﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022920</doi_batch_id><timestamp>14050229203050</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>6</month><day>20</day><year>2022</year></publication_date><journal_volume><volume>20</volume></journal_volume><issue>1</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Anomaly Detection in the Car Trajectories Using Sparse Reconstruction</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Reyhane</given_name><surname>Taghizade</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Abbas</given_name><surname>Ebrahimi moghadam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Khademi</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>20</day><year>2022</year></publication_date><pages><first_page>57</first_page><last_page>65</last_page></pages><doi_data><doi>10.66224/ijece.28724.20.1.57</doi><resource>http://ijece.org/fa/Article/28724</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28724</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28724</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28724</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28724</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28724</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28724</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28724</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Wrigh, A. Y. Yang, A. Ganesh, S. Shankar Sastry, and Y. Ma, "Robust face recognition via sparse representation," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 31, no. 2, pp. 210-227, Feb. 2009.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Chong, W. Chen, et al., "Method for preceding vehicle type classification based on sparse representation," Transportation Research Record, J. of the Transportation Research Board, vol. 2243, no. 1, pp. 74-80, 2011.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. G. Okyere and N. Attoh-Okine, "Traffic sign recognition using sparse representations and active contour models," Transportation Research Record: J. of the Transportation Research Board, vol. 2463, no. 1, pp. 35-45, 2014.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Y. Cong, J. Yang, and J. Liu, "Abnormal event detection in crowded scenes using sparse representation," Pattern Recognition, vol. 46, 
no. 7, pp. 1851-1864, Jul. 2013.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Chartrand, "Nonconvex regularization for shape preservation," in Proc. IEEE Int. Conf. Image Process., vol. 1, pp. 293-296, San Antonio, CA, USA, 16-19 Sept. 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R. Chartrand, "Exact reconstruction of sparse signals via nonconvex minimization," IEEE Signal Processing Letters, vol. 14, no. 10, pp. 707-710, Oct. 2007.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Fan and R. Li, "Variable selection via nonconcave penalized likelihood and its oracle properties," J. of the American Statistical Association, vol. 96, no. 456, pp. 1348-1360, Dec. 2001.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Nikolova, "Analysis of the recovery of edges in images and signals by minimizing nonconvex regularized least-squares," Multiscale Modeling &amp; Simulation, vol. 4, no. 3, pp. 960-991, 2005.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Izadi, Z. Azimifar, and G. H. Jowkar, "Abnormal event detection in indoor video using feature coding," in Proc. IEEE Artificial Intelligence and Signal Processing Conf., pp. 151-155, Shiraz, Iran, 25-27 Oct. 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Li, C. Liu, and Y. Yang, "Anomaly detection based on sparse coding with two kinds of dictionaries," Signal, Image and Video Processing, vol. 12, no. 5, pp. 983-989, Jul. 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Biswas and V. Gupta, "Abnormality detection in crowd videos by tracking sparse components," Machine Vision and Applications, 
vol. 28, no. 1, pp. 35-48, Feb. 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	X. Chen, F. Xu, and Y. Ye, "Lower bound theory of nonzero entries in solutions of \ell_2-\ell_p minimization," SIAM J. on Scientific Computing, vol. 32, no. 5, pp. 2832-2852, 2010.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Adam, E. Rivlin, I. Shimshoni, and D. Reinitz, "Robust real-time unusual event detection using multiple fixed-location monitors," Pattern Analysis and Machine Intelligence, IEEE Trans. on, vol. 30, no. 3, pp. 555-560, Mar. 2008.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	R. Mehran, A. Oyama, and M. Shah, "Abnormal crowd behavior detection using social force model," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, pp. 935-942, Miami, FL, USA, 20-25 Jun. 2009.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Kim and K. Grauman, "Observe locally, infer globally: a space-time MRF for detecting abnormal activities with incremental updates," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, pp. 2921-2928, FL, USA, 20-25 Jun. 2009.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	T. Hospedales, S. Gong, and T. Xiang, "A Markov clustering topic model for mining behaviour in video," in Proc. IEEE 12th Int. 
Conf. on Computer Vision, pp. 1165-1172, Kyoto, Japan, 29 Sept.-
2 Oct. 2009.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	V. Kaltsa, A. Briassouli, I. Kompatsiaris, L. J. Hadjileontiadis, and  M. G. Strintzis, "Swarm intelligence for detecting interesting events in crowded environments," IEEE Trans. on Image Processing, vol. 24, no. 7, pp. 2153-2166, Jul. 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. Zhou, et al., "Spatial-temporal convolutional neural networks for anomaly detection and localization in crowded scenes," Signal Processing, Image Communication, vol. 47, pp. 358-368, Sept. 2016.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	K. Doshi and Y. Yilmaz, "An efficient approach for anomaly detection in traffic videos," in Proc. of the IEEE/CVF Conf. on Computer Vision and Pattern Recognition, pp. 4236-4244, Nashville, TN, USA, 19-25 Jun. 2021.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Liatsikou, S. Papadopoulos, L. Apostolidis, and Y. Kompatsiaris, "A denoising hybrid model for anomaly detection in trajectory sequences," in Proc. EDBT/ICDT Workshops, 23-26 Mar. 2021.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	H. Mohimani, M. Babaie-Zadeh, and C. Jutten, "A fast approach for overcomplete sparse decomposition based on smoothed l0 norm," IEEE Trans. on Signal Processing, vol. 57, no. 1, pp. 289-301, Jan. 2008.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	H. Zayyani, M. Babaie-Zadeh, and C. Jutten, "An iterative Bayesian algorithm for sparse component analysis in presence of noise," 
IEEE Trans. on Signal Processing, vol. 57, no. 11, pp. 4378-4390, Jun. 2009.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Y. Bosi, Y. Liu, and Q. Sun, "Low-rank approximation based abnormal detection in the video sequence," in Proc. IEEE Int. Conf. on Digital Signal Processing, pp. 129-133, Beijing, China, 16-18 Oct. 2016.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. Afshar, O. Bozorg Haddad, M. A. Marino, B. J. Adams, "Honey-bee mating optimization (HBMO) algorithm for optimal reservoir operation," J. of the Franklin Institute, vol. 344, no. 5, pp. 452-462, Aug. 2007.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	C. Yang, J. Yuan, and J. Liu, "Sparse reconstruction cost for abnormal event detection," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, pp. 3449-3456, Colorado Springs, CO, USA, 20-25 Jun. 2011.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	L. Cewu, J. Shi, and J. Jia, "Abnormal event detection at 150 fps in MATLAB," in Proc. of the IEEE Int. Conf. on Computer Vision, pp. 2720-2727, Sydney, Australia, 1-8 Dec. 2013.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	C. Zhi-Jun, et al., "Vehicle behavior learning via sparse reconstruction with l2 – lp minimization and trajectory similarity," IEEE Trans. on Intelligent Transportation Systems, vol. 18, no. 2, pp. 236-247, Feb. 2017.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	UCSD Anomaly Detection Dataset,  http://www.svcl.ucsd.edu/projects/anomaly/dataset.htm.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	B. Auslander, K. Moy Gupta, and D. W. Aha, "A comparative evaluation of anomaly detection algorithms for maritime video surveillance," Proceedings Volume 8019, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense X, Article ID: 801907, 2011.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Resource Management in Multimedia Networks Using Software-Defined Network Technology</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Ahmadreza</given_name><surname>Montazerolghaem</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>20</day><year>2022</year></publication_date><pages><first_page>1</first_page><last_page>12</last_page></pages><doi_data><doi>10.66224/ijece.28921.20.1.1</doi><resource>http://ijece.org/fa/Article/28921</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28921</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28921</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28921</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28921</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28921</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28921</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28921</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Rosenberg, et al., SIP: Session Initiation Protocol, IETF RFC 3261, Jun. 2002.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. Rosenberg, et al., Requirements for Management of Overload in the Session Initiation Protocol, RFC5390, Dec. 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	E. M. Nahum, J. Tracey, and C. P. Wright, "Evaluating SIP server performance," ACM SIGMETRICS Performance Evaluation Review, vol. 35, no. 1, pp. 349-350, Jun. 2007.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Ohta, "Performance comparisons of transport protocols for session initiation protocol signaling," in Proc. 4th Int. Telecommunication Networking Workshop on QoS in Multiservice IP Networks, pp. 148-153, Venezia, Italy, 13-15 Feb. 2008.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	E. Noel and C. Johnson, "Initial simulation results that analyze 
SIP based VoIP networks under overload," in Proc. 20th int. Teletraffic Conf. on Managing traffic performance in converged networks, pp. 54-64, Ottawa, Canada, 17-21 Jun. 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Ohta, "Simulation study of SIP signaling in an overload condition," in Proc. Communication Internet, and Information Technology, pp. 321-326, Cote d'Azur, France, 26-29 Aug. 2004.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	V. K. Gurbani and R. Jain, "Transport protocol considerations for session initiation protocol networks," Bell Labs Technical J., vol. 9, no. 1, pp. 83-97, 2004.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	V. Pascual, SIP Server Overload Problem Statement, http://siprouter.org/wiki/_media/tbd/overload_control_problem_statement_vpascualv10.pdf, 2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	V. Hilt and I. Widjaja, "Controlling overload in networks of SIP servers," in Proc. IEEE Int. Conf. on at the Network Protocols, pp. 83-93, Orlando, FL, USA, 19-22 Oct. 2008.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	P. McGregor, R. Kaczmarek, V. Mosley, D. Dease, and P. Adams, "National security/emergency preparedness and the next-generation network," IEEE Communications Magazine, vol. 44, no. 5, pp. 133-143, May 2006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	V. Hilt, Design Considerations for Session Initiation Protocal (SIP) Overload Control, RFC6357, Aug. 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	I. Widjaja, V. Hilt, and H. Schulzrinne, Session Initiation Protocol (SIP) Overload Control, IETF, http://tools.ietf.org/html/draft-hilt-sipping-overload-02, 2008</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	C. Shen and H. Schulzrinne, "On TCP-based SIP server overload control," in Proc. The Principles, Systems and Applications of IP Telecommunications, pp. 71-83, Munich Germany, 2-4 Aug. 2010.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	H. Schulzrinne, S. Narayanan, J. Lennox, and M. Doyle, SIP Stone-Benchmarking SIP Server Performance, Columbia University, 2002.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	H. Lindholm, T. Vahakangas, and K. Raatikainen, "A control plane benchmark for telecommunications signalling applications," Sort, vol. 20, no. 5, pp. 100-125, May 2007.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Cortes, J. R. Ensor, and J. O. Esteban, "On SIP performance," Bell Labs Technical J., vol. 9, no. 3, pp. 155-172, Nov. 2004.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Wanke, M. Scharf, S. Kiesel, and S. Wahl, "Measurement of the SIP parsing performance in the SIP express router," in Proc. 13th open European Summer School and IFIP TC6.6 Conf. on Dependable and Adaptable Networks and Services, pp. 103-110, Enschede, The Netherlands, 18-20 Jul. 2007.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. S. Gokhale and J. Lu, "Signaling performance of SIP based VoIP: a measurement-based approach," in Proc. IEEE Global Telecommunications Conf., pp. 761-765, St. Louis, MO, USA, 28-Nov.-3 Dec. 2005.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	C. Chi, D. Wang, R. Hao, and W. Zhou, "Performance evaluation of SIP servers," in Proc. 3rd Int. Conf. on the Communications and Networking in China, pp. 674-679, Hangzhou, China, 25-27 Aug. 2008.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	D. Pesch, M. I. Pous, and G. Foster, "Performance evaluation of SIP-based multimedia services in UMTS," Computer Networks, vol. 49, no. 3, pp. 385-403, Oct. 2005.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Homayouni, et al., "Configuration of a sip signaling network: an experimental analysis," in Proc. 5th Int. Joint Conf. on INC, IMS and IDC, pp. 76-81, Seoul, South Korea, 25-27 Aug. 2009.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	K. K. Ram, I. C. Fedeli, A. L. Cox, and S. Rixner, "Explaining the impact of network transport protocols on SIP proxy performance," in Proc. IEEE Int. Symp. on the Performance Analysis of Systems and Software, pp. 75-84, Austin, TX, USA, 20-22 Apr. 2008.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	X. Wenfeng, et al., "A survey on software-defined networking," IEEE Communications Surveys &amp; Tutorials, vol. 17, no. 1, pp. 27-51, Firstquarter 2015.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. R. Montazerolghaem, S. K. Shekofteh, M. H. Yaghmaee, and 
M. Naghibzadeh, "A load scheduler for SIP proxy servers: design, implementation and evaluation of a history weighted window approach," International J. of Communication Systems, vol. 30, no. 3, Article ID: e2980, May 2015.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. Hongbo, et al., "Design, implementation, and performance of a load balancer for SIP server clusters," IEEE/ACM Trans. on Networking, vol. 20, no. 4, pp. 1190-1202, Aug. 2012.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	K. Singh and H. Schulzrinne, "Failover, load sharing and server architecture in SIP telephony," Computer Communications, vol. 30, no. 5, pp. 927-942, Mar. 2007.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	W. M. Wu, K. Wang, R. H. Jan, and C. Y. Huang, "A fast failure detection and failover scheme for SIP high availability networks," in Proc. 13th Pacific Rim Int. Symp. on the Dependable Computing, pp. 187-190, Melbourne, Australia, 17-19 Dec. 2007.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Y. J. Cheng, K. Wang, R. H. Jan, C. Chen, and C. Y. Huang, "Efficient failover and load balancing for dependable SIP proxy servers," in Proc. IEEE Symp. on the Computers and Communications, pp. 1530-1346, Marrakech, 6-9 Jul. 2008.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	G. Kambourakis, D. Geneiatakis, T. Dagiuklas, C. Lambrinoudakis, and S. Gritzalis, "Towards effective SIP load balancing," in Proc. 3rd VoIP Security Workshop, 6 pp., Berlin, Germany, 15-17 Jun. 2006.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	S. Montagna and M. Pignolo, "Performance evaluation of load control techniques in sip signaling servers," in Proc. 3rd Int. Conf. on the Systems, pp. 51-56, Cancun, Mexico, 13-18 Apr. 2008.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Intelligent Vision System for Automatic Forest Fire Surveillance</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad Sadegh </given_name><surname>Kayhanpanah</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Behrooz</given_name><surname>Koohestani</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>20</day><year>2022</year></publication_date><pages><first_page>25</first_page><last_page>35</last_page></pages><doi_data><doi>10.66224/ijece.29060.20.1.25</doi><resource>http://ijece.org/fa/Article/29060</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29060</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29060</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29060</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29060</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29060</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29060</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29060</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. Yuan, Y. M. Zhang, and Z. X. Liu, "A survey on technologies for automatic forest fire monitoring, detection, and fighting using unmanned aerial vehicles and remote sensing techniques," Canadian J. of Forest Research, vol. 45, no. 7, pp. 783-792, Jul. 2015.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. R. Martinez-de Dios, et al., "Computer vision techniques for forest fire perception," Image Vision Comput, vol. 26, no. 4, pp. 550-562, Apr. 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	K. G. Hirsch and P. Fuglem, Canadian Wildland Fire Strategy: Background Syntheses, Analyses, and Perspectives, Canadian Council for Forest Ministries, Natural Resources Canada, Canadian Forest Service, Northern Forestry Centre, Edmonton, Alberta, 2006.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	H. Lin, Z. Liu, T. Zhao, and Y. Zhang, "Early warning system of forest fire detection based on video technology," in Proc. of the 9th Int. Symp. on Linear Drives for Industry Applications, vol. 3, pp. 751-758, Hangzhou, China, 7-10 Jul. 2013.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	E. Den Breejen, et al., "Autonomous forest fire detection," in Proc. of the 3rd Int. Conf. on Forest Fire Research, pp. 2003-2012, Luso, Portugal, 16-20 Nov. 1998.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R. W. Beard, T. W. McLain, D. B. Nelson, D. Kingston, and D. Johanson, "Decentralized cooperative aerial surveillance using fixed-wing miniature UAVs," Proceedings of the IEEE, vol. 94, no. 7, pp. 1306-1324, Jul. 2006.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. Olsson, et al., "Current and emerging operational uses of remote sensing in Swedish forestry," in Proc. of the 5th Annual Forest Inventory and Analysis Symp. USDA Forest Service, pp. 39-46, Portland, ONn, USA, 3-6 Oct. 2005.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. A. J. Berni, P. J. Zarco-Tejada, L. Surez, and E. Fereres, "Thermal and narrowband multispectral remote sensing for vegetation monitoring from an unmanned aerial vehicle," IEEE Trans. Geosci. Remote Sens., vol. 47, no. 3, pp. 722-738, Mar. 2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	J. Everaerts, "The use of unmanned aerial vehicles (UAVs) for remote sensing and mapping," Proc. Int. Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, vol. 37, Pt. B1, pp. 1187-1192, Beijing, China, 3-11 Jul. 2008.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	V. G. Ambrosia and T. Zajkowski, "Selection of appropriate class UAS/sensors to support fire monitoring: experiences in the United States," in Handbook of Unmanned Aerial Vehicles, Edited by K. P. Valavanis and G. J. Vachtsevano, Springer, Netherlands, pp. 2723-2754, 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	R. Sporea, Color Space and Color Model, (http://www.opticallimits.com)</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Pietikainen, A. Hadid, G. Zhao, and T. Ahonen, "Local binary pattern for still images," In: Computer Vision Using Local Binary Patterns. Computational Imaging and Vision, vol 40, pp. 13-47, London: Springer, 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	T. X. Truong and J. M. Kim, "Fire flame detection in video sequences using multi-stage pattern recognition techniques," Engineering Applications of Artificial Injelligence J., vol. 25, no. 7, pp. 1365-1372, Oct. 2012.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	G. W. Lindsay, "Convolutional neural networks as a model of 
the visual system: past, present, and future," J. of Cognitive Neuroscience, vol. 33, no. 10, pp. 1-15, Sept. 2020.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Frizzi, et al., "Convolutional neural network for video fire and smoke detection," in Proc. IECON 42nd Annual Conf. of the IEEE Industrial Electronics Society, pp. 877-882, Florence, Italy, 23-26 Oct. 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Y. Zhao, J. Ma, X. Li, and J. Zhang, "Saliency detection and deep learning-based wildfire identification in UAV imagery," Sensors, vol. 18, no. 3, Article ID: 712, Feb. 2018.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	H. Pan, D. Badawi, and A. E. Cetin, "Computationally efficient wildfire detection method using a deep convolutional network pruned via Fourier analysis," Sensors, vol. 20, no. 10, Article ID: 2891, May 2020.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	https://github.com/tensorflow/models/tree/master/research/object_detection</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	K. He, G. Gkioxari, P. Dollar, and R. Girshick, Mask R-CNN, In ICCV, 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	T. Fawcet, "An introduction to ROC analysis," Pattern Recognition Letters, vol. 27, no. 8, pp. 861-874, Jun. 2006.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	D. M. W. Powers, "Evaluation: from precision, recall and F-measure to ROC, informedness, markedness &amp; correlation," J. of Machine Learning Technologies, vol. 2, no. 1, pp. 37-63, 2011.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	K. M. Ting, C. Sammut, and G. I. Webb, Encyclopedia of Machine Learning, Boston: Springer, 2011.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	A. Krizhevsky, I. Sutskever, and G. E. Hinton, "ImageNet classification with deep convolutional neural networks," in Proc. of the 25th Int. Conf. on Neural Information Processing Systems, pp. 1097-1105, Lake Tahoe, NA, USA, 3-6 Dec. 2012.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Provide an Energy-aware Markov Based Model for Dynamic Placement of Virtual Machines in Cloud  Data Centers</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>mehdi</given_name><surname>rajabzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Abolfazl</given_name><surname>Toroghi Haghighat</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Amir Masoud</given_name><surname>Rahmani</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>20</day><year>2022</year></publication_date><pages><first_page>47</first_page><last_page>56</last_page></pages><doi_data><doi>10.66224/ijece.29097.20.1.47</doi><resource>http://ijece.org/fa/Article/29097</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29097</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29097</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29097</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29097</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29097</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29097</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29097</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Beloglazov and R. Buyya, Energy-Efficient Management of Virtual Machines in Data Centers for Cloud Computing, Ph.D Thesis, Melbourne University, May 2013.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Y. Zomaya and Y. C. Lee, Energy Efficient Distributed Computing Systems, Wiley-IEEE Computer Society Press, Jul. 2016.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Khosravi, S. G. Kumar, and R. Buyya, "Energy and carbon-efficient placement of virtual machines in distributed cloud data centers," in Proc. of the 19th In. Conf. on Parallel Processing Euro-Par'13, pp. 317-328, Aachen, Germany, 26-30 Aug. 2013.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Yang, C. Liu, and Y. Shang, "A cost-aware auto-scaling approach using the workload prediction in service clouds," Inf Syst Front, 
vol. 16, pp. 7-18, Oct. 2017.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Nathuji, C. Isci, and E. Gorbatov, "Exploiting platform heterogeneity for power efficient data centers," in Proc. of the 4th Int. Conf. on Autonomic Computing, vol. 7, pp. 5-15, May 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	E. Feller, et al., "Energy management in IaaS clouds: a holistic approach," in Proc. IEEE 5th Inte. Conf. on, Cloud Computing, pp. 204-212, Honolulu, HI, USA, 24-29 Jun. 2018.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Beloglazov and R. Buyya, "Managing overloaded PMs for dynamic consolidation of virtual machines in cloud data centers under quality of service constraints," IEEE Trans. Parallel Distrib Syst, vol. 24, no. 7, pp. 1366-1379, Sep. 2013.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	G. Katsaros, et al., "A service framework for energy-aware monitoring and VM management in clouds," Future Generation Computer Systems, vol. 29, no. 8, pp. 2077-2091, Jan. 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	I. Takouna, R. Rojas-Cessa, K. Sachs, and C. Meinel, "Communication-aware and energy-efficient scheduling for parallel applications in virtualized data centers," in Proc. 6th IEEE/ACM Int. Conf. on Utility and Cloud Computing, UCC’13, pp. 251-255, Dresden, Germany, 9-12 Dec. 2013.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	L. Salimian, F. S. Esfahani, and M. N. Shahraki, "An adaptive fuzzy threshold-based approach for energy and performance efficient consolidation of virtual machines," Computing, vol. 98, no. 6, pp. 641-660, Mar. 2016.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	K. G. Saurabh, S. Y. Chee, and R. Buyya, "Green cloud framework for improving carbon efficiency of clouds," in Proc. of the 17th Int. European Conf. on Parallel and Distributed Computing, EuroPar’11, vol. 6853, pp. 193-203, LNCS, Springer, Germany,  Dec. 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	T. Mahdhi and H. Mezni, "A prediction-based VM consolidation approach in IaaS cloud data centers," The J. of Systems &amp; Software, vol. 146, no. 12, pp. 263-285, Sept. 2018.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	I. Mohiuddin and A. Almogren, "Workload aware VM consolidation method in edge/cloud computing for IoT applications," J. Parallel Distrib. Comput., vol. 123, no. 1, pp. 204-214, Sept. 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Malekloo, N. Kara, and M. Barachi, "An energy efficient and SLA compliant approach for resource allocation and consolidation 
in cloud computing environments," Sustainable Computing. Informatics and Systems, vol. 17, no. 2, pp. 9-24, Feb. 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	H. Xu, Y. Liu, W. Wei, and Y. Xue, "Migration cost and energy-aware virtual machine consolidation under cloud environments considering remaining runtime," International J. of Parallel Programming, vol. 47, no. 1, pp. 481-501  , Mar. 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Z. Luo and Z. Qian, "Burstiness-aware server consolidation via queuing theory approach in a computing cloud," in Proc. IEEE 27th Int. Symp. on Parallel Distributed Processing, IPDPS’16, pp. 332-341, Cambridge, MA, USA, 20-24 May 2016.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. B. Melhem, A. Agrawal, N. Goel, and M. Zaman, "Markov prediction model for host load detection and VM placement in live migration, " IEEE Access, vol. 6, pp. 7190-7205, 2020.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. Vasan and K. S. Raju, "Comparative analysis of simulated annealing, simulated quenching and genetic, algorithms for optimal reservoir operation," Appl Soft Comput., vol. 9, no. 1, pp. 274-281, May 2016.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	C. Oysu and Z. Bingul, "Application of heuristic and hybrid-GASA algorithms to tool-pathoptimization problem for minimizing airtime during machining," Engineering Applications of Artificial Intelligence, vol. 22, no. 3, pp. 389-396, Apr. 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Rajabzadeh, A. T. Haghighat, and A. M. Rahmani, "New comprehensive model based on virtual clusters and absorbing Markov chains for energy-efficient virtual machine management in cloud computing," J. Supercomput., vol. 76, no. 9, pp. 7438-7457, Dec. 2020.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Aryania, H. S. Aghdasi, and L. Mohammad Khanli, "Energy-aware virtual machine consolidation algorithm based on ant colony system," J. Grid Computing, vol. 16, no. 2, pp. 477-491, Jul. 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	N. Chaurasia, M. Kumar, and R. Chaudhry, "Comprehensive survey on energy-aware server consolidation techniques in cloud computing," J. Supercomput., vol. 77, no. 10, pp. 11682-11737, May 2021.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. Ala'anzy and M. Othman, "Mapping and consolidation of VMs using locust-inspired algorithms for green cloud computing," Neural Process Lett., vol. 77, no. 10, Oct. 2021.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Deep Extreme Learning Machine: A Combined Incremental Learning Approach for Data Stream Classification</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Javad</given_name><surname>Hamidzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mona</given_name><surname>Moradi</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>20</day><year>2022</year></publication_date><pages><first_page>66</first_page><last_page>72</last_page></pages><doi_data><doi>10.66224/ijece.29114.20.1.66</doi><resource>http://ijece.org/fa/Article/29114</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29114</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29114</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29114</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29114</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29114</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29114</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29114</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Lu, A. Liu, F. Dong, F. Gu, J. Gama, and G. Zhang, "Learning under concept drift: a review," IEEE Trans. on Knowledge Data Engineering, vol. 31, no. 12, pp. 2346-2363, Dec. 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	X. Zheng, P. Li, X. Hu, and K. Yu, "Semi-supervised classification on data streams with recurring concept drift and concept evolution," Knowledge-Based Systems, vol. 215, Article ID: 106749, Mar. 2021.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. Ko and M. Comuzzi, "Keeping our rivers clean: information-theoretic online anomaly detection for streaming business process events," Information Systems, vol. 104, Article ID: 101894, Feb. 2022.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	H. Tavasoli, B. J. Oommen, and A. Yazidi, "On utilizing weak estimators to achieve the online classification of data streams," Engineering Applications of Artificial Intelligence, vol. 86, no. C, pp. 11-31, Nov. 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. D. Dilectin and R. B. V. Mercy, "Classification and dynamic class detection of real time data for tsunami warning system," in Proc. Int. Conf. on Recent Advances in Computing and Software Systems, pp. 124-129, Chennai, India, 25-27 Apr. 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	G. Liu, H. Cheng, Z. Qin, Q. Liu, and C. Liu, "E-CVFDT: an improving CVFDT method for concept drift data stream," in Proc. Int. Conf. on Communications, Circuits and Systems, ICCCAS’13, vol. 1, pp. 315-318, Chengdu, China, 15-17 Nov. 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Guan, W. Guo, H. Chen, and O. Lou, "An ensemble of classifiers algorithm based on GA for handling concept-drifting data streams," in Proc. 6th Int. Symp. on Parallel Architectures, Algorithms and Programming, pp. 282-284, Beijing, China, 13-15 Jul. 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. A. M. Raja and S. Swamynathan, "Ensemble learning for network data stream classification using similarity and online genetic algorithm classifiers," in Proc. Int. Conf. on Advances in Computing, Communications and Informatics, ICACCI’16, pp. 1601-1607, Jaipur, India, 21-24 Sept. 2016.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Y. Lv, et al., "A classifier using online bagging ensemble method for big data stream learning," Tsinghua Science Technology, vol. 24, 
no. 4, pp. 379-388, Aug. 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	W. Chen, Q. Sun, J. Wang, J. J. Dong, and C. Xu, "A novel AdaBoost and CNN based for vehicle classification," IEEE Access, vol. 6,  pp. 60445-60455, 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	H. Zhao, H. Yu, D. Li, T. Mao, and H. Zhu, "Vehicle accident risk prediction based on AdaBoost-SO in vanets," IEEE Access, vol. 7, pp. 14549-14557, 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	H. Yu, X. Sun, and J. Wang, "Ensemble OS-ELM based on combination weight for data stream classification," Applied Intelligence, vol. 49, no. 6, pp. 2382-2390, 15 Jun. 2019.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	D. Vitorio, E. Souza, and A. L. I. Oliveira, "Using active learning sampling strategies for ensemble generation on opinion mining," in Proc. 8th Brazilian Conf. on Intelligent Systems, BRACIS’19, pp. 114-119, Salvador, Brazil, 15-18 Oct. 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Y. Freund and R. E. Schapire, "Experiments with a new boosting algorithm," in Proc. of the 13th Int. Conf. on Machine Learning, pp. 148-156, Bari, Italy, 3-6 Jul. 1996.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	B. L. S. da Silva, F. K. Inaba, E. O. T. Salles, and P. M. Ciarelli, "Outlier robust extreme machine learning for multi-target regression," Expert Systems with Applications, vol. 140, Article ID: 112877, Feb. 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	G. B. Huang, Q. Y. Zhu, and C. K. Siew, "Extreme learning machine: theory and applications," Neurocomputing, vol. 70, no. 1-3, pp. 489-501, Dec. 2006.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Zhang, W. Tan, and Y. Li, "A survey of online sequential extreme learning machine," Proc. of 5th Inte. Conf. on Control, Decision and Information Technologies, CoDIT’18, pp. 45-50, Thessaloniki, Greece, 10-13 Apr. 2018.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	G. B. Huang, M. B. Li, L. Chen, and C. K. Siew, "Incremental extreme learning machine with fully complex hidden nodes," Neurocomputing, vol. 71, no. 4-6, pp. 576-583, Jan. 2008.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	G. Feng, G. Huang, Q. Lin, and R. Gay, "Error minimized extreme learning machine with growth of hidden nodes and incremental learning," IEEE Trans. on Neural Networks, vol. 20, no. 8, pp. 1352-1357, Aug. 2009.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	H. J. Rong, Y. S. Ong, A. H. Tan, and Z. Zhu, "A fast pruned-extreme learning machine for classification problem," Neurocomput., vol. 72, no. 1-3, pp. 359-366, Dec. 2008.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Y. Miche, et al., "OP-ELM: optimally pruned extreme learning machine," IEEE Trans. on Neural Networks, vol. 21, no. 1, pp. 158-162, Jan. 2010.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	N. Liu and H. Wang, "Ensemble based extreme learning machine," IEEE Signal Processing Letters, vol. 17, no. 8, pp. 754-757, Aug. 2010.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	N. Liang, G. Huang, P. Saratchandran, and N. Sundararajan, "A fast and accurate online sequential learning algorithm for feedforward networks," IEEE Trans. on Neural Networks, vol. 17, no. 6, pp. 1411-1423, Nov. 2006.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	W. Guo, T. Xu, K. Tang, J. Yu, and S. Chen, "Online sequential extreme learning machine with generalized regularization and adaptive forgetting factor for time-varying system prediction," Mathematical Problems in Engineering, vol. 2018, Article ID: 6195387, 31 May 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. Xie, et al., "GSPSO-LRF-ELM: grid search and particle swarm optimization-based local receptive field-enabled extreme learning machine for surface defects detection and classification on the magnetic tiles," Discrete Dynamics in Nature and Society, vol. 2020, Article ID: 4565769, 15 May 2020.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Y. Lan, Y. C. Soh, and G. B. Huang, "Ensemble of online sequential extreme learning machine," Neurocomputing, vol. 72, no. 13-15, pp. 3391-3395, Aug. 2009.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	S. Xu and J. Wang, "Dynamic extreme learning machine for data stream classification," Neurocomputing, vol. 238, pp. 433-449, May 2017.
[28]	O. Aydogdu and M. Ekinci, "A new approach for data stream classification: unsupervised feature representational online sequential extreme learning machine," Multimedia Tools and Applications, vol. 79, no. 37, pp. 27205-27227, Oct. 2020.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	W. Li-Wen, G. Wei, and Y. Yi-Cheng, "An online weighted sequential extreme learning machine for class imbalanced data streams," J. of Physics: Conf. Series, vol. 1994, no. 1, Article ID: 012008, 10 pp., Chongqing, China, 9-11 Jul. 2021.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	W. Guo, "Robust adaptive online sequential extreme learning machine for predicting nonstationary data streams with outliers," J. of Algorithms &amp; Computational Technology, vol. 13, Article ID: 1748302619895421, 18 Dec. 2019.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	Y. Zhang, W. Liu, X. Ren, and Y. Ren, "Dual weighted extreme learning machine for imbalanced data stream classification," J. of Intelligent &amp; Fuzzy Systems, vol. 33, no. 2, pp. 1143-1154, 2017.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	B. Mirza, S. Kok, and F. Dong, "Multi-layer Online Sequential Extreme Learning Machine for Image Classification," pp. 39-49, 2016.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	S. Ding, L. Guo, and Y. Hou, "Extreme learning machine with kernel model based on deep learning," Neural Computing and Applications, vol. 28, no. 8, pp. 1975-1984, Aug. 2017.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	B. Krawczyk, L. Minku, J. Gama, J. Stefanowski, and M. Wozniak, "Ensemble learning for data stream analysis: a survey," Information Fusion, vol. 37, pp. 132-156, Sept. 2017.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	UC Irvine Machine Learning Repository, https://archive.ics.uci.edu/ml/index.php (Accessed 03/13, 2020).</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improving Register File Access Latency Tolerance in GPUs by Value Reproduction</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Rahil</given_name><surname>Barati</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad</given_name><surname>Sadrosadati</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>حمید</given_name><surname>سربازی آزاد</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>20</day><year>2022</year></publication_date><pages><first_page>13</first_page><last_page>24</last_page></pages><doi_data><doi>10.66224/ijece.29137.20.1.13</doi><resource>http://ijece.org/fa/Article/29137</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29137</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29137</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29137</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29137</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29137</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29137</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29137</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Sethia and S. Mahlke, "Equalizer: dynamic tuning of gpu resources for efficient execution," in Proc. of the IEEE/ACM 47th Annual Int. Symp. on Microarchitecture, pp. 647-658, Cambridge, UK, 13-17 Dec. 2014.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	T. D. Han and T. S. Abdelrahman, "hiCUDA: high-level GPGPU programming," IEEE Trans. on Parallel and Distributed Systems, vol. 22, no. 1, pp. 78-90, Jan. 2011.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	NVIDIA Corporation. CUDA Programming Guide, V4.0.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	NVIDIA Corporation. CUDA Toolkit, 2012. Version 4.2, http://developer.nvidia.com/cuda/cuda-downloads. Sep. 2012.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Lee, N. Lakshminarayana, H. Kim, and R. Vuduc, "Many-thread aware prefetching mechanisms for GPGPU applications," in Proc. IEEE/ACM  of the 43th Annual Int. Symp. on Microarchitecture, pp. 213-224, Atlanta, GA, USA, 4-8 Dec. 2010.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Jog, O. Kayiran, A. Mishra, M. T. Kandemir, O. Mutlu, R. Iyer, and C. R. Das, "Orchestrated scheduling and prefetching for GPGPUs," ACM SIGARCH Computer Architecture News, vol. 41, no. 3, pp. 332-343, Jun. 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Jog, O. Kayiran, N. Chidambaram, A. Mishra, M. T. Kandemir, O. Mutlu, R. Iyer, and C. R. Das, "OWL: cooperative thread array aware scheduling techniques for improving GPGPU performance," ACM SIGARCH Computer Architecture News, vol. 41, no. 1, pp. 395-406, Mar. 2013.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Sethia, G. Dasika, M. Samadi, and S. Mahlke, "APOGEE: adaptive prefetching on GPUs for energy efficiency," in Proc. of the IEEE 22nd Int. Conf. on Parallel Architectures and Compilation Techniques, pp. 73-82, Edinburgh, UK, 7-11 Sept. 2013.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Jeon, G. S. Ravi, N. S. Kim, and M. Annavaram, "GPU register file virtualization," in Proc. IEEE/ACM  of the 48th Annual Int. Symp. on Microarchitecture, pp. 420-432, Waikiki, HI, USA, 5-9 Dec. 2015.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Abdel-Majeed and M. Annavaram, "Warped register file: a power efficient register file for GPGPUs," in Proc. IEEE 19th Int. Symp. on High Performance Computer Architecture, pp. 412-423, Shenzhen, China, 23-27, Feb. 2013.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Lee, K. Kim, G. Koo, H. Jeon, W. W. Ro, and M. Annavaram, "Warped-compression: enabling power efficient GPUs through register compression," ACM SIGARCH Computer Architecture News, vol. 43, no. 3, pp. 502-514, Jun. 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	C. Hsiao, S. Chu, and C. Hsieh, "An adaptive thread scheduling mechanism with low-power register file for mobile GPUs," IEEE Trans. on Multimedia, vol. 16, no. 1, pp. 60-67, Sept. 2014.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	N. Jing, J. Wang, F. Fan, W. Yu, L. Jiang, C. Li, and X. Liang, "Cache-emulated registerfile: an integrated on-chip memory architecture for high performance gpgpus," in Proc. IEEE/ACM  of the 49th Annual Int. Symp. on Microarchitecture,  12 pp., Taipei, Taiwan, 10-15?, Oct. 2016.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	H. Asghari Esfeden, A. A. Abdolrashidi, S. Rahman, D. Wong, and N. Abu-Ghazaleh, "BOW: breathing operand windows to exploit bypassing in GPUs," in Proc. IEEE/ACM  of the 53th Annual Int. Symp. on Microarchitecture, pp. 996-1008, Athens, Greece, 17-21 Oct.  2020.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	F. Khorasani, H. A. Esfeden, A. Farmahini-Farahani, N. Jayasena, and V. Sarkar, "Regmutex: inter-warp gpu register time-sharing," in Proc. of the 45th Annual Int. Symp. on Computer Architecture, pp. 816-828, Providence, RI, USA, 13-17 Apr.  2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	H. Asghari Esfeden, F. Khorasani, H. Jeon, D. Wong, and N. 
Abu-Ghazaleh, "CORF: coalescing operand register file for GPUs," in Proc. of the 24th Int. Conf. on Architectural Support for Programming Languages and Operating Systems, pp. 701-714, Boston, MA, USA, 14-17 Oct.   2019.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. Kloosterman, et al., "Regless: just-in-time operand staging for gpus," in Proc. IEEE/ACM of the 50th Annual Int. Symp. on Microarchitecture,  pp. 151-164, Boston, MA, USA, 14-17, Oct. 2017.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Sadrosadati, A. Mirhosseini, S. B. Ehsani, H. Sarbazi-Azad, M. Drumond, B. Falsafi, R. Ausavarungnirun, and O. Mutlu, "Ltrf: enabling high-capacity register files for gpus via hardware/software cooperative register prefetching," in Proc. of the 23rd Int. Conf. on Architectural Support for Programming Languages and Operating Systems, pp. 489-502, Williamsburg, VA, USA, 24-18 Mar.  2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. E. Lindholm, M. Y. Siu, S. S. Moy, S. Liu, and J. R. Nickolls, Simulating Multiported Memories Using Lower Port Count Memories, US Patent 7,339,592, 2008.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	LTRF Register-Interval-Algorithm, https://github.com/CMU-SAFARI/Register-Interval, 2018.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Bakhoda, G. L. Yuan, W. W. Fung, H. Wong, and T. M. Aamodt, "Analyzing cuda workloads using a detailed gpu simulator," ISPASS. in Proc. IEEE Int. Symp. on Performance Analysis of Systems and Software,, pp. 163-174, Boston, MA, USA, 26-28 Apr.  2009.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Che, et al., "Rodinia: a benchmark suite for heterogeneous computing," in Proc. IEEE Int. Symp. on Workload Characterization, pp. 44-54, Austin, TX, USA, 4-6 Oct. 2009.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. A. Stratton, et al., "Parboil: a revised benchmark suite for scientific and commercial throughput computing," Center for Reliable and High-Performance Computing, vol. 127, p. 27, Mar. 2012.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	R. Venkatesan, S. G. Ramasubramanian, S. Venkataramani, K. 
Roy, and A. Raghunathan, "Stag: spintronic-tape architecture for GPGPU cache hierarchies," in Proc. IEEE Int. Symp. on Computer Architecture, pp. 253-264, Minneapolis, MN, USA, 14-18 Jun. 2014.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	V. Narasiman, M. Shebanow, C. J. Lee, R. Miftakhutdinov, O. Mutlu, and Y. N. Patt, "Improving gpu performance via large warps and two-level warp scheduling," in Proc. IEEE/ACM  of the 44th Annual Int. Symp. on Microarchitecture, pp. 308-317, Porto Alegre, Brazil, 3-7, Dec. 2011.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Patient Identification and Authentication Protocol to Increase Security </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Afsaneh</given_name><surname>Sharafi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sepideh</given_name><surname>Adabi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ali</given_name><surname>Movaghar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Salah</given_name><surname>Al-Majed</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>20</day><year>2022</year></publication_date><pages><first_page>36</first_page><last_page>46</last_page></pages><doi_data><doi>10.66224/ijece.29160.20.1.36</doi><resource>http://ijece.org/fa/Article/29160</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29160</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29160</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29160</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29160</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29160</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29160</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29160</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	I. A. Shah, F. A. Malik, and S. A. Ahmad, "Enhancing security in IoT based home automation using Reed Solomon codes," in Proc. IEEE Int. Conf. on Wireless Communications, Signal Processing and Networking, pp. 1639-1642, Chennai, India, 23-25 Mar. 2016.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, "A survey on security and privacy issues in Internet-of-Things," IEEE Internet of Things J., vol. 4, no. 5, pp. 1250-1258, Oct. 2017.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	F. A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, "Internet of Things security: a survey," J. of Network and Computer Applications, vol. 88, pp. 10-28, Jun. 2017.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	K. Ashton, "Internet of Things," RFID J., vol. 22, no. 7, pp. 97-114, Jun. 2009.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	D. Miorandi, S. Sicari, F. de Pellegrini, and I. Chlamtac, "Internet of things: vision, applications and research challenges," Ad hoc Networks, vol. 10, no. 7, pp. 1497-1516, Sept. 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. H. Ziegeldorf, O. G. Morchon, and K. Wehrle, "Privacy in the Internet of Things: threats and challenges," Security and Communication Networks, vol. 7, no. 12, pp. 2728-2742, Dec. 2014.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Abomhara and G. M. Køien, "Security and privacy in the Internet of Things: current status and open issues," in Proc. Int. Conf. on Privacy and Security in Mobile Systems, 8 pp., Aalborg, Denmark, 8 pp., 11-14 May 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Dantu, G. Clothier, and A. Atri, "EAP methods for wireless networks," Computer Standards &amp; Interfaces, vol. 29, no. 3, pp. 289-301, Mar. 2007.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. T. F. Al-Janabi and M. A. S. Rasheed, "Public-key cryptography enabled kerberos authentication," Developments in E-Systems Engineering, pp. 209-214, Dubai, United Arab Emirates, 6-8 Dec. 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Liu, Y. Xiao, and C. P. Chen, "Authentication and access control in the Internet of Things," in Proc. IEEE 32nd Int. Conf. on, Distributed Computing Systems Workshops, pp. 588-592, Macau, China, 18-21 Jun. 2012.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. P. Pawlowski, A. J. Jara, and M. J. Ogorzalek, "Compact extensible authentication protocol for the Internet of Things: enabling scalable and efficient security commissioning," Mobile Information Systems, vol. vol. 2015, pp. 1-11, Nov. 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	I. Karabey and G. Akman, "A cryptographic approach for secure client-server chat application using public key infrastructure 
(PKI)," in Proc. IEEE 11th Int. Conf. on Internet Technology and Secured Trans., pp. 442-446, Barcelona, Spain, 5-7 Dec. 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	E. Cho, M. Park, and T. Kwon, "TwinPeaks: a new approach 
for certificateless public key distribution," in Proc. IEEE Conf. on Communications and Network Security, pp. 10-18, Philadelphia, PA, USA, 17-19 Oct. 2016.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	W. B. Hsieh and J. S. Leu, "Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks," Wireless Communications and Mobile Computing, vol. 14, no. 10, pp. 995-1006, Jul. 2014.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	N. Tirthani and R. Ganesan, "Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography," IACR Cryptology ePrint Archive, 2014, 49, 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. Joshi, M. Verma, and P. R. Verma, "Secure authentication approach using diffie-hellman key exchange algorithm for WSN," 
in Proc. IEEE Int. Conf. o, Control, Instrumentation, Communication and Computational Technologies, pp. 527-532, Kumaracoil, India, 18-19 Dec. 2015.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Kumar and R. K. Singh, "Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN," International J. of Communication Networks and Distributed Systems, vol. 17, no. 2, pp. 189-201, Sept. 2016.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. R. Sfar, E. Natalizio, Y. Challal, and Z. Chtourou, "A roadmap for security challenges in the Internet of Things," Digital Communications and Networks, vol. 4, no. 2, pp. 118-137, Apr. 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	R. Vijaysanthi, N. Radha, M. J. Shree, and V. Sindhujaa, "Fingerprint authentication using Raspberry Pi based on IoT," in Proc. IEEE Int. Conf. on Algorithms, Methodology, Models and Applications in Emerging Technologies, 3 pp., Chennai, India, 16-18 Feb. 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	P. Hu, H. Ning, T. Qiu, Y. Xu, X. Luo, and A. K. Sangaiah, "A unified face identification and resolution scheme using cloud computing in Internet of Things," Future Generation Computer Systems, vol. 81, pp. 582-592, Apr. 2018.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Y. Lu, S. Wu, Z. Fang, N. Xiong, S. Yoon, and D. S. Park, "Exploring finger vein based personal authentication for secure IoT," Future Generation Computer Systems, vol. 77, pp. 149-160, Dec. 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	P. Kumari and A. Vaish, "Brainwave based authentication system: research issues and challenges," International J. of Computer Engineering and Applications, vol. 4, no. 1, pp. 89-108. Feb. 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Y. S. Soni, S. B. Somani, and V. V. Shete, "Biometric user authentication using brain waves," in Proc. IEEE Int. Conf. on Inventive Computation Technologies, vol. 2, 6 pp., Coimbatore, India, 26-27  Aug. 2016.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. Marcel and J. D. R. Millan, "Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 743-752, Feb. 2007.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	E. G. M. Kanaga, R. M. Kumaran, M. Hema, R. G. Manohari, and T. A. Thomas, "An experimental investigation on classifiers for Brain Computer Interface (BCI) based authentication," in Proc. IEEE Int. Conf. on, Trends in Electronics and Informatics, 6 pp., Tirunelveli, India, 11-12 May 2017.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	I. Švogor and T. Kišasondi, "Two factor authentication using EEG augmented passwords," in Proc. IEEE of the ITI 34th Int. Conf. on Information Technology Interfaces, pp. 373-378, Cavtat, Croatia, 25-28 Jun. 2012.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	C. Y. Cheng, EEG-Based Person Identification System and Its Longitudinal Adaptation, Master in Computer Science, National Chiao Tung University, Hsinchu, Taiwan, 2013.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	T. Alladi and V. Chamola, and Naren, "HARCI: a two-way authentication protocol for three entity healthcare IoT networks networks," IEEE J. on Selected Areas in Communications, vol. 39, no. 2, pp. 361-369, Feb. 2020.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	A. R. Elshenaway and S. K. Guirguis, "Adaptive thresholds of EEG brain signals for IoT devices authentication," IEEE Access, vol. 9, pp. 100294-100307, Jun. 2021.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	R. Zhang, B. Yan, L. Tong, J. Shu, X. Song, and Y. Zeng, "Identity authentication using portable electroencephalography signals in resting states," IEEE Access, vol. 7, pp. 160671-160682, 2019.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	A. Vallabhaneni, T. Wang, and B. He, "Brain-computer interface," Neural Engineering, pp. 85-121, Boston, MA: Springer, 2005.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	H. H. Jasper, "The ten-twenty electrode system of the International Federation," Electroencephalogr. Clin. Neurophysiol., vol. 10,  pp. 370-375, 1958.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	P. Kumari and A. Vaish, "Information-theoretic measures on intrinsic mode function for the individual identification using EEG sensors," IEEE Sensors J., vol. 15, no. 9, pp. 4950-4960, Sept. 2015.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	Q. Gui, Z. Jin, M. V. R. Blondet, S. Laszlo, and W. Xu, "Towards EEG biometrics: pattern matching approaches for user identification," in Proc. IEEE Int. Conf. on,,Identity, Security and Behavior Analysis, 6 pp., Hong Kong, China, 23-25 Mar. 2015.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	W. Kong, L. Wang, S. Xu, F. Babiloni, and H. Chen, "EEG fingerprints: phase synchronization of EEG signals as biomarker for subject identification," IEEE Access, vol. 7, pp. 121165-121173, 2019.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New Heuristic for Deadlock Detection in Safety Analysis of Software Systems</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>عین الله</given_name><surname>پیرا</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>20</day><year>2022</year></publication_date><pages><first_page>73</first_page><last_page>79</last_page></pages><doi_data><doi>10.66224/ijece.29179.20.1.73</doi><resource>http://ijece.org/fa/Article/29179</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29179</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29179</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29179</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29179</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29179</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29179</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29179</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. Baier and J. P. Katoen, Principles of Model Checking, MIT Press, 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. C. Bicarregui and B. M. Matthews, "Proof and refutation in formal software development," in Proc. 3rd Irish Workshop on Formal Methods, pp. 1-15, Galway, Ireland, 1-2 Jul. 1399.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. Behjati, M. Sirjani, and M. Nili Ahmadabadi, "Bounded rational search for on-the-fly model checking of LTL properties," In: F. Arbab and M. Sirjani, (eds) Fundamentals of Software Engineering. FSEN 2009. Lecture Notes in Computer Science, vol 5961. Springer, Berlin, Heidelberg. pp. 292-307, 2009.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Edelkamp, A. L. Lafuente, and S. Leue, "Protocol verification with heuristic search: first results," in Proc. AAAI Sym. on Model-Based Validation of Intelligence, pp. 75-83, Menlo Park, CA, USA, 9 Oct. 2000.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Groce and W. Visser, "Heuristics for model checking Java programs," International J. on Software Tools for Technology Transfer, vol. 6, no. 4, pp. 260-276, 2004.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	E. Pira, V. Rafe, and A. Nikanjam, "Deadlock detection in complex software systems specified through graph transformation using Bayesian optimization algorithm," J. of Systems and Software, vol. 131, pp. 181-200, Sept. 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Yousefian, V. Rafe, and M. Rahmani, "A heuristic solution for model checking graph transformation systems," Applied Soft Computing, vol. 24, pp. 169-180, Nov. 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	E. Alba, F. Chicano, M. Ferreira, and J. Gomez-Pulido, "Finding deadlocks in large concurrent java programs using genetic algorithms," in Proc. of the 10th Annual Conf. on Genetic and Evolutionary Computation, pp. 1735-1742, Atlanta, GA, USA, 12-16 Jul. 2008.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	E. Alba and F. Chicano, "Finding safety errors with ACO," in Proc. of the 9th Annual Conf. on Genetic and Evolutionary Computation, pp. 1066-1073, London, England, 7-11 Jul. 2008.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	F. Chicano, M. Ferreira, and E. Alba, "Comparing metaheuristic algorithms for error detection in java programs," in Proc. Int. Symp. on Search Based Software Engineering, pp. 82-96, Szeged, Hungary, 10-12 Sept. 2011.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	V. Rafe, M. Moradi, R. Yousefian, and A. Nikanjam, "A meta-heuristic solution for automated refutation of complex software systems specified through graph transformations," Applied Soft Computing, vol. 33, pp. 136-149, Aug. 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Ferreira, F. Chicano, E. Alba, and J. Gomez-Pulido, "Detecting protocol errors using particle swarm optimization with java pathfinder," in Proc. of the High Performance Computing &amp; Simulation Conf., pp. 319-325, Nicosia, Cyprus, 3-6 Jun. 2008.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. Kastenberg and A. Rensink, "Model checking dynamic states in GROOVE," in Proc. Int. SPIN Workshop on Model Checking of Software, pp. 299-305, Vienna, Austria, 30 Mar.-1 Apr. 2006.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	G. Rozenberg, Handbook of Graph Grammars and Computing by Graph Transformation, World Scientific, 1997.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	P. E. Hart, N. J. Nilsson, and B. Raphael, "A formal basis for the heuristic determination of minimum cost paths," IEEE Trans. on Systems Science and Cybernetics, vol. 4, no. 2, pp. 100-107, Jul. 1968.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	R. L. Haupt and S. E. Haupt, Practical Genetic Algorithms, John Wiley &amp; Sons, 2004.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. Kennedy and R. Eberhart, "Particle swarm optimization," in Proc. IEEE Int Conf. on Neural Networks, , vol. 4, pp. 1942-1948, Perth, Australia, 27 Nov.-1 Dec. 1995.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	P. Larranaga and J. A. Lozano, Estimation of Distribution Algorithms: A New Tool for Evolutionary Computation, Springer Science &amp; Business Media, 2001.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference, Morgan Kaufmann, 1988.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Schmidt, "Model checking of visual modeling languages," in Proc. Conf. of PhD Students in Computer Science, p. 102, 2004.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. F. Groote and J. V. D. Pol, "A bounded retransmission protocol for large data packets," in Proc. Int. Conf. on Algebraic Methodology and Software Technology, pp. 536-550, Munich, Germany, 1-5 Jul. 1996.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	E. Pira, V. Rafe, and A. Nikanjam, "Searching for violation of safety and liveness properties using knowledge discovery in complex systems specified through graph transformations," Information and Software Technology, vol. 97, pp. 110-134, May 2018.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>