﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051922</doi_batch_id><timestamp>20260519223106</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>3</month><day>21</day><year>2017</year></publication_date><journal_volume><volume>14</volume></journal_volume><issue>4</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Improving Target Coverage in Visual Sensor Networks by Adjusting the Cameras’ Field-of-View and Scheduling the Cover sets Using Simulated Annealing</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>B.</given_name><surname>Shahrokhzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Dehghan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. R.</given_name><surname>Shahrokhzadeh</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2017</year></publication_date><pages><first_page>271</first_page><last_page>285</last_page></pages><doi_data><doi>10.66224/ijece.28216.14.4.271</doi><resource>http://ijece.org/en/Article/28216</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28216</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28216</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28216</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28216</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28216</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28216</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28216</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, no. 4, pp. 393-422, Mar. 2002.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. Soro and W. Heinzelman, "A survey of visual sensor networks," Advances in Multimedia, vol. 2009, 21 pp., 2009.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. H. Yen, "Efficient visual sensor coverage algorithm in wireless visual sensor networks," in Proc. 9th Int. Wireless Communications and Mobile Computing Conf., IWCMC'13, pp. 1516-1521, 1-5 Jul. 2013.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Ai and A. A. Abouzeid, "Coverage by directional sensors in randomly deployed wireless sensor networks," J. of Combinatorial Optimization, vol. 11, no. 1, pp. 21-41, Feb. 2006.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Y. Cai, W. Lou, M. Li, and M. Li, "Energy efficient target-oriented scheduling in directional sensor networks," IEEE Trans. on Computers, vol. 58, no. 9, pp. 1259-1274, Sep. 2009.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	K. Han, L. Xiang, J. Luo, and Y. Liu, "Minimum-energy connected coverage in wireless sensor networks with omni-directional and directional features," in Proc. of the 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 85-94, 11-14 Jun. 2012.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. Hong, et al., "Target-temporal effective-sensing coverage in mission-driven camera sensor networks," in Proc. of 22nd Int. Conf. on Computer Communications and Networks, ICCCN'13, 9 pp., 30 Jul.-2 Aug. 2013.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Y. H. Kim, Y. H. Han, Y. S. Jeong, and D. S. Park, "Lifetime maximization considering target coverage and connectivity in directional image/video sensor networks," The J. of Supercomputing, vol. 65, no. 1, pp. 365-382, Jul. 2013.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	F. Xiao, et al., "Surface coverage algorithm in directional sensor networks for three-dimensional complex terrains," Tsinghua Science and Technology, vol. 21, no. 4, pp. 397-406, Aug. 2016.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Xu, W. Lyu, and H. Li, "Optimizing coverage of 3D wireless multimedia sensor networks by means of deploying redundant sensors," International J. of Advanced Studies in Computers, Science and Engineering, vol. 4, no. 9, p. 28, 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Cardei, M. T. Thai, Y. Li, and W. Wu, "Energy-efficient target coverage in wireless sensor networks," in  Proc. IEEE Proc. 24th Annual Joint Conf. of the IEEE Computer and Communications Societies, INFOCOM'05, vol. 3, pp. 1976-1984, 13-17 Mar. 2005.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. M. Gil and Y. H. Han, "A target coverage scheduling scheme based on genetic algorithms in directional sensor networks," Sensors, vol. 11, no. 2, pp. 1888-1906, 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	G. S. Kasbekar, Y. Bejerano, and S. Sarkar, "Lifetime and coverage guarantees through distributed coordinate-free sensor activation," IEEE/ACM Trans. on Networking, vol. 19, no. 2, pp. 470-483, Apr. 2011.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Hosseini, M. Dehghan, and H. Pedram, "Lifetime improvement of visual sensor networks for target coverage through uniform energy consumption," International J. of Ad Hoc and Ubiquitous Computing, vol. 14, no. 4, pp. 249-266, 2013.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. C. Wu and W. F. Lu, "On target coverage problem of angle rotatable directional sensor networks," in Proc. 7th Int. Conf. on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS'13, pp. 605-610, 3-5 Jul. 2013.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	V. P. Munishwar, V. Kolar, and N. B. Abu-Ghazaleh, "Coverage in visual sensor networks with Pan-Tilt-Zoom cameras: the MaxFoV problem," in Proc. IEEE INFOCOM, pp. 1492-1500, 27 Apr.-2 May 2014.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Cardei and D. Z. Du, "Improving wireless sensor network lifetime through power aware organization," Wireless Networks, 
vol. 11, no. 3, pp. 333-340, May 2005.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	L. Ding, W. Wu, J. Willson, L. Wu, Z. Lu, and W. Lee, "Constant-approximation for target coverage problem in wireless sensor networks," in Proc. IEEE INFOCOM, pp. 1584-1592, Mar. 2012.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Y. Li and S. Gao, "Designing k-coverage schedules in wireless sensor networks," J. of Combinatorial Optimization, vol. 15, no. 2, pp. 127-146, Feb. 2008.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Rossi, A. Singh, and M. Sevaux, "Lifetime maximization in wireless directional sensor network," European J. of Operational Research, vol. 231, no. 1, pp. 229-241, Nov. 2013.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. Kirkpatrick, "Optimization by simulated annealing: quantitative studies," J. of Statistical Physics, vol. 34, no. 5-6, pp. 975-986, Mar. 1984.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	V. Cerny, "Thermodynamical approach to the traveling salesman problem: an efficient simulation algorithm," J. of Optimization Theory and Applications, vol. 45, no. 1, pp. 41-51, Jan. 1985.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	N. Metropolis and S. Ulam, "The monte carlo method," J. of the American Statistical Association, vol. 44, no. 247, pp. 335-341, 1949.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	D. H. Ackley, G. E. Hinton, and T. J. Sejnowski, "A learning algorithm for boltzmann machines," Cognitive Science, vol. 9, 
no. 1, pp. 147-169, Jan. 1985.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Optimizing Quantum Circuits by One-Way Quantum Computation Model Based on Pattern Geometries</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Eslamy</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Saheb Zamani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Sedighi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Houshmand</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2017</year></publication_date><pages><first_page>286</first_page><last_page>298</last_page></pages><doi_data><doi>10.66224/ijece.28217.14.4.286</doi><resource>http://ijece.org/en/Article/28217</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28217</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28217</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28217</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28217</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28217</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28217</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28217</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Nakahara and T. Ohmi, Quantum Computing: From Linear Algebra to Physical Realizations, Taylor &amp; Francis, 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, Cambridge University Press, 2011.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	G. Benenti, G. Strini, and G. Casati, Principles of Quantum Computation and Information, World Scientific, 2004.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," in Proc. Foundations of Computer Science, Proc. of the 35th Annual Symp. on Foundations of Computer Science, pp. 124-134, Nov. 1994.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	L. K. Grover, "A fast quantum mechanical algorithm for database search," in Proc. of ACM Symp. on Theory of Computing, pp. 183-191, 22-24 May 1996.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R. Landauer, "Irreversibility and heat generation in the computing process," IBM J. of Research and Development, vol. 5, no. 3, 
pp. 183-191, Jul. 1961.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Jozsa, "An introduction to measurement based quantum computation," NATO Science Series, III: Computer and Systems Sciences. Quantum Information Processing-from Theory to Experiment, vol. 199, pp. 137-158, Nov. 2006.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	H. Briegel, et al., "Measurement-based quantum computation," Natur Physics, vol. 5, no. 1, pp. 19-26, Jan. 2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	D. Gottesman and I. L. Chuang, "Quantum teleportation is a universal computational primitive," arXiv preprint quant-ph/9908010, 1999.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	R. Raussendorf and H. J. Briegel, "A one-way quantum computer," Physical Review Letters, vol. 86, no. 22, p. 5188, May 2001.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	D. E. Browne and H. J. Briegel, One-Way Quantum Computation - A Tutorial Introduction, 2nd Ed., 2006.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Hein, et al., "Entanglement in graph states and its applications," arXiv preprint quant-ph/0602096, Feb. 2006.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Mhalla and S. Perdrix, "Finding optimal flows efficiently," Automata, Languages, and Programming, Springer, vol. 5125, pp. 857-868, 2008.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Broadbent and E. Kashefi, "Parallelizing quantum circuits," Theoretical Computer Science, vol. 410, no. 26, pp. 2489-2510, Jun. 2009.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	E. Pius, Automatic Parallelisation of Quantum Circuits Using the Measurement Based Quantum Computing Model, M.Sc. in High Performance Computing, University of Edinburgh, p. 65, 2010.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	R. D. Da Silva and E. F. Galvao, "Compact quantum circuits from one-way quantum computation," Physical Review A, vol. 88, no. 1, p. 012319, Jul. 2013.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	D. McMahon, Quantum Computing Explained, John Wiley &amp; Sons, 2007.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. U. Khalid, Z. Zilic, and K. Radecka, "FPGA emulation of quantum circuits," in Proc. IEEE Int. Conf. Computer Design: VLSI in Computers and Processors, ICCD'04, pp. 310-315, Oct. 2004.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	V. Danos, E. Kashefi, and P. Panangaden, "The measurement calculus," J. of the ACM, vol. 54, no. 2, p. 8, Apr. 2007.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	V. Danos, E. Kashefi, P. Panangaden, and S. Perdrix, "Extended measurement calculus," in S. J. Gay and I. Mackie, eds., Semantic Techniques in Quantum Computation, Ch. 7, pp. 235-310, Cambridge University Press, 2009.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	D. E. Browne, E. Kashefi, M. Mhalla, and S. Perdrix, "Generalized flow and determinism in measurement-based quantum computation," New J. of Physics, vol. 9, no. 8, 16 pp., Aug. 2007.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	V. Danos, E. Kashefi, and P. Panangaden, "Parsimonious and robust realizations of unitary maps in the one-way model," Physical Review A, vol. 72, no. 6, p. 064301, Dec. 2005.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. S. Bullock and I. L. Markov, "Arbitrary two-qubit computation in 23 elementary gates," Physical Review A, vol. 68, no. 1, pp. 324-329, Jul. 2003.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. S. Bullock and I. L. Markov, "Smaller circuits for arbitrary 
n-qubit diagonal computations," arXiv preprint quant-ph/0303039, 2003.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	N. D. Beaudrap, "Finding ﬂows in the one-way measurement model," Physical Review A, vol. 77, no. 2, 8 pp., Feb. 2008.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	V. Danos and E. Kashefi, "Determinism in the one-way model," Physical Review A, vol. 74, no. 5, p. 052310, Nov. 2006.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	R. D. da Silva, E. Pius, and E. Kashefi, "Global quantum circuit optimization," arXiv Preprint arXiv: 1301.0351, 2013.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	M. Houshmand, M. Saheb Zamani, M. Sedighi, and M. H.n Samavatian, "Automatic translation of quantum circuits to optimized one-way quantum computation patterns," Quantum Information Processing, vol. 13, no. 11, pp. 24632482, Nov. 2014.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>EBONC: A New Energy-Aware Clustering Approach Based on Optimum Number of Clusters for Mobile Wireless Sensor Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>N.</given_name><surname>Norouzy</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>N.</given_name><surname>Norouzy</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Fazlali</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2017</year></publication_date><pages><first_page>299</first_page><last_page>310</last_page></pages><doi_data><doi>10.66224/ijece.28218.14.4.299</doi><resource>http://ijece.org/en/Article/28218</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28218</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28218</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28218</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28218</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28218</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28218</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28218</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor network survey," Computer Networks, vol. 52, no. 12, pp. 2292-2330, Aug. 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. Zheng and A. Jamalipour, Wireless Sensor Networks: A Networking Perspective, John Wiley &amp; Sons, 2009.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. Y. Yu and P. H. J. Chong, "A survey of clustering schemes for mobile ad hoc networks," Communications Surveys &amp; Tutorials, IEEE, vol. 7, no. 1, pp. 32-48, First Quarter. 2005.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Y. Chen, A. Liestman, and J. Liu, "Clustering algorithms for ad hoc wireless networks," in Ad Hoc and Sensor Networks, eds. Y. Pan and Y. Xiao, ch.4, Nova Science Publishers, 2004.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	V. Katiyar, N. Chand, and S. Soni, "Clustering algorithms for heterogeneous wireless sensor network: a survey," International J. of Applied Engineering Research, vol. 1, no. 2, pp. 273-287, 2010.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. Yan, N. H. Tran, and F. S. Bao, "Gossiping along the path: a direction-biased routing scheme for wireless ad hoc networks," in Proc. IEEE Global Communications Conf., GLOBECOM'11, 6 pp., Dec. 2015.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Agarwal and M. Motwani, "Survey of clustering algorithms for MANET," International J. on Computer Science and Engineering, vol. 1, no. 2, pp. 98-104, 2009.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Pruteanu and S. Dulman, "ASH: tackling node mobility in large-scale networks," Computing, vol. 94, no. 8-10, pp. 811-832, Sept. 2012.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Chinara and S. K. Rath, "A survey on one-hop clustering algorithms in mobile ad hoc networks," J. of Network and Systems Management, vol. 17, no. 1-2, pp. 183-207, Jun. 2009.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. A. Abbasi and M. Younis, "A survey on clustering algorithms for wireless sensor networks," Computer Communications, vol. 30, 
no. 14, pp. 2826-2841, Oct. 2007.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. S. Basurra, et al., "Energy efficient zone based routing protocol for MANETs," Ad Hoc Networks, vol. 25, issue PA, pp. 16-37, Feb. 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Y. Yu and P. H. Chong, "3hbac (3-hop between adjacent clusterheads): a novel non-overlapping clustering algorithm for mobile ad hoc networks," in IEEE Pacific Rim Conf. on Communications, Computers and signal Processing, PACRIM, vol. 1, pp. 318-321, Aug. 2003.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	C. R. Lin and M. Gerla, "Adaptive clustering for mobile wireless networks," IEEE J. on Selected Areas in Communications, vol. 15, no. 7, pp. 1265-1275, Sept. 1997.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	T. J. Kwon and M. Gerla, "Efficient flooding with passive clustering (PC) in ad hoc networks," ACM SIGCOMM Computer Communication Review, vol. 32, no. 1, pp. 44-56, Jan. 2002.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. H. Ryu, S. Song, and D. H. Cho, "Clustering scheme for energy conservation in two-tiered mobile ad hoc networks," Electronics Letters, vol. 37, no. 11, pp. 700-701, May 2001.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	T. Ohta, S. Inoue, and Y. Kakuda, "An adaptive multihop clustering scheme for highly mobile ad hoc networks," in Proc. 6th Int.l Symp. on Autonomous Decentralized Systems, ISADS'03, pp. 293-300, Apr. 2003.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. D. Amis and R. Prakash, "Load-balancing clusters in wireless ad hoc networks," in Proc. 3rd IEEE Symp. on Application-Specific Systems and Software Engineering Technology, pp. 25-32, 24-25 Mar. 2000.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	P. Basu, N. Khan, and T. D. Little, "A mobility based metric for clustering in mobile ad hoc networks," in Proc. Int. Conf. on, Distributed Computing Systems Workshop, pp. 413-418, Apr. 2001.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	D. Kempe, A. Dobra, and J. Gehrke, "Gossip-based computation of aggregate information," in Proc. 44th Annual IEEE Symp. on Foundations of Computer Science, pp. 482-491, Oct. 2003.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	F. Bai and A. Helmy, "A survey of mobility models in wireless ad hoc networks," to appear on book wireless ad hoc and sensor networks.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	V. Vasanthi, M. Romenkumar, N. Ajithsingh, and M. Hemalatha, "A detailed study of mobility models in wireless sensor networks," J. of Theoretical and Applied Information Technology, vol. 33, no. 1, 
pp. 7-14, Nov. 2001.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	T. Camp, J. Boleng, and V. Davies, "A survey of mobility models for ad hoc network research," Wireless Communications and Mobile Computing, vol. 2, no. 5, pp. 483-502, Aug. 2002.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	T. Camp, J. Boleng, and V. Davies, "A survey of mobility models for ad hoc network research," Wireless Communications and Mobile Computing, vol. 2, no. 5, pp. 483-502, Aug. 2002.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	K. E. Kannammal and T. Purusothaman, "Performance of improved directed diffusion protocol for sensor networks under different mobility models," J. of Computer Science, vol. 8, no. 5, pp. 694-700, 2012.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	R. A. Pushpa, A. Vallimayil, and V. S. Dhulipala, "Impact of mobility models on mobile sensor networks," in Proc. 3rd Int. Conf. on Electronics Computer Technology, ICECT'11, vol. 4, pp. 102-106, Apr. 2011.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	A. S. Raghuvanshi, S. Tiwari, R. Tripathi, and N. Kishor, "Optimal number of clusters in wireless sensor networks: a FCM approach," International J. of Sensor Networks, vol. 12, no. 1, pp. 16-24, Jul. 2012.S
[27]	J. A. Jiang, et al., "CoCMA: energy-efficient coverage control in cluster-based wireless sensor networks using a memetic algorithm," Sensors, vol. 9, no. 6, pp. 4918-4940, 2009.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	K. Fall and K. Varadhan, The ns Manual (formerly ns Notes and Documentation), the VINT Project, 47, 2005.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	N. Aschenbruck, R. Ernst, E. Gerhards-Padilla, and M. Schwamborn, "BonnMotion: a mobility scenario generation and analysis tool," in Proc. of the 3rd Int. ICST Conf. on Simulation Tools and Techniques, ICST'10, Article No. 51, Mar. 2010.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	A. Kumar, Design of Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks, Doctoral dissertation, National Institute of Technology Rourkela, 2012.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Classification and Phishing Websites Detection by Fuzzy Rules and Modified Inclined Planes Optimization</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Abdolrazzagh-Nezhad</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2017</year></publication_date><pages><first_page>311</first_page><last_page>321</last_page></pages><doi_data><doi>10.66224/ijece.28219.14.4.311</doi><resource>http://ijece.org/en/Article/28219</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28219</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28219</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28219</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28219</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28219</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28219</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28219</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Zhang, S. Egelman, L. Cranor, and J. Hong, Phinding Phish: Evaluating Anti-Phishing Tools, 2006.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Aburrous, M. A. Hossain, K. Dahal, and F. Thabtah, "Intelligent phishing detection system for e-banking using fuzzy data mining," Expert Systems with Applications, vol. 37, no. 12, pp. 7913-7921, Dec. 2010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. D. I. A. Ajlouni, W. E. Hadi, and J. Alwedyan, "Detecting phishing websites using associative classification," European J. of Business and Management, vol. 5, no. 23, pp. 36-40, Aug. 2013.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	L. F. Cranor, S. Egelman, J. I. Hong, and Y. Zhang, "Phinding Phish: An Evaluation of Anti-Phishing Toolbars," in Proc. of the 14th Annual Network &amp; Distributed System Security Symp., NDSS'07, San Diego, CA, 28 Feb.-2 Mar. 2007.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Sirajuddin, "Data mining approach for deceptive phishing detection system," International Journal of Scientific Research Engineering &amp;Technology, vol. 2, no. ???, pp. 337-334, ???. 2013.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	E. Medvet, E. Kirda, and C. Kruegel, "Visual-similarity-based phishing detection," in Proc. of the 4th Int. Conf. on Security and Privacy in Communication Netowrks, p. 22-28, Sept. 2008.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	W. Zhang, H. Lu, B. Xu, and H. Yang, "Web phishing detection based on page spatial layout similarity," Informatica, vol. 37, no. 3, pp. 231-244, Sept 2013.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	L. Wenyin, G. Huang, L. Xiaoyue, Z. Min, and X. Deng, "Detection of phishing webpages based on visual similarity," in Proc. Special Interest Tracks and Posters of the 14th Int. Conf. on World Wide Web, pp. 1060-1061, Chiba, Japan, 10-14 May 2005.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. T. Kumar, V. Kumar, and A. Kumar, "Detection and Prevention of Phishing Attacks Using Linkguard Algorithm," 2008.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. S. White, J. N. Matthews, and J. L. Stacy, "A method for the automated detection phishing websites through both site characteristics and image analysis," in Proc. SPIE Defense, Security, and Sensing, 11 pp., May 2012.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. P. Rosiello, E. Kirda, C. Kruegel, and F. Ferrandi, "A layout-similarity-based approach for detecting phishing pages," in Proc. 3rd Int.l Conf. on Security and Privacy in Communications Networks and the Workshops, SecureComm'07., pp. 454-463, Sept. 2007.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	N. R. T. Guhan, "Analyzing and detecting phishing webpages 
with visual similarity assessment based on earth mover's distance with linear programming model," International J. of Advanced Engineering Technology, vol. 3, no. 4, pp. 327-330, Nov. 2012.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	P. Barraclough, M. Hossain, M. Tahir, G. Sexton, and N. Aslam, "Intelligent phishing detection and protection scheme for online transactions," Expert Systems with Applications, vol. 40, no. 11, pp. 4697-4706, Sept. 2013.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. DeMaris and S. H. Selman, Logistic Regression, in Converting Data into Evidence, Ed: Springer, pp. 115-136, 2013.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Garera, N. Provos, M. Chew, and A. D. Rubin, "A framework for detection and measurement of phishing attacks," in Proc. of the  ACM Workshop on Recurring Malcode, 8 pp., Nov. 2007.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. Sengar and V. Kumar, "Client-side defense against phishing with pagesafe," International J. of Computer Applications, vol. 4, no. 4, pp. 6-10, Jul. 2010.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, "A comparison of machine learning techniques for phishing detection," in Proc. of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit, pp. 60-69, Oct. 2007.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. P. Marques de Sa, Pattern Recognition: Concepts, Methods, and Applications, Springer, 2001.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	H. M. Deylami and Y. P. Singh, "Cybercrime detection techniques based on support vector machines," Artificial Intelligence Research, vol. 2, no. 1, 12 pp., 2013.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	L. Breiman, "Random forests," Machine Learning, vol. 45, no. 1, pp. 5-32, 2001.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	D. M. L. V. Radha Damodaram, "Experimental study on meta heuristic optimization algorithms for fake website detection," International Association of Scientific Innovation and Research, pp. 43-53, 2012.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. Radha Damodaram and M. Valarmathi, "Phishing website detection and optimization using particle swarm optimization technique," International J. of Computer Science and Security, vol. 5, no. 5, p. 477-490, Dec. 2011.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. Radha Damodaram and M. Valarmathi, "Bacterial foraging optimization for fake website detection," International J. of Computer Science &amp; Applications, vol. 1, no. 11, pp. 116-127, Jan. 2013.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	م. ح. مظفري، ح. عبدي و س. ح. ظهيري، "الگوريتم جديد بهينه سازي سيستم صفحات شيبدار،" مجله رايانش نرم و فناوري اطلاعات، سال 1، شماره 1، 
صص. 20-3، 1391.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. Aburrous, M. Hossain, K. Dahal, and F. Thabtah, "Associative classification techniques for predicting e-banking phishing websites," in Proc. Int. Conf. on Multimedia Computing and Information Technology, MCIT'10, pp. 9-12, Apr. 2010.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Aburrous, M. A. Hossain, K. Dahal, and F. Thabatah, "Modelling intelligent phishing detection system for e-banking using fuzzy data mining," in Proc. Int. Conf. on CyberWorlds, CW'09, vol. ???, pp. 265-272, ???. 2009.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	P. Barraclough, M. Hossain, M. Tahir, G. Sexton, and N. Aslam, "Intelligent phishing detection and protection scheme for online transactions," Expert Systems with Applications, vol. 40, no. 11, pp. 4697-4706, Sept. 2013.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	S. H. Zahiri and S. A. Seyedin, "Intelligent particle swarm classifiers," Iranian J. of Electrical and Computer Engineering, 
vol. 4, no. 1, pp. 63-70, Winter-Spring 2005.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	M. Aburrous, M. A. Hossain, K. Dahal, and F. Thabtah, "Experimental case studies for investigating E-banking phishing techniques and attack strategies," Cognitive Computation, vol. 2, no. 3, pp. 242-253, Sep. 2010.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	A. Y. Fu, L. Wenyin, and X. Deng, "Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD)," IEEE Trans. on Dependable and Secure Computing, vol. 3, no. 4, pp. 301-311, Oct.-Dec. 2006.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	R. Mohammad, T. McCluskey, and F. A. Thabtah, "Intelligent rule based phishing websites classification," IET Information Security, vol. 8, no. 3, pp. 153-160, May 2013.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Using Contour Information for Body Orientation Estimation in the Image</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Sebti</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Hassanpour</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2017</year></publication_date><pages><first_page>322</first_page><last_page>332</last_page></pages><doi_data><doi>10.66224/ijece.28220.14.4.322</doi><resource>http://ijece.org/en/Article/28220</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28220</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28220</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28220</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28220</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28220</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28220</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28220</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K. Smith, S. O. Ba, J. M. Odobez, and D. Gatica-Perez, "Tracking the visual focus of attention for a varying number of wandering people," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 30, no. 7, pp. 1212-1229, Jul. 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	ع. سبطی و ح. حسن‌پور، "بهبود الگوریتم SDALF در بازشناسی انسان با بهره‌گیری از اطلاعات زاویه شخص،" بیست و سومین کنفرانس مهندسی برق ایران، صص. 894-890، اردیبهشت 1394.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	G. Fanelli, J. Gall, and L. Van Gool, "Real time head pose estimation with random regression forests," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'11, pp. 617-624, Jun. 2011.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. Baltieri, R. Vezzani, and R. Cucchiara, "Sarc3d: a new 3d body model for people tracking and re-identification," in Proc. Int.Conf. onImage Analysisand Processing ICIAP'11, pp. 197-206, Sept. 2011.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	L. Bourdev and J. Malik, "Poselets: body part detectors trained using 3d human pose annotations," in Proc. IEEE 12th Int. Conf. on Computer Vision, pp. 1365-1372, Sep. 2009.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	D. Tosato, M. Spera, M. Cristani, and V. Murino, "Characterizing humans on riemannian manifolds," , IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 35, no. 8, pp. 1972-1984, Aug. 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Tao and R. Klette, "Integrated pedestrian and direction classification using a random decision forest," in Proc. IEEE Int. Conf. on Computer Vision Workshops, ICCVW'13, , pp. 230-237, Dec. 2013.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Andriluka, S. Roth, and B. Schiele, "Pictorial structures revisited: people detection and articulated pose estimation," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'09, pp. 1014-1021, Jun.  2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Andriluka, S. Roth, and B. Schiele, "Monocular 3d pose estimation and tracking by detection," in Proc., IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'10, pp. 623-630, Jun. 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	D. M. Gavrila and S. Munder, "Multi-cue pedestrian detection and tracking from a moving vehicle," International J. of Computer Vision, vol. 73, no. 1, pp. 41-59, Jun. 2007.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Y. Mu, S. Yan, Y. Liu, T. Huang, and B. Zhou, "Discriminative local binary patterns for human detection in personal album," in Proc., IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'08, 8 pp, 23-28 Jun. 2008.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	O. Tuzel, F. Porikli, and P. Meer, "Pedestrian detection via classification on riemannian manifolds," IEEE Trans. on Pattern Analysis and Machine Intelligencevol. 30, no. 10, pp. 1713-1727, Oct. 2008.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	P. F. Felzenszwalb, R. B. Girshick, D. McAllester, and D. Ramanan, "Object detection with discriminatively trained part-based models," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 32, no. 9, pp. 1627-1645, Sept. 2010.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Q. Zhu, M. C. Yeh, K. T. Cheng, and S. Avidan, "Fast human detection using a cascade of histograms of oriented gradients," in Proc. IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, CVPR'06, vol. 2, pp. 1491-1498, Jun. 2006.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	N. Dalal and B. Triggs, "Histograms of oriented gradients for human detection," in Proc. IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, CVPR'05, vol. 1, pp. 886-893, Jun. 2005.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	ع. سبطی و ح. حسن‌پور، "بازشناسی انسان در سيستم‌های نظارت ويدئويی،" مجله محاسبات نرم دانشگاه کاشان، جلد سوم، شماره اول، صص. 81-62، تابستان 1393.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	D. Huang, M. Storer, F. De la Torre, and H. Bischof, "Supervised local subspace learning for continuous head pose estimation," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'11, pp. 2921-2928, Jun. 2011.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	E. Murphy-Chutorian and M. M. Trivedi, "Head pose estimation in computer vision: a survey," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 31, no. 4, pp. 607-626, Apr. 2009.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	D. Tran and D. Forsyth, "Improved human parsing with a full relational model," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'10, pt. 4, , pp. 227-240, Sep.2010.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Enzweiler and D. M. Gavrila, "Integrated pedestrian classification and orientation estimation," in Proc. IEEE Conf. Computer Vision and Pattern Recognition, CVPR'10, pp. 982-989, Jun. 2010.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	I. Chavel, Riemannian Geometry: A Modern Introduction, Cambridge University Press, vol. 98, Apr. 2006.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	N. F. Troje, "Decomposing biological motion: A framework for analysis and synthesis of human gait patterns," Journal of Vision, vol. 2, no. 5, pp. 371-387, Sep. 2002.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	R. Kimmel, N. Kiryati, and A. M. Bruckstein, "Sub-pixel distance maps and weighted distance transforms," J. of Mathematical Imaging and Vision, vol. 6, no. 2-3, pp. 223-233, Jun. 1996.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. P. Dubuisson and A. K. Jain, "A modified Hausdorff distance for object matching," in Proc. of the 12th IAPR Int. Conf. IEEE Pattern Recognition, Computer Vision &amp; Image Processing, vol. 1, pp. 566-568, Oct. 1994.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	L. Rokach and O. Maimon, "Clustering methods," in Data Mining and Knowledge Discovery Handbook, Springer, pp. 321-352, 2005.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	D. Gray, S. Brennan, and H. Tao, "Evaluating appearance models for recognition, reacquisition, and tracking," in Proc. IEEE International Workshop on Performance Evaluation of Tracking and Surveillance, vol. 3, pp. 41-47, Oct. 2007.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	S. H. Cha, "Comprehensive Survey on Distance/Similarity Measures between Probability Density Functions, " Int. J. of Mathematical Models and Methods in Applied Sciences, vol. 1, no. 4, pp. 300-307, 2007.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	C. C. Chang, and C. J. Lin, "LIBSVM: a library for support vector machines," ACM Trans. on Intelligent Systems and Technology, vol. 2, no. 3, Article no. 27, Apr. 2011.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	P. Felzenszwalb and D. Huttenlocher, Distance Transforms of Sampled Functions, Cornell University, 2004.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Radon-Based Text and Script-Independent Gender Detection Using Symbolic Dynamic Filtering</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>K.</given_name><surname>Nouri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>K.</given_name><surname>Nouri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Y.</given_name><surname>Akbari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. M.</given_name><surname>Razavi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H. </given_name><surname>Ahmadi Torshizi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2017</year></publication_date><pages><first_page>333</first_page><last_page>341</last_page></pages><doi_data><doi>10.66224/ijece.28221.14.4.333</doi><resource>http://ijece.org/en/Article/28221</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28221</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28221</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28221</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28221</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28221</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28221</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28221</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	F. Adrian and G. Barrie, "Graphology and personality: another failure to validate graphological analysis," Personality and Individual Differences, vol. 8, no. 3, pp. 433-435, 1987.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. J. Klimoshk and A. Rafaeli, "Inferring personal qualities through handwriting analysis," J. of Occupational and Organizational Psychology, vol. 56, no. 3, pp. 191-202, 1987.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	E. Neter and G. Ben-Shakhar, "The predictive validity of graphological inferences: a meta-analytic approach," Personality and Individual Differences, vol. 10, no. 12, pp. 735-745, 1989.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	R. P. Tett and C. A. Palmer, "The validity of handwriting elements in relation to self-report personality trait measures," Personality and Individual Differences, vol. 22, no. 1, pp. 11-18, 1997.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Hamid and K. M. Loewenthal, "Inferring gender from handwriting in Urdu and English," The J. of Social Psychology, vol. 136, no6, pp. 778-782, 1996.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	H. James, "Sex differences in handwriting: a comment on spear," British Educational Research J., vol. 17, no. 2, pp. 141-145, 1991.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	W. N. Hayes, Identifying Sex from Handwriting, Percept Motor Skills, pp. 91-800, 1996.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	I. Siddiqi, C. Djeddi, A. Raza, and L. Souici-Meslati, "Automatic analysis of handwriting for gender classification," Pattern Analysis and Applications, vol. 18, no. 8, pp. 887-899, 2014.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	V. Burr, "Judging gender from sampels of adult handwriting: accuracy and use of cues," the J. of Social Psychology, vol. 142, 
no. 6, pp. 691-700, 2002.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Chaabouni, H. Boubaker, M. Kherallah, and A. Alimi, "Fractal and multi-fractal for Arabic offline writer identification," in Proc. of Int. Conf. on Pattern Recognition, ICPR'10, pp. 3793-3796, 23-26 Aug. 2010.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Liwicki, A. Schlapbach, and H. Bunke, "Automatic gender detection using on-line and off-line information," Pattern Analysis and Applications, vol. 14, no. 1, pp. 87-92, 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Blumenstein, X. Liu, and B. Verma, "An investigation of the modified direction feature for cursive character recognition," Pattern Recognition, vol. 40, no. 2, pp. 376-388, 2007.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Blumenstein, B. Verma, and H. Baseli, "A novel feature exteraction technique for the recognition of segmented handwriten characters," in Proc. of Int. Conf. on Document Analysis and Recognition, ICDAR'03, pp. 137-141, 6 Aug. 2003.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	N. Bouadjenek, H. Nemmour, and Y. Chibani, "Age, gender and handedness prediction from handwriting using gradient features," in Proc. of 13th Int. Conf. on Document Analysis and Recognition, ICDAR'15, pp. 1116-1120, 23-26 Aug. 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	E. Sokic, A. Salihbegovic, and M. Ahic-Djokic, "Analysis of off-line handwritten text samples of different gender using shape descriptors," in Proc. of Int. Symp. on Telecommunications, pp. 114-120, 25-27 Oct. 2012.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Al Maadeed and A. Hassaine, "Automatic prediction of age, gender, and nationality in offline handwriting," EURASIP J. on Image and Video Processing, vol. 10, no. 1, pp. 19-29, 2015.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. Hussain, A. Reza, I. Siddiqi, K. Khurshid, and C. Djeddi, "A comprehensive survey of handwritten document benchmarks: structure, usage and evaluation," EURASIP J. on Image and Video Processing, vol. 56, no. 6, pp. 1-24, Dec. 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	R. N. Bracewell, Two - Dimensional Imaging, Prentice Hall, 1995.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. S. Lim, Two - Dimensional Signal and Image Processing, Prentice Hall, 1990.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Bahrampour, A. Ray, S. Sarkar, T. Damarla, and N. Nasrabadi, "Performance comparsion of feature extraction algorithms for target detection and classification," Pattern Recognition Letter, vol. 34, 
no. 16, pp. 2126-2134, 1 Dec. 2013.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Ray, "Symbolic dynamic analysis of complex systems for anomaly detection," Signal Process, vol. 84, no. 7, pp. 1115-1130, Jul. 2004.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	A. Subbu, A. Srivastav, A. Ray, and E. Keller, "Symbolic dynamic filtering for image analysis: theory and experimental validation," Signal Image and Video Processing, vol. 4, no. 3, pp. 319-329, Sept. 2010.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	C. Djeddi, et al., "LAMIS-MSHD: a multi-script offline handwriting database," in Proc. of the 14th Int. Conf. on Frontiers in Handwriting Recognition, ICFHR'14, pp. 93-97, 2014.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	N. Otsu, "A threshold selection method from gray-level," IEEE Trans. on Systems, vol. 9, no. 1, pp. 62-66, Jan. 1979.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. Cheriet, N. Kharma, C. L. Liu, and C. Suen, Character Recognition Systems: A Guide for Students and Practitioners Anomaly Detection, John Wiley and Sons Inc, 2007.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Robust and Fast Aerial and Satellite Image Matching based on Selective Scale and Rotation</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Safdari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>P.</given_name><surname>Moallem</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Sattari</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2017</year></publication_date><pages><first_page>342</first_page><last_page>348</last_page></pages><doi_data><doi>10.66224/ijece.28222.14.4.342</doi><resource>http://ijece.org/en/Article/28222</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28222</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28222</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28222</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28222</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28222</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28222</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28222</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Nithya, et al., "Feature based automated aerial image to satellite image registration," International J. of Computer Science &amp; Engineering Technology, vol. 3, no. 7, pp. 286-289, Jul. 2012.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Guerrero, A Comparative Study of Three Image Matcing Algorithms: Sift, Surf, and Fast, Ph. D. Thesis, Utah State University, 2011.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	C. Harris and M. Stephens, "A combined corner and edge detector," in Proc. Fourth Alvey Vision Conf., pp. 147-151, 1988.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Trajkovic and M. Hedley, "Fast corner detection," Image and Vision Computing J., vol. 16, no. 6, pp. 75-87, Feb. 1998.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	D. G. Lowe, "Object recognition from local scale-invariant features," in Proc. IEEE Computer Vision Conf., vol. 2, pp. 1150-1157, 20-25 Sep. 1999.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. Ke and R. Sukthankar, "PCA-SIFT: a more distinctive representation for local image descriptors," in Proc. IEEE Computer Vision and Pattern Recognition Conf., pp. 511-517, 27 Jun. - 2 Jul. 2004.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. Qing, B. Lin, and W. Fang, "An improved SIFT algorithm," J. of Harbin Engineering University, vol. 31, pp. 560-564, 2010.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	H. Bay, A. Ess, T. Tuytelaars, and L. V. Gool, " Speeded-up robust features (SURF)," Computer Vision and Image Understanding, vol. 110, no. 3, pp. 346-359, Jun. 2008.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Calonder, et al., "BRIEF: computing a local binary descriptor very fast," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 34, no. 7, pp. 1287-1298, Jul. 2012.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	E. Rublee, V. Rabaud, K. Konolige, and G. Bradski, "ORB: an effcient alternative to SIFT or SURF," in Proc. 13th IEEE Int. Conf. on Computer Vision, ICCV'11, pp. 2564-2571, 6-13. Nov. 2011.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	D. G. Lowe, "Distinctive image features from scale invariant keypoints," International J. of Computer Vision, Springer, vol. 60, no. 2, pp. 91-110, Nov. 2004.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	X. Lu, S. Zhang, W. Yang, and Y. Chen, "SIFT and shape information incorporated into fluid model for non-rigid registration of ultrasound images," J. of Computer Methods and Programs in Biomedicine, vol. 100, no. 2, pp. 123-131, Nov. 2010.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Automatic Error Detecting in Databases, Based on Clustering and Nearest Neighbor</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>ataeyan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>n.</given_name><surname>daneshpour</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2017</year></publication_date><pages><first_page>349</first_page><last_page>356</last_page></pages><doi_data><doi>10.66224/ijece.28223.14.4.349</doi><resource>http://ijece.org/en/Article/28223</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28223</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28223</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28223</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28223</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28223</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28223</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28223</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	G. Beskales, I. F. Ilyas, L. Golab, and A. Galiullin, "Sampling from repairs of conditional functional dependency violations," The VLDB Journal, vol. 23, no. 1, pp. 103-128, Feb, 2014.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	W. Fan, "Dependencies revisited for improving data quality," in Proc. 27th Int. Conf. on Management of Data, pp. 159-170, Vancouver, Canada, 9-12 Jun. 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	W. Ahmed Malik and A. Unwin, "Automated error detection using association rules," Intelligent Data Analysis, vol. 15, no. 5, pp. 749-761, Sept. 2011.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. H. Williams, C. R. Margules, and D. W. Hilbert, "Data requirements and data sources for biodiversity priority area selection," J. of Biosciences, vol. 27, no. 4, pp. 327-338, Jul. 2002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Bruggemann, "Rule mining for automatic ontology based data cleaning," in Progress in WWW Research and Development, pp. 522-527, 2008.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	G. Rahman and Z. Islam, "Missing value imputation using decision trees and decision forests by splitting and merging records: two novel techniques," Knowledge-Based Systems, vol. 53, pp. 51-65, Nov. 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	G. Rahman and Z. Islam, "Decision tree-based missing value imputation technique for data pre-processing," Research and Practice in Information Technology, vol. 121, no. 1, pp. 41-50, Dec. 2011.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	L. Breiman, "Bagging predictors," Machine Learning, vol. 24, no. 2, pp. 123-140, Aug. 1996.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Yakout and L. Berti-Equille, and A. K. Elmagarmid, "Don't be SCAREd: use scalable automatic repairing with maximal likelihood and bounded changes," in Proc. 13th Int. Conf. on Management of Data, pp. 553-564, New York, USA, 22-27 Jun. 2013.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	N. Tang, "Big data cleaning," in Proc. 16th  Int. Conf.in Web Technologies and Applications, pp. 13-24, Changsha, China, 5-7 Sept. 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Hipp, U. Guntzer, and U. Grimmer, "Data quality mining-making a virute of necessity," in Proc. 6th  Int. SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, DMKD'01, pp. 52-57, Santa Barbara, California, USA, May, 2001.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	C. He, Z. Tan, Q. Chen, C. Sha, Z. Wang, and W. Wang, "Repair diversification for functional dependency violations," in Proc. 19th Int. Conf.in Database Systems for Advanced Applications,, pp. 468-482, Bali, Indonesia, 21-24 April, 2014.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Hamad and A. Abdulkhar Jihad, "An enhanced technique to clean data in the data warehouse," in Proc. 11thInt. Conf. in Developments in E-systems Engineering, pp. 306-311, Washington, DC, USA, 6-8 Dec. 2011.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	C. Teng, "Correcting noisy data," in Proc. 16th Int. Conf.in Machine Learning,, pp. 239-248, San Francisco, CA, USA, 27-30 Jun. 1999.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	C. Teng, "A comparison of noise handling techniques," in Proc. 14th Int. Florida Artificial Intelligence Research Society, pp. 269-273, Key West, FL, USA, 21 – 23 May, 2001.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	C. Teng, "Polishing blemishes: issues in data correction," Intelligent Systems, vol. 19, no. 2, pp. 34-39, Mar. 2004.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. Lopatenko and L. Bravo, "Efficient approximation algorithms for repairing inconsistent databases," in Proc. IEEE 23rd Int. Conf. on Data Engineering, ICDE'07, pp. 216-225, 15-20 Apr. 2007.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	V. J. Hodge and J. Austin, "A survey of outlier detection methodologies," Artificial Intelligence Review, vol. 22, no. 2, pp. 85-126, Oct. 2004.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. Chawla and A. Gionis, "k-means: a unified approach to clustering and outlier detection," in Proc. 13th SIAM Int. Conf. on Data Mining, pp. 189-197, Austin, Texas, USA, 2-4 May 2013.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	O. Arbelaitz, I. Gurrutxaga, J. Muguerza, J. M. Perez, and I. Perona, "An extensive comparative study of cluster validity indices," Pattern Recognition, vol. 46, no. 1, pp. 243-256, Jan. 2013.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	P. Rousseeuw, "Silhouettes: a graphical aid to the interpretation and validation of cluster analysis," J. of Computational and Applied Mathematics, vol. 20, no. 1, pp. 53-65, Nov. 1987.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	J. Han, M. Kamber, and J. Pei, Data Mining Concept and Technieques, pp. 451-471, 3 Edition, 2011.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>