﻿<?xml version="1.0" encoding="utf-8"?><ONIXDOISerialArticleWorkRegistrationMessage xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.editeur.org/onix/DOIMetadata/2.0 https://www.medra.org/schema/onix/DOIMetadata/2.0/ONIX_DOIMetadata_2.0.xsd" xmlns="http://www.editeur.org/onix/DOIMetadata/2.0"><Header><FromCompany>Sinaweb</FromCompany><FromPerson>Sinaweb DOI</FromPerson><FromEmail>doi@sinaweb.net</FromEmail><ToCompany>mEDRA</ToCompany><SentDate>20260519</SentDate><MessageNote>DOI Registration</MessageNote><NotificationResponse>01</NotificationResponse></Header><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.7508/jist.2018.04.001</DOI><DOIWebsiteLink>http://jist.ir/Article/15246</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>3433</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>3433</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>6</JournalVolumeNumber><JournalIssueNumber>24</JournalIssueNumber><JournalIssueDesignation>9</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>201909</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>Retinal Vessel Extraction Using Dynamic Threshold And Enhancement Image Filter From Retina Fundus</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>erwin erwin</PersonName><PersonNameInverted>erwin , erwin</PersonNameInverted><NamesBeforeKey>erwin</NamesBeforeKey><KeyNames>erwin</KeyNames></Contributor><Contributor><SequenceNumber>2</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Tomi Kiyatmoko</PersonName><PersonNameInverted>Kiyatmoko , Tomi</PersonNameInverted><NamesBeforeKey>Tomi</NamesBeforeKey><KeyNames>Kiyatmoko</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>201909</PublicationDate><CopyrightStatement><CopyrightYear>2019</CopyrightYear><CopyrightOwner><PersonName>erwin erwin</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.7508/jist.2018.04.002</DOI><DOIWebsiteLink>http://jist.ir/Article/15179</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>3433</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>3433</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>6</JournalVolumeNumber><JournalIssueNumber>24</JournalIssueNumber><JournalIssueDesignation>9</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>201909</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>A 2-bit Full Comparator Design with Minimum Quantum Cost Function in Quantum-Dot Cellular Automata</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Davoud Bahrepour</PersonName><PersonNameInverted>Bahrepour , Davoud</PersonNameInverted><NamesBeforeKey>Davoud</NamesBeforeKey><KeyNames>Bahrepour</KeyNames></Contributor><Contributor><SequenceNumber>2</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Negin Maroufi</PersonName><PersonNameInverted>Maroufi , Negin</PersonNameInverted><NamesBeforeKey>Negin</NamesBeforeKey><KeyNames>Maroufi</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>201909</PublicationDate><CopyrightStatement><CopyrightYear>2019</CopyrightYear><CopyrightOwner><PersonName>Davoud Bahrepour</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.7508/jist.2018.04.003</DOI><DOIWebsiteLink>http://jist.ir/Article/15191</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>3433</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>3433</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>6</JournalVolumeNumber><JournalIssueNumber>24</JournalIssueNumber><JournalIssueDesignation>9</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>201909</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>Long-Term Spectral Pseudo-Entropy (LTSPE): A New Robust Feature for Speech Activity Detection</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Mohammad Rasoul  kahrizi</PersonName><PersonNameInverted>kahrizi , Mohammad Rasoul </PersonNameInverted><NamesBeforeKey>Mohammad Rasoul </NamesBeforeKey><KeyNames>kahrizi</KeyNames></Contributor><Contributor><SequenceNumber>2</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Seyed jahanshah kabudian</PersonName><PersonNameInverted>kabudian , Seyed jahanshah</PersonNameInverted><NamesBeforeKey>Seyed jahanshah</NamesBeforeKey><KeyNames>kabudian</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>201909</PublicationDate><CopyrightStatement><CopyrightYear>2019</CopyrightYear><CopyrightOwner><PersonName>Mohammad Rasoul  kahrizi</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.7508/jist.2018.04.004</DOI><DOIWebsiteLink>http://jist.ir/Article/15215</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>3433</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>3433</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>6</JournalVolumeNumber><JournalIssueNumber>24</JournalIssueNumber><JournalIssueDesignation>9</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>201909</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>DBCACF: A Multidimensional Method for Tourist Recommendation Based on Users’ Demographic, Context and Feedback</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Maral Kolahkaj</PersonName><PersonNameInverted>Kolahkaj , Maral</PersonNameInverted><NamesBeforeKey>Maral</NamesBeforeKey><KeyNames>Kolahkaj</KeyNames></Contributor><Contributor><SequenceNumber>2</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Ali Harounabadi</PersonName><PersonNameInverted>Harounabadi , Ali</PersonNameInverted><NamesBeforeKey>Ali</NamesBeforeKey><KeyNames>Harounabadi</KeyNames></Contributor><Contributor><SequenceNumber>3</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Alireza Nikravan shalmani</PersonName><PersonNameInverted>Nikravan shalmani , Alireza</PersonNameInverted><NamesBeforeKey>Alireza</NamesBeforeKey><KeyNames>Nikravan shalmani</KeyNames></Contributor><Contributor><SequenceNumber>4</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Rahim Chinipardaz</PersonName><PersonNameInverted>Chinipardaz , Rahim</PersonNameInverted><NamesBeforeKey>Rahim</NamesBeforeKey><KeyNames>Chinipardaz</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>201909</PublicationDate><CopyrightStatement><CopyrightYear>2019</CopyrightYear><CopyrightOwner><PersonName>Ali Harounabadi</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.7508/jist.2018.04.005</DOI><DOIWebsiteLink>http://jist.ir/Article/15182</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>3433</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>3433</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>6</JournalVolumeNumber><JournalIssueNumber>24</JournalIssueNumber><JournalIssueDesignation>9</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>201909</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>A Novel Method for Image Encryption Using Modified Logistic Map</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>ardalan Ghasemzadeh</PersonName><PersonNameInverted>Ghasemzadeh , ardalan</PersonNameInverted><NamesBeforeKey>ardalan</NamesBeforeKey><KeyNames>Ghasemzadeh</KeyNames></Contributor><Contributor><SequenceNumber>2</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Omid R.B.  Speily</PersonName><PersonNameInverted>Speily , Omid R.B. </PersonNameInverted><NamesBeforeKey>Omid R.B. </NamesBeforeKey><KeyNames>Speily</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>201909</PublicationDate><CopyrightStatement><CopyrightYear>2019</CopyrightYear><CopyrightOwner><PersonName>Omid R.B.  Speily</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.7508/jist.2018.04.006</DOI><DOIWebsiteLink>http://jist.ir/Article/15136</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>3433</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>3433</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>6</JournalVolumeNumber><JournalIssueNumber>24</JournalIssueNumber><JournalIssueDesignation>9</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>201909</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>An SRN Based Approach for Performance Evaluation of Network Layer in Mobile Ad hoc Networks</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>meisam Yadollahzadeh tabari</PersonName><PersonNameInverted>Yadollahzadeh tabari , meisam</PersonNameInverted><NamesBeforeKey>meisam</NamesBeforeKey><KeyNames>Yadollahzadeh tabari</KeyNames></Contributor><Contributor><SequenceNumber>2</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Ali A Pouyan</PersonName><PersonNameInverted>Pouyan , Ali A</PersonNameInverted><NamesBeforeKey>Ali A</NamesBeforeKey><KeyNames>Pouyan</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>201909</PublicationDate><CopyrightStatement><CopyrightYear>2019</CopyrightYear><CopyrightOwner><PersonName>meisam Yadollahzadeh tabari</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.7508/jist.2018.04.007</DOI><DOIWebsiteLink>http://jist.ir/Article/15207</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>3433</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>3433</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>6</JournalVolumeNumber><JournalIssueNumber>24</JournalIssueNumber><JournalIssueDesignation>9</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>201909</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>Toward an Enhanced Dynamic VM Consolidation Approach for Cloud Datacenters Using Continuous Time Markov Chain</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Monireh Hosseini Sayadnavard</PersonName><PersonNameInverted>Hosseini Sayadnavard , Monireh</PersonNameInverted><NamesBeforeKey>Monireh</NamesBeforeKey><KeyNames>Hosseini Sayadnavard</KeyNames></Contributor><Contributor><SequenceNumber>2</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Abolfazl Toroghi Haghighat</PersonName><PersonNameInverted>Toroghi Haghighat , Abolfazl</PersonNameInverted><NamesBeforeKey>Abolfazl</NamesBeforeKey><KeyNames>Toroghi Haghighat</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>201909</PublicationDate><CopyrightStatement><CopyrightYear>2019</CopyrightYear><CopyrightOwner><PersonName>Monireh Hosseini Sayadnavard</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork></ONIXDOISerialArticleWorkRegistrationMessage>