﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051922</doi_batch_id><timestamp>20260519223117</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>1</month><day>6</day><year>2026</year></publication_date><journal_volume><volume>23</volume></journal_volume><issue>3</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Optimal Data Transmission in Internet of Things based on Wireless Sensor Networks by Combining Linear Programming and Minimum Spanning Tree</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Heydarian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sagar</given_name><surname>Gorbani</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>6</day><year>2026</year></publication_date><pages><first_page>147</first_page><last_page>165</last_page></pages><doi_data><doi>10.66224/ijece.43973.23.3.147</doi><resource>http://ijece.org/en/Article/43973</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/43973</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/43973</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/43973</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/43973</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/43973</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/43973</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/43973</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Tanveer and A. Badshah, "CMAF-IIoT: Chaotic map-based authentication framework for industrial Internet of things," Internet of Things, vol. 23, Article ID: 100902, Oct. 2023.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	Q. Qi, Z. Xu, and P. Rani, "Big data analytics challenges to implementing the intelligent industrial Internet of things (IIoT) systems in sustainable manufacturing operations," Technological Forecasting and Social Change, vol. 190, Article ID: 122401, May 2023. #</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	V. R. Kebande, "Industrial internet of things (IIoT) forensics: The forgotten concept in the race towards industry 4.0," Forensic Science International, vol. 5, Article ID: 100257, Jul. 2022. #</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	H. K. Apat and R. N.  Sahoo, "A comprehensive review on Internet of Things application placement in Fog computing environment," Internet of Things, vol. 23, Article ID: 100866, Oct. 2023. #</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	F. Safara, A. Souri, T. Baker, I. A. Ridhawi, and M. Aloqaily, "PriNergy: A priority-based energy-efficient routing method for IoT systems," The Journal of Supercomputing, vol. 76, no. 11, pp. 8609-8626, Nov. 2020. #</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, "A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications," IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125-1142, Mar. 2017. #</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	T. D. Nguyen, J. Y. Khan, and D. T. Ngo, "An effective energy-harvesting-aware routing algorithm for WSN-based IoT applications," in Proc. IEEE Int. Conf. on Communications, 6 pp., Paris, France, 21-25 May 2017. #</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	P. Maheshwari, A. K. Sharma, and K. Verma, "Energy efficient cluster based routing protocol for WSN using butterfly optimization algorithm and ant colony optimization," Ad Hoc Networks, vol. 110, Article ID: 102317, 2021. #</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	P. G. V. Naranjo, Z. Pooranian, M. Shojafar, M. Conti, and R. Buyya, "FOCAN: A fog-supported smart city network architecture for management of applications in the Internet of everything environments," Journal of Parallel and Distributed Computing, vol. 132, pp. 274-283, Oct. 2019. #</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	W. B. Heinzelman, Application-Specific Protocol Architectures for Wireless Networks, PhD. Thesis, Massachusetts Institute of Technology, 2000. #</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in Proc. of the 33rd Annual Hawaii Int.Conf. on system Sciences, vol. 2, 10 pp., Maui, HI, USA, 7-7 Jan. 2000. #</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	E. N. Szynkiewicz, A. Sikora, J. Kołodziej, and P. Szynkiewicz, "Modelling and simulation of secure energy aware fog sensing systems," Simulation Modelling Practice and Theory, vol. 101, Article ID: 102011, May. 2020. #</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	R. Oma, S. Nakamura, D. Duolikun, T. Enokido, and M. Takizawa, "An energy-efficient model forfog computing in the internet of things (IoT)," Internet of Things, vol. 1-2, pp. 14-26, Sept. 2018. #</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	J. Yao and N. Ansari, "Energy-aware task allocation for mobile IoT by online reinforcement learning," in Proc. IEEE Int. Conf. on Communications, 6 pp., Shanghai, China, 20-24 May. 2019. #</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	Y. Zou, J. Zhu, and R. Zhang, "Exploiting network cooperation in green wireless communication," IEEE Trans. on Communications, vol. 61, no. 3, pp. 999-1010, Mar. 2013. #</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	A. Hazra, P. Rana, and M. Adhikari, "Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges," Computer Science Review, vol. 48, Article ID: 100549, May 2023. #</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	S. Murugesan, "Harnessing green IT: Principles and practices," IT Professional, vol. 10, no. 1, pp. 24-33, Jan./Feb. 2008. #</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	N. Chen, et al., "Spectral graph theory-based virtual network embedding for vehicular fog computing: A deep reinforcement learning architecture," Knowledge-Based Systems, vol. 257, Article ID: 109931, Dec. 2022. #</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	R. Das and M. M. Inuwa, "A review on fog computing: Issues, characteristics, challenges and potential applications," Telematics and Informatics Reports, vol. 10, Article ID: 1100049, Jun. 2023. #</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	G. Anastasi, M. Conti, M. D. Francesco, and A. Passarella, "Energy conservation in wireless sensor networks: A survey," Ad hoc Networks, vol. 7, no. 3, pp. 537-568, May 2009. #</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	K. Verma and A. Kumar, "Rank based mobility-aware scheduling in Fog computing," Informatics in Medicine Unlocked, vol. 24, Article ID: 100619, 2021. #</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	R. Naha and S. Garg, "Multiple linear regression-based energy-aware resource allocation in the fog computing environment," Computer Networks, vol. 216, Article ID: 109240, Oct. 2022. #</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	N. Potu and S. Bhukya, "Quality-aware energy efficient scheduling model for fog computing comprised IoT network," Computers &amp; Electrical Engineering, vol. 97, Article ID: 107603, Jan. 2022. #</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	M. Qin, M. Li, and R. O. Yahya, "Dynamic IoT service placement based on shared parallel architecture in fog-cloud computing," Internet of Things, vol. 23, Article ID: 100856, Oct. 2023. #</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	Y. Sellami, Y. Imine, and A. Gallais, "A verifiable data integrity scheme for distributed data sharing in fog computing architecture," Future Generation Computer Systems, vol. 150, pp. 64-77, Jan. 2024. #</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	 H. Sabireen and V. Neelanarayanan, "A review on fog computing: architecture, fog with IoT, algorithms and research challenges," ICT Express, vol. 7, no. 2, pp. 162-176, Jun. 2021. #     </unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	M. Abbasi, E. M. Pasand, and M. R. Khosravi, "Intelligent workload allocation in IoT–Fog–cloud architecture towards mobile edge computing," Computer Communications, vol. 169, pp. 71-80, Mar. 2021. #</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	A. Ahmad, N. Javaid, M. Imran, M. Guizani, and A. A. Alhamed, "An advanced energy consumption model for terrestrial wireless sensor networks," in Proc. Int. Wireless Communications and Mobile Computing Conf., pp. 790-793, Paphos, Cyprus, 5-9 Sept. 2016. # </unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	 Y. Zhou, N. Wang, and W. Xiang, "Clustering hierarchy protocol in wireless sensor networks using an improved PSO algorithm," IEEE Access, vol. 5, pp. 2241-2253, 2017. #</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	B. Sureshand and S. C. Prasad, "An energy efficient secure routing scheme using LEACH protocol in WSN for IoT networks," Measurement: Sensors, vol. 30, Article ID: 100883, Dec. 2023. #</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	A. M. K. Abdulzahra, A. Kadhum, and M. A. Qurabat, "Optimizing energy consumption in WSN-based IoT using unequal clustering and sleep scheduling methods," Internet of Things, vol. 22, Article ID: 100765, Jul. 2023. #</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	M. V. Babu and C. N. S. Kumar, "AE-LEACH: An incremental clustering approach for reducing the energy consumption in WSN," Microprocessors and Microsystems, vol. 93, Article ID: 104602, Sept. 2022. #</unstructured_citation></citation><citation key="ref33"><unstructured_citation>[33]	S. Wang, J. Yu, M. Atiquzzaman, H. Chen, and L. Ni, "CRPD: a novel clustering routing protocol for dynamic wireless sensor networks," Personal and Ubiquitous Computing, vol. 22, pp. 545-559, 2018. #</unstructured_citation></citation><citation key="ref34"><unstructured_citation>[34]	F. Y. Okay and S. Ozdemir, "Routing in fog-enabled IoT platforms: A survey and an SDN-based solution," IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4871-4889, Dec. 2018. #</unstructured_citation></citation><citation key="ref35"><unstructured_citation>[35]	F. Bajaber and I. Awan, "Adaptive decentralized re-clustering protocol for wireless sensor networks," Journal of Computer and System Sciences, vol. 77, no. 2, pp. 282-292, Mar. 2011. #</unstructured_citation></citation><citation key="ref36"><unstructured_citation>[36]	D. Kumar, T. C. Aseri, and R. Patel, "EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks," Computer Communications, vol. 32, no. 4, pp. 662-667, Mar. 2009. #</unstructured_citation></citation><citation key="ref37"><unstructured_citation>[37]	S. Lindsey, C. Raghavendra, and K. M. Sivalingam, "Data gathering algorithms in sensor networks using energy metrics," IEEE Trans. on Parallel and Distributed Systems, vol. 13, no. 9, pp. 924-935, Sept. 2002. #</unstructured_citation></citation><citation key="ref38"><unstructured_citation>[38]	A. A. Suwaili and O. Simeone, "Energy-efficient resource allocation for mobile edge computing-based augmented reality applications," IEEE Wireless Communications Letters, vol. 6, no. 3, pp. 398-401, Jun. 2017. #</unstructured_citation></citation><citation key="ref39"><unstructured_citation>[39]	X. Li, et al., "Adaptive aggregation routing to reduce delay for multi-layer wireless sensor networks," Sensors, vol. 18, no. 4, Article ID: 1216, Apr. 2018. #</unstructured_citation></citation><citation key="ref40"><unstructured_citation>[40]	A. S. M. Sanwar Hosen, et al., "A QoS-aware data collection protocol for LLNs in fog-enabled internet of things," IEEE Trans. on Network and Service Management, vol. 17, no. 1, pp. 430-444, Mar. 2019. #</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Optimization and Prediction of Users' favorite Programs Using Collaborative Filtering Approach and Cuckoo Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>R.</given_name><surname>Molaee Fard</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>J.</given_name><surname>Mohammadzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>payam</given_name><surname>yarahmadi</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>6</day><year>2026</year></publication_date><pages><first_page>209</first_page><last_page>216</last_page></pages><doi_data><doi>10.66224/ijece.48615.23.3.209</doi><resource>http://ijece.org/en/Article/48615</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/48615</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/48615</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/48615</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/48615</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/48615</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/48615</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/48615</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. Kim, et al., "PubChem in 2021: new data content and improved web interfaces," Nucleic Acids Research, vol. 49, no. D1, pp. D1388-D1395, 2021.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	Adiyanto and Nurasiah, "Customer relationship management (CRM) based on web to improve the performance of the company," IAIC Trans. on Sustainable Digital Innovation, vol. 1, no. 1, pp. 32-41, Oct. 2019. #</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	A. Lau, E. Tsui, and W. Lee, "An ontology-based similarity measurement for problem-based case reasoning," Expert Systems with Applications, vol. 36, no. 3, pt. 2, pp. 6574-6579, Apr. 2009. #</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	F. Beierle and T. Eichinger, "Collaborating with users in proximity for decentralized mobile recommender systems," in Proc. IEEE Smart World, Ubiquitous Intelligence &amp; Computing, Advanced &amp; Trusted Computing, Scalable Computing &amp; Communications, Cloud &amp; Big Data Computing, Internet of People and Smart City Innovation, pp. 1192-1197, Leicester, UK, 19-23 Aug. 2019. #</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	M. Montaner, B. López, J. L. De La Rosa, "A taxonomy of recommender agents on the Internet," Artificial Intelligence Review, vol. 19, pp. 285-330, 2003. #</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	B. Abu-Salih, et al., "Toward a knowledge-based personalised recommender system for mobile app development," JUCS-J. of Universal Computer Science, vol. 27, no. 2, pp. 208-229, 2021. #</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	C. Yang, et al., "Enhancing mobile app recommendations through adaptive fusion of long-term stability and short-term interests," Information Sciences, vol. 699, Article ID: 121817, May 2025. #</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	D. Yu, X. Zhou, A. Noorian, and M. Hazratifard, "An AI-driven social media recommender system leveraging smartphone and IoT data," The J. of Supercomputing, vol. 81, no. 1, pp. 1-32, Jan. 2025. #</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	F. Nadeem and M. Suleman, Developing a Personalized Recommender System for Enhanced User Experience in Mobile Applications, Oct.  2024. DOI:10.13140/RG.2.2.19331.31528#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	Y. Gong, et al., "EdgeRec: recommender system on edge in mobile Taobao," in Proc. of the 29th ACM Int. Conf. on Information &amp; Knowledge Management, pp. 2477-2484, Virtual Event Ireland, 19-23 Oct. 2020. #</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	E. Pimenidis, N. Polatidis, and H. Mouratidis, "Mobile recommender systems: identifying the major concepts," J. of Information Science, vol. 45, no. 3, pp. 387-397, Jun. 2019. #</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	H. Yin, et al., "Mobi-SAGE-RS: a sparse additive generative model-based mobile application recommender system," Knowledge-Based Systems, vol. 157, pp. 68-80, Oct. 2018. #</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	H. Ranaivoson, A. Smets, and P. Ballon, "15 Challenges and opportunities for recommender systems in media markets," In U. Rohn, M. B. von Rimscha, and T, Raats (Eds.) De Gruyter Handbook of Media Economics, pp. 215-228, Boston: De Gruyter, 2024. #</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	E. Hasan, M. Rahman, C. Ding, J. X. Huang, and S. Raza, Review-Based Recommender Systems: A Survey of Approaches, Challenges and Future Perspectives, arXiv preprint arXiv:2405.05562, 2024. #</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	X. Chen, S. Wang, J. McAuley, D. Jannach, and L. Yao, "On the opportunities and challenges of offline reinforcement learning for recommender systems," ACM Trans. on Information Systems, vol. 42, no. 6, Article ID: 150, 26 pp., Nov. 2023. #</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	N. Alharbe, M. A. Rakrouki, and A. Aljohani, "A collaborative filtering recommendation algorithm based on embedding representation," Expert Systems with Applications, vol. 215, Article ID: 119380, Apr. 2023. #</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	S. A. N. Alexandropoulos, S. B. Kotsiantis, and M. N. Vrahatis, "Data preprocessing in predictive data mining," The Knowledge Engineering Review, vol. 34, 2019. doi:10.1017/S026988891800036X#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	N. Ohadi, et al., "SW-DBSCAN: a grid-based DBSCAN algorithm for large datasets," in Proc. 6th Int. Conf. on Web Research, pp. 139-145, Tehran, Iran, 22-23 Apr. 2020. #</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	Y. Jiang, C. Kang, Y. Shen, T. Huang, and G. Zhai, "Research on Argo data anomaly detection based on improved DBSCAN algorithm," in Proc.  China Conference on Wireless Sensor Networks, pp. 44-54, Guangzhou, China, 10-12 Nov. 2022. #</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	R. Molaee Fard and P. Yarahmadi, "A recommendation system in the medical industry using SW-DBSCAN algorithm," International J. of Web Research, vol. 5, no. 1, pp. 82-87, Winter-Spring 2022. #</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	M. A. Sorkhi, E. Akbari, M. Rabbani, and H. Motameni, "A dynamic density-based clustering method based on K-nearest neighbor," Knowledge and Information Systems, vol. 66, pp. 3005-3031, 2024. #</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	I. De Moura Ventorim, D. Luchi, A. L. Rodrigues, and F. M. Varejão, "BIRCHSCAN: a sampling method for applying DBSCAN to large datasets," Expert Systems with Applications, vol. 184, Article ID: 115518, Dec. 2021. #</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	O. Bourkoukou and O. Achbarou, "Weighting based approach for learning resources recommendations," JOIV: International J. on Informatics Visualization, vol. 2, no. 3, pp. 104-109, 2018. #</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	B. Zhao, Y. Zheng, X. Yu, W. Song, "A study on product recommendation based on dynamically adjusted multimodal weights," in Proc. IEEE 5th Int. Conf. on Software Engineering and Artificial Intelligence, pp. 235-239, Fuzhou, China, 20-22 Jun. 2025. #</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	H. R. Boveiri, "An enhanced cuckoo optimization algorithm for task graph scheduling in cluster-computing systems," Soft Computing, vol. 24, no. 13, pp. 10075-10093, 2020. #</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	X. Cai, et al. "An under‐sampled software defect prediction method based on hybrid multi‐objective cuckoo search," Concurrency and Computation: Practice and Experience, vol. 32, no. 5, Article ID: e5478, Mar. 2020. #</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	F. Rezaimehr and C. Dadkhah, "T&amp;TRS: robust collaborative filtering recommender systems against attacks," Multimedia Tools and Applications, vol. 83, pp. 31701-31731, 2024. #</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	C. Yuan, Y. Yang, and Y. Liu, "Sports decision-making model based on data mining and neural network," Neural Computing and Applications, vol. 33, pp. 3911-3924, 2021. #</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	N. Zhou, "Database design of regional music characteristic culture resources based on improved neural network in data mining," Personal and Ubiquitous Computing, vol. 24, no. 1, pp. 103-114, Feb. 2020. #</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	A. Sahu, G. M. Harshvardhan, and M. K. Gourisaria, "A dual approach for credit card fraud detection using neural network and data mining techniques," in Proc. IEEE 17th India Council Int. Conf., 7 pp., New Delhi, India, 10-13 Dec. 2020. #</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	H. Zhou, G. Sun, S. Fu, J. Liu, X. Zhou, and J. Zhou, "A big data mining approach of PSO-based BP neural network for financial risk management with IoT," IEEE Access, vol. 7, pp. 154035-154043, 2019. #</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	S. Wang, J. Cao, and P. Yu, "Deep learning for spatio-temporal </unstructured_citation></citation><citation key="ref33"><unstructured_citation>data mining: a survey," IEEE Trans. on Knowledge and Data Engineering, vol. 34, no. 8, pp. 3681-3700, Aug. 2020. #</unstructured_citation></citation><citation key="ref34"><unstructured_citation>[33]	R. Molaee Fard, "Provide a video recommendation system using collaborative filtering and data mining methods," J. of Advances in Computer Research, vol. 12, no. 1, pp. 13-25, 2021. #</unstructured_citation></citation><citation key="ref35"><unstructured_citation>[34]	S. M. Z. Kashani and J. Hamidzadeh, "Feature selection by using privacy-preserving of recommendation systems based on collaborative filtering and mutual trust in social networks," Soft Computing, vol. 24, no. 15, pp. 11425-11440, Aug. 2020. #</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Modeling Optimal Tile Size for Enhancing Data Reuse in Convolutional Neural Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Seydi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Salehi</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>6</day><year>2026</year></publication_date><pages><first_page>200</first_page><last_page>208</last_page></pages><doi_data><doi>10.66224/ijece.48678.23.3.200</doi><resource>http://ijece.org/en/Article/48678</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/48678</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/48678</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/48678</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/48678</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/48678</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/48678</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/48678</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. Genovese, "Artificial intelligence: a guide for thinking humans," ORDO, vol. 71, no. 1, pp. 444-449, Apr. 2020.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	O. Campesato, Artificial Intelligence, Machine Learning, and Deep Learning, Mercury Learning and Information, 2020. #</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	J. Cheng, J. Wu, C. Leng, Y. Wang, and Q. Hu, "Quantized CNN: A unified approach to accelerate and compress convolutional networks," IEEE Trans. Neural Networks Learn. Syst., vol. 29, no. 10, pp. 4730-4743, Oct. 2018. #</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	Z. Li, F. Liu, W. Yang, S. Peng, and J. Zhou, "A survey of convolutional neural networks: analysis, applications, and prospects," IEEE Trans. Neural Networks Learn. Syst., vol. 33, no. 12, pp. 6999-7019, Dec. 2022#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	Y. Ma, Y. Cao, S. Vrudhula, and J. Seo, "Optimizing loop Operation and dataflow in FPGA acceleration of deep convolutional neural networks," in Proc. of the 2017 ACM/SIGDA Int. Symp. on Field-Programmable Gate Arrays, pp. 45-54, Monterey, CA, USA, 22-24 Feb. 2017. #</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	P. Dhilleswararao, S. Boppu, M. S. Manikandan, and L. R. Cenkeramaddi, "Efficient hardware architectures for accelerating deep neural networks: survey," IEEE Access, vol. 10, pp. 131788-131828, 2022. #</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	Y. –H. Chen, J. Emerl, and V. Sze, "Eyeriss: A spatial architecture for energy-efficient dataflow for convolutional neural networks," ACM SIGARCH Comput. Archit. News, vol. 44, no. 3, pp. 367-379, Jun. 2016. #</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	S. Zheng et al., "Efficient scheduling of irregular network structures on CNN accelerators," IEEE Trans. Comput. Des. Integr. Circuits Syst., vol. 39, no. 11, pp. 3408-3419, Nov. 2020. #</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	M. Horowitz, "1.1 Computing’s energy problem (and what we can do about it)," in ¬Proc. IEEE Int. Solid-State Circuits Conf., pp. 10-14, San Francisco, CA, USA, 9-13 Feb. 2014. #</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	E. Valpreda et al., "HW-Flow-Fusion: inter-layer scheduling for convolutional neural network accelerators with dataflow architectures," Electron., vol. 11, no. 18, Article ID: 2933, Sept. 2022. #</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	M. Alwani, H. Chen, M. Ferdman, and P. Milder, "Fused-layer CNN accelerators," in Proc. of the Annual Int. Symp. on Microarchitecture, 12 pp., Taipei, Taiwan, 15-19 Oct. 2016. #</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	J. Li, et al., "SmartShuttle: Optimizing off-chip memory accesses for deep learning accelerators," in Proc. 2018 Design, Automation and Test in Europe Conf. Exhib., pp. 343-348, Dresden, Germany, 19-23 Mar. 2018. #</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	Q. Nie and S. Malik, "MemFlow: Memory-driven data scheduling with datapath co-design in accelerators for large-scale inference applications," IEEE Trans. Comput. Des. Integr. Circuits Syst., vol. 39, no. 9, pp. 1875–1888, Sept. 2020#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	Q. Nie and S. Malik, "CNNFlow: Memory-driven data flow optimization for convolutional neural networks," ACM Trans. Des. Autom. Electron. Syst., vol. 28, no. 3, Article ID: 40, Feb. 2022. #</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	A. Parashar, et al., "Timeloop: A systematic approach to DNN accelerator evaluation," in Proc. IEEE Int. Symp. Perform. Anal. Syst. Software, pp. 304-315, Madison, WI, USA, 2019. #</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	A. Stoutchinin, F. Conti, and L. Benini, Optimally Scheduling CNN Convolutions for Efficient Memory Access, arXiv Preprint, arXiv:1902.01492, Feb. 2019. #</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	L. Cavigelli, et al., "Origami: A convolutional network accelerator," in Proc. ACM 25th edition on Great Lakes Symp. on VLSI, pp. 199-204, Pittsburgh, PA, USA, 20-22 May 2015. #</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	S. Gupta, A. Agrawal, K. Gopalakrishnan, and P. Narayanan, "Deep learning with limited numerical precision," in Proc. of the 32nd Int. Conf. on Machine Learning, pp. 1737-1746, Lille, France, 6-11 Jul. 2015. #</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	C. Zhang, et al. "Optimizing FPGA-based accelerator design for deep convolutional neural networks," in Proc. 2015 ACM/SIGDA Int. Symp. Field-Programmable Gate Arrays, pp. 161-170, Monterey, CA, USA, Feb. 2015. #</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	I. Dadras, S. Seydi, M. H. Ahmadilivani, J. Raik, and M. E. Salehi, "Fully-Fusible Convolutional Neural Networks for End-to-End Fused Architecture with FPGA Implementation," in Proc. 2023 30th IEEE Int. Conf. Electron. Circuits Syst., 5 pp., Istanbul, Turkey, 4-7 Dec. 2023. #</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	B. Rokh, A. Azarpeyvand, and A. Khanteymoori, "A comprehensive survey on model quantization for deep neural networks in image classification," ACM Trans. on Intelligent Systems and Technology, vol. 14, no. 6, Article ID: 97, Dec. 2023. #</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Breast Cancer Detection Using a Dataset Balancing Approach</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Z.</given_name><surname>Abbasi</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>6</day><year>2026</year></publication_date><pages><first_page>179</first_page><last_page>190</last_page></pages><doi_data><doi>10.66224/ijece.49704.23.3.179</doi><resource>http://ijece.org/en/Article/49704</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/49704</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/49704</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/49704</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/49704</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/49704</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/49704</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/49704</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	WHO, (IARC), International Agency for Research on Cancer, World Health Organization, [Online]. Available: http://gco.iarc.fr/.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	F. Bray, et al., "Global cancer statistics 2018: GLOBOCAN estimates of incidence and mortality worldwide for 36 cancers in 185 countries," CA: A Cancer Journal for Clinicians, vol. 68, no. 6, pp. 394-424. Nov 2018. #</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	L. J. Mena and J. A. Gonzalez, "Machine learning for imbalanced datasets: application in medical diagnostic," in Proc. of the 19th Int. Florida Artificial Intelligence Research Society Conf., pp. 574-579, 2006. #</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	H. Parvin, B. Minaei-Bidgoli, and H. Alinejad-Rokny, "A new imbalanced learning and dictions tree method for breast cancer diagnosis," Journal of Bionanoscience, vol. 7, no. 6, pp. 673-678, 2013. #</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	G. Haixiang, et al., "Learning from class-imbalanced data: Review of methods and applications," Expert Systems with Applications, vol. 73, pp. 220-239, May 2017. #</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	A. Anand, G. Pugalenthi, G. B. Fogel, and P. N. Suganthan, "An approach for classification of highly imbalanced data using weighting and undersampling," Amino Acids, vol. 39, no. 5, pp. 1385-1391, Nov. 2010. #</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	L. Yijing, G. Haixiang, L. Xiao, L. Yanan, and L. Jinling, "Adapted ensemble classification algorithm based on multiple classifier system and feature selection for classifying multi-class imbalanced data," Knowledge-Based Systems, vol. 94, pp. 88-104, Feb. 2016. #</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	Y. Liu, H. T. Loh, and A. Sun, "Imbalanced text classification: A term weighting approach," Expert systems with Applications, vol. 36, no. 1, pp. 690-701, Jan. 2009. #</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	C. Phua, D. Alahakoon, and V. Lee, "Minority report in fraud detection: classification of skewed data," ACM Sigkdd Explorations Newsletter, vol. 6, no. 1, pp. 50-59, 2004. #</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	B. W. Yap, et al., "An application of oversampling, undersampling, bagging and boosting in handling imbalanced datasets," in Proc. of the First Int. Conf. on Advanced Data and Information Engineering, pp. 13-22, Kuala Lumpur, Malaysia, 16-18 Dec. 2014. #</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	S. Kotsiantis, D. Kanellopoulos, and P. Pintelas, "Handling imbalanced datasets: A review," GESTS International Trans. on Computer Science and Engineering, vol. 30, pp. 25-36, 2006. #</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	N. V. Chawla, "Data mining for imbalanced datasets: An overview," In: Maimon, O., Rokach, L. (eds) Data Mining and Knowledge Discovery Handbook, pp. 875-886, Springer: Boston, 2005. #</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	M. Zięba, J. M. Tomczak, M. Lubicz, and J. Świątek, "Boosted SVM for extracting rules from imbalanced data in application to prediction of the post-operative life expectancy in the lung cancer patients," Applied Soft Computing, vol. 14, pt. A, pp. 99-108, Jan. 2014. #</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	S. García and F. Herrera, "Evolutionary undersampling for classification with imbalanced datasets: Proposals and taxonomy," Evolutionary computation, vol. 17, no. 3, pp. 275-306, Fall 2009. #</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	M. M. Rahman and D. N. Davis, "Addressing the class imbalance problem in medical datasets," International Journal of Machine Learning and Computing, vol. 3, no. 2, pp. 224-228, Apr. 2013. #</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	E. Š. M. R. -Š. Igor Kononenko, "Overcoming the myopia of inductive learning algorithms with RELIEFF," Applied Intelligence, vol. 7, no. 1, pp. 39-55, Jan. 1997. #</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	A. Luque, A. Carrasco, A. Martín, and A. D. L. Heras, "The impact of class imbalance in classification performance metrics," Pattern Recognition, vol. 91, pp. 216-231, Jul. 2019. #</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	M. Karabatak and M. C. Ince, "An expert system for detection of breast cancer based on association rules and neural network," Expert systems with Applications, vol. 36, no. 2, pt. 2, pp. 3465-3469, Mar. 2009. #</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	A. Osareh and B. Shadgar, "Machine learning techniques to diagnose breast cancer," in Proc. 5th Int. Symp. on Health Informatics and Bioinformatics, pp. 114-120, Antalya, Turkey, 20-22 Apr. 2010. #</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	K. J. Wang and A. M. Adrian, "Breast cancer classification using hybrid synthetic minority over-sampling technique and artificial immune recognition system algorithm," International Journal of Computer Science and Electronics Engineering, vol. 1, no. 3, pp. 408-412, 2013. #</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	H. Asri, H. Mousannif, H. Al Moatassime, and T. Noel, "Using machine learning algorithms for breast cancer risk prediction and diagnosis," Procedia Computer Science, vol. 83, pp. 1064-1069, 2016. #</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	E. Yavuz, C. Eyupoglu, U. Sanver, and R. Yazici, "An ensemble of neural networks for breast cancer diagnosis," in Proc. Int. Conf. on Computer Science and Engineering, pp. 538-543, Antalya, Turkey, 5-8 Oct. 2017. #</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	B. Zheng, S. Won Yoon, and S. S. Lam, "Breast cancer diagnosis based on feature extraction using a hybrid of K-means and support vector machine algorithms," Expert Systems with Applications, vol. 41, no. 4,pt. 1,  pp. 1476-1482, Mar. 2014. #</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	S. Sasikala, M. Bharathi, M. Ezhilarasi, S. Senthil, and M. R. Reddy, "Particle swarm optimization based fusion of ultrasound echographic and elastographic texture features for improved breast cancer detection," Australasian Physical &amp; Engineering Sciences in Medicine, vol. 42, no. 3, pp. 677-688, Sept. 2019. #</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	M. khanna, L. k. Singh, k. Shrivastava, and R. singh, "An enhanced and efficient approach for feature selection for chronic human disease prediction: A breast cancer study," Heliyon, vol. 10, no. 5, Article ID: e26799, Mar. 2024. #</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	R. R. Kadhim and M. Y. Kamil, "Comparison of breast cancer classification models on Wisconsin dataset," Int. J. Reconfigurable Embed. Syst, vol. 11, no. 2, pp. 166-174, Jul. 2022. #</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	T. Cai, H. He, and W. Zhang, "Breast Cancer Diagnosis Using Imbalanced Learning and Ensemble Method," Applied and Computational Mathematics, vol. 7, no. 3, pp. 146-154, Jun. 2018. #</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	H. Ouifak and A. Idri, "On the performance and interpretability of Mamdani and Takagi-Sugeno-Kang based neuro-fuzzy systems for medical diagnosis," Scientific African, vol. 20, Article ID: e01610, Jul .2023. #</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	F. Gurcan and A. Soylu, "Learning from imbalanced data: Integration of advanced resampling techniques and machine learning models for enhanced cancer diagnosis and prognosis," Cancers, vol. 16, no. 19, p. 3417, Oct.-1 2024. #</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	G. Husain, et al., "SMOTE vs. SMOTEENN: A study on the performance of resampling algorithms for addressing class imbalance in regression models," Algorithms, vol. 18, no. 1, Article ID: 37, 16 pp., Jan. 2025. #</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	Z. Liu, H. Liu, W. Jia, D. Zhang and J. Tan, "A novel imbalanced data classification method based on weakly supervised learning for fault diagnosis.," IEEE Trans. on Industrial Informatics, vol. 18, no. 3, pp. 1583-1593, Mar. 2022. #</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	H. Sinha and M. Shah, "Early prediction and classification of breast cancer survival based on machine learning models," in Proc. IEEE 15th Annual Computing and Communication Workshop and Conf., pp. 01185-01193, Las Vegas, NV, USA, 6-8 Jan. 2025. #</unstructured_citation></citation><citation key="ref33"><unstructured_citation>[33]	F. Gurcan and A. Soylu, "Synthetic boosted resampling using deep generative adversarial networks: A novel approach to improve cancer prediction from imbalanced datasets," Cancers, vol. 16, no. 23, Article ID: 4046, Dec.-1 2024. #</unstructured_citation></citation><citation key="ref34"><unstructured_citation>[34]	Z. Chen, J. Duan, L. Kang, and G. Qiu, "A hybrid data-level ensemble to enable learning from highly imbalanced dataset," Information Sciences, vol. 554, pp. 157-176, Apr. 2021. #</unstructured_citation></citation><citation key="ref35"><unstructured_citation>[35]	I. Czarnowski, "Weighted ensemble with one-class classification and over-sampling and instance selection (WECOI): An approach for learning from imbalanced data streams," Journal of Computational Science, vol. 61, Article ID: 101614, May 2022. #</unstructured_citation></citation><citation key="ref36"><unstructured_citation>[36]	C.-F. Tsai, K.-C. Chen and W.-C. Lin, "Feature selection and its combination with data over-sampling for multi-class imbalanced datasets," Applied Soft Computing, vol. 153, Article ID: 111267, May 2024. #</unstructured_citation></citation><citation key="ref37"><unstructured_citation>[37]	M. Robnik-Šikonja and I. Kononenko, "Theoretical and empirical analysis of ReliefF and RReliefF," Machine Learning, vol. 53, no. 1-2, pp. 23-69, 2003. #</unstructured_citation></citation><citation key="ref38"><unstructured_citation>[38]	Z. Abbasi and M. Rahmani, "An instance selection algorithm based on ReliefF," International Journal on Artificial Intelligence Tools, vol. 28, no. 1, Article ID: 1950001, 2019. #</unstructured_citation></citation><citation key="ref39"><unstructured_citation>[39]	Z. Wang, X. Ning, and M. Blaschko, "Jaccard metric losses: Optimizing the jaccard index with soft labels," in Proc. 37th Int. Conf. on Neural Information Processing Systems, pp. 75259-75285, New Orleans, LA, USA ,10-16 Dec. 2023. #</unstructured_citation></citation><citation key="ref40"><unstructured_citation>[40]	S. Bhowmick and A. Saha, "Enhancing the performance of kNN for glass identification dataset using inverse distance weight, ReliefF ranking and SMOTE," in Proc. 13th Int. Conf. on Material Processing and Characterization, pp. , Hyderabad, India, 22-24 Apr. 2022, https:// https://doi.org/10.1063/5.0161083#</unstructured_citation></citation><citation key="ref41"><unstructured_citation>[41]	A. Moran Calderon, Improved Distance Functions for the ReliefF Family, MSc. Thesis, Universitat Politècnica de Catalunya, Catalunya, Spain, 2023. #</unstructured_citation></citation><citation key="ref42"><unstructured_citation>[42]	F. Rosenblatt, Principles of Neurodynamics. Perceptrons and the Theory of Brain Mechanisms, Spartan Books, Washington DC, US, 1961. #</unstructured_citation></citation><citation key="ref43"><unstructured_citation>[43]	L. Breiman, "Random forests," Machine learning, vol. 45, no. 1, pp. 5-32, Oct. 2001. #</unstructured_citation></citation><citation key="ref44"><unstructured_citation>[44]	Y. Freund and R. E. Schapire, "A decision-theoretic generalization of on-line learning and an application to boosting," Journal of computer and system sciences, vol. 55, no. 1, pp. 119-139, Aug. 1997. #</unstructured_citation></citation><citation key="ref45"><unstructured_citation>[45]	L. Breiman, "Bagging predictors," Machine learning , vol. 24, no. 2, pp. 123-140, Aug. 1996. #</unstructured_citation></citation><citation key="ref46"><unstructured_citation>[46]	T. M. Cover and P. E. Hart, "Nearest neighbor pattern classification," IEEE Trans. on Information Theory , vol. 13, no. 1, pp. 21-27, Jan. 1967. #</unstructured_citation></citation><citation key="ref47"><unstructured_citation>[47]	D. Lavanya and K. U. Rani, "Performance evaluation of decision tree classifiers on medical datasets," International Journal of Computer Applications, vol. 26, no. 4, pp. 1-4, 2011. #</unstructured_citation></citation><citation key="ref48"><unstructured_citation>[48]	I. Rish, "An empirical study of the naive Bayes classifier," in Proc. IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence, pp. 41-46, Seattle, Washington, USA, 4-6 Aug. 2001. #</unstructured_citation></citation><citation key="ref49"><unstructured_citation>[49]	J. G. Cleary and L. E. Trigg, "K*: An instance-based learner using an entropic distance measure," in Proc. of the 12th Int. Conf. on Machine Learning, pp. 108-114, Tahoe City, CA, USA, 9-12 Jul. 1995. #</unstructured_citation></citation><citation key="ref50"><unstructured_citation>[50]	J. R. Quinlan, C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers, 1993. #</unstructured_citation></citation><citation key="ref51"><unstructured_citation>[51]	J. Kaur and A. Kumar, "Speech emotion recognition using CNN, </unstructured_citation></citation><citation key="ref52"><unstructured_citation>k-NN, MLP and random forest," In: S. Smys, R. Palanisamy, Á.Rocha, and G. N. Beligiannis, (eds) Computer Networks and Inventive Communication Technologies. Lecture Notes on Data Engineering and Communications Technologies, vol 58. pp 499-509, Springer, Singapore, 2021. #</unstructured_citation></citation><citation key="ref53"><unstructured_citation>[52]	P. C. Sen, M. Hajra, and M. Ghosh, "Supervised classification algorithms in machine learning: A survey and review," In: J. Mandal and D. Bhattacharya, (eds) Emerging Technology in Modelling and Graphics. Advances in Intelligent Systems and Computing, vol 937, 99-111, Springer, Singapore. #</unstructured_citation></citation><citation key="ref54"><unstructured_citation>[53]	F. Osisanwo, et al., "Supervised machine learning algorithms: classification and comparison," International Journal of Computer Trends and Technology, vol. 48, no. 3, pp. 128-138, Jun. 2017. #</unstructured_citation></citation><citation key="ref55"><unstructured_citation>[54]	Q. Gu, L. Zhu and Z. Cai, "Evaluation measures of the classification performance of imbalanced data sets," in Proc. Int. Symp. on Intelligence Computation and Applications, pp. 461-471, Huangshi, China, 23-25 Oct. 2009. #</unstructured_citation></citation><citation key="ref56"><unstructured_citation>[55]	Y. Sun, A. Wong and M. S. Kamel, "Classification of imbalanced data: A review.," ‏International Journal of Pattern Recognition and Artificial Intelligence, vol. 23, no. 4, pp. 687-719, Jun. 2009. #</unstructured_citation></citation><citation key="ref57"><unstructured_citation>[56]	W. H. Wolberg and O. Mangasarian, "Multisurface method of pattern separation for medical diagnosis applied to breast cytology," Proceedings of the National Academy of Sciences, vol. 87, no. 23, pp. 9193-9196, Dec. 1990. #</unstructured_citation></citation><citation key="ref58"><unstructured_citation>[57]	W. Wolberg, W. Street, and O. Mangasarian, "Machine learning techniques to diagnose breast cancer from fine-needle aspirates," Cancer Letters , vol. 77, no. 2-3, pp. 163-171, 1994. #</unstructured_citation></citation><citation key="ref59"><unstructured_citation>[58]	J. TENG, SEER Breast Cancer Data, IEEE Dataport, 2019. #</unstructured_citation></citation><citation key="ref60"><unstructured_citation>[59]	-, UCI Machine Learning Repository, [Online]. Available: https://archive.ics.uci.edu/ml/index.php. #</unstructured_citation></citation><citation key="ref61"><unstructured_citation>[60]	-, Kaggle, [Online]. Available: https://www.kaggle.com/datasets/sujithmandala/seer-breast-cancer-data. #</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Error Reduction in Cryptocurrency Time Series Forecasting through Bidirectional LSTM and GRU Deep Neural Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>F.</given_name><surname>Kazem zadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. </given_name><surname>Houshmand Kafashian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Houshmand</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>6</day><year>2026</year></publication_date><pages><first_page>166</first_page><last_page>178</last_page></pages><doi_data><doi>10.66224/ijece.49818.23.3.166</doi><resource>http://ijece.org/en/Article/49818</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/49818</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/49818</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/49818</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/49818</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/49818</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/49818</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/49818</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Gasparin, S. Lukovic, and C. Alippi, "Deep learning for time series forecasting: The electric load case," CAAI Trans. on Intelligence Technology, vol. 7, no. 1, pp. 1-25, Mar. 2022.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	M. Shin, D. Mohaisen, and J. Kim, "Bitcoin price forecasting via ensemble-based LSTM deep learning networks," in Proc. Int. Conf. on Information Networking, pp. 603-608, Jeju Island, South Korea, 13-16 Jan. 2021. #</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	S. Yang, X. Yu, and Y. Zhou, "LSTM and GRU neural network performance comparison study: Taking Yelp review dataset as an example," in Proc. Int. Workshop on Electronic Communication and Artificial Intelligence, pp. 98-101, Shanghai, China, 12-14 Jun. 2020. #</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	T. Shintate and L. Pichl, "Trend prediction classification for high frequency bitcoin time series with deep learning," Journal of Risk and Financial Management, vol. 12, no. 1, Article ID: 17, Mar. 2019. #</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	K. A. Althelaya, E.-S. M. El-Alfy, and S. Mohammed, "Stock market forecast using multivariate analysis with bidirectional and stacked (LSTM, GRU)," in Proc. 21st Saudi Computer Society National Computer Conf., 7 pp., Riyadh, Saudi Arabia, 25-26 Apr. 2018. #</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	A. Singh, A. Kumar, and Z. Akhtar, "Bitcoin price prediction: A deep learning approach," in Proc. 8th Int. Conf. on Signal Processing and Integrated Networks, pp. 1053-1058, Noida, India, 26-27 Aug. 2021. #</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	G. Liu, F. Xiao, C. –T. Lin, and Z. Cao, "A fuzzy interval time-series energy and financial forecasting model using network-based multiple time-frequency spaces and the induced-ordered weighted averaging aggregation operation," IEEE Trans. on Fuzzy Systems, vol. 28, no. 11, pp. 2677-2690, Nov. 2020. #</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	R. Reyhani and A. M. E. Moghadam, "A heuristic method for forecasting chaotic time series based on economic variables," in Proc. 6th Int. Conf. on Digital Information Management, pp. 300-304, Melbourne, Australia, 26-28 Sept. 2011. #</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	W. He, et al., "Applying multiple time series data mining to large-scale network traffic analysis," in Proc. IEEE Conf. on Cybernetics and Intelligent Systems, pp. 394-399, Chengdu, China, 21-24 Sept.2008. #</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	J. Bergstra and Y. Bengio, "Random search for hyper-parameter optimization," Journal of Machine Learning Research, vol. 13, pp. 281-305, 2012. #</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	J. Snoek, H. Larochelle, and R. P. Adams, "Practical Bayesian optimization of machine learning algorithms," in Proc. 26th Int. Conf. on Neural Information Processing Systems, vol. 2, pp. 2951- 2959, Lake Tahoe, NV, USA, 3-6 Dec. 2012. #</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	P. L. Seabe, C. R. B. Moutsinga, and E. Pindza, "Forecasting cryptocurrency prices using LSTM, GRU, and bi-directional LSTM: a deep learning approach," Fractal and Fractional, vol. 7, no. 2, Article ID: 203, Feb. 2023. #</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	M. J. Hamayel and A. Y. Owda, "A novel cryptocurrency price prediction model using GRU, LSTM and bi-LSTM machine learning algorithms," AI, vol. 2, no. 4, pp. 477-496, Dec. 2021. #</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	M. Rafi, et al., "Enhancing cryptocurrency price forecasting accuracy: A feature selection and weighting approach with bi-directional LSTM and trend-preserving model bias correction," IEEE Access, vol. 11, pp. 65700-65710, 2023. #</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	N. Hussein and A. M. Abdulazeez, "Bitcoin price prediction using hybrid LSTM-GRU models," The Indonesian Journal of Computer Science, vol. 13, no. 1, pp. 94-101, 2024. #</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	M. H. A. Hadi, N. A. Ramli, and Q. U. Islam, "Predicting Bitcoin and Ethereum prices using long short-term memory and gated recurrent unit," Data Analytics and Applied Mathematics, vol. 4, no. 2, pp. 8-17, 2023. #</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	P. Pandey and G. Sharma, "Effective price prediction of cryptocurrencies using CNN-based dual directional model," Science &amp; Technology Asia, vol. 30, no. 1, pp. 201-219, Jan./Mar. 2025. #</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	X. Wang, I. Cretu, and H. Meng, "A cryptocurrency price forecasting model by integrating empirical mode decomposition and LSTM neural networks," Artificial Intelligence and Applications, vol. 3, no. 3, pp. 305-315, Mar. 2025. #</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	S. Hochreiter and J. Schmidhuber, "Long short-term memory," Neural Computation, vol. 9, no. 8, pp. 1735-1780, 1997. #</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	K. Cho, et al., Learning Phrase Representations Using RNN Encoder-Decoder for Statistical Machine Translation, arXiv preprint arXiv:1406.1078, 2014. #</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	W. Zheng and G. Chen, "An accurate GRU-based power time-series prediction approach with selective state updating and stochastic optimization," IEEE Trans. on Cybernetics, vol. 52, no. 12, pp. 13902-13914, Dec. 2022. #</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	S. Hansun, A. Wicaksana, and A. Q. Khaliq, "Multivariate cryptocurrency prediction: comparative analysis of three recurrent neural networks approaches," Journal of Big Data, vol. 9, no. 1, Article ID: 50, 2022. #</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	S. Ozturk Birim, "An analysis for cryptocurrency price prediction using LSTM, GRU, and the bi-directional implications," In S. Karabulut (ed.), Developments in Financial and Economic Fields at the National and Global Scale, pp. 377-392, 2022. #</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	T. Fischer and C. Krauss, "Deep learning with long short-term memory networks for financial market predictions," European Journal of Operational Research, vol. 270, no. 2, pp. 654-669, Oct. 2018. #</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	S. Siami-Namini, N. Tavakoli, and A. S. Namin, "A comparison of ARIMA and LSTM in forecasting time series," in Proc. 17th IEEE Int. Conf. on Machine Learning and Applications, pp. 1394-1401, Orlando, FL, USA, 17-20 Dec. 2018. #</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	S. McNally, J. Roche, and S. Caton, "Predicting the price of bitcoin using machine learning," in 2018 26th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), 2018. #</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	D. Bahdanau, K. Cho, and Y. Bengio, Neural Machine Translation by Jointly Learning to Align and Translate, arXiv preprint arXiv:1409.0473, 2014. #</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Deep Long-Term Feature Extraction for Video Classification</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Hamedooni Asli</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sh.</given_name><surname>Javidani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>َA.</given_name><surname>Javidani</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>6</day><year>2026</year></publication_date><pages><first_page>191</first_page><last_page>199</last_page></pages><doi_data><doi>10.66224/ijece.50755.23.3.191</doi><resource>http://ijece.org/en/Article/50755</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/50755</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/50755</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/50755</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/50755</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/50755</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/50755</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/50755</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	H. Qiu and B. Hou, "Multi-grained clip focus for skeleton-based action recognition," Pattern Recognition, vol. 148, Article ID: 110188, Apr. 2024.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	M. Karim, et al., "Human action recognition systems: A review of the trends and state-of-the-art," IEEE Access, vol. 12, pp. 36372-36390, 2024. #</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	J. Xie, et al., "Dynamic semantic-based spatial graph convolution network for skeleton-based human action recognition," in Proc. of the AAAI Conf. on Artificial Intelligence, vol. 38, no. 6, pp. 6225-6233. Vancouver, Canada, 20-27 Feb. 2024. #</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	Y. Ma and R. Wang, "Relative-position embedding based spatially and temporally decoupled Transformer for action recognition," Pattern Recognition, vol. 145, Article ID: 109905, Jan. 2024. #</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	S. Guo, H. Pan, G. Tan, L. Chen, and C. Gao, "A High Invariance Motion Representation for Skeleton-Based Action Recognition," International Journal of Pattern Recognition and Artificial Intelligence, vol. 30, no. 08, Article ID: 1650018, 2016. #</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	K. Simonyan and A. Zisserman, "Two-stream convolutional networks for action recognition in videos," in Proc. of the 28th Int. Conf. on Neural Information Processing Systems, vol. 1, pp. 568-576, Montreal, Canada, 8-13 Dec. 2014. #</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	T. P. Nguyen, A. Manzanera, M. Garrigues, and N. -S. Vu, "Spatial motion patterns: action models from semi-dense trajectories," International Journal of Pattern Recognition and Artificial Intelligence, vol. 28, no. 07, Article ID: 1460011, 2014. #</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	A. Karpathy, et al., "Large-scale video classification with convolutional neural networks," in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, pp. 1725-1732, Columbus, OH, USA, 23-28 Jun. 2014. #</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	J. Yue-Hei Ng, et al., "Beyond short snippets: Deep networks for video classification," in Proc. of the IEEE Con. on Computer Vision and Pattern Recognition, pp. 4694-4702., Boston, MA, USA, 7-12 Jun. 2015. #</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	C. Feichtenhofer, A. Pinz, and A. Zisserman, "Convolutional two-stream network fusion for video action recognition," in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, pp. 1933-1941, Las Vegas, NV, USA, 27-30 Jun. 2016. #</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	P. Wang, Y. Cao, C. Shen, L. Liu, and H. T. Shen, "Temporal pyramid pooling-based convolutional neural network for action recognition," IEEE Trans. on Circuits and Systems for Video Technology, vol. 27, no. 12, pp. 2613-2622, Dec. 2017. #</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	D. Tran, L. Bourdev, R. Fergus, L. Torresani, and M. Paluri, "C3D: generic features for video analysis," CoRR, abs/1412.0767, vol. 2, p. 7, 2014. #</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	S. Ji, W. Xu, M. Yang, and K. Yu, "3D convolutional neural networks for human action recognition," IEEE Trans. on pattern analysis and machine intelligence, vol. 35, no. 1, pp. 221-231, Jan. 2013. #</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	S. Yu, Y. Cheng, L. Xie, and S. Z. Li, "Fully convolutional networks for action recognition," IET Computer Vision, vol. 11, no. 8, pp. 744-749, Dec. 2017. #</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	J. Liu, J. Luo, and M. Shah, "Recognizing realistic actions from videos “in the wild”," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, pp. 1996-2003, Miami, FL, USA, 20-25 Jun. 2009. #</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	X. Liu, Y. Li, and Q. Wang, "Multi-view hierarchical bidirectional recurrent neural network for depth video sequence based action recognition," International Journal of Pattern Recognition and Artificial Intelligence, vol. 32, no. 10, Article ID: 1850033, 2018. #</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	S. Yan, J. S. Smith, W. Lu, and B. Zhang, "Hierarchical Multi-scale Attention Networks for action recognition," Signal Processing: Image Communication, vol. 61, pp. 73-84, Feb. 2018. #</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	Z. Li, K. Gavrilyuk, E. Gavves, M. Jain, and C. G. Snoek, "VideoLSTM convolves, attends and flows for action recognition," Computer Vision and Image Understanding, vol. 166, pp. 41-50, Jan. 2018. #</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	X. Wang, L. Gao, P. Wang, X. Sun, and X. Liu, "Two-stream 3d convnet fusion for action recognition in videos with arbitrary size and length," IEEE Trans. on Multimedia, vol. 20, no. 3, pp. 634-644, Mar. 2018. #</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	Y. Shi, Y. Tian, Y. Wang, and T. Huang, "Sequential deep trajectory descriptor for action recognition with three-stream CNN," IEEE Trans. on Multimedia, vol. 19, no. 7, pp. 1510-1520, Jul. 2017. #</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	A. Iqbal, A. Richard, H. Kuehne, and J. Gall, "Recurrent residual learning for action recognition," in ¬Proc. German Conf. on Pattern Recognition, pp. 126-137, Basel, Switzerland, 12-15 Sept. 2017. #</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	A. Piergiovanni, C. Fan, and M. S. Ryoo, "Learning latent sub-events in activity videos using temporal attention filters," in Proc. of the 31st AAAI Conf. on Artificial Intelligence, pp. 4247-4254, San Francisco, CA, USA, 4-7 Feb. 2017. #</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	H. Gammulle, S. Denman, S. Sridharan, and C. Fookes, "Two Stream LSTM: A Deep Fusion Framework for Human Action Recognition," in Proc. IEEE Winter Conf. on Applications of Computer Vision, pp. 177-186, Santa Rosa, CA, USA, 24-31 Mar. 2017. #</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	A. Ullah, K. Muhammad, J. Del Ser, S. W. Baik, and V. H. C. de Albuquerque, "Activity recognition using temporal optical flow convolutional features and multilayer LSTM," IEEE Trans. on Industrial Electronics, vol. 66, no. 12, pp. 9692-9702, Dec. 2019. #</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	P. Zhen, X. Yan, W. Wang, H. Wei, and H.-B. Chen, "A highly compressed accelerator with temporal optical flow feature fusion and tensorized LSTM for video action recognition on terminal device," IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, vol. 42, no. 10, pp. 3129-3142, Oct. 2023. #</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	M. Hasan and A. K. Roy-Chowdhury, "Incremental activity modeling and recognition in streaming videos," in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, pp. 796-803, olumbus, OH, USA, 23-28 Jun. 2014. #</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	N. Ikizler-Cinbis and S. Sclaroff, "Object, scene and actions: Combining multiple features for human action recognition," in Proc. of the Computer Vision, pp. 494-507, Crete, Greece, 5-11 Sept. 2010. #</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	H. Wang, A. Kläser, C. Schmid, and C.-L. Liu, "Action recognition by dense trajectories," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, pp. 3169-3176, olorado Springs, CO, USA, 20-25 Jun. 2011. #</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	S. Sharma, R. Kiros, and R. Salakhutdinov, Action Recognition Using Visual Attention, arXiv Preprint arXiv:1511.04119, 2015. #</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	J. Cho, M. Lee, H. J. Chang, and S. Oh, "Robust action recognition using local motion and group sparsity," Pattern Recognition, vol. 47, no. 5, pp. 1813-1825, May 2014. #</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	M. Ravanbakhsh, H. Mousavi, M. Rastegari, V. Murino, and L. S. Davis, Action Recognition with Image Based CNN Features, arXiv Preprint arXiv:1512.03980, 2015. #</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	A. Javidani and A. Mahmoudi-Aznaveh, "Learning representative temporal features for action recognition," Multimedia Tools and Applications, vol. 81, no. 3, pp. 3145-3163, Jan. 2022. #</unstructured_citation></citation><citation key="ref33"><unstructured_citation>[33]	J. Lu, R. Xu, and J. J. Corso, "Human action segmentation with hierarchical supervoxel consistency," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, pp. 3762-3771, Boston, MA, USA, 7-12 Jun. 2015. #</unstructured_citation></citation><citation key="ref34"><unstructured_citation>[34]	G. Gkioxari and J. Malik, "Finding action tubes," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, pp. 759-768, Boston, MA, USA, 7-012 Jun. 2015. #</unstructured_citation></citation><citation key="ref35"><unstructured_citation>[35]	X. Peng, L. Wang, X. Wang, and Y. Qiao, "Bag of visual words and fusion methods for action recognition: Comprehensive study and good practice," Computer Vision and Image Understanding, vol. 150, pp. 109-125, Sept. 2016. #</unstructured_citation></citation><citation key="ref36"><unstructured_citation>[36]	H. Jhuang, J. Gall, S. Zuffi, C. Schmid, and M. J. Black, "Towards understanding action recognition," in Proc. IEEE Int. Conf. on Computer Vision, pp. 3192-3199, Sydney, Australia, 1-8 Dec. 2013. #</unstructured_citation></citation><citation key="ref37"><unstructured_citation>[37]	X. Peng, C. Zou, Y. Qiao, and Q. Peng, "Action recognition with stacked fisher vectors," in Proc. European Conf. on Computer Vision, pp. 581-595, Zurich, Switzerland, 6-12 Sept. 2014. #</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>