﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022920</doi_batch_id><timestamp>14050229202444</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>2</month><day>20</day><year>2024</year></publication_date><journal_volume><volume>21</volume></journal_volume><issue>3</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A Two-Level Method Based on Dynamic Programming for Partitioning and Optimization of the Communication Cost in Distributed Quantum Circuits</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>zohreh</given_name><surname>davarzani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>maryam</given_name><surname>zomorodi-moghadam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Houshmand</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>20</day><year>2024</year></publication_date><pages><first_page>193</first_page><last_page>201</last_page></pages><doi_data><doi>10.66224/ijece.34075.21.3.193</doi><resource>http://ijece.org/fa/Article/34075</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/34075</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/34075</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/34075</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/34075</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/34075</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/34075</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/34075</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. S. Cacciapuoti, et al., "Quantum internet: networking challenges in distributed quantum computing," IEEE Network, vol. 34, no. 1, pp. 137-143, Jan./Feb. 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. Van Meter, T. D. Ladd, A. G. Fowler, and Y. Yamamoto, "Distributed quantum computation architecture using semiconductor nanophotonics," International Journal of Quantum Information, vol. 8, no. 2, pp. 295-323, 2010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	D. Cuomo, M. Caleffi, and A. S. Cacciapuoti, "Towards a distributed quantum computing ecosystem," IET Quantum Communication, vol. 1, no. 1, pp. 3-8, Jul. 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Loncar, et al., Development of Quantum Interconnects for Next-Generation Information Technologies, Nov. 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	N. H. Nickerson, Y. Li, and S. C. Benjamin, "Topological quantum computing with a very noisy network and local error rates approaching one percent," Nature Communications, vol. 4, Article ID: 1756, 5 pp., 2013.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Whitney, N. Isailovic, Y. Patel, and J. Kubiatowicz, "Automated generation of layout and control for quantum circuits," in Proc. of the 4th Int. Conf. on Computing Frontiers, pp. 83-94, Apr. 2007.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. Bouwmeester, et al., "Experimental quantum teleportation," Nature, vol. 390, pp. 575-579, Dec. 1997.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. A. Nielsen, E. Knill, and R. J. N. Laflamme, "Complete quantum teleportation using nuclear magnetic resonance," Nature, vol. 396, pp. 52-55, Nov. 1998.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Riebe, et al., "Deterministic quantum teleportation with atoms," Nature, vol. 429, no. 6993, pp. 737-739, Jun. 2004.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	L. K.  Grover, Quantum Telecomputation, Apr. 1997.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	R. Cleve and H. Buhrman, "Substituting quantum entanglement for communication," Physical Review A, vol. 56, no. 2, pp. 1201-1204, Apr. 1997.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. I. Cirac, A. Ekert, S. F. Huelga, and C. Macchiavello, "Distributed quantum computation over noisy," Physical Review A, vol. 59, no. 6, Article ID: 4249, Jun. 1999.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. Yepez, "Type-II quantum computers," Int. Journal of Modern Physics C, vol. 12, no. 09, pp. 1273-1284, 2001.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. S. Bharadwaj and K. R. Sreenivasan, "Quantum computation of fluid dynamics," Bulletin of the American Physical Society, Feb. 2020.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Yepez, "Lattice-gas quantum computation," Int. Journal of Modern Physics C, vol. 9, no. 8, pp. 1596-1587, 1998.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	R. Beals, et al., "Efficient distributed quantum computing," Proceedings of the Royal Society A, vol. 469, no. 2153, 20 pp., 8 May 2013.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. V. Meter, W. Munro, K. Nemoto, and K. M. Itoh, "Arithmetic on a distributed-memory quantum multicomputer," ACM Journal on Emerging Technologies in Computing Systems, vol. 3, no. 4, Article ID: 2, 23 pp., Jan. 2008.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	D. Gottesman and I. L. Chuang, "Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations," Nature, vol. 402, no. 6760, pp. 390-393, Aug. 1999.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Caleffi, A. S. Cacciapuoti, and G. Bianchi, "Quantum internet: from communication to distributed computing!," in Proc. of the 5th ACM Int. Conf. on Nanoscale Computing and Communication, 4 pp., Reykjavik, Iceland, 5-7 Sept. 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	C. Heunen and P. A. J. P. R. A. Martinez, "Automated distribution of quantum circuits," Physical Review A, vol.100, Article ID: 032308, Sept. 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Y. Akhremtsev, T. Heuer, P. Sanders, and S. Schlag, "Engineering a direct k-way hypergraph partitioning algorithm," in Proc. of the 19th Workshop on Algorithm Engineering and Experiments, ALENEX'17, pp. 28-42, Jan. 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. Zomorodi-Moghadam, M. Houshmand, and M. Houshmand, "Optimizing teleportation cost in distributed quantum circuits," International Journal of Theorethical Physics, vol. 57, no. 3, pp. 848-861, May 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. Houshmand, Z. Mohammadi, M. Zomorodi-Moghadam, and M. Houshmand, "An evolutionary approach to optimizing teleportation cost in distributed quantum computation," International Journal of Theorethical Physics, vol. 59, no. 4, pp. 1315-1329, Feb. 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Z. Davarzani, M. Zomorodi-Moghadam, M. Houshmand, and M. Nouri-Baygi, "A dynamic programming approach for distributing quantum circuits by bipartite graphs," Quantum Information Processing, vol. 19, no. 10, pp. 1-18, Sept. 2020.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	O. Daei, K. Navi, and M. Zomorodi-Moghadam, "Optimized quantum circuit partitioning," International Journal of Theorethical Physics, vol. 59, no. 12, pp. 3804-3820, Nov. 2020.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	E. Nikahd, N. Mohammadzadeh, M. Sedighi, and M. Saheb Zamani, "Automated window-based partitioning of quantum circuits," Physica Scripta, vol. 96, no. 3, Article ID: 035102, Mar. 2021.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	K. Andreev and H. Räcke, "Balanced graph partitioning," in Proc. of the 16th Annual ACM Symp. on Parallelism in Algorithms and Architectures, pp. 120-124, Barcelona, Spain, 27-30 Jun. 2004.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	A. U. Khalid, Z. Zilic, and K. Radecka, "FPGA emulation of quantum circuits," in Proc. IEEE In. Conf. on Computer Design: VLSI in Computers and Processors, pp. 310-315, San Jose, CA, USA, 11-13 Oct. 2004.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	J. Donald and N. K. Jha, "Reversible logic synthesis with Fredkin and Peres gates," ACM Journal on Emerging Technologies in Computing Systems, vol. 4, no. 1, Article ID:2, 19 pp., Apr. 2008.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	R. Wille, D. Große, L. Teuber, G. W. Dueck, and R. Drechsler, "RevLib: an online resource for reversible functions and reversible circuits," in Proc. 38th Int. Symp. on Multiple Valued Logic, pp. 220-225, Dallas, TX, USA, 22-24 May 2008.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	A. W. Cross, et al., Open Quantum Assembly Language, Mar. 2021,
https://assets.amazon.science/2f/11/b60fba45406fb41d2b2af9aa43a8/open-quantum-assembly-language.pdf</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>SQ-PUF: A Resistant PUF-Based Authentication Protocol against Machine-Learning Attack</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Abolfazl</given_name><surname>Sajadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Bijan</given_name><surname>Alizadeh</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>20</day><year>2024</year></publication_date><pages><first_page>219</first_page><last_page>226</last_page></pages><doi_data><doi>10.66224/ijece.34099.21.3.219</doi><resource>http://ijece.org/fa/Article/34099</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/34099</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/34099</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/34099</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/34099</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/34099</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/34099</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/34099</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. Hemavathy and V. S. Kanchana Bhaaskaran, "Arbiter PUF-a review of design, composition, and security aspects," IEEE Access, vol. 11, pp. 33979-34004, 2023.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Shamsoshoara, A. Korenda, F. Afghah, and S. Zeadally, "A survey on physical unclonable function (PUF)-based security solutions for internet of things," Computer Networks, vol. 183, Article ID: 107593, Dec. 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Ning, F. Farha, A. Ullah, and L. Mao, "Physical unclonable function: architectures, applications and challenges for dependable security," IET Circuits, Devices &amp; Systems, vol. 14, no. 4, pp. 407-424, Jul. 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	B. Gassend, D. Lim, D. Clarke, M. Van Dijk, and S. Devadas, "Identification and authentication of integrated circuits," Concurrency Computation Practice and Experience, vol. 16, no. 11, pp. 1077-1098, 2004.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. W. Lee, et al., "A technique to build a secret key in integrated circuits for identification and authentication applications," in Proc. IEEE Symp. on VLSI Circuits, Digest of Technical Papers, pp. 176-179, Honolulu, HI, USA, 17-19 Jun. 2004.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Techniques for design and implementation of secure reconfigurable PUFs," ACM Trans. Reconfigurable Technol Syst, vol. 2, no. 1, Article ID: 5, 33 pp., Mar. 2009.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Ashtari, A. Shabani, and B. Alizadeh, "A new RF-PUF based authentication of internet of things using random forest classification," in Proc. of 16th Int. ISC Conf. on Information Security and Cryptology, ISCISC'19, pp. 21-26, Mashhad, Iran, 28-29 Aug. 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	B. Chatterjee, D. Das, and S. Sen, "RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning," in Proc. of the IEEE Int. Sym. on Hardware Oriented Security and Trust, HOST'18, pp. 205-208, May 2018.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Proc. 44th ACM/IEEE Design Automation Conf., pp. 9-14, San Diego, CA, USA, 4-8 Jun. 2007.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	P. K. Sadhu and V. P. Yanambaka, "MC-PUF: a robust lightweight controlled physical unclonable function for resource constrained environments," in Proc. of IEEE Computer Society Annual Symposium on VLSI, ISVLSI'22, pp. 452-453, Nicosia, Cyprus, 4-6 Jul. 2022.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. H. Ishak, M. S. Mispan, W. Y. Chiew, M. R. Kamaruddin, 
and M. A. Korobkov, "Secure lightweight obfuscated delay-based physical unclonable function design on FPGA," Bulletin of Electrical Engineering and Informatics, vol. 11, no. 2, pp. 1075-1083, Apr. 2022.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Abdolinezhad and A. Sikora, "A lightweight mutual authentication protocol based on physical unclonable functions," in Proc. of the IEEE Int. Symp. on Hardware Oriented Security and Trust, HOST'22, pp. 161-164, McLean, VA, USA, 27-30 2022.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Vijayakumar and S. Kundu, "A novel modeling attack resistant PUF design based on non-linear voltage transfer characteristics," in Proc. Design, Automation and Test in Europe, DATE'15, pp. 653-658, Grenoble, France, 9-13 Mar. Apr. 2015.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Majzoobi, F. Koushanfar, and M. Potkonjak, "Lightweight secure PUFs," in Proc. IEEE/ACM Int. Conf. on Computer-Aided Design, Digest of Technical Papers, ICCAD'08, pp. 670-673, San Jose, CA, USA, 10-13 Nov. 2008.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	D. P. Sahoo, S. Saha, D. Mukhopadhyay, R. S. Chakraborty, and H. Kapoor, "Composite PUF: a new design paradigm for physically unclonable functions on FPGA," in Proc. of the IEEE Int. Symp. on Hardware-Oriented Security and Trust, HOST'14, pp. 50-55, Arlington, VA, USA, 6-7 May 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	D. E. Holcomb, W. Burleson, and K. Fu, Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID tags, 2007.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	P. Tuyls, et al., "Read-proof hardware from protective coatings," in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, pp. 369-383, Oct. 2006.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Sauer, P. Raiola, L. Feiten, B. Becker, U. Rührmair, and I. Polian, "Sensitized path PUF: a lightweight embedded physical unclonable function," in Proc. of the Design, Automation and Test in Europe, DATE'17, pp. 680-685, Lausanne, Switzerland, 27-31
Mar. 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	D. Canaday, W. A. S. Barbosa, and A. Pomerance, "A novel attack on machine-learning resistant physical unclonable functions," in Proc. of the IEEE Int. Symp. on Hardware Oriented Security and Trust, HOST'22, pp. 25-28, McLean, VA, USA, 27-30 Jun. 2022.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	J. Ye, Q. Guo, Y. Hu, H. Li, and X. Li, "Modeling attacks on strong physical unclonable functions strengthened by random number and weak PUF," in Proc. of the IEEE VLSI Test Symposium, Computer Society, 6 pp., San Francisco, CA, USA, 22-25 Apr. 2018.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	U. Rührmair and J. Sölter, "PUF modeling attacks: an introduction and overview," in Proc. Design, Automation and Test in Europe, DATE'14, 6 pp., Dresden, Germany, 24-28 Mar. 2014.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Y. Wen and Y. Lao, "PUF modeling attack using active learning," 
in Proc. IEEE Int. Symp. on Circuits and Systems, 5 pp., Florence, Italy, 27-30 May 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Delvaux, "Security analysis of PUF-based key generation and entity authentication-KU Leuven," KU Leuven and Shanghai Jiao Tong University, 2017. Accessed: Aug. 26, 2021. [Online]. Available: https://limo.libis.be/primo-explore/fulldisplay?docid=LIRIAS1662341&amp;context=L&amp;vid=Lirias&amp;search_scope=Lirias&amp;tab=default_tab&amp;lang=en_US&amp;fromSitemap=1</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. Delvaux, "Machine-learning attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF-FSMs," IEEE Trans. on Information Forensics and Security, vol. 14, no. 8, pp. 2043-2058, Aug. 2019.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. Majzoobi, M. Rostami, F. Koushanfar, D. S. Wallach, and S. Devadas, "Slender PUF protocol: a lightweight, robust, and secure authentication by substring matching," in Proc. IEEE CS Security and Privacy Workshops, SPW'12, pp. 33-44, San Francisco, CA, USA, 24-25 May 2012.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	S. T. C. Konigsmark, D. Chen, and M. D. F. Wong, "PolyPUF: physically secure self-divergence," IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 7, pp. 1053-1066, Jul. 2016.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	J. Ye, Y. Hu, and X. Li, "RPUF: physical unclonable function with randomized challenge to resist modeling attack," in Proc. of the IEEE Asian Hardware Oriented Security and Trust Symp., Asian HOST'16, 6 pp., Yilan, Taiwan, 19-20 Dec. 2016.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Y. Gao, et al., "Obfuscated challenge-response: a secure lightweight authentication mechanism for PUF-based pervasive devices," in Proc. IEEE Int. Conf. on Pervasive Computing and Communication Workshops, PerCom Workshops, 6 pp., Sydney, Australia, 14-18 Mar. 2016.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	G. T. Becker and R. Kumar, "Active and passive side-channel attacks on delay based PUF designs," IACR Cryptology ePrint Archive, vol. 2014, Article ID:287, 2014, [Online]. Available: http://eprint.iacr.org/2014/287.pdf</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	J. Shi, Y. Lu, and J. Zhang, "Approximation attacks on strong PUFs," IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 10, pp. 2138-2151, Oct. 2020.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	I. G. Târşa, G. D. Budariu, and C. Grozea, "Study on a true random number generator design for FPGA," in Proc. 8th Int. Conf. on Communications, COMM'10, pp. 461-464, Bucharest, Romania, 10-12 Jun. 2010.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	T. Arciuolo and K. M. Elleithy, "Parallel, true random number generator (P-TRNG): using parallelism for fast true random number generation in hardware," in Proc. IEEE 11th Annual Computing and Communication Workshop and Conf., CCWC'21, pp. 987-992, NV, USA, 27-30 Jan. 2021.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	R. S. Durga, et al., "Design and synthesis of LFSR based random number generator," in Proc. of the 3rd Int. Conf. on Smart Systems and Inventive Technology, ICSSIT, pp. 438-442, Tirunelveli, India, 20-22 Aug. 2020.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	A. Maiti and P. Schaumont, "The impact of aging on a physical unclonable function," IEEE Trans. Very Large Scale Integr VLSI Syst, vol. 22, no. 9, pp. 1854-1864, Sept. 2014.
[35]	R. L. Sembiring, R. R. Pahlevi, and P. Sukarno, "Randomness, uniqueness, and steadiness evaluation of physical unclonable functions," in Proc. 9th Int. Conf. on Information and Communication Technology, ICoICT'2021, pp. 429-433, Yogyakarta, Indonesia, 3-5 Aug. 2021.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Social Networks Embedding Based on the Employment of Community Recognition and Latent Semantic Feature Extraction Approaches</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohadeseh</given_name><surname>Taherparvar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Fateme</given_name><surname>Ahmadi abkenari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Peyman</given_name><surname>bayat</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>20</day><year>2024</year></publication_date><pages><first_page>158</first_page><last_page>171</last_page></pages><doi_data><doi>10.66224/ijece.36903.21.3.158</doi><resource>http://ijece.org/fa/Article/36903</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/36903</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/36903</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/36903</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/36903</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/36903</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/36903</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/36903</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	P. Goyal and E. Ferrara, "Graph embedding techniques, applications, and performance: a survey," Knowl.-Based Syst., vol. 151, pp. 78-94, Jul. 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	H. Cai, V. W. Zheng, and K. Chang, "A comprehensive survey of graph embedding: problems, techniques and applications," IEEE Trans. Knowl. Data Eng., vol. 30, no. 9, pp. 1616-1637, Sept. 2018.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	I. Brugere, B. Gallagher, and T. Y. BergerWolf, "Network structure inference, a survey: motivations, methods, and applications," ACM Comput. Surv., vol. 51, no. 2, Article ID: 24, 39 pp., Mar. 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	F. Huang, X. Zhang, J. Xu, C. Li, and Z. Li, "Network embedding by fusingmultimodal contents and links," Knowl.-Based Syst., vol. 171, pp. 44-55, May 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Liao, S. Wang, D. Li, and X. Li, "FREERL: fusion relation embedded representation learning framework for aspect extraction," Knowl. Based Syst., vol. 135, pp. 9-17, Nov. 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	L. Boratto, S. Carta, G. Fenu, and R. Saia, "Using neural word embeddings to model user behavior and detect user segments," Knowl.-Based Syst., vol. 108, pp. 5-14, Sept. 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Ji, J. Han, and M. Danilevsky, "Ranking-based classification of heterogeneous information networks," in Proc. of the 17th ACM SIGKDD In. Conf. on Knowledge Discovery and Data Mining, pp. 1298-1306, San Diego, CA, USA, 21-24 Aug. 2011.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. A. Sinoara, J. Camachocollados, R. Rossi, R. Navigli, and S. O. Rezende, "Knowledge-enhanced document embeddings for text classification," Knowl.-Based Syst. vol. 163, pp. 955-971, Jan. 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	D. Liben-Nowell and J. Kleinberg, "The link-prediction problem for social networks," J. Am. Soc. Inf. Sci. Technol., vol. 58, no. 7, pp. 1019-1031, May 2007.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	T. Mikolov, I. Sutskever, K. Chen, G. Corrado, and J. Dean, "Distributed representations of words and phrases and their compositionality," in Proc. of the 26th Int. Conf. on Neural Information Processing Systems, vol. 2, pp. 3111-3119, Lake Tahoe, NA, USA, 5-10 Dec. 2013.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	B. Perozzi, R. AlRfou, and S. Skiena, "Deepwalk: online learning 
of social representations," in Proc. of the 20th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 701-710, New York, NY, USA, 24-27 Aug. 2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Grover and J. Leskovec, "node2vec: scalable feature learning for networks," in Proc. of the 22nd ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 855-864, San Francisco, CA, USA, 13-17 Aug. 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. Tang, et al., "LINE: large-scale information network embedding," in Proc. of the 24th Int. Conf. on World Wide Web, pp. 1067-1077, Florence Italy, 18-22 May 2015.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	W. Hamilton, Z. Ying, and J. Leskovec, "Inductive representation learning on large graphs," in Proc. of the 31st Int. Conf. on Neural Information Processing Systems, pp. 1024-1034, Long Beach, CA, USA, 4-9 Dec. 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	H. Gao and H. Huang, "Deep attributed network embedding," in Proc. of the 27th Int. Joint Conf. on Artificial Intelligence, pp. 3364-3370, Stockholm Sweden, 13-19 Jul. 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	X. Huang, J. Li, and X. Hu, "Label informed attributed network embedding," in Proc. of the 10th ACM Int. Conf. on Web Search and Data Mining, pp. 731-739, Cambridge, UK, 6-10 Feb. 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. Liang, P. Jacobs, J. Sun, and S. Parthasarathy, "Semi-supervised embedding in attributed networks with outliers," in Proc. of the SIAM Int. Conf. on Data Mining, pp. 153-161, 2018.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	L. Yang, et al., "Modularity based community detection with deep learning," in Proc. of the 25th Int. Joint Conf. on Artificial Intelligence, pp. 2252-2258, New York, NY, USA, 9-15 Jul. 2016.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	X. Wang, P. Cui, J. Wang, J. Pei, W. Zhu, and S. Yang, "Community preserving network embedding," Proc. of the 31st AAAI Conf. on Artificial Intelligence, pp. 203-209, Washington, DC, USA, 4-7 Feb. 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Ismail, and R. Ismail, "Modularity approach for community detection in complex networks," in Proc. the 11th Int, Conf. Ubiquitous Information Management and Communication, 6 pp., Beppu, Japan, 5-7 Jan. 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. Fortunato and M. Barthelemy, "Resolution limit in community detection," in Proc. Natl. Acad. Sci. USA, vol. 104, no. 1, pp. 36-41, Jan. 2007.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	G. Salton and C. Buckley, "Term-weighting approaches in automatic text retrieval," Inf. Process. Manag., vol. 24, no. 5, pp. 513-523, 1988.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent dirichlet allocation," J. Mach. Learn. Res., vol. 3, no. 1, pp. 993-1022, 2003.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. M. Keikha, M. Rahgozar, and M. Asadpour, "Community aware random walk for network embeding," Knowl. Based Syst., vol. 148, pp. 47-54, 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	V. D. Blondel, J. L. Guillaume, R. Lambiotte, and E. Lefebvre, "Fast unfolding of communities in large networks," J. Stat. Mech., vol. 10, Article ID: P10008, 2008.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	P. Li, L. Huang, C. Wang, and J. Lai, "EdMot: an edge enhancement approach for motif-aware community detection," in Proc. of the 25th ACM SIGKDD Int. Conf. on Knowledge Discovery &amp; Data Mining, pp. 479-487, Anchorage, AK, USA, 4-8 Aug. 2019.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	A. Epasto, S. La. anzi, R. Leme, "Ego-Spli.ing framework: from non-overlapping to overlapping clusters," in Proc. of the 23th ACM SIGKDD Int. Conf. on Knowledge Discovery &amp; Data Mining, Halifax, Canada, 13-17 Aug. 2017.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	L. Tang and H. Liu, "Leveraging social media networks for classification," Data Min. Knowl. Discov., vol. 23, no. 3, pp. 447-478, Nov. 2011.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	J. B. Tenenbaum, V. de Silva, and J. C. Langford, "A global geometric framework for nonlinear dimensionality reduction," Science, vol. 250, no. 5500, pp. 2319-2323, 22 Dec. 2000.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	A. Ahmed, N. Shervashidze, S. Narayanamurthy, V. Josifovski, and A. J. Smola, "Distributed large-scale natural graph factorization," in Proc. of the 22nd Int. Conf. on World Wide Web, pp. 37-48, Rio de Janeiro, Brazil, 13-17 May 2013.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	T. F. Cox and M. A. Cox, Multidimensional Scaling, CRC Press, 2000.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	S. Yan, D. Xu, B. Zhang, H. J. Zhang, Q. Yang, and S. Lin, "Graph embedding and extensions: a general framework for dimensionality reduction," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 29, no. 1, pp. 40-51, Jan. 2007.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	S. Fortunato, "Community detection in graphs," Phys. Rep., vol. 486, no. 3-5, pp. 75-174, Feb. 2010.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	K. Henderson, et al., "RolX: structural role extraction &amp; mining in large graphs," in Proc. of the 18th ACM SIGKDD Int. Conf. on Knowledge Discovery &amp; Data Mining, Beijing, China, 12-16 Aug. 2012.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	C. Yang, Z. Liu, D. Zhao, M. Sun, and E. Y. Chang, "Network representation learning with rich text information," in Proc. of the 24th Int. Joint Conf. on Artificial Intelligence, pp. 2111-2117, Buenos Aires, Argentina, 25-31 Jul. 2015.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	Z. Chen, T. Cai, C. Chen, Z. Zheng, and G. Ling, "SINE: side information network embedding," in Proc. of the 24th Int. Conf. on Database Systems for Advanced Applications, pp. 692-708, Chiang Mai, Thailand, 22-25 Apr. 2019.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	D. Wang, P. Cui, and W. Zhu, "Structural deep network embedding," in Proc. of the 22nd ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 1225-1234, San Francisco, CA, USA, 13-17 Aug. 2016.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	X. Wang, D. Jin, X. Cao, L. Yang, and W. Zhang, "Semantic community identification in large attribute networks," in Proc. of the 30th AAAI Conf. on Artificial Intelligence, pp. 265-271, Phoenix, AZ, USA, 12-17 Feb. 2016.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	M. Li, J. Liu, P. Wu, and X. Teng, "Evolutionary network embedding preserving both local proximity and community structure," IEEE Trans. Evol. Comput., vol. 24, no. 3, pp. 523-535, Jun. 2019.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	J. Chen, Q. Zhang, and X. Huang, "Incorporate group information 
to enhance network embedding," in Proc. of the 25th ACM Int. Conf. on Information and Knowledge Management, pp. 1901-1904, Indianapolis, IN, USA, 24-28 Oct. 2016.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	X. Xia, et al., "Improving automated bug triaging with specialized topic model," IEEE Trans. Softw. Eng., vol. 43, no. 3, pp. 272-297, Mar. 2017.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	T. Hofmann, "Probabilistic latent semantic indexing," in Proc. of the 22nd Annual Int. ACM SIGIR Conf. on Research and Revelopment in Information Retrieval, pp. 50-57, Berkeley, CA, USA, 15-19 Aug. 1999.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	M. Steyvers, P. Smyth, M. RosenZvi, and T. Griffiths, "Probabilistic author-topic models for information discovery," in Proc. of the 10th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 306-315, Seattle, WA, USA, 22-25 Aug. 2004.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	M. RosenZvi, T. Griffiths, M. Steyvers, and P. Smyth, "The author-topic model for authors and documents," in Proc. of the 20th Conf. on Uncertainty in Artificial Intelligence, pp. 487-494, Banff, Canada, 6-11 Jul. 2004.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	Q. Mei, D. Cai, D. Zhang, and C. Zhai, "Topic modeling with network regularization," in Proc. of the 17th Int. Conf. on World Wide Web, pp. 101-110, Beijing, China, 21-25 Apr. 2008.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	Y. Shi, M. Lei, H. Yang, and L. Niu, "Diffusion network embedding," Pattern Recognit., vol. 88, pp. 518-531, Apr. 2019.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	H. Chen, et al., "Exploiting centrality information with graph convolutions for network representation learning," in Proc. of the 35th IEEE Int. Conf. on Data Engineering, pp. 590-601, Macao, China ,8-11 Apr. 2019.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	W. Zhao, H. Ma, Z. Li, X. Ao, and N. Li, "SBRNE: an improved unified framework for social and behavior recommendations with network embedding," in Proc. of the 24th Int. Conf. on Database Systems for Advanced Applications, pp. 555-571, Chiang Mai, Thailand, 22-22 Apr. 2019.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	Q. Li, J. Zhong, Q. Li, Z. Cao, and C. Wang, "Enhancing network embedding with implicit clustering," in Proc. of the 24th Int. Conf. on Database Systems for Advanced Applications, pp. 452-467, Chiang Mai, Thailand, April 22-25, 2019.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50]	L. Wu, D. Wang, S. Feng, Y. Zhang, and G. Yu, "MDAL: multi-task dual attention LSTM model for semi-supervised network embedding," in Proc. of the 24th Int. Conf. on Database Systems for Advanced Applications, Chiang Mai, Thailand, April 22-25, 2019.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51]	Y. Gao, M. Gong, Y. Xie, and H. Zhong, "Community-oriented attributed network embedding," Knowledge-Based Systems, vol. 193, Article ID: 105418, Apr. 2019.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52]	X. Cheng, X. Yan, Y. Lan, and J. Guo, "BTM: topic modeling over short texts," IEEE Trans. on Knowledge and Data Engineering, vol. 26, no. 12, pp. 2928 - 2941, Dec. 2013.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53]	D. Whitley, "A genetic algorithm tutorial," Stat. Comput., vol. 4, 
no. 2, pp. 65-85, Jun. 1994.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[54]	J. Tang, Z. Meng, X. Nguyen, Q. Mei, and M. Zhang, "Understanding the limiting factors of topic modeling via posterior contraction analysis," in Proc. of the 31st Int. Conf. on Machine Learning, pp. 190-198, Beijing China 21-26 Jun. 2014.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[55]	A. K. McCallum, K. Nigam, J. Rennie, and K. Seymore, "Automating the construction of internet portals with machine learning," Information Retrieval. vol. 3, no. 2, pp. 127-163, Jun. 2000.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[56]	-, DBLP Citation Network, https://www.aminer.org/citation</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Community Detection in Complex Dynamic Networks Based on Graph Embedding and Clustering Ensemble</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Majid</given_name><surname>Mohammadpour</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyedakbar</given_name><surname>Mostafavi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>وحید</given_name><surname>رنجبر</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>20</day><year>2024</year></publication_date><pages><first_page>141</first_page><last_page>157</last_page></pages><doi_data><doi>10.66224/ijece.37404.21.3.141</doi><resource>http://ijece.org/fa/Article/37404</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/37404</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/37404</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/37404</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/37404</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/37404</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/37404</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/37404</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Z. Gao, et al., "Hierarchical graph learning for protein–protein interaction," Nature Communications, vol. 14, Article ID: 1093, 2023.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	V. Ranjbar, M. Salehi, P. Jandaghi, and M. Jalili, "Qanet: tensor decomposition approach for query-based anomaly detection in heterogeneous information networks," IEEE Trans. on Knowledge and Data Engineering, vol. 31, no. 11, pp. 2178-2189, Nov. 2018.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Dai, Y. Wang, R. Trivedi, and L. Song, Deep Coevolutionary Network: Embedding User and Item Features for Recommendation, arXiv:1609.03675v4, 2017</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Z. Wu, S. Pan, F. Chen, G. Long, C. Zhang, and P. S. Yu, "A comprehensive survey on graph neural networks," IEEE Trans. Neural Networks Learn. Syst., vol. 32, no. 1, pp. 4-24, Jan. 2021.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Zhou, et al., "Graph neural networks: a review of methods and applications," AI Open, vol. 1, pp. 57-81, 2020.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	P. Xu, W. Hu, J. Wu, and B. Du, "Link prediction with signed latent factors in signed social networks," in Proc. 25th ACM SIGKDD Int. Conf. on Knowledge Discovery &amp; Data Mining, pp. 1046-1054, Anchorage, AK, USA, 4-8 Aug. 2019.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Khorasani, B. Minaei-Bidgoli, and C. Saedi, "Automatic synset extraction from text documents using a graph-based clustering approach via maximal cliques finding," International J. of Information and Communication Technology Research, vol. 11, 
no. 1, pp. 27-35, Winter 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Grover and J. Leskovec, "node2vec: scalable feature learning for networks," in Proc. of the 22nd ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 855-864, San Francisco, CA, USA, 13-17 Aug. 2016.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	J. Skarding, B. Gabrys, and K. Musial, "Foundations and modelling of dynamic networks using dynamic graph neural networks: a survey," IEEE Access, vol. 9, pp. 79143-79168, 2021.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Torricelli, M. Karsai, and L. Gauvin, "weg2vec: event embedding for temporal networks," Scientific Reports, vol. 10, Article ID: 7164, 11 pp., 2020.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Cao, W. Lu, and Q. Xu, "Deep neural networks for learning graph representations," in Proc. 13th AAAI Conf. on Artificial Intelligence, pp. 1145-1152, Phoenix, AZ, USA, 12-17 Feb. 2016.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. T. FaghihiNezhad and B. Minaei Bidgoli, "Development of an ensemble learning-based intelligent model for stock market forecasting," Scientia Iranica, vol. 28, no. 1, pp. 395-411, Jan./Feb. 2021.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Banerjee, et al., "A new method for weighted ensemble clustering and coupled ensemble selection," Connection Science, vol. 33, no. 3, pp. 623-644, 2021.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	D. Huang, C. D. Wang, H. Peng, J. Lai, and C. K. Kwoh, "Enhanced ensemble clustering via fast propagation of cluster-wise similarities," IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 51, no. 1, pp. 508-520, Jan. 2021.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	N. Ilc, "Weighted cluster ensemble based on partition relevance analysis with reduction step," IEEE Access, vol. 8, pp. 113720-113736, 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. Goyal, A. Sapienza, and E. Ferrara, "Recommending teammates with deep neural networks," in Proc. 29th on Hypertext and Social Media, pp. 57-61, Baltimore, MD, USA, 9-12 Jul. 2018.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. B. Lee, R. Rossi, and X. Kong, "Graph classification using structural attention," in Proc. 24th ACM SIGKDD Int. Conf. on Knowledge Discovery &amp; Data Mining, pp. 1666-1674, London, UK, 19-23 Aug. 2018.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. You, B. Liu, R. Ying, V. Pande, and J. Leskovec, "Graph convolutional policy network for goal-directed molecular graph generation," in Proc. 32nd Int. Conf. on Neural Information Processing Systems, pp. 6412-6422, Montréal, Canada, 3-8 Dec. 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	R. Ying, J. You, C. Morris, X. Ren, W. L. Hamilton, and J. Leskovec, "Hierarchical graph representation learning with differentiable pooling," in Proc. 32nd Int. Conf. on Neural Information Processing Systems, 11 pp., Montréal, Canada, 3-8 Dec. 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Y. Ma, Z. Guo, Z. Ren, E. Zhao, J. Tang, and D. Yin, Streaming Graph Nneural Networks, arXiv preprint arXiv:1810.10627, 2018.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	F. Manessi, A. Rozza, and M. Manzo, Dynamic Graph Convolutional Networks, arXiv preprint arXiv:1704.06199, 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	F. Monti, M. Bronstein, and X. Bresson, "Geometric matrix completion with recurrent multi-graph neural networks," in Proc. 31st Conf. on Neural Information Processing Systems, 11 pp., Long Beach, CA, USA, 4-9 Dec. 2017.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. You, R. Ying, X. Ren, W. Hamilton, and J. Leskovec, "GraphRNN: generating realistic graphs with deep auto-regressive models," in Proc. 35 th Int. Conf. on Machine Learning, 12 pp., Stockholm, Sweden, 10-15 Jul. 2018.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Z. Zhang, A Note on Spectral Clustering and SVD of Graph Data, arXiv preprint arXiv:1809.11029, 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	R. Ying, et al., "Graph convolutional neural networks for web-scale recommender systems," in Proc. 24th ACM SIGKDD Int. Conf. on Knowledge Discovery &amp; Data Mining, pp. 974-983, London, UK, 19-23 Aug. 2018.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	D. Wang, P. Cui, and W. Zhu, "Structural deep network embedding," in Proc. 22th ACM SIGKDD Int. Conf. on Knowledge Discovery &amp; Data Mining, pp. 1225-1234, San Francisco, CA, USA, 13-17 Aug. 2016.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	F. Manessi, A. Rozza, and M. Manzo, Dynamic Graph Convolutional Networks, arXiv preprint arXiv:1704.06199, 2017.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Y. Ma, Z. Guo, Z. Ren, E. Zhao, J. Tang, and D. Yin, Streaming Graph Neural Networks, arXiv preprint arXiv:1810.10627, 2018.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	L. Zhu, D. Guo, J. Yin, G. Ver Steeg, and A. Galstyan, "Scalable temporal latent space inference for link prediction in dynamic social networks," IEEE Trans. on Knowledge and Data Engineering, 
vol. 28, no. 10, pp. 2765-2777, Oct. 2016.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	C. Hongyun, V. W. Zheng, and K. Chen-Chuan Chang, "A comprehensive survey of graph embedding: problems, techniques, and applications," IEEE Trans. on Knowledge and Data Engineering, vol. 3, no. 9, pp. 1616-1637, Sept. 2018.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	M. Ou, et al., "Asymmetric transitivity preserving graph embedding," in Proc. 22nd ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, pp. 1105-1114, San Francisco, CA, USA, 13-17 Aug. 2016.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	W. L. Hamilton, J. Leskovec, and D. Jurafsky, Diachronic Word Embeddings Reveal Statistical Laws of Semantic Change, arXiv preprint arXiv:1605.09096, 2016.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	S. Cao, W. Lu, and Q. Xu, "GraRep: learning graph representations with global structural information," in Proc. 21st Intl. Conf. on Knowledge Discovery and Data Mining, pp. 891-900, Melbourne Australia, 18-23 Oct. 2015.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	D. Wang, P. Cui, and W. Zhu, "Structural deep network embedding," in Proc. 22th ACM SIGKDD Int. Conf. on Knowledge Discovery &amp; Data Mining, pp. 1225-1234, San Francisco, CA, USA, 13-17 Aug. 2016.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	A. L. Barabasi, Network Science, Cambridge University Press, 2016.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	K. Tu, P. Cui, X. Wang, P. S. Yu, and W. Zhu, "Deep recursive network embedding with regular equivalence," in Proc. 24th ACM SIGKDD Int. Conf. on Knowledge Discovery &amp; Data Mining, pp. 2357-2366, London, UK, 19-23 Aug. 2018.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	A. Fred and A. K. Jain, "Combining multiple clusterings using evidence accumulation," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 27, no. 6, pp. 835-850, Jun. 2005.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	A. Strehl and J. Ghosh, "Cluster ensembles-a knowledge reuse framework for combining multiple partitions," J. of Machine Learning Research, vol. 3, pp. 583-617, 2002.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	H. Alizadeh, B. Minaei-Bidgoli, and H. Parvin, "Cluster ensemble selection based on a new cluster stability measure," Intelligent Data Analysis, vol. 18, no. 3, pp. 389-408, 2014.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	R. Caruana, et al., "Ensemble selection from libraries of models," in Proc. of the 21st Int. Conf. on Machine Learning, 9 pp., Banff, Canada, 4-8 Jul. 2004.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	X. Fern and W. Lin, "Cluster ensemble selection," Statistical Analysis and Data Mining, vol. 1, no. 3, pp. 128-141, Nov. 2008.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	J. Azimi and X. Fern, "Adaptive cluster ensemble selection," in Proc. of 21th Int. Joint Conf. on Artificial Intelligence, pp. 992-997, Pasadena, Ca, USA, 11-17 Jul. 2009.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	H. Alizadeh, P. H. Parvin, and S. Parvin, "A framework for cluster ensemble based on a max metric as cluster evaluator," IAENG International J. of Computer Science, vol. 39, no. 1, 10 pp., Feb. 2012.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	H. Alizadeh, B. Minaei-Bidgoli, and H. Parvin, "To improve the quality of cluster ensembles by selecting a subset of base clusters," 
J. of Experimental &amp; Theoretical Artificial Intelligence, vol. 26, no. 1, Article ID: 813974, 2014.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	W., Li, Z. Wang, W. Sun, S. Bahrami, "An ensemble clustering framework based on hierarchical clustering ensemble selection and clusters clustering," Cybernetics and Systems, vol. 54, no. 5, pp. 741-766, 2023.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	H. Khalili, M. Rabbani, E. Akbari, "Clustering ensemble selection: a systematic mapping study," International Journal of Nonlinear Analysis and Applications, vol. 14, no. 9, pp. 209-240, 2023.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	S. T. Hadjitodorov, L. I. Kuncheva, and L. P. Todorova, "Moderate diversity for better cluster ensembles," Information Fusion, vol. 7, no. 3, pp. 264-275, Sept. 2006.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	H. Parvin, B. Minaei-Bidgoli, and H. Alizadeh, "A new clustering algorithm with the convergence proof," in Proc. of the 15th Int. Conf, on Knowledge-Based and Intelligent Information and Engineering Systems, vol. 1, pp. 21-31, Kaiserslautern, Germany, 12-14 Sept. 2011.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	V. Singh, L. Mukherjee, J. Peng, and J. Xu, "Ensemble clustering using semidefinite programming with applications," Mach. Learn., vol. 79, pp. 177-200, Dec. 2010.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50]	P. R. Rao and J. P. P. da Costa, "A performance study of a consensus clustering algorithm and properties of partition graph," in Proc. of IEEE Int. Conf. on Computational Intelligence and Computing Research, 5 pp., Coimbatore, India, 28-29 Dec. 2011.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51]	A. Gunoche, "Consensus of partitions: a constructive approach," Advances in Data Analysis and Classification, vol. 5, no. 3, pp. 215-229, 2011.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52]	I. T. Christou, "Coordination of cluster ensembles via exact methods," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 33, no. 2, pp. 279-293, Feb. 2011.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53]	S. Vega-Ponz and J. Ruiz-Shulcloper, "A survey of clustering ensemble algorithms," Int. J. of Pattern Recognition and Artificial Intelligence, vol. 25, no. 3, pp. 337-372, 2011.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[54]	U. Brandes, et al., "On modularity clustering," IEEE Trans. on Knowledge and Data Engineering, vol. 20, no. 2, pp. 172-188, Feb. 2008.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[55]	G. Agrawal and D. Kempe, "Modularity-maximizing network communities via mathematical programming," Eur. Phys. J. B, vol. 66, pp. 409-418, 2008.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[56]	X. S. Zhang, et al., "Modularity optimization in community detection of complex networks," Europhys Lett, vol. 87, no. 3, Article ID: 38002, 2009.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[57]	X. S. Zhang, et al., "A combinatorial model and algorithm for globally searching community structure in complex networks," J. Comb Optim, vol. 23, pp. 425-442, 2012.</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[58]	C. Zhao, et al., "Social network optimization for cluster ensemble selection," Fundamenta Informaticae, vol. 176, no. 1, pp. 79-102, 2020.</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[59]	R. Hosseinzadeh, H. Alizadeh, and E. Nazemi, "Community detection ensemble in social networks," in Proc. the 11th Iranian Conf. on Intelligent Systems, pp. 27-28, Tehran, Iran, Feb. 2013.</unstructured_citation></citation><citation key="ref60"><unstructured_citation>
[60]	D. Huang, C. D. Wang, and J. H. Lai, "Locally weighted ensemble clustering," IEEE Trans. on Cybernetics, vol. 48, no. 5, pp. 1460-1473, May 2018.</unstructured_citation></citation><citation key="ref61"><unstructured_citation>
[61]	P. Goyal, S. R. Chhetri, and A. Canedo, "dyngraph2vec: capturing network dynamics using dynamic graph representation learning," Knowledge-Based Systems, vol. 187, Article ID: 104816, Jan. 2020.</unstructured_citation></citation><citation key="ref62"><unstructured_citation>
[62]	P. Goyal, S. R. Chhetri, and A. Canedo, dyngraph2vec: Capturing Network Dynamics using Dynamic Graph Representation Learning, arXiv preprint arXiv:1809.02657, 2018.</unstructured_citation></citation><citation key="ref63"><unstructured_citation>
[63]	A. Clauset, M. E. J. Newman, and C. Moore, "Finding community structure in very large networks," Phys. Rev. E, vol. 70, Article ID: 066111 2004.</unstructured_citation></citation><citation key="ref64"><unstructured_citation>
[64]	M. E. J. Newman, "Modularity and community structure in networks," in Proc. Natl Acad. Sci. USA, vol. 103, no. 23, pp. 8577-8582, 6 Jun. 2006.</unstructured_citation></citation><citation key="ref65"><unstructured_citation>
[65]	L. Shuzhuo, C. Yinghui, H. Haifeng, and M. W. Feldman, "A genetic algorithm with local search strategy for improved detection of community structure," Complexity, vol. 15, no. 4, pp. 53-60, Mar./Apr. 2010.</unstructured_citation></citation><citation key="ref66"><unstructured_citation>
[66]	Y. Ren, C. Domeniconi, G. Zhang, and G. Yu, "Weighted-object ensemble clustering: methods and analysis," Knowledge and Information Systems, vol. 51, no. 2, pp. 661-689, 2017.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Increase of Image Sharpness Using Visual Saliency</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mina</given_name><surname>Vafaei Jahan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Abbas</given_name><surname>Ebrahimi moghadam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Morteza</given_name><surname>Khademi</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>20</day><year>2024</year></publication_date><pages><first_page>183</first_page><last_page>192</last_page></pages><doi_data><doi>10.66224/ijece.38601.21.3.183</doi><resource>http://ijece.org/fa/Article/38601</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/38601</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/38601</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/38601</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/38601</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/38601</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/38601</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/38601</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Tutorials:Sharpness.http://www.cambridgeincolour.com/tutorials/sharpness.htm. [Online] (visited on June 11, 2016).</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Reichmann, Understanding sharpness, https://luminous landscape.com/rediscover-understanding-sharpness/.[Online] (visited on June 27. 2018).</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	N. Strobel and S. K. Mitra, "Quadratic filters for image contrast enhancement," in Proc. of 28th Asilomar Conf. on Signals, Systems and Computers, vol. 1, pp. 208-212, Pacific Grove, CA, USA, 31 Oct-Nov. 1994.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	C. Yin, Y. Zhou, S. Agaian, and C. L. Philip Chen, "Parametric rational unsharp masking for image enhancement," SPIE 9019, Image Processing: Algorithms and Systems XII, vol. 90190, 8 pp., Feb. 2014.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	K. Kaur, N. Jindal, and K. Singh, "Fractional derivative based unsharp masking approach for enhancement of digital images," Multimedia Tools and Applications, vol. 80, pp. 3645-3679, Aug. 2021.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Polesel, G. Ramponi, and V. J. Mathews, "Image enhancement via adaptive unsharp masking," IEEE Trans. on Image Processing, vol. 9, no. 3, pp. 505-510, Mar. 2000.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	W. Ye and K. K. Ma, "Blurriness-guided unsharp masking," 
IEEE Trans. on Image Processing, vol. 27, no. 9, pp. 4465-4477, Jan. 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	T. Kobayashi and J. Tajima, "Content-adaptive automatic image sharpening," in Proc. 20th Int. Conf. on Pattern Recognition, pp. 2214-2217, Istanbul, Turkey, 23-26 Aug. 2010.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	L. Krasula, P. L. Callet, K. Fliegel, and M. Klíma, "Quality assessment of sharpened images: challenges, methodology, and objective metrics," IEEE Trans. on Image Processing, vol. 26, no. 3, pp. 1496-1508, Mar. 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	X. Duan, et al., "A multiscale contrast enhancement for mammogram using dynamic unsharp masking in laplacian pyramid," IEEE Trans. on Radiation and Plasma Medical Sciences, vol. 3, 
no. 5, pp. 557-564, Sep. 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	B. J. Borah and C. K. Sun, "A GPU-accelerated modified unsharp-masking method for high-frequency background-noise suppression," IEEE Access, vol. 9, pp. 68746-68757, 2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	I. Draganov and V. Gancheva, "Unsharp masking with local adaptive contrast enhancement of medical images," In Su, R., Zhang, YD., Liu, H. (eds) Proc. of 2021 Int. Conf. on Medical Imaging and Computer-Aided Diagnosis, Lecture Notes in Electrical Engineering, Springer, Singapore, vol. 784, pp. 354-363, Jan. 2021.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	C. C. Pham and J. W. Jeon, "Efficient image sharpening and denoising using adaptive guided image filtering," IET Image Processing, vol. 9, no. 1, pp. 71-79, Jan. 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	R. R. Kumar, A. Kumar, and S. Srivastava, "Anisotropic diffusion based unsharp masking and crispening for denoising and enhancement of MRI images," in Proc. Int. Conf. on Emerging Frontiers in Electrical and Electronic Technologies, ICEFEET'20, 6 pp., Patna, India, 10-11Jul. 2020.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Z. Alameen, A. Muttar, and G. Albadrani, "Improving the sharpness of digital image using an amended unsharp mask filter," International J. of Image, Graphics and Signal Processing, vol. 11, no. 3, pp. 1-9, Mar. 2019.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. H. Majeed and N. A. M. Isa, "Adaptive entropy index histogram equalization for poor contrast images," IEEE Access, vol. 9, pp. 6402-6437, 2021.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. C. Gonzalez and R. E. Woods, Digital Image Processing Using MATLAB, 2nd Ed. New Delhi India: Pearson, 2004.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Y. T. Kim, "Contrast enhancement using brightness preserving 
bi-histogram equalization," IEEE Trans. on Consumer Electronics, vol. 43, no. 1, pp. 1-8, Feb. 1997.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. D. Chen and A. R. Ramli, "Contrast enhancement using recursive meanseparate histogram equalization for scalable brightness preservation," IEEE Trans. Consum. Electron., vol. 49, no. 4, pp. 1301-1309, Nov. 2003.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Q. Wang and R. Ward, "Fast image/video contrast enhancement based on weighted thresholded histogram equalization," IEEE Trans. Consum. Electron., vol. 53, no. 2, pp. 757-764, Jun. 2007.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. Y. Kim, L. S. Kim, and S. H. Hwang, "An advanced contrast enhancement using partially overlapped sub-block histogram equalization," IEEE Trans. Circuits Syst. Video Technol., vol. 11, 
no. 4, pp. 475-484, Apr. 2001.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. F. Tan and N. A. M. Isa, "Exposure based multi-histogram equalization contrast enhancement for non-uniform illumination images," IEEE Access, vol. 7, pp. 70842-70861, 2019.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Z. Shi, Y. Chen, E. Gavves, P. Mettes, and C. G. M. Snoek, "Unsharp mask guided filtering," IEEE Trans. on Image Processing, vol. 30, pp. 7472-74852021.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. Li, M. D. Levine, X. An, X. Xu, and H. He, "Visual saliency based on scale-space analysis in the frequency domain," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 35, no. 4, pp. 996-1010, Nov. 2013.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	L. Itti, C. Koch, and E. Niebur, "A model of saliency-based visual attention for rapid scene analysis," IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, no. 11, pp. 1254-1259, Nov. 1998.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	L. Itti and C. Koch, "A saliency-based search mechanism for overt and covert shifts of visual attention," IEEE Trans. Image Process, vol. 13, no. 10, pp. 1304-1318, Jan. 2004.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	A. Borji, M. M. Cheng, H. Jiang, and J. Li, "Salient object detection: a benchmark," IEEE Trans. on Image Process, vol. 24, no. 12, pp. 5706-5722, Jan. 2015.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	B. Zhang, J. P. Allebach, and Z. Pizlo, "An investigation of perceived sharpness and sharpness metrics," Proc. SPIE, Image Quality and System Performance II, vol. 5668, pp. 98-110, Jan. 2005.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	T. Judd, K. Ehinger, F. Durand, and A. Torralba, "Learning to predict where humans look," in Proc. IEEE 12th Int. Conf. on Computer Vision, pp. 2106-2113, Kyoto, Japan, 29 Sept.-2 Oct. 2009.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30‌	ف. نعمتی خلیل‌آباد، ﻫ. هادی‌زاده، ع. ابراهیمی‌مقدم و م. خادمی درح، "تخمین کمترین تفاوت قابل درک با استفاده از برجستگی بصری در تصاویر،" فصل‌نامه پردازش علائم و داده‌ها، جلد 17، شماره 2، صص. 71-84، 1399.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	K. Zuiderveld, Contrast Limited Adaptive Histogram Equalization, Chapter VIII.5, Graphics Gems IV. P. S. Heckbert (Eds.), Cambridge, MA, Academic Press, Feb. 1994.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: from error visibility to structural similarity," IEEE Trans. on Image Processing, vol. 13, no. 4, pp. 600-612, Apr. 2004.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	G. Deng, F. Galetto, M. Alnasrawi, and W. Waheed, "A guided edge-aware smoothing-sharpening filter based on patch interpolation model and generalized gamma distribution," IEEE Open J. of Signal Processing, vol. 2, pp. 119-135, Mar. 2021.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	D. Ngo, S. Lee, and B. Kang, "Nonlinear unsharp masking algorithm," in Proc. Int. Conf. on Electronics, Information, and Communication, ICEIC'20, 6 pp., Barcelona, Spain, 19-22 Jan. 2020.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	R. C. Gonzalez and R. E. Woods, Digital Image Processing, 4th Ed. New York, NY: Pearson, pp. 138-140, 2018.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	K. Singh and R. Kapoor, "Image enhancement via median-mean based sub-image-clipped histogram equalization," Optik-International J. for Light and Electron Optics. vol. 125, no. 17, pp. 4646-4651, Sept. 2014.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	T. Judd, K. Ehinger, F. Durand, and A. Torralba, "Learning to predict where humans look," in Proc.IEEE 12th Int. Conf. on Computer Vision, pp. 2106-2113, Kyoto, Japan, 29 Sept.-
2 Oct. 2009.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Fast and Lightweight Network for Road Lines Detection Using Mobile-Net Architecture and Different Loss Functions</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Pejman</given_name><surname>Goudarzi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>milad</given_name><surname>Heydari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mehdi</given_name><surname>Hosseinpour</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>20</day><year>2024</year></publication_date><pages><first_page>202</first_page><last_page>210</last_page></pages><doi_data><doi>10.66224/ijece.39295.21.3.202</doi><resource>http://ijece.org/fa/Article/39295</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/39295</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/39295</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/39295</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/39295</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/39295</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/39295</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/39295</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. T. Ying, T. S. Jeng, and V. Chan, "HSI color model based lane-marking detection," in Proc. IEEE Intelligent Transportation Systems Conf., pp. 1168-1172, Toronto, Canada, 17-20 Sept. 2006.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	H. Y. Cheng, B. S. Jeng, P. T. Tseng, and K. C. Fan, "Lane detection with moving vehicles in the traffic scenes," IEEE Trans. on Intelligent Transportation Systems, vol. 7, no. 4, pp. 571-582, Dec. 2006.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. A. Sotelo, F. J. Rodriguez, L. Magdalena, L. M. Bergasa, and L. Boquete, "A color vision-based lane tracking system for autonomous driving on unmarked roads," Autonomous Robots, vol. 16, 
pp. 95-116, 2004.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. C. Wu, C. Y. Chang, and C. H. J. P. R. Lin, "Lane-mark extraction for automobiles under complex conditions," Pattern Recognition, vol. 47, no. 8, pp. 2756-2767, Aug. 2014.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	C. Mu and X. Ma, "Lane detection based on object segmentation 
and piecewise fitting," Indonesian J. of Electrical Engineering and Computer Science, vol. 12, no. 5, pp. 3491-3500, May 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Niu, J. Lu, M. Xu, P. Lv, and X. Zhao, "Robust lane detection using two-stage feature extraction with curve fitting," Pattern Recognition, vol. 59, pp. 225-233, Nov. 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. C. McCall and M. M. Trivedi, "Video-based lane estimation and tracking for driver assistance: survey, system, and evaluation," IEEE Trans. on Intelligent Transportation Systems, vol. 7, no. 1, pp. 20-37, Mar. 2006.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	P. Y. Hsiao, C. W. Yeh, S. S. Huang, and L. C. Fu, "A portable vision-based real-time lane departure warning system: day and night," IEEE Trans. on Vehicular Technology, vol. 58, no. 4, pp. 2089-2094, May 2008.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Fu, X. Wang, H. Ma, Y. Yang, and M. Wang, "Multi-lanes detection based on panoramic camera," in Proc. 11th IEEE Int. Conf. on Control &amp; Automation, ICCA'14, pp. 655-660, Taichung, Taiwan, 18-20 Jun. 2014.S
[10]	J. G. Kim, J. H. Yoo, and J. C. Koo, "Road and lane detection using stereo camera," in Proc. IEEE Int. Conf. on Big Data and Smart Computing, BigComp'18, pp. 649-652, Shanghai, China, 15-17 Jan. 2018.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	S. P. Narote, P. N. Bhujbal, A. S. Narote, and D. M. Dhane, "A review of recent advances in lane detection and departure warning system," Pattern Recognition, vol. 73, pp. 216-234, Jan. 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	J. Tang, S. Li, and P. Liu, "A review of lane detection methods 
based on deep learning," Pattern Recognition, vol. 111, Article ID: 107623, Mar. 2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	X. Wu, D. Sahoo, and S. C. Hoi, "Recent advances in deep learning for object detection," Neurocomputing, vol. 396, pp. 39-64, 5 Jul. 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	Z. Q. Zhao, P. Zheng, S. T. Xu, and X. Wu, "Object detection with deep learning: a review," IEEE Trans. on Neural Networks and Learning Systems, vol. 30, no. 11, pp. 3212-3232, Nov. 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	D. Neven, B. D. Brabandere, S. Georgoulis, M. Proesmans, 
and L. V. Gool, "Towards end-to-end lane detection: an instance segmentation approach," in Proc. IEEE Intelligent Vehicles Symp. (IV), pp. 286-291, Changshu, China, 26-30 Jun. 2018.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	M. Ghafoorian, C. Nugteren, N. Baka, O. Booij, and M. Hofmann, "EL-GAN: embedding loss driven generative adversarial networks for lane detection," in Proc. of the European Conf. on Computer Vision Workshops, 14 pp., 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	L. C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and A. 
L. Yuille, "DeepLab: semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected CRFs," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 40, no. 4, pp. 834-848, Apr. 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	Z. Qin, H. Wang, and X. Li, "Ultra fast structure-aware deep lane detection," in Proc. of the Computer Vision-ECCV, pp. 276-291, 2020.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	X. Pan, J. Shi, P. Luo, X. Wang, and X. Tang, "Spatial as deep: spatial CNN for traffic scene understanding," in Proc. of the AAAI Conf. on Artificial Intelligence, pp. 7276-7283, New Orleans, LA, USA, 2-7 Feb. 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	Y. Hou, Z. Ma, C. Liu, and C. C. Loy, "Learning lightweight lane detection CNNs by self attention distillation," in Proc. of the IEEE/CVF Int. Conf. on Computer Vision, pp. 1013-1021, Seoul, Korea (South), 27 Oct.-2 Nov. 2019.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	J. Kim and M. Lee, "Robust lane detection based on convolutional neural network and random sample consensus," in Proc. of the Int. Conf. on Neural Information Processing, pp. 454-461, Montreal, Canada 8-13 Dec. 2014.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	A. Howard, et al., "Searching for mobilenetv3," in Proc. of the IEEE/CVF Int. Conf. on Computer Vision, pp. 1314-1324, Seoul, Korea (South), 27 Oct.-2 Nov. 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	A. G. Howard, et al., "Mobilenets: efficient convolutional neural networks for mobile vision applications," arXiv preprint arXiv:1704.04861, 2017.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	Tusimple. Lane Detection Benchmark, 2017. Available: https://github.com/TuSimple/tusimple-benchmark</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	D. P. Kingma and J. Ba, Adam: A Method for Stochastic Optimization, arXiv preprint arXiv:1412.6980, 2014.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	I. Loshchilov and F. Hutter, SGDR: Stochastic Gradient Descent with Warm Restarts, arXiv preprint arXiv:1608.03983, 2016.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Identification of Cancer-Causing Genes in Gene Network Using Feedforward Neural Network Architecture</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>مصطفی</given_name><surname>اخوان صفار</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>abbas ali</given_name><surname>rezaee</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>20</day><year>2024</year></publication_date><pages><first_page>211</first_page><last_page>218</last_page></pages><doi_data><doi>10.66224/ijece.40623.21.3.211</doi><resource>http://ijece.org/fa/Article/40623</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/40623</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/40623</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/40623</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/40623</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/40623</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/40623</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/40623</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. H. Bailey, et al., "Comprehensive characterization of cancer driver genes and mutations," Cell, vol. 173, no. 2, pp. 371-385, Apr. 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	L. Ding, et al., "Somatic mutations affect key pathways in lung adenocarcinoma," Nature, vol. 455, no. 7216, pp. 1069-1075, Oct. 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	L. Mularoni, R. Sabarinathan, J. Deu-Pons, A. Gonzalez-Perez, and N. López-Bigas, "OncodriveFML: a general framework to identify coding and non-coding regions with cancer driver mutations," Genome Biology, vol. 17, Article ID: 128, 13 pp, Dec. 2016.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Reimand, O. Wagih, and G. D. Bader, "The mutational landscape of phosphorylation signaling in cancer," Scientific Reports, vol. 3, no. 1, Article ID: 2651, 9 pp., 2013.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Helmy, M. Awad, and K. A. Mosa, "Limited resources of genome sequencing in developing countries: challenges and solutions," Applied &amp; Translational Genomics, vol. 9, pp. 15-19, Jun. 2016.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Youn and R. Simon, "Identifying cancer driver genes in tumor genome sequencing studies," Bioinformatics, vol. 27, no. 2, pp. 175-181, Jan. 2011.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Zhao, S. Zhang, L. Y. Wu, and X. S. Zhang, "Efficient methods for identifying mutated driver pathways in cancer," Bioinformatics, vol. 28, no. 22, pp. 2940-2947, 15 Nov. 2012.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	F. Vandin, E. Upfal, and B. J. Raphael, "De novo discovery of mutated driver pathways in cancer," Genome Research, vol. 22, 
no. 2, pp. 375-385, Feb. 2012.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Gonzalez-Perez and N. Lopez-Bigas, "Functional impact bias reveals cancer drivers," Nucleic Acids Research, vol. 40, no. 21, Article ID: e169, Nov. 2012.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	G. Ciriello, E. Cerami, C. Sander, and N. Schultz, "Mutual exclusivity analysis identifies oncogenic network modules," Genome Research, vol. 22, no. 2, pp. 398-406, Feb. 2012.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Bashashati, G. Haffari, J. Ding, G. Ha, K. Lui, J. Rosner, D. G. Huntsman, C. Caldas, S. A. Aparicio, and S. P. Shah, "DriverNet: uncovering the impact of somatic driver mutations on transcriptional networks in cancer," Genome Biology, vol. 13, no. 12, pp. 1-4, Dec. 2012.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	F. Vandin, E. Upfal, and B. J. Raphael, "De novo discovery of mutated driver pathways in cancer," Genome Research, vol. 22, 
no. 2, pp. 375-385, Feb. 2012.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. Reimand, O. Wagih, and G. D. Bader, "The mutational landscape of phosphorylation signaling in cancer," Scientific Reports, vol. 3, no. 1, Article ID: 2651, Oct. 2013.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. R. Aure, et al., "Identifying in-trans process associated genes in breast cancer by integrated analysis of copy number and expression data," PloS One, vol. 8, no. 1, Article ID: e53014, Jan. 2013.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. S. Lawrence, et al., "Mutational heterogeneity in cancer and the search for new cancer-associated genes," Nature, vol. 499, pp. 214-218, 2013.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	D. Tamborero, A. Gonzalez-Perez, and N. Lopez-Bigas, "OncodriveCLUST: exploiting the positional clustering of somatic mutations to identify cancer genes," Bioinformatics, vol. 29, no. 18, pp. 2238-2244, Sept. 2013.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	E. Porta-Pardo and A. Godzik, "E-Driver: a novel method to identify protein regions driving cancer," Bioinformatics, vol. 30, no. 21, pp. 3109-3114, Nov. 2014.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. P. Hou and J. Ma, "DawnRank: discovering personalized driver genes in cancer," Genome Medicine, vol. 6, Article ID: 56, 16 pp., Jul. 2014.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. Zhang, L. Y. Wu, X. S. Zhang, and S. Zhang, "Discovery of co-occurring driver pathways in cancer," BMC Bioinformatics, vol. 15, Article ID: 271, 14 pp., 2014.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	D. Arneson, A. Bhattacharya, L. Shu, V. P. Mäkinen, and X. Yang, "Mergeomics: a web server for identifying pathological pathways, networks, and key regulators via multidimensional data integration," BMC Genomics, vol. 17, Article ID: 772, 9 pp., 2016.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Rahimi, B. Teimourpour, and S. A. Marashi, "Cancer driver gene discovery in transcriptional regulatory networks using influence maximization approach," Computers in Biology and Medicine, vol. 114, Article ID: 103362, Nov. 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. Akhavan-Safar, B. Teimourpour, and M. Kargari, "GenHITS: 
a network science approach to driver gene detection in human regulatory network using gene's influence evaluation," J. of Biomedical Informatics, vol. 114, Article ID: 103661, Feb. 2021.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Y. Lu, Y. Wang, N. Sheng, H. Wang, Y. Fu, and Y. Tian, "RDDriver: a novel method based on multi-layer heterogeneous transcriptional regulation network for identifying pancreatic cancer biomarker," in Proc.IEEE Int. Conf. on Bioinformatics and Biomedicine, BIBM'22, pp. 497-502, Las Vegas, NV, USA, 6-8 Dec. 2022.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. Lee, H. Jung, J. Park, and J. Ahn, "Accurate prediction of cancer prognosis by exploiting patient-specific cancer driver genes," International J. of Molecular Sciences, vol. 24, no. 7, Article ID: 6445, Apr. 2023.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. M. Vaquerizas, S. K. Kummerfeld, S. A. Teichmann, and N. M. Luscombe, "A census of human transcription factors: function, expression and evolution," Nature Reviews Genetics, vol. 10, no. 4, pp. 252-263, Apr. 2009.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	H. Han, et al., "TRRUST v2: an expanded reference database of human and mouse transcriptional regulatory interactions," Nucleic Acids Research, vol. 46-D1, pp. 380-386, Jan. 2018.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	S. M. Cheng, V. Karyotis, P. Y. Chen, K. C. Chen, and S. Papavassiliou, "Diffusion models for information dissemination dynamics in wireless complex communication networks," J. of Complex Systems, vol. 2013, Article ID: 972352, 13 pp., 2013.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	I. F. Chung, C. Y. Chen, S. C. Su, C. Y. Li, K. J. Wu, H. W. Wang, and W. C. Cheng, "DriverDBv2: a database for human cancer driver gene research," Nucleic Acids Research, vol. 44-D1, pp. 975-979, Jan. 2016.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	P. Shannon, et al., "Cytoscape: a software environment for integrated models of biomolecular interaction networks," Genome Research, vol. 13, no. 11, pp. 2498-2504, Nov. 2003.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Design and Collection of Speech Data as the First Step of Localization the Intelligent Diagnosis of Autism in Iranian Children</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Maryam</given_name><surname>Alizadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Shima</given_name><surname>tabibian</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>20</day><year>2024</year></publication_date><pages><first_page>172</first_page><last_page>182</last_page></pages><doi_data><doi>10.66224/ijece.41286.21.3.172</doi><resource>http://ijece.org/fa/Article/41286</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/41286</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/41286</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/41286</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/41286</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/41286</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/41286</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/41286</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	D. Mitsumoto, et al., "Autism spectrum disorder discrimination based on voice activities related to fillers and laughter," in Proc. 53rd Annual Conf. on Information Sciences and Systems, CISS'19, 6 pp., Baltimore, MD, USA, 20-22 Mar. 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Alizadeh and S. Tabibian, "A Persian speaker-independent dataset to diagnose autism infected children based on speech processing techniques," in Proc. 7th Int. Conf. on Signal Processing and Intelligent Systems, ICSPIS'21, 5 pp., Tehran, Iran, 29-30 Dec. 2021.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Schelinski and K. V. Kriegstein, "Speech-in-noise recognition and the relation to vocal pitch perception in adults with autism spectrum disorder and typical development," J. of Autism Development Disorder, vol. 50, no. 1, pp. 356-363, Jan. 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Schelinski and K. V. Kriegstein, "The relation between vocal pitch and vocal emotion recognition abilities in people with autism spectrum disorder and typical development," J. of Autism and Developmental Disorders, vol. 49, pp. 68-82, 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. P. Denes, The Speech Chain, WH Freeman Company, 1993.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Deng, et al., "Speech-based diagnosis of autism spectrum condition by generative adversarial network representations," in Proc. of the Inte. Conf. on Digital Health, pp. 53-57, Londres, UK, 2-5 Jul. 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. Drimalla, et al., "Detecting autism by analyzing a simulated social interaction," in Proc. Joint European Conf. on Machine Learning and Knowledge Discovery in Databases, pp. 193-208, 10-14 Sept. 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Schelinski, Mechanisms of Voice Processing: Evidence from Autism Spectrum Disorder, Ph.D. Thesis, Humboldt University in Berlin, 2018.S
[9]	A. Baird, et al., "Automatic classification of autistic child vocalisations: a novel database and results," in Proc. InterSpeech'17, pp. 849-853, Stockholm, Sweden, 20-24 Aug. 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10]	E. Lyakso, et al., "AD-Child. Ru: speech corpus for Russian children with atypical development," in Proc. Int. Conf. on Speech and Computer, SPECOM'19, pp. 299-308, Istanbul, Turkey, 20-25 Aug. 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	S. Sadiq, et al., "Deep learning based multimedia data mining for autism spectrum disorder (ASD) diagnosis," in Proc. Int. Conf. on Data Mining Workshops, ICDMW'19, pp. 847-854, Beijing, China, 8-11 Nov. 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	W. Liu, T. Zhou, C. Zhang, X. Zou, and M. Li, "Response to name: 
a dataset and a multimodal machine learning framework towards autism study," in Proc. 7th Int. Conf. on Affective Computing and Intelligent Interaction, ACII'17, pp. 178-183, San Antonio, TX, USA, 23-26 Oct. 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	K. Welarathna, V. Kulasekara, K. Pulasinghe, and V. Piyawardana, "Automated sinhala speech emotions analysis tool for autism children," in Proc. 10th Int. Conf. on Information and Automation for Sustainability, ICIAfS'21, pp. 500-505, Negambo, Sri Lanka, 11-13 Aug. 2021.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	D. Xu, et al., "Automatic childhood autism detection by vocalization decomposition with phone-like units," in Proc. of the 2nd Workshop on Child, Computer and Interaction, WOCCI '09, Article ID: 5, 7 pp., Cambridge, MA, USA, 5-5 Nov. 2009.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	L. G. Pillai and E. Sherly, "A deep learning based evaluation of articulation disorder and learning assistive system for autistic children," International J. on Natural Language Computing, vol. 6, no. 5, pp. 19-36, Oct. 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	J. Zhang, Y. Meng, C. Wu, Y. T. Xiang, and Z. Yuan, "Non-speech and speech pitch perception among cantonese-speaking children with autism spectrum disorder: an ERP study," Neuroscience Letters, 
vol. 703, pp. 205-212, Jun. 2019.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	N. A. Chi, et al., "Classifying autism from crowdsourced semistructured speech recordings: machine learning model comparison study," JMIR Pediatrics and Parenting, vol. 5, Article ID:  e35406, Apr. 2022.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	A. Khozaei, H. Moradi, R. Hosseini, H. Pouretemad, and B. Eskandari, "Early screening of autism spectrum disorder using cry features," PloS One, vol. 15, Article ID: e0241690, Dec. 2020.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	T. Talkar, J. R. Williamson, D. J. Hannon, H. M. Rao, S. Yuditskaya, K. T. Claypool, et al., "Assessment of speech and fine motor coordination in children with autism spectrum disorder," IEEE Access, vol. 8, pp. 127535-1275452020.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	A. Mohanta and V. K. Mittal, "Acoustic features for characterizing speech of children affected with ASD," in Proc. IEEE 16th India Council Int. Conf., INDICON'19, 4 pp., Rajkot, India, 13-15 Dec. 2019.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	A. Mohanta, P. Mukherjee, and V. K. Mirtal, "Acoustic features characterization of autism speech for automated detection and classification," in Proc. National Conf. on Communications, NCC'20, 6 pp., Kharagpur, India, 21-23 Feb. 2020.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	F. Ringeval, et al., "Automatic analysis of typical and atypical encoding of spontaneous emotion in the voice of children," in Proc. 17th Annual Conf. of the Int. Speech Communication Association, ISCA'16, pp. 1210-1214, San Francisco, CA, USA, 8-12 Sept. 2016.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	I. F. Lin, et al., "Vocal identity recognition in autism spectrum disorder," PloS One, vol. 10, Article ID: e0129451, Jun. 2015.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	F. Ringeval, et al., "Automatic intonation recognition for the prosodic assessment of language-impaired children," IEEE Trans. on Audio, Speech, and Language Processing, vol. 19, no. 5, pp. 1328-1342, Oct. 2010.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	M. Asgari, A. Bayestehtashk, and I. Shafran, "Robust and accurate features for detecting and diagnosing autism spectrum disorder," 
in Proc. Annual Conf. of the Int. Speech Communication Association, - pp. 191-194, 25-29 Aug. 2013.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	E. Lyakso, et al., "Speech features of 13-15 year-old children with autism spectrum disorders," in Proc. Int. Conf. on Speech and Computer, SPECOM'20, pp. 291-303, St. Petersburg, Russia, 7-9 Oct. 2020.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	S. R. Livingstone and F. A. Russo, "The ryerson audio-visual database of emotional speech and song (RAVDESS): a dynamic, multimodal set of facial and vocal expressions in north american english," PloS One, vol. 13, Article ID: e0196391, May 2018.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	R. Matin and D. Valles, "A speech emotion recognition solution-based on support vector machine for children with autism spectrum disorder to help identify human emotions," in Proc. Intermountain Engineering, Technology and Computing, IETC'20, 6 pp., Orem, UT, USA, 2-3 Oct. 2020.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	C. Küpper, et al., "Identifying predictive features of autism spectrum disorders in a clinical sample of adolescents and adults using machine learning," Scientific Reports, vol. 10, Article ID: 4805, 11 pp., 2020.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	Y. K. Kim, et al., "Analyzing short term dynamic speech features for understanding behavioral traits of children with autism spectrum disorder," in Proc. Interspeech'21, pp. 2916-2920, Brno, Czech Republic, 30 Aug.-3 Sept. 2021.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	B. Schuller, S. Steidl, and A. Batliner, "The Interspeech 2009 emotion challenge," in Proc. Interspeech'09, pp. 312-315, Brighton, UK, 6-10 Sept. 2009.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	B. Schuller, et al., "The INTERSPEECH 2010 paralinguistic challenge," in Proc. Interspeech'10, pp. 2794-2797, Makuhari, Japan, 26-30 Sept. 2010.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	B. Schuller, et al., "The INTERSPEECH 2013 computational paralinguistics challenge: social signals, conflict, emotion, autism," in in Proc. Interspeech'13, pp. 148-152, Lyon, France, 25-29 Aug. 2013.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	A. Pahwa, G. Aggarwal, and A. Sharma, "A machine learning approach for identification &amp; diagnosing features of neurodevelopmental disorders using speech and spoken sentences," in Proc. Int. Conf. on Computing, Communication and Automation, ICCCA'16, pp. 377-382, Greater Noida, India, 29-30 Apr. 2016.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	S. A. Majeed, H. Husain, S. A. Samad, and T. F. Idbeaa, "Mel frequency cepstral coefficients (MFCC) feature extraction enhancement in the application of speech recognition: a comparison study," J. of Theoretical &amp; Applied Information Technology, vol. 79, no. 1, pp. 38-56, Sept. 2015.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	A. Mohanta, P. Mukherjee, and V. K. Mirtal, "Acoustic features characterization of autism speech for automated detection and classification," in Proc. National Conf. on Communications, NCC'20, 6 pp., haragpur, India, 21-23 Feb. 2020.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	Z. Sherkatghanad, et al., "Automated detection of autism spectrum disorder using a convolutional neural network," Frontiers in Neuroscience, vol. 13, Article ID: 1325, Jan. 2020.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	S. H. R. E. Motlagh, H. Moradi, and H. Pouretemad, "Using general sound descriptors for early autism detection," in Proc. 9th Asian Control Conf., ASCC'13, 5 pp., Istanbul, Turkey, 23-26 Jun. 2013.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	A. Wijesinghe, P. Samarasinghe, S. Seneviratne, P. Yogarajah, and K. Pulasinghe, "Machine learning based automated speech dialog analysis of autistic children," in Proc. 11th Int. Conf. on Knowledge and Systems Engineering, KSE'19, 5 pp., Da Nang, Vietnam, 24-26 Oct. 2019.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[40]	M. Eni, et al., "Estimating autism severity in young children from speech signals using a deep neural network," IEEE Access, vol. 8, pp. 139489-139500, 2020.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>