﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022920</doi_batch_id><timestamp>14050229202754</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>10</month><day>4</day><year>2021</year></publication_date><journal_volume><volume>19</volume></journal_volume><issue>1</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Blind Two-Channel Speech Source Separation Based on Localization</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hassan </given_name><surname>Alisufi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Khademi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Abbas</given_name><surname>Ebrahimi moghadam</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>4</day><year>2021</year></publication_date><pages><first_page>59</first_page><last_page>64</last_page></pages><doi_data><doi>10.66224/ijece.28542.19.1.59</doi><resource>http://ijece.org/fa/Article/28542</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28542</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28542</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28542</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28542</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28542</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28542</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28542</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. Haykin and Z. Chen, "The cocktail party problem," Neural Comput., vol. 17, no. 9, pp. 1875-1902, Sept. 2005.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	K. Itakura, et al., "Bayesian multichannel audio source separation based on integrated source and spatial models," IEEE/ACM Trans. Audio Speech Lang. Process., vol. 26, no. 4, pp. 831-846, Apr. 2018.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Y. Xie, K. Xie, Z. Wu, and S. Xie, "Underdetermined blind source separation of speech mixtures based on K-means clustering," in Proc. Chinese Control Conf., CCC'19, pp. 42-46, Guangzhou, China, 27-30 Jul. 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. S. Brandstein and H. F. Silverman, "A robust method for speech signal time-delay estimation in reverberant rooms," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, ICASSP'97, vol. 1, pp. 375-378, Munich, Germany, 21-24 Apr. 1997.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Z. Ding, W. Li, and Q. Liao, "Dual-channel speech separation by sub-segmental directional statistics," in Proc. Int. Conf. on Wireless Communications, Signal Processing and Networking, WiSPNET'16, pp. 2287-2291, Chennai, India, 23-35 Mar. 2016.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	X. Li, Z. Ding, W. Li, and Q. Liao, "Dual-channel cosine function based ITD estimation for robust speech separation," Sensors, vol. 17, no. 6, Article No.: 1447, 13 pp. 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	T. Maitheen and M. S. Lekshmi, "Enhancement of DUET blind source separation using wavelet," International Research Journal of Engineering and Technology, vol. 4, no. 5, pp. 3551-3553, May 2017.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	X. Zhang and D. Wang, "Binaural reverberant speech separation based on deep neural networks," in Proc. Interspeech, vol. pp. 2018-2022, Stockholm, Sweden, 20-24 Aug. 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. U. N. Wood, et al., "Blind speech separation and enhancement with GCC-NMF," IEEE/ACM Trans. Audio, Speech Lang. Process., vol. 25, no. 4, pp. 745-755, Apr. 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Y. Yu, W. Wang, J. Luo, and P. Feng, "Localization based stereo speech separation using deep networks," in Proc. IEEE Int. Conf. Digit. Signal Process, pp. 153-157, Singapore, Singapore, 21-24  Jul. 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. U. N. Wood and J. Rouat, "Unsupervised low latency speech enhancement with RT-GCC-NMF," IEEE J. Sel. Top. Signal Process., vol. 13, no. 2, pp. 332-346, May 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	C. Knapp and G. Carter, "The generalized correlation method for estimation of time delay," IEEE Trans. Acoust., vol. 24, no. 4, pp. 320-327, Aug. 1976.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. A. J. Sathya and S. P. Victor, Noise Reduction Techniques and Algorithms for Speech Signal Processing, .</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. P. Klapuri, "Multipitch estimation and sound separation by the spectral smoothness principle," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, ICASSP'01, vol. 5, pp. 3381-3384, Salt Lake City, UT, USA, 7-11 May 2001.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	C. Blandin, A. Ozerov, and E. Vincent, "Multi-source TDOA estimation in reverberant audio using angular spectra and clustering," Signal Processing, vol. 92, no. 8, pp. 1950-1960, Aug. 2012.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	F. Nesta, M. Omologo, and P. Svaizer, "A novel robust solution 
to the permutation problem based on a joint multiple TDOA estimation," in Proc. IWAENC, 4 pp., Seattle, WA, USA, 14-17 Sept. 2008.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	B. Loesch and B. Yang, "Blind source separation based on time-frequency sparseness in the presence of spatial aliasing," in Proc.  9th Int Conf. on Latent Variable Analysis and Signal Separation, 8 pp., St. Malo, France, 27-30 Sept. 2010.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	N. Madhu, C. Breithaupt, and R. Martin, "Temporal smoothing of spectral masks in the cepstral domain for speech separation," in Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, ICASSP'08,  vol. 1, pp. 45-48, Las Vegas, NV, USA, 30 Mar- 4 Apr. 2008.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	[Online]. Available: www.itu.com</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	[Online]. Available: https://sisec.wiki.irisa.fr.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	C. Fevotte, R. Gribonval, and E. Vincent, BSS_EVAL Toolbox User Guide--Revision 2.0, 2005.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	A. Liutkus, et al., "The 2016 signal separation evaluation campaign," in Proc. Int. Conf. on Latent Variable Analysis and Signal Separation, pp. 323-332, Grenoble, France, Feb. 2017.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Robust Persian Isolated Digit Recognition Based on LSTM and Speech Spectral Features</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>شیما</given_name><surname>طبیبیان</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>4</day><year>2021</year></publication_date><pages><first_page>1</first_page><last_page>17</last_page></pages><doi_data><doi>10.66224/ijece.28852.19.1.1</doi><resource>http://ijece.org/fa/Article/28852</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28852</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28852</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28852</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28852</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28852</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28852</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28852</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	ف. فکری، شناسایی صحبت توسط کامپیوتر، پایان‌نامه کارشناسی ارشد، دانشگاه صنعتی شریف، دانشکده مهندسی برق، 1371.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	ح. بابابیک، "بازشناسی گفتار با استفاده از تلفیق مدل مخفی مارکف و شبکه عصبی،" مجموعه مقالات هفتمین کنفرانس مهندسی برق ایران، مقالات مخابرات سيستم، صص. 204-199،  تهران، ایران، 29-27 اردیبهشت 1378.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	س. بابایی‌زاده، ا. غلام‌پور و ک. نایبی، "بهبود کارایی سیستم‌های بازشناسی گفتار گسسته با ترکیب شبکه‌های عصبی و مدل‌های مارکف پنهان،" مجموعه
 مقالات هفتمین کنفرانس مهندسی برق ایران، مقالات مخابرات سيستم، 
صص. 190-183، تهران، ایران، 29-27 اردیبهشت 1378.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	ش. رستم‌زاده، س. م. احدی، ح. شیخ¬زاده، نجار، "بازشناسی گفتار فارسی ناپیوسته، به صورت ناوابسته به گوینده به کمک مدل‌های پنهان مارکف با چگالی پیوسته،" مجموعه مقالات ششمین کنفرانس مهندسی برق ایران، صص. 97-93، تهران، ایران،  اردیبهشت 1377.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	م. م. همایون‌پور و ا. نجاری، "بازشناسی ارقام ناوابسته به گوینده با استفاده از مدل پیشگوی عصبی،" مجموعه مقالات هفتمین کنفرانس مهندسی برق ایران، صص. 81-75، تهران، ایران، 29-27 اردیبهشت 1378.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	ا. صیادیان، ک. بدیع، م. حکاک و م. ر. بیک‌زاده، "ارائه روش آماری FPG-GMM در بازشناسی گفتار،" مجموعه مقالات هشتمین کنفرانس مهندسی برق ایران، صص. 406-398، اصفهان، ایران، 30-28 اردیبهشت 1379.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	ا. اکبری و ب. ناصرشریف، "بازشناسی هجاها در اعداد دورقمی فارسی به وسیله مدل مخفی مارکف،" مجموعه مقالات ششمین کنفرانس سالانه انجمن کامپیوتر ایران، صص. 437-432، اصفهان، ایران، 4-2 اسفند 1379.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	م. م. همایون‌پور و ج. کبودیان، "بازشناسی اعداد فارسی بر روی خط تلفن: مقایسه‌ای بین روش‌های آماری، عصبی و هیبرید،" مجله مهندسی برق، سال چهاردهم، شماره آ-56، صص. 1065-1045، پاییز 1382.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	دانشگاه صنعتی امیرکبیر، گزارش نهایی طرح ملی پردازش زبان فارسی، شورای پژوهش‌های علمی کشور، کمیسیون اطلاع‌رسانی و فناوری اطلاعات، صص. 68-67، 1380.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Wu, Y. Chua, M. Zhang, H. Li, and K. C. Tan, "A spiking neural network framework for robust sound classification," Frontiers in Neuroscience, vol. 12, Article No.: 836, 17 pp., Nov. 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Wazir and J. Chuah, "Spoken Arabic digits recognition using deep learning," in Proc. IEEE Int. Conf. on Automatic Control 
and Intelligent Systems, I2CACIS’19, pp. 339-344, Selangor, Malaysia, 29-29 Jun. 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	E. Swedia, A. Mutiara, and M. Subali, "Deep learning long-short term memory (LSTM) for indonesian speech digit recognition using LPC and MFCC feature," in Proc. 3rd Int. Conf. on Informatics and Computing, ICIC’18, 5 pp., Palembang, Indonesia, 17-18 Oct. 2018.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	N. Zerari, S. Abdelhamid, H. Bouzgou, and C. Raymond, "Bi-directional recurrent end-to-end neural network classifier for spoken Arab digit recognition," in Proc. 2nd Int. Conf. on Natural Language and Speech Processing, ICNLSP’18, 6 pp., Algiers, Algeria, 25-26 Apr. 2018.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. B. Nassif, S. Ismail, A. Imtinan, A. Mohammad, and S. Khaled, "Speech recognition using deep neural networks: a systematic review," IEEE Access, vol. 7, pp. 19143-19165, 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	R. Sharmin, K. R. Shantanu, and R. H. Mohammad, "Bengali spoken digit classification: a deep learning approach using convolutional neural network," Procedia Computer Science, vol. 17, pp. 1381-1388, 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	B. Zada and U. Rahim, "Pashto isolated digits recognition using deep convolutional neural network," Heliyon, vol. 6, no. 2, Article No.: e03372, 6 pp., Feb. 2020.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. Graves, D. Eck, and J. Schmidhuber, LSTM and Timewarping: Spoken Digit Recognition with a Recurrent Neural Network, Technical Report, No. IDSIA-12-03, pp. 1-9, 2003.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	D. Dhanashri and S. B. Dhonde, "Isolated word speech recognition system using deep neural networks," in Proc. of the Int Conf. on Data Engineering and Communication Technology, Springer, Singapore, pp. 9-17, Aug. 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. Vihari, A. S. Murthy, P. Soni, and D. C. Naik, "Comparison of speech enhancement algorithms," Procedia Computer Science, vol. 89, pp. 666-676, 2016.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Pervaiz, et al., "Incorporating noise robustness in speech command recognition by noise augmentation of training data," Sensors, vol. 20, no. 8, pp. 2326-2344, 2020.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	D. Grozdic, J. Slobodan, S. P. Dragana, G. Jovan, and M. Branko, "Comparison of cepstral normalization techniques in whispered speech recognition," Advances in Electrical and Computer Engineering, vol. 17, no. 1, pp. 21-26, Feb. 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	V. Mitra, et al., "Robust features in deep-learning-based speech recognition," in S.Watanabe, M. Delcroix, F. Metze, and J.Hershey (eds) New Era for Robust Speech Recognition, Springer, Cham, pp. 187-217, 2017.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	D. Vazhenina and K. Markov, "End-to-end noisy speech recognition using Fourier and Hilbert spectrum features," Electronics, vol. 9, 
no. 7, pp. 1157-1174, 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. Chang and S. Wegmann, "On the importance of modeling and robustness for deep neural network feature," in Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, ICASSP’15, pp. 4530-4534, South Brisbane, Australia, 19-24 Apr. 2015.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. Tabibian, A. Akbari, and B. Nasersharif, "Keyword spotting 
using an evolutionary-based classifier and discriminative features," Engineering Applications of Artificial Intelligence, vol. 26, no. 7, pp. 1660-1670, Aug. 2013.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	S. A. Hejazi, R. Kazemi, and S. Ghaemmaghami, "Isolated persian digit recognition uding a hybrid HMM-SVM," in Proc. Int. Symp. on Intelligent Signal Processing and Communication Systems, 4 pp., Bangkok, Thailand, 8-11 Feb. 2009.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	L. Ming, Y. Wang, J. Wang, J. Wang, and X. Xie, "Speech enhancement method based on LSTM neural network for speech recognition," in Proc. 14th IEEE Int. Conf. on Signal Processing, ICSP’18, pp. 245-249, Beijing, China, 12-16 Aug. 2018.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	ش. طبیبیان، "بهبود بازشناسی ارقام مجزای فارسی در تلفن همراه بر مبنای کاهش خطای دسته‌بندی در سطح قاب،" مجموعه مقالات بیست و چهارمین کنفرانس ملی انجمن کامپیوتر ایرانصص. 135-128، تهران، ایران، 235-22 اسفند 1397.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	ش. طبیبیان، "بهبود بازشناسی ارقام مشابه فارسی مبتنی بر شبکه بازگشتی LSTM،" بیست و چهارمین کنفرانس ملی انجمن کامپیوتر ایران، صص. 438-432، تهران، ایران، 23-22 اسفند 1397.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	M. M. Naseri and S. Tabibian, "Improving the robustness of persian spoken isolated digit recognition based on LSTM," in Proc. 6th Int. Conf. of Signal Processing and Intelligent Systems, ICSPIS’20, 6 pp., Mashhad, Iran, 23-24 Dec. 2020.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	S. Hochreiter and J. Schmidhuber, "Long short term memory," Neural Computation, vol. 9, no. 8, pp. 1735-1780, 15 Nov. 1997.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	C. Olah, Understanding LSTM Networks, http://colah.github.io/posts/2015-08-Understanding-LSTMs/, 2015.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	Hidden Markov Model Toolkit (HTK), Speech vision and robotics group of the Cambridge University engineering department, http://htk.eng.cam.ac.uk/, August 2015.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	ش. طبیبیان، "طراحی و جمع‌آوری دادگان صوتی اعداد تک‌رقمی فارسی مبتنی بر تلفن همراه،" مجموعه مقالات چهارمین کنفرانس پردازش سیگنال و سیستم‌های هوشمند، 5 صص.، تهران، ایران، 4-4 دی 1397.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	A. M. Toh, R. Togneri, and S. Nordholm, "Spectral entropy as speech features for speech recognition," in Proc. of Postgraduate Electrical Engineering and Computing Symp., PEECS’05, pp. 22-25, Perth, Australia, 2005.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	G. Peeters, A Large Set of Audio Features for Sound Description (Similarity and Classification) in the CUIDADO Project, Cuidado Project Report, Ircam, pp. 1-25, 2004.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	C. Y. Lin, J. S. Rager Jang, and K. T. Chen, "Automatic segmentation and labeling for Mandarin Chinese Speech Corpora for concatenation-based TTS," Computer Linguistic Chinese Language Processing, vol. 10, pp. 145-166, 2005.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	P. Kathirvel, M. S. Manikandan, S. Senthilkumar, and K. P. Soman, "Noise robust zerocrossing rate computation for audio signal classification," in Proc.  3rd Int. Conf. on Trendz in Information Sciences &amp; Computing, TISC’11, pp. 65-69, Chennai, India, 8-9 Dec. 2011.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	K. Dietrich and J. Peters, "Testing the correlation of word error rate and perplexity," Speech Communication, vol. 38, no. 1-2, pp. 19-28, Sept. 2002.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	M. D. Mahony, Sensory Evaluation of Food: Statistical Methods and Procedures, CRC Press, 1986.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	MathWorks, Long Short-Term Memory Networks, https://www.mathworks.com/help/deeplearning/ug/long-short-term-memory-networks.html</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New High Speed Easily Expandable Digital Multiplication Algorithm without Pipeline</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>ebrahim</given_name><surname>hosseini</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Morteza</given_name><surname>Mousazadeh</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>4</day><year>2021</year></publication_date><pages><first_page>18</first_page><last_page>26</last_page></pages><doi_data><doi>10.66224/ijece.28871.19.1.18</doi><resource>http://ijece.org/fa/Article/28871</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28871</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28871</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28871</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28871</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28871</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28871</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28871</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. D. Booth, "A signed binary multiplication technique," the Quarterly J. of Mechanics and Applied Mathematics, vol. 4, no. 2, pp. 236-240, 1951.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. S. Wallace, "A suggestion for a fast multiplier," IEEE Trans. on Electronic Computers, vol. 13, no. 1, pp. 14-17, Feb. 1964.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	O. L. MacSorley, "High-speed arithmetic in binary computers," in Proc. of the IRE, vol. 49, no. 1, pp. 67-91, Jan. 1961.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. A. Pucknell and K. Eshraghian, Basic VLSI Design: Systems and Circuits, Prentice Hall Englewood Cliffs, New Jersey, USA, 1988.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Fried, "Minimizing energy dissipation in high-speed multipliers," in Proc. of the Int. Symp. on Low Power Electronics and Design, pp. 214-219, Monterey, CA, USA, 8-20 Aug. 1997.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	H. Ghasemizadeh, E. Azadi, K. Hadidi, and A. Khoei, "A 1.6 GHz 16×16-bit low-latency pipelined booth multiplier," in Proc. 19th Iranian Conf. on Electrical Engineering, ICEE'11, 6 pp., Tehran, Iran, 17-19 May 2011.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Weinberger and J. Smith, "A logic for high-speed addition," Nat. Bur. Stand. Circ, vol. 591, pp. 3-12, 1958.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	L. Morgan and D. Jarvis, "Transistor logic using current switching and routing techniques and its application to a fast 'carry' propagation adder," Proc. of the IEE-Part B: Electronic and Communication Engineering, vol. 106, pp. 467-468, 1959.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Lehman and N. Burla, "Skip techniques for high-speed carry-propagation in binary arithmetic units," IRE Trans. on Electronic Computers, vol. 10, no. 4, pp. 691-698, Dec. 1961.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	R. P. Brent and H. T. Kung, "A regular layout for parallel adders," IEEE Trans. on Computers, vol. 31, no. 3, pp. 260-264, Mar. 1982.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Sklansky, "Conditional-sum addition logic," IRE Trans. on Electronic Computers, vol. 9, no. 2, pp. 226-231, Jun. 1960.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	P. M. Kogge and H. S. Stone, "A parallel algorithm for the efficient solution of a general class of recurrence equations," IEEE Trans. on Computers, vol. 22, no. 8, pp. 786-793, Aug. 1973.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. C. Chow and I. C. Wey, "A 3.3 V 1 GHz high speed pipelined booth multiplier," in Proc. IEEE Int. Symp. on Circuits and Systems, ISCAS'02, pp. 1-1, Phoenix-Scottsdale, AZ, USA, 26-29 May 2002.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	K. H. Chen and Y. S. Chu, "A low-power multiplier with the spurious power suppression technique," IEEE Trans. on Very Large Scale Integration (VLSI) Systems, vol. 15, no. 7, pp. 846-850, Jul. 2007.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Saha, D. Pal, and M. Chandra, "Low-power 6-GHz wave-pipelined 8b×8b multiplier," IET Circuits, Devices &amp; Systems, vol. 7, no. 3, pp. 124-140, May 2013.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Z. Huang and M. D. Ercegovac, "High-performance low-power left-to-right array multiplier design," IEEE Trans. on Computers, vol. 54, no. 3, pp. 272-283, 2005.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. R. Kuang, J. P. Wang, and C. Y. Guo, "Modified booth multipliers with a regular partial product array," IEEE Trans. on Circuits and Systems II: Express Briefs, vol. 56, no. 5, pp. 404-408, May 2009.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	V. S. Dimitrov, K. U. Jarvinen, and J. Adikari, "Area-efficient multipliers based on multiple-radix representations," IEEE Trans. on Computers, vol. 60, no. 2, pp. 189-201, Feb. 2011.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	P. Mokrian, M. Ahmadi, G. Jullien, and W. Miller, "A reconfigurable digital multiplier architecture," in Proc. Canadian Conf. on Electrical and Computer Engineering. Toward a Caring and Humane Technology, CCECE’03, vol. 1, pp. 125-128, Montreal, Canada, 4-7 May 2003.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improving Energy Consumption in Wireless Sensor Networks Using Shuffled Frog Leaping Algorithm and Fuzzy Logic</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Shayesteh</given_name><surname>Tabatabaey</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>4</day><year>2021</year></publication_date><pages><first_page>43</first_page><last_page>51</last_page></pages><doi_data><doi>10.66224/ijece.28888.19.1.43</doi><resource>http://ijece.org/fa/Article/28888</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28888</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28888</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28888</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28888</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28888</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28888</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28888</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K. Romer and F. Mattern, "The design space of wireless sensor networks," IEEE Wireless Communications, vol. 11, no. 6, pp. 54-61, Dec. 2004.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	B. Baranidharan, S. Srividhya, and B. Santhi, "Energy efficient hierarchical unequal clustering in wireless sensor networks," Indian J. Sci Technol, vol. 7, no. 3, pp. 301-305, Apr. 2014.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Tabatabaei and A. M. Rigi, "Reliable routing algorithm based on clustering and mobile sink in wireless sensor networks," Wireless Personal Communications, vol. 108, no. 4, pp. 2541-2558, May 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Radhika and P. Rangarajan, "On improving the lifespan of wireless sensor networks with fuzzy based clustering and machine learning based data reduction," Applied Soft Computing, vol. 83, Article No.: 105610, Oct. 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Fyffe, M. T. Sun, and X. Ma, "Traffic-adapted load balancing in sensor networks employing geographic routing," in Proc. IEEE Wireless Communications and Networking Conf., WCNC’07, pp. 4389-4394, Hong Kong, China, 11-15 Mar. 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R. Logambigai, S. Ganapathy, and A. Kannan, "Energy-efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks," Computers &amp; Electrical Engineering, 
vol. 68, pp. 62-75, 2018.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Arghavani, M. Esmaeili, M. Esmaeili, F. Mohseni, and A. Arghavani, "Optimal energy aware clustering in circular wireless sensor networks," Ad Hoc Networks, vol. 65, pp. 91-98, Oct. 2017.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Tabatabaei, A. Rajaei, and A. M. Rigi, "A novel energy-aware clustering method via lion pride optimizer algorithm (LPO) and fuzzy logic in wireless sensor networks (WSNs)," Wireless Personal Communications, vol. 108, pp. 1803-1825, 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Shelebaf and S. Tabatabaei, "A novel method for clustering in WSNs via TOPSIS multi-criteria decision-making algorithm," Wireless Personal Communications, vol. 112, pp. 985-1001, 2020.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	R. Singh and A. K. Verma, "Energy efficient cross layer based adaptive threshold routing protocol for WSN," AEU-International J. of Electronics and Communications, vol. 72, pp. 166-173, Feb. 2017.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	D. R. Chen, L. C. Chen, M. Y. Chen, and M. Y. Hsu, "A coverage-aware and energy-efficient protocol for the distributed wireless sensor networks," Computer Communications, vol. 137, pp. 15-31, 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Wang, S. Wang, and B. Zhang, "APTEEN routing protocol optimization in wireless sensor networks based on combination of genetic algorithms and fruit fly optimization algorithm," Ad Hoc Networks, vol. 102, Article No.: 102138, 1 May 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	W. Rehan, S. Fischer, M. Rehan, Y. Mawad, and S. Saleem, "QCM2R: a QoS-aware cross-layered multichannel multisink routing protocol for stream based wireless sensor networks," J. of Network and Computer Applications, vol. 156, Article No.: 102552, 15 Apr. 2020.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	N. P. Mahalik, Sensor Networks and Configuration, Springer, 2007.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Efficient Approach for Resource Allocation in Fog Computing Considering Request Congestion Conditions </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Samira</given_name><surname>Ansari Moghaddam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>سميرا</given_name><surname>نوفرستي</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>مهري</given_name><surname>رجايي</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>4</day><year>2021</year></publication_date><pages><first_page>35</first_page><last_page>42</last_page></pages><doi_data><doi>10.66224/ijece.28909.19.1.35</doi><resource>http://ijece.org/fa/Article/28909</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28909</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28909</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28909</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28909</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28909</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28909</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28909</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K. Ashton, "That 'internet of things' thing," RFID J., vol. 22, no. 7, pp. 97-114, Jun. 2009.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Bahrami and M. Singhal, "The role of cloud computing architecture in big data," in Information Granularity, Big Data, and Computational Intelligence, Springer, Switzerland, Cham, vol. 8, pp. 275-295, 2015.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. Xu, et al., "Improved particle swarm optimization based workflow scheduling in cloud-fog environment," in Proc. Int. Conf. on Business Process Management, BPM’21, vol. 342, pp. 337-347, Rome, Italy, 6-10 Sept. 2018.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. K. Mishra, D. Puthal, J. J. P. C. Rodrigues, B. Sahoo, and E. Dutkiewicz, "Sustainable service allocation using a metaheuristic technique in a fog server for industrial applications," IEEE Trans. on Industrial Informatics, vol. 14, no. 10, pp. 4497-4506, Oct. 2018.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	L. F. Bittencourt, J. D. Montes, R. Buyya, O. F. Rana, and M. Parashar, "Mobility-aware application scheduling in fog computing," IEEE Cloud Computing, vol. 4, no. 2, pp. 26-35, Mar./Apr. 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Verma, N. Bhardwaj, and A. K. Yadav, "Real time efficient scheduling algorithm for load balancing in fog computing environment," International Journal of Information Technology and Computer Science, vol. 8, no. 4, pp. 1-10, 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	V. B. C. Souza, et al., "Handling service allocation in combined fog-cloud scenarios," in Proc. IEEE Int. Conf. on Communications, ICC’16, 5 pp., Kuala Lumpur, Malaysia, 22-27 May 2016.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Y. Sun, T. Dang, and J. Zhou, "User scheduling and cluster formation in fog computing based radio access networks," in Proc. IEEE Int. Conf. on Ubiquitous Wireless Broadband, ICUWB’16, 4 pp., Nanjing, China, 16-19 Oct. 2016.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. Deng, R. Lu, C. Lai, and T. H. Luan, "Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing," in Proc. IEEE Int. Conf. on Communications ICC’15, pp. 3909-3914, London, UK, 8-12 Jun. 2015.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	R. Deng, R. Lu, C. Lai, T. H. Luan, and H. Liang, "Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption," IEEE Internet of Things J., vol. 6, no. 3, pp. 1171-1181, Dec. 2016.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	L. Liu, D. Qi, N. Zhou, and Y. Wu, "A task scheduling algorithm based on classification mining in fog computing environment," Wireless Communications and Mobile Computing, vol. 2018, Article No. 2102348, 11 pp., 2018.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	م. اسدی و آ. طباطبایی، " روش پیشنهادی برای کاهش استفاده پهنای باند در مهاجرت زنده کانتینر در لایه مه،" مجموعه مقالات ششمین کنفرانس وب¬پژوهی، 7 صص.، تهران، ایران، 22-22 خرداد 1399.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	D. Goncalves, K. Velasquez, M. Curado, L. Bittencourt, and E. Madeira, "Proactive virtual machine migration in fog environments," in Proc. IEEE Symp. on Computers and Communications, ISCC’18, pp. 742-745, Natal, Brazil, 25-28 Jun. 2018.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	X. Q. Pham and E. N. Huh, "Towards task scheduling in a cloud-fog computing system," in Proc. IEEE 18th Asia-Pacific Network Operations and Management Symposium, APNOMS’16, 4 pp., Kanazawa, Japan, 5- 7 Oct. 2016.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Bitam, S. Zeadally, and A. Mellouk, "Fog computing job scheduling optimization based on bees swarm," Enterprise Information Systems, vol. 12, no. 4, pp. 373-397, 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. Fan, X. Wei, T. Wang, T. Lan, and S. Subramaniam, "Deadline-aware task scheduling in a tiered IoT infrastructure," in Proc. IEEE Global Communications Conf., GLOBECOM’17, 7 pp., Singapore, Singapore, 4-8 Dec. 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Kabirzadeh, D. Rahbari, and M. Nickray, "A security aware scheduling in fog computing by hyper heuristic algorithm," in 
Proc. 3rd Iranian Conf. on Intelligent Systems and Signal Processing, ICSPIS’17, pp. 87-92, Shahrood, Iran, 20-21 Dec. 2017.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. Kabirzadeh, D. Rahbari, and M. Nickray, "A hyper heuristic algorithm for scheduling of fog networks," in Proc. 21st Conf. of Open Innovations Association, FRUCT’17, pp. 148-155, Helsinki, Finland, 6-10 Nov. 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	T. Choudhari, M. Moh, and T. S. Moh, "Prioritized task scheduling in fog computing," in Proc. of the ACMSE Conf., 8 pp., New York, NY, USA, 29-31 Mar. 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	H. Zhang, Y. Xiao, S. Bu, D. Niyato, F. R. Yu, and Z. Han, "Computing resource allocation in three-tier IoT fog networks: a joint optimization approach combining Stackelberg game and matching," IEEE Internet of Things J., vol. 4, no. 5, pp. 1204-1215, 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	H. Gupta, A. V. Dastjerdi, S. K. Ghosh, and R. Buyya, "iFogSim: a toolkit for modeling and simulation of resource management techniques in the Internet of Things, edge and fog computing environments," Software: Practice and Experience, vol. 47, no. 9, pp. 1275-1296, Jun. 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	H. E. Refaat and M. A. Mead, "DLBS: decentralize load-balance scheduling algorithm for real-time IoT services in mist computing," International J. of Advanced Computer Science and Applications, vol. 10, no. 9, pp. 92-100, Sept. 2019.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	A. Khalid and M. Shahbaz, "Service architecture models for fog computing: a remedy for latency issues in data access from clouds," Trans. on Internet and Information Systems, vol. 11, no. 5, pp. 2310-2345, 2017</unstructured_citation></citation><citation key="ref24"><unstructured_citation>.
[24]	D. Rathod and C. Girish, "Load balancing of fog computing centers: minimizing response time of high priority requests," International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 11, pp. 2713-2716, Sep. 2019.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. N. Srirama, K. Ramamohanarao, R. Buyya, and M. R. Mahmud, "Quality of Experience (QoE)-aware placement of applications in fog computing environments," Journal of Parallel and Distributed Computing, vol. 132, pp. 190-203, Oct. 2018.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	B. Dewulf, T. Neutens, M. Vanlommel, and S. Logghe, "Examining commuting patterns using Floating Car Data and circular statistics: exploring the use of new methods and visualizations to study travel times," Journal of Transport Geography, vol. 48, pp. 41-51, Oct. 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Proposing a Novel Write Circuit to Reduce Energy and Delay of Writing Operations in STT-MRAM Memories Using the Temperature Method</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>امیرمحمد</given_name><surname>حاجی صادقی</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>حمیدرضا</given_name><surname>زرندی</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sh.</given_name><surname>Jalilian</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>4</day><year>2021</year></publication_date><pages><first_page>27</first_page><last_page>34</last_page></pages><doi_data><doi>10.66224/ijece.28911.19.1.27</doi><resource>http://ijece.org/fa/Article/28911</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28911</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28911</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28911</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28911</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28911</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28911</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28911</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	 [1]	W. Kang, E. Deng, Z. Wang, شدی W. Zhao, "Spintronic logic-in-memory paradigms and implementations," Applications of Emerging Memory Technology, vol. 63, no. 1, pp. 215-229, Jan. 2020.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	F. Schwierz and J. J. Liou, "Status and future prospects of CMOS scaling and Moore's law-a personal perspective," in Proc. IEEE Latin America Electron Devices Conf., LAEDC’20, 4 pp., 25-25 Feb. 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. M. Monazzah, A. M. Rahmani, A. Miele, and N. Dutt., "CAST: content-aware STT-MRAM cache write management for different levels of approximation," IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 12, pp. 4385-4398, Dec. 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	N. G. Orji, "Beyond CMOS," International Roadmap for Devices and Systems (IRDS), [Online]. Available: https://irds.ieee.org/editions/2018.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. Farkhani, M. Tohidi, A. Peiravi, J.K. Madsen, and F. Moradi, "STT-RAM energy reduction using self-referenced differential write termination technique," IEEE Trans. on Very Large-Scale Integration and Systems, vol. 25, no. 2, pp. 476-487, Feb. 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R. Bishnoi, M. Ebrahimi, F. Oboril, and M. B. Tahoori, "Improving write performance for STT-MRAM," IEEE Trans. on Magnetics, vol. 52, no. 8, pp. 1-11, Aug. 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Seyedfaraji, J. Talafy, A. M. Hajisadeghi and H.R. Zarandi, "DUSTER: dual source write termination method for STT-RAM memories," in Proc. 21st. Euromicro Conf. on Digital System Design, pp. 182-189, 29-31 Aug. 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	N. Sayed, F. Oboril, A. Shirvanian, R. Bishnoi and M. B. Tahoori, "Exploiting STT-MRAM for approximate computing," in Proc. IEEE 22nd. European Test Symp., 6 pp., Limassol, Cyprus, 22-26 May 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	W. Kang, et al., "Reconfigurable codesign of STT-MRAM under process variations in deeply scaled technology," IEEE Trans. on Electron Devices, vol. 62, no. 6, pp. 1769-1777, Jun. 2015.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	L. Wu, M. Taouil, S. Rao, E. J . Marinissen, and S. Hamdioui, Survey on STT-MRAM Testing: Failure Mechanisms, Fault Models, and Tests, arXiv, 2001.05463, 2020.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	D. Suzuki, M. Natsui, A. Mochizuki, and T. Hanyu, "Cost-efficient self-terminated write driver for spin-transfer-torque RAM and logic," IEEE Trans. on Magnetics, vol. 50, no. 11, pp. 1-4, Nov. 2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	B. Wu, Y. Cheng, J. Yang; A. Todri-Sanial, and W. Zhao., "Temperature impact analysis and access reliability enhancement for 1T1MTJ STT-RAM," IEEE Trans. on Reliability, vol. 65, no. 4, pp. 1755-1768, Dec. 2015.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	W. Kang, Y. Ran, Y. Zhang, and W. Zhao, "Modeling and exploration of the voltage-controlled magnetic anisotropy effect for the next generation low-power and high-speed MRAM applications," IEEE Trans. Transactions on Nanotechnology, vol. 16, no. 3, pp. 387-395, May 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	L. Yang, et al., "A body-biasing of readout circuit for STT-RAM with improved thermal reliability," in Proc. IEEE Int. Symp. on Circuits and Systems, pp. 1530-1533, Lisbon, Portugal, 24-27 May 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	X. Fong, S. H. Choday, P. Georgios, C. Augustine, and K. Roy, Purdue Nanoelectronics Research Laboratory Magnetic Tunnel Junction Model 1.0.0, 2014, [On-line]. Available: https://nanohub.org.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	C. Lin, et al., "45 nm low power CMOS logic compatible embedded STT MRAM utilizing a reverse-connection 1T/1MTJ cell," in Proc. Int. Electron Devices Meeting, 4 pp., Baltimore, MD, USA, 7-9 Dec. 2009.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	K. Lee and S. H. Kang, "Design consideration of magnetic tunnel junctions for reliable high-temperature operation of STT-MRAM," IEEE Trans. on Magnetics, vol. 46, no. 6, pp. 1537-1540, Jun. 2010.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Y. Zhang, et al., "Compact modeling of perpendicular-anisotropy CoFeB/MgO magnetic tunnel junctions," IEEE Trans. Electron Devices, vol. 59, no. 3, pp. 819-826, May 2012</unstructured_citation></citation><citation key="ref19"><unstructured_citation>.
[19]	S. Ikeda, S. Fukami, F. Matsukura, and H. Ohno, "Perpendicular-anisotropy CoFeB-MgO magnetic tunnel junctions with a MgO/CoFeB/Ta/CoFeB/MgO recording structure," Appl. Phys. Lett, vol. 101, no. 2, pp. 214-224-???, May 2012.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Predictive Technology Model (PTM), [Accessed: 24-Sept.-2020]. Available: https://www.eas.asu.edu/∼ptm.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. C. Garcia, A. Juan, and S. Nooshabadi., "Single supply CMOS up level shifter for dual voltage system," in Proc. IEEE Int. Symp. on Circuits and Systems, 4 pp., Baltimore, MD, USA, 28-31 May 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	K. N. Shim, J. Hu, and J. Silva-Martinez, "Dual-level adaptive supply voltage system for variation resilience," IEEE Trans. on Very Large-Scale Integration Systems, vol. 21, no. 6, pp. 1041-1052, Jun. 2013.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	R. Bishnoi, F. Oboril, M. Ebrahimi, and M.B. Tahoori, "Self-timed read and write operations in STT-MRAM," IEEE Trans. on Very Large-Scale Integration Systems, vol. 24, no. 5, pp. 1783-1793, May 2016.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. Chintaluri, H. Naeimi, S. Natarajan and A. Raychowdhury, "Analysis of defects and variations in embedded Spin Transfer Torque (STT) MRAM arrays," Journal on Emerging and Selected Topics in Circuits and Systems, vol. 6, no. 3, pp. 319-329, Sept. 2016.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Construction of Scalable Decision Tree Based on Fast Data Partitioning and Pre-Pruning</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>سميه</given_name><surname>لطفي</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad</given_name><surname>Ghasemzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mehran</given_name><surname>Mohsenzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mitra</given_name><surname>Mirzarezaee</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>4</day><year>2021</year></publication_date><pages><first_page>52</first_page><last_page>58</last_page></pages><doi_data><doi>10.66224/ijece.29083.19.1.52</doi><resource>http://ijece.org/fa/Article/29083</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29083</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29083</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29083</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29083</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29083</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29083</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29083</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. Agarwal, "Data mining: data mining concepts and techniques," 
in Proc. IEEE Int. Conf. on Machine Intelligence and Research Advancement, . pp. 203-207, Katra, India, 21-23 Dec. 2013.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. B. Kotsiantis, "Decision trees: a recent overview," Artificial Intelligence Review, vol. 39, no. 4, pp. 261-283, 2013.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Z. Ruiz, J. Salvador, and J. Garcia-Rodriguez, "A survey of machine learning methods for big data," in International Work-Conf. on the Interplay Between Natural and Artificial Computation, pp. 259-267, Springer, Cham, Jun. 2017.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Lomax and S. Vadera, "A survey of cost-sensitive decision tree induction algorithms," ACM Computing Surveys (CSUR), vol. 45, no. 2, pp. 1-35, Feb. 2013.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Y. L. Chen, C. C. Wu, and K. Tang, "Time-constrained cost-sensitive decision tree induction," Information Sciences, vol. 354, pp. 140-152, Mar. 2016.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. Stahl and M. Bramer, "Jmax-pruning: a facility for the information theoretic pruning of modular classification rules," Knowledge-Based Systems, vol. 29, pp. 12-19, 2012.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Hwang, H. G. Yeo, and J. S. Hong, "A new splitting criterion for better interpretable trees," IEEE Access, vol. 8, pp. 62762-62774, 2020.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. Gehrke, V. Ganti, R. Ramakrishnan, and W. Y. Loh, "BOAT-optimistic decision tree construction," ACM SIGMOD Record, vol. 28, no. 2, pp. 169-180, Jun. 1999.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Mehta, R. Agrawal, and J. Rissanen, "SLIQ: a fast scalable classifier for data mining," Advances in Database Technology-EDBT'96, pp. 18-32, 1996.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Shafer, R. Agrawal, and M. Mehta, "SPRINT: a scalable parallel classifier for data mining," in Proc. Int. Conf. Very Large Data Bases, vol. 96, pp. 544-555, 3-6 Sept. 1996.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Gehrke, R. Ramakrishnan, and V. Ganti, "Rainforest-a framework for fast decision tree construction of large datasets," Data Mining and Knowledge Discovery, vol. 4, pp. 127-162, 2000.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	G. Hulten and P. Domingos, "Mining decision trees from streams," in Garofalakis M., Gehrke J., Rastogi R. (eds.) Data Stream Management. Data-Centric Systems and Applications. pp. 189-208, Springer Berlin Heidelberg, 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	C. C. Wu, Y. L. Chen, Y. H. Liu, and X. Y. Yang, "Decision tree induction with a constrained number of leaf nodes," Applied Intelligence, vol. 45, no. 3, pp. 673-685, Oct. 2016.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Franco-Arcega, J. A. Carrasco-Ochoa, G. Sanchez-Diaz, and J. F. Martinez-Trinidad, "Decision tree induction using a fast splitting attribute selection for large datasets," Expert Systems with Applications, vol. 38, no. 11, pp. 14290-14300, Oct. 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	B. Chandra, R. Kothari, and P. Paul, "A new node splitting measure for decision tree construction," Pattern Recognition, vol. 43, no. 8, pp. 2725-2731, Aug. 2010.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. S. Akash, M. E. Kadir, A. A. Ali, and M. Shoyaib, "Inter-node hellinger distance based decision tree," in Proc. 28th Int. Joint Conf. on Artificial Intelligence, IJCAI’19, pp. 1967-1973, Aug. 2019.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Bramer, "Using J-pruning to reduce overfitting in classification trees," Knowledge-Based Systems, vol. 15, no. 5, pp. 301-308, Jul. 2002.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>