﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051922</doi_batch_id><timestamp>20260519223248</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>9</month><day>24</day><year>2016</year></publication_date><journal_volume><volume>4</volume></journal_volume><issue>15</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A Bio-Inspired Self-configuring Observer/ Controller for Organic Computing Systems</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Ali</given_name><surname>Tarihi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hassan</given_name><surname>Haghighi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Fereidoon </given_name><surname>Shams Aliee</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.03.001</doi><resource>http://jist.ir/en/Article/14952</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14952</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14952</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14952</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14952</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14952</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14952</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14952</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] J. O. Kephart and D. M. Chess, “The vision of autonomic computing,” Computer, vol. 36, no. 1, pp. 41–50, 2003.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	C. M&amp;252;ller-Schloer, H. Schmeck, and T. Ungerer, Eds., Organic Computing - A Paradigm Shift for Complex Systems. Springer, 2011.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	U. Richter, M. Mnif, J. Branke, C. M&amp;252;ller-Schloer, and H. Schmeck, “Towards a generic observer/controller architecture for Organic Computing.,” GI Jahrestag. 1, vol. 93, pp. 112–119, 2006.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	A. Berns and S. Ghosh, “Dissecting self- properties,” in Self-Adaptive and Self-Organizing Systems, 2009. SASO’09. Third IEEE International Conference on, 2009, pp. 10–19.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	B. Satzger, A. Pietzowski, W. Trumler, and T. Ungerer, “Using automated planning for trusted self-organising organic computing systems,” in Autonomic and Trusted Computing, Springer, 2008, pp. 60–72.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	H. Seebach, F. Nafz, J.-P. Stegh&amp;246;fer, and W. Reif, “How to Design and Implement Self-organising Resource-Flow Systems,” in Organic Computing—A Paradigm Shift for Complex Systems, Springer, 2011, pp. 145–161.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	M. Salehie and L. Tahvildari, “Self-adaptive software: Landscape and research challenges.,” TAAS, vol. 4, no. 2, Jul. 2009.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	H. Schmeck, C. M&amp;252;ller-Schloer, E. &amp;199;akar, M. Mnif, and U. Richter, “Adaptivity and self-organization in organic computing systems,” ACM Trans Auton Adapt Syst, vol. 5, no. 3, pp. 10:1–10:32, Sep. 2010.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	B. Alberts, D. Bray, J. Lewis, M. Raff, K. Roberts, and J. D. Watson, Molecular Biology of the Cell, 4th ed. Garland, 2002.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	K. Kang, S. Cohen, J. Hess, W. Novak, and S. Peterson, “Feature-Oriented Domain Analysis (FODA) Feasibility Study,” Software Engineering Institute, Carnegie Mellon University, CMU/SEI-90-TR-21, 1990.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	M. Riebisch, “Towards a more precise definition of feature models,” Model. Var. Object-Oriented Prod. Lines, pp. 64–76, 2003.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	K. Lee and K. C. Kang, “Feature dependency analysis for product line component design,” in Software Reuse: Methods, Techniques, and Tools, Springer, 2004, pp. 69–85.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	U. Brinkschulte, M. Pacher, and A. Von Renteln, “Towards an artificial hormone system for self-organizing real-time task allocation,” in Software Technologies for Embedded and Ubiquitous Systems, Springer, 2007, pp. 339–347.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	M. Roth, J. Schmitt, R. Kiefhaber, F. Kluge, and T. Ungerer, “Organic Computing Middleware for Ubiquitous Environments.,” in Organic Computing, C. M&amp;252;ller-Schloer, H. Schmeck, and T. Ungerer, Eds. Springer, 2011, pp. 339–351.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	W. Brockmann, E. Maehle, K.-E. Grosspietsch, N. Rosemann, and B. Jakimovski, “ORCA: An organic robot control architecture,” in Organic Computing—A Paradigm Shift for Complex Systems, Springer, 2011, pp. 385–398.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	F. Nafz, J.-P. Stegh&amp;246;fer, H. Seebach, and W. Reif, “Formal modeling and verification of self-* systems based on observer/controller-architectures,” in Assurances for Self-Adaptive Systems, Springer, 2013, pp. 80–111.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	V. C. Barbosa, An introduction to distributed algorithms. MIT Press, 1996.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	M. Clavel, F. Dur’an, S. Eker, P. Lincoln, N. M. Oliet, J. Meseguer, and C. Talcott, All About Maude - A High-Performance Logical Framework: How to Specify, Program, and Verify Systems in Rewriting Logic. Springer, 2007.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Safe Use of the Internet of Things for Privacy Enhancing</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hojatallah</given_name><surname>Hamidi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.03.002</doi><resource>http://jist.ir/en/Article/14953</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14953</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14953</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14953</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14953</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14953</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14953</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14953</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	E. Rekleitis, P. Rizomiliotis, and S. Gritzalis, “A Holistic Approach to RFID Security and Privacy,” Proc. 1st Int’l Workshop Security of the Internet of Things (SecIoT 10), Network Information and Computer Security Laboratory, 2010 www.nics.uma.es/seciot10/files/pdf/rekleitis_seciot10_paper.pdf.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	D.Clark, ‘Internet of Things’ in reach: Companies rush into devices like smart door locks, appliances, but limitations exist. The Wall Street Journal. Retrieved April 3, 2015, from http://www.wsj.com/articles/SB100014240527 02303640604579296580892973264 .#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	L. Ding, P. Shi, and B. Liu, “The clustering of Internet, Internet of things and social network,” in Proc. 3rd Int. Symp. KAM, Wuhan, China, 2010.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	M. Nitti, R. Girau, L. Atzori, A. Iera, and G. Morabito, “A subjective model for trustworthiness evaluation in the social Internet of things,” in Proc. IEEE 23rd Int. Symp. PIMRC, Sydney, NSW, Australia, 2012, pp. 18–23.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	F. Bao and I.-R. Chen, “Trust management for the Internet of things and its application to service composition,” in Proc. IEEE Int. Symp. Wow Mom, San Francisco, CA, USA, 2012, pp. 1–6.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	C. Occhiuzzi, C. Vallese, S. Amendola, S. Manzari, and G. Marrocco, “NIGHT-Care: A passive RFID system for remote monitoring and control of overnight living environment,” Procedia Computer Science, vol. 32, 2014, pp. 190 – 197.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	B.Xu, L. D. Xu, H. Cai, C. Xie, J. Hu, and F.Bu, “Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services, ” IEEE Transaction on  Industrial Informatics, Vol. 10, No. 2, May 2014.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	A. Sarma and J. Gir&amp;227;o, “Identities in the Future Internet of Things,” Wireless Personal Comm., Mar. 2009, pp. 353-363.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	J. Sen, “Privacy Preservation Technologies in Internet of Things,” Proc. Int’l Conf. Emerging Trends in Mathematics, Technology, and Management, 2011; http://arxiv.org/ftp/arxiv/papers/1012/1012.2177.pdf.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	G. Broenink, “The Privacy Coach: Supporting Customer Privacy in the Internet of Things,” Proc. Workshop on What Can the Internet of Things Do for the Citizen? (CIOT 2010); Radboud University, May 2010; http://dare.ubn.ru.nl/bitstream/2066/83839/1/83839.pdf.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	S. Radomirovic, “Towards a Model for Security and Privacy in the Internet of Things,” Proc. 1st Int’l Workshop on the Security of the Internet of Things (SecIoT 10), Network Information and Computer Security Laboratory, 2010; www.nics.uma.es/seciot10/files/pdf/radomirovic_seciot10_paper.pdf.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	B. D. Weinberg, G. R. Milne, Y. G. Andonova, F. M. Hajjat, “Internet of Things: Convenience vs. privacy and secrecy,” Business Horizons,&amp;quot; Vol.58, No. 6, November-December, 2015, pp.615-624.# </unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	M.Henze, L.Hermerschmidt, D. Kerpen, R.H&amp;228;u&amp;223;ling, B. Rumpe, K. Wehrle, “A comprehensive approach to privacy in the cloud-based Internet of Things,” Future Generation Computer Systems, Vol.56, March 2016, pp. 701-718.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	R. H. Weber, “Internet of things: Privacy issues revisited,” Computer Law &amp;amp; Security Review, Vol. 31, No. 5, October 2015, pp. 618-627.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	A.Botta, W. de Donato, V. Persico, A.Pescap&amp;233;, “Integration of Cloud computing and Internet of Things: A survey Future Generation Computer Systems,” Vol. 56, March 2016, pp.684-700.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	A. Antonić, M. Marjanović, K. Pripužić, I.P. Žarko, “A mobile crowd sensing ecosystem enabled by CUPUS: Cloud-based publish/subscribe middleware for the Internet of Things,” Future Generation Computer Systems, Vol. 56, March 2016, pp.607-622.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	R.Neisse, G.Steri, I. N. Fovino, G. B.SecKit, “A Model-based Security Toolkit for the Internet of Things Computers &amp;amp; Security,” Vol. 54, October 2015, pp. 60-76.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	I. Lee, K. Lee, “The Internet of Things (IoT): Applications, investments, and challenges for enterprises,” Business Horizons, Vol.58, No. 4, July–August 2015, pp. 431-440.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	Texas Instruments. (2014). “Application areas for the Internet of Things,” Retrieved April 3, 2015, from http://www.ti.com/.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	A.Cavoukian, J.Jonas, “Privacy by design in the age of big data. Information and Privacy Commissioner of Ontario,” Canada. 2012.  Available at https://privacybydesign.ca/ content/uploads/2012/06/pbd-big_data.pdf.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	G. R. Milne, “Digital privacy in the marketplace,” New York: Business Expert Press. 2015.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	I.Rubinstein, “Regulating privacy by design,” Berkeley Technology Law Journal, Vol. 26, No.3, 2011, pp.1409-1456.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	H. Packard, “HP study reveals 70 percent of Internet of Things devices vulnerable to attack,” July 29 2014.  Retrieved from http://www8.hp.com/us/en/hp-news/press-release. Html? Id=1744676.VOTykPnF-ok.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	L. Atzori, A. Iera, and G. Morabito, “The Internet of things: A survey,” Comput. Netw, vol. 54, no. 15, pp. 2787–2805, 2010.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	P. Mendes, “Social-driven Internet of connected objects,” in Proc. Interconn. Smart Objects with the Internet Workshop, Lisbon, Portugal, 2011.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	Z. Yan, P. Zhang, A. V. Vasilakos, “A survey on trust management for Internet of Things,” Journal of Network and Computer Applications, Volume 42, June 2014, pp. 120-134.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	Y. Challal, E. Natalizio, S. Sen, A. M. Vegni, “Internet of Things security and privacy: Design methods and optimization, Ad Hoc Networks,” Vol.32, September 2015, pp.1-2.#</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	J. Lee, S.Oh, J. W. Jang, “A Work in Progress: Context based Encryption Scheme for Internet of Things,” Procedia Computer Science, Vol. 56, 2015, pp. 271-275.#</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	V.H. Jeroen. “Fact sheet-Ethics Subgroup IoT -Version 4.0. Conclusions of the Internet of Things public consultation,” 2013. Available at https://ec.europa.eu/digital-agenda/en/news/conclusions-internet-things-public-consultation.#</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	S. H. Rebecca. “Europe’s policy options for a dynamic and trustworthy development of the Internet of Things,” SMART 2012/0053, RAND Corp., European Union 2013, 2013.#</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	A. Samani, H. H. Ghenniwa, A.Wahaishi, “Privacy in Internet of Things: A Model and Protection Framework,” Procedia Computer Science, Vol. 52, 2015, pp. 606-613.#</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	Value Ageing’ project. “Incorporating European Fundamental Values In to ICT for Ageing: A vital political, ethical, technological, and industrial challenge,” Ref. online: www.valueageing.eu#</unstructured_citation></citation><citation key="ref33"><unstructured_citation>[33]	R. H. Weber, “Internet of Things–New security and privacy challenges”. Computer Law &amp;amp; Security Review, Vol. 26, No.1, 2010, pp. 23-30.#</unstructured_citation></citation><citation key="ref34"><unstructured_citation>[34]	C. M. Medaglia, A.Serbanati, “An overview of privacy and security issues in the internet of things,” In The Internet of Things, Springer New York, 2010, pp. 389-395.#</unstructured_citation></citation><citation key="ref35"><unstructured_citation>[35]	J. S.Kumar, D. R. Patel, “A survey on Internet of Things: security and privacy issues,” International Journal of Computer Applications, 2014, Vol. 90, No.11.#</unstructured_citation></citation><citation key="ref36"><unstructured_citation>[36]	S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Computer Networks, Vol.76, 2015, pp.146-164.#</unstructured_citation></citation><citation key="ref37"><unstructured_citation>[37]	Q, Jing, A.V. Vasilakos, J.Wan, J. Lu, D, Qiu, “Security of the internet of things: Perspectives and challenges,” Wireless Networks, Vol. 20, No.8, 2014, pp. 2481-2501.# </unstructured_citation></citation><citation key="ref38"><unstructured_citation>[38]	H.Suo, J.Wan, C. Zou, J. Liu, “Security in the internet of things: a review,” In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on 2012, pp. 648-651.#</unstructured_citation></citation><citation key="ref39"><unstructured_citation>[39]	S. Chabridon, R. Laborde, T. Desprats, A. Oglaza, P.Marie, S.M. Marquez, “A survey on addressing privacy together with quality of context for context management in the internet of things,” Annals of telecommunications-annales des t&amp;233;l&amp;233;communications, Vol.69, No.1, 2014, pp.47-62.# </unstructured_citation></citation><citation key="ref40"><unstructured_citation>[40]	R.Dworkin, “Autonomy and the demented self,” The Milbank Quarterly, Vol.64, No.2, pp.4-16.#</unstructured_citation></citation><citation key="ref41"><unstructured_citation>[41]	A.Gawande, “Being mortal: Medicine and what matters in the end,” New York: Metropolitan Books, Henry Holt &amp;amp; Company, 2014.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Efficient Land-cover Segmentation Using Meta Fusion	</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Morteza</given_name><surname>Khademi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hadi</given_name><surname>Sadoghi Yazdi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.03.003</doi><resource>http://jist.ir/en/Article/14954</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14954</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14954</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14954</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14954</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14954</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14954</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14954</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. Saha and S. Bandyopadhyay, &amp;quot;Application of a New Symmetry-Based Cluster Validity Index for Satellite Image Segmentation,&amp;quot; IEEE Geoscience and Remote Sensing Letters, vol. 5, pp. 166-170, 2008.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	S. Mitra, M. Dickens, and S. Pemmaraju, &amp;quot;Adaptive Clustering for Segmentation of Multi-sensor Images,&amp;quot; 1998.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	M. Z. Ahmed REKIK, Ahmed Ben Hamida, Mohammed Benjelloun, &amp;quot;Review of satellite image segmentation for an optimal fusion system based on the edge and region approaches,&amp;quot; International Journal of Computer Science and Network Security, vol. 7, pp. 242-250, 2007.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	I. Saha, U. Maulik, S. Bandyopadhyay, and D. Plewczynski, &amp;quot;SVMeFC: SVM Ensemble Fuzzy Clustering for Satellite Image Segmentation,&amp;quot; Geoscience and Remote Sensing Letters, IEEE, vol. 9, pp. 52-55, 2012.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	G. Wang, G. Z. Gertner, S. Fang, and A. B. Anderson, &amp;quot;A methodology for spatial uncertainty analysis of remote sensing and GIS products,&amp;quot; Photogrammetric Engineering &amp;amp; Remote Sensing, vol. 71, pp. 1423-1432, 2005.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	C. T. Hunsaker, M. F. Goodchild, M. A. Friedl, and T. J. Case, Spatial uncertainty in ecology: implications for remote sensing and GIS applications: Springer Science &amp;amp; Business Media, 2013.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	H. T. Mowrer and R. G. Congalton, Quantifying spatial uncertainty in natural resources: theory and applications for GIS and Remote Sensing: CRC Press, 2003.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	T. Cheng, &amp;quot;Fuzzy objects: their changes and uncertainties,&amp;quot; Photogrammetric Engineering and Remote Sensing, vol. 68, pp. 41-50, 2002.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	F. Wang and G. B. Hall, &amp;quot;Fuzzy representation of geographical boundaries in GIS,&amp;quot; International Journal of Geographical Information Systems, vol. 10, pp. 573-590, 1996.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	G. Foody, &amp;quot;Fuzzy modelling of vegetation from remotely sensed imagery,&amp;quot; Ecological modelling, vol. 85, pp. 3-12, 1996.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	X. Zhao, A. Stein, and X. Chen, &amp;quot;Application of random sets to model uncertainties of natural entities extracted from remote sensing images,&amp;quot; Stochastic Environmental Research and Risk Assessment, vol. 24, pp. 713-723, 2010.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	P. Fisher, T. Cheng, and J. Wood, &amp;quot;Higher order vagueness in geographical information: Empirical geographical population of type n fuzzy sets,&amp;quot; Geoinformatica, vol. 11, pp. 311-330, 2007.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	T. Cheng and M. Molenaar, &amp;quot;Objects with fuzzy spatial extent,&amp;quot; Photogrammetric Engineering and Remote Sensing, vol. 65, pp. 797-802, 1999.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	G. Rees, Physical principles of remote sensing vol. 1: Cambridge Univ Pr, 2001.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	E. Yasunori, T. Isao, H. Yukihiro, and M. Sadaaki, &amp;quot;Kernelized fuzzy c-means clustering for uncertain data using quadratic penalty-vector regularization with explicit mappings,&amp;quot; in Fuzzy Systems (FUZZ), 2011 IEEE International Conference on, 2011, pp. 804-809.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	B. Kao, S. D. Lee, D. W. Cheung, W.-S. Ho, and K. Chan, &amp;quot;Clustering uncertain data using voronoi diagrams,&amp;quot; in Data Mining, 2008. ICDM&amp;39;08. Eighth IEEE International Conference on, 2008, pp. 333-342.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	G. B. Heuvelink, J. D. Brown, and E. Van Loon, &amp;quot;A probabilistic framework for representing and simulating uncertain environmental variables,&amp;quot; International Journal of Geographical Information Science, vol. 21, pp. 497-513, 2007.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	X. Yu, H. He, D. Hu, and W. Zhou, &amp;quot;Land cover classification of remote sensing imagery based on interval-valued data fuzzy c-means algorithm,&amp;quot; Science China Earth Sciences, vol. 57, pp. 1306-1313, 2014/06/01 2014.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	A. Stein, N. Hamm, and Q. Ye, &amp;quot;Handling uncertainties in image mining for remote sensing studies,&amp;quot; International journal of remote sensing, vol. 30, pp. 5365-5382, 2009.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	Y. El-Sonbaty and M. A. Ismail, &amp;quot;Fuzzy clustering for symbolic data,&amp;quot; IEEE Transaction on Fuzzy Systems, vol. 6, pp. 195–204, 1998.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	S. Lee and M. Crawford, &amp;quot;Unsupervised classification for multi-sensor data in remote sensing using Markov random field and maximum entropy method,&amp;quot; in IEEE 1999 International Geoscience and Remote Sensing Symposium, 1999. IGARSS&amp;39;99 Proceedings., 1999, pp. 1200-1202.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	S. Lee, A. Suh, and M. Jung, &amp;quot;Multi-sensor data classification in remote sensing using MRF regional growing algorithm,&amp;quot; in IEEE 2001 International Geoscience and Remote Sensing Symposium, 2001. IGARSS&amp;39;01., 2001, pp. 2884-2886.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	S. Lee and M. Crawford, &amp;quot;Multi-channel/multi-sensor image classification using hierarchical clustering and fuzzy classification,&amp;quot; in IEEE 2000 International Geoscience and Remote Sensing Symposium, 2000. Proceedings. IGARSS 2000., 2000, pp. 957-959.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	S. Nazarko, &amp;quot;Evaluation of data fusion methods using Kalman filtering and transferable belief model,&amp;quot; Master’&amp;39;s thesis, University of Jyv&amp;228;skyl&amp;228;, 2002.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	X. Dai and S. Khorram, &amp;quot;Data fusion using artificial neural networks: a case study on multitemporal change analysis,&amp;quot; Computers, Environment and Urban Systems, vol. 23, pp. 19-31, 1999.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	H. Ghassemian, &amp;quot;Multisensor Image Fusion by Inverse Subband Coding,&amp;quot; Proceeding of ISPRS-2000, CD, vol. 3.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	M. Hasanzadeh and S. Kasaei, &amp;quot;A Multispectral Image Segmentation Method Using Size-Weighted Fuzzy Clustering and Membership Connectedness,&amp;quot; IEEE Geoscience and Remote Sensing Letters, vol. 7, 2010.#</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	A. A. Naeini, S. Niazmardi, S. R. Namin, F. Samadzadegan, and S. Homayouni, &amp;quot;A Comparison Study Between Two Hyperspectral Clustering Methods: KFCM and PSO-FCM,&amp;quot; in Computational Intelligence and Decision Making, ed: Springer, 2013, pp. 23-33.#</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	A. Bendjebbour, L. Fouque, V. Samson, and W. Pieczynski, &amp;quot;Multisensor Image Segmentation Using Dempster–Shafer Fusion in Markov Fields Context,&amp;quot; IEEE Transaction on Geoscience and Remote Sensing, vol. 38, pp. 1789-1798, 2001.#</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	B. Benmiloud and W. Pieczynski, &amp;quot;Estimation des parameters dans les chaines de Markov cachees et segmentation d&amp;39;images,&amp;quot; Traitement du signal, vol. 12, pp. 433-454, 1995.#</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	N. Giordana and W. Pieczynski, &amp;quot;Estimation of generalized multisensor hidden Markov chains and unsupervised image segmentation,&amp;quot; IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, pp. 465-475, 1997.#</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	A. Bendjebbour and W. Pieczynski, &amp;quot;Multisensor Evidential Hidden Markov Fields and Image Segmentation,&amp;quot; presented at the Second IEEE Interantional Conference on Intelligent Processing Systems (ICIPC&amp;39;98), Australia, 1998.#</unstructured_citation></citation><citation key="ref33"><unstructured_citation>[33]	N. Giordana and W. Pieczynski, &amp;quot;Unsupervised segmentation of multisensor images using generalized hidden Markov chains,&amp;quot; in International Conference on Image Processing, 1996. Proceedings., 1996, pp. 987-990 vol.3.#</unstructured_citation></citation><citation key="ref34"><unstructured_citation>[34]	M. S. Balch, &amp;quot;Methods for Rigorous Uncertainty Quantification with Application to a Mars Atmosphere Model,&amp;quot; Virginia Polytechnic Institute and State University, 2010.#</unstructured_citation></citation><citation key="ref35"><unstructured_citation>[35]	M. Hadi, K. Morteza, and S. Y. Hadi, &amp;quot;Vector fuzzy C-means,&amp;quot; Journal of Intelligent and Fuzzy Systems, vol. 24, pp. 363-381, 2013.#</unstructured_citation></citation><citation key="ref36"><unstructured_citation>[36]	K. L. Wu and M. S. Yang, &amp;quot;Alternative c-means clustering algorithms,&amp;quot; Pattern Recognition, vol. 35, pp. 2267-2278, 2002.#</unstructured_citation></citation><citation key="ref37"><unstructured_citation>[37]	C. C. Chuang, J. T. Jeng, and C. W. Li, &amp;quot; Fuzzy C-Means Clustering Algorithm with Unknown Number of Clusters for Symbolic Interval Data,&amp;quot; presented at the SICE Annual Conference, 2008.#</unstructured_citation></citation><citation key="ref38"><unstructured_citation>[38]	S. Saha and S. Bandyopadhyay, &amp;quot;Application of a Multiseed-Based Clustering Technique for Automatic Satellite Image Segmentation,&amp;quot; IEEE Geoscience and Remote Sensing Letters, vol. 7, pp. 306-308, 2010.#</unstructured_citation></citation><citation key="ref39"><unstructured_citation>[39]	S. Das and S. Sil, &amp;quot;Kernel-induced fuzzy clustering of image pixels with an improved differential evolution algorithm,&amp;quot; Information Sciences, vol. 180, pp. 1237–1256, 2010.#</unstructured_citation></citation><citation key="ref40"><unstructured_citation>[40]	X. L. Xie and G. Beni, &amp;quot;A validity measure for fuzzy clustering,&amp;quot; IEEE Transactions on pattern analysis and machine intelligence, vol. 13, pp. 841-847, 1991.#</unstructured_citation></citation><citation key="ref41"><unstructured_citation>[41]	S.-B. Cho and S.-H. Yoo, &amp;quot;Fuzzy Bayesian validation for cluster analysis of yeast cell-cycle data,&amp;quot; Pattern recognition, vol. 39, pp. 2405-2414, 2006.#</unstructured_citation></citation><citation key="ref42"><unstructured_citation>[42]	P. D&amp;39;Urso and P. Giordani, &amp;quot;A weighted fuzzy c-means clustering model for fuzzy data,&amp;quot; Computational Statistics &amp;amp; Data Analysisvol, vol. 50, pp. 1496-1523, 2006.#</unstructured_citation></citation><citation key="ref43"><unstructured_citation>[43]	F. A. T. D. Carvalho, &amp;quot;Fuzzy clustering algorithms for symbolic interval data based on adaptive and non-adaptive Euclidean distances,&amp;quot; in Proceedings of the Ninth Brazilian Symposium on Neural Networks (SBRN&amp;39;06), 2006, pp. 60-65.#</unstructured_citation></citation><citation key="ref44"><unstructured_citation>[44]	F. A. T. D. Carvalho, &amp;quot;Fuzzy c-means clustering methods for symbolic interval data,&amp;quot; Pattern Recognition Letters, vol. 28, pp. 423–437, 2007.#</unstructured_citation></citation><citation key="ref45"><unstructured_citation>[45]	M. Ben Salah, A. Mitiche, and I. Ben Ayed, &amp;quot;Effective level set image segmentation with a kernel induced data term,&amp;quot; Image Processing, IEEE Transactions on, vol. 19, pp. 220-232, 2010.#</unstructured_citation></citation><citation key="ref46"><unstructured_citation>[46]	D. Oliva, E. Cuevas, G. Pajares, D. Zaldivar, and V. Osuna, &amp;quot;A Multilevel Thresholding algorithm using electromagnetism optimization,&amp;quot; Neurocomputing, vol. 139, pp. 357-381, 2014.#</unstructured_citation></citation><citation key="ref47"><unstructured_citation>[47]	D. Oliva, E. Cuevas, G. Pajares, D. Zaldivar, and M. Perez-Cisneros, &amp;quot;Multilevel thresholding segmentation based on harmony search optimization,&amp;quot; Journal of Applied Mathematics, vol. 2013, 2013.#</unstructured_citation></citation><citation key="ref48"><unstructured_citation>[48]	H. Greenspan, A. Ruf, and J. Goldberger, &amp;quot;Constrained Gaussian mixture model framework for automatic segmentation of MR brain images,&amp;quot; Medical Imaging, IEEE Transactions on, vol. 25, pp. 1233-1245, 2006.#</unstructured_citation></citation><citation key="ref49"><unstructured_citation>[49]	M. L. Comer and E. J. Delp, &amp;quot;The EM/MPM algorithm for segmentation of textured images: Analysis and further experimental results,&amp;quot; Image Processing, IEEE Transactions on, vol. 9, pp. 1731-1744, 2000.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Preserving Data Clustering with Expectation Maximization Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Leila</given_name><surname>Jafar Tafreshi	</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Farzin</given_name><surname>Yaghmaee</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.03.004</doi><resource>http://jist.ir/en/Article/14955</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14955</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14955</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14955</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14955</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14955</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14955</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14955</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	NIRT, RGPV, and Sajjan Singh Nagar, “A review paper on Privacy-Preserving Data Mining.” Scholars Journal of Engineering and Technology (SJET), Vol. 1, No. 3, pp. 117-121, 2013.# </unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	Lokesh Patel, Prof. Ravindra Gupta, “A Survey of Perturbation Technique for Privacy-Preserving of Data.” International Journal of Emerging Technology and Advanced Engineering, Vol. 3, No. 6, pp. 162-166, 2013.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	Jharna Chopra, Sampada Satav, “Privacy preservation techniques in data mining.” International Journal of Research in Engineering and Technology (IJRET), Vol. 2, No. 4, pp. 537-541, Year  2013.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	Tamanna Kachwala, Dr. L. K. Sharma, “A Literature analysis on Privacy Preserving Data Mining.” International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 4, April 2015.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	A.P. Dempster, N.M. Laird, D.B. Rubin, “Maximum Likelihood from Incomplete Data via the EM Algorithm.” Journal of the Royal Statistical Society, Series B, Vol. 39, No. 1, pp. 1–38,1977.# </unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	Ronica Raj, Veena Kulkarni, “A Study on Privacy Preserving Data Mining: Techniques, Challenges and Future Prospects.” International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 11, November 2015.# </unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	R. Agrawal and R. Srikant. “Privacy Preserving DataMining.” In Proc. ACM SIGMOD Conference on Management of Data, Dallas, Texas, 2000, pp. 439-450.# </unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	S. R. M. Oliveira, and O. R.Zaiyane, “Achieving Privacy Preservation When Sharing Data for Clustering.” In Proc. Workshop on Secure Data Management in a Connected World, in conjunction with VLDB, Toronto, Ontario, Canada, 2004, pp. 67–82.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	Kun Liu, Hillol Kargupta, Senior Member, IEEE, and Jessica Ryan, “Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining.” IEEE transactions on knowledge  and data engineering, Vol. 18, No. 1, PP. 92-106, 2006.# </unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	Liming Li, Sch. of Manage, Fuzhou Univ, Fuzhou, Qishan Zhang, “A Privacy preserving Clustering Technique Using Hybrid Data Transformation Method.” in In Proc. IEEE International Conference, 2009, PP. 1502 - 1506.# </unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	Mohammad Ali Kadampur, D.V.L.N Somayajulu, S.S. Shivaji Dhiraj, and Shailesh G.P. Satyam, “Privacy preserving clustering by cluster bulging for information sustenance.” In Proc. 4th International Conference on Information and Automation for Sustainability (ICIAfS), Colombo, Sri Lanka, 2008, pp. 158-164.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	Jie Liu, Yifeng XU, Harbin, “privacy preserving clustering by Random Response Method of Geometric Transformation.” In Proc. Fourth international conference on internet computing for science and engineering, 2009, pp. 181-188.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	Keke Chen, Ling Liu, “Geometric data perturbation for privacy preserving outsourced data mining.” Knowledge and Information Systems journal, Volume 29, Issue 3, pp 657-695, December 2011.#   </unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	Khaled Alotaibi, V. J. Rayward-Smith, Wenjia Wang, and Beatriz de la Iglesia, “Non-linear Dimensionality Reduction for Privacy-Preserving Data Classification.” in Proc. ASE/IEEE International Conference on Social Computing, 2012 and ASE/IEEE International Conference on Privacy, Security, Risk and Trust, 2012, pp. 694 - 701.# </unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	Ms Shalini Lamba, Dr S. Qamar Abbas, “A model for preserving privacy of sensitive data.” International Journal of Technical Research and Applications Vol. 1, No. 3, PP. 07-11, 2013.#  </unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	MohammadReza Keyvanpour, Somayyeh Seifi Moradi, “Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification–based Framework.” International Journal on Computer Science and Engineering (IJCSE), Vol. 3, No. 2, Feb 2011.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	Keerti Dixit, Bhupendra Pandya, “An overview of Multiplicative data perturbation for privacy preserving Data mining.” International Journal for research in applied science and engineering technology (I JRAS ET), Vol. 2, Issue VII, pp 90-96, July 2014.# </unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	CHEN, K., and LIU, L. “A random rotation perturbation approach to privacy preserving data classification.” In Proc. Intl. Conf. on Data Mining (ICDM) 2005.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	http://www.cs.waikato.ac.nz/ml/weka/#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Promote Mobile Banking Services by using National Smart Card Capabilities and NFC Technology	</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Reza</given_name><surname>Vahedi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sayed Esmaeail</given_name><surname>Najafi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Farhad</given_name><surname>Hosseinzadeh Lotfi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.03.005</doi><resource>http://jist.ir/en/Article/14956</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14956</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14956</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14956</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14956</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14956</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14956</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14956</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	https://en.wikipedia.org/wiki/Mobile_banking.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	https://en.wikipedia.org/wiki/Near_field_communication.# </unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	Project Management Office, National smart card  applications, Tehran: NOCR, 2010, pp.5-45.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	Project Management Office, Some of the dimensions of a national smart card application, Tehran: NOCR, 2010, pp.12-67.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	A. Riyazi, National Smart Card (Secure, standards, biometrics), Tehran: Nass, 2009, pp.63-101.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	NOCR Education Center, The National Smart Card- structure and its role in e-government, Tehran: Institute of Danesh Parsiyan, 2011, pp.51-64.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	Project Management Office, National Smart Card Project for Metropolitan Architecture, Tehran: NOCR, 2010, pp.167-198.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	S. M. Arabi, and N. Azad, &amp;quot;The effects of the implementation of the ASYCUDA system in the country&amp;#39;s business sector&amp;quot;, Iranian journal of Trade Studies, Vol. 29, pp.137-165, 2003.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	M. Barkhordari Firouzabadi, and S. Mohammadi, &amp;quot;A Review and Proposal of a Model for Patient Authentication and NFC Mobile Payment with Smart Health Card&amp;quot;, in 1st National E-Conference of Technology Developments on Electrical, Electoroncs and Computer Engineering, Iran, 2015.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	A. Hosseinpour Soleymani, and M. Yousefi,&amp;quot; Introduction to NFC technology and its application in mobile payments&amp;quot;, in the 1st Regional Conference on Information Technology, Iran, 2013.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	A. Mohammadzadeh, and M. Ataei, and H. Salimi, &amp;quot;Identifying and Prioritizing the Obstacles Leading to Bank Overdue, Using DEMATEL and VIKOR&amp;quot;, Journal of Development Evolution Management, Vol.16, pp.15-26, 2014.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	M. Tabatabaei, and S, Hosseini, and A. Noori, &amp;quot; Identify and prioritize the criteria of quality services MCDM approach in the banking industry&amp;quot;, in 9th International Conference on Industrial Engineering, Iran, 2013.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Data Aggregation Tree Structure in Wireless Sensor Networks Using Cuckoo Optimization Algorithm	</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Elham</given_name><surname>Mohsenifard</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Behnam</given_name><surname>Talebi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.03.006</doi><resource>http://jist.ir/en/Article/14957</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14957</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14957</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14957</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14957</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14957</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14957</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14957</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Yick, B. Mukherjee, and D. Ghosal. “Wireless sensor network survey.”  Computer networks, vol. 52, pp. 2292-2330, 2008.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	A. Ghaffari. “Congestion control mechanisms in wireless sensor networks: A survey. ” Journal of Network and Computer Applications, vol. 52, pp. 101-115, 2015.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	A. Ghaffari. “An energy efficient routing protocol for wireless sensor networks using A-star algorithm.” Journal of applied research and technology, vol. 12, pp. 815-822, 2014.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	Z. Mottaghinia and A. Ghaffari. “A Unicast Tree-Based Data Gathering Protocol for Delay Tolerant Mobile Sensor Networks.” Information Systems &amp;amp; Telecommunication, pp. 59, 2016.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	X. Zhu, G. Chen, S. Tang, X. Wu, and B. Chen. “Fast Approximation Algorithm for Maximum Lifetime Aggregation Trees in Wireless Sensor Networks.” INFORMS Journal on Computing, vol. 28, pp. 417-431, 2016.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	A. Ghaffari, L. Darougaran, and A. Shiri. “Comparing data aggregation methods in wireless sensor networks.” presented at the Third national symposium on computer engineering and information technology, 2010.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	S. Upadhyayula and S. K. Gupta. “ Spanning tree based algorithms for low latency and energy efficient data aggregation enhanced convergecast (dac) in wireless sensor networks. Ad Hoc Networks, vol. 5, pp. 626-648, 2007.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	A. jhumka, M. Bradbury, and S. Saginbeko. “Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks.” Parallel Distributed Computing, vol. 74, pp. 1789-1801, 2014.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	R. R. Rout and S. Ghosh. “Adaptive data aggregation and energy efficiency using network coding in a clustered wireless sensor network: An analytical approach.” Computer Communications pp. 65-75, 2014.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	SH. Niu, C. Wang, Z. Yu, and S. Cao. “Lossy data aggregation integrity scheme in wireless sensor networks.” Computers and Electrical Engineering, vol. 39, pp. 1726-1735, 2013.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	S. park. “ performance Analysis of Data Aggregation Schemes For wirless sensor network, 2006.# </unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	S. Sicari, L. Grieco, G. Boggia, and A. Coen-Porisini. “DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks.” The Journal of Systems and Software, vol. 85, pp. 152-166, 2012.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	Q. Liua, Y.Changa, and X. Jiab. “A hybrid metod of CSM/CA and TDMA for real-time data aggregation in wireless sensor networks.” Computer Communications, vol. 39, pp. 269-278, 2013.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	W. Wu, J. Cao, H. Wu, and J.Li. “Robust and dynamic data aggregation in wireless sensor networks: A cross-layer approach.” Computer Networks, vol. 57, pp. 3929-3940, 2013.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	H. Yousefi, M. Yeganeh, N.Alinaghipour, and A. Movaghar. “Structure-free real-time data aggregation in wireless sensor networks.” Computer Communications, vol. 35, pp. 1132-1140, 2012.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	H.Li, CH.Wua, Q. Huab, and F. Lau. “Latency-minimizing data aggregation in wireless sensor networks under physical interference mode.” Ad Hoc Networks, vol. 12, pp. 52-68, 2014.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	S. Ozdemir and Y.Xiao. “Integrity protecting hierarchical concealed data aggregation for wireless sensor networks.” Computer Networks, vol. 55, pp. 1735-1746, 2011.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	R. Rajabioun. “Cuckoo Optimization Algorithm.” Applied soft computing, vol. 11, pp. 5508- 5518, 2011.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	H. &amp;214;. Tan and I. K&amp;246;rpeoǧlu. “Power efficient data gathering and aggregation in wireless sensor networks.” ACM Sigmod Record, vol. 32, pp. 66-71, 2003.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	S. Hussain and O. Islam. “An energy efficient spanning tree based multi-hop routing in wireless sensor networks.” in 2007 IEEE Wireless Communications and Networking Conference, 2007, pp. 4383-4388.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	P.Wang, Y. He, and L.Huang. “Near optimal scheduling of data aggregation in wireless sensor networks.” Ad Hoc Networks, vol. 11, pp. 1287- 1296, 2013.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	CH.Chaon and T. Hsiao. “Design of structure-free and energy-balanced data aggregation in wireless sensor networks.” vol. 37, pp. 229-239, 2014.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	H.Liu, Z.Liu, D.Li, X.Lub, and H.Due. “Approximation algorithms for minimum latency data aggregation in wireless sensor networks with directional antenna.” Theoretical Computer Science, vol. 497, pp. 139-153, 2013.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	W. -H. Liao, Y. Kao, and C.-M. Fan. “An ant colony algorithm for data aggregation in wireless sensor networks.” in Sensor Technologies and Applications, 2007. SensorComm 2007. International Conference on, 2007, pp. 101-106.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	O. Islam, S. Hussain, and H. Zhang. “Genetic Algorithm for Data Aggregation Trees in Wireless Sensor Networks.” 2007.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	S. Lai and B.Ravindran. “Achieving Max–Min lifetime and fairness with rate allocation for data aggregation in sensor networks.” Ad Hoc Networks, vol. 9, pp. 821-834, 2011.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	S. Kwond, J. H. Ko, and J.Kim. “Dynamic timeout for data aggregation in wireless sensor networks.” Computer Network, vol. 55, pp. 650-664, 2011.#</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	J.AL-Karaki, R.Mustafa, and A.Kamal. “Data aggregation and routing in Wireless Sensor Networks: Optimal and heuristic algorithms.” Computer Network, vol. 53, pp. 954-960, 2009.#</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	Y. Zhang, J. Pu, X. Liu, and Z. Chen. “An adaptive spanning tree-based data collection scheme in wireless sensor networks.” International Journal of Distributed Sensor Networks, vol. 2015, p. 2, 2015.#</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	X. Xu, R. Ansari, A. Khokhar, and A. V. Vasilakos. “Hierarchical data aggregation using compressive sensing (HDACS) in WSNs.” ACM Transactions on Sensor Networks (TOSN), vol. 11, p. 45, 2015.#</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	N.-T. Nguyen, B.-H. Liu, V.-T. Pham, and Y.-S. Luo. “On maximizing the lifetime for data aggregation in wireless sensor networks using virtual data aggregation trees.” Computer Networks, vol. 105, pp. 99-110, 2016.#</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	I. Atoui, A. Ahmad, M. Medlej, A. Makhoul, S. Tawbe, and A. Hijazi. “Tree-based data aggregation approach in wireless sensor network using fitting functions.” in 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), 2016, pp. 146-150.#</unstructured_citation></citation><citation key="ref33"><unstructured_citation>[33]	S. Abbasi-Daresari and J. Abouei. “Toward cluster-based weighted compressive data aggregation in wireless sensor networks.” Ad Hoc Networks, vol. 36, pp. 368-385, 2016.#</unstructured_citation></citation><citation key="ref34"><unstructured_citation>[34]	J. Kennedy and R. Eberhart. “Particle swarm optimization.” in Neural Networks, 1995. Proceedings., IEEE International Conference on, 1995, pp. 1942-1948 vol.4.#</unstructured_citation></citation><citation key="ref35"><unstructured_citation>[35]	E. Atashpaz-Gargari and C. Lucas. “Imperialist competitive algorithm: An algorithm for optimization inspired by imperialistic competition.” in 2007 IEEE Congress on Evolutionary Computation, 2007, pp. 4661-4667.#</unstructured_citation></citation><citation key="ref36"><unstructured_citation>[36]	R. Masoudi and A. Ghaffari. “Software defined networks: A survey.” Journal of Network and Computer Applications, vol. 67, pp. 1-25, 2016.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Instance Based Sparse Classifier Fusion for Speaker Verification</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Hasheminejad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hassan</given_name><surname>Farsi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.03.007</doi><resource>http://jist.ir/en/Article/14958</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14958</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14958</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14958</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14958</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14958</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14958</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14958</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	X. Zhou, A. S. d’Avila Garcez, H. Ali, S. N. Tran, and K. Iqbal, “Unimodal late fusion for NIST i-vector challenge on speaker detection,” Electron. Lett., vol. 50, no. 15, pp. 1098–1100, 2014.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	H. L. Ville Hautamӓki, Tomi Kinnunen, Filip Sedl&amp;225;k, Kong Ail Lee, Bin Ma, “Sparse Classifier Fusion for Speaker Verification,” IEEE Trans. Audio, Speech Lang. Process., vol. 21, no. 8, pp. 1622–1631, 2013.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	Z. Lei, Y. Yang, and Z. Wu, “Ensemble of support vector machine for text-independent speaker recognition,” IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 6, no. 5, pp. 163–167, 2006.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	A. Kumar and B. Raj, “Unsupervised Fusion Weight Learning in Multiple Classifier Systems,” arXiv:1502.01823, Feb. 2015.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	K. Lai, D. Liu, S. Chang, and M. Chen, “Learning Sample Specific Weights for Late Fusion,” Image Process. IEEE Trans., vol. 24, no. 9, pp. 2772–2783, 2015.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	R. Saeidi, J. Pohjalainen, T. Kinnunen, and P. Alku, “Temporally weighted linear prediction features for tackling additive noise in speaker verification,” IEEE Signal Process. Lett., vol. 17, no. 6, pp. 599–602, 2010.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	F.I. Cabeceran, “Fusing prosodic and acoustic information for robust speaker recognition,” Ph.D dissertation, TALP Research Center, Speech Processing Group, Universitat Polit&amp;232;cnica de Catalunya Barcelona, July 2008.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	M. J. Alam, T. Kinnunen, P. Kenny, P. Ouellet, and D. O’Shaughnessy, “Multitaper MFCC and PLP features for speaker verification using i-vectors,” Speech Commun., vol. 55, no. 2, pp. 237–251, Feb. 2013.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	W. M. Campbell, D. E. Sturim, D. A. Reynolds, and A. Solomonoff, “SVM Based Speaker Verification using a GMM Supervector Kernel and NAP Variability Compensation,” 2006 IEEE Int. Conf. Acoust. Speech Signal Process. Proc., vol. 1, no. 2, pp. 1–3, 2006.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	C. You, K.-A. Lee, and H. Li, “GMM-SVM kernel with a Bhattacharyya-based distance for speaker recognition,” IEEE Trans. Audio, Speech Lang. Process., vol. 18, no. 6, pp. 1300–1312, 2010.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	P. Mat, M. Kara, and P. Kenny, “full-covariance ubm and heavy-tailed plda in i-vector speaker verification,” Acoustics, Speech and Signal Processing (ICASSP), IEEE International Conference on, Prague, Czech Republic, 22 May - 27 May 2011 pp. 4516–4519, 2011.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	A. Solomonoff, W. M. Campbell, and I. Boardman, “Advances in channel compensation for SVM speaker recognition,” in International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Philadelphia PA, USA, 2005, pp. 629–632.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	P. Emerson, Designing an All-Inclusive Democracy. Springer, 2007.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	W. M. Campbell, D. E. Sturim, W. Shen, D. A. Reynolds, and J. Navr&amp;225;til, “The MIT-LL/IBM 2006 speaker recognition system: High-performance reduced-complexity recognition,” in ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, Honolulu, Hawaii, USA, 15-20 April 2007.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	S. Chernbumroong, S. Cang, and H. Yu, “Genetic Algorithm-based Classifiers fusion for multi-sensor activity recognition of elderly people,” IEEE J. Biomed. Heal. informatics, vol. 19, no. 1, pp. 282 – 289, 2014.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	C. M. Bishop, Pattern recogintion and machine learning (Information Science and Statistics). Springer, 2007.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	S. Pigeon, P. Druyts, and P. Verlinde, “Applying logistic regression to the fusion of the NIST’99 1_speaker submissions,” Digit. Signal Process., vol. 10, no. 1–3, pp. 237–248, 2000.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	M. Schmidt, G. Fung, and R. Rosales, “Fast Optimization Methods for L1 Regularization: A Comparative Study and Two New Approaches,” Lect. Notes Comput. Sci., vol. 4701, pp. 286–297, 2007.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	N. Br&amp;252;mmer, “Measuring, refining and calibrating speaker and language information extracted from speech,” Ph.D dissertation, Faculty of Engineering, University of Stellenbosch, 2010.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	S. Wang and X. Yao, “Relationships between diversity of classification ensembles and single-class performance measures,” IEEE Trans. Knowl. Data Eng., vol. 25, no. 1, pp. 206–219, 2013.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	C. Magi, J. Pohjalainen, T. B&amp;228;ckstr&amp;246;m, and P. Alku, “Stabilised weighted linear prediction,” Speech Commun., vol. 51, no. 5, pp. 401–411, 2009.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	S. O. Sadjadi, M. Slaney, and L. Heck, “MSR Identity Toolbox v1. 0: A matlab toolbox for speaker-recognition research,” Speech Lang. Process. Tech. Comm. Newsl., 2013.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	N. Br&amp;252;mmer and E. de Villiers, “Bosaris toolkit [software package],” 2011. [Online]. Available: https://sites.google.com/site/bosaristoolkit/.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>The Surfer Model with a Hybrid Approach to Ranking the Web Pages	</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Javad</given_name><surname>Paksima</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Homa </given_name><surname>Khajeh</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.03.008</doi><resource>http://jist.ir/en/Article/14959</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14959</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14959</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14959</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14959</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14959</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14959</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14959</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	R. Albert, H. Jeong, and A.-L. Barab&amp;225;si. “Internet: Diameter of the world-wide web,” Nature, vol. 401, no. 6749, pp. 130–131, Sep. 1999.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	S. Lawrence and C. L. Giles. “Accessibility of information on the web,” Nature, vol. 400, no. 6740, p. 107, Jul. 1999.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	K. Purcell, J. Brenner, and L. Rainie. (2012, Oct.). “Search Engine Use 2012,” PEW Research Center, [Online]. p. 42, 2012  Available: http://www.pewinternet.org/2012/03/09/search-engine-use-2012/. [Sep. 1,2014].#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	S. E. Robertson, and S. Walker. &amp;quot;Some simple effective approximations to the 2-poisson model for probabilistic weighted retrieval,&amp;quot; in Proc. 17th annual international ACM SIGIR conf. Research and development information retrieval, Springer-Verlag New York, Inc, 1994, pp. 232-241.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	G. Salton and C. Buckley. “Term-weighting approaches in automatic text retrieval.” Information processing and management, vol. 24, no. 5, pp. 513–523, Dec. 1988.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	M. R. Henzinger, R. Motwani, and C. Silverstein. “Challenges in web search engines.” In ACM SIGIR Forum, vol. 36, no. 2, pp. 11–22, Sep. 2002.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	L. Page, S. Brin, R. Motwani, and T. Winograd. “The PageRank Citation Ranking: Bringing Order to the Web.” World Wide Web Internet Web Information System, vol. 54, no. 1999–66, pp. 1–17, Jan. 1998.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	G.-R. Xue, Q. Yang, H.-J. Zeng, Y. Yu, and Z. Chen. “Exploiting the hierarchical structure for link analysis,” in Proc. 28th annual international ACM SIGIR Conf. Research and development in information retrieval, 2005, pp. 186–193.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	A.-L. Barab&amp;225;si and R. Albert, “Emergence of scaling in random networks.” Science, vol. 286, pp. 509–512, Oct. 1999.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	J. M. Kleinberg. “Authoritative Sources in a Hyperlinked Environment.” Journal of the ACM (JACM), vol. 46, pp. 668–677, Sep. 1999.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	F. Qiu and J. Cho. “Automatic identification of user interest for personalized search,” in Proc. 15th int. conf. World Wide Web, 2006, pp. 727–736.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	G. Salton. The SMART retrieval system—experiments in automatic document processing. Amsterdam: IOS Press, 1971.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	P. Ghodsnia, A. M. Z. Bidoki, and N. Yazdani. “A punishment/reward based approach to ranking,” in Proc. 2nd int. conf. Scalable information systems, 2007, p. 58.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	W.-C. Peng and Y.-C. Lin. “Ranking web search results from personalized perspective,” in E-Commerce Technology, 2006. 8th IEEE Int. Conf. Enterprise Computing, E-Commerce, and E-Services, 3rd IEEE Int. Conf., 2006, p. 12.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	A. Kritikopoulos, M. Sideri, and I. Varlamis, “WordRank: A Method for Ranking Web Pages Based on Content Similarity,” presented at Databases, 2007. BNCOD’07. 24th British Nat. Conf., 2007, pp. 92–100.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	W. Xing and A. Ghorbani, “Weighted pagerank algorithm,” Commun. Networks and Services Research, 2004. in Proc.. 2nd Annual Conf., 2004, pp. 305–314.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	Z. Gy&amp;246;ngyi, H. Garcia-Molina, and J. Pedersen. “Combating web spam with trustrank,” in Proc. 30th Int. Conf. Very large data bases-Vol. 30, 2004, pp. 576–587.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	S. Pandey, S. Roy, C. Olston, J. Cho, and S. Chakrabarti. “Shuffling a stacked deck: the case for partially randomized ranking of search engine results,” in Proc. 31st Int. Conf. Very large data bases, 2005, pp. 781–792.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	E. Khodadadian, M. Ghasemzadeh, V. Derhami, and S. A. Mirsoleimani, “A novel ranking algorithm based on Reinforcement Learning.” presented at 16th CSI Int. Symposium on Artificial Intelligence and Signal Processing (AISP 2012), 2012, pp. 546–551.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	V. Derhami, E. Khodadadian, M. Ghasemzadeh, and A. M. Zareh Bidoki. “Applying reinforcement learning for web pages ranking algorithms.” Applied Soft Computing, vol. 13, no. 4, pp. 1686–1692, Apr. 2013.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	A. M. Zareh Bidoki and N. Yazdani. “DistanceRank: An intelligent ranking algorithm for web pages.” Information Processing and Management, vol. 44, no. 2, pp. 877–892, Mar. 2008.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	R. Lempel, and S. Moran. &amp;quot;SALSA: the stochastic approach for link-structure analysis.&amp;quot; ACM Transactions on Information Systems (TOIS), vol. 19, no. 2, pp. 131-160, Apr. 2001.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	A. Shakery and C. Zhai. “Relevance Propagation for Topic Distillation UIUC TREC 2003 Web Track Experiments.” in TREC 2003, 2003, pp. 673–677.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	A. M. Z. Bidoki and J. A. Thom. “Combination of documents features based on simulated click-through data.” in Advances in Information Retrieval, Springer Berlin Heidelberg, 2009, pp. 538–545.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	L. Rodrigues and S. Jaswal. “An Efficient Page Ranking Approach Based on Hybrid Model.” presented at Adv. in Computing and Communation Engeering (ICACCE), 2015 2nd Int. Conf., 2015, pp. 693–696.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	T. H. Haveliwala. “Topic-Sensitive PageRank.” in Proc. 11th Int. Conf. World Wide Web, Www2002.Org, 2002, pp. 517–526.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	K. S. Narendra and M. A. L. Thathachar. Learning automata: an introduction. Courier Corporation, 2012.#</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	S. Lakshmivarahan and M. A. L. Thathachar. “Bounds on the convergence probabilities of learning automata.” IEEE Transactions on Systems, Man, and Cybernetics, A Systems Humans, vol. 6, no. 11, pp. 756–763, Nov. 1976.#</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	E. Billard and S. Lakshmivarahan. “Learning in multilevel games with incomplete information. I.” Systems Man, and Cybernetics Part B Cybernetics IEEE Trans., vol. 29, no. 3, pp. 329–339, Jun. 1999.#</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	J. A. Torkestani and M. R. Meybodi. “A New Vertex Coloring Algorithm Based on Variable Aaction-Set Learning Automata.” Computing and Informatics, vol. 29, no. 3, pp. 447–466, Jan. 2012.#</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	N. Kumar, N. Chilamkurti, and J. J. P. C. Rodrigues. “Learning automata-based opportunistic data aggregation and forwarding scheme for alert generation in vehicular ad hoc networks.” Computer Communications, vol. 39, pp. 22–32, Feb. 2014.#</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	M. Hasanzadeh and M. R. Meybodi. “Grid resource discovery based on distributed learning automata.” Computing, vol. 96, no. 9, pp. 909–922, Sep. 2014.#</unstructured_citation></citation><citation key="ref33"><unstructured_citation>[33]	S. Bhattacharyya, A. Sengupta, T. Chakraborti, A. Konar, and D. N. Tibarewala. “Automatic feature selection of motor imagery EEG signals using differential evolution and learning automata.” Medical &amp;amp; biological engineering &amp;amp; computing, vol. 52, no. 2, pp. 131–139, Feb. 2014.#</unstructured_citation></citation><citation key="ref34"><unstructured_citation>[34]	J. Akbari Torkestani. “An adaptive learning to rank algorithm: Learning automata approach,” Decision Support Systems, vol. 54, no. 1, pp. 574–583, Dec. 2012.#</unstructured_citation></citation><citation key="ref35"><unstructured_citation>[35]	J. A. Torkestani. “An adaptive focused web crawling algorithm based on learning automata.” Applied Intelligence, vol. 37, no. 4, pp. 586–601, Dec. 2012.#</unstructured_citation></citation><citation key="ref36"><unstructured_citation>[36]	H. Beigy and M. R. Meybodi. “A mathematical framework for cellular learning automata.” Advances in Complex Systems, vol. 7, no. 03n04, pp. 295–319, Sep. 2004.#</unstructured_citation></citation><citation key="ref37"><unstructured_citation>[37]	T. H. Haveliwala. (1999,Oct.). “Efficient computation of PageRank,” Technical Report, Database Group, Computer Science Department, Stanford University, [On-line]. 1999. Available: http://ilpubs.stanford.edu:8090/386/ [Dec., 1, 2014].#</unstructured_citation></citation><citation key="ref38"><unstructured_citation>[38]	T. Qin, T. Y. Liu, J. Xu, and H. Li. “LETOR: A benchmark collection for research on learning to rank for information retrieval,” Information Retrieval, vol. 13, no. 4, pp. 346–374, Jan. 2010.#</unstructured_citation></citation><citation key="ref39"><unstructured_citation>[39]	J. Xu, T.-Y. Liu and H. Li. “The Evaluation Tool in LETOR,” Microsoft Research Asia [Online]. Available: http://research.microsoft.com/en-us/um/beijing/projects/letor/LETOR3.0/EvaluationTool.zip [Dec. 1,2014].#</unstructured_citation></citation><citation key="ref40"><unstructured_citation>[40]	T.-Y. Liu. Learning to Rank for Information retrieval, Springer Science &amp;amp; Business Media, 2011.#</unstructured_citation></citation><citation key="ref41"><unstructured_citation>[41]	D. H. T. N. Sander Bockting. “A cross-benchmark comparison of 87 learning to rank methods.” Information processing &amp;amp; management, vol. 51, no. 6, pp. 757–772, Nov. 2015.#</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>