﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051922</doi_batch_id><timestamp>20260519223120</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>10</month><day>24</day><year>2023</year></publication_date><journal_volume><volume>21</volume></journal_volume><issue>2</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Proposing a Detection and Mitigation Approach for DDoS Attacks on SDN-Based IoT Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>fatemeh</given_name><surname>MotieShirazi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyedakbar</given_name><surname>Mostafavi</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>24</day><year>2023</year></publication_date><pages><first_page>111</first_page><last_page>119</last_page></pages><doi_data><doi>10.66224/ijece.38142.21.2.111</doi><resource>http://ijece.org/en/Article/38142</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/38142</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/38142</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/38142</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/38142</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/38142</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/38142</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/38142</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K. Zhao and L. Ge, "A survey on the Internet of Things security," in Proc. 9th Int. Conf. on Computational Intelligence and Security, pp. 663-667, Emeishan, China, 14-15 Dec. 2013.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	O. Salman, I. Elhajj, A. Chehab, and A. Kayssi, "IoT survey: an SDN and fog computing perspective," Computer Networks, vol. 143, pp. 221-246, Oct. 2018.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Scott-Hayward, G. O'Callaghan, and S. Sezer, "SDN security: a survey," IEEE SDN for Future Networks and Services, SDN4FNS, 7 pp., Trento, Italy, 11-13 Nov. 2013.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Ren, H. Guo, C. Xu, and Y. Zhang, "Serving at the edge: a scalable IoT architecture based on transparent computing," IEEE Network, vol. 31, no. 5, pp. 96-105, 2017.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	K. S. Sahoo, B. Sahoo, and A. Panda, "A secured SDN framework for IoT," in Proc. Int Conf. on Man and Machine Interfacing MAMI'15, 4 pp., Bhubaneswar, India, 17-19 Dec. 2015.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. Lu and M. Wang, "An easy defense mechanism against botnet-based DDoS flooding attack originated in SDN environment using sFlow," in Proc. of the 11th Int. Conf. on Future Internet Technologies-CFI'16, pp. 14-20, Nanjing, China, 15-17 Jun. 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. M. Mousavi and M. St-Hilaire, "Early detection of DDoS attacks against software defined network controllers," J. of Network and Systems Management, vol. 26, no. 3, pp. 573-591, Jul. 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Neres Carvalho, J. Luiz Bordim, and E. Adilio Pelinson Alchieri, "Entropy-based DoS attack identification in SDN," in Proc. IEEE Int. Parallel and Distributed Processing Symp. Workshops, IPDPSW'19, pp. 627-634, Rio de Janeiro, Brazil, 20-24 May 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. B. Shohani and S. A. Mostafavi, "Introducing a new linear regression based method for early DDoS attack detection in SDN," in Proc. 6th Int. Conf. on Web Research, ICWR'10, pp. 126-132, Tehran, Iran, 23-24 Apr. 2020.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Galeano-Brajones, J. Carmona-Murillo, J. F. Valenzuela-Valdes, and F. Luna-Valero, "Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: an experimental approach," Sensors, vol. 20, no. 3, Article ID: 816, 18 pp., Feb. 2020.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	L. Li, J. Zhou, and N. Xiao, "DDoS attack detection algorithms based on entropy computing," In: Qing, S., Imai, H., Wang, G. (eds) Information and Communications Security. ICICS 2007. Lecture Notes in Computer Science, vol 4861. Springer, Berlin, pp. 452-466, 2007.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	R. Wang, Z. Jia, and L. Ju, "An entropy-based distributed DDoS detection mechanism in software-defined networking," in Proc. IEEE Trustcom/BigDataSE/ISPA, pp. 310-317, Helsinki, Finland, 20-22 Aug. 2015.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Oshima, T. Nakashima, and T. Sueyoshi, "Early DoS/DDoS detection method using short-term statistics," in Proc. Int Conf. on Complex, Intelligent and Software Intensive Systems, pp. 168-173, Krakow, Poland, 15-18 Feb. 2010.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	K. Muthamil Sudar and P. Deepalakshmi, "A two level security mechanism to detect a DDoS flooding attack in software-defined networks using entropy-based and C4.5 technique," J. of High Speed Networks, vol. 26, no. 1, pp. 55-76, Mar. 2020.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	R. L. S. de Oliveira, C. M. Schweitzer, A. A. Shinoda, and L. R. Prete, "Using mininet for emulation and prototyping software-defined networks," in Proc. IEEE Colombian Conf. on Communications and Computing, COLCOM'14, 6 pp., Bogota, Colombia, 4-6 Jun. 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	C. S. Wright, Searching for Exploits, SCAPY Fuzzing, 11 pp., 
31 Mar. 2018, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3153525,</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. A. Al-Adaileh, M. Anbar, Y. W. Chong, and A. Al-Ani, "Proposed statistical-based approach for detecting distribute denial of service against the controller of software defined network (SADDCS)," in Proc. MATEC Web of Conf., vol. 218, Article ID: 02012, 8 pp., 26 Oct2018.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Q. Yan, F. R. Yu, Q. Gong, and J. Li, "Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges," IEEE Communications Surveys &amp; Tutorials, vol. 18, 
no. 1, pp. 602-622, Firstquarter 2016.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Video Summarization Using a Clustering Graph Neural Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mahsa</given_name><surname>RahimiResketi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Homayun</given_name><surname>Motameni</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ebrahim</given_name><surname>Akbari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hossein </given_name><surname>Nematzadeh</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>24</day><year>2023</year></publication_date><pages><first_page>101</first_page><last_page>110</last_page></pages><doi_data><doi>10.66224/ijece.38185.21.2.101</doi><resource>http://ijece.org/en/Article/38185</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/38185</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/38185</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/38185</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/38185</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/38185</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/38185</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/38185</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Messina and M. Montagnuolo, "Fuzzy mining of multimedia genre applied to television archives," in Proc. IEEE Int.Conf. on Multimedia and Expo, pp. 117-120, Hannover, Germany, 23 Jun.-26 Apr. 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Bora and S. Sharma, "A review on video summarization approcahes: recent advances and directions," in Proc. Int. Conf. on Advances in Computing, Communication Control and Networking, ICACCCN'18, pp. 601-606, Greater Noida, India, 12-13 Oct. 2018.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. K. Mahesh and K. Pai, "A survey on video summarization techniques," in Proc. Innovations in Power and Advanced Computing Technologies, i-PACT'19, 5 pp., Vellore, India, 22-23 Mar. 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	V. K. Vivekraj, D. Sen, and B. Raman, "Video skimming: taxonomy and comprehensive survey," ACM Computing Surveys, vol. 52, no. 5, Article ID: 106, 38 pp., Sept. 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Li, Q. Ye, L. Zhang, L. Yuan, X. Xu, and L. Shao, "Exploring global diverse attention via pairwise temporal relation for video summarization," Computer Vision and Pattern Recognition, vol. 111, Article ID: 107677, Mar. 2020.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Gygli, H. Grabner, H. Riemenschneider, and L. V. Gool, "Creating summaries from user videos," In: D. Fleet, T. Pajdla, B. Schiele, and T. Tuytelaars, (eds) Computer Vision-ECCV'14, Lecture Notes in Computer Science, vol 8695. Springer, pp. 505-520, 2014.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. Song, J. Vallmitjana, A. Stent, and A. Jaimes, "TVSum: summarizing web videos using titles," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'15, pp. 5179-5187, Boston, MA, USA, 7-12 Jun. 2015.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	G. Bradski, A. Keahler, and V. Pisarevsky, "Learning-based computer vision with Intel's open source computer vision library," Intel. Technology J., vol. 9, no. 2, pp. 119-130, May 2005.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	D. Zhao, J. Xiu, Y. Bai, and Z. Yang, "An improved item-based movie recommendation algorithm," in Proc. 4th Int. Conf. on Cloud Computing and Intelligence Systems, CCI'16, pp. 278-281, Beijing, China, 17-19 Aug. 2016.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Dimou, D. Matsiki, A. Axenopoulos, and P. Daras, "A user-centric approach for event-driven summarization of surveillance videos," in Proc. 6th Int. Conf. on Imaging for Crime Prevention and Detection, ICDP'15, 6 pp., London, UK, 15-17 Jul. 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	H. Zeng, et al., "EmotionCues: emotion-oriented visual summarization of classroom videos," IEEE Trans. on Visualization and Computer Graphics, vol. 27, no. 7, pp. 3168-3181, Jul. 2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	P. Li, C. Tang, and X. Xu, "Video summarization with a graph convolutional attention network," Frontiers of Information Technology &amp; Electronic Engineering, vol. 22, no. 6, pp. 902-913, 2021.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. S. de Almeida, et al., "Speeding up a video summarization approach using GPUs and multicore CPUs," Procedia Computer Science, vol. 29, pp. 159-171, 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	K. Zhang, W. L. Chao, F. Sha, and K. Grauman, "Video summarization with long short-term memory," In: B. Leibe, J. Matas, N. Sebe, and M. Welling, (eds) Computer Vision-ECCV'16, Lecture Notes in Computer Scienc, vol 9911. Springer, pp. 766-782, 2016. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Rochan, L. Ye, and Y. Wang, "Video summarization using fully convolutional sequence networks," In: V. Ferrari, M. Hebert, C. Sminchisescu, and Y. Weiss, (eds) Computer Vision-ECCV'18, Lecture Notes in Computer Science, vol 11216. Springer, pp. 358-374, 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Y. Li, L. Wang, T. Yang, and B. Gong, "How local is the local diversity? reinforcing sequential determinantal point processes 
with dynamic ground sets for supervised video summarization," In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds) Computer Vision-ECCV'18, Lecture Notes in Computer Science, vol 11216. Springer, pp. 156-174, 2018. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	B. Zhao, X. Li, and X. Lu, "Property-constrained dual learning 
for video summarization," IEEE Trans. on Neural Networks and Learning Systems, vol. 31, no. 10, pp. 3989-4000, Oct. 2020.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	B. U. Kota, A. Stone, K. Davila, S. Setlur, and V. Govindaraju, "Automated whiteboard lecture video summarization by content region detection and representation," in Proc. 25th Int. Conf. on Pattern Recognition, ICPR'21, pp. 10704-10711, Milan, Italy, 10-15 Jan. 2021.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	G. Liang, Y. Lv, S. Li, S. Zhang, and Y. Zhang, "Video summarization with a convolutional attentive adversarial network," Pattern Recognition, vol. 131, Article ID: 108840, Nov. 2022.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	R. Yang, S. Wang, X. Wu, T. Liu, and X. Liu, "Using lightweight convolutional neural network to track vibration displacement in rotating body video," Mechanical Systems and Signal Processing, vol. 177, Article ID: 109137, Sept. 2022.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. Sikandar, R. Mahmum, and N. Akbar, "Cricket videos summary generation using a novel convolutional neural network," in Mohammad Ali Jinnah University Int. Conf. on Computing, MAJICC'22, 7 pp., Karachi, Pakistan, 27-28 Oct. 2022.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	C. Szegedy, W. Liu, Y. Jia, P. Sermanet, et al., "Going deeper with convolutions," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'15, 9 pp., Boston, MA, USA, 7-12 Jun. 2015.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	A. Rahimi, T. Cohn, and T. Baldwin, "Semi-supervised user geolocation via graph convolutional networks," in Proc of the 56th Annual Meeting of the Association for Computational Linguistics, vol. 1, pp. 2009-2019, Melbourne, Australia, Jul. 2018.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. P. Ta, M. Ben, and G. Gravier, "Improving cluster selection and event modeling in unsupervised mining for automatic audiovisual video structuring," In: K. Schoeffmann, B, Merialdo, A. G, Hauptmann, and C. W. Ngo, Andreopoulos, Y., Breiteneder, C. (eds) Advances in Multimedia Modeling. MMM 2012. Lecture Notes in Computer Science, vol 7131. Springer, Berlin, pp. 529-540, 2012.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Z. Ji, K. Xiong, Y. Pang, and X. Li, "Video summarization with attention-based encoder-decoder networks," IEEE Trans. on Circuits and Systems for Video Technology, vol. 30, no. 6, pp. 1709-1717, Jun. 2019.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	X. Li, Q. Li, D. Yin, L. Zhang, and D. Peng, "Unsupervised video summarization based on an encoder-decoder architecture," J. of Physics: 5th Int. Conf. on Advanced Algorithms and Control Engineering, ICAACE'22, vol. 2258, Article ID: 012067, Sanya, China, 20-22 Jan, 2022.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	S. E. F. de Avila, et al., "VSUMM: a mechanism designed to produce static video summaries and a novel evaluation method," Pattern Recognition Letters, vol. 32, no. 1, pp. 56-68, Jan. 2011.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	M. Furini, F. Geraci, M. Montangero, and M. Pellegrini, "STIMO: STIll and MOving video storyboard for the web scenario," Multimedia Tools and Applications, vol. 46, no. 1, pp. 529-540, Jan. 2009.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	P. Mundur, Y. Rao, and Y. Yesha, "Keyframe-based video summarization using delaunay clustering," International J. on Digital Libraries, vol. 6, no. 2, pp. 219-232, 2006.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	D. DeMenthon, V. Kobla, and D. Doermann, "Video summarization by curve simplification," in Proc. of the 6th ACM Int. Conf. on Multimedia, pp. 211-218, Bristol, UK, 13-16 Sept. 1998. </unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	B. Mahasseni, M. Lam, and S. Todorovic, "Unsupervised video summarization with adversarial LSTM networks," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, pp. 2982-2991, Honolulu, HI, USA, 21-26 Jul. 2017.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	K. Y. Zhou, Y. Qiao, and T. Xiang, "Deep reinforcement learning for unsupervised video summarization with diversity-representativeness reward," in Proc. AAAI Conf. on Artificial Intelligence, pp. 7582-7589, New Orleans, LA, USA, 2-7 Feb. 2018.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	H. W. Wei, et al., "Video summarization via semantic attended networks," in Proc. AAAI Conf. on Artificial Intelligence, pp. 216-223, New Orleans, LA, USA, 2-7 Feb. 2018.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	M. Rochan and Y. Wang, "Video summarization by learning from unpaired data," in Proc IEEE/CVF Conf. on Computer Vision and Pattern Recognition, pp. 7894-7903, Long Beach, CA, USA, 15-20 Jun. 2019.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	Y. Jung, D. Cho, D. Kim, and I. S. Kweon, "Discriminative feature learning for unsupervised video summarization," in Proc AAAI Conf. on Artificial Intelligence, pp. 8537-8544, Honolulu, HI, USA, 27 Jun.-1 Feb. 2019.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Ontology Matching Based on Maintaining Local Similarity of Information Using Propagation Technique</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>NazarMohammad</given_name><surname>Parsa</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Asieh</given_name><surname>Ghanbarpour</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>24</day><year>2023</year></publication_date><pages><first_page>120</first_page><last_page>128</last_page></pages><doi_data><doi>10.66224/ijece.38339.21.2.120</doi><resource>http://ijece.org/en/Article/38339</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/38339</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/38339</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/38339</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/38339</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/38339</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/38339</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/38339</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	W. Huang and L. Harrie, "Towards knowledge-based geovisualisation using semantic web technologies: a knowledge representation approach coupling ontologies and rules," International J. of Digital Earth, vol. 13, no. 9, pp. 976-997, 2020.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Sołtysik-Piorunkiewicz and M. Krysiak, "Development trends 
of semantic web information technology: the case study of organisational structure ontology," Information Systems in Management, vol. 6, no. 2, pp. 154-165, 2017.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Z. Lv and R. Peng, "A novel meta-matching approach for ontology alignment using grasshopper optimization," Knowledge-Based Systems, vol. 201, Article ID: 106050, 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	X. Xue, Q. Wu, M. Ye, and J. Lv, "Efficient ontology meta-matching based on interpolation model assisted evolutionary algorithm," Mathematics, vol. 10, no. 17, Article ID: 3212, 20 pp., 2022.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	B. Lima, D. Faria, F. M. Couto, I. F. Cruz, and C. Pesquita, "OAEI 2020 results for AML and AMLC," in Proc. of the 15th Int. Workshop on Ontology Matching, pp. 154-160, Athens, Greece, 2-2 Nov. 2020.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. da Silva, F. A. Baiao, and K. Revoredo, "ALIN results for OAEI 2017," in Proc. the Twelfth Int. Workshop on Ontology Matching Collocated with the 16th Int. Semantic Web Conf., pp. 114-121, Vienna, Austria, 21-21 Oct. 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Chen, et al., "Augmenting ontology alignment by semantic embedding and distant supervision," In: R. Verborgh, et al., Proc. European Semantic Web Conf., vol 12731. Springer, pp. 392-408, 2021.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Y. He, J. Chen, D. Antonyrajah, and I. Horrocks, "BERTMap: a BERT-based ontology alignment system," in Proc. of the AAAI Conf. on Artificial Intelligence, pp. 5684-5691, 22 Feb.-1 Mar. 2022.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Hertling, "WikiV3 results for OAEI 2017," in Proc. the Twelfth Int. Workshop on Ontology Matching Collocated with the 16th In. Semantic Web Conf., ISW'17C, pp. 190-195, Vienna, Austria, 21-21 Oct. 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	F. Ardjani, D. Bouchiha, and M. Malki, "Ontology-alignment techniques: survey and analysis," International J. of Modern Education &amp; Computer Science, vol. 7, no. 11, pp. 67-78, 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	I. Ouali, F. Ghozzi, R. Taktak, and M. S. H. Sassi, "Ontology alignment using stable matching," Procedia Computer Science, vol. 159, no. pp. 746-755, 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Mohammadi and J. Rezaei, "Evaluating and comparing ontology alignment systems: an MCDM approach," J. of Web Semantics, vol. 64, Article ID: 100592, Oct. 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Tounsi Dhouib, C. Faron Zucker, and A. G. Tettamanzi, "An ontology alignment approach combining word embedding and the radius measure," In: M. Acosta, et al. (eds), Semantic Systems, The Power of AI and Knowledge Graphs, SEMANTiCS 2019, Lecture Notes in Computer Science, vol. 11702, pp. 191-197, Springer, 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	E. Jiménez-Ruiz and B. Cuenca Grau, "Logmap: logic-based and scalable ontology matching," In: L. Aroyo, et al., The Semantic Web, ISWC'11, Lecture Notes in Computer Science, vol 7031, pp. 273-288, Springer, 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Kachroudi, G. Diallo, and S. B. Yahia, "KEPLER at OAEI 2018," in Proc. of the 13th Int. Workshop on Ontology Matching Co-located with the 17th Int. Semantic Web Conf., pp. 173-178, Monterey, CA, USA, 8-8 Oct. 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Biniz and M. Fakir, "An ontology alignment hybrid method based on decision rules," The Int. Arab J. of Information Technology, vol. 16, no. 6, pp. 1114-1120, Nov. 2019.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Mao, Y. Peng, and M. Spring, "An adaptive ontology mapping approach with neural network based constraint satisfaction," J. of Web Semantics, vol. 8, no. 1, pp. 14-25, Mar. 2010.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. Gracia and K. Asooja, "Monolingual and cross-lingual ontology matching with CIDER-CL: evaluation report for OAEI 2013," in Proc. of 8th Ontology Matching Workshop, at 12th Int. Semantic Web Conf., pp. 109-116, Sydney.  Australia, 21-21 Oct. 2013.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Mohammadi, W. Hofman, and Y. H. Tan, "SANOM results 
for OAEI 2018," in Proc. of the 13th Int. Workshop on Ontology Matching Co-located with the 17th Int. Semantic Web Conf., pp. 205-209, Monterey, CA, USA, 8-8 Oct. 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	X. Xue and X. Wu, "Optimizing biomedical ontology alignment in lexical vector space," J. of Intelligent &amp; Fuzzy Systems, vol. 38, 
no. 5, pp. 5609-5614, 2020.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. C. Chu, X. Xue, J. S. Pan, and X. Wu, "Optimizing ontology alignment in vector space," J. of Internet Technology, vol. 21, no. 1, pp. 15-22, Jan. 2020.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	L. Bulygin, "Combining lexical and semantic similarity measures with machine learning approach for ontology and schema matching problem," in Proc. of Int. Conf. Data Analytics and Management in Data Intensive Domainspp. 245-249, Moscow, Russia, 9-12 Oct. 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Wang, Z. Ding, and C. Jiang, "GAOM: genetic algorithm based ontology matching," in Proc. IEEE Asia-Pacific Conf. on Services Computing, APSCC'06, pp. 617-620, Guangzhou, China, 12-15 Dec. 2006.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. Algergawy, et al., "Results of the ontology alignment evaluation initiative 2019," in Proc. Int. Workshop on Ontology Matching Co-located with the 18th Int. Semantic Web Conf., pp. 46-85, Auckland, New Zealand, 26-26 Oct. 2019.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. Abd Nikooie Pour, et al., "Results of the ontology alignment evaluation initiative 2020," in Proc. CEUR Workshop Proc., RWTH, vol. 2788, pp. 92-138, 15-15 Oct. 2020.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Abd Nikooie Pour, et al., "Results of the ontology alignment evaluation initiative 2021," in Proc. CEUR Workshop, vol. 3063, pp. 62-108, 2021.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	I. Nkisi-Orji, N. Wiratunga, S. Massie, K. Y. Hui, and R. Heaven, "Ontology alignment based on word embedding and random forest classification," In: M. Berlingerio, F. Bonchi, and T. Gärtner (eds.), Machine Learning and Knowledge Discovery in Databases, Lecture Notes in Computer Science, vol. 11051, pp. 557-572, Springer, 2018.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	P. Ochieng and S. Kyanda, "A K-way spectral partitioning of 
an ontology for ontology matching," Distributed and Parallel Databases, vol. 36, no. 4, pp. 643-673, 2018.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	X. Xue and J. Chen, "Optimizing sensor ontology alignment through compact co-firefly algorithm," Sensors, vol. 20, no. 7, Article ID: 2056, 2020.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	P. Shvaiko and J. Euzenat, "A survey of schema-based matching approaches," J. on Data Semantics IV, vol. 3730, pp. 146-171, 2005.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	M. Maroun, "A survey on ontology operations techniques," Mathematical and Software Engineering, vol. 7, no. 1-2, pp. 7-28, 2021.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	M. Vijaymeena and K. Kavitha, "A survey on similarity measures in text mining," Machine Learning and Applications: An International J., vol. 3, no. 1, pp. 19-28, Mar. 2016.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	M. A. Yulianto and N. Nurhasanah, "The hybrid of Jaro-Winkler and Rabin-Karp algorithm in detecting Indonesian text similarity," J. Online Informatika, vol. 6, no. 1, pp. 88-95, 2021.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	J. L. Peterson, "Computer programs for detecting and correcting spelling errors," Communications of the ACM, vol. 23, no. 12, pp. 676-687, Dec. 1980.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	İ. Kabasakal and H. Soyuer, "A Jaccard similarity-based model to match stakeholders for collaboration in an industry-driven portal," in Proceeding, vol. 74, no. 1, 9 pp., 2021.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	A. Essayeh and M. Abed, "Towards ontology matching based system through terminological, structural and semantic level," Procedia Computer Science, vol. 60, pp. 403-412, 2015.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	S. Melnik, H. Garcia-Molina, and E. Rahm, "Similarity flooding: a versatile graph matching algorithm and its application to schema matching," in Proc. 18th IEEE Int. Conf. on Data Engineering, pp. 117-128, San Jose, CA, USA, 26 Feb.-1 Mar. 2002.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	E. Jiménez-Ruiz, "LogMap family participation in the OAEI 2020," in Proc. of the 15th Int. Workshop on Ontology Matching, vol. 2788, pp. 201-203, 2020.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	I. F. Cruz, F. P. Antonelli, and C. Stroe, "AgreementMaker: efficient matching for large real-world schemas and ontologies," Proceedings of the VLDB Endowment, vol. 2, no. 2, pp. 1586-1589, 2009.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	D. Faria, et al., "The agreementmakerlight ontology matching system," In R., Meersman, et al., On the Move to Meaningful Internet Systems: OTM 2013 Conf., Lecture Notes in Computer Science, vol. 8185, pp. 527-541, Springer, 2013.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	Y. An, A. Kalinowski, and J. Greenberg, "OTMapOnto: optimal transport-based ontology matching," in Proc. of the 16th Int. Workshop on Ontology Matching, pp. 185-192, Oct. 2021.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Presenting a Network-on-Chip Mapping Approach Based on Harmony Search Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Zahra</given_name><surname>Bagheri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Fatemeh</given_name><surname>Vardi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Alireza</given_name><surname>Mahjoub</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>24</day><year>2023</year></publication_date><pages><first_page>77</first_page><last_page>88</last_page></pages><doi_data><doi>10.66224/ijece.38387.21.2.77</doi><resource>http://ijece.org/en/Article/38387</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/38387</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/38387</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/38387</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/38387</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/38387</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/38387</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/38387</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Hemani, et al., "Network on chip: an architecture for billion transistor era," in Proc. of the IEEE NorChip Conf., pp. 166-173, Turku, Finland, Nov. 2000.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. L. Chou and R. Marculescu, "Contention-aware application mapping for network-on-chip communication architectures," in Proc. IEEE Int. Conf. on Computer Design, ICCD'08, pp. 164-169, Lake Tahoe, CA, USA, 12-15 Oct. 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	X. S. Yang, "Harmony search as a metaheuristic algorithm search algorithm: theory and applications," Studies in Computational Intelligence, vol 191, pp.1-14, Springer, Berlin, Heidelberg, 2009.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	C. Marcon, T. Webber, and A. A. Susin, "Models of computation 
for NoC mapping: timing and energy saving awareness," Microelectronics J., vol. 60, pp. 129-143, Feb. 2017.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Mesidis, Mapping of Real-Time Applications on Network-on-Chip Based MPSOCS, MS Thesis, Department of Computer Science, University of York, Dec. 2011.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	P. K. Sahu and S. Chattopadhyay, "A survey on application mapping strategies for network-on-chip design," J. of Systems Architecture, vol. 59, no. 1, pp. 60-76, Jan. 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Bender, "MILP based task mapping for heterogeneous multiprocessor systems," in Proc. of International Conf. on Design and Automation, vol. 96, pp. 190-197, Sep. 1996.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	K. Srinivasan, K. S. Chatha, and G. Konjevod, "Linear-programming-based techniques for synthesis of network-on-chip architectures," IEEE Trans. on Very Large Scale Integration (VLSI) Systems, vol. 14, no. 4, pp. 407-420, Apr. 2006.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	P. Ghosh, A. Sen, and A. Hall, "Energy efficient application mapping to NoC processing elements operating at multiple voltage levels," in Proc. 3rd ACM/IEEE Intl Symp. on Networks-on-Chip, pp. 80-85, La Jolla, CA, USA, 10-13 May 2009.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	C. Ostler and K. S. Chatha, "An ILP formulation for system-level application mapping on network processor architecture," in Proc. of Design, Automation and Test in Europe, DATE'07, pp. 99-104, Nice, France, 16-20 Apr. 2007.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Hu and R. Marculescu, "Communication and task scheduling of application-specific networks-on-chip," IEEE Proc. Computers &amp; Digital Techniques, vol. 152, no. 5, pp. 643-651, Sept. 2005.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Tosun, "Clustered-based application mapping method for network-on-chip," J. of Advances in Engineering Software, vol. 42, no. 10, pp. 868-874, Oct. 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	R. Marculescu and J. Hu, "Energy-aware mapping for tile-based NoC architectures under performance constraints," in Proc. Asia and South Pacific Design Automation Conf., ASP-DAC'03, pp. 233-239,  Kitakyushu, Japan,2 4-24 Jan. 2003.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	R. Marculescu and J. Hu, "Energy-and performance-aware mapping for regular NoC architectures," IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, vol. 24, no. 4, pp. 180-187, Apr. 2005.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Reshadi, A. Khademzadeh, and A. Reza, "Elixir: a new bandwidth-constrained mapping for networks-on-chip," IEICE Electronics Express, vol. 7, no. 2, pp. 73-79, 2010.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	R. Pop and S. Kumar, A Survey of Techniques for Mapping and Scheduling Applications to Network on Chip Systems, Technical Report ISSN 1404-0018 04:4, ING Jönköping, 2004.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	C. Xu, et al., "Optimization strategy of regular NoC mapping using genetic-based hyper-heuristic algorithm," Symmetry, vol. 14, no. 8, Article ID: 1637, Aug. 2022.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	C. Xu, Y. Liu, P. Li, and Y. Yang, "Unified multi-objective mapping for network-on-chip using genetic-based hyper-heuristic algorithms," IET Comput. Digit. Tech, vol. 12, no. 4, pp. 158-166, Jul. 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	H. M. Ali, S. Ashrafinia, and J. Liu, "Wireless mesh network planning using quantum inspired evolutionary algorithm [C]," in Proc. IEEE Conf. on Vehicular Technology, 5 pp., San Francisco, CA, USA, 5-8 Sept. 2015.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Y. Xie and Y. Liu, "A research on NoC mapping with quantum 
ant colony algorithm," in International Conf. on Wireless Communications, Signal Processing and Networking, WiSPNET'17,  pp. 874-877, Chennai, v20-24 Mar. 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	E. Carvalho, N. Calazans, and F. Moraes, "Dynamic task mapping for MPSoCs," IEEE Design and Test of Computers, vol. 27, no. 5, pp. 26-35, Sept./Oct. 2010.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	T. Lei and S. Kumar, "A two-step genetic algorithm for mapping task graphs to a network on chip architecture," in Proc. of the Euromicro Symp. on Digital System Design, DSD'03, pp. 180-187, Belek-Antalya, Turkey, 1-6 Sept. 2003.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	A. Hansson, K. Goossens, and A. Radulescu, "A unified approach to constrained mapping and routing on network-on-chip architectures," in Proc. IEEE/ACM Int Conf. on Hardware/Software Codesign and System Synthesis, CODES+ISSS'05, pp. 75-80, Jersey City, NJ, USA,19-21 Sept. 2005.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	W. T. Shen, C. H. Chao, Y. K. Lien, and A. Y. Wu, "A new binomial mapping and optimization algorithm for reduced-complexity mesh-based on-chip network," in Proc. of First Int. Symp. on Networks-on-Chip, NOCS'07, pp. 317-322, Princeton, NJ, USA, 7-9 May 2007.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. Murali and G. De Micheli, "Bandwidth constrained mapping of cores onto NoC architectures," in Proc. of Design, Automation, and Test in Europe Conf. and Exhibition, vol. 2, pp. 896-901, Feb. 2004.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	P. K. Sahu, P. Venkatesh, S. Gollapalli, and S. Chattopadhyay, "Application mapping onto mesh structured network-on-chip using particle swarm optimization," in Proc. IEEE Int. Symp. VLSI, ISVLSI'11, pp. 335-336, Chennai, India, 4-6 Jul. 2011.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	S. Murali and G. De Micheli, "Bandwidth constrained mapping of cores onto NoC architectures," in Proc. of Design, Automation, and Test in Europe Conf. and Exhibition, DATE'04, vol. 2, pp. 896-901, Paris, France, 16-20 Feb. 2004.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	S. Khan, et al., "An optimized hybrid algorithm in term of energy and performance for mapping real time workloads on 2d based on-chip networks," Springer Science + Business Media, LLC, Part of Springer Nature, vol. 48, no. 12, pp. 4792-4804, Dec. 2018.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	S. Khan, et al., "An efficient algorithm for mapping real time embedded applications on NoC architecture," IEEE ACCESS, vol. 6, pp. 16324-16335, 2018.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	S. Khan, S. Anjum, U. A. Gulzari, T. Umer, and B. S. Kim, "Bandwidth-constrained multi-objective segmented brute-force algorithm for efficient mapping of embedded applications on NoC architecture," IEEE ACCESS, vol. 6, pp. 11242-11254, 2017.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	G. Z. Woo, K. J. Hoon, and G. Loganathan, "A new heuristic optimization algorithm: harmony search," Simulation, vol. 76, no. 2, pp. 60-68, Feb. 2001.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	Z. W. Geem and Y. H. Cho, "Optimal design of water distribution networks using parameter-setting-free harmony search for two major parameters," J. of Water Resources Planning and Management, 
vol. 137, no. 4, pp. 377-380, Oct. 2010.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	N. Theodossiou and I. Kougias, "Harmony search algorithm," WIT Trans. on State of the Art in Science and Engineering, vol. 56, Ch. 7, 25 pp., Jul. 2012.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	P. K. Sahu, K. Manna, T. Shah, and S. Chattopadhyay, "A constructive heuristic for application mapping onto mesh based network-on-chip," J. of Circuits, Systems, and Computers, vol. 24, no. 8, Article ID: 1550126, Aug. 2015.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	C. Marcon, et al., "Exploring NoC mapping strategies: an energy and timing aware technique," in Proc. Design, Automation and Test in Europe, pp. 502-507, Munich, Germany, 7-11 Mar. 2005.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	M. Mahdavi, M. Fesanghary, and E. Damangir, "An improved harmony search algorithm for solving optimization problems," Appl Math Comput., vol. 188, no. 2, pp. 1567-1579, May 2007.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	"Noxim, http://noxim.sourceforge.net [available on dated: 01.08.2014]."</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	D. Fernandes, M. Neto, L. F. B. Soares, M. M. Freire, and P. R. M. Inácio, "Chapter 10-on the self-similarity of traffic generated by network traffic simulators," Modeling and Simulation of Computer Networks and Systems, pp. 285-311, 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Distributed Primal-Dual Algorithm with Variable Parameters and Bidirectional Incremental Cooperation</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Ghanbar </given_name><surname>Azarnia</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>24</day><year>2023</year></publication_date><pages><first_page>129</first_page><last_page>136</last_page></pages><doi_data><doi>10.66224/ijece.39412.21.2.129</doi><resource>http://ijece.org/en/Article/39412</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/39412</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/39412</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/39412</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/39412</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/39412</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/39412</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/39412</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	ح. نظری، م. رئیس‌دانایی و م. سپه‌وند، "مکان‌یابی بر اساس تفاضل توان سیگنال دریافتی با به‌کارگیری بهینه‌سازی محدب در شبکه حسگر بی‌سیم،" نشريه مهندسی برق و مهندسی کامپيوتر ايران، ب- مهندسي كامپيوتر، سال 17، شماره 4، صص. 310-306، زمستان 1398.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	ف. پدیداران مقدم و ح. مقصودی، "مسیریابی بهبودیافته برای توازن بار در شبکه حسگر بی‌سیم در بستر اینترنت اشیا بر پایه الگوریتم کلونی مورچگان چندگانه،" فصلنامه فناوری اطلاعات و ارتباطات ایران، سال 14، شماره 52/51، صص. 255-220، تابستان 1401.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	ق. آذرنیا، م. ع. طینتی و ت. یوسفی رضایی، "الگوریتم توزیع‌شده و مشارکتی به‌منظور بازسازی سیگنال‌های تنک در شبکه‌های حسگری بی‌سیم با توپولوژی افزایشی دوجهته،" فصل‌نامه علمی پردازش علائم و داده‌ها، جلد 18، شماره 3، صص. 76-65، زمستان 1400.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	ق. آذرنیا و ع. ع. شریفی، "الگوریتم طول متغیر کسری نفوذی با قابلیت پیشبرد مشارکت مبتنی بر گرادیان برای افزایش کارایی شبکه‌های تطبیقی با لینک‌های نویزی،" مجله علمی پژوهشی رایانش نرم و فناوری اطلاعات، جلد 10، شماره 4، صص. 14-1، زمستان 1400.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. El Khediri, "Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols," Computing, vol. 104, no. 8, pp. 1775-1837, Aug. 2022.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	G. Azarnia and A. A. Sharifi, "Steady-state analysis of distributed incremental variable fractional tap-length LMS adaptive networks," Wireless Networks, vol. 27, no. 7, pp. 4603-4614, 2021.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	G. Azarnia, "Diffusion fractional tap-length algorithm with adaptive error width and step-size," Circuits, Systems, and Signal Processing, vol. 41, no. 1, pp. 321-345, Jan. 2022.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	G. Azarnia, M. A. Tinati, A. A. Sharifi, and H. Shiri, "Incremental and diffusion compressive sensing strategies over distributed networks," Digital Signal Processing, vol. 101, Article ID: 102732, Jun. 2020.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	C. Li, G. Li, and P. K. Varshney, "Distributed detection of sparse signals with censoring sensors in clustered sensor networks," Information Fusion, vol. 83/84, pp. 1-18, Jul. 2022.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	G. Azarnia and A. A. Sharifi, "Fully cooperative and distributed focal underdetermined system solver compressive sensing recovery algorithm for wireless sensor networks," International J. of Communication Systems, vol. 35, no. 9, Article ID: e5126, Jun. 2022.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	O. Karpis, et al., "Compressed sensing-a way to spare energy in WSN for UAV," IFAC-PapersOnLine, vol. 55, no. 4, 
pp. 170-176, 2022.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Salim, W. Osamy, A. M. Khedr, A. Aziz, and M. Abdel-Mageed, "A secure data gathering scheme based on properties of primes and compressive sensing for IoT-based WSNs," IEEE Sensors J., vol. 21, no. 4, pp. 5553-5571, 15 Feb. 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Y. Xu, G. Sun, T. Geng, and B. Zheng, "Compressive sparse data gathering with low-rank and total variation in wireless sensor networks," IEEE Access, vol. 7, pp. 155242-155250, 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	C. Wang, X. Shen, H. Wang, and H. Mei, "Energy-efficient collection scheme based on compressive sensing in underwater wireless sensor networks for environment monitoring over fading channels," Digital Signal Processing, vol. 127, Article ID: 103530, Jul. 2022.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Al Mazaideh and J. Levendovszky, "A multi-hop routing algorithm for WSNs based on compressive sensing and multiple objective genetic algorithm," J. of Communications and Networks, vol. 23, no. 2, pp. 138-147, Apr. 2021.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. Chen, et al., "Factor graphs for support identification in compressive sensing aided wireless sensor networks," IEEE Sensors J., vol. 21, no. 23, pp. 27195-27207, 1 Dec. 2021.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. Torkamani, H. Zayyani, and R. A. Sadeghzadeh, "Model-based decentralized Bayesian algorithm for distributed compressed sensing," Signal Processing: Image Communication, vol. 95, Article ID: 116212, Jul. 2021.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	F. Amini, Y. Hedayati, and H. Zanddizari, "Exploiting the inter-correlation of structural vibration signals for data loss recovery: 
a distributed compressive sensing-based approach," Mechanical Systems and Signal Processing, vol. 152, Article ID: 107473, May 2021.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	G. Azarnia, "Distribution agnostic Bayesian compressive sensing with incremental support estimation," Multidimensional Systems and Signal Processing, vol. 33, no. 2, pp. 327-340, Jun. 2022.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Chambolle and T. Pock, "A first-order primal-dual algorithm for convex problems with applications to imaging," J. of Mathematical Imaging and Vision, vol. 40, no. 1, pp. 120-145, May 2011.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Semantic Word Embedding Using BERT on the Persian Web </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>shekoofe</given_name><surname>bostan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ali-Mohammad</given_name><surname>Zare-Bidoki</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>mohamad reza</given_name><surname>pajohan</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>24</day><year>2023</year></publication_date><pages><first_page>89</first_page><last_page>100</last_page></pages><doi_data><doi>10.66224/ijece.39509.21.2.89</doi><resource>http://ijece.org/en/Article/39509</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/39509</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/39509</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/39509</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/39509</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/39509</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/39509</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/39509</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Bidoki, Effective Web Ranking and Crawling, Ph.D. Thesis, University of Tehran, 2009.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	W. Qader, M. Ameen, and B. Ahmed, "An overview of bag of words; importance, implementation, applications, and challenges," in Proc. IEEE Int. Engineering Conf., IEC'19, pp. 200-204, Erbil, Iraq, 23-25 Jun. 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	G. Salton and C. Buckley, "Term-weighting approaches in automatic text retrieval," Information Processing &amp; Management, vol. 24, no. 5, pp. 513-523, 1988.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Y. Benjio and R. Ducharme, "A neural probabilistic language model," The J. of Machine Learning Research, vol. 3, pp. 1137-1155, 2003.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	T. Mikolov, K. Chen, G. Corrado, and J. Dea, "Efficient estimation of word representations in vector space," in Proc. Int. Conf. on Learning Representations, ICLR'13, pp. 1137-1155, Scottsdale, AZ, USA, 2-4 May 2013.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	T. Mikolov, I. Sutskever, K. Chen, and G. Corr, "Distributed representations of words and phrases and their compositionality," 
In C. J. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K.Q. Weinberger (ed.), Annual Conf. on Neural Information Processing Systems,  NIPS'13, vol. 2, pp. 3111-3119, Lake Tahoe, NV, USA, 5-10 Dec. 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Pennington, R. Socher, C. Ma, and C. Manning, "GloVe: global vectors for word representation," in Proc. Conf. on Empirical Methods in Natural Language Processing, EMNLP'14, pp. 1532-1543, Doha, Qatar, Oct. 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	P. Bojanowski, E. Grave, A. Joulin, and T. Mikolov, "Enriching word vectors with subword information," Trans. of the Association for Computational Linguistics (TACL), vol. 5, pp. 135-146, 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Pan and Q. Yang, "A survey on transfer learning," IEEE Trans. on Knowledge and Data Engineering, vol. 22, no. 10, pp. 1345-1359, Oct. 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Peters, et al., "Deep contextualized word representations," 
in Proc. Conf. of the North American Chapter of the Association of Computational Linguistics, HLT-NAACL'18, vol. 1, pp. 2227-2237, New Orleans, LA, USA, Jun. 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Devlin, M. Chang, and K. Kristina, "BERT: pre-training of deep bidirectional transformers for language understanding," in Proc. Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, HLT-NAACL'19, pp. 4171-4186, Minneapolis, MN, USA, 2-7 Jun. 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Radford, K. Narasimhan, T. Salimans, and I. Sutskever, Improving Language Understanding by Generative Pre-Training, Technical Report, OpenAI, 11 Jun. 2018.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Hochreiter and J. Schmidhuber, "Long short-term memory," Neural Computation, vol. 9, no. 8, pp. 1735-1780, Nov. 1997.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	T. Mikolov, S. Kombrink, L. Burget, and J. Cernocky, "Extensions of recurrent neural network language model," in Proc. IEEE Int. Speech and Signal Processing, ICASSP'11, pp. 5528-5531, Prague, Czech Republic, 22-27 May 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Schuster and K. Paliwal, "Bidirectional recurrent neural networks," IEEE Trans. on Signal Processing, vol. 45, no. 11, pp. 2673-2681, Nov. 1997.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. Vaswani, et al., "Attention is all you need," In Proc. 31st Annual Conf. on Neural Information Processing Systems, NIPS'17, 11 pp., Long Beach, CA, USA, 4-9 Dec. 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Z. Lan, et al., A Lite BERT for Self-Supervised Learning of Language Representations, arXiv preprint arXiv:1909.11942, 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Y. Liu, et al., A Robustly Optimized BERT Pretraining Approach, arXiv preprint arXiv:1907.11692, 2019.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	V. Sanh, L. Debut, J. Chaumond, and T. Wolf, DistilBERT, A Distilled Version of BERT: Smaller, Faster, Cheaper and Lighter, arXiv preprint arXiv:1910.01108, 2019.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Farahani, M. Gharachorloo, M. Farahani, and M. Manthouri, " ParsBERT: transformer-based model for persian language understanding," Neural Processing Letters, vol. 53, pp. 3831-3847, 2021.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	BERT, "huggingface," 2018. Available: https://huggingface.co/docs/transformers/.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	C. Sun, X. Qiu, Y. Xu, and X. Huang, "How to fine-tune BERT for text classification?" in Proc. China National Conf. on Chinese Computational Linguistics, CCL'19, pp. 194-206, Kunming, China, 18-20 Oct. 2019.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	D. Viji and S. Revathy, "A hybrid approach of weighted fine-tuned BERT extraction with deep siamese bi-LSTM model for semantic text similarity identification," Multimedia Tools and Applications, vol. 81, pp. 6131-6157, 2022.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. Agarwal and P. Meel, "Stacked bi-LSTM with attention and contextual BERT embeddings for fake news analysis," in Proc. 7th Int. Conf. on Advanced Computing and Communication Systems, ICACCS'21, pp. 233-237, Coimbatore, India, 19-20 Mar. 2021.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	K. Jarvelin and J. Kekalainen, "Cumulated gain-based evaluation of IR techniques," ACM Trans. on Information Systems, vol. 20, no. 4, pp. 422-446, Oct. 2002.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>