﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022920</doi_batch_id><timestamp>14050229202442</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>9</month><day>21</day><year>2014</year></publication_date><journal_volume><volume>12</volume></journal_volume><issue>2</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Using Prominent Regions in Search Space Reduction for Recognition of Printed Farsi Subwords</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Davoudi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>E.</given_name><surname>Kabir</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2014</year></publication_date><pages><first_page>1</first_page><last_page>11</last_page></pages><doi_data><doi>10.66224/ijece.28080.12.2.1</doi><resource>http://ijece.org/fa/Article/28080</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28080</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28080</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28080</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28080</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28080</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28080</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28080</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	T. Adamek, N. E. Connor, and A. F. Smeaton, "Word matching using single closed contours for indexing handwritten historical documents," Int. J. of Document Analysis and Recognition, vol. 9, no. 2-4, pp. 153-165, 2007.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. R. Pinales, R. J. Rivas, and M. J. C. Bleda, "Holistic cursive word recognition based on perceptual features," Pattern Recognition Letters, vol. 28, no. 13, pp. 1600-1609, 1 Oct. 2007.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Amin, "Recognition of printed arabic text based on global features and decision tree learning techniques," Pattern Recognition, vol. 33, no. 8, pp. 1309-1323, 2000.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Ebrahimi and E. Kabir, "A pictorial dictionary for printed farsi sub - words," Pattern Recognition Letters, vol. 29, no. 5, pp. 656-663, 2008.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	K. Zagoris, K. Ergina, and N. Papamarkos, "A document image retrieval system," Engineering Application of Artificial Intelligence, vol. 23, no. 6, pp. 872-879, 2010.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Bai, L. Li, and C. L. Tan, "Keyword spotting in document images through word shape coding," in Proc. 10th Int. Conf. on Document Analysis and Recognition, ICDAR'09, pp. 331-335, 26-29 Jul. 2009.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	L. Li, S. Lu, and C. L. Tan, "A fast keyword-spotting technique," 
in Proc. 9th Int. Conf. on Document Analysis and Recognition, ICDAR'07, pp.68-72, 23-26 Sep. 2007.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Lu and C. L. Tan, "Document image retrieval through word shape coding," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 30, no. 11, pp. 1913-1918, Nov. 2008.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	J. A. Rodriguez-Serrano and F. Perronnin, "Handwritten word - spotting using hidden markov models and vocabularies," Pattern Recognition, vol. 42, no. 9, pp. 2106-2116, Sep. 2009.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	T. M. Rath and R. Manmatha, "Word spotting for historical documents," Int. J. on Document Analysis and Recognition, vol. 9, no. 2-4, pp. 139-152, Apr. 2007.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Y. Lu and C. L. Tan, "Information retrieval in document image databases," IEEE Trans. on Knowledge and Data Engineering, 
vol. 16, no. 11, pp. 1398-1410, Nov. 2004.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	ا. ابراهیمی،  استفاده از شكل كلي زير- كلمات چاپي در بازيابي تصوير مستندات و بازشناسي متون فارسي، رساله دکتری مهندسی برق- الکترونیک، دانشگاه تربیت مدرس، تهران، 1384.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	ح. خسروی و ا. کبیر، "ارزیابی روش‏های بازشناسی متون فارسی بر مبنای شکل کلی زیر- کلمات،" نشریه مهندسی برق و کامپیوتر ایران، جلد 7، شماره 4، 
صص. 280-267، زمستان 1388.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. Madhvanath, G. Kim, and V. Govindaraju, "Chain code contour processing for handwritten word recognition," IEEE Trans. on Pattern Recognition and Machine Intelligence, vol. 21, no. 9, 
pp. 928-932, Sep. 1999.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	ا. ابراهیمی و ا. کبیر، "یک روش دومرحله‏ای برای بازشناسی زیر- کلمات چاپی،" نشریه مهندسی برق و کامپیوتر ایران، جلد 2، شماره 2، صص. 62-57، 
ﭘﺎﻳﻴﺰ و زﻣﺴﺘﺎن 1383.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. G. Madhvanath and V. Govindaraju, "The role of holistic paradigms in handwritten word recognition," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 23, no. 2, pp. 149-164, 
Feb. 2001.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. Rehman and T. Saba, "Off - line cursive script recognition: current advances, comparisons and remaining problems," Artificial Intelligence Review, vol. 37, no. 4, pp. 261-288, 2012.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	L. M. Lorigo and V. Govindaraju, "Off - line arabic handwriting recognition: a survey," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 28, no. 5, pp. 712-724, May 2008.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	م. ش. شهرضا، تشخیص کلمات و ارقام دست‌نویس فارسی به وسیله شبکه‌های عصبی (خط نسخ)، رساله دکتری مهندسی برق و کامپیوتر، دانشگاه امیرکبیر، تهران، 1374.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	ر. عزمی، بازشناسی متون چاپی فارسی، رساله دکتری مهندسی برق- الکترونیک، دانشگاه تربیت مدرس، تهران، 1378.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Dehghan, K. Faez, M. Ahmadi, and M. Shridhar, "Handwritten farsi (arabic) word recognition: a holistic approach using discrete HMM," Pattern Recognition, vol. 34, no. 5, pp. 1057-1065, 2001.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. H. Shirali - Shahreza, K. Faez, and A. Khotanzad, "Recognition of handwritten farsi numerals by zernike moments features and a set of class - specific neural network classifiers," in Proc. on Int. Conf. of Signal Processing Applications and Technology, pp. 998-1003, 18-20 Oct. 1994.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	P. Shilane and T. Funkhouser, "Distinctive regions of 3D surfaces," ACM Trans. on Graphics, vol. 26, no. 2, Article 7, Jun. 2007.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	C. Harris and M. Stephens, "A combined corner and edge detector," in Proc. of 4th Alvey Vision Conf., pp. 147-151, 1988.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	N. Dalal and B. Triggs, "Histograms of oriented gradients for human detection," in Proc. of IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, pp. 886-893, 2005.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	ﻫ. داودی و ا. کبیر، "تعیین بخش‏های مهم در شکل زیر- کلمات چاپی،" بیستمین کنفرانس مهندسی برق ایران، 2447-2442 صص.، تهران، 28-26 ارديبهشت 1391.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Hybrid Algorithm for Terrain Simplification</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>F.</given_name><surname>Dabaghi Zarandi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad</given_name><surname>Ghodsi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2014</year></publication_date><pages><first_page>12</first_page><last_page>22</last_page></pages><doi_data><doi>10.66224/ijece.28081.12.2.12</doi><resource>http://ijece.org/fa/Article/28081</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28081</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28081</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28081</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28081</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28081</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28081</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28081</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	P. K. Agarwal and S. Surii, "Surface approximation and geometrics partitions," in Proc. 5th ACM-SIAM Symp. Discrete Algorithms, pp. 24-33, 1994.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Garland and P. S. Heckbert, "Fast polygonal approximation of terrains and height fields," in Technical Report, CMU-CS-95-181, 1995.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. de Berg, O. Cheong, M. van Kreveld, and M. Overmars, Computational Geometry, Springer-Verlag New York Inc, 3rd Edition, May 2008.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Gudmundsson, M. Hammar, and M. van Kreveld, "Higher order delaunay triangulations," Computational Geometry: Theory and Applications, vol. 23, no. 1, pp. 85-98, Jul. 2002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Van Kreveld and R. I. Silveira, "Optimal higher order delaunay triangulations of polygons," Computational Geometry: Theory and Applications, vol. 42, no. 8, pp. 803-813, Oct. 2009.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	I. Dong Yun, K. Choo, and S. Uk Lee, "Mesh simplification using the edge attributes," EURASIP J. Appl. Signal Process., vol. 2002, no. 1, pp. 1102-1115, Jan. 2002.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	C. Chuon and S. Guha, "Volume cost based mesh simplification," in Proc. Int. Conf. on Computer Graphics, Imaging and Visualization, pp. 164-169, 11-14 Aug. 2009.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Y. Guoqing, C. Zhun, and W. Mao, "The new triangulation-simplify algorithm of tin," in Proc. Int. Conf. on Computer Graphics and Virtual Reality, CGVR'06, pp. 79-85, 2006.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Garland and P. S. Heckbert, "Surface simplification using quadric error metrics," in Proc. of the 24th Annual Conf. on Computer Graphics and Interactive Techniques, SIGGRAPH'97, pp. 209-216, New York, NY, US, 1997.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	W. Zhao, T. Tang, H. Gong, F. Duan, and Y. Mo, "Dynamic data retrieval and distance decay of triangulated irregular network (TIN)," Annals of GIS, vol. 12, no. 1, pp. 21-26, 2006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	W. Xie and J. Lu, "An improved simplification algorithm of 3d terrain visualization model," in Proc. IAPRS Integrated System for Spatial Data Production, Custodian and Decision Support, pp. 545-548, 20-23 Aug. 2002.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Wang, L. Wang, J. Li, and I. Hagiwara, "A feature preserved 
mesh simplification algorithm," J. of Engineering and Computer Innovations, vol. 2, no. 6, pp. 98-105, Jun. 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Garland and P. S. Heckbert, "Surface simplification using quadric error metrics," in Proc. 24th Annual Conf. on Computer Graphics and Interactive Techniques, SIGGRAPH '97, 1997.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	P. S. Heckbert and M. Garland, "Optimal triangulation and quadric-based surface simplification," J. of Computational Geometry: Theory and Applications, vol. 14, no. 1-3, pp. 49-65, Nov. 1999.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Wei and Y. Lou, "Feature preserving mesh simplication using feature sensitive metric," J. of Computer Science and Technology, vol. 25, no. 3, pp. 595-605, May 2010.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	ف. دباغی و م. قدسی، "یک الگوریتم تقریبی برای ساده‌سازی سرزمین،" شانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران، دانشگاه صنعتی شریف، تهران، صص. 595-591، 1389.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	P. K. Agarwal and P. K. Desikan, "An efficient algorithm for terrain simplification," in Proc. 8th ACM-SIAM Symp. on Discrete Algorithms, pp. 139-147, 1997.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Software, Lakes Environmental, Web gis. http://www.webgis.com/</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Left Ventricular Segmentation in Echocardiography Images by Manifold Learning and Dynamic Directed Vector Field Convolution</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>N.</given_name><surname> Mashhadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Behnam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ahmad</given_name><surname>Shalbaf</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Z.</given_name><surname>Alizadeh Sani</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2014</year></publication_date><pages><first_page>23</first_page><last_page>32</last_page></pages><doi_data><doi>10.66224/ijece.28082.12.2.23</doi><resource>http://ijece.org/fa/Article/28082</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28082</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28082</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28082</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28082</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28082</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28082</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28082</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	http://www.cardiosmart.org/HeartDisease.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. M. Katz, Physiology of the Heart, 4th ed. Philadelphia, Pa: Lippincott Williams &amp; Wilkins, 2006.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	http://www.heart.org/HEARTORG/Conditions/HeartAttack/PreventionTreatmentofHeartAttack</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	http://www.sciencedaily.com/articles/i/ischaemic_heart_disease.htm.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. J. Soraghan and S. K. Setarehdan, "Automatic echocardiographical feature extraction for left ventricular wall motion and volume changes visualization," in Proc. of the IEEE 23rd Annual Int. Conf. of the Engineering in Medicine and Biology Society, vol. 2, pp. 1653-1656, 2001.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	L. Han and W. Qi - Sheng, "Motion object tracking algorithm using an improved geometric active contour model," in Proc. of 3rd Int. Congress on Image and Signal Processing, CISP, vol. 1, pp. 331-334, 16-18 Oct. 2010.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	X. Hang, N. L. Greenberg, and J. D. Thomas, "A geometric deformable model for echocardiographic image segmentation," Computers in Cardiology, vol. 29, pp. 77-80, 2002.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	X. Min, X. Shunren, and W. Shiwei, "Geometric active contour model with color and intensity priors for medical image segmentation," in Proc. IEEE - EMBS 27th Annual Int. Conf. Engineering in Medicine and Biology Society, pp. 6496-6499, Shanghai, China, 17-18 Jan. 2006.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	G. Raghotham Reddy et al., "Fast global region based minimization of satellite and medical imagery with geometric active contour and level set evolution on noisy images," Recent Advances in Intelligent Computational Systems, RAICS, IEEE, pp. 696-700, 22-24 Sep 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Shalbaf et al., "Automatic detection of end systole and end diastole within a sequence of 2 - D echocardiographic images using modified Isomap algorithm," in Proc. 1st Middle East Conf. on Biomedical Engineering, MECBME,. pp. 217-220, 21-24 Feb. 2011.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Sarti, C. Corsi, E. Mazzini, and C. Lamberti, "Maximum likelihood segmentation of ultrasound images with Raleigh distribution," in Proc. IEEE Conf. on Computer Cardiology, pp. 329-332, 19-22 Sep. 2004.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Q. Duan, E. Angelini, S. Homma, and A. Laine, "Tracking endocardium using optical flow along iso-value curve," in Proc. IEEE Int. Conf. of the on Engineering in Medicine and Biology Society, vol. 1, pp. 707-710, 2006.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. Liang and Y. Wang, "Improved GVF based left ventricle segmentation from cardiac MR images using radial B - snake model," in Proc. IEEE Int. Conf. on Young Computer Scientists, pp. 1000-1005, 18-21 Nov. 2008.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	L. Bing and S. T. Acton, "Vector field convolution for image segmentation using snakes," in Proc. IEEE Int. Conf. on Image Processing, pp. 1637-1640, 8-11 Oct. 2006.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Ganbari Maman, et al., "Fully automatic segmentation of left ventricle in a sequence of echocardiography images of one cardiac cycle by dynamic directional vector field convolution (DDVFC) method and manifold learning," Biomedical Engineering: Applications, Basis and Communications, vol. 25, no. 2, 15 pp., Apr. 2012.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Z. Xingfu and R. Xiangmin, "Two dimensional principal component analysis based independent component analysis for face recognition," in Proc. Int Conf. on Multimedia Technology, ICMT, pp. 934-936, 26-28 Jul. 2011.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	H. Moeinzadeh et al., "Combination of harmony search and linear discriminate analysis to improve classification," in Proc. 3rd Asia Int. Conf. on Modelling &amp; Simulation, AMS'09, pp. 131-135, 25-29 May 2009.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. B. Tenenbaum V. de Silva, and J. Langford, "A global geometric framework for nonlinear dimensionality reduction," Science, vol. 290, no. 5500, pp. 2319-2323, 22 Dec. 2000.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. T. Roweis and L. K. Saul, "Nonlinear dimensionality reduction by locally linear embedding," Springer, vol. 290, no. 5500, pp. 2323-2326, 22 Dec. 2000.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	L. K. Saul and S. T. Roweis, "Think globally, fit locally: unsupervised learning of low dimensional manifolds," J. of Machine Learning Research, vol. 4, no. 1, pp. 119-155, Jan. 2003.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Belkin and P. Niyogi, "Laplacian eigenmaps and spectral techniques for embedding and clustering," Neural Information Processing Systems, vol. 14, pp. 585-591, 2001.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	O. Kouropteva, O. Okun, and M. Pietikainen, "Incremental locally linear embedding algorithm," in Proc. 14th Scandinavian Conf. on Image Analysis, SCIA'05, pp. 521-530, 2005.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	D. Donoho and C. Grimes, "Hessian eigenmaps: new locally linear embedding techniques for high-dimensional data," in Proc. of the National Academy of Sciences, vol. 102, no. 21, pp. 7426-7431, 2005.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	X. Huo, X. Ni, and A. K. Smith, "A survey of manifold-based learning methods," Mining of Enterprise Data, Ch. 1, pp. 691-745, 2007.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	http://www.asecho.org.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title> Color Reduction of Hand-painted Carpet Patterns Before Discretization</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Fateh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>E.</given_name><surname>Kabir</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2014</year></publication_date><pages><first_page>33</first_page><last_page>41</last_page></pages><doi_data><doi>10.66224/ijece.28083.12.2.33</doi><resource>http://ijece.org/fa/Article/28083</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28083</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28083</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28083</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28083</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28083</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28083</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28083</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	L. Brun and A. Tr´emeau, Digital Color Imaging Handbook, CRC Press, pp. 589-638, 2002.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. K. Yang and W. H. Tsai, "Color image compression using quantization, thresholding, and edge detection techniques all based on the moment-preserving principle," Pattern Recognition Letters, vol. 19, no. 2, pp. 205-215, Feb. 1998.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Y. Deng and B. Manjunath, "Unsupervised segmentation of color-texture regions in images and video," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 23, no. 8, pp. 800-810, Aug. 2001.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	N. Sherkat, T. Allen, and S. Wong, "Use of colour for hand-filled form analysis and recognition," Pattern Analysis and Applications, vol. 8, no. 1, pp. 163-180, 2005.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	O. Sertel, et al., "Histopathological image analysis using model-based intermediate representations and color texture: follicular lymphoma grading," J. of Signal Processing Systems, vol. 55, no. 1-3, pp. 169-183, Apr. 2009.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	C. T. Kuo and S. C. Cheng, "Fusion of color edge detection and color quantization for color image watermarking using principal 
axes analysis," Pattern Recognition, vol. 40, no. 12, pp. 3691-3704, Dec. 2007.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. Deng, B. Manjunath, C. Kenney, M. Moore, and H. Shin, "An efficient color representation for image retrieval," IEEE Trans. on Image Processing, vol. 10, no. 1, pp. 140-147, Jan. 2001.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. E. Celebi, "Improving the performance of K-means for color quantization," Image and Vision Computing, vol. 29, no. 4, pp. 260-271, Jan. 2011.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Mojsilovic and E. Soljanin, "Color quantization and processing by fibonacci lattices," IEEE Trans. on Image Processing, vol. 10, 
no. 11, pp. 1712-1725, Nov. 2001.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	N. Papamarkos, A. E. Atsalakis, and C. P. Strouthopoulos, "Adaptive color reduction," IEEE Trans. on Systems, vol. 32, no. 1, pp. 44-56, Feb. 2002.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	P. Heckbert, "Color image quantization for frame buﬀer display," ACM SIGGRAPH Computer Graphics, vol. 16, no. 3, pp. 297-307, Jul. 1982.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Gervautz and W. Purgathofer, "A simple method for color quantization: octree quantization," New Trends in Computer Graphics, Springer-Verlag, pp. 219-231, 1988.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Wan, P. Prusinkiewicz, and S. Wong, "Variance-based color image quantization for frame buﬀer display," Color Research and Application, vol. 15, no. 1, pp. 52-58, Feb. 1990.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	G. Joy and Z. Xiang, "Center-cut for color image quantization," the Visual Computer, vol. 10, no. 1, pp. 62-66, 1993.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Orchard and C. Bouman, "Color quantization of images," IEEE Trans. on Signal Processing, vol. 39, no. 12, pp. 2677-2690, Dec. 1991.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	C. Y. Yang and J. C. Lin, "RWM-cut for color image quantization," Computers and Graphics, vol. 20, no. 4, pp. 577-588, 1996.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	I. S. Hsieh and K. C. Fan, "An adaptive clustering algorithm for color quantization," Pattern Recognition Letters, vol. 21, no. 4, 
pp. 337-346, Apr. 2000.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. Cheng and C. Yang, "Fast and novel technique for color quantization using reduction of color space dimen-sionality," Pattern Recognition Letters, vol. 22, no. 8, pp. 845-856, Jun. 2001.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	K. Lo, Y. Chan, and M. Yu, "Colour quantization by three-dimensional frequency diﬀusion," Pattern Recognition Letters, 
vol. 24, no. 14, pp. 2325-2334, Oct. 2003.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Y. Sirisathitkul, S. Auwatanamongkol, and B. Uyyanonvara, "Color image quantization using distances between adjacent colors along the color axis with highest color variance," Pattern Recognition Letters, vol. 25, no. 9, pp. 1025-1043, Jul. 2004.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	K. Kanjanawanishkul and B. Uyyanonvara, "Novel fast color reduction algorithm for time-constrained applications," J. of Visual Communication and Image Representation, vol. 16, no. 3, pp. 311-332, Jun. 2005.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	W. H. Equitz, "A new vector quantization clustering algorithm," IEEE Trans. on Acoustics, Speech, and Signal Processing, vol. 37, no. 10, pp. 1568-1575, Oct. 1989.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	R. Balasubramanian and J. Allebach, "A new approach to palette selection for color images," J. of Imaging Technology, vol. 17, no. 6, pp. 284-290, Jun. 1991.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Z. Xiang and G. Joy, "Color image quantization by agglomerative clustering," IEEE Computer Graphics and Applications, vol. 14, 
no. 3, pp. 44-48, May 1994.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	L. Velho, J. Gomez, and M. Sobreiro, "Color image quantization by pairwise clustering," in Proc. of the 10th Brazilian Symp. on Computer Graphics and Image Processing, pp. 203-210, Oct. 1997.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	L. Brun and M. Mokhtari, "Two high speed color quantization algorithms," in Proc. of the 1st Int. Conf. on Color in Graphics and Image Processing, pp. 116-121, 2000.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	ا. ايزدی‌پور و ا. ا. کبير، "ارائه روشی برای خواندن خودکار نقشه چاپی فرش و مقایسه آن با روش خوشه‌یابی C- میانگین،" نشریه مهندسی برق و مهندسی کامپیوتر ایران، جلد 8، شماره 1، صص. 56-48، بهار 1389.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Y. L. Huang and R. F. Chang, "A fast finite-state algorithm for generating RGB palettes of color quantized images," J. of Information Science and Engineering, vol. 20, no. 4, pp. 771-782, Jul. 2004.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	Y. C. Hu and M. G. Lee, "K-means based color palette design scheme with the use of stable flags," J. of Electronic Imaging, 
vol. 16, no. 3, 11 pp., Jul. 2007.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	Y. C. Hu and B. H. Su, "Accelerated K-means clustering algorithm for colour image quantization," Imaging Science J., vol. 56, no. 1, pp. 29-40, Dec. 2008.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	Z. Xiang, "Color image quantization by minimizing the maximum intercluster distance," ACM Trans. on Graphics, vol. 16, no. 3, 
pp. 260-276, Jul. 1997.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	M. E. Celebi, "An eﬀective color quantization method based on the competitive learning paradigm," in Proc. of the 2009 Int. Conf. on Image Processing, Computer Vision, and Pattern Recognition, 
vol. 2, pp. 876-880, Jul. 2009.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	M. E. Celebi and G. Schaefer, "Neural gas clustering for color reduction," in Proc. of the 2010 Int. Conf. on Image Processing, Computer Vision, and Pattern Recognition, vol. 2, pp. 429-432, Jul. 2010.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	D. Ozdemir and L. Akarun, "Fuzzy algorithm for color quantization of images," Pattern Recognition, vol. 35, no. 8, pp. 1785-1791, Aug. 2002.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	G. Schaefer and H. Zhou, "Fuzzy clustering for colour reduction in images," Telecommunication Systems, vol. 40, no. 1-2, pp. 17-25, 2009.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	Z. Bing, S. Junyi, and P. Qinke, "An adjustable algorithm for color quantization," Pattern Recognition Letters, vol. 25, no. 16, pp. 1787-1797, Dec. 2004.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	A. Dekker, "Kohonen neural networks for optimal colour quantization," Network: Computation in Neural Systems, vol. 5, 
no. 3, pp. 351-367, 1994.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	C. H. Chang, P. Xu, R. Xiao, and T. Srikanthan, "New adaptive color quantization method based on self-organizing maps," IEEE Trans. on Neural Networks, vol. 16, no. 1, pp. 237-249, Jan. 2005.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	A. Atsalakis and N. Papamarkos, "Color reduction and estimation 
of the number of dominant colors by using a self-growing and 
self-organized neural gas," Engineering Applications of Artificial Intelligence, vol. 19, no. 7, pp. 769-786, Oct. 2006.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	A. T. Ghanbarian, E. Kabir, and N. M. Charkari, "Color reduction based on ant colony," Pattern Recognition Letters, vol. 28, no. 12, pp. 1383-1390, Sep. 2007.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	J. Freixenet, X. Munoz, D. Raba, J. Marti, and X. Cufi, "Yet another survey on image segmentation: region and boundary information integration," Springer, pp. 408-422, 2002.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	L. Lucchese and S. K. Mitra, "Colour image segmentation: a state-of-the-art survey," Proc. Indian National Science Academy, INSA-A, vol. 67, no. 2, pp. 207-221, Mar. 2001.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	Y. Wang, Q. Guo, and Y. Zhu, "Medical image segmentation based on deformable models and its applications," Springer, 209-260, 2007.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	T. Zuva, O. O. Olugbara, S. O. Ojo, and S. M. Ngwira, "Image segmentation, available techniques, developments and open issues," J. on Image Processing and Computer Vision, vol. 2, no. 3, pp. 
20-29, Mar. 2011.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	بوريا، (www.booria.com/carpetdesigner.htm).</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	مرکز کنترل کامپيوتر ايران، نرم‌افزار نقش‌ساز، (www.centraltouch.com).</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	م. فاتح، ا. ا. کبير و م. نیلی احمدآبادی، "کاهش رنگ در نقشه چاپی فرش به کمک یادگیری تقویت‌شده،" نشریه مهندسی برق و مهندسی کامپیوتر ایران، 
جلد 9، شماره 3، صص. 142-133، پاییز 1390.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	م. فاتح و ا. ا. کبير، "خواندن خودکار نقشه‌های دستی فرش،" پذیرفته‌شده در نشریه سيستم‌های هوشمند در مهندسی برق.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	شرکت سهامی فرش ايران، (www.irancarpet.ir).</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50]	ا. ايزدی‌پور و ا. ا. کبير، "شناسايی خودکار خطوط نقشه فرش،" اولين کنگره مشترک سيستم‌های فازی و هوشمند،  مشهد مقدس، شهريور 1386.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51]	موزه فرش ایران، (http://www.allmuseums.com/carpet_museums.html).</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52]	http://www.colorpilot.com/layer.html</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53]	ا. ايزدی‌پور و ا. ا. کبير، خواندن خودکار نقشه چاپی فرش، پايان‌نامه کارشناسی ارشد، دانشگاه تربيت مدرس، دانشکده فنی، صص. 60-59، زمستان 1386.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>The Effects of SIP Register Flood Attack and Detection by Using Kullback–Leibler Distance</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S. R.</given_name><surname>Chogan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Fathy</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Ramezani</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2014</year></publication_date><pages><first_page>42</first_page><last_page>50</last_page></pages><doi_data><doi>10.66224/ijece.28084.12.2.42</doi><resource>http://ijece.org/fa/Article/28084</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28084</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28084</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28084</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28084</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28084</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28084</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28084</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	P. Drew, "Next-generation VoIP network architecture," MSF Technical Report, vol. 1, pp. 3-4, 2003.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Nacico, VoIP and IP Telephony: Planning for Cconvergence in State Government, Representing Chief Information Officers of the States, vol. 1, pp. 1-18, 2005.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	P. Park, "Voice over IP security," Cisco Systems, vol. 1, Ver. 6.0, 
pp. 20-104, 2008.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	H. Sengar and D. Wijesekera, "Detecting VoIP floods using the hellinger distance," IEEE Trans. on Parallel and Distributed Systems, vol. 19, no. 6, pp. 794-805, Jun. 2008.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Ehlert, D. Geneiatakis, and T. Magedanz, "Survey of network security systems to counter SIP-based denia-of-service attacks," Computers &amp; Security, vol. 29, no. 2, pp. 225-243, 2010.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	H. Sengar, D. Wijesekera, H. Wang, and S. Jajodia, "VoIP intrusion detection through interacting protocol state machines," in Proc. Int. IEEE Conf. on Dependable Systems and Networks, pp. 393-402, 25-28 Jun. 2006.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Voznak and J. Safarik, "DoS attacks targeting SIP server and improvements of robustness," Int. J. of Mathematics and Computers in Simulation, vol. 6, no. 1, pp. 177-184, 2012.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. Davidson and J. Peters, "Voice over IP fundamentals," Cisco Press, 2nd Ed., pp. 223-311, 2006.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Kumar, "A novel approach for evaluating and detecting low rate SIP flooding attack," Int. J. of Computer Applications, vol. 26, no. 1, pp. 31-36, Jul. 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Tang, Y. Cheng, and C. Zhou, "Sketch-based SIP flooding detection using hellinger distance," in Proc. of the IEEE Global Telecommunications Conf., GLOBECOM'09, 6 pp., 30 Nov.- 4 Dec. 2009.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. A. Akbar, Z. Tariq, and M. Farooq, "A comparative study of anomaly detection algorithms for detection of sip flooding in IMS," in Proc. 2nd Int. Conf. on Internet Multimedia Services Architecture and Applications, 6 pp., Dec. 2008.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	C. Hecht, P. Reichl, A. Berger, O. Jung, and I. Gojmerac, "Intrusion detection in IMS: experiences with a hellinger distance-based flooding detector," in Proc. IEEE 1st Int. Conf. on Evolving Internet Conf., INTERNET'09, pp. 65-70, 2009.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. N. Do and M. Vetterli, "Wavelet-based texture retrieval using generalized Gaussian density and Kullback-Leibler distance," IEEE Trans. on Image Processing, vol. 11, no. 2, pp. 146-158, Feb. 2002.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	3CX: http://www.3cx.com/</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Voznak and J. Rozhon, "SIP infrastructure performance testing," in Proc. 9th WSEAS Int. Conf. on Telecommunications and Informaticspp. 153-158, Catania, 2010.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. A. Hanley, "Characteristic (ROC) Curvel," Radiology 743, pp. 29-36, 1982.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Sub-Threshold 8T SRAM Cell with Improved Write-Ability and Read Stability</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Gh.</given_name><surname>Pasandi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. M.</given_name><surname>Fakhraie</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2014</year></publication_date><pages><first_page>51</first_page><last_page>59</last_page></pages><doi_data><doi>10.66224/ijece.28085.12.2.51</doi><resource>http://ijece.org/fa/Article/28085</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28085</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28085</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28085</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28085</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28085</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28085</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28085</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Wang, B. H. Calhoun, and A. P. Chandrakasan, Sub-Threshold Design for Ultra Low Power Systems, Springer, 2005.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	K. Wang, Ultra Low Power Fault Tolerant SRAM Design in 90 nm CMOS, M.Sc. Thesis, Department of Electrical and Computer Engineering, University of Saskatchewan, Saskatoon, Saskatchewan, Canada, 2010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	L. Turicchia, et al., "Ultra low power electronics for noninvasive medical monitoring," in Proc. IEEE Custom Integrated Circuits Conf., CICC'09, pp. 85-92, 13-16 Sep. 2009.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. M. Rabaey, A. P. Chandrakasan, and B. Nikolic, Digital Integrated Circuits: a Design Perspective, Prentice-Hall, Inc., 2003.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	T. H. Kim, Design Techniques for Ultra-Low Voltage Sub-Threshold Circuits and on-Chip Reliability Monitoring, Ph.D Thesis, Graduate School, University of Minnesota, Oct. 2010.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	B. H. Calhoun and A. Chandrakasan, "A 256 kb sub-threshold SRAM using 65 nm CMOS," in Proc. IEEE Int. Solid-State Circuits Conf., ISSCC'06. pp. 628-629, 6-9 Feb. 2006.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	L. Chang, D. M. Fried, J. Hergenrother, J. W. Sleight et al., "Stable SRAM cell design for the 32 nm node and beyond," in Proc. IEEE Symp. on VLSI Technology, pp. 128-129, 14-16 Jun. 2005.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. Chen, L. T. Clark, and T. Chen, "An ultra-low-power memory with a sub-threshold power supply voltage," IEEE J. of Solid-State Circuits, vol. 41, no. 10, pp. 2344-2353, Oct. 2006.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Tavva, A Novel Variation-Tolerant 9 T SRAM Design for Nanoscale CMOS, M.Sc. Thesis, Department of Computer Engineering, Kate Gleason College of Engineering, Rochester Institute of Technology, Rochester, New York, May 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	T. Kim, J. Liu, J. Keane, and C. Kim, "A 0.2 V, 480 kb sub-threshold SRAM with 1 k cells per bit-line for ultra-low-voltage computing," IEEE J. of Solid-State Circuits, vol. 43, no. 2, pp. 518-529, Feb. 2008.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	G. Pasandi and S. M. Fakhraie, "A new sub-threshold 7 T SRAM cell design with capability of bit-interleaving in 90 nm CMOS," in Proc. 21st Iranian Conf. on Electrical Engineering, 6 pp., Mashhad, Iran, 14-16 May 2013.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Neale, Digital Timing Control in SRAMs for Yield Enhancement and Graceful Aging Degradation, M.Sc. Thesis, Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada, 2010.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Sharifkhani and M. Sachdev, "Segmented virtual ground architecture for low-power embedded SRAM," IEEE Trans. on Very Large Scale Integration (VLSI) Systems, vol. 15, no. 2, pp. 196-205, Feb. 2007.s
[14]	J. P. Kulkarni, K. Kim, and K. Roy, "A 160 mV robust schmitt trigger based sub-threshold SRAM," IEEE J. of Solid-State Circuits, vol. 42, no. 10, pp. 2303-2313, Oct. 2007.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	A. Islam and M. Hasan, "Leakage characterization of 10 T SRAM cell," IEEE Trans. on Electron Devices, vol. 59, no. 3, pp. 631-638, Mar. 2012.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	Z. Liu and V. Kursun, "Characterization of a novel nine-transistor SRAM cell," IEEE Trans. Very Large Scale Integr. (VLSI) Syst., 
vol. 16, no. 4, pp. 488-492, Apr. 2008.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	J. M. Rabaey, Low Power Essentials, Springer, 2009.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	F. M. Long et al., "Comparison of 4 T and 6 T FinFET SRAM cells for subthreshold operation considering variability - a model-based approach," IEEE Trans. on Electron Devices, vol. 58, no. 3, pp. 609-616, Mar. 2011.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	Predictive Technology Model (PTM), Available: http://ptm.asu.edu/</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Throughput Optimization in a Broadcast Network Using Adaptive Modulation, Coding and Transmit Power Provisioning Security Constraint</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Taki</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2014</year></publication_date><pages><first_page>60</first_page><last_page>66</last_page></pages><doi_data><doi>10.66224/ijece.28086.12.2.60</doi><resource>http://ijece.org/fa/Article/28086</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28086</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28086</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28086</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28086</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28086</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28086</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28086</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 2, pp. 656-715, Oct. 1949.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. Wyner, "The wiretap channel," Bell. Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. 24, no. 3, pp. 339-348, May 1978.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Y. Liang, A. Somekh - Baruch, H. V. Poor, and S. Shamai, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inform. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inform. Theory, vol. 54, no. 10, 
pp. 4687-4698, Oct. 2008.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. Liang, H. V. Poor, and S. Shamai, "Secrecy capacity region of fading broadcast channels," in Proc. IEEE Int. Symp. Information Theory, pp. 1291-1295, Nice, France, 24-29 Jun 2007.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. T. Chung and A. J. Goldsmith, "Degrees of freedom in adaptive modulation: a unified view," IEEE Trans. Commun., vol. 49, no. 9, pp. 1561-1571, Sep. 2001.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	K. J. Hole, H. Holm, and G. E. Oien, "Adaptive multidimensional coded modulation over flat fading channels," IEEE J. Select. Areas Commun., vol. 18, no. 7, pp. 1153-1158, Jul. 2000.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Taki and F. Lahouti, "Discrete rate interfering cognitive link adaptation design with primary link spectral efficiency provisioning," IEEE Trans. Wireless Commun., vol. 10, no. 9, pp. 2929-2939, 
Sep. 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Taki and F. Lahouti, "A framework for integrated discrete - rate and power adaptation and user selection in heterogeneous wireless networks," in Proc. IEEE Wireless Advanced Conf., pp. 252-257, London, UK, 20-22 Jun. 2011.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	H. Khodakarami and F. Lahouti, "Link adaptation for physical layer security overwireless fading channels," IET Commun., vol. 6, no. 3, pp. 353-362,. 2012.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	L. H. Ozarow, S. Shamai, and A. D. Wyner, "Information theoretic considerations for cellular mobile radio," IEEE Trans. Veh. Technol., vol. 43, no. 2, pp. 359-378, May 1994.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B. Kwak, "LDPC codes for physical layer security," in Proc. IEEE Global Telecommunications Conf., GLOBECOM, 6 pp., Honolulu, US, 30 Nov.-4 Dec. 2009.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	J. Nocedal and S. J. Wright, Numerical Optimization, Springer Verlag, Berlin, New York, 2nd ed., 2006.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	ETSI EN: DVB-S2 Standard Specification, 2005.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Select the Optimal Subset of LABP Features Based on CLA-EC Method in Face Recognition System</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Hazrati Bishak</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>K.</given_name><surname>Faez</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Barghi Jond</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S.</given_name><surname>Ghatei</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2014</year></publication_date><pages><first_page>67</first_page><last_page>74</last_page></pages><doi_data><doi>10.66224/ijece.28087.12.2.67</doi><resource>http://ijece.org/fa/Article/28087</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28087</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28087</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28087</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28087</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28087</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28087</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28087</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld, "Face recognition: a literature survey," ACM Computing Survey, vol. 35, no. 4, pp. 399-458, Dec. 2003.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Turk and A. Pentland, "Face recognition using eigenfaces," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'91, pp. 586-591, 3-6 Jun. 1991.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	P. Belhumeur, J. Hespanha, and D. Kriegman, "Eigenfaces vs fisherfaces: recognition using class specific linear projection," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 711-720, Jul. 1997.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. Zhang, A. Kong, J. You, and M. Wong, "Online palmprint identification," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 25, no. 9, pp. 1041-1050, Sep. 2003.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Gross, Handbook of Face Recognition, Springer-Verlag, 2005.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R. Chellappa, C. L. Wilson, and S. Sirohey, "Human and machine recognition of faces: a survey," Proceedings of the IEEE, vol. 83, 
pp. 705-741, May 1995.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	B. Scholkopf, A. J. Smola, and K. R. Muller, "Nonlinear component analysis as a kernel eigenvalue problem," Neural Computation, 
vol. 10, no. 5, pp. 1299-1319, Jul. 1998.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	T. Ojala, M. Pietikainen, and M. Harwood, "A comparative study of texture measures with classification based on feature distributions," Pattern Recognition, vol. 29, no. 1, pp. 51-59, Jan. 1996.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	T. Ahonen, M. Pietikainen, A. Hadid, and T. Maneppa, "Face recognition based on the appearance of local regions," in Proc. Int. Conf. on Pattern Recognition, vol. 3, pp. 153-156, 23-26 Aug.. 2004.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Z. Xie and G. Liu, "Infrared face recognition based on intensity 
of local micropattern-weighted local binary pattern," Optical Engineering, vol. 50, no. 7, Jul. 2011, doi: 10.1117/1.3594788.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Z. Guo, L. Zhang, D. Zhang, and X. Mou, cHierarchical multiscale LBP for face and palm print recognition," in Proc. Int. Conf. on Image Processing, pp. 4521-4524, 26-29 Sep. 2010.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Shelton, et al., "Genetic based LBP feature extraction and selection for facial recognition," in Proc. of 49th Annual Southeast Regional Conf., pp. 197-200, Kennesaw, GA,US, Mar. 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	R. Mehta, J. Yuan, and K. Egiazarian, "Local polynomial approximation-local binary pattern (LPA-LBP) based face classification," in SPIE Proceedings, Multimedia on Mobile Devices 2011; and Multimedia Content Access: Algorithms and Systems, vol 7881, 8 pp. 11 Feb. 2011.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. Liao, X. Zhu, Z. Lei, L. Zhang, and S. Li, "Learning multi-scale block local binary patterns for face recognition," in: Lee, S. W., Li, S., Advances in Biometrics. Springer Berlin/Heidelberg, vol. 4642 of Lecture Notes in Computer Science, pp. 828-837, 2007.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	T. Ojala, M. Pietikainen, and T. Maenpaa, "Multiresolution gray-scale and rotation invariant texture classification with local binary patterns," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 24, no. 7, pp. 971-987, Jul. 2002.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Z. Zhang, M. J. Lyons, M. Schuster, and S. Akamatsu, "Comparison between geometry-based and gabor-wavelets-based facial expression recognition using multi-layer perceptron," in Proc. 3rd Conf, Automatic Face and Gesture Recognition, pp. 454-459, 14-16 Apr. 1998.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	http://www.ee.oulu.fi/mvg/page/lbp_bibliography.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	R. Jensen, Combining Rough and Fuzzy Sets for Feature Selection, Ph.D. Thesis, University of Edinburgh, 2005.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Kudo and J. Sklansky, "Comparison of algorithms that select features for pattern classifiers," Pattern Recognition, vol. 33, no. 1, pp. 25-41, 2000.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	T. P. Riopka and P. Bock, "Intelligent recombination using individual learning in a collective learning genetic algorithm," in Proc. of the Genetic and Evolutionary Computation Conf., GECCO'00, pp. 104-111, Las Vegas, Nevada, US, 10-12 Jul. 2000.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	D. Whitley, V. S. Gordon, and K. Mathias, "Lamarckian evolution, the baldwin effect and function optimization," Parallel Problem Solving from Nature III, Springer-Verlag, 1994.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	B. A. Julstrom, "Comparing darwinian, baldwinian, and lamarckian search in genetic algorithm for 4-cycle problem," Technical Report, Department of Computer Science, St. Cloud State University, St. Cloud, US, 1999.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	B. Masoodi, M. R. Meybodi, and M. Hashemi, "Cooperative CLA-EC," in Proc. of 12th Annual CSI Computer Conf. of Iran, Shahid Beheshti University, Tehran, Iran, pp. 558-559, Feb. 2007.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	B. Masoodifar, M. R. Meybodi, and R. Rastegar, "Asynchronous CLA-EC," in Proc. of 11th Annual CSI Computer Conf. of Iran, Tehran, Iran, pp. 447-458, Jan. 2006.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	R. Rastegar and M. R. Meybodi, "A new evolutionary computing model based on cellular learning automata," in Proc. of IEEE Int. Conf. on Cybernetics and Intelligent Systems, vol. 1, pp. 433-438 Singapore, 1-3 Dec. 2004.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	V. N. Vapnik, Statistical Learning Theory, Wiley, New York, 1998.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	M. Pontil and A. Verri, "Support vector machines for 3-d object recognition," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 20, no. 6, pp. 637-646, Jun. 1998.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	P. J. Philips, H. Moon, S. A. Rizvi, and P. J. Rauss, "The FERET evaluation methodology for face recognition algorithms," IEEE Trans. Pattern Analysis and Machine Analysis, vol. 22, no. 10, 
pp. 1090-1104, Oct. 2000.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	P. J. Phillips, H. Wechsler, J. Huang, and P. Rauss, "The FERET database and evaluation procedure for face recognition algorithms," Image Vis. Comput. J., vol. 16, no. 5, pp. 295-306, 1998.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	A. R. Martinez and R. Benavente, The AR Face Database, Barcelona, Spain, 1998.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Spectral Shaping of Reconstruction Noise in Backward ADPCM Coding</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>قاسم</given_name><surname>علیپور</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>محمدحسن </given_name><surname>ساوجی</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>21</day><year>2014</year></publication_date><pages><first_page>75</first_page><last_page>80</last_page></pages><doi_data><doi>10.66224/ijece.28088.12.2.75</doi><resource>http://ijece.org/fa/Article/28088</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28088</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28088</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28088</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28088</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28088</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28088</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28088</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	N. S. Jayant and P. Noll, Digital Coding of Waveforms: Principles and Applications to Speech and Video, New Jersey: Prentice Hall, 1984.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. R. Deller et al., Discrete-Time Processing of Speech Signals, New York: Macmillan, 1993.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	N. Jayant, J. Johnston, and R. Safranek, "Signal compression based on models of human perception," Proceeding of the IEEE, vol. 81, no. 10, pp. 1385-1422, Oct. 1993.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	T. Painter and A. Spanias, "Perceptual coding of digital audio," Proceeding of the IEEE, vol. 88, no. 4, pp. 451-515, Apr. 2000.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. H. Chen and A. Gersho, "Adaptive postfiltering for quality enhancement of coded speech," IEEE Trans. Speech and Audio Processing, vol. 3, no. 1, pp. 59-70, Jan. 1995.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	D. Malah and R. V. Cox, "A generalized comb filter technique for speech enhancement," in Proc. IEEE ICASSP, vol. 7, pp. 160-163, May 1982.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	V. Ramanaoorthy, N. S. Jayant, R. V. Cox, and M. M. Sondhi,"Enhancement of ADPCM speech coding with backward-adaptive algorithms for postfiltering and noise feedback," IEEE J. Select. Areas Commun., vol. 6, no. 2, pp. 364-382, Feb. 1988.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	B. S. Atal and M. R. Schroeder, "Predictive coding of speech and subjective error criteria," IEEE Trans. Acoust. Speech, Signal Process., vol. 27, no. 2, pp. 247-254, 1979.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. R. Schroeder, B. S. Atal, and J. L. Hall, "Optimizing digital speech coders by exploiting masking properties of the human ear," J. of Acoust. Soc. Am., vol. 66, no. 6, pp. 1647-1652, 1979.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Makhoul and M. Berouti, "Adaptive noise spectral shaping and entropy coding in predictive coding of speech," IEEE Trans. Acoust., Speech, Signal Processing, vol. 27, no. 1, pp. 63-73, Feb. 1979.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Borowicz and A. Petrovsky, "Signal subspace approach for psychoacoustically motivated speech enhancement," Speech Communication, vol. 53, no. 2, pp. 210-219, Feb. 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	E. Ravelli et al., "Joint Optimization of Base and Enhancement Layers in Scalable Audio Coding," IEEE Trans. Acoust. Speech, Signal Process., vol.21, no.4, pp.711-724, Apr. 2013.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	ITU-T, "Recommendation G.711.1, wideband embedded extension for G.711 pulse code modulation," in ITU-T Recommendation, Ed. Geneva, Switzerland, 2008.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. Haykin, Adaptive Filter Theory, Pearson Education India, 2008.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Sayed, Fundamentals of Adaptive Filtering, New York, 2003.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	TIMIT, DARPA TIMIT-Acoustic-Phonetic Continuous Speech Corpus, [Online].</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	ITU-T, "P.862: perceptual evaluation of speech quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech Codecs," in ITU-T Recommendation, Ed. Geneva, Switzerland, 2001.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>