﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022920</doi_batch_id><timestamp>14050229202442</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>3</month><day>5</day><year>2022</year></publication_date><journal_volume><volume>19</volume></journal_volume><issue>4</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Proposing a Robust Method Against Adversarial Attacks Using Scalable Gaussian Process and Voting</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mehran</given_name><surname>Safayani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Pooyan</given_name><surname>Shalbafan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyed Hashem</given_name><surname>Ahmadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahdieh</given_name><surname>Falah aliabadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Abdolreza</given_name><surname>Mirzaei</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2022</year></publication_date><pages><first_page>275</first_page><last_page>288</last_page></pages><doi_data><doi>10.66224/ijece.28868.19.4.275</doi><resource>http://ijece.org/fa/Article/28868</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28868</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28868</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28868</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28868</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28868</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28868</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28868</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	I. J. Goodfellow, J. Shlens, and C. Szegedy, "Explaining and harnessing adversarial examples," in Proc. 3rd Int. Conf. on Learning Representations, ICLR’15, 11 pp., San Diego, CA, USA, 7-9 May 2015.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. Szegedy, et al., "Intriguing properties of neural networks," in Proc. 2nd Int. Conf. on Learning Representations, ICLR ‘14, 15 pp., Banff, Canada,  14-16 Apr. 2014.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. Su, D. V. Vargas, and K. Sakurai, "One pixel attack for fooling deep neural networks," IEEE Trans. on Evolutionary Computation, vol. 23, no. 5, pp. 828-841, Oct. 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	N. Martins, J. M. Cruz, T. Cruz, and P. Henriques Abreu, "Adversarial machine learning applied to intrusion and malware scenarios: a systematic review," IEEE Access, vol. 8, pp. 35403-35419, 2020.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	X. Peng, H. Xian, Q. Lu, and X. Lu, "Semantics aware adversarial malware examples generation for black-box attacks," Applied Soft Computing, vol. 109, Article ID: 107506, Sept. 2021.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. Y. Chen, C. T. Chen, C. Y. Sang, Y. C. Yang, and S. H. Huang, "Adversarial attacks against reinforcement learning-based portfolio management strategy," IEEE Access, vol. 9, pp. 50667-50685, 2021.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Ramadan, "Detecting adversarial attacks on audio-visual speech recognition using deep learning method," International J. of Speech Technology, Article ID: 02.06.2021, 21 pp., Jun. 2021</unstructured_citation></citation><citation key="ref8"><unstructured_citation>.
[8]	L. Yang, Q. Song, and Y. Wu, "Attacks on state-of-the-art face recognition using attentional adversarial attack generative network," Multimedia Tools and Applications, vol. 80, pp. 1-21, 2021.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Y. Zuo, H. Yao, and C. Xu, "Category-level adversarial self-ensembling for domain adaptation," in Proc. IEEE Int. Conf. on Multimedia and Expo, ICME’20, 6 pp., London, UK, 6-10 Jul. 2020.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Z. Wei, et al., "Heuristic black-box adversarial attacks on video recognition models," in Proc. of the 34th AAAI Conf. on Artificial Intelligence, pp. 12338-12345, New York, NY, USA, 7-12 Feb. 2020.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	D. Wang, et al., "Daedalus: breaking nonmaximum suppression in object detection via adversarial examples," IEEE Trans. on Cybernetics, Early Acces, pp. 1-14, 2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	I. Goodfellow, et al, "Generative adversarial nets," in Advances in Neural Information Processing Systems 27, Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger, Eds., pp. 2672-2680, 2014.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	C. Blundell, J. Cornebise, K. Kavukcuoglu, and D. Wierstra, "Weight uncertainty in neural network," in Proc. of the 32nd Int. Conf. on Machine Learning, vol. 37, pp. 1613-1622, Lille, France, Jul. 2015.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Rahimi and B. Recht, "Random features for large-scale kernel machines," Advances in Neural Information Processing Systems, NIPS’08, pp. 1177-1184, Vancouver and Whister, Canada, 3-6 Dec. 2008.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	K. Cutajar, E. V. Bonilla, P. Michiardi, and M. Filippone, "Random feature expansions for deep Gaussian processes," in Proc. of the 34th Int. Conf. on Machine Learning, , pp. 884-893, Sydney, Australia, Aug. 2017.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. Rozsa, E. M. Rudd, and T. E. Boult, "Adversarial diversity and hard positive generation," in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, CVPR’16, pp. 25-32, Las Vegas, NV, USA, 27-30 Jun. 2016.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Y. Dong, F. Liao, T. Pang, H. Su, J. Zhu, X. Hu, and J. Li, "Boosting adversarial attacks with momentum," in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, CVPR’18, pp. 9185-9193, Salt Lake City, UT, USA, 18-23 Jun. 2018.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	F. Tramer, et al., "Ensemble adversarial training: attacks and defenses," in Proc. 6th Int. Conf. on Learning Representations, ICLR’18, 20 pp., Vancouver, Canada, 30 Apr.-3 May 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Kurakin, I. J. Goodfellow, and S. Bengio, "Adversarial examples in the physical world," in Proc. 5th Int. Conf. on Learning Representations, ICLR’17, 15 pp., Toulon, France, 24-26 Apr. 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. M. Moosavi-Dezfooli, A. Fawzi, and P. Frossard, "Deepfool: a simple and accurate method to fool deep neural networks," in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, CVPR’16,, pp. 2574-2582, Las Vegas, NV, USA, 27-30 Jun. 2016.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	X. Yuan, P. He, Q. Zhu, and X. Li, "Adversarial examples: attacks and defenses for deep learning," IEEE Trans. on Neural Networks and Learning Systems, vol. 30, no. 9, pp. 2805-2824, Sept. 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. M. Moosavi-Dezfooli, A. Fawzi, O. Fawzi, and P. Frossard, "Universal adversarial perturbations," in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, CVPR’17, pp. 1765-1773, Honolulu, HI, USA, 21-26 Jul. 2017.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	C. Zhang, P. Benz, T. Imtiaz, and I. S. Kweon, "Understanding adversarial examples from the mutual influence of images and perturbations," in Proc. of the IEEE/CVF Conf. on Computer Vision and Pattern Recognition, CVPR’20, pp. 14509-14518, Seattle, WA, USA, 13-19 Jun. 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. Demontis, M. Melis, M. Pintor, M. Jagielski, B. Biggio, A. Oprea, C. Nita-Rotaru, and F. Roli, "Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks," in Proc. 28th USENIX Security Symp., USENIX Security, pp. 321-338, Santa Clara, CA,USA, 14-16 Aug. 2019.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	N. Carlini and D. A. Wagner, "Towards evaluating the robustness of neural networks," in Proc. IEEE Symp. on Security and Privacy, pp. 39-57, San Jose, CA, USA, 22-26 May 2017.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	J. Rony, L. G. Hafemann, L. S. Oliveira, I. B. Ayed, R. Sabourin, and E. Granger, "Decoupling direction and norm for efficient gradient-based L2 adversarial attacks and defenses," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR’19, pp. 4322-4330, , Long Beach, CA, USA, Jun. 2019.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Y. Liu and F. Cao, "Self-adaptive norm update for faster gradient based L2 adversarial attacks and defenses," in Proc. of the 10th Int. Conf. on Pattern Recognition Applications and Methods, ICPRAM’21, vol. 1, pp. 15-24, Vienna, Austria, 4-6 Feb. 2021.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	N. Papernot, P. McDaniel, X. Wu, S. Jha, and A. Swami, "Distillation as a defense to adversarial perturbations against deep neural networks," in Proc. IEEE Symp. on Security and Privacy, pp. 582-597, San Jose, CA,USA, 22-26 May 2016.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	J. Bradshaw, A. G. d. G. Matthews, and Z. Ghahramani, Adversarial Examples, Uncertainty, and Transfer Testing Robustness in Gaussian Process Hybrid Deep Networks, arXiv preprint arXiv:1707.02476, 2017.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	J. H. Metzen, T. Genewein, V. Fischer, and B. Bischoff, "On detecting adversarial perturbations," in Proc.  5th Int. Conf. on Learning Representations, ICLR’17, 12 pp., Toulon, France, Apr. 2017.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	D. Hendrycks and K. Gimpel, "Early methods for detecting adversarial images," in Proc. 5th Int. Conf. on Learning Representations, Workshop Track, ICLR’17, 9 pp., Toulon, France, Apr. 2017.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	J. Wei, Adversarial Examples for Visual Decompilers, Master's Thesis, EECS Department, University of California, Berkeley, May 2017.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	C. Xie, M. Tan, B. Gong, J. Wang, A. L. Yuille, and Q. V. Le, "Adversarial  examples  improve  image  recognition,"  in  Proc. IEEE/CVF Conf. on Computer Vision and Pattern Recognition, CVPR’20, pp. 816-825, Seattle, WA, USA, 13-19 Jun. 2020. </unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	H. Zheng, Z. Zhang, J. Gu, H. Lee, and A. Prakash, "Efficient adversarial training with transferable adversarial examples," in Proc. IEEE/CVF Conf. on Computer Vision and Pattern Recognition, CVPR’20, pp. 1178-1187, Seattle, WA, USA, 13-19 Jun. 2020.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	F. Guo, et al., "Detecting adversarial examples via prediction difference for deep neural networks," Information Sciences, vol. 501, pp. 182-192, Oct. 2019.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	H. Zhang, M. Cisse, Y. N. Dauphin, and D. Lopez-Paz, "Mixup: beyond empirical risk minimization," in Proc. 6th Int. Conf. on Learning Representations, ICLR’18, 13 pp., Vancouver, Canada, 30 Apr.-3 May 2018.
</unstructured_citation></citation><citation key="ref37"><unstructured_citation> 

[37]	P. Pauli, A. Koch, J. Berberich, P. Kohler, and F. Allgower, "Training robust neural networks using lipschitz bounds," IEEE Control. Syst. Lett., vol. 6, pp. 121-126, 2021.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	A. Graves, "Practical variational inference for neural networks," in Proc. 25th Annual Conf. on Neural Information Processing Systems, NIPS’11, pp. 2348-2356, Sierra Nevada, Spain, 16-17 Dec. 2011.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	C. M. Bishop, Pattern Recognition and Machine Learning, Springer, 2006.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	J. Quinonero-Candela and C. E. Rasmussen, "A unifying view of sparse approximate gaussian process regression," J. of Machine Learning Research, vol. 6, pp. 1939-1959, Dec. 2005.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	V. Tresp, "A bayesian committee machine," Neural Computation, vol. 12, no. 11, pp. 2719-2741, Nov. 2000.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	T. Chen and J. Ren, "Bagging for gaussian process regression," Neurocomputing, vol. 72, no. 7-9, pp. 1605-1610, Mar. 2009.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	E. Rodner, A. Freytag, P. Bodesheim, and J. Denzler, "Large-scale gaussian process classification with flexible adaptive histogram kernels," in Proc. European Conf. on Computer Vision, ECCV’12, pp. 85-98, Florence, Italy, 7-13 Oct 2012.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	M. Sło´nski, "Bayesian neural networks and gaussian processes in identification of concrete properties," Computer Assisted Methods in Engineering and Science, vol. 18, no. 4, pp. 291-302, 2017.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	C. K. Williams and C. E. Rasmussen, Gaussian Processes for Machine Learning, MIT Press Cambridge, MA, 2006.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	A. Mustafa, et al., "Adversarial defense by restricting the hidden space of deep neural networks," in Proc. IEEE/CVF Int. Conf. on Computer Vision, ICCV’19, pp. 3384-3393, Seoul, South Korea, 27 Oct.-2 Nov. 2019.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	Y. Lecun, L. Bottou, Y. Bengio, and P. Haffner, "Gradient-based learning applied to document recognition," Proceedings of the IEEE, 
vol. 86, no. 11, pp. 2278-2324, Nov. 1998.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	H. Khosravi and E. Kabir, "Introducing a very large dataset of handwritten farsi digits and a study on their varieties," Pattern Recognit. Lett., vol. 28, no. 10, pp. 1133-1141, 2007.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Detecting Human Activities Based on Motion Sensors in IOT Using Deep Learning</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Abbas</given_name><surname>Mirzaei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>fatemeh</given_name><surname>faraji</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2022</year></publication_date><pages><first_page>313</first_page><last_page>324</last_page></pages><doi_data><doi>10.66224/ijece.29026.19.4.313</doi><resource>http://ijece.org/fa/Article/29026</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29026</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29026</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29026</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29026</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29026</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29026</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29026</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. J. Preece, J. Y. Goulermas, L. P. J. Kenney, D. Howard, K. Meijer, and R. Cromptone, "Activity identification using body-mounted sensors: a review of classification techniques," Engineering, Medicine, vol. 30, no. 4, pp. 221-243, Apr. 2009.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Mirzaei and A. R. Najafi Souha, "Towards optimal configuration in MEC neural networks: deep learning-based optimal resource allocation," Wireless Personal Communications, vol. 12, no. 1, pp. 221-243, 2021.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Rahimi, A. Ziaeddini, and S. Gonglee, "A novel approach to efficient resource allocation in load-balanced cellular networks using hierarchical DRL," J. of Ambient Intelligence and Humanized Computing, pp. 1-15, 2021.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	L. Liu, Y. Peng, S. Wang, M. Liu, and Z. Huang, "Complex activity recognition using time series pattern dictionary learned from ubiquitous sensors," Information Sciences, Computer Science, vol. 340-341, pp. 41-57, May 2016.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Liu, X. Qiu, and X.Huang, "Recurrent neural network for text classification with multi-task learning," in Proc. of the 25th Int. Joint Confe. on Artificial Intelligence, pp. 2873-2879, New York. NY, USA, 9-15 Jul. 2016.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. T. Heaton, Ian Goodfellow, Yoshua Bengio, and Aaron Courville, Deep learning, The MIT Press, p. 800, 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Farhang, A. Mohajer, O. Zobeyravi, and A. Rahimzadegan, "Adaptive spectrum sensing algorithm based on noise variance estimation for cognitive radio applications," in Proc. MASFOR Conf., 1 p., Istanbul,Turkey, 21-23 Jun. 2012.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Mirzaei Somarin, Y. Alaei, M. R. Tahernezhad, A. Mohajer, 
and M. Barari, "An efficient routing protocol for discovering the optimum path in mobile ad hoc networks," Indian J. of Science and Technology, vol. 8, no. S8, pp. 450-455, Apr. 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. Chavarriaga, H. Sagha, A. Calatroni, S. T. Digumarti, G. Troster, J. R. Millan, and D. Roggen, "The opportunity challenge: a benchmark database for on-body sensor-based activity recognition," Pattern Recognition Letters, vol. 34, no. 15, pp. 2033-2042, Nov. 2013.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	H. Fang and C. Hu, "Recognizing human activity in smart home using deep learning algorithm," in Proc. of the 33rd Chinese Control Conf., pp. 4716-4720, Nanjing, China, 28-30 Jul. 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Papakostas, T. Giannakopoulos, F. Makedon, and V. Karkaletsis, "Short-term recognition of human activities using convolutional neural networks," in Proc. of the 12th Int. Conf. on Signal Image Technology &amp; Internet Systems, pp. 302-307, Naples, Italy, 28 Nov.-1 Dec. 2016.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	N. Oukrich, A. Maach, E. Sabri, E. Mabrouk, and K. Bouchard, "Activity recognition using back-propagation algorithm and minimum redundancy feature selection method," in Proc. of 4th IEEE Int. Colloquium on Information Science and Technology, pp. 818-823, Tangier, Morocco, 24-26 Oct. 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Z. Liouane, T. Lemlouma, P. Roose, F. Weis, and H. Messaoud, "A genetic neural network approach for unusual behavior prediction in smart home," Intelligent Systems Design and Applications, vol. 557, pp. 738-748, Feb. 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Z. Liouane, T. Lemlouma, P. Roose, F. Weis, and H. Messaoud, 
"An improved elman neural network for daily living activities recognition," Intelligent Systems Design and Applications, vol. 557, pp. 697-707, Feb. 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Ignatov, "Real-time human activity recognition from accelerometer data using convolutional neural networks," Applied Soft Computing, vol. 62, pp. 915-922, Jan. 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. M. Hassan, Md. Zia Uddin, A. Mohamed, and A. Almogren, "A robust human activity recognition system using smartphone sensors and deep learning," Future Generation Computer Systems, vol. 81, pp. 307-313, Apr. 2018.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Ahmadi-Karvigh, A. Ghahramani, B. Becerik-Gerber, and L. Soibelman, "Real-time activity recognition for energy efficiency 
in buildings," Applied Energy, vol. 211, no. 1, pp. 146-160, Feb. 2018.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. Wang, Y. Chen, S. Hao, X. Peng, and L. Hu, "Deep learning for sensor-based activity recognition: a survey," Pattern Recognition Letters, vol. 119, pp. 3-11, Mar. 2019.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	F. Bao, I. R. Chen, and J. Guo, "Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems," in Proc. IEEE 11th Int. Symp. on Autonomous Decentralized Systems, ISADS’13, 7 pp., Mexico City, Mexico, 6-8 Mar 2013.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	P. N. Mahalle, P. A. Thakre, N. R. Prasad, and R. Prasad, " A fuzzy approach to trust based access control in internet of things," in Proc. Wireless VITAE’13, 5 pp., Atlantic City, NJ, USA ,24-27 Jun. 2013.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Mohajer, M. Barari, and H. Zarrabi, "Activity feature solving based on TF-IDF for activity recognition in smart homes," Complexity, vol. 2019, 9 Article ID: 5245373, 9 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Zhang, M. Madadkhani, M. Shafieezadeh, and A. Mirzae, "A novel approach to optimize power consumption in orchard WSN: efficient opportunistic routing," Wireless Personal Communications, vol. 108, pp. 1611-1634, 2019.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. Herrera, M. Perez-Hernandez, A. K. Parlikad, and J. Izquierdo, "Multi-agent systems and complex networks: review and applications in systems engineering," Processes, vol. 108, no. 3, Article ID: 312, Mar. 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. Aghagolzadeh and M. Amin-Naji, "Multi-focus image fusion in DCT domain using variance and energy of laplacian and correlation coefficient for visual sensor networks," J. of AI and Data Mining, 
vol. 6, no. 2, pp. 233-250, Summer 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. Haghighat, Biometrics for Cybersecurity and Unconstrained Environments, Ph.D Thesis, University of Miami, USA, 2016.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	X. Zhou, et al., "Deep-learning-enhanced human activity recognition for Internet of healthcare things," IEEE Internet of Things J., vol. 7, no. 7, pp. 6429-6438, Jul. 2020.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Z. Zhou, H. Yu, and H. Shi, "Human activity recognition based on improved bayesian convolution network to analyze health care data using wearable IoT device," IEEE Access, vol. 8, pp. 86411-86418, May 2020.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	B. Razavi, RF Microelectronics (2nd Edition) (Prentice Hall Communications Engineering and Emerging Technologies Series), Prentice Hall PressOne Lake Street Upper Saddle River, NJUnited States, 1998.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	A. Aghagolzadeh and M. A. Naji, "Multi-focus image fusion in DCT domain based on correlation coefficient," in Proc. 2nd Int. Conf. on Knowledge-Based Engineering and Innovation, pp. 632-639, Tehran, Iran, 5-6 Nov. 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Reliable and Energy Efficient Deployment Optimization of Internet of Things Applications in Cloud and Fog Infrastructure by Using Cuckoo Search Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Yaser</given_name><surname>Ramzanpoor</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>میرسعید</given_name><surname>حسینی شیروانی</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2022</year></publication_date><pages><first_page>233</first_page><last_page>247</last_page></pages><doi_data><doi>10.66224/ijece.29050.19.4.233</doi><resource>http://ijece.org/fa/Article/29050</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29050</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29050</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29050</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29050</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29050</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29050</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29050</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	OpenFog Consortium Architecture Working Group, An OpenFog Architecture Overview, Available: https://www.iiconsortium.org/pdf/OpenFog_Reference_Architecture_2_09_17.pdf, 2017.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. Azimi, C. Pahl, and M. Hosseini Shirvani, "Particle swarm optimization for performance management in multi-cluster IoT edge architectures," in Proc. 10th Int. Conf. on .Cloud Computing and Services Science, pp. 328-337, Prague, Czech Republic, 7-9 May 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Hosseini Shirvani, "A hybrid meta-heuristic algorithm for scientific workflow scheduling in heterogeneous distributed computing systems," Engineering Applications of Artificial Intelligence, vol. 90, Article ID: 103501, Apr. 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	H. Hong, P. Tsai, and C. Hsu, "Dynamic module deployment in a fog computing platform," in Proc 18th Asia-Pacific Network Operations and Management Symp., 6 pp., Kanazawa, Japan, 5-7 Oct. 2016.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Taneja and A. Davy, "Resource-aware placement of IoT application modules in fog-cloud computing paradigm," in Proc IFIP/IEEE Symp. on Integrated Network and Service Management, pp. 1222-1228, Lisbon, Portugal, 8-12 May 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Venticinque and A. Amato, "A methodology for deployment of IoT application in fog," J. of Ambient Intelligence and Humanized Computing, vol. 10, no. 2, pp. 1955-1976, May 2019.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Brogi and A. Forti, "QoS-aware deployment of IoT applications through the fog," IEEE Internet of Things J., vol. 4, no. 5, pp. 1185-1192, Oct. 2017.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Mahmud, K. Ramamohanarao, and R. Buyya, "Latency-aware application module management for fog computing environments," ACM Trans. on Internet Technology, vol. 19, no. 1, Article No.: 9, pp. 1-21, Feb. 2018.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Vogler, J. M. Schleicher, C. Inzinger, and S. Dustdar, "DIANE-dynamic IoT application deployment," in Proc IEEE Int. Conf. on Mobile Services, pp. 298-305, New York, NY, USA, 27 Jun.-2 Jul. 2015.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	E. Saurez, K. Hong, D. Lillethun, U. Ramachandran, and B. Ottenwalder, "Incremental deployment and migration of geo-distributed situation awareness applications in the fog," in Proc  10th ACM Int. Conf. on Distributed and Event-based Systems, pp. 258-269, Irvine, CA, USA, 20-24 Jun. 2016.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	U. Arora and N. Singh, "IoT application modules placement in heterogeneous fog-cloud," International J. of Information Technology, vol. 13, no. 9, pp. 1975-1982, May 2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Omer, S. Azizi, M. Shojafar, and R. Tafazolli, "A priority, power and traffic-aware virtual machine placement of IoT applications in cloud data centers," J. of Systems Architecture, vol. 15, Article ID: 101996, May 2021.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Computer Networks, vol. 47, no. 4, pp. 445-487, 15 Mar. 2005.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	J. P. Arcangeli, R. Boujbel, and S. Leriche, "Automatic deployment of distributed software systems: definitions and state of the art," The J. of Systems and Software, vol. 3pp. 198-218, May 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, "Fog computing: a platform for Internet of Things and analytics," In: N. Bessis and C. Dobre (eds), Big Data and Internet of Things: A Roadmap for Smart Environments. Studies in Computational Intelligence, vol 546. Springer, Cham, pp. 169-186, 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Farzai, M. Hosseini Shirvani, and M. Rabbani, "Multi-objective communication-aware optimization for virtual machine placement 
in cloud datacenters," Sustainable Computing: Informatics and Systems, vol. 28, Article ID: 100374, Dec. 2020.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	X. S. Yang and S. Deb, "Cuckoo search via Le´vy flights," in Proc. of World Congress on Nature &amp; Biologically Inspired Computing, pp. 210-214, Coimbatore, India, 9-11 Dec. 2009.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. M. Sait, A. Bala, and A. H. El-Maleh, "Cuckoo search based resource optimization of datacenters," Applied Intelligence, vol. 44, no. 3, pp. 489-506, Apr. 2016.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Tavana, S. Shahdi-Pashaki, E. Teymourian, F. J. Santos-Arteaga, and M. Komaki, "A discrete cuckoo optimization algorithm for consolidation in cloud computing," Computers &amp; Industrial Engineering, vol. 115, pp. 495-511, Jan. 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Hosseini Shirvani and S. Farzai, "Optimal deployment of IoT application components on hybrid fog2cloud infrastructure for reduction of power consumption toward green computing by cuckoo search algorithm," in Proc.of the 1st National Conf. of New Development in Green Studies, Computations, Applications, and Challenges, 10 pp. Noor, Iran, 10-11 Sept.. 2020.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. Mirjalili, S. M. Mirjalili, and A. Lewis, "Grey wolf optimizer," Advances in Engineering Software, vol. 69?, pp. 46-61, Mar. 2014.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	C. G. Martínez, F. J. Rodriguez, and M. Lozano, "Genetic Algorithms," in Handbook of Heuristics, Springer, pp. 431-464, 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Kennedy and R. Eberhart, "Particle swarm optimization," in Proc. of the IEEE Int. Conf. on Neural Networks, pp. 1942-1948, Perth, Australia, 27 Nov.-1 Dec. 1995.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New Data Clustering Method Using 4-Gray Wolf Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Laleh</given_name><surname>Ajami Bakhtiarvand</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Zahra</given_name><surname>Beheshti</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2022</year></publication_date><pages><first_page>261</first_page><last_page>274</last_page></pages><doi_data><doi>10.66224/ijece.29068.19.4.261</doi><resource>http://ijece.org/fa/Article/29068</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29068</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29068</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29068</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29068</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29068</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29068</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29068</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Jafarzadegan, F. Safi-Esfahani, and Z. Beheshti, "Combining hierarchical clustering approaches using the PCA method," Expert Syst. Appl., vol. 137, pp. 1-10, Dec 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. Han, J. Pei, and M. Kamber, Data Mining: Concepts and Techniques, Elsevier, 2011.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	D. J. Hand, "Principles of data mining," Drug Saf., vol. 30, no. 7, 
pp. 621-622, Jul. 2007.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. T. Dinh and V. N. Huynh, "k-PbC: an improved cluster center initialization for categorical data clustering," Appl. Intell., vol. 50, no. 8, pp. 2610-2632, Aug. 2020.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Xu and D. Wunsch, "Survey of clustering algorithms," IEEE Trans. Neural Networks, vol. 16, no. 3, pp. 645-678, May 2005.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Z. Beheshti, "A novel x-shaped binary particle swarm optimization," Soft Comput., vol. 25, no. 4, pp. 3013-3042, Feb. 2021.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Z. Beheshti, "UTF: upgrade transfer function for binary meta-heuristic algorithms," Appl. Soft Comput., vol. 106, Article ID: 107346, 28 pp., Jul. 2021.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Salgotra, U. Singh, S. Singh, G. Singh, and N. Mittal, "Self-adaptive salp swarm algorithm for engineering optimization problems," Appl. Math. Model., vol. 89, pp. 188-207, Jul. 2021.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Z. Beheshti, "BMNABC: binary multi-neighborhood artificial bee colony for high-dimensional discrete optimization problems," Cybern. Syst., vol. 49, no. 7-8, pp. 452-474, Nov. 2018.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Z. Beheshti, S. M. Shamsuddin, S. Hasan, and N. E. Wong, "Improved centripetal accelerated particle swarm optimization," Int. J. Adv. Soft Comput. its Appl., vol. 8, no. 2, pp. 1-26, Jul. 2016.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	I. Aljarah, M. Mafarja, A. A. Heidari, H. Faris, and S. Mirjalili, "Clustering analysis using a novel locality-informed grey wolf-inspired clustering approach," Knowl. Inf. Syst., vol. 62, no. 2, pp. 507-539, Feb. 2020.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	H. D. Menendez, F. E. B. Otero, and D. Camacho, "Medoid-based clustering using ant colony optimization," Swarm Intell., vol. 10, 
no. 2, pp. 123-145, Jul. 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	P. Das, D. K. Das, and S. Dey, "A modified bee colony optimization (MBCO) and its hybridization with k-means for an application to data clustering," Appl. Soft Comput., vol. 70, pp. 590-603, Sept. 2018.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	R. J. Kuo and F. E. Zulvia, "An improved differential evolution 
with cluster decomposition algorithm for automatic clustering," Soft Comput., vol. 23, no. 18, pp. 8957-8973, Sept. 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	T. Ashish, S. Kapil, and B. Manju, "Parallel bat algorithm-based clustering using mapreduce," In: G. Perez, K. Mishra, S. Tiwari, and M. Trivedi (eds), Networking Communication and Data Knowledge Engineering, Lecture Notes on Data Engineering and Communications Technologies, vol 4. Springer, pp. 73-82, 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	O. Tarkhaneh, A. Isazadeh, and H. J. Khamnei, "A new hybrid strategy for data clustering using cuckoo search based on Mantegna levy distribution, PSO and k-means," Int. J. Comput. Appl. Technol., vol. 58, no. 2, pp. 137-149, Jan. 2018.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	H. A. Abdulwahab, A. Noraziah, A. A. Alsewari, and S. Q. Salih, "An enhanced version of black hole algorithm via levy flight for optimization and data clustering problems," IEEE Access, vol. 7, pp. 142085-142096, Aug. 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	K. W. Huang, Z. X. Wu, H. W. Peng, M. C. Tsai, Y. C. Hung, and Y. C. Lu, "Memetic particle gravitation optimization algorithm for solving clustering problems," IEEE Access, vol. 7, pp. 80950-80968, Jan. 2019.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	H. Yu, Z. Chang, G. Wang, and X. Chen, "An efficient three-way clustering algorithm based on gravitational search," Int. J. Mach. Learn. Cybern., vol. 11, no. 5, pp. 1003-1016, May 2020.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Kaur, S. K. Pal, and A. P. Singh, "Hybridization of chaos and flower pollination algorithm over K-means for data clustering," Appl. Soft Comput., vol. 97, Article ID: 105523, 17 pp., Dec. 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Y. Zhou, H. Wu, Q. Luo, and M. Abdel-Baset, "Automatic data clustering using nature-inspired symbiotic organism search algorithm," Knowledge-Based Syst., vol. 163, pp. 546-557, Jan. 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	G. Drakopoulos, et al., "A genetic algorithm for spatiosocial tensor clustering," Evol. Syst., vol. 11, no. 3, pp. 1-11, Sept. 2019.
[23]	M. Alswaitti, M. Albughdadi, and N. A. M. Isa, "Density-based particle swarm optimization algorithm for data clustering," Expert Syst. Appl., vol. 91, pp. 170-186, Jan. 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	J. Chen, X. Qi, L. Chen, F. Chen, and G. Cheng, "Quantum-inspired ant lion optimized hybrid k-means for cluster analysis and intrusion detection," Knowledge-Based Syst., vol. 203, Article ID: 106167, 10 pp., Sept. 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	L. M. Abualigah, A. T. Khader, E. S. Hanandeh, and A. H. Gandomi, "A novel hybridization strategy for krill herd algorithm applied to clustering techniques," Appl. Soft Comput., vol. 60, pp. 423-435, Nov. 2017.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	M. Demri, S. Ferouhat, S. Zakaria, and M. E. Barmati, "A hybrid approach for optimal clustering in wireless sensor networks using cuckoo search and simulated annealing algorithms," in Proc. 2nd Int. Conf. on Mathematics and Information Technology, ICMIT’20, pp. 202-207, Adrar, Algeria, 18-19 Feb. 2020.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	S. Gavel, P. Joshi, S. Tiwari, and A. S. Raghuvanshi, "An optimized hybrid clustering method using salp swarm optimization with K-means," In: V. Nath and J. Mandal (eds) Nanoelectronics, Circuits and Communication Systems. Nanoelectronics, Circuits and Communication Systems, Lecture Notes in Electrical Engineering, vol. 692, Springer, pp. 247-254, 2020.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	S. K. Majhi, "Fuzzy clustering algorithm based on modified whale optimization algorithm for automobile insurance fraud detection," Evol. Intell., vol. 14, no. 1, pp. 35-46, 2021.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	E. Rashedi, H. Nezamabadipour, and S. Saryazdi, "GSA: a gravitational search algorithm," Inf. Sci. (Ny), vol. 179, no. 13, pp. 2232-2248, Jan. 2009.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	S. Mirjalili, S. M. Mirjalili, and A. Lewis, "Grey wolf optimizer," Adv. Eng. Softw., vol. 69, pp. 46-61, 2014.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	G. P. Gupta and S. Jha, "Integrated clustering and routing protocol for wireless sensor networks using Cuckoo and Harmony Search based metaheuristic techniques," Eng. Appl. Artif. Intell., vol. 68, pp. 101-109, Feb. 2018.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	G. P. Gupta and B. Saha, "Load balanced clustering scheme using hybrid metaheuristic technique for mobile sink based wireless sensor networks," J. Ambient Intell. Humaniz. Comput., 12 pp., Apr. 2020. (in Press)</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	M. Shakil, A. Fuad Yousif Mohammed, R. Arul, A. K. Bashir, and J. K. Choi, "A novel dynamic framework to detect DDoS in SDN using metaheuristic clustering," Trans. Emerg. Telecommun. Technol., 12 pp., Apr. 2019. (in Press)</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	R. J. Kuo, T. C. Lin, F. E. Zulvia, and C. Y. Tsai, "A hybrid metaheuristic and kernel intuitionistic fuzzy c-means algorithm for cluster analysis," Appl. Soft Comput., vol. 67, pp. 299-308, Jan. 2018.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	A. Kaur and Y. Kumar, "A new metaheuristic algorithm based on water wave optimization for data clustering," Evol. Intell., 12 pp., Jan. 2021.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	M. Ghobaei-Arani and A. Shahidinejad, "An efficient resource provisioning approach for analyzing cloud workloads: a metaheuristic-based clustering approach," J. Supercomput., vol. 77, no. 1, pp. 711-750, 2021.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	ح. املشی و ی. بستانی املشی، "روشی جدید به منظور خوشه‌بندی داده‌های سرعت باد در نیروگاه‌های بادی با استفاده از الگوریتم‌های FCM و PSO،" نشریه مهندسی برق و مهندسی کامپیوتر ایران، سال 8، شماره 3، صص. 214-210، پاییز 1389.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	م. ع. نژاد و م. خرد، "استفاده از خوشه‌بندی BIRCH و الگوریتم بهینه‌سازی واکنش شیمیایی جهت کشف تقلب در حوزه سلامت،" نشریه مهندسی برق و مهندسی کامپیوتر ایران، ب- مهندسی کامپیوتر، سال 17،  شماره 2، 
صص. 160-153، تابستان 1398.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	م. یقینی و ج. لسان، "حل مسأله خوشه‌بندی ظرفیت‌دار با استفاده از روش‌های مبتنی بر الگوریتم‌های شبیه‌سازی تبریدی و ژنتیک،" نشریه بین‌المللی مهندسی صنایع و مدیریت تولید، دوره 21، شماره 3، صص. 54-45، پاییز 1389.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[40]	ع. فهمی جعفرقلخانلو و م. شمسی، "بخش‌بندی تصاویر رنگی چهره مبتنی بر خوشه‌بند فازی بهینه‌سازی شده با الگوریتم‌های گرگ خاکستری و نهنگ،" مجله علمی رایانش نرم و فناوری اطلاعات، دوره 10، شماره 2، صص. 13-1، تیر 1400.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[41]	Y. Li, X. Lin, and J. Liu, "An improved gray wolf optimization algorithm to solve engineering problems," Sustainability, vol. 13, 
no. 6, Article ID: 3208, 23 pp., 15 Mar. 2021.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[42]	M. Kohli and S. Arora, "Chaotic grey wolf optimization algorithm for constrained optimization problems," J. Comput. Des. Eng., vol. 5, no. 4, pp. 458-472, Oct. 2018.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[43]	Z. Yue, S. Zhang, and W. Xiao, "A novel hybrid algorithm based on grey wolf optimizer and fireworks algorithm," Sensors, vol. 20, 
no. 7, Article ID: 2147, 17 pp., Jan. 2020.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[44]	ع. محمدزاده، م. مصدری، ف. سلیمانیان قره¬چپق و ا. جعفریان، " ارائه یک الگوریتم بهبودیافته بهینه سازی گرگ های خاکستری برای زمان‌بندی جریان کار در محیط محاسبات ابری،" مجله علمی رایانش نرم و فناوری اطلاعات، دوره 8، شماره 4، صص. 29-17، بهمن 1398.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[45]	W. Long, J. Jiao, X. Liang, and M. Tang, "An exploration-enhanced grey wolf optimizer to solve high-dimensional numerical optimization," Eng. Appl. Artif. Intell., vol. 68, pp. 63-80, Feb. 2018.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[46]	M. H. Qais, H. M. Hasanien, and S. Alghuwainem, "Augmented grey wolf optimizer for grid-connected PMSG-based wind energy conversion systems," Appl. Soft Comput., vol. 69, pp. 504-515, Aug. 2018.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[47]	K. Luo, "Enhanced grey wolf optimizer with a model for dynamically estimating the location of the prey," Appl. Soft Comput., vol. 77, no. ???, pp. 225-235, Apr. 2019.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[48]	E. Akbari, A. Rahimnejad, and S. A. Gadsden, "A greedy non‐hierarchical grey wolf optimizer for real‐world optimization," Electron. Lett., vol. 57, no. 13, pp. 499-501, Jan. 2021.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[49]	A. Bahrololoum, H. Nezamabadipour, and S. Saryazdi, "A data clustering approach based on universal gravity rule," Eng. Appl. Artif. Intell., vol. 45, pp. 415-428, Oct. 2015.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[50]	D. Dua and C. Graff, {UCI} Machine Learning Repository, 2017.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[51]	J. Derrac, S. Garcia, D. Molina, and F. Herrera, "A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms," Swarm Evol. Comput., vol. 1, no. 1, pp. 3-18, Mar. 2011.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Energy-Aware Data Gathering in Rechargeable Wireless Sensor Networks Using Particle Swarm Optimization Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Vahideh</given_name><surname>Farahani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Leili</given_name><surname>Farzinvash</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mina</given_name><surname>Zolfy Lighvan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Rahim</given_name><surname>Abri Lighvan</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2022</year></publication_date><pages><first_page>248</first_page><last_page>260</last_page></pages><doi_data><doi>10.66224/ijece.29082.19.4.248</doi><resource>http://ijece.org/fa/Article/29082</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29082</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29082</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29082</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29082</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29082</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29082</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29082</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. K. Singh, S. I. Amin, S. A. Imam, V. K. Sachan, and A. Choudhary, "A survey of wireless sensor network and its types," in Proc. of IEEE Int. Conf. on Advances in Computing, Communication Control and Networking, ICACCCN’18, pp. 326-330, Greater Noida, India, 12-13 Oct. 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Z. Jiao, L. Zhang, M. Xu, C. Cai, and J. Xiong, "Coverage control algorithm-based adaptive particle swarm optimization and node sleeping in wireless multimedia sensor networks," IEEE Access, 
vol. 7, pp. 170096-170105, Nov. 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	P. Visu, T. S. Praba, N. Sivakumar, R. Srinivasan, and T. Sethukarasi, "Bio-inspired dual cluster heads optimized routing algorithm for wireless sensor networks," J. of Ambient Intelligence and Humanized Computing, vol. 12, no. 3, pp. 3753-3761, Mar. 2021.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	ن. نوروزی، ﻫ. طباطبایی ملاذی و م. فضلعلی، "EBONC: يک روش جديد خوشه‌بندي آگاه از انرژي، مبتني بر تعداد خوشه بهينه براي شبکه حسگر بي‌سيم متحرک،" نشریه مهندسی برق و کامپیوتر ایران، ب- مهندسي كامپيوتر، سال 14، شماره 4 ، صص. 310-299، زمستان 1395.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Shafiq, H. Ashraf, A. Ullah, and S. Tahira, "Systematic literature review on energy efficient routing schemes in WSN-a survey," Mobile Networks and Applications, vol. 25, pp. 882-895, Jun. 2020.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	و. ستاري نائيني و ف. موحدي، "به کارگیری منطق فازی در انتخاب مناسب گره بعدی برای پیکربندی مسیر با پروتکل LEAP در شبکه‌های حسگر بی‌سیم،" نشریه مهندسی برق و کامپیوتر ایران، ب- مهندسي كامپيوتر، سال 15، شماره 4، صص. 304-295، زمستان 1396.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	K. S. Adu-Manu, N. Adam, C. Tapparello, H. Ayatollahi, and W. Heinzelman, "Energy-harvesting wireless sensor networks (EH-WSNs): a review," ACM Trans. on Sensor Networks, vol. 14, no. 2, Article No.: 10, 50 pp., May 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Q. Chen, et al., "Harvest energy from the water: a self-sustained wireless water quality sensing system," ACM Trans. on Embedded Computing Systems, vol. 17, no. 1, Article No.: 3, 24 pp., Jan. 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Kosunalp, "An energy prediction algorithm for wind-powered wireless sensor networks with energy harvesting," Energy, vol. 139, pp. 1275-1280, Nov. 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Bakar and J. Hester, "Making sense of intermittent energy harvesting," in Proc. of Int. Workshop on Energy Harvesting &amp; Energy-Neutral Sensing Systems, SenSys’18, pp. 32-37, Shenzhen, China, 4-4 Nov. 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. DeWitt and H. Shi, "Barrier coverage in energy harvesting sensor networks," Ad Hoc Networks, vol. 56pp. 72-83, 1 Mar. 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	C. C. Lin, Y. C. Chen, J. L. Chen, D. J. Deng, S. B. Wang, and S. Y. Jhong, "Lifetime enhancement of dynamic heterogeneous wireless sensor networks with energy-harvesting sensors," Mobile Networks and Applications, vol. 22, no. 5, pp. 931-942, Oct. 2017.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Bengheni, F. Didi, and I. Bambrik, "EEM-EHWSN: enhanced energy management scheme in energy harvesting wireless sensor networks," Wireless Networks, vol. 25, no. 6, pp. 3029-3046, Aug. 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	T. Lu, G. Liu, W. Li, S. Chang, and W. Guo, "Distributed sampling rate allocation for data quality maximization in rechargeable sensor networks," J. of Network and Computer Applications, vol. 80, pp. 1-9, 15 Feb. 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Liu and Y. C. Chen, "Robust data collection for energy-harvesting wireless sensor networks," Computer Networks, vol. 167, Article ID: 107025, 11 Feb. 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	G. Martinez, S. Li, and C. Zhou, "Wastage-aware routing in energy-harvesting wireless sensor networks," IEEE Sensors J., vol. 14, 
no. 9, pp. 2967-2974, Sep. 2014.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	H. Shafieirad, R. S. Adve, and S. Shahbazpanahi, "Opportunistic routing in large-scale energy harvesting sensor networks," in Proc. of IEEE GLOBECOM Workshops, 6 pp., Washington, DC, USA, 4-8 Dec. 2016.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	F. Li, M. Xiong, L. Wang, H. Peng, J. Hua, and X. Liu, "A novel energy-balanced routing algorithm in energy harvesting sensor networks," Physical Communication, vol. 27, no. C, pp. 181-187, Apr. 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. Li and D. Liu, "An energy aware distributed clustering routing protocol for energy harvesting wireless sensor networks," in Proc. of IEEE/CIC Int. Conf. on Communications in China, ICCC’16, 6 pp., Chengdu, China, 27-29 Jul. 2016.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	D. Sharma and A. P. Bhondekar, "An improved cluster head selection in routing for solar energy-harvesting multi-heterogeneous wireless sensor networks," Wireless Personal Communications, 
vol. 108, no. 4, pp. 2213-2228, Oct. 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Y. Wu and W. Liu, "Routing protocol based on genetic algorithm for energy harvesting-wireless sensor networks," IET Wireless Sensor Systems, vol. 3, no. 2, pp. 112-118, Jun. 2013.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Sarang, M. Drieberg, A. Awang, and R. Ahmad, "A QoS MAC protocol for prioritized data in energy harvesting wireless sensor networks," Computer Networks, vol. 144, pp. 141-153, 24 Oct. 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	P. Zhong, Y. Zhang, S. Ma, J. Gao, and Y. Chen, "An adaptive MAC protocol for wireless rechargeable sensor networks," in Proc. of Int. Conf. on Wireless Algorithms, Systems, and Applications, WASA17, Lecture Notes in Computer Science, Springer, vol. 10251, 5 pp., May 2017.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. Pal and A. Nasipuri, "Joint power control and routing for rechargeable wireless sensor networks," IEEE Access, vol. 7, pp. 123992-124007, Aug. 2019.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	R. S. Liu, K. W. Fan, Z. Zheng, and P. Sinha, "Perpetual and fair data collection for environmental energy harvesting sensor networks," IEEE/ACM Trans. on Networking, vol. 19, no. 4, pp. 947-960, Nov. 2011.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	T. Lu, G. Liu, and S. Chang, "Energy-efficient data sensing and routing in unreliable energy-harvesting wireless sensor network," Wireless Networks, vol. 24, no. 2, pp. 611-625, Feb. 2018.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	R. R. Rout, M. S. Krishna, and S. Gupta, "Markov decision process-based switching algorithm for sustainable rechargeable wireless sensor networks," IEEE Sensors J., vol. 16, no. 8, pp. 2788-2797, Apr. 2016.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	X. Zhang, C. Wang, and L. Tao, "An opportunistic packet forwarding for energy-harvesting wireless sensor networks with dynamic and heterogeneous duty cycle," IEEE Sensors Letters, 
vol. 2, no. 3, 4 pp., Sept. 2018.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	H. Darji and H. B. Shah, "Genetic algorithm for energy harvesting-wireless sensor networks," in Proc. of IEEE Int. Conf. 
on Recent Trends in Electronics, Information &amp; Communication Technology, RTEICT’16, pp. 1398-1402, Bangalore, India, 20-21 May 2016.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	J. Li and D. Liu, "DPSO-based clustering routing algorithm for energy harvesting wireless sensor networks," in Proc. of Int. Conf. on Wireless Communications &amp; Signal Processing, WCSP’15, 5 pp., Nanjing, China, 15-17 Oct. 2015.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	M. Deb and S. Roy, "Harvested profile aware multi hop routing protocol for wireless sensor network," in Proc. of Int.
Conf. on Emerging Applications of Information Technology, EAIT’18, 4 pp., Kolkata, India, 12-13 Jan. 2018.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	S. M. Bozorgi, A. S. Rostami, A. A. R. Hosseinabadi, and V. E. Balas, "A new clustering protocol for energy harvesting-wireless sensor networks," Computers &amp; Electrical Engineering, vol. 64, 
pp. 233-247, Nov. 2017.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	M. M. Afsar and M. Youni, "A load-balanced cross-layer design for energy-harvesting sensor networks," J. of Network and Computer Applications, vol. 145, Article ID:. 102390, 1Nov. 2019.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	A. Ratnaweera, S. Halgamuge, and H. Watson, "Self-organizing hierarchical particle swarm optimizer with time-varying acceleration coefficients," IEEE Trans. on Evolutionary Computation, vol. 8, 
no. 3, pp. 240-255, Jun. 2004.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks," IEEE Trans. on Wireless Communications, vol. 1, no. 4, pp. 660-670, Oct. 2002.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	H. Zhang and J. C. Hou, "Maintaining sensing coverage and connectivity in large sensor networks," Ad Hoc &amp; Sensor Wireless Networks, vol. 1, pp. 89-124, Jan. 2005.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	R. S. Y. Elhabyan and M. C. E. Yagoub, "Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network," J. of Network and Computer Applications, vol. 52, no. C, pp. 116-128, Jun. 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Evaluation of the Progression of Boxwood Blight Disease in the Forests of Northern Iran Using Satellite Image Processing Techniques</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>marzieh</given_name><surname>ghavidel</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Peiman</given_name><surname>Bayat</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>    Mohammadebrahim</given_name><surname>farashiani</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2022</year></publication_date><pages><first_page>325</first_page><last_page>334</last_page></pages><doi_data><doi>10.66224/ijece.29140.19.4.325</doi><resource>http://ijece.org/fa/Article/29140</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29140</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29140</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29140</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29140</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29140</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29140</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29140</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	ح. اسماعيل¬زاده, ح. اسدی و ع. احمدی، "جامعه شناسي گياهي منطقه حفاظت شده خيبوس،" پژوهش¬های علوم و فناوري چوب و جنگل، دوره  19،  شماره  4، صص. 20-1، 1391.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	س. سماوات، "بیماری سوختگی شمشاد خزری،" دانش بیماری گیاهی، سال  6،  شماره  2، صص. 96-89، بهار و تابستان 1396.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	F. Loru, D. Duval, A. Aumelas, and F. Akeb, "Four steroidal alkaloids from the leaves of Buxus sempervirens," Phytochemistry, vol. 54, no. 8, pp. 951-957, Aug. 2000.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Jalili and Z. Jamzad, Red Data Book of Iran: A Preliminary Survey of Endemic, Rare &amp; Endangered Plant Species of Iran, Research Institute of Forests and Rangelands Press, Tehran, Iran, 1999.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Mirabolfathy, Y. Ahangaran, L. Lombard, and P. W. Crous, "Leaf blight of buxus sempervirens in northern forests of Iran caused by calonectria pseudonaviculata," Plant Disease, vol. 97, no. 8, Article ID: 30722506, Aug. 2013.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	I. Strachinis, et al., "First record of Cydalima perspectalis, (Walker, 1859) (Lepidoptera: Crambidae) in Greece." Hellenic Plant Protection J., vol. 8, no. 2, pp. 66-72, Jun. 2015.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Esmaili, S. S. Jouibary, J. Soosani, and H. Naghavi, "Mapping of understory infested boxwood trees using high resolution imagery," Remote Sensing Applications: Society and Environment, vol. 18, Article ID: 100289, Apr. 2020.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Bella, "The box tree moth Cydalima perspectalis," (Walker, 1859) continues to spread in southern Europe: new records for Italy (Lepidoptera Pyraloidea Crambidae). Redia 96, 51-55, 2013.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. S. Ray, N. Jain, R. K. Arora, S. Chavan, and S. Panigrahy, "Utility of hyperspectral data for potato late blight disease detection," J. of the Indian Society of Remote Sensing, vol. 39, no. 2, pp. 161-169, Jun. 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	D. Liu, M. Kelly, P. Gong, and Q. Guo, "Characterizing spatial-temporal tree mortality patterns associated with a new forest disease," Forest Ecology and Management, vol. 253, no. 1-3, pp. 220-231, Jul. 2007.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Zhang, Y. Huang, R. Pu, P. Gonzalez-Moreno, L. Yuan, K. Wu, and W. Huang, "Monitoring plant diseases and pests through remote sensing technology," A Review. Computers and Electronics in Agriculture, vol. 165, Aricle ID: 104943, Aug. 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Jabbari, S. J. Khajedin, R. Jafari, and S. Soltani, "Remote sensing technology for mapping and monitoring vegetation cover (case study: Semirom-Isfahan, Iran)," Pollution, vol. 1, no. 2, pp. 165-174, Dec. 2015.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Hussain, D. Chen, A. Cheng, H. Wei, and D. Stanley, "Change detection from remotely sensed images: from pixel-based to object-based approaches," ISPRS J. of Photogrammetry and Remote Sensing, vol. 80, no. 1, pp. 91-106, Mar. 2013.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	T. G. Whiteside, G. S. Boggs, and S. W. Maier, "Comparing object-based and pixel-based classifications for mapping savannas," International J. of Applied Earth Observation and Geoinformation, vol. 13, no. 6, pp. 884-893, Jun. 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Raisi, M. Sheihakitash, H. Kored, and A. Valinafs, "Investigating and prioritizing the factors affecting the defeat of greenhouse business in Zarabad branch of Konarak region," Karafan Scientific Semi-Annual, vol. 15, no. 43, pp. 113-126, Mar. 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Larijani and L. Razi, "Explaining the green job identification and priorization of renewable energy domain: wind energy," Karafan Scientific Semi-Annual, vol. 14, no. 42, pp. 15-32, Dec. 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. Shi, T. Jackson, J. Tao, J. Du, R. Bindlish, L. Lu, and K. S. Chen, "Microwave vegetation indices for short vegetation covers from satellite passive microwave sensor AMSR-E," Remote Sensing of Environment, vol. 112, no. 12, pp. 4285-4300, Jul. 2008.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. Kazeminia, "Application of remote sensing and GIS in the investigating vegetation coverage," Geospatial Engineering J., 
vol. 9, no. 1, pp. 75-85, Sept. 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	T. A. Naji, "Study of vegetation cover distribution using DVI, PVI, WDVI indices with 2D-space plot," J. Phys, Conf. Series, vol.: 1003, Article ID: 012083, 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	V. Vani and V. R. Mandla, "Comparative study of NDVI and 
SAVI vegetation indices in anantapur district semi-arid areas," International J. of Civil Engineering &amp; Technology, vol. 8, no. 4, pp. 287-300, Apr. 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	N. P. Robinson, B. W. Allred, M. O. Jones, A. Moreno, J. S. Kimball, D. E. Naugle, T. A. Erickson, and A. D. Richardson, "A dynamic Landsat derived normalized difference vegetation index (NDVI) product for the conterminous United States," Remote Sensing, vol. 9, no. 8, Article ID: 863, 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	P. Garcia and E. Perez, "Mapping of soil sealing by vegetation indexes: a case study in Madrid (Spain)," Geoderma, vol. 268, no. 1, pp. 100-107, Jul. 2016.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	G. Melillos and D. G. Hadjimitsis, "Using simple ratio (SR) vegetation index to detect deep man-made infrastructures in cyprus detection and sensing of mines, explosive objects and obscured targets," in Proc. Int. Society for Optics and Photonics XXV, vol. 1148, California, CA, USA, 27 Apr.-9 May 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	ح. اسدی، ا. اسماعیل¬زاده, س. م. حسیني, ی. عصری و ح. زارع، " کاربرد روش ترکيب گونه¬هاي معرف در طبقه¬بندي پوشش گياهي،" تاكسونومي و بيوسيستماتيك، دوره  8،  شماره  28، صص. 38-21، پاییز 1395.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. V. Lantschner and J. C. Corle, "Spatial pattern of attacks of the invasive woodwasp Sirex noctilio, at landscape and stand scales," PLOS ONE, vol. 10, no. 5, Article ID: e0127099, 2015.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	J. C. Corley, M. V. Lantschner, A. S. Martinez, D. Fischbein, and 
J. M. Villacide, "Management of Sirex noctilio populations in exotic pine plantations: critical issues explaining invasion success and damage levels in South America," J. of Pest Science, vol. 92, no. 1, pp. 131-142, Oct. 2019.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	F. E. Krivak-Tetley, et al., "Aggressive tree killer or natural thinning agent? assessing the impacts of a globally important forest insect," Forest Ecology and Management:, vol. 483, Article ID: 118728, 2021.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	D. C. Nepstad, I. M. Tohver, D. Ray, P. Moutinho, and G. Cardinot, "Mortality of large trees and lianas following experimental drought in an Amazon forest," Ecology, vol. 88, no. 9, pp. 2259-2269, Sept. 2007.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	E. M. Gora and A. Esquivel-Muelbert, "Implications of size-dependent tree mortality for tropical forest carbon dynamics," Nature Plants, vol. 7, pp. 384-391, 2021.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	D. Menge, M. Makobe, and S. Shomari, "Effect of environmental conditions on the growth of Cryptosporiopsis spp. causing leaf and nut blight on cashew Anacardium occidentale Linn," J. of Yeast and Fungal Research, vol. 4, no. 2, pp. 12-20, Mar. 2013.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	A. Muntala, "Colletotrichum gloeosporioides species complex: pathogen causing anthracnose, gummosis and die-back diseases of cashew (anacardium occidentale L) in Ghana," European J. of Agriculture and Food Sciences, vol. 2, no. 6, Article ID: 146, 2020.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	N. A. Khan, Z. A. Bhat, and M. A. Bhat, "Diseases of stone fruit crops," In M. M. Mir, U. Iqbal, and S. A. Mi (eds.), Diseases of Stone Fruit Crops. Springer, Singapore, pp. 359-395, 2021.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	N. K. Prabhakaran, "Cashew nut anacardium occidentale L," In K. P. Nair (ed.), Tree Crops: Harvesting Cash from the World's Important Cash Crops, Springer, Cham, pp. 27-77, 2021.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	M. Cordaro, et al., "Cashew nuts counteract oxidative stress and inflammation in an acute experimental model of Carrageenan-induced Paw edema,"Antioxidants, vol. 9, no. 8,  Article ID: 660, 24 Jul. 2020.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	R. Fusco, et al., "The role of cashew nuts on an experimental model of painful degenerative joint disease," Antioxidants vol. 9, no. 6, Article ID: 7346149, Jun. 2020.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	ر. اسماعيلي, ج. سوسني, ش. شتايي جويباري, ح. نقوي و ف. پورشكوري، "پراکنش بيماري سوختگي درختان شمشاد و ارتباط آن با برخي عوامل محيطي (مطالعه موردي: ذخيرگاه جنگلي شمشاد خيبوس و انجيل سي- مازندران)،" پژوهش¬های علوم و فناوري چوب و جنگل، دوره  23،  شماره  ويژه¬نامه 2، 
صص. 167-147، 1395.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Prediction-Based Load Distribution Approach for Software-Defined Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hossein</given_name><surname>Mohammadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>سیداکبر</given_name><surname>مصطفوی</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2022</year></publication_date><pages><first_page>289</first_page><last_page>301</last_page></pages><doi_data><doi>10.66224/ijece.29143.19.4.289</doi><resource>http://ijece.org/fa/Article/29143</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29143</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29143</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29143</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29143</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29143</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29143</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29143</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	G. Li, X. Wang, and Z. Zhang, "SDN-based load balancing scheme for multi-controller deployment," IEEE Access, vol. 7, pp. 39612-39622, Mar. 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Wu, G. Min, and L. T. Yang, "Performance analysis of hybrid wireless networks under bursty and correlated traffic," IEEE Trans. Veh. Technol., vol. 62, no. 1, pp. 449-454, Jan. 2013.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	D. Zhang, H. Huang, J. Zhou, F. Xia, and Z. Chen, "Detecting hot road mobility of vehicular Ad Hoc networks," Mob. Networks Appl., vol. 18, no. 6, pp. 803-813, Dec. 2013.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Dong, T. Kimata, K. Sugiura, and K. Zettsu, "Quality-of-Experience (QoE) in emerging mobile social networks," IEICE Trans. Inf. Syst., vol. E97D, no. 10, pp. 2606-2612, Oct. 2014.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. Kim and N. Feamster, "Improving network management with software defined networking," IEEE Commun. Mag., vol. 51, no. 2, pp. 114-119, Feb. 2013.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Sezer, S. Scott-Hayward, P. Kaur, B. Fraser, D. Lake, J. Finnegan, and N. Viljoen, "Are we ready for SDN? implementation challenges for software-defined networks," IEEE Commun. Mag., vol. 51, no. 7, pp. 36-43, Jul. 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. Zhong, Q. Lin, J. Cui, R. Shi, and L. Liu, "An efficient SDN load balancing scheme based on variance analysis for massive mobile users," Mob. Inf. Syst., vol. 2015, Article ID: 241732, 2015.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. Wetherall and D. Tennenhouse, "Retrospective on 'towards an active network architecture'," Comput. Commun. Rev., vol. 49, no. 5, pp. 86-89, Nov. 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Xu, H. Huang, S. Chen, G. Zhao, and L. Huang, "Achieving 
high scalability through hybrid switching in software-defined networking," IEEE/ACM Trans. Netw., vol. 26, no. 1, pp. 618-632, Jan. 2018.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	C. Decusatis, M. Haley, T. Bundy, and R. Cunnistra, "Dynamic, software-defined service provider network infrastructure and cloud drivers for SDN adoption," in Proc. IEEE Int. Conf. Commun. Work, pp. 235-239, Budapest, Hungary, 9-13 Jun. 2013.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Sandhya, Y. Sinha, and K. Haribabu, "A survey: hybrid SDN," J. Netw. Comput. Appl., vol. 100,  pp. 35-55, 15 Dec. 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	D. Namiot and M. Sneps-sneppe, Metadata in SDN API, arXive, abs/1503.06630, 2015.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Shalimov, D. Zimarina, and V. Pashkov, "Advanced study of SDN/OpenFlow controllers," in Proc. of the 9th Central &amp; Eastern European Software Engineering Conf. in Russia, 6 pp., Moscow, Russia, 24-25 Oct. 2013.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	G. Bin Huang, Q. Y. Zhu, and C. K. Siew, "Extreme learning machine: theory and applications," Neurocomputing, vol. 70, no. 1-3, pp. 489-501, May 2006.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	G. Huang, G. Bin Huang, S. Song, and K. You, "Trends in extreme learning machines: a review," Neural Networks, vol. 61, , pp. 32-48, Oct. 2015.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	F. K. Inaba, E. O. Teatini Salles, S. Perron, and G. Caporossi, "DGR-ELM-distributed generalized regularized ELM for classification," Neurocomputing, vol. 275, pp. 1522-1530, Dec. 2018.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Liao and C. Feng, "Meta-ELM: ELM with ELM hidden nodes," Neurocomputing, vol. 128, pp. 81-87, Oct. 2014.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	H. Zhong, Y. Fang, and J. Cui, "LBBSRT: an efficient SDN load balancing scheme based on server response time," Futur. Gener. Comput. Syst., vol. 68, pp. 183-190, Oct. 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	W. C. Chien, C. F. Lai, H. H. Cho, and H. C. Chao, "A SDN-SFC-based service-oriented load balancing for the IoT applications," J. Netw. Comput. Appl., vol. 114, pp. 88-97, Jul. 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	L. Boero, M. Cello, C. Garibotto, M. Marchese, and M. Mongelli, "BeaQoS: load balancing and deadline management of queues in an OpenFlow SDN switch," Comput. Networks, vol. 106, pp. 161-170, Sept. 2016.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. Shahryari, S. A. Hosseini-Seno, and F. Tashtarian, "An SDN based framework for maximizing throughput and balanced load distribution in a cloudlet network," Futur. Gener. Comput. Syst., vol. 110, pp. 18-32, Sept. 2020.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	A. A. Ateya, A. Muthanna, A. Vybornova, and A. D. Algarni, "Chaotic salp swarm algorithm for SDN multi-controller networks," Eng. Sci. Technol. an Int. J., vol. 22, no. 4, pp. 1001-1012, Aug. 2019.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. Chen, K. Ding, J. Hao, C. Hu, G. Xie, C. Xing, and B. Chen, "LCMSC: a lightweight collaborative mechanism for SDN controllers," Comput. Networks, vol. 121, pp. 65-75, Jul. 2017.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	T. Zhang, P. Giaccone, A. Bianco, and S. De Domenico, "The role of the inter-controller consensus in the placement of distributed SDN controllers," Comput. Commun., vol. 113, no. C, pp. 1-13, Nov. 2017.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	P. Song, Y. Liu, C. Liu, and D. Qian, "ParaFlow: fine-grained parallel SDN controller for large-scale networks," J. Netw. Comput. Appl., vol. 87, pp. 46-59, Jun. 2017.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	J. Cui, Q. Lu, H. Zhong, M. Tian, and L. Liu, "A load-balancing mechanism for distributed SDN control plane using response time," IEEE Trans. Netw. Serv. Manag., vol. 15, no. 4, pp. 1197-1206, Oct. 2018.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	V. R. Dasari and T. S. Humble, "OpenFlow arbitrated programmable network channels for managing quantum metadata," J. Def. Model. Simul., vol. 16, no. 1, pp. 67-77, Jan. 2019.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Y. Wu, S. Zhou, Y. Wei, and S. Leng, "Deep reinforcement learning for controller placement in software defined network," in Proc. IEEE Conf. on Computer Communications Workshops pp. 1254-1259, Toronto, Canada, 6-9 Jul. 2020.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	X. Tian, H. Shen, X. Chen, and C. Li, "Analysis of SDN multi-controller placement," in Proc. Int. Conf. on Data Processing Techniques and Applications for Cyber-Physical Systems, Advances in Intelligent Systems and Computing, vol. 1379, pp. 677-683, Jun. 2021.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	S. Yeo, Y. Naing, T. Kim, and S. Oh, "Achieving balanced load distribution with reinforcement learning-based switch migration in distributed SDN controllers," Electronics, vol. 10, no. 2, pp. 1-16, Jan. 2021.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	H. Mostafaei, M. Menth, and M. S. Obaidat, "A learning automaton-based controller placement algorithm for software-defined networks," in Proc. IEEE Global Communications Conf., 6 pp., Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Outlier Detection in High Dimensional Data Using Entropy-Based Locally Relevant Subspace Selection</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mahboobeh</given_name><surname>Riahi Madvar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ahmad</given_name><surname>Akbari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>B.</given_name><surname>Nasersharif</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2022</year></publication_date><pages><first_page>302</first_page><last_page>312</last_page></pages><doi_data><doi>10.66224/ijece.29177.19.4.302</doi><resource>http://ijece.org/fa/Article/29177</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29177</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29177</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29177</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29177</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29177</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29177</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29177</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. C. Aggarwal and S. Y. Philip, "An effective and efficient algorithm for high-dimensional outlier detection," The VLDB J., 
vol. 14, no. 2, pp. 211-221, Apr. 2005.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Riahi-Madvar, B. Nasersharif, and A. Akbari Azirani, "A new density-based subspace selection method using mutual information for high dimensional outlier detection," Knowledge-Based Systems, vol. 216, Article ID: 106733, 16 Mar. 2021.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Riahi-Madvar, B. Nasershari, and A. Akbari Azirani, "Subspace outlier detection in high dimensional data using ensemble of PCA-based subspaces," in Proc. 26th Int. Computer Conf., Computer Society of Iran, CSICC'21, 5 pp., Tehran, Iran, 3-4 Mar. 2021.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	L. Zhang, J. Lin, and R. Karim, "Adaptive kernel density-based anomaly detection for nonlinear systems," Knowledge-Based Systems, vol. 139, pp. 50-63, 1 Jan. 2018.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	V. Chandola, A. Banerjee, and V. Kumar, "Outlier detection: a survey," ACM Computing Surveys, vol. 14, p. 15, Aug. 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	V. Barnett and T. Lewis, Outliers in Statistical Data, 3rd Ed., Wiely, 1994.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. V. Nguyen, V. Gopalkrishnan, and I. Assent, "An unbiased distance-based outlier detection approach for high-dimensional data," in Proc. of the Int. Conf. on Database Systems for Advanced Applications, pp. 138-152, Taipei, Taiwan, 11-14 Apr. 2011.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	E. M. Knox and R. T. Ng, "Algorithms for mining distancebased outliers in large datasets," in Proc. of the Int. Conf. on Very Large Data Bases, pp. 392-403, New York, NY, USA, 24-27 Aug. 1998.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	F. Angiulli and C. Pizzuti, "Outlier mining in large high-dimensional data sets," IEEE Trans. on Knowledge and Data Engineering, 
vol. 17, no. 2, pp. 203-215, Jan. 2005.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. M. Breunig, et al., LOF: identifying density-based local outliers, ACM sigmod record, ACM, 2000.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Zimek, E. Schubert, and H. P. Kriegel, "A survey on unsupervised outlier detection in high‐dimensional numerical data," Statistical Analysis and Data Mining: the ASA Data Science J., 
vol. 5, no. 5, pp. 363-387, Oct. 2012.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	C. C. Aggarwal and P. S. Yu, Outlier detection for high dimensional data, in ACM Sigmod Record, ACM, 2001.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. Zhang, et al., "A concept lattice based outlier mining method in low-dimensional subspaces," Pattern Recognition Letters, vol. 30, no. 15, pp. 1434-1439, Nov. 2009.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	X. Zhao, J. Zhang, and X. Qin, "LOMA: a local outlier mining algorithm based on attribute relevance analysis," Expert Systems with Applications, vol. 84, pp. 272-280, Oct. 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	H. P. Kriegel, et al., "Outlier detection in axis-parallel subspaces 
of high dimensional data," in Proc. Pacific-Asia Conf. on Knowledge Discovery and Data Mining, pp. 831-838, Bangkok, Thailand, 27-30 Apr. 2009.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	E. Muller, M. Schiffer, and T. Seidl, "Statistical selection of relevant subspace projections for outlier ranking," in Proc. IEEE 27th Int. Conf. on Data Engineering, pp. 434-445, Hannover, Germany, 11-16 Apr. 2011.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	F. Keller, E. Muller, and K. Bohm, "HiCS: high contrast subspaces for density-based outlier ranking," in Proc. IEEE 28th Int. Conf. on Data Engineering, pp. 1037-1048, Arlington, VA, USA, 1-5 Apr. 2012.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. Zhang, et al., "A relevant subspace based contextual outlier mining algorithm," Knowledge-Based Systems, vol. 99, pp. 1-9, May 2016.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	H. P. Kriegel, et al., "Outlier detection in arbitrarily oriented subspaces," in Proc. IEEE 12th Int. Conf. on Data Mining, pp. 379-388, Brussels, Belgium, 10-13 Dec. 2012.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	F. Cheraghchi, A. Iranzad, and B. Raahemi, "Subspace selection in high-dimensional big data using genetic algorithm in apache spark," in Proc. of the 2nd Int. Conf. on Internet of Things, Data and Cloud Computing, ACM, Article ID: 54, 7 pp., Cambridge, United Kingdom, 22-23 Mar. 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	C. C. Aggarwal, Outlier Analysis, in Data Mining, Springer, 2015.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	H. V. Nguyen, et al., "CMI: an information-theoretic contrast measure for enhancing subspace cluster and outlier detection," in Proc. of the SIAM Int. Conf. on Data Mining, 9 pp., Austin, TX,USA, 2-4 May 2013.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. Kandanaarachchi, et al., "On normalization and algorithm selection for unsupervised outlier detection," Data Mining and Knowledge Discovery, vol. 34, no. 2, pp. 309-354, Mar. 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. Lazarevic and V. Kumar, "Feature bagging for outlier detection," in Proc. of the 11th ACM SIGKDD Int. Conf. on Knowledge Discovery in Data Mining, pp. 157-166, Chicago, IL, USA, 21-24 Aug. 2005.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	F. Liu, et al., "Scalable KDE-based top-n local outlier detection over large-scale data streams," Knowledge-Based Systems, vol. 204, Article ID: 106186, Sept. 2020.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	C. E. Shannon, "A mathematical theory of communication," the Bell System Technical J., vol. 27, no. 3, pp. 379-423, Jul. 1948.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	D. W. Scott, Multivariate Density Estimation: Theory, Practice, and Visualization, John Wiley &amp; Sons, 2015.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	K. Bache and M. Lichman, UCI machine learning repository, 2013.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	E. Achtert, H. P. Kriegel, and A. Zimek, "ELKI: a software system for evaluation of subspace clustering algorithms," in Proc. Int. Conf. on Scientific and Statistical Database Management, pp. 580-585, Hong Kong, 9-11 Jul. 2008.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>