﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022920</doi_batch_id><timestamp>14050229202445</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>3</month><day>21</day><year>2013</year></publication_date><journal_volume><volume>10</volume></journal_volume><issue>4</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Bidirectional Transformation of Structural Modeling Elements between the UML Class Diagram and  Object-Z</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Rasoolzadegan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ahmad</given_name><surname>Abdollahzadeh Barforoush</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2013</year></publication_date><pages><first_page>69</first_page><last_page>85</last_page></pages><doi_data><doi>10.66224/ijece.28041.10.4.69</doi><resource>http://ijece.org/fa/Article/28041</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28041</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28041</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28041</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28041</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28041</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28041</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28041</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	D. C. Schmidt, "Model-driven engineering," IEEE Computer, vol. 39, no. 2, pp. 25-31, Feb. 2006.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Q. Charatan and A. Kans, Formal Software Development: from VDM to Java, Palgrave Macmillan, 2004.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	D. Bjorner, Software Engineering III: Domains, Requirements, and Software Design, Springer, 2006.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. R. Williams, Automatic Formalization of UML to Z, MSc. Thesis, Dept. Computer Science, Univ. York, 2009.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Hall, "Seven myths of formal methods," IEEE Software, vol. 7, no. 5, pp. 11-19, Sep. 1990.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Bowen and M. Hinchey, "Seven more myths of formal methods," IEEE Software, vol. 12, no. 4, pp. 34-41, Jul. 1995.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. Bojic and D. Velasevic, "Reverse engineering of use case realizations in UML," in Proc. Symp. on Applied Computing - SAC2000, ACM, vol. 2, pp. 741-747, 2000.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Rasoolzadegan and A. Abdollahzadeh, "A new approach to software development process with formal modeling of behavior based on visualization," in Proc. 6th Int. Conf. on Softw. Eng. Advances, ICSEA, pp. 104-111, Barcelona, Spain, 2011.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Rasoolzadegan and A. Abdollahzadeh, Specifying a Parallel, Distributed, Real-Time, and Embedded System: Multi-Lift System Case Study, Tech. Rep., Information Technology and Computer Eng. Faculty, Amirkabir Univ. Technology, Tehran, Iran, 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Kong, K. Zhang, J. Dong, and D. Xu, "Specifying behavioral semantics of UML diagrams through graph transformations," The J. of Systems and Software, vol. 82, no. 2, pp. 292-306, Apr. 2009.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	R. Duke and G. Rose, Formal Object - Oriented Specification Using Object - Z, MacMillan Press, 2000.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design Pattern: Elements of Reusable Object - Oriented Software, Addison - Wesley Publishing Company, 5th Ed., 1995.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	T. Tilley, Formal Concept Analysis Applications to Requirements Engineering and Design, Ph. D. Dissertation, the Univ. Queensland, Australia, 2004.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	J. Sun, J. S. Dong, J. Liu, and H. Wang, "Object - Z web environment and projections to UML," in Proc. 10th Int. World Wide Web Conf., New York, ACM, pp. 725-734, 2001.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Bowen (2003) frequently asked questions, [Online], Available: http://www.faqs.org/faqs/z-faq.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. Bowen (2003) The World Wide Web virtual library: The Z notation, Available: http://www.zuser.org/z.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. Sun, J. S. Dong, J. Liu, and H. Wang, "A formal object approach to the design of ZML," Annals of Software Engineering: an International J., vol. 13, no. 14, pp. 329-356, 2002.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Extensible Markup Language-XML (2003) World Wide Web Consortium, Available: http://www.w3.org/XML.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. K. Kim and D. Carrington, "Visualization of formal specifications," in Proc. 6th Asia - Pacific Softw. Eng. Conf., pp. 38-45, Dec. 1999.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. K. Kim and D. Carrington, "Formalizing the UML class diagram using Object - Z," in Proc. the Second IEEE Conf. on UML, UML'99, pp. 83-98, 1999.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. K. Kim and D. Carrington, "An integrated framework with UML and Object - Z for developing a precise and understandable specification: the light control case study," in Proc. Seventh Asia - Pacific Software Engineering Conf., pp. 240-248, 2000.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Kim and D. Carrington, "A formal meta - modeling approach to a transformation between the UML state machine and Object-Z," in Proc. ICFEM 2002: Int. Conf. Formal Eng. Methods, pp. 548-560, Shanghai, China, 2002.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	E. Wafula and P. Swatman, "FOOM: a diagrammatic illustration of inter-object communication in Object-Z specifications," in Proc. the Asia-Pacific Software Engineering Conf., APSEC'95, 23 pp., 1995.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. German, "Research goals for formal methods," ACM Computing Surveys, vol. 28, no. 4es, p. 118. 1996.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	E. Borger, "High level system design using abstract state machines," in Proc. Current Trends in Applied Formal Methods (FM - Trends 98), Springer LNCS 1641, pp. 1-43, 1998.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	E. Clarke and J. Wing, "Formal methods: state of the art and future directions," ACM Computing Surveys, vol. 28, no. 4, pp. 626-643, Dec. 1996.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	A. Evans, R. France, K. Lano, and B. Rumpe, "The UML as a formal modeling notation," in Proc. UML'98: Beyond the Notation, vol. 1618 of LNCS, Springer, pp. 336-348, Mulhouse, France, 1998.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	H. Miao, L. Liu, and L. Li, "Formalizing UML models with Object-Z," in Proc. ICFEM2002: Conf. on Formal Eng. Methods, pp. 523-534, 2002.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	D. Jackson, "A comparison of object modeling notations: alloy, UML and Z," unpublished manuscript, [Online], Available: http://sdg.lcs.mit.edu/˜dnj/pubs/alloy-comparison.pdf, 1999.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	D. Jackson, I. Schechter, and I. Shlyakhter, "Alcoa: the alloy constraint analyzer," in Proc. of the Int. Conf. on Software Engineering, pp. 730-733, Limerick, Ireland, 2000.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	D. Jackson, Software Abstractions: Logic, Language, and Analysis, MIT Press, 2006.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	S. Agerholm and P. Larsen, "A lightweight approach to formal methods," in Proc. the Int. Workshop on Current Trends in Applied Formal Methods, pp. 168-183, 1998.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	P. G. Larsen, J. V. Katwijk, N. Plat, K. Pronk, and H. Toetenel, "SVDM: an integrated combination of SA and VDM," in Proc. Methods Integration Workshop, 1991.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	N. Plat, J. V. Karwijk, and K. Pronk, "A case for structured analysis/formal design," in Proc. Formal Software Development Methods, VDM'91, vol. 552 of LNCS, pp. 81-105, 1991.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	M. D. Fraser, K. Kumar, and V. K. Vaishnavi, "Informal and formal requirements specification languages: bridging the gap," IEEE Trans. on Softw. Eng., vol. 17, no. 5, pp. 454-465, May 1991.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	J. Dick and J. Loubersac, "Integrating structured and formal methods: a visual approach to VDM," in Proc. ESEC'91: European Softw. Eng. Conf., vol. 550 of LNCS, pp. 37-59, Milan, Italy, 1991.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	V. Hamilton, "Experience of combining Yourdon and VDM," in Proc. the Methods Integration Workshop, pp. 529-555, 1991.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	L. T. Semmens and P. Allen, "Using Yourdon and Z: an approach to formal specification," in Proc. Fifth Annual Z User Meeting, Oxford, Springer, pp. 228-253, 1991.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	F. Polack, M. Whiston, and K. C. Mander, "The SAZ project: integrating SSADM and Z," in Proc. FME'93: Industrial-Strength Formal Methods, vol. 670 of LNCS, pp. 541-557, 1993.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	F. Polack, "SAZ: SSADM version 4 and Z," in Proc. Software Specification Methods: An Overview Using a Case Study, pp. 21-38, 21-38, London, UK, 2001.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	K. C. Mander and F. Polack, "Rigorous specification using structured systems analysis and Z," Information and Software Technology, vol. 37, no. 5, pp. 285-291, 1995.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	N. Nagui - Raiss, "A formal software specification tool using the entity - relationship model," in Proc. ER'94: Entity - Relationship Approach, vol. 881 of LNCS, pp. 316-332, 1994.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	A. Galloway, Integrated Formal Methods with Richer Methodological Profiles for the Development of Multi - Perspective Systems, Ph. D Thesis, University of Teesside, School of Computing and Mathematics, 1996.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	R. B. France, "Semantically extended data flow diagrams: a formal specification tool," IEEE Trans. on Softw. Eng., vol. 18, no. 4, pp. 329-346, Apr. 1992.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	L. T. Semmens, R. B. France, and T. W. G. Docker, "Integrated structured analysis and formal specification techniques," The Computer Journal, vol. 35, no. 6, pp. 600-610, 1992.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	D. Harel, "Statecharts: a visual formalism for complex systems," Science of Computer Programming, vol. 8, no. 3, pp. 231-274, 1987.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	A. Hall, "Using Z as a specification calculus for object - oriented systems," in Proc. VDM'90, vol. 428 of LNCS, pp. 290-318, Dublin, Ireland, 1990.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	A. Hall, "Specifying and interpreting class hierarchies in Z," in Proc. Z User Workshop, Cambridge, Workshops in Computing, pp. 120-138, 1994.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	J. Hammond, "Producing Z specifications from object - oriented analysis," in Proc. Z User Workshop, Cambridge, Workshops in Computing, Springer, pp. 316-336, 1994.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50]	M. Rawson and P. Allen, "Synthesis: an integrated, object - oriented method and tool for requirements specification," in Proc. Method Integration Workshop, Leeds, UK, Electronic Workshops in Computing (eWIC), 320-334, Leeds, UK, 1996.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51]	M. Weber, "Combining statecharts and Z for the design of safety - critical control systems," in Proc. FME'96: 3rd Int. Symposium of Formal Methods Europe, vol. 1051 of LNCS, pp. 307-326, Oxford, UK, 1996.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52]	R. B. France, J. M. Bruel, and G. Raghavan, "Towards rigorous analysis of fusion models: the MIRG experience," in Proc. 2nd Northern Formal methods Workshop, Electronic Workshops in Computing, British Computer Society, 280-289, Ilkley, UK, 1996.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53]	R. B. France and M. M. Larrondo - Petrie, "An integrated object -oriented and formal model environment," J. of Object-Oriented Programming, vol. 10, no. 7, pp. 25-34, 1997.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[54]	R. B. France, E. Grant, and J. M. Bruel, UMLtranZ: An UML - Based Rigorous Requirements Modeling Technique, Tech. Rep., Colorado State University, 2000.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[55]	R. B. France, J. M. Bruel, M. M. Larrondo - Petrie, and E. Grant, "Rigorous object - oriented modeling: integrating formal and informal notations," in Proc. Algebraic Methodology and Software Technology, AMAST'97, vol. 1349 of LNCS, pp. 216-230, Munich, Germany, 1997.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[56]	J. M. Bruel and R. B. France, "Transforming UML models to formal specifications," in Proc. UML'98: Beyond the Notation, vol. 1618 of LNCS, Springer, pp. 165-18, Mulhouse, France, 1998.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[57]	S. Dupuy, Couplage de Notations Semi - Formelles et Formelles Pour la Specification des Systemes D'information, Ph.D. Thesis, Universite Joseph Fourier, Grenoble I, 2000.</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[58]	K. Lano and H. Haughton, "Improving the process of system specification and development in B," in Proc. 6th Refinement Workshop, Workshops in Computing, pp. 42-56, Oxford, UK, 1994.</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[59]	K. Lano, H. Haughton, and P. Wheeler, "Integrating formal and structured methods in object - oriented system development," Formal Methods and Object Technology, pp.113-157, 1996.</unstructured_citation></citation><citation key="ref60"><unstructured_citation>
[60]	P. Facon, R. Laleau, and H. P. Nguyen, "Mapping object diagrams into B specifications," in Proc. Method Integration Workshop, UK, Electronic Workshops in Computing (eWIC), pp. 1-13, 1996.</unstructured_citation></citation><citation key="ref61"><unstructured_citation>
[61]	A. Malioukov, "An object - based approach to the B formal method," in Proc. B'98: Int. B Conf., vol. 1393 of LNCS, pp. 162-181, Montpellier, France, 1998.</unstructured_citation></citation><citation key="ref62"><unstructured_citation>
[62]	H. Nguyen, Derivation De Specifications Formelles B a partir de Specifications Semi-Formelles, Ph.D. Thesis, Laboratoire CEDRIC, Conservatoire National des Arts et Metiers, Evry, France, 1998.</unstructured_citation></citation><citation key="ref63"><unstructured_citation>
[63]	E. Meyer and J. Souquiµeres, "Systematic approach to transform OMT diagrams to a B specification," in Proc. FM'99, vol. 1708 and 1709 of LNCS, pp. 875-895, Toulouse, France, 1999.</unstructured_citation></citation><citation key="ref64"><unstructured_citation>
[64]	C. Snook and M. Butler, Tool - supported use of UML for constructing B specifications, [Online], Available: http://www.ecs.soton.ac.uk/~mjb/, 2000.</unstructured_citation></citation><citation key="ref65"><unstructured_citation>
[65]	P. Facon, R. Laleau, and H. P. Nguyen, "From OMT diagrams to B specifications," in Proc. Softw. Spec. Methods: an Overview Using a Case Study, pp. 57-77, Potsdam, German, 2001.</unstructured_citation></citation><citation key="ref66"><unstructured_citation>
[66]	R. Laleau and F. Polack, "A rigorous metamodel for UML static conceptual modeling of information systems," in Proc. CAiSE 2001: Advanced Information Systems Eng., vol. 2068 of LNCS, pp. 402-416, Interlaken, Switzerland, 2001.</unstructured_citation></citation><citation key="ref67"><unstructured_citation>
[67]	R. Laleau and F. Polack, "Specification of integrity - preserving operations in information systems by using a formal UML - based language," Information and Software Technology, vol. 43, no. 12, pp. 693-704, 2001.</unstructured_citation></citation><citation key="ref68"><unstructured_citation>
[68]	R. Laleau and F. Polack, "Coming and going from UML to B: a proposal to support traceability in rigorous IS development," in Proc. ZB 2002: Formal Specification and Development in Z and B, vol. 2272 of LNCS, pp. 517-534, Grenoble, France, 2002.</unstructured_citation></citation><citation key="ref69"><unstructured_citation>
[69]	H. Treharne, "Supplementing a UML development process with B," in Proc. FME 2002: Formal Methods-Getting it Right, vol. 2391 of LNCS, pp. 568-586, Copenhagen, Denmark, 2002.</unstructured_citation></citation><citation key="ref70"><unstructured_citation>
[70]	A. Hammad, B. Tatibouet, J. Voisinet, and W. Weiping, "From B specification to UML statechart diagrams," in Proc. ICFEM 2002: Int. Conf. of Formal Engineering Methods, vol. 2495 of LNCS, pp. 511-522, Shanghai, China, 2001.</unstructured_citation></citation><citation key="ref71"><unstructured_citation>
[71]	C. Snook and M. Butler, "UML - B: formal modeling and design aided by UML," ACM Trans. Softw. Eng. Methodol, vol. 15, no. 1, pp. 92-122, 2006.</unstructured_citation></citation><citation key="ref72"><unstructured_citation>
[72]	B. Selic and J. Rumbaugh, "Using UML for modeling complex real - time systems," in Proc. the ACM SIGPLAN Workshop on Languages, Compilers, and Tools for Embedded Systems, LCTES'98), pp. 250-260, Montreal, Canada, 1998.</unstructured_citation></citation><citation key="ref73"><unstructured_citation>
[73]	C. Fischer, E. Olderog, and H. Wehrheim, "A CSP view on UML - RT structure diagrams," in Proc. Fundamental Approaches to Softw. Eng., vol. 2029 of LNCS, Springer, pp. 91-108, Genova, Italy, 2001.</unstructured_citation></citation><citation key="ref74"><unstructured_citation>
[74]	G. Engels, J. M. Kuster, and R. Heckel, "A methodology for specifying and analyzing consistency of object - oriented behavioral models," in Proc. 9th ACM SIGSOFT Symp. on Foundations of Softw. Eng., pp. 186-195, Vienna, Austria, 2001.</unstructured_citation></citation><citation key="ref75"><unstructured_citation>
[75]	J. Davies and C. Crichton, "Concurrency and refinement in the UML," in Proc. Refine 2002: the BCS FACS Refinement Workshop, Electronic Notes in Theoretical Computer Science, vol. 70, no. 3, pp. 217-243, Nov. 2002.</unstructured_citation></citation><citation key="ref76"><unstructured_citation>
[76]	J. Araujo, Metamorphosis: an Integrated Object-Oriented Requirements Analysis and Specification Method, Ph.D. Thesis, Dept. of Computing, University of Lancaster, 1996.</unstructured_citation></citation><citation key="ref77"><unstructured_citation>
[77]	K. Achatz and W. Schulte, "A formal object-oriented method inspired by fusion and Object - Z," in Proc. ZUM'97: the Z Formal Specification Notation, Int. Conf., vol. 1212 of LNCS, pp. 91-111, Reading, UK, 1997.</unstructured_citation></citation><citation key="ref78"><unstructured_citation>
[78]	S. Dupuy, Y. Ledru, and M. Chabre-Peccoud, "Integrating OMT and Object-Z," in Proc. BCS FACS/EROS ROOM Workshop, pp. 347-366, London, UK, 1997.</unstructured_citation></citation><citation key="ref79"><unstructured_citation>
[79]	S. Kim and D. Carrington, "A formal mapping between UML models and Object - Z specifications," in Proc. ZB2000: Formal Specification and Development in Z and B, York, UK, Lecture Notes in Computer Science, vol. 1878, pp. pp. 2-21, York, UK, 2000.</unstructured_citation></citation><citation key="ref80"><unstructured_citation>
[80]	S. Kim and D. Carrington, "A formal model of the UML meta - model: the UML state machine and its integrity constraints," in Proc. ZB 2002, vol. 2272 of LNC, pp. 497-516, Grenoble, France, 2002.</unstructured_citation></citation><citation key="ref81"><unstructured_citation>
[81]	F. Bouquet, F. Dadeau, and J. Groslambert, "Checking JML specifications with B machines," in Proc. ZB 2005, vol. 3455 of LNCS, pp. 434-453, Guildford, UK, 2005.</unstructured_citation></citation><citation key="ref82"><unstructured_citation>
[82]	Y. Chen and H. Miao, "From an abstract Object - Z specification to UML diagram," J. of Information &amp; Computational Science, vol. 1, no. 2, pp.319-324, 2004.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Fuzzy Voting for Anomaly Detection in Cluster-Based Mobile Ad Hoc Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Rahmanimanesh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Saeed</given_name><surname>Jalili</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2013</year></publication_date><pages><first_page>86</first_page><last_page>100</last_page></pages><doi_data><doi>10.66224/ijece.28042.10.4.86</doi><resource>http://ijece.org/fa/Article/28042</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28042</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28042</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28042</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28042</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28042</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28042</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28042</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. Perkins and E. Royer, "Ad hoc on demand distance vector routing," in Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 99, pp. 90-100, Feb. 1999.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. Perkins, E. Royer, and S. Das, "Ad hoc on demand distance vector routing," IETF RFC 3561, Jul. 2003.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	N. Vapnik, Statistical Learning Theory, John Wiley and Sons, 1998.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. M. J. Tax, One - Class Classification, Ph. D. Dissertation, Delft University of Technology, 2001.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	C. Bishop, Neural Networks for Pattern Recognition, Oxford University Press, 1995.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	T. Kohonen, Self - Organizing Maps, Springer-Verlag, Third Edition, 2001.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. Huang, W. Fan, W. Lee, and P. Yu, "Cross - feature analysis for detecting ad hoc routing anomalies," in Proc. of the 23rd Int. Conf. on Distributed Computing Systems, ICDCS 03, pp. 478-487, May 2003.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. R. Quinlan, C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers, 1993.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	W. W. Cohen, "Fast effective rule induction," in Proc. of 12th Int. Conf. on Machine Learning, pp. 115-123, Jul. 1995.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	E. Alpaydin, Introduction to Machine Learning, MIT Press, 2004.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto, and N. Kato, "A dynamic anomaly detection scheme for AODV - based mobile ad hoc networks," IEEE Trans. on Vehicular Technology, vol. 58, no. 5, pp. 2471-2481, Jun. 2009.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, "A self - adaptive intrusion detection method for AODV - based mobile ad hoc networks," in Proc. of IEEE Int. Conf. on Mobile Ad Hoc and Sensor Systems, pp. 773-780, Nov. 2005.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. B. D. Cabrera, C. Gutierrez, and R. K. Mehra, "Infrastructures and algorithms for distributed anomaly - based intrusion detection in mobile ad hoc networks," in Proc. of IEEE Military Communications Conf., MILCOM 05, vol. 3, pp. 1831-1837, Oct. 2005.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	J. B. D. Cabrera, C. Gutierrez, and R. K. Mehra, "Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad hoc networks," Information Fusion, vol. 9, no. 1, pp. 96-119, Jan. 2008.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	W. Chen, N. Jain, and S. Singh, "ANMP: ad hoc network management protocol," IEEE J. on Selected Areas in Communications, vol. 17, no. 8, pp. 1506-1531, Aug. 1999.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Y. Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks," in Proc. of 6th Annual Int. Conf. on Mobile Computing and Networking, pp. 275-283, Boston, Aug. 2000.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Y. Zhang, W. Lee, and Y. Huang, "Intrusion detection techniques for mobile wireless networks," ACM Wireless Networks, vol. 9, no. 5, pp. 545-556, Sep. 2003.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	H. Deng, Q. A. Zeng, and D. P. Agrawal, "SVM - based intrusion detection system for wireless ad hoc networks," in Proc. of IEEE Vehicular Technology Conf., vol. 3, pp. 2147-2151, Oct. 2003.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	H. Deng, R. Xu, J. Li, F. Zhang, R. Levy, and W. Lee, "Agent - based cooperative anomaly detection for wireless ad hoc networks," in Proc. of the 12th Int. Conf. on Parallel and Distributed Systems, ICPADS 06, vol. 1, Jul. 2006.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	T. M. Cover and P. E. Hart, "Nearest neighbor pattern classification," IEEE Trans. on Information Theory, vol. 13, no. 1, pp. 21-27, Jan. 1967.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	T. Avram, S. Oh, and S. Hariri, "Analyzing attacks in wireless ad hoc network with self - organizing maps," in Proc. of Fifth Annual Conf. on Communication Networks and Services Research, CNSR'07, pp. 166-175, May 2007.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Y. A. Huang and W. Lee, "Attack analysis and detection for ad hoc routing protocols," in Proc. of Recent Advances in Intrusion Detection, pp. 125-145, Sep. 2004.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	I. Aad, J. Hubaux, and E. W. Knightly, "Impact of denial of service attacks on ad hoc networks," IEEE/ACM Trans. on Networking, vol. 16, no. 4, pp. 791-802, Aug. 2008.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	F. Xing and W. Wang, "Understanding dynamic denial of service attacks in mobile ad hoc networks," in IEEE Military Communication Conf., MILCOM'06, 7 pp., Oct. 2006.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Y. Hu, A. Perrig, and D. Johnson, "Wormhole attacks in wireless networks," IEEE J. on Selected Areas in Communications, vol. 24, no. 2, pp. 370-380, Feb. 2006.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Y. C. Hu, A. Perrig, and D. B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols," in Proc. of ACM Workshop Wireless Security, WiSe'03, pp 30-40, Sep. 2003.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	L. I. Kuncheva, Combining Pattern Classifiers, Methods, and Algorithms, John Wiley and Sons, 2004.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	D. M. J. Tax, M. V. Breukelen, R. P. W. D. Duin, and J. Kittler, "Combining multiple classifiers by averaging or by multiplying?," Pattern Recognition, vol. 33, no. 9, pp. 1475-1485, Sep. 2000.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	Z. Chen, Consensus in Group Decision Making Under Linguistic Assessments, Ph. D. Dissertation, Kansas State University, 2005.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	F. Herrera, E. Herrera - Viedma, and J. L. Verdegay, "Direct approach processes in group decision making using linguistic OWA operators," Fuzzy Sets and Systems, vol. 79, no. 2, pp. 175-190, Apr. 1996.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	R. R. Yager, "On ordered weighted averaging aggregation operators in multi-criteria decision making," IEEE Trans. on Systems, Man and Cybernetics, vol. 18, no. 1, pp. 183-190, Jan./Feb. 1988.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	H. Chen and L. Zhou, "An approach to group decision making with interval fuzzy preference relations based on induced generalized continuous ordered weighted averaging operator," Expert Systems with Applications, vol. 38, no. 10, pp. 13432-13440, Sep. 2011.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	M. Dursun, E. E. Karsak, and M. A. Karadayi, "A fuzzy multi-criteria group decision making framework for evaluating health - care waste disposal alternatives," Expert Systems with Applications, vol. 38, no. 9, pp. 11453-11462, Sep. 2011.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	J. M. Merigo and A. M. Gil-Lafuente, "Fuzzy induced generalized aggregation operators and its application in multi - person decision making," Expert Systems with Applications, vol. 38, no. 8, pp. 9761-9772, Aug. 2011.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	J. Y. Yu and P. H. J. Chong, "A survey of clustering schemes for mobile ad hoc networks," IEEE Communications Surveys &amp; Tutorials, vol. 7, no. 1, pp. 32-48, First Quarter 2005.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	J. Wu et al., "On calculating power - aware connected dominating sets for efficient routing in ad hoc wireless networks," International J. of Communication Networks and Distributed Systems, vol. 4, no. 1, pp. 59-70, Mar. 2002.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	T. C. Hou and T. J. Tsai, "An access - based clustering protocol for multi - hop wireless ad hoc networks," IEEE J. on Selected Areas in Communications, vol. 19, no. 7, pp. 1201-1210, Jul. 2001.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	V. S. Anitha and M. P. Sebastian, "(k, r) - dominating set - based, weighted and adaptive clustering algorithms for mobile ad hoc networks," IET Communications, vol. 5, no. 13, pp. 1836-1853, Sep. 2011.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	J. A. Torkestani and M. R. Meybodi, "Clustering the wireless ad hoc networks: a distributed learning automata approach," J. of Parallel and Distributed Computing, vol. 70, no. 4, pp. 394-405, Apr. 2010.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	K. Bhargavan, C. A. Gunter, M. Kim, I. Lee, D. Obradovic, O. Sokolsky, and M. Viswanathan, "Verisim: formal analysis of network simulations," IEEE Trans. on Software Engineering, vol. 28, no. 2, pp. 129-145, Feb. 2002.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	R. Perdisci, D. Ariu, P. Fogla, G. Giacinto, and W. Lee, "McPAD : a multiple classifier system for accurate payload - based anomaly detection," Computer Networks, Special Issue on Traffic Classification and Its Applications to Modern Networks, vol. 53, no. 6, pp. 864-881, Apr. 2009.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	G. Giacinto, R. Perdisci, M. Del Rio, and F. Roli, "Intrusion detection in computer networks by a modular ensemble of one - class classifiers," Information Fusion, Special Issue on Applications of Ensemble Methods, vol. 9, no. 1, pp. 69-82, Jan. 2008.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	NS-2 (Network Simulator Version 2), URL: http://www.isi.edu/nsnam/ns/ns-documentation, Jan. 2010.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	A. J. Dobson and A. G. Barnett, An Introduction to Generalized Linear Models, Chapman and Hall, 3rd Edition, 2008.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Gravity Oriented One-Class Classifier Based on Support Vector Data Descriptor</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Ghafarian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Sadoghi Yazdi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Y.</given_name><surname>Allahyari</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2013</year></publication_date><pages><first_page>101</first_page><last_page>114</last_page></pages><doi_data><doi>10.66224/ijece.28043.10.4.101</doi><resource>http://ijece.org/fa/Article/28043</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28043</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28043</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28043</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28043</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28043</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28043</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28043</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	B. Scholkopf, R. C. Williamson, A. J Smola, J. Shawe-Taylor, "SV estimation of a distribution's support," in Proc. Neural Information Processing Systems, 1999.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. M. J. Tax and R. P. W. Duin, "Support vector domain description," Pattern Recognition Letters, vol. 20, no. 11-13, pp. 1191-1199, Dec. 1999.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	K. Y. Lee, et al., "Improving support vector data description using local density degree," Pattern Recognition, vol. 38, no. 10, pp. 1768-1771, Oct. 2005.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. M. J. Tax and R. P. W. Duin, "Support vector data description," Machine Learning, vol. 54, no. 1, pp. 45-66, 2004.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. W. Cho, "Data description and noise filtering based detection with its application and performance comparison," Expert Systems with Applications, vol. 36, no. 1, pp. 434-441, Jan. 2009.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. M. Guo et al., "A boundary method for outlier detection based on support vector domain description," Pattern Recognition, vol. 42, no. 1, pp. 77-83, Jan. 2009.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. A. Zachman, "A framework for information systems architecture," IBM Systems J., vol. 26, no. 3, pp. 276-292, 1987.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	K. Y. Lee et al., "Density - induced support vector data description," IEEE Trans. on Neural Networks, vol. 18, no. 1, pp. 284-289, Jun. 2007.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	K. Y. Lee et al., "PLPD: reliable protein localization prediction from imbalanced and overlapped dataset," Nucleic Acids Research, vol. 34, no. 17, pp 4655-4666, 2006.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	X. Geng et al., "Supervised nonlinear dimensionality reduction for visualization and classification," IEEE Trans. Sys. Man Cybernet, vol. 35, no. 6, pp. 1098-1107, 2005.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Structure-Texture Image Decomposition for Content-Based Image Retrieval</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Hayati</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S.</given_name><surname>Saryazdi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Nezamabadi-pour</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2013</year></publication_date><pages><first_page>115</first_page><last_page>125</last_page></pages><doi_data><doi>10.66224/ijece.28044.10.4.115</doi><resource>http://ijece.org/fa/Article/28044</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28044</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28044</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28044</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28044</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28044</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28044</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28044</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Liu, D. Zhang, G. Lu, and W. Ma, "A survey of content-based image retrieval with high-level semantics," Pattern Recognition, vol. 40, no. 1, pp. 262-282, Jan. 2007.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. Aujol, G. Gilboa, T. Chan, and S. Osher, "Structure-texture image decomposition - modeling, algorithms, and parameter selection," Int. J. of Computer Vision, vol. 67, no. 1, pp. 111-136, Apr. 2006.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. F. Chang, T. Sikora, and A. Purl, "Overview of the MPEG - 7 standard," IEEE Trans. on Circuits and Systems for Video Technology, vol. 11, no. 6, pp. 688-695, Jun. 2001.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	L. Rudin, S. Osher, and E. Fatemi, "Nonlinear total variation based noise removal algorithm," Physica, vol. 60, no. 1-4, pp. 259-268, Nov. 1992.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Y. Meyer, Oscillating Pattern in Image Processing and Nonlinear Evolution Equations, the 15th Dean Jacqueline B. Lewis Memorial Lectures, 2002.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	L. Vese and S. Osher, "Modeling texture with total variation minimization and oscillating patterns in image processing," J. of Scientific Computing, vol. 19, no. 1-3, pp. 553-572, Dec. 2003.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	L. Vese, S. Osher, "Color texture modeling and color image decomposition in variational PDE approach," in Proc. of the Eighth Int. Symp. on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC'06, pp.103-110, 2006.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	P. Clough, M. Grubinger, A. Hangury, and H. Muller, "Overview of the imageclef 2007 photographic retrieval task," in Proc. CLEF 2007 Workshop, LNCS, Budapest, Hungary, pp. 445-471, 2008.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. Shahidi and C. Moloney, "Decorrelating structure and texture components of a variational decomposition," IEEE Trans. on Image Processing, vol. 18, no. 2, pp. 299-309, Feb. 2009.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	R. Shahidi and C. Moloney, "Variational textured image decomposition with improved edge segregation," in Proc. IEEE Int. Conf. on Image Processing, ICIP'06, pp. 1569-1572, 8-11 Oct. 2006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Murong, K. Huiling, W. Qian, and C. Yunmei, "Adaptive parameter computing on structure-texture image decomposition," in Proc. Int. Conf. on Computer Science and Software Engineering, pp. 371-373, 12-14 Dec. 2008.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	K. A. Patwardhan and G. Sapiro, "Automatic image decomposition," in Proc. IEEE Int. Conf. on Image Processing, ICIP'04, vol. 1, pp. 645-648, Sep. 2004.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. J. Osher, A. Sole, and L. A. Vese, "Image decomposition and restoration using total variation minimization and the H-1 norm," Sci. Multiscal Model. Simul., vol. 1, no. 3, pp. 349-370, 2003.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	T. Sikora, "The MPEG-7 visual standard for content description - an overview," IEEE Trans. on Circuit and System for Video Technology, vol. 11, no. 6, pp. 696-702, Jun. 2001.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Winn, A. Criminisi, and T. Minka, "Object categorization by learned universal visual dictionary," in Proc. IEEE Intl. Conf. on Computer Vision, vol. 2, pp. 1800-1807, Beijing, China, Oct. 2008.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	F. Magouyres, "Mathematical analysis of model which combines total variation and wavelet fo image restoration," in Proc. Workshop on Image Processing and Related Mathematical Topics, 10 pp., 2002.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	I. Daubechies and G. Teschke, "Variational image restoration by means of wavelets: simultaneous decomposition, deblurring and denoising," App. Comp. Harmonic Analysis, vol. 19, no. 1, pp. 1-17, Jul. 2005.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	D. K. Park, Y. S. Jeon, and C. S. Won, "Efficient use of local edge histogram descriptor," in Proc. 2000 ACM workshops on Multimedia, pp. 51-54, 2000.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. Z. Wang, J. Li, D. Chan, and G. Wiederhold, "Semantics - sensitive retrieval for digital picture libraries," Digital Library Magazine, 
vol. 5, no. 11, Nov. 1999.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	D. Paquin, D. Levy, E. Schreibmann, and L. Xing, "Multiscale image registration," Math. Biosci. Eng., vol. 3, pp. 389-418, 2006.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Yamada, M. Pickering, S. Jeannin, L. Cieplinski, J. R. Ohm, and M. Editors, Eds., "MPEG - 7 visual part of experimentation model version 8.0," ISO/IEC JTC1/SC29/WG11/N3673, Oct. 2000.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	B. S. Manjunath, J. R. Ohm, V. V. Vasudevan, and A. Yamada, "MPEG-7 color and texture descriptors," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 6, pp. 703-715, Jun. 2001.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Z Wang, J. Li, and G. Wiederhold, "SDIMPLIcity: semantic sensitive integratede matching for picture libraries," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 23, no. 9, pp. 142-147, Sep. 1999.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	ش. شمسي‌گوشکي، بازيابي تصاوير رنگي بر پايه محتوا با استفاده از روش‌هاي چندپرسشي و بازخورد ربط، پايان‌نامه کارشناسي ارشد، دانشگاه شهيد باهنر کرمان، ارديبهشت 1389.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	ح. نظام آبادي پور و ا. کبير، "ارزيابي معيارهاي عدم شباهت در بازيابي و طبقه‌بندي تصوير،" فصلنامه فني و مهندسي مدرس، ش. 22، صص. 98-89، زمستان 1384.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	س. حياتي، س. سريزدي، ح. نظام آبادي پور و ا. شمسي، "رهيافتي جديد براي نمايه‌سازي تصاوير بر اساس تجزيه تصوير،" پانزدهمين کنفرانس سالانه انجمن کامپيوتر ايران، تهران، اسفند 1388.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	س. حياتي، جداسازي تصوير به مؤلفه‌هاي بافت و ساختار براي بازيابي تصوير بر اساس محتوا، پايان‌نامه کارشناسي ارشد، دانشگاه شهيد باهنر کرمان، تير 1389.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	F. Zhang, X. Ye, and W. Liu, "Image decomposition and texture segmentation via sparse representation," IEEE Signal Processing Letters, vol. 15, pp. 641-644, 2008.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	M. Bertalmio, L. Vese, G. Sapiro, and S. Osher, "Simultaneous structure and texture image inpainting," IEEE Trans. Image Processing, vol. 12, no. 8, pp. 882-889, Aug. 2003.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	K. Singh, M. Ma, D. W. Park, and S. An, "Image indexing based 
on MPEG-7 scalable color descriptor," Key Engineering Material, vol. 277-279, pp. 375-382, 2005.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Designing Optimal Fuzzy Classifier Using Particle Swarm Optimization</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Seyed-Hamid</given_name><surname>Zahiri</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2013</year></publication_date><pages><first_page>126</first_page><last_page>133</last_page></pages><doi_data><doi>10.66224/ijece.28045.10.4.126</doi><resource>http://ijece.org/fa/Article/28045</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28045</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28045</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28045</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28045</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28045</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28045</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28045</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. Abe and M. S. Lan, "A method for fuzzy rules extraction directly from numerical data and its application to pattern classification," IEEE Trans. Fuzzy Syst., vol. 3, no. 4, pp. 18-28, Feb. 1995.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	P. Thrift, "Fuzzy logic synthesis with genetic algorithms," in Proc. 4th Int. Conf. Genetic Algorithms, ICGA'91, pp. 509-513, San Diego, CA, Jul. 1991.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	W. R. Hwang and W. E. Thompson, "Design of intelligent fuzzy logic controllers using genetic algorithms," in Proc. IEEE Int. Conf. Fuzzy Syst, pp. 1383-1388, Orlando, FL, US, Jun. 1994.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Homaifar and E. McCormick, "Simultaneous design of membership functions and rule sets for fuzzy controllers using genetic algorithms," IEEE Trans. Fuzzy Syst., vol. 3, no. 2, pp. 129-139, May 1995.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. R. Yager and L. A. Zadeh, Adaptive Control with Fuzzy Logic and Genetic Algorithms, Van Nostrand Reinhold Publication, 1993.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. A. Lee and H. Takagi, "Dynamic control of genetic algorithms using fuzzy logic techniques," in Proc. Int. Conf. Genetic Algorithm, pp. 76-83, Urbana - Champaign, IL, US, Jul. 1993.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. Ishobuchi, T. Nakashima, and T. Murata, "Performance evaluation of fuzzy classifier systems for multidimensional pattern classification problems," IEEE Trans. on Systems, Man and Cybernetics, vol. 29, no. 5, pp. 601-618, Oct. 1999.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	H. M. Elragal, "Improving accuracy of fuzzy classifiers using swarm intelligence," in Proc. IEEE 3rd Int. Conf. on Communication Software and Networks, ICCSN'11, pp. 251-257, May 2011.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	C. Rani and S. N. Deepa, "Design of optimal fuzzy classifier system using particle swarm optimization," Technical Report, Anna University Coimbatore, 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	C. C. Chen, "Design of PSO - based fuzzy classification systems," Tamkang J. of Science and Engineering, vol. 9, no 1, pp. 63-70, Dec. 2006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	K. Shimojima, T. Fukuda, and Y. Hasegawa, "RBF - fuzzy system with GA based unsupervised/supervised learning method," in Proc. Int. Joint Conf. 4th IEEE Int. Conf. Fuzzy Syst./2nd Int. Fuzzy Eng. Symp., FUZZ/IEEE - IFES, vol. 1, pp. 253-258, Yokohama, Japan, Mar. 1995.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	H. Ishibuchi, K. Nozaki, N. Yamamoto, and H. Tanaka, "Selecting fuzzy if - then rules for classification problems using genetic algorithms," IEEE Trans. Fuzzy Syst., vol. 3, no. 3, pp. 260-270, Aug. 1995.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	س. ح. ظهیری، "استخراج قواعد مؤثر برای طبقه‌بندی‌کننده‌های فازی با استفاده از روش بهینه‌سازی گروه ذرات،" پانزدهمین کنفرانس مهندسی برق ایران، صص. 165-171، تهران- مرکز تحقیقات مخابرات ایران، اردیبهشت 1386.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. H. Zahiri and S. A. Seyedin, "Swarm intelligence based classifiers," Int. J. of the Franklin Inst., vol. 28, no. 4, pp. 362-376, Nov. 2007.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Kennedy and R. C. Eberhart, "Particle swarm optimization," in Proc. IEEE Intl. Conf. on Neural Networks IV, pp. 1942-1948, Aug. 1995.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Y. Shi and R. C. Eberhart, "Empirical study of particle swarm optimization," in Proc. of the 1999 Cong. on Evolutionary Computation, pp. 1945-1950, May 1999.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. C. Eberhart and Y. Shi, "Tracking and optimizing dynamic systems with particle swarms," in Proc. of the 2001 Congress on Evolutionary Computation, pp. 563-569, Oct. 2001.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	R. A. Fisher, "The use of multiple measurements in taxonomic problems," Ann. Eugen, vol. 7, no. 2, pp. 179-188, Feb. 1936.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	University of California, Irvine, via anonymous ftp ftp.ics.uci.edu/pub/machine-learning-databases.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	D. J. Strausberger, F. D. Garber, N. F. Chamberlain, and E. K. Walton, "Modeling and performance of HF/OTH radar target classification systems," IEEE Trans. on Aerospace and Electronic Systems, vol. 28, no. 2, pp. 396-402, Apr. 1992.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. A. Morgan, "Target I.D. using natural resonance, a new concept for future radar systems," IEEE Potential, vol. 3, no. 2, pp. 11-14, Dec. 1993.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	N. F. Chamberlain, E. K. Walton, and F. D. Garber, "Radar target identification of aircraft using polarization - diverse features," IEEE Trans. on Aerospace and Electronic Systems, vol. 27, no. 1, pp. 58-66, Jan. 1991.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. R. Bell and R. A. Grubbs, "JEM modeling and measurement for radar target identification," IEEE Trans. on Aerospace and Electronic Systems, vol. 29, no. 1, pp. 73-87, Jan. 1993.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. Martin and B. Mulgrew, "Analysis of the theoretical radar returned signal from aircraft propeller blades," in Proc. of the IEEE Int. Radar Conf., pp. 569-572, 1990.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. H. Zahiri and S. A. Seyedin, "Intelligent particle swarm classifier," Iranian J. of Electrical and Computer Engineering, vol. 4, no. 1, pp. 63-70, Winter-Spring 2005.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Y. Shi, R. Eberhart, Y. Chen, and H. Tanaka, "Implementation of evolutionary fuzzy systems," IEEE Trans. on Fuzzy Systems, vol. 7, no. 2, pp. 56-67, Nov. 1999.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Design of a New Format-Compliant Partial Encryption Scheme for H.264 Video   Design of a New Format-Compliant Partial Encryption Scheme for H.264 Video</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Rasoolifar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Khademi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2013</year></publication_date><pages><first_page>134</first_page><last_page>141</last_page></pages><doi_data><doi>10.66224/ijece.28046.10.4.134</doi><resource>http://ijece.org/fa/Article/28046</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28046</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28046</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28046</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28046</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28046</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28046</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28046</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. A. Vanstone, A. J. Menezes, and P. C. Oorschot, Handbook of Applied Cryptography, CRC Press, 1996.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. A. Mollin, An Introduction to Cryptography, CRC Press, 2006.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	F. Chiaraluce, L. Ciccarelli, E. Gambi, P. Pierleoni, and M. Reginelli, "A new chaotic algorithm for video encryption," IEEE Trans. on Consumer Electronics, vol. 48, no. 4, pp. 838-844, Nov. 2002.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Yen and J. Guo, "A new MPEG encryption system and its VLSI architecture," in Proc. IEEE Workshop on Signal Processing Systems, pp. 430-437, Taipei, Taiwan, Oct. 1999.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	C. Shi and B. Bhargava, "An efficient MPEG video encryption algorithm," in Proc. of the 17th IEEE Symposium on Reliable Distributed Systems, pp. 381-386, Indiana, US, Oct. 1998.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	C. G. Shi, S. Y. Wang, and B. Bhargava, "MPEG video encryption in real - time using secret key cryptography," in Proc. of the Int. Conf. of Parallel and Distributed Processing Techniques and Applications, pp. 2822-2828, Las Vegas, US, Jun. 1998.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Tosum and W. Feng, "Efficient multi - layer coding and encryption of MPEG video streams," in Proc. IEEE Int. Conf. on Multimedia and Expo (I), vol. 1, pp. 119-122, Jul. 2000.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	L. Qiao, K. Nahrstedt, and I. Tam, "Is MPEG encryption by using random list instead of zigzag order secure," in Proc. IEEE Int. Symp. on Consumer Electronics, pp. 226-229, Singapore, Dec. 1997.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	W. Zeng and S. Lei, "Efficient frequency domain selective scrambling of digital video," IEEE Trans. on Multimedia, vol. 5, 
no. 1, pp. 118-129, Mar. 2003.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	C. Wang, H. Yu, and M. Zheng, "A DCT- based MPEG - 2 transparent scrambling algorithm," IEEE Trans. on Consumer Electronics, vol. 49, no. 4, pp. 1208-1213, Nov. 2003.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Kankanhalli and T. Guan, "Compressed-domain scrambler/descrambler for digital video," IEEE Trans. on Consumer Electronics, vol. 48, no. 2, pp. 356-365, May 2002.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Wen and W. Zeng, "A format - compliant configurable encryption framework for access control of multimedia," in Proc. IEEE Workshop on Multimedia Signal Processing, vol. 12, pp. 435-440, Oct. 2001.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	D. Xie and C. Kuo, "Enhanced multiple huffman table (MHT) encryption scheme using key hopping," in Proc. IEEE Int. Symp. on Circuits and Systems, vol. 5, pp. 5533-5536, May 2005.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	J. Wang, Y. Fan, T. Ikenaga, and S. Goto, "A partial scramble scheme for H.264 video," in Proc. Int. Conf. on Multimedia Technology, pp. 802-805, Oct. 2007.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Y. Wang, M. Cai, and F. Tang, "Design of a new selective encryption scheme based on H.264," in Proc. IEEE Int. Conf. on Computational Intelligence and Security, pp. 883-887, Dec. 2007.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. G. Lian, Z. X. Liu, Z. Ren, and H. L. Wang, "Secure advanced video coding based on selective encryption algorithms," IEEE Trans. on Consumer Electronics, vol. 52, no. 2, pp. 621-629, May 2006.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Hai-Wei and L. Jin-Ping, "A novel stream cipher for video compressed by H.264," in Proc. Int. Forum on Computer Science - Technology and Applications, vol. 2, pp. 54-56, Dec. 2009.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. Zhou, O. C. Au, and A. Y. Wu, "Secure exp - golomb coding using stream cipher," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp. 1457-1460, Apr. 2009.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	H. Z. Yao and Y. T. Jing, "The design of video-conference encryption system based on H.264," in Proc. Int. Conf. on Multimedia Technology, 4 pp., Oct. 2010.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. K. Yeung, S. Zhu, and B. Zeng, "Partial video encryption based on alternative integer transforms," in Proc. IEEE Int. Symp. on Circuits and Systems, pp. 933-936, May 2010.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	"Draft ITU-T recommendation and final draft international standard of joint video specification (ITU - T Rec. H.264/ISO/IEC 14496-10 AVC version 13)," in Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG, 2010.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	T. Wiegand, G. Sullivan, G. Bjontegaard, and A. Luthra, "Overview of the H.264/AVC video coding standard," IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, no. 7, pp. 560-576, Jul. 2003.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	G. Sullivan and T. Wiegand, "Video compression - from concepts to the H.264/AVC standard," in Proc. of the IEEE, Special Issue on Advances in Video Coding and Delivery, vol. 93, no. 1, pp. 18-31, Jan. 2005.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. Ahn, H. Shim, B. Jeon, and I. Choi, "Digital video scrambling method using intra prediction method," in Proc. PCM2004, vol. 3333 of LNC, pp. 386-393, Nov. 2004.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. Lian, J. Sun, G. Liu, and Z. Wang, "Efficient video encryption scheme based on advanced video coding," Multimedia Tools and Applications, vol. 38, no. 1, pp. 75-89, May 2007.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	I. E. G. Richardson, H.264/MPEG-4 Part 10, Oct. 2002, http://www.vcodex.com.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	N. Masuda, G. Jakimoski, K. Aihara, and L. Kocarev, "Chaotic block ciphers: from theory to practical algorithms," IEEE Trans. on Circuits and Systems-I: Regular Papers, vol. 53, no. 6, pp. 1341-1352, Jun. 2006.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	S. G. Lian, Multimedia Content Encryption, CRC Press, 2008.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>