﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051923</doi_batch_id><timestamp>20260519231852</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>9</month><day>24</day><year>2024</year></publication_date><journal_volume><volume>22</volume></journal_volume><issue>2</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Dynamic Energy Consumption Reduction Algorithm for Mixed Critical Real-Time Systems with Multi-Core Processors</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>seyed hassan</given_name><surname>sadeghzadeh</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2024</year></publication_date><pages><first_page>129</first_page><last_page>137</last_page></pages><doi_data><doi>10.66224/ijece.38212.22.2.129</doi><resource>http://ijece.org/en/Article/38212</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/38212</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/38212</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/38212</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/38212</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/38212</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/38212</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/38212</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	س. ح. صادق‌زاده و ی. صداقت، "زمان‌بندی آگاه از انرژی مصرفی برای سیستم‌های بی‌درنگ تک‌پردازنده‌ای بحرانی- مختلط،" نشریه علمی- پژوهشی نشريه مهندسي برق و مهندسي كامپيوتر ايران، سال 16، شماره 4،  صص. 334-327، زمستان 1397.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. Zhu, "Reliability-aware dynamic energy management in dependable embedded real-time systems," ACM TECS, vol. 10, no. 2, Article ID: 26, 27 pp., Dec. 2011.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	P. Marwedel, Embedded System Design: Embedded Systems Foundations of Cyber-Physical Systems, Berlin, Germany: Springer, 2010.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	H. Kopetz, Real-Time Systems: Design Principles for Distributed Embedded Applications, Springer Science &amp; Business Media, 2011.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Baruah, et al., "Scheduling real-time mixed-criticality jobs," IEEE Trans. on Computers, vol. 61, no. 8, pp. 1140-1152, Aug. 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. Santy, L. George, P. Thierry, and J. Goossens, "Relaxing mixedcriticality scheduling strictness for task sets scheduled with FP," in Proc. Euromicro Conf. on Real-Time Systems, ECRTS’12, pp. 155-165, Pisa, Italy, 11-13 Jul. 2012.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Baruah, et al., "The preemptive uniprocessor scheduling of mixed-criticality implicit-deadline sporadic task systems," in Proc. Euromicro Conf. on Real-Time Systems, ECRTS'12, pp. 145-154, Pisa, Italy, 11-13 Jul. 2012.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	P. Taeju and K. Soontae, "Dynamic scheduling algorithm and its schedulability analysis for certifiable dual-criticality systems," in Proc. Int. Conf. Embedded Software, EMSOFT'11, pp. 253-262, Taipei Taiwan, 9-14 Oct. 2011.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Baruah, H. Li, and L. Stougie, "Towards the design of certifiable mixed-criticality systems," in Proc. 16th IEEE Real-Time and Embedded Technology and Applications Symp., pp. 13-22, Stockholm, Sweden, 12-15 Apr. 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	P. Huang, H. Yang, and L. Thiele, "On the scheduling of fault-tolerant mixed-criticality systems," in Proc. Design Automation Conf. (DAC), ACM/EDAC/IEEE, DAC'14, 6 pp., 1-5 Jun. 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Baruah and S. Vestal, "Schedulability analysis of sporadic tasks with multiple criticality specifications," in Proc. Euromicro Conf. on Real-Time Systems, ECRTS'08, pp. 147-155, Prague, Czech Republic, 2-4 Jul. 2008.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Z. Lia, C. Guo, X. Hua, and S. Ren, "Reliability guaranteed energy minimization on mixed-criticality systems," J. of Syst. and Software, vol. 112, pp. 1-10, Feb. 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. Su, D. Zhu, and S. Brandt, "An elastic mixed-criticality task model and early-release EDF scheduling algorithms," ACM TODAES, vol. 22, no. 2, Article ID: 28, 28 pp., Apr. 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Thekkilakattil, R. Dobrin, and S. Punnekkat, "Fault-tolerant scheduling of mixed-criticality real-time tasks under error bursts," Procedia Computer Science, vol. 46, pp. 1148-1155, 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	P. Ekberg and W. Yi, "Bounding and shaping the demand of mixed-criticality sporadic tasks," in Proc. 24th Euromicro Conference on Real-Time Systems, ECRTS, pp. 135-144, Pisa, Italy, 11-13 Jul. 2012.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Vestal, "Preemptive scheduling of multi-criticality systems with varying degrees of execution time assurance," in Proc. 28th IEEE Int. Real-Time Systems Symp., pp. 239-243, Tucson, AZ, USA, 3-6 Dec. 2007.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. Lin, A. M. K. Cheng, D. Steel, and M. Yu-Chi Wu, "Scheduling mixed-criticality real-time tasks in a fault-tolerant system," International Journal of Embedded and Real-Time Communication Systems, vol. 6, no. 2, 22 pp., 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	C. Kamienski, et al., "Application development for the Internet of Things: a context-aware mixed criticality systems development platform," Computer Communications, vol. 104, pp. 1-16, 15 May 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Taherin, M. Salehi, and A. Ejlali, "Reliability-aware energy management in mixed-criticality systems," IEEE Trans. on Sustainable Computing, vol. 3, no. 3, pp. 195-208, Jul.-Sept. 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Salehi, A. Ejlali, and B. M. Al-Hashimi, "Two-phase low-energy N-modular redundancy for hard real-time multi-core systems," IEEE TPDS, vol. 27, no. 5, pp. 1497-1510, May 2015.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. Baruah, C. Bipasa, L. Haohan, and S. Insik, "Mixed-criticality scheduling on multiprocessors," Real-Time Systems, vol. 50, no. 1, pp. 142-177, Jan. 2014.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	C. Gu, G. Nan, D. Qingxu, and Y. Wang, "Partitioned mixed-criticality scheduling on multiprocessor platforms," in Proc. Design, Automation &amp; Test in Europe Conf. &amp; Exhibition, DATE'14, 6 pp., Dresden, Germany, 24-28 Mar. 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Y. Zhang and K. Chakrabarty, "Dynamic adaptation for fault tolerance and power management in embedded real-time systems," ACM Trans. on Embedded Computing Systems, vol. 3, no. 2, pp. 336-360, May 2004.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	L. Benini, A. Bogliolo, and G. De Micheli, "A survey of design techniques for system-level dynamic power management," IEEE Trans. VLSI Sys., vol. 8, no. 3, pp. 299-316, Jun. 2000.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	T. D. Burd, T. A. Pering, A. J. Stratakos, and R. W. Brodersen, "A dynamic voltage scaled microprocessor system," IEEE J. Solid-State Circuits, vol. 35, no. 11, pp. 1571-1580, Nov. 2000.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. A. Haque, H. Aydin, and D. Zhu, "On reliability management of energy-aware real-time systems through task replication," IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 3, pp. 813-825, Mar. 2017.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Y. Zhang and R.Chen, "A survey of energy-aware scheduling in mixed-criticality systems," Journal of Systems Architecture, vol.1, no.17, Article ID: 102524,  Jun. 2022. </unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	J. Chen and C. Kuo, "Energy-efficient scheduling for realtime systems on dynamic voltage scaling (dvs) platforms," in Proc. Embedded and Real-Time Computing Systems and Applications, RTCSA'07, pp. 28-38, Daegu, South Korea, 21-24 Aug. 2007.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	A. Burns and R. I. Davis, Mixed-Criticality Systems: A Review, Tech. Rep., Dept. Comput. Sci. Univ. York, 61 pp. 1-61, 2016.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	S. Narayana, P. Huang, G. Giannopoulou, L. Thiele, and R. V. Prasad, "Exploring energy saving for mixed-criticality systems on multi-cores," in Proc. IEEE Real-Time and Embedded Technology and Applications Symp., RTAS'16, 12 pp., Vienna, Austria, 11-14 Apr. 2016.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	P. Huang, P. Kumar, G. Giannopoulou, and L. Thiele, "Energy efficient DVFS scheduling for mixed-criticality systems," in Proc. Int. Conf. Embedded Software, EMSOFT'14, 10 pp., Uttar Pradesh, India, 12-17 Oct. 2014.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	V. Moghaddas, M. Fazeli, and A. Patooghy, "Reliability-oriented scheduling for static-priority real-time tasks in standby-sparing systems," Microprocessors and Microsystems, Pt A, vol. 45, pp. 208-215, Aug. 2016.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	V. Legout, M. Jan, and L. Pautet, "Mixed-criticality multiprocessor real-time systems: energy consumption vs deadline misses," in Proc. 1st. Workshop on Real-Time Mixed Criticality Syst., ReTiMiCS'13', 6 pp., Taipei, Taiwan. Aug. 2013.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	M. Völp, M. Hähnel, and A. Lackorzynski, "Has energy surpassed timeliness? scheduling energy-constrained mixed-criticality systems," in Proc. IEEE Real-Time and Embedded Technology and Applications Symp., RTAS'14, pp. 275-284, Berlin, Germany, 15-17 Apr. 2014.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	F. Zhang and A. Burns, "Schedulability analysis for real-time systems with EDF scheduling," IEEE Trans. on Computers, vol. 589, no. 9, pp. 1250-1258, Sept. 2009.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	N. Audsley, Optimal Priority Assignment and Feasibility of Static Priority Tasks with Arbitrary Start Times, Dept. of Comp. Sci., University of York, UK, 1991.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	A. K. Singh, M. Shafique, A. Kumar, and J. Henkel, "Mapping on multi/many-core systems: Survey of current and emerging trends," in Proc. of 50th ACM/EDAC/IEEE Design Automation Conf., DAC'13, pp. 275-284, Austin, TX, USA, 29 May-7 Jun. 2013.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	A. Bastoni, B. B. Brandenburg, and J. H. Anderson, "An emperical comparison of global, partitioned and clustered multiprocessor EDF mchedulers," in Proc. 31st IEEE Real-Time Systems Symp., RTSS'10, San Diego, CA, USA, 30 Nov.-3 Dec. 2010.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Event-Driven Distributed Trust Model for Internet of Things Network</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Zahra</given_name><surname>Hadian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Fazllolah</given_name><surname>Adibnia</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>وحید</given_name><surname>رنجبر</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2024</year></publication_date><pages><first_page>109</first_page><last_page>118</last_page></pages><doi_data><doi>10.66224/ijece.39337.22.2.109</doi><resource>http://ijece.org/en/Article/39337</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/39337</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/39337</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/39337</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/39337</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/39337</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/39337</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/39337</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	R. Thirukkumaran and P. Muthu Kannan, "Survey: security and trust management in Internet of Things," in Proc. IEEE Global Conf. on Wireless Computing and Networking, GCWCN'18, pp. 131-134, Lonavala, India, 23-24 Nov. 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	L. Yijia, J. Wang, Z. Yan, Z. Wan, and R. Jäntti, "A survey on blockchain-based trust management for Internet of Things," IEEE Internet of Things J., vol. 10, no. 7, pp. 5898-5922, 1 Apr. 2023.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	U. Din, M. Guizani, B. S. Kim, S. Hassan, and M. Khurram Khan, "Trust management techniques for the Internet of Things: a survey," IEEE Access, vol. 7, pp. 29763-29787, 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Dhelim, et al., "Trust2Vec: large-scale IoT trust management system based on signed network embeddings," IEEE Internet of Things J., vol. 10, no. 1, pp. 553-562, 1 Jan. 2022.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Ali, et al., "Multilevel central trust management approach for task scheduling on IoT-based mobile cloud computing," Sensors, vol. 22, no. 1, Article ID: 108, Jan. 2022.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	K. A. Awan, I. Ud Din, A. Almogren, M. Guizani, and S. Khan, "StabTrust-a stable and centralized trust-based clustering mechanism for IoT enabled vehicular Ad-Hoc networks," IEEE Access, vol. 8, pp. 21159-21177, 2020.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. D. Alshehri and F. K. Hussain, "A centralized trust management mechanism for the Internet of Things (CTM-IoT)," in Proc. of 12th Int. Conf.on Broad-Band Wireless Computing, Communication and Applications, BWCCA'18, pp. 533-543, Barcelona, Spain, 8-10 Nov. 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. Guo, Trust-Based Service Management of Internet of Things Systems and Its Applications, Apr. 2018, Accessed: Jul. 25, 2021. [Online]. Available: https://vtechworks.lib.vt.edu/handle/10919/82854</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	O. Ben Abderrahim, M. H. Elhdhili, and L. Saidane, "TMCoI-SIOT: a trust management system based on communities of interest 
for the social Internet of Things," in Proc. 13th Int. Wireless Communications and Mobile Computing Conf., IWCMC'17, pp. 747-752, Valencia, Spain , 26-30 Jun. 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Q. Arshad, W. Zada Khan, F. Azam, M. K. Khan, H. Yu, and Y. B. Zikria, "Blockchain-based decentralized trust management in IoT: systems, requirements and challenges," Complex &amp; Intelligent Systems, vol. 9, no. 6, pp. 6155-6176, 2023.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	K. A. Awan, et al., "RobustTrust-a pro-privacy robust distributed trust management mechanism for Internet of Things," IEEE Access, vol. 7, pp. 62095-62106, 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	R. Das, M. Singh, and K. Majumder, "SGSQoT: a community-based trust management scheme in Internet of Things," in Proc. of Int. Ethical Hacking Conf., EHaCON'18, pp. 209-222, Kolkata, India, 2019.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Y. Alghofaili and M. A. Rassam, "A trust management model for IoT devices and services based on the multi-criteria decision-making approach and deep long short-term memory technique," Sensors, vol. 22, no. 2, Article ID: 834, Jan. 2022.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Adewuyi, H. Cheng, Q. Shi, J. Cao, Á. MacDermott, and X. Wang, "CTRUST: a dynamic trust model for collaborative applications in the Internet of Things," IEEE Internet of Things J., vol. 6, no. 3, pp. 5432-5445, Jun. 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	P. Massa and P. Avesani, "Trust-aware recommender systems," in Proc. ACM Recommender Systems Conf., RecSys'07, pp. 17-24, Minneapolis, MN, USA, 19-20 Oct. 2007.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. W. A. Hamdani, et al., "Dynamic distributed trust management scheme for the Internet of Things," Turk J. Elec Eng &amp; Comp Sci, vol. 29, no. 2, pp. 796-815, Mar. 2021.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt, "Cross-level sensor network simulation with COOJA," in Proc. 31st IEEE Conf. on Local Computer Networks, pp. 641-648, Tampa, FL, USA, 16-18 Nov. 2006.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Effective Application of Fractional Optimal Control in the Treatment of Infectious Diseases</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Amin</given_name><surname>Jajarmi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>‎Manijeh</given_name><surname>Hasanabadi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2024</year></publication_date><pages><first_page>138</first_page><last_page>146</last_page></pages><doi_data><doi>10.66224/ijece.41947.22.2.138</doi><resource>http://ijece.org/en/Article/41947</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/41947</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/41947</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/41947</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/41947</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/41947</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/41947</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/41947</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	World Health Organization (WHO), HIV and AIDS, https://www.who.int/news-room/fact-sheets/detail/hiv-aids.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	UNAIDS: Fast-Track-Ending the AIDS Epidemic by 2030. http://www.unaids.org.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	N. H. Sweilam, S. M. Al-Mekhlafi, and D. Baleanu, "Optimal control for a fractional tuberculosis infection model including the impact of diabetes and resistant strains," J. of Advanced Research, vol. 17, pp. 125-137, May 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. Kumar, J. Singh, M. Al Qurashi, and D. Baleanu, "A new fractional SIRS-SI malaria disease model with application of vaccines, antimalarial drugs, and spraying," Advances in Difference Equations, vol. 2019, Article ID: 278, Jul. 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. A. Khan, Z. Hammouch, and D. Baleanu, "Modeling the dynamics of hepatitis E via the Caputo-Fabrizio derivative," Mathematical Modelling of Natural Phenomena, vol. 14, no. 3, Article ID:  311, Apr. 2019.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	C. J. Silva and D. F. Torres, "A SICA compartmental model in epidemiology with application to HIV/AIDS in Cape Verde," Ecological Complexity, vol. 13, pp. 70-75, Jun. 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Jajarmi, A. Yusuf, D. Baleanu, and M. Inc, "A new fractional HRSV model and its optimal control: a non-singular operator approach," Physica A: Statistical Mechanics and its Applications, vol. 547, Article ID: 123860, Jun. 2020.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Rosa and D. F. M. Torres, "Optimal control of a fractional order epidemic model with application to human respiratory syncytial virus infection," Chaos, Solitons &amp; Fractals, vol. 117, pp. 142-149, Dec. 2018.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Kheiri and M. Jafari, "Fractional optimal control of an HIV/AIDS epidemic model with random testing and contact tracing," J. of Applied Mathematics and Computing, vol. 60, pp. 387-411, 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	C. Campos, C. J. Silva, and D. F. M. Torres, "Numerical optimal control of HIV transmission in Octave/MATLAB," Mathematical and Computational Applications, vol. 25, no. 1, Article ID: 1, 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	P. Agarwal, D. Baleanu, Y. Chen, S. Momani, and J. A. T. Machado, Proc. Fractional Calculus: ICFDA 2018, Amman, Jordan, 16-18 Jul. 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Boukhouima, et al., "Stability analysis and optimal control of a fractional HIV-AIDS epidemic model with memory and general incidence rate," The European Physical J. Plus, vol. 136, Article ID: 103, 2021.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Jajarmi, D. Baleanu, S. S. Sajjadi, and J. J. Nieto, "Analysis and some applications of a regularized Ψ-Hilfer fractional derivative," J. of Computational and Applied Mathematics, vol. 415, Article ID:  114476, 2022.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. Sabermahani, Y. Ordokhani, and P. Rahimkhani, "Application of generalized Lucas wavelet method for solving nonlinear fractal-fractional optimal control problems," Chaos, Solitons &amp; Fractals, vol. 170, Article ID: 113348, May 2023.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	C. Liu, C. Yu, Z. Gong, H. T. Cheong, and K. L. Teo, "Numerical computation of optimal control problems with Atangana-Baleanu fractional derivatives," J. of Optimization Theory and Applications, vol. 197, no. 2, pp. 798-816, May 2023.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	F. Kheyrinataj, A. Nazemi, and M. Mortezaee, "Solving time delay fractional optimal control problems via a Gudermannian neural network and convergence results," Network: Computation in Neural Systems, vol. 34, no. 1-2, pp. 122-150, Feb. 2023.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Vellappandi and V. Govindaraj, "Operator theoretic approach to optimal control problems characterized by the Caputo fractional differential equations," Results in Control and Optimization, vol. 10, Article ID:  100194, Mar. 2023.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	C. Liu, W. Sun, and X. Yi, "Optimal control of a fractional smoking system," J. of Industrial and Management Optimization, vol. 19, no. 4, pp. 2936-2954, Apr. 2023.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	R. Almeida, "A caputo fractional derivative of a function with respect to another function," Communications in Nonlinear Science and Numerical Simulation, vol. 44, pp. 460-481, Mar. 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	República de Cabo Verde. Rapport de progrès sur la riposte au SIDA au Cabo Verde-2015, Comitéde Coordenaçao ao do Combate a Sida; 2015.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. F. Gómez-Aguilar, J. J. Rosales-García, J. J. Bernal-Alvarado, 
T. Córdova-Fraga, and R. Guzmán-Cabrera, "Fractional mechanical oscillators," Revista Mexicana de Física, vol. 58, no. 4, pp. 348-352, Aug. 2012.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	D. E. Kirk, Optimal Control Theory: An Introduction, New Jersey: Prentice-Hall, 1970.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	A. Jajarmi and D. Baleanu, "On the fractional optimal control problems with a general derivative operator," Asian J. of Control, vol. 23, no. 2, pp. 1062-1071, 2021.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	W. Hackbush, "A numerical method for solving parabolic equations with opposite orientations," Computing, vol. 20, pp. 229-240, Sept. 1978.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New Green Optimal Routng Algorithm in Data Communication Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohsen</given_name><surname>Heydarian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Fariba</given_name><surname>Darvishiyan</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2024</year></publication_date><pages><first_page>65</first_page><last_page>84</last_page></pages><doi_data><doi>10.66224/ijece.41974.22.2.65</doi><resource>http://ijece.org/en/Article/41974</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/41974</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/41974</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/41974</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/41974</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/41974</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/41974</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/41974</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Mihailovic, B. Abrishamchi, and M. Farhoudi, "A comprehensive multi-topology minimum set cover link-state routing approach for emerging random all-IP access network ntopologies," J. of Computer Networks, vol. 219, Article ID: 109418, 2022.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Y. Romanov, E. V. Lezhnev, and A. Y. Glukhikh, "Development of routing algorithms in networks-on-chip based on two-dimensional optimal circulant topologies," J. of Heliyon, vol. 6, no. 1, Article ID: e03183, Jan. 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Z. Basit, M. Tabassum, T. Sharma, and M. Furqan, "Performance analysis of OSPF and EIGRP convergence through IPsec tunnel using multi-homing BGP connection," Materials Today: Proceedings, vol. 62, no. 7, pp. 4853-4861, Dec. 2022.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. Liu, B. Barber, and L. DiGrande, CHAPTER 5 - Routing Protocols: RIP, RIPv2, IGRP, EIGRP, OSPF, Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit 2009, pp. 169-196.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. Wu and Y. Gao, "An ant colony optimization based on local search for the vehicle routing problem with simultaneous pickup-delivery and time window," J. of Applied Soft Computing, vol. 139, no. C, Article ID: 110203, May 2023.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	I. L. Cherif, L. Zitoune, and V. Vèque, "Energy efficient routing for wireless mesh networks with directional antennas: when Q-learning meets ant systems," J. of Ad Hoc Networks, vol. 121, Article ID: 102589, Oct. 2021.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Isazadeh and M. Heydarian, "Optimal multicast multichannel routing in computer networks," J. of Computer Communications, vol. 31, no. 17, pp. 4149-4161, Nov. 2008.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Garvey, R. G. Rieksts, B. Q. Ventura, and J. A. Ahn, 
"Binary linear programming models for robust broadcasting in communication networks," J. of Mathematics, vol. 204, pp. 173-184, May 2016.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	J. Costa, J. M. Paniago, P. P. Andrade, J. Noronha, and T. F. Vieira, "Integer linear programming formulations for the variable data rate and variable channel bandwidth scheduling problem in wireless networks," J. of Computer Networks, vol. 165, Article ID: 106939, Dec. 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Y. Liu and Q. Chen, "Collaborated eco-routing optimization for continuous traffic flow based on energy consumption difference of multiple vehicles," J. of Energy, vol. 274, Article ID: 127277, Jul. 2023.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. M. Nasiri, H. Mousavi, and S. N. Abarghooee, "A green location-inventory-routing optimization model with simultaneous pickup and delivery under disruption risks," Decision Analytics J., vol. 6, Article ID: 100161, Mar. 2023.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Chaurasia, K. Kumar, and N. Kumar, "MOCRAW: a meta-heuristic optimized cluster head selection based routing algorithm for WSNs," J. of Ad Hoc Networks, vol. 141, Article ID: 103079, Mar. 2023.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Taneja, S. Rani, and S. Garg, "Energy aware resource control mechanism for improved performance in future green 6G networks," J. of Computer Networks, vol. 217, Article ID: 109333, Nov. 2022.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. Kamble, P. Bhilwar, and B. R. Chandavarkar, "Novel fuzzy-based objective function for routing protocol for low power and lossy networks," J. of Ad Hoc Networks, vol 144, Article ID: 103150, May 2023.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	R. Tirumalasetti and S. K. Singh, "Automatic dynamic user allocation with opportunistic routing over vehicles network for intelligent transport system," J. of Sustainable Energy Technologies and Assessments, vol. 57, Article ID: 103195, Jun. 2023.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	B. R. Dawadi, D. B. Rawat, S. R. Joshi, and M. M. Keitsch, "Recommendations for energy efficient SoDIP6 network," in Proc. Int. Conf. on Computing, Networking and Communications, ICNC'19, pp. 714-718, Honolulu, HI, USA, 18-21 Feb. 2019.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	C. Kaur and S. Kaur, "An energy efficient resource allocation policy in cloud infrastructure," International J. of Engineering Science, vol. 31, no. ???, pp. ???-???, Feb. 2024.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	G. Koutsandria, V. DiValerio, D. Spenza, S. Basagni, and C. Petrioli, "Wake-up radio-based data forwarding for green wireless networks," J. of Computer Communications, vol. 160, pp. 172-185, Sept. 2020.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Y. Wu, B. Guo, Y. Shen, J. Wang, and X. Liu, "A cross-layer optimization and design approach under QoS constraints for green IP over WDM networks," J. of Computer Networks, vol. 76, pp. 177-190, May 2015.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	C. Singhal, D. K. Jain, A. Tarable, and A. Nayyar, "Special issue on smart green computing for wireless sensor networks," J. of Computer Communications, vol. 190, no. C, pp. 216-218, Jun. 2022.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. Kumar, et al., "Towards green communication in wireless sensor network: GA enabled distributed zone approach," J. of Ad Hoc Networks, vol. 93, Article ID: 101903, Oct. 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	F. Andreagiovanni, R. G. Garroppo, and M. G. Scutellà, "Green design of wireless local area networks by multiband robust optimization," J. of Electronic Notes in Discrete Mathematics, 
vol. 64, pp. 225-234, Feb. 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. Abbasi and H. A. Choukolaei, "A systematic review of green supply chain network design literature focusing on carbon policy," Decision Analytics J., vol. 6, Article ID: 100189, Mar. 2023.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. Dong, G. Ren, Y. Xue, and K. Liu, "Urban green innovation's spatial association networks in China and their mechanisms," J. of Sustainable Cities and Society, vol. 93, Article ID: 104536, Jun. 2023.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	L. Melander and A. Arvidsson, "Green innovation networks: a research agenda," J. of Cleaner Production, vol. 357, no Article ID: 131926, May 2022.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	C. H. Hsu and N. M. Eshwarappa, "Green communication approach for the smart city using renewable energy systems," J. of Energy Reports, vol. 8, pp. 9528-9540, Nov. 2022.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	B. T. Geetha, P. S. Kumar, and B. S. Bama, "Green energy aware and cluster based communication for future load prediction in IoT," J. of Sustainable Energy Technologies and Assessments, vol. 52, 
no. C, Article ID: 102244, Aug. 2022.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	N. Drouant, E. Rondeau, J. P. Georges, and F. Lepage, "Designing green network architectures using the ten commandments for a mature ecosystem," J. of Computer Communications, vol. 42, pp. 38-46, Apr. 2014.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	A. Isazadeh and M. Heydarian, "Optimal multicast multichannel routing in computer networks," Computer Communications, vol. 31, no. 17, pp. 4149-4161, Nov. 2008.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	G. L. Xue, "Optimal multichannel data transmission in computer networks," J. of Computer Communications, vol. 26, no. 7, pp. 759-765, May 2003.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	L. R. Ford and D. R. Fulkerson, "Constructing maximal dynamic flows from static flows," J. of Operation Reasearch, vol. 6, no. 3, pp. 419-433, Sept./Jun. 1958.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	D. Lin, Z. Lin, L. Kong, and Y. L. Guan, "CMSTR: a constrained minimum spanning tree based routing protocol for wireless sensor networks," J. of Ad Hoc Networks, vol. 146, Article ID: 103160, Jul. 2023.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	S. Babu and A. R. K. Parthiban, "DTMR: an adaptive distributed tree-based multicast routing protocol for vehicular networks," J. of Computer Standards &amp; Interfaces, vol. 79, Article ID: 103551, Jan. 2022.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	Q. Liu, H. P. Ren, R. J. Tang, and J. L. Yao, "Optimizing co-existing multicast routing trees in IP network via discrete artificial fish school algorithm," J. of Knowledge-Based Systems, vol. 191, Article ID: 105276, Mar. 2020.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Novel Approach based on Chaotic Mapping for Implementing Security Phases on Cloud Computing</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Azita</given_name><surname>Rezaei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ali</given_name><surname>Broumandnia</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyed Javad</given_name><surname>Mirabedini</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2024</year></publication_date><pages><first_page>85</first_page><last_page>99</last_page></pages><doi_data><doi>10.66224/ijece.42725.22.2.85</doi><resource>http://ijece.org/en/Article/42725</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/42725</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/42725</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/42725</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/42725</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/42725</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/42725</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/42725</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	P. Zavarasky, R. S. Bali, and F. Jaafar, "Lightweight authentication for MQTT to improve the security of iot communication," in Proc. of the 3rd Int. Conf. on Cryptography, Security and Privacy, ICCSP'19, pp. 6-12, Kuala Lumpur Malaysia, 9-21 Jan. 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. V. Pawar and J. Anuradha, "Network security and types of attacks in network," Procedia Computer Science, vol. 48, pp. 503-506, 2015.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Singh, Z. Amin, and N. Sethi, "Review on fault tolerance techniques in cloud computing," International J. of Computer Applications, vol. 116, no. 18, pp. 11-17, 2015.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Venugopala, J. Broberg, I. Brandic, R. Buyya, and C. S. Yeoa, "Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility," Future Generation Computer Systems, vol. 25, no. 6, pp. 599-616, Jun. 2008.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. Ghazanfaripour and A. Broumandnia, "Designing a digital image encryption scheme using chaotic maps with prime modular," Optics and Laser Technology, vol. 131, Article ID: 106339, 2020.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Coen-Porisini, A. Rizzardi, and S. Sicari, "Analysis on functionalities and security features of internet of things related protocols," Wireless Networks, vol. 28, no. 7, pp. 2857-2887, 2022.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	C. Liao, et al., "MODECP: a multi-objective based approach for solving distributed controller placement problem in software defined network," Sensors, vol. 22, no. 15, Article ID:  22155475, 2022.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	L. T. Yang, G. Huang, J. Feng, and L. Xu, "Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing," Information Sciences, vol. 387, pp. 254-265, May 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Broumandnia, "Image encryption algorithm based on the finite fields in chaotic maps," J. of Information Security and Applications, vol. 54, Article ID:  102553, Oct. 2020.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	E. B. Sanjuan, I. A. Cardiel, J. A. Cerrada, and C. Cerrada, "Message queuing telemetry transport (MQTT) security: a cryptographic smart card approach," IEEE Access, vol. 8, pp. 115051-115062, 2020.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Z. Shen and Q. Tong, "The security of cloud computing system enabled by trusted computing technology," in Proc. 2nd Int. Conf. on Signal Processing Systems, vol. 2, pp. 11-15, Dalian, China, 5-7 Jul. 2010.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. V. Kumar, G. Manogaran, and C. Thota, "Metaclouddatastorage architecture for big data security in cloud computing," Procedia Computer Science, vol. 87, pp. 128-133, 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Q. Zheng, "Improving MapReduce fault tolerance in the cloud," in Proc. IEEE Int. Symp. on Parallel Distributed Processing, Workshops and PhD Forum, IPDPSW'10, 6 pp., Atlanta, GA, USA, 19-23 Apr. 2010.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. K. Sharma, P. Gautam, and M. D. Ansari, "Enhanced security for electronic health care information using obfuscation and RSA algorithm in cloud computing," International J. of Information Security and Privacy, vol. 13, no. 1, pp. 59-69, Jan./Mar. 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Ratha, "Resource provision and QoS support with added security for client side applications in cloud computing," International J. of Information Technology, vol. 11, pp. 357–364, 2019.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Khatri, Y. Sharma, and H. Gupta, "A security model for the enhancement of data privacy in cloud computing," in Proc. Amity Int. Conf. on Artificial Intelligence, AICAI'19, pp. 898-902, Dubai, United Arab Emirates, 4-6 Feb. 2019.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	I. Banerjee and N. Nesa, "Combining merkle hash tree and chaotic cryptography for secure data fusion in IoT," Trans. on Computational Science, vol. 35, pp. 85-105, 2020.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. F. Aboalmaaly, A. J. Hintaw, S. Manickam, and S. Karuppayah, "MQTT vulnerabilities, attack vectors and solutions in the internet of things (IoT)," IETE J. of Research, vol. 69, no. 6, pp. 3368-3397, 2023.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	G. Raines, Cloud Computing and SOA, Technical Report, the MITRE Corporation, 2009.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Santambrogio, R. Jhawar, and V. Piur, "A comprehensive conceptual system-level approach to fault tolerance in cloud computing," in Proc. IEEE Int. Systems Conf., SysCon'12, 5 pp., Vancouver, Canada, 19-22 Mar. 2012.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	K. Sood, "A combined approach to ensure data security in cloud computing," J. of Network and Computer Applications, vol. 35, no. 6, pp. 1831-1838, Nov. 2012.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	P. Wiedera, "Fault-tolerant service level agreement lifecycle management in clouds using actor system," Future Generation Computer Systems, Elsevier B.V, vol. 54, pp. 247-259, Jan. 2016.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	H. Liang, D. Huang, L. X. Cai, X. Shen, and D. Peng, "Resource allocation for security services in mobile cloud computing," in 
Proc. IEEE Conf. on Computer Communications Workshops, INFOCOM WKSHPS'11, pp. 191-195, Shanghai, China, 10-15 Apr. 2011.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Y. Protskaya, L. Veltri, F. Zanichelli, M. Amoretti, and R. Pecori, "A scalable and secure publish/subscribebased framework for industrial IoT," IEEE Trans. on Industrial Informatics, vol. 17, no. 6, pp. 3815-3825, Jun. 2021.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	L. Huang, S. Cai, X. Xiong, and M. Xiao, "On symmetric color image encryption system with permutation-diffusion simultaneous operation," Optics and Lasers in Engineering, vol. 115, pp. 7-20, Apr. 2019.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	P. Li, et al., "A novel color image encryption scheme using DNA permutation based on the Lorenz system," Multimedia Tools and Applications, vol. 77, no. 5, pp. 6243-6265, Mar. 2018.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Y. Q. Zhang, X. Y. Wang, J. Liu, and Z. L. Chi, "An image encryption scheme based on the MLNCML system using DNA sequences," Optics and Lasers in Engineering, vol. 82, pp. 95-103, Jul. 2016.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	N. Chauhan, H. Banka, and R. Agrawal, "Delay-aware application offloading in fog environment using multi-class Brownian model," Wireless Networks, vol. 27, no. 7, pp. 4479-4495, 2021.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	C. A. F. De Rose, R. Buyya, R. N. Calheiros, and M. A. S. Netto, "EMUSIM: an integrated emulation and simulation environment for modeling, evaluation, and validation of performance of cloud computing applications," Software: Practice and Exprience, vol. 43, no. 2, pp. 595-612, 2013.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	A. Beloglazov, C. A. F. De Rose, R. Buyya, R. N. Calheiros, and 
R. Ranjan, "Cloudsim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms," Software-Practice and Experience, vol. 41, no. 1, pp. 23-50, Jan. 2010.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	T. Halabi and M. Bellaiche, "A broker-based framework for standardization and management of cloud security-SLAs," Computers and Security, vol. 75, pp. 59-71, Jun. 2018.
</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Predicting ratings in recommender systems considering the dynamics of  users’ preferences dynamics and changes in items' characteristics</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hamidreza</given_name><surname>Tahamsbi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2024</year></publication_date><pages><first_page>119</first_page><last_page>128</last_page></pages><doi_data><doi>10.66224/ijece.42983.22.2.119</doi><resource>http://ijece.org/en/Article/42983</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/42983</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/42983</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/42983</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/42983</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/42983</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/42983</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/42983</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	H. Tahmasbi, M. Jalali, and H. Shakeri, "TSCMF: temporal and social collective matrix factorization model for recommender systems," J. Intell. Inf. Syst., vol. 56, no. 1, pp. 169-187, Feb. 2021.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Koren, "Collaborative filtering with temporal dynamics," Commun. ACM, vol. 53, no. 4, pp. 89-97, Apr. 2010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	I. Rabiu, N. Salim, A. Da'u, A. Osman, and M. Nasser, "Exploiting dynamic changes from latent features to improve recommendation using temporal matrix factorization," Egypt. Informatics J., vol. 22, no. 3, pp. 285-294, Sept. 2021.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Zhang and X. Lu, "A multi-trans matrix factorization model with improved time weight in temporal recommender systems," IEEE Access, vol. 8, pp. 2408-2416, 2020.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Z. Jin, Y. Zhang, W. Mu, W. Wang, and H. Jin, "Leveraging the dynamic changes from items to improve recommendation," in Proc. 37th Int. Conf. on Conceptual Modeling, pp. 507-520, Xi'an, China, 22-25 Oct. 2018.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	T. Wu, Y. Feng, J. Sang, B. Qiang, and Y. Wang, "A novel recommendation algorithm incorporating temporal dynamics, reviews and item correlation," IEICE Trans. Inf. Syst., vol. E101-D, 
no. 8, pp. 2027-2034, 2018.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	I. Rabiu, N. Salim, A. Da'u, and A. Osman, "Recommender system based on temporal models: a systematic review," Appl. Sci., vol. 10, no. 7, pp. 1-27, Apr. 2020.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	I. Rabiu, N. Salim, A. Da'u, and M. Nasser, "Modeling sentimental bias and temporal dynamics for adaptive deep recommendation system," Expert Syst. Appl., vol. 191, no. C, Article ID: 116262, Apr. 2022.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	D. Rafailidis, P. Kefalas, and Y. Manolopoulos, "Preference dynamics with multimodal user-item interactions in social media recommendation," Expert Syst. Appl., vol. 74, no. C, pp. 11-18, May 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Y. Y. Lo, W. Liao, C. S. Chang, and Y. C. Lee, "Temporal matrix factorization for tracking concept drift in individual user preferences," IEEE Trans. Comput. Soc. Syst., vol. 5, no. 1, pp. 156-168, Mar. 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	C. Wangwatcharakul and S. Wongthanavasu, "A novel temporal recommender system based on multiple transitions in user preference drift and topic review evolution," Expert Syst. Appl., vol. 241, no. C, Article ID: 115626, Apr. 2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12‌	ح. طهماسبي، م. جلالي و ح. شاكري، "یک سامانه پیشنهاددهنده اجتماعی مبتنی بر تجزیه ماتریس با در‌نظر‌گرفتن پویایی علایق کاربران، "پردازش علائم و داده‌ها، سال 18، شماره 1، صص. 28-13، خرداد 1400.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Sheibani, H. Shakeri, and R. Sheibani, "Four-dimensional trust propagation model for improving the accuracy of recommender systems," J. Supercomput., vol. 79, pp. 16793-16820, 2023.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	C. Zhang, K. Wang, H. Yu, J. Sun, and E. P. Lim, "Latent factor transition for dynamic collaborative filtering," in Proc. of the SIAM Int. Conf. on Data Mining, pp. 452-460, Philadelfia, PA, USA24-26 Apr. 2014.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	C. Zhang, Improving Recommender Systems with Rich Side Information, Simon Fraser University, 2015.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Z. Chen and S. Wang, "A review on matrix completion for recommender systems," Knowl. Inf. Syst., vol. 64, no. 1, pp. 1-34, Jan. 2022.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	B. Ju, Y. Qian, M. Ye, R. Ni, and C. Zhu, "Using dynamic multi-task non-negative matrix factorization to detect the evolution of user preferences in collaborative filtering," PLoS One, vol. 10, no. 8, Article ID: 0135090, 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	H. Bao, Q. Li, S. S. Liao, S. Song, and H. Gao, "A new temporal and social PMF-based method to predict users' interests in micro-blogging," Decis. Support Syst., vol. 55, no. 3, pp. 698-709, Jun. 2013.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Y. Aravkin, K. R. Varshney, and L. Yang, "Dynamic matrix factorization with social influence," in Proc. IEEE Int. Workshop on Machine Learning for Signal Processing, 6 pp., Vietri sul Mare, Italy, 13-16 Sept. 2016.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	D. Rafailidis and A. Nanopoulos, "Modeling users' preference dynamics and side information in recommender systems," IEEE Trans. Syst. Man, Cybern. Syst., vol. 46, no. 6, pp. 782-792, Jun. 2016.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	L. Xiong, X. Chen, T. K. Huang, J. Schneider, and J. G. Carbonell, "Temporal collaborative filtering with bayesian probabilistic tensor factorization," in Proc. of the SIAM Int. Conf. on Data Mining, pp. 211-222, Colombus, OH, USA, 29 Apr.-1 May 2010.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	J. Zhao, S. Yang, H. Huo, Q. Sun, and X. Geng, "TBTF: an effective time-varying bias tensor factorization algorithm for recommender system," Appl. Intell., vol. 51, no. 7, pp. 4933-4944, 2021.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	H. Tahmasbi, M. Jalali, and H. Shakeri, "Modeling user preference dynamics with coupled tensor factorization for social media recommendation," J. Ambient Intell. Humaniz. Comput., vol. 12, 
no. 10, pp. 9693-9712,  2021.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. Yu, Z. Zhou, B. Chen, and L. Cao, "Generalized temporal similarity-based nonnegative tensor decomposition for modeling transition matrix of dynamic collaborative filtering," Inf. Sci. (Ny), vol. 632, pp. 340-357, Jun. 2023.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	C. Tong, J. Qi, Y. Lian, J. Niu, and J. J. P. C. Rodrigues, "TimeTrustSVD: a collaborative filtering model integrating time, trust and rating information," Futur. Gener. Comput. Syst., vol. 93, pp. 933-941, Apr. 2019.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	D. Lee and H. S. Seung, "Algorithms for non-negative matrix factorization," in Proc. of the 13th Int. Conf. on Neural Information Processing Systems, pp. 535-541, Denver, CO, USA, 1-1 Jan. 2000.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	D. D. Lee and H. S. Seung, "Learning the parts of objects by non-negative matrix factorization," Nature, vol. 401, pp. 788-791, 1999.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	H. W. Kuhn and A. W. Tucker, "Nonlinear programming," in Proc. of the 2nd Berkeley Symp. on Mathematical Statistics and Probability, vol. 1951, pp. 481-492, 1951.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	J. Tang, Epinions Dataset, [Online]. Available: http://www.cse.msu.edu/~tangjili/trust.html. [Accessed: 11-Feb-2022].</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	H. Ma, T. C. Zhou, M. R. Lyu, and I. King, "Improving recommender systems by incorporating contextual information," ACM Trans. Inf. Syst., vol. 29, no. 2, Article ID: 9, 23 pp., Apr. 2011.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Community Detection in Complex Networks Using Minimum Spanning Tree and Modularity Maximization</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>sondos</given_name><surname>bahadori</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>maryam</given_name><surname>nooraei </surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2024</year></publication_date><pages><first_page>100</first_page><last_page>108</last_page></pages><doi_data><doi>10.66224/ijece.43289.22.2.100</doi><resource>http://ijece.org/en/Article/43289</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/43289</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/43289</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/43289</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/43289</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/43289</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/43289</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/43289</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	D. J. Watts and S. H. Strogatz, "Collective dynamics of 'small-worldl networks," Nature, vol. 393, pp. 440-442, 1998.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. L. Barabási and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, no. 5439, pp. 509-512, 15 Oct. 1999.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Girvan and M. E. Newman, "Community structure in social and biological networks," Proc. Natl. Acad. Sci., vol. 99, no. 12, pp. 7821-7826, 2002.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. E. Newman and M. Girvan, "Finding and evaluating community structure in networks," Phys. Rev. E, vol. 69, no. 2, Article ID: 026113, 2004.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. E. Newman, "The structure and function of complex networks," SIAM Rev., vol. 45, no. 2, pp. 167-256, 2003.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	E. Ravasz, A. L. Somera, D. A. Mongru, Z. N. Oltvai, and A. L. Barabási, "Hierarchical organization of modularity in metabolic networks," Science, vol. 297, no. 5586, pp. 1551-1555, 2002.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. M. Wilkinson and B. A. Huberman, "A method for finding communities of related genes," in Proc. Natl. Acad. Sci. vol. 101, suppl 1, pp. 5241-5248, 2004.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Guimera and L. A. N. Amaral, "Functional cartography of complex metabolic networks," Nature vol. 433, no. 7028, pp. 895-900, 2005.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	G. W. Flake, S. Lawrence, C. L. Giles, and F. M. Coetzee, "Self-organization and identification of web communities," Computer, vol. 35, no. 3, pp. 66-70, Mar. 2002.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Y. Dourisboure, F. Geraci, and M. Pellegrini, "Extraction and classification of dense communities in the web," in Proc. of the 16th Int. Conf. on World Wide Web, pp. 461-470, Banff, Canada, 8-12 May 2007.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Perianes-Rodríguez, C. Olmeda-Gómez, and F. Moya-Anegón, "Detecting, identifying and visualizing research groups in co-authorship networks," Scientometrics, vol. 82, no. 2, pp. 307-319, 2010.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	B. He, Y. Ding, J. Tang, V. Reguramalingam, and J. Bollen, "Mining diversity subgraph in multidisciplinary scientific collaboration networks, a meso perspective," J. Informetrics, vol. 7, no. 1, pp. 117-128, Jan. 2013.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. A. Porter, J. P. Onnela, and P. J. Mucha, "Communities in networks," Notices of the American Mathematical Society. vol. 56, no. 9, pp. 1082-1097, 2009.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. Fortunato, "Community detection in graphs," Phys. Rep., vol. 486, no. 3-5, pp. 75-174, Feb. 2010.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. E. J. Newman, "Communities, modules and large-scale structure in networks," Nature Physics, vol. 8, pp. 25-31, 2012.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Coscia, F. Giannotti, and D. Pedreschi, "A classification for community discovery methods in complex networks," Statistical Analysis and Data Mining, vol. 4, no. 5, pp. 512-546, Oct. 2011.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Z. Shi, Y. Liu, and J. Liang, "PSO-based community detection in complex networks," in Proc. 2nd Int. Symp. on Knowledge Acquisition and Modeling, KAM'09, vol. 3, pp. 114-119, Wuhan, China, 30 Nov.-1 Dec. 2009.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. E. J. Newman, "Detecting community structure in networks," the European Physical J. B-Condensed Matter and Complex Systems, vol. 38, no. 2, pp. 321-330, 2004.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Clauset, M. E. J. Newman, and C. Moore, "Finding community structure in very large networks," Physical Review E, vol. 70, no. 6, Article ID: 066111, 2004.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	C. Shi, Y. Wang, B. Wu, and C. Zhong, "A new genetic algorithm for community detection," Complex Sciences, vol. 535, Article ID: 122259, 2009.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	C. Pizzuti, "GA-Net: a genetic algorithm for community detection in social networks," in Proc. of the 10th Parallel Problem Solving from Nature-PPSN X, pp. 1081-1090, Dortmund, Germany, 13-17 Sept. 2008.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. E. J. Newman, "Finding community structure in networks using the eigenvectors of matrices," Physical Review E, vol. 74, no. 3, Article ID: 36104, 2006.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Reichardt and S. Bornholdt, "Statistical mechanics of community detection," Phys. Rev., vol. E 74, no. 1, Article ID: 016110, 2006.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	U. Brandes, et al., "On finding graph clusterings with maximum modularity," in Proc. of the 33rd Int. Workshop on Graph-Theoretic Concepts in Computer Science, pp. 121-132, Dornburg, Germany, 21-23 Jun. 2007.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	P. J. Bickel and A. Chen, "A nonparametric view of network models and Newman-Girvan and other modularities," Proc. Natl. Acad. Sci., vol. 106, pp. 21068-21073, 15 Dec. 2009.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	V. D. Blondel, J. L. Guillaume, R. Lambiotte, and E. Lefebvre, "Fast unfolding of communities in large networks," J. Stat. Mech., vol. 2008, Article ID: P10008, Oct. 2008.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	B. Saouda and A. Moussaoui, "Community detection in networks based on minimum spanning tree and modularity," Physica A, vol. 460, pp. 230-234, 15 Oct. 2016.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	D. Lusseau, "The emergent properties of a dolphin social network," in Proc. R. Soc. London. Ser. B: Biol. Sci., Suppl. 2, vol. 270, pp. S86-S188, 7 Nov. 2003.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	J. Eustace, X. Wang, and Y. Cui, "Community detection using local neighborhood in complex networks," Physica A., vol. 436, pp. 665-677, 15 Oct. 2015.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	A. Lancichinetti, F. Radicchi, J. J. Ramasco, and S. Fortunato, "Finding statistically significant communities in networks," PLoS One, vol. 6, no. 4, Article ID: e18961, 2011.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	A. Lancichinetti and S. Fortunato, "Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping communities," Phys. Rev., vol. E80, no. 1, Article ID: 016118, Jul. 2009.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	F. Meng, et al., "Incremental density-based link clustering algorithm for community detection in dynamic networks," Mathematical Problems in Engineering, vol. 2016, no. 1, Article ID: 1873504, 11 pp., Jan. 2016.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	K. Nath, R. Shanmugam, and V. Varadaranjan, "ma-CODE: a multi-phase approach on community detection in evolving networks," Information Sciences, vol. 569, pp. 326-343, Aug. 2021.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	X. Xu, N. Yuruk, Z. Feng, and T. A. Schweiger, "Scan: a structural clustering algorithm for networks," in Proc. of the 13th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, KDD'07, pp. 824-833, San Jose, CA, USA, 12-15 Aug. 2007.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	I. B. El Kouni, W. Karoui, and L. B. Romdhane, "Node importance based label propagation algorithm for overlapping community detection in networks," Expert Systems with Applications, vol. 162, Article ID: 113020, 30 Dec. 2020.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	N. Chen, Y. Liu, H. Chen, and J. Cheng, "Detecting communities in social networks using label propagation with information entropy," Physica A: Statistical Mechanics and its Applications, vol. 471, pp. 788-798, 1 Apr. 2017.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	G. Yang, W. Zheng, C. Che, and W. Wang, "Graph-based label propagation algorithm for community detection," International J. of Machine Learning and Cybernetics, vol. 11, pp. 1319-1329, 2020.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	B. Saoud and A. Moussaoui, "Community detection in networks based on minimum spanning tree and modularity," Physica A: Statistical Mechanics and its Applications, vol. 460, pp. 230-234, 15 Oct. 2016.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	J. Wu, X. Li, L. Jiao, X. Wang, and B. Sun, "Minimum spanning trees for community detection," Physica A: Statistical Mechanics and its Applications, vol. 392, no. 9, pp. 2265-2277, 1 May 2013.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	J. Zhu, B. Chen, and Y. Zeng, "Community detection based on modularity and k-plexes," Information Sciences, vol. 513, pp. 127-142, Mar. 2020.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	X. Zhou, K. Yang, Y. Xie, C. Yang, and T. Huang, "A novel modularity-based discrete state transition algorithm for community detection in networks," Neurocomputing, vol. 334, pp. 89-99, 21 Mar. 2019.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	J. Xie, M. Chen, and B. K. Szymanski, "LabelrankT: incremental community detection in dynamic networks via label propagation," 
in Proc. of the Workshop on Dynamic Networks Management and Mining, pp. 25-32, New York, NY, USA, 22-27 Jun. 2013.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	H. Shen, X. Cheng, K. Cai, and M. B. Hu, "Detect overlapping and hierarchical community structure in networks," Physica A: Statistical Mechanics and its Applications, vol. 388, no. 8, pp. 1706-1712, 15 Apr. 2009.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	C. L. Staudt and H. Meyerhenke, "Engineering parallel algorithms for community detection in massive networks," IEEE Trans. on Parallel and Distributed Systems, vol. 27, no. 1, pp. 171-184, Jan. 2015.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	K. Nath, S. Roy, and S. Nandi, "InOvIn: a fuzzy-rough approach for detecting overlapping communities with intrinsic structures in evolving networks," Applied Soft Computing, vol. 89, Article ID: 106096, Apr. 2020.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>