﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051923</doi_batch_id><timestamp>20260519232533</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>11</month><day>12</day><year>2017</year></publication_date><journal_volume><volume>5</volume></journal_volume><issue>19</issue></journal_issue><journal_article publication_type="full_text"><titles><title>De-lurking in Online Communities Using Repost Behavior Prediction Method</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Omid Reza</given_name><surname>Bolouki Speily</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>12</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2017.19.006</doi><resource>http://jist.ir/en/Article/14944</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14944</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14944</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14944</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14944</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14944</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14944</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14944</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	E. Wenger, “Communities of Practice and Social Learning Systems,” Organization, vol. 7. pp. 225–246, 2000.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	E. Wenger, community of practice: a brief introduction, vol. 15. 1998.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	M. O. Weil, “Community building: building community practice,” Soc. Work, vol. 41, p. 481, 1996.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	L. Clarke, “The POD model: Using communities of practice theory to conceptualise student teachers’ professional learning online,” Comput. Educ., vol. 52, no. 3, pp. 521–529, 2009.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	C. K. Chang, G. D. Chen, and L. Y. Li, “Constructing a community of practice to improve coursework activity,” Comput. Educ., vol. 50, pp. 235–247, 2008.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	T. Hoang and E. Lim, “Virality and Susceptibility in Information Diffusions,” Artif. Intell., no. 2010, pp. 146–153, 2012.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	I. Uysal and W. B. Croft, “User oriented tweet ranking: A filtering approach to microblogs,” in International Conference on Information and Knowledge Management, Proceedings, 2011, pp. 2261–2264.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	D. Ienco, F. Bonchi, and C. Castillo, “The meme ranking problem: Maximizing microblogging virality,” in Proceedings - IEEE International Conference on Data Mining, ICDM, 2010, pp. 328–335.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	L. Gou, X. (Luke) Zhang, H.-H. Chen, J.-H. Kim, and C. L. Giles, “Social network document ranking,” Proc. 10th Annu. Jt. Conf. Digit. Libr. - JCDL ’10, pp. 313–322, 2010.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	M. Cha, H. Haddai, F. Benevenuto, and K. P. Gummadi, “Measuring User Influence in Twitter : The Million Follower Fallacy,” Int. AAAI Conf. Weblogs Soc. Media, pp. 10–17, 2010.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	D. M. Romero, W. Galuba, S. Asur, and B. a. Huberman, “Influence and passivity in social media,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6913 LNAI, no. PART 3, pp. 18–33, 2011.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	D. Gruhl, D. Liben-Nowell, R. Guha, and A. Tomkins, “Information diffusion through blogspace,” ACM SIGKDD Explorations Newsletter, vol. 6. pp. 43–52, 2004.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	E. Adar and L. a. Adamic, “Tracking information epidemics in blogspace,” Proc. - 2005 IEEE/WIC/ACM Int. Web Intell. WI 2005, vol. 2005, pp. 207–214, 2005.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	J. Leskovec, L. Adamic, and B. Huberman, “The Dynamics of Viral Marketing,” ACM Trans. Web, vol. 1, no. 1, pp. 1–39, 2007.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	E. Sun, I. Rosenn, C. a Marlow, and T. M. Lento, “Gesundheit ! Modeling Contagion through Facebook News Feed Mechanics of Facebook Page Diffusion,” Proc. Third Int. ICWSM Conf., no. 2000, pp. 146–153, 2009.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	E. Bakshy, B. Karrer, and L. A. Adamic, “Social Influence and the Diffusion of User Created Content,” in Electronic Commerce, 2009, pp. 325–334.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	P. Domingos and M. Richardson, “Mining the Network Value of Customers,” in Proceedings of the Seventh {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, 2001, pp. 57–66.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	M. Richardson and P. Domingos, “Mining knowledge-sharing sites for viral marketing,” Proc. eighth ACM SIGKDD Int. Conf. Knowl. Discov. data Min. KDD 02, vol. 02, no. 3, p. 61, 2002.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	D. Kempe, J. Kleinberg, and &amp;#201;. Tardos, “Maximizing the spread of influence through a social network,” in Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining - KDD ’03, 2003, p. 137.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	A. Goyal, F. Bonchi, and L. V. S. Lakshmanan, “A data-based approach to social influence maximization,” Proc. VLDB Endow., vol. 5, pp. 73–84, 2011.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	U. Feige, V. S. Mirrokni, and J. Vondr&amp;#225;k, “Maximizing non-monotone submodular functions,” in Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS, 2007, pp. 461–471.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	S. Stieglitz and L. Dang-Xuan, “Emotions and Information Diffusion in Social Media - Sentiment of Microblogs and Sharing Behavior,” J. Manag. Inf. Syst., vol. 29, no. 4, p. 217, 2013.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	S. Ye and S. F. Wu, “Measuring message propagation and social influence on Twitter.com,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, vol. 6430 LNCS, pp. 216–231.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	D. M. Romero, W. Galuba, S. Asur, and B. A. Huberman, “Influence and passivity in social media,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, vol. 6913 LNAI, pp. 18–33.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	M. Magnani, D. Montesi, and L. Rossi, “Information Propagation Analysis in a Social Network Site,” 2010 Int. Conf. Adv. Soc. Networks Anal. Min., pp. 296–300, 2010.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	A. Anderson, D. Huttenlocher, J. Kleinberg, and J. Leskovec, “Effects of user similarity in social media,” in Proceedings of the fifth ACM international conference on Web search and data mining WSDM 12, 2012, p. 703.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	A. Goyal, F. Bonchi, and L. V. S. Lakshmanan, “Learning influence probabilities in social networks,” Proc. third ACM Int. Conf. Web search data Min. - WSDM ’10, p. 241, 2010.#</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	N. E. Friedkin and E. C. Johnsen, “Social influence and opinions,” The Journal of Mathematical Sociology, vol. 15. pp. 193–206, 1990.#</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	J. Tang, J. Sun, C. Wang, and Z. Yang, “Social Influence Analysis in Large-scale Networks,” in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2009, pp. 807–816.#</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	M. Nagarajan, H. Purohit, and A. Sheth, “A Qualitative Examination of Topical Tweet and Retweet Practices,” Artif. Intell., pp. 295–298, 2010.#</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	C. G. Knight and L. K. Kaye, “‘To tweet or not to tweet?’ A comparison of academics’ and students’ usage of Twitter in academic contexts,” Innov. Educ. Teach. Int., no. April 2015, pp. 1–11, 2014.#</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	C. Haeussler, “Information-sharing in academia and the industry: A comparative study,” Res. Policy, vol. 40, no. 1, pp. 105–122, 2011.#</unstructured_citation></citation><citation key="ref33"><unstructured_citation>[33]	W. S. Hwang, S. W. Kim, D. H. Bae, and Y. J. Do, “Post ranking algorithms in blog environment,” in Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008, 2008, vol. 2, pp. 64–67.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Concept Detection in Images Using SVD Features and Multi-Granularity Partitioning and Classification</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Kamran </given_name><surname>Farajzadeh </surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Esmail </given_name><surname>Zarezadeh </surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Jafar</given_name><surname>Mansouri</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>12</day><year>2017</year></publication_date><pages><first_page>172</first_page><last_page>182</last_page></pages><doi_data><doi>10.7508/jist.2017.19.004</doi><resource>http://jist.ir/en/Article/14972</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14972</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14972</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14972</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14972</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14972</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14972</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14972</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Tian, Y. Huang, Z. Guo, X. Qi, Z. Chen, T. Huang, &amp;quot;A multi-modal topic model for image annotation using text analysis,&amp;quot; IEEE Signal Process. Lett., vol. 22, no. 7, pp. 886–890, Jul. 2015.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	E. Hassan, S. Chaudhury, and M. Gopal, &amp;quot;Word shape descriptor-based document image indexing: a new DBH-based approach,&amp;quot; International Journal on Document Analysis and Recognition (IJDAR), vol. 16, no. 3, pp 227-246, Sep. 2013. #</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	Moving Picture Expert Group.  [Online]. Available: http://www.chiariglione.org/mpeg#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	Y.-G. Jiang, J. Yang, C.-W. Ngo, and A. Hauptmann, “Representations of keypoint-based semantic concept detection: A comprehensive study,” IEEE Trans. Multimedia, vol. 12, no. 1, pp. 42–53, Jan. 2010.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	K. Beyer, J. Goldstein, R. Ramakrishnan, and U. Shaft, “When is nearest neighbors meaningful?” in Proc. Seventh Int’l Conf. Databasse Theory (ICDT ’99), 1999, vol. 1540, pp. 217–235.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	M. Ledoux, The Concentration of Measure Phenomenon. Mathematical Surveys and Monographs, Vol. 89, American Mathematical Society, 2005. #</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	C.-M. Hsu and M.-S. Chen, “On the design and applicability of distance functions in high-dimensional data space,” IEEE Trans. Knowl. Data Eng., vol. 21, no. 4, pp. 523–536, Apr. 2009.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	R. J. Durrant and A. Kaban, “When is ‘nearest neighbour’ meaningful: A converse theorem and implications,” J. of Complexity, vol. 25, no. 4, pp. 385–397, 2009.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	J. Mansouri and M. Khademi, &amp;quot;Multiplicative Distance: A method to alleviate distance instability for high-dimensional data,&amp;quot; Knowledge and Information Systems, vol. 45, no. 3, pp. 783-805, 2015.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	Y, Han, Y. Yang, Y. Yang, Z. Ma, N. Sebe, and X. Zhou, &amp;quot;Semisupervised feature selection via spline regression for video semantic recognition,&amp;quot; IEEE Trans. Neural Networks and Learning Systems, vol. 26, no. 2, pp. 252–264, Feb. 2014. #</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	L. Duan, I. W. Tsang, and D. Xu, &amp;quot;Domain transfer multiple kernel learning,&amp;quot; IEEE Trans. Pattern Anal. Machine Intell., vol. 34, no. 3, pp. 465–479, Mar. 2012.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	X. Chen, X. Yang, R. Zhang, A. Liu, and S. Zheng, &amp;quot;Edge region color autocorrelogram: A new low-level feature applied in CBIR,&amp;quot; in Proc. IEEE Int. Symp. Broadband Multimedia Systems and Broadcasting (BMSB), 2010, pp. 1–4.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	X. Zhang and C. Liu, &amp;quot;Image understanding based on histogram of contrast,&amp;quot; Signal, Image and Video Processing, pp. 1–10, Nov. 2014. #</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	S. Lazebnik, C. Schmid, and J. Ponce, “Beyond bags of features: Spatial pyramid matching for recognizing natural scene categories,” Proc. IEEE Conf.Computer Vision and Pattern Recognition, vol. 2, pp. 2169-2178, 2006.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	G. Csurka and F. Perronnin, &amp;quot;Fisher vectors: beyond bag-of-visual-words image representations,&amp;quot; Computer Vision, Imaging and Computer Graphics. Theory and Applications, vol. 229, pp. 28-42, 2011.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	R. Liu, Y. Chen, X. Zhu, K. Hou, &amp;quot;Image classification using label constrained sparse coding,&amp;quot; Multimed Tools Appl, pp. 1-15, 2015.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	J. Chen, Q, Li, Q. Peng, K.H. Wong, &amp;quot;CSIFT based locality-constrained linear coding for image classification,&amp;quot; Pattern Analysis and Applications, vol. 18, no. 2, pp. 441-450, May 2015. #</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	X.Y. Ou, H.F. Ling, L.Y. Yan and M.L. Liu, &amp;quot;Convolutional neural codes for image retrieval,&amp;quot; Annual Summit and Conference on Asia-Pacific Signal and Information Processing Association (APSIPA), pp. 1-10, 2014. #</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	G. W. Stewart, Matrix Algorithms, Volume II: Eigensystems, Philadelphia: Siam, 2001.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	G. Wang and Q. M. J. Wu, Advances in Pattern Recognition: Guide to Three Dimensional Structure and Motion Factorization, London: Springer, 2011.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	H. Yanai, K. Takeuchi, and Y. Takane, Projection Matrices, Generalized Inverse Matrices, and Singular Value Decomposition, New York: Springer, 2011.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	D. Skillicorn, Understanding Complex Datasets: Data Mining with Matrix Decompositions, Boca Raton: CRC Press, 2007.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	M. Narwaria and W. Lin, &amp;quot;SVD-based quality metric for image and video using machine learning,&amp;quot; IEEE Trans. Syst., Man, Cybern. B, </unstructured_citation></citation><citation key="ref24"><unstructured_citation>Cybern., vol. 42, no. 2, pp. 347–364, Apr. 2012.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[24]	R. Constantini, L. Sbaiz, and S. S&amp;#252;sstrunk, “Higher order SVD analysis for dynamic texture synthesis,” IEEE Trans. Image Process., vol. 17, no. 1, pp. 42–52, Jan. 2008.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[25]	A.K. Jha, R. Gupta, and D. Saini, &amp;quot;Face recognition: A Fourier transform and SVD based approach,&amp;quot; in Proc. 5th Int. Conf. Computational Intelligence and Communication Networks,&amp;quot; 2013, pp. 205–209.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[26]	M. Radovanovi&amp;#39;c, A. Nanopoulos, and M. Ivanovi&amp;#180;c, &amp;quot;On the existence of obstinate results in vector space models,&amp;quot; in Proc. 33rd Int. ACM SIGIR conference on Research and development in information retrieval, New York, 2010, pp. 186–193. #</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[27]	J. Hegde, &amp;quot;Time course of visual perception: Coarse-to-fine processing and beyond,&amp;quot; Progress in Neurobiology, vol. 84, pp. 405–439, 2008.#</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[28]	M.D. Menz and R.D. Freeman, &amp;quot;Stereoscopic depth processing in the visual cortex: A coarse-to-fine mechanism,&amp;quot; Nat. Neurosci., vol. 6, pp. 59–65, 2003. #</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[29]	M. Everingham, L. Van Gool, C. K. I. Williams, J. Winn, and A. Zisserman. (2007). The PASCAL Visual Object Classes Challenge Results [Online]. Available: http://www.pascal-network.org/challenges/VOC/voc2007/workshop/index.html#</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[30]	M. Sanderson, “Test collection based evaluation of information retrieval systems,” Foundations Trends Inform. Retrieval, vol. 4, no. 4, pp. 247–375, 2010.#</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[31]	P. Over, G.M. Awad, W. Keraaij, and A.F. Smeaton, &amp;quot;TRECVID 2007-overview,&amp;quot; in TRECVid 2007 - Text REtrieval Conference TRECVid Workshop, Gaithersburg, Maryland, Nov. 2007.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Good Index Choosing for Polarized Relay Channel</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hassan</given_name><surname>Tavakoli</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Saeid</given_name><surname>Pakravan</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>12</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2017.19.007</doi><resource>http://jist.ir/en/Article/14974</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14974</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14974</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14974</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14974</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14974</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14974</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14974</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Van Der Meulen, Edward C. &amp;quot;Three-terminal communication       channels.&amp;quot;Advances in applied Probability (1971): 120-154.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	 Cover, Thomas M., and Abbas El Gamal. &amp;quot;Capacity theorems for the relay channel.&amp;quot; Information Theory, IEEE Transactions on 25, no. 5 (1979): 572-584.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	Arikan, Erdal. &amp;quot;Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels.&amp;quot;Information Theory, IEEE Transactions on 55, no. 7 (2009): 3051-3073.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	Arıkan, Erdal, and Emre Telatar. &amp;quot;On the rate of channel polarization.&amp;quot; InInformation Theory, 2009. ISIT 2009. IEEE International Symposium on, pp. 1493-1495. IEEE, 2009.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	Sasoglu, Eren, Emre Telatar, and Edmund Yeh. &amp;quot;Polar codes for the two-user multiple-access channel.&amp;quot; arXiv preprint arXiv:1006.4255 (2010).#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	Abbe, Emmanuel, and Emre Telatar. &amp;quot;Polar codes for the-user multiple access channel.&amp;quot; Information Theory, IEEE Transactions on 58, no. 8 (2012): 5437-5448.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	Goela, Naveen, Emmanuel Abbe, and Michael Gastpar. &amp;quot;Polar codes for broadcast channels.&amp;quot; Information Theory, IEEE Transactions on 61, no. 2 (2015): 758-782.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	Mondelli, Marco, S. Hamed Hassani, Igal Sason, and Rudiger L. Urbanke. &amp;quot;Achieving Marton’s region for broadcast channels using polar codes.&amp;quot;Information Theory, IEEE Transactions on 61, no. 2 (2015): 783-800.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	Andersson, Mattias, Vishwambhar Rathi, Ragnar Thobaben, J&amp;#246;rg Kliewer, and Mikael Skoglund. &amp;quot;Nested polar codes for wiretap and relay channels.&amp;quot;Communications Letters, IEEE 14, no. 8 (2010): 752-754.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	Blasco-Serrano, Ricardo, Ragnar Thobaben, Mattias Andersson, Vishwambhar Rathi, and Mikael Skoglund. &amp;quot;Polar codes for cooperative relaying.&amp;quot; Communications, IEEE Transactions on 60, no. 11 (2012): 3263-3273.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	Blasco-Serrano, Ricardo, Ragnar Thobaben, Vishwambhar Rathi, and Mikael Skoglund. &amp;quot;Polar codes for compress-and-forward in binary relay channels.&amp;quot; In Signals, Systems and Computers (ASILOMAR), 2010 Conference Record of the Forty Fourth Asilomar Conference on, pp. 1743-1747. IEEE, 2010.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	Karzand, Mohammad. &amp;quot;Polar codes for degraded relay channels.&amp;quot; InProceedings of the International Zurich Seminar on Communications, pp. 59-62. 2012.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	Wang, Lele. &amp;quot;Polar coding for relay channels.&amp;quot; In Information Theory (ISIT), 2015 IEEE International Symposium on, pp. 1532-1536. IEEE, 2015.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	El Gamal, Abbas, and Young-Han Kim. Network information theory. Cambridge university press, 2011.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	Khalili, Ramin, and Kav&amp;#233; Salamatian. &amp;quot;On the achievability of cut-set bound for a class of erasure relay channels: The non-degraded case.&amp;quot; InProceedings of the Intl. Symposium on Information Theory and its Applications, pp. 10-13. 2004.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	Şaşoğlu, Eren. &amp;quot;An entropy inequality for q-ary random variables and its application to channel polarization.&amp;quot; In Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on, pp. 1360-1363. IEEE, 2010.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	Şasoğlu, Eren, Emre Telatar, and Erdal Arikan. &amp;quot;Polarization for arbitrary discrete memoryless channels.&amp;quot; In Information Theory Workshop, 2009. ITW 2009. IEEE, pp. 144-148. IEEE, 2009.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	Soliman, Tamer HM, Fengfan Yang, and Saqib Ejaz. &amp;quot;Decode and Forward Polar Coding Scheme for Receive Diversity: A Relay Partially perfect retransmission for Half-Duplex Wireless Relay Channels.&amp;quot; IET Communications (2016).#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	Wang, Lele. &amp;quot;Polar coding for relay channels.&amp;quot; In 2015 IEEE International Symposium on Information Theory (ISIT), pp. 1532-1536. IEEE, 2015.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Investigating the Effect of Functional and Flexible Information Systems on Supply Chain Operation: Iran Automotive Industry</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Abbas</given_name><surname>Zareian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Iraj</given_name><surname>Mahdavi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hamed</given_name><surname>Fazlollahtabar</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>12</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2017.19.005</doi><resource>http://jist.ir/en/Article/14977</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14977</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14977</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14977</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14977</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14977</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14977</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14977</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] Safaei Ghadikolaei , Abdol Hamid et al, comparative Evaluation of Noble, Fast and Noble and Fast Supply Chain Strategies, Executive Management Bulletin, 2011#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2] Shahabi, Behnam, “Human Aspect of Organizational Fastness”, Measure Sentence,  no 175, Azar, Industrial Management Organization, 2005#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3] g. Stevens, Integrating the supply chains, International Journal of physical pistribution and material management, 1989#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4] Lee, H. L.,. Aligning supply chain strategies California management review,vol.44.no.3, spring 2002#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5] Vonderembse, M. A., Uppal, M., Huang, S.H., pismukes, J.P.,. Designing supply chains: towards theory development. International journal of production E Conomics, 2006#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6] Hines, P., Holweg, M. and Rich, N.. Learning to evolve: A review of Gntemporary lean thinking. International journal of operations &amp; production management, (2004)#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7] Agrawal, A., Shankar, R &amp; Tiwari, M.K. "modeling the metrics of lean, agile and Leagile supply chain An ANP-based approach", European journal of operational Research, (2006)#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8] M.christopher and C.Ruther ford,. "Creating supply chain Resilience through agile six sigma," critical Eye, (2004)#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9] G. Gunasekaran and E. Tir. tir oglu, "Performance measures and metrics in a supply chain environment",internationah journal of operation &amp; production management, (2001)#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10] A. Gunase karan, C. Patel, and R. Mc Gaughey, A frame work for supply chain performance measurement", internationah journal of production economics,volume 78,pages333-347 ,(2004)#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11] D. Lambert and L. Pohlen., "supply metrics"., The International journal of logistics management, (2001)#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]Wu, C.R.,Chang, C.W. and Lin,H.L. « A Fuzzy ANPbased Approach to Evaluate Medical Organizational Performance»,Info- rmation and Manag- ement Sciences, Vol.19 No. 1, pp. 53-74, 2008#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13] Sanderson, J. &amp; Cox, A. «The chall- enges of supply strategy selection in a proj- ect environment: evidence   from UK naval shipbuilding »    ,International  Journal    of Supply  Chain Management, 2008#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14] Kisperska-Moron,D.&amp; Swierczek, A. «The agile capabilities of   Polish companies in the supply chain  : An empirical study   », International Journal    of Production   Econ- omics, 118, 217–224, 2009#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15] Qrunfleh,s.tarfdar,m.   supply chain inform- ation system strategy:impact on supply chai performance and firm      performance Int. J. Production Economics,2012#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16] Bendoly, E., Schoenherr, T. ERP system- and implementation-benefits: 19 implications for B2B E-procurement. International Journal of Operations and Production Management 25 (4), 304–319, 2005#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17] Bendoly, E., Jacobs, F.R.,. ERP architectural/operational alignment for20 orderprocessing performance. International Journal of Operations &amp; Production Management 24 (1), 99–117, 2004#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18] Okyere,s.tuo,G.supply chain hnformation system flexibility and performant .,Int J Production Econom, 2014#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]  Qi, Y., Zhao, X., Sheu, C.,. The impact of competitive strategy and supply chain22 strategy on business performance: the role of environmental uncertainty, 2011#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A RFMV Model and Customer Segmentation Based on Variety of Products</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Saman </given_name><surname>Qadaki Moghaddam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Neda</given_name><surname>Abdolvand</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Saeedeh</given_name><surname>Rajaee Harandi</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>12</day><year>2017</year></publication_date><pages><first_page>155</first_page><last_page>161</last_page></pages><doi_data><doi>10.7508/jist.2017.19.002</doi><resource>http://jist.ir/en/Article/14983</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14983</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14983</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14983</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14983</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14983</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14983</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14983</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>M. Khajvand, K. Zolfaghar, S. Ashoori, and S. Alizadeh, “Estimating customer lifetime value based on RFM analysis of customer purchase behavior: Case study”. Procedia Computer Science, Vol. 3, 2011, pp. 57-63.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>P T. Kord Asiabi,, and R. Tavoli, "A Review of Different Data Mining Techniques in Customer Segmentation." Journal of Advances in Computer Research. Vol. 6, No.3, 2015, pp. 51-63.# </unstructured_citation></citation><citation key="ref3"><unstructured_citation>V. L. Miguéis, D. Van den Poel, A. S. Camanho, and J. F. e Cunha, “Modeling partial customer churn: On the value of first product-category purchase sequences”. Expert systems with applications, Vol. 39, No.12, 2012, pp.11250-11256.# </unstructured_citation></citation><citation key="ref4"><unstructured_citation>D. A. Kandeil, A. A. Saad, and S. M. Youssef, “A Two-Phase Clustering Analysis for B2B Customer Segmentation”. In: Intelligent Networking and Collaborative Systems (INCoS), 2014 International Conference on. IEEE, 2014. pp. 221-228.#‏ </unstructured_citation></citation><citation key="ref5"><unstructured_citation>C. Liu, “Customer Segmentation and Evaluation Based on RFM, Cross-Selling and Customer Loyalty”. In: 2011 International Conference on Management and Service Science. 2011.‏#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>E. S. Margianti, R. Refianti, A. B. Mutiara, and K. Nuzulina, “Affinity Propagation and Rfm-Model for CRM's Data Analysis". Journal of Theoretical and Applied Information Technology, Vol. 84, No. 2, 2016, p. 272.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>H. Hwang, T. Jung, and E. Suh, “An LTV model and customer segmentation based on customer value: a case study on the wireless telecommunication industry”. Expert systems with applications, Vol. 26, No. 2, 2004, pp. 181-188.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>C. F. Tsai, Y. H. Hu, and Y. H. Lu, “Customer segmentation issues and strategies for an automobile dealership with two clustering techniques”. Expert Systems, Vol. 32, No.1, 2015, pp. 65-76.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>W. Wang, and S. Fan, “Application of Data Mining Technique in Customer Segmentation of Shipping Enterprises”. In 2010 2nd International Workshop on Database Technology and Applications, on. IEEE.‏ 2010, November. pp. 1-4.# </unstructured_citation></citation><citation key="ref10"><unstructured_citation>K. N. Lemon, and T. Mark, “Customer lifetime value as the basis of customer segmentation: Issues and challenges”. Journal of Relationship Marketing, Vol. 5, No. 2-3, 2006, pp.55-69.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>B. Noori, “An Analysis of Mobile Banking User Behavior Using Customer Segmentation”. International Journal of Global Business, Vol. 8, No.2, 2015, p. 55.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>Y. L. Chen, M. H. Kuo, S. Y. Wu, and K. Tang, “Discovering recency, frequency, and monetary (RFM) sequential patterns from customers’ purchasing data”. Electronic Commerce Research and Applications, Vol. 8, No. 5, 2009, pp. 241-251.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>C. H. Cheng, and Y. S. Chen, “Classifying the segmentation of customer value via RFM model and RS theory”. Expert systems with applications, Vol. 36, No. 3, 2009, pp.4176-4184.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>J. T. Wei, S. Y. Lin, C. C. Weng, and H. H. Wu, “A case study of applying LRFM model in market segmentation of a children’s dental clinic”.Expert Systems with Applications, Vol. 39, No. 5, 2012, pp. 5529-5533.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>A. Asllani, and D. Halstead, “A Multi-Objective Optimization Approach Using the RFM Model in Direct Marketing”. Academy of Marketing Studies Journal, Vol. 19, No. 3, 2015, p. 49.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	S. M. S. Hosseini, A. Maleki, and M. R. Gholamian, “Cluster analysis using data mining approach to develop CRM methodology to assess the customer loyalty”. Expert Systems with Applications, Vol. 37, No. 7, 2010, pp. 5259-5264.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>R. Venkatesan, and V. Kumar, “A customer lifetime value framework for customer selection and resource allocation strategy”. Journal of marketing, Vol.68, No. 4, 2004, pp.106-125.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>M. Alvandi, S. Fazli, and F. S. Abdoli, “K-Mean clustering method for analysis customer lifetime value with LRFM relationship model in banking services”. International Research Journal of Applied and Basic Sciences, Vol. 3, No. 11, 2012, pp. 2294-2302.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>W. J. Reinartz, and V. Kumar, “On the profitability of long-life customers in a noncontractual setting: An empirical investigation and implications for marketing”. Journal of marketing, Vol. 64, No. 4, 2000, pp. 17-35.#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>R. A. Soeini, and E. Fathalizade, “Customer Segmentation based on Modified RFM Model in the Insurance Industry”, Proceedings of 4th International Conference on Machine Learning and Computing IPCSIT. Singapore: IACSIT Press. 2012, Vol. 25, pp. 104-108.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>A. Ansari, and A. Riasi, “Customer Clustering Using a Combination of Fuzzy C-Means and Genetic Algorithms”. International Journal of Business and Management, Vol. 11, No. 7, 2016, p.59.# </unstructured_citation></citation><citation key="ref22"><unstructured_citation>H. C. Chang &amp; H. P. Tsai, “Group RFM analysis as a novel framework to discover better customer consumption behavior”. Expert Systems with Applications, Vol. 38, No. 12, 2011, pp. 14499-14513.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>D. T. Larose, Data mining methods &amp; models. John Wiley &amp; Sons, 2006.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>S. Moro, R. Laureano, &amp; P. Cortez, “Using data mining for bank direct marketing: An application of the crisp-dm methodology”. In Proceedings of European Simulation and Modelling Conference-ESM, Eurosis, 2011, pp. 117-121.# </unstructured_citation></citation><citation key="ref25"><unstructured_citation>P. N. Tan, Introduction to data mining. Pearson Education India, 2006.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improving Image Dynamic Range For An Adaptive Quality Enhancement Using Gamma Correction</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hamid</given_name><surname>Hassanpour</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>12</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.66224/jist.14989.5.19.1</doi><resource>http://jist.ir/en/Article/14989</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/14989</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/14989</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/14989</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/14989</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/14989</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/14989</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/14989</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] M.Y. Nam, P.K. Rhee, “An efficient Face Recognition for Variant Illumination Condition”, The International Symposium on Intelligent Signal Processing and Communication Systems, 2004, pp. 111-115.#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2] Y. Shi, J. Yang, R.Wu, “Reducing Illumination Based on Nonlinear Gamma Correction”, The IEEE International Conference on Image Processing, San Antonio, 2007, pp. 529-532.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3] R.C. Gonzalez, R. E. Woods, “Digital Image Processing Prentice Hall, Upper Saddle River”, NJ 07458, 2002.#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4] M. Tiawari, S. S. Lamba, Bh. Gupta, “An approach for visibility improvement of dark color images using adaptive gamma correction and DCT-SVD”, International Workshop on Pattern Recognition, 2016.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5] H. Farid, “Blind Inverse Gamma Correction. IEEE Transactions on Image Processing”, Vol. 10, No. 10, 2001, pp.1428-1433.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6] S. Lee, “Content-based Image Enhancement in the Compressed Domain based on Multi-scale α-rooting Algorithm”, Pattern Recognition Letters, 2006, Vol. 27, No. 10, pp. 1054-1066.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7] Q. Chen, X. Xu, Q. Sun, D. Xia, “A Solution to the Deﬁciencies of Image Enhancement”, Signal Processing, 2010, Vol. 90, No. 1, pp. 44-56.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8] S. Asadi Amiri, H. Hassanpour, A.K. Pouyan, “Texture Based Image Enhancement Using Gamma Correction”, Middle-East Journal of Scientific Research, 2010, Vol. 6, pp. 569-574.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9] M. Farshbaf Doustar, H. Hassanpour, “A Locally Adaptive Approach for Image Gamma Correction”, Signal Processing and their Applications, 2010, pp. 73-76.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10] H. Hassanpour, S. Asadi Amiri, “Image Enhancement Using Gamma Information”, Journal of Signal and Data Processing, 2012, Vol. 1, No. 15, pp. 25-32.#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11] H. Hassanpour, S. Asadi Amiri, “Image Quality Enhancement Using Pixel Wise Gamma Correction via SVM Classifier”, International Journal of Engineering, 2011, Vol. 24, No. 4, pp. 301-311.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12] H. Hassanpour, S. Asadi Amiri, “A Preprocessing Approach for Image Analysis Using Gamma Correction”, International Journal of Computer Applications, 2012, Vol. 38, No. 12, pp. 38-46.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13] S. Asadi Amiri, E. Moudi, “Image Quality Enhancement in Digital Panoramic Radiograph”, Journal of AI and Data Mining, 2014, Vol. 2, No. 1, pp. 1-6.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14] H. Hassanpour, H. Yousefian, “An Improved Pixon-Based Approach for Image Segmentation”, International Journal of Engineering, 2011, Vol. 24, No. 1, pp. 25-35.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15] F. Yang, T. Jiang, “Pixon-based Image Segmentation with Markov Random Fields”, IEEE Transactions on Image Processing, 2003, Vol. 12, No. 12, pp. 1552-1559.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16] R. Jobanputra, D. Clausi, “Preserving Boundaries for Image Texture Segmentation using Grey Level Co-Occurring probabilities”, Pattern Recognition, 2006, Vol. 39, No. 2, pp. 234-245.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17] R.M. Haralick, K. Shanmugan, I. Dinstein,  “Textural features for image classiﬁcation”, IEEE Transactions on Systems, Man, and Cybernetics, 1973, Vol. 3, No. 6, pp. 610-621.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18] Z. Wang, A.C. Bovik, “Mean Squared Error: Love It or Leave It? A New Look at Signal Fidelity Measures”, IEEE Signal Processing, 2009, Vol. 26, No. 1, pp. 98-117.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19] Zh. Wang, L. Li, Sh. Wu, Y. Xia, Zh. Wan, C. Cai, “A New Image Quality Assessment Algorithm based on SSIM and Multiple Regressions”, International Journal of Signal Processing, Image Processing and Pattern Recognition, 2015, Vol. 8, No. 11, pp. 221-230.#</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Representing a Content-based link Prediction Algorithm in Scientific Social Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hosna</given_name><surname>Solaimannezhad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>omid</given_name><surname>fatemi</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>12</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2017.19.001</doi><resource>http://jist.ir/en/Article/15025</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15025</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15025</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15025</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15025</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15025</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15025</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15025</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]B. Furth, Handbook of Social Network Technologies and Applications, 2010. #[2]LiseGetoor, Christopher P. Diehl, “Link Mining: A Survey,” SIGKDD Explorations, Vol.7, No. 2, pp. 3-12, 2005. #[3]Pieter B. T. M.-F. W.,Koller A. D, “Link prediction in relational data,” Learning Statistical Patterns in Relational Data Using Probabilistic Relational Models, Vol.7, 2005. #[4]David Liben-Nowell, Jon Kleinberg, “The Link Prediction Problem for Social Networks,” Journal of the American Society for Information Science and Technology, Vo.No.58,7, pp. 1019-1031, 2007. #[5]FengX.,Zhao J.,Xu K, “Link prediction in complex networks: a clustering perspective,” European Physical Journal, vol.85, pp. 1-9, 2012. #[6]P Wang, BW Xu, YR Wu, X Zhou, “Link Prediction in Social Networks: the State-of-the-Art,” Science China Information Sciences, Vol.57, pp. 1-38, 2014. #[7]Stroele V, Zimbr~ao G, Souza J M, “Group and link analysis of multi-relational scientific Social Networks,” Journal of Systems and Software, Vol.86, pp. 1819-1830, 2013. [8]Rossetti G, Berlingerio M, Giannotti F, “Scalable link prediction on multidimensional networks,”  in11th IEEE International Conference on Data Mining Workshops, Vancouver, Canada, 2011. #[9]Mori J, Kajikawa Y, Kashima H, et al, “Machine learning approach for finding business partners and buildings reciprocal relationships,” Expert Systems with Applications, Vol.39, pp. 10402-10407, 2012. #[10]Wu S, Sun J, Tang J, “Patent partner recommendation in enterprise social networks,” inthe 6th ACM International Conference on Web Search and Data Mining (WSDM&amp;#39;13), Rome, Italy, 2013. #[11]Aiello L M, Barrat A, Schifanella R, et al, “Friendship prediction and homophily in social media,” inACM Transactions on the Web, 2012. #[12]Chen H H, Miller D J, Giles C L, “The predictive value of young and old links in a social network,”  inthe ACM SIGMOD Workshop on Databases and Social Networks, New York, USA, 2013. #[13]Davis D, Lichtenwalter R, Chawla N V, “Supervised methods for multi-relational link prediction,” Social Networks Analysis and Mining, Vol.3, pp. 127-141, 2013. #[14] 	Adamic, L.A., and E.Adar, “ Friend and Neighbors on the Web,” Social Networks, Vol.25, pp. 211-230, 2003. #[15] 	Soares P R S, Prud^encio R B C, “Proximity measures for link prediction based on temporal events,” Expert Systems with Applications, Vol.40, pp. 6652-6660, 2013. #[16] 	Richard E, Baskiotis N, Evgeniou T, et al, “Link discovery using graph feature tracking,” inthe 24th Annual Conference on Neural Information Processing Systems 2010, Vancouver, Canada, 2010. #[17] 	Oyama S, Hayashi K, Kashima H, “Cross-temporal link prediction,” inthe 11th IEEE International Conference on Data Mining (ICDM&amp;#39;11), Vancouver, Canada, 2011. #[18] 	da Silva Soares P R, BastosCavalcantePrud^encio R, “Time series based link prediction,”  in International Joint Conference on Neural Networks (IJCNN&amp;#39;12), Brisbane, Australia, 2012. #[19] 	Gilbert E, Karahalios K, “Predicting tie strength with social media,”  inthe SIGCHI Conference on Human Factors in Computing Systems, Boston, USA, 2009. #[20] 	O&amp;#39;Madadhain J, Hutchins J, Smyth P, “Prediction and ranking algorithms for event-based network data,” ACM SIGKDD Explorations, Vol.7, pp. 23-30, 2005. #[21] 	Sergey Brin and Lawrence Page, “The Anatomy of a Large-Scale Hypertextual Web Search Engine,” Computer Networks and ISDN Systems, Vol.30, pp. 107-117, 1998. #[22] 	RN Lichtenwalter, JT Lussier , NV Chawla, “New perspectives and methods in link prediction,” in16th ACM SIGKDD International Conference of Knowledge Discovery and Data Mining, Washington, DC, USA, 2010. #[23] 	Dunlavy D M, Kolda T G, Acar E, “Temporal link prediction using matrix and tensor factorizations,” ACM Transactions on Knowledge Discovery from Data,  Vol.5, pp. 1-27, 2011. #[24] 	Kuo T, Yan R, Huang Y, et al, “Unsupervised link prediction using aggregative statistics on heterogeneous social networks,”  inthe 19th ACM SIGKDD international conference on Knowledge discovery and data mining, Chicago, USA, 2013. #[25] 	Yin D, Hong L, Davison B D, “Structural link analysis and prediction in microblogs,” inthe 20th ACM International Conference on Information and Knowledge Management (CIKM&amp;#39;11), Glasgow, UK, 2011. #[26] 	Xiang R, Neville J, Rogati M, “Modeling relationship strength in online social networks,” inthe 19th International Conference on World Wide Web (WWW&amp;#39;10), Raleigh, USA, 2010. #[27] 	“LINKREC: a unified framework For link Recommendation with user attributes and Graph structure,”  inthe 19th International Conference on World Wide Web (WWW&amp;#39;10), Raleigh,USA, 2010. #[28] 	Sachan M, Ichise R, “Using semantic information to improve link prediction results in network datasets,” International Journal of Computer Theory and Engineering, Vol.3, pp. 71-76, 2011. #[29] 	C Cortes, V Vapnik, “Support-vector networks,” Machine learning, Vol.3, pp. 273-297, 1995. #[30] 	Zahra Sarabi, HoomanMahyar, MojganFarhoodi, “ParsiPardaz: Persian Language Processing Toolkit,” 2013. #[31] 	“http://www.ranks.nl/stopwords/persian,” [intra-linear]. #[32] 	Xuan-HieuPhan, Le-Minh Nguyen, and Susumu Horiguchi, “. Learning to Classify Short and Sparse Text&amp;amp;Web with Hidden Topics from Large-scale Data Collections,” inThe 17th International World Wide Web Conference, Beijing, China, 2008.# [33] 	Blei, D., Boyd-Graber, J., Zhu, X., “A Topic Model for Word Sense Disambiguation,”  inthe 2007Joint Conf. on Empirical Methods in Natural Language Processing and Comp. Natural Language Learning, 2007. #[34] 	Chen, W., Chu, J., Luan, J., Bai, H., Wang, Y., Chang, Y.E., “Collaborative Filtering for Orkut Communities: Discovery of User Latent Behavior,”  inInternational World Wide Web Conference, 2009. #[35] 	Singhal, Amit, “Modern Information Retrieval: A Brief Overview,” Bulletin of the IEEE Computer Society Technical Committee on Data Engineering,, NO. 244, pp. 35-43, 2003. #[36] 	P.-N. Tan, M. Steinbach&amp;amp;V. Kumar, Introduction to Data Mining, 2005. #[37] 	D. Hand, “Measuring classifier performance: a coherent alternative to the area under the ROC curve,” Machine learning, pp. 103-123, 2009. #[38] 	J Davis, M Goadrich, “The relationship between Precision-Recall and ROC curves,”  inthe 23rd international conference on Machine Learning, 2006. </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Analysis of Business Customers’ Value Network Using Data Mining Techniques</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Forough</given_name><surname>Farazzmanesh (Isvand)</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Monireh</given_name><surname>Hosseini</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>12</day><year>2017</year></publication_date><pages><first_page>1</first_page><last_page>10</last_page></pages><doi_data><doi>10.7508/jist.2017.19.003</doi><resource>http://jist.ir/en/Article/15030</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15030</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15030</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15030</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15030</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15030</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15030</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15030</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] Shaw M.J, Welge, M.E, Subramaniam, S. and tan, G.,  &amp;quot;Knowledge management and data mining for marketing&amp;quot; , Decision Support Systems, 31, 2001, pp. 127-137#</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2] Hellman K., &amp;quot;Strategy-driven B2B promotions&amp;quot;, Journal of Business &amp;amp; Industrial Marketing, 20( 1), 2005, pp.  4-11.#</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3] Albert C. Socci, &amp;quot;Value-based Marketing for Bottom-line Success&amp;quot;, Journal of Consumer Marketing, 22( 1), 2005, pp. 50 - 51#</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4] Holbrook M.B. , &amp;quot;The Nature of Customer Value&amp;quot;, Sage Publications, Thousand Oaks, CA, 1994.#</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5] Sin L.Y.M., Tse A.C.B. and Yim F.H.K. , &amp;quot;CRM: conceptualization and scale development&amp;quot;, European Journal of Marketing, 39(11/12), 2005, pp. 1264-90.#</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6] Hwang H., Jung t., Suh  E., &amp;quot;An LTV Model and Customer Segmentation Based on Customer Value: a case study on the wireless telecommunication industry&amp;quot;, Expert Systems with Applications, 26, 2004 , pp. 181–188.#</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]  Kiang M.Y, Hu M.Y, Fisher D.M,  &amp;quot;An Extended Self-organizing Map Network for Market Segmentation—a Telecommunication Example&amp;quot; Decision Support Systems ,42, 2006 , pp. 36– 47.#</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8] Mazzoni C., Castaldi L., Addeob F.,&amp;quot;Consumer Behavior in the Italian Mobile Telecommunication Market , Telecommunications Policy&amp;quot;, 31, 2007 , pp.  632–647.#</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]  Sohn S.Y, Kim Y., &amp;quot;Searching Customer Patterns of Mobile Service Using Clustering and Quantitative Association Rule&amp;quot;, Expert Systems with Applications, 34, 2008.#</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]  Hong R., Yan Z., Ye-rong W.  , &amp;quot;Clustering Analysis of Telecommunication Customers&amp;quot; , The Journal of China Universities of Posts and  Telecommunications, 16(2), 2009,pp.114–116 .#</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11] Bose I., Chen X., &amp;quot;Exploring Business Opportunities from Mobile Services Data of Customers:An Inter-cluster Analysis Approach&amp;quot;, Electronic Commerce Research and Applications ,9, 2010, pp. 197-208.#</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]  Hanaﬁzadeh P., Mirzazadeh M., &amp;quot;Visualizing Market Segmentation Using Self-organizing Maps and Fuzzy Delphi Method – ADSL Market of a Telecommunication Company&amp;quot;, Expert Systems with Applications, 38, 2011, pp. 198–205.#</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]  Cheng L.C, Sun L.M,, &amp;quot;Exploring Consumer Adoption of New Services by Analyzing the Behavior of 3G Subscribers: An Empirical Case Study, Electronic Commerce Research and Applications&amp;quot;, 11, 2012, pp. 89–100.#</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14] Li S.H, Shue L.Y, Lee S.F, &amp;quot;Business Intelligence Approach to Supporting Strategy-making of ISP Service Management&amp;quot;, Expert Systems with Applications, 35, 2008, pp. 739–754.#</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15] Bacila M.F, Radulescu A., Marar I.L, ,“RFM based Segmentation: An Analysis of a Telecom Company’s Customers”,Marketing From Information to Decision,5 , 2012,pp. 52-62.#</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16] Wei J.T, Lin S.Y and Wu H.H, &amp;quot;A Review of The Application of RFM Model , African Journal of Business Management&amp;quot;, 4(19), 2010, pp. 4199-4206, December Special Review.#</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17] Coyles S., Gokey T.C, &amp;quot;Customer Retention Is Not Enough, Journal of Consumer Marketing&amp;quot;, 22(2), 2005, pp. 101–105.#</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18] Bayer J.,&amp;quot;Customer Segmentation in the Telecommunications Industry, Journal of Database Marketing &amp;amp; Customer Strategy Management&amp;quot;, 17, 2010,pp. 247- 256.#</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]  Gummesson E., &amp;quot;Total relationship marketing: experimenting with a synthesis of research frontiers&amp;quot;, Australasian Marketing Journal, 7(1), 1999, pp. 72-85.	#</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]  Zolkiewski J. and Turnbull P., &amp;quot;Do relationship portfolios and networks provide the key to successful relationship management?&amp;quot;, Journal of Business &amp;amp; Industrial Marketing, 17(7), 2002, pp. 575-97.#</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21] Allee V., &amp;quot;Value Network Analysis and Value Conversion of Tangible and Intangible Assets&amp;quot; , Journal of Intellectual Capital, 9( 1) , 2008, pp.5-24.#</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22] Peppard J., Rylander A., &amp;quot;From Value Chain to Value Network: Insights for Mobile Operators&amp;quot; , European Management Journal, 24( 2), 2006.#</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]  Allee V.,  &amp;quot;A value Network Approach for Measuring and Modeling Intangibles&amp;quot;, Transparent Enterprise Conference, Madrid, 2002, available at: www.vernaallee.com.#</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24] Allee V., Schwabe O., Digital Edition, &amp;quot;Value Networks and the True Nature of Collaboration&amp;quot; , ISBN 978-615-43765-1 , valuenet works and Verna Allee associates, 2011.#</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25] Ming  Z., &amp;quot;Data  Mining&amp;quot;,  Hefei:  Press of University of Science and Technology of China, 2008.#</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26] CRISP-DM. &amp;quot;The CRISP-DM Process Model for Data Mining&amp;quot;, http://www.crisp-dm.org, 1999.#</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27] Allee V., &amp;quot;Reconﬁguring the Value Network, Journal of Business Strategy&amp;quot;,  21(4) , 2000, pp. 1-6.#</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28] Allee V., &amp;quot;Value-creating Networks: Organizational Issues and Challenges&amp;quot;, The Learning Organization, 16( 6) , 2009, pp. 427-442 , Emerald Group Publishing.#</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29] Albadvi A. and Hosseini M., &amp;quot;Mapping B2B Value Exchange in Marketing Relationships: a Systematic Approach&amp;quot;, Journal of Business &amp;amp; Industrial Marketing, 26)7(,2011, pp. 503-513.#</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30] Allee V., Taug J., &amp;quot;Collaboration, Innovation and Value Creation at a Global telecom&amp;quot;, The Learning Organization, 13( 5), 2006, pp. 569-78.#</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31] Asokan G., Mohanavalli s.,&amp;quot;Fuzzy Clustering for Effective Customer Relationship Management in Telecom Industry&amp;quot; , Springer-Verlag Berlin Heidelberg, CCSEIT 2011, CCIS 204, 2011, pp. 571–580 .#</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>