﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022920</doi_batch_id><timestamp>14050229202750</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>2</month><day>15</day><year>2023</year></publication_date><journal_volume><volume>20</volume></journal_volume><issue>4</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Priority-Based Task Scheduling Using Fuzzy System in Mobile Edge Computing</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Entesar</given_name><surname>Hosseini</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohsen</given_name><surname>Nickray</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>SH.</given_name><surname>GH.</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>15</day><year>2023</year></publication_date><pages><first_page>257</first_page><last_page>270</last_page></pages><doi_data><doi>10.66224/ijece.28461.20.4.257</doi><resource>http://ijece.org/fa/Article/28461</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28461</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28461</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28461</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28461</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28461</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28461</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28461</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Huang, C. C. Xing, and C. Wang, "Simultaneous wireless information and power transfer: technologies, applications, and research challenges," IEEE Communications Magazine, vol. 55, 
no. 11, pp. 26-32, Nov. 2017.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	K. Zhang, et al., "Energy-efficient offloading for mobile edge computing in 5g heterogeneous networks," IEEE Access, vol. 4, pp. 5896-5907, 2016.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Y. Sun, J. Li, X. Fu, H. Wang, and H. Li, "Application research based on improved genetic algorithm in cloud task scheduling," Journal of Intelligent &amp; Fuzzy Systems, vol. 38, no. 1, pp. 239-246, Jan. 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	G. Li, J. Wang, J. Wu, and J. Song, "Data processing delay optimization in mobile edge computing," Wireless Communications and Mobile Computing, vol. 2018, Article ID: 6897523, 9 pp., 2018.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	W. Zhimin, Z. Qinglin, X. Fangxin, D. Hongning, and Z. Yujun, "Detection performance of packet arrival under downclocking for mobile edge computing," Wireless Communications and Mobile Computing, vol. 2018, Article ID: 9641712, 2018.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	W. Yu, et al., "A survey on the edge computing for the Internet of things," IEEE Access, vol. 6, pp. 6900-6919, 2018.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. Guo, et al., "Distributed machine learning for multiuser mobile edge computing systems," IEEE J. of Selected Topics in Signal Processing, vol. 16, no. 3, pp. 460-473, Apr. 2022.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Z. Jiao, et al., "Energy-latency trade-off for energy-aware offloading in mobile edge computing networks," IEEE Internet of Things J., vol. 5, no. 4, pp. 2633-2645, Aug. 2018.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Selvaraj and S. Sundararajan, "Evidence-based trust evaluation system for cloud services using fuzzy logic," International J. of Fuzzy Systems, vol. 19, no. 2, pp. 329-37, Apr. 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Fonseca, U. H. Bezerra, J. D. Brito, J. C. Leite, and M. H. Nascimento, "Pre-dispatch of load in thermoelectric power plants considering maintenance management using fuzzy logic," IEEE Access, vol. 6, pp. 41379-41390, 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	K. Wang, K. Yang, and C. Magurawalage, "Joint energy minimization and resource allocation in C-RAN with mobile cloud," IEEE Trans. Cloud Comput, vol. 6, no. 3, pp. 331-346, Jul./
Sept. 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Y. Mao, J. Zhang, and K. B. Letaief, "Dynamic computation offloading for mobileedge computing with energy harvesting devices," IEEE J. Sel. Areas Commun, vol. 34, no. 12, pp. 3590-3605, Dec. 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. Kchaou, Z. Kechaou, and A. M. Alimi, "Towards an offloading framework based on big data analytics in mobile cloud computing environments," Procedia Comput. Sci., vol. 53, pp. 292-297, 2015.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. Misra and S. Sarkar, "Theoretical modeling of fog computing: a green computing paradigm to support IoT applications," IET Networks, vol. 5, no. 2, pp. 23-29, Mar. 2016.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	L. Yang, J. Cao, H. Cheng, and Y. Ji, "Multi-user computation partitioning for latencysensitive mobile cloud applications," IEEE Trans.Computers, vol. 64, no. 8, pp. 2253-2266, Aug. 2015.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	G. Shuaishuai, W. Dalei, Z. Haixia, and Y. Dongfeng, "Resource modeling and scheduling for mobile edge computing: a service provider's perspective," IEEE Access, vol. 6, pp. 35611-35623, 2018.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Z. Wenchen, et al., "Markov approximation for task offloading and computation scaling in mobile edge computing," Mobile Information Systems, vol. 2019, Article ID: 8172698, 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	T. Chia Wei, T. Fan Hsun, Y. Yao Tsung, L. Chien Chang, and C. LiDer, "Task scheduling for edge computing with agile VNFs on-demand service model toward 5G and beyond," Wireless Communications and Mobile Computing, vol. 2018, Article ID: 7802797, 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Y. Yibo, M. Yongkui, X. Wei, G. Xuemai, and Z. Honglin, "Joint optimization of energy consumption and packet scheduling for mobile edge computing in cyber-physical networks," IEEE Access, vol. 6, pp. 15576-15586, 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	W. Yuan, et al., "NOMA-Assisted multi-access mobile edge computing: a joint optimization of computation offloading and time allocation," IEEE Trans. on Vehicular Technology, vol. 67, no. 12, pp. 12244-12258, Dec. 2018.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Aghababaeipour and S. Ghanbari, " A new adaptive energy-aware job scheduling in cloud computing," in Proc. Int. Conf. on Soft Computing and Data Mining, pp. 308-317, Senai, Malaysia, 5-7 Feb. 2018.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Ghanbari and M. Othman, "Time cheating in divisible load scheduling: sensitivity analysis, results and open problems," Procedia Computer Science, pp. 935-943, vol. 1, no. 125, Jan. 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Y. Changyan, C. Jun, and S. Zhou, "A multi-user mobile computation offloading and transmission scheduling mechanism for delay sensitive application," IEEE Trans. on Mobile Computing, vol. 19, no. 2, pp. 99-110, Jan. 2018.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	D. Yueyue, X. Du, M. Sabita, and Y. Zhang, "Joint computation offloading and user association in multi-task mobile edge computing," IEEE Trans. on Vehicular Technology, vol. 67, no. 12, pp. 12313-12325, Dec. 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	X. Chen, J. Lei, L. Wenzhong, and F. Xiaoming, "Efficient multi-user computation offloading for mobile-edge cloud computing," IEEE/ACM Trans. on Networking, vol. 24, no. 5, pp. 2795-2808, Oct. 2016.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	C. Ying, Z. Ning, Z. Yongchao, and C. Xin, "Dynamic computation offloading in edge computing for the Internet of Things," IEEE Internet of Things J., vol. 6, no. 3, pp. 239-251, Jun. 2019.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	N. Zhaolong, D. Peiran, K. Xiangjie, and X. Feng, "A cooperative partial computation offloading scheme for mobile edge computing enabled Internet of Things," IEEE Internet of Things J., vol. 6, no. 3, pp. 4804-4814, Jun. 2019.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Y. Zhang, D. Niyato, and P. Wang, "Offloading in mobile cloudlet systems with intermittent connectivity," IEEE Trans. Mobile Computing, vol. 14, no. 12, pp. 2516-2529, Dec. 2015.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	L. Tianze, W. Muqing, Z. Min, and L. Wenxing, "An overhead optimizing task scheduling strategy for ad hoc based mobile edge computing," IEEE Access, vol. 5, pp. 5609-5622, 2017.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	R. Morabito and N. Beijar, "Enabling data processing at the network edge through lightweight visualization technologies," in Proc. of the IEEE Int. Conf. on Sensing, Communication, and Networking, SECON Workshops, 6 pp., London, UK, Jun. 2016.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	H. Wang, J. Gong, Y. Zhuang, H. Shen, and J. Lach, "Health edge: task scheduling for edge computing with health emergency and human behavior consideration in smart homes," in Proc. of the IEEE Int. Conf. on Big Data, pp. 1213-1222, Shenzhen, China, 7-9 Aug. 2017.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	P. Samal and P. Mishra, "Analysis of variants in round robin algorithms for load balancing in cloud computing," International J. of Computer Science and Information Technologies, vol. 4, no. 3, 
pp. 416-419, 2013.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	C. You, Y. Mao, J. Zhang, and K. Huang, "Energy-efficient offloading for mobile edge computing," In Wiley 5G Ref: The Essential 5G Reference Online, 2016.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	J. Maozhu, W. Hua, S. Lijun, L. Yuxue, and Z. Yucheng, "Man-machine dialog system optimization based on cloud computing," Personal and Ubiquitous Computing, vol. 22, no. 5-6, pp. 937-942, Oct. 2018.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	J. Wang, J. Peng, Y. Wei, D. Liu, and F. Jielin, "Adaptive application offloading decision and transmission scheduling for mobile cloud computing," in Proc. IEEE Int. Conf. on Communications, ICC’26, 7 pp., Kuala Lumpur, Malaysia, 22-27 May 2016.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	F. Scott, K. Carlenri, Y. Di, B. George, and K. Mellow, "An analysis of vehicular wireless channel communication via queueing theory model," in Proc. IEEE Int. Conf. on Communications, pp. 1736-1741, Sydney, Australia, 10-14 Jun. 2014.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	L. Tong, Y. Li, and W. Gao, "A hierarchical edge cloud architecture for mobile computing," in Proc. 35th Annual IEEE Int. Conf. on Computer Communications, IEEE INFOCOM’16, 9 pp., San Francisco, CA, USA, 10-14 Apr. 2016.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	X. Chen, L. Pu, L. Gao, W. Wu, and D. Wu., "Exploiting massive D2D collaboration for energy-efficient mobile edge computing," IEEE Wireless Communications, vol. 24, no. 4, pp. 64-71, Aug. 2017.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	A. Salehan, H. Deldari, and S. Abrishami, "An online context-aware mechanism for computation offloading in ubiquitous and mobile cloud environments," The J. of Supercomputing, vol. 75, no. 7, pp. 1-41, Ju.. 2019.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	M. Al-Zinati, R. Alrashdan, B. Al-Duwairi, and M. Aloqaily, "A reorganizing biosurveillance framework based on fog and mobile edge computing," Multimedia Tools and Applications, vol. 80, no. 11, pp. 16805-16825, 2021.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	S. Deng, et al., "Burst load evacuation based on dispatching and scheduling in distributed edge networks," IEEE Trans. on Parallel and Distributed Systems, vol. 32, no. 8, pp. 1918-1932, Aug. 2021.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	F. Jazayeri, A. Shahidinejad, and M. Ghobaei-Arani, "Autonomous computation offloading and auto-scaling the in the mobile fog computing: a deep reinforcement learning-based approach," J. of Ambient Intelligence and Humanized Computing, vol. 12, pp. 8265-8284, 2021.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	J. C. Guevara and N. L. da Fonseca, "Task scheduling in cloud-fog computing systems," Peer-to-Peer Networking and Applications, vol. 14, no. 2, pp. 962-977, 2021.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	T. D. Lee, B. M. Lee, and W. Noh, "Hierarchical cloud computing architecture for contextaware IoT services," IEEE Trans. Consume Electron, vol. 64, no. 2, pp. 222-230, May2018.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	Y. Shi, S. Chen, and X. Xu, "MAGA: a mobility-aware computation offloading decision for distributed mobile cloud computing," IEEE Internet of Things, vol. 5, no. 1, pp. 164-174, Feb. 2018.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	M. Goudarzi, M. Zamani, and A. Toroghi Haghighat, "A genetic-based decision algorithm for multisite computation offloading in mobile cloud computing," Int J. Commun Syst, vol. 30, no. 10, Article ID: e3241, Jul. 2017.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	A. Raneetha, H. Moshe, O. Binyamin, and Z. Ilze, "Strategic bidding in a discrete accumulating priority queue," Operations Research Letters, vol. 47, no. 3, pp. 162-167, May 2019.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	J. Yuan and Y. Li, "Solving binary multi-objective knapsack problems with novel greedy strategy," Memetic Comp., vol. 13, pp. 447-458, 2021.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	V. Kumar and K. Dinesh, "Transitive blocks and their applications in fuzzy interconnection networks," Fuzzy Sets and Systems, vol. 352, pp. 142-160, Dec. 2018.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50]	Y. Mao, J. Zhang, S. H. Song, and K. B. Letaief, "Power-delay tradeoff in multi-user mobile-edge computing systems," in Proc. IEEE Global Communication. Conf., GLOBECOM’16, 6 pp., Washington, DC, USA, 4-8 Dec. 2016.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51]	R. Gopi, S. T. Suganthi, R. Rajadevi, et al., "An enhanced green cloud based queue management (GCQM) system to optimize energy consumption in mobile edge computing," Wireless Pers Commun, vol. 117, pp. 3397-3419, 2021.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52]	P. Zou, O. Ozel, and S. Subramaniam, "Optimizing information freshness through computation-transmission tradeoff and queue management in edge computing," IEEE/ACM Trans. on Networking, vol. 29, no. 2, pp. 949-963, Apr. 2021.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Spatio-Temporal Prediction of Vegetation Dynamics Based on Remote Sensing Data Using Deep Learning</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Elham</given_name><surname>Zangeneh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Mashayekhi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Saeed</given_name><surname>Gharachelo</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>15</day><year>2023</year></publication_date><pages><first_page>311</first_page><last_page>318</last_page></pages><doi_data><doi>10.66224/ijece.28986.20.4.311</doi><resource>http://ijece.org/fa/Article/28986</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28986</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28986</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28986</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28986</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28986</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28986</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28986</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	ع. شمسی‌پور، س. حیدری و ک. باقری، "پایش روند تغییرات پوشش زمین در شهر کرمانشاه با مدل CA مارکوف،" پژوهش‌های جغرافیایی برنامه‌ریزی شهری، جلد 5، شماره 3، صص. 495-514، پاييز ۱۳۹۶.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	ع. کاظمی‌نیا، "کاربرد سنجش از دور در بررسی پوشش گیاهی،" نشریه علمی- ترویجی مهندسی نقشه‌برداری و اطلاعات مکانی، جلد 9، شماره 1، صص. 
75-85، بهمن ۱۳۹۶.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Q. Zhuang, S. Wu, X. Feng, and Y. Niu, "Analysis and prediction of vegetation dynamics under the background of climate change in Xinjiang, China," Peer J. Computer Science, vol. 23, no. 8, Article ID: 8282. 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	K. Nataliia, M. Lavreniuk, S. Skakun, and A. Shelestov, "Deep learning classification of land cover and crop types using remote sensing data," IEEE Geoscience and Remote Sensing Letters, vol. 14, no. 5, pp. 778-782, May 2017.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	O. H. Adedeji, O. O. Tope-Ajayi, and O. L. Abegunde, "Assessing and predicting changes in the status of Gambari forest reserve, Nigeria using remote sensing and GIS techniques," J. of Geographic Information System, vol. 7, no. 3, Article ID: 57588, Jun. 2015.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Xue and S. Baofeng, "Significant remote sensing vegetation indices: a review of developments and applications," J. of Sensors, vol. 5, no. 6, pp. 1353691, 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	F. Petitjean, J. Inglada, and P. Gancarski, "Assessing the quality of temporal high-resolution classifications with low-resolution satellite image time series," International J. of Remote Sensing, vol. 35, no. 7, pp. 2693-2712, 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Calera, C. Martínez, and J. Melia, "A procedure for obtaining green plant cover: relation to NDVI in a case study for barley," International J. of Remote Sensing, vol. 22, no. 17, pp. 3357-3362, 2001.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	W. B. Cohen, T. K. Maiersperger, S. Gower, and D. Turner, "An improved strategy for regression of biophysical variables and Landsat ETM + data," Remote Sensing of Environment, vol. 84, no. 4, pp. 561-571, Apr. 2003.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	H. C. Gurgel and N. J. Ferreira, "Annual and interannual variability of NDVI in Brazil and its connections with climate," International J. of Remote Sensing, vol. 24, no. 18, pp. 3595-3609, 2003.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Z. Hosseini, M. Kappas, and P. Propastin, "Estimating relationship between vegetation dynamic and precipitation in central Iran," in Proc. Int. SWAT Conf.,6 pp., Toledo, Spain, 15-17 Jul. 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. J. Arsanjani, M. Helbich, W. Kainz, and A. D. Boloorani, "Integration of logistic regression, Markov chain and cellular automata models to simulate urban expansion," International J. of Applied Earth Observation and Geoinformation, vol. 1, no. 21, pp. 265-275, Apr. 2013.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	ب. فرخ‌زاد، ش. منصوری و ع. سپهری، "بررسی همبستگی بین شاخص‌های پوشش گیاهی NDVI و EVI با شاخص خشک‌سالی هواشناسی SPI (مطالعه موردی: مراتع استان گلستان)،" هواشناسی کشاورزی، جلد 5، شماره 2، صص. 56-65، پاييز و زمستان 1396.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Stepchenko and J. Chizhov, "NDVI short-term forecasting using recurrent neural networks," in Proc. of the 10th Int. Scientific and Practical Conf., vol. 3, pp. 180-185, Rēzekne, Latvija, 18-20 Jun. 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Stepchenko, "NDVI index forecasting using a layer recurrent neural network coupled with stepwise regression and the PCA," 
in Proc. 5th Int. Virtual Scientific Conf. on Informatics and Management Sciences, vol. 5, pp. 130-135, Zilina, Slovakia, 24-25 Apr. 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. Stepchenko and J. Chizhov, "Applying markov chains for NDVI time series forecasting of Latvian regions," Information Technology and Management Science, vol. 18, no. 1, pp. 57-61, 2015.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	E. Kriminger and H. Latchman, "Markov chain model of home-plug CSMA MAC for determining optimal fixed contention window size," in Proc. of the IEEE Int. Symp. on Power Line Communications and Its Applications ISPLC'11, pp. 399-404, Udine, Italy, 3-6 Apr.  2011.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	T. Wu, F. Feng, Q. Lin, and H. Bai, "A spatio-temporal prediction of NDVI based on precipitation: an application for grazing management in the arid and semi-arid grasslands," International J. of Remote Sensing, vol. 41, no. 6, pp. 2359-2373, 2020.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	P. M. Atkinson and A. R. L. Tatnall, "Introduction neural networks in remote sensing," International J. of Remote Sensing, vol. 18, 
no. 4, pp. 699-709, 1997.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	T. S. Wu, H. P. Fu, G. Jin, H. F. Wu, and H. M. Bai, "Prediction of the livestock carrying capacity using neural network in the meadow steppe," The Rangeland J., vol. 41, no. 1, pp. 65-72, 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Stepchenko and J. Chizhov, "Applying Markov chain for NDVI time series for Latvian regions," Information Technology Managements Science, vol. 18, no. 1, pp. 57-61, 2015.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Y. Bengio, P. Simard, and P. Frasconi, "Learning long-term dependencies with gradient descent is difficult," IEEE Trans. Neural Netw., vol. 5, no. 2, pp. 157-166, Mar. 1994.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	P. R. Silva, F. W. Acerbi Júnior, L. M. T. de Carvalho, and J. R. S. Scolforo, "Use of artificial neural networks and geographic objects for classifying remote sensing imagery," CERNE J., vol. 20, no. 2, pp. 267-276, Apr. 2014.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	D. S. Reddy and P. R. C. Prasad, "Prediction of vegetation dynamics using NDVI time series data and LSTM," Modeling Earth Systems and Environment, vol. 4, pp. 409-419, 018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	D. Phiri and J. Morgenroth, "Developments in Landsat land cover classification methods: a review," International of Remote Sensing, vol. 9, no. 9, Article ID: 967, 2017.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Z. Chen, W. G. Jiang, Z. H. Tang, and K. Jia, "Spatial-temporal pattern of vegetation index change and the relationship to land surface temperature in Zoige," International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, XLI-B3, pp. 849-852, Jun. 2016.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	E. Y. Liang, X. M. Shao, and J. C. He, "Relationships between tree growth and NDVI of grassland in the semiarid grassland of north China," International J. of Remote Sensing, vol. 26, no. 13, pp. 2901-2908, 2005.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	A. Graves, Supervised Sequence Labelling with Recurrent Neural Networks, Springer, Berlin-Heidelberg, 2012.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	F. A. Gers and J. Schmidhuber, "Recurrent nets that time and count," in Proc. of the IEEE-INNS-ENNS Int. Joint Conf. on Neural Networks, IJCNN'00, 5 pp., Como, Italy, 27-27 Jul. 2000.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	ز. پرور و ک. شایسته، "پیش‌بینی روند تغییرات و توسعه شهری با استفاده از تصاویر ماهواره‌ای چندزمانه و سیستم اطلاعات جغرافیایی (مطالعه موردی: شهر بجنورد)،" محیط‌شناسی، جلد 43، شماره 3، صص. 513-527، 1396.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	T. Wu, F. Feng, Q. Lin, and H. Bai, "A spatio-temporal prediction of NDVI based on precipitation: an application for grazing management in the arid and semi-arid grasslands," International J. of Remote Sensing, vol. 41, no. 6, pp. 2359-2373, 2020.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Load Balancing in Fog Nodes using Reinforcement Learning Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>niloofar</given_name><surname>tahmasebi pouya</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mehdi-Agha</given_name><surname> Sarram</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>15</day><year>2023</year></publication_date><pages><first_page>291</first_page><last_page>300</last_page></pages><doi_data><doi>10.66224/ijece.29213.20.4.291</doi><resource>http://ijece.org/fa/Article/29213</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29213</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29213</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29213</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29213</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29213</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29213</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29213</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	I. Martinez, A. S. Hafid, and A. Jarray, "Design, resource management, and evaluation of fog computing systems: a survey," IEEE Internet of Things J., vol. 8, no. 4, pp. 2494-2516, Feb. 2020.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Yousefpour, et al., "All one needs to know about fog computing and related edge computing paradigms: a complete survey," J. of Systems Architecture, vol. 98, pp. 289-330, Sept. 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	D. Puthal, et al., "Secure authentication and load balancing of distributed edge data centers," J. of Parallel and Distributed Computing, vol. 124, pp. 60-69, Feb. 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	N. Khattar, J. Sidhu, and J. Singh, "Toward energy-efficient cloud computing: a survey of dynamic power management and heuristics-based optimization techniques," The J. of Supercomputing, vol. 75, no. 8, pp. 4750-4810, Aug. 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Adhikari and T. Amgoth, "Heuristic-based load-balancing algorithm for IaaS cloud," Future Generation Computer Systems, vol. 81, pp. 156-165, Apr. 2018.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Rasheed, et al., " A cloud-fog based smart grid model using max-min scheduling algorithm for efficient resource allocation," in Proc. Int. Conf. on Network-Based Information Systems, vol. 22, pp. 273-285, Sept. 2018.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	L. Abualigah et al., "Advances in meta-heuristic optimization algorithms in big data text clustering," Electronics, vol. 10, no. 2, Article ID: 101, 2021.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Adhikari, S. Nandy, and T. Amgoth, "Meta heuristic-based task deployment mechanism for load balancing in IaaS cloud," J. of Network and Computer Applications, vol. 128, pp. 64-77, Feb. 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	L. Shen, J. Li, Y. Wu, Z. Tang, and Y. Wang, "Optimization of artificial bee colony algorithm based load balancing in smart grid cloud," in Proc. of the IEEE Inovative Smart Grid Technologies-Asia, ISGT Asia, pp. 1131-1134, Chengdu, China, 21-24 May 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	B. Kruekaew and W. Kimpan, "Multi-objective task scheduling optimization for load balancing in cloud computing environment using hybrid artificial bee colony algorithm with reinforcement learning," IEEE Access, vol. 10, pp. 17803-17818, 2022.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. R. Deshmukh, S. K. Yadav, and D. N. Kyatanvar, "Load balancing in cloud environs: optimal task scheduling via hybrid algorithm," International J. of Modeling, Simulation, and Scientific Computing, vol. 12, no. 2, Article ID: 2150008, Apr. 2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. M. Golchi, S. Saraeian, and M. Heydari, "A hybrid of firefly and improved particle swarm optimization algorithms for load balancing in cloud environments: performance evaluation," Computer Networks, vol. 162, Article ID: 106860, Oct. 2019.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. Y. Baek, G. Kaddoum, S. Garg, K. Kaur, and V. Gravel, "Managing fog networks using reinforcement learning based load balancing algorithm," in Proc. of the IEEE Wireless Communications and Networking Conf., WCNC’19, 7 pp., Marrakesh, Morocco, 15-18 Apr. 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	X. Xu, S. Fu, Q. Cai, W. Tian, W. Liu, W. Dou, X. Sun, and 
A. X. Liu, "Dynamic resource allocation for load balancing in fog environment," Wireless Communications and Mobile Computing, vol. 2018, Article ID: 6421607, Apr. 2018.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. B. Manju and S. Sumathy, "Efficient load balancing algorithm for task preprocessing in fog computing environment," In Smart Intelligent Computing and Applications, Springer, Singapore, vol. 105, pp. 291-298, 2019.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Sharma and H. Saini, "A novel four-tier architecture for delay aware scheduling and load balancing in fog environment," Sustainable Computing: Informatics and Systems, vol. 24, Article ID: 100355, Dec. 2019.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	F. M. Talaat, M. S. Saraya, A. I. Saleh, H. A. Ali, and S. H. Ali, 
"A load balancing and optimization strategy (LBOS) using reinforcement learning in fog computing environment," J. of Ambient Intelligence and Humanized Computing, vol. 11, no. 11, pp. 4951-4966, Nov. 2020.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	V. Divya and R. L. Sri, "ReTra: reinforcement based traffic load balancer in fog based network," in Proc. of the 10th Int. Conf. 
on Computing, Communication and Networking Technologies, ICCCNT’19, 6 pp., Kanpur, India, 6-8 Jul. 2019.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	H. Lu, C. Gu, F. Luo, W. Ding, and X. Liu, "Optimization of lightweight task offloading strategy for mobile edge computing based on deep reinforcement learning," Future Generation Computer Systems, vol. 102, pp. 847-861, Jan. 2020.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	R. Beraldi, C. Canali, R. Lancellotti, and G. P. Mattia, "A random walk based load balancing algorithm for fog computing," in Proc. of the Fifth Int. Conf. on Fog and Mobile Edge Computing, FMEC’20, pp. 46-53, Paris, France 20-23 Apr. 2020.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	F. M. Talaat, S. H. Ali, A. I. Saleh, and H. A. Ali, "Effective load balancing strategy (ELBS) for real-time fog computing environment using fuzzy and probabilistic neural networks," J. of Network and Systems Management, vol. 27, no. 4, pp. 883-929, Oct. 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	H. Gupta, A. V. Dastjerdi, S. K. Ghosh, and R. Buyya, "iFogSim: a toolkit for modeling and simulation of resource management techniques in the Internet of Things, edge and fog computing environments," Software-Practice and Experience, vol. 47, no. 9, 
pp. 1275-1296, Sep. 2017.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Xie, F. R. Yu, T. Huang, R. Xie, J. Liu, C. Wang, and Y. Liu, "A survey of machine learning techniques applied to software defined networking (SDN): research issues and challenges," IEEE Communications Surveys and Tutorials, vol. 21, no. 1, pp. 393-430, Aug. 2019.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	H. Ye, L. Liang, G. Y. Li, J. Kim, L. Lu, and M. Wu, "Machine learning for vehicular networks: recent advances and application examples," IEEE Vehicular Technology Magazine, vol. 13, no. 2, 
pp. 94-101, Apr. 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	R. Sheikhpour, M. A. Sarram, S. Gharaghani, and M. A. Z. Chahooki, "A survey on semi-supervised feature selection methods," Pattern Recognition, vol. 64, pp. 141-158, Apr. 2017.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	A. Mebrek, M. Esseghir, and L. Merghem-Boulahia, "Energy-efficient solution based on reinforcement learning approach in fog networks," Proc. of the Fifth 15th Int. Wireless Communications &amp; Mobile Computing Conf., IWCMC’19, pp. 2019-2024, Tangier, Morocco, 24-28 Jun. 2019.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Y. Xu, W. Xu, Z. Wang, J. Lin, and S. Cui, "Load balancing for ultradense networks: a deep reinforcement learning-based approach," IEEE Internet of Things J., vol. 6, no. 6, pp. 9399-9412, Aug. 2019.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	R. Mahmud and R. Buyya, "Modeling and Simulation of Fog and Edge Computing Environments Using iFogSim Toolkit," Fog and Edge Computing, pp. 433-465, Jan. 2019.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	I. Tellioglu and H. A. Mantar, "A proportional load balancing for wireless sensor networks," in Proc. of the Fifth 3rd Int. Conf. on Sensor Technologies and Applications, pp. 514-519, Athens, Greece, 18-23 Jun. 2009.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New Measure for Partitioning of Block-Centric Graph Processing Systems </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Masoud</given_name><surname>Sagharichian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Morteza</given_name><surname>Alipour Langouri</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>15</day><year>2023</year></publication_date><pages><first_page>282</first_page><last_page>290</last_page></pages><doi_data><doi>10.66224/ijece.29250.20.4.282</doi><resource>http://ijece.org/fa/Article/29250</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29250</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29250</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29250</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29250</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29250</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29250</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29250</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Ulizko, E. Antonov, A. Artamonov, et al., "Graph visualization of the characteristics of complex objects on the example of the analysis of politicians," in Proc. 30th Int. Conf. on Computer Graphics and Machine Vision, 9 pp., St. Petersburg, Russia Federation, 22-25 Sept. 2020.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. S. Yeom, et al., "Overcoming the scalability challenges of epidemic simulations on blue waters," in Proc. IEEE 28th Int. Parallel and Distributed Processing Symp., pp. 755-764, Phoenix, AZ, USA, 19-23 May 2014.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. Hess, V. H. Visschers, and M. Siegrist, "Risk communication with pictographs: the role of numeracy and graph processing," Judgment and Decision Making, vol. 6, no. 3, pp. 263-274, Apr. 2011.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	V. Agarwal, F. Petrini, D. Pasetto, D. A. Bader, "Scalable graph exploration on multicore processors," in Proc. of the ACM/IEEE International Conf. for High Performance Computing, Networking, Storage and Analysis, 11 pp., New Orleans, LA, USA, 13-19 Nov. 2010.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Y. Wang, Y. Shangdi, L. Dhulipala, Y. Gu, and J. Shun, "GeoGraph: a framework for graph processing on geometric data," ACM SIGOPS Operating Systems Review, vol. 55, no. 1, pp. 38-46, 2021.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	G. Malewicz, et al., "Pregel: a system for large-scale graph processing," in Proc. of the ACM SIGMOD Int. Conf. on Management of Datapp. 135-146, Indianapolis, IN, USA, 6-10 Jun. 2010.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Salihoglu and J. Widom, "GPS: a graph processing system," in Proc. of the 25th Int. Conf. on Scientific and Statistical Database Management, Article No.: 22, 12 pp., Baltimore, MA, USA, 29-31 Jul. 2013.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. E. Gonzalez, et al., "Graphx: Graph processing in a distributed dataflow framework," in Proc. 11th USENIX Symp. on Operating Systems Design and Implementation, OSDI'14, pp. 599-613, Broomfield, CO, USA, 6-8 Oct. 2014.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Hong, et al., "PGX.D: a fast distributed graph processing engine," in Proc. of the Int. Conf. for High Performance Computing, Networking, Storage and Analysis, 12 pp., Austin, TX, USA, 15-20 Nov. 2015.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	R. R. McCune, T. Weninger, and G. Madey, "Thinking like a vertex: a survey of vertex-centric frameworks for large-scale distributed graph processing," ACM Computing Surveys, vol. 48, no. 2, Article No.: 25, 39 pp., Nov. 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	D. Yan, J. Cheng, Y. Lu, and W. Ng, "Blogel: a block-centric framework for distributed computation on real-world graphs," Proc. of the VLDB Endowment, vol. 7, no. 14, pp. 1981-1992, Oct. 2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Sagharichian, H. Naderi, and M. Haghjoo, "ExPregel: a new computational model for large‐scale graph processing," Concurrency and Computation: Practice and Experience, vol. 27, no. 17, pp. 4954-4969, Dec. 2015.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Aridhi, A. Montresor, and Y. Velegrakis, "BLADYG: a novel block-centric framework for the analysis of large dynamic graphs," in Proc. of the ACM Workshop on High Performance Graph Processing, pp. 39-42, Kyoto, Japan, 31-31 May 2016.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	R. Dindokar, N. Choudhury, and Y. Simmhan, "A meta-graph approach to analyze subgraph-centric distributed programming models," in Proc. IEEE Int. Conf. on Big Data, pp. 37-47, Washington, DC, USA, 5-8 Dec. 2016.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Quamar and A. Deshpande, "NScaleSpark: subgraph-centric graph analytics on Apache Spark," in Proc. of the 1st ACM SIGMOD Workshop on Network Data Analytics, Article No.: 5, 8 pp., San Francisco, CA, USA, 1-1 Jul. 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Sagharichian and H. Naderi, "Intelligent and independent processes for overcoming big graphs," The J. of Supercomputing, 
vol. 73, no. 4, pp. 1438-1466, Apr. 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	X. Sui, D. Nguyen, M. Burtscher, and K. Pingali, "Parallel graph partitioning on multicore architectures," in Proc. Int. Workshop on Languages and Compilers for Parallel Computing, pp. 246-260, Houston, TX, USA, 7-9 Oct. 2010.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	D. LaSalle and G. Karypis, "Multi-threaded graph partitioning," IEEE 27th Int. Symp. on Parallel and Distributed Processing, pp. 225-236, Cambridge, MA, USA,20-24 May 2013.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Naumov and T. Moon, Parallel Spectral Graph Partitioning, Tech. Rep., NVIDIA Tech. Rep, 2016.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	H. Meyerhenke, P. Sanders, and C. Schulz, "Parallel graph partitioning for complex networks," IEEE Trans. on Parallel and Distributed Systems, vol. 28, no. 9, pp. 2625-2638, Sept. 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	F. Rahimian, A. H. Payberah, S. Girdzijauskas, M. Jelasity, and S. Haridi, "JA-BE-JA: A distributed algorithm for balanced graph partitioning," in Proc. IEEE 7th Int Conf. on Self-Adaptive and Self-Organizing Systems, pp. 51-60, Philadelphia, PA, USA, 9-13 Sept. 2013.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	C. Martella, D. Logothetis, A. Loukas, and G. Siganos, "Spinner: scalable graph partitioning in the cloud," in Proc.IEEE 33rd International Conf. on Data Engineering, ICDE'17, pp. 1083-1094, San Diego, CA, USA, 19-22 Apr. 2017.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. Onizuka, T. Fujimori, and H. Shiokawa, "Graph partitioning for distributed graph processing," Data Science and Engineering, vol. 2, no. 1, pp. 94-105, Mar. 2017.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. Sun, H. Vandierendonck, and D. S. Nikolopoulos, "Graphgrind: addressing load imbalance of graph partitioning," in Proc. of the Int. Conf. on Supercomputing, Article No.: 16, 10 pp., Chicago, IL, USA, 14-16 Jun. 2017.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	C. J. Alpert and A. B. Kahng, "Recent directions in netlist partitioning: a survey," Integration, vol. 19, no. 1-2, pp. 1-81, 1995.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	B. Hendrickson and T. G. Kolda, "Graph partitioning models for parallel computing," Parallel Computing, vol. 26, no. 12, pp. 1519-1534, 2000.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	T. N. Bui and C. Jones, "Finding good approximate vertex and edge partitions is NP-hard," Information Processing Letters, vol. 42, no. 3, pp. 153-159, May 1992.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	B. W. Kernighan and S. Lin, "An efficient heuristic procedure for partitioning graphs," The Bell System Technical J., vol. 49, no. 2, 
pp. 291-307, Feb. 1970.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	Y. G. Saab, "An effective multilevel algorithm for bisecting graphs and hypergraphs," IEEE Trans. on Computers, vol. 53, no. 6, pp. 641-652, Jun. 2004.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	L. Sun and M. Leng, "An effective multi-level algorithm based on simulated annealing for bisecting graph," in Proc. Int. Workshop on Energy Minimization Methods in Computer Vision and Pattern Recognition, 12 pp., Ezhou, China, 27-29 Aug. 2007.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	C. Aykanat, B. B. Cambazoglu, and B. Uçar, "Multi-level direct k-way hypergraph partitioning with multiple constraints and fixed vertices," J. of Parallel and Distributed Computing, vol. 68, no. 5, pp. 609-625, May 2008.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	R. Khandekar, S. Rao, and U. Vazirani, "Graph partitioning using single commodity flows," J. of the ACM, vol. 56, no. 4, 
pp. 385-390, 2009.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	H. Meyerhenke, B. Monien, and S. Schamberger, "Graph partitioning and disturbed diffusion," Parallel Computing, vol. 35, no. 10-11, pp. 544-569, Oct. 2009.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	P. Chardaire, M. Barake, and G. P. McKeown, "A probe-based heuristic for graph partitioning," IEEE Trans. on Computers, vol. 56, no. 12, pp. 1707-1720, Dec. 2007.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	R. Zamprogno and A. R. Amaral, "An efficient approach for large scale graph partitioning," J. of Combinatorial Optimization, vol. 13, no. 4, pp. 289-320, May 2007.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	A. Trifunovic and W. J. Knottenbelt, "Towards a parallel disk-based algorithm for multilevel k-way hypergraph partitioning," in Proc. IEEE 18th Int. Parallel and Distributed Processing Symp., pp. 236-243, Santa Fe, NM, USA, 26-30 Apr. 2004.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	I. Stanton and G. Kliot, "Streaming graph partitioning for large distributed graphs," in Proc. of the 18th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 1222-1230, Beijing, China, ?12-16 Aug. 2012.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	C. Tsourakakis, C. Gkantsidis, B. Radunovic, M. Vojnovic, "Fennel: streaming graph partitioning for massive scale graphs," in Proc. of the 7th ACM Int. Conf. on Web Search and Data Mining, pp. 333-342, New York, NY, USA, 24-26 Feb. 2014.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	Y. Tian, A. Balmin, S. A. Corsten, S. Tatikonda, and J. McPherson, "From "think like a vertex" to "think like a graph"," Proc. of the VLDB Endowment, vol. 7, no. 3, pp. 193-204, Nov. 2013.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	W. Fan, J. Xu, Y. Wu, W. Yu, and J. Jiang, "GRAPE: parallelizing sequential graph computations," Proc. of the VLDB Endowment, vol. 10, no. 12, pp. 1889-1892, Aug. 2017.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	S. Verma, L. M. Leslie, Y. Shin, and I. Gupta, "An experimental comparison of partitioning strategies in distributed graph processing," Proc. of the VLDB Endowment, vol. 10, pp. 493-504, Jan. 2017.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	Y. Kim, M. Bae, and S. Oh, "Dynamic block reassignment for load balancing of block centric graph processing systems," KIPS Trans. on Software and Data Engineering, vol. 7, no. 5, pp. 177-188, 2018.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	X. Wen, S. Zhang, and H. You, DRONE: A Distributed Subgraph-Centric Framework for Processing Large Scale Power-law Graphs, arXiv preprint arXiv:1812.04380, 2018.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	M. Sagharichian, M. A. Langouri, and H. Naderi, "A fast method to exactly calculate the diameter of incremental disconnected graphs," World Wide Web, vol. 20, no. 2, pp. 399-416, Mar. 2017.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	Stanford University, Stanford Large Network Dataset Collection, Available from: http://snap.stanford.edu/data.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Increasing Image Quality in Image Steganography Using Genetic Algorithm and Reversible Mapping</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Saeed</given_name><surname>TorabiTorbati</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>مرتضی</given_name><surname>خادمی</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>عباس</given_name><surname>ابراهیمی مقدم</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>15</day><year>2023</year></publication_date><pages><first_page>327</first_page><last_page>334</last_page></pages><doi_data><doi>10.66224/ijece.31718.20.4.327</doi><resource>http://ijece.org/fa/Article/31718</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/31718</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/31718</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/31718</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/31718</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/31718</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/31718</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/31718</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Q. M. Hussein, "New metrics for steganography algorithm quality," International J. of Advanced Science and Technology, vol. 29, no. 2, pp. 2092-2098 2020.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	H. Alatawi and C. Narmatha, "The secret image hiding schemes using steganography-survey," in Proc. of the Int. Conf. on Computing and Information Technology, ICCIT-1441, 5 pp., Tabuk, Saudi Arabia, 9-10 Sept. 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Baluja, "Hiding images in plain sight: deep steganography," Advances in Neural Information Processing Systems, vol. 30, pp. 2069-2079, 2017.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Dhawan and R. Gupta, "Analysis of various data security techniques of steganography: a survey," Information Security J.: A Global Perspective, vol. 30, no. 2, Article ID: 1801911, 2021.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Adeboye Ajala, S. Singh, and S. Mukherjee, "Application of steganography technique in cloud computing," in Proc. Int. Conf. on Computational Intelligence and Knowledge Economy, ICCIKE'19, pp. 532-537, Dubai, United Arab Emirates, 10-11 Dec. 2019.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. Khelifi, T. Brahimi, J. Han, and X. Li, "Secure and privacy-preserving data sharing in the cloud based on lossless image coding," Signal Processing, vol. 148, pp. 91-101, Jul. 2018.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Hussain, A. Wahid Abdul Wahab, Y. Idna Bin Idris, A. T. S. Ho, and K. H. Jung, "Image steganography in spatial domain: a survey," Signal Processing: Image Communication, vol. 65, pp. 46-66, Jul. 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	K. Bansal, A. Agrawal, and N. Bansal, "A survey on steganography using least significant bit (LSB) embedding approach," in Proc. 4th Int. Conf. on Trends in Electronics and Informatics, ICOEI'20, pp. 64-69, Tirunelveli, India, 15-17 Jun. 2020.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	D. R. I. M. Setiadi, "PSNR vs SSIM: imperceptibility quality assessment for image steganography," Multimedia Tools and Applications, vol. 80, pp. 8423-8444, 2021.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. C. Kasapbaşı and İ. Bayam, "A new improved LSB chaotic image steganography scheme," in Proc. Conf. of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus'22, pp. 2069-2079, Saint Petersburg, Russian Federation, 25-28 Jan. 2022.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Chanchal, P. Malathi, and G. Kumar T., "A comprehensive survey on neural network based image data hiding scheme," in Proc. 4th In. Conf. on IoT in Social, Mobile, Analytics and Cloud, 
I-SMAC'20, pp. 1245-1249, Palladam, India, 7-9 Oct. 2020.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	R. Rahim and M. S. Nadeem, "End-to-end trained CNN encode-decoder networks for image steganography," in Proc. of the 15th European Conf. on Computer Vision, ECCV'18, pp. 723-729, Munich, Germany, 8-14 Sept. 2018.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	D. Hu, L. Wang, W. Jiang, S. Zheng, and B. Li, "A novel image steganography method via deep convolutional generative adversarial networks," IEEE Access, vol. 6, pp. 38303-38314, 2018.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Q. Liu, T. Qiao, M. Xu, and N. Zheng, "Fuzzy localization of steganographic flipped bits via modification map," IEEE Access, 
vol. 7, pp. 74157-74167, 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Z. Ashraf, M. L. Roy, P. K. Muhuri, and Q. M. Danish Lohani, "A novel image steganography approach based on interval type-2 fuzzy similarity," in Proc. IEEE Int. Conf. on Fuzzy Systems, 8 pp., Rio de Janeiro, Brazil, 8-13 Jul. 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. K. Hussein, "Genetic algorithm based steganography using adaptive rectangular embedding area," International J. of Mechanical Engineering and Technology, vol. 10, no. 1, pp. 2066-2074, 2019.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	E. Ghasemi, J. Shanbehzadeh, and N. Fassihi, "High capacity image steganography using wavelet transform and genetic algorithm," in Proc. of the Int. Multi Conf. of Engineers and Computer Scientists, vol. 1, pp. 495-498, Hong Kong, 16-18 Mar. 2011.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	R. Biswas and S. K. Bandyapadhay, "Random selection based GA optimization in 2D-DCT domain color image steganography," Multimed Tools Appl, vol. 79, no. 11-12, pp. 7101-7120, Mar. 2020.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. Hemanth D., et al., "A modified genetic algorithm for performance improvement of transform based image steganography systems," J. of Intelligent &amp; Fuzzy Systems, vol. 35, no. 1, pp. 197-209, 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Khamrui and J. Mandal, "A genetic algorithm based steganography using discrete cosine transformation (GAS DCT)," in Proc. of the 1st Int.l Conf. on Computational Intelligence: Modeling Techniques and Applications, CIMTA’13, vol. 10, pp. 105-110, Kalyani, India, 27-28 Sept. 2013.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	R. Wazirali, W. Alasmary, M. M. E. A. Mahmoud, and A. Alhindi, "An optimized steganography hiding capacity and imperceptibly using genetic algorithms," IEEE Access, vol. 7, pp. 133496-133508, 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Chaudhary, S. Hiranwal, and C. P. Gupta, " Graph signal processing and tunicate swarm optimization-based image steganography using hybrid chaotic map-based image scrambling," Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, no. 7, pp. 2159-2171, 2022.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	L. Yu, Y. Zhao, R. Ni, and T. Li, "Improved adaptive LSB steganography based on chaos and genetic algorithm," EURASIP J. on Advances in Signal Processing, Article ID: 876946, Jun. 2010.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. Soleimanpour-Moghadam and S. Talebi, "A novel technique for steganography method based on improved genetic algorithm optimization in spatial domain," Iranian J. of Electrical and Electronic Engineering, vol. 9, no. 2, pp. 67-75, Jun. 2013.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	R. Latha, R. Premkumar, and S. Anand, "An efficient wavelet transform based steganography technique using chaotic map," in Proc. IEEE Int. Conf. on Current Trends Toward Converging Technologies, 7 pp., Coimbatore, India,1-3 Mar. 2018.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Allan G. Weber, The USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering. http://sipi.usc.edu/database.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	J. H. Horng, C. C. Chang, and G. L. Li, "Steganography using quotient value differencing and LSB substitution for AMBTC compressed images," IEEE Access, vol. 8, pp. 129347-129358, 2020.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improvement of the Sharpness and Brightness of Dim Images Using the Retinax Approach and Nonlinear Conversion</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>maryam</given_name><surname>ghasemi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Morteza</given_name><surname>Khademi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Abbas</given_name><surname>Ebrahimi moghadam</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>15</day><year>2023</year></publication_date><pages><first_page>301</first_page><last_page>310</last_page></pages><doi_data><doi>10.66224/ijece.32047.20.4.301</doi><resource>http://ijece.org/fa/Article/32047</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/32047</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/32047</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/32047</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/32047</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/32047</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/32047</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/32047</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Xu, C. Yang, B. Sun, X. Yan, and M. Chen, "A novel multi-scale fusion framework for detail-preserving low-light image enhancement," Information Sciences, vol. 548, pp. 378-397, Feb. 2021.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	W. Wang, X. Wu, X. Yuan, and Z. Gao, "An experiment-based review of low-light image enhancement methods," IEEE Access, vol. 8, 
pp. 87884-87917, 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	X. Liu, G. Cheung, X. Ji, D. Zhao, and W. Gao, "Graph-based joint dequantization and contrast enhancement of poorly lit JPEG images," IEEE Trans. on Image Processing, vol. 28, no. 3, pp. 1205-1219, Mar. 2018.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Parihar and K. Singh, "A study on retinex based method for image enhanceme," in Proc. of the 2nd Int. Conf. on Inventive Systems and Control, ICISC'18, pp. 619-624, Coimbatore, India, 19-20 Jan. 2018.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Mahmood, S. A. Khan, S. Hussain, and E. M. Almaghayreh, "An adaptive image contrast enhancement technique for low-contrast images," IEEE Access, vol. 7, pp. 161584-161593, 2019.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	T. Dong, G. Zhao, J. Wu, Y. Ye, and Y. Shen, "Efficient traffic video dehazing using adaptive dark channel prior and spatial-temporal correlations," Sensors, vol. 19, no. 7, Artucle ID: 1593, 2019.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. Chang, C. Jung, P. Ke, H. Song, and J. Hwang, "Automatic contrast-limited adaptive histogram equalization with dual gamma correction," IEEE Access, vol. 6, pp. 11782-11792, 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. Xiong, et al., "Application of histogram equalization for image enhancement in corrosion areas," Shock and Vibration, vol. 2021, Article ID: 8883571, 2021.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	P. P. Banik, R. Saha, and K. D. Kim, "Contrast enhancement of 
low-light image using histogram equalization and illumination adjustment," in Proc. IEEE Int. Conf. on Electronics, Information, and Communication, ICEIC'18, 4 pp., Honolulu, HI, USA, 24-27 Jan. 2018.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	K. A. Dar and S. Mittal, "An enhanced adaptive histogram equalization based local contrast preserving technique for HDR images," in Proc. IOP Conf. Series: Materials Science and Engineering, vol. 1022, Article: ID: 012119, 12 pp., 2021.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	E. H. Land and J. J. McCann, "Lightness and retinex theory," Journal of the Optical Society of America, vol. 61, no. 1, pp. 1-11, 1971.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Y. Guo, Y. Lu, R. W. Liu, M. Yang, and K. T. Chui, "Low-light image enhancement with regularized illumination optimization and deep noise suppression," IEEE Access, vol. 8, pp. 145297-145315, 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. Tanaka, Y. Waizumi, and T. Kasezawa, "Retinex-based signal enhancement for image dark regions," in Proc. IEEE Int, Conf. on Signal and Image Processing Applications, ICSIPA'17, pp. 205-209, Kuching, Malaysia, 12-14 Sept. 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	J. Zhou, D. Zhang, P. Zou, W. Zhang, and W. Zhang, "Retinex-based laplacian pyramid method for image defogging," IEEE Access, vol. 7, pp. 122459-122472, 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Park, K. Kim, S. Yu, and J. Paik, "Contrast enhancement for 
low-light image enhancement: a survey," IEIE Trans. on Smart Processing &amp; Computing, vol. 7, pp. 36-48, 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	K. A. Dar and S. Mittal, "A dynamic fuzzy histogram equalization for high dynamic range images by using multi-scale retinex algorithm," in Proc. of the First Int. Conf. on Innovative Computing &amp; Communications, ICICC'20, 8 pp., 1-1 Apr. 2020.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	P. Hao, S. Wang, S. Li, and M. Yang, "Low-light image enhancement based on retinex and saliency theories," in Proc.Chinese Automation Congress, CAC'19, pp. 2594-2597, Hangzhou, China, 22-24 Nov. 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Cornia, L. Baraldi, G. Serra, and R. Cucchiara, "Predicting human eye fixations via an LSTM-based saliency attentive model," IEEE Trans. on Image Processing, vol. 27, no. 10, pp. 5142-5154, Oct. 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. A. Al-Hashim and Z. Al-Ameen, "Retinex-based multiphase algorithm for low-light image enhancement," Traitement du Signal, vol. 37, no. 5, pp. 733-743, Oct. 2020.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Liu, W. Long, L. He, Y. Li, and W. Ding, "Retinex-based fast algorithm for low-light image enhancement entropy," Entropy, vol. 21, no. 6, Article ID: 746, 2021.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Arora, et al., Low Light Image Enhancement via Global and Local Context Modeling, arXiv preprint arXiv: 2101.00850, Jan. 2021.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	H. Liang, A. Yu, M. Shao, and Y. Tian, "Multi-feature guided low-light image enhancement," Applied Sciences, vol. 11, Article ID: 5055, 11 pp., 2021.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	X. Guo, Y. Li, and H. Ling, "LIME: low-light image enhancement via illumination map estimation," IEEE Trans. on Image Processing, vol. 26, no. 2, pp. 982-993, Feb. 2017.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. Rahman, et al., "An adaptive gamma correction for image enhancement," EURASIP J. on Image and Video Processing, vol. 26, Article ID: 35, 13 pp., 2016.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Wikipedia, Guided Filter, last edited in 2021, https://en.wikipedia.org/wiki/Guided_filter.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	X. Fu, D. Zeng, Y. Huang, X. P. Zhang, and X. Ding, "A weighted variational model for simultaneous reflectance and illumination estimation," in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, pp. 2782-2790, Las Vegas, NV, USA, 27-30 Jun. 2016.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	S. C. Huang, F. C. Cheng, and Y. S. Chiu, "Efficient contrast enhancement using adaptive gamma correction with weighting distribution," IEEE Trans. on Image Processing, vol. 22, no. 3, pp. 1032-1041, Mar. 2013.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	X. Fu, et al., "A fusion-based enhancing method for weakly illuminated images," Signal Processing, vol. 129, no. C, pp. 82-96, Dec. 2016.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	L. Li, S. Sun, C. Xia, P. Chen, and F. M. Dong, "Survey of histogram equalization technology," Comput. Syst. Appl, vol. 23, no. 3, pp. 1-8, 2014.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Multi-Label Feature Selection Using a Hybrid Approach Based on the Particle Swarm Optimization Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>َAzar</given_name><surname>Rafiei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Parham</given_name><surname>Moradi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Abdolbaghi</given_name><surname>Ghaderzadeh</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>15</day><year>2023</year></publication_date><pages><first_page>271</first_page><last_page>281</last_page></pages><doi_data><doi>10.66224/ijece.32290.20.4.271</doi><resource>http://ijece.org/fa/Article/32290</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/32290</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/32290</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/32290</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/32290</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/32290</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/32290</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/32290</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	م. رحمانی¬نیا و پ. مرادی، "يك الگوريتم انتخاب ويژگي برخط در جريان داده¬ها با استفاده از اطلاعات متقابل چندمتغيره،" نشریه مهندسی برق و مهندسی كامپیوتر ایران، ب- مهندسی کامپیوتر، سال 18، شماره 4، صص. 336-327، زمستان 1399.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Lin, Q. Hu, J. Liu, J. Chen, and J. Duan, "Multi-label feature selection based on neighborhood mutual information," Applied Soft Computing, vol. 38, pp. 244-256, Jan. 2016.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	O. Reyes, C. Morell, and S. Ventura, "Scalable extensions of the ReliefF algorithm for weighting and selecting features on the multi-label learning context," Neurocomputing, vol. 161, pp. 168-182, Aug. 2015.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	L. Li, et al., "Multi-label feature selection via information gain," in Proc. Int. Conf. on Advanced Data Mining and Applications, ADMA'14, pp. 345-355, Guilin, China, 19-21 Dec. 2014.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Y. Lin, Q. Hu, J. Liu, and J. Duan, "Multi-label feature selection based on max-dependency and min-redundancy," Neurocomputing, vol. 168, pp. 92-103, Nov. 2015.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Tabakhi and P. Moradi, "Relevance-redundancy feature selection based on ant colony optimization," Pattern Recognition, vol. 48, no. 9, pp. 2798-2811, Sept. 2015.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	P. Moradi and M. Rostami, "Integration of graph clustering with 
ant colony optimization for feature selection," Knowledge-Based Systems, vol. 84, pp. 144-161, Aug. 2015.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. Lee and D. W. Kim, "Memetic feature selection algorithm for multi-label classification," Information Sciences, vol. 293, pp. 80-96, Feb. 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Y. Yu and Y. Wang, "Feature selection for multi-label learning using mutual information and GA," in Proc. 9th Int. Conf. on Rough Sets and Knowledge Technology, RSKT'14, pp. 454-463, Shanghai, China, 24-26 Oct. 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Y. Zhang, D. W. Gong, X. Y. Sun, and Y. N. Guo, "A PSO-
based multi-objective multi-label feature selection method in classification," Scientific Reports, vol. 7, Article ID: 376, Mar. 2017.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. L. Zhang, J. M. Peña, and V. Robles, "Feature selection for multi-label naive bayes classification," Information Sciences, vol. 179, no. 19, pp. 3218-3229, Sept. 2009.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. A. Khan, A. Ekbal, E. L. Mencía, and J. Fürnkranz, "Multi-objective optimisation-based feature selection for multi-label classification," in Proc. Int. Conf. on Applications of Natural Language to Information Systems, NLDB'17, pp. 38-41, Liege, Belgium, 21-23 Jun. 2017.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. You, J. Liu, G. Z. Li, and Y. Chen, "Embedded feature selection for multi-label classification of music emotions," International J. of Computational Intelligence Systems, vol. 5, no. 4, pp. 668-678, Aug. 2012.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	P. Zhu, Q. Xu, Q. Hu, C. Zhang, and H. Zhao, "Multi-label feature selection with missing labels," Pattern Recognition, vol. 74, pp. 488-502, Feb. 2018.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Tabakhi, A. Najafi, R. Ranjbar, and P. Moradi, "Gene selection for microarray data classification using a novel ant colony optimization," Neurocomputing, vol. 168, pp. 1024-1036, Nov. 2015.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	R. K. Sivagaminathan and S. Ramakrishnan, "A hybrid approach for feature subset selection using neural networks and ant colony optimization," Expert Systems with Applications, vol. 33, no. 1, pp. 49-60, Jul. 2007.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. H. Aghdam, N. Ghasem-Aghaee, and M. E. Basiri, "Text feature selection using ant colony optimization," Expert Systems with Applications, vol. 36, no. 3, pt. 2, pp. 6843-6853, Apr. 2009.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Paniri, M. B. Dowlatshahi, and H. Nezamabadi-pour, "MLACO: a multi-label feature selection algorithm based on ant colony optimization," Knowledge-Based Systems, vol. 192, Article ID: 105285, Mar. 2020.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. Yang and V. Honavar, "Feature subset selection using a genetic algorithm," IEEE Intelligent Systems, vol. 13, no. 2, pp. 117-136, Mar. 1998.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Rostami and P. Moradi, "A clustering based genetic algorithm for feature selection," in Proc. 6th Conf. on Information and Knowledge Technology, IKT'14, pp. 112-116, Shahrood, Iran, 27-29 May. 2014.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	T. M. Hamdani, J. M. Won, A. M. Alimi, and F. Karray, "Hierarchical genetic algorithm with new evaluation function and bi-coded representation for the selection of features considering their confidence rate," Applied Soft Computing, vol. 11, no. 2, pp. 2501-2509, Mar. 2011.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. W. Lin, Z. J. Lee, S. C. Chen, and T. Y. Tseng, "Parameter determination of support vector machine and feature selection using simulated annealing approach," Applied Soft Computing, vol. 8, no. 4, pp. 1505-1512, Sep. 2008.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. W. Lin, T. Y. Tseng, S. Y. Chou, and S. C. Chen, "A simulated-annealing-based approach for simultaneous parameter optimization and feature selection of back-propagation networks," Expert Systems with Applications, vol. 34, no. 2, pp. 1491-1499, Feb. 2008.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	L. Y. Chuang, C. H. Yang, and J. C. Li, "Chaotic maps based on binary particle swarm optimization for feature selection," Applied Soft Computing, vol. 11, no. 1, pp. 239-248, Jan. 2011.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Y. Liu, et al., "An improved particle swarm optimization for feature selection," J. of Bionic Engineering, vol. 8, no. 2, pp. 191-200, Jun. 2011.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	B. Xue, M. Zhang, and W. N. Browne, "Particle swarm optimisation for feature selection in classification: novel initialisation and updating mechanisms," Applied Soft Computing, vol. 18, pp. 261-276, May 2014.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	H. M. Abdelsalam and A. M. Mohamed, "Optimal sequencing of design projects' activities using discrete particle swarm optimisation," International J. of Bio-Inspired Computation, vol. 4, no. 2, pp. 100-110, 2012.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	K. Demir, B. H. Nguyen, B. Xue, and M. Zhang, " Particle swarm optimisation for sparsity-based feature selection in multi-label classification," in Proc. of the Genetic and Evolutionary Computation Conf. Companion, pp. 232-235, Boston, MA, USA, 9-13 Jul. 2022.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	J. Lee and D. W. Kim, "Mutual information-based multi-label feature selection using interaction information," Expert Systems with Applications, vol. 42, no. 4, pp. 2013-2025, Mar. 2015.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	W. Chen, J. Yan, B. Zhang, Z. Chen, and Q. Yang, "Document transformation for multi-label feature selection in text categorization," in Proc of 7th IEEE Int. Conf. on Data Mining, ICDM'07, vol. ???, pp. 451-456, Omaha, NE, USA, 28-31 Oct. 2007.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	N. Spolaôr, E. A. Cherman, M. C. Monard, and H. D. Lee, "A comparison of multi-label feature selection methods using the problem transformation approach," Electronic Notes in Theoretical Computer Science, vol. 292, pp. 135-151, Mar. 2013.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	G. Doquire and M. Verleysen, "Feature selection for multi-label classification problems," in Proc of Int. Work-Conf. on Artificial Neural Networks, IWANN'11, pp. 9-16, Torremolinos-Málaga, Spain, 8-10 Jun. 2011.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	G. Doquire and M. Verleysen, "Mutual information-based feature selection for multilabel classification," Neurocomputing, vol. 122, pp. 148-155, Dec. 2013.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	J. Lee and D. W. Kim, "Fast multi-label feature selection based on information-theoretic feature ranking," Pattern Recognition, vol. 48, no. 9, pp. 2761-2771, Sept. 2015.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	J. Read, B. Pfahringer, and G. Holmes, "Multi-label classification using ensembles of pruned sets," in Proc of 8th IEEE Int. Conf. on Data Mining, pp. 995-1000, Pisa, Italy, 15-19 Dec. 2008.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	A. Hashemi, M. B. Dowlatshahi, and H. Nezamabadi-pour, "MGFS: a multi-label graph-based feature selection algorithm via PageRank centrality," Expert Systems with Applications, vol. 142, Article ID: 113024, Mar. 2020.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	Z. Sun, et al., "Mutual information based multi-label feature selection via constrained convex optimization," Neurocomputing, vol. 329, pp. 447-456, Feb. 2019.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	J. Kennedy and R. Eberhart, "Particle swarm optimization," in Proc. of Int. Conf. on Neural Networks, ICNN'95, vol. 4, pp. 1942-1948, Perth, Australia, 27 Nov.-1 Dec. 1995.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	ح. افراخته و پ. مرادی، "روشی جدید به‌منظور خوشه‌بندی داده‌های سرعت باد در نیروگاه‌های بادی با استفاده از الگوریتم‌های FCM و PSO ،" نشریه مهندسی برق و مهندسی كامپیوتر ایران، ب- مهندسی کامپیوتر، سال 8، شماره 3، 
صص. 214-210، پاییز 1389.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	M. M. Kabir, M. Shahjahan, and K. Murase, "A new local search based hybrid genetic algorithm for feature selection," Neurocomputing, vol. 74, no. 17, pp. 2914-2928, Oct. 2011.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	D. P. Muni, N. R. Pal, and J. Das, Genetic Programming for Simultaneous Feature Selection and Classifier Design, 2006.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	M. M. Kabir, M. M. Islam, and K. Murase, "A new wrapper feature selection approach using neural network," Neurocomputing, vol. 73, pp. 3273-3283, Oct. 2010.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	P. Resnick, N. Iacovou, M. Suchak, P. Bergstrom, and J. Riedl, "GroupLens: an open architecture for collaborative filtering of netnews," in Proc. of the ACM Conf. on Computer Supported Cooperative Work, CSCW'94, pp. 175-186, Chapel Hill, NC, USA, 22-26 Oct. 1994.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	X. He, D. Cai, and P. Niyogi, "Laplacian score for feature selection," in Proc. of the 18th Int. Conf. on Neural Information Processing Systems, NIPS'05, pp. 507-514, Vancouver, Canada, 5-8 Dec. 2005.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	M. Stone, "Cross‐validatory choice and assessment of statistical predictions," J. of the Royal Statistical Society: Series B (Methodological), vol. 36, pp. 111-133, 1974.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	M. L. Zhang and Z. H. Zhou, "ML-KNN: a lazy learning approach to multi-label learning," Pattern Recognition, vol. 40, no. 7, pp. 2038-2048, Jul. 2007.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	S. Kashef and H. Nezamabadi-pour, "A label-specific multi-label feature selection algorithm based on the Pareto dominance concept," Pattern Recognition, vol. 88, pp. 654-667, 2019.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	J. Lee and D. W. Kim, "Feature selection for multi-label classification using multivariate mutual information," Pattern Recognition Letters, vol. 34, no. 3, pp. 349-357, Feb. 2013.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	D. J. Sheskin, Handbook of Parametric and Nonparametric Statistical Procedures, 5th ed., Chapman &amp; Hall, 2011.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>High Level Synthesis of Decimal Arithmetic on Coarse Grain Reconfigurable Architectures</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Samaneh</given_name><surname>Emami</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>15</day><year>2023</year></publication_date><pages><first_page>319</first_page><last_page>326</last_page></pages><doi_data><doi>10.66224/ijece.32627.20.4.319</doi><resource>http://ijece.org/fa/Article/32627</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/32627</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/32627</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/32627</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/32627</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/32627</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/32627</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/32627</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Sedighi, F. Haddadi, S. Emami, and M. Saffarpour, "A heuristic algorithm for high level synthesis of decimal arithmetic circuits using systemC," in Proc. 10th Int. Conf. on Design &amp; Technology of Integrated Systems in Nanoscale Era, DTIS'15, 6 pp., Napoli, Italy, 21-23 Apr. 2015.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. D. Gajski and L. Ramachandran, "Introduction to high-level synthesis," IEEE Design &amp; Test of Computers, vol. 11, no. 4, pp. 
44-54, Winter 1994.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	P. Coussy, D. D. Gajski, M. Meredith, and A. Takach, "An introduction to high-level synthesis," IEEE Design &amp; Test of Computers, vol. 26, no. 4, pp. 8-17, Aug. 2009.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	R. Nane, V. M. Sima, C. Pilato, J. Choi, B. Fort, A. Canis, Y. T. Chen, H. Hsiao, S. Brown, F. Ferrandi, J. Anderson, and K. Bertels, "A survey and evaluation of FPGA high-level synthesis tools," IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 10, pp. 1591-1604, Oct. 2016.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	L. K. Wang, M. A. Erle, C. Tsen, E. M. Schwarz, and M. J. Schulte, "A survey of hardware designs for decimal arithmetic," IBM J. of Research and Development, vol. 54, no. 2, pp. 8:1-8:15, Mar./Apr. 2010.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Nannarelli, "FPGA based acceleration of decimal operations," in Proc. Int. Conf. on Reconfigurable Computing and FPGAs, ReConFig'11, Cancun, pp. 146-151, Cancun, Mexico, 30-30 Nov. 2011.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Cong, B. Liu, S. Neuendorffer, J. Noguera, K. Vissers, and Z. Zhang, "High-level synthesis for FPGAs: from prototyping to deployment," IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, vol. 30, no. 4, pp. 473-491, Apr. 2011.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. A. Shami, Dynamically Reconfigurable Resource Array, Ph.D. Dissertation, KTH Sch. Inf. Tech. Sweden, Kista, 2012.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Y. Kim, R. N. Mahapatra, and K. Choi, "Design space exploration for efficient resource utilization in coarse-grained reconfigurable architecture," IEEE Trans. on Very Large Scale Integration (VLSI) Systems, vol. 18, no. 10, pp. 1471-1482, Oct. 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Emami and M. Sedighi, "An optimized reconfigurable architecture for hardware implementation of decimal arithmetic," Computers &amp; Electrical Engineering, vol. 63, pp. 18-29, Oct. 2017.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Vladutiu, "Functional analysis and synthesis of binary and decimal adding and subtracting devices," in Computer Arithmetic Algorithms and Hardware Implementations, Springer Berlin Heidelberg, 2012.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	I. D. Castellanos, Analysis and Implementation of Decimal Arithmetic Hardware in Nanometer CMOS technology, Ph.D. Dissertation, Oklahoma State University, USA, 2008.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. P. Deschamps, G. J. A. Bioul, and G. D. Sutter, Synthesis of Arithmetic Circuits-FPGA, ASIC and Embedded Systems, Wiley-Interscience, 2006.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. A. Gladshtein, "Algorithmic synthesis of a combinational adder of decimal digits encoded by the Johnson-Mobius code," Automatic Control and Computer Sciences, vol. 43, no. 5, pp. 233-240, 2009.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	R. Zimmermann, "Datapath synthesis for standard-cell design," in Proc. of the 19th IEEE Symposium on Computer Arithmetic, pp. 207-211, Portland, OR, USA, 08-10 Jun. 2009.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	C. K. Cheng, "Design space exploration for power-efficient mixed-radix ling adders," in Proc. of the 19th IEEE Symp. on Computer Arithmetic, pp. 212-212, Portland, OR, USA, 8-10 Jun. 2009.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. K. Verma, P. Brisk, and P. Ienne, "Challenges in automatic optimization of arithmetic circuits," in Proc. of the 16th IEEE Symposium on Computer Arithmetic, pp. 213-218, Portland, OR, USA, 8-10 Jun. 2009.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Zimpl, Zuse Institute Mathematical Programming Language, Available at: http://zimpl.zib.de.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	SCIP, Solving Constraint Integer Programs, Available at: http://scip.zib.de.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	IBM Corporation, The Telco Benchmark, Retrieved May 10, 2022, from: http://speleotrove.com/decimal/telcoSpec.html.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>