﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051923</doi_batch_id><timestamp>20260519232534</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>5</month><day>22</day><year>2021</year></publication_date><journal_volume><volume>9</volume></journal_volume><issue>34</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A New Power Control Algorithm in MMSE Receiver for D2D Underlying Massive MIMO System</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Faezeh </given_name><surname>Heydari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name> Saeed</given_name><surname>Ghazi-Maghrebi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ali</given_name><surname>Shahzadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad Jalal</given_name><surname> Rastegar Fatemi</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>22</day><year>2021</year></publication_date><pages><first_page>141</first_page><last_page>150</last_page></pages><doi_data><doi>10.52547/jist.9.34.141</doi><resource>http://jist.ir/en/Article/15482</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15482</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15482</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15482</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15482</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15482</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15482</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15482</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. G. Andrew, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. K. Soong, and J. C. Zhang, “What will 5G be?” IEEE J. Sel. Areas Commun, 2014, vol. 32, no. 6, pp. 1065–1082.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. Liu, L. Wang, Y. Chen, M. Elkashlan, K. K. Wong, R. Schober, and L. Hanzo, “User association in 5G networks: A survey and an outlook,” ‎IEEE Commun. Surveys &amp; Tutorials, ‎‎2016, vol. 18, no. 2, pp.</unstructured_citation></citation><citation key="ref3"><unstructured_citation> 1018–1044.‎</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[3]	E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, “Massive MIMO for next generation wireless systems,” IEEE Commun. Mag., 2014 vol. 52, no. 2, pp. 186–195.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[4]	T. L. Marzetta, E. G. Larsson, H. Yang, and H. Q. Ngo, Fundamentals of Massive MIMO. Cambridge University Press. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[5]	E. Björnson, J. Hoydis, and L. Sanguinetti, Massive MIMO Networks: Spectral, Energy, and Hardware Efﬁciency. Now Publishers, Inc., 2017, vol. 11, no. 3-4.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[6]	A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device communication in cellular networks,” Commun. Surveys Tuts., 2014, vol. 16, no. 4, pp. 1801–1819.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[7]	S. Shalmashi, E. Björnson, M. Kountouris, K. S. Won, and M. Debbah, “Energy efﬁciency and sum rate tradeoffs for massive MIMO systems with underlaid device-to-device communications,” EURASIP J. on Wireless Comm. and Netw., 2016, vol., no. 1, pp. 175–193.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[8]	R. H. Louie, M. R. McKay, N. Jindal, and I. B. Collings,. Spatial multiplexing with MMSE receivers: Single-stream optimality in ad hoc networks. arXiv preprint arXiv:1003.3056, 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[9]	N. Jindal, J. G. Andrews, and S. Weber,. Multi-antenna communication in ad hoc networks: Achieving MIMO gains with SIMO transmission. IEEE Trans. Commun., 2011, 59(2), 529-540.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[10]	X. Lin, R. W. Heath, and J. G. Andrews, “The interplay between massive MIMO and underlaid D2D networking,” IEEE Trans. Wireless Commun., 2015, vol. 14, no. 6, pp. 3337–3351.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[11]	H.  ElSawy,  E.  Hossain,  and  M.  S.  Alouini,  “Analytical   modeling of mode selection and power control for underlay  D2D communication in cellular networks,”  IEEE Trans. Commun., 2014, vol.  62,  no.  11, pp. 4147–4161.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[12]	Gu, S. J. Bae, B.-G. Choi, and M. Y. Chung, “Dynamic power control mechanism for interference coordination of device-to-device communication in cellular networks,” in Proc. IEEE Int. Conf. Ubiquitous Future Netw. (ICUFN), Jun. 2011, pp. 71–75.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[13]	S. Ali, H. ElSawy, and M. S. Alouini, “On mode selection and power control for uplink D2D communication in cellular networks,” in Proc. IEEE Int. Conf. Commun. Workshop (ICCW), 2015, pp. 620–626.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[14]	Y. Huang, A. A. Nasir, S. Durrani, and X. Zhou, “Mode selection, resource allocation, and power control for D2D-enabled two-tier cel- lular network,” IEEE Trans. Commun., 2016, vol. 64, no. 8, pp. 3534–3547.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[15]	N. Lee, X. Lin, J. G. Andrews, and R. W. Heath, Jr., “Power control for D2D underlaid cellular networks: Modeling, algorithms, and analysis,” IEEE J. Sel. Areas Commun.,2015, vol. 33, no. 1, pp. 1–13.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[16]	W. Zhong, Y. Fang, S. Jin, K. K. Wong, S. Zhong, and Z. Qian, “Joint resource allocation for device-to-device communications under- laying uplink MIMO cellular networks,” IEEE J. Sel. Areas Commun., 2015, vol. 33, no. 1, pp. 41–54. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[17]	M. Lin, J. Ouyang, and W.-P. Zhu, “Joint beamforming and power ‎control for device-to-device communications underlaying cellular net- ‎works,” IEEE J. Sel. Areas Commun., 2016, vol.  34,  no.  1,  pp.  138–150.‎</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[18]	Z. Yang, N. Huang, H. Xu, Y. Pan, Y. Li, and M. Chen, “Downlink ‎resource allocation and power control for device-to-device communica‎tion underlaying cellular networks,” IEEE Commun. Lett., 2016, vol. 20, no. 7, ‎pp. 1449–1452.‎</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[19]	J. Liu, J. Dai, N. Kato, and N. Ansari, “Optimizing uplink resource ‎allocation for D2D overlaying cellular networks with power control,” in ‎Proc. IEEE Global Commun. Conf. (GLOBECOM), Washington, DC, ‎USA, 2016, pp. 1–6.‎ </unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[20]	A. He, L. Wang, Y. Chen, K.-K. Wong, and M. Elkashlan, “Spectral and energy efﬁciency of uplink D2D underlaid massive MIMO ‎cellular ‎networks,” IEEE Trans. Commun., 2017, vol. 65, no. 9, pp. 3780–3793.‎</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[21]	A. Abdallah, M. Mansour, and A. Chehab, “A distance-based power ‎control scheme for D2D communications using stochastic geometry,” ‎in ‎Proc. IEEE Vehicular Technol. Conf. (VTC), Toronto, ON, Canada, 2017,  pp. 1–6.‎</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[22]	‎——, “Joint channel allocation and power control for D2D commu‎nications using stochastic geometry,” in IEEE WCNC. Conf. ‎‎(WCNC), ‎Barcelona, Spain, 2018.‎</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[23]	Gao, H., Smith, P. J., &amp; Clark, M. V. Theoretical reliability of MMSE linear diversity combining in Rayleigh-fading ‎additive interference channels. IEEE Trans. Commun., 1998, 46(5), 666-672.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[24]	Ma, J., Zhang, Y. J., Su, X., &amp; Yao, Y. On capacity of wireless ad hoc networks with MIMO MMSE receivers. IEEE ‎Trans. Wireless Commun., 2008, 7(12), 5493-5503.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>‎
[25]	T. D. Novlan, H. S. Dhillon, and J. G. Andrews, “Analytical modeling of ‎uplink cellular networks,” IEEE Trans. Wireless  Commun., 2013, vol. 12, no. ‎‎6, pp. 2669–2679.‎</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[26]	K. Hosseini, W. Yu, and R. S. Adve, “Large-scale MIMO versus network ‎MIMO for multicell interference mitigation,” IEEE J. Sel. Topics Signal ‎Process., 2014,  vol. 8, no. 5, pp. 930–941.‎</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[27]	U. Schilcher et al., “Interference functionals in Poisson networks,” IEEE ‎Trans. Inf. Theory, 2016, vol. 62, no. 1, pp. 370–383.‎</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[28]	Zh. Liu, L. Kuang, T. Hu, “Interference alignment for D2D based on power control and MMSE,” in proc. EAI International Conf. on Mobile Multimedia Commun., 2017, pp. 74–82.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[29]	H. Xu, W. Xu, Z. Yang, J. Shi, and M. Chen, “Pilot reuse among D2D users in D2D underlaid massive MIMO systems,” IEEE Trans. Veh. Technol., 2018, vol. 67, no. 1, pp. 467–482.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[30]	A. Ghazanfari, E. Bj¨ornson, and E. G. Larsson, “Optimized power control for Massive MIMO with underlaid D2D communications,” IEEE Trans. Commun.,2019, vol. 67, no. 4, pp. 2763–2778.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[31]	T. V. Chien, T. N. Canh, E. Björnson, and E. G. Larsson, “Power control in cellular massive MIMO with varying user activity: A deep learning solution," May 2019. [Online]. Available: https://arxiv.org/abs/ 1901.03620.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[32]	A. Abdallah, M. M. Mansour, and A. Chehab, ‘‘Power control and channel allocation for D2D underlaid cellular networks,’’ IEEE Trans. Commun., 2018, vol. 66, no. 7, pp. 3217–3234.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[33]	D. Stoyan, W. Kendall, and J. Mecke, Stochastic Geometry and its ‎Applications, 2nd ed. John Wiley and Sons, 1996.‎</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[34]	F. Baccelli and B. Błaszczyszyn, Stochastic Geometry and Wireless ‎Networks. NOW: Foundations and Trends in Networking, 2010.‎</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[35]	D. Moltchanov, “Distance distributions in random networks,” Ad Hoc ‎Networks, 2012, vol. 10, no. 6, pp. 1146–1166.‎</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Utilizing Gated Recurrent Units to Retain Long Term Dependencies with Recurrent Neural Network in Text Classification</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Nidhi</given_name><surname>Chandra</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Laxmi </given_name><surname>Ahuja</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sunil Kumar</given_name><surname>Khatri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Himanshu</given_name><surname>Monga</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>22</day><year>2021</year></publication_date><pages><first_page>89</first_page><last_page>102</last_page></pages><doi_data><doi>10.52547/jist.9.34.89</doi><resource>http://jist.ir/en/Article/15522</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15522</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15522</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15522</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15522</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15522</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15522</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15522</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] Andrew L , Maas, Raymond E. Daly, Peter T. Pham, Dan Huang, Andrew Y. Ng, and Christopher Potts. "Learning word vectors for sentiment analysis." In Proceedings of the 49th annual meeting of the association for computational linguistics: Human language technologies, pp. 142-150. 2011.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] Bengio, Yoshua, Patrice Simard, and Paolo Frasconi. "Learning long-term dependencies with gradient descent is difficult." IEEE transactions on neural networks 5, no. 2, 1994,pp 157-166.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] Bengio, Yoshua, Aaron Courville, and Pascal Vincent. "Representation learning: A review and new perspectives." IEEE transactions on pattern analysis and machine intelligence 35, no. 8, 2013, pp 1798-1828.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] B. Athiwaratkun, Ben, and Jack W. Stokes. "Malware classification with LSTM and GRU language models and a character-level CNN." In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2482-2486.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] Chen, Huimin, Maosong Sun, Cunchao Tu, Yankai Lin, and Zhiyuan Liu. "Neural sentiment classification with user and product attention." In Proceedings of the 2016 conference on empirical methods in natural language processing, 2016, pp. 1650-1659.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] Chen, Peng, Zhongqian Sun, Lidong Bing, and Wei Yang. "Recurrent attention network on memory for aspect sentiment analysis." In Proceedings of the 2017 conference on empirical methods in natural language processing,2017  pp. 452-461.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] Cho, Kyunghyun, Bart Van Merriënboer, Caglar Gulcehre, Dzmitry Bahdanau, Fethi Bougares, Holger Schwenk, and Yoshua Bengio. "Learning phrase representations using RNN encoder-decoder for statistical machine translation, 2014 ." arXiv preprint arXiv:1406.1078.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] Chung, Junyoung, Caglar Gulcehre, KyungHyun Cho, and Yoshua Bengio. "Empirical evaluation of gated recurrent neural networks on sequence modeling, 2014." arXiv preprint arXiv:1412.3555.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] C.Zhou, Chunting, Chonglin Sun, Zhiyuan Liu, and Francis Lau. "A C-LSTM neural network for text classification."2015,  arXiv preprint arXiv:1511.08630.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Collobert, Ronan, Jason Weston, Léon Bottou, Michael Karlen, Koray Kavukcuoglu, and Pavel Kuksa. "Natural language processing (almost) from scratch." Journal of machine learning research 12, no. ARTICLE 2011, pp 2493-2537.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] D. Tang, Duyu, Furu Wei, Nan Yang, Ming Zhou, Ting Liu, and Bing Qin. "Learning sentiment-specific word embedding for twitter sentiment classification." In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics ,Volume 1, 2014 , pp. 1555-1565.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] Hemmatian, Fatemeh, and Mohammad Karim Sohrabi. "A survey on classification techniques for opinion mining and sentiment analysis." Artificial Intelligence Review 52, no. 3, 2019,pp 1495-1545.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Guolong Liu, Xiaofei Xu, Bailong Deng, Siding Chen, and Li. "A hybrid method for bilingual text sentiment classification based on deep learning." In 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD),IEEE, 2016,pp. 93-98.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] Guan, Ziyu, Long Chen, Wei Zhao, Yi Zheng, Shulong Tan, and Deng Cai. "Weakly-Supervised Deep Learning for Customer Review Sentiment Classification." In IJCAI,2016,  pp. 3719-3725.</unstructured_citation></citation><citation key="ref15"><unstructured_citation> 
[15] Goldberg, Yoav. "A primer on neural network models for natural language processing." Journal of Artificial Intelligence Research 57,2016, pp. 345-420.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] H.Wang,  and Dequn Zhao. "Emotion analysis of microblog based on emotion dictionary and Bi-GRU." In 2020 Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC), . IEEE, 2020,  pp. 197-200.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]J. Pennington, R. Socher, and C. D. Manning. “Glove: Global vectors for word representation”. Conference on Empirical Methods in Natural Language Processing, 2014, pp. 1532-1543.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] Jabreel, Mohammed, Fadi Hassan, and Antonio Moreno. "Target-dependent sentiment analysis of tweets using bidirectional gated recurrent neural networks." In Advances in hybridization of intelligent methods, Springer, Cham, 2018, pp. 39-55.</unstructured_citation></citation><citation key="ref19"><unstructured_citation> 
[19] Junyoung Chung, Caglar Gulcehre, Kyunghyun Cho, Yoshua Bengio. "Gated feedback recurrent neural networks." In International conference on machine learning, PMLR, 2015,  pp. 2067-2075.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] Johnson, Rie, and Tong Zhang. "Effective use of word order for text categorization with convolutional neural networks," 2014, arXiv preprint arXiv:1412.1058.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] L Zhang, S Wang, B Liu. Deep learning for sentiment analysis: A survey. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. 2018 Jul, 8(4):e1253.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22[ Le, Quoc, and Tomas Mikolov. "Distributed representations of sentences and documents." In International conference on machine learning, PMLR, 2014, pp. 1188-1196.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]Li, Cheng, Xiaoxiao Guo, and Qiaozhu Mei. "Deep memory networks for attitude identification." In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining,2017, pp. 671-680.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] Luo LX. “Network text sentiment analysis method combining LDA text representation and GRU-CNN”, Personal and Ubiquitous Computing 23, no. 3 ,2019, pp 405-12.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]M Zulqarnain, R Ghazali, MG Ghouse.” Efficient processing of GRU based on word embedding for text classification”, International Journal of Informatics Visualisation, vol 3 No 4, 2019, pp.377-383.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] MU Salur, I Aydin. “A novel hybrid deep learning model for sentiment classification”. IEEE Access. 2020 Mar 23;8,pp 58080-93.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] Moraes, Rodrigo, João Francisco Valiati, and Wilson P. GaviãO Neto. "Document-level sentiment classification: An empirical comparison between SVM and ANN." Expert Systems with Applications 40, no. 2 , 2013, pp  621-633.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]  Ö Yildirim. "A novel wavelet sequence based on deep bidirectional LSTM network model for ECG signal classification." Computers in biology and medicine 96 , 2018, pp189-202.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] R. Ni and H. Cao, "Sentiment Analysis based on GloVe and LSTM-GRU," In 2020 39th Chinese Control Conference (CCC), IEEE, 2020, pp. 7492-7497.</unstructured_citation></citation><citation key="ref30"><unstructured_citation> 
[30] S Yan, J Chai, L Wu. "Bidirectional GRU with Multi-Head Attention for Chinese NER." In 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC), IEEE, 2020,  pp. 1160-1164.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] S Yang, X Yu, Y Zhou. "LSTM and GRU Neural Network Performance Comparison Study: Taking Yelp Review Dataset as an Example." In 2020 International Workshop on Electronic Communication and Artificial Intelligence , IWECAI, IEEE, 2020,  pp. 98-101.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] Tang, Duyu, Bing Qin, and Ting Liu. "Document modeling with gated recurrent neural network for sentiment classification." In Proceedings of the 2015 conference on empirical methods in natural language processing,2015, pp. 1422-1432.</unstructured_citation></citation><citation key="ref33"><unstructured_citation> 
[33]Tang, Duyu, Bing Qin, and Ting Liu. "Learning semantic representations of users and products for document level sentiment classification." In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing ,Volume 1, 2015, pp. 1014-1023.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]Tai, Kai Sheng, Richard Socher, and Christopher D. Manning. "Improved semantic representations from tree-structured long short-term memory networks." 2015, arXiv preprint arXiv:1503.00075.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]Thet, Tun Thura, Jin-Cheon Na, and Christopher SG Khoo. "Aspect-based sentiment analysis of movie reviews on discussion boards." Journal of information science 36, no. 6 2010, pp 823-848.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]T. Mikolov, , Ilya Sutskever, Kai Chen, Greg Corrado, and Jeffrey Dean. "Distributed representations of words and phrases and their compositionality."2013,  arXiv preprint arXiv:1310.4546.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]Turian, Joseph, Lev Ratinov, and Yoshua Bengio. "Word representations: a simple and general method for semi-supervised learning." In Proceedings of the 48th annual meeting of the association for computational linguistics,2010, pp. 384-394.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]Y. Pan and M. Liang, "Chinese text sentiment analysis based on bi-gru and self-attention." In 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), . IEEE, 2020, vol. 1, pp. 1983-1988.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]Zhou, Zhiyuan, Yuan Qi, Zheng Liu, Chengchao Yu, and Zhihua Wei. "A C-GRU neural network for rumors detection." In 2018 5th IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), IEEE, 2018, pp. 704-708.</unstructured_citation></citation><citation key="ref40"><unstructured_citation> 
[40] Zhang, Wei, Quan Yuan, Jiawei Han, and Jianyong Wang. "Collaborative multi-Level embedding learning from reviews for rating prediction." In IJCAI, vol. 16, pp. 2986-2992. 2016.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41] Data Set: Large Movie Review Dataset v1.0  by Andrew L. Maas, Raymond E. Daly, Peter T. Pham, Dan Huang, Andrew Y. Ng, and Christopher Potts. (2011). Available http://ai.stanford.edu/~amaas/data/sentiment/
.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>The Development of a Hybrid Error Feedback Model for Sales Forecasting</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mehdi</given_name><surname>Farrokhbakht Foumani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sajad</given_name><surname>Moazami Goudarzi</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>22</day><year>2021</year></publication_date><pages><first_page>131</first_page><last_page>140</last_page></pages><doi_data><doi>10.52547/jist.9.34.131</doi><resource>http://jist.ir/en/Article/15603</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15603</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15603</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15603</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15603</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15603</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15603</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15603</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	B. Sohrabi, I. RaeesiVanani, N. Nikaein and S. Kakavand, "A predictive analytics of physiciansprescription and pharmacies sales correlation using data mining", International Journal of Pharmaceutical and Healthcare Marketing, vol.13, No.3, pp. 346-363, 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Kaneko and K. Yada, "A Deep Learning Approach for the Prediction of Retail Store Sales", In Data Mining Workshops (ICDMW), 2016 IEEE 16th International Conference, 2016, December, pp. 531-537.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Bohanec, M.K. Borštnar and M. Robnik-Šikonja, "Explaining machine learning models in sales predictions", Expert Systems with Applications, vol. 71, pp. 416-428, 2017.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Thomassey, "Sales forecasts in clothing industry: The key success factor of the supply chain management", International Journal of Production Economics, Vol. 128, No. 2, pp. 470-483, 2010.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Demiriz, "Demand Forecasting based on Pairwise Item Associations",Procedia Computer Science, vol. 36, pp. 261-268, 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Thomassey,"Sales forecasting in apparel and fashion industry: A review”, Intelligent fashion forecasting systems: Models and applications,Springer, Berlin, Heidelberg, pp. 9-27, 2014.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	B. Sohrabi, I. RaeesiVanani, A. Gooyavar and N. Naderi, " Predicting the Readmission of Heart Failure Patients through Data Analytics ", Journal of Information &amp; Knowledge Management, Vol.18, No.1, pp.1950012-1, 1950012-20, 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	N. Liu, S. Ren, T.M. Chio, C.L.Hui,andS.F.Ng,"Sales forecasting for fashion retailing service industry: a review", Mathematical Problems in Engineering, Vol.20, No. 2, pp. 22-29, 2013.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Z.L. Sun, T.M. Choi, K.F. Au, and Y. Yu,"Sales forecasting using extreme learning machine with applications in fashion retailing", Decision Support Systems, Vol.46, No. 1, pp. 411-419, 2008.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Q.Y.Zhu, A.K.Qin, P.N.Suganthan, and G.B.Huang, "Evolutionary extreme learning machine", Pattern recognition, Vol.38, No. 10, pp.1759-1763, 2005.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	W. K. Wong, and Z. X. Guo,"A hybrid intelligent model for medium-term sales forecasting in fashion retail supply chains using extreme learning machine and harmony search algorithm", International Journal of Production Economics, Vol.128, No. 2, pp.614-624, 2010.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	X. Yu, Z. Qi, and Y. Zhao,"Support vector regression for newspaper/magazine sales forecasting", Procedia Computer Science,vol. 17, pp. 1055-1062, 2013.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	G. Di Pillo, V.Latorre, S. Lucidi, and E. Procacci,"An application of support vector machines to sales forecasting under promotions", 4OR, Vol.14, No. 3, pp. 309-325, 2016.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	E. Aramaki, S. Maskawa, and M. Morita,"Twitter catches the flu: detecting influenza epidemics using Twitter", In Proceedings of the conference on empirical methods in natural language processing, Association for Computational Linguistics, N. Eight Street, Stroudsburg, PA, 18360 United States, 2011, pp. 1568-1576.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Asur and B.A. Huberman,"Predicting the future with social media", In 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), 2010, IEEE, Toronto, Canada,Vol.1, pp. 492-499.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. Bollen, H. Mao, and X. Zeng,"Twitter mood predicts the stock market", Journal of computational science, Vol. 2, No. 2, pp. 1-8, 2011.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	H. Choi, and H. Varian,"Predicting the present with Google Trends", Economic Record, Vol.88, No. S1, pp.2-9, 2012.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	V. Dhar, and E.A. Chang,"Does chatter matter? The impact of user-generated content on music sales", Journal of Interactive Marketing, Vol.23, No. 4, pp.300-307, 2009.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	D. L. Donoho,"High-dimensional data analysis: The curses and blessings of dimensionality", AMS math challenges lecture, pp. 1-32, 2000.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	G. H. John, R. Kohavi, and k. Pfleger,"Irrelevant features and the subset selection problem", In Machine Learning Proceedings, Proceedings of the Eleventh International Conference,1994,Elsevier, Rutgers University, New Brunswick, NJ, pp. 121-129.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	R. Meiri, and J. Zahavi,"Using simulated annealing to optimize the feature selection problem in marketing applications", European Journal of Operational Research, Vol.171. No. 3, pp.842-858, 2006.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	V. Kumar, and R.P. Leone,"Measuring the effect of retail store promotions on brand and store substitution", Journal of Marketing Research, Vol.25, No. 2, pp. 178-185,1988.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	R.G. Walters,"Assessing the impact of retail price promotions on product substitution, complementary purchase, andinterstore sales displacement", The Journal of Marketing, Vol.55, No. 2, pp. 17-28, 1991.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	H.J. Heerde, S. Gupta, and D.R. Wittink,"Is 75% of the sales promotion bump due to brand switching? No, only 33% is", Journal of Marketing Research, Vol.40, No. 4, pp.481–491, 2003.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. Ma, R. Fildes, and T. Huang. "Demand forecasting with high dimensional data: The case of SKU retail sales forecasting with intra-and inter-category promotional information", European Journal of Operational Research, Vol.249, No. 1, pp.245-2572, 2016.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	K. Ord, and R. Fildes,Principles of business forecasting, Mason, 1sted, OH: South Western Cengage Learning, 2013.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Ö. GürAli, S. Sayın, T. Van Woensel, and J. Fransoo,"SKU demand forecasting in the presence of promotions", Expert Systems with Applications, Vol.36, No. 10, pp.12340-12348, 2009.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	P. Baecke, S. De Baets, and K. Vanderheyden,"Investigating the added value of integrating human judgement into statistical demand forecasting systems", International Journal of Production Economics, Vol.191, pp.85-96, 2017.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	C. Li, and A. Lim,"greedy aggregation–decomposition method for intermittent demand forecasting in fashion retailing", European Journal of Operational Research, Vol.269, No. 3, pp.860-869, 2018.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	N. Kourentzes, and F. Petropoulos,"Forecasting with multivariate temporal aggregation: The case of promotional modelling", International Journal of Production Economics, Vol.181, part A,pp.145-153, 2016.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	M.Z. Babai, Y. Dallery, S. Boubaker, andR.Kalai,"A new method to forecast intermittent demand in the presence of inventory obsolescence", International Journal of Production Economics, Vol.209, pp.30-41, 2019.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	L. F. Simmons,"Time-series decomposition using the sinusoidal model", International Journal of Forecasting, Vol. 6, No. 4, pp. 485-495, 1990.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	L.I. Zheng-Feng, X.U. Guang-Jin, W.A. Jia-Jun, D.U. Guo-Rong, C.A. Wen-Sheng and SH. Xue-Guang, "Outlier Detection for Multivariate Calibration in Near Infrared Spectroscopic Analysis by Model Diagnostics",Chinese Journal of Analytical Chemistry, vol.44, No.2, pp.305-309, 2016 Feb.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improvement of Firefly Algorithm using Particle Swarm Optimization and Gravitational Search Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mahdi</given_name><surname>Tourani</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>22</day><year>2021</year></publication_date><pages><first_page>123</first_page><last_page>130</last_page></pages><doi_data><doi>10.52547/jist.9.34.123</doi><resource>http://jist.ir/en/Article/15605</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15605</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15605</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15605</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15605</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15605</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15605</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15605</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1].	N. Bacanin, M. Tuba, "Firefly Algorithm for Cardinality Constrained Mean-Variance Portfolio Optimization Problem with Entropy Diversity Constraint", Scientific World Journal, Vol. 2014, P.P. 1-16, May 2014.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2].	W.W. Hwu, "GPU Computing Gems Jade Edition", Morgan Kaufmann press, 2011.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3].	X.S. Yang, "Nature-Inspired Metaheuristic Algorithms", Luniver Press. 2008.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4].	N. F. Johari, A. M. Zain, N.H. Mustaffa, A. Udin, "Firefly Algorithm for Optimization Problem", Applied Mechanics and Materials, Vol. 421, P.P. 512-517, 2013.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5].	A.H. Damia, M. Esnaashari, "Automated Test Data Generation Using a Combination of Firefly Algorithm and Asexual Reproduction Optimization Algorithm", International Journal of Web Research, Vol. 3, No. 1, P.P. 19-28, Spring-Summer, 2020.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6].	I. Brajević, P.S. Stanimirović, S. Li, X. Cao, "A Hybrid Firefly and Multi-Strategy Artificial Bee Colony Algorithm", International Journal of Computational Intelligence Systems, Vol. 13, P.P. 810-821, 2020.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7].	F. Wahid1, M. Sultan zia, R.N. Bin Rais, M. AAmir, U. Muneer butt, M. Ali, A. Ahmed, I. Ali khan, O. KHalid, "An Enhanced Firefly Algorithm Using Pattern Search for Solving Optimization Problems", IEEE Access, Vol. 8, P.P. 148264-148288, 2020.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8].	W. Alomoush, K. Omar, A. Alrosan, Y. M. Alomari, D. Albashish, A. Almomani, "Firefly photinus search algorithm", Journal of King Saud University – Computer and Information Sciences, Vol. 32, P.P. 599–607, 2020.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9].	SH. Mashhadi Farahani, A.A. Abshouri, B. Nasiri, M.R. Meybodi, "Some Hybrid Models to Improve Firefly Algorithm Performance", International Journal of Artificial Intelligence, Vol. 8, P.P. 1-20, 2012.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10].	G.G. Wang, L. Guo, H. Duan, H. Wang, "A New Improved Firefly Algorithm for Global Numerical Optimization", Journal of Computational and Theoretical Nanoscience, Vol. 11, P.P. 477–485, 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11].	F. Wahid, R. Ghazali, L.H. Ismail, "Improved Firefly Algorithm Based on Genetic Algorithm Operators for Energy Efficiency in Smart Buildings", Arabian Journal for Science and Engineering, Vol. 44, P.P. 4027-4047, 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12].	J. Nayak, B. Naik, P. Dinesh, K. Vakula, P.B. Dash, "Firefly Algorithm in Biomedical and Health Care: Advances, Issues and Challenges", SN Computer Science. Vol. 1, P.P. 1-36, 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13].	H. Zhang, J Yang, J. Zhang, P. Song, X. Xu, "A Firefly Algorithm Optimization-Based Equivalent Consumption Minimization Strategy for Fuel Cell Hybrid Light Rail Vehicle", Energies, Vol. 12, P.P. 1-18, 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14].	M. Zile, "Routine Test Analysis in Power Transformers by Using Firefly Algorithm and Computer Program", IEEE Access, Vol. 8, P.P. 132033-132040, 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15].	S.P. Mishra, P.K. Dash, "Short-term prediction of wind power using a hybrid pseudo-inverse Legendre neural network and adaptive firefly algorithm", Neural Computing and Applications, Vol. 31, P.P. 2243–2268, 2019.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16].	X.S. Yang, "Firefly Algorithm for Multimodal Optimization", SAGA 2009, Lecture Notes in Computer Science, Vol. 5792, P.P. 169-178, 2009.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17].	Rashedi, “Gravitational search algorithm,” M.Sc. thesis, Dept. Elect. Eng., Shahid Bahonar University of Kerman, Kerman, Iran, 2007.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18].	E. Rashedi, H. Nezamabadi-Pour, S. Saryazdi, "GSA: A gravitational search algorithm,” Information Science, Vol. 179, P.P. 2232-2248, June 2009.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19].	P. Tharawetcharak, T. Karot, C. Pornsing, "An Improved Gravitational Coefficient Function for Enhancing Gravitational Search Algorithm’s Performance", International Journal of Machine Learning and Computing, Vol. 9, P.P. 261-266, June 2019.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20].	R.C. Eberhart, J. Kennedy, "A new optimizer using particle swarm theory", Proceedings of the Sixth International Symposium on Micromachine and Human Science, Nagoya, Japan, P.P. 39–43, 1995.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21].	J. Kennedy, R.C. Eberhart, "Particle swarm optimization", in Proceedings of IEEE International Conference on Neural Networks, Piscataway, NJ, P.P. 1942–1948, 1995.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22].	Y. Jiang, T. Hu, C.C. Huang, X. Wu, "An improved particle swarm optimization algorithm", Applied Mathematics and Computation, Vol. 193, P.P. 231–239, 2007.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23].	X. Yao, Y. Liu, G. Lin, "Evolutionary Programming Made Faster", IEEE Transactions on Evolutionary Computation, Vol. 3, No. 2, P.P. 82-102, 1999.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New Game Theory-Based Algorithm for Target Coverage in Directional Sensor Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Elham</given_name><surname>Golrasan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>marzieh</given_name><surname>varposhti</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>22</day><year>2021</year></publication_date><pages><first_page>103</first_page><last_page>112</last_page></pages><doi_data><doi>10.52547/jist.9.34.103</doi><resource>http://jist.ir/en/Article/15609</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15609</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15609</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15609</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15609</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15609</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15609</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15609</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	B. D. Deebak and F. Al-Turjman, "A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks," Ad Hoc Networks, vol. 97, p. 102022, 2020.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	K. Evbarunegbe, "Coverage in Wireless Sensor Networks: A Survey," Texas A&amp;M University-Kingsville, 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Harizan and P. Kuila, "Evolutionary algorithms for coverage and connectivity problems in wireless sensor networks: a study," in Design Frameworks for Wireless Networks: Springer, 2020, pp. 257-280.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Rahili, J. Lu, W. Ren, and U. M. Al-Saggaf, "Distributed Coverage Control of Mobile Sensor Networks in Unknown Environment Using Game Theory: Algorithms and Experiments," IEEE Transactions on Mobile Computing, vol. 17, no. 6, pp. 1303-1313, 2018.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. R. Marden, H. P. Young, and L. Y. Pao, "Achieving pareto optimality through distributed learning," SIAM Journal on Control and Optimization, vol. 52, no. 5, pp. 2753-2770, 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	T. AlSkaif, M. G. Zapata, and B. Bellalta, "Game theory for energy efficiency in wireless sensor networks: Latest trends," Journal of Network and Computer Applications, vol. 54, pp. 33-61, 2015.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	E. Golrasan, H. SHIRAZI, and K. Dadashtabar Ahmadi, "Sensing Radius Adjustment in Wireless Sensor Networks: A Game Theoretical Approach," INTERNATIONAL JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY RESEARCH, vol. 11, no. 4, pp. -, 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	F. Hajjej, M. Hamdi, R. Ejbali, and M. Zaied, "A distributed coverage hole recovery approach based on reinforcement learning for Wireless Sensor Networks," Ad Hoc Networks, vol. 101, p. 102082, 2020.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	J. R. Marden and J. S. Shamma, "Game theory and control," Annual Review of Control, Robotics, and Autonomous Systems, vol. 1, pp. 105-134, 2018.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	N. Mehendale, "Game Theory-Based Planning of Nodes in Wireless Sensor Networks for Optimum Coverage With Maximum Battery Life," Available at SSRN 3639170, 2020.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	H. Mostafaei, M. U. Chowdhury, and M. S. Obaidat, "Border surveillance with WSN systems in a distributed manner," IEEE Systems Journal, vol. 12, no. 4, pp. 3703-3712, 2018.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	N. Li and J. R. Marden, "Designing games for distributed optimization," IEEE Journal of Selected Topics in Signal Processing, vol. 7, no. 2, pp. 230-242, 2013.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	B. S. Pradelski and H. P. Young, "Learning efficient Nash equilibria in distributed systems," Games and Economic behavior, vol. 75, no. 2, pp. 882-897, 2012.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Algorithmic game theory. Cambridge University Press, 2007.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Habibi, H. Mahboubi, and A. G. Aghdam, "A gradient-based coverage optimization strategy for mobile sensor networks," IEEE Transactions on Control of Network Systems, vol. 4, no. 3, pp. 477-488, 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. Ai and A. A. Abouzeid, "Coverage by directional sensors in randomly deployed wireless sensor networks," Journal of Combinatorial Optimization, vol. 11, no. 1, pp. 21-41, 2006.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	H. Mohamadi, S. Salleh, and M. N. Razali, "Heuristic methods to maximize network lifetime in directional sensor networks with adjustable sensing ranges," Journal of Network and Computer Applications, vol. 46, pp. 26-35, 2014.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. Alibeiki, H. Motameni, and H. Mohamadi, "A new genetic-based approach for maximizing network lifetime in directional sensor networks with adjustable sensing ranges," Pervasive and Mobile Computing, vol. 52, pp. 1-12, 2019.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. Yu, S. Wan, X. Cheng, and D. Yu, "Coverage contribution area based $ k $-coverage for wireless sensor networks," IEEE Transactions on Vehicular Technology, vol. 66, no. 9, pp. 8510-8523, 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	J.-P. Sheu and H.-F. Lin, "Probabilistic coverage preserving protocol with energy efficiency in wireless sensor networks," in Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE, 2007, pp. 2631-2636: IEEE.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	C.-I. Weng, C.-Y. Chang, C.-Y. Hsiao, C.-T. Chang, and H. Chen, "On-supporting energy balanced $ k $-barrier coverage in wireless sensor networks," IEEE Access, vol. 6, pp. 13261-13274, 2018.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	L. Jing, W. Ruchuan, H. Huang, and S. Lijuan, "Voronoi-based coverage optimization for directional sensor networks," Wireless Sensor Network, vol. 1, no. 05, p. 417, 2009.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	T.-W. Sung and C.-S. Yang, "Distributed Voronoi-based self-redeployment for coverage enhancement in a mobile directional sensor network," International Journal of Distributed Sensor Networks, vol. 9, no. 11, p. 165498, 2013.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. R. Marden and J. S. Shamma, "Game Theory and Control," Annual Review of Control, Robotics, and Autonomous Systems, no. 0, 2017.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. Rahili, "Distributed Optimization in Multi-Agent Systems: Game Theory Based Sensor Coverage and Continuous-Time Convex Optimization," UC Riverside, 2016.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Movassagh and H. S. Aghdasi, "Game theory based node scheduling as a distributed solution for coverage control in wireless sensor networks," Engineering Applications of Artificial Intelligence, vol. 65, pp. 137-146, 2017.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	M. Varposhti, P. Saleh, S. Afzal, and M. Dehghan, "Distributed area coverage in mobile directional sensor networks," in 2016 8th International Symposium on Telecommunications (IST), 2016, pp. 18-23: IEEE.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	M. Varposhti, V. Hakami, and M. Dehghan, "Distributed coverage in mobile sensor networks without location information," Autonomous Robots, vol. 44, no. 3, pp. 627-645, 2020.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	M. Hasanbeig and L. Pavel, "Distributed Coverage Control by Robot Networks in Unknown Environments Using a Modified EM Algorithm," World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 11, no. 7, pp. 721-729, 2017.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	R. Cerulli, R. De Donato, and A. Raiconi, "Exact and heuristic methods to maximize network lifetime in wireless sensor networks with adjustable sensing ranges," European Journal of Operational Research, vol. 220, no. 1, pp. 58-66, 2012.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	J. R. Marden, "Learning in large-scale games and cooperative control," CALIFORNIA UNIV BERKELEY DEPT OF MECHANICAL ENGINEERING2007.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	H. P. Young, Individual strategy and social structure: An evolutionary theory of institutions. Princeton University Press, 2001.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	D. P. Foster and H. P. Young, "Regret testing: learning to play Nash equilibrium without knowing you have an opponent," Theoretical Economics, vol. 1, no. 3, pp. 341-367, 2006.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	I. Ariel and Y. Babichenko, Average testing and the efficient boundary. Center for the study of Rationality, 2011.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	D. Fudenberg and E. Maskin, "The folk theorem in repeated games with discounting or with incomplete information," in A Long-Run Collaboration On Long-Run Games: World Scientific, 2009, pp. 209-230.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	H. P. Young, "Learning by trial and error," Games and economic behavior, vol. 65, no. 2, pp. 626-643, 2009.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	H. P. Young and B. S. Pradelski, "Learning Efficient Nash Equilibria in Distributed Systems," 2010.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	A. Menon and J. S. Baras, "Convergence guarantees for a decentralized algorithm achieving Pareto optimality," in 2013 American Control Conference, 2013, pp. 1932-1937: IEEE.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Optimal Clustering-based Routing Protocol Using Self-Adaptive Multi-Objective TLBO For Wireless Sensor Network</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Ali</given_name><surname>Sedighimanesh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hessam </given_name><surname>Zandhessami</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahmood </given_name><surname>Alborzi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammadsadegh </given_name><surname>Khayyatian</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>22</day><year>2021</year></publication_date><pages><first_page>113</first_page><last_page>122</last_page></pages><doi_data><doi>10.52547/jist.9.34.113</doi><resource>http://jist.ir/en/Article/15640</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15640</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15640</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15640</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15640</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15640</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15640</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15640</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	N. R. Roy and P. Chandra, “Energy dissipation model for wireless sensor networks: a survey,” Int. J. Inf. Technol., vol. 12, no. 4, pp. 1343–1353, 2020.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Sedighimanesh* and H. Z. H. and A. Sedighimanesh, “Routing Algorithm based on Clustering for Increasing the Lifetime of Sensor Networks by Using Meta-Heuristic Bee Algorithms,” International Journal of Sensors, Wireless Communications and Control, vol. 10, no. 1. pp. 25–36, 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Belfkih, C. Duvallet, and B. Sadeg, “A survey on wireless sensor network databases,” Wirel. Networks, vol. 25, no. 8, pp. 4921–4946, 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Shahraki, A. Taherkordi, Ø. Haugen, and F. Eliassen, “Clustering objectives in wireless sensor networks: A survey and research direction analysis,” Comput. Networks, vol. 180, p. 107376, 2020.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	V. Parashar, B. Mishra, and G. S. Tomar, “Energy Aware Communication in Wireless Sensor Network: A Survey,” Mater. Today Proc., vol. 29, pp. 512–523, 2020.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	D. K. Sah and T. Amgoth, “Renewable energy harvesting schemes in wireless sensor networks: A Survey,” Inf. Fusion, vol. 63, pp. 223–247, 2020.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Sedighimanesh* and H. Z. and A. Sedighimanesh, “Presenting the Hybrid Algorithm of Honeybee - Harmony in Clustering and Routing of Wireless Sensor Networks,” International Journal of Sensors, Wireless Communications and Control, vol. 9, no. 3. pp. 357–371, 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Kochhar, P. Kaur, P. Singh, and S. Sharma, “Protocols for wireless sensor networks: A survey,” Journal of Telecommunications and Information Technology. 2018.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Shokouhifar and A. Jalali, “A new evolutionary based application specific routing protocol for clustered wireless sensor networks,” AEU - Int. J. Electron. Commun., vol. 69, no. 1, pp. 432–441, Jan. 2015.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Wang, J. Yu, M. Atiquzzaman, H. Chen, and L. Ni, “CRPD: a novel clustering routing protocol for dynamic wireless sensor networks,” Pers. Ubiquitous Comput., vol. 22, no. 3, pp. 545–559, 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Khabiri and A. Ghaffari, “Energy-Aware Clustering-Based Routing in Wireless Sensor Networks Using Cuckoo Optimization Algorithm,” Wirel. Pers. Commun., vol. 98, no. 3, pp. 2473–2495, 2018.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Performance Analysis of Hybrid SOM and AdaBoost Classifiers for Diagnosis of Hypertensive Retinopathy</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Wiharto</given_name><surname>Wiharto</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Esti</given_name><surname>Suryani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Murdoko</given_name><surname>Susilo</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>22</day><year>2021</year></publication_date><pages><first_page>79</first_page><last_page>88</last_page></pages><doi_data><doi>10.52547/jist.9.34.79</doi><resource>http://jist.ir/en/Article/15670</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15670</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15670</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15670</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15670</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15670</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15670</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15670</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	W. Wiharto and E. Suryani, “The Review of Computer Aided Diagnostic Hypertensive Retinopathy Based on The Retinal Image Processing,” in The 2nd Sriwijaya international Conference on Science, Engineering, and Technology [SICEST], Palembang, Indonesia, 2018, vol. 690, pp. 1–9. doi: 10.1088/1757-899X/620/1/012099.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	F. Garcia-Lamont, J. Cervantes, A. López, and L. Rodriguez, “Segmentation of images by color features: A survey,” Neurocomputing, vol. 292, pp. 1–27, May 2018, doi: 10.1016/j.neucom.2018.01.091.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	W. Wiharto and E. Suryani, “The Analysis Effect of Cluster Numbers On Fuzzy C-Means Algorithm for Blood Vessel Segmentation of Retinal Fundus Image,” in IEEE The 2nd International Conference on Information and Communications Technology, Yogyakarta, Indonesia, 2019, pp. 1–5. doi: 10.1109/ICOIACT46704.2019.8938583.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	W. Wiharto and E. Suryani, “The Segmentation Analysis of Retinal Image Based on K-means Algorithm for Computer-Aided Diagnosis of Hypertensive Retinopathy,” Indonesian Journal of Electrical Engineering and Informatics (IJEEI), vol. 8, no. 2, pp. 419–426, 2020, doi: 10.11591/ijeei.v8i2.1287.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	W. Wiharto, E. Suryani, and M. Susilo, “The Hybrid Method of SOM Artiﬁcial Neural Network and Median Thresholding for Segmentation of Blood Vessels in the Retina Image Fundus,” International Journal of Fuzzy Logic and Intelligent Systems, vol. 19, no. 4, pp. 323–331, 2019.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. Shafiei and S. Fekri-Ershad, “Detection of Lung Cancer Tumor in CT Scan Images Using Novel Combination of Super Pixel and Active Contour Algorithms,” Traitement du Signal, vol. 37, no. 6, pp. 1029–1035, Dec. 2020, doi: 10.18280/ts.370615.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	C. Lupascu and D. Tegolo, “Automatic unsupervised segmentation of retinal vessels using self-organizing maps and k-means clustering,” in Computational Intelligence Methods for …, Berlin, Heidelberg, 2011, vol. 6685, pp. 263–274. doi: 10.1007/978-3-642-21946-7_21.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	C. Budayan, I. Dikmen, and M. T. Birgonul, “Comparing the performance of traditional cluster analysis, self-organizing maps and fuzzy C-means method for strategic grouping,” Expert Systems with Applications, vol. 36, no. 9, pp. 11772–11781, 2009, doi: 10.1016/j.eswa.2009.04.022.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Arumugadevi and V. Seenivasagam, “Comparison of Clustering Methods for Segmenting Color Images,” Indian Journal of Science and Technology, vol. 8, no. 7, pp. 670–677, 2015, doi: 10.17485/ijst/2015/v8i7/62862.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	O. A. Abbas, “Comparisons Between Data Clustering Algorithms,” The International Arab Journal of Information Technology, vol. 5, no. 3, pp. 320–325, 2008.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	K. K. Jassar, “Comparative Study and Performance Analysis of  Clustering Algorithms,” IJCA Proceedings on International Conference on ICT for Healthcare, vol. ICTHC 2015, no. 1, pp. 1–6, 2016.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	P. Zhu et al., “The relationship of retinal vessel diameters and fractal dimensions with blood pressure and cardiovascular risk factors,” PLoS ONE, vol. 9, no. 9, pp. 1–10, 2014, doi: 10.1371/journal.pone.0106551.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	N. Popovic, M. Radunovic, J. Badnjar, and T. Popovic, “Fractal dimension and lacunarity analysis of retinal microvascular morphology in hypertension and diabetes,” Microvascular Research, vol. 118, no. 2018, pp. 36–43, 2018, doi: 10.1016/j.mvr.2018.02.006.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	H. A. Crystal et al., “Association of the Fractal Dimension of Retinal Arteries and Veins with Quantitative Brain MRI Measures in HIV-Infected and Uninfected Women,” PLoS ONE, vol. 11, no. 5, pp. 1–11, 2016, doi: 10.1371/journal.pone.0154858.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	E. V. L. Costa and R. A. Nogueira, “Fractal, multifractal and lacunarity analysis applied in retinal regionsof diabetic patients with and without non-proliferative diabetic retinopathy,” Fractal Geometry and Nonlinear Anal in Med and Biol, vol. 1, no. 3, pp. 112–119, 2016, doi: 10.15761/FGNAMB.1000118.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	W. Wiharto, E. Suryani, and M. Yahya Kipti, “Assessment of Early Hypertensive Retinopathy using Fractal Analysis of Retinal Fundus Image,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 16, no. 1, pp. 445-454, 2018, doi: 10.12928/telkomnika.v16i1.6188.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. F. Syahputra, I. Aulia, R. F. Rahmat, and others, “Hypertensive retinopathy identification from retinal fundus image using probabilistic neural network,” in 2017 International Conference on Advanced Informatics, Concepts, Theory, and Applications (ICAICTA), 2017, pp. 1–6.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	K. Narasimhan, V. C. Neha, and K. Vijayarekha, “Hypertensive retinopathy diagnosis from fundus images by estimation of AVR,” Procedia Engineering, vol. 38, no. 2012, pp. 980–993, 2012, doi: 10.1016/j.proeng.2012.06.124.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	N. Hutson, A. Karan, J. A. Adkinson, P. Sidiropoulos, I. Vlachos, and L. Iasemidis, “Classification of Ocular Disorders Based on Fractal and Invariant Moment Analysis of Retinal Fundus Images,” in 2016 32nd Southern Biomedical Engineering Conference (SBEC), Shreveport, LA, USA, Mar. 2016, pp. 57–58. doi: 10.1109/SBEC.2016.21.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	U. G. Abbasi and U. M. Akram, “Classification of blood vessels as arteries and veins for diagnosis of hypertensive retinopathy,” in 2014 10th International Computer Engineering Conference: Today Information Society What’s Next?, ICENCO 2014, Giza, Egypt, 2014, pp. 5–9. doi: 10.1109/ICENCO.2014.7050423.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	B. K. Triwijoyo, W. Budiharto, and E. Abdurachman, “The Classification of Hypertensive Retinopathy using Convolutional Neural Network,” Procedia Computer Science, vol. 116, pp. 166–173, 2017, doi: 10.1016/j.procs.2017.10.066.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	X. Miao and J. S. Heaton, “A comparison of random forest and Adaboost tree in ecosystem classification in east Mojave Desert,” in 2010 18th International Conference on Geoinformatics, Beijing, China, Jun. 2010, pp. 1–6. doi: 10.1109/GEOINFORMATICS.2010.5567504.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	C. A. Lupascu, D. Tegolo, and E. Trucco, “FABC: Retinal Vessel Segmentation Using AdaBoost,” IEEE Trans. Inform. Technol. Biomed., vol. 14, no. 5, pp. 1267–1274, Sep. 2010, doi: 10.1109/TITB.2010.2052282.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	N. Dey, A. B. Roy, M. Pal, and A. Das, “FCM Based Blood Vessel Segmentation Method for Retinal Images,” International Journal of Computer Science and Network (IJCSN), vol. 1, no. 3, pp. 1–5, 2012.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	G. B. Kande, T. S. Savithri, and P. Subbaiah, “Segmentation of vessels in fundus images using spatially weighted fuzzy c-means clustering algorithm,” International journal of computer science and network security, vol. 7, no. 12, pp. 102–109, 2007.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	R. A. Aras, T. Lestari, H. Adi Nugroho, and I. Ardiyanto, “Segmentation of retinal blood vessels for detection of diabetic retinopathy: A review,” Communications in Science and Technology, vol. 1, no. 2016, pp. 33–41, 2016, doi: 10.21924/cst.1.1.2016.13.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Ş. Talu, C. Vlǎduţiu, L. A. Popescu, C. A. Lupaşcu, Ş. C. Vesa, and S. D. Ţǎlu, “Fractal and lacunarity analysis of human retinal vessel arborisation in normal and amblyopic eyes,” Human and Veterinary Medicine, vol. 5, no. 2, pp. 45–51, 2013.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	T. Acharya and K. R. Ray, Image Processing: Principles and Applications. USA: John Willey &amp; Sons, 2005.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	B. B. Mandelbrot, The fractal geometry of nature, vol. 173. WH freeman New York, 1983.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	A. R. Backes and O. M. Bruno, “A new approach to estimate fractal dimension of texture images,” in In: Elmoataz A., Lezoray O., Nouboud F., Mammass D. (eds) Image and Signal Processing. ICISP 2008. Lecture Notes in Computer Science, Berlin, Heidelberg, 2008, vol. 5099, pp. 136–143. doi: 10.1007/978-3-540-69905-7_16.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	C. Allain and M. Cloitre, “Characterizing the lacunarity of random and deterministic fractal sets,” Physical Review A, vol. 44, no. 6, pp. 3552–3558, 1991, doi: 10.1103/PhysRevA.44.3552.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	M.-K. Hu, “Visual pattern recognition by moment invariants,” IRE transactions on information theory, vol. 8, no. 2, pp. 179–187, 1962.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	Z. Wu et al., “Application of image retrieval based on convolutional neural networks and Hu invariant moment algorithm in computer telecommunications,” Computer Communications, vol. 150, pp. 729–738, Jan. 2020, doi: 10.1016/j.comcom.2019.11.053.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	S. Lefkovits and L. Lefkovits, “Gabor Feature Selection Based on Information Gain,” Procedia Engineering, vol. 181, no. 2017, pp. 892–898, 2017, doi: 10.1016/j.proeng.2017.02.482.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	Y. Freund and R. E. Schapire, “Experiments with a New Boosting Algorithm,” in Proceedings of the Thirteenth International Conference on International Conference on Machine Learning, The University of Virginia, 1996, pp. 148–156.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	G. Eibl and K. Pfeiffer, “Multiclass Boosting forWeak Classifiers,” Journal of Machine Learning Research, vol. 6, no. 7, pp. 189–210, 2005.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	Y. Freund and R. E. Schapire, “A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting,” Journal of Computer and System Sciences, vol. 55, no. 1, pp. 119–139, Aug. 1997, doi: 10.1006/jcss.1997.1504.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	E. Ramentol, Y. Caballero, R. Bello, and F. Herrera, “SMOTE-RSB *: A hybrid preprocessing approach based on oversampling and undersampling for high imbalanced data-sets using SMOTE and rough sets theory,” Knowledge and Information Systems, vol. 33, no. 2, pp. 245–265, 2012, doi: 10.1007/s10115-011-0465-6.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	S. McGee, “Simplifying likelihood ratios,” J Gen Intern Med, vol. 17, no. 8, pp. 647–650, Aug. 2002, doi: 10.1046/j.1525-1497.2002.10750.x.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	F. Gorunescu, Data Mining: Concepts, Models and Techniques. Berlin, Heidelberg: Springer, 2011.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	M. Stella and S. Kumar, “Prediction and Comparison using AdaBoost and ML Algorithms with Autistic Children Dataset,” IJERT, vol. 9, no. 7, pp. 133–136, Jul. 2020, doi: 10.17577/IJERTV9IS070091.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	P. H. Prastyo, I. G. Paramartha, M. S. M. Pakpahan, and I. Ardiyanto, “Predicting Breast Cancer: A Comparative Analysis of Machine Learning Algorithms,” PROC. INTERNAT. CONF. SCI. ENGIN., vol. 3, no. 2020, pp. 455–459, 2020.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>