﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051923</doi_batch_id><timestamp>20260519231851</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>3</month><day>21</day><year>2015</year></publication_date><journal_volume><volume>12</volume></journal_volume><issue>4</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A New eDLA-Based Framework for Finding Optimal Stochastic Sub-Graph</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M. R.</given_name><surname>Mollakhalili Meybodi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. R.</given_name><surname>Meybodi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2015</year></publication_date><pages><first_page>85</first_page><last_page>97</last_page></pages><doi_data><doi>10.66224/ijece.28098.12.4.85</doi><resource>http://ijece.org/en/Article/28098</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28098</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28098</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28098</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28098</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28098</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28098</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28098</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K. S. Narendra and M. A. L. Thathachar, "Learning automata: a survey," IEEE Trans. Syst. Man, Cyberentics, vol. 14, no. 4, 
pp. 323-334, 1974.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. L. Thathachar and P. S. Sastry, "Varieties of learning automata: an overview," IEEE Trans. Syst. Man. Cybern. B. Cybern., vol. 32, no. 6, pp. 711-722, Jan. 2002.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Beigy and M. Meybodi, Intelligent Channel Assignment in Cellular Networks: A Learning Automata Approach, Amirkabir University of Technology, 2004.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	H. Beigy and M. R. Meybodi, "Utilizing distributed learning automata to solve stochastic shortest path problems," Int. J. Uncertainty, Fuzziness Knowledge-Based Syst., vol. 14, no. 5, 
pp. 591-615, Oct. 2006.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. R. Meybodi and H. Beigy, "A sampling method based on distributed learning automata," in Proc. the 10th Iranian Conf. on Electrical Engineering, vol. 1, pp. 618-626, May 2002.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. R. MollakhaliliMeybodi and M. R. Meybodi, "A new distributed learning automata based algorithm for solving stochastic shortest path," presented at 6th Conf. on Intelligent Systems, 2004.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. R. Meybodi and H. Beigy, "Solving stochastic shoretst path problem using Monte Carlo sampling method: a distributed learning automata approach," Neural Networks and Soft Computing, Physica-Verlag HD, pp. 626-632, 2003.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Motevalian and M. R. Meybodi, "Solving maximal independent set problem using distributed learning automata," in Proc. 14th Iranian Electrical Engineering Conf., ICEE2006, Tehran, Iran, 16-18 May, 2006.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Alipour and M. R. Meybodi, "Solving traveling salesman problem using distributed learning automata," in Proc. 10th Annual CSI Computer Conf., pp. 759-761, Tehran, Iran, Feb. 2005.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Saati and M. Meybodi, "A self organizing model for document structure using distributed learning automata," in Proc. 2nd Int. Conf. on Information and Knowledge Technology, IKT2005, Tehran, Iran, 24-26 May, 2005.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Z. Anari, M. R. Meybodi, and B. Anari, "Web page ranking based on fuzzy and learning automata," in Proc. Int. Conf. Manag. Emergent Digit. Ecosyst., MEDES'09, pp. 162-166, Lion, France, 27-31 Oct. 2009.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. R. Mollakhalili Meybodi and M. R. Meybodi, "Link prediction in adaptive web sites using distributed learning automata," in Proc. 13th Annual CSI Computer Conf. of Iran, Kish Island, Iran, 9-11, Mar. 2008.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. R. MollakhaliliMeybodi and M. R. Meybodi, "A distributed learning automata based approach for user modeling in adaptive hypermedia," in Proc. Congress on Electrical, Computer, and Information Technology, 2012.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. BaradaranHashemi and M. R. Meybodi, "Web usage mining using distributed learning automata," in Proc. 12th Annual CSI Computer Conf. of Iran, pp. 553-560, 2007.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Misra and B. J. Oommen, "Dynamic algorithms for the shortest path routing problem: learning automata - based solutions," IEEE Trans. Syst. Man. Cybern. B. Cybern., vol. 35, no. 6, pp. 1179-1192, Dec. 2005.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	K. Liu, Stochastic Online Learning for Network Optimization under Random Unknown Weights, 18 pp. 1-18.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	K. S. Narendra and M. A. L. Thathachar, Learning Automata: An Introduction, Prentice Hall, p. 476, 1989.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. Lakshmivarahan and M. A. L. Thathachar, "Absolutely expedient learning algorithms for stochastic automata," IEEE Trans. Syst. Man Cybern., vol. 6, pp. 281-286, 1973.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. A. L.Thathachar and B. Harita, "Learning automata with changing number of actions," IEEE Trans. Syst. Man, Cybern. - Part A Syst. Humans, vol. 17, no. 6, pp. 1095-1100, Dec. 1987.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	J. Akbari Torkestani and M. R. Meybodi, "A learning automata-based heuristic algorithm for solving the minimum spanning tree problem in stochastic graphs," J. Supercomput., vol. 59, no. 2, pp. 1035-1054, Oct. 2012.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	F. Norman, "On the linear model with two absorbing," J. Math. Psychol., vol. 5, pp. 225-241, Jun. 1968.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	A. Papoulis, Probability, Random Variables, and Stochastic Processes, 3rd ed. New York, USA: McGrawHill, 1991.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. M. Ross, Introduction to Probability and Statistics for Engineers and Scientists, 3rd. Ed., Elsevier Academic Press, 2004.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	K. R. Hutson and D. R. Shier, Online Supplement to ‘Bounding Distributions for the Weight of a Minimum Spanning Tree in Stochastic Networks,’ 12 pp.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. Akbari Torkestani and M. R. Meybodi, "Learning automata - based algorithms for solving stochastic minimum spanning tree problem," Appl. Soft Comput., vol. 11, no. 6, pp. 4064-4077, Sep. 2011.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Multi-Resolution Learning Based Method for Multimodal Medical Image Registration</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S. S.</given_name><surname>Alehojat Khasmakhi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. R. </given_name><surname>Keyvanpour</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2015</year></publication_date><pages><first_page>98</first_page><last_page>108</last_page></pages><doi_data><doi>10.66224/ijece.28099.12.4.98</doi><resource>http://ijece.org/en/Article/28099</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28099</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28099</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28099</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28099</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28099</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28099</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28099</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. P. W. Pluim, "Mutual information based registration of medical images: a survey," IEEE Trans. on Medical Imaging, vol. 22, no. 8, pp. 986-1004, Aug. 2003.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. Suganya, K. Priyadharsini, and S. Rajaram, "Intensity based image registration by maximization of mutual information," Int. J. of Computer Application, vol. 1, no. 20, 5 pp., 2010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. Chen and J. Tian, "Real - time multi - modal rigid registration based on a novel symmetric - SIFT descriptor," Progress in Natural Science, vol. 19, no. 5, pp. 643-651, 10 May 2009.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. R. Keyvanpour and S. Alehojat, "Analytical comparison of learning based methods to increase the accuracy and robustness of registration algorithms in medical imaging," Int. J. of Advanced Science and Technology, vol. 41, pp. 61-70, Apr. 2012.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	B. Zitova, J. Flusser, and F. Sroubek, "Image registration: a survey," Image and Vision Computing, vol. 21, no. 11, pp. 977-1000, 2003.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	G. Coppini, S. Diciotti, and G. Valli, "Matching of medical images by self - organizing neural networks," Pattern Recognition Letters, vol. 25, no. 4, pp. 341-352, Feb. 2004.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Wang, S. Lei, and F. Chang, "Image registration based on neural network," in Proc. of the 5th Int. Conf. on Information Technology and Application in Biomedicine, pp. 74-77, 30-31 May 2008.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Fornefett, K. Rohr, and H. S. Stiehl, "Elastic registration of medical images using radial basis functions with compact support," in Proc. IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, vol. 1, pp. 1063-6919, 23-25 Jun. 1999.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. Rajeswari and A. A. Irudhayaraj, "Implementation of radial basis function for fMRI registration," Int. J. of Computer Theory and Engineering, vol. 3, no. 2, pp. 287-291, Apr. 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Oldridge, S. Fels, and G. Miller, "Classification of image registration problems using support vector machines," in Proc. of the Int. Conf. on Computer Vision, pp. 360-366, 5-7 Jan. 2011.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	C. Wachinger and N. Navab, "Manifold learning for multi - modal image registration," BMVC, 2010.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	H. –M. Chan, A. C. S. Chung, S. C. H. Yu, A. Norbash, and 
W. M. Wells, "Multi-modal image registration by minimizing kullback - leibler distance between expected and observed joint class histogram," in Proc. IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, vol. 2, p. 570, 18-20 Jun. 2003.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. C. S. Chung, R. Gan, and W. M. Wells III, Robust Multi-Modal Image Registration Based on Prior Joint Intensity Distributions and Minimization of Kullback- Leibler Distance, HKUST CSE Technical Report, 2007.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	R. Liao, et al., "Learning-based 2D/3D rigid registration using Jensen-SShannon divergence for image-guided surgery," Medical Imaging and Augmented Reality, Lecture Notes in Computer Science, vol. 4091, pp. 228-235, 2006.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	D. Lee, et al.,, "Learning similarity measure for multi-modal 3D image registration," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'2009, pp. 186-193, 20-25 Jun. 2009.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	C. Chaux, L. Duval, and J. C. Pesquet, "Image analysis using a dual-tree M - band wavelet transform," IEEE Trans. on Image Processing, vol. 15, no. 6, pp. 2397-2412, Aug. 2006.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. Mavudila, M. Cherkaoui, L. Masmoudi, and N. Hassanain, "A combined dual - tree complex wavelet (DT - CWT) and bivariate shrinkage for ultrasound medical images despeckling," Int. J. of Computer Applications, vol. 49, no. 14, pp. 42-49, Jul. 2012.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. B. Abche, F. Yaacoub, A. Maalouf, and E. Karam, "Image registration based on neural network and fourier transform," in Proc. of the 28th IEEE EMBS Annual Int. Conf., 
pp. 4803-4806, Aug. 2006.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. West, et al., "Comparison and evaluation of retrospective intermodality image registration techniques," SPIE Proc. on Medical Imaging: Image Processing, vol. 2710, pp. 332-347, 1996.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Roche, G. Malandain, X. Pennec, and N. Ayache, "The correlation ratio as a new similarity measure for multimodal image registration," in Proc. 1st Int. Conf.e on Medical Image Computing and Computer-Assisted Intervention, MICCAI'98, vol. 1496, pp. 1115-1124, 1998.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	R. W. K. So and A. C. S. Chung, "Learning - based multi - modal rigid image registration by using Bhattacharyya distances," in Proc. 33rd Annual Int. Conf. of the IEEE on Biomedical Imaging: from Nano to Macro, pp. 368-371, Boston, Massachusetts, US, 2011.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	D. L. Collins and A. P. Zijdenbos, "Design and construction of a realistic digital brain phantom," IEEE Trans. Med. Img., vol. 17, 
no. 3, pp. 463-468, Jun. 1998.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	C. A. Cocosco, V. Kollokian, R. K. S. Kwan, G. Bruce Pike, and A. C. Evans, "BrainWeb: online interface to a 3D MRI simulated brain database," NeuroImage, vol. 5, no. 4, 1997.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Implementation of a Fuzzy Multi-Agent Model for City Evacuation Traffic Management Using Probabilistic Automata</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A. R.</given_name><surname>Karbaschian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Saeed</given_name><surname>Setayeshi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>arash</given_name><surname>Sharifi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2015</year></publication_date><pages><first_page>109</first_page><last_page>118</last_page></pages><doi_data><doi>10.66224/ijece.28100.12.4.109</doi><resource>http://ijece.org/en/Article/28100</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28100</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28100</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28100</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28100</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28100</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28100</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28100</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	V. McKinney, 2007, Sea Level Rise and the Future of the Netherlands, Accessed March 10, 2011, http://www1.american.edu/ted/ice/dutch-sea.html</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	K. Caruso, 2005, Welcome to Rita Info.com, Accessed March 10, 2011, http://www.ritainfo.com/</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Kim, S. Shekhar, and M. Min, "Contraflow transportation network reconfiguration for evacuation route planning," IEEE Trans. on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1-15, Aug. 2008.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Y. Liu, An Intelligent Optimal Control System for Emergency Evacaution, Ph. D Thesis, University of Maryland, 2007.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Madireddy, D. J. Medeiros, and S. Kumara, "An agent based model for evacuation traffic management," in Proc. of the 2011 Winter Simulation Conf., 2011.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Varney, 2008, Contraflow Evacuation a Hurricane Triumph, Accessed March 11, 2011, http://www.nola.com/hurricane/areweready2006/tp/index.ssf?/hurricane/areweready2006/stories/contraflow.html</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	E. Bonabeau, "Agent - based modeling: methods and techniques for simulating human systems," PNAS vol. 99 no. Suppl 3, May 14, 2002.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	F. B. Zhan and X. Chen, "Agent - based modeling and evacuation planning," Geospatial Technologies and Homeland Security, 
vol. 94, pp. 189-208, 2008.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	T. Cova and J. P. Johnson, "A network flow model for lane - based evacuation routing," Transportation Research Part A: Policy and Practice, vol. 37, no. 7, pp. 579-604, 2003.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Kim, B. George, and S. Shekhar, "Evacuation route planning: scalable heuristics," in Proc. of the 2007 Int. Sym. on Advances in Geographic Information Systems, Seattle, WA, US, 2007.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	H. W. Hamacher and S. A. Tjandra, "Mathematical modeling of evacuation problems: a state of the art," Pedestrian and Evacuation Dynamics, pp. 227-266, 2002.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. K. Rathi and R. S. Solanki, "Simulation of traffic flow during emergency evacuations: a microcomputer based modeling system," in Proc. of the 1993 Winter Simulation Conf., pp. 1250-1258, 12-15 Dec. 1993.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	C. M. Macal and M. J. North, "Agent-based modeling and simulation: desktop ABMS," in Proc. INFORMS Winter Simulation Conf., pp. 95-106, 2007.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	B. Zhang, W. Kin, and S. V. Ukkusuri, "Agent - based modeling for household level hurricane evacuation," in Proc. of the 2009 Winter Simulation Conf., pp. 2778-2784, 2009.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Shendarkar and K. Vasudevan, "Crowd simulation for emergency response using BDI agent based on virtual reality," in Proc. of the 2006 Winter Simulation Conf., pp. 545-553, 2006.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	B. Wolshon, "One-way-out: contraflow freeway operation for hurricane evacuation," Natural Hazards Review, vol. 2, no. 3, pp. 105-112, 2001.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	X. Chen and F. Zhan, "Agent - based modelling and simulation of urban evacuation: relative effectiveness of simultaneous and staged evacuation strategies," J. of the Operational Research Society, 
vol. 59, no. 1, pp. 25-33, Jan. 2008.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	X. Chen and F. B. Zhan, "Agent - based modeling and simulation of urban evacuation: relative effectiveness of simultaneous and staged evacuation strategies," Presented at the 83rd Annual Meeting of the Transportation Research Board, Washington, D.C. 2004.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	H. Tuydes, Network Traffic Management under Disaster Conditions, Ph. D Thesis, Northwestern University, 2005.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	H. Tuydes and A. Ziliaskopoulos, "Tabu - based heuristic approach for optimization of network evacuation contraflow," Transportation Research Record: J. of the Transportation Research Board, vol. 1964, no. 1, pp. 157-168, 2006.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. Kim and S. Shekhar, "Contraflow network reconfiguration for evacuation planning: a summary of results," in Proc. 13th ACM Symp. Advances in Geographic Information Systems, pp. 250-259, Nov. 2005.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	G. K. H. Pang, K. Takahashi, T. Yokota, and H. Takenaga, "Adaptive route selection for dynamic route guidance system based on fuzzy - neural approaches," IEEE Trans. on Vehicular Technology, vol. 48, no. 6, pp. 2028-2041, Nov. 1999.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	م. تشنه‌لب، نيما صفارپور و داريوش افيوني، سیستم‌هاي فازي و كنترل فازي، انتشارات دانشگاه صنعتي خواجه نصيرالدين طوسي، صص. 79-80، 1389.
[24]	http://www.rstudio.com/, Accessed Apr. 2013, </unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	http://www.r-project.org/, Accessed Apr. 2013, </unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	http://rnetlogo.r-forge.r-project.org/, Accessed Apr. 2013, </unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	U. Wilensky, 1999, NetLogo (and NetLogo User Manual), Center for Connected Learning and Computer Based Modeling, Northwestern University, http://ccl.northwestern.edu/netlogo/, Accessed Apr. 2013,</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	L. S. Riza, C. Bergmeir, F. H. Triguero, and J. M. Benitez, frbs: Fuzzy rule-based systems, a package for R Language, http://cran.r-project.org/web/packages/frbs/index.html, Accessed Apr. 2013. </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New Extended Distributed Learning Automata-Based Algorithm for Parameter Learning of a Bayesian Network</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M. R.</given_name><surname>Mollakhalili Meybodi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. R.</given_name><surname>Meybodi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2015</year></publication_date><pages><first_page>119</first_page><last_page>126</last_page></pages><doi_data><doi>10.66224/ijece.28101.12.4.119</doi><resource>http://ijece.org/en/Article/28101</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28101</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28101</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28101</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28101</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28101</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28101</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28101</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	F. V. Jensen and T. D. Nielsen, Bayesian Networks and Decision Graphs, Springer, 2007.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. Heckerman and D. M. Chickering, "Learning bayesian networks: the combination of knowledge and statistical data metrics for belief networks," Mach. Learn., vol. 20, no. 3, pp. 197-243, 1995.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. L. Thathachar and P. S. Sastry, "Varieties of learning automata: an overview," IEEE Trans. Syst. Man. Cybern. B. Cybern., vol. 32, no. 6, pp. 711-722, Jan. 2002.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	K. S. Narendra and M. A. L. Thathachar, "Larning automata: a survey," IEEE Trans. Syst. Man, Cybern. - Part A Syst. Humans, vol. 14, no. 4, pp. 323-334, Jul. 1974.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. Beigy and M. Meybodi, Intelligent Channel Assignment in Cellular Networks: A Learning Automata Approach, Amirkabir University of Technology, 2004.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. S. Poznyak and K. Najim, Learning Automata and Stochastic Optimization (Lecture Notes in Control and Information Sciences), vol. 225, London: Springer - Verlag, 1997.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. Beigy and M. R. Meybodi, "Utilizing distributed learning automata to solve stochastic shortest path problems," Int. J. Uncertainty, Fuzziness Knowledge - Based Syst., vol. 14, no. 5, pp. 591-615, Oct. 2006.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. R. Mollakhalili Meybodi and M. R. Meybodi, "A new distributed learning automata based algorithm for solving stochastic shortest path," in Proc. 6th Conf. on Intelligent Systems, Nov. 26-27, 2004.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. R. Meybodi and H. Beigy, "A sampling method based on distributed learning automata," in Proc. 10th Iranian Conf. on Electrical Engineering, vol. 1, pp. 618-626, May 2002.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Motevalian and M. R. Meybodi, "Solving maximal independent set problem using distributed learning automata," in Proc.14th Iranian Electrical Engineering Conf., ICEE 2006, vol. 1, Tehran, Iran, 16-18 May 2006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Alipour and M. R. Meybodi, "Solving traveling salesman problem using distributed learning automata," in Proc. 10th Annual CSI Computer Conf., pp. 759-761, Tehran, Iran, Feb. 2005.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Baradaran Hashemi and M. R. Meybodi, "Web usage mining using distributed learning automata," in Proc. 12th Annual CSI Computer Conf. of Iran, pp. 553-560, Tehran, Iran, 20-22 Feb. 2007.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. R. Mollakhalili Meybodi and M. R. Meybodi, "A distributed learning automata based approach for user modeling in adaptive hypermedia," in Proc. Congress on Electrical, Computer, and Information Technology, Mashhad, Iran, 7-9 Nov. 2012.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. R. Mollakhalili Meybodi and M. R. Meybodi, "Link prediction in adaptive web sites using distributed learning automata," in Proc. 13th Annual CSI Computer Conf. of Iran, 6 pp., Kish Island, Iran, March 9-11, 2008.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	B. Anari and M. R. Meybodi, "A method based on distributed learning automata for determining web documents structure," in proc. 12th Annual CSI Computer Conf. of Iran, pp. 2276-2282, 20-22 Feb.. 2007.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	E. Bauer, D. Koller, and Y. Singer, "Update rules for parameter estimation in bayesian networks," in Proc. of the 13th Conf. on Uncertainty in Artificial Intelligence, UAI1997, pp. 3-13, 1997.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	I. Cohen, A. Bronstein, F. G. Cozman, and N. M. A. Urbana, Online Learning of Bayesian Network Parameters, Technical Report, 2001.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	N. A. Rezvani and M. R. Meybodi, "A learning automata - based technique for training conditional probability tables of bayesian network," in Proc. 14th National Conf. of Iran Computer Society, CSICC'09, Tehran, Iran, 2009.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. R. Mollakhalili Meybodi and M. R. Meybodi, "Extended distributed learning automata: a new method for solving stochastic graph optimization problems," vol. 41, no. 3, pp. 923-940, Aug. 2013.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	P. Murphy Kevin, An Introduction to Graphical Models, 2001.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	C. B. G., G. Suermondt, and R. Chavez, "The ALARM monitoring system: a case study with two probabilistic inference techniques for belief networks," in Proc. 2nd European Conf. on AI and Medicine, vol. 38, pp. 247-256, 1989.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	"Bayesian network repository," [Online]. Available: http://www.cs.huji.ac.il/~galel/Repository.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Introducing a New Version of Binary Ant Colony Algorithm to Solve the Problem of Feature Selection</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Kashef</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Nezamabadi-pour</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2015</year></publication_date><pages><first_page>127</first_page><last_page>134</last_page></pages><doi_data><doi>10.66224/ijece.28102.12.4.127</doi><resource>http://ijece.org/en/Article/28102</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28102</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28102</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28102</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28102</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28102</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28102</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28102</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Kabir, Md. Shahjahan, and K. Murase, "A new local search standard, based hybrid genetic algorithm for feature selection," Neurocomputing, vol. 74, no. 17, pp. 2914-2928, Oct. 2011.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. M. Vieira, J. M. C. Sousa, and T. A. Runkler, "Two cooperative ant colonies for feature selection using fuzzy models," Expert Systems with Applications, vol. 37, no. 4, pp. 2714-2723, Apr. 2010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	I. Guyon and A. Elisseeff, "An introduction to variable and feature selection," J. of Machine Learning Research, vol. 3, pp. 1157-1182, Mar. 2003.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Dash and H. Liu, "Feature selection for classification," Intelligent Data Analysis, vol. 1, no. 1-4, pp. 131-156, 1997.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. Liu and L. Yu, "Toward integrating feature selection algorithms for classification and clustering," IEEE Trans. on Knowledge and Data Engineering, vol. 17, no. 4, pp. 491-502, Apr. 2005.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Ding, "Feature selection based F- score and ACO algorithm in support vector machine," in Proc. 2nd Int. Symp. on Knowledge Acquisition and Modeling, vol. 1, pp. 10-23, Nov. 2009.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	L. T. Vinh, S. Lee, Y. T. Park, and B. J. d'Auriol, "A novel feature selection method based on normalized mutual information," Appl Intell, vol. 37, no. 1, pp. 100-120, Jul. 2010.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. H. Aghdam, N. Ghasem-Aghaee, and M. E. Basiri, "Text feature selection using ant colony optimization," Expert Systems with Applications, vol. 36, no. 3, pp. 6843-6853, Apr. 2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Kabir, M. Islam, and K. Murase, "A new wrapper feature selection approach using neural network," Neurocomputing, vol. 73, no. 16-18, pp. 3273-3283, Oct. 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	R. Kohavi and G. John, "Wrappers for feature selection," Artificial Intelligence, vol. 97, no. 1-2, pp. 273-324, Dec. 1997.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	P. Bermejo, J. A. Gamez, and J. M. Puerta, "A GRASP algorithm 
for fast hybrid (filter - wrapper) feature subset selection in high - dimensional datasets," Pattern Recognition Letters, vol. 32, no. 5, pp. 701-711, Apr. 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Huang, Y. Cai, and X. Xu, "A hybrid genetic algorithm for feature selection wrapper based on mutual information," Pattern Recognition Letters, vol. 28, no. 13, pp. 1825-1844, Oct. 2007.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	R. K. Sivagaminathan and S. Ramakrishnan, "A hybrid approach for feature subset selection using neural networks and ant colony optimization," Expert Systems with Applications, vol. 33, no. 1, pp. 49-60, Jul. 2007.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	I. Oh, J. S. Lee, and B. R. Moon, "Hybrid genetic algorithm for feature selection," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 26, no. 11, pp. 1424-1437, Nov. 2004.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	س. م. رضوي، ﻫ. صدوقي يزدي و ا. کبير، "انتخاب ويژگي براي بازشناسي ارقام دست‌نويس فارسي به کمک الگوريتم وراثتي،" هفتمين کنفرانس سالانه انجمن کامپيوتر ايران، صص. 285-292، 1380.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	م. رستمي شهر بابکي و ح. نظام آبادي پور، "انتخاب ويژگي در طبقه‌بندي معنايي تصاوير با استفاده از الگوريتم PSO،" پانزدهمين کنفرانس سالانه مهندسي کامپيوتر ايران، صص. 269-275، 1384.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	L. Y. Chuang, S. W. Tsai, and C. H. Yang, "Improved binary particle swarm optimization using catfish effect for feature selection," Expert Systems with Applications, vol. 38, no. 10, pp. 12699-12707, Sep. 2011.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	E. Rashedi, H. Nezamabadi-pour, and S. Saryazdi, "A simultaneous feature adaptation and feature selection method for content - based image retrieval systems," Knowledge Based System, vol. 39, pp. 85-94, Feb. 2013.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	E. Rashedi and H. Nezamabadi-pour, "Feature subset selection using improved binary gravitational search algorithm," J. of Intelligent and Fuzzy Systems, vol. 26, no. 3, pp. 1211-1221, May 2013.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	ع. راشدي، ح. نظام آبادي پور و ح. توحيدي، "انتخاب ويژگي با استفاده از الگوريتم جستجوي گرانشي"، سومين کنفرانس بين‌المللي فناوري اطلاعات و دانش، مشهد، آذر 1386.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. Sarafrazi and H. Nezamabadi-pour, "Facing the classification of binary problems with a GSA-SVM hybrid system," Mathematical and Computer Modelling, vol. 57, no. 1-2, pp. 270-278, Jan. 2013.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. Dorigo and L. M. Gambardella, "Ant colonies for the traveling salesman problem," BioSystems, vol. 43, no. 2, pp. 73-81, Jul. 1997.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. Dorigo and L. M. Gambardella, "Ant colony system: a cooperative learning approach to the traveling salesman problem," IEEE Trans. on Evolutionary Computation, vol. 1, no. 1, pp. 53-66, Apr. 1997.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. Dorigo, V. Maniezzo, and A. Colorni, "The ant system: optimization by a colony of cooperative agents," IEEE Trans. on System, Man, and Cybernetics, vol. 26, no. 1, pp. 1-13, Feb. 1996.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	A. Al-Ani, "Feature subset selection using ant colony optimization," Int. J. of Computational Intelligence, vol. 2, no. 1, pp. 53-58, 2005.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	T. Hiroyasu, M. Miki, Y. One, and Y. Minami, Ant Colony for Continuous Functions, the Science and Engineering, Doshisha University, 2000.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	ح. توحيدي، ح. نظام آبادي پور و س. سريزدي، "انتخاب ويژگي با استفاده از الگوريتم جمعيت مورچگان باينري،" اولين کنگره فازي و سيستم‌هاي هوشمند، دانشگاه فردوسي مشهد، ايران، صص. 269-275، 9-7 شهريور 1386.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	S. Kashef and H. Nezamabadi-pour, "A new feature selection algorithm based on binary ant colony optimization," in 5th Conf. on Information and Knowledge Technology, IKT2013, pp. 50-54, Shiraz, Iran, May 2013.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	N. Karaboga, A. Kalinli, and D. Karaboga, "Designing digital IIR filters using ant colony optimization algorithm," Engineering Applications of Artificial Intelligence, vol. 17, no. 3, pp. 301-309, Apr. 2004.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	L. Ozbakir, A. Baykasoglu, S. Kulluk, and H. Yapici, "TACO - miner: an ant colony based algorithm for rule extraction from trained neural networks," Expert Systems with Applications, vol. 36, no. 10, pp. 12295-12305, Dec. 2009.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	M. Janaki Meena, K. R. Chandran, A. Karthik, and A. Vijay Samuel, "An enhanced ACO algorithm to select features for text categorization and ites parallelization," Expert Systems with Applications, vol. 39, no. 5, pp. 5861-5871, Apr. 2012.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	UCI Machine Learning Repository, Center for Machine Learning and Intelligent Systems, http://archieve.ics.uci.edu/ml/datasets.html.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	L. Y. Chuang, C. H. Yang, and J. C. Li, "Chaotic maps based on binary particle swarm optimization for feature selection," Applied Soft Computing, vol. 11, no. 1, pp. 239-248, Jan. 2011.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	C. T. Su and H. C. Lin, "Applying electromagnetism-like mechanism for feature selection," Information Science, vol. 181, no. 5, pp. 972-986, Mar. 2011.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Control of the Interference and Increasing Capacity by Creating a Phase Difference between the Signals Sent in LTE Network</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Mirsalari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>N.</given_name><surname>Neda</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2015</year></publication_date><pages><first_page>135</first_page><last_page>142</last_page></pages><doi_data><doi>10.66224/ijece.28103.12.4.135</doi><resource>http://ijece.org/en/Article/28103</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28103</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28103</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28103</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28103</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28103</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28103</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28103</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	F. Khan, LTE for 4G Mobile Broadband, Cambridge Univercity Press, New York, 2009.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. Astely, et al., "LTE: the evolution of mobile broadband," IEEE Communications Magazine, vol. 47, no. 4, pp. 44-51, Apr. 2009.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	T. S. Rappaport, Wireless Communications Principles and Practice, 2nd Ed., New Delhi, 2006.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. E. Elayoubi and B. Fourestie, "On frequency allocation in 3G LTE systems," in Proc. of 17th IEEE Int. Symp. on Indoor and Mobile Radio Communications, 5 pp., Helsinki, Finland, 11-14 Sep. 2006.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Rahman and H. Yanikomeroglu, "Enhancing cell-edge performance: a downlink dynamic interference avoidance scheme with inter-cell coordination," IEEE Trans. on Wireless Communications, vol. 9, no. 4, pp. 1414-1425, Apr. 2010.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. M. Kwon, O. K. Lee, J. Y. Lee, and M. Y. Chung, "Power control for soft fractional frequency reuse in OFDMA system," Computational Science and Its Applications, ICCSA,'10, pp. 63-71, 2010.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Qian, et al., "Inter-cell interference coordination through adaptive soft frequency reuse in LTE networks," in Proc. IEEE Wireless Communications and Networking Conf.: MAC and Cross-Layer Design, pp. 1618-1623, Shanghai, China, 1-4 Oct. 2012.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Prasad, OFDM for Wireless Communications Systems, Artech House, Inc., Boston-London, 2004.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Son and S. Lee, "Bandwidth and region division for broadband multi-cell networks," IEEE Communications Letters, vol. 10, no. 5, pp. 360-362, May 2006.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	D. Tse and P. Viswanath, Fundamentals of Wireless Communication, Cambridge Univercity Press, New York, 2005.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	V. Kuhn, Wireless Communications over MIMO Channels, John Wiley &amp; Sons, Ltd, 2007.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Adhikari, "Critical analysis of multi-antenna systems in the LTE downlink," in Proc. IEEE Int. Conf. Internet Multimedia Services Architecture and Applications, IMSAA'09, 6 pp., Bangalore, India, 9-11 Dec. 2009.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Secure Algorithm to Overcome Fingerprint Classification Problems</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>F.</given_name><surname>Mirzaei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Ebrahimpour-Komleh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Biglari</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2015</year></publication_date><pages><first_page>143</first_page><last_page>151</last_page></pages><doi_data><doi>10.66224/ijece.28104.12.4.143</doi><resource>http://ijece.org/en/Article/28104</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28104</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28104</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28104</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28104</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28104</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28104</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28104</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer - Verlag New York Inc, 2009.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. I. Awad and K. Baba, "Efficient fingerprint classification using singular point," Int. J. of Digital Information and Wireless Communications, vol. 1, no. 3, pp. 611-616, 2011.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Bhuyan and D. Bhattacharyya, "An effective fingerprint classification and search method," Int. Journal of Computer Science and Network Security, vol. 9, no. 11, pp. 39-48, Nov. 2009.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	I. S. Msiza, B. Leke - Betechuoh, F. V. Nelwamondo, and N. Msimang, "A fingerprint pattern classification approach based on the coordinate geometry of singularities," in Proc. IEEE Int. Conf. on Systems, Man, and Cybernetics, pp. 510-517, 11-14 Oct. 2009.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	L. Wang and M. Dai, "Application of a new type of singular points in fingerprint classification," Pattern Recognition Letters, vol. 28, no. 13, pp. 1640-1650, 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	H. Zhang and X. Wang, "A new fingerprint enhancement algorithm," in Proc. Third IEEE Int. Cof on Broadband Network and Multimedia Technology, IC-BNMT'10, pp. 1222-1225, Beijing, China, 26-28 Oct. 2010.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	L. O'Gorman and J. V. Nickerson, "An approach to fingerprint filter design," Pattern Recognition, vol. 22, no. 1, pp. 29-38, Jan. 1989.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	L. Hong, Y. Wan, and A. Jain, "Fingerprint image enhancement: algorithm and performance evaluation," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp. 777-789, Aug. 1998.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	K. Arora, and P. Garg, "A quantitative survey of various fingerprint enhancement techniques," Int. J. of Computer Applications, vol. 28, no. 5, pp. 24-29, Aug. 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	W. Wang, J. Li, F. Huang, and H. Feng, "Design and implementation of Log-Gabor filter in fingerprint image enhancement," Pattern Recognition Letters, vol. 29, no. 3, pp. 301-308, Feb. 2008.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Y. Wang, J. Hu, and F. Han, "Enhanced gradient - based algorithm for the estimation of fingerprint orientation fields," Applied Mathematics and Computation, vol. 185, no. 2, pp. 823-833, Feb. 2007.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Wang and X. Sun, "Fingerprint image enhancement using a fast Gabor filter," in Proc. 8th World Congress Intelligent Control and Automation, WCICA , pp. 6347-6350, 7-9 Jul. 2010.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Yang - Biao, "Fingerprint enhancement based on Gabor Filter [J]," Computer Engineering and Application. vol. 45, no. 10, pp. 172-175, 2009. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	C. Watson, G. Candela, and P. Grother, Comparison of FFT Fingerprint Filtering Methods for Neural Network Classification, NIST Technical Report 5493 NISTIR-5493, 1994.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Wang, W. W. Zhang, and Y. S. Wang, "Fingerprint classification by directional fields," in Proc. 4th IEEE Int. Conf. on Multimodal Interfaces, pp. 395-399, 2002.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Kawagoe and A. Tojo, "Fingerprint pattern classification," Pattern Recognition, vol. 17, no. 3, pp. 295-303, 1984.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. K. Jain, S. Prabhakar, and L. Hong, "A multichannel approach 
to fingerprint classification," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 21, no. 4, pp. 348-359, Apr. 1999.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	K. Nilsson and J. Bigun, "Localization of corresponding points in fingerprints by complex filtering," Pattern Recognition Letters, 
vol. 24, no. 13, pp. 2135-2144, Sep. 2003.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	K. Nilsson and J. Bigun, "Complex filters applied to fingerprint images detecting prominent symmetry points used for alignment," Biometric Authentication, Lecture Notes in Computer Science, vol. 2359, pp. 39-47, 2002.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	G. Aguilar, G. Sanchez, K. Toscano, M. Nakano - Miyatake, and H. Perez - Meana, "Automatic fingerprint recognition system using fast fourier transform and gabor filters," Cientifica, vol. 12, no. 1, pp. 9-16, 2008.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	V. Areekul, U. Watchareeruetai, K. Suppasriwasuseth, and S. Tantaratana, "Separable gabor filter realization for fast fingerprint enhancement," in Proc. IEEE Int. Conf. on . Image Processing, ICIP 2005, vol. 3, pp. 253-256, 11-14 Sep. 2005.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	J. Yang, L. Liu, T. Jiang, and Y. Fan, "A modified gabor filter design method for fingerprint image enhancement," Pattern Recognition Letters, vol. 24, no. 12, pp. 1805-1817, Aug. 2003.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	K. Kale, R. Manza, V. Humbe, and P. Deshmukh, "Fingerprint image enhancement using composite method," in Proc. GSPx-2005 Pervasive Signal Processing Conf., California USA,, 24-27 Oct. 2005.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. K. Jain and F. Farrokhnia, "Unsupervised texture segmentation using gabor filters," Pattern Recognition, vol. 24, no. 12, pp. 1167-1186, Dec. 1991.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. G. Daugman, "Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters," Optical Society of America, J., A: Optics and Image Science, vol. 2, no. 7, pp. 1160-1169, Jul 1985.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	http://onin.com/fp/fphistory.html, "The history of fingerprint".</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	J. W. Wang, "Classification of fingerprint based on traced orientation flow," in Proc. IEEE Int. Symp. on Industrial Electronics, ISIE, pp. 1585-1588, 4-7 Jul. 2010.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, "FVC 2000: fingerprint verification competition," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 24, no. 3, pp. 402-412, Mar. 2002.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	D. Maio, D. Maltoni, R. Cappelli, J. Wayman, and A. Jain, "FVC2004: Third fingerprint verification competition," in Proc. of the Int. Conf. on Biometric Authentication, 5 pp., 2004.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	(11/10/2012). CASIA-FingerprintV5. Available: http://biometrics.idealtest.org/</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, "FVC2002: Second fingerprint verification competition," in Proc. of 16th Int. Conf. on Pattern Recognition, vol. 3, pp. 811-814, 2002.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Topology Control in Wireless Sensor Networks Using Two-Level Fuzzy Logic</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Abdi Seyedkolaei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Zakerolhosseini</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2015</year></publication_date><pages><first_page>152</first_page><last_page>157</last_page></pages><doi_data><doi>10.66224/ijece.28105.12.4.152</doi><resource>http://ijece.org/en/Article/28105</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28105</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28105</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28105</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28105</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28105</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28105</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28105</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. K. Singh, N. Purohit, K. P. Singh, and M. Shukla, "A novel approach for lifetime analysis of sensor network using fuzzy logic," in Proc. of India Conf., INDICON, 6 pp., Dec. 2011.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy - efficient communication protocol for wireless microsensor networks," in Proc. of 33rd Hawaii Int. Conf. on System Sciences, HICSS'00, vol. 2, pp. 3005-3014, 4-7 Jan. 2000.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Y. M. Tashtoush and M. A. Okour, "Fuzzy self-clustering for wireless sensor networks," in Proc. IEEE/IFIP Int. Conf. on Embedded and Ubiquitous Computing, vol. 1, pp. 223-229, 17-20 Dec. 2008.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Zhang, Y. Lin, C. Zhou, and J. Ouyang, "Optimal model for energy - efficient clustering in wireless sensor networks using global simulated annealing genetic algorithm," in Proc. Symp. on Intelligent Information Technology Application Workshops, pp. 656-660, 21-22 Dec. 2008.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Taimourei Yenesary and E. Saeedian, "CORDF: cluster heads optimum choice and route discovery in multi-hop connection by using fuzzy logic in wireless sensor networks," American J. of Scientific Research, vol. 64, no. 1, pp. 84-90, Jun. 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. Faheem, S. Boudjit, and K. Chen, "Dynamic sink location update scope control mechanism for mobile sink wireless sensor network," in Proc. Int. Conf. on Wireless on Demand Network Systems and Services, pp. 171-178, 26-28 Jan. 2011.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks," IEEE Trans. on Wireless Communications, vol. 1, no. 4, pp. 660-670, Oct. 2002.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	H. Ando, L. Barolli, A. Durresi, F. Xhafa, and A. Koyama, "An intelligent fuzzy - based cluster head selection system for WSNs and its performance evaluation for D3N parameter," in Proc. 2010 Int. Conf. on Broadband, Wireless Computing, Communication and Applications, pp. 648-653, 4-6 Nov.. 2010.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	K. N. Veena and B. P. Vijaya Kumar, "Dynamic clustering for wireless sensor networks: a neuro - fuzzy technique approach," in Proc. IEEE Int. Conf. Computational Intelligence and Computing Research, ICCIC'10, 6 pp., 28-29 Dec. 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	K. Soharabi and J. Pottie, "Protocols for self-organization of a wireless sensor network," IEEE J. on Personal Commun., vol. 7, 
no. 5, pp. 16-27, Oct. 2000.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	F. Ye, A. Chen, S. Liu, and L. Zhang, "A scalable solution to minimum cost forwarding in large sensor networks," in Proc. 10th Int. Conf. Computer Commun. Networks, ICCCN'01, pp. 304-309, 15-17 Oct. 2001.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Lindsey and C. Raghavendra, "PEGASIS: power efficient gathering in sensor information systems," in Proc. IEEE. Aerospace Conference Conf., vol. 3, pp. 1125-1130, 2002.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	N. Abazari Torghabeh, M. R. Akbarzadeh, and M. H. Yaghmaee, "Mobile base station management using fuzzy logic in wireless sensor networks," in Proc. 2nd Int. Conf. on Computer Engineering and Technology, vol. 2, pp. 352-356, 16-18 Apr. 2010.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Alkesh, A. Kumar Singh, and N. Purohit, "A moving base station strategy using fuzzy logic for lifetime enhancement in wireless sensor network," in the Proc. of IEEE Int. Conf. on Communication Systems and Network Technologies, pp. 198-202, 3-5 Jun. 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Vijayalakshmi, K. Arthi, and P. Vanaja Ranjan, "Network lifetime enhancement in wireless sensor networks using fuzzy logic based clustering algorithm," International J. of Soft Computing, 
vol. 8, no. 5, pp. 321-326, 2013.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. K. Singh and N. Purohit, "An optimised fuzzy clustering for wireless sensor networks," International J. of Electronics, vol. 101, no. 8, pp. 1027-1041, 4 Jul. 2013.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Gharghi, E. Parvinnia, and R. Khayami, "Designing a fuzzy rule base system to head cluster election in wireless sensor networks," Indian J. of Science and Technology, vol. 6, no. 5, pp. 4410-4415, May 2013.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>PLAER: Penalty Base Learning Automata for Energy Aware Routing in WSN</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Parvizi Omran</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Moeni</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Haj Seyyed Javadi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2015</year></publication_date><pages><first_page>158</first_page><last_page>163</last_page></pages><doi_data><doi>10.66224/ijece.28106.12.4.158</doi><resource>http://ijece.org/en/Article/28106</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28106</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28106</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28106</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28106</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28106</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28106</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28106</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor network survey," Computer Networks, vol. 52, no. 12, pp. 2292-2330, Apr. 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	G. Anastasi, M. Conti, M. Di Francesco, and A. Passarella, "Energy conservation in wireless sensor networks: a survey," Ad Hoc Networks, vol. 7, no. 3, pp. 537-568, May 2009.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	K. S. Narendra and M. A. L. Thathachar, "Learning automata - a survey," Systems, Man and Cybernetics, IEEE Trans. on, vol. 4, no. 4, pp. 323-334, Jul. 1974.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Ankit, M. Arpit, T. J Deepak, R. Venkateswarlu, and D. Janakiram, "TinyLap: a scalable learning automata-based energy aware routing protocol for sensor networks," Communicated to IEEE Wireless and Communications and Networking Conf., Las Vegas, NV, USA. 2006.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. M. Abolhasani, M. R. Meybodi, and M. Esnaashari, "LABER: a learning automata based energy - aware routing protocol for sensor networks," in Proc. of the Third Information and Knowledge Technology, IKT'07, 9 pp., Mashad, Iran, 27-29 Nov. 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. H. Fathy Navid and H. Haj Seyed Javadi, "ICLEAR: energy aware routing protocol for WSN using irregular cellular learning automata," in Proc. IEEE Symp. on Industrial Electronics and Applications, ISIEA'09, vol. 1, pp. 463-468, 4-6 Oct. 2009.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	E. Ahvar and M. Fathy, "BEAR: a balanced energy - aware routing protocol for wireless sensor networks," Wireless Sensor Network, vol. 2, no. 10, pp. 793-800, 2010.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. A. Torkestani, "Backbone formation in wireless sensor networks," Sensors and Actuators A: Physical, vol. 185, pp. 117-126, Oct. 2012.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. A. L. Thathachar and P. S. Sastry, "Varieties of learning automata: an overview," Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Trans. on, vol. 32, no. 6, pp. 711-722, 2002.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Varga, "The OMNeT++ discrete event simulation system," in Proc. of the European Simulation Multiconference, ESM'01, 
pp. 319-324, Prague, Czech Republic, Jun. 2001.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	L. F. W. van Hoesel and P. Havinga, "A lightweight medium access protocol (LMAC) for wireless sensor networks: reducing preamble transmissions and transceiver state switches," 2004.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>