﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051922</doi_batch_id><timestamp>20260519223111</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>12</month><day>21</day><year>2016</year></publication_date><journal_volume><volume>14</volume></journal_volume><issue>3</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Example-Based single Document Image Super Resolution Using Asynchronous Sequential Gradient Descent Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Abedi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>E.</given_name><surname>Kabir</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2016</year></publication_date><pages><first_page>177</first_page><last_page>192</last_page></pages><doi_data><doi>10.66224/ijece.28197.14.3.177</doi><resource>http://ijece.org/en/Article/28197</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28197</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28197</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28197</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28197</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28197</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28197</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28197</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Abedi and E. Kabir, "Stroke width-based directional total variation regularisation for document image super resolution," IET Image Processing, vol. 10, no. 2, pp. 158-166, Feb. 2016.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	P. Milanfar, Super-Resolution Imaging, vol. 1, CRC Press, 2010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	K. Donaldson and G. Myers, "Bayesian super-resolution of text in video with a text-specific bimodal prior," Int. J. Document Anal. Recognit., vol. 7, no. 2, pp. 159-167, Jul. 2005.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	C. M. Thillou and M. Mirmehdi, "An introduction to super-resolution text," Digital Document Processing, Advances in Pattern Recognition, vol. 16, no. 17, pp. 305-327, Sep. 2007.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	D. Datsenko and M. Elad, "Example-based single document image super-resolution: a global MAP approach with outlier rejection," Multidim Syst Sign Process, vol. 18, no. 2, pp. 103-121, Sep. 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Elad and D. Datsenko, "Example-based regularization deployed to super-resolution reconstruction of a single image," The Computer J., vol. 52, no. 1, pp. 15-30, Oct. 2009.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Park, Y. Kwon, and J. H. Kim, "An example-based prior model for text image super-resolution," in Proc. 8th Int. Conf. on Document Analysis and Recognition, vol. 1, pp. 374-378, Sep. 2005.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Zeyde, M. Elad, and M. Protter, "On single image scale-up using sparse-representations," Curves and Surfaces Lecture Notes in Computer Science, vol. 6920, pp. 711-730, Jan. 2012.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. Walha, F. Driram, F. Lebourgeois, and A. M. Alimi, "Super-resolution of single text image by sparse representation," in Proc. of the Workshop on Document Analysis and Recognition DAR'12, 
pp. 22-29, Aug. 2012.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	G. Caner and I. Haritaoglu, "ShapeDNA: effective character restoration and enhancement for arabic text documents," in Proc. 20th Int. Conf. on Pattern Recognition, ICPR'10, pp. 2053-2056, Jul. 2010.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Baker and T. Kanade, "Limits on super-resolution and how to break them," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 24, no. 9, pp. 1167-1183, Nov. 2002.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	W. T. Freeman, E. C. Pasztor, and O. T. Carmichael, "Learning low-level vision," International J. of Computer Vision, vol. 40, no. 1, 
pp. 25-47, Oct. 2000.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	P. Thouin and C. Chang, "A method for restoration of low-resolution document images," Int. J. Document Anal. Recognit., vol. 2, no. 4, pp. 200-210, Jun. 2000.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	H. Q. Luong and W. Philips, "Robust reconstruction of low-resolution document images by exploiting repetitive character behaviour," International J. on Document Analysis and Recognition, vol. 11, no. 1, pp. 39-51, Oct. 2008.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Banerjee and C. V. Jawahar, "Super-resolution of text images using edge-directed tangent field," in Proc. 8th IAPR Int. Workshop on Document Analysis Systems, DAS'08, pp. 76-83, Nov. 2008.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. Kheradmand and P. Milanfar, "A general framework for regularized, similarity-based image restoration," IEEE Trans. on Image Processing, vol. 23, no. 12, pp. 5136-5151, Dec. 2014.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. H. Friedman, J. L. Bentley, and R. A. Finkel, "An algorithm for finding best matches in logarithmic expected time," ACM Trans. on Mathematical Software, vol. 3, no. 3, pp. 209-226, Feb. 1977.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. V. W. Zibetti, F. S. V. Bazan, and J. Mayer, "Determining the regularization parameters for super-resolution problems," Signal Processing, vol. 88, no. 12, pp. 2890-2901, Dec. 2008.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Panagiotopoulou and V. Anastassopoulos, "Super-resolution image reconstruction techniques: trade-offs between the data-fidelity and regularization terms," Information Fusion, vol. 13, no. 3, pp. 185-195, Jul. 2012.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Agarwal and J. C. Duchi, Distributed Delayed Stochastic Optimization, arXiv: 1104.5525, 2011.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	H. Lu, A. Kot, and Y. Shi, "Distance-reciprocal distortion measure for binary document images," IEEE Signal Processing Letters, 
vol. 11, no. 2, pp. 228-231, Feb. 2004.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. M. Pincus, I. M. Gladstone, and R. A. Ehrenkranz, "A regularity statistic for medical data analysis," J. of Clinical Monitoring and Computing, vol. 7, no. 4, pp. 335-345, Feb. 1991.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	G. Louloudis, B. Gatos, I. Pratikakis, and C. Halatsis, "Text line detection in handwritten documents," Pattern Recognition, vol. 41, no. 12, pp. 3758-3772, Dec. 2008.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	L. Zheng, S. Wang, and Y. Liu, "Information theoretic regularization for semi-supervised boosting," in  Proc. of the 15th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, KDD'09, pp. 1017-1026, Aug. 2009.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	L. M. Lorigo and V. Govindaraju, "Offline Arabic handwriting recognition: a survey," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 28, no. 5, pp. 712-724, Mar. 2006.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Evaluation of Performance, Reliability and Security for Share-Data, Object-Oriented and Pipe and Filter Styles</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Banki</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Banki</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2016</year></publication_date><pages><first_page>193</first_page><last_page>207</last_page></pages><doi_data><doi>10.66224/ijece.28198.14.3.193</doi><resource>http://ijece.org/en/Article/28198</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28198</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28198</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28198</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28198</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28198</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28198</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28198</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	L. Bass, P. Clements, and R. Kazman, Software Architecture in Practice, Addison-Wesely, 2nd Edition, 2003.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	K. Fukuzawa and M. Saeki, "Evaluating software architectures by coloured petri nets," in Proc. 14th Int. Conf. on Software Engineering and Knowledge Engineering, pp. 263-270, Ischia, Italy, 15-19 Jul.2002.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	B. Roy and T. C. N. Graham, Methods for Evaluating Software Architecture: A Survey, School of Computing, TR 545, p. 82, 2008.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Bosch and P. Molin, "Software architecture design: evaluation and transformation," in Proc. IEEE Conf. and Workshop on Engineering of Computer-Based Systems, pp. 4-10, Mar. 1999.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	V. S. Sharma and K. S. Trivedi, "Quantifying software performance, reliability and security: an architecture-based approach," J. of Systems and Software, vol. 80, no. 4, pp. 493-509, Apr. 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. S. Gokhale and K. S. Trivedi, "Reliability prediction and sensitivity analysis based on software architecture," Proc. 13th Int. Symp. on Software Reliability Engineering, pp. 64-75, 2002.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Roshandel, N. Medvidovic, and L. Golubchik, "A Bayesian model for predicting reliability of software systems at the architectural level," in Proc. Quality of Software Architectures 3rd int. Conf. on Software Architectures, Components, and Applications, pp. 108-126, Medford, MA, USA, 11-13 Jul. 2007.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. S. Gokhale, et al., "An analytical approach to architecture-based software performance and reliability prediction," Performance Evaluation, vol. 58, no. 4, pp. 391-412, Dec. 2004.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	V. S. Sharma and K. S. Trivedi, "Quantifying software performance, reliability and security: an architecture-based approach," J. of Systems and Software, vol. 80, no. 4, pp. 493-509, Apr. 2007.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	N. Yang, H. Yu, H. Sun, and Z. Qian, "Quantifying software security based on stochastic petri-nets," J. of Computational Information Systems, vol. 6, no. 9, pp. 3049-3056, Sep. 2010.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Tahmasebipour and S. M. Babamir, "Ranking of common architectural styles based on availability, security and performance quality attributes," J. of Computing and Security, vol. 1, no. 2, 
pp. 83-93, 2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	W. L. Wang, D. Pan, and M. H. Chen, "Architecture-based software reliability modeling," J. of Systems and Software, vol. 79, no. 1, pp. 132-146, Jan. 2006.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. Koziolek, B. Schlich, and C. Bilich, "A large-scale industrial case study on architecture-based software reliability analysis," in Proc. 21st IEEE Int. Symp. on Software Reliability Engineering, pp. 279-288, Nov. 2010.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. M. Sharafi, G. A. Ghazvini, and S. Emadi, "An analytical model for performance evaluation of software architectural styles," in Proc. 2nd Int. Conf. on Software Technology and Engineering, pp. 394-398, 2010.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. L. Yin, C. L. Hyde, and L. E. James, "A petri-net approach 
for early-stage system-level software reliability estimation," in Proc. Int. Symp. on Product Quality and Integrity., pp. 100-105, 24-27 Jan. 2000.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	W. L. Wang and M. H. Chen, "Heterogeneous software reliability modeling," in Proc. 13th Int. Symp. on Software Reliability Engineering, pp. 41-52, 12-15 Nov. 2002.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. Pressman, Software Engineering: A Practioner's Approach, McGraw-Hill, 8th Edition, 2014.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	ISO, ISO/IEC 9126: Information Technology-Software Product Evaluation-Quality Characteristics and the Guidelines for Their Use, 1991.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	P. Clements and R. Nord, Documenting Software Architectures: Views and Beyond, Addison-Wesley, 2010.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	K. Jensen and L. M. Kristensen, Coloured Petri Nets: Modelling and Validation of Concurrent Systems, Springer, 2009.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	E. Triantaphyllou, B. Kovalerchuk, L. Mann, and G. M. Knapp, "Determining the most important criteria in maintenance decision making," J. of Quality in Maintenance Engineering, vol. 3, no. 1, pp. 16-28, Mar. 1997.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	T. L. Saaty, "How to make a decision: the analytic hierarchy process," European J. of Operational Research, vol. 48, no. 1, pp. 9-26, Sep. 1990.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	www.expertchoice.com.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. S. Gokhale, "Architecture-based software reliability analysis: overview and limitations," IEEE Trans. on Dependable and Secure Computing, vol. 4, no. 1, pp. 32-40, Jan. 2007.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	www.cpntools.org.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	N. Yang, H. Yu, Z. Qian, and H. Sun, "Modeling and quantitatively predicting software security based on stochastic petri-nets," Mathematical and Computer Modelling, vol. 55, no. 1, pp. 102-112, Jan. 2012.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	N. Yang, H. Yu, H. Sun, and Z. Qian, "Modeling UML sequence diagrams using extended petri nets," in Proc. Int. Conf. on Information Science and Applications, 8 pp., 21-23 Apr. 2010.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	S. Yu and S. Zhou, "A survey on metric of software complexity," in Proc. 2nd IEEE Int. Conf. on Information Management and Engineering, pp. 352-356, 16-18 Apr. 2010.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	J. Bosch, "Design and use of industrial software architectures," in Proc. Conf. on Technology of Object-Oriented Languages and Systems, pp. 404-404, Jun. 1999.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	H. Zhu, Software Design Methodology: From Principles to Architectural Styles, Butterworth-Heinemann, 2005.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Novel Extended Mapping of Local Binary Pattern for Texture Classification</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M. H.</given_name><surname>Shakoor</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. H.</given_name><surname>Shakoor</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2016</year></publication_date><pages><first_page>208</first_page><last_page>216</last_page></pages><doi_data><doi>10.66224/ijece.28199.14.3.208</doi><resource>http://ijece.org/en/Article/28199</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28199</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28199</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28199</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28199</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28199</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28199</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28199</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Petrou and P. G. Sevilla, Image Processing Dealing with Texture, 2006.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Tuceryan and A. K. Jain, Handbook of Pattern Recognition and Computer Vision, ch.2, pp. 207-248, World Scientific Publishing, 1998.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. M. Haralick, K. Shanmugam, and I. Dinestein, "Textural features for image classification," IEEE Trans. on Systems, Man, and Cybernetic, vol. 3, no. 6, pp. 610-621, Nov. 1973.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. Popescu, R. Dobrescu, and M. Nicolae, "Texture classification and defect detection by statistical features," International J. of Circuit, System, and Signal processing, vol. 1, no. 1, pp. 79-85, 2007.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Hegenbarta and A. Uhla, "A scale - and orientation - adaptive extension of local binary patterns for texture classification," Pattern Recognition, vol. 48, no. 8, pp. 2633-2644, Aug. 2015.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R. Davarzani, S. Mozaffari, and K. Yaghmaie, "Scale and rotation - invariant texture description with improved local binary pattern features," Signal Processing, vol. 111, pp. 274-293, Jun. 2015.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Z. Li, G. Liu, Y. Yang, and J. You, "Scale-and rotation-invariant local binary pattern using scale-adaptive texton and subuniform-based circular shift," IEEE Trans. on Image Processing, vol. 12, no. 4, pp. 2130-2140, Apr. 2012.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Pakdel and F. Tajeripour, "Texture classification using optimal Gabor filters," in Proc. First Int. Conf. on Computer and Knowledge Engineering, ICCKE'11, pp. 208-213, 13-14 Oct. 2011.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	X. Chen, X. Zeng, and D. van Alphen, "Multi-class feature selection for texture classification," Pattern Recognition Letters, vol. 27, 
no. 14, pp. 1685-1691, 15 Oct. 2006.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Pietikainen, T. Ojala, and Z. Xu, "Rotation-invariant texture classification using feature distributions," Pattern Recognition, 
vol. 33, no. 1, pp. 43-52, Jan. 2000.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	T. Ojala, M. Pietikainen, and T. Maenpaa, "Multiresolution gray-scale and rotation invariant texture classification with local binary patterns," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 24, no. 7, pp. 971-987, Jul. 2002.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Arivazhagan and L. Ganesan, "Texture classification using wavelet transform," Pattern Recognition Letters, vol. 24, no. 1-2, pp. 1513-1521, Jun. 2003.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	P. S. Hiremath and S. Shivashankar, "Texture classification using wavelet packet decomposition," Journal on Graphics, Vision and Image Processing., vol. 6, no. 2, pp. 77-80, Sep. 2006.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	B. V. Ramana Reddy, M. Radhika Mani, and K. V. Subbaivah, "Texture classification method using wavelet transform based on gaussian markov random field," International J. of Signal and Image processing, vol. 1, no. 1, pp. 35-39, Jan. 2010.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	V. Vijaya Kumar, U. S. N. Raju, M. Radhika Mani, and A. L. Narasimha Rao, "Wavelet based texture segmentation methods based on combinatorial of morphological and statistical operations," International J. of Computer Science and Network Security, vol. 8, no. 8, pp. 176-181, Aug. 2008.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. S. Weszka, C. R. Dyer, and A. Rosenfeld, "A comparative study of texture measures for terrain classification," IEEE Trans. on System, Man, and Cybernetic, vol. 6, no. 4, pp. 267-285, May 1976.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	T. Randen and J. H. Husoy, "Filtering for texture classification: a comparative study," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 21, no. 4, pp. 291-310, Apr. 1996.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	T. Maenpaa, M. Pietikainen, and T. Ojala, "Texture classification by multi-predicate local binary pattern operators," in Proc. 15th Int. Conf. on Pattern Recognition, pp. 939-942, 3-7 Sep. 2000.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Varma and A. Zisserman, "A statistical approach to texture classification from single images," International J. of Computer Vision, vol. 62, no. 1, pp. 61-81, Apr. 2005.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Varma and A. Zisserman, "Texture classification: are filter banks necessary?" in Proc. Int. Conf. on Computer Vision and Pattern Recognition, pp. 691-698, 18-20 Jun. 2003.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Varma and A. Zisserrman, "A statistical approach to material classification using image patch examplars," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 31, no. 11, pp. 2032-2047, Nov. 2009.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	F. Tajeripour, E. Kabir, and A. Sheikhi, "Fabric defect detection using modified local binary patterns," EURASIP J. on Advances in Signal Processing, vol. 2008, 12 pp., Jan. 2008.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. Soltaninejad, M. H. Shakoor, and F. Tajeripour, "Lung nodule segmentation based on modified local binary pattern," International J. of Scientific &amp; Engineering Research, vol. 5, no. 12, pp. 575-586, Dec. 2014.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	F. Bianconi and A. Fernandez, "On the occurrence probability of local binary patterns: a theoretical study," J. of Mathematical Imaging and Vision Manuscript, vol. 40, no. 3, pp. 259-268, Jul. 2011.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. Liao, M. W. K. Law, and A. C. S. Chung, "Dominant local binary patterns for texture classification," IEEE Trans. on Image Processing, vol. 18, no. 5, pp. 1107-1118, Mar. 2009.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Z. Guo, L. Zhang, and D. Zhang, "A completed modeling of local binary pattern operator for texture classification," IEEE Trans. Image Process, vol. 9, no. 16, pp. 1657-1663, Jun. 2010.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Z. Guo, L. Zhang, and D. Zhang, "Rotation invariant texture classification using LBP Variance (LBPV) with global matching," Pattern Recognition J., vol. 43, no. 3, pp. 706-719, Mar. 2010.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Y. Zhao, D. S. Huang, and W. Jia, "Completed local binary count for rotation invariant texture classification," IEEE Trans. on Image Processing, vol. 21, no. 10, pp. 4492-4497, Oct. 2012.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	X. Tan and B. Triggs, "Enhanced local texture feature sets for 
face recognition under difficult lighting conditions," IEEE Trans. on Image Processing, vol. 19, no. 6, pp. 168-182, Jun. 2010.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	T. Ojala, et al., "Outex-a new framework for empirical evaluation of texture analysis algorithms," in Proc. of 16 Int. Conf. of Pattern Recognition, vol. 1, pp. 701-706, 11-15 Aug. 2002.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>  Weighted Multi-Level Fuzzy Min-Max Neural Network</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>R.</given_name><surname>Davtalab</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. A.</given_name><surname>Balafar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. R.</given_name><surname>Feizi-Derakhshi</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2016</year></publication_date><pages><first_page>217</first_page><last_page>228</last_page></pages><doi_data><doi>10.66224/ijece.28200.14.3.217</doi><resource>http://ijece.org/en/Article/28200</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28200</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28200</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28200</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28200</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28200</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28200</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28200</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	L. A. Zadeh, "Fuzzy Sets," Inform. and Control, vol. 8, pp. 189-200, 1965.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. C. Bezdek, S. K. Pal, and IEEE Neural Networks Council., Fuzzy models for pattern recognition: methods that search for structures in data, New York: Institute of Electrical and Electronics Engineers, 1992.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. Vieira, F. M. Dias, and A. Mota, Neuro-Fuzzy Systems: A Survey, 2004.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Mitra and Y. Hayashi, "Neuro-fuzzy rule generation: survey in soft computing framework," Neural Networks, IEEE Trans. on, 
vol. 11, no. 3, pp. 748-768, May 2000.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	D. Nauck and R. Kruse, What Are Neuro-Fuzzy Classifiers?, 1997.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Bargiela, W. Pedrycz, and M. Tanaka, "An inclusion/exclusion fuzzy hyperbox classifier," International J. of Knowledge Based Intelligent Engineering Systems, vol. 8, no. 2, pp. 91-98, Aug. 2004.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	B. Gabrys and A. Bargiela, "General fuzzy min-max neural network for clustering and classification," IEEE Trans. on Neural Networks, vol. 11, no. 3, pp. 769-783, May 2000.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. V. Nandedkar and P. K. Biswas, "A fuzzy min-max neural network classifier with compensatory neuron architecture," IEEE Trans. on Neural Networks, vol. 18, no. 1, pp. 42-54, Jan. 2007.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	P. K. Simpson, "Fuzzy min-max neural networks I: classification," IEEE Trans. on Neural Networks, vol. 3, no. 5, pp. 776-786, Sep. 1992.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Joshi, N. Ramakrishman, E. N. Houstis, and J. R. Rice, "On neurobiological, neuro-fuzzy, machine learning, and statistical pattern recognition techniques," IEEE Trans. on Neural Networks, vol. 8, no. 1, pp. 18-31, Jan. 1997.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	P. K. Simpson, "Fuzzy min-max neural networks, part 2, clustering," IEEE Trans. on Fuzzy Systems, vol. 1, no. 1, pp. 32-45, Feb. 1993.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. V. Nandedkar and P. K. Biswas, "A reflex fuzzy min max neural network for semi-supervised learning," J. of Intelligent Systems, 
vol. 17, no. 1, pp. 5-18, Aug. 2008.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. V. Nandedkar and P. K. Biswas, "A granular reflex fuzzy min-max neural network for classification," IEEE Trans. on Neural Networks, vol. 20, no. 7, pp. 1117-1134, Jul. 2009.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	H. Zhang, J. Liu, D. Ma, and Z. Wang, "Data-core-based fuzzy min-max neural network for pattern classification," IEEE Trans. on Neural Networks, vol. 22, no. 12, pp. 2339-2352, Nov. 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	R. Davtalab, M. H. Dezfoulian, and M. Mansoorizadeh, "Multi-level fuzzy min-max neural network classifier," IEEE Trans. Neural Netw Learn Syst, vol. 25, no. 3, pp. 470-482, Mar. 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Q. Hua, "A new union-set learning algorithm in fuzzy min-max neural networks," Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence, vol. 14, no. 4, p. 413, 2001.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	B. Gabrys, "Agglomerative learning algorithms for general fuzzy min-max neural network," J. of VLSI Signal Processing Systems for Signal, Image, and Video Technology, vol. 32, no. 1, pp. 67-82, Aug. 2002.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. V. Nandedkar and P. K. Biswas, "A general fuzzy min max neural network with compensatory neuron architecture," in Proc. Int. Conf. on Knowledge-Based and Intelligent Information and Engineering Systems, pp. 1160-1167, 2005.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	P. F. Peng, L. J. Yang, and Q. G. Zhang, "Improvement and application based on general fuzzy min-max neural network," Wuhan Ligong Daxue Xuebao/J. of Wuhan University of Technology, vol. 26, no. 10, p. 87, Oct. 2004.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	P. F. Peng, L. J. Yang, and Q. G. Zhang, "Unsupervised general fuzzy min-max artificial neural network," Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, vol. 26, no. 10, pp. 1503-1505+1536, Oct. 2004.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	G. Tang, Y. Dai, and G. Liu, "Radar range profile classification based on fuzzy min-max neural networks," Binggong Xuebao/Acta Armamentarii, vol. 25, no. 2, pp. 218-221, Feb. 2004.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	H. J. Kim and H. S. Yang, "A weighted fuzzy min-max neural network and its application to feature analysis," in Proc. of the First Int. Conf. on Advances in Natural Computation, vol. 3, pp. 1178-1181, Changsha, China  27-29 Aug. 2005.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	C. C. Chen, "Design of a fuzzy min-max hyperbox classifier using a supervised learning method," Cybernetics and Systems, vol. 37, pp. 329-346, 2006.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. Hu, J. Yang, and J. Gao, "Ordination-fuzzy min-max neural network classifier on unlabelled pattern classification," Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence, vol. 20, no. 2, pp. 173-179, Feb. 2007.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. Yang, J. Gao, X. H. Xu, and X. Liu, "Hierarchical fuzzy min-max clustering algorithm," Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence, vol. 20, no. 4, pp. 558-564, Apr. 2007.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	A. Quteishat and C. P. Lim, "A modified fuzzy min-max neural network with rule extraction and its application to fault detection and classification," Applied Soft Computing J., vol. 8, no. 2, pp. 985-995, Mar. 2008.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	R. Zemouri, D. Racoceanu, N. Zerhouni, E. Minca, and F. Filip, "Training the recurrent neural network by the fuzzy min-max algorithm for fault prediction," in Proc. 2nd Mediterranean Conference on Intelligent Systems and Automation. CISA'09, pp. 85-90, Zarzis, Tunisia, 23-25 Mar. 2009.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	X. Ge and E. J. Ding, "Research on parameters of fuzzy min-max neural networks," Kongzhi yu Juece/Control and Decision, vol. 25, no. 8, pp. 295-298, Aug. 2010.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	A. Quteishat, C. P. Lim, and K. S. Tan, "A modified fuzzy min-max neural network with a genetic-algorithm-based rule extractor for pattern classification," IEEE Trans. on Systems, Man, and Cybernetics Part A: Systems and Humans, vol. 40, no. 3, pp. 641-650, May 2010.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	P. Rey-del-Castillo and J. Cardenosa, "Fuzzy min-max neural networks for categorical data: application to missing data imputation," Neural Computing and Applications, vol. 21, no. 6, pp. 1349-1362, Sep. 2012.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	R. Davtalab, M. Parchami, M. H. Dezfoulian, M. Mansourizade, 
and B. Akhtar, "M-FMCN: modified fuzzy min-max classifier using compensatory neurons," in the Proc. of the 11th WSEAS International Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases, Cambridge, UK, pp. 77-82, Feb. 2012.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	C. Blake, E. Keogh, and C. Merz, UCI Repository of Machine Learning Databases, Irvine: Department of Information and Computer Science, University of California, 1998.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Integration of Systems in Ultra-Large-Scale Systems Using a Data-Centric Rich Services Approach</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Shokrollahi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>F.</given_name><surname>Shams</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>J.</given_name><surname>Esmaeili</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2016</year></publication_date><pages><first_page>229</first_page><last_page>238</last_page></pages><doi_data><doi>10.66224/ijece.28201.14.3.229</doi><resource>http://ijece.org/en/Article/28201</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28201</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28201</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28201</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28201</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28201</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28201</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28201</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	L. Northrop, et al., Ultra-Large-Scale Systems: The Software Challenge of the Future, Carnegie Mellon Software Engineering Institute, Ultra-Large-Scale Systems Study Report, 2006.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. Herold, H. Klus, D. Niebuhr, and A. Rausch, "Engineering of it ecosystems: design of ultra-large-scale software-intensive systems," in Proc. of the 2nd Int. Workshop on Ultra-Large-Scale Software-Intensive Systems, ACM, pp. 49-52, May 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	K. Sullivan, W. Knaus, and R. Marks, "An ultra-large-scale systems approach to national-scale health information systems," in Proc. of the FSE/SDP Workshop on Future of Software Engineering Research, ACM, pp. 365-368, Nov. 2010.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	C. Farcas, E. Farcas, and I. Kruger, "Requirements for service composition in ultra-large scale software-intensive systems," Foundations of Computer Software, Future Trends and Techniques for Development, Springer Berlin Heidelberg, pp. 93-115, 2010.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	B. Demchak, V. Ermagan, E. Farcas, T. Huang, I. H. Kruger, and 
M. Menarini, "A rich services approach to cocome," The Common Component Modeling Example, pp. 85-115, Springer Berlin Heidelberg, 2008.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Arrott, et al., "Rich services: the integration piece of the SOA puzzle," in Proc. IEEE Int. Conf. on Web Services, ICWS, pp. 176-183, Jul. 2007.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	B. Demchak, et al., "Rich services: addressing challenges of ultra-large-scale software-intensive systems," in Proc. of the 2nd Int Workshop on Ultra-Large-Scale Software-Intensive Systems, pp. 29-32, May 2008.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Arrott, et al., "Integrating marine observatories into a system-of-systems: messaging in the US ocean observatories initiative," in Proc. MTS/IEEE Biloxi - Marine Technology for Our Future: Global and Local Challenges, 10 pp., Oct. 2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Y. Zhang, L. Duan, and J. L. Chen, "Event-driven SOA for IoT services," in Proc. IEEE Int. Conf. on in Proc. Services Computing, SCC'14, pp. 629-636, Jun. 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Hachem, A. Pathak, and V. Issarny, "Service-oriented middleware for the mobile internet of things: a scalable solution," in Proc. IEEE Global Communications Conf., GLOBECOM'14, 6 pp., Dec. 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Rodriguez-Valenzuela, J. A. Holgado-Terriza, J. M. Gutierrez-Guerrero, and J. L. Muros-Cobos, "Distributed service-based approach for sensor data fusion in IoT environments," Sensors, vol. 14, no. 10, pp. 19200-19228, Oct. 2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	N. Lee, H. Lee, W. Ryu, and K. Heo, "Web of object service architecture for device orchestration and composition," in Proc. IEEE Int. Conf. on Information Science and Applications, ICISA'14, 3 pp., May 2014.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	L. Li, S. Li, and S. Zhao, "QoS-aware scheduling of services-oriented internet of things," IEEE Trans. on Industrial Informatics, vol. 10, no. 2, pp. 1497-1505, May 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Giordano and G. Spezzano, "Service-oriented middleware for the cooperation of smart objects and web services," in Internet of Things Based on Smart Objects, Springer International Publishing, pp. 49-68, 2014.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	.F. Ning, D.Junhua, and G.Yan, “A Service Composition Environment Based on Enterprise Service Bus,” in Proc. of the 11th Int. Conf. on Ubiquitous Intelligence and Computing and 11th Int. Conf on Autonomic and Trusted Computing and 14th Int. Conf on Scalable Computing and Communications and Its Associated Workshops, pp. 738-743, Dec. 2014..</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. Schauer and G. Debita, "Internet of things service systems architecture," in New Trends in Intelligent Information and Database Systems, pp. 239-248, Springer International Publishing, Mar. 2015.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	OMG, Object Management Group. Data Distribution Service for Real-Time Systems Specification, version 1.2, 2007, www.omg.org/spec/DDS/1.2/</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. M. Lopez-Vega, J. Povedano-Molina, G. Pardo-Castellote, and 
J. M. Lopez-Soler, "A content-aware bridging service for publish/subscribe environments," J. of Systems and Software, 
vol. 86, no. 1, pp. 108-124, Jan. 2013.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Hakiri, P. Berthou, A. Gokhale, D. C. Schmidt, and G. Thierry, "Supporting SIP-based end-to-end data distribution service QoS in WANs," J. of Systems and Software, Elsevier Science, vol. 95, 
pp. 100-121, Sep. 2014.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Chae, S. Ahn, K. Kang, J. Kim, S. Lee, and W. Kim, "Fast discovery scheme using DHT-like overlay network for a large-scale DDS," in Control and Automation, and Energy System Engineering, Springer Berlin Heidelberg, pp. 128-137, 2011.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. Shokrollahi, F. Shams, and J. Esmaeili, "Access control in ultra-large-scale systems using a data-centric middleware," The ISC International J. of Information Security, vol. 6, no. 1, pp. 3-22, Jul. 2014.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	J. Bacon, D. M. Eyers, J. Singh, and P. R. Pietzuch, "Access control in publish/subscribe systems," in Proc. of the 2nd Int. Conf. on Distributed Event-Based Systems, pp. 23-34, Jul. 2008.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Bacon, K. Moody, and W. Yao, "A model of OASIS role-based access control and its support for active security," ACM Trans. on Information and System Security, vol. 5, no. 4, pp. 492-540, Nov. 2002.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. Dustdar and W. Schreiner, "A survey on web services composition," International J. of Web and Grid Services, vol. 1, 
no. 1, pp. 1-30, Jan. 2005.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	B. Demchak and I. Kruger, "Policy driven development: flexible policy insertion for large scale systems," in Proc. IEEE Int. Symp. on Policies for Distributed Systems and Networks, POLICY'12, pp. 17-24, Jul. 2012.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	B. Demchak, J. Kerr, F. Raab, K. Patrick, and I. H. Kruger, "PALMS: a modern coevolution of community and computing using policy driven development," in Proc. IEEE 45th Hawaii Int. Conf. on System Science, HICSS'12, pp. 2735-2744, Jan. 2012.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Q. Wei, M. Ripeanu, and K. Beznosov, "Authorization using the publish-subscribe model," in Proc. IEEE Int. Symp. on Parallel and Distributed Processing with Applications, ISPA'08, pp. 53-62, Dec. 2008.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	T. Goovaerts, L. Desmet, and W. Joosen, "Scalable authorization middleware for service oriented architectures," in Engineering Secure Software and Systems, Springer Berlin Heidelberg, pp. 221-233, Feb. 2011.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	R. Joshi, "Data-centric invocable services: a core design pattern for building scalable distributed real-time systems," in Proc. of IEEE 15th Int. Symp. on Object/Component/Service-Oriented Real-Time Distributed Computing, IEEE Computer Society, 7 pp., Apr. 2012.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	F. Khodadadi, R. N. Calheiros, and R. Buyya, "A data-centric framework for development and deployment of internet of things applications in clouds," in Proc. IEEE 10th Int. Conf. on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP'15, 6 pp., Apr. 2015.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	L. I. Pesonen, D. M. Eyers, and J. Bacon, "Access control in decentralised publish/subscribe systems," J. of Networks, vol. 2, 
no. 2, pp. 57-67, Apr. 2007.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	RTI. RTI Connext DDS, 2014. Available: www.rti.com</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Quantum-Logic Synthesis Using Improved Block-Based Approach</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>K.</given_name><surname>Marjoei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Houshmand</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Saheb Zamani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Sedighi</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2016</year></publication_date><pages><first_page>239</first_page><last_page>248</last_page></pages><doi_data><doi>10.66224/ijece.28202.14.3.239</doi><resource>http://ijece.org/en/Article/28202</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28202</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28202</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28202</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28202</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28202</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28202</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28202</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, Cambridge University Press, 2011.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	N. S. Yanofsky and M. A. Mannucci, Quantum Computing for Computer Scientists, Cambridge University Press, 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Nakahara and T. Ohmi, Quantum Computing: From Linear Algebra to Physical Realizations, Taylor &amp; Francis, 2008.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM J. on Computing, vol. 26, no. 5, pp. 1484-1509, Oct. 1997.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	L. K. Grover, "A fast quantum mechanical algorithm for database search," in Proc. 28th Annual ACM Symposium on the Theory of Computing, pp. 212-219, Philadelphia, PA, USA, 22-24 May 1996.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Barenco, et al., "Elementary gates for quantum computation," Physical Review A, vol. 52, no. 5, pp. 3457-3467, Nov. 1995.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	G. Cybenko, "Reducing quantum computations to elementary unitary operations," Computing in Science and Engineering, vol. 3, no. 2, pp. 27-32, Mar./Apr. 2001.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	V. V. Shende, I. L. Markov, and S. S. Bullock, "Minimal universal two-qubit quantum circuits," Physical Review A, vol. 69, pp 062321-062329, Jub. 2004.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Mottonen, J. J. Vartiainen, V. Bergholm, and M. M. Salomaa, "Quantum circuits for general multiqubit gates," Physical Review Letters, vol. 93, p. 130502, Sep. 2004.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	V. Bergholm, J. J. Vartiainen, M. Mottonen, and M. M. Salomaa, "Quantum circuits with uniformly controlled one-qubit gates," Physical Review A, vol. 71, no. 5, pp. 23-30, May 2005.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	V. V. Shende, S. S. Bullock, and I. L. Markov, "Synthesis of quantum-logic circuits," IEEE Trans. on CAD, vol. 25, no. 6, pp. 1000-1010, Jun. 2006.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. M. Steane, "Error correcting codes in quantum theory," Phys. Rev. Lett., vol. 77, no. 5, pp. 793-797, Jul. 1996.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	D. Bacon, "Operator quantum error-correcting subsystems for self correcting quantum memories," Phys. Rev. A, vol. 73, no. 1, pp. 012 34001-012 4013, Jan. 2006.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	G. D. Forney, M. Grassl, S. Guha, "Convolutional and tail-biting quantum error-correcting codes," IEEE Trans. on Information Theory,  vol. 53, no. 3, pp. 865-880, Mar. 2007.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Houshmand, S. Hosseini-Khayat, and M. M. Wilde, "Minimal-memory, non-catastrophic, polynomial-depth quantum convolutional encoders," IEEE Trans. on Information Theory, vol. 59, no. 2, 
pp. 1198-1210, Feb. 2013.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	V. Kliuchnikov, D. Maslov, and M. Mosca, "Fast and effcient exact synthesis of single qubit unitaries generated by clifford and T gates," Quantum Information and Computation, vol. 13, no. 7-8, pp. 607-630, Jul. 2013.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	B. Giles and P. Selinger, "Exact synthesis of multiqubit clifford+T circuits," Physical Review A, vol. 87, no. 3, p. 032332, Mar. 2013.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	C. Lin and A. Chakrabarti, "FTQLS: fault-tolerant quantum logic synthesis," IEEE Trans. on VLSI Systems, vol. 22, no. 6, pp. 1350-1363, Jun. 2014.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Saeedi, M. Arabzadeh, M. Saheb Zamani, and M. Sedighi, "Block-based quantum-logic synthesis," Quantum Information and Computation J., vol. 11, no. 3, pp. 262-277, Mar. 2011.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	R. Wille, M. Saeedi, and R. Drechsler, "Synthesis of reversible functions beyond gate count and quantum cost," in Proc. 18th Int. Workshop on Logic and Synthesis, pp. 43-49, Aug. 2009.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Mohammadi and M. Eshghi, "On figures of merit in reversible and quantum logic designs," Quantum Information Processing, 
vol. 8, no. 4, pp. 297-318, Aug. 2009.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. Saeedi and I. L. Markov, "Synthesis and optimization of reversible circuits-a survey," ACM Computing Surveys (CSUR), 
vol. 45, no. 2, 34 pp., 2013.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	E. P. Chong and S. H. Zak, An Introduction to Optimization, 4th Ed. Wiley, 2013.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	V. V. Shende, I. L. Markov, and S. S. Bullock, "Smaller two-qubit circuits for quantum communication and computation," Design Automation and Test in Europe, pp. 980-985, Feb. 2004.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Hybrid Access Control Model for CIM-Based SCADA System</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>P.</given_name><surname>Mahmoudi Nasr </surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Yazdian Varjani</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2016</year></publication_date><pages><first_page>249</first_page><last_page>258</last_page></pages><doi_data><doi>10.66224/ijece.28203.14.3.249</doi><resource>http://ijece.org/en/Article/28203</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28203</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28203</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28203</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28203</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28203</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28203</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28203</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. Alcaraz, J. Lopez, and S. Wolthusen, "Policy enforcement system for secure interoperable control in distributed smart grid systems," J. of Network and Computer Applications, vol. 59, pp. 301-314, Jan. 2016.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	P. M. Nasr and A. Y. Varjani, "Alarm based anomaly detection of insider attacks in SCADA system," in Proc. Smart Grid Conf. SGC'14, 6 pp., 9-10 Dec. 2014.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	C. W. Ten, C. C. Liu, and G. Manimaran, "Vulnerability assessment of cybersecurity for SCADA systems," IEEE Trans. on Power Systems, vol. 23, no. 4, pp. 1836-1846, Nov. 2008.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, "SCADA security in the light of cyber-warfare," Computers &amp; Security, vol. 31, no. 4, pp. 418-436, Jun. 2012.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	N. Baracaldo and J. Joshi, "An adaptive risk management and access control framework to mitigate insider threats," Computers &amp; Security, vol. 39, pt. B, pp. 237-254, Nov. 2013.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Kim, D. K. Kim, L. Lu, S. Kim, and S. Park, "A feature-based approach for modeling role-based access control systems," J. of Systems and Software, vol. 84, no. 12, pp. 2035-2052, Dec. 2011.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	IEC 62351-8, Power Systems Management and Associated Information Exchange: Data and Communications Security, International Standard, 2011.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. Rosic, U. Novak, and S. Vukmirovic, "Role-based access control model supporting regional division in smart grid system," in Proc. Fifth Int. Conf. on Computational Intelligence, Communication Systems and Networks, CICSyN'13, pp. 197-201, 5-7 Jun. 2013.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Cheung, A. Hamlyn, T. Mander, C. Yang, and R. Cheung, "Role-based model security access control for smart power-grids computer networks," in Proc. IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, 7 pp., 20-24 Jul. 2008.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	H. Seng-Phil, A. Gail-Joon, and X. Wenjuan, "Access control management for SCADA systems," IEICE Trans. on Information and Systems, vol. 91, no. 10, pp. 2449-2457, Oct. 2008.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	N. Slimani, H. Khambhammettu, K. Adi, and L. Logrippo, "UACML: unified access control modeling language," in Proc. 4th IFIP Int. Conf. on New Technologies, Mobility and Security, NTMS'11, 8 pp., Paris, France, 7-10 Feb. 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	International Electrotechnical Commission, IEC 61970-301, Energy Management System Application Program Interface Part 301: Common Information Model (CIM) Base, International Standard, 2009.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	E. Bertino, P. A. Bonatti, and E. Ferrari, "TRBAC: a temporal role-based access control model," ACM Trans. on Information and System Security, vol. 4, no. 3, pp. 191-233, Aug. 2001.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Q. Ni, et al., "Privacy-aware role-based access control," ACM Trans. on Information and System Security, vol. 13, no. 3, p. 41-50, Jul. 2010.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	V. M. Igure, S. A. Laughter, and R. D. Williams, "Security issues in SCADA networks," Computers &amp; Security, vol. 25, no. 7, pp. 498-506, Oct. 2006.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	O. Rysavy, J. Rab, P. Halfar, and M. Sveda, "A formal authorization framework for networked SCADA systems," in Proc. IEEE 19th Int. Conf. and Workshops on Engineering of Computer Based Systems, ECBS'12, pp. 298-302, 11-13 Apr. 2012.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. R. R. Barbosa, Anomaly Detection in SCADA Systems: A Network Based Approach, University of Twente, 2014.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	پ. نیرو، استاندارد سیستم‌های اتوماسیون پست‌های انتقال و فوق توزیع، وزارت نیرو- توانیر، 1386.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	K. Jensen and L. M. Kristensen, Coloured Petri Nets: Modelling and Validation of Concurrent Systems, Springer Science &amp; Business Media, 2009.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Feature Extraction and Lexicon Expanded in Opinion Mining through Persian Reviews</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>E.</given_name><surname>Golpar-Rabooki</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S.</given_name><surname>Zarghamifar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S.</given_name><surname>Zarghamifar</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2016</year></publication_date><pages><first_page>259</first_page><last_page>266</last_page></pages><doi_data><doi>10.66224/ijece.28204.14.3.259</doi><resource>http://ijece.org/en/Article/28204</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28204</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28204</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28204</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28204</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28204</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28204</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28204</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Stavrianou and J. H. Chauchat, "Opinion mining issues and agreement identification in forum texts," in Proc. 6th Int.Conf. on Computational Linguistics and Intelligent Text Processing, CICLing'05, 51-58, Feb. 2005.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	B. Pang, L. Lee, and S. Vaithyanathan, "Thumbs up? sentiment classification using machine learning techniques," in Proc. Conf. on Empirical Methods in Natural Language Processingm, EMNLP'02, pp. 79-86, Jul. 2002.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Sepehri, "Chi-square for features selection in opinion mining in persian text," in Proc. 2nd National Conf. on Computer/Electrical and IT Engineering, CEIC'09, pp. 128-132, Mar. 2009.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	C. Nichols, Feature Selection and Weighting for Sentiment Analysis, University of Guelph, 2010.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	B. Liu, Sentiment Analysis and Opinion Mining, Morgan and Claypool, 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	م. ر. شمس نجف‌آبادی، اندیشه‌کاوی و تحلیل نظرات در مستندات فارسی، دانشگاه تهران، 1391.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	س. ا. ضرغامی‌فر، "استخراج ویژگی‌ها در اندیشه‌کاوی مورد استفاده در متون فارسی،" دومین همایش ملی کامپیوتر دانشکده فنی و حرفه‌ای سما، 
صص. 95-89، سنندج، 1392.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	E. Riloff, J. Wiebe, and T. Wilson, "Learning subjective nouns using extraction pattern bootstrapping," in Proc. Conf. on Natural Language Learning, CoNLL'03, pp. 25-32, Mar. 2003.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	C. Zhai and J. Lafferty, "Model-based feedback in the language modeling approach to information retrieval," in Proc. 10th Int. Conf. on Information and Knowledge Management, pp. 403-410, Oct. 2001.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Yi, T. Nasukawa, and R. Bunescu, "Sentiment analyzer: extracting sentiments about a given topic using natural language processing techniques," in Proc. 3rd IEEE Int. Conf. on Data Mining, pp. 427-434, Nov. 2003.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Hu and B. Liu, "Mining and summarizing customer reviews," in Proc. 10th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 168-177, Aug. 2004.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Popescu and O. Etzioni, "Extracting product features and opinions from reviews," in Proc. Conf. on Human Language Technology and Empirical Methods in Natural Language Processing, pp. 339-346, Oct. 2005.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Q. Mei, X. Ling, and M. Vondra, "Topic sentiment mixture: modeling facets and opinions in weblogs," in Proc. Int. World Wide Web Conf. Committee, pp. 171-180, May. 2007.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Y. Liu, X. Huang, and A. An, "ARSA: a sentiment-aware model for predicting sales performance using blogs," in Proc. 30th Annual Int. ACM SIGIR Conf. on Research and Development in Information Retrieval, pp. 607-614, Jul. 2007.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	R. McDonald, K. Hannan, and T. Neylon, "Structured models for fine-to-coarse sentiment analysis," in Proc. 45th Annual Meeting of the Association of Computational Linguistics, pp. 432-439, Jun. 2007.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Q. Su, X. Xu, and H. Guo, "Hidden sentiment association in chinese web opinion mining," in Proc. Int. World Wide Web Conf. Committee, pp. 959-968, Apr. 2008.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	I. Titov and R. McDonald, "A joint model of text and aspect ratings for sentiment summarization," Association for Computational Linguistics, pp. 308-316, Jun. 2008.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	G. Qiu, B. Liu, J. Bu, and C. Chen, "Opinion word expansion and target extraction through double propagation," Computational Linguistics, vol. 37, no.1, pp. 9-27, Mar. 2011.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Hu and B. Liu, "Mining and summarizing customer reviews", in Proc. ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 168-177, Aug. 2004.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	B. Liu, M. Hu, and J. Cheng, "Opinion observer: analyzing and comparing opinions on the web," in Proc. 14th Int. World Wide Web Conf., pp. 341-351, May. 2005.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Shamsfard, et al., "Semi-automatic development of farsnet; the persian wordnet," in Proc. 5th Global WordNet Conf., pp.846-850, Aug. 2010.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	م. ح. الهی‌منش و ب. مینایی، "برچسب‌گذاری ادات سخن متون فارسی به کمک مدل مخفی مارکوف،" فصل‌نامه اطلاع رساني، آموزشي و مطالعات رايانه‌اي علوم اسلامي، شماره 34، صص. 106-102، بهار 1390.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	F. Raja, H. Amiri, and F. Oroumchian, et al., "Evaluation of part of speech tagging on persian text," in Proc. Second Workshop on Computational Approaches to Arabic Script-Based Languages, Linguistic Institute Stanford University, pp. 120-127, Jul. 2007.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. Tasharofi, et al., "Evaluation of statistical part of speech tagging of Persian text," in Proc. Int. Symp. on Signal Processing and its Applications, 4 pp., Feb. 2007.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Dadegan Research Group, Persian Dependency Treebank Version 1.0, Annotation Manual and User Guide, Supreme Council of Information and Communication Technology (SCICT), 2012.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Rasooli, M. Kouhestani, and M. Moloodi, "Development of a persian syntactic dependency treebank," in Proc. 2013 Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL HLT'13, pp. 306-314, Atlanta, USA, Jun. 201.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	گروه پژوهشی دادگان، پیکره وابستگی نحوی زبان فارسی (نسخه 1.0)، تهران، دبیرخانه شورای عالی اطلاع‌رسانی، بازیابی از http://dadegan.ir/perdt، ۱۳۹۱.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	س. کاووسی‌نژاد، "حذف در گروه اسمی زبان،" نامه فرهنگستان، صص. 127-109، 1379.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	م. سنجی و م. ر. داورپناه، "شناسايي واژه‌هاي غير مفهومي (رايج) در نمايه‌سازي خودكار مدارك فارسي،" فصل‌نامه كتابداري و اطلاع‌رساني، جلد 12، شماره 4، صص. 36-9، زمستان 1389.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	ف. ‌ا. خداپرستی، فرهنگ جامع واژگان مترادف و متضاد زبان فارسی، شیراز، دانشنامه فارس، ۱۳۷۶.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	B. Liu, M. Hu, and J. Cheng, "Opinion observer: analyzing and comparing opinions on the web," in Proc. 14th Int. World Wide Web Conf., pp. 342-351, Chiba, Japan, May 2005.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>