﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022920</doi_batch_id><timestamp>14050229203048</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>12</month><day>21</day><year>2007</year></publication_date><journal_volume><volume>5</volume></journal_volume><issue>4</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Analyzing Weighted Attack Graphs Using Genetic Algorithms</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Abadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Saeed</given_name><surname>Jalili</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2007</year></publication_date><pages><first_page>189</first_page><last_page>202</last_page></pages><doi_data><doi>10.66224/ijece.27883.5.4.189</doi><resource>http://ijece.org/fa/Article/27883</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27883</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27883</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27883</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27883</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27883</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27883</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27883</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	م. آبادي و س. جليلي، "کشف سناريوهاي نفوذ به شبکه‌هاي کامپيوتري با استفاده از بررسي‌کننده مدل SPIN،" مجموعه مقالات سومين كنفرانس رمز ايران، دانشگاه صنعتي اصفهان، صص. 305-294، شهريور ماه 138۴.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. Ramakrishnan and R. Sekar, "Model-based vulnerability analysis of computer systems," in Proc. 2nd Int. Workshop on Verification, Model Checking and Abstract Interpretation, pp. 1-8, Sep. 1998. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	C. A. Phillips and L. P. Swiler, "A graph-based system for network vulnerability analysis," in Proc. 1998 New Security Paradigms Workshop, pp. 71-79, Charlottesville, US, Sep. 1998. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	O. Sheyner, Scenario Graphs and Attack Graphs, Ph.D. Thesis, Carnegie Mellon University, Apr. 2004.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Ammann, D. Wijesekera, and S. Kaushik, "Scalable, graph-based network vulnerability analysis," in Proc. 9th ACM Conf. on Computer and Communications Security, pp. 217-224, Washington DC, US, Nov. 2002.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, "Automated generation and analysis of attack graphs," in Proc. IEEE Symposium on Security and Privacy, pp. 273-284, Oakland, US, May 2002.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	NuSMV: A New Symbolic Model Checker. http://nusmv.irst.itc.it/.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Noel and S. Jajodia, "Managing attack graph complexity through visual hierarchical aggregation," in Proc. ACM CCS Workshop on Visualization and Data Mining for Computer Security, pp. 109-118, Washington DC, US, Oct. 2004.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Noel, M. Jacobs, P. Kalapa, and S. Jajodia, "Multiple coordinated views for network attack graphs," in Proc. IEEE Workshop on Visualization for Computer Security, pp. 99-106, Minneapolis, US, Oct. 2005.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Jha, O. Sheyner, and J. M. Wing, "Two formal analyses of attack graphs," in Proc. 15th IEEE Computer Security Foundations Workshop, pp. 49-63, Nova Scotia, Canada, Jun. 2002.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Abadi and S. Jalili, "Applying genetic algorithms for minimization analysis of network attack graphs," in Proc. 11th Int. CSI Computer Conf., pp. 133-139, Tehran, Jan. 2006.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	D. E. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning, Addison Wesley, Reading, MA, 1989.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	K. A. De Jong, Evolutionary Computation: A Unified Approach, MIT Press, Cambridge, MA, 2006.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Mitchell, An Introduction to Genetic Algorithms, MIT Press, Cambridge, MA, 1999.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	R. Deraison, Nessus Scanner. http://www.nessus.org.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Common Vulnerabilities and Exposures. http://www.cve.mitre.org.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	P. Ammann, J. Pamula, R. Ritchey, and J. Street, "A host-based approach to network attack chaining analysis," in Proc. Annual Computer Security Applications Conf., pp. 72-84, Tucson, US, Dec. 2005.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Adaptive Inverse Controller Design for Teleoperation Systems</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Sha Sadeghi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H. R.</given_name><surname>Momeni</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>R.</given_name><surname>Amirifar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S.</given_name><surname>Ganjefar</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2007</year></publication_date><pages><first_page>203</first_page><last_page>214</last_page></pages><doi_data><doi>10.66224/ijece.27884.5.4.203</doi><resource>http://ijece.org/fa/Article/27884</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27884</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27884</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27884</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27884</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27884</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27884</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27884</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K .Gu, V. L. Kharitonov, and J. Chen, Stability of Time - Delay Systems, Birkhäuser: Springer, 2003.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. J. Anderson and M. W. Spong, "Bilateral control of teleoperators with time delay," IEEE Trans. on Autom. Control, vol. 34, no. 5, 
pp. 494-501, May 1989.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	G. Niemeyer and J. Slotine, "Stable adaptive teleoperation," IEEE J. Ocean. Eng., vol. 16, no. 1, pp. 152-162, Jan. 1991.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Munir and W. Book, "Internet - based teleoperation using wave variables with prediction," IEEE/ASME Trans. on Mechatronics, vol. 7, no. 2, pp. 124-133, Jun. 2002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Ganjefar, H. R. Momeni, F. J. Sharifi, and M. T. H. Beheshti, "Teleoperation control system using a hybrid structure of wave variables and Smith predictor with varying time delay estimation," Modares J. Eng., vol. 13, no. 3, pp. 73-84, Fall 2003.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	D. A. Lawrence, "Stability and transparency in bilateral teleoperation," IEEE Trans. on Robotic. Autom., vol. 9, no. 5, pp. 624-637, Oct. 1993.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. Yokokohji and T. Yoshikawa, "Bilateral control of master - slave manipulators for ideal kinesthetic coupling formulation and experiment," IEEE Trans. Robotic. on Autom., vol. 10, no. 5, pp. 605-620, Oct. 1994.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	K. Hashtrudi-Zaad and S. E. Salcudean, "On the use of local force feedback for transparent teleoperation," in Proc. IEEE Int. Conf. Robotic. Autom., vol. 3, pp. 1863-1869, Detroit, Michigan, 1999.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	K. H. Sunny, H. R. Momeni, and F. J. Sharifi, "Designing a model reference adaptive controller for a teleoperation system using slave robot output prediction," Iranian J. Elec. and Comput. Eng., vol. 3, no. 2, pp. 96-102, Fall-Winter 2005.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	E. Kamrani, H. R. Momeni, and A. R. Sharafat, "A novel adaptive control system for stable teleoperation via Internet," in Proc. IEEE Int. Conf. Contr. Applicat., pp. 1164-1169, Toronto, Canada, Aug. 2005.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	W. H. Zhu and S. E. Salcudean, "Stability guaranteed teleoperation: an adaptive motion/force control approach," IEEE Trans. Autom. Control, vol. 45, no. 11, pp. 1951-1969, Nov. 2000.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	H. Kazerooni, T. I. Tsay, and K. Hollerbach, "A controller design framework for telerobotics systems," IEEE Trans. Contr. Syst. Technol., vol. 1, no. 1, pp. 50-62, Mar. 1993.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. H. Gary, B. Leung, A. Francis, and J. Apkarian, "Bilateral controller for teleoperators with time delay via μ – synthesis," IEEE on Trans. Robot. Autom., vol. 11, no. 1, pp. 105-116, Feb. 1995.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	I. Elhajj, J. Tan, N. Xi, W. K. Fung, Y. H. Liu, T. Kaga, and T. Fukuda, "Multi - site Internet - based cooperative control of robotic operations," in Proc. IEEE/RSJ Int. Conf. Intell. Robot. Syst., vol. 2, pp. 826-831, Takamatsu, Japan, 31 Oct.-5 Nov. 2000.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. H. Park and H. C. Cho, "Sliding - mode controller for bilateral teleoperation with varying time delay," in Proc. IEEE/ASME Int. Conf. Advanced Intell. Mechatronics, pp. 311-316, Atlanta, US, Sep. 1999.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. H. Park and H. C. Cho, "Sliding mode control of bilateral teleoperation systems withforce-reflection on the Internet," in Proc. IEEE/RSJ Int. Conf. Intell. Robot. Syst., vol. 2, pp. 1187-1192, Takamatsu, Japan, 31 Oct-5 Nov. 2000.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	H. C. Cho, J. H. Park, K. Kim, and J. O. Park, "Sliding - mode - based impedance controller for bilateral teleoperation systems under varying time-delay," in Proc. IEEE Int. Conf. Robot. Autom., vol. 1 pp. 1025-1030, Seoul, South Korea, 2001.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	D. Lee and M. W. Spong, "Passive bilateral teleoperation with constant time delay," IEEE Trans. on Robotic. Autom., vol. 22, no. 2,  pp. 269-281, Apr. 2006.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	D. J. Lee and M. W. Spong, "Bilateral teleoperation of multiple cooperative robots over delayed communication networks: theory," in Proc. IEEE Int. Conf. Robot. Autom., pp. 360-365, Barcelona, Spain, Apr. 2005.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	D. Lee, O. Martinez-Palafox, and M. W. Spong, "Bilateral teleoperation of multiple cooperative robots over delayed communication networks: application," in Proc. IEEE Int. Conf. Robot. Autom., pp. 366-371, Barcelona, Spain, Apr. 2005.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	P. Arcara and C. Melchiorri, "Control schemes for teleoperation with time delay: a comparative study," Robot. Autom. Syst., vol. 38, no. 1, pp. 49-64, Jan. 2002.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	E. J. Odriguez - Seda, D. Lee, and M. W. Spong, "An experimental comparison study for bilateral Internet - based teleoperation," in Proc. IEEE Conf. Contr. Applicat., CCA, pp. 1701-1706, Munich, Germany, Oct. 2006.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	B. Hannaford, "A design framework for teleoperators with kinesthetic feedback," IEEE Trans. on Robot. Autom., vol. 5, no. 4, pp. 426-434, Aug. 1989.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. Ueda and T. Yoshikawa, "Force reflecting bilateral teleoperation with time delay by signal filtering," IEEE Trans. on Robot. Autom., 
vol. 20, no. 3, pp. 256-268, Jun. 2004.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	K. B. Fite, L. Shao, and M. Goldfarb, "Loop shaping for transparency and stability robustness in bilateral telemanipulation," IEEE Trans. on Robot. Autom., vol. 20, no. 3, pp. 620-624, Jun. 2004.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	G. L. Plett, Adaptive Inverse Control of Plants with Disturbances, Ph. D. Dissert., Dept. Elec. Eng., Stanford Univ., Stanford, CA, May 1998.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	G. L. Plett, "Adaptive inverse control of unmodeled stable SISO and MIMO linear systems," Int. J. Adapt. Contr. Signal Process., vol. 16, no. 4, pp. 243-272, May 2002.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	G. L. Plett, "Adaptive inverse control of linear and nonlinear systems using dynamic neural networks," IEEE Trans. on Neural Net., vol. 14, no. 2, pp. 360-376, Mar. 2003.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	B. Widrow and E. Walach, Adaptive Inverse Control. Upper Saddle River, NJ: Prentice - Hall, 1996.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	G. L. Plett, "Efficient linear MIMO adaptive inverse control," in Proc. IFAC Workshop on Adapt. Learning in Contr. Signal Process., pp. 89-94, Cernobbio - Como, Italy, Aug. 2001.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	G. L. Plett and H. Böttrich, "DDEKF learning for fast nonlinear adaptive inverse control," in Proc. World Cong. on Comput. Intell., 6 pages, Honolulu, US, May 2002.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	M. Sha Sadeghi, H. R. Momeni, R. Amirifar, and S. Ganjefar, "A novel bilateral teleoperation paradigm with time varying communication delay," in Proc. IEEE Conf. Contr. Applicat., CCA, pp. 199-204, Munich, Germany, Oct. 2006.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	O. J. M. Smith, "Closer control of loops with dead time," Chem. Eng. Progress, vol. 53, no. 5, pp. 217-219, May 1957.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	Z. Palmor, "Stability properties of Smith dead - time compensator controllers," Int. J. Control, vol. 32, no. 6, pp. 937-949, Dec. 1980.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	M. S. Tavazoei and M. Haeri, "Comparison of the existing methods in determination of the characteristic polynomials," in Proc. of ARAS Conference, Istanbul, Turkey, pp. 130-133, 2005.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	S. E. Hamamci, I. Kaya, and M. Koksal, "Improving performance for a class of processes using coefficient diagram method," in Proc. 9th Mediterranean Conf. on Contr. Autom., vol. 1, pp. 092-1:092-6, Dubrovnik, Crotia, Jun. 2001.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	S. Manabe, "Coefficient diagram method," in Proc. 14th IFAC Symp. Autom. Contr. Aerospace, pp. 199-210, Seoul, Korea, 
Aug. 1998.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Optimization of Shunt Active Power Filter and Load Current with an Improved Sliding Mode Control</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Nayeripour</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Yazdian Varjani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Mohamadian</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2007</year></publication_date><pages><first_page>215</first_page><last_page>223</last_page></pages><doi_data><doi>10.66224/ijece.27885.5.4.215</doi><resource>http://ijece.org/fa/Article/27885</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27885</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27885</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27885</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27885</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27885</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27885</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27885</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation> [1] J. Miret and L. Cruz, "A simple sliding mode control of an active power filter," in Proc. of IEEE Power Electronics Specialists Conf.,
vol. 2, pp. 1052-1056, Jun. 2004.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] H. C. Yuen and W. H. Yuan, "A new single - phase active power filter with reduced energy storage capacitor," in Proc. IEEE Power
Electronics Specialists Conf., vol. 1, pp. 202-208, Jun. 1995.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] M. G. F. Gous and I. J. Beukes, "Sliding mode control for a three-phase shunt active power filter utilizing a four-leg voltage
source inverter," in Proc. of IEEE Power Electronics Specialists Conf., vol. 6, pp. 4609-4615, Jun. 2004.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] N. Mabrouk, F. Fnajech, K. Al - Haddad, and S. Rahmani, "Sliding mode control of a 3 - phase - shunt active power filter," in Proc. of
IEEE Conf., on Industrial Technology, vol. 1, pp. 597-601,Dec. 2003.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] M. Aredes, Active Power Line Conditioners, Ph. D. Thesis, Institut fur Allgemeine Elektrotechnik, Technical University of Berlin, 1996.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] M. C. Benhabib and S. Saadate, "New control approach for four-wire active power filter based on the use of synchronous
refernce frame," Electric Power System Research, vol. 73, no. 3, pp. 353-362, Mar. 2005.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] N. Mabrouk and F. Fnajech, "Sliding mode control of A 3-phase -shunt active power filter," in Proc. Int. Conf. Industrial Technology,
vol. 1, pp. 597-600, Dec. 2003.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] J. S. Subjak Jr. and McQuilkin, "Harmonics-causes, effects, measurments, and analysis: an update," IEEE Trans. on Industry
Application, vol. 26, no. 6, pp. 1034-1042, Nov./Dec. 1990.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] C. C. Chan and H. Q. Wang, "New scheme of sliding mode control for high performance induction motor drives," in IEE Proceedings
Electric Power Applications, vol. 143, no. 3, pp. 177-185, May 1996.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] B. Singh and K. Al - Haddad, "A review of active filters for power quallity improvement," IEEE Trans. on Industrial Electronics,
vol. 16, no. 5, pp. 960-971, Oct. 1999.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New Method for Ripple Reduction of DC Voltage Using Active Filter</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S. M.</given_name><surname>Dehghan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Yazdian Varjani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Mohamadian</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2007</year></publication_date><pages><first_page>224</first_page><last_page>232</last_page></pages><doi_data><doi>10.66224/ijece.27886.5.4.224</doi><resource>http://ijece.org/fa/Article/27886</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27886</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27886</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27886</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27886</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27886</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27886</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27886</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	W. Zhang et al., "Active DC filter for HVDC system: test installation in Konti-Skan DC link at Lindome converter station," IEEE Trans. on Power Delivery, vol. 8, no. 3, pp. 1599-1606, Jul. 1993.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	L. J. Xiao and L. Zhang, "Harmonic cancellation for HVDC systems using a notch filter controlled active DC filter," in IEE Proceedings Gener. Transm. Distrib., vol. 147, no. 3, pp. 176-181, May 2000.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	D. Zhao, J. Chen, Z. Wang, and Y. Wang, "An approximate inverse system control based active DC filter applied in HVDC," in Proc. 35th Annual IEEE Power Electronic Specialists Conf., vol. 1, pp. 765-770, Germany, Jun. 2004.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Y. Wang, G. Joos, and H. Jin, "DC - side shunt-active power filter for phase-controlled magnet-load power supplies," IEEE Trans. on Power Electronics, vol. 12, no. 5, pp. 765-771, Sep. 1997.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	G. Xiao, Y. Pei, K. Li, and Z. Wang, "A novel control approach to the DC active power filter used in low ripple and large stable/pulse power supply," in Proc. 34th Annual IEEE Power Electronic Specialists Conf., vol. 4, pp. 1489-1493, Jun. 2003.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	K. Li, G. Xiao, J. Liu, and Z. Wang, "New control scheme for series DC active power filter coupled by transformers applied to high performance magnet power supplies," in Proc. Power Electronic and Motion Control Conf., vol. 2, pp. 462-467, Aug. 2004.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	P. A. Ioannou and J. Sun, Robust Adaptive Control. Englewood Cliffs, NJ: Prentice - Hall, 1996.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	K. J. Astrom and B. Wittenmark, Computer - Controlled Systems: Theory and Design. Upper Saddle River, NJ: Prentice - Hall, 1997.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	C. Rech, H. Grundling, H. Pinheiro, "A modified discrete control law for UPS application," in Proc. 31th Annual IEEE Power Electronic Specialists Conf., vol. 3, pp. 1476 - 1481, 2000.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	H. A. Grundling, E. G. Carati, and J. R. Pinheiro, "A robust model reference adaptive controller for UPS applications," in Proc. IEEE Industrial Electronics Conf., vol. 2, pp. 901-905, Nov. 1997.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	C. Rech, H. Pinheiro, and H. Grundling, "Comparison of digital control techniques with repetitive integral action for low cost PWM inverters," IEEE Trans. on Power Electronics, vol. 18, no. 1, pt. 2, pp. 401-410, Jan. 2003.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Sedighy, S. B. Dewan, and F. P. Dawson, "A robust digital current control method for active power filters," IEEE Trans. on Industry Applications, vol. 36, no. 4, pp. 1158-1164, Jul./Aug. 2000.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	L. Malesani, P. Mattaveli, and S. Buso, "Robust dead-beat current control for PWM rectifiers and active filters," IEEE Trans. on Industry Applications, vol. 35, no. 3, pp. 613-620, May/Jun. 1999.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	The MathWorks, Inc. Using Simulink. Version 6, 2004.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. H. Rashid, Power Electronics: Circuits, Devices and Applications, 3rd ed., Upper Saddle River, NJ: Pearson Education, 2003.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Detection of Coherent Radar Signals with Unknown Doppler Shift in Non-Gaussian Clutter</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M. R.</given_name><surname>Taban</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>mohammadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Modarres Hashemi</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2007</year></publication_date><pages><first_page>233</first_page><last_page>240</last_page></pages><doi_data><doi>10.66224/ijece.27887.5.4.233</doi><resource>http://ijece.org/fa/Article/27887</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27887</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27887</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27887</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27887</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27887</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27887</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27887</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. I. Marcum, "A statistical theory of target detection by pulsed radar," IEEE Trans. on Inform. Theory, vol. 6, no. 2, pp. 65-104, Apr. 1960.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	P. Swerling, "Detection of fluctuating pulsed signals in the presence of noise," IEEE Trans. on Inform. Theory, vol. 3, no. 3, pp. 175-178, Sep. 1957.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	P. Swerling, "Probability of detection for fluctuating target," IEEE Trans. on Inform. Theory, vol. 6, no. 2, pp. 269-308, Apr. 1960.
[4]	M. I. Skolnik, Introduction to Rradar Systems, McGraw-Hill, New York, 2002.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[5]	J. V. D. Franco and W. L. Rubin, Radar Detection, Artech House, 1980.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[6]	I. Selin, "Detection of coherent radar returns of unknown Doppler shift," IEEE Trans. on Inform. Theory, vol. 11, no. 3, pp. 396-400, Jul. 1965.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[7]	L. E. Brennan, I. S. Reed, and W. Sollfrey, "A comparison of Average - Likelihood and Maximum - Likelihood Ratio tests for detecting radar targets of unknown Doppler frequency," IEEE Trans. on Inform. Theory, vol. 14, no. 1, pp. 104-110, Jan. 1968.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[8]	M. M. Nayebi, M. M. Aref and, M. H. Bastani, "Detection of coherent radar signal with unknown Doppler shift," in IEE Proc. Radar, Sonar, and Navigation, vol. 143, no. 2, pp. 79-86, Apr. 1996.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[9]	D. C. Schleher, Radar Detection and Radar Data Processing, Artech House, 1980.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10]	K. D. Ward, "Compound representation of high resolution sea clutter," Elect. Lett. vol. 17, no. 16, pp. 561-563, Aug. 1981.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	X. Y. Hou and N. Morinaga, "Detection performance in 
K - distributed and correlated Rayleigh clutter," IEEE Trans. AES, vol. 25, no. 5, pp. 639-641, Sep. 1989.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	S. Watts, C. J. Baker, and K. D. Ward, "Maritime surveillance radar part 1: radar scattering from the ocean surface," in IEE Proc. Pt. F, vol. 137, no. 2, pp. 51-62, Apr. 1990.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	S. Watts, C. J. Baker, and K. D. Ward, "Maritime surveillance radar part 2: detection performance prediction in sea clutter," in IEE Proc. Pt. F, vol. 137, no. 2, pp. 63-72, Apr. 1990.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	H. F. Helmken, "Low - grazing angle radar backscatter from the ocean surface," in IEE Proc. Pt. F, vol. 137, no. 2, pp. 113-117, Apr. 1990.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	E. Conte and G. Ricci, "Performance prediction in compound-Gaussian clutter," Trans. on Aerospace and Electronic Systems, vol. 30, no. 2, pp. 611-616, Apr. 1994.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	S. M. Kay, Fundamentals of Statistical Signal Processing Volume II Detection Theory, Prentice - Hall, 1998.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	H. V. Poor, An Introduction to Signal Detection and Estimation, 2nd edition, Dow den &amp; Cluver, 1994.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	M. Barkat, Signal Detection and Estimation, 2nd edition, Artech House, 2005.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	A. D. Whalen and R. N. Mc Donouth, Detection of Signals in Noise, 2nd edition, Academic Press, New York, 1995.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	M. R. Taban, M. R. Aref, H. Alavi, and M. M. Nayebi, "A new approach for coherent radar detection in K - distributed interference," Scientia Iranica, vol. 5, no. 1&amp;2, pp. 16-23, Apr. 1998.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	K. Yao, "A representation theorem and its applications to spherically invariant random processes," IEEE Trans. on Inform. Theory, vol. 19, no. 5, pp. 600-608, Sep. 1973.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	K. J. Sangston and K. R. Gerlach, "Coherent detection of radar targets in a non-Gaussian background," IEEE Trans. on Aerospace and Electronic Systems, vol. 30, no. 2, pp. 330-340, Apr. 1994.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	M. R. Taban, M. R. Aref, H. Alavi, and M. M. Nayebi, "Coherent radar detection of rapid fluctuating targets in pseudo-Gaussian clutter," in Proc. ICT. Int. Conf. on Telecommunication, vol. 1, pp. 460-464, Porto Carras, Greece, Jun. 1998.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	F. Gini, "Sub - optimum coherent radar detection in a mixture of 
K - distributed and Gaussian clutter," in IEE Proc. Radar, Sonar and Navigation, vol. 144, no. 1, pp. 39-48, Feb. 1997.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	ع. محمدي، آشكارسازي سيگنال راداري با شيفت داپلر نامعلوم در تداخل شبه‌گوسي، پايان‌نامه كارشناسي ارشد مهندسي برق- مخابرات، دانشكده برق، دانشگاه يزد، 1384.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Nonoblivious Watermarking Scheme for Embedding Spread Spectrum-like Watermarks in the Wavelet Domain Using HVS Characteristics</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A. R.</given_name><surname>zolghadr asli</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S.</given_name><surname>Rezazadeh</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2007</year></publication_date><pages><first_page>241</first_page><last_page>248</last_page></pages><doi_data><doi>10.66224/ijece.27888.5.4.241</doi><resource>http://ijece.org/fa/Article/27888</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27888</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27888</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27888</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27888</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27888</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27888</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27888</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, "Watermarking digital image and video data: a state - of - the - art overview," IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, Sep. 2000.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	I. J. Cox, J. Killian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. on Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec. 1997.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	X. G. Xia, C. G. Boncelet, and G. R. Arce, "Wavelet transform based watermark for digital images," Optics Express, vol. 3, no. 12, pp. 497-511, Dec. 1998.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	W. Zhu, Z. Xiong, and Y. Zhang, "Multiresolution watermarking for images and video," IEEE Trans. on Circuits and Systems for Video Technology, vol. 9, no. 4, pp. 545-550, Jun. 1999.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Nikolaidis and I. Pitas, "Asymptotically optimal detection for additive watermarking in the DCT and DWT domains," IEEE Trans. on Image Processing, vol. 12, no. 5, pp. 563-571, May 2003.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. H. Choi and T. S. Choi, "Robust logo embedding technique for copyright protection," in Proc. IEEE Int. Conf. on Consumer Electronics, pp. 341-342, Jan. 2005.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. Kundur and D. Hatzinakos, "Toward robust logo watermarking using multiresolution image fusion principles," IEEE Trans. on Multimedia, vol. 6, no. 1, pp. 185-198, Feb. 2004.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	P. H. W. Wong, O. C. Au, and Y. M. Yeung, "A novel blind multiple watermarking technique for images," IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 813-830, Aug. 2003.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized - LSB data embedding," IEEE Trans. on Image Processing, vol. 14, no. 2, pp. 253-266, Feb. 2005.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. P. Maity and M. K. Kundu, "An image watermarking scheme using HVS characteristics and spread transform," in IEEE International Conf. on Pattern Recognition, vol. 4, pp. 869-871, Aug. 2004.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Y. S. Kim, O. Kwon, and R. H. Park, "Wavelet based watermarking method for digital images using the human visual system," Electronics Letters, vol. 35, no. 6, pp. 466-468, Mar. 1999.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. S. Lewis and G. Knowles, "Image compression using the 2-D wavelet transform," IEEE Trans. on Image Processing, vol. 1, no. 2, pp. 244-250, Apr. 1992.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Barni, F. Bartolini, and A. Piva, "Improved wavelet - based watermarking through pixel - wise masking," IEEE Trans. on Image Processing, vol. 10, no. 5, pp. 783-791, May 2001.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	D. F. Walnut, An Introduction to Wavelet Analysis, Birkhauser Inc, Boston, 2002.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Jansen and P. J. Oonincx, Second Generation Wavelets and Their Applications, Springer Verlag, New York, 2005.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking, Morgan Kaufmann Inc., San Francisco, 2002.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New Method for Short Block Length LDPC Code Design</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Taki</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. B.</given_name><surname>Nezafati</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2007</year></publication_date><pages><first_page>249</first_page><last_page>254</last_page></pages><doi_data><doi>10.66224/ijece.27889.5.4.249</doi><resource>http://ijece.org/fa/Article/27889</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27889</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27889</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27889</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27889</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27889</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27889</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27889</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	R. G. Gallager, Low Density Parity Check Codes, No. 21 in Research Monograph series, MIT Press, Cambridge, Mass., ???. 1963.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. J. C. MacKay and R. M. Neal, "Near Shannon limit performance low density parity check codes," Electronics Letters, vol. 32, no. 18, p. 1645, Aug. 1996.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke, "Design of capacity - approaching irregular Low Density Parity Check Codes," IEEE Trans. on Information Theory, vol. 47, no. 2, pp. 619-637, Feb. 2001.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Y. Xue and H. Xiang, "Performance analysis of finite - length LDPC codes," in Proc. 4th IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, pp. 85-89, Jun. 2003.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	C. Di, D. Proietti, I. E. Telatar, T. J. Richardson, and R. L. Urbanke, "Finite-length analysis of lowdensity parity-check codes on the binary erasure channel," IEEE Truns. on Information Theory, vol. 48, no. 6, pp. 1570-1579, Jun. 2002.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Campello and D. S. Modha, "Extended bit - filling and LDPC code design," in IEEE Global Telecommunications Conf., vol. 2, pp. 985-989, Nov. 2001.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	L. Ping, W. K. Leung, and N. Phamdo, "Low - density parity - check codes with semi-random parity-check matrix," Elecrronic Letters, vol. 35, no. 1, pp. 38-39, Jan. 1999.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	H. Xiao - Yu, E. Eleftheriou, and D. M. Arnold, "Progressive edge - growth tanner graphs," in Proc. IEEE Global Telecommunications Conf., vol. 2, pp. 995-1001, Nov. 2001.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	C. Sae - Young, T. J. Richardson, and R. L. Urbanke, "Analysis of sum - product decoding of low - density parity - check codes using a Gaussian approximation," IEEE Trans. on Information Theory, vol. 47, no. 2, pp. 657-670, Feb. 2001.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Rashidpour, A. Shokrollahi, and S. H. Jamali, "Optimal regular LDPC codes for the binary erasure channel," IEEE Communications Letters, vol. 9, no. 6, pp. 546-548, Jun. 2005.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Fuzzy Evaluation of Long-Term Impacts of Electrical Appliances Efficiency Improvement on Load Pattern</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Behrangrad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Parsa-Moghaddam</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>21</day><year>2007</year></publication_date><pages><first_page>255</first_page><last_page>260</last_page></pages><doi_data><doi>10.66224/ijece.27890.5.4.255</doi><resource>http://ijece.org/fa/Article/27890</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/27890</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/27890</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/27890</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/27890</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/27890</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/27890</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/27890</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	B. F. Hobbs, H. B. Rouse, and D. T. Hoog, "Measuring the economic value of demand - side and supply resources in integrated resource planning models," IEEE Trans. on Power System, vol. 8, no. 3, pp. 979-987, Aug. 1993.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	H. Davoudpour and M. S. Ahadib, "The potential for greenhouse gases mitigation in household sector of Iran: cases of price reform/efficiency improvement and scenario for 2000 - 2010," Energy Policy, vol. 34, no. 1, pp. 40-49, May 2006.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. M. Shrestha and C. O. P. Marpaung, "Supply and demand - side effects of power sector planning with demand - side management options and SO2 emission constraints," Energy Policy, vol. 33, no. 6, pp. 815-825, Apr. 2005.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	G. Wikler, A. Faruqui, C. W. Gehgs, and K. Seiden, "The potential for energy efficiency in electric end - use technologies," IEEE Trans. on Power Systems, vol. 8, no. 3, pp. 1351-1357, Aug. 1993.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Fotuhi-Firuzabad and R. bellinton, "Impact of load management on composite system reliability evaluation short-term operating benefits," IEEE Trans. on Power Systems, vol. 15, no. 2, pp. 858-864, May 2000.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	E. Vine, J. Sathaye, and E. Orlando, Guidelines for the Monitoring, Evaluation, Reporting, Verification, and Certification of Energy - Efficiency Projects for Climate Change Mitigation, Ernest Orlando Lawrence Berkeley National Laboratory, 1999.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Flory and J. S. Peter, "Evaluating DSM: can an engineer count on it?" IEEE Trans. on Power Systems, vol. 9, no. 4, pp. 1752-1758, Nov. 1994.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	م. پارسا مقدم، م. بهرنگ راد و م. اقبال، "طراحي شاخص‌هاي راهنما براي انتخاب بهينه لوازم برقي خانگي،" چهاردهمين كنفرانس مهندسي برق ايران، بهار 1385.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	مجله پيك برق، سال يازدهم، شماره 544، 1385.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	م. بهرنگ راد و م. پارسا مقدم، "تدوين شاخص‌هاي اقتصادي و بهره‌وري جهت ارزيابي عملكرد وسايل برقي خانگي با رويكرد مديريت مصرف انرژي الكتريكي و تهيه بانك اطلاعاتي،" گزارش پروژه، مركز مطالعات و برنامه‌ريزي شبكه‌هاي قدرت ايران، دانشگاه تربيت مدرس، 1385.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>