no. 1, pp. 170-176, Jan. 2003.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Guzman, S. Zocholl, G. Benmouyal, and H. J. Altuve, "A current based solution for transformer differential protection - part I: problem statement," IEEE Trans. on Power Del., vol. 16, no. 4, pp. 485-491, Oct. 2001.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	G. Ziegler, Numerical Differential Protection: Principles, and Applications, Publicis Corporate Publishing, Erlangen, 2005.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Application Manual of RET 521*2.3, Transf-ormer Protection Relay, ABB Company, 1MRK 504 021-UEN.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. D. Cho, Parameter Estimation for Transformer Modeling, Ph.D. Dissertation, Michigan Technological University, Dec. 2002.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Fault Location Algorithm in Practical Radial Distribution Systems Based on Voltage and Current Recorded by Digital Fault Recorders</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S. </given_name><surname>Jamali </surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>V.</given_name><surname>Talavat</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2009</year></publication_date><pages><first_page>145</first_page><last_page>153</last_page></pages><doi_data><doi>10.66224/ijece.27945.7.2.145</doi><resource>http://ijece.org/en/Article/27945</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/27945</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/27945</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/27945</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/27945</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/27945</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/27945</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/27945</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Z. Jun, D. L. Lubkeman, and A. A. Girgis, "Automated fault location and diagnosis on electric power distribution feeders," IEEE Trans. on Power Delivery, vol. 12, no. 2, pp. 801-809, Apr. 1997.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	L. Seung-Jae, C. Myeon-Song, K. Sang-Hee, J. Bo-Gun, L. Duck-Su, A. Bok-Shin, Y. Nam-Seon, K. Ho-Yong, and W. Sang-Bong, "An intelligent and efficient fault location and diagnosis scheme for radial distribution systems," IEEE Trans. on Power Delivery, vol. 19, no. 2, pp. 524-532, Apr. 2004.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	C. Myeon-Song, L. Seung-Jae, L. Duck-Su, and J. Bo-Gun, "A new fault location algorithm using direct circuit analysis for distribution systems," IEEE Trans. on Power Delivery, vol. 19, no. 1, pp. 35-41, Jan. 2004.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	E. C. Senger, G. Manassero Jr., C. Goldemberg, and E. L. Pellini, "Automated fault location system for primary distribution networks," IEEE Trans. on Power Delivery, vol. 20, no. 2, pt. 2, pp. 1332-1340, Apr. 2005.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	C. S. Cheng and D. Shirmohammadi, "A three - phase power flow method distribution system analysis," IEEE Trans. on Power Systems, vol. 10, no. 2, pp. 671-679, May 1995.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Pseudo Covariance Wavelet-based Feature Extraction Method to Biomarker Selection from Ovarian Cancer Proteomic Patterns</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Montazery Kordy</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. H.</given_name><surname>Miran-Baygi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. H.</given_name><surname>Moradi</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2009</year></publication_date><pages><first_page>154</first_page><last_page>161</last_page></pages><doi_data><doi>10.66224/ijece.27946.7.2.154</doi><resource>http://ijece.org/en/Article/27946</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/27946</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/27946</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/27946</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/27946</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/27946</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/27946</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/27946</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	E. F. Petricoin and L. A. Liotta, "SELDI-TOF-based serum proteomic pattern diagnostics for early detection of cancer," Analytical Biotechnology, Science Direct, vol. 15, no. 1, pp. 24-30, Feb. 2004.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	H. Kuruma, S. Egawa, and et al., "Proteome analysis of prostate cancer," Prostate Cancer and Prostatic Disease, vol. 8, no. 1, pp. 14-21, 2005.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	T. P. Conrads, M. Zhou, E. F. Petricoin III, L. Liotta, and T. D. Veenstra, "Cancer diagnosis using proteomics patterns," Expert Rev. Mol. Diagn., vol. 3, no. 4, pp. 411-420, 2003.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	E. F. Petricoin III, D. K. Ornstein, C. P. Paweletz, A. M. Ardekani, P. S. Hackett, B. A. Hitt, A. Velassco, C. Trucco, L. Wiegand, K. Wood, C. B. Simone, P. J. Levine, W. M. Linehan, M. R. Emmert - Buck, S. M. Steinberg, E. C. Kohn, and L. A. Liotta, "Serum proteomic patterns for detection of prostate cancer," J. of National Cancer Institute, vol. 94, no. 20, pp. 1576-1578, Oct. 2002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	E. J. Finehout and K. H. Lee, "An introduction to mass spectrometry applications in biological research," Biochemistry and Molecular Biology Education, vol. 32, no. 2, pp. 93-100, 2004.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Jemal, R. Siegel, E. Ward, Y. Hao, J. Xu, T. Murray, and M. J. Thun, "Cancer statistics, 2008" CA Cancer J. Clin., vol. 58, pp. 71-96, 2008.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. S. Morris, K. R. Coombes, J. Koomen, K. A. Baggerly, and R. Kobayashi, "Feature extraction and quantification for mass spectrometry in biomedical applications using the mean spectrum," Bioinformatics, vol. 21, no. 9, pp. 1764-1775, 2005.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	E. F. Petricoin III, A. M. Ardekani, B. A. Hitt, P. J. Levine, V. A. Fusaro, S. M. Steinberg, G. B. Mills, C. Simone, D. A. Fishman, E. C. Kohn, and L. A. Liotta, "Use of proteomic patterns in serum to identify ovarian cancer," The Lancet, vol. 359, pp. 572-577, Feb. 2002.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	B. L. Adam, A. Vlahou, O. J. Semmes, and G. L. Wright, "Proteomic approaches to biomarker discovery in prostate and baladder cancers," Proteomics, vol. 1, no. 10, pp. 1264-1270, Oct. 2001.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Y. Qu, B. L. Adam, Y. Yasui, M. D. Ward, S. Nasim, P. F. Schellhammer, Z. Feng, O. J. Semmes, and G. L. Wright, "Boosted decision tree analysis of SELDI mass spectral serum profiles discriminates prostate cancer from noncancer patients," Clinical Chemistry, vol. 48, no. 10, pp. 1835-1843, Oct. 2002.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. M. Sorace and M. Zhan, "A data review and re - assessment of ovarian cancer serum proteomic profiling," BMC Bioinformatics, vol. 4, no. 24, pp. 1-13, Jun. 2003.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	K. A. Baggerly, J. S. Morris, S. R. Edmonson, and K. R. Coombes, "Signal in noise: evaluating reported reproducibility of serum proteomic tests for ovarian cancer," J. of National Cancer Institute, vol. 97, no. 4, pp. 307-309, Feb. 2005.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Hilario and A. Kalousis, "Approaches to dimensionality reduction in proteomic biomarker studies," Briefings in Bioinformatics, vol. 9, no. 2, pp. 102-118, Feb. 2008.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	K. A. Baggerly, J. S. Morris, and K. R. Coombes, "Reproducibility of SELDI - TOF protein patterns in serum: comparing datasets from different experiments," Bioinformatics, vol. 20, no. 5, pp. 777-785, 22 Mar. 2004.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	G. M. Boratyn, M. L. Merchant, and J. B. Klein, "Utilization of human expert techniques for detection of low-abundant peaks in high-resolution mass spectra," 28th IEEE EMBS Annual Int. Conf., pp. 5798-5801, New York City, US, 30 Aug-3 Sep. 2006.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. G. Hanbury and J. Serra, "Morphological operators on the unit circle," IEEE Trans. Image Processing, vol. 10, no. 12, pp. 1842-1850, Dec. 2001.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Mallat, "A wavelet tour of signal processing," Academic Press, 1998.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	D. L. Donoho and I. M. Johnstone, "Threshold selection for wavelet shrinkage of noisy data," in Proc. 16th Annual Conf. of the IEEE Engineering in Medicine and Biology Society, vol. 1, pp. 24a-25a, Nov. 1994.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	D. L. Donoho, "Denoising by soft-thresholding," IEEE Trans. on Information Theory, vol. 41, no. 3, pp. 613-627, May 1995.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	J. Ojanen, T. Miettinen, J. Heikkonen, and J. Rissanen, "Robust denoising of electrophoresis and mass spectrometry signals with minimum description length principle," Federation of European Biochemical Societies Lett.,, vol. 570, no. 1-3, pp. 107-113, 2004.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	G. Frosini, B. Lazzerini, and F. Marcelloni, "A modified fuzzy C-means algorithm for feature selection," in Proc. of 19th Int.l Conf. of the North American Fuzzy Information Processing Society, NAFIPS’2000,, Atlanta, US, pp. 148-152, Jul. 2000.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	E. D. Hoffman and V. Stroobant, Mass Spectrometry: Principles and Applications, John Wiley and Sons Ltd., 2001.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	W. Windig and J. Guilment, "Interactive self-modeling mixture analysis," Analytical Chemistry, vol. 63, no. 14, pp. 1425-1432, 15 Jul. 1991.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	L. Cao, P. B. Harrington, and J. Liu, "SIMPLISMA and ALS applied to tow-way nonlinear wavelet compressed ion mobility spectra of chemical warfare agent simulates," Analytical Chemistry, vol. 77, no. 8, pp. 2575-2586, Apr. 2005.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. A. Astakhov, H. Stogbauer, A. Kraskov, and P. Grassberger, "Monte carlo algorithm for least dependent non-negative mixture decomposition," Analytical Chemistry, vol. 78, no. 5, pp. 1620-1627, 2006.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Vannucci, N. Sha, and P. J. Brown, "NIR and mass spectra classification: bayesian methods for wavelet-based feature selection," Chemometrics and Intelligent Laboratory Systems, vol. 77, no. 1-2, pp. 139-148, May 2005.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	H. Montazery Kordy, M. H. Miranbaygi, and M. H. Moradi, "Ovarian cancer diagnosis using discrete wavelet transform based feature extraction from serum proteomic patterns," in Cairo Int. Biomedical Engineering Conf., vol. 1, pp. 139-142, Cairo, Egypt, Dec. 2006.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	H. Montazery Kordy, M. H. Miranbaygi, and M. H. Moradi, "Diagnosis of prostate cancer by wavelet based feature extraction method using blood proteomic patterns," in Proc. 13th Iranian Conf. in Biomedical Engineering, Tehran, Iran, Jan. 2007.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	L. Li, H. Tang, Z. Wu, J. Gong, M. Gruidl, J. Zou, M. Tockman, and R. A. Clark, "Data mining techniques for cancer detection using serum proteomic profiling," Artificial Intelligence in Medicine, vol. 32, no. 2, pp. 71-83, Mar. 2004.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	B. Wu, T. Abbott, D. Fishman, W. McMurray, G. Mor, K. Stone, D. Ward, K. Williams, and H. Zhao, "Comparison of statistical methods for classification of ovarian cancer using mass spectrometry data," Bioinformatics, vol. 9, no. 13, pp. 1636-1643, Jul. 2003.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Using Minimum Mean Squared Error Estimator for Quality Improvement of Abdominal Computerized Tomography Images Based on a Bivariate Laplacian Mixture Model for Complex Wavelet Coefficient</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Rabbani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Vafadust</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2009</year></publication_date><pages><first_page>162</first_page><last_page>169</last_page></pages><doi_data><doi>10.66224/ijece.27947.7.2.162</doi><resource>http://ijece.org/en/Article/27947</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/27947</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/27947</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/27947</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/27947</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/27947</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/27947</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/27947</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Starck, F. Murtagh, and A. Bijaoui, Image Processing and Data Analysis: the Multiscale Approach, Cambridge University Press, Cambridge, 1998.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. L. Donoho, "Denoising by soft-thresholding," IEEE Trans. Inform. Theory, vol. 41, no. 3, pp. 613-627, May 1995.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	D. L. Donoho and I. M. Johnstone, "Ideal spatial adaptation by wavelet shrinkage," Biometrika, vol. 81, no. 3, pp. 425-455, Sep. 1994.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. L. Donoho and I. M. Johnstone, "Adapting to unknown smoothness via wavelet shrinkage," J. Amer. Statist. Assoc., vol. 90, no. 432, pp. 1200-1224, Dec. 1995.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Chang, B. Yu, and M. Vetterli, "Adaptive wavelet thresholding for image denoising and compression," IEEE Trans. Image Processing, vol. 9, no. 9, pp. 1532-1546, Sep. 2000.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. Luisier, T. Blu, and M. Unser, "A new SURE approach to image denoising: interscale orthonormal wavelet thresholding," IEEE Trans. on Image Processing, vol. 16, no. 3, pp. 593-606, Mar. 2007.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Pizurica and W. Philips, "Estimating the probability of the presence of a signal of interest in multiresolution single and multiband image denoising," IEEE Trans. on Image Processing, vol. 15, no. 3, pp. 654-665, Mar. 2006.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. J. Fadili and L. Boubchir, "Analytical form for a Bayesian wavelet estimator of images using the Bessel K form densities," IEEE Trans. on Image Proc., vol. 14, no. 2, pp. 231-240, Feb. 2005.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. S. Crouse, R. D. Nowak, and R. G. Baraniuk, "Wavelet - based statistical signal processing using hidden Markov models," IEEE Trans. Signal Processing, vol. 46, no. 4, pp. 886-902, Apr. 1998.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	H. Rabbani and M. Vafadoost, "Wavelet based image denoising based on a mixture of Laplace distributions," Iranian J. of Science &amp; Technology, Trans. B., Engineering, vol. 30, no. B6, pp. 711-733, 2006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	E. Simoncelli, "Modeling the joint statistics of images in the wavelet domain," in Proc. of the SPIE 44th Annual Meeting, 3813, pp. 188-195, Jul. 1999.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Srivastava, A. B. Lee, E. P. Simoncelli, and S - C. Zhu, " On advances in statistical modeling of natural images," J. Math. Imaging and Vision, vol. 18, no. 1, pp. 17-33, Jan. 2003.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	E. Simoncelli, Modeling the Joint Statistics of Images in the Wavelet Domain, Handbook of Image and Video Processing, pp. 431-441, Academic Press, May 2005.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	L. Sendur and I. W. Selesnick, "Bivariate shrinkage functions for wavelet - based denoising exploiting interscale dependency," IEEE. Tran. Signal Processing, vol. 50, no. 11, pp. 2744-2756, Nov. 2002.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Achim, P. Tsakalides, and A. Bezerianos, "SAR image denoising via Bayesian wavelet shrinkage based on heavy-tailed modeling," IEEE Trans. Geosci. Remote Sensing, vol. 41, no. 8, pp. 1773-1784, Aug. 2003.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. K. Romberg, C. Hyeokho, and R. G. Baraniuk, "Bayesian tree - structured image modeling using wavelet - domain hidden Markov models," IEEE Trans. Signal Processing, vol. 10, no. 7, pp. 1056-1068, Jul. 2001.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	I. W. Selesnick, R. G. Baraniuk, and N. Kingsbury, "The dual-tree complex wavelet transform - a coherent framework for multiscale signal and image processing," IEEE Signal Processing Magazine, vol. 22, no. 6, pp.123-151, Nov. 2005.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. Gazor and W. Zhang, "Speech enhancement employing Laplacian- Gaussian mixture," IEEE Trans. on Speech and Audio Processing, vol. 13, no. 5, pp. 896-904, Sep. 2005.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	N. G. Kingsbury, "A dual - tree complex wavelet transform with improved orthogonality and symmetry properties," in Proc. Int. Conf. Image Processing, vol. 2, pp. 375-378, Sep. 2000.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: from error visibility to structural similarity," IEEE Trans. Image Processing, vol. 13, no. 4, pp. 600-612, Apr. 2004.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Performance Improvement of the Traditional SVM-Based Face Detection Method</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Roohi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>G.</given_name><surname>Mirjalily</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. T.</given_name><surname>Sadeghi</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2009</year></publication_date><pages><first_page>170</first_page><last_page>177</last_page></pages><doi_data><doi>10.66224/ijece.27948.7.2.170</doi><resource>http://ijece.org/en/Article/27948</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/27948</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/27948</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/27948</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/27948</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/27948</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/27948</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/27948</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Yang, D. J. Kriegman, and N. Ahuja, "Detecting faces in images: a survey," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 24, no. 1, pp. 34-58, Jan. 2002.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. J. C. Burges, "A tutorial on support vector machines for pattern recognition," Data Mining and Knowledge Discovery, vol. 2, no. 2, pp. 121-158, Jun. 1998.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	E. Osuna, R. Freund, and F. Girosi, "Support Vector Machines: Training and Applications," A. I. Memo, No. 1602, MIT A. I. Lab., 1997.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	E. Osuna, R. Freund, and F. Girosi, "Training support vector machines: an application to face detection," in Proc. IEEE Conf. Computer Vision and Pattern Recognition, vol. 1, pp. 130-136, Jun. 1997.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	N. Cristianini and J. Shawe - Taylor, An Introduction to Support Vector Machines, Cambridge University Press, 2000.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	B. Murtagh and M. Saunders, "Large-scale linearly constrained optimization," Mathematical Programming, vol. 14, no. 1, pp. 41-72, Dec. 1978.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	http://SVMlight.joachims.org.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	C. Shavers, R. Li, and G. Lebby, "An SVM-based approach to face detection," in Proc. of 38th Southeastern Symp. on System Theory, vol. 1, pp. 362-366, US, Mar. 2006.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Q. Gao, Q. Pan, H. Zhang, Y. Cheng, and Q. Tlan, "Face detection using SVM trained in independent space," in Proc. of the Third Int. Conf. on Machine Learning and Cybernetics, vol. 6, pp. 3674-3677, Shanghai, Aug. 2004.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	P. Shih and C. Liu, "Face detection using discriminating feature analysis and support vector machine," Elsevier Pattern Recognition J., vol. 39, no. 2, pp. 260-276, Feb. 2006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Wring and X. Liu, "Face detection using spectral histograms and SVMs," IEEE Trans. Systems, Man, and Cybernetics - Part B: Cybernetics, vol. 35, no. 3, pp. 467-476, Jun. 2005.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	B. Heisele, T. Serre, S. Prentice, and T. Poggiob, "Hierarchical classification and feature reduction for fast face detection with support vector machines," Pattern Recognition, vol. 36, no. 9, pp. 2007-2017, Sep. 2003.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. Sahbi, Coarse - to - Fine Support Vector Machines for Hierarchical Face Detection, Ph.D. Thesis, Versailles University, France, 2003.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Roohi, G. Mirjalily, and M. T. Sadeghi, "Face detection using a modified SVM - based classifier," in Proc. of IEEE Int. Conf. on Computational Intelligence and Multimedia Applications, ICCIMA, vol. 2, pp. 354-360, Dec. 2007.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	G. Mirjalily, M. Roohi, and M. T. Sadeghi, "A new approach for face detection using support vector machine," in Proc. of First Joint Cogress on Fuzzy and Intelligent Systems, Ferdowsi University of Mashad, vol. 1, pp. 435-440, Aug.. 2007.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Roohi, Face Detection Using Support Vector Machine, M.Sc. Thesis, Yazd University, 2007.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	http://www.vasc.ri.cmu.edu/idb/html/face/frontal_images/index.html</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Energy Efficiency Trading, a New Tool for Long-Term Market Power Reduction in Restructured Environment</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Behrangrad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Parsa-Moghaddam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. K.</given_name><surname>Sheikh-El-Eslami</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2009</year></publication_date><pages><first_page>178</first_page><last_page>183</last_page></pages><doi_data><doi>10.66224/ijece.27949.7.2.178</doi><resource>http://ijece.org/en/Article/27949</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/27949</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/27949</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/27949</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/27949</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/27949</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/27949</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/27949</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. W. Gellings, "The concept of demand-side management for electric utilities," in Proc. of the IEEE, vol. 73, no. 10, pp. 1468-1470, Oct. 1985.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. E. Runnels and M. Douglas Whyte, "Evaluation of demand-side management," in Proc. of the IEEE, vol. 73, no. 10, pp. 1489-1495, Oct. 1985.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	C. W. Gellings, "Integrating demand-side management into utility planning," in Proc. of the IEEE, vol. 77, no. 6, pp. 908-918, Jun. 1989.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. S. Malik and B. J. Cory, "Impact of DSM on energy production cost and start-up and shut-down costs of thermal units," in Proc. of the 4th Intemational Conf. on Advances in Power System Control, Operation and Management, APSCOM’97, vol. 2, pp. 650-655, Hong Kong, Nov. 1997.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	T. S. Yau, R. G. Huff, and H. Lee Willis, "Demand-side management impact on the transmission and the distribution system," IEEE Trans. on Power Systems, vol. 5, no. 2, pp. 506-512, May 1990.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. H. Didden and W. D. D’haeselee, "Demand side management in a competitive european market: who should be responsible for its implementation," Energy Policy, vol. 31, no. 13, pp. 1307-1314, Oct. 2003.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	U. Helman, "Market power monitoring and mitigation in the US wholesale power markets," Energy, 2005.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	P. Wang, Y. Xiao, and Y. Ding, "Nodal market power assessment in electricity markets," IEEE Trans. on Power Systems, vol. 19, no. 3, pp. 1373-1379, Aug. 2004.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	K. David and A. Fushuan Wen, "Market power in electricity supply," IEEE Trans. on Energy Conversion, vol. 16, no. 4, pp. 352-360, Dec. 2001.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	D. Gan and D. V. Bourcier, "Locational market power screening and congestion management: experience and suggestions," IEEE Trans. on Power Systems, vol. 17, no. 1, pp. 180-185, Feb. 2002.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Kanagala, M. Sahni, S. Sharma, B. Gou, and J. Yu, "A probabilistic approach of hirschman-herfindahl index (HHI) to determine possibility of market power acquisition," in Proc. IEEE Power Systems Conf. and Expo., vol. 3, pp. 1277-1282, 10-13 Oct. 2004.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. J. Denton, S. J. Rassenti, V. L. Smith, and S. R. Backerman, "Market power in a deregulated electrical industry," Decision Support Systems, vol. 30, no. 3, pp. 357-381, Jan. 2001.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	L. E. Ruff, "Economic principles of demand response in electricity," Available: www.eei.org.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	C. Goldman, "Demand response: issues and challenges," FERC Demand Response Technical Conf., Jan. 2006.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	P. Visudhiphari and M. D. Ilic, "Dependence of generation market power on the demand/supply ratio: analysis and modeling," in Proc. Power Engineering Society Winter Meeting, vol. 2, pp. 1115-1122, Singapore, 2000.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	م. بهرنگ راد و م. پارسامقدم، "ارزيابي تأثير بلندمدت بهينه‌سازي لوازم برقي خانگي بر الگوي بار شبكه به‌صورت فازي،" نشریه مهندسی برق و مهندسی کامپیوتر ایران، سال 5، شماره 4، صص. 260-255، زمستان 1386.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Direct Power Control of an Active Filter by Constant Switching Frequency</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>E.</given_name><surname>Abiri</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2009</year></publication_date><pages><first_page>184</first_page><last_page>189</last_page></pages><doi_data><doi>10.66224/ijece.27950.7.2.184</doi><resource>http://ijece.org/en/Article/27950</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/27950</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/27950</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/27950</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/27950</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/27950</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/27950</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/27950</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	T. Noguchi, H. Tomiki, S. Kondo, and I. Takahashi, "Direct power control of PWM converter without power-source voltage sensors," IEEE Trans. Ind. Applicat., vol. 34, no. 3, pp. 473-479, May/Jun. 1998.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	F. Z. Peng, G. W. Ott, and D. J. Adams, "Harmonic and reactive power compensation based on the generalized instantaneous reactive theory for three - phase four - wire systems," IEEE Trans. Power Elec., vol. 13, no. 6, pp. 1174-1181, Nov. 1998.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	B. H. Kwon and J. H. Lim, "A line-voltage-sensorless synchronous rectifier," IEEE Trans. Ind. Applicat., vol. 14, no. 5, pp. 966-972, Sep. 1999.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Malinowski, Sensorless Control Strategies for Three - Phase PWM Rectifiers, Ph. D. Dissertation, Inst. Control Ind. Electron., Warsaw Univ. Technol., Warsaw, Poland, 2001.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Chen and G. Joos, "Direct power control of active filters for voltage flicker mitigation," in Proc. Ind. Appl. Conf., 36th IAS Annual Meeting, vol. 4, pp. 2683-2690, Sep./Oct. 2001.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	P. Rodriguez, J. Bergas, and L. Sainz, "New PLL approach considering unbalanced line voltage condition," in Proc. IEEE Int. Conf. Power and Energy Systems, pp. 329-334, Jun. 2002.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	ع. رحمتي، س. ا. ابريشمي‌فر و ا. عبيري جهرمي، "كنترل مستقيم توان اكتيو و راكتيو با مدولاسيون بردار فضايي در يك اينورتر متصل به شبكه و توربين بادي،" چهاردهمين كنفرانس مهندسي برق، صص. 6-1، ارديبهشت 1385.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>