﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022920</doi_batch_id><timestamp>14050229203056</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>3</month><day>21</day><year>2016</year></publication_date><journal_volume><volume>14</volume></journal_volume><issue>1</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Object Transportation by a Multi-Robot Distributed System Using a Compound Architecture</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>T. </given_name><surname>Hekmatfar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>T. </given_name><surname>Hekmatfar</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>15</last_page></pages><doi_data><doi>10.66224/ijece.28161.14.1.1</doi><resource>http://ijece.org/fa/Article/28161</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28161</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28161</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28161</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28161</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28161</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28161</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28161</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Yamashita, T. Arai, J. Ota, and H. Asama, "Motion planning 
of multiple mobile robots for cooperative manipulation and transportation," Robotics and Automation, IEEE Trans. on, vol. 19, no. 2, pp. 223-237, Apr. 2003.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	G. Weiss, Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence, the MIT Press, 1999.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Nemrava and P. Cermak, "Solving the box-pushing problem by master-slave robots," J. of Automation, Mobile Robotics &amp; Intelligent Systems, vol. 2, no. 3, pp. 32-37, 2008.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Z. Wang and V. Kumar, "Object closure and manipulation by multiple cooperating mobile robots," in Proc. 6th Int. Symp. on Distributed Autonomous Robotic Systems, vol. 1, pp. 394-399, 2002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Khozaee, A. H. Aminaiee, and A. Ghaffari, "A swarm robotic approach to distributed object pushing using fuzzy controllers," in Proc. IEEE Int. Conf. on Robotics and Biomimetics, ROBIO'09, pp. 1117-1122, Bangkok, Thailand, 2009.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. C. Satici and M. W. Spong, "Nonholonomic cooperative manipulation of polygonal objects in the plane," in Proc, IEEE 51st Annual Conf. on Decision and Control, CDC'12, pp. 2439-2446, 10-13 Dec. 2012.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Nili Ahmadabadi and E. Nakano, "A 'constrain and move' approach to distributed object manipulation," IEEE Trans. on Robotics and Automation, vol. 17, no. 2, pp. 157-172, Apr. 2001.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Eslamy and S. A. A. Moosavian, "Dynamics and cooperative object manipulation control of suspended mobile manipulators," J. of Intelligent &amp; Robotic Systems, vol. 60, no. 2, pp. 181-199, Nov. 2010.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Zaerpoora, M. N. Ahmadabadia, M. R. Barunia, and Z. D. Wang, "Distributed object transportation on a desired path based on constrain and move strategy," Robotics and Autonomous Systems, vol. 50, no. 2-3, pp. 115-128, Feb. 2005.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	O. Khatib, "Mobile manipulation: the robotic assistant," Robotics and Autonomous Systems, vol. 26, no. 2-3, pp. 175-183, Feb. 1999.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	I. Mas and C. Kitts, "Object manipulation using cooperative mobile multi-robot systems," in Proc. of the World Congress on Engineering and Computer Science, vol. 1, pp. 324-329, 2012.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	E. Yang and D. Gu, Multiagent Reinforcement Learning for Multi-Robot Systems: A Survey, Department of Computer Science, Univeristy of Essex, Tech. Report, 2004.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Z. Wang, E. Nakano, and T. Matsukawa, "Cooperating multiple behavior-based robots for object manipulation," in Proc. IEEE/RSJ/GI Int. Conf. on Distributed Autonomous Robotic Systems, vol. 3, pp. 371-382, Munich, Germany, 12-16 Sep. 1994.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	ع. ا. امینایی، یادگیری همکاری در سیستم‏های جابه‌جایی اجسام، پایان‏نامه 
دوره کارشناسی ارشد مهندسی رباتیک- دانشکده فنی و مهندسی، دانشگاه تهران، 1385.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	آ. زائرپور، طراحی و تحلیل یک پروتکل هماهنگی در یک تیم گسترده رباتیک جهت جابه‌جایی اجسام در یک صفحه دوبعدی، پایان‏نامه دوره کارشناسی ارشد مهندسی رباتیک- دانشکده فنی و مهندسی، دانشگاه تهران، 1380.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	K. Kosuge and T. Oosumi, "Decentralized control of multiple robots handling an object," in Proc. IEEE/RSJ Int. Conf. on Intelligent Robots and Systems, vol. 1, pp. 318-323, Osaka, Japan, 4-8 Nov. 1996.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. Spletzer, et al., "Cooperative localization and control for multi-robot manipulation," in Proc. IEEE/RSJ Int. Conf. on Intelligent Robots and Systems, vol. 2, pp. 631-636, 29 Oct.-3 Nov. 2001.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Z. Wang, Y. Takano, Y. Hirata, and K. Kosuge, "Decentralized cooperative object transportation by multiple mobile robots with a pushing leader," in Distributed Autonomous Robotic Systems 6, Ed: Springer, pp. 453-462, 2007.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	R. Gross and M. Dorigo, "Towards group transport by swarms of robots," Int. J. of Bio-Inspired Computation, vol. 1, no. 1-2, pp. 1-13, Jan. 2009.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	C. R. Kube and E. Bonabeau, "Cooperative transport by ants and robots," Robotics and Autonomous Systems, vol. 30, no. 1-2, pp. 85-101, Jan. 2000.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	H. Frank, N. Wellerdick-Wojtasik, B. Hagebeuker, G. Novak, and 
S. Mahlknecht, "Throwing objects-a bio-inspired approach for the transportation of parts," in Proc. IEEE Int. Conf. on Robotics and Biomimetics, pp. 91-96, 17-20 Dec. 2006.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	K. F. Bohringer, V. Bhatt, and K. Y. Goldberg, "Sensorless manipulation using transverse vibrations of a plate," in Proc. IEEE Int. Conf. on Robotics and Automation, Nagoya, vol. 2, pp. 1989-1996, 21-27 May 1995.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. Cheon, K. Ryu, and Y. Oh, "Object manipulation using robot arm-hand system," in Proc. 10th Int. Conf. on Ubiquitous Robots and Ambient Intelligence, URAI'13, pp. 163-166, 30 Oct.-2 Nov. 2013.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	P. Dzitac and A. M. Mazid, "Factors that influence reliable object manipulation," in Proc. 8th IEEE Conf. on, Industrial Electronics and Applications, ICIEA'13, pp. 1468-1473, 19-21 Jun. 2013.
[25]	K. Harada, M. Kaneko, and T. Tsuji, "Rolling-based manipulation for multiple objects," in Proc. IEEE Int. Conf. on Robotics and Automation, ICRA'00, vol. 4, pp. 457-468, San Francisco, CA, USA, 24-28 Apr. 2000.
[26]	A. Saxena, J. Driemeyer, and A. Y. Ng, "Robotic grasping of novel objects using vision," The International J. of Robotics Research, 
vol. 27, pp. 157-173, 2008.
[27]	M. J. Mataric, M. Nilsson, and K. Simsarin, "Cooperative multi-robot box-pushing," in Proc. IEEE/RSJ Int. Conf. on, Intelligent Robots and Systems 95.'Human Robot Interaction and Cooperative Robots', vol. ???, pp. 556-561, 5-9 Aug. 1995.
[28]	Y. Wang and C. W. de Silva, "Multi-robot box-pushing: single-agent q-learning vs. team q-learning," in Proc. IEEE Int. Conf. on Intelligent Robots and Systems, pp. 3694-3699, Beijing, China, 9-15 Oct. 2006.
[29]	Z. Wang, Y. Hirata, and K. Kosuge, "An algorithm for testing object caging condition by multiple mobile robots," in Proc. IEEE Int. Conf. on Intelligent Robots and Systems, pp. 3022-3027, 2-6 Aug. 2005.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[30]	ی. کاتبی، برنامه‌ریزی حرکت و تخصیص کار در سیستم‏های چندرباتی، رساله دوره دکتری مهندسی صنایع- صنایع، دانشگاه تربیت مدرس، 1392.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[31]	H. M. Choset, Principles of Robot Motion: Theory, Algorithms, and Implementation, the MIT Press, 2005.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[32]	V. J. Lumelsky, Sensing, Intelligence, Motion: How Robots and Humans Move in an Unstructured World, John Wiley &amp; Sons, 2005.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[33]	J. B. Mbede, X. Huang, and M. Wang, "Fuzzy motion planning among dynamic obstacles using artificial potential fields for robot manipulators," Robotics and Autonomous Systems, vol. 32, no. 1, pp. 61-72, Jul. 2000.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Estimation of Causality Coefficients in Strategy Maps Using Gravitational Search-Based Learning of Fuzzy Cognitive Maps</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Jahanbeigi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Jahanbeigi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Rohani</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2016</year></publication_date><pages><first_page>16</first_page><last_page>26</last_page></pages><doi_data><doi>10.66224/ijece.28162.14.1.16</doi><resource>http://ijece.org/fa/Article/28162</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28162</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28162</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28162</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28162</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28162</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28162</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28162</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	R. S. Kaplan and D. P. Norton, "The balanced scorecard-measures that drive performance," Harvard Business Review, vol. 70, no. 1, pp. 71-79, Jan. 1992.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. S. Kaplan and D. P. Norton, "Using scorecard as a strategic management system," Harvard Business Review, vol. 74, no. 1, pp. 75-85, Jan. 1996.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. S. Kaplan and D. R. Norton, Strategy Maps: Converting Intangible Assets into Tangible Outcomes, Boston, Massachusette: Harvard Business School Press, 2004.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Jassbi, F. Mohamadnejad, and H. Nasrollahzadeh, "A fuzzy DEMATEL framework for modeling cause and effect relationships of strategy map," Expert Systems with Applications, vol. 38, no. 5, pp. 5967-5973, May 2011.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. Y. Wu, "Constructing a strategy map for banking institutions with key performance indicators of the balanced scorecard," Evaluation and Program Planning, vol. 35, no. 3, pp. 303-320, Aug. 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	P. T. Chang, L. C. Huang, and H. J. Lin, "The fuzzy Delphi method via fuzzy statistics and membership function fitting and an application to the human resources," Fuzzy Sets and Systems, 
vol. 112, no. 3, pp. 511-520, Jun. 2000.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Axelrod, Structure of Decision: The Cognitive Map of Political Elites, Princeton: Princeton University Press, 1976.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	B. Kosko, "Fuzzy cognitive maps," International J. of Man-Machine Studies, vol. 24, no. 1, pp. 65-75, Jan. 1986.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	W. Stach, L. Kurgan, W. Pedrycz, and M. Reformat, "Genetic learning of fuzzy cognitive maps," Fuzzy Sets and Systems, vol. 153, no. 3, pp. 371-401, Aug. 2005.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. K. Ketipi, D. E. Koulouriotis, E. G. Karakasis, G. A. Papakostas, and V. D. Tourassis, "A flexible nonlinear approach to represent cause-effect relationships in FCMs," Applied Soft Computing, 
vol. 12, no. 12, pp. 3757-3770, Dec. 2012.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	E. I. Papageorgiou, J. D. Roo, C. Huszka, and D. Colaert, "Formalization of treatment guideline using fuzzy cognitive maps and semantic web tools," J. of Biomedical Informatics, vol. 45, 
no. 1, pp. 45-60, Feb. 2012.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Kannappan, A. Tamilarasi, and E. Papageorgiou, "Analyzing the performance of fuzzy cognitive maps with non-linear Hebbian learning algorithm in predicting autistic disorder," Expert Systems with Applications, vol. 38, no. 3, pp. 1282-1292, Mar. 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	D. Yaman and S. Polat, "A fuzzy cognitive map approach for effect-based operations: an illustrative case," Information Science, vol. 179, no. 4, pp. 382-403, Feb. 2009.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	N. Lee, J. K. Bae, and C. Koo, "An agent-based cognitive mapping system for sales opportunity analysis," Expert Systems with Applications, vol. 38, no. 6, pp. 7016-7028, Jun. 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Glykas, "Fuzzy cognitive strategic map in business process performance measurement," Expert Systems with Applications, 
vol. 40, no. 1, pp. 1-14, Jan. 2013.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	L. E. Quezada, F. M. Cordova, P. Palominos, K. Godoy, and J. Ross, "Method for identifying strategic objectives in strategy maps," International J. of Production Economics, vol. 122, no. 1, pp. 492-500, Nov. 2009.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Kunc, "Using systems thinking to enhance stratgey maps," Management Decision, vol. 46, no. 5, pp. 761-778, May 2008.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	C. H. Yang, J. C. Chen, J. Z. Shyu, and G. H. Tzeng, "Causal relationship analysis based on DEMATEL technique for innovative policies in SMEs," in Proc. of Portland International Conf. on Management of Engineering &amp; Technology, pp. 373-379, Cape Town, South Africa, 27-31 Jul. 2008.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	C. L. Lin and W. W. Wu, "A causal analytical method for group decision-making under fuzzy environment," Expert Systems with Applications, vol. 34, no. 1, pp. 205-213, Jan. 2008.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	F. H. Chen, T. S. Hsu, and G. H. Tzeng, "A balanced scorecard approach to establish a performance evaluation and relationship model for hot spring hotels based on a hybrid MCDM model combining DEMATEL and ANP," International J. of Hospitality Management, vol. 30, no. 4, pp. 908-932, Dec. 2011.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. L. Tseng, "Implementation and performance evaluation using 
the fuzzy network balanced scorecard," Computers &amp; Education, vol. 55, no. 1, pp. 188-201, Aug. 2010.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	L. E. Quezada and H. A. Lopez-Ospina, "A method for designing a strategy map using AHP and linear programming," International J. of Production Economic, vol. 158, pp. 244-255, Dec. 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. A. Dickerson and B. Kosko, "Virtual worlds as fuzzy cognitive maps," Presence, vol. 3, no. 2, pp. 173-189, Spring 1994.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	E. I. Papageorgiou, "Learning algorithms for fuzzy cognitive maps:
A review study," IEEE Trans. on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 42, no. 2, pp. 150-163, Mar. 2012.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	A. V. Huerga, "A balanced differential learning algorithm in fuzzy cognitive maps," in Proc. of the 16th Int. Workshop on Qualitative Reasoning, 7 pp., Barcelona, Spain, 10-12 Jun. 2002.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	E. Papageorgiou, C. D. Stylios, and P. P. Groumpos, "Active Hebbian learning algorithm to train fuzzy cognitive maps," International J. of Approximate Reasoning, vol. 37, no. 3, pp. 219-249, Nov. 2004.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	E. I. Papageorgiou and J. L. Salmeron, "Learning fuzzy grey cognitive maps using nonlinear Hebbian-based approach," International J. of Approximate Reasoning, vol. 53, no. 1, pp. 54-65, Jan. 2012.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	D. Koulouriotis, I. E. Diakoulakis, and D. M. Emiris, "Learning fuzzy cognitive maps using evolution strategies: a novel schema for modeling and simulating high-level behaviour," in Proc. of the Congress on Evolutionary Computation, vol. 1, pp. 364-371, Seoul, Korea, 27-30 May 2001.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	E. I. Papageorgiou, K. E. Pasopoulos, C. S. Stylios, P. P. Groumpos, and M. N. Vrahatis, "Fuzzy cognitive maps learning using partice swarm optimization," J. of Intelligence Information Systems, vol. 25, no. 1, pp. 95-121, Jul. 2005.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	W. Stach, L. Kurgan, and W. Pedrycz, "A divide and conquer method for learning large fuzzy cognitive maps," Fuzzy Sets and Systems, vol. 161, no. 19, pp. 2515-2532, Oct. 2010.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	M. Ghazanfari, S. Alizadeh, M. Fathian, and D. E. Koulouriotis, "Comparing simulated annealing and genetic algorithm in learning FCM," Applied Mathematics and Computation, vol. 192, no. 1, pp. 56-68, Sep. 2007.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	Y. Chen, L. J. Mazlack, and L. J. Lu, "Learning fuzzy cognitive maps from data by ant colony optimization," in Proc. of the 14th Annual Conf. on Genetic and Evolutionary Computation, pp. 9-16, Philadelphia, Pennsylvania, USA, 7-11 Jul. 2012.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	E. I. Papgeorgiou and P. Groumpos, "A weight adaptation method for fine-tuning fuzzy cognitive map causal links," Soft Computing, vol. 9, no. 11, pp. 846-857, Nov. 2005.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	C. H. Cheng and Y. Lin, "Evaluating the best main battle tank using fuzzy decision theory with linguistic criteria evaluation," European J. of Operational Research, vol. 142, no. 1, pp. 174-186, Oct. 2002.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	E. Rashedi, H. Nezamabadi-pour, and S. Saryazdi, "GSA: a gravitational search algorithm," Information Sciences, vol. 179, 
no. 13, pp. 2232-2248, Jun. 2009.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Leaning the Structure of Bayesian Networks Using Learning Automata</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M. R.</given_name><surname>Mollakhalili Meybodi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. R.</given_name><surname>Meybodi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2016</year></publication_date><pages><first_page>27</first_page><last_page>40</last_page></pages><doi_data><doi>10.66224/ijece.28163.14.1.27</doi><resource>http://ijece.org/fa/Article/28163</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28163</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28163</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28163</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28163</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28163</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28163</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28163</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	L. de Campos and J. Puerta, "Stochastic local algorithms for learning belief networks: searching in the space of the orderings," in Symbolic and Quantitative Approaches to Reasoning with Uncertainty, vol. 2143, pp. 228-239, 2001.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. Heckerman, A Tutorial on Learning with Bayesian Networks, in Innovations in Bayesian Networks, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 33-82,1996.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	T. Nielsen and F. Jensen, Bayesian Networks and Decision Graphs, 2nd Ed. Springer, 2009.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. M. Chickering, "Learning Bayesian networks is NP-complete," in Learning from Data, Springer, pp. 121-130, 1996.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	W. Buntine, "A guide to the literature on learning probabilistic networks from data," IEEE Trans. Knowl. Data Eng., vol. 8, no. 2, pp. 195-210, Apr. 1996.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	G. F. Cooper and E. Herskovits, "A Bayesian method for the induction of probabilistic networks from data," Mach. Learn., vol. 9, no. 4, pp. 309-347, 1992.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. Heckerman and D. M. Chickering, "Learning Bayesian networks: the combination of knowledge and statistical data metrics for belief networks," Mach. Learn., vol. 20, no. 3, pp. 197-243, 1995.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	W. Lam and F. Bacchus, "Learning Bayesian belief networks: an approach based on the MDL principle," Comput. Intell., vol. 10, 
no. 3, pp. 269-293, Aug. 1994.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	L. De Campos and J. Fernandez-Luna, "Ant colony optimization for learning Bayesian networks," Int. J. Approx. Reason., vol. 31, no. 3, pp. 291-311, 2002.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	D. Chickering, D. Geiger, and D. Heckerman, "Learning Bayesian networks: search methods and experimental results," in Proc. 5th Conf. Artif. Intell. Stat., pp. 112-128, 1995.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	ف. مریخ‌بیات، الگوریتم‌های بهینه‌سازی الهام‌گرفته از طبیعت، نص، 1391.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	K. Shibata, H. Nakano, and A. Miyauchi, "A learning method for dynamic Bayesian network structures using a multi-objective particle swarm optimizer," Artif. Life Robot., vol. 16, no. 3, pp. 329-332, Dec. 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	K. Salama and A. Freitas, "ABC-miner: an ant-based Bayesian classification algorithm," Swarm Intell., 2012.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	T. Wang and J. Yang, "A heuristic method for learning Bayesian networks using discrete particle swarm optimization," Knowl. Inf. Syst., vol. 24, no. 2, pp. 269-281, Aug. 2009.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	P. C. Pinto, A. Nagele, M. Dejori, T. A. Runkler, and J. M. C. Sousa, "Using a local discovery ant algorithm for Bayesian network structure learning," IEEE Trans. Evol. Comput., vol. 13, no. 4, pp. 767-779, Aug. 2009.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	R. Daly, Q. Shen, and S. Aitken, "Using ant colony optimization in learning Bayesian network equivalence classes," in Proc. UKCI, pp. 111-118, 2006.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	T. Brouard, A. Delaplace, and H. Cardot, Evolutionary Methods for Learning Bayesian Network Structures, 2008.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. Lee, W. Chung, E. Kim, and S. Kim, "A new genetic approach for structure learning of Bayesian networks: matrix genetic algorithm," Int. J. Control. Autom. Syst., vol. 8, no. 2, pp. 398-407, Apr. 2010.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	L. de Campos and J. Huete, "On the use of independence relationships for learning simplified belief networks," Int. J. Intell. Syst., vol. 12, no. 7, pp. 495-522, 1997.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Acid and L. M. de Campos, "A hybrid methodology for learning belief networks: BENEDICT," Int. J. Approx. Reason., vol. 27, 
no. 3, pp. 235-262, Sep. 2001.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	R. Blanco, I. Inza, and P. Larranaga, "Learning Bayesian networks in the space of structures by estimation of distribution algorithms," Int. J. Intell. Syst., vol. 18, no. 2, pp. 205-220, Feb. 2003.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. Teyssier and D. Koller, "Ordering-Based Search: A Simple and Effective Algorithm for Learning Bayesian Networks," arXiv:1207.1429, 2012.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	W. Hsu, H. Guo, B. Perry, and J. Stilson, "A Permutation Genetic Algorithm for Variable Ordering in Learning Bayesian Networks from Data," GECCO, 2002.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	P. Larranaga, C. M. H. Kuijpers, R. H. Murga, and Y. Yurramendi, "Learning Bayesian network structures by searching for the best ordering with genetic algorithms," IEEE Trans. Syst. Man, Cybern.-Part A Syst. Humans, vol. 26, no. 4, pp. 487-493, Jul. 1996.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	N. Friedman, M. Linial, I. Nachman, and D. Pe'er, "Using Bayesian networks to analyze expression data," J. Comput. Biol., vol. 7, no. 3-4, pp. 601-620, Jan. 2000.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	T. Silander and P. Myllymaki, A Simple Approach for Finding the Globally Optimal Bayesian Network Structure," arXiv Prepr. arXiv1206.6875, Jun, 2012.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	O. Francois, BNT Structure Learning Package: Documentation and Experiments, 2004.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	D. Margaritis, Learning Bayesian Network Model Structure from Data, Ph.D. Thesis, School of Computer Science, Carnegie Mellon University, 2003.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	K. P. Murphy, Machine Learning: A Probabilistic Perspective (Adaptive Computation and Machine Learning Series), the MIT Press, 2012.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	P. Munteanu and M. Bendou, "The EQ framework for learning equivalence classes of Bayesian networks," in Proc. 2001 IEEE Int. Conf. on Data Mining, ICDM'01, pp. 417-424, San Jose, CA, USA, 2001.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	D. Chickering, "Learning equivalence classes of Bayesian-network structures," J. Mach. Learn. Res., vol. 2, no. 3, pp. 445-498, 2002.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	R. Castelo and T. Kocka, "On inclusion-driven learning of Bayesian networks," J. Mach. Learn. Res., vol. 4, pp. 527-574, 2003.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	D. M. Chickering, "Optimal structure identification with greedy search," J. Mach. Learn. Res., vol. 3, pp. 507-554, 2003.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	M. A. Thathachar and B. Harita, "Learning automata with changing number of actions," IEEE Trans. Syst. Man, Cybern.-Part A Syst. Humans, vol. 17, no. 6, pp. 1095-1100, Nov./Dec. 1987.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	م. ملاخلیلی‌میبدی و م. میبدی، "یک الگوریتم جدید مبتنی بر آتاماتای یادگیر توزیع‌شده توسعه‌یافته برای یادگیری پارامتری شبکه بیزی،" نشریه مهندسی برق و مهندسی کامپیوتر ایران، ب- مهندسی کامپیوتر، دوره 12، شماره 2، 
صص. 126-119، زمستان 1393.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	M. R. Mollakhalili Meybodi and M. R. Meybodi, Extended Distributed Learning Automata: A New Method for Solving Stochastic Graph Optimization Problems, arXiv Prepr. arXiv1308.2772, Aug. 2013.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	M. R. Mollakhalili Meybodi and M. R. Meybodi, "Extended distributed learning automata: an automata-based framework for solving stochastic graph optimization problems," Appl. Intell., 
vol. 41, no. 2, pp. 923-940, 2014.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	M. R. Mollakhalili Meybodi and M. R. Meybodi, "Solving stochastic permutation optimization using monte carlo sampling: a learning automata based framework," Submitt. to Appl. Soft Comput., 2013.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	م. ملاخلیلی‌میبدی و م. میبدی، حل مسأله درخت پوشای کمینه تصادفی از طریق بهینه‌سازی جایگشت: یک رهیافت مبتنی بر آتاماتای یادگیر توزیع‌شده، 1395. </unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	A. Rezvanian and M. R. Meybodi, "A new learning automata-based sampling algorithm for social networks," Int. J. Commun. Syst., 
p. n/a–n/a, 2015.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	م. ملاخلیلی‌میبدی و م. میبدی، "یک چارچوب مبتنی بر آتاماتای یادگیر توزیع‌شده توسعه‌یافته برای حل مسأله یافتن زیرگراف بهینه تصادفی،" نشریه مهندسی برق و مهندسی کامپیوتر ایران، ب- مهندسی کامپیوتر، دوره 12، شماره 2، صص. 97-85، زمستان 1393.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	M. Thathachar and K. Ramakrishnan, "A hierarchical system of learning automata," IEEE Trans. Syst. Man. Cybern., vol. 11, no. 3, pp. 236-241, 1981.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	H. Beigy and M. R. Meybodi, "Utilizing distributed learning automata to solve stochastic shortest path problems," Int. J. Uncertainty, Fuzziness Knowledge-Based Syst., vol. 14, no. 5, 
pp. 591-615, Oct. 2006.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	F. Norman, "On the linear model with two absorbing," J. Math. Psychol., vol. 5, pp. 225-241, 1968.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	S. Lakshmivarahan and M. Thathachar, "Bounds on the convergence probabilities of learning automata," IEEE Trans. Syst. Man, Cybern.-Part A Syst. Humans, vol. 6, no. 11, pp. 756-763, 1976.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	V. Lepar and P. P. Shenoy, "A comparison of lauritzen-spiegelhalter, hugin, and shenoy-shafer architectures for computing marginals of probability distributions," in Proc. of the 14th Conf. on Uncertainty in Artificial Intelligence, UAI'98, pp. 328-337, 1998.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	R. M. C. G. F. C. Ingo A. Beinlich Henri Jacques Suermondt, "The ALARM Monitoring System: A Case Study with Two Probabilistic Inference Techniques for Belief Networks," 1989.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Multi-Human Face Detection Using Gabor Filters and Neural Networks in Internet Images</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>R.</given_name><surname>Mohammadian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Mahlouji</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2016</year></publication_date><pages><first_page>41</first_page><last_page>52</last_page></pages><doi_data><doi>10.66224/ijece.28164.14.1.41</doi><resource>http://ijece.org/fa/Article/28164</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28164</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28164</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28164</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28164</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28164</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28164</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28164</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	N. Rathore and D. Chaubey, "A survey on face detection and recognition," International J. of Computer Architecture and Mobility, vol. 1, no. 5, 6 pp., Mar. 2013.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. Zhang and Z. Zhang, A Survey of Recent Advances in Face Detection, Technical Report, Microsoft Research, Jun. 2010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Lumini, B. Nanni, and F. Dominio, "Effective and precise face detection based on both gray-level image and depth map," Applied Computing and Informatics, Apr. 2014.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. Kriegman, M. Yang, and N. Ahuja, "Detecting faces in images: a survey," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 24, no. 1, pp. 34-58, Jan. 2002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Kim, S. –K Kim, K. Toh, Y. Ban, and S. Lee, "Face detection based on skin color likelihood," Pattern Recognition, vol. 47, no. 4, pp. 1573-1585, Apr. 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	X. Zhang, J. Yan, and Z. Lei, "Face detection by structural models," Image and Vision Computing, 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Pereira de Magalhaes and C. Lima, "A new method for Haar-Like features weight adjustment using principal component analysis for face detection," in Proc. of the 9th Int. Conf. on Systems, pp. 55-62, 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Gopi Krishna and A. Srinivasulu, "Face detection system on AdaBoost algorithm using Haar classifiers," International J. of Modern Engineering Research, IJMER, vol. 2, no. 5, pp. 3556-3560, Sep./Oct. 2012.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Ulukaya, C. E. Erdem, and A. Karaali, "Combining Haar feature and skin color based classifiers for face detection," in Proc. of IEEE IEEE Int, Conf. on Acoustics, Speech and Signal Processing, ICASSP'11, pp. 1497-1500, Prague, Czech Republic, 22-27 May 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	T. Wang, J. Li, and Y. Zhang, "Face detection using SURF cascade," in Proc. IEEE Int. Conf. on Computer Vision Workshops, pp. 2183-2190, Barcelona, Spain 6-13 Nov. 2011.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	D. Kim and R. Dahyot, "Face components detection using SURF descriptors and SVMs," in Proc. Int. Machine Vision and Image Processing Conf., IMVIP '08, pp. 51-56, Portrush, UK, 3-5 Sep. 2008.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	D. Huang et al., "Local binary patterns and its application to facial image analysis: A survey," IEEE Trans. on Systems, Man, and Cybernetis, vol. 41, no. 6, pp. 765-781, Nov. 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Y. Zhu, H. Pan, and L. Xia, "Efficient and accurate face detection using heterogeneous feature descriptors," Computer Vision and Image Understanding, vol. 117, no. 1, pp. 12-28, Jan. 2013.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Fische, H. Ekenel, F. Jiang, and E. Shi, "Combining texture and stereo disparity cues for real-time face detection," Signal Processing: Image Communication, vol. 28, no. 9, pp. 1100-1113, Oct. 2013.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Shimizu, H. Kobatake, and L. Huang, "Robust face detection using Gabor filter features," Pattern Recognition Letters, vol. 26, 
no. 11, pp. 1641-1649, Aug. 2005.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Prakash Sahu, "Face detection by fine tuning the Gabor filter parameter," International J. of Computer Science and Information Technologies, vol. 2, no. 6, pp. 2719-2724, Nov./Dec 2011.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	L. Xiaohua, K. Lam, S. Lansun, and Z. Jiliu, "Face detection using simplified Gabor features and hierarchical regions in a cascade of classifiers," Pattern Recognition Letters, vol. 30, no. 8, pp. 717-728, Jun. 2009.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	N. Batool and R. Chellappa, "Fast detection of facial wrinkles based on Gabor features using image morphology and geometric constraints," Pattern Recognition, vol. 48, no. 3, pp. 642-658, Mar. 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Gaianu and D. M. Onchis, "Face and marker detection using Gabor frames on GPUs," Signal Processing, vol. 96, pp. 90-93, Mar. 2014.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	م. محلوجی و ر. محمدیان، "آشکارسازی صورت با استفاده از فیلترهای گابور و شبکه‌های عصبی،" نشریه مهندسی برق و مهندسی کامپیوتر ایران، سال 13، شماره 1- ب، صص. 13-1، تابستان 1394.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. Kaneda, R. Ariizumi, and H. Haga, "Energy saving of TV by face detection," Pervasive Technologies Related to Assistive Environments, 2008.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	W. Eric, E Wong, and Tingshao, "Computer power management system based on the face detection," in Computer Engineering and Networking: Springer International Publishing, pp. 913-920, 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	P. Viola and M. J. Jones, "Robust real-time face detection," International J. of Computer Vision, vol. 57, no. 2, pp. 137-154, May 2004.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. Adwan and H. Arof, "Modified integral projection method for eye detection using dinamic time warping," International J. of Innovation Computing, Information, and Control, vol. 8, no. 1-A, pp. 187-189, Jan. 2012.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. Meynet, V. Popovici, and J. Thiran, "Face detection with boosted Gaussian features," Pattern Recognition, vol 40, no. 8, pp. 2283-2291, Aug. 2007.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	S. Shan, X. Chen, S. Yan, and W. Gao, "Locally assembled binary (LAB) feature with feature-centric cascade for fast and accurate face detection," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'08, 7 pp., Anchorage, AK, USA, 23-28 Jun. 2008.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Fusion of Neural Networks Based on Negative Correlation Learning for Offline Handwritten  Word Recognition</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S. A. A.</given_name><surname>Abbaszadeh Arani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>E.</given_name><surname>Kabir</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2016</year></publication_date><pages><first_page>53</first_page><last_page>62</last_page></pages><doi_data><doi>10.66224/ijece.28165.14.1.53</doi><resource>http://ijece.org/fa/Article/28165</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28165</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28165</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28165</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28165</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28165</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28165</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28165</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Brakensiek and G. Rigoll, "Handwritten address recognition using hidden markov models," Reading and Learning, vol. 2956, pp. 103-122, 2004.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. Palacios, A. Gupta, and P. S. Wang, "Handwritten bank check recognition of courtesy amounts," Int'l J. of Image and Graphics, vol. 4, no. 2, pp. 203-222, Apr. 2004.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Ye, P. A. Viola, S. Raghupathy, H. Sutanto, and C. Li, "Learning to group text lines and regions in freeform handwritten notes," in Proc. 9th Int. Conf. on Document Analysis and Recognition, IEEE Computer Society, vol. 1, pp. 28-32, Sep. 2007.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	V. Govindaraju and H. Xue, "Fast handwriting recognition for indexing historical documents," in Proc. of 1st Int'l Workshop on Document Image Analysis for Libraries, pp. 314-320, 2004.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	ک. مسروری، ا. کبیر و ک. بدیع، "شناسایی کلمات دست‌نویس فارسی با استفاده از الگوریتم DTW،" فصل‌نامه علمی پژوهشی دانشگاه شاهد، شماره 25، صص. 59-68،1378.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Dehghan, K. Faez, M. Ahmadi, and M. Shridhar, " Handwritten Farsi (Arabic) word recognition: a holistic approach using discrete HMM," Pattern Recognition, vol. 34, no. 5, pp. 1057-1065, May 2001.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Dehghan, K. Faez, M. Ahmadi, and M. Shridhar, " Unconstrained Farsi handwritten word recognition using fuzzy vector quantization and hidden Markov models," Pattern Recognition Letters, vol. 22, no. 2, pp. 209-214, Feb. 2001.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Broumandnia, J. Shanbehzadehb, and M. Rezakhah, "Persian/Arabic handwritten word recognition using M-band packet wavelet transform," Image and Vision Computing, vol. 26, no. 6, pp. 829-842, Jun. 2008.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	G. Brown, Diversity in Neural Network Ensembles, Ph.D. Thesis, University of Birmingham, 2003.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	L. I. Kuncheva, Combining Pattern Classifiers: Methods and Algorithms, Wiley-Interscience, 2004.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	L. Xu, A. Krzyzak, and C. Y. Suen, "Methods of combining multiple classifiers and their applications to handwriting recognition," IEEE Trans. on Systems, Man, and Cybernetics, vol. 22, no. 3, pp. 418-435, May/Jun. 1992.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	B. Plessis, A. Sicsu, L. Heutte, E. Menu, E. Lecolinet, O. Debon, and J. V. Debon, "A multi-classifier combination strategy for the recognition of handwritten cursive words," in Proc. Int. Conf. on Document Analysis and Recognition, pp. 642-645, Oct. 1993.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Gunter and H. Bunke, "Ensembles of classifiers for handwritten word recognition," International J. on Document Analysis and Recognition, vol. 5, no. 1, pp. 224-232, Jul. 2003.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Y. S. Huang and C. Y. Suen, "A method of combining multiple experts for the recognition of unconstrained handwritten numerals," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 17, no.1, pp. 90-94, Jan. 1995.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	B. Verma, P. Gader, and W. Chen, "Fusion of multiple handwritten word recognition techniques," Patter Recognition Letters, vol. 22, no. 9, pp. 991-998, Jul. 2001.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	N. Farah, M. T. Khadir, and M. Sellami, "Artiffcial neural network fusion: application to Arabic words recognition," in Proc. European Symposium on Artificial Neural Network, pp. 151-156, Apr. 2005.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. Ebrahimpour, M. Amini, and F. Sharifizadehi, "Farsi handwritten recognition using combining neural networks based on stacked generalization," International J. on Electrical Engineering and Informatics, vol. 3, no. 2, pp. 146-164, Jun. 2011.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	H. El Abed and V. Margner, "A framework for the combination of different arabic handwritten word recognition systems," in Proc. 20th Int. Conf. on Pattern Recognition, pp. 1904-1907, Aug. 2010.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Y. Kessentini, T. Burger, and T. Paquet, "Evidential combination of multiple HMM classifiers for multi-script handwritting recognition," Computational Intelligence for Knowledge-Based Systems Design, Lecture Notes in Computer Science, vol. 6178, pp. 445-454, 2010.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	T. Burger, Y. Kessentini, and T. Paquet, "Dempster-shafer based rejection strategy for handwritten word recognition," in Proc. Int. Conf. on Document Analysis and Recognition, pp. 528-532, Sep. 2011.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	R. Ebrahimpour, R. D. Vahid, and B. Mazloom Nezhad, "Decision templates with gradient based features for Farsi handwritten word recognition," International J. of Hybrid Information Technology, 
vol. 4, no. 1, pp. 1-12, Jan. 2011.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	H. Salimi and D. Giveki, "Farsi/Arabic handwritten digit recognition based on ensemble of SVD classifiers and reliable multi-phase PSO combination rule," International J. on Document Analysis and Recognition, vol. 16, no. 4, pp. 371-386, Dec. 2012.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	V. Frinken, T. Peter, A. Fischer, H. Bunke, T. M. T. Do, and T. Artieres, "Improved handwriting recognition by combining two forms of hidden markov models and a recurrent neural network," Computer Analysis of Images and Patterns, Lecture Notes in Computer Science, vol. 5702, pp. 189-196, 2009.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Y. C. Chim, A. A. Kassim, and Y. Ibrahim, "Dual classifier system for hand printed alphanumeric character recognition," Pattern Analysis and Application, vol. 1, no. 3, pp. 155-162, Sep. 1998.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	R. M. O. Cruz, G. D. C. Cavalcanti, and T. I. Ren, "An ensemble classifier for offline cursive character recognition using multiple feature extraction techniques," in Proc. Int. Joint Conf. on Neural Networks, 8 pp., Jul. 2010.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	R. M. O. Cruz, G. D. C. Cavalcanti, and T. I. Ren, "Handwritten digit recognition using multiple feature extraction techniques and classifier ensemble," in Proc. 17th Int. Conf. on Systems, Signals, and Image Processing, pp. 215-218, 2010.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	M. Liwicki and H. Bunke, "Combining diverse on-line and off-line systems for handwritten text line recognition," Pattern Recognition, vol. 42, no. 12, pp. 3254-3263, Dec. 2009.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	M. Liwicki, H. Bunke, J. A. Pittman, and S. Knerr, "Combining diverse systems for handwritten text line recognition," Machine Vision and Applications, vol. 22, no. 1, pp. 39-51, Jan. 2011.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	C. Leila, K. Maamar, and C. Salim, "Combining neural networks for Arabic handwriting recognition," in Proc. 10th Int. Symp. on Programming and Systems, pp. 74-79, Apr. 2011.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	A. Rahman and B. Verma, "Effect of ensemble classifier composition on offline cursive character recognition," Information Processing and Management, vol. 49, no. 4, pp. 852-864, Jul. 2013.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	N. Azizi, N. Farah, and M. Sellami, "Ensemble classifier construction for Arabic handwritten recognition," in Proc. Int. Workshop on Systems, Signal Processing, and their Applications, pp. 272-274, May 2011.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	L. S. Oliveira, M. Morita, and R. Sabourin, "Feature selection for ensembles applied to handwriting recognition," International J. of Document Analysis and recognition, vol. 8, no. 4, pp. 262-279, Sep. 2006.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	B. E. Rosen, "Ensemble learning using decorrelated neural networks," Connection Science, vol. 8, no. 3-4, pp. 373-384, Jul. 1996.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	Y. Liu and X. Yao, "Ensemble learning via negative correlation," Neural Networks, vol. 12, no. 10, pp. 1399-1404, Dec. 1999.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	Y. Liu and X. Yao, "Simultaneous training of negatively correlated neural networks in an ensemble," IEEE Trans. on Systems, Man, and Cybernetics-Part B: Cybernetics, vol. 29, no. 6, pp. 716-725, Dec. 1999.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	C. L. Liu, K. Nakashima, H. Sako, and H. Fujisawa, "Handwritten digit recognition: investigation of normalization and feature extraction techniques," Pattern Recognition, vol. 37, no. 2, pp. 265-279, Feb. 2004.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	R. Azmi and E. Kabir, "A new segmentation technique for omnifont Farsi text," Pattern Recognition Letters, vol. 22, no. 2, pp. 97-104, Feb. 2001.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	Ø. D. Trier, A. K. Jain, and T. Taxt, "Feature extraction methods for character recognition-a survey," Pattern Recognition, vol. 29, no. 4, pp. 641-662, Apr. 1995.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	R. Polikar, "Ensemble based systems in decision making," Circuits and Systems Magazine, IEEE, vol. 6, no. 3, pp. 21-45, Third Quarter 2006.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	س. ح. نبوی کریزی و ا. کبیر، "تركيب طبقه‌بندها: ايجاد گوناگوني و قواعد تركيب،" نشريه علمي پژوهشي انجمن كامپيوتر ايران، جلد ۳، شماره ۳- الف، صص. 95-107، پایيز 1384.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	م. ع. باقری، غ. ع. منتظر و ا. کبیر، "سیستم‌های دسته‌بند چندگانه روش‌های طراحی و قواعد ترکیب شورا،" دو‌فصل‌نامه پردازش علایم و داده‌ها، جلد 8، شماره 2، صص. 29-56، 1390.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	L. I. Kuncheva and C. J. Whitaker, "Measures of diversity in classifier ensembles and their relationship with the ensemble accuracy," Machine Learning, vol. 51, no. 2, pp. 181-207, May 2003.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	D. Ruta and B. Gabrys, "Analysis of the correlation between majority voting error and the diversity measures in multiple classifier systems," in Proc. of the 4th Int. Symp. on Soft Computing, 7 pp., Paisley, UK, Jun. 2001.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	م. صنیعی آباده، س. محمودی و م. طاهرپور، داده‌کاوی کاربردی، نیاز دانش، صص. 187-189، چاپ اول 1391.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Botnet Detection Based on Computing Negative Reputation Score by Use of a Clustering Method and DNS Traffic</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>R.</given_name><surname>Sharifnyay Dizboni</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Manafi Murkani</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2016</year></publication_date><pages><first_page>63</first_page><last_page>72</last_page></pages><doi_data><doi>10.66224/ijece.28166.14.1.63</doi><resource>http://ijece.org/fa/Article/28166</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28166</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28166</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28166</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28166</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28166</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28166</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28166</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. S. C. Silva, R. M. P. Silva, R. C. G. Pinto, and R. M. Salles, "Botnets: a survey," Computer Networks: the International J. of Computer and Telecommunications Networking, vol. 57, no. 2, 
pp. 378-403, Feb. 2013.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling, "Measuring and detecting fast-flux service networks," in Proc. 15th Network and Distributed System Security Symp., NDSS'08, 12 pp., San Diego, California, USA, Feb. 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Yadav, A. K. Krishna Reddy, A. L. Reddy, and S. Ranjan, "Detecting algorithmically generated malicious domain names," in Proc. of the 10th ACM SIGCOMM Conf. on Internet Measurement, ACM, pp. 48-61, New York, NY, USA, 1-3 Nov. 2010.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Yadav and A. L. Narasimha Reddy, "Winning with DNS failures: strategies for faster botnet detection," in Proc. of the 7th International ICST Conf. on Security and Privacy in Communication Networks, SecureComm'11, vol. 96, pp. 446-459, London, UK, 2011.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	C. Kruegel, L. Bilge, E. Kirda, and M. Balduzzi, "Exposure: finding malicious domains using passive DNS analysis," in Proc. of 18th Network and Distributed System Security Symp., NDSS’11, pp. 214-231, San Diego, California, USA, 6-9 Feb. 2011.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Antonakakis, et al., "From throw-away traffic to bots: detecting the rise of DGA-based malware," in Proc. of 21th USENIX Security Symp., pp. 24-40, Bellevue, WA, USA, Aug. 2012.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. Choi and H. Lee, "Identifying botnets by capturing group activities in DNS traffic," Computer Networks: the International J. of Computer and Telecommunications Networking, vol. 56, no. 1, 
pp. 20-33, Jan. 2012.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	N. Davuth and S. R. Kim, "Classification of malicious domain names using support vector machine and bi-gram method," International J. of Security and Its Applications, IJSIA, vol. 7, no. 1, pp. 51-58, Jan. 2013.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Jordi and C. Sierra, "REGRET: reputation in gregarious societies," in Proc. of the 5th ACM International Conf. on Autonomous Agents, pp. 194-195, Montreal, Canada, 28 May- 1 Jun. 2001.S</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Alexa Top Global Sites, http://www.alexa.com/topsites</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	W. Lu, G. Rammidi, and A. Ghorbani, "Clustering botnet communication traﬃc based on n-gram feature selection," Computer Communications, vol. 34, no. 3, pp. 502-514, Mar. 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. A. Pardo, L. Pardo, and M. C. Pardo, "The jensen-shannon divergence," J. of the Franklin Institute, vol. 334, no. 2, pp. 307-318, Mar. 1997.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. L. Myers and A. D. Well, Research Design and Statistical Analysis, New York, NY: Lawrence Erlbaum Associates, 2003.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Q. Cheng, X. Chen, C. Xu, J. Shi, and P. Liu, "A bigram based real time DNS tunnel detection approach," in Proc.of Int. Conf. on Information Technology and Quantitative Management, vol. 17, 
pp. 852-860, China, May 2013.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	L. Wang, Y. Zhang, and J. Feng, "On the euclidean distance of images," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 27, no. 8, pp. 1334-1339, Jun. 2005.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. N. Tan, M. Steinbach, and V. Kumar, Introduction to Data Mining, Boston, MA: Addison-Wesley, 2005.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Open Malware, Community Malicious Code Research and Analysis, http://www.offensivecomputing.net</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	GeoIP API, MaxMind, Open source API and 
Database for Geological Information, http://dev.maxmind.com/geoip/geoip2/geolite2</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Classification of Hyperspectral Images Using Cluster Space Linear Discriminant Analysis and Small  Training Set</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Imani </surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Ghassemian</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2016</year></publication_date><pages><first_page>73</first_page><last_page>81</last_page></pages><doi_data><doi>10.66224/ijece.28167.14.1.73</doi><resource>http://ijece.org/fa/Article/28167</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28167</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28167</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28167</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28167</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28167</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28167</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28167</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	G. F. Hughes, "On the mean accuracy of statistical pattern recognition," IEEE Trans. Inf. Theory, vol. 14, no. 1, pp. 55-63, Jan. 1968.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	G. Moser and S. B. Serpico, "Combining support vector machines and markov random fields in an integrated framework for contextual image classification," IEEE Trans. on Geoscience and Remote Sensing, vol. 51, no. 5, pp. 2734-2752, May 2013.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	B. Demir and S. Erturk, "Clustering-based extraction of border training patterns for accurate SVM classification of hyperspectral images," IEEE Geoscience and Remote Sensing Lett., vol. 6, no. 4, pp. 840-844, Oct. 2009.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Imani and H. Ghassemian, "Adaptive expansion of training samples for improving hyperspectral image classification performance," in Proc. 21st Iranian Conf. on Electrical Engineering, 
6 pp., May 2013.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	X. Jia, B. C. Kuo, and M. Crawford, "Feature mining for hyperspectral image classification," Proceedings of the IEEE, vol. 101, no. 3, pp. 676-697, Mar. 2013.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Kamandar and H. Ghassemian, "Linear feature extraction for hyperspectral images based on information theoretic learning," IEEE Geoscience and Remote Sensing Lett., vol. 10, no. 4, pp. 702-706, Jun. 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Imani and H. Ghassemian, "Band clustering-based feature extraction for classification of hyperspectral images using limited training samples," IEEE Geoscience and Remote Sensing Lett., 
vol. 11, no. 8, pp. 1325-1329, Aug. 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. Korycinski, M. Crawford, J. W. Barnes, and J. Ghosh, "Adaptive feature selection for hyperspectral data analysis using a binary hierarchical classifier and tabu search," in Proc. IEEE Symp. on Geoscience and Remote Sensing, vol. 1, pp. 297-299, Jul. 2003S.
[9]	S. Li, H. Wu, D. Wan, and J. Zhu, "An effective feature selection method for hyperspectral image classification based on genetic algorithm and support vector machine," Knowledge-Based Systems, vol. 24, no. 1, pp. 40-48, Feb. 2011.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10]	K. Fukunaga, Introduction to Statistical Pattern Recognition, 
San Diego: Academic Press Inc., 1990.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	G. Baudat and F. Anouar, "Generalized discriminant analysis using a kernel approach," Neural Comput., vol. 12, no. 10, pp. 2385-2404, Oct. 2000.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	B. C. Kuo and D. A. Landgrebe, "Nonparametric weighted feature extraction for classification," IEEE Trans. Geosci. Remote Sens, 
vol. 42, no. 5, pp. 1096-1105, May 2004.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	X. F. He and P. Niyogi, "Locality preserving projections," in Proc. Adv. Neural Inf. Process. Syst., vol. 16, pp. 153-160, 2004.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	X. F. He, D. Cai, S. C. Yan, and H. J. Zhang, "Neighborhood preserving embedding," in Proc. 10th IEEE Int. Conf. Comput. Vis., ICCV'05, vol. 2, pp. 1208-1213, 17-21 Oct. 2005.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	H. Y. Huang and B. C. Kuo, "Double nearest proportion feature extraction for hyperspectral-image classification," IEEE Trans. Geosci. Remote Sens., vol. 48, no. 11, pp. 4034-4046, Nov. 2010.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	J. Wen, Z. Tian, X. Liu, and W. Lin, "Neighborhood preserving orthogonal PNMF feature extraction for hyperspectral image classification," IEEE J. of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 6, no. 2, pp. 759-768, Apr. 2013.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	A. M. MartoAnez and A. C. Kak, "PCA versus LDA," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 23, no. 2, 
pp. 228-233, Feb. 2001.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	J. H. Friedman, "Regularized discriminant analysis," J. of the American Statistical Association, vol. 84, no. 405, pp. 165-175, Mar. 1989.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	C. Chang and C. Linin, LIBSVM-A Library for Support Vector Machines, 2008. [Online], Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	J. Cohen, "A coefficient of agreement from nominal scales," Edu. Psychol. Meas., vol. 20, no. 1, pp. 37-46, Apr. 1960.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	G. M. Foody, "Thematic map comparison: evaluating the statistical significance of differences in classification accuracy," Photogramm. Eng. Remote Sens., vol. 70, no. 5, pp. 627-633, May 2004.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Onset Detection for Tar Solo Based on Pitch and Energy Features</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>B.</given_name><surname>Farrokhi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>E.</given_name><surname>Kabir</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>21</day><year>2016</year></publication_date><pages><first_page>82</first_page><last_page>88</last_page></pages><doi_data><doi>10.66224/ijece.28168.14.1.82</doi><resource>http://ijece.org/fa/Article/28168</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28168</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28168</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28168</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28168</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28168</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28168</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28168</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	P. Marsi, Computer Modelling of Sound for Transcription and Synthesis of Musical Signal, Ph.D. Dissertation, University of Bristol, UK, 1996.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Klapuri, "Sound onset detection by applying psychoacoustic knowledge," in IEEE Int. Conf. Acoust., Speech, and Sig. Proc., ICASSP'99, vol. 6, pp. 3089-3092, Phoenix, AZ, USA, 15-19 Mar. 1999.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	ب. فرخی و ا. کبير، "آشکارسازی آغازه در تکنوازی تار،" اولين کنفرانس بين‌المللی آکوستیک و ارتعاشات، دانشگاه صنعتي اميرکبير، 8 صص.، 30 آذر/ 1 دي 1390.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	B. Thoshkahna and K. R. Ramakrishnan, "A psychoacoustics based sound onset detection algorithm for polyphonic audio," in Proc. Int. Conf. on Signal Processing, ICSP'08, pp. 1424-1427, Beijing , China, 26-29 Oct. 2008.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	E. Marchi, G. Ferroni, F. Eyben, S. Squartini, and B. Schuller, "Audio onset detection: a wavelet packet based approach with recurrent neural networks," in Proc. IEEE Int. Joint Conf. on Neural Networks, IJCNN'14, pp. 3585-3591, Beijing, China, 6-8 Jul. 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. P. Bello and M. Sandler, "Phase-based note onset detection for music signals," in IEEE Int, Conf. Acoustics, Speech, and Signal Processing, ICASSP'03, vol. 5, pp. 441-444, 6-10 Apr. 2003.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Bello, C. Duxbury, M. Davies, and M. Sandler, "On the use of phase and energy for musical onset detection in thecomplex domain," in IEEE Sig. Proc. Letters, vol. 11, no. 6, pp. 553-556, Jun. 2004.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Dixon, "Onset detection revisited," in Proc. 9th Int. Conf. on Digital Audio Effects, DAFX'06, pp. 133-137, Montreal, Canada, 18-20 Sep. 2006.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. Zhou, M. Mattavelli, and G. Zoia, "Music onset detection based on resonator time frequency image," IEEE Trans. on Audio, Speech, and Language Processing, vol. 16, no. 8, pp. 1685-1695, Nov. 2008.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	N. Collins, "Using a pitch detector as an onset detector," in Proc. Int. Soc. Music Inf. Retrieval Conf., ISMIR'0 , pp. 100-106, London, UK, 11-15 Sep. 2005.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	R. Zhou, Feature Extraction of Musical Content for Automatic Music Transcription, Ph.D Dissertation, Swiss Federal Inst. of Technol., Lausanne, Oct. 2006.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	H. Heo, D. Sung, and K. Lee, "Note onset detection based on harmonic cepstrum regularity," in Proc, IEEE In. Conf. on Multimedia and Expo., ICME'13, 6 pp., San Jose, CA, Jul. 2013.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	پ. جعفرزاده، آوانگاری اصوات موسيقی ايرانی، دانشگاه سمنان، پايان‌نامه کارشناسی ارشد، اسفند 1380.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	پ. حيدريان،‌ بازشناسي نت‌هاي موسيقي براي سنتور، پايان‌نامه کارشناسي ارشد، دانشگاه تربيت مدرس، بهار 1379.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Bello, et al., "A tutorial on onset detection in musical signals," IEEE Trans. Speech and Audio Processing, vol. 13, no. 5, pp. 1035-1047, Sep. 2005.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	N. Collins, "A comparison of sound onset detection algorithms with emphasis on psychoacoustically motivated detection functions," in Proc. 118th AES Conv., Barcelona, Spain, pp. 28-31, May 2005.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. Holzapfel, Y. Stylianou, A. C. Gedic, and B. Bozkurt, "Three dimensions of pitched instrument onset detection," IEEE Trans. on Audio, Speech, and Language Processing, vol. 18, no. 6, pp. 1517-1527, Aug. 2010.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	E. Benetod and Y. Stylianou, "Auditory spectrum-based pitched instrument onset detection," IEEE Trans. on Audio, Speech, and Language Processing, vol. 18, no. 8, pp. 1968-1977, Nov. 2010.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	P. M. Kumar, J. Sebastian, and H. A. Murthy, "Musical onset detection on carnatic percussion instruments," in Proc. IEEE 21st National Conf. on Communications, NCC'15, Mumbai, India, 6 pp., 27 Feb.- 1 Mar.. 2015.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	H. Thornburg, R. J. Leistikow, and J. Berger, "Melody extraction and musical onset detection via probabilistic models of framewise STFT peak data," IEEE Trans. on Audio, Speech, and Language Processing, vol. 15, no. 4, pp. 1257-1272, May 2007.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	N. Degara, M. E. P. Davies, A. Pena, and Mark D. Plumbley, "Onset event decoding exploiting the rhythmic structure of polyphonic music," IEEE J. of Selected Topics in Signal Processing, vol. 5, no. 6, pp. 1228-1239, Oct. 2011.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	B. Zhu, J. Gan, J. Cai, Y. Wang, and H. Wang, "Adaptive onset detection based on instrument recognition," in Proc. 12th IEEE Int. Conf. on Signal Processing, ICSP'14, pp. 2416-2421, Hangzhou, China, 19-23 Oct. 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. C. Brown, "Calculation of a constant Q spectral transform," J. Acoust. Soc. Am., vol. 89, no. 1, pp. 425-434, Jan. 1991.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. C. Brown and M. S. Puckette, "An efficient algorithm for the calculation of a constant Q transform," J. Acoust. Soc. Am., vol. 92, no. 5, pp. 2698-2701, Nov. 1992.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	B. C. J. Moore, B. R. Glasberg, and T. Baer, "A model for the prediction of thresholds, loudness, and partial loudness," J. Audio Eng. Soc., vol. 45, no. 4, pp. 224-240, Apr. 1997.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	J. C. Brown, "Musical fundamental frequency tracking using a pattern recognition method," J. Acoust. Soc. Am., vol. 92, no. 3, 
pp. 1394-1402, Sep. 1992.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	تار هوشنگ ظريف، همراهی تنبک سيامک بنايي، انتشارات ماهور، سی‌دی شماره 107.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	دستور مقدماتي تار، اجرا هوشنگ ظريف، انتشارات ماهور، سی‌دی شماره 235.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	ردیف دوره عالی استاد علی اکبرخان شهنازی، انتشارات ماهور، مجموعه 6کاستی.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	"صد سال تار،" انتشارات ماهور، کاست شماره 118.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>