﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051923</doi_batch_id><timestamp>20260519232702</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>10</month><day>20</day><year>2019</year></publication_date><journal_volume><volume>6</volume></journal_volume><issue>23</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Security Enhancement of Wireless Sensor Networks: A Hybrid Efficient Encryption Algorithm Approach</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Omid Mahdi</given_name><surname>Ebadati</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Farshad</given_name><surname>Eshghi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Amin</given_name><surname>Zamani</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>20</day><year>2019</year></publication_date><pages><first_page>180</first_page><last_page>192</last_page></pages><doi_data><doi>10.7508/jist.2018.03.007</doi><resource>http://jist.ir/en/Article/15082</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15082</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15082</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15082</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15082</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15082</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15082</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15082</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] Panda, M. (January 2014). Security in Wireless Sensor Networks using Cryptographic Techniques. American Journal of Engineering Research (AJER), 3(1), 7.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] Shenoy, P. D., Iyengar, S. S., Raja, K. B., K R, V., Buyya, R., Patnaik, L. M., . . . Singh, K. M. (2015b). Eleventh International Conference on Communication Networks, ICCN 2015, August 21-23, 2015, Bangalore, India Eleventh International Conference on Data Mining and Warehousing, ICDMW 2015, August 21-23, 2015, Bangalore, India Eleventh International Conference on Image and Signal Processing, ICISP 2015, August 21-23, 2015, Bangalore, India. Implementation of Text Encryption using Elliptic Curve Cryptography. Procedia Computer Science, 54, 73-82.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] Shenoy, P. D., Iyengar, S. S., Raja, K. B., K R, V., Buyya, R., Patnaik, L. M., Singh, K. M. (2015a). Eleventh International Conference on Communication Networks, ICCN 2015, August 21-23, 2015, Bangalore, India Eleventh International Conference on Data Mining and Warehousing, ICDMW 2015, August 21-23, 2015, Bangalore, India Eleventh International Conference on Image and Signal Processing, ICISP 2015, August 21-23, 2015, Bangalore, India. Image Encryption using Elliptic Curve Cryptography. Procedia Computer Science, 54, 472-481.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] Gaurav R. Patel, Prof. Krunal Panchal. Hybrid Encryption Algorithm, International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Vol.2, Issue 2, pp.2064-2070, June 2014.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] Akshaya.P, M. S. a. (2014). Hybrid Cryptographic Technique Using RSA Algorithm and Scheduling Concept. International Journal of Network Security &amp;amp; Its Applications, 6(6), 10.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] Zhu, S. h. (2011, 9-11 Sept. 2011). Research of hybrid cipher algorithm application to hydraulic information transmission. Paper presented at the Electronics, Communications and Control (ICECC), 2011 International Conference on.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] K. Brindha, G. R., Rajpal Amit Jayantila. (2013). Secured Data Transfer in Wireless Networks Using Hybrid Cryptography. International Journal of Advanced Research in Computer Science and Software Engineering, 3(10), 3.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] Patnaik, S., Singh, R., Panchbhaiya, I., Pandey, A., &amp;amp; Goudar, R. H. (2015). International Conference on Computer, Communication and Convergence (ICCC 2015) Hybrid Encryption Scheme (HES): An Approach for Transmitting Secure Data over Internet. Procedia Computer Science, 48, 51-57.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] Prakash Kuppuswamy, S. Q. Y. A. K. (2014). Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm. International Journal of Information and Computer Security, 19(2), 14. doi: 10.6131/MISR.2014.1902.01.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Sakthivel, S. S. a. N. K. (2010). Design of A New Security Protocol Using Hybrid Cryptography Algorithms. International Journal of Research and Reviews, 2(2), 9.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] Dubai, M. J., Mahesh, T. R., &amp;amp; Ghosh, P. A. (2011, 8-10 April 2011). Design of new security algorithm: Using hybrid Cryptography architecture. Paper presented at the Electronics Computer Technology (ICECT), 2011 3rd International Conference on.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] Dr. Bhupinder Singh Dhaliwal, V. S. (2015). Reprogramming of Wireless Sensor Network Securely with New Hybrid Encryption Scheme. International Journal of Engineering Technology, Management and Applied Sciences, 3(4).</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Mrs.A.S. Bhave, M. S. R. J. (2014). Secure Communication in Wireless Sensor Network using Symmetric and Asymmetric Hybrid Encryption Scheme. International Journal of Innovative Science, Engineering &amp;amp; Technology, 1(4), 4.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] V. Vijayalakshmi, R. S. a. (2015). Hybrid Key Management Scheme for Wireless Sensor Networks. International Journal of Security and Its Applications, 9(11), 8.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] Ren, W., &amp;amp; Miao, Z. (2010, 15-16 May 2010). A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication. Paper presented at the Modeling, Simulation and Visualization Methods (WMSVM), 2010 Second International Conference on.#
[16] Komal Rege, N. G., Pooja Bhutada, Sunil Mane. (2013). Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA. International Journal of Computer Applications, 71(22), 4.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17] Mathew, J., Singh, A. K., Monika, &amp;amp; Upadhyaya, S. (2015). Proceedings of the 4th International Conference on Eco-friendly Computing and Communication Systems Secure Communication Using DNA Cryptography with Secure Socket Layer (SSL) Protocol in Wireless Sensor Networks. Procedia Computer Science, 70, 808-813.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18] Rizk, R., &amp;amp; Alkady, Y. (2015). Two-phase hybrid cryptography algorithm for wireless sensor networks. Journal of Electrical Systems and Information Technology, 2(3), 296-313.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19] Yaeghoobi S. B., K., Soni, M. K., Tyagi, S. S., &amp;amp; Ebadati E., O. M. (2013). Impact of NP-Complete in Triangle Segments Tree Energy Efficiency Model in Wireless Sensor Networks. J. Basic. Appl. Sci. Res, 3(9), 8.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20] Yaeghoobi S. B., K., Tyagi, S. S., Soni, M. K., &amp;amp; Ebadati E, O. M. (2014, 6-8 Feb. 2014). SAERP: An energy efficiency Real-time Routing protocol in WSNs. Paper presented at the Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21] Yazdinejad, M., Nayyeri, F., Ebadati E., O. M., &amp;amp; Afshari, N. (2017). Secure Distributed Group Rekeying Scheme for Cluster Based Wireless Sensor Networks Using Multilevel Encryption. In Internet of Things: Novel Advances and Envisioned Applications (pp. 127-147): Springer.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Information Bottleneck and its Applications in Deep Learning</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hassan</given_name><surname>Hafez Kolahi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Shohreh</given_name><surname>Kasaei</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>20</day><year>2019</year></publication_date><pages><first_page>119</first_page><last_page>127</last_page></pages><doi_data><doi>10.7508/jist.2018.03.001</doi><resource>http://jist.ir/en/Article/15113</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15113</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15113</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15113</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15113</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15113</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15113</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15113</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] C. E. Shannon, “A mathematical theory of communication,” Bell system technical journal,</unstructured_citation></citation><citation key="ref2"><unstructured_citation>vol. 27, no. 3, pp. 379–423, 1948. # #</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[2] S. Kullback and R. A. Leibler, “On information and sufficiency,” The annals of mathematical statistics, vol. 22, no. 1, pp. 79–86, 1951. # #</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[3] R. Bassily, S. Moran, I. Nachum, J. Shafer, and A. Yehudayoff, “Learners that Use Little</unstructured_citation></citation><citation key="ref5"><unstructured_citation>Information,” in Algorithmic Learning Theory, pp. 25–55, 2018. # #</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[4] M. Vera, P. Piantanida, and L. R. Vega, “The Role of Information Complexity and</unstructured_citation></citation><citation key="ref7"><unstructured_citation>Randomization in Representation Learning,” arXiv:1802.05355 [cs, stat], Feb. 2018. # #</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[5] I. Nachum, J. Shafer, and A. Yehudayoff, “A Direct Sum Result for the Information Complexity of Learning,” arXiv:1804.05474 [cs, math, stat], Apr. 2018. # #</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[6] J. Zhang, T. Liu, and D. Tao, “An Information-Theoretic View for Deep Learning,” p. 12. # #</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[7] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, “Dropout:</unstructured_citation></citation><citation key="ref11"><unstructured_citation>A simple way to prevent neural networks from overfitting,” The Journal of Machine Learning</unstructured_citation></citation><citation key="ref12"><unstructured_citation>Research, vol. 15, no. 1, pp. 1929–1958, 2014. # #</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[8] C. Zhang, S. Bengio, M. Hardt, B. Recht, and O. Vinyals, “Understanding deep learning requires rethinking generalization,” International Conference on Learning Representations, 2017. # #</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[9] N. Tishby and N. Zaslavsky, “Deep Learning and the Information Bottleneck Principle,” arXiv</unstructured_citation></citation><citation key="ref15"><unstructured_citation>preprint arXiv:1503.02406, 2015. # #</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[10] N. Tishby, F. Pereira, and W. Bialek, “The information bottleneck method,” in Proceedings of the 37-th Annual Allerton Conference on Communication, Control and Computing, pp. 368–</unstructured_citation></citation><citation key="ref17"><unstructured_citation>377, 1999. # #</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[11] R. Shwartz-Ziv and N. Tishby, “Opening the Black Box of Deep Neural Networks via Information,” arXiv:1703.00810 [cs], Mar. 2017. # #</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[12] P. Khadivi, R. Tandon, and N. Ramakrishnan, “Flow of information in feed-forward deep neural networks,” arXiv preprint arXiv:1603.06220, 2016.  # #</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[13] A. Achille and S. Soatto, “On the Emergence of Invariance and Disentangling in Deep Representations,” arXiv:1706.01350 [cs, stat], June 2017. # #</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[14] A. M. Saxe, Y. Bansal, J. Dapello, M. Advani, A. Kolchinsky, B. D. Tracey, and D. D. Cox,</unstructured_citation></citation><citation key="ref22"><unstructured_citation>“On the Information Bottleneck Theory of Deep Learning,” International Conference on Learning</unstructured_citation></citation><citation key="ref23"><unstructured_citation>Representations, Feb. 2018. # #</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[15] A. A. Alemi, I. Fischer, J. V. Dillon, and K. Murphy, “Deep Variational Information Bottleneck,” arXiv preprint arXiv:1612.00410, 2016. # #</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[16] A. Kolchinsky, B. D. Tracey, and D. H. Wolpert, “Nonlinear Information Bottleneck,”</unstructured_citation></citation><citation key="ref26"><unstructured_citation>arXiv:1705.02436 [cs, math, stat], May 2017. # #</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[17] A. Achille and S. Soatto, “Information Dropout: Learning Optimal Representations Through</unstructured_citation></citation><citation key="ref28"><unstructured_citation>Noisy Computation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 1–1, 2018. # #</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[18] A. Kolmogorov, “On the Shannon theory of information transmission in the case of continuous signals,” IRE Transactions on Information Theory, vol. 2, no. 4, pp. 102–108, 1956. # #</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[19] T. M. Coverl, “Kolmogorov’s Contributions to Information Theory and Algorithmic Complexity,” 1989. # #</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[20] T. M. Cover and J. A. Thomas, Elements of Information Theory. John Wiley &amp;amp; Sons, 2012. # #</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[21] M. A. RA Fisher, “On the mathematical foundations of theoretical statistics,” Phil. Trans. R.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>Soc. Lond. A, vol. 222, no. 594-604, pp. 309–368, 1922. # #</unstructured_citation></citation><citation key="ref34"><unstructured_citation>[22] O. Shamir, S. Sabato, and N. Tishby, “Learning and generalization with the information bottleneck,” Theoretical Computer Science, vol. 411, pp. 2696–2711, June 2010. # #</unstructured_citation></citation><citation key="ref35"><unstructured_citation>[23] E. L. Lehmann and H. Scheff&amp;#180;e, “Completeness, Similar Regions, and Unbiased Estimation,” in Bulletin of the American Mathematical Society, vol. 54, pp. 1080–1080, Charles St, Providence, 1948. # #</unstructured_citation></citation><citation key="ref36"><unstructured_citation>[24] B. O. Koopman, “On distributions admitting a sufficient statistic,” Transactions of the American Mathematical society, vol. 39, no. 3, pp. 399–409, 1936. # #</unstructured_citation></citation><citation key="ref37"><unstructured_citation>[25] N. Friedman, O. Mosenzon, N. Slonim, and N. Tishby, “Multivariate information bottleneck,”</unstructured_citation></citation><citation key="ref38"><unstructured_citation>in Proceedings of the Seventeenth Conference on Uncertainty in Artificial Intelligence, pp. 152–161, Morgan Kaufmann Publishers Inc., 2001. # #</unstructured_citation></citation><citation key="ref39"><unstructured_citation>[26] R. Gilad-Bachrach, A. Navot, and N. Tishby, “An information theoretic tradeoff between complexity and accuracy,” in Learning Theory and Kernel Machines, pp. 595–609, Springer, 2003. # #</unstructured_citation></citation><citation key="ref40"><unstructured_citation>[27] R. Blahut, “Computation of channel capacity and rate-distortion functions,” IEEE transactions on Information Theory, vol. 18, no. 4, pp. 460–473, 1972. # #</unstructured_citation></citation><citation key="ref41"><unstructured_citation>[28] S. Arimoto, “An algorithm for computing the capacity of arbitrary discrete memoryless channels,” IEEE Transactions on Information Theory, vol. 18, no. 1, pp. 14–20, 1972. # #</unstructured_citation></citation><citation key="ref42"><unstructured_citation>[29] G. Chechik, A. Globerson, N. Tishby, and Y. Weiss, “Information bottleneck for Gaussian variables,” Journal of machine learning research, vol. 6, no. Jan, pp. 165–188, 2005. # #</unstructured_citation></citation><citation key="ref43"><unstructured_citation>[30] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in Neural Information Processing Systems, pp. 1097–1105, 2012. # #</unstructured_citation></citation><citation key="ref44"><unstructured_citation>[31] N. S. Keskar, D. Mudigere, J. Nocedal, M. Smelyanskiy, and P. T. P. Tang, “On largebatch training for deep learning: Generalization gap and sharp minima,” arXiv preprint arXiv:1609.04836, 2016. # #</unstructured_citation></citation><citation key="ref45"><unstructured_citation>[32] S. Hochreiter and J. Schmidhuber, “Flat minima,” Neural Computation, vol. 9, no. 1, pp. 1–</unstructured_citation></citation><citation key="ref46"><unstructured_citation>42, 1997. # #</unstructured_citation></citation><citation key="ref47"><unstructured_citation>[33] P. Chaudhari, A. Choromanska, S. Soatto, and Y. LeCun, “Entropy-sgd: Biasing gradient descent into wide valleys,” arXiv preprint arXiv:1611.01838, 2016.	# #</unstructured_citation></citation><citation key="ref48"><unstructured_citation>[34] M. Hardt, B. Recht, and Y. Singer, “Train faster, generalize better: Stability of stochastic gradient descent,” arXiv preprint arXiv:1509.01240, 2015. # #</unstructured_citation></citation><citation key="ref49"><unstructured_citation>[35] T. Poggio, H. Mhaskar, L. Rosasco, B. Miranda, and Q. Liao, “Why and When Can Deep–but Not Shallow–Networks Avoid the Curse of Dimensionality,” arXiv preprint arXiv:1611.00740,</unstructured_citation></citation><citation key="ref50"><unstructured_citation>2016. # #</unstructured_citation></citation><citation key="ref51"><unstructured_citation>[36] L. Dinh, R. Pascanu, S. Bengio, and Y. Bengio, “Sharp minima can generalize for deep nets,” arXiv preprint arXiv:1703.04933, 2017. # #</unstructured_citation></citation><citation key="ref52"><unstructured_citation>[37] R. Vidal, J. Bruna, R. Giryes, and S. Soatto, “Mathematics of Deep Learning,”</unstructured_citation></citation><citation key="ref53"><unstructured_citation>arXiv:1712.04741 [cs], Dec. 2017. # #</unstructured_citation></citation><citation key="ref54"><unstructured_citation>[38] R. A. Amjad and B. C. Geiger, “How (Not) To Train Your Neural Network Using the Information Bottleneck Principle,” arXiv:1802.09766 [cs, math], Feb. 2018. # #</unstructured_citation></citation><citation key="ref55"><unstructured_citation>[39] P. Chaudhari and S. Soatto, “Stochastic gradient descent performs variational inference,</unstructured_citation></citation><citation key="ref56"><unstructured_citation>converges to limit cycles for deep networks,” arXiv:1710.11029 [cond-mat, stat], Oct. 2017. # #</unstructured_citation></citation><citation key="ref57"><unstructured_citation>[40] D. P. Kingma and M. Welling, “Autoencoding variational bayes,” arXiv preprint arXiv:1312.6114, 2013. # #</unstructured_citation></citation><citation key="ref58"><unstructured_citation>[41] Y. Bengio, L. Yao, G. Alain, and P. Vincent, “Generalized denoising auto-encoders as generative models,” in Advances in Neural Information Processing Systems, pp. 899–907, 2013. # #</unstructured_citation></citation><citation key="ref59"><unstructured_citation>[42] D. J. Im, S. Ahn, R. Memisevic, and Y. Bengio, “Denoising Criterion for Variational Auto-</unstructured_citation></citation><citation key="ref60"><unstructured_citation>Encoding Framework.,” in AAAI, pp. 2059–2065, 2017. # #</unstructured_citation></citation><citation key="ref61"><unstructured_citation>[43] A. A. Alemi, B. Poole, I. Fischer, J. V. Dillon, R. A. Saurous, and K. Murphy, “Fixing a Broken ELBO,” arXiv:1711.00464 [cs, stat], Feb. 2018. # #</unstructured_citation></citation><citation key="ref62"><unstructured_citation>[44] C.-W. Huang and S. S. S. Narayanan, “Flow of Renyi information in deep neural networks,” in Machine Learning for Signal Processing (MLSP), 2016 IEEE 26th International Workshop</unstructured_citation></citation><citation key="ref63"><unstructured_citation>On, pp. 1–6, IEEE, 2016. # #</unstructured_citation></citation><citation key="ref64"><unstructured_citation>[45] I. Higgins, L. Matthey, A. Pal, C. Burgess, X. Glorot, M. Botvinick, S. Mohamed, and</unstructured_citation></citation><citation key="ref65"><unstructured_citation>A. Lerchner, “Beta-VAE: Learning Basic Visual Concepts with a Constrained Variational Framework,” Nov. 2016. # #</unstructured_citation></citation><citation key="ref66"><unstructured_citation>[46] X. Chen, D. P. Kingma, T. Salimans, Y. Duan, P. Dhariwal, J. Schulman, I. Sutskever, and</unstructured_citation></citation><citation key="ref67"><unstructured_citation>P. Abbeel, “Variational lossy autoencoder,” arXiv preprint arXiv:1611.02731, 2016. # #</unstructured_citation></citation><citation key="ref68"><unstructured_citation>[47] S. Zhao, J. Song, and S. Ermon, “Infovae: Information maximizing variational autoencoders,” arXiv preprint arXiv:1706.02262, 2017. # #</unstructured_citation></citation><citation key="ref69"><unstructured_citation>[48] H. Zheng, J. Yao, Y. Zhang, and I. W. Tsang, “Degeneration in VAE: In the Light of Fisher</unstructured_citation></citation><citation key="ref70"><unstructured_citation>Information Loss,” arXiv:1802.06677 [cs, stat], Feb. 2018. # #</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>The Influence of ERP Usage on Organizational Learning: An Empirical Investigation</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Faisal</given_name><surname>Aburub</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>20</day><year>2019</year></publication_date><pages><first_page>150</first_page><last_page>158</last_page></pages><doi_data><doi>10.7508/jist.2018.03.004</doi><resource>http://jist.ir/en/Article/15142</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15142</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15142</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15142</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15142</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15142</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15142</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15142</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Ağaoğlu, Mustafa, E. Serra Yurtkoru, and Aslı Küçükaslan Ekmekçi. "The effect of ERP implementation CSFs on business performance: an empirical study on users’ perception." Procedia-Social and Behavioral Sciences, vol. 210, no. 22, pp. 35-42, 2015.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Ahmad, M. Munir, and Ruben Pinedo Cuenca. "Critical success factors for ERP implementation in SMEs." Robotics and computer-integrated manufacturing, vol. 29, no.3, pp. 104-111, 2013.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Argote, Linda. "Organizational learning research: Past, present and future." Management learning, vol.42, no. 4, pp. 439-446, 2011.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Bhatti, "Critical success factors for the implementation of enterprise resource planning (ERP): empirical validation." The second international conference on innovation in information technology, 2005.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	BolíVar-Ramos, MaríA Teresa, VíCtor J. GarcíA-Morales, and EncarnacióN GarcíA-SáNchez. "Technological distinctive competencies and organizational learning: Effects on organizational innovation to improve firm performance," Journal of Engineering and Technology Management, vol. 29, no. 3, pp. 331-357, 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Bowen, L. Gary, Roderick A. Rose, and William B. Ware. "The reliability and validity of the school success profile learning organization measure." Evaluation and program planning, vol. 29, no.1, pp. 97-104, 2006.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Brown, David H., and Susan He. "Patterns of ERP adoption and implementation in China and some implications." Electronic Markets, vol. 17, no.2, pp. 132-141, 2007.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Chiva, Ricardo, Joaquin Alegre, and Rafael Lapiedra. "Measuring organisational learning capability among the workforce," International Journal of Manpower, vol. 28, no.3, pp. 224-242, 2007.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Cook, Scott DN, and Dvora Yanow. "Culture and organizational learning," Journal of management inquiry, vol. 2, no. 4, pp. 373-390, 1993.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Dong, John Qi, and Chia-Han Yang. "Information technology and organizational learning in knowledge alliances and networks: Evidence from US pharmaceutical industry," Information &amp; Management, vol. 52, no. 1, pp. 111-122, 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Farhanghi, Ali Akbar, Abbas Abbaspour, and Reza Abachian Ghassemi. "The effect of information technology on organizational structure and firm performance: An analysis of Consultant Engineers Firms (CEF) in Iran," Procedia-Social and Behavioral Sciences, vol. 81, pp. 644-649, 2013.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Goh, Swee C. "Improving organizational learning capability: lessons from two case studies," The learning organization, vol. 10, no. 4, pp. 216-227, 2003.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Hair, R. E. Anderson, R. L. Tatham, and W. C. Black, Multivariate data analysis (5th ed.). New Jersey: Prentice-Hall, 2012.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Jerez-Gomez, Pilar, José Céspedes-Lorente, and Ramón Valle-Cabrera. "Organizational learning capability: a proposal of measurement." Journal of business research, vol. 58, no. 6, pp. 715-725, 2005.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Jerez-Gomez, Pilar, José Céspedes-Lorente, and Ramón Valle-Cabrera. "Organizational learning capability: a proposal of measurement." Journal of business research, vol. 58, no. 6, pp. 715-725, 2005.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Kumar, Vinod, Bharat Maheshwari, and Uma Kumar. "An investigation of critical management issues in ERP implementation: emperical evidence from Canadian organizations." Technovation, vol. 23, no.10, pp. 793-807, 2003.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Kwahk, Kee-Young, and Hyunchul Ahn. "Moderating effects of localization differences on ERP use: A socio-technical systems perspective." Computers in Human Behavior, vol. 26, no. 2, pp. 186-198, 2010.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Lara, Francisco J., and Andres Salas-Vallina. "Managerial competencies, innovation and engagement in SMEs: The mediating role of organisational learning." Journal of Business Research, vol. 79, no. 15, pp. 152-160, 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Laudon, Kenneth C., and Jane Price Laudon. Management information systems. Vol. 8. Prentice Hall, 2015.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Lee, Heeseok, and Byounggu Choi. "Knowledge management enablers, processes, and organizational performance: An integrative view and empirical examination." Journal of management information systems, vol. 20, no. 1, pp.179-228, 2013.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Lee, “Relationship between the use of information technology (IT) and performances of human resources management (HRM),” Degree of Docotor of Business Administration, Alliant International University, San Diego, CA, 2008.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Levitt, Barbara, and James G. March. "Organizational learning." Annual review of sociology vol. 14, no. 1, pp. 319-338, 1988.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Madanhire, Ignatio, and Charles Mbohwa. "Enterprise resource planning (ERP) in improving operational efficiency: Case study." Procedia CIRP40, pp. 225-229, 2016.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Madapusi, Arun, and Derrick D'Souza. "The influence of ERP system implementation on the operational performance of an organization." International Journal of Information Management, vol. 32, no.1, pp. 24-34, 2012.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Marsick, Victoria J., and Karen E. Watkins. "Demonstrating the value of an organization's learning culture: the dimensions of the learning organization questionnaire." Advances in developing human resources, vol. 5, no .2, pp.132-151, 2003.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	McGill, Michael E., John W. Slocum Jr, and David Lei. "Management practices in learning organizations." Organizational dynamics, vol. 21, no.1,pp. 5-17, 1992.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Mitić, Siniša, et al. "The impact of information technologies on communication satisfaction and organizational learning in companies in Serbia," Computers in Human Behavior, vol. 76, pp. 87-101, 2017.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Motwani, Jaideep, Asli Yagmur Akbulut, and Vijay Nidumolu. "Successful implementation of ERP systems: a case study of an international automotive manufacturer," International Journal of Automotive Technology and Management, vol. 5, no.4, pp. 375-386, 2005.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	Motwani, Jaideep, et al. "Successful implementation of ERP projects: Evidence from two case studies." International Journal of Production Economics, vol. 75, no. 2, pp. 83-96, 2002.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	Nwankpa, Joseph, and Yaman Roumani. "Understanding the link between organizational learning capability and ERP system usage: An empirical examination." Computers in Human Behavior, vol. 33, pp. 224-234, 2014.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	Nwankpa, Joseph K., and Yaman Roumani. "The Influence of Organizational Trust and Organizational Mindfulness on ERP Systems Usage." CAIS, vol. 34, pp. 85-98, 2014.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	Nwankpa, Joseph K. "ERP system usage and benefit: A model of antecedents and outcomes." Computers in Human Behavior, vol. 45, pp. 335-344, 2015.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	Peddler, J. Burgoyne, and T. Boydell, The learning company, a strategy for sustainable development. London: McGraw-Hill, 1998.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	Rajan, Christy Angeline, and Rupashree Baral. "Adoption of ERP system: An empirical study of factors influencing the usage of ERP and its impact on end user." IIMB Management Review, vol. 27, no. 2, pp. 105-117, 2015.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	Saadat, Vajiheh, and Zeynab Saadat. "Organizational learning as a key role of organizational success." Procedia-Social and Behavioral Sciences, vol. 230, pp. 219-225, 2016.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	Sadrzadehrafiei, Samira, et al. "The benefits of enterprise resource planning (ERP) system implementation in dry food packaging industry." Procedia Technology, vol. 11, pp. 220-226, 2013. </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Polar Split Tree as a Search Tool in Telecommunication</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Farzad</given_name><surname>Bayat</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Zahra</given_name><surname>Nilforoushan</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>20</day><year>2019</year></publication_date><pages><first_page>159</first_page><last_page>168</last_page></pages><doi_data><doi>10.7508/jist.2018.03.005</doi><resource>http://jist.ir/en/Article/15150</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15150</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15150</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15150</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15150</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15150</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15150</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15150</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] Robert Adams and Essex Christopher, Calculus: a complete course (Eighth ed.). Pearson Canada Inc., 2013.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] Pablo Alonso Gonzalez, Optimization of antenna coverage in telecommunication systems, AGH University of Science and Technology, 2018.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] ‎Mark de Berg‎, ‎Otfried Cheong‎, ‎Marc van Kreveld‎, ‎and Mark Overmars‎, Computational Geometry:‎ Algorithms and Applications.‎ ‎Springer‎, ‎‎pp. ‎309-312‎, 2008.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] Cristina Costa, Francesco G.B. De Natale and Fabrizio Granelli, Quality Evaluation and Nonuniform Compression of Geometrically Distorted Images Using the Quadtree Distortion Map, EURASIP Journal on Applied Signal Processing, pp. 1899–1911, 2004.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] Ameneh Eskandari‎, ‎Zahra Nilforoushan and javad ranjbar‎, ‎A Novel Method to Improve Query in Big‎ ‎Databases Using a Geometric tree Base Algorithm: ‎International Journal of computer &amp; Information‎ ‎Technologies‎, ‎Volume 5‎, ‎Issue 1‎, ‎2017‎.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] Clara Grima and Alberto Marquez, Computational Geometry on Surfaces: Performing Computational Geometry on the Cylinder, the Sphere, the Torus, and the Cone, Kluwer Academic Publishers, 2001.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] Anton Howard, Irl Bivens and Stephen Davis, Calculus (Seventh ed.). Anton Textbooks, Inc., 2002.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] Moritz von Looz, Christian L. Staudt, Henning Meyerhenke and Roman Prutkin, Fast generation of dynamic complex networks with underlying hyperbolic geometry, Karlsruhe Reports in Informatics, 2014.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]‎ Nimrod Megiddo‎, ‎Linear-time algorithms for Linear programing in R ‎and related problems‎ .: ‎SIAM Journal on Computing‎, ‎12(4)‎: ‎759-776,1983‎.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]‎ Giri Narasimhan and Michiel Smid‎, ‎Geometric Spanner Networks.‎: ‎Cambridge University Press‎, ‎2007‎.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] Joseph O'Rourke, Computational Geometry in C, Cambridge University Press,1998.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
‎[12] ‎Rina Panigrahy‎, An Improved ‎Algorithm Finding Nearest Neighbor Using kd-trees‎, Latin American Symposium on Theoretical Informatics, pp. 387--398, 2008.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Sudhir Porwal, Quad tree-based level-of-details representation of digital Globe, Defence Science Journal, Vol. 63, No. 1, pp. 89-92, 2013.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] Franco P. Preparata and Michael Ian Shamos, Computational Geometry - An Introduction, Springer, 1985.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] Javad Ranjbar, Zahra Nilforoushan and Ameneh Eskandari, Improved Fingerprint Matching Speed in Large Databases Using Split Tree, 3rd National Conference on Distributed Computing and Big Data Processing, 2017.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] J. R. Sack and J. Urrutia, Handbook of Computational Geometry, Elsevier, 1999.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] Hanan Samet, Foundations of Multidimensional and Metric Data Structures, Elsevier, 2006.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] S. Saric and Z. Bozanic, R. Svalina: Automation in Developing Technical Documentation of Telecommunication Networks, Promet- Traffic- Traffico, Vol. 16, No. 5, pp. 257-262, 2004.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] Ian Stewart and David Tall, Complex Analysis (the Hitchhiker's Guide to the Plane). Cambridge University Press, 1983.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] A. M. Sukhov and D. Yu. Chemodanov, The Neighborhoods Method and Virtual Polar coordinates in Wireless Sensor Networks, Network and Communication Technologies, Vol. 2, No. 1, pp. 19-27, 2013.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] Waldo Tobler and Zi‐tan Chen, A Quad tree for Global Information Storage, Geographical Analysis, Volume18, Issue4, 1986.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
‎[22] ‎https://www.coursera.org/learn/ml-clustering-and-retrieval/lecture/6eTzw/nn-search-with-kd-rees ‎</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improvement in Accuracy and Speed of Image Semantic Segmentation via Convolution Neural Network Encoder-Decoder</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hanieh</given_name><surname>Zamanian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hassan</given_name><surname>Farsi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sajad</given_name><surname>Mohammadzadeh</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>20</day><year>2019</year></publication_date><pages><first_page>128</first_page><last_page>135</last_page></pages><doi_data><doi>10.7508/jist.2018.03.002</doi><resource>http://jist.ir/en/Article/15156</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15156</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15156</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15156</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15156</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15156</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15156</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15156</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. a. M. Ess, Tobias and Grabner, Helmut and Gool, Luc van, “Segmentation-Based Urban Traffic Scene Understanding,” Proceedings of the British Machine Vision Conference, pp. 84.1-84.11, 2009.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Geiger,  “Are we ready for autonomous driving? the kitti vision benchmark suite,” in 2012 IEEE Conference on Computer Vision and Pattern Recognition, pp. 3354–3361, 2012.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Cordts, M. Omran, S. Ramos, T. Rehfeld, M. Enzweiler, R. Benenson, U. Franke, S. Roth, and B. Schiele, &amp;quot;The Cityscapes Dataset for Semantic Urban Scene Understanding.&amp;quot; in 2016 IEEE Conference on Computer Vision and Pattern Recognition, pp. 3213–3223, 2016.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Oberweger, P. Wohlhart, and V. Lepetit, “Hands Deep in Deep Learning for Hand Pose Estimation,” CoRR, vol. abs/1502.06807, 2015.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Y. Yoon, H.-G. Jeon, D. Yoo, J.-Y. Lee, and I. S. Kweon, “Learning a Deep Convolutional Network for Light-Field Image Super-Resolution,” in IEEE International Conference on Computer Vision Workshop (ICCVW), Santiago, Chile, pp. 57-65, 2015.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Wan, D. Wang, S. C. H. Hoi, P. Wu, J. Zhu, Y. Zhang, and J. Li, “Deep Learning for Content-Based Image Retrieval: A Comprehensive Study,” in Proceedings of the 22nd ACM international conference on Multimedia, Orlando, Florida, USA, pp. 157-166, 2014.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	F. Ning, D. Delhomme, Y. LeCun, F. Piano, L. Bottou, and P. E. Barbano, “Toward automatic phenotyping of developing embryos from videos,” Transaction of Image. Processing, vol. 14, no. 9, pp. 1360-1371, 2005.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. C. Cire, #351, an, A. Giusti, L. M. Gambardella, #252, and r. Schmidhuber, “Deep neural networks segment neuronal membranes in electron microscopy images,” in Proceedings of the 25th International Conference on Neural Information Processing Systems, Vol. 2, Lake Tahoe, Nevada, pp. 2843-2851, 2012.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	C. Farabet, C. Couprie, L. Najman, and Y. LeCun, “Learning Hierarchical Features for Scene Labeling,” IEEE Transaction of Pattern Analysis, Machine Intelligence, vol. 35, no. 8, pp. 1915-1929, 2013.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	B. Hariharan, P. Arbel&amp;#225;ez, R. Girshick, and J. Malik, &amp;quot;Simultaneous Detection and Segmentation,&amp;quot; Computer Vision – ECCV 2014. pp. 297-312, 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Gupta, R. Girshick, P. Arbel&amp;#225;ez, and J. Malik, &amp;quot;Learning Rich Features from RGB-D Images for Object Detection and Segmentation,&amp;quot; Computer Vision – ECCV 2014. pp. 345-360, 2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Bittel, V. Kaiser, M. Teichmann, and M. Thoma, “Pixel-wise Segmentation of Street with Neural Networks,” CoRR, vol. abs/1511.00513, 2015.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Kass, A. Witkin, and D. Terzopoulos, “Snakes: Active contour models,” International Journal of Computer Vision, vol. 1, no. 4, pp. 321-331, January 01, 1988.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. D. Levine, and S. I. Shaheen, “A Modular Computer Vision System for Picture Segmentation and Interpretation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 3, no. 5, pp. 540-556, 1981.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	T. K. Ho, “Random decision forests,” in Proceedings of the Third International Conference on Document Analysis and Recognition (Volume 1) - Vol. 1, pp. 278, 1995.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	E. Shelhamer, J. Long, and T. Darrell, “Fully Convolutional Networks for Semantic Segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence., vol. 39, no. 4, pp. 640-651, 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	V. Badrinarayanan, A. Kendall, and RobertoCipolla, “ SegNet: A Deep Convolutional Encoder-Decoder Architecture for Image Segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 39, pp. 2481-2495, 2017.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	F. Yu, and V. Koltun, “Multi-Scale Context Aggregation by Dilated Convolutions,” CoRR, vol. abs/1511.07122, 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	L.-C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and A. L. Yuille, “Semantic Image Segmentation with Deep Convolutional Nets and Fully Connected CRFs,” CoRR, vol. abs/1412.7062, 2014.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	L.-C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and A. L. Yuille, “DeepLab: Semantic Image Segmentation with Deep Convolutional Nets, Atrous Convolution, and Fully Connected CRFs,” CoRR, vol. abs/1606.00915, 2016.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	G. Lin, A. Milan, C. Shen, and I. D. Reid, “RefineNet: Multi-Path Refinement Networks for High-Resolution Semantic Segmentation,” CoRR, vol. abs/1611.06612, 2016.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	H. Zhao, J. Shi, X. Qi, X. Wang, and J. Jia, “Pyramid Scene Parsing Network,” 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6230-6239, 2017.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	C. Peng, X. Zhang, G. Yu, G. Luo, and J. Sun, &amp;quot;Large Kernel Matters — Improve Semantic Segmentation by Global Convolutional Network.&amp;quot; IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1743-1751, 2017.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	L.-C. Chen, G. Papandreou, F. Schroff, and H. Adam, “Rethinking Atrous Convolution for Semantic Image Segmentation,” CoRR, vol. abs/1706.05587, 2017.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	G. J. Brostow, J. Fauqueur, and R. Cipolla, “Semantic object classes in video: A high-definition ground truth database,” Pattern Recogn. Lett., vol. 30, no. 2, pp. 88-97, 2009.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	A. Ahmed, K. Yu, W. Xu, Y. Gong, and E. Xing, &amp;quot;Training Hierarchical Feed-Forward Visual Recognition Models Using Transfer Learning from Pseudo-Tasks,&amp;quot; Computer Vision – ECCV 2008. pp. 69-82, 2008.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	M. Oquab, L. Bottou, I. Laptev, and J. Sivic, “Learning and Transferring Mid-level Image Representations Using Convolutional Neural Networks,” in Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1717-1724, 2014.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	J. Yosinski, J. Clune, Y. Bengio, and H. Lipson, “How transferable are features in deep neural networks?,” in Proceedings of the 27th International Conference on Neural Information Processing Systems, vol. 2, Montreal, Canada, pp. 3320-3328, 2014.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei, “ImageNet: A large-scale hierarchical image database,” 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248-255, 2009.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, A. C. Berg, and L. Fei-Fei, “ImageNet Large Scale Visual Recognition Challenge,” International Journal of Computer Vision, vol. 115, no. 3, pp. 211-252, December 01, 2015.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet classification with deep convolutional neural networks,” in Proceedings of the 25th International Conference on Neural Information Processing Systems, vol. 1, Lake Tahoe, Nevada, pp. 1097-1105, 2012.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	K. Simonyan, and A. Zisserman, “Very Deep Convolutional Networks for Large-Scale Image Recognition,” CoRR, vol. abs/1409.1556, 2014.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, “Going deeper with convolutions,” in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, USA, pp. 1-9, 2015.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	K. He, X. Zhang, S. Ren, and J. Sun, “Deep Residual Learning for Image Recognition,” in 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, pp. 770–778, 2016.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	M. D. Zeiler, G. W. Taylor, and R. Fergus, “Adaptive deconvolutional networks for mid and high level feature learning,” in Proceedings of the 2011 International Conference on Computer Vision, pp. 2018-2025, 2011.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	M. D. Zeiler, and R. Fergus, &amp;quot;Visualizing and Understanding Convolutional Networks,&amp;quot; Computer Vision – ECCV 2014. pp. 818-833, 2014.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	A. Paszke, A. Chaurasia, S. Kim, and E. Culurciello, “ENet: {A} Deep Neural Network Architecture for Real-Time Semantic Segmentation,” CoRR, vol. abs/1606.02147, 2016.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	G. Nanfack, A. Elhassouny, and R. O. H. Thami, “Squeeze-SegNet: {A} new fast Deep Convolutional Neural Network for Semantic Segmentation,” CoRR, vol. abs/1711.05491, 2017.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	D. Eigen, and R. Fergus, “Predicting Depth, Surface Normals and Semantic Labels with a Common Multi-scale Convolutional Architecture,” in Proceedings of the 2015 IEEE International Conference on Computer Vision (ICCV), pp. 2650-2658, 2015.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	M. Everingham, S. M. A. Eslami, L. Van Gool, C. K. I. Williams, J. Winn, and A. Zisserman, “The Pascal Visual Object Classes Challenge: A Retrospective,” International Journal of Computer Vision, vol. 111, no. 1, pp. 98-136, January 01, 2015.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	J. Tighe, and S. Lazebnik, &amp;quot;SuperParsing: Scalable Nonparametric Image Parsing with Superpixels,&amp;quot; Computer Vision – ECCV 2010. pp. 352-365, 2010.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	H. Noh, S. Hong, and B. Han, “Learning Deconvolution Network for Semantic Segmentation,” in Proceedings of the 2015 IEEE International Conference on Computer Vision (ICCV), pp. 1520-1528, 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Multi-objective Multi-agent Optimization Algorithm for the Community Detection Problem</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Amirhossein</given_name><surname>Hosseinian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Vahid</given_name><surname>Baradaran</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>20</day><year>2019</year></publication_date><pages><first_page>169</first_page><last_page>179</last_page></pages><doi_data><doi>10.7508/jist.2018.03.006</doi><resource>http://jist.ir/en/Article/15158</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15158</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15158</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15158</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15158</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15158</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15158</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15158</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K.R. Zalik, and B. Zalik, “Multi-objective evolutionary algorithm using problem-specific genetic operators for community detection in networks”, Neural Computing and Applications, Vol. 1, 2017, pp. 1-14.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] 	S. Fortunato, “Community detection in graphs”, Physics Reports, Vol. 486, No. 3, 2010, pp. 1-100.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] 	Z. Zhao, S. Feng, Q. Wang, J.Z. Huang, G.J. Williams, and J. Fan, “Topic oriented community detection through social objects and link analysis in social networks”, Knowledge-Based Systems, Vol. 26, 2012, pp. 164-173.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] 	S. Rahimi, A. Abdollahpouri, and P. Moradi, “A multi-objective particle swarm optimization algorithm for community detection in complex networks”, Swarm and Evolutionary Computation, Vol. 39, 2018, pp. 297-309.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] 	C. Pizzuti, “GA-Net: A genetic algorithm for community detection in social networks”, In Proc. Parallel Problem Solving from Nature–PPSN X, Springer, 2008, pp. 1081-1090.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] 	M. Gong, B. Fu, L. Jiao, and H. Du, “Memetic algorithm for community detection in networks”, Physical Review E, Vol. 84, 2011, pp. 1-9.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] 	C. Pizzuti, “A multi-objective genetic algorithm to find communities in complex networks”, IEEE Transactions on Evolutionary Computation, Vol. 16, 2012, pp. 418-430.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] 	C. Shi, Z. Yan, Y. Cai, and B. Wu, “Multi-objective community detection in complex networks”, Applied Soft Computing, Vol. 12, 2012, pp. 850-859.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] 	M. Gong, L. Ma, Q. Zhang, and L. Jiao, “Community detection in networks by using multi-objective evolutionary algorithm with decomposition”, Physica A: Statistical Mechanics and its Applications, Vol. 391, 2012, pp. 4050-4060.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] 	J. Li, and Y. Song, “Community detection in complex networks using extended compact genetic algorithm”, Soft computing, Vol. 17, 2013, pp. 925-937.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] 	B. Amiri, L. Hossain, J.W. Crawford, and R.T. Wigand, “Community detection in complex networks: Multi–objective enhanced firefly algorithm”, Knowledge-Based Systems, Vol. 46, 2013, pp. 1-11.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] 	Q. Cai, M. Gong, B. Shen, L. Ma, and L. Jiao, “Discrete particle swarm optimization for identifying community structures in signed social networks”, Neural Networks, Vol. 58, 2014, pp. 4-13.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] 	M. Gong, Q. Cai, X. Chen, and L. Ma, “Complex network clustering by multi-objective discrete particle swarm optimization based on decomposition”, IEEE Transactions on Evolutionary Computation, Vol. 18, 2014, pp. 82-97.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] 	Q. Cai, M. Gong, L. Ma, S. Ruan, F. Yuan, and L. Jiao, “Greedy discrete particle swarm optimization for large-scale social network clustering”, Information Sciences, Vol. 316, 2015, pp. 503-516.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] 	Y. Zhou, J. Wang, N. Luo, and Z. Zhang, “Multi-objective local search for community detection in networks”, Soft Computing, Vol. 20, 2015, pp. 3273–3282.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] 	R. Shang, S. Luo, W. Zhang, R. Stolkin, and L. Jiao, “A multi-objective evolutionary algorithm to find community structures based on affinity propagation”, Physica A: Statistical Mechanics and its Applications, Vol. 453, 2016, pp. 203-227.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] 	H.S. Cheraghchi, and A. Zakerolhosseini, “COGNISON: A Novel Dynamic Community Detection Algorithm in Social Network”, Journal of Information Systems and Telecommunication, Vol. 4, No. 2, 2016, pp. 78-84.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] 	S. Bilal, and M. Abdelouahab, “Evolutionary algorithm and modularity for detecting communities in networks”, Physica A: Statistical Mechanics and its Applications, Vol. 473, 2017, pp. 89-96.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] 	L. Li, L. Jiao, J. Zhao, R. Shang, and M. Gong, “Quantum-behaved discrete multi-objective particle swarm optimization for complex network clustering”, Pattern Recognition, Vol. 63, 2017, pp. 1-14.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] 	J. Handl, and J. Knowles, “An evolutionary approach to multi-objective clustering”, IEEE transactions on Evolutionary Computation, Vol. 11, 2007, pp. 56-76.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] 	N.R. Jennings, K. Sycara, and M. Wooldridge, “A roadmap of agent research and development”, Autonomous Agents and Multi-Agent Systems, Vol. 1, No. 1, 1998, pp. 7–38.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] 	J. Li, H. Jing, and Y.Y. Tang, “Multi-agent oriented constraint satisfaction”, Artificial Intelligence, Vol. 136, No. 1, 2002, pp. 101-144.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] 	X.L. Zheng, and L. Wang, “A multi-agent optimization algorithm for resource constrained project scheduling problem”, Expert Systems with Application, Vol. 42, 2015; pp. 6039-6049</unstructured_citation></citation><citation key="ref24"><unstructured_citation>.
[24] 	W.C. Zhong, J. Liu, M.Z. Xue, and L.C. Jiao, “A multi-agent genetic algorithm for global numerical optimization”, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, Vol. 34, No. 2, 2004, pp. 229-244.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] 	K. Deb, A. Pratap, S. Agrawal, and T. Meyarivan, “A Fast and Elitist Multi-objective Genetic Algorithm: NSGA-II”, IEEE Transactions on Evolutionary Computation, Vol. 6, No. 2, 2000, pp. 182-197.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] 	R.T. Marler, and J.S. Arora, “The weighted sum method for multi-objective optimization: new insights”, Structural and Multidisciplinary Optimization, Vol. 41, No. 6, 2010, pp. 853-862.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] 	C. A. Coello Coello, and M. S. Lechuga, &amp;quot;MOPSO: a proposal for multiple objective particle swarm optimization&amp;quot;, In Proc. Congress on Evolutionary Computation (CEC&amp;#39;02), Honolulu, HI, USA, Vol. 2, 2002, pp. 1051-1056.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] 	W. Sheng, Y. Liu, X. Meng, and T. Zhang, “An Improved Strength Pareto Evolutionary Algorithm 2 with application to the optimization of distributed generations”, Computers &amp;amp; Mathematics with Applications, Vol. 64, No. 5, 2012, pp. 944-955.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] 	W. W. Zachary, &amp;quot;An information flow model for conflict and fission in small groups&amp;quot;, Journal of anthropological research, Vol. 33, No.4, 1977, pp. 452-473.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] 	D.E. Knuth, “The Stanford Graph Base: A Platform for Combinatorial Computing”, Addison-Wesley, Reading, MA (1993).</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] 	H. R. Bernard, P. D. Killworth, and L. Sailer, &amp;quot;Informant accuracy in social network data IV: A comparison of clique-level structure in behavioral and cognitive network data&amp;quot;, Social Networks, Vol. 2, 1980, pp. 191-218.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] 	S. R. Sundaresan, I. R. Fischhoff, J. Dushoff, and D. I. Rubenstein, &amp;quot;Network metrics reveal differences in social organization between two fission–fusion species, Grevy’s zebra and onager&amp;quot;, Oecologia, Vol. 151, 2007, pp. 140-149.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] 	E. Zitzler and L. Thiele, &amp;quot;Multiobjective evolutionary algorithms: a comparative case study and the strength Pareto approach&amp;quot;, IEEE Transactions on Evolutionary Computation, Vol. 3, No. 4, 1999, pp. 257-271.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] 	V. Hajipour, E. Mehdizadeh, and R. Tavakkoli-Moghaddam, “A novel Pareto-based multi-objective vibration damping optimization algorithm to solve multi-objective optimization problems”, Scientia Iranica, Vol. 21, No. 6, 2014, pp. 2368–2378.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] 	B. Golpalsamy, B. Mondal, and S. Ghosh, “Taguchi method and ANOVA: An approach for process parameters optimization of hard machining while machining hardened steel”, Journal of Scientific &amp;amp; Industrial Research, Vol. 68, 2009, pp. 686-695.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] 	S.H.A. Rahmati, V. Hajipour, and S.T.A. Niaki, “A soft-computing Pareto-based meta-heuristic algorithm for a multi-objective multi-server facility location problem”, Applied Soft Computing, Vol. 13, 2013, pp. 1728-1740.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] 	J. Gao, R. Chen, W. Deng, “An efficient tabu search algorithm for the distributed permutation flowshop scheduling problem”, International Journal of Production Research, Vol. 51, No. 3, 2013, pp. 641-651.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Handwritten Digits Recognition Using an Ensemble Technique Based on the Firefly Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Azar</given_name><surname>Mahmoodzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hamed</given_name><surname>Agahi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Marzieh </given_name><surname>Salehi </surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>20</day><year>2019</year></publication_date><pages><first_page>136</first_page><last_page>149</last_page></pages><doi_data><doi>10.7508/jist.2018.03.003</doi><resource>http://jist.ir/en/Article/15183</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15183</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15183</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15183</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15183</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15183</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15183</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15183</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] Liu CL, Nakashima K, Sako H, Fujisawa H. Handwritten digit recognition: benchmarking of state-of-the-art techniques. Pattern recognition. 2003 Oct 1;36(10):2271-85.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] Al-Jawfi R. Handwriting Arabic character recognition LeNet using neural network. Int. Arab J. Inf. Technol.. 2009 Jul 1;6(3):304-9.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] Ayyaz, M.N., Javed, I. and Mahmood, W., 2016. Handwritten character recognition using multiclass SVM classification with hybrid feature extraction. Pakistan Journal of Engineering and Applied Sciences.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] Hassan, A.K.A., 2018. Arabic (Indian) Handwritten‏‏ Digits Recognition Using Multi feature and KNN Classifier. Journal of University of Babylon, 26(4), pp.10-17.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] Savas B, Eld&amp;#233;n L. Handwritten digit classification using higher order singular value decomposition. Pattern recognition. 2007 Mar 1;40(3):993-1003</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] Chen, Y., Xu, Z., Cai, S., Lang, Y. and Kuo, C.C.J., 2017. A Saak Transform Approach to Efficient, Scalable and Robust Handwritten Digits Recognition. arXiv preprint arXiv:1710.10714.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] Lu, W.S., 2017, August. Handwritten digits recognition using PCA of histogram of oriented gradient. In Communications, Computers and Signal Processing (PACRIM), 2017 IEEE Pacific Rim Conference on (pp. 1-5). IEEE.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] Boukharouba, A. and Bennia, A., 2017. Novel feature extraction technique for the recognition of handwritten digits. Applied Computing and Informatics, 13(1), pp.19-26.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] Qiao, J., Wang, G., Li, W. and Chen, M., 2018. An adaptive deep Q-learning strategy for handwritten digit recognition. Neural Networks.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Alaei, A., U. Pal, and P. Nagabhushan. Using modified contour features and SVM based classifier for the recognition of Persian/Arabic handwritten numerals. in Advances in Pattern Recognition, 2009. ICAPR&amp;#39;09. Seventh International Conference on. 2009. IEEE.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] Nahvi, M., Kiaee, K., Ebrahimpour, R., improvement the feature extraction method of Gradient based on the discrete cosine transform for recognizing Farsi handwritten digits. 18th Iranian Conference on Electrical Engineering, 2010, Isfahan Iran, (in Farsi).</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] Ebrahimpour, R., Esmkhani, A., Faridi, S.: Farsi handwritten digit recognition based on mixture of RBF experts. IEICE Electron. Express 7(14), 1014–1019 (2010)</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Abdi,M.J., Salimi, H.: Farsi handwriting recognition with mixture of RBF experts based on particle swarm optimization. Int. J. Inf. Sci. Comput. Math. 2, 129–136 (2010)</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] Rashnodi O., Sajedi H., Abadeh, M., Elci A., Munot M., Joshi M., Sharma N., Gupta N., Sharma R., and Mihajlov B., “Persian Handwritten Digit Recognition Using Support Vector Machines,” the International Journal of Computer Applications, vol. 29, no. 12, pp. 1-6, 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] Soltanzadeh, H. and M. Rahmati, Recognition of Persian handwritten digits using image profiles of multiple orientations. Pattern Recognition Letters, 2004. 25(14): p. 1569-1576.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] Ziaratban, M., K. Faez, and F. Faradji. Language-based feature extraction using template-matching in Farsi/Arabic handwritten numeral recognition. in Document Analysis and Recognition, 2007. ICDAR 2007. Ninth International Conference on. 2007. IEEE.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] Razavi, M., and Kabir, E., On-line Recognition of Farsi separate letters using the neural network. Third conference on machine vision and image processing, 2004, Tehran, Iran (in Farsi).</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] El Kessab, B., et al., Extraction method of handwritten digit recognition tested on the mnist database. International Journal of Advanced Science &amp;amp; Technology, 2013. 50.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] Wshah, S., Z. Shi, and V. Govindaraju. Segmentation of Arabic handwriting based on both contour and skeleton segmentation. in Document Analysis and Recognition, 2009. ICDAR&amp;#39;09. 10th International Conference on. 2009. IEEE.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] Mah-Abadi, A., Kazemian, A., and, Torkamani, MA., Fuzzy recognition of Farsi handwritten numbers. Journal of Computer Science and Engineering, Spring 2006. P. 19-25, (In Farsi).</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] Ghanbari.Y., Golzari, S., and Askari, S., Recognition of Farsi handwritten numbers using the Gabor filter, Principle component analysis and K nearest neighbor algorithm. 7th International Conference on Information and Knowledge Technology, Summer 2015. Orumieh. Iran, (In Farsi).</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] Parseh, M.J. and Meftahi, M., 2017. A new combined feature extraction method for Persian handwritten digit recognition. International Journal of Image and Graphics, 17(02), p.1750012.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] Sadri J, Suen CY, Bui TD. Application of support vector machines for recognition of handwritten Arabic/Persian digits. InProceedings of Second Iranian Conference on Machine Vision and Image Processing 2003 Feb (Vol. 1, pp. 300-307).</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] Mowlaei, A. and K. Faez. Recognition of isolated handwritten Persian/Arabic characters and numerals using support vector machines. in Neural Networks for Signal Processing, 2003. NNSP&amp;#39;03. 2003 IEEE 13th Workshop on. 2003. IEEE.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] Impedovo, D. and G. Pirlo, Zoning methods for handwritten character recognition: A survey. Pattern Recognition, 2014. 47(3): p. 969-981.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] Salimi, H. and D. Giveki, Farsi/Arabic handwritten digit recognition based on ensemble of SVD classifiers and reliable multi-phase PSO combination rule. International Journal on Document Analysis and Recognition (IJDAR), 2013. 16(4): p. 371-386.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] AlKhateeb, J.H. and M. Alseid. DBN-Based learning for Arabic handwritten digit recognition using DCT features. in Computer Science and Information Technology (CSIT), 2014 6th International Conference on. 2014. IEEE.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] Biglari, M., F. Mirzaei, and J.G. Neycharan, Persian/Arabic handwritten digit recognition using local binary pattern. International Journal of Digital Information and Wireless Communications (IJDIWC), 2014. 4(4): p. 486-492.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] Khorashadizadeh, S. and A. Latif, Arabic/farsi handwritten digit recognition using histogram of oriented gradient and chain code histogram. Int. Arab J. Inf. Technol., 2016. 13(4): p. 367-374.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] Fouladi, K., B.N. Araabi, and E. Kabir, A fast and accurate contour-based method for writer-dependent offline handwritten Farsi/Arabic subwords recognition. International Journal on Document Analysis and Recognition (IJDAR), 2014. 17(2): p. 181-203.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] Sajedi, H., Handwriting recognition of digits, signs, and numerical strings in Persian. Computers &amp;amp; Electrical Engineering, 2016. 49: p. 52-65.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] Safdari, R. and M.-S. Moin. A hierarchical feature learning for isolated Farsi handwritten digit recognition using sparse autoencoder. in Artificial Intelligence and Robotics (IRANOPEN), 2016. 2016. IEEE.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] Duda, R., P. Hart, and D. Stork, Pattern classification. 2nd edn Wiley. New York, 2001: p. 632.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] Khosravi, H. and E. Kabir, Introducing a very large dataset of handwritten Farsi digits and a study on their varieties. Pattern recognition letters, 2007. 28(10): p. 1133-1141.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] Askari, S., KHarashadizadeh, M., and Sadri, J., A new method for Recognizing Farsi handwritten numbers based on Pre-Classification. First Conference on Pattern Recognition and Image Analysis, 2012, Birjand, Iran (in Farsi).</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] Deodhare, D., N.R. Suri, and R. Amit, Preprocessing and Image Enhancement Algorithms for a Form-based Intelligent Character Recognition System. IJCSA, 2005. 2(2): p. 131-144.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] Zeyaratban M, Faez K, Mozzafari S, Azvaji M. Presenting a New Structural Method Based on Partitioning Thinned Image for Recognition of Handwritten Farsi-Arabic Numerals. InProceedings of the Third Conference on Machine Vision, Image Processing and Applications, Farsi, Iran 2005 Feb (Vol. 1, pp. 76-82).</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38] Gunavathi, C. and K. Premalatha, Performance analysis of genetic algorithm with KNN and SVM for Feature Selection in Tumor Classification. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2014. 8(8): p. 1490-1497.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39] Padma, A., Sukanesh, R., 2011 A wavelet based automatic segmentation of brain tumor in CT images using optimal statistical texture features, Int. J. Image Process., 5, (5), pp. 552–563</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40] Deb K, Pratap A, Agarwal S, Meyarivan T (2002) A fast and elitist multi objective genetic algorithm: NSGA-II. IEEE Trans Evolut Comput 6(2):181–197</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41] Breslow, L.A. and D.W. Aha, Simplifying decision trees: A survey. The Knowledge Engineering Review, 1997. 12(1): p. 1-40.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42] Esmaeili, M., Data Mining Concepts And Techniques. Niaz Danesh Publication, Second edition, July 2012. P:233-260 (in Farsi).</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43] Lior R. Data mining with decision trees: theory and applications. World scientific; 2014 Sep 3.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44] Singh S, Gupta P. Comparative study ID3, cart and C4. 5 decision tree algorithm: a survey. Int J Adv Inf Sci Technol Internet. 2014 Jul;27:97-103.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45] Aggarwal, C.C. and S.Y. Philip, A general survey of privacy-preserving data mining models and algorithms, in Privacy-preserving data mining. 2008, Springer. p. 11-52.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46] Van Gerven M, Bohte S, editors. Artificial neural networks as models of neural information processing. Frontiers Media SA; 2018 Feb 1.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47] Shavlik, J.W., R.J. Mooney, and G.G. Towell, Symbolic and neural learning algorithms: An experimental comparison. Machine learning, 1991. 6(2): p. 111-143.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48] Zhang X, Tian Y, Jin Y. A knee point-driven evolutionary algorithm for many-objective optimization. IEEE Transactions on Evolutionary Computation. 2015 Dec;19(6):761-76.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49] Yang XS. Firefly algorithms for multimodal optimization. In International symposium on stochastic algorithms 2009 Oct 26 (pp. 169-178). Springer, Berlin, Heidelberg.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50] Bozorg-Haddad O, Solgi M, Lo&amp;#195; HA. Meta-heuristic and Evolutionary Algorithms for Engineering Optimization. John Wiley &amp;amp; Sons; 2017 Oct 9.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51] Ekbal, A. and S. Saha, Combining feature selection and classifier ensemble using a multiobjective simulated annealing approach: application to named entity recognition. Soft Computing, 2013. 17(1): p. 1-16.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>