﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022921</doi_batch_id><timestamp>14050229212923</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>11</month><day>17</day><year>2019</year></publication_date><journal_volume><volume>17</volume></journal_volume><issue>3</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Cautious Classification of Hyper Rectangular, Hyper Circular, and Hyper Oval with a Maximum Symmetric Margin Relative to the Data Edge</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Yahya</given_name><surname>Forghani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Hejazi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Sadoghi Yazdi</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2019</year></publication_date><pages><first_page>171</first_page><last_page>189</last_page></pages><doi_data><doi>10.66224/ijece.28708.17.3.171</doi><resource>http://ijece.org/fa/Article/28708</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28708</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28708</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28708</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28708</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28708</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28708</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28708</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. S. Lobo, L. Vandenberghe, S. Boyd, and H. Lebert, "Applications of second-order cone programming," Linear Algebra and Its Applications, vol. 284, no. 1-3, pp. 193-228, Nov. 1998.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. S. Bazaraa, H. D. Sherali, and C. M. Shetty, Nonlinear Programming: Theory and Algorithms, John Wiley &amp; Sons, 2013.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	G. Chechik, G. Heitz, G. Elidan, P. Abbeel, and D. Koller, "Max-margin classification of data with absent features," J. of Machine Learning Research, vol. 9, no. pp. 1-21, Jan. 2008.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Kambar, Generating Synthetic Data by Morphing Transformation for Handwritten Numeral Recognition (with V-SVM), Concordia University, 2005.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Simard, D. Steinkraus, and J. Platt, "Best practices for convolutional neural networks applied to visual document analysis," in Proc. 7th Int. Conf. on Document Analysis and Recognition, pp. 958 963, Edinburgh, UK, 6-6 Aug. 2003.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	G. Loosli, A. S. Canu, and L. Bottou, Large-Scale Kernel Machines, Massachusetts: MIT Press, 2007.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	G. M. Fung, O. L. Mangasarian, and J. W. Shavlik, "Knowledge-based support vector machine classifiers," in Proc. of the 15th Int. Conf. on Neural Information Processing Systems, NIPS'02, pp. 537-544, Vancouver, Canada, 9-14 Dec. 2002.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	V. Jeyakumar, J. Ormerod, and R. S. Womersley, "Knowledge-based semidefinite linear programming classifiers," Optimisation Methods Software, vol. 21, no. 5, pp. 693-706, 2006.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	E. Carrizosa, J. Gordillo, and F. Plastria, Classification Problems with Imprecise Data through Separating Hyperplanes, MOSI Department, Vrije Universiteit Brussel MOSI/33, 2007.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	T. B. Trafalis and R. C. Gilbert, "Robust support vector machines 
for classification and computational issues," Optimisation Methods Software, vol. 22, no. 1, pp. 187-198, 2007.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	T. B. Trafalis and R. C. Gilbert, "Robust classification and regression using support vector machines," European J. of Operational Research, vol. 173, no. 3, pp. 893-909, 16 Sept. 2006.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	H. Xu, Robust Decision Making and Its Applications in Machine Learning, McGill University, 2009.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. Xu, C. Caramanis, and S. Mannor, "Robustness and regularization of support vector machines," J. of Machine Learning Research, vol. 10, pp. 1485-1510, Jul. 2009.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Y. Forghani and H. Sadoghi, "Comment on robustness and regularization of support vector machines by H. Xu et al. (J. of machine learning research, vol. 10, pp. 1485-1510, 2009)," The J. of Machine Learning Research, vol. 14, no. 1, pp. 3493-3494, Nov. 2013.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Y. Shi, Y. Tian, G. Kou, Y. Peng, and J. Li, Optimization Based Data Mining: Theory and Applications, Springer Science &amp; Business Media, 2011.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	H. Xu, C. Caramanis, S. Manor, and S. Yun, "Risk sensitive robust support vector machines," in Proc. of the 48th IEEE Conf. on Decision and Control, held jointly with the 2009 28th Chinese Control Conf., CDC/CCC'09, pp. 4655-4661, Shanghai, China, 15-18 Dec. 2009.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	H. Xu, S. Mannor, and C. Caramanis, "Robustness, risk, and regularization in support vector machines," J. of Machine Learning Research, vol. 10, pp. 1485-1510, Dec. 2009.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	H. Xu and S. Mannor, "Robustness and generalization," Machine Learning, vol. 86, no. 3, pp. 391-423, Mar. 2012.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	W. An and Y. Sun, "PKSVR: a novel prior knowledge-based support vector regression," Asian J. of Information Technology, vol. 4, 
no. 11, pp. 978-980, 2005.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	B. Liu, Y. Xiao, L. Cao, and P. S. Yu, "One-class-based uncertain data stream learning," in Proc. of the 11th SIAM Int. Conf. on Data Mining, pp. 992-1003, Mesa, AZ, USA, 28-30 Apr. 2011.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. B. Pothin and C. Richard, "Incorporating prior information into support vector machines in the form of ellipsoidal knowledge sets," in Proc. 14 th IEEE European Signal Processing Conf., EUSIPCO'06, 4 pp., Florence, Italy, 4-8 Sept. 2006.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Q. V. Le, A. J. Smola, and T. Gartner, "Simpler knowledge-based support vector machines," in Proc. of the 23rd Int. Conf. on Machine Learning, pp. 521-528, Pittsburgh, PA, USA, 25-29 Jun. 2006.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	C. H. Teo, et al., Convex learning with invariances, in Advances in Neural Information Processing Systems, 2008.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. B. Ji, J. H. Pang, and H. J. Qiu, "Support vector machine for classification based on fuzzy training data," Expert Systems with Applications, vol. 37, no. 4, pp. 3495-3498, Apr. 2010.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	L. Yang and H. Dong, "Support vector machine with truncated pinball loss and its application in pattern recognition," Chemometrics Intelligent Laboratory Systems, vol. 177, pp. 89-99, 15 Jun. 2018.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	B. B. Gao and J. J. Wang, A Fast and Robust TSVM for Pattern Classification, arXiv preprint arXiv:.05406, 2017.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	J. Chen, T. Takiguchi, and Y. Ariki, "A robust SVM classification framework using PSM for multi-class recognition," EURASIP J. on Image Video Processing, vol. 2015, no. 7, 12 pp., Dec. 2015.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	S. Katsumata and A. Takeda, "Robust cost sensitive support vector machine," in Proc. of the 18th Int. Conf. on Artificial Intelligence and Statistics (AISTATS), JMLR: W&amp;CP, vol. 38, no. 18, pp.434-443, 2015.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	C. Tzelepis, V. Mezaris, and I. Patras, "Linear maximum margin classifier for learning from uncertain data," IEEE Trans. on Pattern Analysis Machine Intelligence, vol. 40, no. 12, pp. 2948 -2962, Dec. 2017.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	Y. Forghani and H. S. Yazdi, "Fuzzy min-max neural network for learning a classifier with symmetric margin," Neural Processing Letters, vol. 42, no. 2, pp. 317-353, Oct. 2015.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	S. Jing and L. Yang, "A robust extreme learning machine framework for uncertain data classification," The J. of Supercomputing, pp. 1-27, 2018. https://doi.org/10.1007/s11227-018-2430-6</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	E. Adeli, et al., "Semi-supervised discriminative classification robust to sample-outliers and feature-noises," IEEE Trans. on Pattern Analysis Machine Intelligence, vol. 41, no. 2, pp. 515-522, Feb. 2018.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	W. Y. Cheng and C. F. Juang, "An incremental support vector machine-trained TS-type fuzzy system for online classification problems," Fuzzy Sets Systems, vol. 163, no. 1, pp. 24-44, 16 Jan. 2011.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	MOSEK, Available: https://www.mosek.com/.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	D. C. Montgomery, Design and Analysis of Experiments, John Wiley &amp; Sons, 2017.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	J. Demsar, "Statistical comparisons of classifiers over multiple data sets," J. of Machine Learning Research, vol. 7, no. 1, pp. 1-30, Jan. 2006.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	O. T. Yildiz and E. Alpaydin, "Ordering and finding the best of K&gt;2 supervised learning algorithms," IEEE Trans. on Pattern Analysis Machine Intelligence, vol. 28, no. 3, pp. 392-402, Mar. 2006.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	B. M. Marlin, Missing Data Problems in Machine Learning, Department of Computer Science, University of Toronto, 2008.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	A. P. Dempster, N. M. Laird, and D. B. Rubin, "Maximum likelihood from incomplete data via the EM algorithm," J. of the Royal Statistical Society. Series B, vol. 39, no. 1, pp. 1-38, 1997.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	D. B. Rubin, "Multiple imputation after 18+ years," J. of the American Statistical Association, vol. 91, no. 434, pp. 473-489, Jun. 1996.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	P. K. Shivaswamy, C. Bhattacharyya, and A. J. Smola, "Second order cone programming approaches for handling missing and uncertain data," J. of Machine Learning Research, vol. 7, pp. 1283-1314, Jul. 2006.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	S. Garcia, A. Fernandez, J. Luengo, and F Herrera., "Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining: experimental analysis of power," Information Sciences, vol. 180, no. 10, pp. 2044-2064, 15 May 2010.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	D. J. Sheskin, Handbook of Parametric and Nonparametric Statistical Procedures, Florida, US: Chapman &amp; Hall, 2007.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	H. Finner, "On a monotonicity problem in step-down multiple test procedures," J. of the American Statistical Association, vol. 88, 
no. 423, pp. 920-923, Sept. 1993.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	Y. Forghani, S. Effati, H. Sadoughi Yazdi, and R. Sigari Tabrizi, "Support vector data description by using hyper-ellipse instead of hyper-sphere," in Proc. 1st IEEE Int. eConf. on Computer and Knowledge Engineering, ICCKE'11, pp. 22-27, Mashad, Iran, 13-14 Oct. 2011.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	L. M. Manevitz, and M. Yousef, "One-class SVMs for document classification," J. of Machine Learning Research, vol. 2, pp. 139-154, Dec. 2001.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	C. F. Juang, S. H. Chiu, and S. W. Chang, "A self-organizing TS-type fuzzy network with support vector learning and its application to classification problems," IEEE Trans. on Fuzzy Systems, vol. 15, no. 5, pp. 998-1008, Oct. 2007.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	H. Zhang, J. Liu, D. Ma, D. Ma, Z. Wang., "Data-core-based fuzzy min-max neural network for pattern classification," IEEE Trans. on Neural Networks, vol. 22, no. 12, pp. 2339-2352, Dec. 2011.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Quality of Service Aware Service Composition Method Using Biogeography-Based Optimization (BBO) Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Saligheh </surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>B.</given_name><surname>Arasteh</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2019</year></publication_date><pages><first_page>190</first_page><last_page>198</last_page></pages><doi_data><doi>10.66224/ijece.28709.17.3.190</doi><resource>http://ijece.org/fa/Article/28709</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28709</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28709</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28709</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28709</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28709</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28709</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28709</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Jadeja and K. Modi, &amp;quot;Cloud computing-concepts, architecture and challenges,&amp;quot; in Proc. Int. Conf. on Computing, Electronics and Electrical Technologies, ICCEET&amp;#39;12, pp. 877-880, Kumaracoil, India, 21-22 Mar. 2012.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	T. Dillon, C. Wu, and E. Chang, &amp;quot;Cloud computing: issues and challenges,&amp;quot; in Proc. 24th IEEE Int. Conf. on Advanced Information Networking and Applications, AINA&amp;#39;10, pp. 27-33, Perth, Australia, 20-23 Apr. 2010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Jula, E. Sundararajan, and Z. Othman, &amp;quot;Cloud computing service composition: a systematic literature review,&amp;quot; Expert Syst. Appl., 
vol. 41, no. 8, pp. 3809-3824, Jun. 2014.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Jula, Z. Othman, and E. Sundararajan, &amp;quot;Imperialist competitive algorithm with PROCLUS classifier for service time optimization in cloud computing service composition,&amp;quot; Expert Syst. Appl., vol. 42, no. 1, pp. 135-145, Jan. 2015.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Z. Ye, X. Zhou, and A. Bouguettaya, &amp;quot;Genetic algorithm based QoS-aware service compositions in cloud computing,&amp;quot; Database Systems for Advanced Applications, DASFAA&amp;#39;11, Part II, LNCS 6588, pp. 321–334, 2011.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Q. Wu and Q. Zhu, &amp;quot;Transactional and QoS-aware dynamic service composition based on ant colony optimization,&amp;quot; Futur. Gener. Comput. Syst., vol. 29, no. 5, pp. 1112-1119, Jul. 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Wang, Q. Sun, H. Zou, and F. Yang, &amp;quot;Particle swarm optimization with skyline operator for fast cloud-based web service composition,&amp;quot; Mob. Networks Appl., vol. 18, no. 1, pp. 116-121, Feb. 2013.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	O. K. Qtaish, Z. BtJamaludin, and M. Mahmuddin, &amp;quot;Multi-path QoS-aware service composition,&amp;quot; Int. J. Eng. Res. Appl., vol. 2, no. 2, pp. 2248-9622, Mar./Apr. 2012.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Bhaduri, &amp;quot;A clonal selection based shuffled frog leaping algorithm,&amp;quot; in Proc. IEEE Int. on Advance Computing Conf., IACC&amp;#39;09, pp. 125-130, Patiala, India, 6-7 Mar. 2009.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Z. Yang, C. Shang, Q. Liu, and C. Zhao, &amp;quot;A dynamic web services composition algorithm based on the combination of ant colony algorithm and genetic algorithm,&amp;quot; J. Comput. Inf. Syst., vol. 6, no. 8, pp. 2617-2622, 2010.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	N. H. Rostami, E. Kheirkhah, and M. Jalali, &amp;quot;An optimized semantic web service composition method based on clustering and ant colony algorithm,&amp;quot; arXiv Prepr. arXiv1402.2271, 2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	G. Zou, Y. Chen, Y. Yang, R. Huang, and Y. Xu, &amp;quot;AI planning and combinatorial optimization for web service composition in cloud computing,&amp;quot; in Proc. Int. Conf. on Cloud Computing and Virtualization, 8 pp., Singapore, 17-18 May 2010.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. A. P. Kazem, H. Pedram, and H. Abolhassani, &amp;quot;BNQM: a bayesian network based QoS model for grid service composition,&amp;quot; Expert Syst. Appl., vol. 42, no. 20, pp. 6828-6843, 15 Nov. 2015.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	E. Al-Masri and Q. H. Mahmoud, &amp;quot;Investigating web services on the world wide web,&amp;quot; in Proc. of the 17th Int. Conf. on World Wide Web, pp. 795-804, Beijing, China, 21-25 Apr. 2008.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	D. Simon, &amp;quot;Biogeography-based optimization,&amp;quot; IEEE Trans. Evol. Comput., vol. 12, no. 6, pp. 702-713, Dec. 2008.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Efficient Document Partitioning for Load Balancing between Servers Using Term Frequency of Past Queries</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Reyhaneh</given_name><surname>Torab</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sajjad</given_name><surname>Zarifzadeh</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2019</year></publication_date><pages><first_page>199</first_page><last_page>208</last_page></pages><doi_data><doi>10.66224/ijece.28711.17.3.199</doi><resource>http://ijece.org/fa/Article/28711</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28711</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28711</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28711</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28711</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28711</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28711</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28711</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	B. B. Cambazoglu, E. Kayaaslan, S. Jonassen, and C. Aykanat, &amp;quot;A term-based inverted index partitioning model for efficient distributed query processing,&amp;quot; ACM Trans. Web, vol. 7, no. 3, pp. 15-23, Sept. 2013.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. C. Ma, C. P. Chung, and T. F. Chen, &amp;quot;Load and storage balanced posting file partitioning for parallel information retrieval,&amp;quot; J. Syst. Softw., vol. 84, no. 5, pp. 864-884, May 2011.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Kulkarni, A. S. Tigelaar, D. Hiemstra, and J. Callan, &amp;quot;Shard ranking and cut off estimation for topically partitioned collections,&amp;quot; in Proc. of the 21st ACM Int. Conf. on Information and Knowledge Management, pp. 555-564, Hawaii, USA, 1-2 Nov. 2012.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Moffat, W. Webber, J. Zobel, and R. Baeza-Yates, &amp;quot;A pipelined architecture for distributed text query evaluation,&amp;quot; Inf. Retr. Boston., vol. 10, no. 3, pp. 205-231, Jun. 2007.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Kulkarni, J. Teevan, K. M. Svore, and S. T. Dumais, &amp;quot;Understanding temporal query dynamics,&amp;quot; in Proc. of the 4th ACM Int. Conf. on Web Search and Data Mining, WSDM&amp;#39;11, pp. 167-176, Hong Kong, China, 9-12 Feb. 2011.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	K. M. Risvik and R. Michelsen, &amp;quot;Search engines and web dynamics,&amp;quot; Comput. Networks, vol. 39, no. 3, pp. 289-302, Jun. 2002.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Brin and L. Page, &amp;quot;The anatomy of a large-scale hypertextual web search engine,&amp;quot; Computer Networks ISDN Syst., vol. 30, no. 1-7, 
pp. 107-117, Apr. 1998.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Moffat, W. Webber, and J. Zobel, &amp;quot;Load balancing for term-distributed parallel retrieval,&amp;quot; in Proc. of the 29th Annual ACM SIGIR Int. Conf. on Research and Development in Information Retrieval, pp. 348-355, Seattle, USA, 6-11Aug. 2006.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	D. Puppin, F. Silvestri, R. Perego, and R. Baeza-Yates, &amp;quot;Tuning 
the capacity of search engines: load-driven routing and incremental caching to reduce and balance the load,&amp;quot; ACM Trans. Inf. Syst., 
vol. 28, no. 2, pp. 1-36, May 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	C. Lucchese, S. Orlando, R. Perego, and F. Silvestri, &amp;quot;Mining query logs to optimize index partitioning in parallel web search engines,&amp;quot; in Proc. of the 2nd Int. Conf. on Scalable Information Systems, pp. 43-52, Suzhou, China, 6-8 Jun. 2007.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Kulkarni and J. Callan, &amp;quot;Selective search: efficient and effective search of large textual collections,&amp;quot; ACM Trans. Inf. Syst., vol. 33, no. 4, pp. 1-33, Apr. 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Kulkarni, A. S. Tigelaar, D. Hiemstra, and J. Callan, &amp;quot;Shard ranking and cutoff estimation for topically partitioned collections,&amp;quot; in Proc. of the 21st ACM International Conf. on Information and Knowledge Management, pp. 555-564, Hawaii, USA, 1-2 Nov. 2012.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Y. Kim, J. Callan, J. S. Culpepper, and A. Moffat, &amp;quot;Load-balancing in distributed selective search,&amp;quot; in Proc. of the 39th ACM SIGIR Int. Conf. on Research and Development in Information Retrieval, pp. 905-908, Pisa, Italy, 17-21 Jul. 2016.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Z. Dai, C. Xiong, and J. Callan, &amp;quot;Query-biased partitioning for selective search,&amp;quot; in Proc. of the 25th ACM International Conf. on Information and Knowledge Management, pp. 1119-1128, New York, USA, 24-28 Oct.  2016.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Y. Kim, J. Callan, J. S. Culpepper, and A. Moffat, &amp;quot;Efficient distributed selective search,&amp;quot; Information Retrieval J., vol. 20, no. 3, pp. 221-252, Jun. 2017.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. Kane and F. W. Tompa, &amp;quot;Small-term distribution for disk-based search,&amp;quot; in Proc. of the ACM Symposium on Document Engineering, New York, USA, 4-7 Sept. 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Jonassen and S. E. Bratsberg, &amp;quot;Impact of the query model and system settings on performance of distributed inverted indexes,&amp;quot; in Proc. of the 22nd Norwegian Informatics Conf., NIK&amp;#39;09, pp. 143-154, Oslo, Norway, 25-27 Nov. 2009.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	B. Ribeiro-Neto, E. S. Moura, M. S. Neubert, and N. Ziviani, &amp;quot;Efficient distributed algorithms to build inverted files,&amp;quot; in Proc. of the 22nd Annual International ACM SIGIR Conf. on Research and Development in Information Retrieval, pp. 105-112, Berkeley, USA, 15-19 Aug. 1999.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Z. Dai, C. Xiong, and J. Callan, &amp;quot;Query-biased partitioning for selective search,&amp;quot; in Proc. of the 25th ACM Int. on Conf. on Information and Knowledge Management, pp. 1119-1128, New York, USA, 24-28 Oct. 2016.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	H. Patel, Inverted Index Partitioning Strategies for a Distributed Search Engine, University of Waterloo, 2010.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Z. Gyongyi and H. Garcia-Molina, Web Spam Taxonomy, Stanford University, 2005.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	J. Zhou and T. Yang, &amp;quot;Selective early request termination for busy internet services,&amp;quot; in Proc. of the 15th Int. Conf. on World Wide Web-WWW&amp;#39;06, pp. 605-614, Edinburgh, Scotland, 23-26 May 2006.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	K. Sparck Jones, &amp;quot;A statistical interpretation of term specificity and its application in retrieval,&amp;quot; J. Doc., vol. 28, no. 1, pp. 11-21, Jan. 1972.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Apache Lucene, Welcome to Apache Lucene, Apache Foundation, 2018. [Online]. Available: http://lucene.apache.org/.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Family of Variable Step-Size Affine Projection Adaptive Algorithms in Diffusion Distributed Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>S. E. Abadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>E.</given_name><surname>Heydari</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2019</year></publication_date><pages><first_page>209</first_page><last_page>218</last_page></pages><doi_data><doi>10.66224/ijece.28712.17.3.209</doi><resource>http://ijece.org/fa/Article/28712</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28712</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28712</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28712</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28712</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28712</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28712</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28712</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	B. Widrow and S. D. Stearns, Adaptive Signal Processing, Englewood Cliffs, NJ: Prentice-Hall, 1985.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. R. Treichler, C. R. Johnson, and M. G. Larimore, Theory and Design of Adaptive Filters, Wiley, 1987.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	B. F. Boroujeny, Adaptive Filters: Theory and Applications, Wiley, 1998.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Haykin, Adaptive Filter Theory, NJ: Prentice-Hall, 4th Edition, 2002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. H. Sayed, Fundamentals of Adaptive Filtering, Wiley, 2003.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	P. S. R. Diniz, Adaptive Filtering: Algorithms and Practical Implementation, 2nd Ed, Kluwer, 2002.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	م. حاجی‌آبادی، ع. ابراهیمی‌مقدم و ح. خوش‌بین، &amp;quot;حذف نویز صوتی مبتنی بر یک الگوریتم وفقی نوین،&amp;quot; مجله مهندسی برق دانشگاه تبریز، دوره 45، شماره 3، صص. 139-146، زمستان 1395.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	ق. آذرنیا و م. ع. طینتی، &amp;quot;افزایش همگرایی شبکه‌های تطبیقی با لینک‌های نویزی: الگوریتم حداقل میانگین مربعات توزیع‌شده افزایشی طول متغیر،&amp;quot; مجله مهندسی برق دانشگاه تبریز، جدوره 45، شماره 3، صص. 15-1، زمستان 1394.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. S. Lee, S. E. un Kim, J. W. Lee, and W. J. Song, &amp;quot;A variable step-size diffusion LMS algorithm for distributed estimation,&amp;quot; IEEE Trans. on Signal Processing, vol. 63, no. 7, pp. 1808-1820, 1 Apr. 2015.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, &amp;quot;A surveyon sensor networks,&amp;quot; IEEE Commun. Mag., vol. 40, no. 8, 
pp. 102-114, Aug. 2002.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	L. A. Rossi, B. Krishnamachari, and C. C. J. Kuo, &amp;quot;Distributed parameter estimation for monitoring diffusion phenomena using physical models,&amp;quot; in Proc. IEEE Int. Conf. Sensor Ad Hoc Comm. Netw, pp. 460-469, Santa Clara, CA, USA, 4-7 Oct. 2004.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	F. S. Cattivelli and A. H. Sayed, &amp;quot;Modeling bird flight formations using diffusion adaptation,&amp;quot; IEEE Trans, Signal Process, vol. 59, 
no. 5, pp. 2038-2051, May 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Y. Tu and A. H. Sayed, &amp;quot;Mobile adaptive networks,&amp;quot; IEEE J. Sel. Topics Signal Process, vol. 5, no. 4, pp. 649-664, Aug. 2011.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	F. S. Cattivelli and A. H. Sayed, &amp;quot;Distributed detection over adaptive networks using diffusion adaptation,&amp;quot; IEEE Trans. Signal Process, vol. 59, no. 5, pp. 1917-1932, May 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. B. Predd, S. R. Kulkarni, and H. V. Poor, &amp;quot;Distributed learning in wireless sensor networks,&amp;quot; IEEE Signal Processing Magazine, 
vol. 23, no. 4, pp. 56-69, Jul. 2006.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	C. G. Lopes and A. H. Sayed, &amp;quot;Diffusion least-mean squares over adaptive networks,&amp;quot; in Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP &amp;#39;07, vol. 3, pp. 917-920, Honolulu, HI, USA, 15-20 Apr. 2007.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	K. Ozeki and T. Umeda, &amp;quot;An adaptive filtering algorithm using an orthogonal projection to an affine subspace and its properties,&amp;quot; Electronics and Communications in Japan, Part I: Communications, vol. 67-A, no. 5, pp. 19-27, May 1984.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	K. Dogancay and O. Tanrıkulu, &amp;quot;Adaptive filtering algorithms with selective partial updates,&amp;quot; IEEE Trans. Circuits, Syst. II: Analog and Digital Signal Processing, vol. 48, no. 8, pp. 762-769, Aug. 2001.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. Werner, M. L. R. de Campos, and P. S. R. Diniz, &amp;quot;Partial-update NLMS algorithms with data-selective updating,&amp;quot; IEEE Trans, Signal Processing, vol. 52, no. 4, pp. 938-948, Apr. 2004.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	K. Y. Hwang and W. J. Song, &amp;quot;An affine projection adaptive filtering algorithm with selective regressors,&amp;quot; IEEE Trans. Circuit. Syst. II: Express Briefs, vol. 54, no. 1, pp. 43-46, Jan. 2007.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. J. Kong, K. Y. Hwang, and W. J. Song, &amp;quot;An affine projection algorithm with with dynamic selection of input vectors,&amp;quot; IEEE Signal Processing Letters, vol. 14, no. 8, pp. 529-532, Aug. 2007.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. S. E. Abadi and V. Mehrdad, &amp;quot;Family of affine projection adaptive filters with selective partial updates and selective regressors,&amp;quot; IET Signal Processing, vol. 4, no. 5, pp. 567-575, Oct. 2010.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	L. Shi and H. Zhao, &amp;quot;Variable step-size distributed incremental normalised LMS algorithm,&amp;quot; Electronics Letters, vol. 52, no. 7, pp. 519-521, Apr. 2016.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. O. B. Saeed and A. Zerguine, &amp;quot;A new variable step-size strategy for adaptive networks,&amp;quot; in Proc. 45th Asilamar Conf. Signals, Syst, Comput, pp. 312-315, Pacific Grove, CA, USA, 6-9 Nov. 2011.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. O. B. Saeed, A. Zerguine, and S. A. Zummo, &amp;quot;A noise-constrained algorithm for estimation over distributed networks,&amp;quot; Int, J. Adapt. Contr. Signal Process, vol. 27, no. 10, pp. 827-845, Oct. 2013.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	J. Shi, J. Ni, and X. Chen, &amp;quot;Variable step-size diffusion proportionate affine projection algorithm,&amp;quot; in Proc. IEEE Int. Workshop on Acoustic Signal Enhancement, IWAENC&amp;#39;16, 4 pp., Xi&amp;#39;an, China, 13-16 Sept. 2016.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	J. W. Yoo, I. S. Song, J. W. Shin, and P. G. Park, &amp;quot;A variable step-size diffusion affine projection algorithm,&amp;quot; Int. J. Commun. Syst., vol. 29, no. 5, pp. 1012-1025, 25 Mar. 2016.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	H. C. Shin, A. H. Sayed, and W. J. Song, &amp;quot;Variable step-size NLMS and affine projection algorithms,&amp;quot; IEEE Signal Process. Lett., 
vol. 11, no. 2, pp. 132-135, Feb. 2004.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	F. S. Cattivelli and A. H. Sayed, &amp;quot;Diffusion LMS strategies for distributed estimation,&amp;quot; IEEE Trans. Signal Process, vol. 58, no. 3, pp. 1035-1048, Mar. 2010.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	L. Li and J. Chambers, &amp;quot;Distributed adaptive estimation based on the apa algorithm over diffusion networks with changing topology,&amp;quot; in Proc. IEEE/SP 15th Workshop on Statistical Signal Processing Statistical Signal Processing, pp. 757-760, , Cardiff, UK, 31 Aug.-3 Sept. 2009.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	H. C. Shin and A. H. Sayed, &amp;quot;Transient behavior of affine projection algorithms,&amp;quot; in Proc. Int. Conf., Acoust. Speech, Signal Processing, ICASSP&amp;#39;03, vol. 4, pp. 353-356, Hong Kong, China, 6-10 Apr. 2003.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	N. Metropolis, A. W. Rosenbluth, M. N. Rosenbluth, A. H. Teller, and E. Teller, &amp;quot;Equations of state calculationsby fast computing machines,&amp;quot; J. of Chemical Physics, vol. 21, no. 6, pp. 1087-1092, 1953.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Propose a New Clustering Algorithm for Data Transmission in Wireless Sensor Networks by Using Apollonius Circle</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Sh.</given_name><surname>Pourbahrami</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>E.</given_name><surname>Khaledi Alamdari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>L.</given_name><surname>Mohammad Khanli</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2019</year></publication_date><pages><first_page>219</first_page><last_page>226</last_page></pages><doi_data><doi>10.66224/ijece.28713.17.3.219</doi><resource>http://ijece.org/fa/Article/28713</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28713</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28713</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28713</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28713</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28713</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28713</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28713</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, &amp;quot;Wireless sensor networks: a survey,&amp;quot; Computer Networks, vol. 38, no. 4, pp. 393-422, Mar. 2002.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. Bandyopadhyay and E. Coyle, &amp;quot;An energy efficient hierarchical clustering algorithm for wireless sensor networks,&amp;quot; in Proc. of the 22nd Annual Joint Conf. of the IEEE Computer and Communications Societies, pp. 1713-1723, San Francisco, CA, USA, 30 Mar. -3 Apr. 2003.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	D. J. Baker and A. Epheremides, &amp;quot;The architectural organization of a moblie radio network via a distributed algorithm,&amp;quot; IEEE Trans. on Communications, vol. 29, no. 11, pp. 1694-1701, Nov. 1981.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Sahraoui and S. Bouam, &amp;quot;Secure routing optimization in hierarchical cluster-based wireless sensor networks,&amp;quot; International J. of Communication Networks and Information Security, vol. 5, no. 3, pp. 178-185, Dec. 2013.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Premkumar, A. Joseph, K. Moses, and A. chacko, &amp;quot;Efficient cluster head selection strategy with all pair shortest routing in networks,&amp;quot; IOSR J. of Computer Engineering (IOSR-JCE), vol. 16, no. 2, pp. 1-7, Mar./Apr. 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson, &amp;quot;Wireless sensor networks for habitat monitoring,&amp;quot; in Proc. of the 1st ACM Int. Workshop on WSN, pp. 88-97, Atlanta, GA, USA, 28-28 Sept. 2002.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	C. E. Nishimura and D. M. Conlon, &amp;quot;IUSS dual use: monitoring of whales and earthquakes using SOSUS,&amp;quot; Mar. Technol. Soc. J., 
vol. 27, no. 4, pp. 12-23, 1994.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. P. Durisc, Z. Tafa, G. Dimic, and V. Milutinovic, &amp;quot;A survey of military applications of wireless sensor networks,&amp;quot; in Proc. Mediterranean Conf. on Embedded Computing, MECO&amp;#39;12, pp. 196-199, Bar, Montenegro, 19-21 Jun. 2012.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	G. Spandan, A. Patel, C. Manjunath, and N. GS, &amp;quot;Data aggregation protocols in wireless sensor networks,&amp;quot; International J. of Computational Engineering Research, vol. 3, no. 5, pp. 18-24, May 2013.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	P. V. Ujawe and S. Khiani, &amp;quot;Review on data aggrigation techniques for energy efficiency in wireless sensor networks,&amp;quot; International J. of Emerging Technology and Advanced Engineering, vol. 4, no. 5, pp. 142-145, Jul. 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Manikadan and S. Rathingowari, &amp;quot;An efficient detection and recovery of fault node in wireless sensor networks,&amp;quot; International J. of Innovative Research in Science, Engineering and Technology, 
vol. 3, no. 1, pp. 369-373, Feb. 2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	G. Gupta and M. Younis, &amp;quot;Load-balanced clustering in wireless sensor networks,&amp;quot; in Proc. of the Int. Conf. on Communication, ICC&amp;#39;03, pp. 1848-1852, Anchorage, AK, USA, 11-15 May 2003.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	D. Wajgi and V. Thakur, &amp;quot;Load balancing based approach to improve lifetime of wireless sensor network,&amp;quot; International J. of Wireless &amp;amp; Mobile Networks, vol. 4, no. 4, pp. 155-167, Aug. 2012.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	F. Garcia, J. Solano, and I. Stojmenovic, &amp;quot;Connectivity based k-hop clustering in wireless networks,&amp;quot; Telecommunication Systems, 
vol. 22, no. 1, pp. 205-220, Jan. 2003.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	K. Dasgupta, M. Kukreja, and K. Kalpakis, &amp;quot;Topology-aware placement and role assignment for energy-efficient information gathering in sensor networks,&amp;quot; in Proc. of 8th IEEE Symp. on Computers and Communication, ISCC&amp;#39;03, pp. 341-348, Kemer-Antalya, Turkey, 3-3 Jul. 2003.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	T. Moscibroda and R. Wattenhofer, &amp;quot;Maximizing the lifetime of dominating sets,&amp;quot; in Proc. of the 19th IEEE Int. Parallel and Distributed Processing Symp., IPDPS&amp;#39;05, vol. 13, 8 pp., Denver, CO, USA, 4-8 Apr. 2005.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. Khanna, H. Liu, and H. H. Chen, &amp;quot;Self-organization of sensor networks using genetic algorithms,&amp;quot; in Proc. of the 32nd IEEE Int. Conf. on Communications, vol. 8, pp. 3378-3382, Istanbul, Turkey, 11-15 Jun. 2006.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. Mottaghi and M. R. Zahabi, &amp;quot;Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes,&amp;quot; Int. J. Electron. Commun., vol. 69, no. 2, pp. 507-514, Feb. 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. El Khediri, N. Nasri, A. Wei, and A. Kachouri, &amp;quot;A new approach for clustering in wireless sensors networks based on LEACH,&amp;quot; Procedia Computer Science, vol. 32, pp. 1180-1185, 2014.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. H. Moon, S. Park, and S. Han, &amp;quot;Energy efficient data collection in sink-centric wireless sensor networks: a cluster-ring approach,&amp;quot; Computer Communications, vol. 101, no. 5, pp. 12-25, Mar. 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Sabet and H. Naji, &amp;quot;An energy efficient multi-level route-aware clustering algorithm for wireless sensor networks: a self-organized approach,&amp;quot; Computers and Electrical Engineering, vol. 56, pp. 399-417, Nov. 2016.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, &amp;quot;An application-specific protocol architecture for wireless microsensor networks,&amp;quot; IEEE Trans. on Wireless Communications, vol. 1, no. 4, pp. 660-670, Oct. 2002.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. Bayraklı and S. Z. Erdogan, &amp;quot;Genetic algorithm based energy efficient clusters (gabeec) in wireless sensor networks,&amp;quot; Procedia Computer Science, vol. 10, pp. 247-254, 2012.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. Kheireddine, R. Abdellatif, and G. Ferrari, &amp;quot;Genetic centralized dynamic clustering in wireless sensor networks,&amp;quot; in Proc 5th Int. Conf. on Computer Science and Its Applications, CIIA&amp;#39;15, Saida, Algeria, May 2015.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	R. S. Elhabyan and M. C. Yagoub, &amp;quot;Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network,&amp;quot; J. of Network and Computer Applications, vol. 52, pp. 116-128, Jun. 2015.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	D. J. Baker, J. E. Wieselthier, and A. Epheremides, &amp;quot;A design concept for reliable mobile radio networks with frequency hopping signaling,&amp;quot; Proceedings of the IEEE, vol. 75, no. 1, pp. 56-73, Jan. 1987.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	S. Pourbahrami, &amp;quot;Optimization of LEACH method using distribute nodes and cell clustering,&amp;quot; in Proc. IEEE 4th Int. Conf. on Knowledge-Based Engineering and Innovation, KBEI&amp;#39;17, pp. 0083-0087, Tehran, Iran, 22-22 Dec. 2017.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	S. Pourbahrami, L. M. Khanli, and S. Azimpour, &amp;quot;A novel and efficient data point neighborhood construction algorithm based on apollonius circle,&amp;quot; Expert Systems with Applications, vol. 115, pp. 57-67, Jan. 2019.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Efficient Approach to Reduce Energy Consumption in Internet of Things Routing</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Asgari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Fathy</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad</given_name><surname>Shahverdy</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Soheili Nayer</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2019</year></publication_date><pages><first_page>227</first_page><last_page>234</last_page></pages><doi_data><doi>10.66224/ijece.28714.17.3.227</doi><resource>http://ijece.org/fa/Article/28714</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28714</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28714</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28714</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28714</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28714</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28714</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28714</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. Umamaheswari and A. Negi, &amp;quot;Internet of things and RPL routing protocol: a study and evaluation,&amp;quot; in Proc. Int. Conf. on Computer Communication and Informatics, ICCCI&amp;#39;17, 7 pp., Coimbatore, India, 5-7 Jan. 2017.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	H. M. Xin and K. Yang, &amp;quot;Routing protocols analysis for internet of things,&amp;quot; in Proc. 2nd Int. Conf. on Information Science and Control Engineering, ICISCE&amp;#39;15, pp. 447-450, Shanghai, China 24-26 Apr. 2015.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. McCann, and K. Leung, &amp;quot;A survey on the IETF protocol suite for the internet of things: standards, challenges, and opportunities,&amp;quot; IEEE Wirel. Commun., vol. 20, no. 6, pp. 91-98, Dec. 2013.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	T. Zhang and X. Li, &amp;quot;Evaluating and analyzing the performance of RPL in contiki,&amp;quot; in Proc. 1st Int. Workshop on Mobile Sensing, Computing and Communication, pp. 19-24, Philadelphia, PA, USA, 11-11 Aug. 2014.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	X. Vilajosana, P. Tuset, T. Watteyne, and K. Pister, &amp;quot;OpenMote: open-source prototyping platform for the industrial IoT,&amp;quot; Ad Hoc Networks, pp. 211-222, San Remo, Italy, 1-2 Sept. 2015.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	D. Han and O. Gnawali, &amp;quot;Performance of RPL under wireless interference,&amp;quot; Commun. Mag. IEEE, vol. 51, no. 12, pp. 137-143, Dec. 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Dhumane, R. Prasad, and J. Prasad, &amp;quot;Routing issues in internet of things: a survey,&amp;quot; in Proc. Int. Multi Conf. of Engineers and Computer Scientists, IMECS&amp;#39;16, vol. 1, pp. 404-412, Hong Kong, China, 16-18, Mar. 2016.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	G. S. Rapat and N. C. Naveen, &amp;quot;A survey on routing protocols of internet of things,&amp;quot; International J. of Innovative Research in Computer and Communication Engineering, vol. 6, no. 5, pp. 5892-5898, May 2018.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. K. Poluru and S. Naseera, &amp;quot;A literature review on routing strategy in the internet of things,&amp;quot; J. of Engineering Science and Technology Review, vol. 10, no. 5, pp. 50-60, Sept. 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	D. Airehrour, J. Gutierrez, and S. K. Ray, &amp;quot;Secure routing for internet of things: Aa survey,&amp;quot; Journal of Network and Computer Applications, vol. 66, pp. 198-213, May.2016.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	B. Mohamed and F. Mohamed, &amp;quot;QoS routing RPL for low power and lossy networks,&amp;quot; International J. of Distributed Sensor Networks, vol. 11, no. 11, pp. 1-10, Nov. 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Wang and H. Li, &amp;quot;Researching and hardware implementation of RPL routing protocol based on the contiki operating system,&amp;quot; International J. of Future Computer and Communication, vol. 3, 
no. 6, pp. 411-414, Dec. 2014.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	O. Gaddour and A. Koubaa, &amp;quot;RPL in a nutshell: a survey,&amp;quot; Computer Networks, vol. 56, no. 14, pp. 3163-3178, Sep. 2012.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Q. Le, T. Ngo-Quynh, and T. Magedanz, &amp;quot;RPL-based multipath routing protocols for internet of things on wireless sensor networks,&amp;quot; in Proc. Int. Conf. on Advanced Technologies for Communications, ATC&amp;#39;14, pp. 424-429, Hanoi, Vietnam, 15-17 Oct. 2014.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Gormus, F. Tosato, Z. Fan, Z. Bocus, and P. Kulkarni, &amp;quot;Opportunistic RPL for reliable AMI mesh networks,&amp;quot; Wireless Networks, vol. 20, no. 8, pp. 2147-2164, Nov. 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	T. Winter, et al., &amp;quot;RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks,&amp;quot; IETF RFC 6550 Standards Track, 2012.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. Vasseur, M. Kim, K. Pister, N. Dejean, and D. Barthel, Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks, IETF RFC 6551 Standards Track, 2012.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	O. Iova, F. Theoleyre, and T. Noel, &amp;quot;Using multiparent routing in RPL to increase the stability and the lifetime of the network,&amp;quot; Ad Hoc Networks, vol. 29, pp. 45-62, Jun. 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>SDDNA: Sign-Digit Coding for Mapping Digital Data in DNA Data Storage</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>میثم</given_name><surname>اللهی رودپشتی</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S.</given_name><surname>Alinezhad</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2019</year></publication_date><pages><first_page>235</first_page><last_page>241</last_page></pages><doi_data><doi>10.66224/ijece.28715.17.3.235</doi><resource>http://ijece.org/fa/Article/28715</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28715</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28715</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28715</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28715</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28715</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28715</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28715</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Data storage supply and demand worldwide, from 2009 to 2020, Available at: https://www.statista.com/statistics/751749/worldwide-data-storage-capacity-and-demand, 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Where in the world is storage? Available at: https://www.idc.com/downloads/where_is_storage_infographic_243338.pdf, 2013.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Sony develops magnetic tape technology with the world’s highest recording, 2014. Available at: www.sony.net/SonyInf/News/Press/201708/17-070E/index.html.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	ExtremeTech. New optical laser can increase DVD storage up to one petabyte, Available at: https://www.extremetech.com/computing/ 159245-new-optical-laser-can-increase-dvd-storage-up-to-one-petabyte</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Sh. Pep, Storing Your Data on DNA? Sept. 2018, Available: https://www.capconnect.com.au/single-post/DNA-Storage.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Bornholt, R. Lopez, L. Ceze, G. Seelig, and K. Strauss, &amp;quot;A DNA-based archival storage system,&amp;quot; in Proc. of the 21st Int. Conf. on Architectural Support for Programming Languages and Operating Systems, ASPLOS’16, pp. 637-649, Atlanta, GA, USA, 2-6 Apr. 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Garg and M. Choudhary, &amp;quot;Analysing and obtaining the most efficient DNA computing algorithm,&amp;quot; J. of Computational Intelligence in Bioinformatics, vol. 8, no. 1, pp. 1-6, Jun. 2015.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. Limbachiya and M. Kumar Gupta, &amp;quot;Natural data storage: a review on sending information from now to then via nature,&amp;quot; ACM J. on Emerging Technologies in Computing Systems, vol. 18, no. 1, pp. 550-4832, May 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	L. Organick, S. Dumas Ang, and Y. J. Chen, &amp;quot;Random access in large-scale DNA data storage,&amp;quot; Nature Biotechnology, vol. 12, no. 1, pp. 242-248, Feb. 2018.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	E. Willerslev, A 700.000 year old horse gets its genome sequenced, https://news.ku.dk/all_news/2013/2013.6/a-700.000-year-old-horse-gets-its-genome-sequenced, 2013.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	B. Alberts, et al., Essential Cell Biology, Essential Cell Biology, Garland Science, 3rd Edition, 2009.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Harvard cracks DNA storage, crams 700 terabytes of data into a single gram. https://www.extremetech.com/extreme/ 134672-harvard-cracks-dna-storage-crams-700-terabytes-of-data-into-a-single-gram.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	R. Heckel, &amp;quot;An archive written in DNA,&amp;quot; Nature Biotechnology, 
vol. 36, no. 3, pp. 236-237, Mar. 2018.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	N. Goldman, P. Bertone, S. Chen, C. Dessimoz, E. M. LeProust, 
B. Sipos, and E. Birney, &amp;quot;Towards practical, high-capacity, low-maintenance information storage in synthesized DNA,&amp;quot; Nature Biotechnology, vol. 494, no. 7435, pp. 77-80, Jan. 2013.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	D. Huffman, &amp;quot;A method for the construction of minimum-redundancy codes,&amp;quot; in Proc. of the IRE, vol. 40, no. 9,  pp. 1098-1101, Sept. 1952.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	G. M. Church, Y. Gao, and S. Kosuri, &amp;quot;Next-generation digital information storage in DNA,&amp;quot; Science 337, 1628 2012.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. Grass, R. Heckel, M. Puddu, D. Paunescu, and W. Stark, &amp;quot;Robust chemical preservation of digital information on DNA in silica with error-correcting codes,&amp;quot; Angewandte Chemie International Edition, vol. 54, no. 8, pp. 2552-2555, Feb. 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Blawat, et al., &amp;quot;Forward error correction for DNA data storage,&amp;quot; Procedia Computer Science, vol. 80, Issue: C, pp. 1011-1022, Jun. 2016.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Y. Erlich and D. Zielinski, &amp;quot;DNA fountain enables a robust and efficient storage architecture,&amp;quot; Science, vol. 355, no. 6328, pp. 950-954, Mar. 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Yazdi, R. Gabrys, and O. Milenkovic, &amp;quot;Portable and error-free DNA-based data storage,&amp;quot; Scientific Reports, vol. 7, no. 1, Article No. 5011, Jul. 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Chandrasekaran, O. Levchenko, D. Patel, M. MacIsaac, and K. Halvorsen, &amp;quot;Addressable configurations of DNA nanostructures for rewritable memory,&amp;quot; Nucleic Acids Research, vol. 45, no. 19, pp. 11459-11465, Jul. 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	B. Wang, Y. Xie, S. Zhou, X. Zheng, and C. Zhou, &amp;quot;Correcting errors in image encryption based on DNA coding,&amp;quot; Molecules, 
vol. 23, no. 8, p. 1878, Aug. 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	H. Lee, R. Kalhor, N. Goela, J. Bolot, and G. Church, &amp;quot;Terminator-free template-independent enzymatic DNA synthesis for digital information storage,&amp;quot; Nature Communications, vol. 10, no. 1, p. 2283, Jun. 2019.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	I. Koren, Computer Arithmetic Algorithms, 2nd Edition, Published by A. K. Peters, Natick, MA, 2002.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	DNA Replication and Causes of Mutation, Available at: .https://www.nature.com/scitable/topicpage/dna-replicationand-causes-of-mutation-409.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Diagnosis of Attention-Deficit/Hyperactivity Disorder (ADHD) based on Variable Length Evolutionary Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Ramzanyan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hussain</given_name><surname>Montazery Kordy</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>17</day><year>2019</year></publication_date><pages><first_page>242</first_page><last_page>248</last_page></pages><doi_data><doi>10.66224/ijece.28716.17.3.242</doi><resource>http://ijece.org/fa/Article/28716</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28716</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28716</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28716</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28716</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28716</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28716</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28716</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	T. Banaschewski, et al., &amp;quot;Attention-deficit/hyperactivity disorder,&amp;quot; Deutsches &amp;#196;rzteblatt International, vol. 114, no. 9, pp. 149-159, 3 Mar. 2017.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	-, ADHD in Children, Available at: http://www.adhd.com/index.html</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	م. یوسفی، ع. ا. ابراهیم‌زاده، ع. خزائی و ع. باباجانی، &amp;quot;آنالیز داده‌های fMRI حالت استراحت با استفاده از الگوریتم PSO به منظور تشخیص ADHD،&amp;quot; مجله علمی- پژوهشی رایانش نرم و فناوری اطلاعات، جلد 1، شماره 3، صص. 53-66، پاییز 1391.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Clare, Functional Magnetic Resonance Image: Methods and Applications, PhD Thesis, University of Nottingham, England, 1997.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	C. Z. Zhu, et al., &amp;quot;Fisher discriminative analysis of resting-state brain function for attention-deficit/hyperactivity disorder,&amp;quot; Neuroimage, vol. 40, no. 1, pp. 110-120, 1 Mar. 2008.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	W. Cheng, X. Ji, J. Zhang, and J. Feng, &amp;quot;Individual classification of ADHD patients by integrating multiscale neuroimaging markers and advanced pattern recognition techniques,&amp;quot; Frontiers in Systems Neuroscience., vol. 6, Article 58,  6 Aug. 2012.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. Tomasi and N. D. Volkow, &amp;quot;Abnormal functional connectivity in childeren with attention-deficit/hyperactivity disorder,&amp;quot; Biological Psychiatry, vol. 71, no. 5, pp. 443-450, 1 Mar. 2012.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Eloyan, et al., &amp;quot;Automated diagnoses of attention-deficit/hyperactivity disorder using magnetic resonance imaging,&amp;quot; Frontiers in Systems Neuroscience., vol. 6, Article 61, 30 Aug. 2012.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	D. Dai, J. Hua, and H. He, &amp;quot;Classification of ADHD children through multimodal magnetic resonance imaging,&amp;quot; Frontiers in Systems Neuroscience., vol. 6, Article 63, 3 Sept. 2012.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Q. Cao, Y. Zang, L. Sun, M. Sui, X. Long, Q. Zou, and Y. Wang, &amp;quot;Abnormal neural activity in children with Attention-Deficit Hyperactivity Disorder: a resting-state functional magnetic resonance imaging study,&amp;quot; Neuroreport, vol. 17, no. 10, pp. 1033-1036, 17 Jul. 2006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. P. Millan, D. Fair, M. Mennes, and S. H. Mostofsky, &amp;quot;The ADHD-200 Consortium: a model to advance the translational potential of neuroimaging in clinical neuroscience,&amp;quot; Frontiers in System Neuroscience, vol. 6, Article 62, 6 Sept. 2012.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	N. Tzourlo-Mazoyer, et al., &amp;quot;Automated anatomical labeling of activations in SPM using a macroscopic anatomical parcellation of the MNI MRI single-subject brain,&amp;quot; Neuroimage, vol. 15, no. 1, 
pp. 273-289, Jan. 2002.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	W. Cheng, X. Ji, J. Zhang, and J. Feng, &amp;quot;Individual classification of ADHD patients by integrating multiscale neuroimaging markers 
and advanced pattern recognition techniques,&amp;quot; Frontiers in System Neuroimaging, vol. 6, Article 58, 6 Aug. 2012.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	NITRC, Neuro Bureau: Athena Pipeline, Available at http://www.nitrc.org/plugins/mwiki/index.php/neurobureau: AthenaPipeline #Regional_Homogeniety. 28ReHo.29</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	I. Guyon and A. Elisseeff, &amp;quot;An introduction to variable and feature selection,&amp;quot; J. of Machine Learning Research, vol. 3, no. 1, pp. 1157-1182, 3 Mar. 2003.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Theodoridis, A. Pikrakis, K. Koutroumbas, and D. Cavouras, Introduction to Pattern Recognition: A MATLAB Approach, Academic Press, 2010.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	D. Karaboga and B. Akay, &amp;quot;A comparative study of Artificial Bee Colony algorithm,&amp;quot; Applied Mathematics and Computation, vol. 214, no. 1, pp. 108-132, 1 Aug. 2009.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. Huang, Y. Cai, and X. Xu, &amp;quot;A hybrid genetic algorithm for feature selection wrapper based on mutual information,&amp;quot; Pattern Recognition Letters, vol. 28, no. 13, pp. 1825-1844, 1 Oct. 2007.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. Kennedy and R. Eberhart, &amp;quot;Particle swarm optimization,&amp;quot; in Proc. IEEE Int. Conf. on Neural Networks,, vol. 4, pp. 1942-1948, Perth, Australia, 27 Nov.- 1 Dec. 1995.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	B. O. Alijla, L. C. Peng, A. T. Khader, and M. A. Al-Betar, &amp;quot;Intelligent water drops algorithm for rough set feature selection,&amp;quot; in the Proc. of the 5th Asian Conf. on Intelligent Information and Database Systems, pp. 356-36, Kuala Lumpur, Malaysia, 18-20 Mar. 2013.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>