﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051922</doi_batch_id><timestamp>20260519222840</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>3</month><day>23</day><year>2017</year></publication_date><journal_volume><volume>5</volume></journal_volume><issue>17</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A new Sparse Coding Approach for Human Face and Action Recognition</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohsen</given_name><surname>Nikpoor</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad Reza</given_name><surname>Karami-Mollaei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Reza</given_name><surname>Ghaderi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2017.17.003</doi><resource>http://jist.ir/en/Article/14905</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14905</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14905</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14905</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14905</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14905</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14905</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14905</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>M. Long, G. Ding, J. Wang, J. Sun, Y.Guo, and P. S. Yu,Transfer Sparse Coding for Robust Image Representation,IEEE Conference onComputer Vision and Pattern Recognition (CVPR), 2013.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>J.Zhang, D. Zhao, W. Gao, Group-based Sparse Representation for Image Restoration, DOI0.1109/TIP.2014.2323127, IEEE Transactions on Image Processing.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>H. Lee, A. Battle, R. Raina, and A. Y. Ng. Efficient sparse coding algorithms. In Advances in Neural Information Processing Systems 20, NIPS, 2006.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>J. Mairal, F. Bach, J. Ponce, and G. Sapiro. Online dictionary learning for sparse coding. In Proceedings of the International Conference on Machine Learning, ICML, 2009.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>J. Wright, A. Yang, A. Ganesh, S. Sastry, and Y. Ma. Robust face recognition via sparse representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.31, No.2, 2009.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>S. Gao, I. W.-H. Tsang, L.-T. Chia, and P. Zhao. Local features are not lonely – laplacian sparse coding for image classification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, CVPR, 2010.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>J. Yang, K. Yu, Y. Gong, and T. Huang. Linear spatial pyramid matching using sparse coding for image classification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, CVPR, 2009.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>M. Zheng, J. Bu, C. Chen, C. Wang, L. Zhang, G. Qiu, and D. Cai. Graph regularizedsparse coding for image representation. IEEE Transactions on Image Processing, Vol. 20, No.5, 2011.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>Y. N. Liu, F. Wu, Z. H. Zhang, Y. T. Zhuang, and S. C. Yan. Sparse representation using nonnegative curds and whey. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, CVPR, 2010.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>R.Ptucha and e.avakis, &amp;quot; LGE-KSVD: Robust Sparse Representation Classification&amp;quot;, IEEE Transactions On Image Processing,  Vol. 23, No. 4, 2014.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>Y. Wen, L. Zhang, K. M. von Deneen, L. He,Face   recognition   using   discriminative   locality   preserving   vectors, Digit. Signal Process, http://dx.doi.org/10.1016/j.dsp.2015.11.001, 2015.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>X. Jiangand J. Lai, &amp;quot;Sparse And Dense Hybrid Representation via Dictionary Decomposition for Face Recognition&amp;quot;, IEEE Transactions on Pattern Analysis and Machine Intelligence. ,DOI 10.1109/TPAMI.2014.2359453#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>M. Yang, L. Zhang, J. Yang, and D. Zhang. Robust sparse coding for face recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, CVPR, 2011.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>Z. Lu, Y. Peng, Latent semantic learning with structured sparse representation for human action recognition, in: ICCV, 2011.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>M.Zheng, J.Bu, C.Chen, C.Wang, L.Zhang, G.Qiu and D.Cai ,Graph Regularized Sparse Coding for Image Representation,JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARY 2007.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>B. Quanz, J. Huan, and M. Mishra. Knowledge transfer with low-quality data: A feature extraction issue. IEEE Transactions on Knowledge and Data Engineering,Vol.24, No.10, 2012.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>Hazewinkel, Michiel, ed.(2001),Affine transformation, Encyclopedia of Mathematics, Springer, ISBN 978-1-55608-010-4.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>R. Fletcher. Practical methods of optimization. Wiley-Interscience, 1987.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>M. Aharon, M. Elad, A. Bruckstein, and Y. Katz. K-svd: An algorithm for designingovercomplete dictionaries for sparse representation. IEEE Transactions on Signal Processing, Vol.57, No.11, 2006.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>M. Belkin and P. Niyogi. Laplacianeigenmaps and spectral techniques for embeddingand clustering. In Advances in Neural Information Processing Systems 15, NIPS, 2001.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>X.Lu, Y.Yuan and P.Yan, Alternatively Constrained Dictionary Learning for Image Superresolution, IEEE Transactions On Cybernetics, Vol. 44, No. 3, 2014.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>E. Cand`es and T. Tao, “Near-optimal signal recovery from random projections:  niversal encoding strategies?” IEEE transactions on information theory, Vol. 52, No. 12, pp. 5406–5425, 2006.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>F. Samaria, A. Harter, Parameterisation of a Stochastic Model for Human Face Identification, Proceedings of 2nd IEEE Workshop on Applications of Computer Vision, Sarasota FL, 1994.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection, IEEE Trans. on PAMI, vol. 19, no. 7, pp. 711-720, July 1997.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>S. J. Pan, I.W. Tsang, J. T. Kwok, and Q. Yang. Domain adaptation via transfer component analysis. IEEE Transactions on Neural Networks, Vol.22, No.2, PP.199–210, 2011.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Coverage Improving with Energy Efficient in Wireless Sensor Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Amir</given_name><surname>Pakmehr</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ali</given_name><surname>Ghaffari</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2017.17.008</doi><resource>http://jist.ir/en/Article/14927</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14927</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14927</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14927</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14927</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14927</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14927</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14927</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., Cayirci, E. (2002). Wireless sensor networks: a survey. Computer networks, 38(4), 393-422.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	Akbari Torkestani, J. ( 2013). An adaptive energy-efficient area coverage algorithm for wireless sensor networks. Ad Hoc Networks, vol. 11, pp. 1655-1666, 8.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	Wang, B., Lim, H. B., Ma, D. (2012). A coverage-aware clustering protocol for wireless sensor networks. Computer Networks, pp.1599–1611.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	Wang, G., Cao, G., Berman, P., Porta, T.F.L. .(2007). Bidding protocols for deploying mobilesensors. IEEE Transactions on Mobile Computing 6 (5) 515–528.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	Wang, B., Lim, H. B., Ma D., (2009). A survey of movement strategies for improving network coverage in wireless sensor networks. Computer Communications vol. 32 ,1427–1436.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	Ghaffari, A. (2015). Congestion control mechanisms in wireless sensor networks: A survey. Journal of Network and Computer Applications, 52, 101-115.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	Ghaffari, A. (2014). An energy efficient routing protocol for wireless sensor networks using A-star algorithm. Journal of applied research and technology, 12(4), 815-822.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	Ghaffari, A., &amp;amp; Nobahary, S. (2015). FDMG: Fault detection method by using genetic algorithm in clustered wireless sensor networks. Journal of AI and Data Mining, 3(1), 47-57.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	Ghaffari, A. (2014). Designing a wireless sensor network for ocean status notification system. Indian Journal of Science and Technology, 7(6), 809.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	Cheng, p., Cao, X., Bai, J., and Sun, Y. (2012). On optimizing sensing quality with guaranteed coverage in autonomous mobile sensor networks. Computer communications, 35(9), 1107-1114.doi:10.1016/j.comcom.2011.11.004. #</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	Torkestani, J. A. (2013). An adaptive energy-efficient area coverage algorithm for wireless sensor networks. Ad hoc networks, 11(6), 1655-1666.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	GaoJun, F., ShiYao, J., (2010). Coverage Problem in Wireless Sensor Network: A Survey. Journal of Networks, Vol. 5, PP. 1033-1040. #</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	Ghaffari, A. Real-time routing algorithm for mobile ad hoc networks using reinforcement learning and heuristic algorithms. Wireless Networks, 1-12.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	Ghosh, A. (2007). Estimating coverage holes and enhancing coverage in mixed sensornetworks. in: IEEE International Conference on Local Computer Networks, pp. 68–76.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	Heinzelman,W. B.,Chandrakasan, A. P., Balakrishnan, H. (2002). Application specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Networking.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	Karl, H. (2005). Protocol and Architectures for Wireless Sensor Networks. Copyright 2005 Johon Wiley &amp;amp; Sonsors, Ltd.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	Li, J., L., Chuan, H. F., Zukerman, M. (2009). Coverage and Placement in Wireless Sensor Networks. Sensors. Vol. 9, 7664-7693.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	Ming, L., Jiannong, C., Guihai, Ch., Lijun, Ch. (2007). EADGP: an energy-aware data gathering protocol for wireless sensor networks. J Software;18(5):1092–109. pp. 528 – 531.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	Mulligan, R. (2010). Coverage in Wireless Sensor Networks: A Survey. 2(2). IEEE.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	Ossama, Y., Fahmy S.(2004). A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks. IEEE Transactions on Mobile Computing, Volume 3 Issue 4, pp. 366-379.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	Mottaghinia, Z., &amp;amp; Ghaffari, A. (2016). A Unicast Tree-Based Data Gathering Protocol for Delay Tolerant Mobile Sensor Networks. Information Systems &amp;amp; Telecommunication, 59.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	Xing, G., Wang, X., Zhang, Lu, Y., Pless, C., R., and Gill, C., (2005). Integrated coverage and connectivity configuration for energy conservation in sensor networks. ACM Transactions on Sensor Networks, vol. 1, no. 1,pp. 36–72.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	Xinlian, Z., Min, W. Jianbo, X. (2009). an energy-aware distributed clustering algorithm in WSNs. J Comput Res Develop, 46(5):723–30.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	Masoudi, R., &amp;amp; Ghaffari, A. (2016). Software defined networks: A survey. Journal of Network and Computer Applications, 67, 1-25.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	Liu, Zhixin, et al. &amp;quot;A distributed energy-efficient clustering algorithm with improved coverage in wireless sensor networks.&amp;quot; Future Generation Computer Systems 28.5 (2012): 780-790.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	Li, Wei, and Yuwei Wu. &amp;quot;Tree-based coverage hole detection and healing method in wireless sensor networks.&amp;quot; Computer Networks 103 (2016): 33-43.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Efficient Noise Removal Edge Detection Algorithm Based on Wavelet Transform</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Ehsan</given_name><surname>Ehsaeian</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2017.17.005</doi><resource>http://jist.ir/en/Article/15010</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15010</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15010</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15010</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15010</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15010</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15010</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15010</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] F. Guo, Y. Yang, B. Chen, and L. Guo, &amp;quot;A novel multi-scale edge detection technique based on wavelet analysis with application in multiphase flows,&amp;quot; Powder Technology, vol. 202, no. 1-3, pp. 171–177, Aug. 2010.# </unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2] C. Lopez-Molina, B. De Baets, H. Bustince, J. Sanz, and E. Barrenechea, &amp;quot;Multiscale edge detection based on Gaussian smoothing and edge tracking,&amp;quot; Knowledge-Based Systems, vol. 44, pp. 101–111, May 2013.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3] J. Canny, &amp;quot;A computational approach to edge detection,&amp;quot; IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PAMI-8, no. 6, pp. 679–698, Nov. 1986.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4] W. McIlhagga, &amp;quot;The canny edge detector revisited,&amp;quot; International Journal of Computer Vision, vol. 91, no. 3, pp. 251–261, Oct. 2010.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5] L. Ding and A. Goshtasby, &amp;quot;On the canny edge detector,&amp;quot; Pattern Recognition, vol. 34, no. 3, pp. 721–725, Mar. 2001.# </unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6] R. C. Gonzalez, R. E. Woods, D. J. Czitrom, and S. Armitage, Digital image processing, 3rd ed. United States: Prentice Hall, 2007.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7] S. Mallat and S. Zhong, &amp;quot;Characterization of signals from multiscale edges,&amp;quot; IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 14, no. 7, pp. 710–732, Jul. 1992.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8] B. M. Sadler and A. Swami, &amp;quot;Analysis of multiscale products for step detection and estimation,&amp;quot; IEEE Transactions on Information Theory, vol. 45, no. 3, pp. 1043–1051, Apr. 1999. [9] L. Zhang and P. Bao, &amp;quot;Edge detection by scale multiplication in wavelet domain,&amp;quot; Pattern Recognition Letters, vol. 23, no. 14, pp. 1771–1784, Dec. 2002. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>[10] Z. Zhu, H. Lu, and Y. Zhao, &amp;quot;Scale multiplication in odd Gabor transform domain for edge detection,&amp;quot; Journal of Visual Communication and Image Representation, vol. 18, no. 1, pp. 68–80, Feb. 2007.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[11] M. Hasanzadeh Mofrad, S. Sadeghi, A. Rezvanian, and M. R. Meybodi, &amp;quot;Cellular edge detection: Combining cellular automata and cellular learning automata,&amp;quot; AEU - International Journal of Electronics and Communications, vol. 69, no. 9, pp. 1282–1290, Sep. 2015.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[12] S. Uguz, U. Sahin, and F. Sahin, &amp;quot;Edge detection with fuzzy cellular automata transition function optimized by PSO,&amp;quot; Computers &amp;amp; Electrical Engineering, vol. 43, pp. 180–192, Apr. 2015.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[13] S. Amrogowicz and Y. Zhao, &amp;quot;An edge detection method using outer totalistic cellular Automata,&amp;quot; Neurocomputing, Jun. 2016.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[14] J. Gu, Y. Pan, and H. Wang, &amp;quot;Research on the improvement of image edge detection algorithm based on artificial neural network,&amp;quot; Optik - International Journal for Light and Electron Optics, vol. 126, no. 21, pp. 2974–2978, Nov. 2015.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation> [15] C. I. Gonzalez, P. Melin, J. R. Castro, O. Castillo, and O. Mendoza, &amp;quot;Optimization of interval type-2 fuzzy systems for image edge detection,&amp;quot; Applied Soft Computing, vol. 47, pp. 631–643, Oct. 2016. #</unstructured_citation></citation><citation key="ref15"><unstructured_citation> [16] X. Liu and S. Fang, &amp;quot;A convenient and robust edge detection method based on ant colony optimization,&amp;quot; Optics Communications, vol. 353, pp. 147–157, Oct. 2015.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation> [17] G. Ma, C. Liu, and D. Huang, &amp;quot;The removal of additional edges in the edge detection of potential field data,&amp;quot; Journal of Applied Geophysics, vol. 114, pp. 168–173, Mar. 2015.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation> [18] D. Rivero-Castillo, H. Pijeira, and P. Assun&amp;#231;ao, &amp;quot;Edge detection based on Krawtchouk polynomials,&amp;quot; Journal of Computational and Applied Mathematics, vol. 284, pp. 244–250, Aug. 2015.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[19] N. Decoster, S. G. Roux, and A. Arn&amp;#233;odo, &amp;quot;A wavelet-based method for multifractal image analysis. II. Applications to synthetic multifractal rough surfaces,&amp;quot; The European Physical Journal B, vol. 15, no. 4, pp. 739–764, Jun. 2000.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[20] Q. Sun, Y. Hou, and Q. Tan, &amp;quot;A subpixel edge detection method based on an arctangent edge model,&amp;quot; Optik - International Journal for Light and Electron Optics, vol. 127, no. 14, pp. 5702–5710, Jul. 2016.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation> [21] G. J. Tu and H. Karstoft, &amp;quot;Logarithmic dyadic wavelet transform with its applications in edge detection and reconstruction,&amp;quot; Applied Soft Computing, vol. 26, pp. 193–201, Jan. 2015.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[22] B. Zuo and X. Hu, &amp;quot;Edge detection of gravity field using eigenvalue analysis of gravity gradient tensor,&amp;quot; Journal of Applied Geophysics, vol. 114, pp. 263–270, Mar. 2015.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[23] J. Wang, X. Meng, and F. Li, &amp;quot;Improved curvature gravity gradient tensor with principal component analysis and its application in edge detection of gravity data,&amp;quot; Journal of Applied Geophysics, vol. 118, pp. 106–114, Jul. 2015.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[24] M.-Y. Shih and D.-C. Tseng, &amp;quot;A wavelet-based multiresolution edge detection and tracking,&amp;quot; Image and Vision Computing, vol. 23, no. 4, pp. 441–451, Apr. 2005.# </unstructured_citation></citation><citation key="ref24"><unstructured_citation>[25] PRATT, W.K.: &amp;#39;DIGITAL IMAGE PROCESSING&amp;#39;, (JOHN WILEY &amp;amp; SONS, NEW YORK, USA, 2001. EASED).#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[26] M. K. Geetha and S. Palanivel, &amp;quot;Video classification and shot detection for video retrieval applications,&amp;quot; International Journal of Computational Intelligence Systems, vol. 2, no. 1, pp. 39–50, 2009.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Model for Mobile Code Computing Paradigms in Computer Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hojatallah</given_name><surname>Hamidi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Maryam</given_name><surname>Parvini</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2017.17.002</doi><resource>http://jist.ir/en/Article/15011</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15011</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15011</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15011</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15011</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15011</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15011</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15011</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	H.Hamidi and K.Mohammadi, “Evaluation of Fault Tolerant Mobile Agents in Distributed Systems, “International Journal of Intelligent Information Technologies (IJIIT 5(1)), pp.43-60, Janauary-March 2009.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	 H.Hamidi and A.Vafaei, &amp;quot;Evaluation of Security and Fault-Tolerance in Mobile Agents,&amp;quot; Proc.Of the 5th IEEE Conf. on Wireless &amp;amp; Optical Communications Networks (WOCN2008), May 5, 6 and 7, 2008.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	 H.Hamidi and K.Mohammadi, &amp;quot;Modeling and Evaluation of Fault Tolerant Mobile Agents in Distributed Systems,&amp;quot; Proc.Of the 2th IEEE Conf . on Wireless &amp;amp; Optical Communications Networks (WOCN2005),pp.91-95, March 2005.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	 S. Pleisch and A. Schiper, &amp;quot;Modeling Fault-Tolerant Mobile Agent Execution as a Sequence of Agree Problems,&amp;quot; Proc. of the 19th IEEE Symp. on Reliable Distributed Systems, pp. 11-20,2000.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	 S. Pleisch and A. Schiper, &amp;quot;FATOMAS - A Fault-Tolerant Mobile Agent System Based on the Agent-Dependent Ap&amp;#172;proach,&amp;quot; Proc. 2001 Int&amp;#39;l Conf on Dependable Systems and networks,pp.215-224,luI.2001.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	M. Strasser and K. Rothermel, &amp;quot;System Mechanism for Par&amp;#172;tial Rollback of Mobile Agent Execution,&amp;quot; Proc. 20th In!&amp;#39;l Conf on Distributed Computing Systems, 2000.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	T. Park, I. Byun, H. Kim and H.Y. Yeom, &amp;quot;The Performance of Checkpointing and Replication Schemes for Fault Tol&amp;#172;erant Mobile Agent Systemss ,&amp;quot; Proc. 21th IEEE Symp. On Reliable Distributed Systems, 2002.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	 M. Izatt, P. Chan, and T. Brecht. Ajents: Towards an Environment for Parallel, Distributed and Mobile Java Applications. In Proc. ACM 1999 Conference on Java Grande, pages 15-&amp;#172;24, June 1999.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	 A. S. Tanenbaum, &amp;quot;Distributed Operating Systems&amp;quot;,prentice Hall, Inc . , 1995#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	H.W.Chan,K.M.Wong , R.Lyu  “ Design ,Implementation ,and Experimentation on Mobile Agent Security for Electronic Commerce Application,”  Distributed systems, s. Mullender,ed., second ed., pp. 199-216, Reading, Mass.: Addison-wesley , 1993.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	  X.Defago,A. schiper,and N. sergent,  “semi-passive Replication,”proc. 17th  IEEE  symp. Reliable Distributed system (SRDS ‘98), pp. 43-50, oct. 1998.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	MJ. Fischer,N.A.  Lynch and M.S. paterson,  “Impossibility of Distributed consensus with one Faulty process,”Proc.second ACM SIGACT-SIGMOD symp. Principles of Database system,pp. 17, Mar.1983.# </unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	 Michael S. Greenberg, Jennifer C. Byington, and David G. Harper. “Mobile Agents and Security”. In Volume 367, IEEE Communications Magazine. IEEE Press, July 1998.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	Christian F. Tschudin. “Mobile Agent Security”. In M. Klusch, Intelligent Information Agents. Forthcoming LNCS. http://www.docs.uu.se/~tschudin/pub/cft-1999-iia.ps.gz, 1999.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	C.Ghezzi, G, Vigna. “Mobile Code Paradigms and Technologies: A Case Study”. In Kurt Rothermet, Radu Popescu-Zeletin, editors, Mobile Agents, First International Workshop, MA’97, Berlin, Germany, April 1997, Proceedings, LNCS 1219, p. 39-49. Springer, 1997.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	A.Fuggetta, , G. P.Picco, , &amp;amp; G.Vigna, Understanding code mobility. IEEE Transactions on Software Engineering, 24(5).(pp. 342–361,1998.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	W.Stallings. Cryptography and Network Security, Principles and Practice. Prentice Hall, 2nd edition, 1999.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	T.Sander and C. F. Tschudin. “Protecting Mobile Agents against Malicious Hosts”. In Giovanni Vigna, editor, Mobile Agents and Security, LNCS 1419, p. 44-60. Springer, 1998.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	F. Hohl. “Time Limited Blackbox Security: Protecting Mobile Agents from Mali cious Hosts”. In Giovanni Vigna, editor, Mobile Agents and Security, LNCS 1419, p. 92-113. Springer, 1998.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	  M.K.   Aguilera,   w.   chen,  and  s.   Toueg,   “Failure Detection and consensus in the crash-Recovery Model,” Distributed computing,vol. 13,no. 2,pp.  99-125,2000.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	R. A. Sahner, K. S. Trivedi, and A. Puliafito. Performance and Reliablity Analysis of Computer Systems. Kluwer Academic Publishers, Boston, 1996.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	 S. Pleisch and A. Schiper, “Fault-Tolerant Mobile Agent Execution,&amp;quot; IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO .2, Feb 2003.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	M. Strasser and K. Rothermel, &amp;quot;System Mechanism for Par&amp;#172;tial Rollback of Mobile Agent Execution,&amp;quot; Proc. 20th In!&amp;#39;l Conf on Distributed Computing Systems, 2000.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	H. Hamidi, “Modeling Fault Tolerant and Secure Mobile Agent Execution in Distributed Systems, &amp;quot;      International Journal   of Intelligent Information Technologies (IJIIT 2(1)), pp.21-36, 2006.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	H.Hamidi and A.Vafaei, July 2010 “Evaluation and Check pointing of Fault Tolerant Mobile Agents Execution in Distributed Systems,” Journal of Networks (Academy Publisher), VOL. 5, NO. 7. doi:10.4304/jnw.5.7.800-807.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	A.Vafaei, 	H.Hamidi. , S.A. Monadjemi,. (2012).  “A Framework for Fault Tolerance Techniques in the Analysis and Evaluation of Computing Systems” International Journal of Innovative Computing, Information and Control (IJICIC), Vol.8, No.7, July 2012.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	Monadjemi, S. A., Hamidi, H., Vafaei, A. (2012). Analysis and Evaluation of a New Algorithm Based Fault Tolerance for Computing Systems. International Journal of Grid and High Performance Computing (IJGHPC), 4(1), 37-51. doi:10.4018/jghpc.2012010103 #</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	Monadjemi, S. A., Hamidi, H., Vafaei, A. (2012).  “ANALYSIS AND DESIGN OF AN ABFT AND PARITY-CHECKING TECHNIQUE IN HIGH PERFORMANCE COMPUTING SYSTEMS” Journal of Circuits, Systems, and Computers (JCSC), JCSC Volume 21 Number 3.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Towards Accelerating IP Lookups on Commodity PC Routers using Bloom Filter: Proposal of Bloom-Bird</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Bahram</given_name><surname>Bahrambeigy</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahmood</given_name><surname>Ahmadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>mahmood</given_name><surname>Fazlali</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2017.17.004</doi><resource>http://jist.ir/en/Article/15012</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15012</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15012</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15012</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15012</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15012</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15012</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15012</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Zhu, Y. Deng, and Y. Chen, &amp;quot;Hermes: an integrated CPU/GPU microarchitecture for IP routing,&amp;quot; presented at the Proceedings of the 48th Design Automation Conference, San Diego, California, 2011.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	S. Han, K. Jang, K. Park, and S. Moon, &amp;quot;PacketShader: a GPU-accelerated software router,&amp;quot; ACM SIGCOMM Computer Communication Review, vol. 41, pp. 195-206, 2010.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	BIRD Internet Routing Daemon. Available: http://bird.network.cz#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	Quagga Routing Suite. Available: http://www.nongnu.org/quagga/#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	M. Handley, O. Hodson, and E. Kohler, &amp;quot;XORP: an open platform for network research,&amp;quot; ACM SIGCOMM Computer Communication Review, vol. 33, pp. 53-57, 2003.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	B. H. Bloom, &amp;quot;Space/time trade-offs in hash coding with allowable errors,&amp;quot; Communications of the ACM, vol. 13, pp. 422-426, 1970.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	S. Tarkoma, C. E. Rothenberg, and E. Lagerspetz, &amp;quot;Theory and practice of bloom filters for distributed systems,&amp;quot; Communications Surveys &amp;amp; Tutorials, IEEE, vol. 14, pp. 131-155, 2012.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	L. Fan, P. Cao, J. Almeida, and A. Z. Broder, &amp;quot;Summary cache: a scalable wide-area web cache sharing protocol,&amp;quot; IEEE/ACM Transactions on Networking (TON), vol. 8, pp. 281-293, 2000.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	C. E. Rothenberg, C. A. B. Macapuna, F. L. Verdi, and M. F. Magalh&amp;#227;es, &amp;quot;The deletable bloom filter: a new member of the bloom family,&amp;quot; IEEE Communications Letters, vol. 14, pp. 557-559, 2010.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	A. Broder and M. Mitzenmacher, &amp;quot;Network Applications of Bloom Filters: A Survey,&amp;quot; Internet Mathematics, vol. 1, pp. 636-646, 2002.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	M. Ahmadi and S. Wong, &amp;quot;Modified collision packet classification using counting Bloom filter in tuple space,&amp;quot; presented at the Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: parallel and distributed computing and networks, Innsbruck, Austria, 2007.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	L. Hyesook and L. Nara, &amp;quot;Survey and proposal on binary search algorithms for longest prefix match,&amp;quot; Communications Surveys &amp;amp; Tutorials, IEEE, vol. 14, pp. 681-697, 2012.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	S. Dharmapurikar, P. Krishnamurthy, and D. E. Taylor, &amp;quot;Longest prefix matching using bloom filters,&amp;quot; presented at the Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, Karlsruhe, Germany, 2003.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	S. Sahni and K. S. Kim, &amp;quot;Efficient construction of multibit tries for IP lookup,&amp;quot; IEEE/ACM Trans. Netw., vol. 11, pp. 650-662, 2003.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	K. Lim, K. Park, and H. Lim, &amp;quot;Binary search on levels using a Bloom filter for IPv6 address lookup,&amp;quot; presented at the Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, Princeton, New Jersey, 2009.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	S. Haoyu, H. Fang, M. Kodialam, and T. V. Lakshman, &amp;quot;IPv6 Lookups using Distributed and Load Balanced Bloom Filters for 100Gbps Core Router Line Cards,&amp;quot; in INFOCOM 2009, IEEE, 2009, pp. 2518-2526.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	H. Lee and A. Nakao, &amp;quot;Improving Bloom Filter Forwarding Architectures,&amp;quot; IEEE Communications Letters, vol. 18, pp. 1715-1718, 2014.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	H. Lee and A. Nakao, &amp;quot;Improving Routing Table Lookup in Software Routers,&amp;quot; IEEE Communications Letters, vol. 19, pp. 957-960, 2015.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	J. Bonwick, &amp;quot;The slab allocator: an object-caching kernel memory allocator,&amp;quot; presented at the Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1, Boston, Massachusetts, 1994.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	RouteViews IPv4 BGP RIBs. December 2008, December 2010, July 2013. Available: http://routeviews.org/#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	RouteViews IPv6 BGP RIBs. December 2011, December 2012, November 2013. Available: http://routeviews.org/#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	ipv6gen, IPv6 prefix generator. Available: https://code.google.com/p/ipv6gen/#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Speech Emotion Recognition Based on Fusion Method</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Sara</given_name><surname>Motamed</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Saeed</given_name><surname>Setayeshi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Azam</given_name><surname>Rabiee</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Arash </given_name><surname>Sharifi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2017.17.007</doi><resource>http://jist.ir/en/Article/15013</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15013</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15013</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15013</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15013</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15013</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15013</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15013</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>1.	R&amp;#180;azuri, J.G., et al., Speech emotion recognition in emotional feedback for human - robot interaction International Journal of Advanced Research in Artificial Intelligence, 2015. 4: p. 20-27.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>2.	Ayadi, M.E., M.S. Kamel, and F. Karray, Survey on speech emotion recognition: features, classification schemes and databases. Pattern Recognition, 2011: p. 572- 587.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>3.	Cowie, R., et al., Emotion recognition in human-computer interaction. IEEE signal Processing, 2001: p. 32-80.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>4.	Seehapoch, T. and S. Wongathanavasu, Speech emotion recognition using support vector machines. 5th International Conference on Knowledge and Smart Technology, 2012: p. 621 - 625.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>5.	Ververidis, D. and C. Kotropoulos, Emotional speech recognition: resources, features and methods. Elsevier Speech communication, 2006. 48(9): p. 1162- 1181.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>6.	Hozjan, V. and Z. Kacic, Context-independent multilingual emotion recognition from speech signal. Int. J. Speech Technol, 2003. 6: p. 311-320.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>7.	cahn, J., The generation of affect in synthesized speech. Voice Input/ Output Soc, 1990: p. 1-19.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>8.	Zhang, Q., et al., Speech Emotion Recognition using Combination of Features. Forth International Conference on Intelligent control and Information Processing (ICICIP), 2013.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>9.	Bojanic, M., V. Crnojevic, and V. Deliv, Application of neural network in emotional speech recognition. 2012: p. 20-22.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>10.	Price, J., Design an automatic speech recognition system using Matlab. University of Maryland Estern Shore Princess Anne, 2005: p. 100-106.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>11.	Adell Mercado, J., A. Bonafonte C&amp;#225;vez, and D. Escudero Mancebo, Analysis of prosodic features: towards modelling of emotional and pragmatic attributes of s</unstructured_citation></citation><citation key="ref12"><unstructured_citation>peech. SEPLN, 2005: p. 277- 284.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>12.	Wu, D., T.D. Parsons, and S.S. Narayanan, Acoustic feature analysis in speech emotion primitives estimation. Interspeech, 2010: p. 785-788.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>13.	Lotfi, E., Mathematical modeling of emotional brain for classification problems. Proceedings of IAM, 2013. 2(1): p. 60- 71.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>14.	Muda, L., M. Begam, and Elamvazuthi., Voice Recognition Algorithms using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW Techniques). JOURNAL OF COMPUTING, 2010. 2(3): p. 138-143.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>15.	Thathachar, M.A.L. and P.S. Sastry, Varieties of learning automata. An Overview in IEEE Transaction on System, 2002. 32(6): p. 711-722.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>16.	Narendra, K.S. and M.A.L. Thathachar, Learning automata. An Introduction in Prentice Hall, 1974.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>17.	Narendra, K.S. and M.A.L. Thathachar, Learning automata - A survey. IEEE Transactions on Systems, Man and Cybernetics, 1974. 4(4): p. 323-334.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>18.	Horn, G. and B.J. Oommen, Solving Multiconstraint Assignment Problems Using Learning Automata. IEEE transactions on system, man, and cybernetics- part, 2002.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>19.	Eyben, F., M. W&amp;#246;llmer, and B. Schuller, Opensmile: the munich versatile and fast open source audio feature extractor. 10 Proceedings of the International Conference on Multimedia, 2010: p. 1459-1462.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>20.	Harimi, A., et al., Classification of emotional speech spectral pattern features. Journal of AI and Data Mining, 2014. 2(1): p. 53-61.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>21.	Burkhardt, F., et al., A database of German emotional speech. Interspeech, 2005. 5: p. 1517-1520.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>The Separation of Radar Clutters using Multi-Layer Perceptron</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Akhondi Darzikolaei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ataollah</given_name><surname>Ebrahimzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Elahe</given_name><surname>Gholami</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2017.17.006</doi><resource>http://jist.ir/en/Article/15014</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15014</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15014</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15014</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15014</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15014</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15014</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15014</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	J. Anderson, M. T. Gately, P. A. Penz, D. R. Collins, and others, “Radar signal categorization using a neural network,” Proceedings of the IEEE, vol. 78, no. 10, pp. 1646–1657, 1990#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2] J.-H.Lee, I.-S.Choi ,H.-T.Kim, “Natural frequency-based neural network approach to radar target recognition,” IEEE Trans. Signal Process., vol. 51, no. 12, p. 3191, December 2003#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3] R. Rouveure, P. Faure, and Monod, “Multi-layer feed-forward perceptron for microwave signals processing,” in Geoscience and Remote Sensing, Symposium, 2003. IGARSS &amp;#39;03, vol. 6, 2003, pp. 3519-3521.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4] O. L. Mangasarian and W. H. Wolberg, “Cancer diagnosis via linear programming. University of Wisconsin-Madison,” Computer Sciences Department, 1990.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5] T. L. Fine, Feedforward neural network methodology. Springer Science &amp;amp; Business Media, 2006.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6] W. S. McCulloch and W. Pitts, “A logical calculus of the ideas immanent in nervous activity,” The bulletin of mathematical biophysics, vol. 5, no. 4, pp. 115–133, 1943.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7] S. Mirjalili, S. Z. M. Hashim, and H. M. Sardroudi, “Training feedforward neural networks using hybrid particle swarm optimization and gravitational search algorithm,” Applied Mathematics and Computation, vol. 218, no. 22, pp. 11125–11137, 2012.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8] S. Mirjalili and S. Z. M. Hashim, “A new hybrid PSOGSA algorithm for function optimization,” in Computer and information application (ICCIA), 2010 international conference on, 2010, pp. 374–377.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9] Z. X. Guo, W. K. Wong, and M. Li, “Sparsely connected neural network-based time series forecasting,” Information Sciences, vol. 193, pp. 54–71, 2012.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10] P. Auer, H. Burgsteiner, and W. Maass, “A learning rule for very simple universal approximators consisting of a single layer of perceptrons,” Neural Networks, vol. 21, no. 5, pp. 786–795, 2008.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11] Haykin and C. Deng, “Classification of radar clutter using  NN,” IEEE Trans. Neural Netw., vol. 2, November 1991.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12] R. Soleti, L. Cantini, F. Berizzi, A. Capria, and D. Calugi, “Neural Network for polarimetric radar target classification,” in Signal Processing Conference, 2006 14th European, 2006, pp. 1–5.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13] K. Cheikh and F. Soltani, “Application of neural networks to radar signal detection in k-distributed clutter,” Radar, Sonar and Navigation, IEE Proceedings, vol. 153, no. 5, pp. 460-466, 2006.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14] R. Vicen-Bueno, M. Rosa-Zurera, M. P. Jarabo-Amores, and R. Gil-Pita, “Automatic target detection in simulated ground clutter (Weibull distributed) by multilayer perceptrons in a low-resolution coherent radar,” Radar, Sonar &amp;amp; Navigation, IET, vol. 4, no. 2, pp. 315–328, 2010.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15] C. Bouvier, L. Martinet, G. Favier, H. Sedano, and M. Artaud, “Radar clutter classification using autoregressive modelling, K-distribution and neural network,” in Acoustics, Speech, and Signal Processing, 1995. ICASSP-95., 1995 International Conference on, 1995, vol. 3, pp. 1820–1823.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16] L. Pierucci and L. Bocchi, “Improvements of radar clutter classification in air traffic control environment,” in Signal Processing and Information Technology, 2007 IEEE International Symposium on, 2007, pp. 721–724.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17] L. Teng, H. Dan, “Model for spatial correlated clutter and its application to temporal spatialcorrelated clutter”, IET Microwaves, Antennas &amp;amp; Propagation, Vol. 5, No. 3, 2011, pp. 298-304.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18] K. D. Ward, S. Watts, and R. J. Tough, Sea clutter: scattering, the K distribution and radar performance, vol. 20. IET, 2006.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19] A. Farina, A. Russo, and F. A. Studer, “Coherent radar detection in log-normal clutter,” Communications, Radar and Signal Processing, IEE Proceedings F, vol. 133, no. 1, pp. 39–53, 1986.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20] W. Stehwien, “Parametric spectral analysis of radar clutter,” McMaster University, 1983.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21] J. P. Burg, “A new  analysis  technique  for  time  series  data,” presented at the NATO Advanced  Study Institute  on Signal Processing with Emphasis on Underwater Acoustics, Enschede, The Netherlands,  1968.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22] S. S. Haykin, Adaptive filter theory. Pearson Education India, 2008.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23] J. R. Barry, B. K. Carter, R. J. Erdahl, R. L. Harris, J. T. Miller, G. D. Smith, and R. M. Barnes, “Angel clutter and the ASR air traffic control radar,” Applied Physics Laboratory, John Hopkins University, Silver Spring, MD, Final Report under Federal Aviation Administration Contract DOT-FA72WA-2705, 1973.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24] M. Kubat, Neural networks: a comprehensive foundation by Simon Haykin, Macmillan, 1994, ISBN 0-02-352781-7. Cambridge Univ Press, 1999.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25] H. Adeli and S.-L. Hung, Machine learning: neural networks, genetic algorithms, and fuzzy systems. John Wiley &amp;amp; Sons, Inc., 1994.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26] J. J. Mor&amp;#233;, “The Levenberg-Marquardt algorithm: implementation and theory,” in Numerical analysis, Springer, 1978, pp. 105–116.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27] M. T. Hagan and M. B. Menhaj, “Training feedforward networks with the Marquardt algorithm,” Neural Networks, IEEE Transactions on, vol. 5, no. 6, pp. 989–993, 1994.#</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28] R. Fletcher and C. M. Reeves, “Function minimization by conjugate gradients,” The computer journal, vol. 7, no. 2, pp. 149–154, 1964.#</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29] A. Ebrahimzadeh, A. Khazaee, An efficient technique for classification of electrocardiogram signals, Advances in Electrical and Computer Engineering, Volume 9, 2009, pp. 89-93.#</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30] M. Riedmiller and H. Braun, “A direct adaptive method for faster backpropagation learning: The RPROP algorithm,” in Neural Networks, 1993., IEEE International Conference on, 1993, pp. 586–591.#</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31] S. Haykin, Neural Networks: A Comprehensive Foundation. New York: MacMillan, 1999.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New Calibration Method for SAR Analog-to-Digital Converters Based on All Digital Dithering</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Ebrahim</given_name><surname>Farshidi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Shabnam</given_name><surname>Rahbar</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2017.17.001</doi><resource>http://jist.ir/en/Article/15015</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15015</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15015</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15015</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15015</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15015</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15015</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15015</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] F. Kuttner, “A 1.2-V 10-b 20-Msample/s nonbinary successive approximation ADC in 0.13- m CMOS,” in IEEE ISSCC Dig. Tech. Papers, Feb. 2002.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2] J. Craninckx and G. Van der Plas, “A 65 fJ/conversion-step 0-to-50 MS/s 0-to-0.7 mW 9 b charge-sharing SAR ADC in 90 nm digital CMOS,” in IEEE ISSCC Dig. Tech. Papers, Feb. 2007.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3] V. Giannini et al., “An 820 W 9 b 40 MS/s noise-tolerant dynamic-SAR ADC in 90 nm digital CMOS,” in IEEE ISSCC Dig. Tech.Papers, Feb. 2008.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4] C. C. Liu et al., “A 10 b 100 MS/s 1.13 mW SAR ADC with binary scaled error compensation,” in IEEE ISSCC Dig. Tech. Papers, Feb. 2010.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5] Y. Z. Lin et al., “A 9-bit 150-MS/s 1.53-mW subranged SAR ADC in 90-nm CMOS,” in Symp. VLSI Circuits Dig. Tech. Papers, Jun. 2010.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6] C. C. Liu et al., “A 1 V 11 fJ/conversion-step 10 bit 10 MS/s asynchronous SAR ADC in 0.18 m CMOS,” in Symp. VLSI Circuits Dig. Tech. Papers, Jun. 2010.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7] G. Promitzer, “12 bit low-power fully differential switched capacitor noncalibrating successive approximation ADC with 1 MS/s,” IEEE J. Solid-State Circuits, vol. 36, no. 7, pp. 1138–1143, Jul. 2001.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8] C. P. Hurrell et al., “An 18 b 12.5 MHz ADC with 93 dB SNR,” in EEE ISSCC Dig. Tech. Papers, Feb. 2010.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9] W. Liu, P. Huang, and Y. Chiu, “A 12 b 22.5/45 MS/s 3.0 mW 0.059 mm CMOS SAR ADC achieving over 90 dB SFDR,” in IEEE ISSCC Dig. Tech. Papers, Feb. 2010.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation> [10] S. M. Louwsam et al., “A 1.35 GS/s, 10 b, 175 mW time-interleaved AD converter in 0.13 m CMOS,” IEEE J. Solid-State Circuits, vol. 43, no. 4, pp. 778–786, Apr. 2008.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation> [11] B. E. Amazeen, M. C. W. Coln, and G. R. Carreau, ”Quasi-differential successive-approximation structures and methods for converting analog signals into corresponding digital signals.” U.S. Patent 6,400,302, June,2002.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation> [12] W. Liu, Y. Chang, S.-K. Hsien, B.-W. Chen, Y.-P. Lee, W.-T. Chen, T.-Y. Yang, G.-K. Ma, and Y. Chiu, ”A 600MS/s 30mW 0:13_m CMOS ADC array achieving over 60dB SFDR with adaptive digital equalization,” ISSCC2009 Digest of Technical Papers, vol. 52, 2009, pp. 82-83.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13] W. Liu and Y. Chiu, “An equalization-based adaptive digital background calibration technique for successive approximation analog-to-digital converters,” in ASIC, 2007. ASICON&amp;#39;07. 7th International Conference on, pp. 289-292, 2007.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14] P. Harpe, H. Hegt, and A. Roermund, Smart AD and DA Conversion: Springer, 2010.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15] W. Liu, P. Huang, and Y. Chiu, “A 12-bit, 45-MS/s, 3-mW Redundant Successive-Approximation-Register Analog-to-Digital Converter With Digital Calibration,” IEEE Journal of Solid-State Circuits, vol. 46, pp. 2661-2672, 2011.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16] R. Xu, B. Liu, and J. Yuan, “Digitally Calibrated 768-kS/s 10-b Minimum-Size SAR ADC Array With Dithering,” IEEE Journal of Solid-State Circuits, vol. 47, pp. 2129-2140, 2012.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17] S. Rahbar and E. Farshidi “Digital Background Calibration of Radix 1.83 Successive Approximations Register Analog-to-Digital Converter using the Split Architecture,” Technical Journal of Engineering and Applied Sciences, vol. 3, no. 2, pp. 233-238, 2013.# </unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18] J. A. McNeill, K. Y. Chan, M. C. W. Coln, C. L. David, and C. Brenneman, “All-Digital Background Calibration of a Successive Approximation ADC Using the Split ADC Architecture,” Circuits and Systems I: IEEE Transactions on  Regular Papers, vol. 58, pp. 2355-2365, 2011.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19] L. Du, N. Ning, S. Wu, and Y. Liu, “A digital background calibration technique for SAR ADC based on capacitor swapping,” IEICE , vo11, no. 12, pp. 1-11, 2014.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20] J. Wu, A. Wu, and Y. Du, “Dithering-based calibration of capacitor mismatch in SAR ADCs,” Electronic Letters IET, vol. 52, no. 19, pp. 1198-1600, 2016.#</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>