﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051922</doi_batch_id><timestamp>20260519222841</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>11</month><day>14</day><year>2020</year></publication_date><journal_volume><volume>8</volume></journal_volume><issue>31</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Optical Power Distributions for 4×4 MIMO Visible Light Communications in Indoor Environment</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>lwaa</given_name><surname>abdulameer</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ahmed</given_name><surname>Hassan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Aliaa</given_name><surname>T. Obeed</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Aya</given_name><surname>N. Dahir</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>14</day><year>2020</year></publication_date><pages><first_page>140</first_page><last_page>148</last_page></pages><doi_data><doi>10.29252/jist.8.31.140</doi><resource>http://jist.ir/en/Article/15403</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15403</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15403</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15403</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15403</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15403</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15403</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15403</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] D. Karunatilaka, F. Zafar, V. Kalavally and R. Parthiban, "LED Based Indoor Visible Light Communications: State of the Art", IEEE Communications Surveys &amp; Tutorials, vol. 17, no. 3, pp. 1649-1678, 2015. Available: 10.1109/comst.2015.2417576.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] A. Jovicic, J. Li and T. Richardson, "Visible light communication: opportunities, challenges and the path to market", IEEE Communications Magazine, vol. 51, no. 12, pp. 26-32, 2013. Available: 10.1109/mcom.2013.6685754.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] M. Chowdhury, M. Hossan, A. Islam and Y. Jang, "A Comparative Survey of Optical Wireless Technologies: Architectures and Applications", IEEE Access, vol. 6, pp. 9819-9840, 2018. Available: 10.1109/access.2018.2792419.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] S. Bawazir, P. Sofotasios, S. Muhaidat, Y. Al-Hammadi and G. Karagiannidis, "Multiple Access for Visible Light Communications: Research Challenges and Future Trends", IEEE Access, vol. 6, pp. 26167-26174, 2018. Available: 10.1109/access.2018.2832088.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] T. Komine and M. Nakagawa, "Fundamental analysis for visible-light communication system using LED lights", IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 100-107, 2004. Available: 10.1109/tce.2004.1277847.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] T. Fath and H. Haas, "Performance Comparison of MIMO Techniques for Optical Wireless Communications in Indoor Environments", IEEE Transactions on Communications, vol. 61, no. 2, pp. 733-742, 2013. Available: 10.1109/tcomm.2012.120512.110578.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] Y. Zhang, H. Yu and J. Zhang, "Block Precoding for Peak-Limited MISO Broadcast VLC: Constellation-Optimal Structure and Addition-Unique Designs", IEEE Journal on Selected Areas in Communications, vol. 36, no. 1, pp. 78-90, 2018. Available: 10.1109/jsac.2017.2774480.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] M. Uysal, C. Capsoni, Z. Ghassemlooy, A. Boucouvalas and E. Udvary, Optical Wireless Communications. Switzerland: springer, 2016, pp. 107-122.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] A. Agarwal and S. Mohammed, "Achievable Rate Region of the Zero-Forcing Precoder in a $2\times 2$ MU-MISO Broadcast VLC Channel With Per-LED Peak Power Constraint and Dimming Control", Journal of Lightwave Technology, vol. 35, no. 19, pp. 4168-4194, 2017. Available: 10.1109/jlt.2017.2719920.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Y. Zhang, "Intrinsic Robustness of MISO Visible Light Communications: Partial CSIT Can be as Useful as Perfect One", IEEE Transactions on Communications, vol. 67, no. 2, pp. 1297-1312, 2019. Available: 10.1109/tcomm.2018.2874988.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] C. Chen, W. Zhong and D. Wu, "On the Coverage of Multiple-Input Multiple-Output Visible Light Communications [Invited]", Journal of Optical Communications and Networking, vol. 9, no. 9, p. D31, 2017. Available: 10.1364/jocn.9.000d31.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] S. Nandkeolyar, R. Mohanty and V. Dash, "Management of Time-Flexible Demand to Provide Power System Frequency Response", in IEEE International Conference on Technologies for Smart-City Energy Security and Power, Bhubaneswar, India, 2018, pp. 28-30.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] A. Nuwanpriya, S. Ho and C. Chen, "Indoor MIMO Visible Light Communications: Novel Angle Diversity Receivers for Mobile Users", IEEE Journal on Selected Areas in Communications, vol. 33, no. 9, pp. 1780-1792, 2015. Available: 10.1109/jsac.2015.2432514.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] A. Alwarafy, M. Alresheedi, A. Abas and A. Alsanie, "Performance Evaluation of Space Time Coding Techniques for Indoor Visible Light Communication Systems", in 2018 International Conference on Optical Network Design and Modeling (ONDM), Dublin, Ireland, 2018, pp. 88-93.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] Z. Wang, S. Han and N. Chi, "Performance enhancement based on machine learning scheme for space multiplexing 2×2 MIMO VLC system employing joint IQ independent component analysis", Optics Communications, vol. 458, p. 124733, 2019. Available: 10.1016/j.optcom.2019.124733.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] J. Ye, G. Pan, Y. Xie, Q. Feng, Q. Ni, and Z. Ding, "On Indoor Visible Light Communication Systems with Spatially Random Receiver", Optics Communications, Vol. 431,2019 , pp. 29-38.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	K. K. Wong, R. D. Murch, and K. Ben Letaief, “Performance enhancement of multiuser MIMO wireless communication systems,” IEEE Trans. Commun., vol. 50, no. 12, pp. 1960–1970, 2002, doi: 10.1109/TCOMM.2002.806503.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] P. Fahamuel, J. Thompson, and H. Haas, "Improved      indoor VLC MIMO channel capacity using mobile receiver with angular diversity detectors"In 2014 IEEE Global Communications Conference. IEEE, Austin, TX, USA,8-12 Dec.2014, p.2060-2065.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Farsi Font Detection using the Adaptive RKEM-SURF Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Zahra</given_name><surname>Hossein-Nejad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hamed</given_name><surname>Agahi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Azar</given_name><surname>Mahmoodzadeh</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>14</day><year>2020</year></publication_date><pages><first_page>188</first_page><last_page>196</last_page></pages><doi_data><doi>10.29252/jist.8.31.188</doi><resource>http://jist.ir/en/Article/15445</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15445</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15445</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15445</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15445</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15445</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15445</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15445</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Mostafa Rahmandoust, &amp;amp;quot;The Death of Pitcher: Persian Parables and its Stories,&amp;amp;quot; Tehran: School Publications, , 1387.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	University of Texas: New Persian Language.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	https://w3techs.com/technologies/overview/content_language/all/.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Zramdini and R. Ingold, &amp;amp;quot;Optical font recognition using typographical features,&amp;amp;quot; IEEE Transactions on pattern analysis and machine intelligence, vol. 20, no. 8, pp. 877-882, 1998.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Rajdev, D. Sahay, S. Khare, and S. Nainan, &amp;amp;quot;Optical Character and Font Recognizer,&amp;amp;quot; in International Conference on Advances in Computing and Data Sciences, 2019, pp. 477-486: Springer.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	B. Bataineh, S. N. H. S. Abdullah, and K. Omar, &amp;amp;quot;A statistical global feature extraction method for optical font recognition,&amp;amp;quot; in Asian Conference on Intelligent Information and Database Systems, 2011, pp. 257-267: Springer.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. A. Mousa, M. S. Sayed, and M. I. Abdalla, &amp;amp;quot;An efficient algorithm for Arabic optical font recognition using scale-invariant detector,&amp;amp;quot; International Journal on Document Analysis and Recognition (IJDAR), vol. 18, no. 3, pp. 263-270, 2015.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	C. Avil&amp;amp;#233;s-Cruz, R. Rangel-Kuoppa, M. Reyes-Ayala, A. Andrade-Gonzalez, and R. Escarela-Perez, &amp;amp;quot;High-order statistical texture analysis––font recognition applied,&amp;amp;quot; Pattern Recognition Letters, vol. 26, no. 2, pp. 135-145, 2005.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	V.-C. Juan and A.-C. Carlos, &amp;amp;quot;Font recognition by invariant moments of global textures,&amp;amp;quot; in Proceedings of international workshop VLBV05 (very low bit-rate video-coding 2005), 2005, pp. 15-16.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Lutf, X. You, Y.-m. Cheung, and C. P. Chen, &amp;amp;quot;Arabic font recognition based on diacritics features,&amp;amp;quot; Pattern Recognition, vol. 47, no. 2, pp. 672-684, 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	G. D. Joshi, S. Garg, and J. Sivaswamy, &amp;amp;quot;A generalised framework for script identification,&amp;amp;quot; International Journal of Document Analysis and Recognition (IJDAR), vol. 10, no. 2, pp. 55-68, 2007.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	H. Khosravi and E. Kabir, &amp;amp;quot;Farsi font recognition based on Sobel–Roberts features,&amp;amp;quot; Pattern Recognition Letters, vol. 31, no. 1, pp. 75-82, 2010.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Y. Zhu, T. Tan, and Y. Wang, &amp;amp;quot;Font recognition based on global texture analysis,&amp;amp;quot; IEEE Transactions on pattern analysis and machine intelligence, vol. 23, no. 10, pp. 1192-1200, 2001.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	F. Slimane, S. Kanoun, A. M. Alimi, R. Ingold, and J. Hennebert, &amp;amp;quot;Gaussian mixture models for arabic font recognition,&amp;amp;quot; in 2010 20th International Conference on Pattern Recognition, 2010, pp. 2174-2177: IEEE.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	E. Rashedi, E. Nezam abadipour, and a. S. Saryazdi, &amp;amp;quot;Farsi font recognition using correlation coefficients (in Farsi),&amp;amp;quot; 4th Conf. on Machine Vision and Image Processing, Ferdosi Mashhad, 2007.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	N. E. B. Amara and S. Gazzah, &amp;amp;quot;Une approche d&amp;amp;#39;identification des fontes arabes,&amp;amp;quot; in Conf&amp;amp;#233;rence Internationale Francophone sur l&amp;amp;#39;Ecrit et le Document (CIFED 04), 2004.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Y. Pourasad, H. Hassibi, and A. Ghorbani, &amp;amp;quot;Farsi font recognition using holes of letters and horizontal projection profile,&amp;amp;quot; in International Conference on Innovative Computing Technology, 2011, pp. 235-243: Springer.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Y. Pourasad, H. Hassibi, and A. Ghorbani, &amp;amp;quot;Farsi font recognition in document images using PPH features,&amp;amp;quot; International Journal of Natural and Engineering Sciences (IJNES) E-ISSN: 2146-0086, vol. 2, no. 3, pp. 17-20, 2011.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Zahedi and S. Eslami, &amp;amp;quot;Farsi/Arabic optical font recognition using SIFT features,&amp;amp;quot; Procedia Computer Science, vol. 3, pp. 1055-1059, 2011.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Nicolaou, F. Slimane, V. Maergner, and M. Liwicki, &amp;amp;quot;Local binary patterns for arabic optical font recognition,&amp;amp;quot; in 2014 11th IAPR International Workshop on Document Analysis Systems, 2014, pp. 76-80: IEEE.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. H. AlKhateeb, J. Ren, S. S. Ipson, and J. Jiang, &amp;amp;quot;Knowledge-based baseline detection and optimal thresholding for words segmentation in efficient pre-processing of handwritten Arabic text,&amp;amp;quot; in Fifth International Conference on Information Technology: New Generations (itng 2008), 2008, pp. 1158-1159: IEEE.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	C. ERG&amp;amp;#220;N and S. Norozpour, &amp;amp;quot;Farsi document image recognition system using word layout signature,&amp;amp;quot; Turkish Journal of Electrical Engineering &amp;amp;amp; Computer Sciences, vol. 27, no. 2, pp. 1477-1488, 2019.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	D. G. Lowe, &amp;amp;quot;Distinctive image features from scale-invariant keypoints,&amp;amp;quot; International journal of computer vision, vol. 60, no. 2, pp. 91-110, 2004.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Z. Hossein-Nejad and M. Nasri, &amp;amp;quot;RKEM: Redundant Keypoint Elimination Method in Image Registration,&amp;amp;quot; IET Image Processing, vol. 11, no. 5, pp. 273-284, 2017.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Z. H.-N. a. M. Nasri, &amp;amp;quot;Copy-Move Image Forgery Detection Using Redundant Keypoint Elimination Method,&amp;amp;quot; in Cryptographic and Information Security Approaches for Images and Videos, S. Ramakrishnan, Ed. Boca Raton: CRC Press, pp. 773-797, 2019.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	H. Bay, A. Ess, T. Tuytelaars, and L. Van Gool, &amp;amp;quot;Speeded-up robust features (SURF),&amp;amp;quot; Computer vision and image understanding, vol. 110, no. 3, pp. 346-359, 2008.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	K. Mikolajczyk and C. Schmid, &amp;amp;quot;A performance evaluation of local descriptors,&amp;amp;quot; Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 27, no. 10, pp. 1615-1630, 2005.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	K. Mikolajczyk and C. Schmid, &amp;amp;quot;A performance evaluation of local descriptors,&amp;amp;quot; IEEE transactions on pattern analysis and machine intelligence</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Localization of Blockchain and E-Currency Model for E-Government Services</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Maryam</given_name><surname>Niknezhad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sajjad</given_name><surname>Shokouhyar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mehrzad</given_name><surname>Minouei </surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>14</day><year>2020</year></publication_date><pages><first_page>157</first_page><last_page>166</last_page></pages><doi_data><doi>10.29252/jist.8.31.157</doi><resource>http://jist.ir/en/Article/15454</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15454</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15454</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15454</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15454</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15454</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15454</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15454</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	D. Tapscott and A. Tapscott, "Block chain revolution", Portfolio: Reprint edition, 2018, ISBN-10: 1101980141.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, “An overview of blockchain technology: Architecture, consensus, and future trends”, in 2017 IEEE International Congress on Big Data (BigData Congress), 2017, DOI: 10.1109/ BigDataCongress .2017.85, pp. 557-564.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] W. Petersz, E. Panayiy, and A. Chapelley, "Trends in crypto-currencies and blockchain technologies: A monetary theory and regulation perspective Gareth", arXiv: 1508.04364v1, [cs.CR], 2015.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] M. Jun, "Blockchain government - a next form of infrastructure for the twenty-first century", CreateSpace Independent Publishing Platform; 1 edition, 2018, ISBN-10: 171912714X, pp. 2-6.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] S. Olnes, J. U-b.acht and M. Janssen, "Blockchain in government: Benefits and implications of distributed ledger technology for information sharing", Government Information Quarterly, 34, Issue 3, 2017, pp. 355-364.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] H. Chen, "An E-government Model Design Based on Block Chain", in International Conference on Manufacturing Construction and Energy Engineering, 2017, ISBN: 978-1-60595-483-7, pp. 176-179.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] D. Allessie, M. Sobolewski and L. Vaccari, "Blockchain for digital government", Science for Policy report by the Joint Research Centre (JRC), the European Commission’s science and knowledge service, 2019, ISBN 978-92-76-00582-7, doi:10.2760/93808. pp. 65-67.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] G. Mark, N. Melinda, P. Lisa, G. Bell, J. Downing, K. Rahbari and M. Kilani, “Blockchain and Suitability for Government Applications”, PUBLIC-PRIVATE ANALYTIC EXCHANGE PROGRAM, 2018, pp. 27-31.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] M. Janssen, V. Weerakkody, E. Ismagilova, U. Sivarajah and Z. Irani, "A framework for analysing blockchain technology adoption: Integrating institutional, market and technical factorsInternational Journal of Information Management, 50, 2020, ISBN 0268-4012, pp.302–309.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] R. Böhme, N. Christin, B. Edelman, and T. Moore, "Bitcoin: Economics, Technology, and Governance", Journal of Economic Perspectives, 29, Number 2, 2015, pp. 213–238.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] E. Shahghasemi, B. Tafazzoli, M. Akhavan, G. Mirani and T. Khairkhah, “Electronic Government in Iran: A Case Study”, Online Journal of Social Sciences Research. ISSN 2277-0844; Volume 2, Issue 9, 2013, pp. 254-262.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] A. Jahangiri, and N. Alavi, "Creating the Groundwork for an Electronic Government", Journal of Management and Development Process, 20 (3 and 4): 42-53, 2006. [In Persian].</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] S. Barber, X. Boyen, E. Shi, and E.Uzun, "Bitter to Better—How to Make Bitcoin a Better Currency", 16 th International Conference on Financial Cryptography and Data Security, 2012, pp. 399-414.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
 [14] E. Rasolinejad "Factors affecting the use of e-money: The Case of Saderat Bank", Journal of New Economy and Commerce, Volume 3, Issue 10, 2009, pp. 131-153. [In Persian].</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] T. Aste, P. Tasca, and T.D. Matteo, "Blockchain Technologies: foreseeable impact on industry and society", COMPUTER, 50(9), 2017, pp. 18-28.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] I. Lin and T. Liao, "A Survey of Blockchain Security Issues and Challenges", International Journal of Network Security, Vol.19, No 5, 2017, pp. 653-659.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] C. T. Lin and C. S. George Lee, Neural Fuzzy Systems: A Neuro-Fuzzy Synergism to Intelligent Systems, Hardcover –Publisher: Prentice Hall; Har/Dskt edition, ISBN 10: 0132351692ISBN 13: 9780132351690, 1996.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] R. N. Mishra and K. Mohanty, "Real time implementation of an ANFIS-based induction motor drive via feedback linearization for performance enhancement",  Engineering Science and Technology an International Journal, 2016, 19(4) DOI: 10.1016/j.jestch.2016.09.014.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] S. Moayer and P. A. Bahri, “Hybrid intelligent scenario generator for business strategic planning by using ANFIS” Expert Systems with Applications, 2009, Volume 36, Issue 4, May 2009, pp. 7729-7737.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Reliability Analysis of the Sum-Product Decoding Algorithm for the PSK Modulation Scheme</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hadi</given_name><surname>Khodaei Jooshin</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahdi</given_name><surname>Nangir</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>14</day><year>2020</year></publication_date><pages><first_page>167</first_page><last_page>174</last_page></pages><doi_data><doi>10.29252/jist.8.31.167</doi><resource>http://jist.ir/en/Article/15480</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15480</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15480</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15480</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15480</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15480</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15480</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15480</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. Berrou, A. Glavieux, and P. Thitimajshima, “Near Shannon limit error-correcting coding and decoding : Turbo-codes,” In Communications, 1993. ICC ’93 Geneva. Technical Program, Conference Record, IEEE International Conference on,, vol. 2, pp. 1064–1070. </unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. E. Shannon, “A mathematical theory of communication,” Bell System Technical Journal, vol. 27, 1948, pp. 379–423 and 623–656.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	D. J. C. MacKay and R. M. Neal, “Near Shannon limit performance of low density parity check codes,” IEEE electronics letters 32, no. 18 ,1996, pp. 1645-1646.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. J. C. MacKay, “Good error-correcting codes based on very sparse matrices,” IEEE Transactions on Information Theory, vol. 45, no. 2, Aug 1999, pp. 399–431.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. Hatami, DG. Mitchell, DJ. Costello, TE. Fuja. “Performance bounds and estimates for quantized LDPC decoders”. IEEE Transactions on Communications. 2019 Nov 13;68(2):683-96.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R.G. Gallager, “Low-density parity-check codes,” IRE Trans. Inf. Theory, 1962, IT-8, pp. 21–28.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	B. Rong, Y. Wu and G. Gagnon, “Multi -Layer Iterative LDPC Decoding for Broadband Wireless Access Networks: A Recursive Shortening Algorithm,” IEEE Transactions on Wireless Communications, vol. 12, no. 3, March 2013, pp. 1320–1327.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	T. Koike-Akino, K. Kojima, D.S. Millar, K. Parsons, T. Yoshida and T. Sugihara, “Pareto Optimization of Adaptive Modulation and Coding Set in Nonlinear Fiber-Optic Systems,” Journal of Lightwave Technology, Vol. 35, no. 4, February 2017, pp.1041–1049.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. Xue, H. Yu and Q. Cheng, “Adaptive Coded Modulation Based on Continuous Phase Modulation for Inter-Satellite Links of Global Navigation Satellite Systems,” IEEE Access, vol. 6, April 2018, pp. 20652–20662.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Chen, K. Peng, J. Song and Y. Zhang, “Performance Analysis of Practical QC-LDPC Codes: From DVB-S2 to ATSC 3.0,” IEEE Transactions on Broadcasting, vol. 65, no. 1, March 2019, pp. 172–178.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Song, C. Zhang, K. Peng, J. Wang, C. Pan, F. Yang, J. Wang, H. Yang, Y. Xue, Y. Zhang, and Z. Yang, “Key Technologies and Measurements for DTMB-A System,” IEEE Transactions on Broadcasting, vol. 65, no. 1, March 2019, pp. 53–64.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S.-K. Ahn, K.-J. Kim, S. Myung, S.I. Park and K. Yang, “Comparison of Low-Density Parity-Check Codes in ATSC 3.0 and 5G Standards,” IEEE Transactions on Broadcasting, vol. 65, no. 3, September 2019, pp. 489-495.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	KS. Chan, A. James, S. Rahardja. “Evaluation of a Joint Detector Demodulator Decoder (JDDD) Performance With Modulation Schemes Specified in the DVB-S2 Standard”. IEEE Access. 2019 Jun 19;7:86217-25.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. Papaharalabos and P. T. Mathiopoulos, “Simplified sum-product algorithm for decoding LDPC codes with optimal performance,” Electronics Letters, vol. 45, no. 2, January 2009, pp. 116-117.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	IB. de Almeida, GP. Aquino, LL. Mendes. “Iterative Receiver for Non-Orthogonal Waveforms Based on the Sum-Product Algorithm”. In 16th International Symposium on Wireless Communication Systems (ISWCS) 2019 Aug 27, pp. 38-42.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	F. Vatta, A. Soranzo, F. Babich. “More accurate analysis of sum-product decoding of LDPC codes using a Gaussian approximation”. IEEE Communications Letters. 2018 Dec 11;23(2):230-3.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. Ziv and A. Lempel, “A Universal Algorithm for Sequential Data Compression,” IEEE Transactions on Information Theory, vol. 23, no. 3, May 1997, pp. 337–343.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. Ziv and A. Lempel, “Compression of Individual Sequences via Variable-Rate Coding,” IEEE Transactions on Information Theory, vol. 24, no. 5, September 1978, pp. 530–536.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. A. Storer and T. G. Szymanski, “Data Compression via Textual Substitution,” Journal of the ACM, vol. 29, no. 4, October 1982, pp. 928–951.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Nangir, H. Behroozi, and M. R. Aref, “A new recursive algorithm for universal coding of integers”. Journal of Information Systems and Telecommunication (JIST), vol. 3, no. 1, Jan 2015, pp. 1–6.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Nangir, R. Asvadi, M. Ahmadian-Attari, and  J. Chen, “Binary CEO problem under log-loss with BSC test-channel model”, In 2018 29th Biennial Symposium on Communications (BSC), IEEE, Jun 2018, pp. 1–5.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	D. Harita, KP. Rajan. “Reliability Variance based Weighted Bit Flipping Algorithms for LDPC”. In 9th International Conference on Cloud Computing, Data Science &amp; Engineering (Confluence), 2019 Jan 10, pp. 593-595.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Liu, J. Yuan, J. Sha. “Symbol-Based Algorithms for Decoding Binary LDPC Codes with Higher-Order Modulations”. In IEEE International Symposium on Circuits and Systems (ISCAS) 2019 May 26, pp. 1-5.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	R. Tanner, “A recursive approach to low complexity codes,” IEEE Transactions on Information Theory, vol. 27, no. 5, 1981, pp. 533–547.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	T. Richardson and R. Urbanke, “Efficient encoding of low-density parity-check codes,” IEEE Transactions on Information Theory, vol. 47, no. 2, Feb 2000, pp. 638–656.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Providing a Network for Measuring the Dynamics Volatility Connectedness of Oil and Financial Markets</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Nasser</given_name><surname>Gholami</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Teymor</given_name><surname>Mohammadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hamid</given_name><surname>Amadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Morteza </given_name><surname>Khorsandi</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>14</day><year>2020</year></publication_date><pages><first_page>149</first_page><last_page>156</last_page></pages><doi_data><doi>10.29252/jist.8.31.149</doi><resource>http://jist.ir/en/Article/15499</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15499</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15499</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15499</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15499</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15499</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15499</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15499</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Hamilton, J. D." What is an oil shock?". Journal of econometrics, 113(2), 363-398.‏ 2003.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Kilian, L. "The economic effects of energy price shocks". Journal of Economic Literature, 46(4), 871-909.‏‏ 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Bagheri, E., &amp; Ebrahimi, S. B., “Estimating Network Connectedness of Financial Markets and Commodities”. Journal of Systems Science and Systems Engineering, 29(5), 572-589.‏ 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Diebold, F. X., &amp; Yılmaz, K. “On the network topology of variance decompositions: Measuring the connectedness of financial firms”. Journal of Econometrics, 182(1), 119-134. 2014.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Billio, M. A.W., and Pelizzon, L. “Econometric measures of connectedness and systemic risk in the finance and insurance sectors”. Journal of financial economics, 104(3), pp. 535-559. 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Acharya, V. Philippon, T., &amp; Richardson, M. “Measuring systemic risk”. Review of Financial Studies, 30(1), pp. 2–47. 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Adrian, T. “CoVaR”. The American Economic Review, 106(7), pp. 1705-1741. 2016.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Jahangiri, Khalil and Hekmati Farid, Samad. “Studying the effects of spillover volatility on stock markets, gold, oil and foreign exchange”. Journal of Economic Research, p. 194-161. 2015. (In Persian).</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Maghyereh, A. I., Awartani, B., &amp; Bouri, E. “The directional volatility connectedness between crude oil and equity markets: New evidence from implied volatility indexes”. Energy Economics, 57, 78-93. 2016.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Mimipour, Sayab and Feli, Atefeh. “Investigation of spillover volatility of oil prices on yields of selected industries in Tehran Stock Exchange: variance decomposition approach”. Monetary Economics Research. 2017. (In Persian).</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Singh, V. K., Nishant, S., &amp; Kumar, P. “Dynamic and directional network connectedness of crude oil and currencies: Evidence from implied volatility”. Energy Economics, 76, 48-63. 2018.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Husain, S., Tiwari, A. K., Sohag, K., &amp; Shahbaz, M. “Connectedness among crude oil prices, stock index and metal prices: An application of network approach in the USA”. Resources Policy, 62, 57-65.‏ 2019.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Al-Yahyaee, K. H., Mensi, W., Sensoy, A., &amp; Kang, S. H. “Energy, precious metals, and GCC stock markets: Is there any risk spillover?”. Pacific-Basin Finance Journal, 56, 45-70.‏ 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Fasanya, I., &amp; Akinbowale, S. “Modelling the return and volatility spillovers of crude oil and food prices in Nigeria”. Energy, 169, 186-205.‏ 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Yoon, S. M., Al Mamun, M., Uddin, G. S., &amp; Kang, S. H. “Network connectedness and net spillover between financial and commodity markets”. The North American Journal of Economics and Finance, 48, 801-818. 2019.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Parkinson, M. “The extreme value method for estimating the variance of the rate of return”. Journal of business, 61-65. 1980.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Koop, G., Pesaran, M. H., &amp; Potter, S. M. “Impulse response analysis in nonlinear multivariate models”. Journal of econometrics, 74(1), 119-147. 1996.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Pesaran, H. H., &amp; Shin, Y. “Generalized impulse response analysis in linear multivariate models”. Economics letters, 58(1), 17-29. 1998.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Sailor Localization in Oceans Beds using Genetic and Firefly Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Shruti </given_name><surname>Gupta</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Dr Ajay </given_name><surname>Rana</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name> Vineet </given_name><surname>Kansal</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>14</day><year>2020</year></publication_date><pages><first_page>175</first_page><last_page>187</last_page></pages><doi_data><doi>10.29252/jist.8.31.175</doi><resource>http://jist.ir/en/Article/15534</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15534</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15534</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15534</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15534</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15534</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15534</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15534</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	B Abbas, A Benslimane, and K.D. Singh "Dynamic anchor points selection for mobility management in Software Defined Networks" Journal of Network and Computer Applications, 57, 1-11.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Meguerdichian, S., Slijepcevic, S., Karayan, V., &amp;Potkonjak, M. (2001, October). "Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure". In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking &amp; computing (pp. 106-116).</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J.S Lee and WL Cheng" Fuzzy-logic-based clustering approach for wireless sensor networks using energy predication", IEEE Sensors Journal, 12(9), 2891-2897.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	RV Kulkarni, A Förster and GK Venayagamoorthy "Computational intelligence in wireless sensor networks: A survey". IEEE communications surveys &amp; tutorials, 13(1), 68-96.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S Kumar, DK Lobiyal "Power efficient range-free localization algorithm for wireless sensor networks. Wireless networks", 20(4), 681-694.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S Kumar, DK Lobiyal "Novel DV-Hop localization algorithm for wireless sensor networks", Telecommun. Syst. 64 (3) (2017) 509–524.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S Kumar, DK Lobiyal"An advanced DV-Hop localization algorithm for wireless sensor networks," Wireless personal communications, 71(2), 1365-1385.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	I.Mohammad, and I.Mahgoub, Handbook of sensor networks: compact wireless and wired sensing systems. CRC press, 2004.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	N.Dragos, and B.Nath. "Ad hoc positioning system (APS)." GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270). Vol. 5. IEEE, 2001.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S.Chris, J.M. Rabaey, and J.Beutel. "Location in distributed ad-hoc wireless sensor networks." 2001 IEEE international conference on acoustics, speech, and signal processing. proceedings (Cat. No. 01CH37221). Vol. 4. IEEE, 2001.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Savvides, Andreas, H.Park, and M.B. Srivastava. "The bits and flops of the n-hop multilateration primitive for node localization problems." Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications. 2002.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Savvides, Andreas, H.Park, and M.B. Srivastava. "The n-hop multilateration primitive for node localization problems." Mobile Networks and Applications 8.4 (2003): 443-451.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Hu, Lingxuan, and D.Evans. "Localization for mobile sensor networks." Proceedings of the 10th annual international conference on Mobile computing and networking. 2004.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	D.Oliveira, H.ABF, . F., Loureiro, A. A. F., &amp;, A Boukerche. "Directed position estimation: A recursive localization approach for wireless sensor networks." Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.. IEEE, 2005.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	D.Oliveira, H.ABF, . F., Loureiro, A. A. F., &amp;, A Boukerche. "Directed position estimation: A recursive localization approach for wireless sensor networks. In Proceedings" 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005. (pp. 557-562). IEEE.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	B.Nirupama, J.Heidemann, and D.Estrin. "GPS-less low-cost outdoor localization for very small devices." IEEE personal communications 7.5 (2000): 28-34.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Zhao, Lin-zhe, Xian-bin Wen, and Dan Li. "Amorphous localization algorithm based on BP artificial neural network." (2014): 178-183.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Lin, Chih-Min, "ANFIS-based indoor location awareness system for the position monitoring of patients." Acta Polytech. Hung 11.1 (2014): 37-48.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S.Velimirovic, Andrija Fuzzy ring-overlapping range-free (FRORF) localization method for wireless sensor networks." Computer Communications 35.13 (2012): 1590-1600.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	H.Stephan, JB. Martins, and L.Oliveira. "An approach to localization scheme of wireless sensor networks based on artificial neural networks and genetic algorithms." 10th IEEE international NEWCAS conference. IEEE, 2012.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Z-kLiu, and L.Zhong. "Node self-localization algorithm for wireless sensor networks based on modified particle swarm optimization." The 27th Chinese Control and Decision Conference (2015 CCDC). IEEE, 2015.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	R.Kulkarni, and G.K.Venayagamoorthy. "Bio-inspired algorithms for autonomous deployment and localization of sensor nodes." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40.6 (2010): 663-675.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S K Gharghan, R.Nordin, and M.Ismail. "A wireless sensor network with soft computing localization techniques for track cycling applications." Sensors 16.8 (2016): 1043.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	G Aloor, and L.Jacob. "Performance of some metaheuristic algorithms for localization in wireless sensor networks." International journal of network management 19.5 (2009): 355-373.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	V.Kumar, A.Kumar, and S. Soni. "A combined Mamdani-Sugeno fuzzy approach for localization in wireless sensor networks." Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology. 2011.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	S.Kazem, D.Minoli, and T.Znati. Wireless sensor networks: technology, protocols, and applications. John wiley &amp; sons, 2007.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Yun, Sukhyun, et al. "A soft computing approach to localization in wireless sensor networks." Expert Systems with Applications 36.4 (2009): 7552-7561.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Yun, Sukhyun, et al. "Centroid localization method in wireless sensor networks using TSK fuzzy modeling." Proc. 6th Int’l Symps. On Advanced Intelligent System (ISIS) (2005): 971-974.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	A.Tran, Duc ., and T.Nguyen. "Localization in wireless sensor networks based on support vector machines." IEEE Transactions on Parallel and Distributed Systems 19.7 (2008): 981-994.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	H.Jia, W.Yong, and T.Xiaoling. "Localization algorithm for mobile anchor node based on genetic algorithm in wireless sensor network." 2010 international conference on intelligent computing and integrated systems. IEEE, 2010.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	S.Ali, Y.Zhu, and M.Musavi. "Localization using neural networks in wireless sensor networks." Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications. 2008.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	Yang, Xin-She. "Firefly algorithms for multimodal optimization." International symposium on stochastic algorithms. Springer, Berlin, Heidelberg, 2009.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	G.Gene., and C.F. Van Loan. "Matrix Computations Johns Hopkins University Press." Baltimore and London (1996).</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	Bukh, Per D.Nikolaj. "The art of computer systems performance analysis, techniques for experimental design, measurement, simulation and modeling." (1992): 113-115.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	M.Melanie. "An introduction to genetic algorithms mit press." Cambridge, Massachusetts. London, England 1996 (1996).[36] S.Javad, S.Sadeghi, and S.Taghi A. Niaki. "Optimizing a hybrid vendor-managed inventory and transportation problem with fuzzy demand: an improved particle swarm optimization algorithm." Information Sciences 272 (2014): 126-144.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	S P Ponmalar,V. J.S. Kumar, and R. Harikrishnan. "Hybrid firefly variants algorithm for localization optimization in WSN." International Journal of Computational Intelligence Systems 10.1 (2017): 1263-1271.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	H.Subir, and A.Ghosal. "A survey on mobility-assisted localization techniques in wireless sensor networks." Journal of Network and Computer Applications 60 (2016): 82-94.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	SP Singh, and S. C. Sharma. "Range free localization techniques in wireless sensor networks: A review." Procedia Computer Science 57.7-16 (2015): 3rd.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	S Gupta, A.Rana, and V.Kansal "Comparison of Heuristic techniques: A case of TSP." 2020 10th International Conference on Cloud Computing, Data Science &amp; Engineering (Confluence). IEEE, 2020.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	K.Fard, Abdollah, H.Samet, and F.Marzbani. "A new hybrid modified firefly algorithm and support vector regression model for accurate short term load forecasting." Expert systems with applications 41.13 (2014): 6047-6056.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	Pandey, P.Kumar, A.Swaroop, and V.Kansal.. "Vehicular Ad Hoc Networks (VANETs): Architecture, Challenges, and Applications." Handling Priority Inversion in Time-Constrained Distributed Databases. IGI Global, 2020. 224-239.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	Pandey, P.Kumar, A.Swaroop, and V.Kansal. "A Concise Survey on Recent Routing Protocols for Vehicular Ad hoc Networks (VANETs)." 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). IEEE, 2019.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	S Gupta, A.Rana, and V.Kansal. "Optimization in Wireless Sensor Network Using Soft Computing." Proceedings of the Third International Conference on Computational Intelligence and Informatics. Springer, Singapore, 2020.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Evaluation of Pattern Recognition Techniques in Response to Cardiac Resynchronization Therapy (CRT)</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Nejadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Peyman</given_name><surname>Bayat</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Jalal</given_name><surname>Kheirkhah</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hassan</given_name><surname>Moladoust</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>14</day><year>2020</year></publication_date><pages><first_page>197</first_page><last_page>206</last_page></pages><doi_data><doi>10.29252/jist.8.31.197</doi><resource>http://jist.ir/en/Article/15549</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15549</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15549</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15549</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15549</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15549</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15549</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15549</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	R. C. Deo, "Machine learning in medicine", Circulation, vol. 132, no. 20, 2015, pp. 1920-1930.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] 	H. Assodiky, I. Syarif, and T. Badriyah, "Deep Learning Algorithm for Arrhythmia Detection", International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC), 2017, pp. 26-32.</unstructured_citation></citation><citation key="ref3"><unstructured_citation> 
[3] 	A. K. Flügge, K. Wasmer, S. Orwat, H. Abdul-Khaliq, P. C. Helm, U. Bauer, H. Baumgartner, and G. P. Diller, "Cardiac resynchronization therapy in congenital heart disease: Results from the German National Register for Congenital Heart Defects," International Journal of Cardiology, vol. 273, 2018, pp. 108-111.</unstructured_citation></citation><citation key="ref4"><unstructured_citation> 
[4] 	J. Rickard, A. Cheng, D. Spragg, S. Bansal, M. Niebauer, B. Baranowski, D. J. Cantillon, P. J. Tchou, R. A. Grimm, W. H. W. Tang, B. L. Wilkoff, and N. Varma, "Durability of the survival effect of cardiac resynchronization therapy by level of left ventricular functional improvement: Fate of "nonresponders"," Heart Rhythm, vol. 11, no. 3, 2014, pp. 412-416.</unstructured_citation></citation><citation key="ref5"><unstructured_citation> 
[5] 	H. X. Niu, W. Hua , F. Z. Wang , S. Zhang , K. P. Chen, and X. Chen, "Complications of cardiac resynchronization therapy in patients with congestive heart failure," Chinese Medical Journal, vol. 119, no. 6, 2006, pp. 449-453.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] 	C. Leclercq, H. Burri, A. Curnis, P. P. Delnoy, C. A. Rinaldi, J. Sperzel, K. Lee, C. Cohorn, and B. Thibault, "Rationale and design of a randomized clinical trial to assess the safety and efficacy of multipoint pacing therapy: MOre REsponse on Cardiac Resynchronization Therapy with MultiPoint Pacing (MORE-CRT MPP–PHASE II)," American Heart Journal, vol. 209, 2019, pp. 1-8.</unstructured_citation></citation><citation key="ref7"><unstructured_citation> 
[7] 	H. Huang, L. Shen, R. Zhang, F. Makedon, B. Hettleman, and J. Pearlman, "Cardiac Motion Analysis to Improve Pacing Site Selection in CRT," Academic Radiology, vol. 13, no. 9, 2006, pp. 1124–1134.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] 	M. M. Kalscheur, R. T. Kipp, M. C. Tattersall, C. Mei, K. A. Buhr, D. L. DeMets, M. E. Field, L. L. Eckhardt, and C. D. Page, "Machine Learning Algorithm Predicts Cardiac Resynchronization Therapy Outcomes: Lessons From the COMPANION Trial," Circ Arrhythm Electrophysiol, vol. 11, no. 1, 2018, pp. 1-11.</unstructured_citation></citation><citation key="ref9"><unstructured_citation> 
[9] 	S. Giffard-Roisin, H. Delingette, T. Jackson, J. Webb, L. Fovargue, J. Lee, C. A. Rinaldi, R. Razavi, N. Ayache, and M. Sermesant, "Transfer Learning From Simulations on a Reference Anatomy for ECGI in Personalized Cardiac Resynchronization Therapy," IEEE Transactions on Biomedical Engineering, vol. 66, no. 2, 2019, pp. 343-353.</unstructured_citation></citation><citation key="ref10"><unstructured_citation> 
[10] 	K. Howe, P. Gladding, N. James, C. Prabhakar, L. Dawson, A. Gavin, and T. Schlegel, "Predicting CRT Response Using Machine Learning Analysis of Pre-Implant ECG Data," Heart, Lung and Circulation, vol. 26, no. 1, 2017, pp. S25-S26.</unstructured_citation></citation><citation key="ref11"><unstructured_citation> 
[11] 	I. Kononenko, "Machine learning for medical diagnosis: history, state of the art and perspective," Artificial Intelligence in Medicine, vol. 23, no. 1, 2001, pp. 89-109.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] 	P. K. Chao, C. L. Wang, and H. L. Chan, "An intelligent classifier for prognosis of cardiac resynchronization therapy based on speckle-tracking echocardiograms," Artificial Intelligence in Medicine, vol. 54, no. 3, 2012, pp. 181-188.</unstructured_citation></citation><citation key="ref13"><unstructured_citation> 
[13] 	M. Fedorco, A. Bulava, P. Šantavý, A. Mokráček, V. Lonský, L. Dušek, and M. Táborský, "Middle-term stability of epicardial left ventricular electrodes for cardiac resynchronization therapy," Cor et Vasa, vol. 59, no. 6, 2017, pp. e530-e539.</unstructured_citation></citation><citation key="ref14"><unstructured_citation> 
[14] 	R. Zhang, S. Ma, L. Shanahan, J. Munroe, S. Horn, and S. Speedie, "Discovering and identifying New York heart association classification from electronic health records," BMC Medical Informatics and Decision Making, vol. 18, no. 2, 2018, pp. 5-13.</unstructured_citation></citation><citation key="ref15"><unstructured_citation> 
[15] 	N. M. Hawkins, M. C. Petrie, M. I. Burgess, and J. J.V. McMurray, "Selecting Patients for Cardiac Resynchronization Therapy: The Fallacy of Echocardiographic Dyssynchrony," Journal of the American College of Cardiology, vol. 53, no. 21, 2009, pp. 1944-1959.</unstructured_citation></citation><citation key="ref16"><unstructured_citation> 
[16] 	J. Rickard, H. Michtalik, R. Sharma, Z. Berger, E. Iyoha, A. R. Green, N. Haq, and K. A. Robinson, "Predictors of response to cardiac resynchronization therapy: a systematic review," International Journal of Cardiology, vol. 225, 2016, pp. 345-352.</unstructured_citation></citation><citation key="ref17"><unstructured_citation> 
[17] 	M. Tokodi, W. Schwertner, P. Perge, A. Kosztin, B. Lakatos, S. Shrestha, A. Kovacs, and B. Merkely, "Unsupervised machine learning algorithm to identify high and low risk patients following crt implantation," Journal of the American College of Cardiology, vol. 71, no. 11, 2018, pp. 947-948.</unstructured_citation></citation><citation key="ref18"><unstructured_citation> 
[18] 	M. Loutfi, M. Nawar, S. Eltahan, and A. A. Elhoda, "Predictors of response to cardiac resynchronization therapy in chronic heart failure patients," The Egyptian Heart Journal, vol. 68, no. 4, 2016, pp. 227-236.</unstructured_citation></citation><citation key="ref19"><unstructured_citation> 
[19] 	A. Grimaldi, E. Z. Gorodeski, and J. Rickard, "Optimizing Cardiac Resynchronization Therapy: an Update on New Insights and Advancements," Current Heart Failure Reports, vol. 15, no. 3, 2018, pp. 156-160.</unstructured_citation></citation><citation key="ref20"><unstructured_citation> 
[20] 	O. Adegbala, O. Olagoke, A. Adejumo, E. Akintoye, A. Oluwole, P. Alebna, K. Williams, R. Lieberman, and L. Afonso, "Incidence and outcomes of cardiac tamponade in patients undergoing cardiac resynchronization therapy," International journal of cardiology, vol. 272, 2018, pp. 137-141.</unstructured_citation></citation><citation key="ref21"><unstructured_citation> 
[21] 	C. J. Plummer, C. M. Frank, Z. Bári, Y. S. Al Hebaishi, R. N. Klepfer, R. W. Stadler, S. Ghosh, S. Liu, and S. Mittal, "A novel algorithm increases the delivery of effective cardiac resynchronization therapy during atrial fibrillation: The CRTee randomized crossover trial," Heart Rhythm, vol. 15, no. 3, 2018, pp. 369-375.</unstructured_citation></citation><citation key="ref22"><unstructured_citation> 
[22] 	E. Thomas, D. Toth, T. Kurzendorfer, K. Rhode, and P. Mountney, "Mechanical Activation Computation from Fluoroscopy for Guided Cardiac Resynchronization Therapy," in 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2018, pp. 592-595.</unstructured_citation></citation><citation key="ref23"><unstructured_citation> 
[23] 	D. J. van Veldhuisen, A. H. Maass, S. G. Priori, P. Stolt, I. C. van Gelder, K. Dickstein, and K. Swedberg, "Implementation of device therapy (cardiac resynchronization therapy and implantable cardioverter defibrillator) for patients with heart failure in Europe: changes from 2004 to 2008," European Journal of Heart Failure, vol. 11, no. 12, 2009, pp. 1143-1151.</unstructured_citation></citation><citation key="ref24"><unstructured_citation> 
[24] 	G. Boriani, M. Ziacchi, M. Nesti, A. Battista, F. Placentino, V. L. Malavasi, I. Diemberger, and L. Padeletti, "Cardiac resynchronization therapy: How did consensus guidelines from Europe and the United States evolve in the last 15 years?," International journal of cardiology, vol. 261, 2018, pp. 119-129.</unstructured_citation></citation><citation key="ref25"><unstructured_citation> 
[25] 	J. Gorcsan, C. P. Anderson, B. Tayal, M. Sugahara, J. Walmsley, R. C. Starling, and J. Lumens, "Systolic Stretch Characterizes the Electromechanical Substrate Responsive to Cardiac Resynchronization Therapy," JACC: Cardiovascular Imaging, vol. 12, no. 9, 2018, pp. 1741-1752.</unstructured_citation></citation><citation key="ref26"><unstructured_citation> 
[26] 	M. A. Baturova, V. Kutyifa, S. McNitt, B. Polonsky, S. Solomon, J. Carlson, W. Zareba, and P. G. Platonov, "Usefulness of Electrocardiographic Left Atrial Abnormality to Predict Response to Cardiac Resynchronization Therapy in Patients With Mild Heart Failure and Left Bundle Branch Block," The American Journal of Cardiology, vol. 122, no. 2, 2018, pp. 268-274.</unstructured_citation></citation><citation key="ref27"><unstructured_citation> 
[27] 	D. Peressutti, W. Bai, T. Jackson, M. Sohal, A. Rinaldi, D. Rueckert, and A. King, "Prospective Identification of CRT Super Responders Using a Motion Atlas and Random Projection Ensemble Learning," in International Conference on Medical Image Computing and Computer-Assisted Intervention, 2015, vol. 9351, pp. 493-500.</unstructured_citation></citation><citation key="ref28"><unstructured_citation> 
[28] 	S. Shanmuganathan, "Artificial Neural Network Modelling: An Introduction," in Studies in Computational Intelligence, vol. 628, 2016, pp. 1-14.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] 	A. Dongoran, S. Rahmadani, M. Zarlis, and S. Zakarias, "Feature weighting using particle swarm optimization for learning vector quantization classifier," in 2nd International Conference on Computing and Applied Informatics, 2017 vol.978, pp.1-6.</unstructured_citation></citation><citation key="ref30"><unstructured_citation> 
[30] 	D. Weber, M. Koller, D. Theuns, S. Yap, M. Kühne, C. Sticherling, T. Reichlin, T. Szili-Torok, S. Osswald, and B. Schaer, "Predicting defibrillator benefit in patients with cardiac resynchronization therapy: A competing risk study," Heart Rhythm, vol. 16, no. 7, 2019, pp. 1057-1064.</unstructured_citation></citation><citation key="ref31"><unstructured_citation> 
[31] 	F. Leyva, A. Zegard, O. N Okafor, J. de Bono, D. McNulty, A. Ahmed, H. J Marshall, D. Ray, and T. Qiu, "Survival after cardiac resynchronization therapy: results from 50 084 implantations," EP Europace, vol. 21, no. 5, 2019, pp. 754–762.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>