﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051919</doi_batch_id><timestamp>20260519195914</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>12</month><day>24</day><year>2016</year></publication_date><journal_volume><volume>4</volume></journal_volume><issue>16</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Short Time Price Forecasting for Electricity Market Based on Hybrid Fuzzy Wavelet Transform and Bacteria Foraging Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>keyvan</given_name><surname>Borna</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sepideh</given_name><surname>Palizdar</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.04.001</doi><resource>http://jist.ir/en/Article/14994</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14994</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14994</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14994</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14994</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14994</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14994</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14994</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	International Energy Outlook 2005, Energy Information Administration; http://www.eia.doe.gov/iea.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	Patel, M.R., ”Electricity price and solar power systems”, CRC Press LLC, 1999.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	Global power source, Global electricity price energy council, http://www.gwec.net/.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	Cota, A., ”A review on the young history of electricity price power short term prediction”, Journal on Renewable Energy Review, vol. 12, Issue 6, pp. 1725-1744, 2008.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	Sideratos, G. Hatziargyriou, N.D. “An Advanced Statistical Method for Electricity price Power Forecasting”, IEEE Transaction on power systems, Nat. Tech. Univ. of Athens , vol. 22, Issue 1, pp. 258-265, Feb 2007.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	Hui, L., Hong-Qi, T., Chao, C., Yan-fei, L. “A Hybrid Statistical to Predict Electricity price Speed and Electricity price Power”, Renewable energy, Science direct, December 2009.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	Monfared, M., Rastegar, H., Kojabadi, H. M. “On Comparing Three Artificial Neural Networks for Electricity price Speed Forecasting”, Applied energy, Science direct, January 2010.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	MATLAB, Mathematical Foundations of Multiple Linear Regressions, R2007a.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	Sahin, A. D., Zekai, S., “First-order Markov chain approach to electricity price speed modeling”, Journal of wind Engineering and Industrial Aerodynamics 89 (2001) 263-269.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	Shamshad, A., Bawadi, M.A., Wan Hussin, W.M.A., Majid, T.A., Sanusi, S.A.M., “First and second order Markov chain models for synthetic generation of electricity price speed time series”, Energy 30 (2005) 693-708.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	Kennedy, J., and Eberhart, R., “Particle Swarm Optimization”, IEEE International Conference on Neural Networks, pp. 1942-1948, 1995.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	M. Monfared, H. Rastegar , H. M. Kojabadi “A New Strategy for Electricity price Speed Forecasting Using Artificial Intelligent Methods”, Renewable energy, Science direct, Vol. 34, Issue 3, pp. 845-848, March 2009.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	A. Motamedi, H. Zareipour, W.D. Rosehart, &amp;quot;Electricity Price and Demand Forecasting in Smart Grids&amp;quot;, IEEE Transactions on Smart Grid, vol. 3, pp. 664-674, 2012.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Identification of a Nonlinear System by Determining of Fuzzy Rules</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>hojatallah</given_name><surname>hamidi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Atefeh </given_name><surname>Daraei</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.04.002</doi><resource>http://jist.ir/en/Article/14995</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14995</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14995</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14995</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14995</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14995</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14995</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14995</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. Chen, S.A. Billings, Representation of non-linear systems: the NARMAX model, Int. J. Control 49 (1989) 1013–1032.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	H. Hujiberts, H. Nijmeijer, R. Willems, System identification in communication with chaotic systems, IEEE Trans. Circuits Syst. I 47 (6), 2000, pp. 800–808.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	M. Adjrad, A. Belouchrani, Estimation of multi component polynomial phase signals impinging on a multisensor array using state-space modeling, IEEE Trans. Signal Process. 55 (1), 2007.pp. 32–45.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	K. Watanbe, I. Matsuura, M. Abe, M. Kebota, D.M. Himelblau, Incipient fault diagnosis of chemical processes via artificial neural networks, AICHE J. 35 (11) (1989) 1803–1812.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	Y. Xie, B. Guo, L. Xu, J. Li, P. Stoica, Multistatic adaptive microwave imaging for early breast cancer detection, IEEE Trans. Biomed. Eng. 53 (8), 2006, pp. 1647–1657.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	D. Chen, J. Wang, F. Zou, H. Zhang, W. Hou, “Linguistic fuzzy model identification based on PSO with different length of particles”, Applied Soft Computing 12, pp. 3390–3400, 2012.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	C. F. Juang, and P. H. Chang, “Designing Fuzzy-Rule-Based Systems Using Continuous Ant-Colony Optimization”, IEEE Trans on Fuzzy Syst., vol. 18, no. 1, pp. 138-149, Feb 2010.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	C. F. Juang, C. Lo, “Zero-order TSK-type fuzzy system learning using a two-phase swarm intelligence algorithm”, Fuzzy Sets and Systems 159, 2910 – 2926, 2008.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	R. Storn, System design by constraint adaptation and differential evolution, IEEE Trans. Evol. Comput. 3 (1999) 22–34.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	J. Ilonen, J.K. Kamarainen, J. Lampinen, Differential evolution training algorithm for feed forward neural networks, Neural Proc. Lett. 17 (2003) 93–105.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	E. Goldberg, J. Richardson, Genetic algorithms with sharing for multimodal function optimization, in: J. Richardson (Ed.), Genetic Algorithms and their Applications (ICGA’87)., 1987, pp. 41–49.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	K. Kristinsson, G.A. Dumont, System identification and control using genetic algorithms, IEEE Trans. Syst. Man Cybernet. 22 (1992) 1033–1046.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	J. Ilonen, J.K. Kamarainen, J. Lampinen, Differential evolution training algorithm for feed forward neural networks, Neural Proc. Lett. 17, 2003, pp.93–105.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	R. Storn, System design by constraint adaptation and differential evolution, IEEE Trans. Evol. Comput. 3, 1999, pp. 22–34.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	H.R. Tizhoosh, Opposition-based learning: a new scheme for machine intelligence, in: Proc. Int. Conf. Comput. Intell. Modeling Control and Autom, vol. I, Vienna, Austria, 2005, pp. 695–701.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	S. Rahnamayan, H.R. Tizhoosh, M.M.A. Salama, Opposition Versus Randomness in Soft Computing Techniques, Elsevier J. Appl. Soft Comput. 8 (March (2)), 2008, pp. 906–918.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	S. Rahnamayan, H.R. Tizhoosh, M.M.A. Salama, Opposition-based differential evolution, IEEE Trans. Evol. Comput. 12 (1), 2008.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	K. V. Price, R. M. Storn, and J. A. Lampinen, &amp;quot;Differential Evolution: A Practical Approach to Global Optimization&amp;quot;, (Kindle Edition). Springer, 2005.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	H.R. Tizhoosh, Opposition-based learning: a new scheme for machine intelligence, in: Proc. Int. Conf. Comput. Intell. Modeling Control and Autom, vol. I, Vienna, Austria, 2005, pp. 695–701.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	J. Kennedy, R. Eberhart, “Particle swarm optimization”, in: Proc. IEEE Internat. Conf. Neural Networks, Perth, Australia, pp. 1942–1948, 1995.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	C. F. Juang, C. W. Hung and C. H. Hsu, “Rule-Based Cooperative Continuous Ant Colony Optimization to Improve the Accuracy of Fuzzy System Design”, IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 4, AUGUST 2014.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	W. Zhao, Q. Niu, K. Li and G. W. Irwin, “A Hybrid Learning Method for Constructing Compact Rule-Based Fuzzy Models”, IEEE TRANSACTIONS ON CYBERNETICS, VOL. 43, NO. 6, DECEMBER 2013. #</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	H.Hamidi, “A Model for Impact of Organizational Project Benefits Management and its Impact on End User”, JOEUC, Volume 29, Issue 1, 2017, pp.50-64.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	K.Mohammadi, H.Hamidi., Modeling and Evolution of Fault-Tolerant Mobile Agents in Distributed System.The Second IEEE and IFIP International Conference on wireless and Optical Communications Networks (WOCN 2005), March 6 –8, 2005.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	S. A.Monadjemi, H.Hamidi, A.Vafaei. Analysis and Evaluation of a New Algorithm Based Fault Tolerance for Computing Systems. International Journal of Grid and High Performance Computing (IJGHPC), 4(1), 2012, pp. 37-51. </unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	S. A.Monadjemi, H..Hamidi., A.Vafaei.  “ANALYSIS AND DESIGN OF AN ABFT AND PARITY-CHECKING TECHNIQUE IN HIGH PERFORMANCE COMPUTING SYSTEMS” Journal of Circuits, Systems, and Computers (JCSC), JCSC Volume 21 Number 3, 2012.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	A.Vafaei., S. A.Monadjemi, H..Hamidi., Evaluation of Fault Tolerant Mobile Agents in Distributed Systems. International Journal of Intelligent Information Technologies (IJIIT), 5(1), 2009, pp.43-60. #</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	A.Vafaei, S. A.Monadjemi, H.Hamidi “Evaluation and Check pointing of Fault Tolerant Mobile Agents Execution in Distributed Systems,” Journal of Networks, VOL. 5, NO. 7. 2009. #</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	H.Hamidi, A New Method for Transformation Techniques in Secure Information Systems Journal of Information Systems and Telecommunication, Vol. 4, No. 1, January-March 2016, pp. 19-26.#</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	X. Ye,  T.Sakurai, “Robust Similarity Measure for Spectral Clustering Based on Shared Neighbors,” ETRI Journal, vol. 38, no. 3, June. 2016, pp. 540-550.#</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	 J.Wu, F. Ding, M. Xu, Z. Mo, A..Jin. Investigating the Determinants of Decision-Making on Adoption of Public Cloud Computing in E-government. JGIM, 24(3), 2016, pp. 71-89.#</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	 S. KUMAR, &amp;quot;Performance Evaluation of Novel AMDF-Based Pitch Detection Scheme,&amp;quot; ETRI Journal, vol. 38, no. 3, June. 2016, pp. 425-434. #</unstructured_citation></citation><citation key="ref33"><unstructured_citation>[33]	B. Shadloo, A. Motevalian, V. Rahimi-movaghar, M.A. Esmaeili, V. Sharifi, A. Hajebi, R. Radgoodarzi, M. Hefazi, A. Rahimi- Movaghar, Psychiatric Disorders Are Associated with an Increased Risk of Injuries: Data from the Iranian Mental Health Survey, Iranian Journal of Public Health 45(5), 2016, pp. 623-635.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>	Automatic Facial Emotion Recognition Method Based on Eye Region Changes</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mina </given_name><surname>Navraan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>charkari</given_name><surname>charkari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Muharram</given_name><surname>Mansoorizadeh</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.04.003</doi><resource>http://jist.ir/en/Article/14996</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14996</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14996</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14996</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14996</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14996</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14996</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14996</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Kaimin Yu, “Toward Realistic Facial Expression Recognition“, Doctoral dissertation, School of Information Technologies at The University of Sydney, 2013.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	P.Viola, MJ. Jones, “Robust Real-Time Face Detection“, Interna-tional Journal of Computer Vision, 57(2):137{154, May 2004.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	Li,Peiyao, “Adaptive feature extraction and selection for robust facial expression“, Master of Engineering by Research thesis, University of Wollongong, School of Electrical, Computer and Telecommunications Engineering,UniversityofWollongong,2010.http://ro.uow.edu.au/theses/3268.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	A. Mehrabian, “Communication without words“. Psychology today, vol.2, no.4, pp.53-56, 1968.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	M. Mansoorizadeh, N. Moghaddam Charkari, “Multimodal information fusion application to humanemotion recognition from face and speech“ Springer Science, Multimed Tools Appl 2010.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	Z. Zeng, M. Pantic, G.I. Rosman, and T.S. Huang. “A Survey of Af-fection Recognition Methods: Audio, Visual, and Spontaneous Expressions“.IEEE Transactions on Pattern Analysis and Machine Intelligence, 31(1):39{58,January 2009.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	A.Samal, A. Lyengar. “Automatic recognition and analysis of human faces and facial expressions: a survey“. Pattern Recognition, 25(1):65{77,January 1992.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	M.Pantic, J.M. Rothkrantz. “ Automatic Analysis of Facial Ex pressions: The State of the Art“. IEEE Transaction on Pattern Analysis and Machine I Intelligence, 22(12):1424{1445, December 2000.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	B.Fasel, J.Luettin. “ Automatic facial expression analysis: a Survey“,Pattern Recognition, 36(1):259{275, January 2003.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	Y.Tian, Takeo Kanade,F. Cohn, “Facial Expression Analysis.In Handbook of Face Recognition“, Springer New York, 2005.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	Y.Tian, T. Kanade, and J. Cohn. “Eye-state action unit detection by Gabor wavelets“,In Proceedings of International Conference on Multi-modalInterfaces, pages 143{150, 2000.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	Y. Tian, T. Kanade, and J. Cohn. “Evaluation of gabor-wavelet-based facialaction unit recognition in image sequences of increasing complexity“, In IEEEInternational Conference on Automatic Face and Gesture Recognition, page 229,2002.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	Y. Tian, T. Kanade and J. Cohn, “Recognizing Action Units for Facial Expression Analysis,” IEEE Trans. Pattern Analysis and Machine Intelligence,vol. 23, no. 2, pp. 97–115, 2001.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	I. Kotsia, I. Buciu and I. Pitas, “An Analysis of Facial Expression Recognition under Partial Facial Image Occlusion,” Image and Vision Computing, vol. 26, no. 7, pp. 1052-1067, July 2008.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	I. Cohn, N. Sebe, F. Cozman, M. Cirelo, and T. Huang, “Learning Bayesian Network Classifiers for Facial Expression Recognition Using  Both Labeled and Unlabeled Data,” Proc. IEEE Conf. Computer Vision and Pattern Recognition(CVPR),vol. 1, pp. I-595-I-604, 2003.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	I. Cohn, N. Sebe, A. Garg, L.S. Chen, and T.S. Huang, “Facial Expression Recognition From Video Sequences: Temporal and Static Modeling”, Computer Vision and Image Understanding,vol. 91, pp. 160-187, 2003.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	M. Jones, P. Viola. “Fast Multi-view Face Detection“, Technical report, Mitsubishi Electric Research Laboratories, 2003.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	J. Wu, S.C. Brubaker, M. Mullin, and J. Rehg. “Fast asymmetric learning for cascade face detection“, IEEE Transaction on Pattern Analysis and Machine Intelligence, 30(3):369{382, 2008.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	M. Pantic, M. Rothkrantz. “Facial action recognition for facial expressionanalysis from static face images“, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 34(3):1449{1461, June 2004.# </unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	M. Pantic,I. Patras, “Dynamics of facial expression: recognition of facial actions and their temporal segments from face profile image sequences“,IEEETransactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 36(2):433{449, April 2006.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	G. Donato, M. Bartlett, J. Hager, P. Ekman, and T. Sejnowski. “Classifying facial actions“, IEEE Transactions on Pattern Analysis and Machine Intelligence,21(10):974{989, 1999.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	S.Koelstra, M.Pantic, “A Dynamic Texture-Based Approach to Recognition of Facial Actions and Their Temporal Models“,IEEE TRANSACTIONS on Pattern Analysis and Machine  Intelligence, VOL. 32, NO. 11, NOVEMBER 2010.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	M.S. Bartlett, G. Littlewort, I. Fasel, and R. Movellan, “Real Time Face Detection and Facial Expression Recognition: Development and Application to Human Computer Interaction,” Proc. CVPR Workshop on Computer Vision and Pattern Recognition for Human-Computer Interaction,vol. 5, 2003.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	A.Savran,  B. Sankur, M. Taha Bilge, ”Regression-based intensity estimation of facial action units”, Image and Vision Computing 2012.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	M. Pantic and L. Rothkrantz, &amp;quot;Expert System for Automatic Analysis of Facial Expression&amp;quot;, Image and Vision Computing J., Vol. 18, No. 11, p. 881-905,2000.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	C. Zhan, W. Li, P. Ogunbona,F. Safaei, A Real-Time Facial Expression Recognition Systemfor Online Games, International Journal of Computer Games Technology, Volume 2008.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	Ekman, P. and Friesen, W. V, &amp;#39;Detecting deception from body or face.&amp;#39;Journal of  Nonverb Behav,(1974).#</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	D.Reisfeld and Y.Yeshurun,”Robust detection of facial features by generalized symmetry”, in Proceeding of 11th IAPR International Conference on Pattern Recognition, PP.117-120, 1992.#</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	G.A. Ramirez and O.Fuentes,”Face detection using combination of classifiers”, in Proceeding of The Canadian Conference on Computer and Robot Vision, PP.610-615,2005.#</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	P.Zhang,”A video-based face detection and recognition system using cascade face verification modules”,in Proceeding of 37th IEEE Applied Imagery Pattern Recognition Workshop, PP.1-8, 2008.#</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	B.Yipp,”Face and eye rectification in video conference using artificial neutral network”, in IEEE International Conference on Multimedia and Expo,PP.690-693,2005.#</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	[32] P.Viola, M.J.Jones, and D.Snow,”Dtecting pedestrians using patterns of motion and appearance”, in Proceeding of Ninth IEEE International Conrefence on Computer Vision, Vol.2,PP.734-741, 2002.#</unstructured_citation></citation><citation key="ref33"><unstructured_citation>[33]	Z. Zhang, M.J. Lyons, M. Schuster, and S. Akamatus. “Comparison betweengeometry-based and Gabor-wavelets-based facial expression recognition usingmulti-layer perceptron”. In IEEE International Conference on Automatic Face&amp;amp; Gesture Recognition, 1998.#</unstructured_citation></citation><citation key="ref34"><unstructured_citation>[34]	R.E. Kaliouby and P. Robinson. “Real-time inference of complex mental states from facial expressions and head gestures”. In IEEE CVPR Workshop on Real-time Vision for HumanCComputer Interaction, 2004.#</unstructured_citation></citation><citation key="ref35"><unstructured_citation>[35]	Michel Valstar, I. Patras, and M. Pantic. “Facial Action Unit Detection using Probabilistic Actively Learned Support Vector Machines on Tracked Facial Point”. In IEEE Conference on Computer Vision and Pattern Recognition, page 76, 2005.#</unstructured_citation></citation><citation key="ref36"><unstructured_citation>[36]	G. Ford. “Tutorial on gabor filters”. Technical report, Machine Perception Lab, Institute of Neural Computation, 2002.#</unstructured_citation></citation><citation key="ref37"><unstructured_citation>[37]	Ying-Li Tian, T. Kanade, and J. Cohn. “Eye-state action unit detection by Gabor wavelets”. In Proceedings of International Conference on Multi-modal Interfaces, pages 143{150, 2000.#</unstructured_citation></citation><citation key="ref38"><unstructured_citation>[38]	T. Ojala, M. Pietikainen, and D. Harwood. “A comparative study of texture measures with classification based on featured distribution”. Pattern Recognition, 29(1):51{59, 1996.#</unstructured_citation></citation><citation key="ref39"><unstructured_citation>[39]	T. Ahonen, A. Hadid, and M. Pietikainen. “Face recognition with local binary Patterns”. In European Conference on Computer Vision, 2004.#</unstructured_citation></citation><citation key="ref40"><unstructured_citation>[40]	X. Feng, A. Hadid, and M. Pietikainen. “A coarse-to-fine classification scheme for facial expression recognition”. In International Conference on Image Analysis and Recognition, 2004.#</unstructured_citation></citation><citation key="ref41"><unstructured_citation>[41]	Caifeng Shan, Shaogang Gong, and Peter W. McOwan. “Facial expression recognition based on Local Binary Patterns: A comprehensive study”. Image andVision Computing, 27(6):803{816, May 2009.#</unstructured_citation></citation><citation key="ref42"><unstructured_citation>[42]	M.S.Barlett, G.Littlewort, M.Frank, C.Lainscsek, I.Fasel, and J.Movellan. “Recognizing Facial Expression: Machine Learning and Application to Spontaneous Behavior”. In Computer Vision and Pattern Recognition, 2005.# </unstructured_citation></citation><citation key="ref43"><unstructured_citation>[43]	P. Lekshmi.V1. , Dr.M.Sasikumar, “Analysis of Facial Expression using Gabor and SVM” , International Journal of Recent Trends in Engineering, Vol. 1, No. 2, May 2009.#</unstructured_citation></citation><citation key="ref44"><unstructured_citation>[44]	M.S. Bartlett, G. Littlewort, M.G. Frank, C. Lainscsek, I. Fasel, and J. Movellan, “Fully Automatic Facial Action Recognition in Spontaneous Behavior,” Proc. IEEE Int’l Conf. Automatic Face and Gesture Recognition (AFGR ’06), pp. 223-230, 2006.#</unstructured_citation></citation><citation key="ref45"><unstructured_citation>[45]	M. Osadchy, Y. LeCun, and M. Miller. “Synergistic face detection and pose estimation with energy-based models”. Journal of Machine Learning Research, 8:1197{1215, May 2007.#</unstructured_citation></citation><citation key="ref46"><unstructured_citation>[46]	B. Heisele, T. Serre, and T. Poggio. “A component-based framework for face detection and identification. “,International Journal of Computer Vision, 74(2):167{181, 2007.#</unstructured_citation></citation><citation key="ref47"><unstructured_citation>[47]	D. Keren, M. Osadchy, and C. Gotsman. “Antifaces: A novel fast method for image detection”. IEEE Transaction on Pattern Analysis and Machine Intelligence,23(7):747{761, 2001.#</unstructured_citation></citation><citation key="ref48"><unstructured_citation>[48]	H. Schneiderman and T. Kanade.” Object detecion using the statistics of parts”. International Journal of Computer Vision, 56(3):151{177, 2004.#</unstructured_citation></citation><citation key="ref49"><unstructured_citation>[49]	M. Pardas and A. Bonafonte, “Facial animation parameters extraction and expression recognition using Hidden Markov Models,” Signal Processing: Image Communication,vol. 17, pp.675–688, 2002.#</unstructured_citation></citation><citation key="ref50"><unstructured_citation>[50]	M.J. Lyons, S. Akamatsu, M. Kamachi, and J. Gyoba. “Coding facial expression with Gabor wavelets”. In IEEE International Conference on Automatic Face &amp;amp;Gesture Recognition, pages 200{205, 1998.#</unstructured_citation></citation><citation key="ref51"><unstructured_citation>[51]	Priya Metri, Jayshree Ghorpade, Ayesha Butalia, &amp;quot; Facial Emotion Recognition Using Context Based  Multimodal Approach&amp;quot;, International Journal of Emerging Sciences, 2(1), 171-182, March 2012.#</unstructured_citation></citation><citation key="ref52"><unstructured_citation>[52]	Ekman, Paul, and Wallace V. Friesen. “Manual for the facial action coding system”. Consulting Psychologists Press, 1978.#</unstructured_citation></citation><citation key="ref53"><unstructured_citation>[53]	Wu, Tingfan, Marian S. Bartlett, and Javier R. Movellan. &amp;quot;Facial expression recognition using gabor motion energy filters.&amp;quot; In Computer Vision and Pattern Recognition Workshops (CVPRW), 2010 IEEE Computer Society Conference on, pp. 42-47. IEEE, 2010.#</unstructured_citation></citation><citation key="ref54"><unstructured_citation>[54]	Zhang, Ligang, Dian Tjondronegoro, and Vinod Chandran. &amp;quot;Random Gabor based templates for facial expression recognition in images with facial occlusion.&amp;quot; Neurocomputing 145 (2014): 451-464.#</unstructured_citation></citation><citation key="ref55"><unstructured_citation>[55]	Kanade, Takeo, Jeffrey F. Cohn, and Yingli Tian. &amp;quot;Comprehensive database for facial expression analysis.&amp;quot; In Automatic Face and Gesture Recognition, 2000. Proceedings. Fourth IEEE International Conference on, pp. 46-53. IEEE, 2000.#</unstructured_citation></citation><citation key="ref56"><unstructured_citation>[56]	Wallhoff, Frank. &amp;quot;Facial expressions and emotion database.&amp;quot; Technische    Universit&amp;#228;t M&amp;#252;nchen (2006).#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Semantic Approach to Person Profile Extraction from Farsi Web Documents</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hojjat</given_name><surname>Emami</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hossein</given_name><surname>Shirazi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>ahmad</given_name><surname>abdolahzade</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.04.004</doi><resource>http://jist.ir/en/Article/14997</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14997</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14997</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14997</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14997</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14997</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14997</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14997</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	P. Saeedi, H. Faili, and A. Shakery, “Semantic role induction in Persian: An unsupervised approach by using probabilistic models,” Lit. Linguist. Comput., 2014.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	M. Shamsfard, “Challenges and open problems in Persian text processing,” in Proceedings of 5th Language &amp;amp; Technology Conference (LTC), Poznań, Poland, 2011, pp. 65–69.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	H. Fadaei and M. Shamsfard, “Extracting conceptual relations from Persian resources,” in ITNG2010 - 7th International Conference on Information Technology: New Generations, Las Vegas, Nevada, USA, 2010, pp. 244–248.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	M. Moradi, B. Vazirnezhad, and M. Bahrani, “Commonsense Knowledge Extraction for Persian Language: A Combinatory Approach,” Iran. J. Inf. Process. Manag., vol. 31, no. 1, pp. 109–124, 2015.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	M. Shamsfard, “Lexico-syntactic and Semantic Patterns for Extracting Knowledge from Persian Texts,” Int. J. Comput. Sci. Eng., vol. 2, no. 6, pp. 2190–2196, 2010.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	S. Soderland, N. Hawkins, G. L. Kim, and D. S.Weld, “University of Washington System for 2015 KBP Cold Start Slot Filling,” in Proceedings of TAC-KBP 2015, Maryland, USA, 2015.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	W. Li, R. Srihari, C. Niu, and X. Li, “Entity profile extraction from large corpora,” in Pacific Association for Computational Linguistics Conference (PACLING-2003), Harifax, Canada, 2003.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	X. YU and W. LAM, “An Integrated Probabilistic and Logic Approach to Encyclopedia Relation Extraction with Multiple Features,” in Proceedings of the 22nd International Conference on Computational Linguistics (Coling 2008), Manchester, UK, 2008, pp. 1065–1072.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	T. Lee, Z. Wang, H. Wang, and S. Hwang, “Attribute extraction and scoring: A probabilistic approach,” in ICDE 2013, Brisbane, Australia, 2013, pp. 194–205.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	F. M. Suchanek, G. Ifrim, and G. Weikum, “Combining Linguistic and Statistical Analysis to Extract Relations from Web Documents,” in Proceedings of KDD, Philadelphia, Pennsylvania, USA, 2006, pp. 712–717.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	J. Zhu, Z. Nie, X. Liu, B. Zhang, and J.-R. Wen, “StatSnowball : a Statistical Approach to Extracting Entity,” in Proceedings of the 18th international conference on World wide web, Madrid, Spain, 2009, pp. 101–110.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	N. Bach and S. Badaskar, “A review of relation extraction,” Lit. Rev. Lang. Stat. II, 2007.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	A. Sun, R. Grishman, and S. Sekine, “Semi-supervised relation extraction with large-scale word clustering,” in Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics, Portland, Oregon, USA, 2011, pp. 521–529.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	F. Xu, “Bootstrapping Relation Extraction from Semantic Seeds,” Saarland University, Saarbr&amp;#252;cken, Germany, 2007.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	F. Wu and D. S.Weld, “Autonomously Semantifying Wikipedia,” in Proceedings of CIKM’ 07, Lisboa, Portugal, 2007, pp. 41–50.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	M. Mintz, S. Bills, R. Snow, and D. Jurafsky, “Distant supervision for relation extraction without labeled data,” in Proceedings of the 47th Annual Meeting of the ACL and the 4th IJCNLP of the AFNLP, Suntec , Singapore, 2009, pp. 1003–1011.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	K. Eichler, H. Hemsen, and G. Neumann, “Unsupervised relation extraction from Web documents,” in Proceeding of the 6th International Conference on Language Resources and Evaluation, Marrakech, Morocco, 2008, pp. 1674–1679.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	M. Banko, M. Cafarella, and S. Soderland, “Open information extraction from the web,” in International Joint Conferences on Artificial Intelligence, Hyderabad, India, 2007, pp. 2670–2676.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	S. Soderland, B. Roof, B. Qin, and S. Xu, “Adapting Open Information Extraction to Domain-Specific Relations,” AI Mag., vol. 31, no. 3, pp. 93–102, 2010.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	S. Soderland, J. Gilmer, R. Bart, O. Etzioni, and D. Weld, “Open Information Extraction to KBP Relations in 3 Hours,” in Proceedings of TAC-KBP 2013, Maryland, USA, 2013.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	M. Yahya, S. E. Whang, R. Gupta, and A. Halevy, “ReNoun: Fact Extraction for Nominal Attributes,” in Proceedings of EMNLP 2014, Doha, Qatar, 2014, pp. 325–335.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	R. C. Bunescu and R. J. Mooney, “A shortest path dependency kernel for relation extraction,” in Proceedings of the Human Language Technology Conference and Conference on Empirical Methods in Natural Language Processing, Vancouver, Canada, 2005, pp. 724–731.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	M. Surdeanu, S. Harabagiu, J. Williams, and P. Aarseth, “Using predicate-argument structures for information extraction,” in Proceedings of the 41st Annual Meeting on Association for Computational Linguistics - ACL ’03, Morristown, NJ, USA, 2003, pp. 8–15.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	M. Gregory, L. Mcgrath, E. Bell, K. O. Hara, and K. Domico, “Domain Independent Knowledge Base Population From Structured and Unstructured Data Sources,” in Twenty-Fourth International FLAIRS Conference, Palm Beach, Florida, USA, 2011, pp. 251–256.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	P. Exner and P. Nugues, “Using semantic role labeling to extract events from Wikipedia,” in CEUR Workshop Proceedings, Bonn, Germany, 2011, pp. 38–47.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	A. Moro and R. Navigli, “Integrating Syntactic and Semantic Analysis into the Open Information Extraction Paradigm,” in Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence, Beijing, China, 2013, pp. 2148–2154.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	C. Delli Bovi, L. Telesca, and R. Navigli, “Large-Scale Information Extraction from Textual Definitions through Deep Syntactic and Semantic Analysis,” Trans. Assoc. Comput. Linguist., vol. 3, pp. 529–543, 2015.#</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	A. Moro, A. Raganato, and R. Navigli, “Entity Linking meets Word Sense Disambiguation : a Unified Approach,” Trans. Assoc. Comput. Linguist., vol. 2, pp. 231–244, 2014.#</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	M. A. Heart, “Automatic Acquisition of Hyponyms from Large Text Corpora Lexico-Syntactic for Hyponymy Patterns,” in Proceedings of the 14th conference on Computational linguistics, Stroudsburg, PA, USA, 1992, pp. 539–545.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	H. Emami, H. Shirazi, A. A. Barforoush, and M. Hourali, “A Pattern-Matching Method for Extracting Personal Information in Farsi Content,” U.P.B. Sci. Bull., Ser. C, vol. 78, no. 1, pp. 125–138, 2016.#</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	R. Al-Rfou, V. Kulkarni, B. Perozzi, and S. Skiena, “Polyglot-NER: Massive Multilingual Named Entity Recognition,” in Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, British Columbia, Canada, 2015, pp. 586–594.#</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	E. Minkov, R. C. Wang, and W. W. Cohen, “Extracting Personal Names from Email : Applying Named Entity Recognition to Informal Text,” Comput. Linguist., pp. 443–450, 2005.#</unstructured_citation></citation><citation key="ref33"><unstructured_citation>[33]	Y. Chen, S. Y. Mei Lee, and C. R. Huang, “A robust web personal name information extraction system,” Expert Syst. Appl., vol. 39, no. 3, pp. 2690–2699, 2012.#</unstructured_citation></citation><citation key="ref34"><unstructured_citation>[34]	Z. M. Arani and A. Abdollahzadeh Barforoush, “Semantic Role Labeling using Syntactic Dependency Analysis and Noun Semantic Catergory,” in 20th Annual Conference of Computer Society of Iran, Mashhad, Iran (In Farsi), 2015, pp. 619–624.#</unstructured_citation></citation><citation key="ref35"><unstructured_citation>[35]	K. Kipper, A. Korhonen, N. Ryant, and M. Palmer, “A large-scale classification of English verbs,” Lang. Resour. Eval., vol. 42, no. 1, pp. 21–40, 2008.#</unstructured_citation></citation><citation key="ref36"><unstructured_citation>[36]	H. Mohagheghiyan, “Comparison of Persian Syntactic Dependency Parsers,” Vali-e-Asr University of Rafsanjan, Rafsanjan, Iran, 2015.#</unstructured_citation></citation><citation key="ref37"><unstructured_citation>[37]	M. Surdeanu, “Overview of the TAC2013 Knowledge Base Population Evaluation: English Slot Filling and Temporal Slot Filling,” in Proceedings of the Sixth Text Analysis Conference (TAC 2013), Maryland, USA, 2013.#</unstructured_citation></citation><citation key="ref38"><unstructured_citation>[38]	M. Surdeanu and H. Ji., “Overview of the English Slot Filling Track at the TAC2014 Knowledge Base Population Evaluation,” in Proceedings of Text Analysis Conference (TAC2014), Maryland, USA, 2014.#</unstructured_citation></citation><citation key="ref39"><unstructured_citation>[39]	C. Fellbaum, “WordNet: An Electronic Lexical Database,” MIT Press, 1998.#</unstructured_citation></citation><citation key="ref40"><unstructured_citation>[40]	M. Shamsfard, A. Hesabi, H. Fadaei, N. Mansoory, A. Famian, S. Bagherbeigi, E. Fekri, M. Monshizadeh, and S. M. Assi, “Semi Automatic Development Of FarsNet: The Persian Wordnet,” in Proceedings of 5th Global WordNet Conference, Mumbai, India, 2010.#</unstructured_citation></citation><citation key="ref41"><unstructured_citation>[41]	C. J. Fillmore, C. R. Johnson, and M. R. L. Petruck, “Background to FrameNet,” Int. J. Lexicogr., vol. 16, no. 3, pp. 1–28, 2002.#</unstructured_citation></citation><citation key="ref42"><unstructured_citation>[42]	C. Bonial, K. Stowe, and M. Palmer, “Renewing and revising SemLink,” in The GenLex Workshop on Linked Data in Linguistics, Pisa, Italy, 2013, pp. 9–17.#</unstructured_citation></citation><citation key="ref43"><unstructured_citation>[43]	G. Angeli, A. Chaganty, A. Chang, K. Reschke, J. Tibshirani, J. Y. Wu, O. Bastani, K. Siilats, and C. D. Manning, “Stanford’s 2013 KBP System,” in Proceedings of the Sixth Text Analysis Conference (TAC2013), Maryland, USA, 2013.#</unstructured_citation></citation><citation key="ref44"><unstructured_citation>[44]	J. Christensen, S. Soderland, and O. Etzioni, “Semantic Role Labeling for Open Information Extraction,” in Proceedings of the NAACL HLT 2010 First International Workshop on Formalisms and Methodology for Learning by Reading, Los Angeles, California, 2010, pp. 52–60.#</unstructured_citation></citation><citation key="ref45"><unstructured_citation>[45]	A. Fader, S. Soderland, and O. Etzioni, “Identifying relations for open information extraction,” in Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing (EMNLP), Edinburgh, UK, 2011, pp. 1535–1545.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>[46]	J. R. Landis and G. G. Koch, “The measurement of observer agreement for categorical data,” Biometrics, vol. 33, no. 1, pp. 159–174, 1977.#</unstructured_citation></citation><citation key="ref47"><unstructured_citation>[47]	D. M. W. Powers, “Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness and Correlation,” J. Mach. Learn. Technol., vol. 2, no. 1, pp. 37–63, 2011.#</unstructured_citation></citation><citation key="ref48"><unstructured_citation>[48]	K. Balog, J. He, C. Monz, M. Tsagkias, K. Hofmann, V. Jijkoun, W. Weerkamp, and M. De Rijke, “The University of Amsterdam at WePS2,” in 2nd Web People Search Evaluation Workshop (WePS 2009), 18th WWW Conference, Madrid, Spain, 2009.#</unstructured_citation></citation><citation key="ref49"><unstructured_citation>[49]	Y. Chen, S. Lee, and C. Huang, “Polyuhk: A robust information extraction system for web personal names,” 2nd Web People Search Eval. Work. (WePS 2009), 18th WWW Conf. Madrid, Spain, 2009.#</unstructured_citation></citation><citation key="ref50"><unstructured_citation>[50]	J. Artiles, J. Gonzalo, and S. Sekine, “Weps 2 evaluation campaign: overview of the web people search clustering task,” in 2nd Web People Search Evaluation Workshop (WePS 2009), 18th WWW Conference, Madrid, Spain, 2009.#</unstructured_citation></citation><citation key="ref51"><unstructured_citation>[51]	I. Nagy, “Person Attribute Extraction from the Textual Parts of Web Pages,” Acta Cybern., vol. 20, no. 3, pp. 419–440, 2012.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Effective Risk Computation Metric for Android Malware Detection	</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mahmood</given_name><surname>Deypir</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>	Ehsan</given_name><surname>Sharifi	</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.04.005</doi><resource>http://jist.ir/en/Article/14998</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14998</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14998</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14998</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14998</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14998</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14998</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14998</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Gates, C. S., Chen, J., Li, N., &amp;amp; Proctor, R. W. (2014). Effective risk communication for android apps. Dependable and Secure Computing, IEEE Transactions on, 11(3), 252-265.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	Gates, C. S., Li, N., Peng, H., Sarma, B., Qi, Y., Potharaju, R., &amp;amp; Molloy, I. (2014). Generating summary risk scores for mobile applications. Dependable and Secure Computing, IEEE Transactions on, 11(3), 238-251.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	Chin, E., Felt, A. P., Sekar, V., &amp;amp; Wagner, D. (2012, July). Measuring user confidence in smartphone security and privacy. In Proceedings of the Eighth Symposium on Usable Privacy and Security (p. 1). ACM.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	Felt, A. P., Greenwood, K., &amp;amp; Wagner, D. (2011, June). The effectiveness of application permissions. In Proceedings of the 2nd USENIX conference on Web application development (pp. 7-7).#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., &amp;amp; Wagner, D. (2012). Android permissions: User attention, comprehension, and behavior. Tech. Rep. UCB/EECS-2012-26, UC Berkeley.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	Kelley, P. G., Consolvo, S., Cranor, L. F., Jung, J., Sadeh, N., &amp;amp; Wetherall, D. (2012). A conundrum of permissions: installing applications on an android smartphone. In Financial Cryptography and Data Security (pp. 68-79). Springer Berlin Heidelberg.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	Kelley, P. G., Cranor, L. F., &amp;amp; Sadeh, N. (2013, April). Privacy as part of the app decision-making process. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 3393-3402). ACM.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R.,&amp;amp; Molloy, I. (2012, October). Using probabilistic generative models for ranking risks of android apps. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 241-252). ACM.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	Grace, M., Zhou, Y., Zhang, Q., Zou, S., &amp;amp; Jiang, X. (2012, June). Riskranker: scalable and accurate zero-day android malware detection. In Proceedings of the 10th international conference on Mobile systems, applications, and services (pp. 281-294). ACM.# </unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	Enck, W., Ongtang, M., &amp;amp; McDaniel, P. (2009, November). On lightweight mobile phone application certification. In Proceedings of the 16th ACM conference on Computer and communications security (pp. 235-245). ACM. #</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	Jang, J. W., Kang, H., Woo, J., Mohaisen, A., &amp;amp; Kim, H. K. (2016). Andro-dumpsys: anti-malware system based on the similarity of malware creator and malware centric information. Computers &amp;amp; Security.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	Sarma, B. P., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., &amp;amp; Molloy, I. (2012, June). Android permissions: a perspective combining risks and benefits. In Proceedings of the 17th ACM symposium on Access Control Models and Technologies (pp. 13-22). ACM.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	Cen, L., Gates, C., Si, L., &amp;amp; Li, N. (2015). A probabilistic discriminative model for android malware detection with decompiled source code, in Dependable and Secure Computing, IEEE Transactions on, vol.12, no.4, (pp.400-412). IEEE.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	Desnos, A. (2012, January). Android: Static analysis using similarity distance. In System Science (HICSS), 2012 45th Hawaii International Conference on (pp. 5394-5403). IEEE.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	Schmidt, A. D., Bye, R., Schmidt, H. G., Clausen, J., Kiraz, O., Y&amp;#252;ksel, K., &amp;amp; Albayrak, S. (2009, June). Static analysis of executables for collaborative malware detection on android. In Communications, 2009. ICC&amp;#39;09. IEEE International Conference on (pp. 1-5). IEEE.# </unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	Zhou, Y., Wang, Z., Zhou, W., &amp;amp; Jiang, X. (2012, February). Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In NDSS.# </unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	Aafer, Y., Du, W., &amp;amp; Yin, H. (2013). DroidAPIMiner: Mining API-level features for robust malware detection in android. In Security and Privacy in Communication Networks (pp. 86-103). Springer International Publishing.# </unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	Christodorescu, M., Jha, S., &amp;amp; Kruegel, C. (2008, February). Mining specifications of malicious behavior. In Proceedings of the 1st India software engineering conference (pp. 5-14). ACM.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	Rieck, K., Holz, T., Willems, C., D&amp;#252;ssel, P., &amp;amp; Laskov, P. (2008). Learning and classification of malware behavior. In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 108-125). Springer Berlin Heidelberg. [17]</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	Shabtai, A., &amp;amp; Elovici, Y. (2010). Applying behavioral detection on android-based devices. In Mobile Wireless Middleware, Operating Systems, and Applications (pp. 235-249). Springer Berlin Heidelberg# </unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	Burguera, I., Zurutuza, U., &amp;amp; Nadjm-Tehrani, S. (2011, October). Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (pp. 15-26). ACM.# </unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	Geneiatakis, D., Fovino, I. N., Kounelis, I., &amp;amp; Stirparo, P. (2015). A Permission verification approach for android mobile applications. Computers &amp;amp; Security, 49, 192-205.# </unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	Fang, Z., Han, W., &amp;amp; Li, Y. (2014). Permission based android security: Issues and countermeasures. computers &amp;amp; security, 43, 205-218.# </unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	Barrera, D., Kayacik, H. G., van Oorschot, P. C., &amp;amp; Somayaji, A. (2010, October). A methodology for empirical analysis of permission-based security models and its application to android. In Proceedings of the 17th ACM conference on Computer and communications security (pp. 73-84). ACM. #</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	Enck, W., Octeau, D., McDaniel, P., &amp;amp; Chaudhuri, S. (2011, August). A Study of Android Application Security. In USENIX security symposium (Vol. 2, p. 2). #</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	Chakradeo, S., Reaves, B., Traynor, P., &amp;amp; Enck, W. (2013, April). Mast: triage for market-scale mobile malware analysis. In Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks (pp. 13-24). ACM.# </unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	Au, K. W. Y., Zhou, Y. F., Huang, Z., &amp;amp; Lie, D. (2012, October). Pscout: analyzing the android permission specification. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 217-228). ACM.# </unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., &amp;amp; Rieck, K. (2014, February). DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In NDSS.# </unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	Desnos, A. (2013). Androguard-Reverse engineering, Malware and goodware analysis of Android applications. URL code. google. com/p/androguard.# </unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	Lin, Y. D., Lai, Y. C., Chen, C. H., &amp;amp; Tsai, H. C. (2013). Identifying android malicious repackaged applications by thread-grained system call sequences. computers &amp;amp; security, 39, 340-350.#</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	Wu, S., Wang, P., Li, X., &amp;amp; Zhang, Y. (2016). Effective detection of android malware based on the usage of data flow APIs and machine learning. Information and Software Technology, 75, 17-25.#</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	Feizollah, A., Anuar, N. B., Salleh, R., &amp;amp; Wahab, A. W. A. (2015). A review on feature selection in mobile malware detection. Digital Investigation, 13, 22-37.# </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New Node Density Based k-edge Connected Topology Control Method: A Desirable QoS Tolerance Approach</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohsen</given_name><surname>Heydarian</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.04.006</doi><resource>http://jist.ir/en/Article/14999</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14999</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14999</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14999</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14999</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14999</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14999</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14999</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Paolo Santi, Topology control in ad hoc and sensor networks, John Wiley &amp;amp; Sons,2005, pp 16-100. #</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	B. Bollaobas, “Modern graph theory”, Graduate Texts in Mathematics, vol. 189, , no. 10, pp. 56-99, Jan, 1998. # </unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	J. Pan, L. Cai, Y. Hou, Y. Shi, and X. Shen, “Optimal base-station locations in two-tiered wireless sensor networks”, IEEE Trans. Mobile Comput., vol. 4, no. 5, pp. 458–473, Sep. 2005.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	J. Zhang, J. Chen, and Y. Sun, “Transmission power adjustment of wireless sensor networks using fuzzy control algorithm”, Wireless Communication and Mobile Computing (Wiley), vol. 9, no. 6, pp. 805–818, June 2009.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	N. Li, J.C. Hou, and L. Sha, “Design and analysis of an MST-based topology control algorithm”, IEEE Trans. Wireless Commun.,vol.4, no. 3, pp. 259–270, May 2005.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	G. Toussaint, “The relative neighborhood graph of finite planar set”, Pattern Recognition, vol. 12, no. 4, pp. 261–268, 1980.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	L. Li and J. Y. Halpern, “Minimum energy mobile wireless networks revisited”, in Proc. 2001 IEEE ICC, 2001, pp. 278–283.# </unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	N. Li and J. C. Hou, “Localized fault-tolerant topology control in wire-less ad hoc networks”, IEEE Trans. Parallel and Distributed Systems, vol. 17, no. 4, pp. 307–320, Apr. 2006.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	K. Miyao, H. Nakayama, N. Ansari, and N. Kato, “LTRT: an efficient and reliable topology control algorithm for ad-hoc networks”, IEEE Trans. Wireless Commun., vol. 8, no. 12, pp. 6050-6058, Dec. 2009.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	H.Nishiyama, T.Ngo, N. Ansari, N. Kato, “On Minimizing    the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks”, IEEE Transaction On Wireless Communications, vol. 11, no. 3, pp. 1158-1166,  March. 2012.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	Prim, R. C., &amp;quot;Shortest connection networks and some generalizations&amp;quot;, Bell System Technical Journal, vol.  36, no. 6, pp. 1389–1401, November 1957.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	X. Li, Y. Wang, and W. Song, “Applications of k-local MST for topology control and broadcasting in wireless ad hoc networks”, IEEE Trans. Parallel and Distrib. Syst., vol. 15, no. 12, pp 1057–1069, Dec. 2004.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	J. Cartigny, D. Simplot, and I. Stojmenovic, “Localized minimum-energy broadcasting in ad-hoc networks”, in Proc. 2003 IEEE INFO-COM, 2003, pp. 2210–2217.# </unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	J. Cartigny, F. Ingelrest, D. Simplot-Ryl, and I. Stojmenovic, “Localized LMST and RNG based minimum-energy broadcast protocols in ad hoc networks&amp;quot;, Ad Hoc Networks, vol. 3, no. 1, pp. 1-16, 2005.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	V. Rodoplu and T. H. Meng, “Minimum energy mobile wireless networks”, IEEE J. Sel. Areas Commun., vol. 17, no. 8, pp. 1333–1344, Aug. 1999.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	E. W. Dijkstra, “A note on two problems in connexion with graphs”, Numerische Mathematik , vol. 1, no. 1, pp. 269–271, Dec. 1959.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	M. Bahramgiri, M. T. Hajiaghayi, and V. S. Mirrokni, “Fault-tolerant and 3-dimensional distributed topology control algorithms in wireless multi-hop networks”, Wireless Network, vol. 12, no. 2, pp. 179–188, Mar. 2006.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	L. Li, J. Y. Halpern, P. Bahl, Y. Wang, and R. Wattenhofer, “Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks”, in Proc. 2001 ACM PODC, pp. 264–273, 2001.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	N. Ansari, G. Cheng, and R. Krishna n, “Efficient and reliable link state information dissemination”, IEEE Commun. Lett., vol. 8, no. 5, pp. 317– 319, May 2004.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	R. Azzeddine and W. Dong, “A simple fault-tolerant local topology control algorithm for sensor networks”, presented at IEEE conference on Industrial electronics and applications (ICIEA), Japan, 2012.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	Ch. Bettstetter, “On the minimum node degree and connectivity of a wireless multi-hop network”, presented at the  MOBIHIC’02 Int. Conf, EPF Lausanna, Switzerland,  2002.# </unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	N. Bulusu, D. Estrin, L. Girod, J. Heidemann, “Scalable coordination of wireless sensor networks: self-configuring localization systems”, in Proc. Of the international symposium communication theory and applications (ISCTA’01), UK, 2001, pp. 1-6. #</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	M. Shiwen, Fundamentals of communication networks, Cognitive Radio Communications and Networks, New Yourk, Elsevior,  2010, pp. 201-234.# </unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	S. Wolf, Optimization problems in self-organization networks, Berlin,  Logos Verlag Berlin GmbH, 2010, pp. 160-161. #</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	A. Isazadeh, M. Heydarian, “Optimal multicast multichannel routing in computer networks”, Computer Communications, vol. 31,  pp. 4149–4161, June, 2008.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	M. Heydarian, “A new high performance approach: merging optimal multicast sessions for supporting multisource routing”, Supercomputing, vol. 63, pp. 871–896, May, 2013.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	Mrunal Gavhale, Pranay D. Saraf, “Survey on Algorithms for Efficient Cluster Formation and Cluster Head Selection in MANET”, Procedia Computer Science, Vol. 78, pp. 477-482, 2016. #</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	Hasan Abdulwahid, BinDai, BenxiongHuang, Zijing Chen, “Scheduled-links multicast routingprotocol in MANETs”, Journal of Network and Computer Applications, vol. 63, pp. 56–67, May, 2016. #</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	S. Gundry, J. Zou, M. Umit Uyar, C. S. Sahin, J. Kusyk, “Differential evolution-based autonomous and disruption tolerant vehicular self-organization in MANETs”,  Ad Hoc Networks, Vol. 25, Part B, pp. 454-471, Jan. 2015. #</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>High-Resolution Fringe Pattern Phase Extraction, Placing a Focus on Real-Time 3D Imaging</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Amir Hooshang	</given_name><surname>Mazinan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ali </given_name><surname>Esmaeili</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.04.007</doi><resource>http://jist.ir/en/Article/15000</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15000</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15000</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15000</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15000</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15000</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15000</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15000</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Abdulbasit, Zaid Ahmed. &amp;quot;Fringe Pattern Analysis&amp;quot;. Liverpool John Moores University, 2008.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	X. Su, W. Chen, Z. Qc and Y. Chao &amp;quot;Dynamic 3-D Shape Measurment Method Based on Ftp&amp;quot;. Optics and Lasers in Engineering, vol. 36, pp. 46-64, 2001.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	M. Takeda, H. Ina and A. Kobayashi, &amp;quot;Fourier-Transform Method of Fringe Pattern Analysis for Computer-Based Topography and Interferometry&amp;quot;. Journal of the Optical Society of America, pp. 156-160, 1982#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	N. Karpinsky, S. Zhang, &amp;quot;High-resolution, real-time 3D imaging with fringe analysis&amp;quot;. Journal of Real-Time Image Processing, vol.7, issue 1, pp. 55-66, March 2012.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	G. Munther, &amp;quot;Mother Wavelets&amp;quot;. Liverpool John Moores University.2009.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	R. Cusack, J.M. Huntley and H. T. Goldrein. &amp;quot;Improved noise immune phase-unwrapping algorithm&amp;quot;, Applied Optics,   pp. 781-789, 1995.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	S. A. Karout, M. A. Gdeisat, D. R. Burton and M. J. Lalor, &amp;quot;Two-dimensional phase unwrapping using a hybrid genetic algorithm&amp;quot;. Applid Optics, vol. 46, pp. 730–743, 2007.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	P. Sandoz, &amp;quot;Wavelet Transform as a Processing Tool in White-Light Interferometry&amp;quot;. Optics Letters, vol. 22, pp. 1065-7, 1997.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	M. Cherbuliez, P. Jacquot and X. Colonna de Lega, &amp;quot;Wavelet Processing of Interferometric Signals and Fringe  Patterns&amp;quot;. SPIE-Int. Soc. Opt. Eng., 1999.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	A. Dursun, S. Ozder and F. N. Ecevit, &amp;quot;Continuous Wavelet Transform Analysis of Projected Fringe Patterns&amp;quot;. Measurement Science and Technology, vol. 15, pp. 1768-1772, 2004.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	H. Pottle, &amp;quot;The Phase Unwrapping Problem&amp;quot;. Liverpool John Mooores University.  2012.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	F. Qiangian, P. M. Meaney and K. D. Paulsen. &amp;quot;The multidimensional phase unwrapping Integral and applications to microwave tomographical image reconstruction&amp;quot;. IEEE Transactions on Image Processing, no. 11, vol. 15, pp. 3311-24, 2006.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	S. A. Karout, M. A. Gdeisat, D. R. Burton and M. J. Lalor. &amp;quot;Residue Vector, An Approach To Branch-Cut Placement In Phase Unwrapping: Theoretical Study&amp;quot;. Applied Optics, vol. 46, no. 21, pp. 4712-4727, 2007.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	R. Kulkarni, P. Rastogi, &amp;quot;Patch-wise denoising of phase fringe patterns based on matrix enhancement&amp;quot;, Optics and Lasers in Engineering, in press, 2016.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	A. Abid, M. Gdeisat, D. Burton and M.A. Lalor, &amp;quot;Comparison between Wavelet Fringe Analysis Algorithms&amp;quot;. Journal of Photon, Manchester UK,2006.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	B. Li, Y. Wang, J. Dai, W. Lohry, S. Zhang, &amp;quot;Some recent advances on superfast 3D shape measurement with digital binary defocusing techniques&amp;quot;. Optics and Lasers in Engineering, vol.54, pp. 236-246, 2014.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	Y. Xu, L. Ekstrand, J. Dai, S. Zhang, &amp;quot;Phase error compensation for three- dimensional shape measurement with projector defocusing&amp;quot;. Applied Optics, pp. 2572–81, 2011.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	S. Zhang. &amp;quot;Flexible 3-D shape measurement using projector defocusing: extended measurement range&amp;quot;. Optics Letters, pp. 931–3, 2010.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	W. Lohry, S. Zhang, &amp;quot;3D shape measurement with 2D area modulated binary patterns&amp;quot;. Optics and Lasers in Engineering, vol. 50, issue 7, pp. 917-921, 2012.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	J. Dai, B. Li, S. Zhangm, &amp;quot;Intensity-optimized dithering technique for three-dimensional shape measurement with projector defocusing&amp;quot;. Optics and Lasers in Engineering, pp.79–85, 2014.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	S. Zhang, &amp;quot;Three-dimensional range data compression using computer graphics rendering pipeline&amp;quot;. US 20140063 024A1 2014.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	A. Abdulbasit, &amp;quot;FPGA Implementation for Fringe Pattern Demodulation Using the One-Dimensional Modified Morlet Wavelet Transform&amp;quot;, International Journal of Engineering and Innovative Technology, vol. 3, pp. 2277-3754, 2013.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	A. Abdulbasit, &amp;quot;Fringe pattern demodulation using the one-dimensional continuous wavelet transform: field-programmable gate array implementation&amp;quot;. Applied Optics, vol. 52, 2013.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	S. Saadi, M. Touiza, F. Kharfi, A. Guessoum. &amp;quot;Dyadic wavelet for image coding implementation on a Xilinx MicroBlaze processor: application to neutron radiography&amp;quot;. Applied Radiation and Isotopes, vol. 82, pp. 200-210, 2013.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Hybrid Task Scheduling Method for Cloud Computing by Genetic and PSO Algorithms</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Amin</given_name><surname>Kamalinia</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ali</given_name><surname>Ghaffari</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>24</day><year>2016</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2016.04.008</doi><resource>http://jist.ir/en/Article/15001</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15001</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15001</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15001</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15001</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15001</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15001</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15001</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Ghaffari, &amp;quot;Real-time routing algorithm for mobile ad hoc networks using reinforcement learning and heuristic algorithms,&amp;quot; Wireless Networks, pp. 1-12, 2016.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	Z. Mottaghinia and A. Ghaffari, &amp;quot;A Unicast Tree-Based Data Gathering Protocol for Delay Tolerant Mobile Sensor Networks,&amp;quot; Information Systems &amp;amp; Telecommunication, p. 59, 2016.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	A. Ghaffari, &amp;quot;Congestion control mechanisms in wireless sensor networks: A survey,&amp;quot; Journal of Network and Computer Applications, vol. 52, pp. 101-115, 6// 2015.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	C.-S. Chen, W.-Y. Liang, and H.-Y. Hsu, &amp;quot;A cloud computing platform for ERP applications,&amp;quot; Applied Soft Computing, vol. 27, pp. 127-136, 2// 2015.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	Y.-D. Lin, M.-T. Thai, C.-C. Wang, and Y.-C. Lai, &amp;quot;Two-tier project and job scheduling for SaaS cloud service providers,&amp;quot; Journal of Network and Computer Applications, vol. 52, pp. 26-36, 6// 2015.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	R. Masoudi and A. Ghaffari, &amp;quot;Software defined networks: A survey,&amp;quot; Journal of Network and Computer Applications, vol. 67, pp. 1-25, 5// 2016.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	M. Pinedo, Scheduling : theory, algorithms, and systems, 4th ed. New York: Springer, 2012.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	Y. Robert and F. d. r. Vivien, Introduction to scheduling. Boca Raton: CRC Press, 2010.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	F. Magoulès, J. Pan, and F. Teng, Cloud Computing : Data-Intensive Computing and Scheduling. Boca Raton: CRC Press, 2012.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	Y. Li and W. Cai, &amp;quot;Update schedules for improving consistency in multi-server distributed virtual environments,&amp;quot; Journal of Network and Computer Applications, vol. 41, pp. 263-273, 5// 2014.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	B. Xu, C. Zhao, E. Hu, and B. Hu, &amp;quot;Job scheduling algorithm based on Berger model in cloud environment,&amp;quot; Advances in Engineering Software, vol. 42, pp. 419-425, 7// 2011.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	T. S. Somasundaram and K. Govindarajan, &amp;quot;CLOUDRB: A framework for scheduling and managing High-Performance Computing (HPC) applications in science cloud,&amp;quot; Future Generation Computer Systems, vol. 34, pp. 47-65, 5// 2014.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	S. Su, J. Li, Q. Huang, X. Huang, K. Shuang, and J. Wang, &amp;quot;Cost-efficient task scheduling for executing large programs in the cloud,&amp;quot; Parallel Computing, vol. 39, pp. 177-188, 4// 2013.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	B. Keshanchi and N. J. Navimipour, &amp;quot;Priority-Based Task Scheduling in the Cloud Systems Using a Memetic Algorithm,&amp;quot; Journal of Circuits, Systems and Computers, vol. 25, p. 1650119, 2016.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	S. Pandey, L. Wu, S. M. Guru, and R. Buyya, &amp;quot;A Particle Swarm Optimization-Based Heuristic for Scheduling Workflow Applications in Cloud Computing Environments,&amp;quot; in 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010, pp. 400-407.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	Y. C. Liang, A. H. L. Chen, and Y. H. Nien, &amp;quot;Artificial Bee Colony for workflow scheduling,&amp;quot; in 2014 IEEE Congress on Evolutionary Computation (CEC), 2014, pp. 558-564.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	L. Wang and L. Ai, &amp;quot;Task Scheduling Policy Based on Ant Colony Optimization in Cloud Computing Environment,&amp;quot; in LISS 2012: Proceedings of 2nd International Conference on Logistics, Informatics and Service Science, Z. Zhang, R. Zhang, and J. Zhang, Eds., ed Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 953-957.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	Y. Xu, K. Li, J. Hu, and K. Li, &amp;quot;A genetic algorithm for task scheduling on heterogeneous computing systems using multiple priority queues,&amp;quot; Information Sciences, vol. 270, pp. 255-287, 6/20/ 2014.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	X. Kong, C. Lin, Y. Jiang, W. Yan, and X. Chu, &amp;quot;Efficient dynamic task scheduling in virtualized data centers with fuzzy prediction,&amp;quot; Journal of Network and Computer Applications, vol. 34, pp. 1068-1077, 7// 2011.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	H. Topcuoglu, S. Hariri, and W. Min-You, &amp;quot;Performance-effective and low-complexity task scheduling for heterogeneous computing,&amp;quot; Parallel and Distributed Systems, IEEE Transactions on, vol. 13, pp. 260-274, 2002.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	G. Giftson Samuel and C. Christober Asir Rajan, &amp;quot;Hybrid: Particle Swarm Optimization–Genetic Algorithm and Particle Swarm Optimization–Shuffled Frog Leaping Algorithm for long-term generator maintenance scheduling,&amp;quot; International Journal of Electrical Power &amp;amp; Energy Systems, vol. 65, pp. 432-442, 2// 2015.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	R. L. Haupt and S. E. Haupt, Practical genetic algorithms, 2nd ed. Hoboken, N.J.: John Wiley, 2004.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	F. T. Hecker, M. Stanke, T. Becker, and B. Hitzmann, &amp;quot;Application of a modified GA, ACO and a random search procedure to solve the production scheduling of a case study bakery,&amp;quot; Expert Systems with Applications, vol. 41, pp. 5882-5891, 10/1/ 2014.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	S. N. Sivanandam and S. N. Deepa, Introduction to genetic algorithms. Berlin ; New York: Springer, 2007.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	A. Mahor and S. Rangnekar, &amp;quot;Short term generation scheduling of cascaded hydro electric system using novel self adaptive inertia weight PSO,&amp;quot; International Journal of Electrical Power &amp;amp; Energy Systems, vol. 34, pp. 1-9, 1// 2012.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	D. Y. Sha and H.-H. Lin, &amp;quot;A multi-objective PSO for job-shop scheduling problems,&amp;quot; Expert Systems with Applications, vol. 37, pp. 1065-1070, 3// 2010.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	A. P. Engelbrecht, Computational intelligence : an introduction, 2nd ed. Chichester, England ; Hoboken, NJ: John Wiley &amp;amp; Sons, 2007.#</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	U. Defense Acquisition and Press, Scheduling guide for program managers. Fort Belvoir, VA; Washington, DC: Defense Acquisition University Press ; For sale by the U.S. G.P.O., Supt. of Docs., 2001.#</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>