﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051923</doi_batch_id><timestamp>20260519231851</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>3</month><day>21</day><year>2011</year></publication_date><journal_volume><volume>9</volume></journal_volume><issue>1</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A Novel Proposed Algorithm to Tackle Glasses Wearing and Beard Issues in Facial IR Recognition</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Komari Alaie</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Khademi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2011</year></publication_date><pages><first_page>3</first_page><last_page>13</last_page></pages><doi_data><doi>10.66224/ijece.27997.9.1.3</doi><resource>http://ijece.org/en/Article/27997</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/27997</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/27997</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/27997</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/27997</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/27997</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/27997</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/27997</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Jain, R. Bolle, S. Pankanti, and A. K. Jain, Biometrics: Personal Identiﬁcation in Networked Society, Kluwer Academic Publishers, 1999.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	W. Zhao, R. Chellapa, P. J. Phillips, and A. Rosenfeld, Face Recognition: a Literature Survey, ACM Computing Surveys (CSUR), p. 399, 2003.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Z. L. Stan and K. J. Anil, Handbook of Face Recognition, Springer Science, 2005.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. Socolinsky, L. Wolff, J. Neuheiser, and C. Evelenad, "Illumination invariant face recognition using thermal infrared imagery," in Proc. of the IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, vol. 1, pp. I-527 - I-534, Kauai, Hawaii, US, 8-14 Dec.  2001.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Buddharaju, I. T. Pavlidis, P. Tsiamyrtzis, and M. Bazakos, "Physiology-based face recognition in the thermal infrared spectrum," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 613-626, Apr. 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. J. Prokoski and R. Riedel, "Infrared identification of faces and body parts," Biometrics: Personal Identification in Networked Society, A. K. Jain, R. Bolle, and S. Pankati, eds., Chapter 9. Kluwer Academic, 1998.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	F. Dellaert. The Expectation Maximization Algorithm, Technical. Report GIT- GVU-02-20, College of Computing, Georgia Institute of Technology, Feb. 2002.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer Verlag, Jun. 2003.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	P. Buddharaju and I. Pavlidis, "Physiological face recognition is coming of age," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'09, Miami, FL, US, Jun. 2009.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	E. Keogh and M. Pazzani, "Derivative dynamic time warping," in Proc. First SIAM Int. Conf. on Data Mining, SDM'01, Chicago, US, 5-7 Apr. 2001.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Turk and A. Pentland, "Eigenfaces for Recognition," J. of Cognitive Neuroscience, vol. 3, no. 1, pp. 71-86, Winter 1991.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	T. Fawcett, "An introduction to ROC analysis," Pattern Recognition Letters, vol. 27, no. 8, pp. 861-874, Jun. 2006.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. G. Kong, J. Heo, F. Boughorbel, Y. Zheng, B. Abidi, A. Koschan, M. Yi, and M. Abidi, "Adaptive fusion of visual and thermal IR </unstructured_citation></citation><citation key="ref14"><unstructured_citation>images for illumination-invariant face recognition," Int. J. of Computer Vision, vol. 71, no. 2, pp. 215-233, Feb. 2007.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improving Pose Manifold and Virtual Images Using Bidirectional Neural Networks in Face Recognition Using Single Image per Person</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>F.</given_name><surname>Abdolali</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. A.</given_name><surname>Seyed Salehi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2011</year></publication_date><pages><first_page>14</first_page><last_page>20</last_page></pages><doi_data><doi>10.66224/ijece.27998.9.1.14</doi><resource>http://ijece.org/en/Article/27998</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/27998</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/27998</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/27998</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/27998</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/27998</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/27998</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/27998</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	X. Zhang and Y. Gao, "Face recognition across pose: a review," Pattern Recognition, vol. 42, no. 11, pp. 2876-2896, Nov. 2009.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	T. Stonham, "Practical face recognition and verification with WISARD," Aspects of Face Processing, pp. 426-441, 1984.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. H. Lin, S. Y. Kung, and L. J. Lin, "Face recognition/detection by probabilistic decision - based neural network," IEEE Trans. Neural Network, vol. 8, no. 1, pp. 114-132, Jan. 1997.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Lawrence, C. L. Giles, A. C. Tsoi, and A. D. Back, "Face recognition: a convolutional neural-network approach," IEEE Trans. Neural Network, vol. 8, no. 1, pp. 98-113, Jan.1997.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Y. W. Wong, K. P. Seng, and L. M. Ang, "Radial basis function neural network with incremental learning for face recognition," IEEE Trans. Syst. Man Cybern. B, vol. 41, no. 4, pp. 940-949, Aug. 2011.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. Abdolali and S. Seyyedsalehi, "Face recognition from a single image per person using deep architecture neural networks," in Proc. 3rd Int. Conf. on Computer and Electrical Engineering, Chengdu, vol. 1, pp. 70-73, Nov. 2010.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	ن. داداشی، بازشناسی چهره با استفاده از يک تصوير از هر فرد، پايان‌نامه کارشناسی ارشد، دانشگاه صنعتی اميرکبير، دانشکده مهندسی پزشکی، دی 1387.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	ع. سيدصالحي، افزايش کارآيي بازشناخت الگوي شبکه‌هاي عصبي جلوسو از طريق توسعه روش‌هايي براي دوسويه‌کردن عملکرد آنها، گزارش طرح پژوهشي، دانشگاه صنعتي اميرکبير، دانشکده مهندسي پزشکي، 1383.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Leila and S. Seyyedsalehi, "Modeling phones coarticulation effects in a neural network based speech recognition system," in Proc. INTERSPEECH-2004, vol. 1, pp. 1657-1660, Oct. 2004.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	I. Nejadgholi and S. Seyyedsalehi, "Nonlinear normailization of input patterns to speaker variability in speech recognition neural networks," Neural Computing &amp; Applications, vol. 18, no. 1, pp. 45-55, Jan. 2009.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. M. Mesulam, "From sensation to cognition," Brain, vol. 121, no. 6, pp. 1013-1052, Jun. 1998.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	E. Koerner and G. Matsumoto, "Cortical architecture and self - referential control for brain - like computation, a new approach to understanding how the brain organizes computation," IEEE Eng. in Medicine and Biology Magazine, vol. 21, no. 5, pp. 121-133, Sep./Oct. 2002.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	E. Koerner, H. Tsujino, and T. Masutani, "A cortical - type modular neural network for hypothetical reasoning," Neural Networks, vol. 10, no. 5, pp. 791-814, Jul. 1997.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	E. Koerner and et al., "A model of computation in neocortical architecture," Neural Networks, vol. 12, no. 12, pp. 989-1005, Oct. 1999.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Ghosen and Y. Bengio, "Bias learning, knowledge sharing," IEEE Trans. on Neural Networks, vol. 14, no. 4, pp. 748-765, Jul. 2003.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. Aghajanian and S. J. D. Prince, "Face pose estimation in uncontrolled environments," in Proc. British Machine Vision Conf., 2009.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Analysis of Supervised Learners to Extract Knowledge of Lighting Angels in Face Images</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Naderi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>N.</given_name><surname>Moghadam Charkari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>E.</given_name><surname>Kabir</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2011</year></publication_date><pages><first_page>21</first_page><last_page>28</last_page></pages><doi_data><doi>10.66224/ijece.27999.9.1.21</doi><resource>http://ijece.org/en/Article/27999</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/27999</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/27999</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/27999</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/27999</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/27999</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/27999</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/27999</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	T. Chen, W. Yin, X. S. Zhou, D. Comaniciu, and T. S. Huang, "Total variation models for variable lighting face recognition," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 28, no. 9, pp. 1519-1524, Sep. 2006.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	[2]	J. Ruiz-del-Solar, and J. Quinteros, "Illumination compensation and normalization in eigenspace-based face recognition: a comparative study of different pre-processing approaches," Pattern Recognition Letters, vol. 29, no. 14, pp. 1966-1979, Oct. 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	[3]	O. Arandjelovic and R. Cipolla, "A methodology for rapid illumination - invariant face recognition using image processing filters," Computer Vision and Image Understanding, vol. 113, no. 2, pp. 159-171, Feb. 2009.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	[4]	Y. K. Park, S. L. Park, and J. Kim,, "Retinex method based on adaptive smoothing for illumination invariant face recognition," Signal Processing, vol. 88, no. 8, pp. 1929-1945, Aug. 2008.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. I. Choi, Ch. Kim, C. H. Choi, "Shadow compensation in 2D images for face recognition," Pattern Recognition, vol. 40, no. 7, pp. 2118-2125, Jul. 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	[6]	A. Franco, L. Nanni, "Fusion of classifiers for illumination robust face recognition," Expert Systems with Application, vol. 36, no.5, pp. 8946-8954, Jul. 2009.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. S. Georghiades, P. N. Belhumeur, and D. J. Kriegman, "From few to many: illumination cone models for face recognition under differing pose and lighting," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 23, no. 6, pp. 643-660, Jun. 2001.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Y. Adini, Y. Moses, and S. Ullman, "Face recognition: the problem of compensating for changes in illumination direction," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 721-732, Jul. 1997.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	B. K. P. Horn, "Determining lightness from an image," Computer Graphics and Image Processing, vol. 3, no. 1, pp. 277-299, Dec. 1974.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	W. Chen, M. J. Er, and S. Wu, "Illumination compensation and normalization for robust face recognition using discrete cosine transform in logarithm domain," IEEE Trans. on Systems, Man, and Cybernetics Part B: Cybernetics, vol. 36, no. 2, pp. 458-466, Apr. 2006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	ش. نادري، ن. ا. مقدم چركري و م. ش. معين، "روشي جديد براي كاهش تأثير تغييرات نور در بازدهي سيستم‌هاي بازشناسي چهره،" پانزدهمين كنفرانس مهندسي برق ايران،صص. 176-182، ارديبهشت 1386.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	E. Kirkosa, C. Spathisb, and Y. Manolopoulosc, "Support vector machines, decision trees and neural networks for auditor selection," J. of Computational Methods in Sciences and Engineering Archive, vol. 8, no. 3, pp. 213-224, Aug. 2008.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. W. Kattan and R. B. Cooper, "A simulation of factors affecting machine learning techniques: an examination of partitioning and class proportions," Omega Int. J. Management Science, vol. 28, no. 5, pp. 501-512, Oct. 2000.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	T. S. Lim, W. Y. Loh, and Y. S. Shih, "A comparison of prediction accuracy, complexity, and training time of thirty-three old and new classification algorithms," Machine Learning, vol. 40, no. 3, pp. 203-228, Sep. 2000.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. B. Kotsiantis, "Supervised machine learning: a review of classification techniques," Informatica, vol. 31, no. 3, pp. 249-268, Oct. 2007.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	G. H. John and P. Langley, "Estimating continuous distributions in bayesian classifiers," in Proc. 11th Conf. on Uncertainty in Artificial Intelligence, pp. 338-345, 18-20 Aug. 1995.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	G. Webb, J. Boughton, and Z. Wang, "Not so naive bayes: aggregating one-dependence estimators," Machine Learning J., vol. 58, no. 1, pp. 5-24, Jan. 2005.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	L. Jiang and H. Zhang, "Weightily averaged one - dependence estimators," in Proc. of the 9th Biennial Pacific Rim International Conf. on Artificial Intelligence, PRICAI'06, pp. 970-974, 7–11 Aug. 2006.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	H. Zhang and L. Jiang, "Hidden naive bayes," in Proc. 12th National Conf. on Artificial Intelligence, pp. 919-924, Pittsburgh, Pennsylvania, US, 9-13 Jul. 2005.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	"WEKA: Waikato environment for knowledge analysis", http://www.cs.waikato.ac.nz/ml/weka.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. R. Quinlan, "Discovering Rules by Induction from large collections of examples," in Expert Systems in the Micro-Electronic Age, D. Michie, ed. , pp. 168-201, 1979.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. L. Salzberg, "Book Review: C4.5: Programs for Machine Learning by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc., 1993," Machine Learning, vol. 16, no. 3, pp. 235-240, Sep. 1994.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	W. W. Cohen, "Fast effective rule induction," in Proc. of 12th Int. Conf. on Machine Learning, pp. 115-123, Lake Tahoe, CA, US, Jul. 1995.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	P. Winston, "C4.5 Tutorial, http://www2.cs.uregina.ca /~dbd/cs831/notes/ml/dtrees/c4.5/tutorial.html", 1992.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Intelligent BGSA Based Method for Feature Selection in a Persian Handwritten Digits Recognition System</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>N.</given_name><surname>Ghanbari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. M.</given_name><surname>Razavi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. H.</given_name><surname>Nabavi Karizi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2011</year></publication_date><pages><first_page>29</first_page><last_page>36</last_page></pages><doi_data><doi>10.66224/ijece.28000.9.1.29</doi><resource>http://ijece.org/en/Article/28000</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28000</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28000</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28000</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28000</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28000</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28000</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28000</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	ح. ر. نفیسی و ا. ا. کبیر، "شناسایی ارقام دست‌نویس فارسی،" دومین کنفرانس مهندسی برق ایران، جلد 5، صص. 295-304، ارديبهشت 1373.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	و. جوهری مجد و س. م. رضوی، "بازشناسی فازی ارقام دست‌نویس فارسی،" اولین کنفرانس ماشین بینایی و پردازش تصویر ایران، جلد 1، صص. 144-151، اسفند 1379.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	ع. ر. درویش، ا. ا. کبیر و ح. خسروی، "کاربرد تطابق شکل در بازشناسی ارقام دست‌نویس فارسی،" فني و مهندسي مدرس، شماره 22، صص. 37-48، زمستان 1384.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	ح. خسروی و ا. ا. کبیر، بازشناسی حروف و ارقام دست‌نویس فارسی در فرم‌های ثبت نام آزمون سراسری، پایان‌نامه کارشناسی ارشد، 1385.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	م. نحوی، م. رفیعی، ر. ابراهیم‌پور و ا. ا. کبیر، "ترکیب طبقه‌بندهای دوکلاسی برای بازشناسی ارقام دست‌نویس فارسی،" شانزدهمین کنفرانس مهندسی برق ایران، صص. 203-207، ارديبهشت 1387.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. E. Smith, T. C. Fogarty, and I. R. Johnson, "Genetic selection of feature for clustering and classification," in Proc. of the IEE Colloquium on Genetic Algorithms in Image Processing and Vision, 1994.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. Qi, J. Tian, and R. W. Dai, "Fingerprint classification system with feedback mechanism based on genetic algorithm," in Proc. Int. Conf. Pattern Recognition, vol. 1, Aug. 1998.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Khosravi and E. Kabir, "Introducing a very large dataset of handwritten Farsi digits and a study on their varienties," Pattern Recognition Letters 28, vol. 28, no. 10, pp. 1133-1141, 2007.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	س. م. رضوی، ه. صدوقی یزدی و ا. ا. کبیر، "انتخاب ویژگی برای بازشناسی ارقام دست‌نویس فارسی به کمک الگوریتم‌های وراثتی،" هفتمین کنفرانس سالانه انجمن کامپیوتر ایران، صص. 285-292، اسفند 1380.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	ع. راشدی، ح. نظام آبادی پور و س. سریزدی، "الگوریتم جستجوی گرانشی باینری،" اولین کنگره مشترک سیستم‌های فازی و هوشمند، مشهد، شهريور 1386.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	ع. راشدی، ح. نظام آبادی پور و ح. توحیدی، "انتخاب ویژگی با استفاده از الگوریتم جستجوی گرانشی،" سومین کنفرانس فناوری اطلاعات و دانش، آذر 1386.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	ح. توحیدی، ح. نظام آبادی پور و س. سریزدی، "انتخاب ویژگی با استفاده از الگوریتم جمعیت مورچگان باینری،" اولین کنفرانس سیستم‌های فازی و هوشمند، دانشگاه فردوسی مشهد، 1384.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	E. Rashedi, H. Nezamabadi Pour, and S. Saryazdi, "GSA: a gravitational search algorithm," Information Sciences, vol. 179, no. 13, pp. 2232-2248, 2009.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	J. Kennedy and R. C. Eberhart, "A discrete binary version of the particle swarm algorithm," in Proc. IEEE Int. Conf. on Computational Cybernetics and Simulation, vol. 5, pp. 4104-4108, 12-15 Oct. 1997.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	م. رستمی شهر بابکی و ح. نظام آبادی پور، "روش جدیدی برای الگوریتم PSO باینری،" چهاردهمین کنفرانس مهندسی برق ایران، دانشگاه صنعتی امیرکبیر، تهران، ارديبهشت 1386.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Cost Allocation Framework for Small Signal Stability Ancillary Service in Deregulated Environment</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>E.</given_name><surname>Riahi Samani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Seifi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad Kazem</given_name><surname>Sheikh El Eslami</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2011</year></publication_date><pages><first_page>37</first_page><last_page>44</last_page></pages><doi_data><doi>10.66224/ijece.28001.9.1.37</doi><resource>http://ijece.org/en/Article/28001</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28001</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28001</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28001</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28001</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28001</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28001</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28001</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	E. Riahi Samani, H. Seifi, and M. K. Sheikh-El-Eslami, "Economic valuation of small signal stability as an ancillary service in a competitive electricity market," Int. Review of Electrical Engineering, pt. B, vol. 5, no. 2, pp. 608-613, Apr. 2010.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. K. M. Kodsi and C. A. Canizares, "Application of a stability-constrained optimal power flow to tuning of oscillation controls in competitive electricity markets," IEEE Trans. on Power Systems, vol. 22, no. 4, pp. 1944-1954, Nov. 2007.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. K. M. Kodsi and C. A. Canizares, "Stability-constrained optimal power flow and its application to pricing, power system stabilizers," in Power Symposium, Proc. of the 37th Annual North American, pp. 120-126, Oct. 2005.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Andreoiu, K. Bhattacharya, and C. Canizares, "Pricing power system stabilizers using game theory," in IEE Proc.-Gener. Transm. Distrib., vol. 152, no. 6, pp. 780-786, Nov. 2005.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Andreoiu and K. Bhattacharya, "PSS-control as ancillary service," Electric Power System Research, vol. 4, no. 3, pp. 391-399, Jun. 2005.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	P. Kundur, J. Paserba, V. Ajjarapu, G. Andersson, A. Bose, C. A. Canizares, N. Hatziargyriou, D. Hill, A. Stankovic, C. Taylor, T. V. Cutsem, and V. Vittal, "Definition and classification of power system stability," IEEE Trans. on Power Systems, vol. 19, no. 2, pp. 1387-1401, May 2004.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. G. Rebours, D. S. Kirschen, M. Trotignon, and S. Rossignol, "A survey of frequency and voltage control ancillary services, part I: technical features," IEEE Trans. on Power Systems, vol. 22, no. 1, pp. 350-357, Feb. 2007.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Y. G. Rebours, D. S. Kirschen, M. Trotignon, and S. Rossignol, "A survey of frequency and voltage control ancillary services, part II: economic features," IEEE Trans. on Power Systems, vol. 22, no. 1, pp. 358-366, Feb. 2007.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Shahidehpour, W. F. Tinney, and YongFu, "Impact of security on power systems operation," in Proc. of The IEEE, vol. 93, no. 11, pp. 2013-2025, Nov. 2005.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	C. A. Canizares and M. Kodsi, "Power system security in market clearing and dispatch mechanisms," in Proc. IEEE Power Engineering Society General Meeting, 6 pp., Oct./Nov. 2006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. K. M. Kodsi and C. A. Canizares, "Application of a stability constrained optimal power flow to tuning of oscillation controls in competitive electricity markets," IEEE Trans. on Power Systems, vol. 22, no. 4, pp. 1944-1954, Nov. 2007.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. K. Parida, S. N. Singh, and S. C. Srivastava, "Voltage security constrained localized reactive power market," in IEEE Proc. of Power India Conf., 6 pp., Apr. 2006.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	X. Lin, A. K. David, and C. W. Yu, "Reactive power optimisation with voltage stability consideration in power market systems," in IEE Proc.-Gener. Tram. Dirtrib., vol. 150, no. 3, pp. 305-310, May 2003.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	L. Y. C. Amarasinghe, B. Jayasekar, and U. D. Annakkage, "The effect of dynamic security constraints on the locational marginal prices," in Proc. IEEE Power Engineering Society General Meeting, vol. 1, pp. 370-375, Jun. 2005.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	W. Rosehart, "Optimal power flows incorporating network stability," in Proc. of Power Engineering Society Winter Meeting, IEEE, vol. 2, pp. 1100-1104, Aug. 2002.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	X. J. Lin, C. W. Yu, and A. K. David, "Optimum transient security constrained dispatch in compatetive deregulated poewer system," Electric Power Systems Research, vol. 76, no. 4, pp. 209-216, Jan. 2006.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. K. David and X. J. Lin, "Dynamic security enhancement in poewer market system," IEEE Trans. on Power Systems, vol. 17, no. 2, pp. 431-438, May 2002.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. Andreoiu and K. Bhattacharya, "PSS-control as ancillary service," Electric Power Systems Research, vol. 74, no. 3, pp. 391-399, Jun. 2005.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Andreoiu, K. Bhattacharya, and C. Canizares, "Pricing power system stabilisers using game theory," in IEE Proc.-Gener. Transm. Distrib., vol. 152, no. 6, pp. 780-786, Nov. 2005.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	F. Milano, C. A. Canizares, and M. Invernizzi, "Multiobjective optimization for pricing system security in electricity markets," IEEE Trans. on Power Systems, vol. 18, no. 2, pp. 596-604, May 2003.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	R. Khajjayam and A. Feliachi, "Impact of VAR support on electricity pricing in voltage stability constrained OPF market model," in IEEE Proc. of Power Engineering Society General Meeting, 6 pp., Jun. 2007.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	D. Chattopadhyay Bhujanga, B. Chakrabarti, and E. Grant Read, "Pricing for voltage stability," in Proc. of IEEE Power Engineering Society Int. Conf. on Power Industry Computer Applications, vol. 1, pp. 235-240, May 2001.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Y. Yuan, J. Kubokawa, and H. Sasaki, "Pricing for transient stability," in IEEE Proc. of the International Conf. on Electric Utility Deregulation, Restructuring, and Power Technologies, vol. 1, pp. 332-336, Apr. 2004.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. Konak, D. W. Coit, and A. E. Smith, "Multi-objective optimization using genetic algorithms: atutorial," Reliability Engineering and System Safety, vol. 91, pp. 992-1007, Jan. 2006.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	N. Srinivas and K. Deb, "Multi-objective optimization using non-dominated sorting in genetic algorithms," J. of Evolutionary Computation, vol. 2, no. 3, pp. 221-248, Fall 1995.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, "A fast and elitist multiobjective genetic algorithm: NSGA-II," IEEE Trans. on Evolutionary Computation, vol. 6, no. 2, pp. 182-197, Apr. 2002.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New Switching Algorithm for Compensating the Voltage Deviation of NPC Inverter DC Link Capacitors in DTC Drive of Induction Motors</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Sadeghi Larijani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Shahparasti</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Mohamadian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Yazdian Varjani</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2011</year></publication_date><pages><first_page>45</first_page><last_page>51</last_page></pages><doi_data><doi>10.66224/ijece.28002.9.1.45</doi><resource>http://ijece.org/en/Article/28002</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28002</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28002</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28002</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28002</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28002</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28002</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28002</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	I. Takahashi and T. Noguchi, "A new quick - response and high - efficiency control strategy of an induction motor," IEEE Trans. Ind. Applicat., vol. 22, no. 5, pp. 820-827, Sep./Oct. 1986.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	K. Lee, J. H. Song, I. Choy, and J. Y. Yoo, "Torque ripple reduction in DTC of induction motor driven by three - level inverter with low switching frequency," IEEE Trans. on Power Elec., vol. 17, no. 2, pp. 255-264, Mar. 2002.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	V. Perelmuter, "Three - level inverters with direct torque control," IEEE Industry Applications Conf., vol. 3, pp. 1368-1374, Oct. 2000.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. F. Escalante, J. Vannier, and A. Arzandé, "Flying capacitor multilevel inverters and DTC motor drive applications," IEEE Trans. on Industrial Elec., vol. 49, no. 4, pp. 809-815, Aug. 2002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	C. A. Martins, X. Roboam, T. A. Meynard, and A. S. Carvalho, "Switching frequency imposition and ripple reduction in DTC drives by using a multilevel converter," IEEE Trans. on Power Elec., vol. 17, no. 2, pp. 286-297, Mar. 2002.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R. Zaimeddine and T. Undeland, "DTC control schemes for induction motor fed by three - level NPC - VSI using space vector modulation," in Proc. Int. Symp. on Power Electronics Drives Automation and Motion, SPEEDAM, pp. 1718-1725, Jun. 2010.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Kouro, J. Rebolledo, and J. Rodriguez, "Reduced switching -frequency-modulation algorithm for high-power multilevel inverters," IEEE Trans. on Industrial Electronics, vol. 54, no. 5, pp. 2894-2901, Oct. 2007.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	L. G. Franquelo, J. Rodriguez, J. I. Leon, S. Kouro, R. Portillo, and M. A. M. Prats, "The age of multilevel converters arrives," IEEE Industrial Electronics Magazine, vol.  2, no. 2, pp. 28-39, Jun. 2008.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Alloui, A. Berkani, and H. Rezine, "A three level NPC inverter with neutral point voltage balancing for induction motors direct torque control," in Proc. XIX Int. Conf. on Electrical Machines, ICEM, 6 pp., Sep. 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	C. Liu, B. Wu, D. Xu, N. Zargari, and S. Rizzo, "Progressive natural balance of neutral - point voltage of three level NPC inverter with a modified SVM scheme," in 21st Annual IEEE Applied Power Electronics Conf. and Exposition, APEC, 4 pp., Mar. 2006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Y. S. Lai, Y. K. Chou, and S. Y. Pai, "Simple PWM technique of capacitor voltage balance for three - level inverter with DC - link voltage sensor only," in Proc. 33rd Annual Conf. of the IEEE Industrial Electronics Society, IECON, pp. 1749-1754, 2007.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. V. Jouannce, S. Dai, and H. Zhang, "A multilevel inverter approach providing DC-link balancing, ride - through enhancement, and common - mode voltage elimination," IEEE Trans. on Industrial Electronics, vol. 49, no. 4, pp. 739-745, Aug. 2002.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Cirrincione, M. Pucci, and G. Vitale, "A novel direct torque control of an induction motor drive with a three-level inverter," in Proc. IEEE Bologna Power Tech Conf., 7 pp., Jun. 2003.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Y. Wenxi, L. Zhengyn, and Z. Rongxiang, "Hysteresis - band control based PWM strategy of three - level neutral - point balance," in Proc. 20th Annual IEEE Applied Power Electronics Conf. and Exposition (APEC), vol. 1, pp. 415-418, Mar. 2005.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Cirrincione, M. Pucci, and G. Vitale, "Direct torque control for three - level fed induction motor drives with capacitor voltage ripple minimization," in Proc. 34th Annual Conf. of IEEE Industrial Electronics, IECON, pp. 3238-3245, Nov. 2008.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	B. Wu, High - Power Converters and AC Drives, A John Wiley &amp; Sons, Inc., 2006.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. Sadeghi Larijani, M. Shahparasti, A. Fatemi, A. Amiri, and M. Mohammadian, "DTC drive of induction motor using three - level inverter with optimized switching table and minimizing the deviation of neutral point voltage," in Proc. Power Electronic &amp; Drive Systems &amp; Technologies Conf., PEDSTC, pp. 255-260, May 2010.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>