﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051923</doi_batch_id><timestamp>20260519232507</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>1</month><day>18</day><year>2021</year></publication_date><journal_volume><volume>8</volume></journal_volume><issue>32</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Low Complex Standard Conformable Transceiver based on Doppler Spread for DVB-T2 Systems</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name> Saeed</given_name><surname>Ghazi-Maghrebi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Behnam</given_name><surname>Akbarian</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>18</day><year>2021</year></publication_date><pages><first_page>272</first_page><last_page>285</last_page></pages><doi_data><doi>10.29252/jist.8.32.272</doi><resource>http://jist.ir/en/Article/15440</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15440</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15440</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15440</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15440</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15440</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15440</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15440</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Omri, R. Hamila, A. Hazmi, R. Bouallegue, and A. Al-Dweik, “Enhanced Alamouti decoding scheme for DVB-T2 systems in SFN channels,” in 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, 2011, pp. 1626–1630, DOI: 10.1109/PIMRC.6139779.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	E. P. Simon, L. Ros, H. Hijazi, and M. Ghogho, “Joint Carrier Frequency Offset and Channel Estimation for OFDM Systems via the EM Algorithm in the Presence of Very High Mobility,” IEEE Trans. Signal Process, vol. 60, no. 2, pp. 754–765, Feb. 2012, DOI: 10.1109/tsp.2011.2174053.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	L. E. Nazarov, “Signal constructions based on OFDM signals resistant to the influence of spectrum-concentrated interference,” J. Commun. Technol. Electron., vol. 64, no. 8, pp. 774–782, 2019.
[4]	J. Yao et al., “Comprehensive study on MIMO-related interference management in WLANs,” IEEE Commun. Surv. Tutor., vol. 21, no. 3, pp. 2087–2110, 2019. DOI: 10.1109/COMST.2019.2894160.
[5]	K. Yang, N. Yang, C. Xing, J. Wu, and Z. Zhang, “Space-time network coding with transmit antenna selection and maximal-ratio combining,” IEEE Trans. Wirel. Commun., vol. 14, no. 4, pp. 2106–2117, 2015. DOI: 10.1109/TWC.2014.2381217.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[6]	E. Biglieri, R. Calderbank, A. Constantinides, A. Goldsmith, A. Paulraj, and H. V. Poor, “Capacity limits of MIMO system,” in MIMO Wireless Communications. Cambridge, England: Cambridge University Press, 2009.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[7]	N. Fernando, Y. Hong, and E. Viterbo, “MIMO Self-Heterodyne OFDM,” IEEE Trans. Veh. Technol., vol. 65, no. 3, pp. 1271–1280, 2016
[8]	S. H. Ahmed, S. M. U. Talha, and A. Khan, “Performance evaluation of DVB-T based OFDM over wireless communication channels,” Lect. Notes Eng. Comput. Sci., Vol. 2195, 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[9]	M. Tormos, C. Tanougast, A. Dandache, D. Masse, and P. Kasser, “Modeling and performance evaluations of Alamouti technique in a single frequency network for DVB-T2,” EURASIP J. Wirel. Commun. Netw., vol. 2013, no. 1, 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation> 
[10]  T. H. Liu, “Analysis of the Alamouti STBC MIMO System With Spatial Division Multiplexing Over the Rayleigh Fading Channel,” IEEE Trans. Wirel. Commun., Vol. 14, no. 9, 2015, pp. 5156–5170, DOI: 10.1109/TWC.2015.2433924.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[11]	A. Dammann and S. Kaiser, “Low Complex Standard Conformable Antenna Diversity Techniques for OFDM Systems and its Application to the DVB-T System,”,  ITG FACHBERICHT. 2002, pp. 253-60.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[12]	N. Cornillet, M. Crussiere, and J. F. Helard, “Performance of the DVB-T2 system in a single frequency network: Analysis of the distributed alamouti scheme,” in 2011 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), 2011, DOI: 10.1109/BMSB.2011.5954961.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[13]	K. Yang, N. Yang, C. Xing, J. Wu, and J. An, “Space-Time Network Coding With Antenna Selection,” IEEE Trans. Veh. Technol., Vol. 65, no. 7, 2016, pp. 5264–5274, DOI: 10.1109/TVT.2015.2455233.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[14]	R. Zakaria and D. Le Ruyet, “A novel filter-bank multicarrier scheme to mitigate the intrinsic interference: Application to MIMO systems,” IEEE Trans. Wirel. Commun., vol. 11, no. 3, pp. 1112–1123, 2012. DOI: 10.1109/TWC.2012.012412.110607.</unstructured_citation></citation><citation key="ref12"><unstructured_citation> 
[15]	S. Lu, S. Member, B. Narasimhan, and S. Member, “A Novel SFBC-OFDM Scheme for Doubly-Selective Channels,” IEEE Trans. Veh. Technol.,Vol. 58(5), pp. 2573-2578, 2008.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[16]	K. A. Banawan and E. Sourour, “Turbo equalization of precoded collaborative MIMO for the uplink of LTE-advanced,” presented at the 2013 International Conf. on Computing, Networking and Communications (ICNC 2013), Jan. 2013, DOI: 10.1109/ICCNC.2013.6504225.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[17]	Y. Jung and H. Song, “Low-Complexity and Robust Symbol Timing Synchronization Scheme for MIMO DVB-T2 Systems,” IEEE Access, Vol. 6, 2018, pp. 43384–43391, DOI: 10.1109/ACCESS.2018.2863255.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[18]	T. Arbi, B. Geller, J. Yang, C. A. Nour, and O. Rioul, “Uniformly Projected RCQD QAM : A Low-Complexity Signal Space Diversity Solution Over Fading Channels With or Without Erasures,” IEEE Trans. Broadcast., Vol. 64, no. 4, 2018, pp. 803–815, DOI: 10.1109/TBC.2018.2811618.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[19]	T. Sato, B. Roland, P. Ivan, and A. Pablo, “A comparison between theoretical and practical planning approaches for DVB-T2 single frequency networks,” in 2015 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2015., pp. 1-6.</unstructured_citation></citation><citation key="ref17"><unstructured_citation> 
[20]	L. Fay, L. Michael, D. Gomez-Barquero, N. Ammar, and M. W. Caldwell, “An overview of the ATSC 3.0 physical layer specification,” IEEE Trans. On Broadcast., vol. 62, no. 1, pp. 159–171, 2016. pp. 159–171, DOI: 10.1109/TBC.2015.2505417.</unstructured_citation></citation><citation key="ref18"><unstructured_citation> 
[21]	A. A. A. Solyman et al., “A low-complexity equalizer for video broadcasting in cyber-physical social systems through handheld mobile devices,” IEEE Access, vol. 8, pp. 67591–67602, 2020. DOI: 10.1109/ACCESS.2020.2982001.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[22]	Y. H. You and J. H. Paik, “Suboptimal Maximum Likelihood Detection of Integer Carrier Frequency Offset for Digital Terrestrial Television Broadcasting System,” IEEE Trans. Broadcast., Vol. 66, no. 1, 2020, pp. 195–202, DOI: 10.1109/TBC.2019.2921663.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[23]	S. M. Alamouti, “A simple transmit diversity technique for wireless communication,” IEEE J. Sel. Areas Commun., Vol. 16, no. 8, pp. 1451–1458, 1998.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[24]	D. Gozálvez, D. Gómez-Barquero, D. Vargas, and N. Cardona, “Time diversity in mobile DVB-T2 systems,” IEEE Trans. Broadcast., Vol. 57, no. 3, pp. 617–628, 2011, DOI: 10.1109/TBC.2011.2161189.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[25]	S. Kaiser, “Spatial transmit diversity techniques for broadband OFDM systems,” IEEE. Global Telecommunications Conf. (Cat. No. 00CH37137), 2000, Vol. 3, pp. 1824-1828).</unstructured_citation></citation><citation key="ref23"><unstructured_citation> 
[26]	Y. Zhang, J. Cosmas, K. K. Loo, M. Bard, and R. D. Bari, “Analysis of cyclic delay diversity on DVB-H systems over spatially correlated channel,” IEEE Trans. Broadcast., Vol. 53, no. 1, pp. 247–254, 2007, DOI: 10.1109/TBC.2007.891702.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[27]	S. Plass, A. Dammann, G. Richter, and M. Bossert, “Channel correlation properties in OFDM by using time-varying cyclic delay diversity,” J. Commun., Vol. 3, no. 3, pp. 19–26, 2008.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[28]	M. Liu, M. Crussi, and A. M. T. Model, “Enhanced Mobile Digital Video Broadcasting with Distributed Space-Time Coding,” in 2012 IEEE International Conf. on Communications (ICC), 2012, pp. 6971–6976.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[29]	S. Plass, A. Dammann, and S. Sand, “An overview of cyclic delay diversity and its applications,” IEEE Veh. Technol. Conf., 2008, DOI: 10.1109/VETECF.2008.133.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[30]	A. Dammann, “On the influence of cyclic delay diversity and doppler diversity on the channel characteristics in OFDM systems,” IEEE Int. Conf. Commun., 2007, pp. 4179–4184, DOI: 10.1109/ICC.2007.689.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[31]	R. Raulefs, A. Dammann, S. Kaiser, and G. Auer, “The Doppler Spread – Gaining Diversity for Future Mobile Radio Systems,” IEEE Glob. Telecommun. Conf. (IEEE Cat. No.03CH37489), 2003, pp. 1301–1305.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[32]	B. Akbarian, S. Ghazi.M, “Better Performance of New Generation of Digital Video Broadcasting-terrestrial ( DVB-T2 ) using Alamouti scheme with Cyclic Delay Diversity,” JIST,vol. 10, 108-114, 2015.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[33]	ITSI, Implementation guidelines for a second generation digital terrestrial television broadcasting system (DVB-T2), ETSI, no. February 2012.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[34]	Y. Fang et al., “Improved passive SAR imaging with DVB-T transmissions,” IEEE Trans. Geosci. Remote Sens., Vol. 58, no. 7, 2020, pp. 5066–5076, DOI: 10.1109/TGRS.2020.2972156.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[35]	A. Dammann, R. Raulefs, and S. Plass, “Soft cyclic delay diversity and its performance for DVB-T in ricean channels,” GLOBECOM - IEEE Glob. Telecommun. Conf., 2007, pp. 4210–4214, DOI: 10.1109/GLOCOM.2007.801.C</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[36]	Q. Hamarsheh and O. Daoud, “Enhancing DVB-H BER based OFDM systems,” J. Commun. Technol. Electron., Vol. 60, no. 8, pp. 880–889, DOI: 10.1134/S1064226915080069, 2015.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[37]   A. Dammann, S. Plass, and S. Sand, “Cyclic delay diversity - A simple, flexible and effective multi-antenna technology for OFDM,” IEEE Int. Symp. Spread Spectr. Tech. Appl., 2008, pp. 550–554, DOI: 10.1109/ISSSTA.2008.108.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[38]	C. Gómez-Calero, L. Cuéllar, L. De Haro, and R. Martínez, “A 2 x 2 novel MIMO testbed for DVB-T2 systems,” 2009 IEEE Int. Symp. Broadband Multimed. Syst. Broadcast. BMSB 2009, 2009, DOI: 10.1109/ISBMSB.2009.5133823.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>  
[39]	W. Zhou, J. Wu, and P. Fan, “High Mobility Wireless Communications with Doppler Diversity: Fundamental Performance Limits,” IEEE Trans. Wirel. Commun., Vol. 14, no. 12, pp. 6981–6992 , 2015, DOI: 10.1109/TWC.2015.2463276.J</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[40]	L. De Haro, “A 2 x 2 MIMO DVB-T2 System : Design, New Channel Estimation Scheme and Measurements With Polarization Diversity,” IEEE Trans. On Broadcast, 56(2), Vol. 56, no. 2, pp. 184–192,2010.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[41]	K. Chanthirasekaran, M. A. Bhagyaveni, and L. R. Parvathy, “Multi-Parameter Based Scheduling for Multi-user MIMO Systems,” J. Electr. Eng. Technol Vol. 10, no. 6, pp. 2406–2412, 2015.</unstructured_citation></citation><citation key="ref39"><unstructured_citation> 
[42]	C. W. Tan and A. R. Calderbank, “Multiuser detection of alamouti signals,” IEEE trans. commun., vol. 57, no. 7, pp. 2080–2089, 2009, DOI: 10.1109/TCOMM.2009.07.070592.</unstructured_citation></citation><citation key="ref40"><unstructured_citation> 
[43]	R. Chai, A.L. Savvaris, and A. Tsourdos, “Violation learning differential evolution-based hp-adaptive pseudospectral method for trajectory optimization of space maneuver vehicle,” IEEE Trans. Aerosp. Electron. Syst., vol. 53, no. 4, pp. 2031–2044, 2017.</unstructured_citation></citation><citation key="ref41"><unstructured_citation> 
[44]	F. Qu, Z. Wang and L. Yang, “Differential orthogonal space-time block coding modulation for time-variant underwater acoustic channels,” IEEE j. ocean. eng., pp. 1–11, 2016.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>




</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>AI based Computational Trust Model for Intelligent Virtual Assistant</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Babu</given_name><surname>Kumar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ajay Vikram</given_name><surname>Singh </surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Parul</given_name><surname> Agarwal</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>18</day><year>2021</year></publication_date><pages><first_page>263</first_page><last_page>271</last_page></pages><doi_data><doi>10.29252/jist.8.32.263</doi><resource>http://jist.ir/en/Article/15536</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15536</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15536</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15536</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15536</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15536</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15536</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15536</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Caminha, A. Perkusich, and M. Perkusich, “A smart trust management method to detect on-off attacks in the internet of things,” Security Commun. Netw., vol. 2018, pp. 1–10, Apr. 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A.V. Singh, V. Juyal and R.Saggar, "Trust based Intelligent Routing Algorithm for Delay Tolerant Network using Artificial Neural Network" in Wireless Networks (WINE), US:Springer Publication, vol. 22, no. 135, pp. 1-10, Jan. 2016.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	G. D’Angelo, S. Rampone and F. Palmieri, "An Artificial Intelligence based Trust Model for Pervasive Computing", Proceedings on 10th International Conference on P2P Parallel Grid Cloud and Internet Computing 3PGCIC 2015 art. no. 7424653, pp. 701-706, 2015.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	K. Siau and W. Wang, Building Trust in Artificial Intelligence, Machine Learning, and Robotics, Cutter Business Technology Journal, Vol. 31, No. 2, pp. 47-53, 2018.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	I.-R. Chen, F. Bao and J. Guo, "Trust-based service management for social Internet of Things systems", IEEE Trans. Depend. Secure Comput., vol. 13, no. 6, pp. 684-696, Nov./Dec. 2016.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. M. Sony and S. B. Sasi, "On-Off attack management based on trust", In 2016 Online International Conference on Green Engineering and Technologies (IC-GET), pp. 1-4, November, 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	F. Jiang et al., "Deep learning based multi-channel intelligent attack detection for data security", IEEE Trans. Sustain. Comput., [online] Available: https://ieeexplore.ieee.org/document/8259310/.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. Jiang, G. Han, C. Zhu, S. Chan and J. J. P. C. Rodrigues, "A trust cloud model for underwater wireless sensor networks", IEEE Commun. Mag., vol. 55, no. 3, pp. 110-116, Mar. 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Kot, Mateusz Tomasz, and Grzegorz Leszczyński. "The concept of intelligent agent in business interactions: is virtual assistant an actor or a boundary object?." Journal of Business &amp; Industrial Marketing (2020).</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] F. Fei, S. Li, H. Dai, C. Hu and W. Dou, "A K-anonymity based schema for location privacy preservation", IEEE Trans. Sustainable Comput.2017.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] S. Talari et al., "A review of smart cities based on the Internet of Things concept", Energies, vol. 10, no. 4, pp. 421, 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] F. Boustanifar and Z. Movahedi, "A trust-based offloading for mobile M2M communications", Proc. Int. IEEE Conf. Ubiquitous Intell. Comput., pp. 1139-1143, 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Gartner Says Worldwide Spending on VPA-Enabled Wireless Speakers Will Top \$2 Billion by 2020, Gartner, Oct. 2016, [online] Available: www.gartner.com/newsroom/id/3464317.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] A. Liptak, Amazon's Alexa Started Ordering People Dollhouses after Hearing Its Name on TV, The Verge, Jan. 2017, [online] Available: www.theverge.com/2017/1/7/14200210/amazon-alexa-tech-news-anchor-order-dollhouse.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] K. York, Dyn Statement on 10/21/2016 DDoS Attack, [online] Available: dyn.com/blog/dyn-statement-on-10212016-ddos-attack, Oct. 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] Yuting Liao, Jessica Vitak, Priya Kumar, Michael Zimmer, and Katherine Kritikos. Understanding the Role of Privacy and Trust in Intelligent Personal Assistant Adoption. In Information in Contemporary Society, Natalie Greene Taylor, Caitlin Christian-Lamb, Michelle H. Martin and Bonnie Nardi (eds.). Springer International Publishing, Cham, 102--113. https://doi.org/10.1007/978--3-030--15742--5_9, 2019.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] Chung, Hyunji, Michaela Iorga, Jeffrey Voas, and Sangjin Lee. Alexa, Can I Trust You? Computer 50: 100, 2017.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] A. S. Tulshan and S. N. Dhage, "Survey on virtual assistant: Google assistant Siri Cortana Alexa", Proc. Int. Symp. Signal Process. Intell. Recognit. Syst., pp. 190-201, 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] Kshama V. Kulhalli, “Personal Assistant with Voice Recognition Intelligence”, ISSN 0974-3154 Volume 10, Number 1, 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] Amanda Purington, Jessie G. Taft, Shruti Sannon, Natalya N. Bazarova, and Samuel Hardman Taylor. 2017. "Alexa is my new BFF": Social Roles, User Satisfaction, and Personification of the Amazon Echo. In Proceedings of the CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '17). ACM, New York, NY, USA, 2853—2859, 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] V. Këpuska and G. Bohouta, “Next-Generation of Virtual Personal Assistants (Microsoft Cortana, Apple Siri, Amazon Alexa and Google Home),” in 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), pp. 99–103, 2018.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] J. R. Bellegarda, "Spoken language understanding for natural interaction: The Siri experience" in Natural Interaction with Robots Knowbots and Smartphones, New York:Springer-Verlag, pp. 3-14, 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] Kunal Gupta, Ryo Hajika, Yun Suen Pai, Andreas Duenser, Martin Lochner, and Mark Billinghurst. "Measuring Human Trust in a Virtual Assistant using Physiological Sensing in Virtual Reality." In 2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR), pp. 756-765. IEEE, 2020.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Effective Method of Feature Selection in Persian Text for Improving the Accuracy of Detecting Request in Persian Messages on Telegram</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>zahra</given_name><surname>khalifeh zadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad Ali</given_name><surname>Zare Chahooki</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>18</day><year>2021</year></publication_date><pages><first_page>249</first_page><last_page>262</last_page></pages><doi_data><doi>10.29252/jist.8.32.249</doi><resource>http://jist.ir/en/Article/15539</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15539</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15539</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15539</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15539</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15539</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15539</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15539</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	W. Y. Wang, D. J. Pauleen, and T. Zhang. "How social media applications affect B2B communication and improve business performance in SMEs". Industrial Marketing Management, vol. 54, pp. 4–14, 2016.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	E. Omer, "Using machine learning to identify jihadist messages on Twitter". M.S Theses, Dept. Information Technology, Uppsala Univ., Sweden, 2015.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. Surma and A. Furmanek. "Improving marketing response by data mining in social network ", in 2010 International Conference on Advances in Social Networks Analysis and Mining, 2010, pp. 446–451.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	W. He, S. Zha, and L. Li. "Social media competitive analysis and text mining: A case study in the pizza industry". International Journal of Information Management, vol. 33, no. 3, pp. 464–472, Jun. 2013.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. A. Vamerzani and M. Khademi. "Exploring the Uses and Challenges of Big Data in Opinion Analysis," in Proceedings of the 7th Iranian Conference on Electrical and Electronics Engineering, Gonabad, Islamic Azad University of Gonabad, 2016.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Kiani nejad, T. hashemi, and M. rashidi. " Text mining social networks for consumer brand feelings and desires," in Proceedings of the 6th International Conference on Economics, Management and Engineering Sciences, Belgium, International Center for Academic Communication, 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Iran Analytical News Agency, "In which countries do telegram messengers favor?", khabaronline.ir, July. 2, 2019. [Online]. Available: khabaronline.ir/news/1275665. [Accessed:4 Jan 2020].</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Wikipedia contributors, "Telegram (software)," Wikipedia, The Free Encyclopedia, 27 Dec 2019, 15:24 UTC. [Online].Available: https://b2n.ir/907494.[Accessed:4 Jan 2020].</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Economics News, "Latest statistics from the mostpopular social networks in Iran", eghtesadnews.com, April. 9, 2019. [Online]. Available: https://b2n.ir/661242. [Accessed:4 Jan 2020].</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Nekkaa and D. Boughaci. "Hybrid harmony search combined with stochastic local search for feature selection". Neural Processing Letters, vol. 44, no. 1, pp. 199–220, 2016.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	X. Deng, Y. Li, J. Weng, and J. Zhang. "Feature selection for text classification: A review". Multimedia Tools and Applications, vol. 78, no. 3, pp. 3797–3816, 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. K. Uysal. "An improved global feature selection scheme for text classification". Expert systems with Applications, vol. 43, pp. 82–92, 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	L. M. Abualigah, A. T. Khader, M. A. Al-Betar, and O. A. Alomari. "Text feature selection with a robust weight scheme and dynamic dimension reduction to text document clustering". Expert Systems with Applications, vol. 84, pp. 24–36, 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	D. Agnihotri, K. Verma, and P. Tripathi. "Variable global feature selection scheme for automatic classification of text documents". Expert Systems with Applications, vol. 81, pp. 268–281, 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	G. BİRİCİK, B. Diri, and A. C. SÖNMEZ. "Abstract feature extraction for text classification". Turkish Journal of Electrical Engineering &amp; Computer Sciences, vol. 20, no. Sup. 1, pp. 1137–1159, 2012.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. Lachheta and S. Bawa. "Combining synthetic minority oversampling technique and subset feature selection technique for class imbalance problem", in Proceedings of the International Conference on Advances in Information Communication Technology &amp; Computing, 2016, p. 25.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. F. Sheta and A. Alamleh. "A professional comparison of c4. 5, mlp, svm for network intrusion detection based feature analysis", in The International Congress for global Science and Technology, 2015, vol. 47, p. 15.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	F. Aragón-Royón, A. Jiménez-Vílchez, A. Arauzo-Azofra, and J. M. Benítez. "FSinR: an exhaustive package for feature selection". arXiv preprint arXiv:2002.10330, 2020.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A.-Z. Ala’M, A. A. Heidari, M. Habib, H. Faris, I. Aljarah, and M. A. Hassonah. "Salp Chain-Based Optimization of Support Vector Machines and Feature Weighting for Medical Diagnostic Information Systems", in Evolutionary Machine Learning Techniques, Springer, 2020, pp. 11–34.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	O. Stromann, A. Nascetti, O. Yousif, and Y. Ban. "Dimensionality Reduction and Feature Selection for Object-Based Land Cover Classification based on Sentinel-1 and Sentinel-2 Time Series Using Google Earth Engine". Remote Sensing, vol. 12, no. 1, p. 76, 2020.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	D. Ö. Şahin and E. Kılıç. "Two new feature selection metrics for text classification". Automatika, vol. 60, no. 2, pp. 162–171, 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. A. Hassonah, R. Al-Sayyed, A. Rodan, A.-Z. Ala’M, I. Aljarah, and H. Faris, "An efficient hybrid filter and evolutionary wrapper approach for sentiment analysis of various topics on Twitter". Knowledge-Based Systems, vol. 192, p. 105353, 2020.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Y. Piao et al., "A new ensemble method with feature space partitioning for high-dimensional data classification". Mathematical Problems in Engineering, vol. 2015, 2015.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Y. B. Wah, N. Ibrahim, H. A. Hamid, S. Abdul-Rahman, and S. Fong. "Feature Selection Methods: Case of Filter and Wrapper Approaches for Maximising Classification Accuracy. ". Pertanika Journal of Science &amp; Technology, vol. 26, no. 1, 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	A. K. Uysal. "On two-stage feature selection methods for text classification". IEEE Access, vol. 6, pp. 43233–43251, 2018.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	J. Xie and C. Wang. "Using support vector machines with a novel hybrid feature selection method for diagnosis of erythemato-squamous diseases". Expert Systems with Applications, vol. 38, no. 5, pp. 5809–5815, 2011.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	H. Ogura, H. Amano, and M. Kondo. "Distinctive characteristics of a metric using deviations from Poisson for feature selection". Expert Systems with Applications, vol. 37, no. 3, pp. 2273–2281, 2010.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	C. Huang, J. Zhu, Y. Liang, M. Yang, G. P. C. Fung, and J. Luo. "An efficient automatic multiple objectives optimization feature selection strategy for internet text classification". International Journal of Machine Learning and Cybernetics, vol. 10, no. 5, pp. 1151–1163, 2019.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	Z. Zheng and R. Srihari. "Optimally combining positive and negative features for text categorization", in ICML 2003 Workshop, 2003.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	A. K. Uysal and S. Gunal. "A novel probabilistic feature selection method for text classification". Knowledge-Based Systems, vol. 36, pp. 226–235, 2012.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	A. Melo and H. Paulheim. "Local and global feature selection for multilabel classification with binary relevance". Artificial intelligence review, vol. 51, no. 1, pp. 33–60, 2019.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	M. mojaveriyan, H. Ebrahimpour-Komleh, and S. jalaleddin Mousavirad. "Text Feature Selection using Document Frequency and Colonial Competitive Algorithm", in 8th National Conference on Data Mining, At Amirkabir University of Technology, Tehran, Iran, 2014.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	Ö. Uncu and I. B. Türkşen. "A novel feature selection approach: combining feature wrappers and filters". Information Sciences, vol. 177, no. 2, pp. 449–466, 2007.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	Y. Zhou, G. Cheng, S. Jiang, and M. Dai, "Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier". Computer Networks, p. 107247, 2020.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	V. Bolon-Canedo, N. Sanchez-Marono, and A. Alonso-Betanzos. "Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset". Expert Systems with Applications, vol. 38, no. 5, pp. 5947–5957, 2011.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	A. Onan, S. Korukoğlu, and H. Bulut. "Ensemble of keyword extraction methods and classifiers in text classification". Expert Systems with Applications, vol. 57, pp. 232–247, 2016.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	K. Kurniabudi, A. Harris, and A. Rahim. "Seleksi Fitur Dengan Information Gain Untuk Meningkatkan Deteksi Serangan DDoS menggunakan Random Forest". Techno. Com, vol. 19, no. 1, pp. 56–66, 2020.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	T. Z. Win and N. S. M. Kham. "Information Gain Measured Feature Selection to Reduce High Dimensional Data", in Seventeenth International Conference on Computer Applications (ICCA 2019), 2019.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	B. Z. Abbasi, S. Hussain, S. Bibi, and M. A. Shah. "Impact of Membership and Non-membership Features on Classification Decision: An Empirical Study for Appraisal of Feature Selection Methods", in 2018 24th International Conference on Automation and Computing (ICAC), 2018, pp. 1–6.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	G. Kou, P. Yang, Y. Peng, F. Xiao, Y. Chen, and F. E. Alsaadi. "Evaluation of feature selection methods for text classification with small datasets using multiple criteria decision-making methods". Applied Soft Computing, vol. 86, p. 105836, 2020.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	A. K. Uysal and S. Gunal. "A novel probabilistic feature selection method for text classification". Knowledge-Based Systems, vol. 36, pp. 226–235, 2012.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	B. Tang, S. Kay, and H. He. "Toward optimal feature selection in naive Bayes for text categorization". IEEE transactions on knowledge and data engineering, vol. 28, no. 9, pp. 2508–2521, 2016.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	K. D. Rosa and J. Ellen. "Text classification methodologies applied to micro-text in military chat", in 2009 International Conference on Machine Learning and Applications, 2009, pp. 710–714.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	D. Sarkar. "Text Classification", in Text Analytics with Python, Springer, 2019, pp. 275–342.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	S. A. Verma, G. T. Thampi, and M. Rao. "Efficacy of a Classical and a Few Modified Machine Learning Algorithms in Forecasting Financial Time Series", in Internet of Things, Smart Computing and Technology: A Roadmap Ahead, Springer, 2020, pp. 3–30.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	M. Swamynathan. Mastering machine learning with python in six steps: A practical implementation guide to predictive data analytics using python. Apress, 2019.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>IT Capability Evaluation through the IT Capability Map</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>mina</given_name><surname>ranjbarfard</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyedeh Reyhaneh</given_name><surname>Mirsalari</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>18</day><year>2021</year></publication_date><pages><first_page>207</first_page><last_page>218</last_page></pages><doi_data><doi>10.29252/jist.8.32.207</doi><resource>http://jist.ir/en/Article/15553</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15553</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15553</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15553</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15553</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15553</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15553</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15553</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] N. A. A. Hamid, C. W. Liew, N. H. Abdullah, and S. S. Omar, “The role of information technology human capability in the implementation of information technology governance (ITG): a systematic literature review on malaysian organizations,” Technology and Engineering Systems Journal, Vol. 4, No. 4, 314-322, 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] A. S. Bharadwaj, “A resource-based perspective on information technology capability and firm performance: An empirical investigation,” MIS quarterly, Vol. 24, No. 1, pp.169–196, 2000.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] S. Mithas, N. Ramasubbu, M. S. Krishnan and V. Sambamurthy, “Information technology infrastructure capability and firm performance: An empirical analysis. Working paper,” Ross School of Business, University of Michigan, Ann Arbor, 2005.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] G. K. Chepkole, and J. Deya, “Effect of strategic capability on competitive advantage of information technology firms in Nairobi City County, Kenya,” International Academic Journal of Human Resource and Business Administration, Vol. 3, No. 5, 104-127, 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] C. H. Chen, and T. Cates, T. “The role of information technology capability and innovative capability: An empirical analysis of knowledge management in healthcare,” International Management Review, Vol. 14 No. 1, 5–16, 2018.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] J. Luftman, K. Lyytinen, and T. B. Zvi, “Enhancing the measurement of information technology (IT) business alignment and its influence on company performance,” Journal of Information Technology, Vol. 32, No. 1, 26-46, 2018.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[8] P. Mikalef, and A. Pateli, “Information technology-enabled dynamic capabilities and their indirect effect on competitive performance: Findings from PLS-SEM and fsQCA,” Journal of Business Research, Vol. 70, No.1, 1-16, 2017.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[9] M. Queiroz, P. Tallon, R. Sharma, and T. Coltman, “The role of IT application orchestration capability in improving agility and performance, The Journal of Strategic Information Systems,” Vol. 27, No. 1, 4-21, 2018.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10] M. Zhang, S. Sarker and S. Sarker, “Unpacking the effect of IT capability on the performance of export-focused SMEs: A report from China,” Information Systems Journal, Vol. 18, No. 4, pp.357-380, 2008.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11] H. Liu, K. Ke, K. Wei and ZH. Hua, “The impact of IT capabilities on firm performance: The mediating roles of absorptive capacity and supply chain agility,” Decision Support Systems, Vol. 54, pp.1452–1462, 2013.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12] K. J. Ringim, M. R. Razalli and N. Hasnan, N “The relationship between information technology capability and organizational performance in Nigerian banks,” International Journal of Business Research and Development, Vol. 4, No. 2, pp.1- 10, 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13] H. C. Chae, C. E. Koh and K. O. Park, “Information technology capability and firm performance: Role of industry,” Information and Management, Vol. 55, No. 5, pp.525-546, 2018.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14] Z. Wang, D. Q. Yao, X. Yue and J. J. Liu, “Impact of IT Capability on the Performance of Port Operation,” Production and Operations Management, Vol. 27, No. 11, pp.1996-2009, 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15] U. Hameed, M. Shabbir, A. Raza and A. Salman, “Remedies of low performance among Pakistani e-logistic companies: The role of firm’s IT capability and information communication technology (ICT),” Uncertain Supply Chain Management, Vol. 7, No. 2, 2018.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16] J. Braojos, J. Benitez and J. Llorenz, “How do social commerce-IT capabilities influence firm performance? Theory and empirical evidence,” Information &amp; Management, Vol. 56, No. 2, pp.155–171, 2019.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17] J. B. Barney, “Firm resources and sustained competitive advantage,” Journal of Management, Vol. 17, No. 1, pp.99–120, 1991.
[18] M. Wade and J. Hulland, “Review: the resource-based view and information systems research: review, extension, and suggestions for future research,” MIS Quarterly, Vol. 28, No. 107, 2004.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[19] Y. Lu and K. Ramamurthy, “Understanding the link between information technology capability and organizational agility: an empirical examination,” MIS Quarterly, Vol. 35, No. 4, pp.931–954, 2011.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[20] V. Sambamurthy and R. W. Zmud, “At the heart of success: organization-wide management competencies,” in Steps to the Future: Fresh Thinking on the management of IT-Based Organizational transformation, Sauer, C. and P. Yetton, P. (Eds.), San Francisco, CA: Jossey-Bass Publishers, 1997, pp.143-164.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[21] F. J. Mata, W. L. Fuerst and J. B. Barney, “Information technology and sustained competitive advantage: a resource-based analysis,” MIS Quarterly, Vol. 19, No. 4, pp.487-505, 1995.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[22] B. B. Tyler, “The complementarity of cooperative and technological competencies: a resource-based perspective,” Journal of Engineering and Technology Management, Vol. 18, No. 1, pp.1–27, 2001.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[23] S. H. Huang, C. Ou, C. M. Chen and B. Lin, “An empirical study of relationship between IT investment and ﬁrm performance: a resource-based perspective,” European Journal of Operational Research, Vol. 173, No. 3, pp.984-999, 2006.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[24] J. Benitez-Amado and R. M. Walczuch, “Information technology, the organizational capability of proactive corporate environmental strategy and firm performance: A resource-based analysis,” European Journal of Information Systems, Vol. 21, pp.664–679, 2012.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[25] L. Kang, C. H. Tan and J. L. Zhao, “Organizational quest for competitive advantage through innovation: where should IT capability be focused?,” in Twenty-Second Pacific Asia Conference on Information Systems, Yokohama,  Japan, 2018.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[26] J. G. Kamau, T. A. Senaji and S. C. Nzioki, “Effect of information technology capability on competitive advantage of the Kenyan banking sector,” International Journal of Technology and Systems, Vol. 4, No. 1, pp.1 – 20, 2019.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[27] D. G. Bhatt and V. Grover, “Types of information technology capabilities and their role in competitive advantage: an empirical study,” Journal of Management Information Systems, Vol. 22, No. 2, pp.253-277, 2005.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[28] C.Y. Yoon, “Measuring enterprise IT capability: a total IT capability perspective,” Knowledge-Based Systems, Vol. 29, No. 7, pp.1-6, 2011.
[29] M. Zhang, M. Brodke and J. McCullough, “Cross-cultural reliability and validity of a scale to measure information technology capability,” Journal of Technology Research, Vol. 2, No. 1, pp.1–20, 2010.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[30] J. S. Chen and H. T. Tsou, “Performance effects of IT capability service process innovation and the mediating role of customer service,” Journal of Engineering and Technology Management, Vol. 29, No. 1, pp.71-94, 2012.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[31] J. W. Lainhart, “COBIT: a methodology for managing and controlling information technology risks and vulnerabilities. Journal of Information Systems, Vol. 1, No. 14, pp. 21–25, 2000.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[32] Y. Chen, Y. Wang, S. Nevo, J. Jin, L. Wang, and W. S. Chow, “IT capability and organizational performance: the roles of business process agility and environmental factors,” European Journal of Information Systems, Vol. 23, No. 3, pp.326–342, 2014.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[33] J. W. Ross, C. M. Beath, and D. L. Goodhue, “Develop long-term competitiveness through IT assets,” Sloan Management Review, 38, No. 1, pp.31-45, 1996.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[34] Z. Aiqun, “An IT Capability Approach to Informatization Construction of Higer Education Institutions,” Procedia Computer Science, Vol.131, pp.683-690, 2018.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
 [35] A. Q. Bataineh, M. G. Al-Abdallah and A. Y. Alhadid, “The role of information technology capabilities in capitalizing market agility in jordanian telecommunications sector,” International Journal of Academic Research in Business and Social Sciences, Vol. 5, No. 8, pp.90-101, 2015.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[36] H. Mao, S. Liu and J. Zhang, “How the effects of IT and knowledge capability on organizational agility are contingent on environmental uncertainty and information intensity,” Information Development, Vol. 31, No. 4, pp.358-382, 2014.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[37] A. S. Bharadwaj, S. G. Bharadwaj and B. R. Konsynski, “Information technology effects on firm performance as measured by Tobin's q,” Management Science, Vol. 45, No. 7, pp.1008-1024, 1999.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[38] H. S. Han, J. N. Lee and Y. W. Seo, “Analyzing the impact of a firm’s capability on outsourcing success: a process perspective,” Information and Management, Vol.  45, No. 1, pp.31–42, 2008.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[39] F. Lai, D. Li, Q. Wang and X. Zhao, “The information technology capability of third-party logistics providers: a resource-based view and empirical evidence from China,” Journal of Supply Chain Management, Vol. 44, No. 3, pp.22-38, 2008.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[40] M. Zhang, “Information systems strategic flexibility and firm performance: an empirical investigation,” Journal of Engineering and Technology Management, Vol. 22, No. 3, pp.163–184, 2005.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[41] B. Kitchenham and S. Charters, Guidelines for performing systematic literature reviews in software engineering (Report No. EBSE-2007-01“School of Computer Science and Mathematics, Keele University, 2007.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[42] I. Bakan and ZH. Sekkeli, “Types of information technology capability and their impacts on competitiveness,” Research Journal of Business and Management, Vol. 4 No. 2, pp.212-220, 2017.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[43] R. Bi, R. M. Davison, B. Kam and K. X. Smyrnios, “Developing Organizational Agility through IT and Supply Chain Capability,” Journal of Global Information Management, Vol. 21, No. 4, pp.38-55, 2013.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[44] B. Boar, “Cost Effective Strategies for Client/ Server Systems. New York, NY: Wiley and Sons, 1996.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[45] M. Broadbent, P. Weill and D. S. Clair, “The implications of information technology infrastructure for business process redesign,” MIS quarterly, Vol. 23, No. 2, pp.159–182, 1999.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[46] T. A. Byrd and D. E. Turner, “Measuring the flexibility of information technology infrastructure: exploratory analysis of a construct,” Journal of Management Information Systems, Vol.1, No.17, pp.167-208, 2000.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[47] Y. Chen, Y. Wang, S. Nevo, J. Benitez-Amado and G. Kou, “IT capabilities and product innovation performance: The roles of corporate entrepreneurship and competitive intensity,” Information &amp; Management, Vol. 52, No. 6, pp. 643-657, 2015.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[48] N. B. Duncan, “Capturing flexibility of information technology infrastructure: A study of resource characteristics and their measure,” Journal of Management Information Systems, Vol. 12, No. 2, pp.37–57, 1995.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[49] R. G. Fichman, “Real options and IT platform adoption: Implications for theory and practice,” Information Systems Research, Vol. 15, No. 2, pp.132–154, 2004.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[50] L. Fink and S Neumann, “Gaining agility through IT personnel capabilities: the mediating role of IT infrastructure capabilities,” Journal of the Association for Information Systems, Vol. 8, No. 8, pp.440–462, 2007.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[51] N. H. Hassan, N. I. Arshad, E. E. Mustapha and J. Jaafar, “A literature review: exploring organizational learning orientation as antecedent of information technology (IT) infrastructure capability to achieve organizational agility. In Third International Conference on Research and Innovation in Information Systems (ICRIIS), Kuala Lumpur, Malaysia, 2013.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[52] M. A. Karimi, A. Amini and M. Latifi, “The impact of information technology capability on firm performance; a focus on employee customer profit chain,” Iranian Journal of Management Studies (IJMS), Vol. 7, No. 1, pp.95-120, 2014.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[53] G. Kim, B. Shin., K. K. Kim and H. G. Lee, “IT capabilities, process-oriented dynamic capabilities, and firm financial performance,” Information Systems, Vol. 12, No. 7, pp.491–492, 2011.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
 [54] D. M. Lee, E. M. Trauth and D. Farwell, “Critical skills and knowledge requirement of IS professionals: a joint academic and industry investigation,” MIS Quarterly, Vol. 19, No. 3, pp.313–340, 1995.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[55] P. Tallon, “Competing perspectives on the link between strategic information technology alignment and organizational agility: insights from a mediation model,” MIS Quarterly, Vol. 35, No. 2, pp.463-486, 2011.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[56] P. Weill, M. Subramani and M. Broadbent, “Building IT infrastructure for strategic agility,” MIT Sloan Management Review, Vol. 44, No. 1, pp.57–66, 2002.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[57] M. Zhang, “Information Technology Capability, Organizational Culture, and Export Performance. Washington State University, Washington, 2005.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[58] J. W. Ross, P. Weill and D. C. Robertson, “Enterprise architecture as strategy: creating a foundation for business execution. Boston, MA: Harvard Business School Press, 2006.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[59] B. Thompson, “Exploratory and confirmatory factor analysis: Concepts and applications. Washington, DC: American Psychological Association, 2004.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[60] B. Williams, T. Brown and O. Andrys, “Exploratory factor analysis: a five-step guide for novices,” Australasian Journal of Paramedicine, Vol. 8, No. 3, pp.1-13, 2010.</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[61] J. Y. Park, K. S. Im and J. S. Kim, “The role of IT human capability in the knowledge transfer process in IT outsourcing context,” Information and Management, Vol. 48, No. 1, pp.53–61, 2011.</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[62] J. B. Schreiber, A. Nora, F. K. Stage, EA. Barlow and J. King, “Reporting structural equation modeling and confirmatory factor analysis results: a review,” the Journal of Educational Research, Vol. 99, No. 6, pp.323-337, 2006.</unstructured_citation></citation><citation key="ref60"><unstructured_citation>
[63] W. W. Chin, B. L. Marcolin and P. R. Newsted, “A partial least squares latent variable modeling approach for measuring interaction effects: Results from a monte carlo simulation study and voice mail emotion/adoption study,” in Proceedings of the Seventeenth International Conference on Information System, Cleveland, Ohio. 1996, pp.21-41.</unstructured_citation></citation><citation key="ref61"><unstructured_citation>
[64] J. C. Nunnally, “Psychometric theory. 2nd (ed.) New York: McGraw-Hill Book Company, 1978.</unstructured_citation></citation><citation key="ref62"><unstructured_citation>
[65] R. P. Bagozzi and Y. Yi, “On the evaluation of structural equation models,” Journal of the Academy of Marketing Science, Vol. 16, No. 1, pp.74–94, 1988.</unstructured_citation></citation><citation key="ref63"><unstructured_citation>
[66] C. Fornell and D. F. Larcker, “Evaluating structural equation models with unobservable variables and measurement errors,” Journal of Marketing Research, Vol. 18, No. 1, pp.39–50. 1981.</unstructured_citation></citation><citation key="ref64"><unstructured_citation>
[67] W. M. A. B. W. Afthanorhan, “A comparison of partial least square structural equation modeling (PLS-SEM) and covariance based structural equation modeling (CB-SEM) for confirmatory factor analysis,” International Journal Engineering and Science Innovative Technologies (IJESIT), Vol. 2, No. 5, pp.8, 2013.</unstructured_citation></citation><citation key="ref65"><unstructured_citation>
[68] M. Tenenhaus, S. Amato and V. Esposito Vinzi, “A global goodness-of-fit index for PLS structural equation modelling,” Proceedings of the XLII SIS Scientific Meeting, pp. 739-742“Padova: CLEUP, 2004.</unstructured_citation></citation><citation key="ref66"><unstructured_citation>
[69] M. J. Earl, “Management Strategies for Information Technology. Upper Saddle River, NJ: Prentice Hall, 1989.</unstructured_citation></citation><citation key="ref67"><unstructured_citation>
[70] Q. Xianfeng, L. Boxiong and G. Zhenwei, G. “Conceptual model of IT infrastructure capability and its empirical justification,” TSINGHUA SCIENCE AND TECHNOLOGY, Vol. 13, No. 3, 2008.</unstructured_citation></citation><citation key="ref68"><unstructured_citation>
[71] J. Zdravkovic, J. Stirna and J. Grabis, “Capability consideration in business and enterprise architecture frameworks,” in Capability Management in Digital Enterprises, K. Sandkuhl and J. Stirna, (Eds.), Springer International Publishing, Cham, 2018, pp.41–56.</unstructured_citation></citation><citation key="ref69"><unstructured_citation>
[72] M. Carcary, “IT Risk Management: A Capability Maturity Model Perspective,” Electronic journal of information systems evaluation, Vol. 16, No. 1, 2013.</unstructured_citation></citation><citation key="ref70"><unstructured_citation>
[73] S. McLaughlin, “Using the IT-CMF as an Enabler for Transformational Change,” IVI White Paper Series, 2013.</unstructured_citation></citation><citation key="ref71"><unstructured_citation>
[74] P. Zhang, K. Zhao and R. L. Kumar, “Impact of IT Governance and IT Capability on Firm Performance,” Infromation Systems Management, Vol. 33, pp.17, 2016.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Using Decision Lattice Analysis to Model IOT-based Companies’ profit</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Nazanin</given_name><surname>Talebolfakhr</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyed Babak</given_name><surname>Ebrahimi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Donya</given_name><surname>Rahmani</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>18</day><year>2021</year></publication_date><pages><first_page>230</first_page><last_page>239</last_page></pages><doi_data><doi>10.29252/jist.8.32.230</doi><resource>http://jist.ir/en/Article/15564</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15564</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15564</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15564</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15564</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15564</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15564</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15564</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	X. Zhang and W. T. Yue, “Transformative value of the Internet of Things and pricing decisions,” Electronic Commerce Research and Applications, vol. 34, No. November 2018, 2019, p. 100825.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Computer Networks, vol. 54, No. 15, 2010, pp. 2787–2805.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Kim and S. Kim, “A multi-criteria approach toward discovering killer IoT application in Korea,” Technological Forecasting and Social Change, vol. 102, 2016, pp. 143–155.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Cuomo, P. De Michele, F. Piccialli, A. Galletti, and J. E. Jung, “IoT-based collaborative reputation system for associating visitors and artworks in a cultural scenario,” Expert Systems with Applications, vol. 79, 2017, pp. 101–111.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Y. H. Tehrani, Z. Fazel, and S. M. Atarodi, “A survey of two dominant low power and long range communication technologies,” Journal of Information Systems and Telecommunication, vol. 6, No. 2, 2018, pp. 60–66.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Fasanghari and A. Keramati, “Customer Churn Prediction Using Local Linear Model Tree for Iranian Telecommunication Companies,” Journal of Industrial Engineering, University of Tehran, 2011, pp. 25–37.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Fasanghari, “E-Commerce Assessment in Fuzzy Situation,”in E-commerce, Shangha, China: InTech, 2010, ch. 2, pp. 21–31.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. C. Cox, S. A. Ross, and M. Rubinstein, “Option pricing: A simplified approach,” Journal of Financial Economics, vol. 7, No. 3, 1979, pp. 229–263.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	P. Tufano and T. Copeland, “A Real-World Way to Manage Real Options,” Harvard Business Review, Vol. 82, 2004, pp. 90-99.
[10]	T. Copeland and V. Antikarov, Real options, New York: Texere LLC, 2001.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	L. E. Brandão, J. S. Dyer, and W. J. Hahn, “Using Binomial Decision Trees to Solve Real-Option Valuation Problems,” Decision Analysis, vol. 2, No. 2, 2005, pp. 69–88.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	D. Singh, G. Tripathi, and A. J. Jara, “A survey of Internet-of-Things: Future vision, architecture, challenges and services,” in 2014 IEEE World Forum on Internet of Things (WF-IoT), Mar. 2014, pp. 287–292.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	A. Čolaković and M. Hadžialić, “Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues,” Computer Networks, vol. 144, 2018, pp. 17–39.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	M. H. Miraz, M. Ali, P. S. Excell, and R. Picking, “A review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT),” in 2015 Internet Technologies and Applications, ITA 2015 - Proceedings of the 6th International Conference, 2015, pp. 219–224.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	H. Lamaazi, N. Benamar, A. J. Jara, L. Ladid, and D. El Ouadghiri, “Challenges of the Internet of Things: IPv6 and Network Management,” in 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Jul. 2014, pp. 328–333.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	H. Hamidi, “Safe use of the internet of things for privacy enhancing,” Journal of Information Systems and Telecommunication, vol. 4, No. 3, 2016, pp. 145–151.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	S. Fay and J. Xie, “Probabilistic goods: A creative way of selling products and services,” Marketing Science, vol. 27, No. 4, 2008, pp. 674–690.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	G. Gallego, S. G. Kou, and R. Phillips, “Revenue management of callable products,” Management Science, vol. 54, No. 3, 2008, pp. 550–564.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	V. Mak, A. Rapoport, and E. J. Gisches, “Competitive dynamic pricing with alternating offers: Theory and experiment,” Games and Economic Behavior, vol. 75, No. 1, 2012, pp. 250–264.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	I. P. L. Png and H. Wang, “Buyer uncertainty and two-part pricing: Theory and applications,” Management Science, vol. 56, No. 2, 2010, pp. 334–342.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	M. Kremer, B. Mantin, and A. Ovchinnikov, “ Dynamic Pricing in the Presence of Myopic and Strategic Consumers: Theory and Experiment,” Production and Operations Management, vol. 26, No. 1. 2017, pp. 116-133.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	L. Cabral, “Dynamic pricing in customer markets with switching costs,” Review of Economic Dynamics, vol. 20, 2016, pp. 43–62.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	J. J. Anton, G. Biglaiser, and N. Vettas, “Dynamic price competition with capacity constraints and a strategic buyer,” International Economic Review, vol. 55, No. 3, 2014, pp. 943–958.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	E. Biyalogorsky and E. Gerstner, “Contingent Pricing to Reduce Price Risks,” Marketing Science, vol. 23, No. 1, 2004, pp. 146-155.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	H. A. Najafabadi, A. Shekarchizadeh, A. Nabiollahi, N. Khani, and H. Rastegari, “The innovation roadmap and value creation for information goods pricing as an economic commodity,” Journal of Information Systems and Telecommunication, vol. 7, No. 2, 2019, pp. 154–164.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	H. K. Bhargava and S. Sundaresan, “Contingency Pricing for Information Goods and Services under Industrywide Performance Standard,” Journal of Management Information Systems, vol. 20, No. 2, 2003, pp. 113–136.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	F. Black and M. Scholes, “The pricing of options and corporate liabilities,” Journal of Political Economy, vol. 81, No. 3, 1973, pp. 637–657.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	P. Kodukula and Ch. Papudesu , Project Valuation Using Real Options Analysis, A practitioner's Guide, J. Ross Publishing, 2006.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	X. Li and J. D. Johnson, “Opportunities Using Real Options Theory,” Information Resources Management Journal, vol. 15, No. 3, 2002, pp. 32–47.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]     J. Zhang, S. Bandyopadhyay, and S.    Piramuthu,    “Real option valuation on grid computing,” Decision Support Systems, vol. 46, No. 1, 2008, pp. 333-343.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Using Static Information of Programs to Partition the Input Domain in Search-based Test Data Generation </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Atieh</given_name><surname>Monemi Bidgoli</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hassan</given_name><surname>haghighi</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>18</day><year>2021</year></publication_date><pages><first_page>219</first_page><last_page>229</last_page></pages><doi_data><doi>10.29252/jist.8.32.219</doi><resource>http://jist.ir/en/Article/15593</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15593</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15593</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15593</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15593</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15593</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15593</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15593</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	P. McMinn, M. Harman, K. Lakhotia, Y. Hassoun, and J. Wegener, “Input domain reduction through irrelevant variable removal and its effect on local, global, and hybrid search-based structural test data generation,” IEEE Trans. Softw. Eng., vol. 38, no. 2, pp. 453–477, 2012, doi: 10.1109/TSE.2011.18.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. Mao, L. Xiao, X. Yu, and J. Chen, “Adapting ant colony optimization to generate test data for software structural testing $,” Swarm Evol. Comput., vol. 20, pp. 23–36, 2014, doi: 10.1016/j.swevo.2014.10.003.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Anand et al., “An Orchestrated Survey on Automated Software Test Case Generation,” J. Syst. Softw., vol. 86, no. 8, pp. 1978–2001, 2013, doi: 10.1016/j.jss.2013.02.061.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Ali, L. C. Briand, H. Hemmati, and R. K. Panesar-Walawege, “A Systematic Review of the Application and Empirical Investigation of Evolutionary Testing,” IEEE Trans. Softw. Eng., vol. 36, no. 6, pp. 742–762, 2010, doi: http://doi.ieeecomputersociety.org/10.1109/TSE.2009.52.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Ammann and J. Offutt, Introduction to software testing. Cambridge University Press, 2016.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Weiser, “Program Slicing,” IEEE Trans. Softw. Eng., vol. SE-10, no. 4, pp. 352–357, 1984, doi: 10.1109/TSE.1984.5010248.
[7]	B. F. Jones, H. H. Sthamer, and D. E. Eyres, “Automatic structural testing using genetic algorithms,” Softw. Eng. J., vol. 11, pp. 299–306, 1996.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[8]	R. Pargas, M. J. Harrold, and R. Peck, “Test-Data Generation Using Genetic Algorithms,” J. Softw. Testing, Verif. Reliab., vol. 9, pp. 263–282, 1999.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[9]	P. Mcminn, “Search-Based Software Testing : Past , Present and Future,” pp. 153–163, 2011, doi: 10.1109/ICSTW.2011.100.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10]	M. Harman and P. McMinn, “A theoretical and empirical study of search-based testing: Local, global, and hybrid search,” IEEE Trans. Softw. Eng., vol. 36, no. 2, pp. 226–247, 2010, doi: 10.1109/TSE.2009.71.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	G. Fraser and A. Arcuri, “Whole test suite generation,” IEEE Trans. Softw. Eng., vol. 39, no. 2, pp. 276–291, 2013, doi: 10.1109/TSE.2012.14.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	N. Tracey, “An Automated Framework for Structural Test-Data Generation 2 Optimisation-Based Struc- tural Test-Data Generation 1 Introduction,” 1904.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	M. B. Cohen, C. J. Colbourn, and A. C. H. Ling, “Augmenting simulated annealing to build interaction test suites,” Proc. - Int. Symp. Softw. Reliab. Eng. ISSRE, vol. 2003-Janua, pp. 394–405, 2003, doi: 10.1109/ISSRE.2003.1251061.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	E. Elbeltagi, T. Hegazy, and D. Grierson, “Comparison among five evolutionary-based optimization algorithms,” Adv. Eng. Informatics, vol. 19, no. 1, pp. 43–53, 2005, doi: 10.1016/j.aei.2005.01.004.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	K. Socha and M. Dorigo, “Ant colony optimization for continuous domains,” Eur. J. Oper. Res., vol. 185, no. 3, pp. 1155–1173, 2008, doi: 10.1016/j.ejor.2006.06.046.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	C. Simons and J. Smith, “A comparison of evolutionary algorithms and ant colony optimization for interactive software design,” 2012.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	B. Suri and P. Jajoria, “Using ant colony optimization in software development project scheduling,” in 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2013, pp. 2101–2106.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	J. T. de Souza, C. L. B. Maia, T. do Nascimento Ferreira, R. A. F. Do Carmo, and M. M. A. Brasil, “An ant colony optimization approach to the software release planning with dependent requirements,” in International symposium on search based software engineering, 2011, pp. 142–157.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	D. Azar and J. Vybihal, “An ant colony optimization algorithm to improve software quality prediction models: Case of class stability,” Inf. Softw. Technol., vol. 53, no. 4, pp. 388–393, 2011.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	B. Suri, “Literature Survey of Ant Colony Optimization in Software Testing,” 2010.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	H. Li, “An Ant Colony Optimization Approach to Test Sequence Generation for State-Based Software Testing,” no. 1, pp. 255–262, 2005.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	P. R. Srivastava and K. Baby, “Automated Software Testing Using Metahurestic Technique Based on an Ant Colony Optimization,” Electron. Syst. Des. (ISED), 2010 Int. Symp., 2010, doi: 10.1109/ISED.2010.52.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	A. Bouchachia, R. Mittermeir, P. Sielecky, S. Stafiej, and M. Zieminski, “Nature-inspired techniques for conformance testing of object-oriented software,” Appl. Soft Comput. J., vol. 10, no. 3, pp. 730–745, 2010, doi: 10.1016/j.asoc.2009.09.003.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	K. Li, Z. Zhang, and W. Liu, “Automatic Test Data Generation Based on Ant Colony Optimization,” 2009 Fifth Int. Conf. Nat. Comput., vol. 6, pp. 216–220, 2009, doi: 10.1109/ICNC.2009.239.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	H. Sharifipour, M. Shakeri, and H. Haghighi, “Structural test data generation using a memetic ant colony optimization based on evolution strategies,” Swarm Evol. Comput., vol. 40, pp. 76–91, 2018, doi: 10.1016/j.swevo.2017.12.009.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	A. M. Bidgoli and H. Haghighi, “Augmenting ant colony optimization with adaptive random testing to cover prime paths,” J. Syst. Softw., vol. 161, p. 110495, 2020.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	A. Monemi Bidgoli, H. Haghighi, T. Zohdi Nasab, and H. Sabouri, Using Swarm Intelligence to Generate Test Data for Covering Prime Paths, vol. 10522 LNCS. 2017.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	X. Lv, S. Huang, and H. Ji, “Input Domain Reduction of Search-based Structural Test Data Generation using Interval Arithmetic.,” Int. J. Performability Eng., vol. 14, no. 6, 2018.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	M. Harman, Y. Hassoun, K. Lakhotia, P. McMinn, and J. Wegener, “The impact of input domain reduction on search-based test data generation,” Proc. 6th Jt. Meet. Eur. Softw. Eng. Conf. ACM SIGSOFT Symp. Found. Softw. Eng., pp. 155–164, 2007, doi: 10.1145/1287624.1287647.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	C. Cadar and M. Nowack, “KLEE symbolic execution engine in 2019.”</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	M. Dorigo and L. M. Gambardella, “Ant colonies for the travelling salesman problem,” BioSystems, vol. 43, no. 2, pp. 73–81, 1997, doi: 10.1016/S0303-2647(97)01708-5.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	V. Maniezzo, “Ant System: Optimization by a Colony of Cooperating Agents,” vol. 26, no. 1, pp. 1–13, 1996.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	H. Coles, T. Laurent, C. Henard, M. Papadakis, and A. Ventresque, “PIT: A practical mutation testing tool for Java (Demo),” ISSTA 2016 - Proc. 25th Int. Symp. Softw. Test. Anal., pp. 449–452, 2016, doi: 10.1145/2931037.2948707.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	R Developement Core Team, “R: A Language and Environment for Statistical Computing,” R Found. Stat. Comput., vol. 1, p. 409, 2015, doi: 10.1007/978-3-540-74686-7.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Approach to Improve the Quality of Service in DTN and Non-DTN based VANET</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Ahmad</given_name><surname>Sarlak</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Yousef</given_name><surname>Darmani</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>18</day><year>2021</year></publication_date><pages><first_page>240</first_page><last_page>248</last_page></pages><doi_data><doi>10.29252/jist.8.32.240</doi><resource>http://jist.ir/en/Article/15660</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15660</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15660</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15660</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15660</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15660</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15660</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15660</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] X. Wu, S. Subramanian, R. Guha, R. G. White, J. Li, K. W. Lu, A. Bucceri, and T. Zhang, “Vehicular Communications Using DSRC: Challenges, Enhancements, and Evolution,” IEEE Journal on Selected Areas in Communications, VOL.31, pp. 399–408, 09 2013.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, and H. Zedan, “A Comprehensive Survey on Vehicular Ad Hoc Network,” Journal of Network and Computer Applications, VOL. 37, pp. 380–392, 01 2014.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] P. Matzakos, J. Hrri, B. Villeforceix, and C. Bonnet, “An IPv6 Architecture for Cloud-to-Vehicle Smart Mobility Services over Heterogeneous Vehicular Networks,” Proceedings of 2014 International Conference on Connected Vehicles and Expo (ICCVE), pp. 767–772, Nov 2014.
[4] N. Cheng, N. Lu, N. Zhang, X. S. Shen, and J. W. Mark, “Opportunistic WiFi Offloading in Vehicular Environment: A Queueing Analysis,” Proceedings of 2014 IEEE Global Communications Conference, pp. 211–216, Dec 2014.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[5] K. Lee, J. Lee, Y. Yi, I. Rhee, and S. Chong, “Mobile Data Offloading: How Much Can WiFi Deliver?” IEEE/ACM Transactions on Networking, VOL. 21, pp. 536–550, 04 2013.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[6] S. Al-Sultan, M. M. Al-Doori, A. H. Al-Bayatti, H. Zedan, “Vehicle-to-Infrastructure (V2I) Offloading from Cellular Network to 802.11p Wi-Fi Network based on the Software-Defined Network (SDN) Architecture,” Vehicular communications, VOL. 9, pp. 288–300, 07 2017.
[7] D. Kreutz, F. M. V. Ramos, P. E. Verssimo, C. E. Rothenberg, S. Azodolmolky, and S. Uhlig, “Software-Defined Networking: A Comprehensive Survey,” Proceedings of the IEEE, VOL. 103, NO. 1, pp. 14–76, Jan 2015.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[8] J. Pan, I. S. Popa, and C. Borcea, “DIVERT: A Distributed Vehicular Traffic Re-Routing System for Congestion Avoidance,” IEEE Transactions on Mobile Computing, VOL. 60, NO. 1, pp. 58-72, Jan. 1 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[9] N. Nguyen, M. Arifuzzaman, and T. Sato, “A Novel WLAN Roaming Decision and Selection Scheme for Mobile Data
Offloading,” Journal of Electrical and  Computer Engineering, VOL. 2015, Article ID   324936, pp. 1–15, 2015.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[10] A. Aijaz, H. Aghvami, and M. Amani, “A Survey on Mobile Data Offloading: Technical and Business Perspectives,” IEEE Wireless Communications, VOL. 20, NO. 2, pp. 104–112, April 2013.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[11] G. e. m. Zhioua, H. Labiod, N. Tabbane, and   S. Tabbane, “A Traffic QoS Aware Approach for Cellular Infrastructure
Offloading using VANETs,” Proceedings of  the 22nd IEEE International Symposium of Quality of Service (IWQoS),
pp. 278–283, May 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[12] G. E. M. Zhioua, H. Labiod, N. Tabbane, and S. Tabbane, “Cellular Content Download through A Vehicular Network: I2V Link Estimation,” Proceedings of the 81st IEEE Vehicular Technology Conference (VTC Spring), pp. 1–6, May 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[13] Z. He, D. Zhang, and J. Liang, “Cost-Efficient Sensory Data Transmission in Heterogeneous Software-Defined Vehicular Networks,” IEEE Sensors Journal, VOL. 16, NO. 20, pp. 7342–7354, 10 2016.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[14] D. Suh, H. Ko, and S. Pack, “Efficiency Analysis of WiFi Offloading Techniques,” IEEE Transactions on Vehicular Technology, VOL. 65, NO. 5, pp. 3813–3817, 05 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[15] S. M. Park, S. Ju, and J. Lee, “Efficient Routing for Traffic Offloading in Software-Defined Network,” Procedia Computer Science, VOL. 34, pp. 674–679, 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[16] J. Chen, B. Liu, L. Gui, F. Sun, and H. Zhou, “Engineering Link Utilization in Cellular Offloading Oriented VANETs,” Proceedings of 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1–6, Dec 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[17] P. Salvo, I. Turcanu, F. Cuomo, A. Baiocchi, and I. Rubin, “Heterogeneous Cellular and DSRC Networking for Floating Car Data Collection in Urban Areas,” Vehicular Communications, 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[18] A. Mabrouk, A. Kobbane, E. Sabir, J. Ben-Othman, and M. El Koutbi, “Meeting Always-Best-Connected Paradigm in Heterogeneous Vehicular Networks: A Graph Theory and A Signaling Game Analysis,” Vehicular Communications, VOL. 5, pp. 1–8, 2016.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[19] J. F. Bravo-Torres, J. V. Sains-Vzquez, M. Lpez-Nores, Y. Blanco-Fernndez, and J. J. Pazos-Arias, “Mobile Data Offloading in Urban VANETs on Top of A Virtualization Layer,” Proceedings of 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 291–296, Aug 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[20] S. Wang, T. Lei, L. Zhang, C.-H. Hsu, and F. Yang, “Offloading Mobile Data Traffic for QoS-Aware Service Provision in Vehicular Cyber-Physical Systems,” Future Generation Computer Systems, VOL. 61, pp. 118–127, 08 2016.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[21] H. Park, Y. Jin, J. Yoon, and Y. Yi, “On The Economic Effects of User-Oriented Delayed Wi-Fi Offloading,” IEEE Transactions on Wireless Communications, VOL. 15, NO. 4, pp. 2684–2697, 04 2016.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[22] Y. He, M. Chen, B. Ge, and M. Guizani, “On WiFi Offloading in Heterogeneous Networks: Various Incentives and Trade-Off Strategies,” IEEE Communications Surveys Tutorials, VOL. 18, NO. 4, pp. 2345–2385, Fourthquarter 2016.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[23] N. Cheng, N. Lu, N. Zhang, X. Zhang, X. S. Shen, and J. W. Mark, “Opportunistic WiFi Offloading in Vehicular Environment: A Game-Theory Approach,” IEEE Transactions on Intelligent Transportation Systems, VOL. 17, NO. 7, pp. 1944–1955, 07 2016. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[24] J. Cho, B. Nguyen, A. Banerjee, R. Ricci, J. Van der Merwe, and K. Webb, “SMORE: Software-Defined Networking Mobile Offloading Architecture,” Proceedings of the 4th Workshop on All Things Cellular: Operations, Applications, and Challenges, AllThingsCellular ’14, (New York, NY, USA), pp. 21–26, ACM, 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[25] A. U. Khan and B. K. Ratha, “Time Series Prediction QoS Routing in Software-Defined Vehicular Ad-Hoc Network,” Proceedings of 2015 International Conference on Man and Machine Interfacing (MAMI), pp. 1–6, Dec 2015.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[26] Y. Liu, X. Chen, C. Chen, and X. Guan, “Traffic Big Data Analysis Supporting Vehicular Network Access Recommendation,” Proceedings of 2016 IEEE International Conference on Communications (ICC), pp. 1–6, May 2016.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[27] G. e. m. Zhioua, H. Labiod, N. Tabbane, and S. Tabbane, “VANET Inherent Capacity for Offloading Wireless Cellular Infrastructure: An Analytical Study,” Proceedings of the 6th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5, March 2014.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[28] A. Bazzi, B. M. Masini, A. Zanella, and G. Pasolini, “Virtual Road Side Units for Geo-Routing in VANETs,” Proceedings of 2014 International Conference on Connected Vehicles and Expo (ICCVE), pp. 234–239, Nov 2014.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[29] G. el Mouna Zhioua, J. Zhang, H. Labiod, N. Tabbane, and S. Tabbane, “VOPP: A VANET Offloading Potential Prediction Model,” Proceedings of 2014 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2408– 2413, April 2014.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[30] G. Thomas, R. Finney. Calculus and Analytic Geometric: Addison-Wesley, 1988.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[31] R. Fernandes and M. Ferreira, “Scalable VANET Simulations with NS-3,” Proceedings of the 75th IEEE Vehicular Technology Conference (VTC Spring), pp. 1–5, May 2012.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[32] H. Arbabi and M.C. Weigle, “HIGHWAY MOBILITY AND VEHICULAR AD-HOC NETWORKS IN NS-3,” Proceedings of the 2010 Winter Simulation Conference, pp. 5-8 Dec. 2010.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>