﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051923</doi_batch_id><timestamp>20260519232700</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>7</month><day>19</day><year>2020</year></publication_date><journal_volume><volume>8</volume></journal_volume><issue>29</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Density Measure in Context Clustering for Distributional Semantics of Word Sense Induction</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Masood</given_name><surname>Ghayoomi</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>19</day><year>2020</year></publication_date><pages><first_page>15</first_page><last_page>24</last_page></pages><doi_data><doi>10.7508/jist.2020.01.002</doi><resource>http://jist.ir/en/Article/15362</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15362</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15362</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15362</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15362</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15362</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15362</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15362</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] F. de Saussure, Cours de linguistique générale, C. Bally, A. Sechehaye, and A. Riedlinger, Eds. Lausanne, Paris: Payot, 1916.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] G. A. Miller, “WordNet: A lexical database for English,” Communications of the ACM, Vol. 38, No. 11, 1995, pp. 39-41.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] E. Hovey, M. Marcus, M. Palmer, L. Ramshaw, and R. Weischedel, “OntoNotes: The 90% solutions,” in Proceedings of the Human Language Technology Conference of the NAACL, Companion Volume: Short Papers. Stroudsburg, PA, USA: Association for Computational Linguistics, 2006, pp. 57-60.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] E. Huang, R. Socher, C. D. Manning, and A. Ng, “Improving word representations via global context and multiple word prototypes,” in Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics. Jeju Island, Korea: Association for Computational Linguistics, 2012, Vol. 1, pp. 837-882.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] A. Neelakantan, J. Shankar, A. Passos, and A. McCallum, “Efficient non-parametric estimation of multiple embeddings per word in vector space,” in Proceedings of the Conference on Empirical Methods in Natural Language. Doha, Qatar: Association for Computational Linguistics, 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] J. Li, and D. Jurafsky, “Do multi-sense embeddings improve natural language understanding?” in Proceedings of the Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 2015, pp. 1722-1732.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] D. M. Blei, M. I. Jordan, T. L. Griffiths, and J. B. Tenenbaum, “Hierarchical topic models and the nested Chines restaurant process,” in Proceedings of the 16th International Conference on Neural Information Processing Systems. MIT Press, 2003, pp. 17-24.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] M. Ester, H. P. Kriegel, J. Sander, and X. Xu, “A density-based algorithm for discovering clusters in large spatial database with noise,” in Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining, E. Simoudis, J. Han, and U. M. Fayyad, Eds. AAAI Press, 1996, pp. 226-231.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, “Distributed representations of words and phrases and their compositionality,” in Proceedings of the 26th International Processing Systems, C. J. C. Burges, L. Bottou, M. Welling, Z . Ghahramani, and K. Q. Weinberger, Eds. Curran Associates, Inc., 2013, pp. 3111-3119.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] O. Levy, and Y. Goldberg, “Dependency-based word embeddings,” in Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, Vol. 2. Baltimore, Maryland: Association for Computational Linguistics, 2014, pp. 302-308.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] I. Beltagy, K. Erk, and R. Mooney, “Semantic Parsing using distributional semantics and probabilistic logic,” in Proceedings of the ACL 2014 Workshop on Semantic Parsing, Association for Computational Linguistics, 2014, pp. 7-11.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] A. Das, D. Ganguly, and U. Garain, “Named entity recognition with word embeddings and Wikipedia categories for a low-resource language,” ACM Transaction on Asian Low-Resource Language Information Processing, Vol. 16, No. 3, 2017, pp. 1-19.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] L. C. Yu, J. Wang, K. R. Lai, and X. Zhang, “Refining word embeddings using intensity scores for sentiment analysis,” IEEE/ACM Transaction on Audio, Speech and Language Processing, Vol. 26, No. 3, 2018, pp. 671-681.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] L. Song, Z. Wang, H. Mi, and D. Gildea, “Sense embedding learning for word sense induction,” in Proceedings of the 5th Joint Conference on Lexical and Computational Semantics. The *SEM 2016 Organizing Committee, 2016, pp. 85-90.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] Z. S. Harris, “Distributional structure,” Word, Vol. 23, No. 10, 1954, pp. 146-162.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] L. Wittgenstein, Philosophical Investigations, Oxford, UK: Blackwell Publishing Ltd, 1953.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] J. R. Firth, “A synopsis of linguistic theory 1930-1955,” Studies in Linguistic Analysis (Special Volume of the Philosophical Society), 1957, pp. 1-32.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] G. A. Miller, and W. G. Charles, “Contextual correlates of semantic similarity,” Language and Cognitive Processing, Vol. 6, No. 1, 1991, pp. 1-28.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] D. M. Blei, A. Ng, and M. Jordan, “Latent Dirichlet allocation,” Journal of Machine Learning Research, Vol. 3, 2003, pp. 993-1022.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] Y. W. The, M. I. Jordan, M. J. Beal, and D. M. Blei, “Hierarchical Dirichlet process,” Journal of the American Statistical Association, Vol. 101, No. 476, 2006, pp. 1566-1581.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] G. M. Salton, A. Wong, and C. S. Yang, “A vector space model for automatic indexing,” Communications of the ACM, Vol. 18, No. 11, 1975, pp. 613-620.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] D. Jurafsky, and J. H. Martin, Speech and Language Proeccing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition, 2018, https://web.stanford.edu/~jurafsky/slp3/ed3book.pdf</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] Y. Peirsman, and D. Geeraerts, “Predicting strong associations on the basis of corpus data,” in Proceedings of the 12th Conference of the European Chapter of the Association for Computational Linguistics, Stroudsburg, PA, USA: Association for Computational Linguistics, 2009, pp. 648-656.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] T. K. Landauer, and S. T. Dumais, “A solution to Plato’s problem: The latent semantic analysis theory of acquisition, induction, and representation of knowledge,” Psychological Review, Vol. 104, No. 2, 1997, pp. 211-240.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] M. Sahlgren, The Word-space Model: Using Distributional Analysis to Represent Syntagmatic and Paradigmatic Relations between Words in High-dimensional Vector Spaces, Ph.D. dissertation, Stockholm University, Stockholm, Sweden, 2006.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] Z. S. Harris, A Theory of Language and Information: A Mathematical Approach, Oxford, England: Oxford University Press, 1991.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] D. Lin, “Automatic retrieval and clustering of similar words,” in Proceedings of the 17th International Conference on Computational Linguistics, Morristown, NJ, USA: Association for Computational Linguistics, 1998, Vol. 2, pp. 768-774.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] S. Padó, and M. Lapata, “Dependency-based construction of semantic space models,” Computational Linguistics, Vol. 33, No. 2, 2007, pp. 161-199.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] K. M. Hermann, and P. Blunsom, “The role of syntax in vector space models of compositional semantics,” in Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, Sofia, Bulgaria, 2013, Vol. 1, pp. 894-904.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] J. Pennington, R. Socher, and C. D. Manning, “Glove: Global Vectors for word representation,” in Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, 2014, Vol. 14, pp. 1532-1543.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] J. Wang, M. Bansal, K. Gimpel, B. D. Ziebart, and C. T. Yu, “A sense-topic model for word sense induction with unsupervised data enrichment,” Transaction of the Association for Computational Linguistics, Vol. 3, 2015, pp. 59-71.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] A. Amrami, and Y. Goldberg, “Word sense induction with neural biLM and symmetric pattern,” in Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. Brussels, Belgium: Association for Computational Linguistics, 2018, pp. 4860-4867.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] M. Peters, M. Neumann, M. Iyyer, M. Gardner, C. Clark, K. Lee, and L. Zettlemoyer, “Deep contextualized word representations,” in Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1. New Orleans, Louisiana: Association for Computational Linguistics, 2018, pp. 2227-2237.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] D. Alagić, J. Šnajder, and S. Padó, “Leveraging lexical substitutes for unsupervised word sense induction,” in Proceedings of the 32nd AAAI Conference on Artificial Intelligence, New Orleans, LA, 2018.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] E. A. Corrêa, and D.R. Amancio, “Word sense induction using word embeddings and community detection in complex networks,” Physica A: Statistical Mechanics and its Applications, Vol. 523, 2019, pp. 180-190.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] B. Perozzi, R. Al-Rfou’, V. Kulkarni, and S. Skiena, “Inducing language networks from continuous space word representations,” in Complex Networks, P. Contucci, R. Menezes, A. Omicini, and J. Poncela-Casasnovas, Eds. Cham: Springer International Publishing, 2014, pp. 261-273.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] S. Manandhar, I P. Klapaftis, D. Dligach, and S. S. Pradhan, “SemEval-2010 task 14: Word sense induction &amp; disambiguation,” in Proceedings of the 5th International Workshop on Semantic Evaluation. Stroudsburg, PA, USA: Association for Computational Linguistics, 2010, pp 63-68.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38] J. MacQueen, “Some methods for classification and analysis of multivariate observations,” in Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability. Berkley, California: University of California Press, 1967, Vol. 1, pp. 281-297.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39] Y. Lie, Z. Li, H. Xiong, X. Gao, and J. Wu, “Understanding of internal clustering validation measures,” in Proceedings of the 2010 IEEE International Conference on Data Mining. Washington, D.C., USA: IEEE Computer Society, 2010, pp 911-916.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40] P. J. Rousseeuw, “Silhouettes: A graphical aid to the interpretation and validation of cluster analysis,” Journal of Computational and Applied Mathematics, Vol. 20, No. 1, 1987, pp 53-65.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41] C. Shaoul, and C. Westbury, “The Westbury Lab Wikipedia Corpus,” 2010, http://www.psych.ualberta.ca/~ westburylab/downloads/westburylab.wikicorp.download.html </unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42] C. J. V. Rijsbergen, Information Retrieval, 2nd ed. Newton, MA, USA: Butterworth-Heinemann, 1979.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43] B. E. Dom, “An information-theoretic external cluster-validity measure,” IBM, Technical Report, 2001.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44] M. Melia, “Comparing clusterings – an information based distance,” Journal of Multivariate Analysis, Vol. 98, No. 5, 2007, pp. 873-8995.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]A. Rosenberg, and J. Hirschberg, “V-measure: A conditional entropy-based external cluster evaluation measure,” in Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, Prague, Czech Republic: Association for Computational Linguistics, 2007, pp 410-420.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A way to improve Adaptive Maintenance in Enterprise Architecture</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>feridon</given_name><surname>Shams</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>safura</given_name><surname>oviesi</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>19</day><year>2020</year></publication_date><pages><first_page>1</first_page><last_page>14</last_page></pages><doi_data><doi>10.7508/jist.2020.01.001  </doi><resource>http://jist.ir/en/Article/15388</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15388</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15388</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15388</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15388</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15388</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15388</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15388</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	D.Amyot,"Consistency Analysis for	User   Requirements Notation  Models",Ninth International i* Workshop (iStar), At Beijing, China, Volume: CEUR-WS Vol-1674,2016.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	P.Bengtsson, "Architecture Level Prediction of  Software Maintenance", Department of Software Engineering aComputerScience University of Karlskrona/Ronneby S-372 25 Ronneby Sweden,1999.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	NR.Buschand and A.Zalewski, "Enterprise        Architecture Modifiability Analysis". In Towards a Synergistic Combination of Research and Practice in Software Engineering, Springer, Cham, pp. 119-134, 2018.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Chief Information Officer Council Version 1.0,A Practical Guide to Federal Enterprise Architecture,  February 2001, [Online]. Available: https://www.gao.gov/.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R.KazmanBass and L.Abowd and M.Webb, "SAAM: A method for analyzing the properties of software architectures". In Proceedings of 16th International Conference on Software Engineering, IEEE, pp. 81-90,1994.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R.Kazman and M. Klein,  and P. Clements, "ATAM: Method for architecture evaluation",Carnegie-Mellon Univ Pittsburgh PA Software Engineering Inst,2004.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M.Karimi AND S.M.Sharafi and M.N .Dehkordi, "A new approach based on genetic algorithm for   prioritizing quality scenarios in enterprise architecture evaluation. International Journal of Computer Science Engineering ", IJCSE, 3(01), 21-31, ,2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D.Amyot,"Consistency Analysis for	User    Requirements  Notation	Models",Ninth International i* Workshop (iStar), At Beijing, China, Volume: CEUR-WS Vol-1674,2016.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	P.Bengtsson, "Architecture Level Prediction of  Software Maintenance", Department of Software Engineering aComputerScience University of Karlskrona/Ronneby S-372 25 Ronneby Sweden,1999.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	NR.Buschand and A.Zalewski, "Enterprise        Architecture Modifiability Analysis". In Towards a Synergistic Combination of Research and Practice in Software Engineering ,Springer, Cham,  pp. 119-134,2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Chief Information Officer Council Version 1.0,A Practical Guide to Federal Enterprise Architecture,  February 2001, [Online]. Available: https://www.gao.gov/.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	R.KazmanBass and L.Abowd and M.Webb, "SAAM: A method for analyzing the properties of software architectures". In Proceedings of 16th International Conference on Software Engineering, IEEE, pp. 81-90,1994.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	R.Kazman and M. Klein,  and P. Clements, "ATAM: Method for architecture evaluation",Carnegie-Mellon Univ Pittsburgh PA Software Engineering Inst,2004.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M.Karimi AND S.M.Sharafi and M.N .Dehkordi, "A new approach based on genetic algorithm for   prioritizing quality scenarios in enterprise architecture evaluation. International Journal of Computer Science Engineering ", IJCSE, 3(01), 21-31, ,2014.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	D.Amyot,"Consistency Analysis for	User    Requirements Notation	Models",Ninth International i* Workshop (iStar), At Beijing, China, Volume: CEUR-WS Vol-1674,2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P.Bengtsson, "Architecture Level Prediction of  Software Maintenance", Department of Software Engineering aComputerScience University of Karlskrona/Ronneby S-372 25 Ronneby Sweden,1999.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	NR.Buschand and A.Zalewski, "Enterprise        Architecture Modifiability Analysis". In Towards a Synergistic Combination of Research and Practice in Software Engineering ,Springer, Cham,  pp. 119-134,2018.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Chief Information Officer Council Version 1.0,A Practical Guide to Federal Enterprise Architecture,  February 2001, [Online]. Available: https://www.gao.gov/.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	R.KazmanBass and L.Abowd and M.Webb, "SAAM: A method for analyzing the properties of software architectures". In Proceedings of 16th International Conference on Software Engineering, IEEE, pp. 81-90,1994.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	R.Kazman and M. Klein,  and P. Clements, "ATAM: Method for architecture evaluation",Carnegie-Mellon Univ Pittsburgh PA Software Engineering Inst,2004.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M.Karimi AND S.M.Sharafi and M.N .Dehkordi, "A new approach based on genetic algorithm for   prioritizing quality scenarios in enterprise architecture evaluation. International Journal of Computer Science Engineering ", IJCSE, 3(01), 21-31, ,2014.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	D.Amyot,"Consistency Analysis for	UserRequirements  Notation	Models",Ninth International i* Workshop (iStar), At Beijing, China, Volume: CEUR-WS Vol-1674,2016.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	P.Bengtsson, "Architecture Level Prediction of  Software Maintenance", Department of Software Engineering aComputerScience University of Karlskrona/Ronneby S-372 25 Ronneby Sweden,1999.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	NR.Buschand and A.Zalewski, "Enterprise        Architecture Modifiability Analysis". In Towards a Synergistic Combination of Research and Practice in Software Engineering ,Springer, Cham,  pp. 119-134,2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Chief Information Officer Council Version 1.0,A Practical Guide to Federal Enterprise Architecture,  February 2001, [Online]. Available: https://www.gao.gov/.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	R.KazmanBass and L.Abowd and M.Webb, "SAAM: A method for analyzing the properties of software architectures". In Proceedings of 16th International Conference on Software Engineering, IEEE, pp. 81-90,1994.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	R.Kazman and M. Klein,  and P. Clements, "ATAM: Method for architecture evaluation",Carnegie-Mellon Univ Pittsburgh PA Software Engineering Inst,2004.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	M.Karimi AND S.M.Sharafi and M.N .Dehkordi, "A new approach based on genetic algorithm for   prioritizing quality scenarios in enterprise architecture evaluation. International Journal of Computer Science Engineering ", IJCSE, 3(01), 21-31, ,2014.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	S.R.Khayyami,. "Evaluation and analysis of Enterprisearchitecture",Ph.D.dissertation,University of Shiraz,iran, , 2009.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	R. Lagerström, "Analyzing system maintainability using enterprise architecture models," jEA 2007, pp. 31-40, 2007.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	 M. Lankhorst, " Enterprise Architecture at Work: Modeling, Communication and Analysis, " 3th ed. Springer, 2013.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	 M .M .Lehman, " Implications of Evolution Metrics on Software Maintenance, " Department of Computing Imperial College London SW7 2BZ,2015.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	 L. Manzur and  J. Mario Ulloa, M. Sanchez  and J. Villalobos, "xArchiMate: Enterprise Architecture simulation, experimentation 
[34]	and analysis," Simulation-Transactions of the Society for Modeling and Simulation International, 2015 ,vol. 91, no. 3, pp. 276-301.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	 P. Narman and P. Johnson,"Enterprise Architecture: A Framework Supporting System Quality Analysis," presented at the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), Annapolis, MD, USA, 2007.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	 M. Razavi Davoudi and K. Sheikhvand, "An Approach towards Enterprise Architecture Analysis,using AHP and Fuzzy AHP, "2012.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	 M.Razavi , "Presentation of a new framework for analysis of qualitative features of Enterprise architecture, " PhD.dissertation ,Tehran University of Science and Technology,iran, 2009.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	 F. Shams and A. Mahjourian, " Introduction to the principles and basics and architectural methods of     service-oriented Enterprise, " Shahid Beheshti University, Tehran,iran, 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Using Residual Design for Key Management in Hierarchical Wireless Sensor Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Vahid</given_name><surname>Modiri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hamid</given_name><surname>Haj Seyyed Javadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Amir Masoud </given_name><surname>Rahmani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohaddese</given_name><surname>Anzani</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>19</day><year>2020</year></publication_date><pages><first_page>53</first_page><last_page>61</last_page></pages><doi_data><doi>10.7508/jist.2020.01.006</doi><resource>http://jist.ir/en/Article/15399</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15399</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15399</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15399</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15399</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15399</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15399</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15399</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] C. Boyd, A. Mathuria, and D. Stebila, Protocols for authentication and key establishment. Springer, 2003.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] I. Memon, "A secure and efficient communication scheme with authenticated key establishment protocol for road networks," Wireless Personal Communications, vol. 85, no. 3, pp. 1167-1191, 2015.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] I. Memon, I. Hussain, R. Akhtar, and G. Chen, "Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme," Wireless Personal Communications, vol. 84, no. 2, pp. 1487-1508, 2015.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] J. Zhang and V. Varadharajan, "Wireless sensor network key management survey and taxonomy," Journal of network and computer applications, vol. 33, no. 2, pp. 63-75, 2010.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] J.-W. Dong, D.-Y. Pei, and X.-L. Wang, "A class of key predistribution schemes based on orthogonal arrays," Journal of Computer Science and Technology, vol. 23, no. 5, pp. 825-831, 2008.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM conference on Computer and communications security, 2002, pp. 41-47.</unstructured_citation></citation><citation key="ref7"><unstructured_citation> 
[7] H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in 2003 Symposium on Security and Privacy, 2003, 2003: IEEE, pp. 197-213.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] S. A. Çamtepe and B. Yener, "Combinatorial design of key distribution mechanisms for wireless sensor networks," IEEE/ACM Transactions on networking, vol. 15, no. 2, pp. 346-358, 2007.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] J. Lee and D. R. Stinson, "On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs," ACM Transactions on Information and System Security (TISSEC), vol. 11, no. 2, pp. 1-35, 2008.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] X. Zhang and J. Wang, "An efficient key management scheme in hierarchical wireless sensor networks," in 2015 International Conference on Computing, Communication and Security (ICCCS), 2015: IEEE, pp. 1-7.</unstructured_citation></citation><citation key="ref11"><unstructured_citation> 
[11] V. Modiri, H. H. S. Javadi, and M. Anzani, "A novel scalable key pre-distribution scheme for wireless sensor networks based on residual design," Wireless Personal Communications, vol. 96, no. 2, pp. 2821-2841, 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] M. Anzani, H. H. S. Javadi, and V. Modirir, "Key-management scheme for wireless sensor networks based on merging blocks of symmetric design," Wireless Networks, vol. 24, no. 8, pp. 2867-2879, 2018.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] S. Ruj and B. Roy, "Key pre-distribution using partially balanced designs in wireless sensor networks," International Journal of High Performance Computing and Networking, vol. 7, no. 1, pp. 19-28, 2011.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] M. Javanbakht, H. Erfani, H. H. S. Javadi, and P. Daneshjoo, "Key predistribution scheme for clustered hierarchical wireless sensor networks based on combinatorial designs," Security and Communication Networks, vol. 7, no. 11, pp. 2003-2014, 2014.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] Y. Cheng and D. P. Agrawal, "An improved key distribution mechanism for large-scale hierarchical wireless sensor networks," Ad Hoc Networks, vol. 5, no. 1, pp. 35-48, 2007.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] Y. Zhang and P. Li, "Key management scheme based on nodes capture probability for wireless sensor networks," in 2018 Chinese Control and Decision Conference (CCDC), 2018: IEEE, pp. 5470-5475.</unstructured_citation></citation><citation key="ref17"><unstructured_citation> 
[17] A. Albakri, L. Harn, and S. Song, "Hierarchical key management scheme with probabilistic security in a wireless sensor network (WSN)," Security and Communication Networks, vol. 2019, 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] D. Stinson, Combinatorial designs: constructions and analysis. Springer Science &amp; Business Media, 2007.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] T. Kavitha and R. Kaliyaperumal, "Energy Efficient Hierarchical Key Management Protocol," in 2019 5th International Conference on Advanced Computing &amp; Communication Systems (ICACCS), 2019: IEEE, pp. 53-60.</unstructured_citation></citation><citation key="ref20"><unstructured_citation> 
[20] S. Zhao, K. Tepe, I. Seskar, and D. Raychaudhuri, "Routing protocols for self-organizing hierarchical ad-hoc wireless networks," 2003.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] B. Liu, Z. Liu, and D. Towsley, "On the capacity of hybrid wireless networks," in IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), 2003, vol. 2: IEEE, pp. 1543-1552.</unstructured_citation></citation><citation key="ref22"><unstructured_citation> 
[22] G. Gupta and M. Younis, "Performance evaluation of load-balanced clustering of wireless sensor networks," in 10th International Conference on Telecommunications, 2003. ICT 2003, 2003, vol. 2: IEEE, pp. 1577-1583.</unstructured_citation></citation><citation key="ref23"><unstructured_citation> 
[23] J. Li and R. Levy, "Fair and Secure Clustering Scheme (FSCS) clustering protocol," In Technical report, 2005.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] O. Younis and S. Fahmy, "HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks," IEEE Transactions on mobile computing, vol. 3, no. 4, pp. 366-379, 2004.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Effective Query Recommendation with Medoid-based Clustering using a Combination of Query, Click and Result Features</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Elham</given_name><surname>Esmaeeli-Gohari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sajjad</given_name><surname>Zarifzadeh</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>19</day><year>2020</year></publication_date><pages><first_page>33</first_page><last_page>44</last_page></pages><doi_data><doi>10.7508/jist.2020.01.004</doi><resource>http://jist.ir/en/Article/15402</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15402</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15402</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15402</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15402</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15402</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15402</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15402</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>	[1] J. Wang, J. Z. Huang, J. Guo, and Y. Lan, “Query Ranking Model for Search Engine Query Recommendation”, International Journal of Machine Learning and Cybernetics, Vol. 8, No. 3, 2015, pp. 1-20.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
	[2] M. Mitsui, “A Generative Framework to Query Recommendation and Evaluation”, in ACM Conference on Human Information Interaction and Retrieval (CHIIR), 2017, pp. 407-409.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
	[3] X. Zhu, J. Guo, X. Cheng and Y. Lan, “More than Relevance: High Utility Query Recommendation by Mining Users' Search Behaviors”, in 21st ACM International Conference on Information and Knowledge Management (CIKM), 2012, pp. 1814-1814.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
	[4] P. Melville and V. Sindhwani, “Recommender Systems”, Encyclopedia of Machine Learning, Springer US, pp. 829-838, 2011.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
	[5] Y. Liu, J. Miao, M. Zhang, S. Ma and L. Ru, “How Do Users Describe Their Information Need: Query Recommendation based on Snippet Click Model”, Expert Systems with Applications, Vol. 38, No. 11, 2011, pp. 13:847-13:856.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
	[6] W. Song, J. Z. Liang, X. L. Cao and S. C. Park, “An Effective Query Recommendation Approach using Semantic Strategies for Intelligent Information Retrieval”, Expert Systems with Applications, Vol. 41, No. 2, 2014, pp. 366-372.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
	[7] Y. Song, D. Zhou and L. W. He, “Query Suggestion by Constructing Term-transition Graphs”, in 5th ACM International Conference on Web Search and Data Mining (WSDM), 2012, pp. 353-362.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
	[8] Web Search Query Log Downloads. https://www.jeffhuang.com/search_query_logs.html (2018).</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
	[9] Z. Zhang and O. Nasraoui, “Mining Search Engine Query Logs for Query Recommendation”, in 15th International Conference on World Wide Web (WWW), 2006, pp. 1039–1040.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
	[10] J. R. Wen, J. Y. Nie and H. J. Zhang, “Clustering User Queries of a Search Engine”, in 10th International Conference on World Wide Web (WWW), 2001, pp. 162-168.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
	[11] R. Baeza-Yates, C. Hurtado and M. Mendoza, “Query Recommendation using Query Logs in Search Engines”, in International Conference on Extending Database Technology (EDBT), 2004, pp. 588-596.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
	[12] Y. Hong, J. Vaidya and H. Lu, “Search Engine Query Clustering using Top-k Search Results”, in IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology (WI-IAT), 2011, pp. 112-119.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
	[13] R. Chaudhary and N. Taneja, “A Novel Approach for Query Recommendation via Query Logs”, International Journal of Scientific and Engineering Research (IJSER), Vol. 3, No. 8, 2012, pp. 1-6.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
	[14] L. Fitzpatrick and M. Dent, “Automatic Feedback using Past Queries: Social Searching?”, in 20th Annual International Conference on Research and Development in Information Retrieval (SIGIR), 1997, pp. 306–313.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
	[15] K. Sugiyama, K. Hatano and M. Yoshikawa, “Adaptive Web Search based on User Profile Constructed without any Effort from Users”, in 13th Conference on World Wide Web (WWW), 2004, pp. 675–684.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
	[16] B. J. Chelliah, R. Ojha, S. Semwal, P. Dobhal and C. Sahu, “Personalized Search Engine with Query Recommendation and Re-ranking”, Journal of Network Communications and Emerging Technologies (JNCET), Vol. 8, No. 4, 2018, pp. 213-217.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
	[17] Q. Mei, D. Zhou and K. Church, “Query Suggestion using Hitting Time”, in 17th ACM Conference on Information and Knowledge Management (CIKM), 2008, pp. 469–478.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
	[18] P. Boldi, F. Bonchi, C. Castillo, D. Donato, A. Gionis and S. Vigna, “The Query-flow Graph: Model and Applications”, in 17th ACM Conference on Information and Knowledge Management (CIKM), 2008, pp. 609-618.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
	[19] A. Anagnostopoulos, L. Becchetti, C. Castillo and A. Gionis, “An Optimization Framework for Query Recommendation”, in 3rd ACM International Conference on Web Search and Data Mining (WSDM), 2010, pp. 161-170.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
	[20] L. Bai, J. Guo and X. Cheng, “Query Recommendation by Modelling the Query-flow Graph”, in Asia Information Retrieval Symposium (AIRS), 2011, pp. 137-146.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
	[21] F. Bonchi, R. Perego, F. Silvestri, H. Vahabi and R. Venturini, “Recommendations for the Long Tail by Term-Query Graph”, in 20th International Conference on World Wide Web (WWW), 2011, pp. 15-16.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
	[22] J. Wang, J. Z. Huang, D. Wu, J. Guo and Y. Lan, “An Incremental Model on Search Engine Query Recommendation”, Elsevier Neurocomputing, Vol. 218, 2016, pp. 423-431.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
	[23] A. Sordoni, Y. Bengio, H. Vahabi, C. Lioma, J. G. Simonsen and J. Y. Nie, “A Hierarchical Recurrent Encoder-decoder for Generative Context-aware Query Suggestion”, in 24th ACM International Conference on Information and Knowledge Management (CIKM), 2015, pp. 553-562.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
	[24] Z. Huang, B. Cautis, R. Cheng and Y. Zheng, “Kb-enabled Query Recommendation for Long-tail queries”, in 25th ACM International Conference on Information and Knowledge Management(CIKM), 2016, pp. 2107-2112.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
	[25] R. Cheng, Y. Zheng and J. Yan, “Entity-based Query Recommendation for Long-tail Queries”, ACM Transactions on Knowledge Discovery from Data, Vol. 1, No. 1, 2018, pp. 1-22.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
	[26] S. Kannan and V. Gurusamy, “Preprocessing techniques for text mining”, International Journal of Computer Science &amp; Communication Networks, Vol. 5, No. 1, 2014, pp. 1-7.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
	[27] Hunspell GitHub. https://github.com/hunspell (2018).</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
	[28] H. Taghi-Zadeh, M. H. Sadreddini, M. H. Diyanati, and A. H. Rasekh, “A New Hybrid Stemming Method for Persian Language”, Digit. Scholarsh. Humanit., Vol. 32, No. 1, 2017, pp. 209–221.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
	[29] Infront Webworks: Value of Organic First-page Results. https://www.infront.com/blogs/the-infront-blog/2015/6/17/value-of-first-page-google-results (2018).</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
	[30] T. Joachims, L. Granka, B. Pan, H. Hembrooke, F. Radlinski and G. Gay, “Evaluating the Accuracy of Implicit Feedback from Clicks and Query Reformulations in Web Search”, ACM Transactions on Information Systems (TOIS), Vol. 25, No. 2, 2007, pp. 183-190.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
	[31] L. Kaufman, and P.J. Rousseeuw, “Clustering by Means of Medoids in Statistical Data Analysis based on the L1–norm and Related Methods”, North-Holland, pp. 405–416, 1987.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
	[32] H. S. Park, and C. H. Jun, “A Simple and Fast Algorithm for K-medoids Clustering”, Elsevier Expert Systems with Applications, Vol. 36, No. 2, 2009, pp. 3336-3341.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
	[33] T. Shakiba, S. Zarifzadeh, and V. Derhami, “Spam Query Detection using Stream Clustering”, Springer World Wide Web (WWW), Vol. 21, No. 2, 2018, pp. 557–572.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
	[34] M. Fallah, S. Zarifzadeh, “Practical Detection of Click Spams using Efficient Classification-based Algorithms”, International Journal of Information and Communication Technology Research, Vol. 10, No. 2, 2018, pp. 63-71.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
	[35] C. D. Manning, P. Raghavan and H. Schütze, Introduction to Information Retrieval, Cambridge University Press, 2008.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Experimental Study on Performance of Text Representation Models for Sentiment Analysis</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Sajjad</given_name><surname>Jahanbakhsh Gudakahriz</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Amir Masoud</given_name><surname>Eftekhari Moghaddam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Fariborz</given_name><surname>Mahmoudi</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>19</day><year>2020</year></publication_date><pages><first_page>45</first_page><last_page>52</last_page></pages><doi_data><doi>10.7508/jist.2020.01.005</doi><resource>http://jist.ir/en/Article/15435</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15435</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15435</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15435</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15435</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15435</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15435</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15435</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] A. Montoyo, P. Martínez-Barco, and A. Balahur, “Subjectivity and sentiment analysis: An overview of the current state of the area and envisaged developments”, Decision Support Systems, Vol. 53, 2012, pp. 675–679.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] J. A. Balazs, and J. D. Velasquez, “Opinion Mining and Information Fusion: A survey”, Information Fusion, Vol. 27, 2016, pp. 95–110.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] F. A. Pozzi, E. Fersini, E. Messina, and B. Liu, Sentiment Analysis in Social Networks (Chapter 1), Science Direct, 2017.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] V. M. Mika, G. Daniel, and K. Miikka, “The evolution of sentiment analysis—A review of research topics, venues, and top cited papers”, Computer Science Review, Vol. 27, 2018, pp. 16-32.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] E. Cambria, “Affective computing and sentiment analysis”, IEEE Intelligent Systems,Vol. 31, No. 2, 2016, pp. 102-107.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] P. Gupta, R. Tiwari, and N. Robert, “Sentiment Analysis and Text Summarization of Online Reviews: A Survey”, in International Conference on Communication and Signal Processing, 2016, pp. 241-245.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] J. A. Balazs, and J. D. Velasquez, “Opinion Mining and Information Fusion: A survey”, Information Fusion, Vol. 27, pp. 95–110, 2016.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] A. Heydari, M. A. Tavakoli, N. Salim, and Z. Heydar, “Detection of review spam: A survey”, Expert Systems with Applications, Vol. 42, 2015, pp. 3634–3642.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
 [9] A. Qazi, R. Raj, G. Hardaker, and C. Standing, “A systematic literature review on opinion types and sentiment analysis techniques: tasks and challenges”, Internet Research, Vol. 27, 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] F. Bisio, L. Oneto, and E. Cambria, Sentiment Analysis in Social Networks (Chapter 5), Science Direct, 2017.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] S. Sun, C. Luo, and J. Chen, “A Review of Natural Language Processing Techniques for Opinion Mining Systems”, Information Fusion, 2016.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] P. Sobkowicz, M. Kaschesky, and G. Bouchard, “Opinion mining in social media: Modeling, simulating, and forecasting political opinions in the web”, Government Information Quarterly, Vol. 31, 2012, pp. 470–479.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] M. Thelwall, “Sentiment Analysis for Tourism”, Big Data and Innovation in Tourism, Travel, and Hospitality, 2019, pp. 87-104.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] L. Yue, W. Chen, X. Li, W. Zuo, and M. Yin, “A survey of sentiment analysis in social media”, Knowledge and Information Systems, 2018.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] K. Ravi, and V. Ravi, “A survey on opinion mining and sentiment analysis: Tasks, approaches and applications”, Knowledge-Based Systems, Vol. 89, 2015, pp. 14–46. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] Z. Jianqiang, and G. Xiaolin, “Comparison Research on Text Pre-processing Methods on Twitter Sentiment Analysis”, IEEE Access, Vol. 5, 2017, pp. 2870 – 2879.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] L. W. Manod, P. J. Wiliam, and T. R. Michael, “Variable segmentation and ensemble classifiers for predicting dairy cow behavior”, Biosystems engineering, Vol. 17, 2019, pp. 156-167.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] T. Brychcin, and M. Konopik, “Semantic spaces for improving language modeling”, Computer Speech and Language, Vol. 28, 2014, pp. 192–209.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] A. Aizawa, “An information-theoretic perspective of tf–idf measures”, Information Processing and Management, Vol. 39, 2003, pp.  45-65.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] S. Deerwester, S. T. Dumais, G. W. Furnas, T. K. Landauer, and R. Harshman, “Indexing by latent semantic analysis”, Journal of the American Society for Information Science, Vol. 41, 1990, pp. 391–407.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient Estimation of Word Representations in Vector Space”, Proc. Workshop at ICLR, 2013.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] Q. Le, and T. Mikolov, “Distributed representations of sentences and documents”, in Proceedings of the 31st International Conference on Machine Learning (ICML 2014), 2014, pp. 1188–1196.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] G. Wang, J. Sun, J. Ma, K. Xu, and J. Gu, “Sentiment classification: The contribution of ensemble learning”, Decision Support Systems, 2013.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] I. Furxhi, F. Murphy, M. Mullins, and C. A. Poland, “Machine Learning Prediction of Nanoparticle In Vitro Toxicity: A Comparative Study of Classifiers and Ensemble-Classifiers using the Copeland Index”, Toxicology Letters,Vol. 312, 2019, pp. 157-166.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] I. Lopez-Gazpio, M. Maritxalar, M. Lapata, and E. Agirre, “Word n-gram attention models for sentence similarity and inference”, Expert Systems With Applications, Vol. 132, 2019, pp. 1-11.</unstructured_citation></citation><citation key="ref26"><unstructured_citation> 
[26] N. F. F. Da Silva, E. R. Hruschka, and J. E. R. Hruschka, “Tweet sentiment analysis with classifier ensembles”, Decision Support Systems, 2014.</unstructured_citation></citation><citation key="ref27"><unstructured_citation> 
[27] M. Speriosu, N. Sudan, S. Upadhyay, and J. Baldridge, “Twitter polarity classification with label propagation over lexical links and the follower graph”, in Proceedings of the EMNLP First workshop on Unsupervised Learning in NLP, 2011.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] W. Deitrick, and W. Hu, “Mutually enhancing community detection and sentiment analysis on twitter networks”, Journal of Data Analysis and Information Processing, Vol. 1, 2013, pp. 19-29.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] P. Nakov, S. Rosenthal, Z. Kozareva, V. Stoyanov, A. Ritter and T. Wilson, “Semeval-2013 task 2: Sentiment analysis in twitter”, in Proceedings of the 7th International Workshop on Semantic Evaluation, Association for Computational Linguistics, 2013.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] A. Go, R. Bhayani, and L. Huang, “Twitter sentiment classification using distant supervision”, CS224N Project Report, Stanford, 2009.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Low-Complexity Iterative Detection for Uplink Multiuser Large-Scale MIMO </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mojtaba</given_name><surname>Amiri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahmoud</given_name><surname>Ferdosizade Naeiny</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>19</day><year>2020</year></publication_date><pages><first_page>25</first_page><last_page>32</last_page></pages><doi_data><doi>10.7508/jist.2020.01.003</doi><resource>http://jist.ir/en/Article/15446</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15446</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15446</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15446</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15446</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15446</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15446</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15446</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Thompson, X. Ge, H.-C. Wu, R. Irmer, H. Jiang, G. Fettweis, et al., "5G wireless communication systems: Prospects and challenges," IEEE Communications Magazine, vol. 52, pp. 62-64, 2014.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	E. Björnson, E. G. Larsson, and T. L. Marzetta, "Massive MIMO: Ten myths and one critical question," IEEE Communications Magazine, vol. 54, pp. 114-123, 2016.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. A. Albreem, M. Juntti, and S. Shahabuddin, "Massive MIMO detection techniques: a survey," IEEE Communications Surveys &amp; Tutorials, vol. 21, pp. 3109-3132, 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. Zhang, X. Yang, J. Chen, and Y. Huang, "A survey of testing for 5G: Solutions, opportunities, and challenges," China Communications, vol. 16, pp. 69-85, 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. Soong, et al., "What will 5G be?," IEEE Journal on Selected areas in Communications, vol. 32, pp. 1065-1082, 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. Arjoune and S. Faruque, "Artificial Intelligence for 5G Wireless Systems: Opportunities, Challenges, and Future Research Direction," in 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), 2020, pp. 1023-1028.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, "Massive MIMO for next generation wireless systems," IEEE Communications Magazine, vol. 52, pp. 186-195, 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, et al., "Scaling up MIMO: Opportunities and challenges with very large arrays," IEEE Signal Processing Magazine, vol. 30, pp. 40-60, 2013.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. O. Damen, H. El Gamal, and G. Caire, "On maximum-likelihood detection and the search for the closest lattice point," IEEE Transactions on Information Theory, vol. 49, pp. 2389-2402, 2003.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	C. Thrampoulidis, W. Xu, and B. Hassibi, "Symbol error rate performance of box-relaxation decoders in massive MIMO," IEEE Transactions on Signal Processing, vol. 66, pp. 3377-3392, 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	E. G. Larsson and J. Jalden, "Fixed-complexity soft MIMO detection via partial marginalization," IEEE transactions on Signal Processing, vol. 56, pp. 3397-3407, 2008.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Z. Guo and P. Nilsson, "Algorithm and implementation of the K-best sphere decoding for MIMO detection," IEEE Journal on Selected areas in Communications, vol. 24, pp. 491-503, 2006.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	N. A. Khan, S. Ahmed, D. M. S. Bhatti, M. Z. Tunio, and S. Kim, "Study of MIMO detection schemes for emerging wireless communications," International Journal of Computer Science and Network Security, vol. 18, pp. 142-149, 2018.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Y. N. Ahmed, "Enhanced low-complexity matrix inversion method for Massive MIMO systems," in 2019 16th International Symposium on Wireless Communication Systems (ISWCS), 2019, pp. 495-499.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	C. Tang, Y. Tao, Y. Chen, C. Liu, L. Yuan, and Z. Xing, "Approximate iteration detection and precoding in Massive MIMO," China Communications, vol. 15, pp. 183-196, 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	L. Dai, X. Gao, X. Su, S. Han, I. Chih-Lin, and Z. Wang, "Low-complexity soft-output signal detection based on Gauss–Seidel method for uplink multiuser large-scale MIMO systems," IEEE Transactions on Vehicular Technology, vol. 64, pp. 4839-4845, 2015.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	X. Qin, Z. Yan, and G. He, "A near-optimal detection scheme based on joint steepest descent and Jacobi method for uplink Massive MIMO systems," IEEE Communications Letters, vol. 20, pp. 276-279, 2016.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	G. Peng, L. Liu, P. Zhang, S. Yin, and S. Wei, "Low-computing-load, high-parallelism detection method based on Chebyshev iteration for Massive MIMO systems with VLSI architecture," IEEE Transactions on Signal Processing, vol. 65, pp. 3775-3788, 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	F. Jin, Q. Liu, H. Liu, and P. Wu, "A Low Complexity Signal Detection Scheme Based on Improved Newton Iteration for Massive MIMO Systems," IEEE Communications Letters, vol. 23, pp. 748-751, 2019.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Wu, B. Yin, G. Wang, C. Dick, J. R. Cavallaro, and C. Studer, "Large-scale MIMO detection for 3GPP LTE: Algorithms and FPGA implementations," IEEE Journal of Selected Topics in Signal Processing, vol. 8, pp. 916-929, 2014.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	D. Zhu, B. Li, and P. Liang, "On the matrix inversion approximation based on Neumann series in massive MIMO systems," in 2015 IEEE International Conference on Communications (ICC), 2015, pp. 1763-1769.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	X. Liu, Z. Zhang, X. Wang, J. Lian, and X. Dai, "A Low complexity high performance weighted Neumann series-based Massive MIMO detection," in 2019 28th Wireless and Optical Communications Conference (WOCC), 2019, pp. 1-5.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. A. Albreem, "Approximate matrix inversion methods for massive mimo detectors," in 2019 IEEE 23rd International Symposium on Consumer Technologies (ISCT), 2019, pp. 87-92.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. A. Albreem, A. A. El-Saleh, and M. Juntti, "Linear Massive MIMO uplink detector based On joint jacobi and Gauss-Seidel methods," in 2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020, 2020, pp. 1-4.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. Burger, B. Kaltenbacher, and A. Neubauer, "Iterative solution methods," in Handbook of Mathematical Methods in Imaging, ed: Springer, 2011, pp. 345-384.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	R. I. Hernández, R. Baghaie, and K. Kettunen, "Implementation of Gram-Schmidt conjugate direction and conjugate gradient algorithms," in Proc. IEEE Finish Signal Processing Symposium, 1999, pp. 165-169.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	J. R. Shewchuk, "An introduction to the conjugate gradient method without the agonizing pain," ed: Carnegie-Mellon University. Department of Computer Science, 1994.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>