﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022920</doi_batch_id><timestamp>14050229203051</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>7</month><day>1</day><year>2023</year></publication_date><journal_volume><volume>21</volume></journal_volume><issue>1</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Synthesis and Implementation of Reversible Circuits Using all-optical Switch of Mach-Zehnder Switch (MZI)</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>yasser</given_name><surname>Sohrabi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>hooshmand</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad</given_name><surname>boloukian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Maryam</given_name><surname>Moosavi</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>1</day><year>2023</year></publication_date><pages><first_page>39</first_page><last_page>48</last_page></pages><doi_data><doi>10.66224/ijece.28801.21.1.39</doi><resource>http://ijece.org/fa/Article/28801</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28801</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28801</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28801</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28801</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28801</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28801</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28801</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	R. C. Merkle, "Reversible electronic logic using switches," Nanotechnology, vol. 4, no. 1, Article ID:  21-134, Jan. 1993.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	I.J.R.i.c.a. Present, Cramming Mmore Components onto Integrated Circuits, 2000.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. W. Keyes and R. Landauer, "Development, minimal energy dissipation in logic," IBM Journal of Research and Development, vol. 14, no. 2, pp. 152-157, Mar. 1970.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	R. Landauer, "Irreversibility and heat generation in the computing process," IBM J. of Research and Development, vol. 5, no. 3, pp. 183-191, 14-18 Jul. 1961.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	T. Toffoli, "Reversible computing," in Proc. Automata, Languages and Programming: Seventh Colloquium Noordwijkerhout, vol. 7, pp. 632-644. Springer Berlin Heidelberg, July. 1980.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R. Bennett, "Logical reversibility of computation," IBM journal of Research and Development, vol. 17, no. 6, 525-532, Nov. 1973.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Bennett, "Notes on the history of reversible computation," IBM Journal of Research and Development, vol. 32, no. 1, pp. 16-23, Jan./Mar. 2000.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Chauhan and J. Kedia, "A review on MZI based all optical reversible gates," 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Amoldeep and D. Divya, "Implementing all-optical new reversible gate using SOA-MZI architecture," Indian J. of Science and Technology, vol. 9, no. 40, pp.191-198, Oct. 2016.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Ashis Kumar, "Full-optical Mach–Zehnder interferometer-based discrete Fourier transform," Journal of Optics, vol. 48, no. 2, pp. 252-261, Jun. 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	C. Taraphdar, et al., "Mach-Zehnder interferometer-based all-optical reversible logic gate," Optics &amp; Laser Technology, vol. 42, no. 2, 249-259, Mar. 2010.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. M. Mirizadeh and P. Asghari, "Fault-tolerant quantum reversible full adder/subtractor: Design and implementation," Optik, vol. 1, no. 253, pp. 168-543, Mar. 2022.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. K. Thomsen, et al., "Reversible arithmetic logic unit for quantum arithmetic," Journal of Physics A: Mathematical and Theoretical, vol. 43, no. 38, 382-002, Aug. 2010.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. A. Cuccaro, et al., A New Quantum Ripple-Carry Addition Circuit, arXiv preprint quant-ph, 0410184, Octo. 2004.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. D. Thabah and P. Saha, "Low quantum cost realization of reversible binary-coded-decimal adder," Procedia Computer Science, vol. 1, no. 167, pp. 1437-43, January. 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Kotiyal, H. Thapliyal, and N. Ranganathan, "Mach-Zehnder interferometer based design of all optical reversible binary adder," in Proc. of the Conf. on Design, Automation and Test in Europe, pp. 721-726, Dresden, Germany, 12-16 Mar. 2012.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. A. Moldeep, D.J.I.J.o.S. Divya, and Technology, "Implementing all-optical new reversible gate using SOA-MZI architecture," Indian Journal of Science and Technology, vol. 9, no. 40, Pages: 1-9, Oct. 2016.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Zhang, et al., "Design and analysis of all-optical XOR gate using SOA-based Mach-Zehnder interferometer," Optics Communications, vol. 223, no. 4-6, 301-308, Aug. 2003.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. Roy, et al., "All-optical reversible logic gates with optically controlled bacteriorhodopsin protein-coated microresonators," Advances in Optical Technologies, vol. 2012, Article ID 727206, 12 pp, Jun. 2012.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Nivedita and R. Goyal, "All-optical decoder/demultiplexer with enable using SOA based Mach-Zehnder interferometers," in Proc, 6th Int. Conf. on Signal Processing and Integrated Networks, SPIN'19, pp. 780-784, Noida, India, 7-8 Mar. 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	R. Jindal and D. Ruhela, "All-optical N-bit multiplier design using Mach-Zehnder interferometer," in Proc. 2nd Int. Conf. for Emerging Technology, INCET'21, 8 pp., Belagavi, India, 21-23 May 2021.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	T. Chattopadhyay and D. K. Gayen, "Optical half and full adders using the nonlinear Mach-Zehnder interferometer," Journal of Optics, vol. 50, pp. 314-321, Jun. 2021.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	N. Sukhender, P. Mittal, and S. Kaur, "Design of all-optical D flipflop using SOA-MZI architecture," in Proc. Int. Conf. on Artificial Intelligence and Smart Systems, ICAIS'21, pp. 1657-1662, Coimbatore, India, 25-27 Mar. 2021.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. Johari, B. Kaushik, A. Bhatnagar, P. Dubey, and S. Naithani, "Implementation of Mach Zehnder modulator based all optical gates," Novel Optical Systems, Methods, and Applications XXII, vol. 11105, pp. 130-137, SPIE, Sept. 2019.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. Saha and S. Mukhopadhyay, "All optical frequency encoded quaternary memory unit using symmetric configuration of MZI-SOA," Optics &amp; Laser Technology, vol. 131, no. 1, pp.106-386, Nov. 2020</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	A. Poustie and K. Blow, "Demonstration of an all-optical Fredkin gate," Optics Communications, vol. 174, no. 1-4, pp. 317-320, Jan. 2000.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	N. Kostinski, M. P. Fok, and P. R. J. O. L. Prucnal, "Experimental demonstration of an all-optical fiber-based Fredkin gate," Optics letters, vol. 34, no. 18, pp. 2766-2768, Sept. 2009.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	K. Bordoloi, T. Theresal, and S. Prince, "Design of all optical reversible logic gates," in Proc. Int. Conf., Communications and Signal Processing, ICCSP'14, pp. 1583-1588, Melmaruvathur, India, 3-5 Apr. 2014.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	A. Vijayasri and B. M. Krishna, SoA Based Carry Lookahead Adder Using Reversible MZI, 2016.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	P. Dutta, Implementation and Synthesis of Reversible Logic Using MZI Switches, Ph.D. Dissertation, Indian Institute of Engineering Science and Technology, Shibpur, India, Apr. 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Detection and Recovery of Corrupted Images After High Rate of Tampering Attacks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Faranak</given_name><surname>Tohidi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad Reza</given_name><surname>Hooshmandasl</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>1</day><year>2023</year></publication_date><pages><first_page>1</first_page><last_page>17</last_page></pages><doi_data><doi>10.66224/ijece.29205.21.1.1</doi><resource>http://ijece.org/fa/Article/29205</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29205</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29205</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29205</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29205</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29205</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29205</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29205</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	L. Rakhmawati, W. Wirawan, and S. Suwadi, "A recent survey 
of self-embedding fragile watermarking scheme for image authentication with recovery capability," EURASIP J. on Image and Video Processing, vol. 2019, Article ID: 61, 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	B. B. Haghighi, A. H. Taherinia, and A. H. Mohajerzadeh, "TRLG: fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA," Information Sciences, vol. 486, pp. 204-230, Jun. 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	C. Qin, C. Chang, and P. Chen, "Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism," Signal Processing, vol. 92, no. 4, pp. 1137-1150, Apr. 2012.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Y. Huo, H. He, and F. Chen, "Alterable-capacity fragile watermarking scheme with restoration capability," Optics Communications, vol. 285, no. 7, pp. 1759-1766, Apr. 2012.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	C. Qin, P. Ji, C. C. Chang, J. Dong, and X. Sun, "Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery," IEEE MultiMedia, vol. 25, no. 3, pp. 36-48, Jul.-Sept. 2018.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Hamid and C. Wang, "Adaptive image self-recovery based on feature extraction in the DCT domain," IEEE Access, vol. 6, pp. 67156-67165, 2018.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	B. B. Haghighi, A. H. Taherinia, and A. Harati, "TRLH: fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique," J. of Visual Communication and Image Representation, vol. 50, pp. 49-64, Jan. 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	K. Sreenivas and V. Kamakshiprasad, "Improved image tamper localisation using chaotic maps and self-recovery," J. of Visual Communication and Image Representation, vol. 49, pp. 164-176, Nov. 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	C. S. Hsu and S. F. Tu, "Image tamper detection and recovery using adaptive embedding rules," Measurement, vol. 88, pp. 287-296, Jun. 2016.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Azeroual and K. Afdel, "Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet," AEU-International J. of Electronics and Communications, vol. 79, pp. 207-218, Sept. 2017.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	R. O. Preda, "Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain," Measurement, vol. 46, no. 1, pp. 367-373, Jan. 2013.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	C. Qin and X. Zhang, "Effective reversible data hiding in encrypted image with privacy protection for image content," J. of Visual Communication and Image Representation, vol. 31, pp. 154-164, Aug. 2015.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. A. Wahed and H. Nyeem, "High capacity reversible data hiding with interpolation and adaptive embedding," PloS One, vol. 14, no. 3, Article ID: e0212093, 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	X. T. Wang, C. C. Chang, T. S. Nguyen, and M. C. Li, "Reversible data hiding for high quality images exploiting interpolation and direction order mechanism," Digital Signal Processing, vol. 23, no. 2, pp. 569-577, Mar. 2013.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Malik, G. Sikka, and H. Kumar Verma, "An image interpolation based reversible data hiding scheme using pixel value adjusting feature," Multimedia Tools and Applications, vol. 76, no. 11, pp. 13025-130462017.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	C. Qin, P. Ji, X. Zhang, J. Dong, and J. Wang, "Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy," Signal Processing, vol. 138, pp. 280-293, Sept.  2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. Shehab, M. Elhoseny, K. Muhammad, A. K. Sangaiah, P. Yang, H. Huang, and G. Hou, "Secure and robust fragile watermarking scheme for medical images," IEEE Access, vol. 6, pp. 10269-10278, 2018.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	F. Tohidi and M. Paul, "A new image watermarking scheme for efficient tamper detection, localization and recovery," in Proc. IEEE Int. Conf. on Multimedia &amp; Expo Workshops, ICMEW'19, pp. 19-24, Shanghai, China, 8-12 Jul. 2019.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	F. Tohidi, M. Paul, M. R. Hooshmandasl, S. Chakraborty, and 
B. Pradhan, "Block-wise authentication and recovery scheme for medical images focusing on content complexity," in Proc. 10th Pacific-Rim Symp. on Image and Video Technology, pp. 86-99, Sydney, Australia, 18-22 Nov. 2019.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. M. Joshi, A. Darji, and V. Mishra, "Design and implementation 
of real-time image watermarking," in Proc. IEEE In. Conf. on Signal Processing, Communications and Computing, ICSPCC'11, 5 pp., Xi'an, China, 14-16 Sept. 2011.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	F. Tohidi, M. Paul, M. R. Hooshmandasl, T. Debnath, and H. Jamshidi, "Efficient self-embedding data hiding for image integrity verification with pixel-wise recovery capability," in Proc. Pacific-Rim Symp. on Image and Video Technology, pp. 128-141, Sydney, Australia, 18-22 Nov. 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Y. Xiang, D. Xiao, H. Wang, and X. Li, "A secure image tampering detection and self-recovery scheme using POB number system over cloud," Signal Processing, vol. 162, pp. 282-295, Sept. 2019.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	C. Kim and C. N. Yang, "Self-embedding fragile watermarking scheme to detect image tampering using AMBTC and OPAP approaches," Applied Sciences, vol. 11, no. 3, Article ID:. 1146, 2021.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	E. Gul and S. Ozturk, "A novel pixel-wise authentication-based self-embedding fragile watermarking method," Multimedia Systems, vol. 27, pp. 531-545, Jun. 2021.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Generation of Persian sentences By Generative Adversarial Network </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Nooshin</given_name><surname>riahi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sahar</given_name><surname>Jandaghy</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>1</day><year>2023</year></publication_date><pages><first_page>49</first_page><last_page>57</last_page></pages><doi_data><doi>10.66224/ijece.29260.21.1.49</doi><resource>http://ijece.org/fa/Article/29260</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/29260</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/29260</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/29260</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/29260</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/29260</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/29260</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/29260</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>Celikyilmaz, A., Clark, E., &amp;amp; Gao, J. (2020). Evaluation of text generation: A survey. arXiv preprint arXiv:2006.14799.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>Lamb, A. M., Goyal, A. G. A. P., Zhang, Y., Zhang, S., Courville, A. C., &amp;amp; Bengio, Y. (2016). Professor forcing: A new algorithm for training recurrent networks. In Advances in neural information processing systems (pp. 4601-4609).#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>Press, O., Bar, A., Bogin, B., Berant, J., &amp;amp; Wolf, L. (2017). Language generation with recurrent generative adversarial networks without pre-training. arXiv preprint arXiv:1706.01399.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>Zhang, Y., Gan, Z., Fan, K., Chen, Z., Henao, R., Shen, D., &amp;amp; Carin, L. (2017). Adversarial feature matching for text generation. arXiv preprint arXiv:1706.03850.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>Bengio, S., Vinyals, O., Jaitly, N., &amp;amp; Shazeer, N. (2015). Scheduled sampling for sequence prediction with recurrent neural networks. In Advances in Neural Information Processing Systems (pp. 1171-1179)#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>Ranzato, M. A., Chopra, S., Auli, M., &amp;amp; Zaremba, W. (2015). Sequence level training with recurrent neural networks. arXiv preprint arXiv:1511.06732.7#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>Husz&amp;#225;r, F. (2015). How (not) to train your generative model: Scheduled sampling, likelihood, adversary. arXiv preprint arXiv:1511.05101.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>Bowman, S. R., Vilnis, L., Vinyals, O., Dai, A. M., Jozefowicz, R., &amp;amp; Bengio, S. (2015). Generating sentences from a continuous space. arXiv preprint arXiv:1511.06349.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>Yang, Z., Hu, Z., Salakhutdinov, R., &amp;amp; Berg-Kirkpatrick, T. (2017). Improved variational autoencoders for text modeling using dilated convolutions. arXiv preprint arXiv:1702.08139.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., ... &amp;amp; Bengio, Y. (2014). Generative adversarial nets. In Advances in neural information processing systems (pp. 2672-2680)#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>Yu, L., Zhang, W., Wang, J., &amp;amp; Yu, Y. (2017, February). Seqgan: Sequence generative adversarial nets with policy gradient. In Thirty-first AAAI conference on artificial intelligence.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>Guimaraes, G. L., Sanchez-Lengeling, B., Outeiral, C., Farias, P. L. C., &amp;amp; Aspuru-Guzik, A. (2017). Objective-reinforced generative adversarial networks (ORGAN) for sequence generation models. arXiv preprint arXiv:1705.10843.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>Kusner, M. J., &amp;amp; Hern&amp;#225;ndez-Lobato, J. M. (2016). Gans for sequences of discrete elements with the gumbel-softmax distribution. arXiv preprint arXiv:1611.04051.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>Jang, E., Gu, S., &amp;amp; Poole, B. (2016). Categorical reparameterization with gumbel-softmax. arXiv preprint arXiv:1611.01144.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>Mescheder, L., Nowozin, S., &amp;amp; Geiger, A. (2017). The numerics of gans. In Advances in Neural Information Processing Systems (pp. 1825-1835).#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>Salimans, T., Goodfellow, I., Zaremba, W., Cheung, V., Radford, A., &amp;amp; Chen, X. (2016). Improved techniques for training gans. In Advances in neural information processing systems (pp. 2234-2242)#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>Salimans, T., Goodfellow, I., Zaremba, W., Cheung, V., Radford, A., &amp;amp; Chen, X. (2016). Improved techniques for training gans. In Advances in neural information processing systems (pp. 2234-2242)#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., &amp;amp; Courville, A. C. (2017). Improved training of wasserstein gans. In Advances in neural information processing systems (pp. 5767-5777).#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>Rajeswar, S., Subramanian, S., Dutil, F., Pal, C., &amp;amp; Courville, A. (2017). Adversarial generation of natural language. arXiv preprint arXiv:1705.10929.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>Lin, K., Li, D., He, X., Zhang, Z., &amp;amp; Sun, M. T. (2017). Adversarial ranking for language generation. In Advances in Neural Information Processing Systems (pp. 3155-3165).#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>Che, T., Li, Y., Zhang, R., Hjelm, R. D., Li, W., Song, Y., &amp;amp; Bengio, Y. (2017). Maximum-likelihood augmented discrete generative adversarial networks. arXiv preprint arXiv:1702.07983.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>Guo, J., Lu, S., Cai, H., Zhang, W., Yu, Y., &amp;amp; Wang, J. (2017). Long text generation via adversarial training with leaked information. arXiv preprint arXiv:1709.08624.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>https://dbrg.ut.ac.ir/hamshahri/ آزمایشگاه بانک اطلاعاتی دانشگاه تهران#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>S. Bakhshaei, S. Khadivi, N. Riahi and H. Sameti, &amp;quot;A study to find influential parameters on a Farsi-English statistical machine translation system,&amp;quot; 2010 5th International Symposium on Telecommunications, 2010, pp. 985-991, doi: 10.1109/ISTEL.2010.5734165#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>Srivastava, R. K., Greff, K., &amp;amp; Schmidhuber, J. (2015). Highway networks. arXiv preprint arXiv:1505.00387.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>Vezhnevets, A. S., Osindero, S., Schaul, T., Heess, N., Jaderberg, M., Silver, D., &amp;amp; Kavukcuoglu, K. (2017). Feudal networks for hierarchical reinforcement learning. arXiv preprint arXiv:1703.01161.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>Papineni, K., Roukos, S., Ward, T., &amp;amp; Zhu, W. J. (2002, July). BLEU: a method for automatic evaluation of machine translation. In Proceedings of the 40th annual meeting of the Association for Computational Linguistics (pp. 311-318).#</unstructured_citation></citation><citation key="ref28"><unstructured_citation>Zhu, Y., Lu, S., Zheng, L., Guo, J., Zhang, W., Wang, J., &amp;amp; Yu, Y. (2018, June). Texygen: A benchmarking platform for text generation models. In The 41st International ACM SIGIR Conference on Research &amp;amp; Development in Information Retrieval (pp. 1097-1100).#</unstructured_citation></citation><citation key="ref29"><unstructured_citation>ROUGE, L. C. (2004, July). A package for automatic evaluation of summaries. In Proceedings of Workshop on Text Summarization of ACL, Spain.#</unstructured_citation></citation><citation key="ref30"><unstructured_citation>Lavie, A., Sagae, K., &amp;amp; Jayaraman, S. (2004, September). The significance of recall in automatic metrics for MT evaluation. In Conference of the Association for Machine Translation in the Americas (pp. 134-143). Springer, Berlin, Heidelberg.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Maintaining Confidentiality and Integrity of Data and Preventing Unauthorized Access to DICOM Medical Images</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Soltani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name> Hassan</given_name><surname>Shakeri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name> Mahboobeh</given_name><surname>Houshmand</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>1</day><year>2023</year></publication_date><pages><first_page>27</first_page><last_page>38</last_page></pages><doi_data><doi>10.66224/ijece.33140.21.1.27</doi><resource>http://ijece.org/fa/Article/33140</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/33140</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/33140</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/33140</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/33140</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/33140</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/33140</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/33140</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Andersen, B. Lo, and G. Z. Yang, "Experimental platform for usability testing of secure medical sensor network protocols," in Proc. 5th Int. Summer School and Symp. on Medical Devices and Biosensors, pp. 179-182, Hong Kong, China, 1-3 Jun. 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. C. Lin, et al., "A healthcare integration system for disease assessment and safety monitoring of dementia patients," IEEE Trans. on Information Technology in Biomedicine, vol. 12, no. 5, pp. 579-586, Sept. 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	-, Encryption, Google Trends, https://www.google.com/trends (accessed).</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	F. Ayankoya and B. Ohwo, "Brute-force attack prevention in cloud computing using one-time password and cryptographic hash function," International J. of Computer Science and Information Security, vol. 17, no. 2, pp. 7-19, Feb. 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	E. Tirado, et al., "A new distributed brute-force password cracking technique," in Proc. Int. Conf. on Future Network Systems and Security, Springer, vol. 878, pp. 117-127, Jun. 2018.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	"DICOM Conformance Tests," Aliza Medical Imaging. https://www.aliza-dicom-viewer.com/ (accessed), 2022.
[7]	B. Zhang, B. Rahmatullah, S. L. Wang, A. Zaidan, B. Zaidan, and P. Liu, "A review of research on medical image confidentiality related technology coherent taxonomy, motivations, open challenges and recommendations," Multimedia Tools and Applications, vol. 82, pp. 21867-21906, Aug. 2023.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[8]	S. H. Shin, W. S. Yoo, and H. Choi, "Development of modified 
RSA algorithm using fixed mersenne prime numbers for medical ultrasound imaging instrumentation," Computer Assisted Surgery, vol. 24, no. 2, pp. 73-78, Oct. 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[9]	Q. Natsheh, B. Li, and A. G. Gale, "Security of multi-frame DICOM images using XOR encryption approach," Procedia Computer Science, vol. 90, no. 1, pp. 175-181, Jul. 2016.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10]	R. M. Kumar and M. Viswanath, "A symmetric medical image encryption scheme based on irrational numbers," Biomedical Research, vol. 1, no. 5, pp. 494-498, Jan. 2018.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	O. Dorgham, B. Al-Rahamneh, A. Almomani, and K. F. Khatatneh, "Enhancing the security of exchanging and storing DICOM medical images on the cloud," International J. of Cloud Applications and Computing, vol. 8, no. 1, pp. 154-172, Jan. 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	A. Al-Haj, G. Abandah, and N. Hussein, "Crypto-based algorithms for secured medical image transmission," IET Information Security, vol. 9, no. 6, pp. 365-373, Mar. 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	P. Subhasri and A. Padmapriya, "Enhancing the security of DICOM content using modified vigenere cipher," International J. of Applied Engineering Research, vol. 10, no. 55, pp. 1951-1956, Jan. 2015.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	R. Matthews, "On the derivation of a "chaotic" encryption algorithm," Cryptologia, vol. 13, no. 1, pp. 29-42, Jan. 1989.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	J. Fridrich, "Symmetric ciphers based on two-dimensional chaotic maps," International J. of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259-1284, Jun. 1998.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	S. M. Ismail, L. A. Said, A. G. Radwan, A. H. Madian, and M. F. Abu-Elyazeed, "Generalized double-humped logistic map-based medical image encryption," J. of Advanced Research, vol. 10, no. 1, pp. 85-98, Mar. 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	R. Gupta, R. Pachauri, and A. K. Singh, "An effective approach of secured medical image transmission using encryption method," Molecular &amp; Cellular Biomechanics, vol. 15, no. 2, pp. 63-83, May 2018.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	M. M. Parvees, J. A. Samath, and B. P. Bose, "Protecting large size medical images with logistic map using dynamic parameters and key image," Int. J. Netw. Secur., vol. 19, no. 6, pp. 984-994, Jan. 2017.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	Y. Dai, H. Wang, and Y. Wang, "Chaotic medical image encryption algorithm based on bit-plane decomposition," International J. of Pattern Recognition and Artificial Intelligence, vol. 30, no. 4, Article ID: 1657001, May 2016.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	X. Li, L. Wang, Y. Yan, and P. Liu, "An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems," Optik, vol. 127, no. 5, pp. 2558-2565, Mar. 2016.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	Q. Zhang, L. Guo, and X. Wei, "Image encryption using DNA addition combining with chaotic maps," Mathematical and Computer Modelling, vol. 52, no. 11, pp. 2028-2035, Dec. 2010.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	A. Belazi, M. Talha, S. Kharbech, and W. Xiang, "Novel medical image encryption scheme based on chaos and DNA encoding," IEEE Access, vol. 7, pp. 36667-36681, 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	J. C. Dagadu, J. P. Li, and E. O. Aboagye, "Medical image encryption based on hybrid chaotic DNA diffusion," Wireless Personal Communications, vol. 108, no. 1, pp. 591-612, Apr. 2019.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	R. S. Devi, K. Thenmozhi, J. B. B. Rayappan, R. Amirtharajan, and P. Praveenkumar, "Entropy influenced RNA diffused quantum chaos to conserve medical data privacy," International J. of Theoretical Physics, vol. 58, no. 6, pp. 1937-1956, Mar. 2019.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	A. Kumari, B. Akshaya, B. Umamaheswari, K. Thenmozhi, R. Amirtharajan, and P. Praveenkumar, "3D lorenz map governs DNA rule in encrypting DICOM images," Biomedical and Pharmacology J., vol. 11, no. 2, pp. 897-906, Jun. 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	P. Praveenkumar, et al., "Transreceiving of encrypted medical image-a cognitive approach," Multimedia Tools and Applications, vol. 77, no. 7, pp. 8393-8418, Apr. 2018.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	N. Sasikaladevi, K. Geetha, and A. Revathi, "EMOTE-multilayered encryption system for protecting medical images based on binary curve," J. of King Saud University-Computer and Information Sciences, vol. 34, no. 3?, pp. 676-686, Mar. 2019.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	S. Sheela, K. Suresh, and D. Tandur, "Secured transmission of clinical signals using hyperchaotic DNA confusion and diffusion transform," International J. of Digital Crime and Forensics, vol. 11, no. 3, pp. 43-64, Jul. 2019.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	N. Yuvaraj, K. Praghash, and T. Karthikeyan, "Data privacy preservation and trade-off balance between privacy and utility using deep adaptive clustering and elliptic curve digital signature algorithm," Wireless Personal Communications, vol. 124, pp. 655-670, Nov. 2021.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	J. Katz, "Digital signatures,"in Digital Signatures, Springer Science &amp; Business Media, pp. 3-33, Jan. 2010.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	R. Kaur and A. Kaur, "Digital signature," in Proc. Int. Conf. on Computing Sciences, pp. 295-301, Phagwara, India, 14-15 Sept. 2012.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	D. M. Davide Maltoni, A. K. Jain, and Salil Prabhakar, Handbook of Fingerprint Recognition, Springer London, 2009.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	R. Agarwal and A. S. Jalal, "Presentation attack detection system for fake Iris: a review," Multimedia Tools and Applications, vol. 80, 
no. 10, pp. 15193-15214, Feb. 2021.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	J. Jayanthi, E. L. Lydia, N. Krishnaraj, T. Jayasankar, R. L. Babu, and R. Suji, "An effective deep learning features based integrated framework for iris detection and recognition," J. of Ambient Intelligence and Humanized Computing, vol. 12, no. 3, pp. 3271-3281, Jun. 2021.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	R. Amirtharajan, R. Akila, and P. Deepikachowdavarapu, "A comparative analysis of image steganography," International J. of Computer Applications, vol. 2, no. 3, pp. 41-47, May. 2010.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	T. Morkel, J. H. Eloff, and M. S. Olivier, "An overview of image steganography," ISSA, vol. 1, no. 2, pp. 1-11, Jan. 2005.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	R. Ahlswede, "A short course on cryptography," in Hiding Data-Selected Topics: Springer, vol. 12, pp. 1-54, Apr. 2016.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	M. J. Durand-Richard, "Probability, cryptology and meaning in Claude Shannon (1916-2001)'s works," in Proc. Cryptologic History Symp.: Global Perspectives on Cryptologic History, 12 pp.,  Baltimore, Washington, USA,15-16 Oct 2009.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	R. G. Gallager, "Claude E. Shannon: A retrospective on his life, work, and impact," IEEE Trans. on Information Theory, vol. 47, 
no. 7, pp. 2681-2695, Nov. 2001.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[40]	M. Soltani, "A new secure image encryption algorithm using logical and visual cryptography algorithms and based on symmetric key encryption," J. of Basic and Applied Scientific Research, vol. 3, no. 6, pp. 1193-1201, 2013.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[41]	M. Soltani and A. K. Bardsiri, "Designing a novel hybrid algorithm for QR-code images encryption and steganography," J. Comput., 
vol. 13, no. 9, pp. 1075-1088, Sept. 2018.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[42]	S. Lian, J. Sun, and Z. Wang, "Security analysis of a chaos-based image encryption algorithm," Physica A: Statistical Mechanics and its Applications, vol. 351, no. 2-4, pp. 645-661, Jun. 2005.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[43]	O. F. Mohammad, M. S. M. Rahim, S. R. M. Zeebaree, and F. Ahmed, "A survey and analysis of the image encryption methods," International J. of Applied Engineering Research, vol. 12, no. 23, pp. 13265-13280, Dec. 2017.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[44]	Sample DICOM  Images. [Online]. Available: http://deanvaughan.org</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[45]	DICOMs category. [Online]. Available: https://www.nitrc.org/</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[46]	H. Khanzadi, M. Eshghi, and S. E. Borujeni, "Image encryption using random bit sequence based on chaotic maps," Arabian J. for Science and Engineering, vol. 39, no. 2, pp. 1039-1047, Feb. 2014.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[47]	H. Arora, G. K. Soni, R. K. Kushwaha, and P. Prasoon, "Digital image security based on the hybrid model of image hiding and encryption," in Proc IEEE. 6th Int. Conf. on Communication and Electronics Systems, vol. 6, pp. 1153-1157, 8-10 Jul. 2021.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[48]	2015, "Key space in cryptiography," http://csrc.nist.gov (accessed).</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[49]	X. Chai, Y. Chen, and L. Broyde, "A novel chaos-based image encryption algorithm using DNA sequence operations," Optics and Lasers in Engineering, vol. 88, pp. 197-213, Jan. 2017.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[50]	J. Wu, X. Liao, and B. Yang, "Image encryption using 2D Hénon-Sine map and DNA approach," Signal Processing, vol. 153, pp. 11-23, Dec. 2018.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[51]	G. Ye, K. Jiao, C. Pan, and X. Huang, "An effective framework for chaotic image encryption based on 3D logistic map," Security and Communication Networks, vol. 2018, pp. 1-11, Oct. 2018.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[52]	P. T. Akkasaligar and S. Biradar, "Selective medical image encryption using DNA cryptography," Information Security J.: a Global Perspective, vol. 29, no. 2, pp. 91-101, Mar. 2020.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[53]	X. Chai, J. Zhang, Z. Gan, and Y. Zhang, "Medical image encryption algorithm based on Latin square and memristive chaotic system," Multimedia Tools and Applications, vol. 78, no. 24, pp. 35419-35453, Dec. 2019.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[54]	A. Mahmood, R. Dony, and S. Areibi, "An adaptive encryption based genetic algorithms for medical images," in Proc. IEEE Int. Workshop on Machine Learning for Signal Processing, 6 pp., Southampton, UK, 20-25 Sept. 2013.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Distributed Target Tracking by Solving Average Consensus Problem on Sensor Network Measurements</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Iman </given_name><surname>Maghsudlu</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Meysam</given_name><surname>r. Danaee</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hamid </given_name><surname>Arezumand</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>1</day><year>2023</year></publication_date><pages><first_page>67</first_page><last_page>74</last_page></pages><doi_data><doi>10.66224/ijece.34225.21.1.67</doi><resource>http://ijece.org/fa/Article/34225</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/34225</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/34225</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/34225</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/34225</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/34225</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/34225</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/34225</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Z. Ying and L. Gao, "Sensor-networked underwater target tracking based on grubbs criterion and improved particle filter algorithm," IEEE Access, vol. 7pp. 142894-142906, 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Z. Hao, Z. Xue, W. Zhuping, Y. Huaicheng, and S. Jian, "Adaptive consensus-based distributed target tracking, with dynamic cluster in sensor networks," IEEE Trans. on Cybernetics, vol. 5, no. 5, pp. 1580-1591, May 2018.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. Jesse, K. Achutegui, and J. Miguez, "A distributed particle filter for nonlinear tracking in wireless sensor networks," Signal Processing, vol. 98, pp. 121-134, May 2014.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	F. Zhao and L. Guibas, Wireless Sensor Networks: An Information Processing Approach, Morgan Kaufmann, San Francisco, CA, USA, 2004.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	W. Zhao and Y. Liang, "Energy-efficient and robust in-network inference in wireless sensor networks," IEEE Trans. on Cybernetics, vol. 45, no. 10, pp. 2105-2118, Oct. 2015.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	O. Hlinka, F. Hlawatsch, and P. Djuric, "Distributed particle ﬁltering in agent networks: a survey, classiﬁcation, and comparison," IEEE Signal Processing Magazine, vol. 30, no. 1, pp. 61-81, Jan. 2012.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	L. Xiao and S. Boyd, "Fast linear iterations for distributed averaging," Syst. Contr. Lett., vol. 53, no. 1, pp. 65-78, Sept. 2004.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Farahmand, S. I. Roumeliotis, and G. B. Giannakis, "Set-membership constrained particle ﬁlter: distributed adaptation for sensor networks," IEEE Trans. Signal Processing, vol. 59, no. 9, pp. 4122-4138, Sept. 2011.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	D. Gu, J. Sun, Z. Hu, and H. Li, "Consensus based distributed particle filter in sensor networks," in Proc. Int. Conf. Inform. Automationpp. 302-307, Changsha, China, 20-23 Aug. 2008.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Y. Xu, K. Xu, J. Wan, Z. Xiong, and Y. Li, "Maneuvering target tracking by using particle filter," in Proc. IEEE Joint 9th IFSA World Congress and 20th NAFIPS Int. Conf., pp. 2223-2228, Vancouver, Canada, 25-28 Jul. 2002.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	O. Hlinka, O. Sluciak, F. Hlawatsch, P. Djuric, and M. Rupp, "Likelihood consensus and its application to distributed particle filtering," IEEE Trans. on Signal Processing, vol. 60, no. 8, pp. 4334-4349, Aug. 2012.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Y. Yu, M. J. Coates, and M. G. Rabbat, "Graph-based compression for distributed particle filters," IEEE Trans. on Signal and Information Processing over Networks, vol. 5, no. 3, pp. 404-417, Sept. 2019.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Mohammadi and A. Asif, "Distributed consensus + innovation particle filtering for bearing/range, tracking with communication constraints," IEEE Trans. on Signal Processing, vol. 63, no. 3, pp. 620-635, Feb. 2014.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Stock Price Movement Prediction Using Directed Graph Attention Network</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Alireza</given_name><surname>Jafari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Saman</given_name><surname>Haratizadeh</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>1</day><year>2023</year></publication_date><pages><first_page>18</first_page><last_page>26</last_page></pages><doi_data><doi>10.66224/ijece.36319.21.1.18</doi><resource>http://ijece.org/fa/Article/36319</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/36319</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/36319</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/36319</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/36319</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/36319</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/36319</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/36319</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Timmermann and C. Granger, "Efficient market hypothesis and forecasting," Int. J. Forecast, vol. 20, no., pp. 15-27, 2004.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. Yao and C. L. Tan, "A case study on using neural networks to perform technical forecasting of forex," Neurocomputing, vol. 34, no. 1-4, pp. 79-98, Sept. 2000.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Jafari and S. Haratizadeh, GCNET: Graph-Based Prediction of Stock Price Movement Using Graph Convolutional Network, arXiv preprint arXiv:2203.11091, 2022.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. N. Kia, S. Haratizadeh, and S. B. Shouraki, "Network-based direction of movement prediction in financial markets," Engineering Applications of Artificial Intelligence, vol. 88, Article ID: 103340, Feb. 2020.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	E. Hoseinzade and S. Haratizadeh, "CNNnpred: CNN-based stock market prediction using a diverse set of variables," Expert Systems with Applications, vol. 129, pp. 273-285, Sept. 2019.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. Jovanovic and C. Schinckus, Econophysics and Financial Economics: An Emerging Dialogue, Oxford Uni Press, 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	K. Park and H. Shin, "Stock price prediction based on a complex interrelation network of economic factors," Engineering Applications of Artificial Intelligence, vol. 26, no. 5-6, pp. 1550-1561, May/Jun. 2013.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	ع. ر. جعفری و س. هراتیزاده، "پیشبینی جهت حرکت قیمت سهام با استفاده از یک مدل انتشار برچسب مبتنی بر شبکه و یادگیری نظارتشده،" مجموعه مقالات بیست و ششمین کنفرانس بین¬المللی کامپیوتر، انجمن کامپیوتر ایران، 6 صص.، تهران، ایران، 13-14 اسفند 1399 .</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	D. Shah, H. Isah, and F. Zulkernine, "Stock market analysis: a review and taxonomy of prediction techniques," International J. of Financial Studies, vol. 7, no. 2, Article ID: 70200026, 22 pp., 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. N. Kia, S. Haratizadeh, and S. B. Shouraki, "A hybrid supervised semi-supervised graph-based model to predict one-day ahead movement of global stock markets and commodity prices," Expert Systems with Applications, vol. 105, pp. 159-173, Sept. 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	F. Scarselli, M. Gori, A. C. Tsoi, M. Hagenbuchner, and G. Monfardini, "The graph neural network model," IEEE Trans. on Neural Networks, vol. 20, no. 1, pp. 61-80, Jan. 2009.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Chen, T. Ma, and C. Xiao, FastGCN: Fast Learning with Graph Convolutional Networks via Importance Sampling, arXiv preprint arXiv: 1801.10247, 2018.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	R. Kim, C. H. So, M. Jeong, S. Lee, J. Kim, and J. Kang, HATS: A Hierarchical Graph Attention Network for Stock Movement Prediction, arXiv preprint arXiv: 1908.07999, 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	H. Gunduz, Y. Yaslan, and Z. Cataltepe, "Intraday prediction of Borsa Istanbul using convolutional neural networks and feature correlations," Knowledge-Based Systems, vol. 137, pp. 138-148, Dec. 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	T. N. Kipf and M. Welling, Semi-Supervised Classification with Graph Convolutional Networks, arXiv preprint arXiv: 1609.02907, 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. Veličković, et al., Graph Attention Networks, arXiv preprint arXiv: 1710.10903, 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	X. J. Zhu, Semi-Supervised Learning Literature Survey, Tech. Rep., University of Wisconsin-Madison Department of Computer Sciences, 2005.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	H. Shin, T. Hou, K. Park, C. K. Park, and S. Choi, "Prediction of movement direction in crude oil prices based on semi-supervised learning," Decision Support Systems, vol. 55, no. 1, pp. 348-358, Apr. 2013.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	R. N. Mantegna, "Hierarchical structure in financial markets," The European Physical Journal B - Condensed Matter and Complex Systems, vol. 11, pp. 193-197, 1999.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	D. Matsunaga, T. Suzumura, and T. Takahashi, Exploring Graph Neural Networks for Stock Market Predictions with Rolling Window Analysis, arXiv preprint arXiv: 1909.10660, 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	X. Zhong and D. Enke, "Forecasting daily stock market return using dimensionality reduction," Expert Systems with Applications, vol. 67, pp. 126-139, Jan. 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	F. Chollet, et al., Keras: The python Deep Learning Library, Astrophysics Source Code Library, 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	K. Da, A Method for Stochastic Optimization, arXiv preprint arXiv: 1412.6980, 2014.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improving Precision of Recommender Systems using Time-, Location- and Context-aware Trust Estimation Based on Clustering and Beta Distribution</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Samaneh</given_name><surname>Sheibani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hassan</given_name><surname>Shakeri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Reza</given_name><surname>Sheybani</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>1</day><year>2023</year></publication_date><pages><first_page>58</first_page><last_page>66</last_page></pages><doi_data><doi>10.66224/ijece.38021.21.1.58</doi><resource>http://ijece.org/fa/Article/38021</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/38021</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/38021</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/38021</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/38021</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/38021</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/38021</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/38021</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>1.	Yao, L., Xu, Z., Zhou, X., &amp; Lev, B., Synergies Between Association Rules and Collaborative Filtering in Recommender System: An Application to Auto Industry. Data Science and Digital Business, 2019: p. 16.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
2.	Rubens, N., et al., Active learning in recommender systems, in Recommender systems handbook. 2015, Springer. p. 809-846.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
3.	Li, Y.-M., C.-T. Wu, and C.-Y. Lai, A social recommender mechanism for e-commerce: Combining similarity, trust, and relationship. Decision Support Systems, 2013. 55(3): p. 740-752.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
4.	Savage, N.S., et al., I’m feeling loco: A location based context aware recommendation system, in Advances in Location-Based Services. 2012, Springer. p. 37-54.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
5.	Bączkiewicz, A., et al., Methodical Aspects of MCDM Based E-Commerce Recommender System. Journal of Theoretical and Applied Electronic Commerce Research, 2021. 16(6): p. 2192-2229.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
6.	Elahi, M., et al., User Preference Elicitation, Rating Sparsity and Cold Start. 2018.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
7.	Antolić, G. and L. Brkić. Recommender system based on the analysis of publicly available data. in 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). 2017. IEEE.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
8.	Wangwatcharakul, C. and S. Wongthanavasu, A novel temporal recommender system based on multiple transitions in user preference drift and topic review evolution. Expert Systems with Applications, 2021. 185: p. 115626.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
9.	Nilashi, M., O. Ibrahim, and K. Bagherifard, A recommender system based on collaborative filtering using ontology and dimensionality reduction techniques. Expert Systems with Applications, 2018. 92: p. 507-520.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
10.	Zheng, X.-L., et al., A hybrid trust-based recommender system for online communities of practice. IEEE Transactions on Learning Technologies, 2015. 8(4): p. 345-356.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
11.	Sani, N.S. and F.N. Tabriz, A new strategy in trust-based recommender system using k-means clustering. International Journal of Advanced Computer Science And Applications, 2017. 8(9): p. 152-156.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
12.	Nobahari, V., M. Jalali, and S.J.S. Mahdavi, ISoTrustSeq: a social recommender system based on implicit interest, trust and sequential behaviors of users using matrix factorization. Journal of Intelligent Information Systems, 2019. 52(2): p. 239-268.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
13.	AlBanna, B., et al., Interest aware location-based recommender system using geo-tagged social media. ISPRS International Journal of Geo-Information, 2016. 5(12): p. 245.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
14.	Celdrán, A.H., et al., Design of a recommender system based on users’ behavior and collaborative location and tracking. Journal of Computational Science, 2016. 12: p. 83-94.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
15.	Khazaei, E. and A. Alimohammadi, An automatic user grouping model for a group recommender system in location-based social networks. ISPRS international journal of geo-information, 2018. 7(2): p. 67.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
16.	Gao, H., et al. Content-aware point of interest recommendation on location-based social networks. in Twenty-ninth AAAI conference on Artificial Intelligence. 2015.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
17.	Tahmasbi, H., M. Jalali, and H. Shakeri. Modeling temporal dynamics of user preferences in movie recommendation. in 2018 8th International Conference on Computer and Knowledge Engineering (ICCKE). 2018. IEEE.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
18.	Kefalas, P. and Y. Manolopoulos, A time-aware spatio-textual recommender system. Expert Systems with Applications, 2017. 78: p. 396-406.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
19.	Fard, K.B., et al., Recommender System Based on Semantic Similarity. International Journal of Electrical &amp; Computer Engineering (2088-8708), 2013. 3(6).</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
20.	Urena, R., et al., A review on trust propagation and opinion dynamics in social networks and group decision making frameworks. Information Sciences, 2019. 478: p. 461-475.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
21.	Ghavipour, M. and M.R. Meybodi, A dynamic algorithm for stochastic trust propagation in online social networks: Learning automata approach. Computer Communications, 2018. 123: p. 11-23.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
22.	Xue, H., et al., Content-aware trust propagation toward online review spam detection. Journal of Data and Information Quality (JDIQ), 2019. 11(3): p. 1-31.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
23.	Ying, H., et al., Time-aware metric embedding with asymmetric projection for successive POI recommendation. World Wide Web, 2019. 22(5): p. 2209-2224.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
24.	Rafailidis, D. and A. Nanopoulos, Modeling users preference dynamics and side information in recommender systems. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2015. 46(6): p. 782-792.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
25.	Adomavicius, G. and A. Tuzhilin, Context-aware recommender systems, in Recommender systems handbook. 2011, Springer. p. 217-253.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
26.	Lathia, N., et al. Temporal diversity in recommender systems. in Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval. 2010.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
27.	Xiong, L., et al. Temporal collaborative filtering with bayesian probabilistic tensor factorization. in Proceedings of the 2010 SIAM international conference on data mining. 2010. SIAM.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
28.	Roy, F., A Comparative Analysis of Different Trust Metrics in User-User Trust-Based Recommender System. 2020.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
29.	Bedi, P., Combining trust and reputation as user influence in cross domain group recommender system (CDGRS). Journal of Intelligent &amp; Fuzzy Systems, 2020. 38(5): p. 6235-6246.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
30.	Richa and P. Bedi, Trust and Distrust based Cross-domain Recommender System. Applied Artificial Intelligence, 2021. 35(4): p. 326-351.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
31.	El Yebdri, Z., et al., Context-aware recommender system using trust network. Computing, 2021: p. 1-19.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
32.	Asani, E., H. Vahdat-Nejad, and J. Sadri, Restaurant recommender system based on sentiment analysis. Machine Learning with Applications, 2021. 6: p. 100114.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
33.	Cardoso, I.M.G., Vulcont: A Recommender System based on Contexts History Ontology. 2017.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
34.	Seo, Y.-D. and Y.-S. Cho, Point of interest recommendations based on the anchoring effect in location-based social network services. Expert Systems with Applications, 2021. 164: p. 114018.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
35.	Milias, V. and A. Psyllidis, Assessing the influence of point-of-interest features on the classification of place categories. Computers, Environment and Urban Systems, 2021. 86: p. 101597.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
36.	Han, P., et al., Point-of-interest recommendation with global and local context. IEEE Transactions on Knowledge and Data Engineering, 2021.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
37.	Agrawal, S., D. Roy, and M. Mitra, Tag embedding based personalized point of interest recommendation system. Information Processing &amp; Management, 2021. 58(6): p. 102690.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
38.	Fang, W., et al., A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution. Science China Information Sciences, 2017. 60(4): p. 1-11.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
39.	Moe, M.E., B.E. Helvik, and S.J. Knapskog. Comparison of the beta and the hidden markov models of trust in dynamic environments. in IFIP International Conference on Trust Management. 2009. Springer.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
40.	Wu, X., et al., BLTM: beta and LQI based trust model for wireless sensor networks. IEEE Access, 2019. 7: p. 43679-43690.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
41.	Wu, Z. and M. Palmer. V Verbs semantics and lexical selection. in Proceedings of the 32nd annual meeting on Association for Computational Linguistics. 1994.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
42.	Yelp Challenge Dataset. 2018.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
43.	Liu, Y., et al., An experimental evaluation of point-of-interest recommendation in location-based social networks. Proceedings of the VLDB Endowment, 2017. 10(10): p. 1010-1021.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
44.	Cho, E., S.A. Myers, and J. Leskovec. Friendship and mobility: user movement in location-based social networks. in Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. 2011.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
45.	Ardissono, L. and N. Mauro, A compositional model of multi-faceted trust for personalized item recommendation. Expert Systems with Applications, 2020. 140: p. 112880.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>