﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051923</doi_batch_id><timestamp>20260519232507</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>9</month><day>4</day><year>2019</year></publication_date><journal_volume><volume>6</volume></journal_volume><issue>24</issue></journal_issue><journal_article publication_type="full_text"><titles><title>An SRN Based Approach for Performance Evaluation of Network Layer in Mobile Ad hoc Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>meisam</given_name><surname>Yadollahzadeh tabari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ali A</given_name><surname>Pouyan</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2019</year></publication_date><pages><first_page>228</first_page><last_page>235</last_page></pages><doi_data><doi>10.7508/jist.2018.04.006</doi><resource>http://jist.ir/en/Article/15136</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15136</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15136</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15136</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15136</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15136</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15136</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15136</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Tabari MY, Hassanpour H, Pouyan A, Saleki S. Proposing a light weight semi-distributed IDS for mobile ad-hoc network based on nodes' mode. In6th International Symposium on Telecommunications (IST) 2012 Nov 6 (pp. 948-953). IEEE.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Younes O, Thomas N. Modelling and performance analysis of multi-hop ad hoc networks. Simulation Modelling Practice and Theory. 2013 Nov 1;38:69-97.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Pouyan A, Yadollahzadeh Tabari M. Estimating reliability in mobile ad-hoc networks based on Monte Carlo simulation. International Journal of Engineering. 2014 Jan 21;7(5):739-46.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	"The Network Simulator ns2," available at http://www.isi.edu/nsnam/ns/.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	"OPNET Modeler," available at http://www.opnet.com. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Zeng X, Bagrodia R, Gerla M. GloMoSim: a library for parallel simulation of large-scale wireless networks. InProceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS'98 (Cat. No. 98TB100233) 1998 May 26 (pp. 154-161). IEEE.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Kostin A, Oz G, Haci H. Performance study of a wireless mobile ad hoc network with orientation‐dependent internode communication scheme. International Journal of Communication Systems. 2014 Feb;27(2):322-40.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Pouyan AA, Yadollahzadeh Tabari M. FPN‐SAODV: using fuzzy petri nets for securing AODV routing protocol in mobile Ad hoc network. International Journal of Communication Systems. 2017 Jan 10;30(1):e2935.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Masri A, Bourdeaud'Huy T, Toguyeni A. Performance analysis of IEEE 802.11 b wireless networks with object oriented Petri nets. Electronic Notes in Theoretical Computer Science. 2009 Jul 13;242(2):73-85.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Marsan MA, Balbo G, Conte G, Donatelli S, Franceschinis G. Modelling with generalized stochastic Petri nets. John Wiley &amp; Sons, Inc.; 1994 Oct 1.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Tang Y, Chen L, He KT, Jing N. SRN: an extended Petri-net-based workflow model for Web service composition. InProceedings. IEEE International Conference on Web Services, 2004. 2004 Jul 6 (pp. 591-599). IEEE.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	German R, Heindl A. Performance evaluation of IEEE 802.11 wireless LANs with stochastic Petri nets. InProceedings 8th International Workshop on Petri Nets and Performance Models (Cat. No. PR00331) 1999 (pp. 44-53). IEEE.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Zhang C, Zhou M. A stochastic Petri net-approach to modeling and analysis of ad hoc network. InInternational Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003. 2003 Aug 11 (pp. 152-156). IEEE.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Xiong C, Murata T, Tsai J. Modeling and simulation of routing protocol for mobile ad hoc networks using colored petri nets. InProceedings of the conference on Application and theory of petri nets: formal methods in software engineering and defence systems-Volume 12 2002 Jun 1 (pp. 145-153). Australian Computer Society, Inc.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Ciardo G, Cherkasova L, Kotov V, Rokicki T. Modeling a scalable high-speed interconnect with stochastic Petri nets. InProceedings 6th International Workshop on Petri Nets and Performance Models 1995 Oct 3 (pp. 83-92). IEEE.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Kostin A, Oz G, Haci H. Performance study of a wireless mobile ad hoc network with orientation-dependent inter-node communication links. In2009 24th International Symposium on Computer and Information Sciences 2009 Sep 14 (pp. 316-321). IEEE.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Chiang TC, Tai CF, Hou TW. A knowledge-based inference multicast protocol using adaptive fuzzy Petri nets. Expert Systems with Applications. 2009 May 1;36(4):8115-23.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>

[18]	Younes O, Thomas N. A path connection availability model for MANETs with random waypoint mobility. InComputer Performance Engineering 2012 Jul 30 (pp. 111-126). Springer, Berlin, Heidelberg. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Ciardo G, Muppala J, Trivedi K. SPNP: stochastic Petri net package. InProceedings of the Third International Workshop on Petri Nets and Performance Models, PNPM89 1989 Dec 11 (pp. 142-151). IEEE.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Younes O, Thomas N. An SRN model of the IEEE 802.11 DCF MAC protocol in multi-hop ad hoc networks with hidden nodes. The Computer Journal. 2011 Jun;54(6):875-93.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Yadollahzadeh Tabari M, Pouyan AA. Misbehavior analysis of IEEE 802.11 MAC layer in mobile ad hoc network using stochastic reward nets. International Journal of Communication Systems. 2017 Nov 10;30(16):e3385.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Soltani MD, Purwita AA, Zeng Z, Haas H, Safari M. Modeling the random orientation of mobile devices: Measurement, analysis and LiFi use case. IEEE Transactions on Communications. 2019 Mar;67(3):2157-72.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Bettstetter C. On the connectivity of ad hoc networks. The computer journal. 2004 Jan 1;47(4):432-47.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Xu J. On the fundamental tradeoffs between routing table size and network diameter in peer-to-peer networks. InIEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428) 2003 Mar 30 (Vol. 3, pp. 2177-2187). IEEE.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Hu X, Jiao L, Li Z. Modelling and performance analysis of IEEE 802.11 DCF using coloured Petri nets. The Computer Journal. 2016 Oct; 59(10):1563-80.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Erbas F, Kyamakya K, Jobmann K. Modelling and performance analysis of a novel position-based reliable unicast and multicast routing method using coloured Petri nets. In2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No. 03CH37484) 2003 Oct 6 (Vol. 5, pp. 3099-3104). IEEE.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Hieu TD, Choi SG. Simulation modeling and analysis of the hop count distribution in cognitive radio ad-hoc networks with shadow fading. Simulation Modelling Practice and Theory. 2016 Dec 1;69:43-54.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Ciardo G, Trivedi KS. A decomposition approach for stochastic Petri net models. InProceedings of the Fourth International Workshop on Petri Nets and Performance Models PNPM91 1991 Dec 2 (pp. 74-83). IEEE.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A 2-bit Full Comparator Design with Minimum Quantum Cost Function in Quantum-Dot Cellular Automata</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Davoud</given_name><surname>Bahrepour</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Negin</given_name><surname>Maroufi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2019</year></publication_date><pages><first_page>197</first_page><last_page>203</last_page></pages><doi_data><doi>10.7508/jist.2018.04.002</doi><resource>http://jist.ir/en/Article/15179</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15179</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15179</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15179</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15179</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15179</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15179</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15179</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. C. Das, and D. De, "Novel low power reversible binary incrementer design using quantum-dot cellular automata. Microprocessors and Microsystems", vol. 42, 2016, pp. 10-23.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. Jayalakshmi, and R. Amutha, "A Theoretical Study on the Implementation of Quantum Dot Cellular Automata", Fourth International Conference on Advances in Electrical, Electronics, Information, Communication, and Bio-Informatics (AEEICB), Chennai, 2018, pp. 1-6.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. Sarma,  and R. Jain, "Quantum Gate Implementation of a Novel Reversible Half Adder and Subtractor Circuit,"  International Conference on Intelligent Circuits and Systems (ICICS), Phagwara, 2018, pp. 72-76.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. M. Rahman,  N. M. Nahid,  and  M. K. Hassan, "Energy dissipation dataset for reversible logic gates in quantum dot-cellular automata" Data in brief, vol. 10, 2017, pp. 557-560.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Walter,  R. Wille,  D. Grobe,  F. S. Torres,  and R. Drechsler, "An exact method for design exploration of quantum-dot cellular automata,"  Design, Automation and  Test in Europe Conference and Exhibition (DATE), Dresden, 2018, pp. 503-508.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	V. S. Kalogeiton, D. P. Papadopoulos, O. Liolis, V. A. Mardiris, G. C. Sirakoulis, and I. G. Karafyllidis, "Programmable Crossbar Quantum-Dot Cellular Automata Circuits," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 36, no. 8, 2017, pp. 1367-1380.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	G. Cocorullo, P. Corsonello, F. Frustaci and S. Perri, "Design of Efficient BCD Adders in Quantum-Dot Cellular Automata," IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 64, no. 5, 2017, pp. 575-579.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Mohammadi, S. Gorgin and M. Mohammadi, "Design of non-restoring divider in quantum-dot cellular automata technology," IET Circuits, Devices and Systems, vol. 11, no. 2, 2017, pp. 135-141.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	K. Walus, T. J. Dysart, G. A. Jullien, and R. A. Budiman,  "QCADesigner: A rapid design and simulation tool for quantum-dot cellular automata," IEEE transactions on nanotechnology, vol. 3, no. 1, 2004, pp. 26-31.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	D. Bahrepour, and J. Forouzanfar,  "A Novel Robust Macrocell Based on Quantum Dot Cellular Automata. Quantum Matter," vol. 5, no. 5, 2016, pp. 689-696.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	P. D. Tougaw, and C. S. Lent,  "Logical devices implemented using quantum cellular automata," Journal of Applied Physics, vol. 75, no. 3, 1994, pp. 1818-1825.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	D. Bahrepour, "A Novel Full Comparator Design Based on Quantum-Dot Cellular Automata. International Journal of Information and Electronics Engineering," vol. 5, no. 6, 2015, pp. 406.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Hashemi, M. Tehrani, and K. Navi,  "An efficient quantum-dot cellular automata full-adder. Scientific Research and Essays," vol. 7, no. 2, 2012, pp. 177-189.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. S. Anuradha, B. D. Ravi, and M. Pasar Vishal, "Design of five input majority gate full comparator using Quantum-Dot Cellular Automata," International Journal of Ethics in Engineering and Management Education, vol. 1, no. 4, 2014, pp. 326-328.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Y. Xia, and K. Qiu,  "Design and application of universal logic gate based on quantum-dot cellular automata" In Communication Technology, ICCT. 11th IEEE International Conference on, 2008, pp. 335-338.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Perri, P. Corsonello, and G. Cocorullo, "Design of efficient binary comparators in quantum-dot cellular automata," IEEE Transactions on Nanotechnology, vol. 13, no. 2, 2014, pp. 192-202. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Gladshtein,  "Quantum-dot cellular automata serial decimal adder," IEEE Transactions on Nanotechnology, vol. 10, no. 6, 2011. pp. 1377-1382.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. Saravanan, I. Vennila, and S. Mohanram, "Design and Implementation of an Efficient Reversible Comparator Using TR Gate," Circuits and Systems, vol. 7, no. 9, 2016, pp. 2578.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. J. Sharifi, and D. Bahrepour, "Introducing a technology index concept and optimum performance design procedure for single-electron-device based circuits," Microelectronics Journal, vol. 42, no. 7, 2011, pp. 942-949. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Chabi, A. Roohi, R. F. DeMara, S. Angizi, K. Navi, and H. Khademolhosseini, "Cost-efficient QCA reversible combinational circuits based on a new reversible gate," In Computer Architecture and Digital Systems (CADS), 18th CSI International Symposium on, 2015, pp. 1-6.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Oklobdzija, V. G. (Ed.). (2001). The computer engineering handbook. CRC press.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Novel Method for Image Encryption Using Modified Logistic Map</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>ardalan</given_name><surname>Ghasemzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Omid R.B. </given_name><surname>Speily</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2019</year></publication_date><pages><first_page>220</first_page><last_page>227</last_page></pages><doi_data><doi>10.7508/jist.2018.04.005</doi><resource>http://jist.ir/en/Article/15182</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15182</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15182</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15182</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15182</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15182</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15182</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15182</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Kardan, O. R. B. Speily. Increasing Information Reposting Behavior in Online Learning Community. Educational Technology &amp; Society, 21(4), 100–110. 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Speily, O. R. B.. De-lurking in Online Communities Using Repost Behavior Prediction Method. Information Systems &amp; Telecommunication, 192. 2017.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Tarokh, M. J., Arian, H. S., &amp; Speily, O. R. B.. Discovering Influential Users in Social Media to Enhance Effective Advertisement. Advances in Computer Science: An International Journal, 4(5), 23–28. 2015.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	H. Natiq,M. Said, &amp; A. Kilicman. “A new hyperchaotic map and its application for image”, https://doi.org/10.1140/epjp/i2018-11834-2. 2018.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Z. Hua, S. Yi &amp; Y. Zhou, “Medical image encryption using high-speed scrambling and pixel adaptive diffusion”, Signal Processing. https://doi.org/10.1016/j.sigpro.2017.10.004, 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	B.  Gaurav, Q. M. Jonathan Wu &amp; B. Raman. “Discrete fractional wavelet transforms and its application to multiple encryption.” Inf. Sci. 223-297-316, 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Z. Hua &amp; Y. Zhou. “Design of image cipher using block-based scrambling and image filtering”. Information Sciences. https://doi.org/10.1016/j.ins.2017.02.036, 2017.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	L. D. Singh &amp; K. M. Singh. ‘Image Encryption using Elliptic Curve Cryptography”, Procedia - Procedia Computer Science, 54, 472–481. https://doi.org/10.1016/j.procs.2015.06.054, 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	X. Wang &amp; D. Luan. “A novel image encryption algorithm using chaos and reversible cellular automata”. Communications in Nonlinear Science and Numerical Simulation, 18(11), 3075–3085. https://doi.org/10.1016/j.cnsns.2013.04.008, 2013.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	O. Lafe, “Data Compression and Encryption using Cellular Automata Transform”, Engineering Applications of Articial Intelligence, Vol. 10, No. 6, pp. 581–591, 1998.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	R. J. Chen and J. L. Lai, “Image Security System using Recursive Cellular Automata Substitution,” Pattern Recognition , Vol. 40, pp. 1621–1631, 2007.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Jolfaei and A. Mirghadri, “Survey: Image Encryption Using Salsa20”, International Journal of Computer Science Issues, Vol. 7, Issue 5, pp. 213-220, September 2010.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. E. Borujeni and M. Eshghi, “Chaotic Image Encryption System using Phase-Magnitude Transformation and Pixel Substitution”, J. Telecommun. Syst. DOI:10.1007/s11235-011-9458-8. 2011.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	C. Zhu, “A Novel Image Encryption Scheme based on Improved Hyperchaotic Sequences,” Journal of Optics Communications, Vol. 285, pp 29–37, 2012.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh, and M. R. Mosavi, “A Simple,Sensitive and Secure Image Encryption Algorithm based on Hyper-Chaotic System with Only One Round Diffusion Process,”  The Journal of Multimedia Tools and Applications, DOI 10.1007/s11042-012-1292-9, 2012.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	X. Wang and L. Teng, “An Image Blocks Encryption Algorithm based on Spatiotemporal Chaos”, J Nonlinear Dyn., Vol. 67, pp. 365–371, 2012.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	H. Natiq, M. R. M. Said &amp; A. Kilicman. “A new hyperchaotic map and its application for image”. https://doi.org/10.1140/epjp/i2018-11834-2, 2018.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	X. Huang, G. Ye, “An image encryption algorithm based on irregular wave representation”. https://doi.org/10.1007/s11042-017-4455-x. 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	R. Enayatifar, A. H. Abdullah, I. F. Isnin, A. Altameem  &amp; M. Lee, “Image encryption using a synchronous permutation diffusion technique”. Optics and Lasers in Engineering, 90(June 2016), 146–154. https://doi.org/10.1016/j.optlaseng.2016.10.006. 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	C. Li, G. Luo &amp; K. Qin. “An image encryption scheme based on chaotic tent map”. Nonlinear Dynamics. https://doi.org/10.1007/s11071-016-3030-8.2016.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	K. Mishra, R. Saharan, &amp; B. Rathor, “A new cryptographic method for image encryption”, 32, 2885–2892. https://doi.org/10.3233/JIFS-169231. 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. H. Annaby, M. A. Rushdi, &amp; E. A. Nehary. “Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion”. Optics and Lasers in Engineering, 103, 9–23. https://doi.org/10.1016/j.optlaseng.2017.11.005. 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. M. Ismail, L. A. Said, A. G. Radwan, A. H. Madian &amp; M. F. Abu-elyazeed. “Generalized double-humped logistic map-based medical image encryption”. Journal of Advanced Research, 10, 85–98. https://doi.org/10.1016/j.jare.2018.01.009. 2018.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	L. Zhang, X. Liao, X. Wang, “An image encryption approach based on chaotic maps”, Chaos Solitons &amp; Fractals, Vol. 24, pp. 759-765, 2005.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Barker, E., Roginsky, A., &amp; Barker, E. (n.d.). “Transitioning the Use of Cryptographic Algorithms and Key Lengths”, NIST Special Publication 800-131A Transitioning the Use of Cryptographic Algorithms and Key Lengths. July 2018.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	A. Kulsoom, D. Xiao, A. Rehman, S. A. Abbas, “An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules”, Multimed Tools Appl., DOI 10.1007/s11042-014-2221-x. 2014.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Wu, Yue, Joseph P. Noonan, and Sos Agaian. "NPCR and UACI randomness tests for image encryption." Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT) 1.2: 31-38, (2011).</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Y. Wang, K. Wong, X.  Liao &amp; G. Chen. “A new chaos-based fast image encryption algorithm”, 11, 514–522. https://doi.org/10.1016/j.asoc.2009.12.011. 2011.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	A. Hanan,R. Enayatifar &amp; M. Lee., “A hybrid genetic algorithm and chaotic function model for image encryption. AEUE - International Journal of Electronics and Communications, 66(10), 806–816. https://doi.org/10.1016/j.aeue.2012.01.015. 2012.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	Z. Zhu, W. Zhang, K. Wong &amp; H. Yu. “A chaos-based symmetric image encryption scheme using a bit-level permutation”. Information Sciences, 181(6), 1171–1186. https://doi.org/10.1016/j.ins.2010.11.009. 2011.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	G. Zhang &amp; Q. Liu. “A novel image encryption method based on total shuffling scheme”. OPTICS, 284(12), 2775–2780. https://doi.org/10.1016/j.optcom.2011.02.039. 2011.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	A. Akhshani, A. Akhavan, S. C. Lim, Z. Hassan, “An image encryption scheme based on quantum logistic map”, Communications in Nonlinear Science and Numerical Simulation, Vol. 17, pp. 4653-4661, 2012.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	S. M. Seyedzadeh, S. Mirzakuchaki, “A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map, “Signal Processing, Vol. 92, pp. 1202-1215, 2012.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	E. Vaferi, R. Sabbaghi-Nadooshan, “A New Encryption Algorithm for Color Images based on Total Chaotic Shuffling Scheme”, Optik - International Journal for Light and Electron Optics, Volume 126, Issue 20, Pages 2474–2480, October 2015.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	M. Mohammadizadeh, B. Pourabbas, K. Foroutani, M. Fallahian, “Conductive polythiophene nanoparticles deposition on transparent PET substrates: effect of modification with hybrid organic-inorganic coating”, International Journal of Engineering (IJE), TRANSACTIONS C: Aspects  Vol. 28, No. 4, (April 2015)  567-572.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Long-Term Spectral Pseudo-Entropy (LTSPE): A New Robust Feature for Speech Activity Detection</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad Rasoul </given_name><surname>kahrizi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyed jahanshah</given_name><surname>kabudian</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2019</year></publication_date><pages><first_page>204</first_page><last_page>208</last_page></pages><doi_data><doi>10.7508/jist.2018.04.003</doi><resource>http://jist.ir/en/Article/15191</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15191</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15191</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15191</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15191</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15191</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15191</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15191</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. R. Kahrizi, "Long-Term Spectral Pseudo-Entropy (LTSPE) Feature," IEEE Dataport, 2017. [Online]. Available: http://dx.doi.org/10.21227/H2G05K. Accessed: May. 27, 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	W. Wang, H. Liu, J. Yang, G. Cao, and C. Hua, "Speech enhancement based on noise classification and deep neural network," Modern Physics Letters B, p. 1950188, 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Wang, Z. Ye, and J. Chen, "A Front-End Speech Enhancement System for Robust Automotive Speech Recognition," in 2018 11th International Symposium on Chinese Spoken Language Processing (ISCSLP), 2018, pp. 1-5: IEEE.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	K. Dinesh, R. Prakash, and M. P. Madhan, "Real-time Multi-Source Speech Enhancement for Voice Personal Assistant by using Linear Array Microphone based on Spatial Signal Processing," in 2019 International Conference on Communication and Signal Processing (ICCSP), 2019, pp. 0965-0967: IEEE.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	I. Ariav, D. Dov, and I. Cohen, "A deep architecture for audio-visual voice activity detection in the presence of transients," Signal Processing, vol. 142, pp. 69-74, 2018.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Pal, D. Paul, and G. Saha, "Synthetic speech detection using fundamental frequency variation and spectral features language," Computer Speech, vol. 48, pp. 31-50, 2018.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	B. Mouaz, B. H. Abderrahim, and E. Abdelmajid, "Speech Recognition of Moroccan Dialect Using Hidden Markov Models," Procedia Computer Science, vol. 151, pp. 985-991, 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	H. Chen, "Speaker Identification: Time-Frequency Analysis With Deep Learning," ETD Collection for Tennessee State University, 2018.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	P. Vecchiotti, G. Pepe, E. Principi, and S. Squartini, "Detection of activity and position of speakers by using Deep Neural Networks and Acoustic Data Augmentation," Expert Systems with Applications, 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	F. Tao, "Advances in Audiovisual Speech Processing for Robust Voice Activity Detection and Automatic Speech Recognition," 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Ivry, B. Berdugo, and I. Cohen, "Voice Activity Detection for Transient Noisy Environment Based on Diffusion Nets," IEEE Journal of Selected Topics in Signal Processing, 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	V. Andrei, H. Cucu, and C. Burileanu, "Overlapped speech detection and competing speaker counting-humans vs. deep learning," IEEE Journal of Selected Topics in Signal Processing, 2019.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	C. Vikram, N. Adiga, and S. M. Prasanna, "Detection of Nasalized Voiced Stops in Cleft Palate Speech Using Epoch-Synchronous Features," IEEE/ACM Transactions on Audio, Speech, and Language Processing, 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	N. Mansour, M. Marschall, T. May, A. Westermann, and T. Dau, "A method for conversational signal-to-noise ratio estimation in real-world sound scenarios," The Journal of the Acoustical Society of America, vol. 145, no. 3, pp. 1873-1873, 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Pandharipande, R. Chakraborty, A. Panda, and S. K. Kopparapu, "Robust Front-End Processing For Emotion Recognition In Noisy Speech," in 2018 11th International Symposium on Chinese Spoken Language Processing (ISCSLP), 2018, pp. 324-328: IEEE.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Y. Malviya, S. Kaul, and K. Goyal, "Music Speech Discrimination," CS229 Final Project, 2016.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Davis and P. Mermelstein, "Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences," Speech, and Signal Processing, vol. 28, no. 4, pp. 357-366, 1980.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	P. K. Ghosh, A. Tsiartas, and S. Narayanan, "Robust voice activity detection using long-term signal variability," IEEE Transactions on Audio, Speech, and Language Processing, vol. 19, no. 3, pp. 600-613, 2011.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Tsiartas et al., "Multi-band long-term signal variability features for robust voice activity detection," in Interspeech, 2013, pp. 718-722.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Makur and S. K. Mitra, "Warped discrete-Fourier transform: Theory and applications," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 48, no. 9, pp. 1086-1093, 2001.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. Ramırez, J. C. Segura, C. Benıtez, A. De La Torre, and A. Rubio, "Efficient voice activity detection algorithms using long-term speech information," Speech Communication, vol. 42, no. 3-4, pp. 271-287, 2004.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. O. Sadjadi and J. H. Hansen, "Unsupervised speech activity detection using voicing measures and perceptual spectral flux," IEEE Signal Processing Letters, vol. 20, no. 3, pp. 197-200, 2013.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	T. Drugman, Y. Stylianou, Y. Kida, and M. Akamine, "Voice activity detection: Merging source and filter-based information," IEEE Signal Processing Letters, vol. 23, no. 2, pp. 252-256, 2016.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	D. Snyder, G. Chen, and D. Povey, "MUSAN: A Music, Speech, and Noise Corpus," CoRR, vol. abs/1510.08484, 2015.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	T. Cover and P. Hart, "Nearest neighbor pattern classification," IEEE Transactions on Information Theory, vol. 13, no. 1, pp. 21-27, 1967.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	I. Cohen and B. Berdugo, "Speech enhancement for non-stationary noise environments," Signal Processing, vol. 81, no. 11, pp. 2403-2418, 2001.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	I. H. Witten, E. Frank, M. A. Hall, and C. J. Pal, Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann, 2016.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Toward an Enhanced Dynamic VM Consolidation Approach for Cloud Datacenters Using Continuous Time Markov Chain</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Monireh</given_name><surname>Hosseini Sayadnavard</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Abolfazl</given_name><surname>Toroghi Haghighat</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2019</year></publication_date><pages><first_page>236</first_page><last_page>244</last_page></pages><doi_data><doi>10.7508/jist.2018.04.007</doi><resource>http://jist.ir/en/Article/15207</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15207</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15207</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15207</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15207</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15207</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15207</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15207</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Armbrust et al., "A view of cloud computing," Communications of the ACM, vol. 53, no. 4, pp. 50-58, 2010.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Mills, "The cloud begins with coal. big data, big networks, big infrastructure, and big power. an overview of the electricity used by the digital ecosystem," ed, 2013.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. W. Ahmad, A. Gani, S. H. A. Hamid, M. Shiraz, A. Yousafzai, and F. Xia, "A survey on virtual machine migration and server consolidation frameworks for cloud data centers," Journal of Network and Computer Applications, vol. 52, pp. 11-25, 2015.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Varasteh and M. Goudarzi, "Server consolidation techniques in virtualized data centers: A survey," IEEE Systems Journal, vol. 11, no. 2, pp. 772-783, 2017.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Beloglazov and R. Buyya, "Managing overloaded hosts for dynamic consolidation of virtual machines in cloud data centers under quality of service constraints," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 7, pp. 1366-1379, 2013.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Beloglazov, "Energy-efficient management of virtual machines in data centers for cloud computing," 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. Sharma, B. Javadi, W. Si, and D. Sun, "Reliability and energy efficiency in cloud computing systems: Survey and taxonomy," Journal of Network and Computer Applications, vol. 74, pp. 66-85, 2016.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	W. Deng, F. Liu, H. Jin, X. Liao, and H. Liu, "Reliability‐aware server consolidation for balancing energy‐lifetime tradeoff in virtualized cloud datacenters," International Journal of Communication Systems, vol. 27, no. 4, pp. 623-642, 2014.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Varasteh, F. Tashtarian, and M. Goudarzi, "On Reliability-Aware Server Consolidation in Cloud Datacenters," arXiv preprint arXiv:1709.00411, 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	L. Grit, D. Irwin, A. Yumerefendi, and J. Chase, "Virtual machine hosting for networked clusters: Building the foundations for autonomic orchestration," in Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing, 2006, p. 7: IEEE Computer Society.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	B. Speitkamp and M. Bichler, "A mathematical programming approach for server consolidation problems in virtualized data centers," IEEE Transactions on services computing, vol. 3, no. 4, pp. 266-278, 2010.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Beloglazov, J. Abawajy, and R. Buyya, "Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing," Future generation computer systems, vol. 28, no. 5, pp. 755-768, 2012.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Beloglazov and R. Buyya, "Energy efficient resource management in virtualized cloud data centers," in Proceedings of the 2010 10th IEEE/ACM international conference on cluster, cloud and grid computing, 2010, pp. 826-831: IEEE Computer Society.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. Esfandiarpoor, A. Pahlavan, and M. Goudarzi, "Structure-aware online virtual machine consolidation for datacenter energy improvement in cloud computing," Computers &amp; Electrical Engineering, vol. 42, pp. 74-89, 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Zhang, Z. Qian, Z. Luo, J. Wu, and S. Lu, "Burstiness-aware resource reservation for server consolidation in computing clouds," IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 4, pp. 964-977, 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	H. Shen and L. Chen, "Compvm: A complementary vm allocation mechanism for cloud systems," IEEE/ACM Transactions on Networking (TON), vol. 26, no. 3, pp. 1348-1361, 2018.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	E. Arianyan, H. Taheri, and V. Khoshdel, "Novel fuzzy multi objective DVFS-aware consolidation heuristics for energy and SLA efficient resource management in cloud data centers," Journal of Network and Computer Applications, vol. 78, pp. 43-61, 2017.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	K. S. Rao and P. S. Thilagam, "Heuristics based server consolidation with residual resource defragmentation in cloud data centers," Future Generation Computer Systems, vol. 50, pp. 87-98, 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Ponraj, "Optimistic virtual machine placement in cloud data centers using queuing approach," Future Generation Computer Systems, vol. 93, pp. 338-344, 2019.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Z. Li, C. Yan, X. Yu, and N. Yu, "Bayesian network-based virtual machines consolidation method," Future Generation Computer Systems, vol. 69, pp. 75-87, 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	H. Khani, A. Latifi, N. Yazdani, and S. Mohammadi, "Distributed consolidation of virtual machines for power efficiency in heterogeneous cloud data centers," Computers &amp; Electrical Engineering, vol. 47, pp. 173-185, 2015.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	T. Mahdhi and H. Mezni, "A prediction-Based VM consolidation approach in IaaS Cloud Data Centers," Journal of Systems and Software, vol. 146, pp. 263-285, 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	F. Farahnakian et al., "Using ant colony system to consolidate VMs for green cloud computing," IEEE Transactions on Services Computing, vol. 8, no. 2, pp. 187-198, 2015.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	H. Mi, H. Wang, G. Yin, Y. Zhou, D. Shi, and L. Yuan, "Online self-reconfiguration with performance guarantee for energy-efficient large-scale cloud computing data centers," in Services Computing (SCC), 2010 IEEE International Conference on, 2010, pp. 514-521: IEEE.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	H. Li, G. Zhu, C. Cui, H. Tang, Y. Dou, and C. He, "Energy-efficient migration and consolidation algorithm of virtual machines in data centers for cloud computing," Computing, vol. 98, no. 3, pp. 303-317, 2016.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	H. Zhao, J. Wang, F. Liu, Q. Wang, W. Zhang, and Q. Zheng, "Power-aware and performance-guaranteed virtual machine placement in the cloud," IEEE Transactions on Parallel and Distributed Systems, vol. 29, no. 6, pp. 1385-1400, 2018.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	B. Wei, C. Lin, and X. Kong, "Dependability modeling and analysis for the virtual data center of cloud computing," in High Performance Computing and Communications (HPCC), 2011 IEEE 13th International Conference on, 2011, pp. 784-789: IEEE.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	N. B. Fuqua, "The applicability of markov analysis methods to reliability, maintainability, and safety," Selected Topic in Assurance Related Technologies (START), vol. 2, no. 10, pp. 1-8, 2003.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	K. S. Trivedi, Probability &amp; statistics with reliability, queuing and computer science applications. John Wiley &amp; Sons, 2008.
[30]	A. Goyal, S. S. Lavenberg, and K. S. Trivedi, "Probabilistic modeling of computer system availability," Annals of Operations Research, vol. 8, no. 1, pp. 285-306, 1987.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	J. F. Meyer, "Closed-form solutions of performability," IEEE Transactions on Computers, no. 7, pp. 648-657, 1982.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	F. Machida, D. S. Kim, and K. S. Trivedi, "Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration," Performance Evaluation, vol. 70, no. 3, pp. 212-230, 2013.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	J. K. Ghosh, "Introduction to Modeling and Analysis of Stochastic Systems, by VG Kulkarni," International Statistical Review, vol. 80, no. 3, pp. 487-487, 2012.
[34]	A. Beloglazov and R. Buyya, "Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers," Concurrency and Computation: Practice and Experience, vol. 24, no. 13, pp. 1397-1420, 2012.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[35]	R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De Rose, and R. Buyya, "CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms," Software: Practice and experience, vol. 41, no. 1, pp. 23-50, 2011.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[36]	K. Park and V. S. Pai, "CoMon: a mostly-scalable monitoring system for PlanetLab," ACM SIGOPS Operating Systems Review, vol. 40, no. 1, pp. 65-74, 2006.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[37]	R. d. S. Matos, P. R. Maciel, F. Machida, D. S. Kim, and K. S. Trivedi, "Sensitivity analysis of server virtualized system availability," IEEE Transactions on Reliability, vol. 61, no. 4, pp. 994-1006, 2012.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>DBCACF: A Multidimensional Method for Tourist Recommendation Based on Users’ Demographic, Context and Feedback</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Maral</given_name><surname>Kolahkaj</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ali</given_name><surname>Harounabadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Alireza</given_name><surname>Nikravan shalmani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Rahim</given_name><surname>Chinipardaz</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2019</year></publication_date><pages><first_page>209</first_page><last_page>219</last_page></pages><doi_data><doi>10.7508/jist.2018.04.004</doi><resource>http://jist.ir/en/Article/15215</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15215</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15215</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15215</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15215</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15215</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15215</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15215</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	D. Godoy and A. Corbellini, &amp;quot;Folksonomy-Based Recommender Systems: A State-of-the-Art Review,&amp;quot; Int. J. Intell. Syst., vol. 31, no. 4, pp. 314-346, 2016.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	P. Yu, L. Lin, and Y. Yao, &amp;quot;A Novel Framework to Process the Quantity and Quality of User Behavior Data in Recommender Systems,&amp;quot; in Proceedings of the 17th International Conference on Web-Age Information Management, WAIM 2016, Nanchang, China, Part I, 2016, pp. 231-243.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Z. K. Zhang, T. Zhou, and Y. C. Zhang, &amp;quot;Tag-Aware Recommender Systems: A State-of-the-Art Survey,&amp;quot; Journal of Computer Science and Technology, vol. 26, no. 5, pp. 767-777, 2011.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Z. L. Zhao, C. D. Wang, Y. Y. Wan, and J. H. Lai, &amp;quot;Recommendation in feature space sphere,&amp;quot; Electronic Commerce Research and Applications, vol. 26, no. Supplement C, pp. 109-118, 2017.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Khusro, Z. Ali, and I. Ullah, &amp;quot;Recommender Systems: Issues, Challenges, and Research Opportunities,&amp;quot; in Proceedings of the Information Science and Applications (ICISA), Singapore, 2016, pp. 1179-1189.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Kolahkaj, A. Harounabadi, and M. Sadeghzade, &amp;quot;A Recommender System for Web Mining using Neural Network and Fuzzy Algorithm,&amp;quot; International Journal of Computer Applications, vol. 78, no. 8, pp. 20-24, 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Kolahkaj and M. Khalilian, &amp;quot;A recommender system by using classification based on frequent pattern mining and J48 algorithm,&amp;quot; in 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), 2015, pp. 780-786.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Safa, S. Mirroshandel, S. Javadi, and M. Azizi, &amp;quot;Venue Recommendation Based on Paper’s Title and Co-authors Network,&amp;quot; Journal of Information Systems and Telecommunication, vol. 1, no. 6, pp. 209-217, 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	X. Ma, H. Lu, Z. Gan, and J. Zeng, &amp;quot;An explicit trust and distrust clustering based collaborative filtering recommendation approach,&amp;quot; Electronic Commerce Research and Applications, vol. 25, no. Supplement C, pp. 29-39, 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	R. Gao, J. Li, X. Li, C. Song, and Y. Zhou, &amp;quot;A personalized point-of-interest recommendation model via fusion of geo-social information,&amp;quot; Neurocomputing, vol. 273, pp. 159-170, 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Y. M. Afify, I. F. Moawad, N. L. Badr, and M. F. Tolba, &amp;quot;A personalized recommender system for SaaS services,&amp;quot; Concurrency and Computation: Practice and Experience, vol. 29, no. 4, p. e3877, 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	N. M. Villegas, C. S&amp;#225;nchez, J. D&amp;#237;az-Cely, and G. Tamura, &amp;quot;Characterizing context-aware recommender systems: A systematic literature review,&amp;quot; Knowledge-Based Systems, vol. 140, pp. 173-200, 2018.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	I. Cenamor, T. de la Rosa, S. N&amp;#250;&amp;#241;ez, and D. Borrajo, &amp;quot;Planning for tourism routes using social networks,&amp;quot; Expert Systems with Applications, vol. 69, pp. 1-9, 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	G. Cai, K. Lee, and I. Lee, &amp;quot;Itinerary recommender system with semantic trajectory pattern mining from geo-tagged photos,&amp;quot; Expert Systems with Applications, vol. 94, pp. 32-40, 2018.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	I. Memon, L. Chen, A. Majid, M. Lv, I. Hussain, and G. Chen, &amp;quot;Travel Recommendation Using Geo-tagged Photos in Social Media for Tourist,&amp;quot; Wirel. Pers. Commun., vol. 80, no. 4, pp. 1347-1362, 2015.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	D. Wang, S. Deng, and G. Xu, &amp;quot;Sequence-based context-aware music recommendation,&amp;quot; Information Retrieval Journal, vol. 21, no. 2, pp. 230-252, 2018.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	D. Bachmann et al., &amp;quot;(CF)2 architecture: contextual collaborative filtering,&amp;quot; Information Retrieval Journal, 2018.
[18]	Z. Xiang and U. Gretzel, &amp;quot;Role of social media in online travel information search,&amp;quot; Tourism Management, vol. 31, no. 2, pp. 179-188, 2010.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	V. Subramaniyaswamy, V. Vijayakumar, R. Logesh, and V. Indragandhi, &amp;quot;Intelligent Travel Recommendation System by Mining Attributes from Community Contributed Photos,&amp;quot; Procedia Computer Science, vol. 50, pp. 447-455, 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	R. S. Aquino, H. A. Sch&amp;#228;nzel, and K. F. Hyde, &amp;quot;Unearthing the geotourism experience: Geotourist perspectives at Mount Pinatubo, Philippines,&amp;quot; Tourist Studies, vol. 18, no. 1, pp. 41-62, 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	L. Ravi and S. Vairavasundaram, &amp;quot;A Collaborative Location Based Travel Recommendation System through Enhanced Rating Prediction for the Group of Users,&amp;quot; Intell. Neuroscience, vol. 2016, p. 7, 2016.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	M. Pazzani and D. Billsus, &amp;quot;Learning and Revising User Profiles: The Identification ofInteresting Web Sites,&amp;quot; Mach. Learn., vol. 27, no. 3, pp. 313-331, 1997.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	D. H. Park, H. K. Kim, I. Y. Choi, and J. K. Kim, &amp;quot;A literature review and classification of recommender systems research,&amp;quot; Expert Systems with Applications, vol. 39, no. 11, pp. 10059-10072, 2012.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	M. Nilashi, O. bin Ibrahim, N. Ithnin, and N. H. Sarmin, &amp;quot;A multi-criteria collaborative filtering recommender system for the tourism domain using Expectation Maximization (EM) and PCA–ANFIS,&amp;quot; Electronic Commerce Research and Applications, vol. 14, no. 6, pp. 542-562, 2015.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	G. Adomavicius and A. Tuzhilin, &amp;quot;Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions,&amp;quot; IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 6, pp. 734-749, 2005.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	M. Balabanovi and Y. Shoham, &amp;quot;Fab: content-based, collaborative recommendation,&amp;quot; Commun. ACM, vol. 40, no. 3, pp. 66-72, 1997.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	W. Wu et al., &amp;quot;Improving performance of tensor-based context-aware recommenders using Bias Tensor Factorization with context feature auto-encoding,&amp;quot; Knowledge-Based Systems, vol. 128, pp. 71-77, 2017.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	D. H. Lee and P. Brusilovsky, &amp;quot;Improving personalized recommendations using community membership information,&amp;quot; Information Processing &amp;amp; Management, vol. 53, no. 5, pp. 1201-1214, 2017.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	T. Ha and S. Lee, &amp;quot;Item-network-based collaborative filtering: A personalized recommendation method based on a user&amp;#39;s item network,&amp;quot; Information Processing &amp;amp; Management, vol. 53, no. 5, pp. 1171-1184, 2017.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	A. Sesagiri Raamkumar, S. Foo, and N. Pang, &amp;quot;Using author-specified keywords in building an initial reading list of research papers in scientific paper retrieval and recommender systems,&amp;quot; Information Processing &amp;amp; Management, vol. 53, no. 3, pp. 577-594, 2017.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	K. H. L. Tso-Sutter, L. B. Marinho, and L. Schmidt-Thieme, &amp;quot;Tag-aware recommender systems by fusion of collaborative filtering algorithms,&amp;quot; in Proceedings of the ACM symposium on Applied computing, Fortaleza, Ceara, Brazil, 2008, pp. 1995-1999.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	A. M. Nagrale and A. P. Pande, &amp;quot;User Preferences-based Recommendation System for Services Using Map Reduce Approach for Big Data Applications,&amp;quot; International Journal of Innovations &amp;amp; Advancement in Computer Science, vol. 4, pp. 528-532, 2015.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	M. Y. H. Al-Shamri, &amp;quot;Effect of Collaborative Recommender System Parameters,&amp;quot; Adv. in Artif. Intell., vol. 2016, pp. 1-10, 2016.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	Z. Zhang, X. Zheng, and D. D. Zeng, &amp;quot;A framework for diversifying recommendation lists by user interest expansion,&amp;quot; Knowledge-Based Systems, vol. 105, pp. 83-95, 2016.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	J. Bobadilla, F. Ortega, A. Hernando, and J. Alcal&amp;#225;, &amp;quot;Improving collaborative filtering recommender system results and performance using genetic algorithms,&amp;quot; Knowledge-Based Systems, vol. 24, no. 8, pp. 1310-1316, 2011.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	Q. Cheng et al., &amp;quot;The new similarity measure based on user preference models for collaborative filtering,&amp;quot; in Proceedings of the IEEE International Conference on Information and Automation, 2015, pp. 577-582.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	G. Guo, J. Zhang, and N. Yorke-Smith, &amp;quot;A Novel Evidence-Based Bayesian Similarity Measure for Recommender Systems,&amp;quot; ACM Trans. Web, vol. 10, no. 2, pp. 1-30, 2016.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	M. Y. H. Al-Shamri, &amp;quot;User profiling approaches for demographic recommender systems,&amp;quot; Knowledge-Based Systems, vol. 100, pp. 175-187, 2016.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	S. Zammali, K. Arour, and A. Bouzeghoub, &amp;quot;A Context Features Selecting and Weighting Methods for Context-Aware Recommendation,&amp;quot; in Proceedings of the IEEE 39th Annual Computer Software and Applications Conference, 2015, vol. 2, pp. 575-584.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[40]	H. Liu, Z. Hu, A. Mian, H. Tian, and X. Zhu, &amp;quot;A new user similarity model to improve the accuracy of collaborative filtering,&amp;quot; Knowledge-Based Systems, vol. 56, pp. 156-166, 2014.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[41]	Z. L. Zhao, C. D. Wang, and J. H. Lai, &amp;quot;AUI&amp;amp;GIV: Recommendation with Asymmetric User Influence and Global Importance Value,&amp;quot; PLoS ONE, vol. 11, no. 2, pp. 1-21, 2016.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[42]	S. H. Cha, &amp;quot;Comprehensive Survey on Distance/Similarity Measures between Probability Density Functions,&amp;quot; International Journal of Mathematical Models and Methods in Applied Sciences, vol. 1, no. 4, pp. 300-307, 2007.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[43]	P. Pirasteh, D. Hwang, and J. E. Jung, &amp;quot;Weighted Similarity Schemes for High Scalability in User-Based Collaborative Filtering,&amp;quot; Mob. Netw. Appl., vol. 20, no. 4, pp. 497-507, 2015.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[44]	A. Majid, L. Chen, G. Chen, H. T. Mirza, I. Hussain, and J. Woodward, &amp;quot;A context-aware personalized travel recommendation system based on geotagged social media data mining,&amp;quot; Int. J. Geogr. Inf. Sci., vol. 27, no. 4, pp. 662-684, 2013.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[45]	Y. Zheng, R. Burke, and B. Mobasher, &amp;quot;Recommendation with Differential Context Weighting,&amp;quot; in Proceedings of the 21th International Conference on User Modeling, Adaptation, and Personalization, UMAP 2013, Rome, Italy, 2013, pp. 152-164.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[46]	P. Pirasteh, J. J. Jung, and D. Hwang, &amp;quot;An Asymmetric Weighting Schema for Collaborative Filtering,&amp;quot; in In: Proceedings of the New Trends in Computational Collective Intelligence, 2015, pp. 77-82: Springer.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[47]	P. Pirasteh, D. Hwang, and J. J. Jung, &amp;quot;Exploiting matrix factorization to asymmetric user similarities in recommendation systems,&amp;quot; Knowledge-Based Systems, vol. 83, pp. 51-57, 2015.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[48]	B. K. Patra, R. Launonen, V. Ollikainen, and S. Nandi, &amp;quot;A new similarity measure using Bhattacharyya coefficient for collaborative filtering in sparse data,&amp;quot; Know.-Based Syst., vol. 82, no. C, pp. 163-177, 2015.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[49]	S. Vairavasundaram, V. Varadharajan, I. Vairavasundaram, and L. Ravi, &amp;quot;Data mining-based tag recommendation system: an overview,&amp;quot; Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol. 5, no. 3, pp. 87-112, 2015.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[50]	G. Adomavicius and A. Tuzhilin, &amp;quot;Context-Aware Recommender Systems,&amp;quot; in Recommender Systems Handbook1st ed.: Springer US, 2011, pp. 217-253.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[51]	A. Majid, L. Chen, H. T. Mirza, I. Hussain, and G. Chen, &amp;quot;A system for mining interesting tourist locations and travel sequences from public geo-tagged photos,&amp;quot; Data &amp;amp; Knowledge Engineering, vol. 95, pp. 66-86, 2015.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[52]	Suryakant and T. Mahara, &amp;quot;A New Similarity Measure Based on Mean Measure of Divergence for Collaborative Filtering in Sparse Environment,&amp;quot; Procedia Computer Science, vol. 89, pp. 450-456, 2016.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[53]	Z. Xu, &amp;quot;Trip similarity computation for context-aware travel recommendation exploiting geotagged photos,&amp;quot; in Proceedings of the 30th IEEE  International Conference on Data Engineering Workshops, 2014, pp. 330-334.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[54]	S. Kisilevich, F. Mansmann, and D. Keim, &amp;quot;P-DBSCAN: a density based clustering algorithm for exploration and analysis of attractive areas using collections of geo-tagged photos,&amp;quot; in Proceedings of the 1st ACM International Conference and Exhibition on Computing for Geospatial Research &amp;amp; Application, Washington, D.C., USA, 2010, pp. 1-4.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[55]	L. J. Li, R. K. Jha, B. Thomee, D. A. Shamma, L. Cao, and Y. Wang, &amp;quot;Where the Photos Were Taken: Location Prediction by Learning from Flickr Photos,&amp;quot; in Proceeding of the Large-Scale Visual Geo-Localization, 2016, pp. 41-58.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[56]	M. Ester, H. P. Kriegel, r. Sander, and X. Xu, &amp;quot;A density-based algorithm for discovering clusters in large spatial databases with noise,&amp;quot; in Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, Portland, Oregon, 1996, pp. 226-231.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[57]	J. Han, M. Kamber, and J. Pei, "Data Mining: Concepts and Techniques," Third ed. Boston: Morgan Kaufmann, 2012, pp. 39-82.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[58]	B. Thomee et al., &amp;quot;YFCC100M: the new data in multimedia research,&amp;quot; Commun. ACM, vol. 59, no. 2, pp. 64-73, 2016.</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[59]	Flickr. (2018, 6 jan. 2017). Available: http://www.Flickr.com</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[60]	WebscopeYahooLabs. (15 Feb 2017). Available: https://webscope.sandbox.yahoo.com/catalog.php?datatype=i&amp;amp;did=67</unstructured_citation></citation><citation key="ref60"><unstructured_citation>
[61]	A. Bellog&amp;#237;n and P. S&amp;#225;nchez, &amp;quot;Collaborative filtering based on subsequence matching: A new approach,&amp;quot; Information Sciences, vol. 418-419, pp. 432-446, 2017.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Retinal Vessel Extraction Using Dynamic Threshold And Enhancement Image Filter From Retina Fundus</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>erwin</given_name><surname>erwin</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Tomi</given_name><surname>Kiyatmoko</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2019</year></publication_date><pages><first_page>189</first_page><last_page>196</last_page></pages><doi_data><doi>10.7508/jist.2018.04.001</doi><resource>http://jist.ir/en/Article/15246</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15246</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15246</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15246</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15246</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15246</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15246</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15246</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	N. Pratap and S. Rajeev, “Extraction of Retinal Blood Vessels by Using an Extended Matched Filter Based on Second Derivative of Gaussian,” Proc. Natl. Acad. Sci. India Sect. A Phys. Sci., 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Biran, P. S. Bidari, A. Almazroa, and K. Raahemifar, “Blood Vessels Extraction from Retinal Images Using Combined 2D Gabor Wavelet Transform with Local Entropy Thresholding and Alternative Sequential Filter,” IEEE Can. Conf. ECE, pp. 1–5, 2016.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. L. Pal, S. Prabhu, and N. Sampathila, “Extraction of Retinal Blood Vessels from Retinal Fundus Image for Computer Aided Diagnosis,” Canar. E.college, pp. 400–403, 2015.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Z. Yavuz and C. Köse, “Blood Vessel Extraction in Color Retinal Fundus Images with Enhancement Filtering and Unsupervised Classification,” Hindawi Int. J., vol. 2017, 2017.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Dash, “Retinal Blood Vessels Extraction from Fundus Images Using an Automated Method,” 2018 4th Int. Conf. Recent Adv. Inf. Technol., pp. 1–5, 2018.#3
[6]	J. Dash and N. Bhoi, “An Unsupervised Approach for Extraction of Blood Vessels from Fundus Images,” J. Digit. Imaging, 2018.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[7]	D. Güu, “A Novel Retinal Vessel Extraction Method Based on Dynamic Scales Allocation,” Int. Conf. image, Vis. Comput., pp. 145–149, 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[8]	T. A. Soomro, “Retinal Blood Vessel Extraction Method Based on Basic Filtering Schemes,” IEEE Int. Conf. Image Process., 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[9]	M. Ben Abdallah et al., “Automatic Extraction of Blood Vessels in the Retinal Vascular Tree Using Multiscale Medialness,” Hindawi Int. J., vol. 2015, 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10]	R. Kamble, “Automatic Blood Vessel Extraction Technique Using Phase Stretch Transform In Retinal Images,” 2016 Int. Conf. signal Inf. Process., 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	B. Khomri, A. Christodoulidis, L. Djerou, and M. C. Babahenini, “Retinal blood vessel segmentation using the elite-guided multi-objective artificial bee colony algorithm,” IET Image Process., vol. 12, pp. 2163 – 2171, 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	S. A. Amiri, “A Preprocessing Approach For Image Analysis Using Gamma Correction,” vol. 38, no. 12, 2012.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	F. K. P, D. Saepudin, and A. Rizal, “Analisis Contrast Limited Adaptive Histogram Equalization ( Clahe ) Dan Region Growing Dalam Deteksi Gejala Kanker Payudara Pada Citra Mammogram,” elektro, vol. 9, pp. 1–14, 2014.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	A. L. I. M. Reza, “Realization of the Contrast Limited Adaptive Histogram Equalization ( CLAHE ) for Real-Time Image Enhancement,” J. VLSI Signal Process., vol. 38, pp. 35–44, 2004.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	D. Govind, B. Ginley, and B. Lutnick, “Glomerular detection and segmentation from multimodal microscopy images using a Butterworth band-pass filter,” SPIE Med. Imaging, vol. 1058114, no. March, 2018.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	R. C. Gonzalez, Digital Image Processing Third Edition. 2006.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	Diptoneel Kayal Sreeparna Banerjee, “Dynamic Thresholding with Tabu Search for Detection of Hard Exudates in Retinal Image,” in Industry Interactive Innovations in Science, Engineering and Technology, 2017, pp. 553–560.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	Z. H. Chan FH, Lam FK, “Adaptive thresholding by variationalmethod,” IEEE Trans. Image Process., vol. 7, pp. 468–473, 1998.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	A. Ray, A. Chakraborty, D. Roy, B. Sengupta, and M. Biswas, “Blood Vessel Extraction from Fundus Image,” Emerg. Technol. Data Min. Inf. Secur., pp. 259–268, 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	Michael Goldbaum, “STARE database,” 2003. [Online]. Available: http://cecas.clemson.edu/~ahoover/stare/.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	J. J. Staal, M. D. Abramoff, M. Niemeijer, M. A. Viergever, and B. van Ginneken, “Ridge based vessel segmentation in color images of the retina,” IEEE Trans. Med. Imaging, vol. 23, no. 4, pp. 501–509, 2004.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	M. D. Michael Goldbaum, “STructured Analysis of the Retina,” 1975. [Online]. Available: http://cecas.clemson.edu/~ahoover/stare/.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	H. B. Wong and G. H. Lim, “Measures of Diagnostic Accuracy: Sensitivity , Specificity , PPV and NPV,” in Proceedings of Singapore Healthcare, 2011, vol. 20, no. 4, pp. 316–318.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	D. M. W. Powers, “Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness &amp; Correlation,” J. Mach. Learn. Technol., pp. 37–63, 2011.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	R. K. B, H. Kabir, and S. Salekin, “Contrast Enhancement by Top-Hat and Bottom-Hat Transform with Optimal Structuring Element : Application to Retinal Vessel Segmentation,” Springer Int. Publ. AG 2017, pp. 533–540, 2017.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>