﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051922</doi_batch_id><timestamp>20260519223118</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>11</month><day>17</day><year>2021</year></publication_date><journal_volume><volume>19</volume></journal_volume><issue>2</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Improved Semi-Quantum Direct Communication Protocol</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Z.</given_name><surname>rashidi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>hooshmand</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2021</year></publication_date><pages><first_page>136</first_page><last_page>142</last_page></pages><doi_data><doi>10.66224/ijece.28750.19.2.136</doi><resource>http://ijece.org/en/Article/28750</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28750</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28750</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28750</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28750</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28750</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28750</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28750</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Boyer, D. Kenigsberg, and T. Mor, "Quantum key distribution with classical Bob," in Proc. IEEE 1st Int. Conf. on Quantum, Nano, and Micro Technologies, ICQNM'07, pp. 10-10, Guadeloupe, French, 2-6 Jan. 2007.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	م. هوشمند و ش. حسن‌پور، "ارتباط مستقیم امن کوانتومی کنترل‌شده با هدف افزایش بازدهی،" مجموعه مقالات يازدهمين کنفرانس بین‌المللی انجمن رمز ایران، 6 صص.، تهران، ايران، 12-11 شهريور 1393.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	G. E. Moore, "Cramming more components onto integrated circuits," Proceedings of the IEEE, vol. 86, no. 1, pp. 82-85, Jan. 1998.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, Cambridge University Press, 2001.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	T. P. Spiller, W. J. Munro, S. D. Barrett, and P. Kok, "An introduction to quantum information processing: applications and realizations," Contemporary Physics, vol. 46, no. 6, pp. 407-436, 2005.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	D. C. Marinescu and G. M. Marinescu, Approaching Quantum Computing, pp. 1-41, Pearson/Prentice Hall, 2005.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Nakahara and T. Ohmi, Quantum Computing: From Linear Algebra to Physical Realizations, CRC Press, 2008.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. P. Feynman, "Simulating physics with computers," International J. of Theoretical Physics, vol. 21, no. 6/7, pp. 467-488, 1982.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	L. K. Grover, "A fast quantum mechanical algorithm for database search," in Proc. of the 28th Annual ACM Symp. on Theory of Computing, STOC’96, pp. 212-219, Philadelphia, PA, USA, 22-24 May 1996.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," in Proc. IEEE 35th Annual Symp. on Foundations of Computer Science, pp. 124-134, Santa Fe, NM, USA, 20-22 Nov. 1994.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Wiesner, "Conjugate coding," ACM Sigact News, vol. 15, no. 1, pp. 78-88, Jan. 1983.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	C. H. Bennett, G. Brassard, S. Breidbart, and S. Wiesner, "Quantum cryptography, or unforgeable subway tokens," Advances in Cryptology: Proceedings of CRYPTO '82, pp. 267-275, Santa Barbara, CA, USA, 23-25 Aug 1982.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	C. H. Bennett and G. Brassard, "Quantum cryptography: public key distribution and coin tossing," Theor. Comput. Sci., vol. 560, pp. 7-11, 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	م. هوشمند، م. خرم‌پناه و ر. ساروقی، "ارسال محرمانه اطلاعات به کمک کیوبیت‌های درهم‌تنیده،" مجموعه مقالات نهمين کنفرانس بین‌المللی رمز ایران، 5 صص. تبريز، ايران، 24-23 شهريور 1391.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	X. Zou and D. Qiu, "Three-step semiquantum secure direct communication protocol," Science China Physics, Mechanics &amp; Astronomy, vol. 57, no. 9, pp. 1696-1702, 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	K. Thapliyal and A. Pathak, "Applications of quantum cryptographic switch: various tasks related to controlled quantum communication can be performed using bell states and permutation of particles," Quantum Information Processing, vol. 14, no. 7, pp. 2599-2616, 2015.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Y. P. Luo and T. Hwang, "Authenticated semi-quantum direct communication protocols using bell states," Quantum Information Processing, vol. 15, no. 2, pp. 947-958, 2016.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	C. Shukla, K. Thapliyal, and A. Pathak, "Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue," Quantum Information Processing, vol. 16, no. 12, Article No.: 295, 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	H. Lu, M. Barbeau, and A. Nayak, "Economic no-key semi-quantum direct communication protocol," in Proc. IEEE Globecom Workshops, GC Wkshps’2017, 7 pp., Singapore, Singapore, 4-8 Dec. 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	J. Gu, P. H. Lin, and T. Hwang, "Double C-NOT attack and counterattack on ‘three-step semi-quantum secure direct communication protocol’," Quantum Information Processing, vol. 17, no. 7, Article No.: 182, 8 pp., Jul. 2018.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	C. Xie, L. Li, H. Situ, and J. He, "Semi-quantum secure direct communication scheme based on bell states," International J. of Theoretical Physics, vol. 57, no. 6, pp. 1881-1887, 2018.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	W. Zhang, D. Qiu, and P. Mateus, "Security of a single-state semi-quantum key distribution protocol," Quantum Information Processing, vol. 17, no. 4, Article No.: 2050013, 21 pp., 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	L. C. Xu, H. Y. Chen, N. R. Zhou, and L. H. Gong, "Multi-party semi-quantum secure direct communication protocol with cluster states," International J. of Theoretical Physics, vol. 49, no. 1, Article No.: 1950004, 10 Jan. 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	F. G. Deng and G. L. Long, "Controlled order rearrangement encryption for quantum key distribution," Physical Review A, 
vol. 68, no. 4, Article No.: 042315, Oct. 2003.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Computing Colored Average Degree of Graphs in Sublinear Time</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad Ali</given_name><surname>Abam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>محمدرضا</given_name><surname>بهرامی</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2021</year></publication_date><pages><first_page>143</first_page><last_page>148</last_page></pages><doi_data><doi>10.66224/ijece.28837.19.2.143</doi><resource>http://ijece.org/en/Article/28837</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28837</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28837</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28837</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28837</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28837</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28837</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28837</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	R. Rubinfeld and A. Shapira, "Sublinear time algorithms," SIAM J. on Discrete Mathematics, vol. 25, no. 4, pp. 1562-15882011.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Dasgupta, R. Kumar, and T. Sarlos, "On estimating the average degree," in Proc. 23rd  Int. Conf. on World Wide Web, WWW’14, pp. 795-806, Seoul, South Korea, 7-11 Apr. 2014.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	O. Goldreich, "Introduction to testing graph properties," Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation, pp. 470-506, 2011.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	O. Goldreich and D. Ron, "Approximating average parameters of graphs," Random Structures and Algorithms, vol. 32, no. 4, pp. 473-493, 2008.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	O. Goldreich and D. Ron, "Estimating simple graph parameters in sublinear time," Encyclopedia of Algorithms, pp. 650-653, 2016.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R. Canetti, G. Even, and O. Goldreich, "Lower bounds for sampling algorithms for estimating the average," Information Processing Letters, vol. 53, no. 1, pp. 17-25, 13 Jan. 1995.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Motwani, R. Panigrahy, and Y. Xu, "Estimating sum by weighted sampling," in Proc. Int. Colloquium on Automata, Languages, and Programming, ICALP’07, pp. 53-64, Wroclaw, Poland, 9-13 Jul. 2007.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 3rd Edition, MIT Press, 2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	U. Feige, "On sums of independent random variables with unbounded variance and estimating the average degree in a graph," SIAM J. on Computing, vol. 35, no. 4, pp. 964-984, 2006.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	T. Kaufman, M. Krivelevich, and D. Ron, "Tight bounds for testing bipartiteness in general graphs," SIAM J. on Computing, vol. 33, 
no. 6, pp. 1441-1483, 2004.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	O. Goldreich and D. Ron, "On estimating the average degree of a graph," Electronic Colloquium on Computational Complexity, vol. 11, Article 13, 9 pp., 2004.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Transfer Learning Algorithm to Improve the Convergence Rate and Accuracy in Cellular Learning Automata</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Seyyed Amir Hadi</given_name><surname>Minoofam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Azam</given_name><surname>Bastanfard</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. R. </given_name><surname>Keyvanpour</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2021</year></publication_date><pages><first_page>69</first_page><last_page>80</last_page></pages><doi_data><doi>10.66224/ijece.28875.19.2.69</doi><resource>http://ijece.org/en/Article/28875</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28875</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28875</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28875</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28875</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28875</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28875</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28875</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. A. H. Minoofam and A. Bastanfard, "Square kufic pattern formation by asynchronous cellular automata," in Proc. Int Conf. on Cellular Automata, pp. 79-82, Ascoli Piceno, Italy, 21-24 Sept. 2010.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. A. H. Minoofam and A. Bastanfard, "A novel algorithm for generating Muhammad pattern based on cellular automata," in Proc. WSEAS 13th Int. Conf. on Applied, pp. 339-344, Puerto De La Cruz, Spain, 15-17 Dec. 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	E. Fredkin, "An informational process based on reversible universal cellular automata," Phys. D Nonlinear Phenom., vol. 45, no. 1-3, pp. 254-270, Sept. 1990.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. A. H. Minoofam, M. M. Dehshibi, A. Bastanfard, and P. Eftekhari, "Ad-hoc ma'qeli script generation using block cellular automata," J. Cell. Autom., vol. 7, pp. 321-334, 2012.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Wolfram, Cellular Automata and Complexity: Collected Papers, CRC Press, 2018.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. L. Schiff, Cellular Automata: A Discrete View of the World, vol. 45, John Wiley &amp; Sons, 2011.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. A. H. Minoofam, M. M. Dehshibi, A. Bastanfard, and J. Shanbehzadeh, "Pattern formation using cellular automata and L-systems: a case study in producing Islamic patterns," in Cellular Automata in Image Processing and Geometry, Ch. 12, pp. 233-252, Switzerland: Springer, 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	K. S. Narendra and M. A. L. Thathachar, "Learning automata-a survey," IEEE Trans. Syst. Man. Cybern., vol. 4, no. 4, pp. 323-334, Jul. 1974.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	F. Esmaeily and M. R. Keyvanpour, "WMat algorithm based on Q-Learning algorithm in taxi-v2 game," in Proc. 4th Int. Conf. on Smart City, Internet of Things and Applications, SCIOT’20, pp. 112-118, Mashhad, Iran, 16-17 Sept. 2020.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Rezvanian, A. M. Saghiri, S. M. Vahidipour, M. Esnaashari, and M. R. Meybodi, Recent Advances in Learning Automata. Springer, 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Z. Movahedi and A. Bastanfard, "Toward competitive multi-agents in polo game based on reinforcement learning," Multimed. Tools Appl., vol. 80, no. 17, pp. 26773–26793, May 2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Savargiv, B. Masoumi, and M. R. Keyvanpour, "A new random forest algorithm based on learning automata," Comput. Intell. Neurosci., vol. 2021, Article No.: 5572781, 19 pp., 2021.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. A. H. Minoofam and A. Bastanfard, "Learning automata: a comparative analysis of estimator algorithms," in Proc. 25th Iran. Conf. Electr. Eng., pp. 1772-1778, Tehran, Iran, 2-4 May 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. A. L. Thathachar and P. S. Sastry, Networks of Learning Automata: Techniques for Online Stochastic Optimization, Springer Science &amp; Business Media, 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Savargiv, B. Masoumi, and M. R. Keyvanpour, "A new ensemble learning method based on learning automata," J. Ambient Intell. Humaniz. Comput., vol. 11, no. 4, pp. 1-16, Apr. 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. R. Meybodi, H. Beigy, and M. Taherkhani, "Cellular learning automata and its applications," Sharif J. Sci. Technol., vol. 19, no. 25, pp. 54-77, Autumn 2003.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	H. Beigy and M. R. Meybodi, "A mathematical framework for cellular learning automata," Adv. Complex Syst., vol. 7, no. 03n04, pp. 295-319, 2004.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. N. Qureshi, M. I. Tiwana, and M. Haddad, "Distributed self optimization techniques for heterogeneous network environments using active antenna tilt systems," Telecommun. Syst., vol. 70, no. 3, pp. 379-389, Jul. 2019.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Torshizi and M. J. Sheikhzadeh, "Optimum k-coverage in wireless sensor network with no redundant node by cellular learning automata," Wirel. Pers. Commun., vol. 110, no. 2, pp. 1-18, Oct. 2019.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. J. Moghaddam, A. Esmaeilzadeh, M. Ghavipour, and A. K. Zadeh, "Minimizing virtual machine migration probability in cloud computing environments," Cluster Comput., vol. 23, no. 4, pp. 3029-3038, Feb. 2020.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. K. Sohrabi and R. Roshani, "Frequent itemset mining using cellular learning automata," Comput. Human Behav., vol. 68, no. C, pp. 244-253, Mar. 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	ا. حضرتی بی‌شک،  ک. فائز،  ح. برقی جند و س. قطعی "انتخاب زیرمجموعه بهینه از ویژگی‌های استخراج‌شده توسط عملگر بهینه‌شده LBP بر مبنای  CLA - EC در سیستم بازشناسی چهره،" نشریه مهندسی برق و مهندسی كامپیوتر ایران، ب- مهندسی کامپیوتر، سال 12، شماره 2، صص. 74-67، زمستان 1393.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	C. Di, B. Zhang, Q. Liang, S. Li, and Y. Guo, "Learning automata-based access class barring scheme for massive random access in machine-to-machine communications," IEEE Internet Things J., 
vol. 6, no. 4, pp. 6007-6017, Aug. 2018.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	م. رضاپور میرصالح و م. ر. میبدی "ارائه يک مدل جديد ممتيکي مبتني بر اتوماتاي يادگير ساختار ثابت،" نشریه مهندسی برق و مهندسی كامپیوتر ایران، ب- مهندسی کامپیوتر، سال 16، شماره 3، صص. 195-183، پاییز 1397.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	م. ر. ملاخلیلی میبدی و م. ر. میبدی، "یک معیار مبتنی بر واریانس برای ارزیابی یادگیری آتاماتای یادگیر ‏در حل مسایل بهینه‌سازی گراف تصادفی،" نشریه مهندسی برق و مهندسی كامپیوتر ایران، ب- مهندسی کامپیوتر، سال 15، 
شماره 1، صص. 13-1، بهار 1396.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	م. ر. ملاخلیلی میبدی و م. ر. میبدی، "یک چارچوب مبتنی بر آتاماتای یادگیر توزیع شده توسعه یافته برای حل مسأله یافتن زیرگراف بهینه تصادفی،" نشریه مهندسی برق و مهندسی كامپیوتر ایران، ب- مهندسی کامپیوتر، سال 12، 
شماره 2، صص. 95-85، زمستان 1393.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	م. طهماسبی، ف. فتوحی و م. اسماعیلی، "پیشنهاد‌دهنده تطبیقی منابع آموزشی بر اساس سبک یادگیری، بازخورد کاربر و الگوریتم اتوماتای یادگیر،" نشریه مهندسی برق و مهندسی كامپیوتر ایران، ب- مهندسی کامپیوتر، سال 18، شماره 1، 
صص. 71-60، بهار 1398.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	م. ر. خجسته و م. ر. میبدی، "همکاری در سیستم¬های چند عامله با استفاده از اتوماتاهای یادگیر،" نشریه مهندسی برق و مهندسی كامپیوتر ایران، سال 1، 
شماره 2، صص. 11-81، پاییز و زمستان 1382.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	ب. معصومی و م. ر. میبدی، "مدلی مبتنی بر آنتروپی و اتوماتاهاي یادگیر برای حل بازی‌های تصادفی،" نشریه مهندسی برق و مهندسی كامپیوتر ایران، سال 8، 
شماره 2، صص. 106-97، تابستان 1389.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	A. Rezvanian, B. Moradabadi, M. Ghavipour, M. M. D. Khomami, and M. R. Meybodi, Learning Automata Approach for Social Networks, vol. 820, Springer 2019.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	س. روح¬الهی، ع. خطیبی بردسیری و ف. کی¬نیا،" نمونه¬گیری از شبکه¬های اجتماعی به کمک بهره گیری از واحد ارزیاب در ماشین های یادگیر با ساختار ثابت،" مجله هوش مصنوعی و داده¬کاوی، سال 8، شماره 1، صص. 148-127، زمستان 1399.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	T. Tommasi, F. Orabona, and B. Caputo, "Learning categories from few examples with multi model knowledge transfer," IEEE Trans. Pattern Anal. Mach. Intell., vol. 36, no. 5, pp. 928-941, May 2014.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	L. Fei-Fei, R. Fergus, and P. Perona, "One-shot learning of object categories," IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 4, pp. 594-611, Feb. 2006.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	S. Rahman, S. Khan, and F. Porikli, "A unified approach for conventional zero-shot, generalized zero-shot, and few-shot learning," IEEE Trans. Image Process., vol. 27, no. 11, pp. 5652-5667, Jul. 2018.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	X. Dong, L. Zheng, F. Ma, Y. Yang, and D. Meng, "Few-example object detection with model communication," IEEE Trans. Pattern Anal. Mach. Intell., vol. 41, no. 7, pp. 1641-1654, Jun. 2018.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	A. Rezvanian and M. R. Meybodi, "LACAIS: learning automata based cooperative artificial immune system for function optimization," in Proc. Int. Conf. on Contemporary Computing, vol. 2, pp. 64-75, Noida, India, August 9-11 Aug. 2010.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	M. Mozafari, M. E. Shiri, and H. Beigy, "A cooperative learning method based on cellular learning automata and its application in optimization problems," J. Comput. Sci., vol. 11, no. 1, pp. 279-288, Nov. 2015.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	M. R. Khojasteh and M. R. Meybodi, "Evaluating learning automata as a model for cooperation in complex multi-agent domains," Robot Soccer World Cup, vol. 4434, pp. 410-417, 19-20 Jun. 2006.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	F. Zhuang, et al., A Comprehensive Survey on Transfer Learning, arXiv Prepr. arXiv1911.02685, 2019.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	Z. Wan, R. Yang, M. Huang, N. Zeng, and X. Liu, "A review on transfer learning in EEG signal analysis," Neurocomputing, vol. 421, pp. 1-14, 15 Jan. 2021.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	S. J. Pan and Q. Yang, "A survey on transfer learning," IEEE Trans. Knowl. Data Eng., vol. 22, no. 10, pp. 1345-1359, Oct. 2010.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	R. Vafashoar, H. Morshedlou, A. Rezvanian, and M. R. Meybodi, "Learning from multiple reinforcements in cellular learning automata," in Cellular Learning Automata: Theory and Applications, Springer, vol. 307, pp. 111-156, 2021.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	M. M. D. Khomami, A. Rezvanian, A. M. Saghiri, and M. R. Meybodi, "Overlapping community detection in social networks using cellular learning automata," in Proc. 28th Iranian Conf. on Electrical Engineering, 6 pp., Tabriz, Iran, 4-6 Aug. 2020.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	H. Beigy and M. R. Meybodi, "Open synchronous cellular learning automata," Adv. Complex Syst., vol. 10, no. 04, pp. 527-556, Dec. 2007.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	H. Beigy and M. R. Meybodi, "Asynchronous cellular learning automata," Automatica, vol. 44, no. 5, pp. 1350-1357, May 2008.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	M. Esnaashari and M. R. Meybodi, "Irregular cellular learning automata," IEEE Trans. Cybern., vol. 45, no. 8, pp. 1622-1632, Oct. 2014.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	M. Ahangaran, N. Taghizadeh, and H. Beigy, "Associative cellular learning automata and its applications," Appl. Soft Comput., vol. 53, pp. 1-18, Apr. 2017.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	A. M. Saghiri and M. R. Meybodi, "An adaptive super-peer selection algorithm considering peers capacity utilizing asynchronous dynamic cellular learning automata," Appl. Intell., vol. 48, no. 2, pp. 271-299, Jul. 2018.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	R. Vafashoar, H. Morshedlou, A. Rezvanian, and M. R. Meybodi, "Cellular learning automata for collaborative loss sharing," in Cellular Learning Automata: Theory and Applications, vol. 307, pp. 255-284, Springer, 2021.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50]	M. M. D. Khomami, A. Rezvanian, A. M. Saghiri, and M. R. Meybodi, "Utilizing cellular learning automata for finding communities in weighted networks," in Proc.  6th In. Conf. on Web Research, ICWR’20, pp. 325-329, Tehran, Iran, 22-23 Apr. 2020.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51]	M. M. D. Khomami, A. Rezvanian, A. M. Saghiri, and M. R. Meybodi, "SIG-CLA: a significant community detection based on cellular learning automata," in Proc.  8th Iranian Joint Congress on Fuzzy and Intelligent Systems, CFIS’20, pp. 39-44, Mashhad, Iran, 2-4 Sept. 2020.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52]	L. Zuo, M. Jing, J. Li, L. Zhu, K. Lu, and Y. Yang, "Challenging tough samples in unsupervised domain adaptation," Pattern Recognit., vol. 110, Article No.: 107540, Feb. 2021.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53]	S. Niu, Y. Liu, J. Wang, and H. Song, "A decade survey of transfer learning (2010-2020)," IEEE Trans. Artif. Intell., vol. 1, no. 2, pp. 151-166, Feb. 2020.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[54]	D. Sarkar, R. Bali, and T. Ghosh, Hands-On Transfer Learning with Python: Implement Advanced Deep Learning and Neural Network Models Using TensorFlow and Keras, Packt Publishing Ltd, 2018.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[55]	M. Arora, P. Mangipudi, and M. K. Dutta, "Deep learning neural networks for acrylamide identification in potato chips using transfer learning approach," J. Ambient Intell. Humaniz. Comput., vol. 2, no. 12, pp. 10601-10614, Jan. 2021.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[56]	Q. Yang, Y. Zhang, W. Dai, and S. J. Pan, Transfer Learning, Cambridge University Press, 2020.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[57]	Q. Sun, Y. Liu, Z. Chen, T. S. Chua, and B. Schiele, "Meta-transfer learning through hard tasks," IEEE Trans. Pattern Anal. Mach. Intell., Early access, Aug. 2020.</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[58]	B. Al-Helali, Q. Chen, B. Xue, and M. Zhang, "Multi-tree genetic programming with new operators for transfer learning in symbolic regression with incomplete data," IEEE Trans. Evol. Comput., Early access,, May 2021.</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[59]	Q. Gu, Q. Dai, H. Yu, and R. Ye, "Integrating multi-source transfer learning, active learning and metric learning paradigms for time series prediction," Appl. Soft Comput., vol. 109, Article No.: 107583, Sept. 2021</unstructured_citation></citation><citation key="ref60"><unstructured_citation>.
[60]	R. Vafashoar, H. Morshedlou, A. Rezvanian, and M. R. Meybodi, Cellular Learning Automata: Theory and Applications, Springer 2019.</unstructured_citation></citation><citation key="ref61"><unstructured_citation>
[61]	M. He, J. Zhang, and J. Zhang, "Restoring latent factors against negative transfer using partial-adaptation nonnegative matrix factorization," CCF Trans. Pervasive Comput. Interact., vol. 2, 
no. 1, pp. 42-50, Oct. 2020.</unstructured_citation></citation><citation key="ref62"><unstructured_citation>
[62]	C. Di, S. Li, F. Li, and K. Qi, "A novel framework for learning automata: a statistical hypothesis testing approach," IEEE Access, vol. 7, pp. 27911-27922, Feb. 2019.</unstructured_citation></citation><citation key="ref63"><unstructured_citation>
[63]	A. M. Saghiri and M. R. Meybodi, "On expediency of closed asynchronous dynamic cellular learning automata," J. Comput. Sci., vol. 24, no. 1, pp. 371-378, Jan. 2018.</unstructured_citation></citation><citation key="ref64"><unstructured_citation>
[64]	H. Ge, H. Huang, Y. Li, S. Li, and J. Li, "Two approaches on accelerating bayesian two action learning automata," in Proc. Int.Conf. on Intelligent Computing, pp. 239-247, Lanzhou, China, 2-5 Aug. 2016.</unstructured_citation></citation><citation key="ref65"><unstructured_citation>
[65]	H. Ge, Y. Yan, J. Li, Y. Guo, and S. Li, "A parameter-free gradient bayesian two-action learning automaton scheme," in Proc. of the  Int Conf. on Communications, Signal Processing, and Systems, pp. 963-970, Chengdu, China, 23-24 Oct. 2016.</unstructured_citation></citation><citation key="ref66"><unstructured_citation>
[66]	Y. Guo, H. Ge, and S. Li, "A loss function based parameterless learning automaton scheme," Neurocomputing, vol. 260pp. 331-340, Oct. 2017.</unstructured_citation></citation><citation key="ref67"><unstructured_citation>
[67]	Y. Guo and S. Li, "A non-monte-carlo parameter-free learning automata scheme based on two categories of statistics," IEEE Trans. Cybern., vol. 49, no. 12, pp. 4153-4166, Aug. 2018.</unstructured_citation></citation><citation key="ref68"><unstructured_citation>
[68]	H. Ge, J. Li, S. Li, W. Jiang, and Y. Wang, "A novel parallel framework for pursuit learning schemes," Neurocomputing, vol. 228, pp. 198-204, Mar. 2017.</unstructured_citation></citation><citation key="ref69"><unstructured_citation>
[69]	D. Neider, R. Smetsers, F. Vaandrager, and H. Kuppens, "Benchmarks for automata learning and conformance testing," in Models, Mindsets, Meta: the What, the How, and the Why Not?, pp. 390-416, Springer, 2019.</unstructured_citation></citation><citation key="ref70"><unstructured_citation>
[70]	C. Carson, S. Belongie, H. Greenspan, and J. Malik, "Blobworld: image segmentation using expectation-maximization and its application to image querying," IEEE Trans. Pattern Anal. Mach. Intell., vol. 24, no. 8, pp. 1026-1038, Nov. 2002.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Presenting a Multi-Criteria QoS-Aware Fault Tolerant Routing Algorithm for Network-On-Chips</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Alireza</given_name><surname>Mahjoub</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Fatemeh</given_name><surname>Vardi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Roya</given_name><surname>Rad</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2021</year></publication_date><pages><first_page>93</first_page><last_page>105</last_page></pages><doi_data><doi>10.66224/ijece.28940.19.2.93</doi><resource>http://ijece.org/en/Article/28940</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28940</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28940</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28940</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28940</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28940</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28940</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28940</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K. Lahiri, A. Raghunathan, and S. Dey, "Evaluation of the traffic-performance characteristics of system-on-chip communication architectures," in Proc. of the 14th Int. Conf. on VLSI Design. IEEE, pp. 29-35, Bangalore, India, 7- Jan. 2001.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	T. Bjerregaard and S. Mahadevan, "A survey of research and practices of network-on-chip," ACM Computing Surveys J., vol. 38, no. 1, Article No. 1-es, Jun. 2006.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	L. Benin and G. De Micheli, "Networks on chips: a new SoC paradigm," Computer, vol. 35, no. 1, pp. 70-78, Jan. 2002.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	R. Kamal, P. Goyal, and V. Nehra, "Network on chip: topologies, routing, implementation," International J. of Advances in Science and Technology, vol. 4, no. 1, pp. 24-34, Feb. 2012.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Duato and S.Y alamanchili, Interconnection Networks - An Engineering Approach, Morgan Kaufmann, 2003.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Ben Achballah, S. Ben Othman, and S. Ben Saoud, "Problems and challenges of emerging technology networks-on-chip: a review," Microprocessors and Microsystems, vol. 53, pp. 1-20, Aug. 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. K. Rahimi and F. S. Haug, Distributed Database Management Systems: A Practical Approach, Wiley, 2010.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Konstantinidou and L. Snyder, "The chaos router," IEEE Trans. on Computers, vol. 43, no. 12, pp. 1386-1397, Dec. 1994.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Atagoziyev, Routing Algorithms for on Chip Networks, MSc. Thesis in Electrical and Electronics Engineering, Middle East Technical University, 2007.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	P. Lotfi-Kamran, A. M. Rahmani, M. Daneshtalab, and A. Afzali-Kusha, "EDXY-a low cost congestion-aware routing algorithm for network-on-chips," J. of Systems Architecture, vol. 56, no. 7, pp. 256-264, Jul. 2010.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Hu and R. Marculescu, "DyAD-smart routing for networks-on-chip," in Proc. 41st Design Automation Conf., pp. 260-263, San Diego, CA, USA, 7-11 Jul. 20042004.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Li, Q. Zeng, and W. Jone, "DyXY-a proximity congestion-aware deadlock-free dynamic routing method for network on chip," in Proc. 43rd ACM/IEEE Design Automation Conf, pp. 849-852, San Francisco, CA, USA, 24-28 Jul. 2006</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	G. M. Chiu, "The odd-even turn model for adaptive routing," IEEE Trans. on Paralleland Distributed Systems, vol. 11, no. 7, pp. 729-738, Jul.. 2000.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	N. Dahir, T. Mak, R. Al-Dujaily, and A. Yakovlev, "Highly adaptive and deadlock-free routingfor three-dimensional network-on-chip," Computers and Digital Techniques, IET, vol. 7, no. 6, pp. 255-263, Nov. 2013.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	R. Saini and M. Ahmed, "Restricted turn model fault tolerant routing techniques for 3D mesh network-on-chip: an evaluation," in Proc. of Int. Congress on Information and Communication Technology, ICICT’16, pp. 113-122, Bangkok, Thailand, 12-13 Dec. 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Z. Lu, A. Jantsch, and L. Ji, "A reconfigurable fault-tolerant deflection routing algorithm based on reinforcement learning for network-on-chip," in Proc. of the 3rd Int. Workshop on Network on Chip Architectures, pp. 11-16, Atlanta, GA, USA, 4-4 Dec. 2010.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. Liu, J. Harkin, Y. Li, and L. Maguire, "Low cost fault-tolerant routing algorithm for networks-on-chip," Microprocessors and Microsystems, vol. 39, no. 6, pp. 358-372, Aug. 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	D. Sinha, A. Roy, K. V. Kumar, P. Kulkarni, and J. Soumya, "Dn-FTR: fault-tolerant routing algorithm for mesh based network-on-chip," in Proc. 4th Int'l Conf. on Recent Advances in Information Technology RAIT’18, 5 pp., Dhanbad, India, 15-17 Mar. 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. Khichar and S. Choudhary, "Fault aware adaptive routing algorithm for mesh based NoCs," in Proc. Int. Conf. on Inventive Computing and Informatics, ICICI’17, pp. 584-589, Coimbatore, India, 23-24 Nov. 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. F. Yota Kurokawa, "XY based fault-tolerant routing with the passage of faulty nodes," IET Computers &amp; Digital Techniques, 
vol. 13, no. 3, pp. 224-23, Nov. 2018.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Z. Zhang, W. Serwe, J. Wu, T. Yoneda, H. Zheng, and C. Myers, "An improved fault-tolerant routing algorithm for a network-on-chip derived with formal analysis," Science of Computer Programming, vol. 118, pp. 24-39, Mar. 2016.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	J. Wu, Z. Zhang, and C. Myers, A Fault-Tolerant Routing Algorithm for a Network-on-Chip Using a Link Fault Model, Virtual Worldwide Forum for PhD Researchers in Electronic Design Automation, 2011.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	E. K. Gawish, M. W. El-Kharashi, and M. F. Abu-Elyazeed, "Variability-tolerant routing algorithms for networks-on-chip," Microprocessors and Microsystems, vol. 38, no. 8, pt. B, pp. 1037-1045, Nov. 2014.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Y. Ren, L. Liu, S. Yin, Q. Wu, S. Wei, and J. Han, "A VLSI architecture for enhancing the fault tolerance of NoC using quad-spare mesh topology and dynamic reconfiguration," in Proc. IEEE Int. Symp. on Circuits and Systems, pp. 1793-1796, Beijing, China, 19-23 May 2013.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. Opricovic and G. H. Tzeng, "Compromise solution by MCDM methods: a comparative analysis of VIKOR and TOPSIS," European J. of Operational Research, vol. 156, no. 2, pp. 445-455, Jul. 2004.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	J. Kim, D. Park, T. Theocharides, N. Vijaykrishnan, and C. R. Das, "A low latency router supporting adaptivity for on-chip interconnects," in Proc. 42nd Annual Design Automation Conf., pp. 559-564, Anaheim, CA, USA, 13-17 Jun 2005.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	M. E. Shaheen and A. Abukmail, "A fault tolerant deadlock-free multicast algorithm for 2D mesh multicomputers," The J. of Management and Engineering Integration, vol. 5, no. 2, pp. 1-9, Winter 2012.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	A. Alhussien, C. Wang, and N. Bagherzadeh, "Design and evaluation of a high throughput robust router for network-on-chip," Digital Techniques, vol. 6, no. 3, pp. 173-179, May 2012.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	A. Alhussien, C. Wang, and N. Bagherzadeh, "Planar-adaptive routing: low-cost adaptive networks for multiprocessors," ACM J., vol. 42, no. 1, pp. 91-123, Jan. 1995.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	M. Palesi, D. Patti, and F. Fazzino, Noxim: Network on Chip Simulator, http://www.noxim.org, 2010".</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	G. Ascia, V. Catania, M. Palesi, and D. Patti, "Implementation and analysis of a new selection strategy for adaptive routing in networks-on-chip," IEEE Trans. on Computers, vol. 57, no. 6, pp. 809-820, Jun. 2008.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	P. A. Tsai, Y. H. Kuo, E. J. Chang, H. K. Hsin, and A. Y. Wu, "Hybrid path-diversity-aware adaptive routing with latency prediction model in network-on-chip systems," in Proc. Int. Symp. VLSI Design Autom. Test, 4 pp., Hsinchu, Taiwan, 22-24 Apr. 2013.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	S. Carrillo, J. Harkin, L. J. McDaid, F. Morgan, S. Pande, and 
S. Cawley, "Scalable hierarchical network-on-chip architecture for spiking neural network hardware implementations," IEEE Trans. on Parallel and Distributed Systems, vol. 24, no. 12, pp. 2451-2461, Dec. 2013.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	S. Carrillo, J. Harkin, L. McDaid, S. Pande, S. Cawley, B. McGinley, and F. Morgan, "Advancing interconnect density for spiking neural network hardware implementations using traffic-aware adaptive network-on-chip routers," Neural Networks, vol. 33, no. 9, pp. 42-57, Sept. 2012.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	J. Liu, J. Harkin, Y. Li, and L. Maguire, "Online traffic-aware fault detection fornetworks-on-chip," J. Parall. Distrib. Comput., vol. 74, no. 1, pp. 1984-1993, Jan. 2014.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	A. Vitkovskiy, V. Soteriou, and C. Nicopoulos, "Dynamic fault-tolerant routing algorithm for networks-on-chip based on localised detouring paths," IET Computers &amp; Digital Techniques, vol. 7, no. 2, pp. 93-103, Mar. 2013.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	N. E. Jerger and L. S. Peh, "On-Chip Networks," San Rafael, CA, USA: Morgan and Claypool, 2009.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improving Age Estimation of Dental Panoramic Images Based on Image Contrast Correction by Spatial Entropy Method</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Masoume</given_name><surname>Mohseni</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hussain</given_name><surname>Montazery Kordy</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mehdi</given_name><surname>Ezoji</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2021</year></publication_date><pages><first_page>127</first_page><last_page>135</last_page></pages><doi_data><doi>10.66224/ijece.28983.19.2.127</doi><resource>http://ijece.org/en/Article/28983</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28983</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28983</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28983</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28983</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28983</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28983</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28983</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. S. Panchbhai, "Dental radiographic indicators, a key to age estimation," Dentomaxillofacial Radiology, vol. 40, no. 4, pp. 199-212, May 2011.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. Cameriere, L. Ferrante, and M. Cingolani, "Age estimation in children by measurement of open apices in teeth," Int. J. Legal. Med., vol. 120, no. 1, pp. 49-52, Jan. 2006.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Lurie, G. M. Tosoni, J. Tsimikas, and W. Fitz, "Recursive hierarchic segmentation analysis of bone mineral density changes on digital panoramic images," Oral Surgery, Oral Medicine, Oral Pathology and Oral Radiology, vol. 113, no. 4, pp. 549-558, Apr. 2012.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. Bruellmann, S. Sander, and I. Schmidtmann, "The design of a fast fourier filter for enhancing diagnostically relevant structures-endodontic files," Computers in Biology and Medicine, vol. 72, pp. 212-217, May 2016.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Y. Y. Amer and M. J. Aqel, "An efficient segmentation algorithm for panoramic dental images," Procedia Computer Science, vol. 65, pp. 718-725, 2015.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Tikhe, A. Naik, S. Bhide, T. Saravanan, and K. Kaliyamurthie, "Algorithm to identify enamel caries and interproximal caries using dental digital radiographs," in Proc. Int. Advanced Computing Conf., IACC’16, pp. 225-228, Bhimavaram, India, 27-28 Feb. 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. M. Hasan, R. Hassan, and W. Ismail, "Automatic segmentation of jaw from panoramic dental x-ray images using GVF snakes," in Proc. World Automation Congress, WAC’16, 6 pp., Rio Grande, PR, USA, 31 Jul.-4 Aug. 2016.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. B. Ali, R. Ejbali, and M. Zaied, "GPU-based segmentation of dental x-ray images using active contours without," in Proc. Int. Conf. on Intelligent Systems Design and Applications, pp. 505-510, Marrakech, Morocco, 14-16 Dec. 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	J. Kaur and J. Kaur, "Dental image disease analysis using pso and backpropagation neural network classifier," International J. of Advanced Research in Computer Science and Software Engineering, vol. 6, no. 4, pp. 158-160, Apr. 2016.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. K. Alsmadi, "A hybrid fuzzy c-means and neutrosophic for jaw lesions segmentation," Ain Shams Engineering J., vol. 9, no. 4, pp. 697-706, Dec. 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	L. H. Son and T. M. Tuan, "A cooperative semi-supervised fuzzy clustering framework for dental x-ray image segmentation," Expert Systems with Applications, vol. 46, no. C, pp. 380-393, Mar. 2016.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. K. Jain and H. Chen, "Matching of dental x-ray images for human identification," Pattern Recognition vol. 37, no. 7, pp. 1519-1532, Jul. 2004.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	O. Nomir and M. Abdel-Mottaleb, "A system for human identification from x-ray dental radiographs," Pattern Recognition  vol. 38, no. 8, pp. 1295-1305, Aug. 2005.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	E. H. Said, D. E. M. Nassar, G. Fahmy, and H. H. Ammar, "Teeth segmentation in digitized dental x-ray films using mathematical morphology," IEEE Trans. Inf. Forensic Secur., vol. 1, no. 2, pp. 178-189, Jun. 2006.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	N. Al-sherif, G. Gue, and H. H. Ammar, "A new approach to teeth segmentation," IEEE Int. Sympo. on Multimedia, pp. 145-148, Irvine, CA, USA, 10-12 Dec. 2012.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. L. Lin, Y. H. Lai, and P. W. Huang, "An effective classification and numbering system for dental bitewing radiographs using teeth region and contour information," Pattern Recognition, vol. 43, no. 4, pp. 1380-1392, Apr. 2010.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Shah, A. Ross, and H. H. Ammar, "Automatic teeth segmentation using active contour without edges," in Proc. of the Biometrics Symp.: Special Session on Research at the Biometric Consortium Conf., pp. 145-148, Baltimore, MD, USA, 19 Sept.-21 Aug. 2006.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. Zhou and M. Abdel-Mottaleb, "A content-based system for human identification based on bitewing dental x-ray images," Pattern Recognition, vol. 38, no. 11, pp. 2132-2142, Nov. 2005.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. A. Mahoor and M. Abdel-Mottaleb, "Classification and numbering of teeth in dental bitewing images," Pattern Recognition,  vol. 38, no. 4, pp. 577-586, Apr. 2005.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Y. H. Lai and P. L. Lin, "Effective segmentation for dental x-ray images using texture-based fuzzy inference system," in Proc. 10th Int. Conf. on, Advanced Concepts for Intelligent Vision Systems, pp. 936-947, 20-24 Oct. 2008.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	F. Keshtkar and G. Gueaieb, "Segmentation of dental radiographs using a swarm intelligence approach," in Proc. IEEE Canadian Conf. on Electrical and Computer Engineering, pp. 328-331, Ottawa, Canada, 7-10 May 2006.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	P. L. Lin, Y. H. Lai, and P. W. Huang, "Dental biometrics: human identification based on teeth and dental works in bitewing radiographs," Pattern Recognition, vol. 45, no. 3, pp. 934-946, Mar. 2012.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	P. Choorat, W. Chiracharit, and K. Chamnongthai, "A single tooth segmentation using structural orientations and statistical textures," in Proc. the Biomedical Engineering Int. Conf., pp. 294-297, Chiang Mai, Thailand, 29-31 Jan.. 2011.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	P. L. Lin, P. W. Huang, Y. S. Cho, and C. H. Kuo, "An automatic and effective tooth isolation method for dental radiographs," Opto-Electronics Review, vol. 21, pp. 126-136, 2013.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	P. L. Lin, P. Y. Huang, P. W. Huang, H. C. Hsu, and C. C. Chen, "Teeth segmentation of dental priapical radiographs based on 
local singularity analysis," Computer Methods and Programs in Biomedicine, vol. 113, no. 2, pp. 433-445, Feb. 2014.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	L. Hoang and T. Manh, "Dental segmentation from x-ray images using semi-supervised fuzzy clustering with spatial constraints," Engineering Application of Artificial Intelligence, vol. 59, no. C, pp. 186-195, 2017.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Y. Gan, et al., "Tooth and alveolar bone segmentation from dental computed tomography image," IEEE J. of Biomedical and Health Information, vol. 22, no. 1, pp. 196-204, Jan. 2018.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	G. Silva, L. Oliveira, and M. Pithon, "Automatic segmentation teeth in x-ray images: trends, set, benchmarking and future perspective," Expert Systems with Applications, vol. 107, pp. 15-31, 1 Oct. 2018.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	T. Celik, "Spatial entropy-based global and local image contrast enhancement," IEEE Trans. on Image Processing, vol. 23, no. 12, pp. 5298-5308, Dec. 2014.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	D. Frejlichowsky and R. Wanat, "Application of the laplacian pyramid decomposition to the enhancement of digital dental radiographic images for the automatic person identification," A. Campilho and M. Kamel, (eds.) Image Analysis and Recognition: 7th Int. Conf., ICIAR 2010, Part II. LNCS, vol. 6112, pp. 151-160, Springer, Heidelberg 2010.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	ش. جوادی‌نژاد، م. مهدی‌زاده و ر. ترابی، "تعیین دقت روش کمریر (Cameriere) در تعیین سن تقویمی،" مجله دانشکده دندان‌پزشکی اصفهان، جلد 8، شماره 4، صص. 314-321، مهر 1391‌.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	C. Giardina and E. Doughetr, Morphological Methods in Image and Signal Processing, Prentice-Hall, Englewood Cliffs, NJ, 1988.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	R. Wanat and D. Frejlichowsky, "A problem of automatic segmentation of digital dental panoramic x-ray images for forensic human identification," in Proc. 16th Int. Conf., pp. 294-302, Ravenna, Italy, Sept. 2011.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	N. Otsu, "A threshold selection method from gray-level histograms," IEEE Trans. Syst. Man Cybern., vol. 9, no. 1, pp. 62-66, Jan. 1979.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Semi-Central Method to Improve Energy Saving in Real Wireless Sensor Networks Using Clustering and Mobile Sinks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Fatemeh</given_name><surname>Sadeghi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sepideh</given_name><surname>Adabi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sahar</given_name><surname>Adabi</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2021</year></publication_date><pages><first_page>81</first_page><last_page>92</last_page></pages><doi_data><doi>10.66224/ijece.29029.19.2.81</doi><resource>http://ijece.org/en/Article/29029</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/29029</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/29029</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/29029</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/29029</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/29029</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/29029</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/29029</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	P. Chauhan and P. Ahlawat, "Target tracking in wireless sensor network," International J. of Information &amp; Computation Technology, vol. 4, no. 6, pp. 643-648, Apr. 2014.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	F. Fanian and M. Kuchaki Rafsanjani, "A new fuzzy multi-hop clustering protocol with automatic rule tuning for wireless sensor networks," Applied Soft Computing J., vol. 89, pp. 106-115, Apr. 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	P. Singh Mehra, M. Najmud Doja, and B. Alam, "Fuzzy-based enhanced cluster head selection (FBECS) for WSN," J. of King Saud University-Science, vol. 32, no. 1, pp. 390-401, Jan. 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Adabi, M. Abdolkarimi, and A. Sharifi, "A new multi-objective distributed fuzzy clustering algorithm for wireless sensor networks with mobile gateways," AEU-International J. of Electronics and Communications, vol. 89, pp. 92-104, May 2018.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	N. Ghosh, I. Baberjee, and R. Simon Sherratt, "On-demand fuzzy clustering and ant-colony optimization based mobile data collection in wireless sensor network," Wireless Networks, vol. 25, no. 4, pp. 1829-1845, May 2019.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Ghosal, S. Halder, and S. K. Das, "Distributed on-demand clustering algorithm for lifetime optimization in wireless sensor networks," J. of Parallel and Distributed Computing, vol. 141, pp. 129-142, Jul. 2020.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	T. Stephan, F. Al-Turjman, K. Suresh Joseph, B. Balusamy, and S. Srivastava, "Artificial intelligence inspired energy and spectrum aware cluster based routing protocol for cognitive radio sensor networks," J. of Parallel and Distributed Computing, vol. 142, pp. 90-105, Aug. 2020.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	P. Parvin Renold and A. Balaji Ganesh, "Energy efficient secure data collection with path-constrained mobile sink in duty-cycled unattended wireless sensor network," Pervasive and Mobile Computing, vol. 55, pp. 1-12, Apr. 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	N. Gharaei, K. Abu bakar, S. Zaiton Mohd Hashim, and A. Hosseingholi Pourasl, "Inter-and intra-cluster movement of mobile sink algorithms for cluster-based networks to enhance the network lifetime," Ad Hoc Networks, vol. 85, pp. 60-70, Mar. 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Wang, Y. Yin, J. Zhang, S. Lee, and R. S. Sherratt, "Mobility based energy efficient and multi-sink algorithms for consumer home networks," IEEE Trans. on Consumer Electronics, vol. 59, no. 1, pp. 77-84, Feb. 2013.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Gao, H. Zhang, and S. K. Das, "Efficient data collection in wireless sensor networks with path-constrained mobile sinks," IEEE Trans. on Mobile Computing, vol. 10, no. 4, pp. 592-608, Apr. 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. H. Khodashahi, F. Tashtarian, M. H. Yaghmaee Moghaddam, and M. Tolou Honary, "Optimal location for mobile sink in wireless sensor networks," in Proc IEEE Wireless Communications and Networking Conf., 6 pp., Sydney, Australia, 18-20 Apr. 2010.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Marta and M. Cardei, "Improved sensor network lifetime with multiple mobile sinks," Pervasive and Mobile Computing, vol. 5, 
pp. 542-555, 2009.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Elshrkawey, S. M. Elsherif, and M. Elsayed Wahed, "An enhancement approach for reducing the energy consumption in wireless sensor networks," J. of King Saud University-Computer and Information Sciences, vol. 30, no. 2, pp. 259-267, Apr. 2018.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Wang, J. Cao, S. Ji, et al., "Energy-efficient cluster-based dynamic routes adjustment approach for wireless sensor networks with mobile sinks," J. of Supercomputing, vol. 73, no. 7, pp. 3277-3290, Jul. 2017.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Shokouhifar and A. Jalali, "Optimized sugeno fuzzy clustering algorithm for wireless sensor networks," Engineering Applications of Artificial Intelligence, vol. 60, pp. 16-25, Apr. 2017.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Multi-Objective Optimization Solution for Virtual Machine Placement Problem in Cloud Datacenters with Minimization of Power Consumption and Resource Dissipation Perspectives by Simulated Annealing Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mirsaeid</given_name><surname>Hosseini Shirvani</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2021</year></publication_date><pages><first_page>106</first_page><last_page>116</last_page></pages><doi_data><doi>10.66224/ijece.29051.19.2.106</doi><resource>http://ijece.org/en/Article/29051</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/29051</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/29051</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/29051</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/29051</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/29051</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/29051</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/29051</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. Wei, Z. H. Hu, and Y. G. Wang, "Exact algorithms for energy-efficient virtual machine placement in data centers," Future Generation Computer Systems, vol. 106, pp. 77-91, 2020. </unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	س. اصغری و ن. جعفری نویمی‌پور، "یک روش آگاه از هزینه برای ترکیب خدمات ابری به کمک یک الگوریتم ترکیبی،" مجله علمی رایانش نرم و فناوری اطلاعات، جلد 8، شماره 2، صص. 26-17، تابستان 1398.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Hosseini Shirvani, A. M. Rahmani, and A. Sahafi, "A survey study on virtual machine migration and server consolidation techniques in DVFS-enabled cloud datacenter: taxonomy and challenges," J. of King Saud University-Computer and Information Sciences, vol. 32, no. 3, pp. 267-286, Mar. 2020. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. Kliazovich, P. Bouvry, and S. U. Khan, "DENS: data center energy-efficient network-aware scheduling," Cluster Computing, vol. 16, pp. 65-75, 2013.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Brown, et al., Report to Congress on Server and Data Center Energy Efficiency: Public Law, pp. 109-431, Lawrence Berkeley National Laboratory, Berkeley, 2008.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. U. Khan and A. Y. Zomaya, Handbook on Datacenters, Springer, New York, NY, 2015.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Hosseini Shirvani, "To move or not to move: an iterative four-phase cloud adoption decision model for IT outsourcing based on TCO," J. of Soft Computing and Information Technology, vol. 9, 
no. 1, pp. 7-17, Spring 2020.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Hosseini Shirvani, A. M. Rahmani, and A. Sahafi, "An iterative mathematical decision model for cloud migration: a cost and security risk approach," Software: Practice and Experience, vol. 48, no. 3, pp. 449-485, Mar. 2018. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. A. Reddy and R. Ravindranath, "Virtual machine placement using JAYA optimization algorithm," Applied Artificial Intelligence, vol. 34, no. 1, pp. 31-46, 2019. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	W. Van Heddeghem, et al., "Trends in worldwide ICT electricity consumption from 2007 to 2012," Computer Communications, vol. 50, pp. 64-76, 1 Sept. 2014. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Mills, The Cloud Begins with Coal: An Overview of the Electricity Used by the Global Digital Ecosystem, Technical Report, Digital Power Group, Washington D.C, USA, 2013.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	V. D. Reddy, B. Setz, G. S. V. R. K. Rao, G. R. Gangadharan, 
and M. Aiello, "Best practices for sustainable datacenter," IT Professional, vol. 20, no. 5, pp. 57-67, Sept./Oct. 2018.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	B. S. Baker, "A new proof for the first-fit decreasing bin-packing algorithm," J. of Algorithms, vol. 6, no. 1, pp. 49-70, Mar. 1985. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Yue, "A simple proof of the inequality FFD (L) ≤ 11/9 OPT (L) + 1, ∀ L for the FFD bin-packing algorithm," Acta Mathematicae Applicatae Sinica, vol. 7, no. 4, pp. 321-331, 1991. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	P. Saeedi and M. Hosseini Shirvani, "An improved thermodynamic simulated annealing-based approach for resource-skewness-aware and power-efficient virtual machine consolidation in cloud datacenters," Soft Comput., vol. 25, pp. 5233-5260, 2021.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. Saeedi, "An energy-efficient genetic-based algorithm for virtual machine placement in cloud datacenter," J. of Multidisciplinary Engineering Science and Studies, vol. 5, no. 5, pp. 1-4, May 2019.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. E. Dashti and A. M. Rahmani, "Dynamic VMs placement for energy efficiency by PSO in cloud computing," J. of Experimental &amp; Theoretical Artificial Intelligence, vol. 28, no. 1-2, pp. 97-112, 2016. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Y. Gao, H. Guan, Z. Qi, Y. Hou, and L. Liu, "A multi-objective ant colony system algorithm for virtual machine placement in cloud computing," J. of Computer and System Sciences, vol. 79, no. 8, pp. 1230-1242, Dec. 2013. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Y. Kao, (Ed.), Encyclopedia of Algorithms, Springer Science &amp; Business Media, 2008. ISBN: 978-0-387-30162-4.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	L. Grit, D. Irwin, A. Yumerefendi, and J. Chase, "Virtual machine hosting for networked clusters: building the foundations for autonomic orchestration," in Proc. of First Int. Workshop on Virtualization Technology in Distributed Computing, pp. 7-7, Tampa, FL, USA, 17-17 Nov. 2006.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. A. Chandio, N. Tziritas, M. S. Chandio, and C. Z. Xu, "Energy efficient VM scheduling strategies for HPC workloads in cloud data centers," Sustainable Computing: Informatics and Systems, vol. 24, Article No.: 100352, Dec.2019. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	L. Gao and G. N. Rouskas, "A spectral clustering approach to network-aware virtual request partitioning," Computer Networks, vol. 139, pp. 70-80, 5 Jul. 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Y. Wu, M. Tang, and M. Fraser, "A simulated annealing algorithm for energy efficient virtual machine placement," in Proc. IEEE Int. Conf. on Systems, Man, and Cybernetics, SMC’12, pp. 1245-1250, Seoul, South Korea, 14-17 Oct. 2012. </unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	N. Su, A. Shi, C. Chen, E. Chen, and Y. Wang, "Research on virtual machine placement in the cloud based on improved simulated annealing algorithm," World Automation Congress, WAC’16, 7 pp., Rio Grande, PR, USA, 31 Jul.-4 Aug. 2016. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. Farzai, M. Hosseini Shirvani, and M. Rabbani, "Multi-objective communication-aware optimization for virtual machine placement in cloud datacenters," Sustainable Computing: Informatics and Systems, vol. 28, Article No.: 100374, Dec. 2020. </unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Tang and S. A. Pan, "Hybrid genetic algorithm for the energy-efficient virtual machine placement problem in data centers," Neural Process Lett, vol. 41, no. 2, pp. 211-221, Apr. 2015.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, "Optimization by simulated annealing," Science, vol. 220, no. 4598, pp. 671-680, 13 May 1983.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	M. Hosseini Shirvani, "Web service composition in multi-cloud environment: a bi-objective genetic optimization algorithm," in Proc. Innovations in Intelligent Systems and Applications, INISTA’18, 6 pp., Thessaloniki, Greece, 3-5 Jul. 2018. </unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	M. Hosseini Shirvani and A. Babazadeh Gorji, "Optimisation of automatic web services composition using genetic algorithm," Int. J. Cloud Computing, vol. 9, no. 4, pp. 397-411, 2020.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	ع. محمدزاده، م. مصدری، ف. سلیمانیان قره چپق و ا. جعفریان، "ارائه یک الگوریتم بهبودیافته بهینه‌سازی گرگ‌های خاکستری برای زمان‌بندی جریان کار در محیط محاسبات ابری،" مجله علمی رایانش نرم و فناوری اطلاعات، جلد 8، شماره 4، صص. 29-17، زمستان 1398.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A POI Recommendation Model According to the Behavior Pattern of Users Based on Friends List Using Deep Learning</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>sadaf</given_name><surname>safavi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>mehrdad</given_name><surname>jalali</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2021</year></publication_date><pages><first_page>117</first_page><last_page>126</last_page></pages><doi_data><doi>10.66224/ijece.29095.19.2.117</doi><resource>http://ijece.org/en/Article/29095</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/29095</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/29095</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/29095</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/29095</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/29095</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/29095</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/29095</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	T. Qian, B. Liu, Q. V. H. Nguyen, and H. Yin, "Spatiotemporal representation learning for translation-based POI recommendation," ACM Trans. Inf. Syst., vol. 37, no. 2, pp. 1-24, Jan. 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	X. Li, D. Han, J. He, L. Liao, and M. Wang, "Next and next new POI recommendation via latent behavior pattern inference," ACM Trans. Inf. Syst., vol. 37, no. 4, pp. 1-28, Sept. 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	W. Liu, H. Lai, J. Wang, G. Ke, W. Yang, and J. Yin, "Mix geographical information into local collaborative ranking for POI recommendation," World Wide Web, vol. 23, no. 1, pp. 131-152, Jan. 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Y. Wu, G. Zhao, K. Li, and X. Qian, "Long-and short-term preference learning for next POI recommendation," in Int. Conf. Inf. Knowl. Manag. Proc., Association for Computing Machinery, New York, NY, USA, pp. 2301-2304, Beijing, China, 3-7 Nov. 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Ding and Z. Chen, "RecNet: a deep neural network for personalized POI recommendation in location-based social networks," Int. J. Geogr. Inf. Sci., vol. 32, no. 8, pp. 1631-1648, Aug. 2018.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	T. N. Doan and E. P. Lim, "Modeling location-based social network data with area attraction and neighborhood competition," Data Min. Knowl. Discov., vol. 33, no. 1, pp. 58-95, Jan. 2019.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. Lian, K. Zheng, Y. Ge, L. Cao, E. Chen, and X. Xie, "GeoMF++: scalable location recommendation via joint geographical modeling and matrix factorization," ACM Trans. Inf. Syst., vol. 36, no. 3, pp. 1-29, Mar. 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Ye, P. Yin, W. C. Lee, and D. L. Lee, "Exploiting geographical influence for collaborative point-of-interest recommendation," in SIGIR'11-Proc. 34th Int. ACM SIGIR Conf. Res. Dev. Inf. Retr., Association for Computing Machinery, pp. 325-334, Beijing, China, 24-28 Jul. 2011.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Z. Zhang, C. Li, Z. Wu, A. Sun, D. Ye, and X. Luo, "NEXT: a neural network framework for next POI recommendation," Front. Comput. Sci., vol. 14, no. 2, pp. 314-333, Apr. 2020.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
Y. Gao, Z. Duan, W. Shi, J. Feng, and Y. Y. Chiang, "Personalized recommendation method of POI based on deep neural network," 
in   Proc.  Int.  Conf. on  Behavioral,  Economic  and  Socio-Cultural Computing, 6 pp., Beijing, China, 28-30 Oct. 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[10]	M. A. Sit, C. Koylu, and I. Demir, "Identifying disaster-related tweets and their semantic, spatial and temporal context using deep learning, natural language processing and spatial analysis: a case study of Hurricane Irma," Int. J. Digit. Earth, vol. 12, no. 11, pp. 1205-1229, Jan. 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[11]	J. Zhang, Y. Xie, Q. Wu, and Y. Xia, "Medical image classification using synergic deep learning," Med. Image Anal., vol. 54, no. 1, pp. 10-19, May 2019.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[12]	P. Y. Hao, W. H. Cheang, and J. H. Chiang, "Real-time event embedding for POI recommendation," Neurocomputing, vol. 349, pp. 1-11, 15 Jul. 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[13]	J. Yuan, X. Hou, Y. Xiao, D. Cao, W. Guan, and L. Nie, "Multi-criteria active deep learning for image classification," Knowledge-Based Syst., vol. 172, pp. 86-94, 15 May. 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[14]	R. Ranjbarzadeh and S. B. Saadi, "Automated liver and tumor segmentation based on concave and convex points using fuzzy 
c-means and mean shift clustering," Meas. J. Int. Meas. Confed, 
vol. 150, pp. 230-269, Jan. 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[15]	H. Yin, W. Wang, H. Wang, L. Chen, and X. Zhou, "Spatial-aware hierarchical collaborative deep learning for POI recommendation," IEEE Trans. Knowl. Data Eng., vol. 29, no. 8, pp. 2537-2551, Aug. 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[16]	F. He and P. Wei, "Research on comprehensive point of interest (POI) recommendation based on spark," Cluster Comput., vol. 22, no. 4, pp. 9049-9057, Jul. 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[17]	L. Huang, Y. Ma, S. Wang, and Y. Liu, "An attention-based spatiotemporal LSTM network for next POI recommendation," IEEE Trans. Serv. Comput, vol. 12, no. 1, pp. 1-1, May 2019.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[18]	L. Sun, "POI recommendation method based on multi-source information fusion using deep learning in location-based social networks," J. Inf. Process. Syst., vol. 17, no. 2, pp. 352-368, Apr. 2021.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[19]	H. Wang, P. Li, Y. Liu, and J. Shao, "Towards real-time demand-aware sequential POI recommendation," Inf. Sci. (Ny), vol. 547, 
pp. 482-497, 8 Feb. 2021.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[20]	J. Zeng, H. Tang, Y. Zhao, M. Gao, and J. Wen, "PR-RCUC: a POI recommendation model using region-based collaborative filtering and user-based mobile context," Mob. Networks Appl., vol. 26, no. 3, pp. 1-11, Jan. 2021.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[21]	A. Ellahyani and M. El Ansari, "Mean shift and log-polar transform for road sign detection," Multimed. Tools Appl., vol. 76, no. 22, pp. 24495-24513, Nov. 2017.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[22]	Q. Mahmood, A. Chodorowski, and M. Persson, "Automated MRI brain tissue segmentation based on mean shift and fuzzy c-means using a priori tissue probability maps," IRBM, vol. 36, no. 3, pp. 185-196, Jun. 2015.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[23]	D. Comaniciu and P. Meer, "Mean shift: a robust approach toward feature space analysis," IEEE Trans. Pattern Anal. Mach. Intell., 
vol. 24, no. 5, pp. 603-619, Aug. 2002.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
Z. Liu, J. Liu, X. Xiao, H. Yuan, X. Li, J. Chang, and C. Zheng, "Segmentation of white blood cells through nucleus mark watershed operations and mean shift clustering," Sensors, vol. 15, no. 9, pp. 22561-22586, Sept. 2015.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[24]	J. Michel, D. Youssefi, and M. Grizonnet, "Stable mean-shift algorithm and its application to the segmentation of arbitrarily large remote sensing images," IEEE Trans. Geosci. Remote Sens., vol. 53, no. 2, pp. 952-964, Jul. 2015.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[25]	K. Fukunaga and L. D. Hostetler, "The estimation of the gradient of a density function, with applications in pattern recognition," IEEE Trans. Inf. Theory, vol. 21, no. 1, pp. 32-40, Jan. 1975.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[26]	N. Karimi, R. Ranjbarzadeh Kondrood, and T. Alizadeh, "An intelligent system for quality measurement of Golden Bleached raisins using two comparative machine learning algorithms," Meas. J. Int. Meas. Confed, vol. 107, pp. 68-76, 1 Sept. 2017.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[27]	P. J. Sudharshan, C. Petitjean, F. Spanhol, L. E. Oliveira, L. Heutte, and P. Honeine, "Multiple instance learning for histopathological breast cancer image classification," Expert Syst. Appl., vol. 117, 
pp. 103-111, 1 Mar. 2019.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[28]	F. Ozyurt, T. Tuncer, E. Avci, M. Koc, and I. Serhatlioglu, "A novel liver image classification method using perceptual hash-based convolutional neural network," Arab. J. Sci. Eng., vol. 44, no. 4, pp. 3173-3182, Apr. 2019.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[29]	Y. Bengio, "Practical recommendations for gradient-based training of deep architectures," in Neural Networks: Tricks of the Trade, pp. 437-478, Springer, Berlin, Heidelberg, 2012.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[30]	J. Dolz, C. Desrosiers, and I. Ben Ayed, "3D fully convolutional networks for subcortical segmentation in MRI: a large-scale study," Neuroimage, vol. 170, pp. 456-470, 15 Apr. 2018.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[31]	X. Glorot, A. Bordes, and Y. Bengio, "Deep sparse rectifier neural networks," in Proc. of the 14th. Int. Conf. on Artificial Intelligence and Statistics, vol. 15, pp. 315-323, Fort Lauderdale, FL, USA, 11-13 Apr. 2011.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[32]	W. Shang, K. Sohn, D. Almeida, and H. Lee, "Understanding and improving convolutional neural networks via concatenated rectified linear units," in Proc. 33rd. Int. Conf. on Machine Learning, vol 48, pp. 2217-2225, New York, NY, USA, 19-24 Jun. 2016.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[33]	F. C. Morabito, M. Campolo, C. Ieracitano, and N. Mammone, "Deep learning approaches to electrophysiological multivariate time-series analysis," in Artificial Intelligence in the Age of Neural Networks and Brain Computing, ch. 11, pp. 219-243, Academic Press, 2018.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[34]	W. Yin, H. Schutze, S. Schutze, B. Xiang, and B. Zhou, ABCNN: Attention-Based Convolutional Neural Network for Modeling Sentence Pairs, 2016. https://github.com/ (accessed January 4, 2021).</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[35]	F. Husain, B. Dellen, and C. Torras, "Scene understanding using deep learning," in Handbook of Neural Computation, ch. 20, pp. 373-382, Academic Press, 2017.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[36]	M. Havaei, et al., "Brain tumor segmentation with deep neural networks," Med. Image Anal., vol. 35, pp. 18-31, Jan. 2017.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[37]	N. Srivastava, G. Hinton, A. Krizhevsky, and R. Salakhutdinov, "Dropout: a simple way to prevent neural networks from overfitting," vol. 15, no. 56, pp. 1929-1958, 2014.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[38]	T. Y. Kim and S. B. Cho, "Predicting residential energy consumption using CNN-LSTM neural networks," Energy, vol. 182, pp. 72-81, Sept. 2019.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[39]	J. Chen, Z. Liu, H. Wang, A. Nunez, and Z. Han, "Automatic defect detection of fasteners on the catenary support device using deep convolutional neural network," IEEE Trans. Instrum. Meas., vol. 67, pp. 257-269, Dec. 2017.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[40]	Yelp Dataset. Availabe online: (n.d.). https://www.yelp.com/dataset.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[41]	E. Cho, S. A. Myers, and J. Leskovec, "Friendship and mobility: user movement in location-based social networks," in Proc. ACM SIGKDD Int. Conf. Knowl. Discov. Data Min., pp. 1082-1090, San Diego, CA, USA. 21-24 Aug. 2011.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[42]	J. Zhou, B. Liu, Y. Chen, and F. Lin, "UFC: a unified POI recommendation framework," Arab. J. Sci. Eng., vol. 44, no. 11, pp. 9321-9332, Nov. 2019.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[43]	I. Rahman, et al., "Ergothioneine inhibits oxidative stress- and TNF-α-induced NF-κ B activation and interleukin-8 release in alveolar epithelial cells," Biochem. Biophys. Res. Commun., vol. 302, no. 4, pp. 860-864, Mar. 2003.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[44]	J. D. Zhang, C. Y. Chow, and Y. Li, "LORE: exploiting sequential influence for location recommendations," in Proc. 22nd. ACM Int. Symp. Adv. Geogr. Inf. Syst., Association for Computing Machinery, pp. 103-112, Dallas, TX, NY, USA, 3-7 Nov. 2014.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[45]	H. Wang, M. Terrovitis, and N. Mamoulis, "Location recommendation in location-based social networks using user check-in data," in Proc. 21nd. ACM Int. Symp. Adv. Geogr. Inf. Syst., Association for Computing Machinery, pp. 364-373, Orlando, FL, USA, 5-8 Nov. 2013.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>