﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022921</doi_batch_id><timestamp>14050229212924</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>9</month><day>30</day><year>2018</year></publication_date><journal_volume><volume>16</volume></journal_volume><issue>2</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Design of Floating-Point Multipliers with Normal and Fault-Tolerant Operations Using Reduced-Precision Computin</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Mohajer</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. </given_name><surname>Taghizadeh Firoozjaee</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>30</day><year>2018</year></publication_date><pages><first_page>91</first_page><last_page>100</last_page></pages><doi_data><doi>10.66224/ijece.28325.16.2.91</doi><resource>http://ijece.org/fa/Article/28325</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28325</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28325</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28325</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28325</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28325</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28325</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28325</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. H. Yu, K. Chung, D. Kim, and L. S. Kim, &amp;quot;An energy-efficient mobile vertex processor with multithread expanded VLIW architecture and vertex caches,&amp;quot; IEEE J. of Solid-State Circuits, 
vol. 42, no. 10, pp. 2257-2269, Oct. 2007.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	B. Nicolescu, N. Lgnat, Y. Savaria, and G. Nicolescu, &amp;quot;Analysis of real-time systems sensitivity to transient faults using MicroC kernel,&amp;quot; IEEE Trans. Nuclear Science, vol. 53, no. 4, pp. 1902-1909, Aug. 2006.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. B. Kahng and S. Kang, &amp;quot;Accuracy-configurable adder for approximate arithmetic designs,&amp;quot; in Proc. 49th Annual Design Automation Conf., DAC&amp;#39;12, pp. 820-825, San Francisco, CA, USA, 3-7 Jun. 2012.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Venkataramani, S. T. Chakradhar, K. Roy, and A. Raghunathan, &amp;quot;Computing approximately, and efficiently,&amp;quot; in Proc. Design, Automation &amp;amp; Test in Europe Conf., DATE&amp;#39;15, pp. 748-751, Grenoble, France, 9-13 Mar. 2015.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	IEEE Computer Society (2008), IEEE standard for floating-point arithmetic, IEEE Standard 754-2008.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Ying, F. Tong, D. Nagle, and R. A. Rutenbar, &amp;quot;Reducing power by optimizing the necessary precision/range of floating-point arithmetic,&amp;quot; IEEE Trans. VLSI Systems, vol. 8, no. 3, pp. 273-286, Jun. 2000.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	I. Z. Milovanovic, E. I. Milovanovic, M. K. Stojcev, and M. P. Bekakos, &amp;quot;Orthogonal fault-tolerant systolic arrays for matrix multiplication,&amp;quot; Microelectronics Reliability, vol. 51, no. 3, pp. 711-725, Mar. 2011.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Fazeli, A. Namazi, S. G. Miremadi, and A. Haghdoost, &amp;quot;Operand width aware hardware reuse: a low cost fault-tolerant approach to ALU design in embedded processors,&amp;quot; Microelectronics Reliability, vol. 51, no. 12, pp. 2374-2387, Dec. 2011.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	P. Reviriego, S. Z. Can, C. Eryılmaz, J. A. Maestro, and O. Ergin, &amp;quot;Exploiting processor features to implement error detection in reduced precision matrix multiplications,&amp;quot; Microprocessors and Microsystems, vol. 38, no. 6, pp. 581-584, Aug. 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Mukherjee and A. S. Dhar, &amp;quot;Real-time fault-tolerance with hot-standby topology for conditional sum adder,&amp;quot; Microelectronics Reliability, vol. 55, no. 3-4, pp. 704-712, Feb./Mar. 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Valinataj, &amp;quot;Fault-tolerant carry look-ahead adder architectures robust to multiple simultaneous errors,&amp;quot; Microelectronics Reliability, vol. 55, no. 12, pp. 2845-2857, Dec. 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	D. Lipetz and E. Schwarz, &amp;quot;Self checking in current floating-point units,&amp;quot; in Proc. 20th IEEE Symp. Computer Arithmetic, pp. 73-76, Tubingen, Germany, 25-27 Jul. 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Maniatakos, Y. Makris, P. Kudva, and B. Fleischer, &amp;quot;Exponent monitoring for low-cost concurrent error detection in FPU control logic,&amp;quot; in Proc. 29th IEEE VLSI Test Symp., pp. 235-240, Dana Point, CA, USA, 1-5 May 2011.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Gupta, et al., &amp;quot;Low power probabilistic floating point multiplier design,&amp;quot; in Proc. IEEE Computer Society Annual Symp. VLSI, ISVLSI&amp;#39;11, pp. 182-187, Chennai, India, 4-6 Jul. 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	H. Zhang, W. Zhang, and J. Lach, &amp;quot;A low-power accuracy-configurable floating point multiplier,&amp;quot; in Proc. 32nd IEEE Intl. Conf. Computer Design, ICCD&amp;#39;14, pp. 48-54, Seoul, South Korea, 19-22 Oct. 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Hashemi, R. Iris Bahar, and S. Reda., &amp;quot;DRUM: a dynamic range unbiased multiplier for approximate applications,&amp;quot; in Proc. IEEE Int. Conf. on Comp. Aided Design, ICCAD&amp;#39;15, pp. 418-425, Austin, TX, USA, 2-6 Nov. 2015.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Narayanamoorthy, H. Asghari Moghaddam, Z. Liu, T. Park, and  N. Sung Kim, &amp;quot;Energy-efficient approximate multiplication for digital signal processing and classification applications,&amp;quot; IEEE Trans. on VLSI, vol. 23, no. 6, pp. 1180-1184, Jun. 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	V. Camus, J. Schlachter, C. Enz, M. Gautschi, and F. K. Gurkaynak, &amp;quot;Approximate 32-bit floating-point unit design with 53% power-area product reduction,&amp;quot; in Proc. 42nd European Solid-State Circuits Conf., ESSCIRC&amp;#39;16, pp. 465-468, Lausanne, Switzerland, 12-15 Sept. 2016.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Imani, D. Peroni, and T. Rosing, &amp;quot;CFPU: configurable floating point multiplier for energy-efficient computing,&amp;quot; in Proc. 54th ACM/EDAC/IEEE Design Automation Conf., DAC&amp;#39;17, 6 pp., Austin, TX, USA, 18-22 Jun. 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	P. Yin, C. Wang, W. Liu, and F. Lombardi, &amp;quot;Design and performance evaluation of approximate floating-point multipliers,&amp;quot; in Proc. IEEE Computer Society Annual Symp. VLSI, ISVLSI&amp;#39;16, pp. 296-301, Pittsburgh, PA, USA, 11-13 Jul. 2016.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Sunny, B. K. Mathew, and P. B. Dhanusha, &amp;quot;Area efficient high speed approximate multiplier with carry predictor,&amp;quot; Procedia Technology, vol. 24, pp. 1170-1177, 2016.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. Fathi and H. Nikmehr, &amp;quot;Improving accuracy, area and speed of approximate floating point multiplication using carry prediction,&amp;quot; 
J. of Information Systems and Telecommunication, vol. 5, no. 2, 
pp. 120-127, Apr./Jun. 2017.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	C. Liu, J. Han, and F. Lombardi, &amp;quot;A low-power, high-performance approximate multiplier with configurable partial error recovery,&amp;quot; in Proc. Design, Automation &amp;amp; Test in Europe Conf., DATE&amp;#39;14, 4 pp. , Dresden, Germany, 24-28 Mar. 2014.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	P. Yin, C. Wang, W. Liu, E. E. Swartzlander Jr., and F. Lombardi, &amp;quot;Designs of approximate floating-point multipliers with variable accuracy for error-tolerant applications,&amp;quot; J. of Signal Processing Systems, vol. 90, no. 4, pp. 641-654, Apr. 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	P. J. Eibl, A. D. Cook, and D. J. Sorin, &amp;quot;Reduced precision checking for a floating point adder,&amp;quot; in Proc. 24th IEEE Int. Symp. Defect and Fault Tolerance in VLSI Systems, pp. 145-152, Chicago, IL, USA, 
7-9 Oct. 2009.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	K. Seetharam, L. C. T. Keh, R. Nathan, and D. J. Sorin, &amp;quot;Applying reduced precision arithmetic to detect errors in floating point multiplication,&amp;quot; in Proc. IEEE Pacific Rim Intl. Symp. Dependable Computing, PRDC&amp;#39;13, pp. 232-235, Vancouver, BC, Canada, 2-4 Dec. 2013.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	M. Mohajer and M. Valinataj, &amp;quot;A novel reduced-precision fault-tolerant floating-point multiplier,&amp;quot; Int. J. of Modern Education and Computer Science, vol. 9, no. 6, pp. 17-24, Jun. 2017.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	B. Parhami, Computer Arithmetic, Algorithms and Hardware Designs, 2nd Ed., Oxford University Press, 2009.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Analyzing and Designing a Domain Specific Language to Describe Structure and Movement of Linkages</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>nourollah</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>N.</given_name><surname>Behzadpour</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>30</day><year>2018</year></publication_date><pages><first_page>101</first_page><last_page>110</last_page></pages><doi_data><doi>10.66224/ijece.28326.16.2.101</doi><resource>http://ijece.org/fa/Article/28326</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28326</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28326</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28326</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28326</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28326</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28326</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28326</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. E. Goodman, J. O&amp;#39;Rourke, and L. Guibas, Modeling Motion, pp. 1114-1132, 2004.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Fowler, Domain Specific Languages, Addison-Wesley Professional, 1st Ed., 2010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. P. Tolvanen and S. Kelly, &amp;quot;Metaedit+: defining and using integrated domain-specific modeling languages,&amp;quot; in Proc. of the 
24th ACM SIGPLAN Conf. Companion on Object Oriented Programming Systems Languages and Applications, OOPSLA&amp;#39;09, pp. 819-820, New York, NY, USA, 25-29 Oct. 2009.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Nordmann, N. Hochgeschwender, and S. Wrede, A Survey on Domain-Specific Languages in Robotics, pp. 195-206, Cham: Springer International Publishing, 2014.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Ryman-Kane, RhondaHughes Ryman, Benesh for Ballet, 
1 Ed., 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	B. M. Farnell, Movement Notation Systems, Oxford, 1996.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	O. Teitelbaum, et al., &amp;quot;Eshkol-Wachman movement notation in diagnosis: the early detection of asperger&amp;#39;s syndrome,&amp;quot; in Proc. of the National Academy of Sciences, United States of America, vol. 10132, pp. 11909-11914, 28 Jul. 2004.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Nordmann, N. Hochgeschwender, D. L. Wigand, and S. Wrede, &amp;quot;A survey on domain-specific modeling and languages in robotics,&amp;quot; J. of Software Engineering in Robotics, vol. 7, no. 1, pp. 75-99, 2016.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	E. D. Demaine and J. O&amp;#39;Rourke, Part I. Linkages, Cambridge University Press Cambridge, 2007.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	R. Connelly and E. D. Demaine, Geometry and Topology of Polygonal Linkages, pp. 213-235, 2004.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Schneider, N. Hochgeschwender, and G. K. Kraetzschmar, &amp;quot;Declarative specification of task-based grasping with constraint validation,&amp;quot; in Proc. IEEE/RSJ Int. Conf. on Intelligent Robots and Systems, pp. 919-926, Chicago, IL, USA, 14-18 Sep. 2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	D. Vanthienen, M. Klotzbucher, J. D. Schutter, T. D. Laet, and H. Bruyninckx, &amp;quot;Rapid application development of constrained-based task modelling and execution using domain specific languages,&amp;quot; in Proc. IEEE/RSJ Int. Conf. on Intelligent Robots and Systems, pp. 1860-1866, Tokyo, Japan, 3-7 Nov. 2013.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Frigerio, J. Buchli, and D. G. Caldwell, &amp;quot;Code generation of algebraic quantities for robot controllers,&amp;quot; in Proc. IEEE/RSJ Int. Conf. on Intelligent Robots and Systems, pp. 2346-2351, Vilamoura, Portugal, 7-12 Oct. 2012.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Nordmann, S. Wrede, and J. Steil, &amp;quot;Modeling of movement control architectures based on motion primitives using domain-specific languages,&amp;quot; in Proc. IEEE Int. Conf. on Robotics and Automation, ICRA&amp;#39;15, pp. 5032-5039, Seattle, WA, USA, 26-30 May 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	G. Borghesan, E. Scioni, A. Kheddar, and H. Bruyninckx, &amp;quot;Introducing geometric constraint expressions into robot constrained motion specification and control,&amp;quot; IEEE Robotics and Automation Letters, vol. 1, no. 2, pp. 1140-1147, Jul. 2016.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Power Control and Subchannel Allocation in OFDMA Macrocell-Femtocells Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Davoudi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Rasti</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>30</day><year>2018</year></publication_date><pages><first_page>111</first_page><last_page>120</last_page></pages><doi_data><doi>10.66224/ijece.28327.16.2.111</doi><resource>http://ijece.org/fa/Article/28327</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28327</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28327</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28327</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28327</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28327</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28327</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28327</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	R. Wang, H. Hu, and X. Yang, &amp;quot;Potentials and challenges of C-RAN supporting multi-RATs toward 5G mobile networks,&amp;quot; IEEE Access vol. 2, pp. 1187-1195, 2014.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Abdelnasser and E. Hossain, &amp;quot;Two-tier OFDMA cellular cloud-RAN: joint resource allocation and admission control,&amp;quot; in Proc. IEEE Global Communications Conf., GLOBECOM’15, 7 pp., San Diego, CA, USA, 6-10 Dec. 2015.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Adedoyin and O. Falowo, &amp;quot;Self-organizing radio resource management for next generation heterogeneous wireless networks,&amp;quot; in Proc. IEEE Int. Conf. on Communications. ICC’16, 6 pp., Kuala Lumpur, Malaysia, 22-27 May 2016.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Checko, et al., &amp;quot;Cloud RAN for mobile networks-a technology overview,&amp;quot; IEEE Communications Surveys &amp;amp; Tutorials, vol. 17, no. 1, pp. 405-426, Firstquarter 2015.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	E. Dahlman, G. Mildh, S. Parkvall, J. Peisa, J. Sachs, and Y. Seln, &amp;quot;5G radio access,&amp;quot; Ericsson Review, Jun. 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	V. Chandrasekhar and J. G. Andrews, &amp;quot;Femtocell networks: a survey,&amp;quot; IEEE Commun. Mag., vol. 46, no. 9, pp. 59-67, Sep. 2008.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. Fooladivanda and R. Catherine, &amp;quot;Joint resource allocation and user association for heterogeneous wireless cellular networks,&amp;quot; IEEE Trans. on Wireless Communications, vol. 12, no. 1, pp. 248-257, Jan. 2013.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Peng, Y. Li, J. Jiang, J. Li, and C. Wang, &amp;quot;Heterogeneous cloud radio access networks: a new perspective for enhancing spectral and energy efficiencies,&amp;quot; IEEE Wireless Communications, vol. 21, no. 6, pp. 126-135, Dec. 2014.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	J. Kim and C. D. Ho, &amp;quot;A joint power and subchannel allocation scheme maximizing system capacity in indoor dense mobile communication systems,&amp;quot; IEEE Trans. on Vehicular Technology, vol. 59, no. 9, pp. 4340-4353, Nov. 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	V. N. Ha and B. L. Long, &amp;quot;Fair resource allocation for OFDMA femtocell networks with macrocell protection,&amp;quot; IEEE Trans. on Vehicular Technology, vol. 63, no. 3, pp. 1388-1401, Mar. 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Abdelnasser, E. Hossain, and D. Kim, &amp;quot;Clustering and resource allocation for dense femtocells in a two-tier cellular OFDMA network,&amp;quot; IEEE Trans. on Wireless Communications, vol. 13, no. 3, pp. 1628-1641, Mar. 2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	H. Zhang, C. Jiang, N. C. Beaulieu, X. Chu, X. Wen, and M. Tao, &amp;quot;Resource allocation in spectrum-sharing OFDMA femtocells with heterogeneous services,&amp;quot; IEEE Trans. on Communications, vol. 62, no. 7, pp. 2366-2377, Jul. 2014.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Y. Xu, Y. Hu, Q. Chen, R. Chai, and G. Li, &amp;quot;Distributed resource allocation for cognitive HetNets with cross-tier interference constraint,&amp;quot; in Proc. IEEE Wireless Communications and Networking Conf., WCNC’17, 6 pp., San Francisco, CA, USA, 19-22 Mar. 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	L. Giupponi and C. Ibars, &amp;quot;Distributed interference control in ofdmabased femtocells,&amp;quot; in Proc. 21st Annual IEEE Int. Symp. on Personal, Indoor and Mobile Radio Communications PIMRC’10, pp. 1201-1206, Instanbul, Turkey, 26-30 Sept. 2010.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	N. Lu, Y. Jiang, F. Zheng, and X. You, &amp;quot;Energy efficient power control for the two-tier networks with small cells and massive MIMO,&amp;quot; in Proc. Wireless Communications and Networking Conf. WCNC’16, pp. 127-132, Doha, Qatar, 3-6 Apr. 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	D. T. Ngo, S. Khakurel, and T. Le-Ngoc, &amp;quot;Joint subchannel assignment and power allocation for OFDMA femtocell networks,&amp;quot; IEEE Trans. on Wireless Communications, vol. 13, no. 1, pp. 342-355, Jan. 2014.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. Abdelnasser, E. Hossain, and D. Kim, &amp;quot;Tier-aware resource allocation in ofdma macrocell-small cell networks,&amp;quot; IEEE Trans. on Communications, vol. 63, no. 3, pp. 695-710, Mar. 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	W. L. Winston, Operations Research: Applications and Algorithms, Cengage Learning, 2003.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Abdelnasser and E. Hossain, &amp;quot;Resource allocation for an OFDMA cloud-RAN of small cells overlaying a macrocell,&amp;quot; IEEE Trans. on Mobile Computing, vol. 15, no. 11, pp. 2837-2850, Nov. 2016.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	R. Byers, &amp;quot;A bisection method for measuring the distance of a stable matrix to the unstable matrices,&amp;quot; SIAM J. on Scientific and Statistical Computing, vol. 9, no. 5, pp. 875-881, 1988.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	K. Seong, M. Mohseni, and J. Cioffi, &amp;quot;Optimal resource allocation for OFDMA downlink systems,&amp;quot; in Proc. IEEE Int. Symp. on Information Theory, pp. 1394-1398, Seattle, WA, USA, 9-14 Jul. 2006.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge, 
U. K.: Cambridge Univ. Press, 2004.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	D. W. K. Ng and R. Schober, &amp;quot;Resource allocation and scheduling in multi-cell ofdma systems with decode-and-forward relaying,&amp;quot; IEEE Trans. Wireless Communications, vol. 10, no. 7, pp. 2246-2258, Jul. 2011.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Hyper Spherical Search Optimization Algorithm Based on Chaos Theory</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Kalantari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S.</given_name><surname>Sohrabi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Rashidy Kanan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Karami</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>30</day><year>2018</year></publication_date><pages><first_page>121</first_page><last_page>130</last_page></pages><doi_data><doi>10.66224/ijece.28328.16.2.121</doi><resource>http://ijece.org/fa/Article/28328</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28328</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28328</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28328</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28328</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28328</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28328</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28328</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	X. S. Yang, Nature-Inspired Metaheuristic Algorithms, Luniver Press, 2010.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. A. Ahmadi, &amp;quot;Human behavior-based optimization: a novel metaheuristic approach to solve complex optimization problems,&amp;quot; Neural Computing and Applications, vol. 28, no. 1, pp. 233-244, Dec. 2017.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. H. Gandomi, A. H. Alavi, and S. Talatahari, &amp;quot;Structural optimization using krill herd algorithm,&amp;quot; Swarm Intelligence and Bio-Inspired Computation: Theory and Applications, pp. 335-349, 2013.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	R. Nallakumar, N. Sengottaiyan, and K. S. Priya, &amp;quot;A survey on scheduling and the attributes of task scheduling in the cloud,&amp;quot; Int. J. Adv. Res. Comput. Commun. Eng., vol. 3, no. 10, pp. 8167-8171, Oct. 2014.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	C. W. Tsai and J. J. Rodrigues, &amp;quot;Metaheuristic scheduling for cloud: a survey,&amp;quot; IEEE Systems J., vol. 8, no. 1, pp. 279-291, Mar. 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. Dong, J. Luo, L. Gao, and L. Ge, &amp;quot;A grid task scheduling algorithm based on QoS priority grouping,&amp;quot; in Proc. 5th Int. Conf on Grid and Cooperative Computing, GCC’06, pp. 58-61, Hunan, China, 21-23 Oct. 2006.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	U. Parlitz and L. Junge, &amp;quot;Synchronization of chaotic systems,&amp;quot; 
in Proc. European Control Conf., ECC’99, pp. 4637-4642, Karlsruhe, Germany, 31 Aug.-3 Sept. 1999.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. Yang, G. Li, and G. Cheng, &amp;quot;On the efficiency of chaos optimization algorithms for global optimization,&amp;quot; Chaos, Solitons &amp;amp; Fractals, vol. 34, no. 4, pp. 1366-1375, Nov. 2007.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	B. Alatas, &amp;quot;Chaotic harmony search algorithms,&amp;quot; Applied Mathematics and Computation, vol. 216, no. 9, pp. 2687-2699, Jul. 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. H. Gandomi, G. J. Yun, X. S. Yang, and S. Talatahari, &amp;quot;Chaos-enhanced accelerated particle swarm optimization,&amp;quot; Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 2, pp. 327-340, Feb. 2013.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	B. Alatas, &amp;quot;Chaotic bee colony algorithms for global numerical optimization,&amp;quot; Expert Systems with Applications, vol. 37, no. 8, pp. 5682-5687, Aug. 2010.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. H. Gandomi and X. S. Yang, &amp;quot;Chaotic bat algorithm,&amp;quot; J. of Computational Science, vol. 5, no. 2, pp. 224-232, Mar. 2014.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. Karami, M. J. Sanjari, and G. B. Gharehpetian, &amp;quot;Hyper-spherical search (HSS) algorithm: a novel meta-heuristic algorithm to optimize nonlinear functions,&amp;quot; Neural Computing and Applications, vol. 25, no. 6, pp. 1455-1465, Nov. 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	P. Arena, R. Caponetto, L. Fortuna, A. Rizzo, and M. La Rosa, &amp;quot;Self-organization in nonrecurrent complex systems,&amp;quot; International J. of Bifurcation and Chaos, vol. 10, no. 5, pp. 1115-1125, May 2000.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	B. Alatas, E. Akin, and A. B. Ozer, &amp;quot;Chaos embedded particle swarm optimization algorithms,&amp;quot; Chaos, Solitons &amp;amp; Fractals, 
vol. 40, no. 4, pp. 1715-1734, May 2009.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	E. N. Lorenz, &amp;quot;Deterministic nonperiodic flow,&amp;quot; J. of the Atmospheric Sciences, vol. 20, no. 2, pp. 130-141, Mar. 1963.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	L. Dos Santos Coelho and V. C. Mariani, &amp;quot;Use of chaotic sequences in a biologically inspired algorithm for engineering design optimization,&amp;quot; Expert Systems with Applications, vol. 34, no. 3, pp. 1905-1913, Apr. 2008.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. Das and P. N. Suganthan, Problem Definitions and Evaluation Criteria for CEC 2011 Competition on Testing Evolutionary Algorithms on Real World Optimization Problems, Technical Report, Dec. 2010.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Proposing a New Method for Acquiring Skills in Reinforcement Learning with the Help of Graph Clustering</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Davoodabadi Farahani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>N.</given_name><surname>Mozayani</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>30</day><year>2018</year></publication_date><pages><first_page>131</first_page><last_page>141</last_page></pages><doi_data><doi>10.66224/ijece.28329.16.2.131</doi><resource>http://ijece.org/fa/Article/28329</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28329</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28329</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28329</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28329</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28329</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28329</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28329</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. G. Barto and S. Mahadevan, &amp;quot;Recent advances in hierarchical reinforcement learning,&amp;quot; Discrete Event Dynamic Systems, vol. 13, no. 4, pp. 341-379, Jan. 2003.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. S. Sutton and A. G. Barto, &amp;quot;Reinforcement learning: an introduction,&amp;quot; IEEE Trans. on Neural Networks, vol. 9, no. 5, pp. 1054-1054, Sep. 1998.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	W. Moerman, Hierarchical Reinforcement Learning: Assignment of Behaviours to Subpolicies by Self-Organization, Ph.D Thesis, Cognitive Artificial Intelligence, Utrecht University, 2009.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Pfau, Plans as a Means for Guiding Reinforcement Learner, Master Thesis, Department of Information Systems, University of Melbourn, 2008.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	T. Mann and S. Mannor, &amp;quot;Scaling up approximate value iteration with options: better policies with fewer iterations,&amp;quot; in Proc. of the 31st Int. Conf. on Machine Learning, vol. 1, pp. 127-137, Beijing, China, 21-26 Jun. 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. McGovern and R. S. Sutton, Macro-Actions in Reinforcement Learning: An Empirical Analysis, University of Massachusetts, Department of Computer Science, Tech. Rep, pp. 98-70, 1998.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	N. K. Jong, T. Hester, and P. Stone, &amp;quot;The utility of temporal abstraction in reinforcement learning,&amp;quot; in Proc. of the 7th Int. Joint Conf. on Autonomous Agents and Multiagent Systems, vol. 1, pp. 299-306, Estoril, Portugal, 12-16 May 2008.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. S. Sutton, D. Precup, and S. Singh, &amp;quot;Between MDPs and semi-MDPs: a framework for temporal abstraction in reinforcement learning,&amp;quot; Artificial Intelligence, vol. 112, no. 1-2, pp. 181-211, Aug. 1999.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	T. Dietterich, &amp;quot;An overview of MAXQ hierarchical reinforcement learning,&amp;quot; Abstraction, Reformulation, and Approximation, pp. 26-44, 2000.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Stolle, Automated Discovery of Options in Reinforcement Learning, M.Sc Thesis, McGill University, 2004.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. McGovern and A. G. Barto, &amp;quot;Automatic discovery of subgoals in reinforcement learning using diverse density,&amp;quot; in Proc. Int. Workshop Conf. Machine Learning, pp. 361-368, 28 Jun-1 Jul. 2001.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Mannor, I. Menache, A. Hoze, and U. Klein, &amp;quot;Dynamic abstraction in reinforcement learning via clustering,&amp;quot; in Proc. of the 21st Int. Conf. on Machine Learning, p. 71, Banff, Alberta, Canada, 4-8 Jul. 2004.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	O. Simsek and A. Barto, &amp;quot;Identifying useful subgoals in reinforcement learning by local graph partitioning,&amp;quot; in Proc. of the 22nd Int. Conf. on Machine Learning, pp. 816-823, Bonn, Germany, 7-11 Aug. 2005.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Jonsson and A. Barto, &amp;quot;A causal approach to hierarchical decomposition of factored MDPs,&amp;quot; in Proc. of the 22nd Int. Conf. on Machine Learning, pp. 401-408, Bonn, Germany, 7-11 Aug. 2005.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	N. Mehta, S. Ray, P. Tadepalli, and T. Dietterich, &amp;quot;Automatic discovery and transfer of MAXQ hierarchies,&amp;quot; in Proc. of the 25th Int. Conf. on Machine Learning, pp. 648-655, Helsinki, Finland, 5-9 Jul. 2008.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. Zang, P. Zhou, D. Minnen, and C. Isbell, &amp;quot;Discovering options from example trajectories,&amp;quot; in Proc. of the 26th Annual Int. Conf. on Machine Learning, pp. 1217-1224, Montreal, Quebec, Canada, 14-18 Jun. 2009.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	I. Menache, S. Mannor, and N. Shimkin, &amp;quot;Q-cut-dynamic discovery of sub-goals in reinforcement learning,&amp;quot; in Proc. 13th European Conf. on Machine Learning, ECML&amp;#39;02, pp. 187-195, 19-23 Aug. 2002.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	O. Simsek, Behavioral Building Blocks for Autonomous Agents: Description, Identification, and Learning, Ph.D. Thesis, Department of Computer Science, University of Massachusetts Amherst, 2008.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	V. Mathew, K. Peeyush, and B. Ravindran, &amp;quot;Abstraction in reinforcement learning in terms of metastability,&amp;quot; in Proc. of the 10th European Workshop on Reinforcement Learning, EWRL&amp;#39;12, pp. 1-14, 2012.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	C. C. Chiu and V. W. Soo, &amp;quot;Automatic complexity reduction in reinforcement learning,&amp;quot; Computational Intelligence, vol. 26, no. 1, pp. 1-25, Feb. 2010.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. H. Metzen and F. Kirchner, &amp;quot;Incremental learning of skill collections based on intrinsic motivation,&amp;quot; Frontiers in Neurorobotics, vol. 7, p. 11, Jan. 2013.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	P. Bacon and D. Precup, &amp;quot;Using label propagation for learning temporally abstract actions in reinforcement learning,&amp;quot; in Proc. of the Workshop on Multiagent Interaction Networks, pp. 357-368, 2013.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. Davoodabadi and H. Beigy, &amp;quot;A new method for discovering subgoals and constructing options in reinforcement learning,&amp;quot; in Proc. IICAI, pp. 441-450, 2011.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	O. Simsek and A. G. Barto, &amp;quot;Skill characterization based on betweenness,&amp;quot; in Proc. 21th Int. Conf. on Neural Information Processing Systems, NIPS&amp;#39;08, pp. p.1497-1504, Vancouver, Canada, 8-10 Dec. 2008.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	A. A. Rad, M. Hasler, and P. Moradi, &amp;quot;Automatic skill acquisition in reinforcement learning using connection graph stability centrality,&amp;quot; in Proc. of 2010 IEEE Int. Symp. on Circuits and Systems, ISCAS&amp;#39;10, pp. 697-700, Paris, France, 30 May-2 Jun. 2010.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	L. J. Lin, &amp;quot;Self-improving reactive agents based on reinforcement learning, planning and teaching,&amp;quot; Machine Learning, vol. 8, no. 3-4, pp. 293-321, May 1992.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	R. S. Sutton, D. Precup, and S. Singh, &amp;quot;Intra-option learning about temporally abstract actions,&amp;quot; in Proc. of the Fifteenth Int. Conf. on Machine Learning, pp. 556-564, 1998.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	M. E. J. Newman and M. Girvan, &amp;quot;Finding and evaluating community structure in networks,&amp;quot; Physical Review E, vol. 69, no. 2, p. 026113, Feb. 2004.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	U. N. Raghavan, R. Albert, and S. Kumara, &amp;quot;Near linear time algorithm to detect community structures in large-scale networks,&amp;quot; Physical Review E, vol. 76, no. 3, p. 036106, Sep. 2007.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	M. E. J. Newman, &amp;quot;Fast algorithm for detecting community structure in networks,&amp;quot; Physical Review E, vol. 69, no. 6, p. 066133, Jun. 2004.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	K. Merrick, Modelling Motivation for Experience-Based Attention Focus in Reinforcement Learning, Ph.D. Thesis, School of Information Technologies, the University of Sydney, 2007.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	M. Davoodabadi and N. Mozayani, &amp;quot;Automatic construction and evaluation of options in reinforcement learning,&amp;quot; Submitted in Artificial Intelligence, https://www.journals.elsevier.com/artificial-intelligence/</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	A. G. Barto, S. Singh, and N. Chentanez, &amp;quot;Intrinsically motivated learning of hierarchical collections of skills,&amp;quot; in Proc. of the 3rd Int. Conf. on Development and Learning, ICDL’04, pp. 112-119, Salk Institute, San Diego, USA, Oct. 2004.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	J. Murata, &amp;quot;Controlled use of subgoals in reinforcement learning,&amp;quot; Robotics, Automation and Control, pp. 167-182, 2008.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Data Offloading to Femtocell with In-Band Full Duplex Deployment</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Mollashahi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Mehrjoo</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Abiri</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>30</day><year>2018</year></publication_date><pages><first_page>142</first_page><last_page>148</last_page></pages><doi_data><doi>10.66224/ijece.28330.16.2.142</doi><resource>http://ijece.org/fa/Article/28330</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28330</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28330</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28330</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28330</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28330</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28330</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28330</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	V. Chandrasekhar, J. G. Andrews, and A. Gatherer, "Femtocell networks: a survey," IEEE Communications Magazine, vol. 46, 
no. 9, pp. 59-67, Sept. 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. Kim, H. Lee, and D. Hong, "A survey of in-band full-duplex transmission: from the perspective of PHY and MAC layers," IEEE Communications Surveys &amp; Tutorials, vol. 17, no. 4, pp. 2017-2046, Feb. 2015.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. I. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti, "Achieving single channel, full duplex wireless communication," in Proc. of 
the ACM 16th Annual Int. Conf. on Mobile Computing and Networking, 12 pp., Chicago, Illinois, USA, 20-24 Sept. 2010.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	E. Aryafar, M. A. Khojastepour, K. Sundaresan, S. Rangarajan, and M. Chiang, "MIDU: enabling MIMO full duplex," in Proc. of 
the ACM 18th Annual Int. Conf. on Mobile Computing and Networking, pp. 257-268, Istanbul, Turkey, 22-26 Aug. 2012.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	K. S. Munasinghe, I. Elgendi, A. Jamalipour, and D. Sharma, "Traffic offloading 3-tiered SDN architecture for denseNets," IEEE Network, vol. 31, no. 3, pp. 56-62, May 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	D. C. Oh, H. C. Lee, and Y. H. Lee, "Power control and beamforming for femtocells in the presence of channel uncertainty," IEEE Trans. on Vehicular Technology, vol. 60, no. 6, pp. 2545-2554, Jun. 2011.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	T. M. Nguyen, T. Q. Queki, and H. Shin, "Opportunistic interference alignment in MIMO femtocell networks," in Proc. IEEE Int. Symp. on Information Theory Proc., ISIT’12, pp. 2631-2635, Cambridge, MA, USA, 1-6 Jul. 2012.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. Zarbouti, G. Tsoulos, and G. Athanasiadou, "4G multicell systems with in-band full duplex relays: using beamforming to 
lower self-interference and/or transmitted powers," in Proc. IEEE 81st. Vehicular Technology Conf., VTC Spring’15, 6 pp., Glasgow, UK, 11-14 May 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	DUPLO, D4.1.1. Performance of Full-Duplex Systems, Jan. 2014. Available: http://www.fp7-duplo.eu/index.php/deliverables.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Michanan, R. Dewri, and M. J. Rutherford, "Understanding the power-performance tradeoff through Pareto analysis of live performance data," in Proc. IEEE Int. Green Computing Conf., IGCC’14, 8 pp., Dallas, TX, USA, 3-5 Nov. 2014.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Scheduling of Modules in Fog Computing by Knapsack-Based Symbiotic Organisms Search</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>D.</given_name><surname>Rahbari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Nickray</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>30</day><year>2018</year></publication_date><pages><first_page>149</first_page><last_page>156</last_page></pages><doi_data><doi>10.66224/ijece.28331.16.2.149</doi><resource>http://ijece.org/fa/Article/28331</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28331</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28331</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28331</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28331</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28331</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28331</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28331</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	H. Gupta, A. V. Dastjerdi, S. K. Ghosh, and R. Buyya, &amp;quot;IFogsim: a toolkit for modeling and simulation of resource management techniques in internet of things, edge and fog computing environments,&amp;quot; Software: Practice and Experience, vol. 47, no. 9, pp. 1275-1296, Jun. 2017.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Aazam, M. St-Hilaire, C. H. Lung, and I. Lambadaris, &amp;quot;Pre-fog: Iot trace based probabilistic resource estimation at fog,&amp;quot; in Proc. 13th IEEE Annual. Consumer Communications and Networking Conf., CCNC&amp;#39;16, pp. 12-17, Jan. 2016.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. M. Rahmani, T. N. Gia, B. Negash, A. Anzanpour, I. Azimi, M. Jiang, and P. Liljeberg, &amp;quot;Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach,&amp;quot; Future Generation Computer Systems, vol. 78, no. 2, pp. 641-658, Feb. 2017.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, &amp;quot;The case for vm-based cloudlets in mobile computing,&amp;quot; IEEE Pervasive Computing, vol. 8, no. 4, pp. 14-23, Oct. 2009.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Gupta and S. P. Ghrera, &amp;quot;Trust and deadline aware scheduling algorithm for cloud infrastructure using ant colony optimization,&amp;quot; in Proc. IEEE Int. Conf. on Innovation and Challenges in Cyber Security, ICICCS-INBUSH&amp;#39;16, pp. 187-191, Noida, India, 3-5 Feb. 2016.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. A. Rodriguez and R. Buyya, &amp;quot;Deadline based resource provisioning and scheduling algorithm for scientific workflows on clouds,&amp;quot; IEEE Trans. on Cloud Computing, vol. 2, no. 2, pp. 222-235, Apr. 2014.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Lv, X. Wang, M. Huang, H. Cheng, and F. Li, &amp;quot;Solving 0-1 knapsack problem by greedy degree and expectation efficiency,&amp;quot; Applied Soft Computing, vol. 41, pp. 94-103, Apr. 2016.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Y. Cheng and D. Prayogo, &amp;quot;Symbiotic organisms search: a new metaheuristic optimization algorithm,&amp;quot; Computers &amp;amp; Structures, 
vol. 139, vol. 139, pp. 98-112, Jul. 2014.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. A. Rodriguez and R. Buyya, &amp;quot;A taxonomy and survey on scheduling algorithms for scientific workflows in iaas cloud computing environments,&amp;quot; Concurrency and Computation: Practice and Experience, vol. 29, no. 8, pp. 1-23, Dec. 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. E. Frincu, S. Genaud, and J. Gossa, &amp;quot;Comparing provisioning and scheduling strategies for workflows on clouds,&amp;quot; in Proc. IEEE 27th Int. Parallel and Distributed Processing Symp. Workshops and PhD Forum, IPDPSW&amp;#39;13, pp. 2101-2110, Cambridge, MA, USA, 20-24 May. 2013.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Malawski, K. Figiela, M. Bubak, E. Deelman, and J. Nabrzyski, &amp;quot;Scheduling multilevel deadline-constrained scientific workflows on clouds based on cost optimization,&amp;quot; Scientific Programming, vol. 2015, pp. 1-13, Jan. 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. J. Durillo and R. Prodan, &amp;quot;Multi-objective workflow scheduling in amazon ec2,&amp;quot; Cluster Computing, vol. 17, no. 2, pp. 169-189, Jun. 2014.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	D. Poola, K. Ramamohanarao, and R. Buyya, &amp;quot;Fault-tolerant workflow scheduling using spot instances on clouds,&amp;quot; Procedia Computer Science, vol. 29, pp. 523-533, Jun. 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	X. Zhu, J. Wang, H. Guo, D. Zhu, L. T. Yang, and L. Liu, &amp;quot;Fault-tolerant scheduling for real-time scientific workflows with elastic resource provisioning in virtualized clouds,&amp;quot; IEEE Trans. on Parallel and Distributed Systems, vol. 27, no. 12, pp. 3501-3517, Mar. 2016.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	L. F. Bittencourt, J. Diaz-Montes, R. Buyya, O. F. Rana, and M. Parashar, &amp;quot;Mobility-aware application scheduling in fog computing,&amp;quot; IEEE Cloud Computing, vol. 4, no. 2, pp. 26-35, Apr. 2017.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	X. Q. Pham and E. N. Huh, &amp;quot;Towards task scheduling in a cloud-fog computing system,&amp;quot; in Proc. 18th Asia-Pacific IEEE Network Operations and Management Symp., APNOMS&amp;#39;, 4 pp., Kanazawa, Japan, 5-7 Oct. 2016.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Y. Sun, T. Dang, and J. Zhou, &amp;quot;User scheduling and cluster formation in fog computing based radio access networks,&amp;quot; in Proc. IEEE Int. Conf. on Ubiquitous Wireless Broadband ICUWB, 4 pp., Nanjing, China, 16-19 Oct. 2016.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	X. Chen and L. Wang, &amp;quot;Exploring fog computing-based adaptive vehicular data scheduling policies through a compositional formal methodpepa,&amp;quot; IEEE Communications Letters, vol. 21, no. 4, pp. 745-748, Jan. 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	H. E. Zahaf, A. E. H. Benyamina, R. Olejnik, and G. Lipari, &amp;quot;Energy efficient scheduling for moldable real-time tasks on heterogeneous computing platforms,&amp;quot; J. of Systems Architecture, vol. 74, pp. 46-60, Mar. 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Bitam, S. Zeadally, and A. Mellouk, &amp;quot;Fog computing job scheduling optimization based on bees swarm,&amp;quot; Enterprise Information Systems, vol. vol. 12 no. 4, pp. 373-397, Apr. 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	T. Wang, X. Wei, C. Tang, and J. Fan, &amp;quot;Efficient multi-tasks scheduling algorithm in mobile cloud computing with time constraints,&amp;quot; Peer-to-Peer Networking and Applications, 11, no. 4, pp. 793-807, Jul. 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	F. Lao, X. Zhang, and Z. Guo, &amp;quot;Parallelizing video transcoding using map-reduce-based cloud computing,&amp;quot; in Proc. IEEE Int.Symp.on Circuits and Systems, ISCAS&amp;#39;12, pp. 2905-2908, Seoul, South Korea, 20-23 May 2012.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. A. Rodriguez and R. Buyya, &amp;quot;A responsive knapsack-based algorithm for resource provisioning and scheduling of scientific workflows in clouds,&amp;quot; in Proc. 44th IEEE Int. Conf. on Parallel Processing, ICPP&amp;#39;15, pp. 839-848, Beijing, China, 1-4 Sept. 2015.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. Rahim, et al., &amp;quot;Towards multiple knapsack problem approach for home energy management in smart grid,&amp;quot; in Proc. 18th IEEE Int. Conf. on Network-Based Information Systems, NBiS&amp;#39;15, pp. 48-52, Taipei, Taiwan, 2-4 Sept. 2015.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. Chen, J. Wu, and Z. Lu, &amp;quot;A cloud computing resource scheduling policy based on genetic algorithm with multiple fitness,&amp;quot; in Proc. 12th IEEE Int. Conf. on Computer and Information Technology, CIT&amp;#39;12, pp. 177-184, Chengdu, China, 27-29 Oct. 2012.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Q. Ni, A. B. Garcia Hernando, and I. P. de la Cruz, &amp;quot;The elderlys independent living in smart homes: a characterization of activities and sensing infrastructure survey to facilitate services development,&amp;quot; Sensors, vol. 15, no. 5, pp. 11312-11362, May 2015.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De Rose, and R. Buyya, &amp;quot;Cloudsim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms,&amp;quot; Software: Practice and Experience, vol. 41, no. 1, pp. 23-50, Aug. 2011.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Self-Learning Single Image Super-Resolution by Considering Consistency in Adjacent Pixels</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Habibi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Ahmadyfard</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>hassanpour</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>30</day><year>2018</year></publication_date><pages><first_page>157</first_page><last_page>163</last_page></pages><doi_data><doi>10.66224/ijece.28332.16.2.157</doi><resource>http://ijece.org/fa/Article/28332</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28332</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28332</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28332</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28332</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28332</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28332</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28332</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Bevilacqua, A. Roumy, C. Guillemot, and M. Morel, "Single-image super-resolution via linear mapping of interpolated self-examples," IEEE Trans. on Image Processing, vol. 23, no. 12, pp. 5334-5347, Dec. 2014.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	T. S. Huang and R. Y. Tsai, "Multiframe image restoration and registration," Advances in Computer Vision and Image Processing, vol. 1, no. 7, pp. 317-339, Apr. 1984. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Irani and S. Peleg, "Super resolution from image sequences," in Proc. 10th Int. Conf. on Pattern Recognition, vol. 2, pp. 115-120, Jun. 1990. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. W. Hwang and H. S. Lee, "Adaptive image interpolation based on local gradient features," IEEE Signal Processing Letters, vol. 11, no. 3, pp. 359-362, Feb. 2004. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. Quang Luong, A. Ledda, and W. Philips, "Non-local image interpolation," in Proc. IEEE Int. Conf. on Image Processing ICIP'06, pp. 693-696, Atlanta, GA, USA, 8-11 Oct. 2006. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. Cha and S. Kim, "Edge-forming methods for color image zooming," IEEE Trans. Image Processing, vol. 15, no. 8, pp. 2315-2323, Aug. 2006. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. Cha and S. Kim, "PDE-based interpolation for image super resolution," International Journal of Future Generation Communication and Networking, vol. 1, pp. 214-219, Dec. 2007. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	H. Kim, Y. Cha, and S. Kim, "Curvature interpolation method for image zooming," IEEE Trans. on Image Processing, vol. 20, no. 7, pp. 1895-1903, Jul. 2011. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	F. Malgouyres and F. Guichard, "Edge direction preserving image zooming: a mathematical and numerical analysis," SIAM J. on Numerical Analysis, vol. 39, no. 1, pp. 1-37, Nov. 2001. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Belahmidi and F. Guichard, "A partial differential equation approach to image zoom," in Proc. Int. Conf. on Image Processing, ICIP'04, pp. 649-652, Singapore, Singapore, 24-27 Oct. 2004. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. G. Chang, Z. Cvetkovic, and M. Vetterli, "Locally adaptive wavelet-based image interpolation," IEEE Trans. on Image Processing, vol. 15, no. 6, pp. 1471-1485, Jun. 2006. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	G. Freedman and R. Fattal, "Image and video upscaling from local self-examples," ACM Trans. on Graphics, vol. 28, no. 3, pp. 1-10, Apr. 2010. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. Yang, Z. Lin, and S. Cohen, "Fast image super-resolution based on in-place example regression," in Proc. IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, CVPR'13, pp. 1059_1066, Portland, OR, USA, 23-28 Jun. 2013. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	D. Glasner, S. Bagon, and M. Irani, "Super-resolution from a single image," in Proc. IEEE 12th Int. Conf. on Computer Vision, ICCV'09, pp. 349-356, Kyoto, Japan, 29 Sept.-2 Oct. 2009. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	C. Y. Yang, J. B. Huang, and M. H. Yang, "Exploiting self-similarities for single frame super-resolution," in  Proc. Asian Conf. on Computer Vision, ACCV'10, vol. 3, pp. 497-510, Queenstown, New Zealand, 8-12 Nov. 2010. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. C. Yang, C. H. Wang, T. Y. Hu, and Y. C. F. Wang, "Learning context-aware sparse representation for single image super-resolution," in Proc. IEEE Int. Conf. on Image Processing, ICIP'11, pp. 1349-1352, Brussels, Belgium, 11-14 Sept. 2011. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	W. T. Freeman, T. R. Jones, and E. C. Pasztor, "Example-based superresolution," IEEE Comput. Graph. Appl., vol. 22, no. 2, pp. 56-65, Apr. 2002. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	H. Chang, D. Y. Yeung, and Y. Xiong, "Super-resolution through neighbor embedding," in Proc. IEEE Conf. Comput. Vision and Pattern Recognition, pp. 275-282, Washington, DC, USA, 27 Jun.-2 Jul. 2004. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	N. Suetake, M. Sakano, and E. Uchino, "Image super-resolution based on local self-similarity," Optical Review, vol. 15, no. 11, pp. 26-30, Jan. 2008. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. C. Yang and Y. C. F. Wang, "A self-learning approach to single image super-resolution," IEEE Trans. on Multimedia, vol. 15, no. 3, pp. 498-508, Apr. 2013. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. Yang, J. Wright, T. S. Huang, and Y. Ma, "Image super-resolution as sparse representation of raw image patches," in Proc. IEEE Conf. Comput. Vision and Pattern Recognition, CVPR'08, pp. 2861-2873, Anchorage, AK, USA, 23-28 Jun. 2008. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	J. Yang, J. Wright, T. Huang, and Y. Ma, "Image super-resolution via sparse representation," IEEE Trans. Image Process., vol. 19, no. 11, pp. 2861-2873, Nov. 2010. </unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. C. Yang, C. T. Chu, and Y. C. F. Wang, "Learning sparse image representation with support vector regression for single-image super-resolution," in Proc. IEEE Int. Conf. Image Processing, ICIP'10, pp. 1973-1976, Hong Kong, China, 26-29 Sept. 2010. </unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	K. I. Kim and Y. Kwon, "Single-image super-resolution using sparse regression and natural image prior," IEEE Trans. Pattern Anal. Mach. Intell., vol. 32, no. 6, pp. 1127-1133, Jun. 2010. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. Protter and M. Elad, "Image sequence denoising via sparse and redundant representations," IEEE Trans. Image Process., vol. 18, no. 1, pp. 27-35, Jan. 2009. </unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>