﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022920</doi_batch_id><timestamp>14050229202752</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>9</month><day>21</day><year>2011</year></publication_date><journal_volume><volume>9</volume></journal_volume><issue>3</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Learning Stable Analysis Patterns for Intelligent Software Agents</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Vafadar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ahmad</given_name><surname>Abdollahzadeh Barforoush</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2011</year></publication_date><pages><first_page>119</first_page><last_page>132</last_page></pages><doi_data><doi>10.66224/ijece.28010.9.3.119</doi><resource>http://ijece.org/fa/Article/28010</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28010</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28010</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28010</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28010</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28010</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28010</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28010</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Wooldridge, An Introduction to Multiagent Systems, Wiley, 2nd Edition, pp. 21-28, 2009.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	F. Zambonelli and A. Omicini, "Challenges and research directions in agent - oriented software engineering, in autonomous agents and multi-agent systems," Autonomous Agents and Multi-Agent Systems Journal, vol. 9, no. 3, pp. 253-283, Nov. 2004.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	ش. وفادار و ا. عبداله‌زاده بارفروش، "مهندسی هوش در سیستم‌های محاسباتی: بررسی کمی ویژگی‌های هوشمندی،" مجموعه مقالات شانزدهمین کنفرانس ملی انجمن کامپیوتر ایران، جلد 1، صص. 95 - 90، تهران، اسفند 1389.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	ش. وفادار و ا. عبداله‌زاده بارفروش، "ارائه الگوی تحلیل نرم‌افزار برای قابلیت یادگیری در عامل‌های هوشمند،" مجموعه مقالات پانزدهمین کنفرانس ملی انجمن کامپیوتر ایران، تهران، اسفند 1388.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Vafadar and A. Abdollahzadeh Barfroush, "Towards analysis patterns for learning agents, agent oriented software engineering (AOSE)", In: D. Weyns and M. Gleizes, (Eds), Agent-Oriented Software Engineering XI. LNCS 6788, pp. 79-90, 2011.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Vafadar and A. Abdollahzadeh Barfroush, "Analysis patterns for learning agents," in Proc.15th European Conf. on Pattern Languages of Programs, EuroPLoP 2010, Germany, 2010.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Abbott, "Program design by informal English descriptions," Commu. of the ACM, vol. 26, no. 11, pp. 892-894, Nov. 1983.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	T. M. Mitchel, Machine Learning, McGraw - Hill, 1997.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	G. Wiess, Multiagent Systems: a Modern Approach to Distributed Artificial Intelligence, MIT Press, 1996.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Russell and P. Norvig, Artificial Intelligence: a Modern Approach, 3rd Edition, Prentice Hall, 2010.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. A. R. P. Sardinha, A. F. Garcia, R. L. Milidiú, and C. J. P. Lucena, "The agent learning pattern," in Proc. 4th Latin American Conf. on Pattern Languages of Programming, SugarLoafPLoP'04, Fortaleza, Brazil, 2004.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. F. Garcia, U. Kulesza, J. A. R. P. Sardinha, R. L. Milidiú, and C. J. P. Lucena, "The learning aspect pattern," in Proc. 11th Conf. on Pattern Languages of Programs, PLoP2004, Allterton Park, Monticello, Illinios, US, 8-12 Sep. 2004.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. E. Fayad, "How to deal with software stability," Communications of the ACM, vol. 45, no. 4, pp. 109-112, Apr. 2002.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. E. Fayad and A. Altman, "Introduction to software stability," Communications of the ACM, vol. 44, no. 9, pp. 95-98, Sep. 2001.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	H. Hamza, A Foundation for Building Stable Analysis Patterns, Master Thesis, University of Nebraska - Lincoln, 2002.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	E. Gamma, R. Helm, J. Johnson, and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley, 1995.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Withall, Introduction to Software Requirements Patterns, Microsoft Press, 1st Edition, 2007.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Fowler, Analysis Patterns: Reusable Object Models, Addison - Wesley, Reading, MA, 1997.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	P. Coad, D. North, and M. Mayfield, Object Models: Strategies, Patterns, and Applications, Prentice Hall, Upper SaddleRiver, NJ, 1995.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal, Pattern - Oriented Software Architecture Volume 1: A System of Patterns, Willy Press, 2000.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	H. S. Hamza and M. E. Fayad, "The negotiation analysis pattern," in Proc. Pattern Languages of Programming, PLoP2004, 2004.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Y. Shoham, R. Powers, and T. Grenager, Multi - Agent Reinforcement Learning: a Critical Survey, Technical Report, Stanford University, 2003.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	H. V. D. Herik, D. Hennes, M. Kaisers, K. Tuyls, and K. Verbeeck, "Multi-agent learning dynamics: a survey," in Cooperative Information Agents XI, Lecture Notes in Computer Science, vol. 11, pp. 36-56, Springer Berlin/Heidelber, 2007.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	D. Weyns, A. Omicini, and J. Odell, "Environment as a first class abstraction in multi - agent systems," J. of Autonomous Agents and Multi Agent Systems, vol. 14, no. 1, pp. 5-30, Feb. 2007.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	E. Yang and D. Gu, Multiagent Reinforcement Learning for Multi -Robo Systems: A Survey, CSM - 404, Technical Reports of the Department of Computer Science, University of Essex, 2004.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	J. Odell, H. V. D. Parunak, and M. Fleischer, "Modeling agents and their environment: the communication environment," J. of Object Technology, vol. 2, no. 3, pp. 39 -52, May 2003.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	D. Weyns, M. Schumacher, A. Ricci, M. Viroli, and T. Holvoet, "Environments in multiagent systems," Knowl. Eng. Rev., vol. 20, no. 2, pp. 127-141, Jan. 2005.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	S. Purao, V. C. Storey, and T. Han, "Improving analysis pattern reuse in conceptual design: augmenting automated processes with supervised learning," Information System Research, vol. 14, no. 3, pp. 269-290, Sep. 2003.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Color reduction for Machine-Printed Carpet Pattern by Reinforcement Learning</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Fateh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>E.</given_name><surname>Kabir</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Nili Ahmadabadi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2011</year></publication_date><pages><first_page>133</first_page><last_page>142</last_page></pages><doi_data><doi>10.66224/ijece.28011.9.3.133</doi><resource>http://ijece.org/fa/Article/28011</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28011</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28011</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28011</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28011</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28011</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28011</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28011</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Atsalakis and N. Papamarkos, "Color reduction and estimation of the number of dominant colors by using a self - growing and self - organized neural gas," Engineering Applications of Artificial Intelligence, vol. 19, no. 7, pp. 769-786, May 2006.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	N. Papamarkos, A. E. Atsalakis, and C. P. Strouthopoulos, "Adaptive color reduction," IEEE Trans. on Systems, vol. 33, no. 1, pp. 44-56, Feb. 2002.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. H. Dekker, "Kohonen neural networks for optimal color quantization," Network: Computat. Neural Syst., vol. 5, no. 3 pp. 351-367, 1994.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Z. Xiang, Handbook of Approximation Algorithms and Metaheuristics, Chapman &amp; Hall/CRC, Ch. Color Quantization, pp. 86/1–86/17, 2007.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Mojsilovic and E. Soljanin, "Color quantization and processing by fibonacci lattices," IEEE Trans. on Image Processing, vol. 10, no. 11, pp. 1712-1725, Nov. 2001.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. E. Celebi, "Improving the performance of K - means for color quantization," Image and Vision Computing, vol. 29, no. 4, pp. 260-271, Jan 2011.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. P. Braquelaire and L. Brun, "Comparison and optimization of methods of color image quantization," IEEE Trans. on Image Processing, vol. 6, no. 7, pp. 1048-1052, Jul. 1997.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	P. Scheunders, "A comparison of clustering algorithms applied to color image quantization," Pattern Recogn. Lett., vol. 18, no. 11-13, pp. 1379-1384, Jul. 1997.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	D. M. Tsai, "A fast thresholding selection procedure for multimodal and unimodal histograms," Pattern Recognit. Lett., vol. 16, no. 6, pp. 653-666, Jun. 1995.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. T. Ghanbarian, E. Kabir, and N. M. Charkari, "Color reduction based on ant colony," Pattern Recognition Letters, vol. 28, pp. 1383-1390, Sep. 2007.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Z. Bing, S. Junyi, and P. Qinke, "An adjustable algorithm for color quantization," Pattern Recognition Letters, vol. 25, no. 16, pp. 1787-1797, Dec. 2004.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	ا. ايزدی‌پور و ا. کبير، "ارائه روشی برای خواندن خودکار نقشه چاپی فرش و مقایسه آن با روش خوشه‌یابی میانگین - C،" نشریه مهندسی برق و مهندسی کامپیوتر ایران، جلد 8، شماره 1، صص. 56-48، بهار 1389.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	شرکت سهامی فرش ايران، (www.irancarpet.ir).</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	ا. ايزدی‌پور و ا. کبير، "شناسايی خودکار خطوط نقشه فرش،" اولين کنگره مشترک سيستم‌های فازی و هوشمند، مشهد، شهريور 1386.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	شرکت بوريا (www.booria.com/carpetdesigner.htm).</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	مرکز کنترل کامپيوتر ايران، نرم‌افزار نقش‌ساز (www.centraltouch.com).</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. S. Sutton and A. C. Barto, "Reinforcement learning an introduction," Jan. 2005.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Y. Zheng, H. Li, and D. Doermann, "A model - based line detection algorithm in documents," in Proc. of the 7th Int. Conf. on Document Analysis and Recognition, ICDAR,vol. 1, pp. 44-48, Aug. 2003.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. Sun, F. Zhou, and J. Zhou, "A new fast line detection algorithm," Proc. Fist Int. Symp. Systems and Control in Aerospace and Astronautics, pp. 831-833, Jan. 2006.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	http://www.colorpilot.com/layer.html</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improvement of GMM Model Using PSK for Spoken Language Recognition Systems</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>F.</given_name><surname>Ghasemian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. M.</given_name><surname>Homayounpour</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2011</year></publication_date><pages><first_page>143</first_page><last_page>150</last_page></pages><doi_data><doi>10.66224/ijece.28012.9.3.143</doi><resource>http://ijece.org/fa/Article/28012</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28012</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28012</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28012</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28012</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28012</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28012</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28012</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Ziaei, S. M. Ahadi, S. M. Mirrezaie, and H. Yeganeh, "Spoken language identification using a new sequence kernel - based SVM back - end classifier," in Proc. IEEE Int. Symp. on Signal Processing and Information Technology, pp. 324-329, Dec. 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. A. Zissman, "Comparision of four approaches to automatic language identification of telephone speech," IEEE Trans. on Speech and Audio Processing, vol. 4, no. 1, pp. 31-44, Jan. 1996</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Li, B. Ma, and C. H. Lee, "A vector space modeling approach to spoken language identification," IEEE Trans. on Audio, Speech and Language Processing, vol. 15, no. 1, pp. 271-284, Jan. 2007.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	R. Tong, B. Ma, H. Li, and E. S. Chng, "A target oriented phonotactic front - end for spoken language recognition," IEEE Trans. on Audio, Speech and Language Processing, vol. 17, no. 7, pp. 1335-1347, Sep. 2009.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. A. Torres-Carrasquillo, E. Singer, M. A. Kohler, R. J. Greene, D. A. Reynolds, and J. A. Deller, "Approaches to language identification using gaussian mixture models and shifted delta cepstral features," in Proc. ICSLP, pp. 89-92, 2002.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	K. -A. Lee, C. You, H. Li, T. Kinnunen, and D. Zhu, "Characterizing speech utterances for speaker verification with sequence kernel SVM," in Proc. InterSpeech 2008, pp. 1397-1400, 2008.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	W. Campbell, J. Campbell, D. Reynolds, E. Singer, and P. Torres - Carrasquillo, "Support vector machines for speaker and language recognition," Comput. Speech Lang., vol. 20, no. 2-3, pp. 210-229, Jul.. 2006.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	W. Campbell, D. Sturim, and D. Reynolds, "Support vector machines using GMM supervectors for speaker verification," IEEE Signal Process. Lett., vol. 13, no. 5, pp. 308-311, May 2006.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Z. Karam and W. Campbell, "A new kernel for SVM MLLR based speaker recognition," in Proc. InterSpeech 2007, pp. 290-293, Antwerp, Belgium, Aug. 2007.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	N. Dehak, P. A. Torres, D. Reynolds, and R. Dehak, "Language recognition via i-vectors and dimensionality reduction," in Proc. InterSpeech 2011, pp. 857-860, 2011.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	D. Matrouf, F. Verdet, M. Rouvier, J. F. Bonastre, and G. Linarès, "Modeling nuisance variabilities with factor analysis for GMM - based audio pattern classification," Computer Speech and Language, vol. 25, no. 3, pp. 481-498, Jul. 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Farinas and F. Pellegrino, "Automatic rhythm modeling for language identification," in Proc. Eurospeech, vol. 4, pp. 2539-2542, 2001.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	R. Tong, M. Bin, D. Zhu, H. Li, and E. S. Chng, "Integrating acoustic, prosodic and phonotactic features for spoken language identification," in Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP, vol. 1, pp. 205-208, 14-19 May 2006.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	W. M. Campbell, E. Singer, P. A. Torres - Carrasquillo, and D. A. Reynolds, "Language recognition with support vector machines," in Proc. Odyssey: the Speaker and Language Recognition Workshop, pp. 41-44, 2004.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	F. Ghasemian and M. M. Homayounpour, "Towards better GMM-based acoustic modeling for spoken language identification," in Proc. ICEE, 4 pp., 2011.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	R. Tong, B. Ma, H. Li, and E. S. Chng, "Target-oriented phone tokenizers for spoken language recognition," in Proc. InterSpeech 2009, pp. 200-203, Apr. 2009.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	W. M. Campbell, "A covariance kernel for SVM language recognition," Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP, pp. 4141-4144, Apr. 2008.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Y. K. Muthusamy, R. A. Cole, and B. T. Oshika, "The OGI multi - language telephone speech corpus," in Proc. ICSLP 92, pp. 895-898, 1992.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>TiR-UWB Communication System Analysis and Compensation in an Imperfect CSI Scenario</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Khaleghi Bizaki</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S.</given_name><surname>Alizadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Okhovvat</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2011</year></publication_date><pages><first_page>151</first_page><last_page>161</last_page></pages><doi_data><doi>10.66224/ijece.28013.9.3.151</doi><resource>http://ijece.org/fa/Article/28013</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28013</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28013</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28013</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28013</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28013</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28013</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28013</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	D. Abbasi - Moghadam and V. T. Vakili, "Channel characterization of time reversal UWB communication systems," Annals of Telecommunications (Springer), vol. 65, no. 9-10, pp. 601-614, Jul. 2010.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. C. Qiu, "A theory of time - reversed impulse multiple - input multiple - output (MIMO) for ultra - wideband (UWB) communications," in IEEE International Conf. on UWB, vol. 1, pp. 587-592, Waltham, MA, US, Sep. 2006.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. E. Akogun, Theory and Application Time Reversal Technique to Ultra - Wideband Wireless Communication, M.Sc. Thesis, Tennessee Technological University (TTU), Tennessee, US, Aug. 2005.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	R. C. Qiu, C. Zhou, N. Guo, and J. Q. Zhang, "Time reversal with MISO for ultra - wideband communications: experimental results," in Proc. IEEE Radio and Wireless Symposium, pp. 499-502, 17-19 Jan. 2006.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	N. Guo, B. M. Sadler, and R. C. Qiu, "Reduced - complexity UWB time - reversal techniques and experimental results," IEEE Trans. on Wireless Commun., vol. 6, no. 12, pp. 4221-4226, Dec. 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	N. Guo, J. Q. Zhang, R. C. Qiu, and S. S. Mo, "UWB MISO time reversal with energy detector receiver over ISI channels," in IEEE Consumer Commun. and Networking Conf., vol. 1, pp. 629-633, Las Vegas, Nevada, US, Jan. 2007.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	C. Zhou, N. Guo, B. Sadler, and R. C. Qiu, "Performance study on time reversed impulse MIMO for UWB communications based on measured spatial UWB channels," in Proc. IEEE Milcom'07, 6 pp., Oct. 2007.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	N. Guo, R. C. Qiu, and B. M. Sadler, "An ultra - wideband autocorrelation demodulation scheme with low - complexity time reversal enhancement," in IEEE Milcom'05, Atlantic City, NJ, vol. 5, pp. 3066-3072, Oct. 2005.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	K. Popovski, B. J. Wysocki, and T. A. Wysock, "Modelling and comparative performance analysis of a time - reversed UWB system," EURASIP J. on Wireless Communications and Networking, vol. 7, no. 1, pp. 1-11, Apr. 2007.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	T. Strohmer, M. Emami, J. Hansen, G. Papanicolaou, and A. J. Paulraj, "Application of time reversal with MMSE equalizer to UWB communications," in Proc. IEEE Global Telecommunications Conf., Dallas, Texas, vol. 5, pp. 3123-3127, Nov./Dec. 2004.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	C. Zhou, N. Guo, and R. C. Qiu, "Time - reversed ultra wideband (UWB) multiple input - multiple output (MIMO) based on measured spatial channels," IEEE Trans. on Vehicular Technology, vol. 58, no. 6, pp. 2884-2898, Jul. 2009.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	H. Nguyen, F. Zheng, and T. Kaiser, "Antenna selection for time reversal MIMO UWB systems," in Proc. IEEE 69th Vehicular Technology Conf., Barcelona, Spain, 5 pp., Apr. 2009.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	D. Abbasi-Moghadam and V. T. Vakili, "A single input-multiple output time reversal UWB communication system," Wireless Personal Communications, 17 pp., Jun. 2011, DOI: 10.1007/s11277-011-0346-z.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	I. H. Naqvi, P. Besnier, and G. El Zein, "Robustness of a time - reversal ultra - wideband system in non - stationary channel environment," IET Microwaves, Antennas and Propagation, vol. 5, no. 4, pp. 468-475, Mar. 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	T. Kaiser and F. Zheng, Ultra Wideband Systems with MIMO, John Wiley &amp; Sons Ltd., UK, 2010.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	X. Liu, B. Z. Wang, S. Xiao, and S. Lai, "Post - time - reversal MIMO ultrawideband transmission scheme," IEEE Trans. on Antennas and Propagation, vol. 58, no. 5, pp. 1731-1738, May 2010.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. H. Reed, An Introduction to Ultra Wideband Communication Systems, Prentice Hall PTR, Apr. 2005.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	H. Sheng, R. You, and A. M. Haimovich, "Performance analysis of ultra - wideband rake receivers with channel delay estimation errors," in Proc. Conf. Information Sciences and Systems, CISS'04, vol. 1, pp. 921-926, Mar. 2004.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	H. K. Bizaki and A. Falahati, "Tomlinson - harashima precoding with imperfect channel state information," IET. Communication J., vol. 2, no. 1, pp. 151-158, Jan. 2008.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	T. O. Lewis and P. L. Odell, Estimation in Linear Models, Upper Saddle River, NJ: Prentice Hall, 1971.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. R. Foerster, Channel Modeling Sub-Committee Report Final, Tech. Rep., Wireless Personal Area Network (WPAN), P802.15-02/490r1-SG3a, 2003.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	A. F. Molisch, "Ultra - wideband propagation channels - theory, measurement, and modeling," IEEE Trans Veh. Technol., vol. 54, 
no. 5, pp. 1525-1545, Sep. 2005.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	T. Rappaport, Wireless Communications: Principles and Practice, 2nd Edition, Pearson, New York, 2002.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Design and Simulation of Fuzzy-ANFIS Controller for Continuous Control of Transmitted Power by TCSC</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Kargar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Hosseinzadeh</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2011</year></publication_date><pages><first_page>162</first_page><last_page>168</last_page></pages><doi_data><doi>10.66224/ijece.28014.9.3.162</doi><resource>http://ijece.org/fa/Article/28014</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28014</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28014</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28014</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28014</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28014</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28014</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28014</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K. R. Padiyar, FACTS Controllers in Power Transmission and Distribution, Tunbridge Wells: Anshan, 2009.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	N. G. Hingorani and L. Gyugyi, Understanding FACTS: Concepts and Technology of Flexible AC Transmission Systems, New York: Institute of Electrical and Electronics Engineers, 1999.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. G. Jalali, R. A. Hedin, M. Pereira, and K. Sadek, "A stability model for the advanced series compensator (ASC)," IEEE Trans. Power Delivery, vol. 11, no. 2, pp. 1128-1137, Apr. 1996.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	C. R. Fuerte - Esquivel, E. Acha, and H. Ambriz - Perez, "A thyristor controlled series compensator model for the power flow solution of practical power networks," IEEE Trans. Power Systems, vol. 15, no. 1, pp. 58-64, Feb. 2000.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. G. Jalali, R. H. Lasseter, and I. Dobson, "Dynamic response of a thyristor controlled switched capacitor," IEEE Trans. Power Delivery, vol. 9, no. 3, pp. 1609-1615, Jul. 1994.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Ghosh and G. Ledwich, "Modelling and control of thyristor - controlled series compensators," in IEE Proc. Generation, Transmission, and Distribution, vol. 142, no. 3, pp. 297-304, May 1995.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	P. Mattavelli, G. C. Verghese, and A. M. Stankovic, "Phasor dynamics of thyristor controlled series capacitor systems," IEEE Trans. Power System, vol. 12, no. 2, pp. 1259-1267, Aug. 1997.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. Jovcic and G. N. Pillai, "Analytical modeling of TCSC dynamics," IEEE Trans. Power Delivery, vol. 20, no. 2, pp. 1097-1104, Apr. 2005.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. M. Stankovic, P. Mattavelli, and R. Ortega, "On the nonlinear control of TCSC," in Proc. of the 35th Annual Hawaii International Conf. on System Sciences, pp. 841-846, Jan. 2002.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	X. Nong and L. Dichen, "Nonlinear stabilized controller design for TCSC," in IEEE Conf. Electric Utility Deregulation and Restructuring and Power Technologies, pp. 2069-2099, Apr. 2008.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	G. Escobar, A. M. Stankovic, P. Mattavelli, and R. Ortega, "A comparative study of three nonlinear controllers for TCSC," in Power Tech Proc., vol. 2, Porto, Sep. 2001.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	R. Ghazi, A. Azemi, and K. Pour Badakhshan, "Adaptive fuzzy sliding mode control of SVC and TCSC for improving the dynamic performance of power systems," in Proc. 7th Int. Conf. on AC - DC Power Transmission, IET Conf., pp. 333-337, Nov. 2001.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	T. Sansawatt and I. Ngamroo, "Sliding mode control design of TCSC for robust power system stabilization using dynamic compensation observer technique," in Proc. 41st Int. Conf. UPEC '06, 
vol. 2, pp. 447-451, Sep 2006.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	U. Yolac and T. Yalcinoz, "Comparison of fuzzy logic and PID controllers for TCSC using Matlab," in Proc. 39th Int. Conf. UPEC '04, vol. 1, pp. 438-442, Sep. 2004.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	X. Tan, N. Zhang, L. Tong, and Z. Wang, "Fuzzy control of thyristor - controlled series compensator in power system transients," Fuzzy Sets and Systems, vol. 110, no. 3, pp. 429-436, May 2000.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Hameed, "Power system stability enhancement using reduced rule base self - tuning fuzzy PI controller for TCSC," in Proc. IEEE PES Transmission and Distribution Conf. and Exposition, 8 pp., Apr. 2010.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. Oudalov, R. Cherkaoui, and A. J. Germond, "Application of fuzzy logic techniques for the coordinated power flow control by multiple series FACTS devices," in Proc. Power Industry Computer Applications, PICA 2001, pp. 74-80, May 2001.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. A. Nabavi Niaki, R. Iravani, and M. Noroozian, "Power - flow model and steady - state analysis of the hybrid flow controller," IEEE Trans. Power Delivery, vol. 23, no. 4, pp. 2330-2338, Oct. 2008.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. S. R. Jang, "ANFIS: adaptive - network - based fuzzy inference system," IEEE Trans. Systems, Man, and Cybernetics, vol. 23, no. 3, pp. 665-685, May/Jun. 1993.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Stegananalysis Method Based on Co-Occurrence Matrix and Neural Network</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Ghanbari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>N.</given_name><surname>Ghanbari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Keshtgari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. H.</given_name><surname>Nabavi Karizi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2011</year></publication_date><pages><first_page>169</first_page><last_page>174</last_page></pages><doi_data><doi>10.66224/ijece.28015.9.3.169</doi><resource>http://ijece.org/fa/Article/28015</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28015</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28015</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28015</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28015</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28015</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28015</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28015</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. S. Shieh, H. C. Huang, F. H. Wang, and J. S. Pan, "Genetic watermarking based on transform - domain techniques," Pattern Recognition, vol. 37, no. 3, pp. 555-565, Mar. 2004.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Mahdavi, S. Samavi, N. Zaker, and M. Modarres - Hashemi, "Steganalysis method for LSB replacement based on local gradient of image histogram," Iranian J. of Electrical &amp; Electronic Engineering, vol. 4, no. 3, pp. 59-70, Jul. 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Westfeld and A. Pfitzman, "Attacks on steganographic systems," in Proc. of 3rd Int. Information Hiding Workshop, Springer-Verlag, pp. 61-76, Sep. 1999.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Fridrich, M. Goljan, and D. Holga, "Steganalysis of JPEG images: breaking the F5 algorithm," in Lecture Notes in Computer Science, Springer, vol. 2578, pp. 310-323, Oct. 2002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Fridrich, R. Du, and L. Meng, "Steganalysis of LSB encoding in color images," in Proc. of IEEE International Conf. on Multimedia, vol. 3, pp. 1279-1282, Jul. 2000.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Fridrich, M. Goljan, and R. Du, "Reliable detection of LSB steganography in grayscale and color images," in Proc. of ACM, Special Session on Multimedia Security and Watermarking, pp. 27-30, Otawwa, Canada, Oct. 2001.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Dumitrescu, X. Wu, and N. Memon, "On steganalysis of random LSB embedding in continuous-tone images," in Proc. IEEE Int. Conf. on Image Processing, vol. 3, pp. 641-644, 24-28 June 2002.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Yadollahpour and H. Miar Naeimi, "Attack on LSB steganography in color and grayscale images using autocorrelation coefficients," European J. of Scientific Research, vol. 31, no. 2, pp. 172-183, May 2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	T. Zhang, Y. Zhanh, X. Ping, and M. Song, "Detection of LSB steganography based on image smoothness," in Proc. IEEE Int. Conf. Multimedia and Expo, vol. 1, pp. 1377-1380, Jul. 2006.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	N. Provos, "Defending against statistical steganalysis proc," in Proc. 10th Usenix Security Symp, Usenix Assoc., vol. 10, pp. 323-335, Aug. 2001.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Fridrich, M. Goljan, and D. Hogea, "Attacking the outguess," in Proc. ACM Workshop Multimedia and Security 2002, Dec. 2002.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. Fridrich, "Feature - based steganalysis for JPEG images and its implications for future design of steganographic schemes," in Proc. 6th Information Hiding Workshop, LNCS, Springer-Verlag, vol. 3200, pp. 67-81, May 2004.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	J. Fridrich, M. Goljan, and D. Hogea, "New methodology for breaking steganographic techniques for JPEGs," in Proc. SPIE Electronic Imaging, vol. 5020, pp. 143-155, Santa Clara, CA, US, Jan. 2003.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	V. Sabeti, S. Samavi, and M. Mahdavi, "Steganalysis of embedding in difference of image pixel pairsby neural network," ISC Int'l J. of Information Security, vol. 1, no. 1, pp. 17-26, Jan. 2009.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	L. Shaohui, Y. Hongxun, and G. Wen, "Neural network based steganalysis in still images," in Proc. Int. Conf. on Multimedia and Expo, ICME 2003, vol. 2, pp. 509-512, Jul. 2003.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	P. Lafferty and F. Ahmed, "Texture based steganalysis: results for color images," in Proc. SPIE, Mathematics of Data/Image Coding, vol. 5561, pp. 145-151, Aug. 2004.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Z. Sun, M. Hui, and C. Guan, "Steganalysis based on co - occurrence matrix of differential image," in Proc. Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1097-1100, Aug. 2008.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	H. B. Kekre, A. A. Athawale, and S. A. Patki, "Steganalysis of 
LSB embedded images using gray level co - occurrence matrix," Int. J. of Image Processing, IJIP, vol. 5, no. 1, pp. 711-720, 2011.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Standard Database of USC - SIPI (University of Southern California Signal &amp; Image Processing Institute), available at http://sipi.usc.edu/database/index.php</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Standard Database of BSD (BerkeleySegmentationDataset) available at http://www.eecs.berkeley.edu/Research/Projects/CS/vision/
grouping/fg/</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>