﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051922</doi_batch_id><timestamp>20260519223110</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>6</month><day>21</day><year>2017</year></publication_date><journal_volume><volume>15</volume></journal_volume><issue>1</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A New Variance-Based Method for Solving Stochastic Graph Optimization Problem Using Learning Automata</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M. R.</given_name><surname>Mollakhalili Meybodi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. R.</given_name><surname>Meybodi</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>13</last_page></pages><doi_data><doi>10.66224/ijece.28232.15.1.1</doi><resource>http://ijece.org/en/Article/28232</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28232</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28232</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28232</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28232</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28232</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28232</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28232</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K. S. Narendra and M. A. L. Thathachar, "Learning automata: a survey," IEEE Trans. Syst. Man, Cyberentics, vol. 14, no. 4, pp. 323-334, Jul. 1974.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. Lakshmivarahan, Learning Algorithms Theory and Applications, vol. 30, Springer-Verlag, New York, 1981.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	G. Santharam and P. S. Sastry, "A reinforcement learning neural network for adaptive control of Markov chains," IEEE Trans.Syst. Man Cybern. Part A, Syst. Humans, vol. 27, no. 5, pp. 588-600, Sept. 1997.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	B. J. Oommen and D. C. Y. Ma, "Deterministic learning automata solutions to the equipartitioning problem," IEEE Trans. Comput., vol. 37, no. 1, pp. 2-13, Jan. 1988.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	B. J. Oommen and E. V De St Croix, "String taxonomy using learning automata," IEEE Trans. Syst. Man, Cybern. Part B, Cybern. a Publ. IEEE Syst. Man, Cybern. Soc., vol. 27, no. 2, pp. 354-65, Jan. 1997.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	B. J. Oommen and E. V de St Croix, "Graph partitioning using learning automata," IEEE Trans. Comput., vol. 45, no. 2, pp. 195-208, Feb. 1996.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Tsoularis, C. Kambhampati, and K. Warwick, "Path planning of robots in noisy workspaces using learning automata," in Proc. of the 1993 IEEE Int. Symp. on Intelligent Control, pp. 560-564, Aug. 1993.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	T. J. Gordon, C. Marsh, and Q. H. Wu, "Stochastic optimal control of active vehicle suspensions using learning automata," Proc. Inst. Mech. Eng. Part I J. Syst. Control Eng., vol. 207, no. 3, pp. 143-152, Aug. 1993.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	C. Marsh, T. J. Gordon, and Q. H. Wu, "Application of learning automata to controller design in slow-active automobile suspensions," Veh. Syst. Dyn., vol. 24, no. 8, pp. 597-616, Sept. 1995.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	E. Ikonen and K. Najim, "Use of learning automata in distributed fuzzy logic processor training," IEE Proc.Control Theory Appl., vol. 144, no. 3, pp. 255-262, May 1997.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	T. Aoki, T. Oka, T. Suzuki, and S. Okuma, "Acquisition of optimal action selection to avoid moving obstacles in autonomous mobile robot," in Proc., IEEE Int. Conf. on Robotics and Automation, vol. 3, pp. 2055-2060, Apr. 1996.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. A. Thathachar and B. Harita, "Learning automata with changing number of actions," IEEE Trans. Syst. Man, Cybern.-Part A Syst. Humans, vol. 17, no. 6, pp. 1095-1100, Nov. 1987.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. Beigy and M. Meybodi, Intelligent Channel Assignment in Cellular Networks: A Learning Automata Approach, Amirkabir University of Technology, Technical Report, 2004.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	H. Beigy and M. R. Meybodi, "Utilizing distributed learning automata to solve stochastic shortest path problems," Int. J. Uncertainty, Fuzziness Knowledge-Based Syst., vol. 14, no. 5, pp. 591-615, Oct. 2006.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	م. ر. ملاخلیلی میبدی و م. ر. میبدی، "یک الگوریتم جدید مبتنی بر آتاماتای یادگیر توزیع‌شده برای حل مسأله کوتاه‌ترین مسیر تصادفی،" مجموعه مقالات ششمین کنفرانس سیستم‌های هوشمند، کرمان، 10 ص.، 5-4 آذر 1384.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. Akbari Torkestani and M. R. Meybodi, "Learning automata-based algorithms for solving stochastic minimum spanning tree problem," Appl. Soft Comput., vol. 11, no. 6, pp. 4064-4077, Sep. 2011.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. Rezvanian and M. R. Meybodi, "A new learning automata-based sampling algorithm for social networks," Int. J. Commun. Syst., vol. 30, no. 5, 21 pp., 25 Mar. 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	م. ر. ملاخلیلی میبدی و م. ر. میبدی، "روشی مبتنی بر آتاماتای یادگیر توزیع‌شده برای مدل‌سازی کاربران در محیط‌های فراپیوندی،" مجموعه مقالات کنگره ملی مهندسی برق، کامپیوتر و فناوری اطلاعات، 5 ص.، 19-17 آبان 1391.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	م. ر. ملاخلیلی‌میبدی و م. ر. میبدی، "استفاده از آتاماتای یادگیر توزیع‌شده در پیش‌بینی حرکت کاربران در وب،" مجموعه مقالات سیزدهمین کنفرانس سالانه انجمن کامپیوتر ایران، 6 ص.، تهران، 21-19 اسفند 1386.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	ع. براداران هاشمی و م. ر. میبدی، "داده‌کاوی استفاده از وب با استفاده از آتاماتای یادگیر توزیع‌شده،" مجموعه مقالات دوازدهمین کنفرانس سالانه انجمن کامپیوتر ایران، 7 ص.، تهران، 3-1 اسفند 1385.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	ب. اناری، م. ر. میبدی و ز. اناری، "ارائه روشی جدید برای رتبه‌بندی صفحات وب با استفاده از آتاماتای یادگیر توزیع‌شده،" مجموعه مقالات سیزدهمین کنفرانس سالانه انجمن کامپیوتر ایران، 7 ص.، تهران، 21-19 اسفند 1386.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. R. Mollakhalili Meybodi and M. R. Meybodi, "Extended distributed learning automata: an automata-based framework for solving stochastic graph optimization problems," Appl. Intell., 
vol. 41, no. 2, pp. 923-940, Oct. 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	م. ر. ملاخلیلی میبدی و م. ر. میبدی، "یک الگوریتم جدید مبتنی بر آتاماتای یادگیر توزیع‌شده توسعه‌یافته برای یادگیری پارامتری شبکه بیزی،" نشریه مهندسی برق و مهندسی کامپیوتر ایران، سال 12، شماره ۲- ب، 
صص. 126-119، زمستان 1393.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	م. ر. ملاخلیلی میبدی و م. ر. میبدی، "یادگیری ساختاری شبکه‌های بیزی: یک رهیافت مبتنی بر آتاماتای یادگیر،" نشریه مهندسی برق و مهندسی کامپیوتر ایران، سال 14، شماره ۱- ب، صص. 40-27، بهار 1395.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. B. Kruskal, "On the shortest spanning sub tree of a graph and the traveling salesman problem," American Mathematical Society, vol. 7, no. 1, pp. 48-50, Feb. 1956.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Elkin, "An unconditional lower bounds on the time-approximation tradeoffs for the distributed minimum spanning tree problem," SIAM Journal on Computing, vol. 36, no.2, pp.433-456, 2006.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	J. Garay, S. Kutten, and D. Peleg, "A sublinear time distributed algorithm for minimum-wight-spanning tree," SIAM J. Comput., vol. 27, no. 1, pp. 302-326, 1998.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	M. Khan and G. Pandurangan, "A fast distributed approximation algorithm for minimum spanning trees," in Proc. of the 20th Int. Symp. on Distributed Computing, DISC'06, pp. 355-369, 2006.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	H. Beigy and M. R. Meybodi, "Solving stochastic shortest path problem using distributed learning automata," in Proc. 6th Annual CSI Computer Conf., CSICC'01, pp. 70-86, 2001.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	K. Liu, Stochastic Online Learning for Network Optimization under Random Unknown Weights, 18 pp.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	م. ر. ملاخلیلی میبدی و م. ر. میبدی، "یک روش جدید مبتنی بر معیارهای آماری توزیع برای تنظیم خودکار نرخ یادگیری آتاماتای یادگیر در محیط‌های پویا،" نشریه مهندسی برق و مهندسی کامپیوتر ایران، سال ۱۱، شماره ۱- ب، 
صص. 51-43، تابستان 1392.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	م. قربعلی‌پوردرو و م. ر. میبدی، "یافتن درخت پوشای مینیمم در گراف‌های تصادفی با استفاده از آتاماتاهای یادگیر،" مجموعه مقالات چهاردهمين کنفرانس سالانه انجمن کامپیوتر ایران، 7 ص.، تهران، 21-20 اسفند 1387.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	K. R. Hutson and D. R. Shier, "Bounding distributions for the weight of a minimum spanning tree in stochastic networks," Oper. Res., 
vol. 53, no. 5, pp. 879-886, Oct. 2005.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Using the Capabilities of XML and Materialized Views in Creating a Near Real-Time Data Warehouse</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S. M.</given_name><surname>Shafaei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. M.</given_name><surname>Shafaei</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2017</year></publication_date><pages><first_page>14</first_page><last_page>26</last_page></pages><doi_data><doi>10.66224/ijece.28233.15.1.14</doi><resource>http://ijece.org/en/Article/28233</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28233</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28233</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28233</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28233</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28233</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28233</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28233</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Zhu, Lei An, and S. Liu, "Data updating and query in real-time data warehouse system," in Proc. of Int. Conf. on Computer Science and Software Engineering, vol. 5, pp. 1295-1297, Dec. 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. J. Santos and J. Bernardino, "Real-time data warehouse loading methodology," in Proc. of ACM Int. Symp. on Database Engineering &amp; Applications, pp. 49-58, Sept. 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Cuzzocrea, N. Ferreira, and P. Furtado, "Enhancing traditional data warehousing architectures with real-time capabilities," in Proc. of Int. Symp. on Methodologies for Intelligent Systems, pp. 456-465, Jun. 2014.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Obali, B. Dursun, Z. Erdem, and A. K. Görür, "A real time data warehouse approach for data processing," in Proc. of Signal Processing and Communications Applications Conf., SIU'13, 4 pp., Apr. 2013.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Zuters, "Near real-time data warehousing with multi-stage trickle and flip," in Proc. of Int. Conf. on Business Informatics Research, . pp. 73-82, Oct. 2011.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	T. Winsemann, V. Koppen, and G. Saake, "A layered architecture for enterprise data warehouse systems," in Proc. of Int.Conf. on Advanced Information Systems Engineering, pp. 192-199, Jun. 2012.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. Sharma, R. Nasri, and K. Askand, "Building a data warehousing infrastructure based on service oriented architecture," in Proc. of IEEE Int. Conf. on Cloud Computing Technologies, Applications and Management, ICCCTAM'12, pp. 82-87, Dec. 2012.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	V. Gonzalez-Castro, L. M. MacKinnon, and M. del Pilar Angeles, "An alternative data warehouse reference architectural configuration," in Proc. of British National Conf. on Databases, pp. 33-41, Jul. 2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Y. Mao, et al., "Dynamic mirror based real-time query contention solution for support big real-time data analysis," in Proc. of 2nd Int. Conf. on Information Technology and Electronic Commerce, ICITEC'14, pp. 229-233, Dec. 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	W. Qu, V. Basavaraj, S., Shankar, and S. Dessloch, "Real-time snapshot maintenance with incremental ETL pipelines in data warehouses," in Proc. of Int. Conf. on Big Data Analytics and Knowledge Discovery, pp. 217-228, Sept. 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Z. Lin, Y. Lai, C. Lin, Y. Xie, and Zou Q, "Maintaining internal consistency of report for real-time OLAP with layer-based view," in Proc. of Asia-Pacific Web Conf., pp. 143-154, Apr. 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	I. Hamdi, E. Bouazizi, and J. Feki, "Dynamic management of materialized views in real-time data warehouses," in Proc. of 6th Int. Conf. on Soft Computing and Pattern Recognition, SoCPaR'14, pp. 168-173, Aug. 2014.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	T. Jain, "Refreshing data warehouse in near real-time," Int. J. of Computer Applications, vol. 46, no. 18, pp. 24-28, May 2012.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Asif Naeem, G. Dobbie, and G. Webber, "An event-based near real-time data integration architecture," in Proc. of 12th Enterprise Distributed Object Computing Conf. Workshops, pp. 401-404, Sept. 2008.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Yi Chuan and X. Yao, "Research of real-time data warehouse storage strategy based on multi-level caches," Physics Procedia, vol. 25, pp. 2315-2321, Jan. 2012.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	R. J. Santos, J. Bernardino, and M. Vieira, "24/7 real-time data warehousing: a tool for continuous actionable knowledge," in Proc. of 35th Annual Computer Software and Applications Conf., pp. 279-288, Jul. 2011.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	N. Ferreira, P. Martins, and P. Furtado, "Near real-time with traditional data warehouse architectures: factors and how-to," in Proc. of ACM 17th Int. Database Engineering &amp; Applications Symp., pp. 68-75, Oct. 2013.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	P. O'Neil, E. O'Neil, X. Chen, and S.Revilak, "The star schema benchmark and augmented fact table indexing," in Proc. of Technology Conf. on Performance Evaluation and Benchmarking, pp. 237-252, Aug. 2009.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Nguyen Tho and A. Min Tjoa, "Zero-latency data warehousing for heterogeneous data sources and continuous data streams," in Proc. of 5th Int. Conf. on Information Integration and Web-Based Applications Services, pp. 55-64, Sept. 2003.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	L. Golab and T. Johnson, "Data stream warehousing," in Proc. of IEEE 30th Int. Conf. on Data Engineering, pp. 949-952, Mar./Apr. 2014.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Gorawski and A. Gorawska, "Research on the stream ETL process," Proc. of Int. Conf. Beyond Databases, Architectures and Structures, pp. 61-71, Jan. 2014.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	R. Abrahiem, "A new generation of middleware solutions for a near-real-time data warehousing architecture," in Proc. of IEEE Int. Conf. on Electro/Information Technologypp. 192-197, May 2007.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. K. Sohrabi and V. Ghods, "Materialized view selection for data warehouse using frequent itemset mining," J. of Computers, vol. 11, no. 1, pp. 140-148, Mar. 2016.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. Gosain, "Materialized cube selection using particle swarm optimization algorithm," Procedia Computer Science, vol. 79, pp. 2-7, Jan. 2016.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	T. Win, "Conversion of XML schema to data warehouse schema using automatic approach," International J. of Computer Applications, vol. 108, no. 15, pp. 12-18, Dec. 2014.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Z. Ouaret, R. Chalal, and O. Boussaid, "An approach for generating an XML data warehouse schema using model transformation language," Journal of Digital Information Management, vol. 12, no. 6, pp. 407-420, Dec. 2014.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Optimization of Adaptive Design of Wireless Sensor Networks Using Binary Quantum-Inspired Gravitational Search Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Mirhosseini</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>F.</given_name><surname>Barani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Nezamabadi-pour</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2017</year></publication_date><pages><first_page>27</first_page><last_page>36</last_page></pages><doi_data><doi>10.66224/ijece.28234.15.1.27</doi><resource>http://ijece.org/en/Article/28234</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28234</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28234</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28234</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28234</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28234</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28234</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28234</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	H. Alemdar and C. Ersoy, "Wireless sensor networks for healthcare: a survey," J. of Computer Networks, vol. 54, no. 15, pp. 2688-2710, Oct. 2010.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	V. L. Boginski, C. W. Commander, P. M. Pardalos, and Y. Ye, Sensors: Theory, Algorithms, and Applications, Springer Optimization and Its Applications, Springer-Verlag, New York, 2011.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. K. Das, G. Ghidini, A. Navarra, and C. M. Pinotti, "Localization and scheduling protocols for actor-centric sensor networks," J. of Networks, vol. 59, no. 3, pp. 299-319, May 2012.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. K. Rafsanjani, M. Mirhoseini, and R. Nourizadeh, "A multi-objective evolutionary algorithm for improving energy consumption in wireless sensor networks," Bull. Transilv. Univ. Brasov, vol. 6, 
no. 2, pp. 107-116, Jan. 2013.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Park, S. Lee, and S. Yoo, "Time slot assignment for converge cast in wireless sensor networks," J. of Parallel Distrib. Comput, vol. 83, pp. 70-82, Sept. 2015.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. Carrabs, R. Cerulli, C. D'Ambrosio, M. Gentili, and A. Raiconi, "Maximizing lifetime in wireless sensor networks with multiple sensor families," Computers &amp; Operations Research, vol. 60, pp. 121-137, Aug. 2015.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Rebaia, M. Leberreb, H. Snoussic, F. Hnaiend, and L. Khoukhie, "Sensor deployment optimization methods to achieve both coverage and connectivity in wireless sensor networks," Computers &amp; Operations Research, vol. 59, pp. 11-21, Jul. 2015.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	K. P. Ferentinos and T. A. Tsiligiridis, "Adaptive design optimization of wireless sensor networks using genetic algorithms," J. of Computer Networks, vol. 51, no. 4, pp. 1031-1051, Mar. 2007.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	K. P. Ferentinos and T. A. Tsiligiridis, "A memetic algorithm for optimal dynamic design of wireless sensor networks," J. of Computer Communications, vol. 33, no. 2, pp. 250-258, Feb. 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	B. Krishnamachari and F. Ordonez, "Analysis of energy-eﬃcient, fair routing in wireless sensor networks through non-linear optimization," in Proc. of IEEE Vehicular Technology Conf.-Fall, pp. 2844-2848, Orlando, FL, USA, Oct. 2003.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	K. P. Ferentinos and T. A. Tsiligiridis, "Evolutionary energy management and design of wireless sensor networks," in Proc. of Second Annual IEEE Communications Society Conf. on Sensor and Ad Hoc Communications and Networks, pp. 406-417, Sept. 2005.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Hojjatoleslami, V. Aghazarian, M. Dehghan, and N. G. Motlagh, "PSO based node placement optimization for wireless sensor networks," in Proc. of Intelligent Systems and Applications, pp. 12-17, Sept. 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	E. Rashedi, H. Nezamabadi-pour, and S. Saryazdi, "GSA: a gravitational search algorithm," J. of Information Sciences, vol. 179, no. 13, pp. 2232-2248, Jun. 2009.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	E. Rashedi, H. Nezamabadi-pour, and S. Saryazdi, "BGSA: binary gravitational search algorithm," J. of Nat Comput, vol. 9, no. 3, pp. 727-745, Sept. 2010.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	E. Rashedi and H. Nezamabadi-pour, "Feature subset selection using improved binary gravitational search algorithm," J. of Intelligent and Fuzzy Systems, vol. 26, no. 3, pp. 1211-1221, Apr. 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	X. H. Han, X. M. Chang, L. Quan, X. Y. Xiong, J. X. Li, Z. X. Zhang, and Y. Liu, "Feature subset selection by gravitational search algorithm optimization," J. of Information Sciences, vol. 281, pp. 128-146, Oct. 2014.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	E. Rashedi, H. Nezamabadi-pour, and S. Saryazdi, "Filter modeling using gravitational search algorithm," J. of Engineering Applications of Artificial Intelligence, vol. 24, no. 1, pp. 117-122, Feb. 2011.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. Chatterjee and G. K. Mahanti, "Comparative performance of gravitational search algorithm and modified particle swarm optimization algorithm for synthesis of thinned scanned concentric ring array antenna," Electromagnetics Research, vol. 25, pp. 331-348, Sept. 2010.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Yin, Y. Hu, F. Yang, X. Li, and W. Gu, "A novel hybrid 
K-harmonic means and gravitational search algorithm approach for clustering," J. of Expert Systems with Applications, vol. 38, no. 8, 
pp. 9319-9324, Aug. 2011.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Sarafrazi and H. Nezamabadi-pour, "Facing the classiﬁcation of binary problems with a GSA-SVM hybrid system," J. of Math. Comput. Model, vol. 57, no. 1-2, pp. 270-278, Jan. 2013.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	C. Li and J. Zhou, "Parameters identification of hydraulic turbine governing system using improved gravitational search algorithm," Energy Conversion and Management, vol. 52, no. 1, pp. 374-381, Jan. 2011.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. Taghipour, A. R. Moradi, and M. Yazdani-Asrami, "Identification of magnetizing inrush current in power transformers using GSA trained ANN for educational purposes," in Proc. of IEEE Conf. on Open Systems, ICOS'10, pp. 23-27, Dec. 2010.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. Soleimanpour-Moghadam, H. Nezamabadipour, and M. M. Farsangi, "A quantum behaved gravitational search algorithm," Intelligent Information Management, vol. 4, no. 6, pp. 390-395, Nov. 2012.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. Soleimanpour-Moghadam and H. Nezamabadipour, "An improved quantum behaved gravitational search algorithm," in Proc. of 20th Iranian Conf. on Electrical Engineering, ICEE'12, pp. 711-715, May 2012.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. Soleimanpour-Moghadam, H. Nezamabadipour, and M. M. Farsangi, "A quantum inspired gravitational search algorithm for numerical function optimization," J. of Information Sciences, 
vol. 267, no. 20, pp. 83-100, May 2014.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	A. A. Ibrahim, A. Mohamed, and H. Shareef, "A novel quantum-inspired binary gravitational search algorithm in obtaining optimal power quality monitor placement," J. of Applied Science, vol. 12, 
no. 9, pp. 822-830, Jun. 2012.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	H. Nezamabadi-pour, "A quantum-inspired gravitational search algorithm for binary encoded optimization problems," J. of Engineering Application of Artificial Intelligence, vol. 40, pp. 62-75, Apr. 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Fast Tracking Algorithm Robust Against Occlusion Using Divided Edge-Based Templates</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>P.</given_name><surname>Moallem</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>R.</given_name><surname>Asgarian</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2017</year></publication_date><pages><first_page>37</first_page><last_page>45</last_page></pages><doi_data><doi>10.66224/ijece.28235.15.1.37</doi><resource>http://ijece.org/en/Article/28235</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28235</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28235</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28235</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28235</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28235</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28235</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28235</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	P. Moallem, A. Memarmoghaddam, and M. Ashourian, "Robust and fast tracking algorithm in video sequences by adaptive window sizing using a novel analysis on spatiotemporal gradient powers," International J. of Circuit, Systems, and Computers, vol. 16, no. 2, pp. 305-317, Apr. 2007.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	W. Zhong, H. Lu, and M. Yang, "Robust object tracking via sparsity-based collaborative model," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'12, pp. 1838-1845, Jun. 2012.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. C. Emilio Maggio, Video Tracking: Theory and Practice, Wiley, 2011.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	B. Javidi, Image Recognition and Classification, Algorithms, Systems and Applications, 1st Edition, CRC Press, 2002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	T. Zhang, B. Ghanem, S. Liu, and N. Ahuja, "Robust visual tracking via multi-task sparse learning," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'12, pp. 2042-2049, Jun. 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	L. Cehovin, M. Kristan, and A. Leonardis, "Robust visual tracking using an adaptive coupled-layer visual model," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 35, no. 4, pp. 941-953, Apr. 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	X. Jia, D. Wang, and H. Lu, "Fragment-based tracking using online multiple kernel learning," in Proc. 19th IEEE Int. Conf. on Image Processing, ICIP'12, pp. 393-396, Oct. 2012.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. Wu, H. Yue, Y. Cao, and Z. Cui, "Video object tracking method based on normalized cross-correlation matching," in Proc. 9th Int. Symp. on Distributed Computing and Applications to Business Engineering and Science, DCABES'10, pp. 523-527, Aug. 2010.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	C. Chu, J. Hwang, H. Pai, and K. Lan, "Robust video object tracking based on multiple kernels with projected gradients," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, ICASSP'11, pp. 1421-1424, May 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	H. Tahvilian, P. Moallem, and A. Monadjemi, "Balloon energy based on parametric active contour and directional walsh-hadamard transform and its application in tracking of texture object in texture background," EURASIP J. on Advances in Signal Processing, Article 253, 15 pp., Dec. 2012.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	ر. عسگریان دهکردی، پ. معلم و ع. معمار مقدم، "الگوریتمی قطعه مبنا برای ردیابی بلادرنگ تصویری با مقاومت مناسب نسبت به انسداد و تغییرات هدف،" مجموعه مقالات دومین کنفرانس بین‌المللی بازشناسی الگو و تحلیل تصویر، 7 صص.، رشت،  اسفند 93.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	C. Choi and H. I. Christensen, "Robust 3D visual tracking using particle filtering on the SE (3) group," in Proc. IEEE Int. Conf. on Robotics and Automation, ICRA'11, pp. 4384-4390, May 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	C. Choi and H. I. Christensen, "3D texture-less object detection and tracking: an edge-based approach," in Proc. IEEE/RSJ Int. Conf. on Intelligent Robots and Systems, IROS'12, pp. 3877-3884, Oct. 2012.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	K. Lebeda, S. Hadfield, J. Matas, and R. Bowden, "Long-term tracking through failure cases," in Proc. IEEE Int. Conf. on Computer Vision Workshops, ICCVW'13, pp. 153-160, Dec. 2013.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Adam, E. Rivlin, and I. Shimshoni, "Robust fragments-based tracking using the integral histogram," in Proc. IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, vol. 1, pp. 798-805, Jun. 2006.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	D. A. Ross, J. Lim, R. Lin, and M. Yang, "Incremental learning for robust visual tracking," International J. of Computer Vision, vol. 77, no. 3, pp. 125-141, May 2008.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	D. Comaniciu, V. Ramesh, and P. Meer, "Kernel-based object tracking," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 25, no. 5, pp. 564-577, Apr. 2003.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	P. Zhao, H. Zhu, H. Li, and T. Shibata, "A directional-edge-based real-time object tracking system employing multiple candidate-location generation," IEEE Trans. on Circuits and Systems for Video Technology, vol. 23, no. 3, pp. 503-517, Mar. 2013.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Y. Suzuki and T. Shibata, "Multiple-clue face detection algorithm using edge-based feature vectors," in Proc. IEEE In. Conf. on Acoustics, Speech, and Signal Processing, ICASSP'04, vol. 5, pp. 737-740, May 2004.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	B. Babenko, M. Yang, and S. Belongie, "Visual tracking with online multiple instance learning," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'09, pp. 983-990, Jun. 2009.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Z. Kalal, J. Matas, and K. Mikolajczyk, "P-N learning: bootstrapping binary classifiers by structural constraints," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'10, pp. 49-56, Jun. 2010.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	J. Kwon and K. M. Lee, "Visual tracking decomposition," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'10, pp. 1269-1276, Jun. 2010.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	L. Wang, H. Yan, K. Lv, and C. Pan, "Visual tracking via kernel sparse representation with multikernel fusion," IEEE Trans. on Circuits and Systems for Video Technology, vol. 24, no. 7, pp. 1132-1141, Jul. 2014.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	H. Grabner, M. Grabner, and H. Bischof, "Real-time tracking via on-line boosting," in Proc. British Machine Vision Conf., pp. 47-56, May 2006.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Human Recognition via Finger Vein Images in Radon Space Using Common Spatial Patterns</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Hassanpour</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Gholami</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2017</year></publication_date><pages><first_page>46</first_page><last_page>54</last_page></pages><doi_data><doi>10.66224/ijece.28236.15.1.46</doi><resource>http://ijece.org/en/Article/28236</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28236</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28236</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28236</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28236</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28236</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28236</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28236</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	X. J. Meng, G. P. Yang, Y. L. Yin, and R. Y. Xiao, "Finger vein recognition based on local directional code," Sensors, vol. 12, no. 12, pp. 14937-14952, Nov. 2012.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	K. Park, "Finger vein recognition by combing global and local feature base on SVM," Computing and Informatics, vol. 30, no. 2, pp. 295-309, Apr. 2011.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	G. P. Yang, X. M. Xi, and Y. L. Yin, "Finger vein recognition based on (2D) 2PCA and metric learning," J. Biomed. Biotechnol, vol. 2012, 9 pp., Mar. 2012.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	G. P. Yang, X. M. Xi, and Y. L. Yin, "Finger vein recognition based on a personalized best bit map," Sensors, vol. 12, no. 2, pp. 1738-1757, Feb. 2012.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. D. Wu and C. T. Liu, "Finger-vein pattern identification using principal component analysis and the neural network technique," Expert Syst, vol. 38, no. 5, pp. 5423-5427, May 2011.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	C. B. Yu, D. M. Zhang, and H. B. Li, "Finger vein image enhancement based on multi-threshold fuzzy algorithm," in Proc. of the 2nd Int. Congress on Image and Signal Processing, CISP'09, 3 pp., Tianjin, China, Oct. 2009.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. F. Yang and J. L. Yang, "Multi-channel Gabor finger design for finger vein image enhancement," in Proc. of the 5th International Conf. on Image and Graphic,s ICIG'09, pp. 87-91, Xi'an, China, Sept. 2009.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. F. Yang and M. F. Yan, "An improved method for finger-vein image enhancement," in Proc. of the 2010 IEEE 10th Int. Conf. on Signal Processing, pp. 1706-1709, Beijing, China, Oct. 2010.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	J. F. Yang, J. L. Yang, and Y. H. Shi, "Combination of Gabor wavelets and circular Gabor filter for finger-vein extraction," in Proc. of the 5th Int. Conf. on Emerging Intelligent Computing Technology and Applications, pp. 346-354, , Ulsan, Korea, Sept. 2009.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	N. Miura, A. Nagasaka, and T. Miyatake, "Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification," Mach. Vis. Appl, vol. 15, no. 4, pp. 194-203, Oct. 2004.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	C. B. Yu, H. F. Qin, L. Zhang, and Y. Z. Cui, "Finger-vein image recognition combining modified Hausdorff distance with minutiae feature matching," Interdisciplinary Sciences: Computational Life Sciences, vol. 1, no. 4, pp. 280-289, Dec. 2009.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	W. Song, T. Kim, H. C. Kim, J. H. Choi, H. J. Kong, and S. R. Lee, "A finger-vein verification system using mean curvature," Patt. Recogn. Lett, vol. 32, no. 11, pp. 1541-1547, Aug. 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	N. Miura, A. Nagasaka, and T. Miyatake, "Extraction of finger-vein patterns using maximum curvature points in image profiles," in Proc. of the 9th IAPR Conf. on Machine Vision Applications, MVA'05, pp. 347-350, Tsukuba, Japan, May 2005.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	B. N. Huang, Y. G. Dai, and R. F. Li, "Finger-vein authentication based on wide line detector and pattern normalization," in Proc. of the 20th Int. Conf. on Pattern Recognition, pp. 1269-1272, Istanbul, Turkey, Aug. 2010.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	K. J. Wang, J. Y. Liu, P. Popoola Oluwatoyin, and W. X. Feng, "Finger vein identification based on 2-D Gabor filter," in Proc. of the 2nd Int. Conf. on Industrial Mechatronics and Automation, pp. 10-13, Wuhan, China, May 2010.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	B. A. Rosdi, C. W. Shing, and S. A. Suandi, "Finger vein recognition using local line binary pattern," Sensors, vol. 11, no. 12, pp. 11357-11371, Nov. 2011.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	E. C. Lee, H. Jung, and D. Kim, "New finger biometric method using near infrared imaging," Sensors, vol. 11, no. 3, pp. 2319-2333, Feb. 2011.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. D. Wu and C. T. Liu, "Finger-vein pattern identification using principal component analysis and the neural network technique," Expert Systems with Applications, vol. 38, no. 5, pp. 5423-5427, May 2011.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Z. Liu, Y. H. Yin, H. Wang, S. Song, and Q. Li, "Finger vein recognition with manifold learning," J. of Network and Computer Applications, vol. 33, no. 3, pp. 275-282, May 2010.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	J. D. Wu and C. T. Liu, "Finger-vein pattern identification using SVM and neural network technique," Expert Systems with Applications, vol. 38, no. 11, pp. 14284-14289, Oct. 2011.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	T. Chanwimaluang and G. Fan, "An efficient blood vessel detection algorithm for retinal images using local entropy thresholding," in Proc. of IEEE Int. Symp. on Circuits and Systems, vol. 5, pp. 21-24, Bangkok, Thailand, Mar 2003.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	N. R. Pal and S. K. Pal, "Entropic thresholding," Signal Processing, vol. 16, no. 2, pp. 97-108, Feb. 1989.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	C. I. Chang, K. Chen, J. Wang, and M. L. G. Althouse, "A relative entropy-based approach to image thresholding," Pattern Recognition, vol. 27, no. 9, pp. 1275-1289, Sept. 1994.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. Gavlasova and A. Prochazka, "Simulink modelling of radon and wavelet transforms for image feature extraction," in Proc. Int. Conf. Technical Computing, 7 pp., Prague, Czech Republic2005.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	A. Asad, S. A. M. Gilani, and U. Shafique, "Affine invariant feature extraction using a combination of Radon and wavelet transforms," T. Sobh (ed.), in Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, pp. 93-97, 2013.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	X. Jia, J. J. Cui, D. Y. Xue, and F. Pan, "An adaptive dorsal hand vein recognition algorithm based on optimized HMM," J. of Computational Information Systems, vol. 8, no. 8, pp. 313-322, 2012.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	A. Kumar and Y. B. Zhou, "Human identification using finger images," IEEE Trans. Image Process., vol. 21, no. 4, pp. 2228-2244, Apr. 2011.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Radon Transform, http://homepages.inf.ed.ac.uk/rbf/CVonline/ LOCAL_COPIES/AV0405/HAYDEN/Slice_Reconstruction.html, Accessed on 1 Sept. 2014</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	S. Venturas and I. Flaounas, "Study of radon transformation and application of its inverse to NMR," Athenas, Available from cgi.di.uoa.gr/~erga/mobio/05/proj2/Flaounas_Venturas_Final.doc, 2005, Accessed on 19 October 2007.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	J. Muller-Gerking, G. Pfurtscheller, and H. Flyvbjerg, "Designing optimal spatial filters for single-trial EEG classification in a movement task," Clin. Neurophysiol, vol. 110, no. 5, pp. 787-798, May 1999.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	E. Niedermeyer and F. H. L. D. Silva, Electroencephalography: Basic Principles, Clinical Applications, and Related Fields, Lippincott Williams &amp; Wilkins, 2005.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	S. Kulkarni and R. D. Raut, "Finger vein recognition," IOSR J. of Electrical and Electronics Engineering, vol. 2, pp. 32-36, 2014.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	PKU Finger Vein Database (V4) from Peking University, http://rate.pku.edu.cn/.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	J. D. Wu and S. H. Ye, "Driver identification using finger-vein patterns with radon transform and neural network," Expert Syst. Appl, vol. 36, no. 3, pp. 5793-5799, Apr. 2009.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Symbolic Verification of Temporal Fuzzy Logic Properties on Fuzzy Program Graph</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>G.</given_name><surname>Sotudeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Movaghar</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2017</year></publication_date><pages><first_page>55</first_page><last_page>63</last_page></pages><doi_data><doi>10.66224/ijece.28237.15.1.55</doi><resource>http://ijece.org/en/Article/28237</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28237</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28237</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28237</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28237</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28237</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28237</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28237</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	E. M. Clarke, J. O. Grumberge, and D. A. Peled, Model Checking, Cambridge, MA: MIT Press, 1999.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. Baier and J. P. Katoen, Priciples of Model Checking, Cambridge, MA: MIT Press, 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Huth and M. Ryan, Logic Computer Science, 2nd Ed. New York: Cambridge Univ. Press, 2004.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	B. Konikowska and W. Penczek, "On designated values in multi-valued CTL* model checking," Fundamenta Informaticae, vol. 60, no. 1-4, pp. 211-224, Sept. 2003.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Kwiatkowska, G. Norman, J. Sproston, and J. Wang, "Symbolic model checking for probabilistic timed automata," Information and Computation, vol. 205, no. 7, pp. 1027-1077, Jul. 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. Wang, Symbolic Implementation of Model-Checking Probabilistic Timed Automata, Ph.D Dissertation, School of Comput. Sci., Univ. of Birmingham, UK, 2006.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	F. Wang and M. Kwiatkowska, "An MTBDD-based implementation of forward reachability for probabilistic timed automata," in Proc. 3rd Int. Sym. on Automated Technology for Verification and Analysis, ATVA'05, pp. 385-399, Oct. 2005.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Chechik, B. Devereux, S. Easterbrook, and A. Gurfinkel, "Multi-valued symbolic model-checking," ACM Trans. Softw. Eng. Methodol., vol. 12, no. 4, pp. 371-408, Oct. 2003.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Chechik, S. Easterbrook, and V. Petrovykh, "Model-checking over multi-valued logics," in Proc. Int. Symp. Formal Methods Europe on Formal Methods for Increasing Software Productivity, FME'01, pp. 72-98, Berlin, Germany, Mar. 2001.S
[10]	M. Chechik, A. Gurfinkel, B. Devereux, A. Lai, and S. Easterbrook, "Data structures for symbolic multi-valued model-checking," Form. Method Syst. Des., vol. 29, no. 3, pp. 295-344, Nov. 2006.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	G. E. Fainekos, An Introduction to Multi-Valued Model Checking, Dept. Computer and Information Science, Univ. of Pennsylvania, Tech. Rep. MS-CIS-05-16, 2005.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	A. Gurfinkel, Multi-Valued Symbolic Model-Checking: Fairness, Counter-Examples, Running Time, M.S Thesis, Dept. Comput. Sci., Univ. of Toronto, Canada, 2003.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	A. F. Vilas, J. J. P. Arias, A. B. B. Martınez, M. L. Nores, R. P. D. Redondo, A. G. Solla, J. G. Duque, and M. R. Cabrer, "Multi-valued model checking in dense-time," Lecture Notes in Computer Science, vol. 3751, pp. 638-649, Dec. 2005.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	H. Pan, Y. Li, Y. Cao, and Z. Ma, "Model checking computation tree logic over finite lattices," Theoretical Computer Science, vol. 612, pp. 45-62, Jan. 2016.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	N. Sladoje, On Analysis of Discrete Spatial Fuzzy Sets in 2 and 3 Dimensions, Ph.D. Dissertation, Centre for Image Analysis, SLU and Uppsala Univ., Uppsala, Sweden, 2005.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	M. J. Wierman, An Introduction to the Mathematics of Uncertainty, 1st. ed., 20 Aug. 2010.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	P. Carinena, A. Burgarin, M. Mucientes, and S. Barro, "A language for expressing expert knowledge using fuzzy temporal rules," in Proc. EUSFLAT-ESTYLF Joint Conf., pp. 171-174, Palma de Mallorca, Spain, Sept. 1999.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	S. Moon, K. Lee, and D. Lee, "Fuzzy branching temporal logic," IEEE Trans. Syst. Man Cybern. B, vol. 34, no. 2, pp. 1045-1055, Sept. 2004.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	J. Whittle, P. Sawyer, N. Bencomo, B. H. C. Cheng, and J. M. Bruel, "RELAX: incorporating uncertainty into the specification of self-adaptive systems," in Proc. 17th IEEE Int. Requirements Eng. Conf,. RE'09, pp. 79-88, Atlanta, GA, USA, Apr. 2009.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	G. Palshikar, "Representing fuzzy temporal knowledge," in Proc. Int. Conf. on Knowledge-Based Systems, KBCS'00, pp. 252-263, Mumbai, India, Dec. 2000.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	G. Bruns and P. Godefroid, "Model checking with multi-valued logics," Lecture Notes in Computer Science, vol. 3142, pp. 281-293, Jul. 2004.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	B. Intrigila, D. Magazzeni, A. Tofani, I. Melatti, and E. Tronci, "A model checking technique for the verification of fuzzy control systems," in Proc. Int. Conf. on Computational Intell. for Modelling, Control and Automation and Int. Conf. on Intelligent Agents, Web Tech. and Internet Commerce, vol. 2, pp. 536-542, Nov. 2005.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	W. Liang, W. Bing-Wen, and G. Yi-Ping, "Cell mapping description for digital control system with quantization effect," presented at Computing Research Repository, CoRR, 2007, http://arxiv.org/abs/0712.2501</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	J. Y. Yen and S. W. Tarng, "A fuzzy cell-mapping feedback control algorithm for the satellite attitude maneuvering control," in Proc. Asian Fuzzy Syst. Symp. Soft Computing in Intelligent Syst. and Inform. Process., pp. 567-572, Kenting, Taiwan, Dec. 1996.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	غ. ر. ستوده و ع. موقر رحیم‌آبادی، "تقریب و تجدید در منطق و مدل‌های زمانی فازی"، شانزدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران، صص. 166-160، تهران، اسفند ۱۳۸۹.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	G. R. Sotudeh and A. Movaghar, "Abstraction and approximation in fuzzy temporal logics and models," Formal Aspects of Computing, London, UK, Springer-Verlag, vol. 27, no. 2, pp. 309-334, Mar. 2015.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	G. R. Sotudeh and A. Movaghar, "Applications of fuzzy program graph in symbolic checking of fuzzy flip-flops," J. of Computer &amp; Robotics, vol. 7, no. 1, pp. 22-36, Winter/Spring 2014.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	H. Pan, Y. Li, Y. Cao, and Z. Ma, "Model checking fuzzy computation tree logic," Fuzzy Sets and Systems, vol. 262, pp. 60-77, Mar. 2015.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	غ. ر. ستوده و ع. موقر رحیم‌آبادی، "تعمیم مدل و منطق زمانی فازی به زمان حقیقی،" مجموعه مقالات هفدهمین کنفرانس سالانه انجمن کامپیوتر ایران، تهران،  صص. 524-517، اسفند 1390.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	S. Mukherjee and P. Dasgupta, "A fuzzy real-time temporal logic," International J. of Approximate Reasoning, vol. 54, no. 9, pp. 1452-1470, Nov. 2013.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	J. Nild-Nielson, BuDDy-A Binary Decision Diagram Package, Dep. Inform. Tech., Technical Univ. of Denmark, 1999.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	http://nusmv.fbk.eu</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	B. Choi and K. Shukla, "Multi-valued logic circuit design and implementation," International J. of Electronics and Electrical Engineering, vol. 3, no. 4, pp. 256-262, Aug. 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Key Concept Extraction Using FrameNet and Concept Chains</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Mohammadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>K.</given_name><surname>Badie</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2017</year></publication_date><pages><first_page>64</first_page><last_page>72</last_page></pages><doi_data><doi>10.66224/ijece.28238.15.1.64</doi><resource>http://ijece.org/en/Article/28238</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28238</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28238</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28238</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28238</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28238</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28238</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28238</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	 , General Release Note 1.5. https://framenet.icsi.berkeley.edu/fndrupal/ Accessed: on 12 Feb. 2016.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	T. N. Erekhinskaya and D. I. Moldovan, "Lexical chains on wordnet and extensions," in Proc.  Twenty-sixth Int. Florida Artificial Intelligence Research Society Conf., pp. 52-57, May 2013.ُ</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	F. Boudin and E. Morin, "Keyphrase extraction for N-best reranking in multi-sentence compression," in Proc. of the NAACL HLT Conf., pp. 298-305, Jun. 2013.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. R. Thomas, S. K. Bharti, and K. S. Babu, "Automatic keyword extraction for text summarization in e-newspapers," in Proc. ACM Int. Conf. on Informatics and Analytics., p. 86, Aug. 2016.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	E. D'Avanzo, B. Magnini, and A. Vallin, "Keyphrase extraction for summarization purposes: the LAKE system at DOC-2004," in Proc. Document Understanding Conf., 4 pp., May 2004.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Onan, S. Korukoglu, and H. Bulut, "Ensemble of keyword extraction methods and classifiers in text classification," Expert Syst. Appl., vol. 57, pp. 232-247, Sept. 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	P. Turney, "Learning algorithms for keyphrase extraction," Information Retrieval, vol. 2, no. 4, pp. 303-336, Boston, Sept. 2000.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	I. Witten, G. Paynter, and E. Frank, "KEA: practical automatic keyphrase extraction," in Proc. of the 4th ACM Conf. on Digital Libraries, pp. 254-255, Aug. 1999.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	F. Liu, D. Pennell, and Y. Liu, "Unsupervised approaches for automatic keyword extraction using meeting transcripts," in Proc. of Human Language Technologies: the 2009 Annual Conf. of the North American Chapter of the Association for Computational Linguistics, pp. 620-628, May 2009.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	R. Wang, W. Liu, and C. McDonald, "How preprocessing affects unsupervised keyphrase extraction," Proc. 15th Int. Conference on Computational Linguistics and Intelligent Text Processing , CICLing'014, pp. 163-176, Kathmandu, Nepal, 6-12 Apr. 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	T. Tomokiyo and M. Hurst, "A language model approach to keyphrase extraction," in Proc. of the ACL 2003 Workshop on Multiword Expressions: Analysis, Acquisition and Treatment, vol. 18, pp. 33-40, Nov. 2003.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	G. Ercan and I. Cicekli, "Using lexical chains for keyword extraction," Information Processing &amp; Management, vol. 43, no. 6, pp. 1705-1714, Sept. 2007.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	K. Sarkar, A Hybrid Approach to Extract Keyphrases from Medical Documents, arXiv Prepr. arXiv1303.1441, 2013.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	K. Sarkar, M. Nasipuri, and S. Ghose, A New Approach to Keyphrase Extraction Using Neural Networks, arXiv Prepr. arXiv1004.3274, 2010.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	K. Hasan and V. Ng, "Automatic keyphrase extraction: a survey of the state of the art," in Proc. of the 52nd Annual Meeting of the Association for Computational Linguistics, vol. 1, pp. 1262-1273, 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Kim, O. Medelyan, M. Kan, and T. Baldwin, "Automatic keyphrase extraction from scientific articles," Lang. Resour. Eval., vol. 47, no. 3, pp. 723-742, Sept. 2013.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Kim, O. Medelyan, M. Kan, and T. Baldwin, "Semeval-2010 task 5: automatic keyphrase extraction from scientific articles," in Proc. of the 5th Int. Workshop on Semantic Evaluation, Association for Computational Linguistics, pp. 21-26, Jul. 2010.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	F. Xie, X. Wu, and X. Zhu, "Document-specific keyphrase extraction using sequential patterns with wildcards," in Proc. IEEE Int. Conf. on Data Mining, ICDM'14, pp. 1055-1060, Dec. 2014.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	G. Salton, C. S. Yang, and C. T. Yu, "A theory of term importance in automatic text analysis," J. Am. Soc. Inf. Sci., vol. 26, no. 1, pp. 33-44, Jan. 1975.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	J. D. Cohen, "Highlights: language-and domain-independent automatic indexing terms for abstracting," J. Am. Soc. Inf. Sci., 
vol. 46, no. 3, p. 162, Apr. 1995.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Ortuno, P. Carpena, P. Bernala-Galvan, E. Munoz, and A. M. Somoza, "Keyword detection in natural languages and DNA," Europhysics Lett., vol. 57, no. 5, pp. 759-764, Mar. 2002.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Beliga, A. Mestrovic, and S. Martincic-Ipsic, "An overview of graph-based keyword extraction methods and approaches," Inf. Organ. Sci., vol. 39, no. 1, pp. 1-20, Jun. 2015.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	R. Hussey, S. Williams, and R. Mitchell, "Automatic keyphrase extraction: a comparison of methods," in Proc. Int. Conf. on Information Processing and Knowledge Management, pp. 18-23, Jan. 2012.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Y. HaCohen-Kerner, S. Vrochidis, D. Liparas, A. Moumtzidou, and I. Kompatsiaris, "Keyphrase extraction using textual and visual features," in Proc. 25th Int. Conf. Comput. Linguist., pp. 121-123, Aug. 2014.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Y. Zhang, R. Mukherjee, and B. Soetarman, "Concept extraction and e-commerce applications," Electronic Commerce Research and Applications, vol. 12, no. 4, pp. 289-296, Aug. 2013.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	D. Glinos, Syntax-Based Concept Extraction for Question Answering, Doctoral Dissertation, University of Central Florida Orlando, Florida, 2006.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	N. A. Bennett, Q. He, C. T. K. Chang, and B. R. Schatz, Concept Extraction in the Interspace Prototype, Urbana Champaign, 1999.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	B. Gelfand, M. Wulfekuler, and W. Punch, "Automated concept extraction from plain text," in Proc. AAAI Workshop on Text Categorization, pp. 13-17, Jul. 1998.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	P. M. Ramirez and C. A. Mattmann, "ACE: improving search engines via automatic concept extraction," in Proc. Int. Conf. on Information Reuse and Integration, IRI, pp. 229-234, Nov. 2004.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	S. Mohamadi, K. Badie, and A. Moeini, "Using frame-based lexical chains for extracting key points from texts," in Proc. the 3rd Int. Conf. on Creteave Content Technologies, CONTENT'11, pp. 68-73, Sept. 2011.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	R. Barzilay and M. Elhadad, "Using lexical chains for text summarization," in I. Mani and M. T. Maybury, Eds., Advances in Automatic Text Summarization, pp. 111-121, The MIT Press, Cambridge, 1999. </unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	S. Mohamadi and K. Badie, "Extracting key concept from English texts by the use of FrameNet," in Proc. 17th National CSI Computer Conf., pp. 384-389, , Mar. 2012. [in Persian]</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	M. Ajgalik, M. Barla, and M. Bielikova, "From ambiguous words to key-concept extraction," in Proc.-Int. Workshop on Database and Expert Systems Applications, DEXA'13, pp. 63-67, Aug. 2013.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	Y. Liu, M. Shi, and C. Li, "Domain ontology concept extraction method based on text," in Proc. 15th In. Conf. on Computer and Information Science, ICIS'16, 5 pp., Jun. 2016.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	M. Hearst, "TextTiling: segmenting text into multi-paragraph subtopic passages," Computational Linguistics, vol. 23, no. 1, pp. 33-64, Mar. 1997.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	F. Choi, "Advances in domain independent linear text segmentation," in Proc. of the 1st North American Chapter of the Association for Computational Linguistics Conf., pp. 26-33, Apr. 2000.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	D. Das, D. Chen, A. Martins, N. Schneider, and N. A. Smith, "Frame-semantic parsing," MIT Press J., Comput. Linguist., vol. 40, no. 1, pp. 9-56, Mar. 2014.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	K. Erk and S. Pado, "Shalmaneser-a toolchain for shallow semantic parsing," in Proc. of LREC, vol. 6, pp. 527-532, May 2006.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	R. Johannson, Language Technology at LTH, Lund University. http://nlp.cs.lth.se/software. Accessed on 12 Dec. 2016.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	R. Johansson and P. Nugues, "LTH: semantic structure extraction using nonprojective dependency trees," in Proc. of the 4th Int. Workshop on Semantic Evaluations, Association for Computational Linguistics, pp. 227-230, Jun. 2007.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	D. Das, No Title, Noah Smith’s NLP Group at Carnegie Mellon University, http://www.ark.cs.cmu.edu/SEMAFOR. Accessed on 2 Dec. 2016.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	D. Das, N. Schneider, D. Chen, and N. A. Smith, SEMAFOR 1.0: A Probabilistic Frame-Semantic Parser, Lang. Technol. Institute, Sch. Comput. Sci. Carnegie Mellon Univ., 2010.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	W. Gale, K. W. Church, and D. Yarowsky, "Estimating upper and lower bounds on the performance of word-sense disambiguation programs," in Proc. of 30th Annual Meeting on Association for Computational Linguistics. Association for Computational Linguistics, pp. 249-256, Jun. 1992.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	H. G. Silber and K. F. McCoy, "Efficient text summarization using lexical chains," in Proc. of 5th Int. Conf. on Intelligent User Interfaces, pp. 252-255, Jan. 2000.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>The Effect of Granularity on the Design of Decimal Arithmetic Reconfigurable Units</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Emami</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Sedighi</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2017</year></publication_date><pages><first_page>73</first_page><last_page>80</last_page></pages><doi_data><doi>10.66224/ijece.28239.15.1.73</doi><resource>http://ijece.org/en/Article/28239</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28239</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28239</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28239</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28239</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28239</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28239</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28239</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	H. H. Goldstine and A. Goldstine, "The electronic numerical integrator and computer (ENIAC)," IEEE Annals of the History of Computing, vol. 18, no. 1, pp. 10-16, Spring 1996.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	G. Gray, "UNIVAC I instruction set," Unisys History Newsletter, vol. 5, no. 3, pp. 1-3, Jun. 2001.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	F. E. Hamilton and E. C. Kubie, "The IBM magnetic drum calculator type 650," J. of ACM, vol. 1, no. 1, pp. 13-20, Jan. 1954.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. F. Cowlishaw, "Decimal floating-point: algorism for computers," in Proc. of the 16th IEEE Symp. on Computer Arithmetic, vol. 1, pp. 104-111, Jun. 2003.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	IBM Corporation, The Telco Benchmark, http://speleotrove.com/decimal/telcoSpec.html, Accessed on 26 Apr. 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	IEEE Standards Committee, "754-2008 IEEE standard for floating-point arithmetic," IEEE Computer Society Standard, pp. 1-58, Aug. 2008.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	N. Chainani, Decfloat: The Data Type of the Future, http://www.ibm.com/developerworks/data/library/techarticle/dm0801chainani/, Accessed on 26 Apr. 2017.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Cornea, Intel Decimal Floating-Ppoint Math Library, software.intel.com/en-us/blogs/2008/03/06/inteldecimal-floating-point-math-library, Accessed on 26 Apr. 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	GCC, The GNU Compiler Collection, http://www.gcc.gnu.org, Accessed on 26 Apr. 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Y. Duale, M. H. Decker, H. G. Zipperer, M. Aharoni, and T. J. Bohizic, "Decimal floating-point in Z9: an implementation and testing perspective," IBM J. Research and Development, vol. 51, no. 1, pp. 217-227, Jan. 2007.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	C. F. Webb, "IBM z10-the next-generation mainframe microprocessor," IEEE Micro, vol. 28, no. 2, pp. 19-29, May 2008.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Carlough, A. Collura, S. Mueller, and M. Kroener, "The IBM zEnterprise-196 decimal floating-point accelerator," in Proc. of the 20th IEEE Symp. on Computer Arithmetic, pp. 139-146, Jul. 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	L. K. Wang, C. Tsen, M. J. Schulte, and D. Jhalani, "Benchmarks and performance analysis of decimal floating-point applications," in Proc. of 25th Int. Conf. on Computer Design, pp. 164-170, Oct. 2007.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Anderson, C. Tsen, L. K. Wang, K. Compton, and M. J. Schulte, "Performance analysis of decimal floating-point libraries and its impact on decimal hardware and software solutions," in Proc. of 27th Int. Conf. on Computer Design, pp. 465-471, Oct. 2009.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	D. A. Buell and K. L. Pocek, "Custom computing machines: an introduction," J. of Supercomputing, vol. 9, no. 3, pp. 219-230, Sept. 1995.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. A. Hauck, T. W. Fry, M. M. Hosler, and J. P. Kao, "The chimaera reconfigurable functional unit," IEEE Trans. on Very Large Scale Integration (VLSI) Systems, vol. 12, no. 2, pp. 206-217, Feb. 2004.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. D. Kenney and M. J. Schulte, "High-speed multioperand decimal adders," IEEE Trans. on Computers, vol. 54, no. 8, pp. 953-963, Aug. 2005.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. Vazquez and E. Antelo, "Conditional speculative decimal addition," in Proc. of the 7th Conf. on Real Numbers and Computers, pp. 47-57, Jul. 2006.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. Gorgin and G. Jaberipur, "A fully redundant decimal adder and its application in parallel decimal multipliers," Microelectronics J., 
vol. 40, no. 10, pp. 1471-1481, Oct. 2009.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Vazquez, E. Antelo, and J. D. Bruguera, "Fast radix-10 multiplication using redundant BCD codes," IEEE Trans. on Computers, vol. 63, no. 8, pp. 1902-1914, Aug. 2014.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	P. Chawla, P. Palsodkar, and S. Sheikh, "Hardware efficient reconfigurable arithmetic unit," in Proc. of the Int. Conf. on Advances in Computer Science and Electronics Engineering, pp. 159-163, Jan. 2012.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	W. Haller, W. H. Li, M. R. Kelly, and H. Wetter, Highly Parallel Structure for Fast Cycle Binary and Decimal Adder Unit, International Business Machines Corporation, US Patent 2006/0031289, 8 pp., 2006.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	H. Calderon, G. Gaydadjiev, and S. Vassiliadis, "Reconfigurable universal adder," in Proc. of IEEE Int. Conf. on Application-Specific Systems, Architecture Processors, pp. 186-191, Jul. 2007.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. Veeramachaneni, M. Kirthi Krishna, V. Prateek, S. Subroto, S. Bharat, and M. B. Srinivas, "A novel carry-look ahead approach to a unified BCD and binary adder/subtractor," in Proc. 21st Int. Conf. on VLSI Design, pp. 547-552, Jan. 2008.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. Tyagi, A. Vaishist, and K. Khare, "A novel hardware efficient reconfigurable 32-bit arithmetic unit for binary, BCD and floating point operands," International J. of Engineering Science and Technology, vol. 3, no. 5, pp. 4449-4464, May 2011.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Dorrigiv and G. Jaberipur, "Low area/power decimal addition with carry-select correction and carry-select sum-digits," Integration, the VLSI J., vol. 47, no. 4, pp. 443-451, Sept. 2014.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	S. Ganguly, A. Mittal, and S. E. Ahmed, "A reconfigurable parallel prefix ling adder with modified enhanced flagged binary logic," in Proc. Asia Pacific Conf. on Postgraduate Research in Microelectronics and Electronics, PrimeAsia'12, 7 pp., Dec. 2012.
[28]	A. Nannarelli, "FPGA based acceleration of decimal operations," in Proc. Int. Conf. on Reconfigurable Computing and FPGAs, 
pp. 146-151, Dec. 2011.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	A. Vazquez and F. de Dinechin, Multi-Operand Decimal Tree Adders for FPGAs, INRIA, Research Report, 2010.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	Xilinx Inc, Virtex-6 User Guide, http://www.xilinx.com/, Accessed on 26 Apr. 2017.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	M. Baesler and T. Teufel, "FPGA implementation of a decimal floating-point accurate scalar product unit with a parallel fixed-point multiplier," in Proc. of Int. Conf. on Reconfigurable Computing and FPGAs, pp. 6-11, Dec. 2009.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	G. Biaul, M. Vazquez, J. P. Deschamps, and G. Sutter, "Decimal addition in FPGA," in Proc. of 5th Southern Conf. on Programmable Logic, pp. 101-108, Apr. 2009.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	G. Sutter, E. Todorovich, G. Bioul, M. Vazquez, and G. P. Deschamps, "FPGA implementations of BCD multipliers," in Proc. of IEEE Int. Conf. on Reconfigurable Computing and FPGAs, pp. 36-41, Dec. 2009.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	M. Vazquez, G. Sutter, J. P. Deschamps, and G. Bioul, " Decimal adders/subtractors in FPGA: efficient 6-input LUT implementations," in Proc. of Int. Conf. on Reconfigurable Computing and FPGAs, pp. 42-47, Dec. 2009.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	I. Koren, Computer Arithmetic Algorithms, A. K. Peters, Natic, Massachusetts, pp. 116-119, 2002.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	M. A. Erle and M. J. Schulte, "Decimal multiplication via carry-save addition," in Proc. of IEEE Int. Conf. on Application-Specific Systems, Architecture Processors, pp. 348-359, Jun. 2003.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	B. Hickmann, A. Krioukov, M. Schulte, and M. Erle, "A parallel IEEE 754 decimal floating-point multiplier," in Proc. of 25th Int. Conf. on Computer Design, pp. 296-303, Oct. 2007.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	S. Gorgin, G. Jaberipur, and B. Parhami, "Design and evaluation of decimal array multipliers," in Proc. 43rd Asilomar Conf. on Signals, Systems and Computers, pp. 1782-1786, Nov. 2009.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	S. Gorgin, G. Jaberipur, and R. Hashemi-Asl, "Efficient ASIC and FPGA implementation of binary coded decimal digit multipliers," Circuits, Systems and Signal Processing, vol. 33, no. 12, pp. 3883-3899, Dec. 2014.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[40]	T. Ueda, Decimal Multiplying Assembly and Multiply Module, US Patent 5379245, 1995.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>