﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022920</doi_batch_id><timestamp>14050229202439</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>6</month><day>21</day><year>2006</year></publication_date><journal_volume><volume>4</volume></journal_volume><issue>1</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A New and Robust Steganography Method for Data Hiding in JPEG Images</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A. R.</given_name><surname>Naghsh-Nilchi</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2006</year></publication_date><pages><first_page>3</first_page><last_page>11</last_page></pages><doi_data><doi>10.66224/ijece.27847.4.1.3</doi><resource>http://ijece.org/fa/Article/27847</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27847</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27847</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27847</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27847</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27847</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27847</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27847</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	R. C. Gonzalez and R. E. Woods, Digital Image Processing, Addison Publishing Co., 1993.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	P. Wayner, Disaapearing Cryptography, 2nd Ed., Elsevier Science: US, 2002.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. J. Anderson and F. A. P. Petitcolas, "On the limits of steganography," IEEE J. of Selected Areas in Communication, vol. 16, no. 4, pp. 474-481, May 1998.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. A. Laplante and A. D. Stoyenko, Real Time Imaging, IEEE Press, 1996.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Network Working Group, RFC 2435- Payload Format for JPEG Compressed Video, 1998.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. A. P. Petitcolas, P. J. Anderson, and M. G. Kuhn, "Information hiding: a survey," in Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, 1999.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Fridrich and M. Goljan, Practical Steganoganalysis of Digital Image_ State of the Art, SUNY Binghamton, Department of Electrical Engineerring, 2002.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	N. Provos and P. Honeyman, Hide and Seek: An Introduction to Steganography, University of Michigan, IEEE Conmputer Society, 2003.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	N. Provos, Defending Against Statistical Steganalysis, Center of Information Technology Integration, University of Michigan, 2000.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Fridrich, M. Goljan, and D. Hogea, Attacking the Outguess, Binghamton University Press, 2000.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Fridrich, M. Goljan, and D. Hogea, Steganalsis of JPEG Images: Braaking the F5 Algorithm, Binghamton University Press, 2003.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	اعظم نادعليان، بررسي امنيت شيوه‌هاي پنهان‌نگاري اطلاعات در تصوير و ارائه يك شيوه مناسب، پايان نامه كارشناسي ارشد، گروه مهندسي كامپيوتر دانشگاه اصفهان، 1383.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	نسرين رسولي، پنهان‌سازي تصوير ديجيتالي در تصاوير با فرمت  JPEG، پايان نامه كارشناسي ارشد، دانشكده تحصيلات تكميلي دانشگاه آزاد نجف آباد، 1384.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Modified Multi-Band Spectral Subtraction for  A Modified Multi-Band Spectral Subtraction for Speech Enhancement</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Bekrani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Sadoghi Yazdi</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2006</year></publication_date><pages><first_page>12</first_page><last_page>20</last_page></pages><doi_data><doi>10.66224/ijece.27848.4.1.12</doi><resource>http://ijece.org/fa/Article/27848</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27848</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27848</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27848</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27848</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27848</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27848</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27848</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. V. Vaseghi, Advanced Digital Signal Processing and Noise Reduction, John Wiley&amp; Sons, Ltd., 2000.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	H. Gustafsson, S. E. Nordholm, and I. Claesson, "Spectral subtraction using reduced delay convolution and adaptive averaging," IEEE Trans. on Speech and Audio Processing, vol. 9, no. 8, pp. 799-807, Nov. 2001.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	K. Yamashita, S. Ogata and T. Shimamura, "Spectral subtraction iterated with weighting factors," in Proc. IEEE Speech Coding Workshop, pp. 138-140, Oct. 2002.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	L. Lin, E. Ambikairajah, and H. Holmes, "Speech enhancement for nonstationary noise environment," in Proc. Asia-Pacific Conf. on Circuits and Systems, vol. 1, pp. 177-180, Oct. 2002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	D. Almagor, Enhancement of Noisy Speech Signals by Low-Cost, Adaptive Methods, National Semiconductor Corporation, DSP Technology Group, pp. 25-28, 1986.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	B. L. Sim, Y. C. Tong, J. S. Chang, and C. T. Tan, "A parametric formulation of the generalized spectral subtraction method," IEEE Trans. on Speech and Audio Processing, vol. 6, no. 4, pp. 328-337, Jul. 1998.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. F. Boll, "Suppression of acoustic noise in speech using spectral subtraction," IEEE Trans. on Acoustica, Speech and Signal Processing, vol. 27, no. 2, pp. 113-120, Apr. 1979.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. Poruba, "Speech enhancement based on nonlinear spectral subtraction," in Proc, Fourth IEEE Int. Caracas Conf. on Devices, Circuits, and Systems, pp. T031-1-T031-4, 2002.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. F. Boll, "A spectral subtraction algorithm for suppression of acoustic noise in speech," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 200-203, Apr. 1979.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Lagler, G. Gruhler, P. Sovka, V. Davidek, and &amp; P. Pollak, Real-time Fixed-point DSP-implementation of Spectral Subtraction Algorithm for Speech Enhancement in Noisy Environment, Fachhochschule Heilbronn, University for Applied Sciences, D-74081 Heilbronn, Germany, Czech Technical University Prague, Fac. of  Electrical Engineering, Dpt. Of Cicuit Theory Technicka2, 16627, Praha 6, Czech Republic, 1996.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	P. Lockwood and J. Boudy, "Experiments with a non-linear spectral subtractor (NSS), hidden Markov models and the projections, for robust recognition in cars," Speech Comm., vol. 11, no. 2-3, pp. 215-228, June 1992.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	C. He and G. Zweig, "Adaptive two-band spectral subtraction with multi-window spectral estimation," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, vol. 2, pp. 793-796, Mar. 1999.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Md. Kamrul Hasan, S. Salahuddin, and M. Rezwan Khan, "A modified a priori SNR for speech enhancement using spectral subtraction rules", IEEE Signal Processing Letters, vol. 11, no. 4, pp. 450-453, Apr. 2004.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	K. Wu and P. Chen, "Efficient speech enhancement using spectral subtraction for car hands-free application," in Proc. Int. Conf. on Consumer Electronics, vol. 2, pp. 220-221, 2001.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. D. Kamath, A Multi-Band Spectral Subtraction Method for Speech Enhancement, M.Sc Thesis in Electrical Eng., University of Texas at Dallas, Dec. 2001.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Kamath, and P. Loizou, "A multi-band spectral subtraction method for enhancing speech corrupted by colored noise," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, vol. 4, p. 4164, Orlando, US, May 2002.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Y. Ghanbari, M. R. Karami-Mollaei, and B. Amelifard, "Improved multi-band spectral subtraction method for speech enhancement," in Proc. The Sixth IASTED Int. Conf. on Signal and Image Processing, pp. 225-250, Honolulu, US, Aug. 2004. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	http://www.speech.cs.cmu.edu/comp.speech/section1/data/noisex.html</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. R. Deller, Jr., J. H. L. Hansen, and J. G. Proakis, Discrete-Time Processing of Speech Signals, IEEE Press, Piscataway, NJ, 2000.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	L. Lin, W. H. Holmes, and E. Ambikairajah, "Subband noise estimation for speech enhancement using a perceptual wiener filter," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, vol. 1, pp. 80-83, Apr. 2003.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	R. Martin, "Noise power spectral density estimation based on optimal smoothing and minimum statistics," IEEE Trans. Speech and Audio Processing, vol. 9, no. 5, pp. 504-512, Jul. 2001. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. Berouti, R. Schwartz, and J. Makhoul, "Enhancement of speech corrupted by acoustic noise," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp. 208-211, Apr. 1979.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	 "IEEE recommended practice for speech quality measurement," IEEE Trans. on Audio and Electroacoustics, vol. 17, no. 3, pp. 227-246, Sept. 1969.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Robust Recognition of Direct and Telephony Speech Using Proper Extraction of Feature Vectors and Their Modification by Neural Networks Inversion</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Vali</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. A.</given_name><surname>Seyed Salehi</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2006</year></publication_date><pages><first_page>21</first_page><last_page>29</last_page></pages><doi_data><doi>10.66224/ijece.27849.4.1.21</doi><resource>http://ijece.org/fa/Article/27849</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27849</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27849</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27849</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27849</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27849</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27849</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27849</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. Fouri, "Robust methods in automatic speech recognition and understanding," in Proc. Eurospeech, pp. 1993-1997, Geneva, Switzerland, 2003.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Gong, "Speech recognition in noisy environments: A survey," Speech Communication, vol. 16, no. 3, pp. 261-291, Apr. 1995.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	C. H. Lee and Q. Huo, "On adaptive decision rules and decision parameter adaptation for automatic speech recognition," in Proceedings of the IEEE, vol. 88, pp. 1241- 1269, Aug. 2000.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Martin, J. Fiscus, B. Fisher, D. Pallet, and M. Przybocki, "System Descriptions and Performance Summary," presented at the Conversational Speech Recognition Workshop: DARPA Hub-5E Evaluation, Baltimore, Maryland, US, May 1997.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	D. Yuk and J. Flanagan, "Telephone speech recognition using neural networks and hidden Markov models," in Proc. ICASSP, pp. 157-160, 1999.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Thrun, "Is learning the n-th thing any easier than learning the first?" Advances in Neural Information Processing Systems, MIT Press, 1996.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Ben-David and R. Schuller, "Exploiting task relatedness for multiple task learning," Lecture Notes in Computer Science, vol. 2777, pp. 567 - 580,2003.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	C. W. Omlin and C. L. Giles, "Training second-order recurrent neural networks using hints," in Proc. of the Ninth International Conference on Machine Learning., pp. 363-368, 1992.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Parveen and P. Green, "Multitask learning in connectionist robust ASR using recurrent neural networks," in Proc. Eurospeech, pp. 1813-1816, Geneva, Switzerland, Sep. 2003. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	P., Niyogi and et al. "Incorporating prior information in machine learning by creating virtual examples," in Proceedings of the IEEE, vol. 86, no. 11, pp. 2196-2209, Nov. 1998.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	الف. نژادقلي، بازشناخت مقاوم گفتار نسبت به تنوعات مختلف گوينده در شبكه‌هاي عصبي بازشناخت گفتار، پايان‌نامه كارشناسي ارشد، دانشگاه صنعتي اميركبير، دانشكده مهندسي پزشكي، 1382.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Blumer, A. Ehrenfeucht, D. Haussler, and M.Warmuth, "Learnability and the Vapnik-Chervo-Nenkis dimention," J. Ass. Comput. Match., vol.36, no.4, pp. 929-965, 1989.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Bijankhan, J. Seikhzadeghan, M. R. Roohani, Y. Samareh, K. Lucas, M. Tebyani., "FARSDAT: the speech database of Farsi spoken language," in Proc. SST-94, pp. 826-831, Perth, Australia, 1994.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. B. Davis and P. Mermelstein, "Comparison of parametric representations of monosyllabic word recognition in continuously spoken sentences," IEEE Trans. ASSP, vol. 28, no. 4, pp. 357-366, Aug. 1980.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	م. رحيمي‎نژاد، توسعه و بهبود كيفيت روشهاي استخراج پارامترهاي بازنمايي در سيستم‌هاي بازشناخت گفتار، پايان نامه كارشناسي ارشد، دانشگاه صنعتي اميركبير، دانشكده مهندسي پزشكي، 1381. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. Han and W. Gao, "Robust telephone speech recognition based on channel compensation," Journal of Pattern Recognition Society, vol. 32, no.6, pp. 1061-1067, Jun. 1999.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	C. A. Jensen, et al., "Inversion of feedforward neural networks: algorithms and applications," Proceedings of the IEEE, vol. 87, no. 9, pp. 1536-1549, Sep. 1999. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	R. J., Williams, "Inverting a connectionist network mapping by backpropagation of error," in Proc 8th Annu. Conf. Cognitive Science Society, pp. 859-865, 1986.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>New Optimization Approach in the Design of Yagi Uda Antenna</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A. A.</given_name><surname>Lotfi-Neyestanak</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>F.</given_name><surname>Hojjat Kashani</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2006</year></publication_date><pages><first_page>30</first_page><last_page>36</last_page></pages><doi_data><doi>10.66224/ijece.27850.4.1.30</doi><resource>http://ijece.org/fa/Article/27850</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27850</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27850</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27850</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27850</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27850</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27850</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27850</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Rahmat-Samii and E. Michielssen, Electromagnetic optimization by genetic algorithms, New York: John Wiley &amp; Sons, 1999.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	E. A. Jones and W. T. Joines, "Design of Yagi-Uda antennas using genetic algorithm," IEEE Trans. Antennas Prop., vol. 45, no. 9, pp. 1386-1392, Sep. 1997. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	D. Correia, A. J. M. Soares, and M. A. B. Terada, "Optimization of gain impedance and bandwidth in Yagi-uda antemnas using genetie algorithm," in Proc SBMO/IEEE MlT-S IMOC’99 int., vol. 1, pp. 41- 44, Aug. 1999.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	B. A. Austin and Wen-Chung Liu, "An optimized shaped yagi-uda array using the genetic algorithm," in Proc. IEE National Conf. on Antennas and Propagation, pp. 245-248, no. 461, Mar.-Apr. 1999.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. J. Wang, K. F. Man, C. H. Chan, and K. M. Luk, "Optimization of Yagi array by hierarchical genetic algorithms",in Proc Radio &amp; Wireless Conf. RAWCON’03, pp.91-94, Aug. 2003. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. Kuwaha, "Multiobjective optimization design of Yagi–Uda Antenna," IEEE Trans. Antennas Prop., vol. 53, no. 6, pp. 1984-1992, Jun. 2005. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. Gies and Y. Rahmat-Samii, "Particle swarm optimization for reconfigurable phase differentiated array design," Microwave and Optiucal Technology Letters, vol. 38, no. 3, pp. 168-175, Aug. 2003.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Clerc and J. Kennedy, "The particle swarm: explosion, stability, and convergence in a multidimensional complex space," IEEE Trans Evolutionary Computation, vol. 6, no. 1, pp. 58-73, Feb. 2002.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	J. Robinson and Y. Rahmat-Samii, "Particle swarm optimization in electromagnetics," IEEE Trans. Antennas Prop. vol. 52, no. 2, pp. 397-407, Feb. 2004.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. L. Lawson and Yagi Antenna Design, American Radio league, US: New York, 1986.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	E. A. Jones, Genetic Design of Antennas and Electronic Circuits, Ph.D. Thesis, Department of Electrical and Computer Engineering, Duke University, 1999.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	مهدي شيرازي، "بهينه‌سازي و ساخت آنتن ياگي با استفاده از الگوريتم ژنتيک،" پايان‌نامه کارشناسي ارشد مخابرات، دانشگاه علم و صنعت ايران، 1379.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	L. Davis and D. E. Goldberg, Genetic Algorithms and Simulated Annealing, Pitman Publishing, London, 1990.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. A. Lotfi Neyestanak, F. Hojjat Kashani, and K. Barkeshli, "E-shaped patch antenna design based on genetic algorithm using decision fuzzy rules", Iranian Journal of Electrical and Computer Engineering, vol. 4, no. 1, pp. 18-24, Winter-Spring 2005.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Fuzzy Toolbox of MATLAB 7, 2004, http://www.mathworks.com/.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Novel Phase Shifters for Microstrip Reflectarray Antenna</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Horaizi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>K.</given_name><surname>Keyghobad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sh.</given_name><surname>Hosseinzadeh</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2006</year></publication_date><pages><first_page>37</first_page><last_page>44</last_page></pages><doi_data><doi>10.66224/ijece.27851.4.1.37</doi><resource>http://ijece.org/fa/Article/27851</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27851</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27851</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27851</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27851</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27851</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27851</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27851</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	R. C. Hansen, Microwave Scanable Antennas, Academic Press, 1966. </unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. Huang, "Microstrip reflectarray and its applications," in Proc. ISAP 96, pp. 1177-1180, Chiba, Japan, 1996. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	D. M. Pozar, S. D. Targonski, and H. D. Syrigos, "Design of millimeter wave microstrip reflectarrays," IEEE Trans. on Antennas Propagate, vol. 45, no. 2, pp. 287-296, Feb. 1996 </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Huang and R. J. Pogorzelski, "A Ka-band microstrip reflectarray with elements having variable rotation angles," IEEE Trans. of Antennas Propagation, vol. 46, no. 5, pp. 650-656, May 1998.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. R. Chaharmir., J. Shaker, M. Cuhaci, and A. Sebak "Reflectarray with slots of varying length on ground plane," in Proc. IEEE Antennas and Propagation Society Int. Symp., vol. 3, pp. 144-147, 2002.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R. D. Javor, X. D. Wu, and K. C., "Design and performance of a microstrip reflectarray antenna," IEEE Trans. on Antennas and Propagation, vol. 43, no. 9, pp. 932-939, Sep. 1995.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Van de Capelle, Transmission Line Model for Rectangular Microstrip Antennas, Microstrip Antenna Handbook. London, U. K.: Peter Peregrinus, 1989, Ch. 10.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. M. Pozar, Microwave Engineering, Addison-Wesely Publishing Company, second edition, 1998.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Oraizi and K. Keyghobad, "Novel broadband phase shifter for microstrip reflectarray antennas," in Proc IST 2005, vol. 1, pp. 435-439, Shiraz, Iran, 10-12 Sep. 2005.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	T. C. Edwards, Foundations for Microstrip Circuit Design, John Wiley &amp; Sons, second edition, 1992.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	P. Anders and F. Amdt, "Microstrip discontinuity capacitances and inductances for double steps, mitered with arbitrary angle and asymmetric right-angle bends," IEEE Trans. on Microwave Theory and Techniques, vol. 28, no. 11, pp. 1213-1217, Nov. 1980.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	E. Hammerstad, "Computer-aided design of microstrip couplers with accurate discontinuity models," in Proc MTT-S Int. Microwave Symposium Digest, vol. 81, no. 1, pp. 54-56, Jun. 1981.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	http://www.mathworks.com</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	http://www.appwave.com</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	P. Bhartia, K. V. S. Rao, and R. S. Tomar, Millimeter-Wave Microstrip and Printed Circuit Antennas, Artech House Inc., 1991.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Design and Implementation of an IGBT Gate Driver with Necessary Protections and SMD Devices</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Fazeli</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. A.</given_name><surname>Abrishamifar</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>21</day><year>2006</year></publication_date><pages><first_page>45</first_page><last_page>47</last_page></pages><doi_data><doi>10.66224/ijece.27852.4.1.45</doi><resource>http://ijece.org/fa/Article/27852</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27852</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27852</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27852</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27852</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27852</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27852</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27852</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]		R. Chokhawala, J. Catt, and B. Pelly, "Gate drive considerations for IGBT modules," IEEE Trans. on Industry Applications, vol. 31, no. 3, pp. 603-611, May-June 1995.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]		C. Kuratli, Q. Huang, and A. Biber, "Implementation of high peak current IGBT gate driver in a VLSI compatible BiCMOS technology," IEEE J. of Solid State Circuits, vol. 31, no. 7, pp. 924-932, Jul. 1996.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]		J. M. Park et al., "a monolithic IGBT gate driver for intelligent power modules in 0.8 m high voltage (50 V) CMOS process," Microelectronical Journal, vol. 32, no. 5-6, pp. 537-541, May/Jun. 2001.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]		N. McNeil, K. Sheng, B. W. Williams, and S. J. Finney, "Assessment of off-state negative gate voltage requirements for IGBT’s," IEEE Trans. on Power Electronics, vol. 13, no. 3, pp. 436-440, May, 1998.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>