﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051923</doi_batch_id><timestamp>20260519232507</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>12</month><day>27</day><year>2021</year></publication_date><journal_volume><volume>9</volume></journal_volume><issue>0</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Reliability Analysis of the Joint LDPC Decoding Algorithms over the Multiple Access Channels</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mahdi</given_name><surname>Nangir</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>27</day><year>2021</year></publication_date><pages><first_page>33</first_page><last_page>40</last_page></pages><doi_data><doi>10.52547/jist.9.36.33</doi><resource>http://jist.ir/en/Article/16296</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/16296</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/16296</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/16296</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/16296</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/16296</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/16296</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/16296</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	E. C. Van Der Meulen, “The discrete memoryless channel with two senders and one receiver”, In Proc. IEEE Int. Symp. Information Theory (ISIT), September 1971, pp. 78.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. Ahlswede, “The capacity region of a channel with two senders and two receivers”, Annals of probability, Vol. 2, No. 5, 1974, pp. 805-814.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Khandekar, “Graph-based codes and iterative decoding”, Ph.D. thesis, California Institute of Technology, USA, 2002.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Scarlett, A. Martinez, and A. G. Fabregas, “Mismatched multi-letter successive decoding for the multiple-access channel”, IEEE Transactions on Information Theory, Vol. 64, No. 4, 2017, pp. 2253-2266.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Li, X. Jian, F. Wang, S. Fu, and Z. Zhang, “Theoretical throughput analysis for massive random access with spatial successive decoding”, IEEE Transactions on Vehicular Technology, Vol. 69, No. 7, 2020, pp. 7998-8002.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Nangir, R. Asvadi, J. Chen, M. Ahmadian-Attari, and T. Matsumoto, “Successive Wyner-Ziv Coding for the Binary CEO Problem under Logarithmic Loss”, IEEE Transactions on Communications, Vol. 67, No .11, 2019, pp. 7512-7525.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Nangir, J. Pourrostam, J. M. Niya, and B. M. Tazehkand, “Comparison Between the Joint and Successive Decoding Schemes for the Binary CEO Problem”, In IEEE 28th Iranian Conference on Electrical Engineering (ICEE), August 2020, pp. 1-5.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Papaharalabos and P. T. Mathiopoulos, “Simplified sum-product algorithm for decoding LDPC codes with optimal performance,” Electronics Letters, Vol. 45, No. 2, January 2009, pp. 116-117.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Nangir, R. Asvadi, M. Ahmadian-Attari, and J. Chen, “Analysis and code design for the binary CEO problem under logarithmic loss”, IEEE Transactions on Communications, Vol. 66, No. 12, 2018, pp. 6003-6014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	 H. Khodaei Jooshin, and M. Nangir, “Reliability Analysis of the Sum-Product Decoding Algorithm for the PSK Modulation Scheme”, Journal of Information Systems and Telecommunication (JIST), Vol. 8, No. 3, 2020, pp. 167-174.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	 A. El Gamal, and Y. H. Kim, Network information theory, Cambridge University Press, 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	 M. Nangir, R. Asvadi, M. Ahmadian-Attari, and J. Chen, “Successive Wyner-Ziv coding for the binary CEO problem under log-loss”, In IEEE 29th Biennial Symposium on Communications (BSC), Canada, 2018, pp. 1-5.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	 Z. Goldfeld, and H. H. Permuter, “A Useful Analogy Between Wiretap and Gelfand-Pinsker Channels”, In IEEE International Symposium on Information Theory (ISIT), 2018, pp. 121-125.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	 M. Nangir, R. Asvadi, M. Ahmadian-Attari, and J. Chen, ‘Binary CEO problem under log-loss with BSC test-channel model”, In IEEE 29th Biennial Symposium on Communications (BSC), 2018, pp. 1-5.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	 F. Vatta, A. Soranzo, M. Comisso, G. Buttazzoni, and F. Babich, “Performance study of a class of irregular LDPC codes through low complexity bounds on their belief-propagation decoding thresholds”, In IEEE AEIT International Annual Conference, 2019, pp. 1-6.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	 S. Jayasooriya, M. Shirvani moghaddam, L. Ong, G. Lechner, and S. J. Johnson, “A new density evolution approximation for LDPC and multi-edge type LDPC codes”, IEEE Transactions on Communications, Vol. 64, No. 10, 2016, pp. 4044-4056.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	 S. Jeong, and J. Ha, “On the Design of Multi-Edge Type Low-Density Parity-Check Codes”, IEEE Transactions on Communications, Vol. 67, No. 10, 2019, pp. 6652-6667.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	 J. Du, L. Zhou, L. Yang, S. Peng and J. Yuan, "A New LDPC Coded Scheme for Two-User Gaussian Multiple Access Channels," in IEEE Communications Letters, vol. 22, no. 1, pp. 21-24, Jan. 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	 S. Cammerer, X. Wang, Y. Ma and S. t. Brink, "Spatially Coupled LDPC Codes and the Multiple Access Channel," 2019 53rd Annual Conference on Information Sciences and Systems (CISS), 2019, pp. 1-6.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	 M. B. Abdessalem, A. Zribi, T. Matsumoto and A. Bouallègue, "LDPC-based Joint Source-Channel-Network Coding for the Multiple Access Relay Channel," 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), 2018, pp. 1-6.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	 B. K. Ng and C. Lam, "Joint Power and Modulation Optimization in Two-User Non-Orthogonal Multiple Access Channels: A Minimum Error Probability Approach," in IEEE Transactions on Vehicular Technology, vol. 67, no. 11, pp. 10693-10703, Nov. 2018.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	 M. Ebada, S. Cammerer, A. Elkelesh, M. Geiselhart and S. t. Brink, "Iterative Detection and Decoding of Finite-Length Polar Codes in Gaussian Multiple Access Channels," 2020 54th Asilomar Conference on Signals, Systems, and Computers, 2020, pp. 683-688.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Z. Sun, M. Shao, J. Chen, K. M. Wong, and X. Wu, “Achieving the rate-distortion bound with low-density generator matrix codes”, IEEE Transactions on Communications, Vol. 58, No. 6, 2010, pp. 1643-1653.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	T. Richardson, and R. Urbanke, Modern coding theory, Cambridge University Press, 2008.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	 D. H. Schonberg, “Practical distributed source coding and its application to the compression of encrypted data”, Ph.D. thesis, University of California, Berkeley, USA, 2007.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>SQP-based Power Allocation Strategy for Target Tracking in MIMO Radar Network with Widely Separated Antennas</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name> Mohammad </given_name><surname>Akhondi Darzikolaei </surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad Reza</given_name><surname>Karami-Mollaei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Maryam</given_name><surname>Najimi</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>27</day><year>2021</year></publication_date><pages><first_page>21</first_page><last_page>32</last_page></pages><doi_data><doi>10.52547/jist.9.36.21</doi><resource>http://jist.ir/en/Article/21155</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/21155</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/21155</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/21155</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/21155</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/21155</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/21155</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/21155</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] M. A. Darzikolaei, A. Ebrahimzade, and E. Gholami, “Classification of radar clutters with artificial neural network,” in 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), 2015, pp. 577–581.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] M. A. Darzikolaei, A. Ebrahimzade, and E. Gholami, “The Separation of Radar Clutters using Multi-Layer Perceptron,” Information Systems &amp; Telecommunication, p. 41, 2017.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] E. Fishler, A. Haimovich, R. Blum, D. Chizhik, L. Cimini, and R. Valenzuela, “MIMO radar: An idea whose time has come,” in Proceedings of the 2004 IEEE Radar Conference (IEEE Cat. No. 04CH37509), 2004, pp. 71–78.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] E. Fishler, A. Haimovich, R. S. Blum, L. J. Cimini, D. Chizhik, and R. A. Valenzuela, “Spatial diversity in radars—Models and detection performance,” IEEE Transactions on signal processing, vol. 54, no. 3, pp. 823–838, 2006.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] J. Li and P. Stoica, “MIMO radar with colocated antennas,” IEEE Signal Processing Magazine, vol. 24, no. 5, pp. 106–114, 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] A. M. Haimovich, R. S. Blum, and L. J. Cimini, “MIMO radar with widely separated antennas,” IEEE Signal Processing Magazine, vol. 25, no. 1, pp. 116–129, 2007.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] M. Hai, “MIMO radar with widely separated antennas technology,” IEE Signal Magazine, vol. 26, no. 2, pp. 98–106, 2009.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] Y. Bar-Shalom, X. R. Li, and T. Kirubarajan, Estimation with applications to tracking and navigation: theory algorithms and software. John Wiley &amp; Sons, 2004.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] A. Pakdaman and H. Bakhshi, “Separable transmit beampattern design for MIMO radars with planar colocated antennas,” AEU-International Journal of Electronics and Communications, vol. 89, pp. 153–159, 2018.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] M. Xie, W. Yi, T. Kirubarajan, and L. Kong, “Joint node selection and power allocation strategy for multitarget tracking in decentralized radar networks,” IEEE Transactions on Signal Processing, vol. 66, no. 3, pp. 729–743, 2017.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] H. Godrich, A. P. Petropulu, and H. V. Poor, “Power allocation strategies for target localization in distributed multiple-radar architectures,” IEEE Transactions on Signal Processing, vol. 59, no. 7, pp. 3226–3240, 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] H. Chen, S. Ta, and B. Sun, “Cooperative game approach to power allocation for target tracking in distributed MIMO radar sensor networks,” IEEE Sensors Journal, vol. 15, no. 10, pp. 5423–5432, 2015.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] P. Chavali and A. Nehorai, “Scheduling and power allocation in a cognitive radar network for multiple-target tracking,” IEEE Transactions on Signal Processing, vol. 60, no. 2, pp. 715–729, 2011.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] C. Shi, S. Salous, F. Wang, and J. Zhou, “Power allocation for target detection in radar networks based on low probability of intercept: A cooperative game theoretical strategy,” Radio Science, vol. 52, no. 8, pp. 1030–1045, 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] J. Yan, H. Liu, B. Jiu, and Z. Bao, “Power allocation algorithm for target tracking in unmodulated continuous wave radar network,” IEEE sensors journal, vol. 15, no. 2, pp. 1098–1108, 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] L. Wang, L. Wang, Y. Zeng, and M. Wang, “Jamming power allocation strategy for MIMO radar based on MMSE and mutual information,” IET Radar, Sonar &amp; Navigation, vol. 11, no. 7, pp. 1081–1089, 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] S. M. H. Andargoli and J. Malekzadeh, “LPI radar network optimization based on geometrical measurement fusion,” Optimization and Engineering, vol. 20, no. 1, pp. 119–150, 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] B. Ma, H. Chen, B. Sun, and H. Xiao, “A joint scheme of antenna selection and power allocation for localization in MIMO radar sensor networks,” IEEE communications letters, vol. 18, no. 12, pp. 2225–2228, 2014.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] X. Li, W. Yi, G. Cui, L. Kong, and X. Yang, “Radar selection for single-target tracking in radar networks,” in 2015 IEEE Radar Conference (RadarCon), 2015, pp. 0545–0550.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] Y. Lu, Z. He, X. Zhang, and S. Liu, “Transmit and receive sensors joint selection for MIMO radar tracking based on PCRLB,” in 2016 IEEE 13th International Conference on Signal Processing (ICSP), 2016, pp. 1551–1555.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] J. She, F. Wang, and J. Zhou, “A novel sensor selection and power allocation algorithm for multiple-target tracking in an LPI radar network,” Sensors, vol. 16, no. 12, p. 2193, 2016.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] J. Yan, H. Liu, W. Pu, S. Zhou, Z. Liu, and Z. Bao, “Joint beam selection and power allocation for multiple target tracking in netted colocated MIMO radar system,” IEEE Transactions on Signal Processing, vol. 64, no. 24, pp. 6417–6427, 2016.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] X. Song, N. Zheng, and T. Bai, “Resource allocation schemes for multiple targets tracking in distributed MIMO radar systems,” International Journal of Antennas and Propagation, vol. 2017, 2017.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] N. Garcia, A. M. Haimovich, M. Coulon, and M. Lops, “Resource allocation in MIMO radar with multiple targets for non-coherent localization,” IEEE Transactions on Signal Processing, vol. 62, no. 10, pp. 2656–2666, 2014.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] Yi, Wei, Ye Yuan, Reza Hoseinnezhad, and Lingjiang Kong. "Resource scheduling for distributed multi-target tracking in netted colocated MIMO radar systems." IEEE Transactions on Signal Processing 68 (2020): 1602-1617.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] Li, Zhengjie, Junwei Xie, Haowei Zhang, Houhong Xiang, and Zhaojian Zhang. "Adaptive sensor scheduling and resource allocation in netted collocated MIMO radar system for multi-target tracking." IEEE Access 8 (2020): 109976-109988.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] Q. He, R. S. Blum, and A. M. Haimovich, “Noncoherent MIMO radar for location and velocity estimation: More antennas means better performance,” IEEE Transactions on Signal Processing, vol. 58, no. 7, pp. 3661–3680, 2010.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] V. Trees and L. Harry, Detection, Estimation, and Modulation Theory-Part l-Detection, Estimation, and Linear Modulation Theory. John Wiley &amp; Sons New York, 2001.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] H. Godrich, A. M. Haimovich, and R. S. Blum, “Target localization accuracy gain in MIMO radar-based systems,” IEEE Transactions on Information Theory, vol. 56, no. 6, pp. 2783–2803, 2010.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] D. Wassel, “Exploring novel designs of nlp solvers: architecture and implementation of worhp,” PhD Thesis, Universität Bremen, 2013.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Analytical Model to Create Proxy Server Sessions in  Multimedia Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mehdi</given_name><surname>Khazaei</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>27</day><year>2021</year></publication_date><pages><first_page>10</first_page><last_page>20</last_page></pages><doi_data><doi>10.52547/jist.9.36.10</doi><resource>http://jist.ir/en/Article/22510</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/22510</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/22510</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/22510</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/22510</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/22510</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/22510</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/22510</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	D. Y. Yavas, I. Hokelek, and B. Gunsel, "Controlling SIP server overload with priority based request scheduling", International Conference on Computing, Networking and Communications (ICNC), 2015, pp. 510-514.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	I. Kuzminykh, "A combined LIFO-Priority algorithm for overload control of SIP server", International Conference on Modern Problems of Radio Engineering Telecommunications and Computer Science (TCSET), 2012, pp. 330-330.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. G. Garroppo, S. Giordano, S. Spagna, and S. Niccolini, "Queueing Strategies for Local Overload Control in SIP Server", In IEEE Global Telecommunications Conference, 2009, pp. 1-6.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Lee and I. Joe, "An Overload Control Algorithm based on Priority Scheduling for SIP Proxy Server", Proceedings on the International Conference on Internet Computing, Athens 2012.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	K. K. Guduru and J. Usha, "Queuing strategies for self overload control in SIP servers", International Conference on Contemporary Computing and Informatics, 2014, pp. 1007-1011.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Montazerolghaem, M. H. Yaghmaee, A. Leon-Garcia, M. Naghibzadeh, and F. Tashtarian, "A Load-Balanced Call Admission Controller for IMS Cloud Computing", IEEE Transactions on Network and Service Management, vol. 13, no. 4, pp. 806-822, 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Montazerolghaem, M. H. Y. Moghaddam, and A. Leon-Garcia, "OpenSIP: Toward Software-Defined SIP Networking", IEEE Transactions on Network and Service Management, vol. 15, no. 1, pp. 184-199, 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	H. Kim and N. Feamster, "Improving network management with software defined networking", IEEE Communications Magazine, vol. 51, no. 2, pp. 114-119, 2013.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	P. Abaev, A. Pechinkin, and R. Razumchik, "Analysis of Queueing System with Constant Service Time for SIP Server Hop-by-Hop Overload Control", Berlin, Heidelberg, 2013, pp. 1-10: Springer Berlin Heidelberg.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	K. E. Samouylov, P. O. Abaev, Y. Gaidamaka, A. Pechinkin, and R. Razumchik, "Analytical Modelling And Simulation For Performance Evaluation Of SIP Server With Hysteretic Overload Control", In ECMS, 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Y. Gaidamaka, A. Pechinkin, R. Razumchik, K. E. Samouylov, and E. S. Sopin, "Analysis of an M|G|1|R queue with batch arrivals and two hysteretic overload control policies", International Journal of Applied Mathematics and Computer Science, vol. 24, pp. 519 - 534, 2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	V. K. Gurbani, L. J. Jagadeesan, and V. B. Mendiratta, "Characterizing session initiation protocol (SIP) network performance and reliability", presented at the Proceedings of the Second international conference on Service Availability, Berlin, Germany, 2005.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. V. Subramanian and R. Dutta, "A study of performance and scalability metrics of a SIP proxy server – a practical approach", Journal of Computer and System Sciences, vol. 77, no. 5, pp. 884-897, 2011/09/01/ 2011.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	G. Mishra, S. Dharmaraja, and S. Kar, "Performance analysis of SIP signaling network using hierarchical modeling", In  Twentieth National Conference on Communications, 2014, pp. 1-5.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Shorgin, K. Samouylov, Y. Gaidamaka, and S. Etezov, "Polling System with Threshold Control for Modeling of SIP Server under Overload", Cham, 2014, pp. 97-107: Springer International Publishing.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Y. V. Gaidamaka, "Model with threshold control for analyzing a server with an SIP protocol in the overload mode", Automatic Control and Computer Sciences, vol. 47, no. 4, pp. 211-218, 2013/07/01 2013.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Y. Hong, C. Huang, and J. Yan, "Modeling chaotic behavior of SIP retransmission mechanism", International Journal of Parallel, vol. Emergent and Distributed Systems, 02/01 2013.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Y. Hong, C. Huang, and J. Yan, "Modeling and simulation of SIP tandem server with finite buffer", ACM Trans. Model. Comput. Simul., vol. 21, no. 2, p. Article 11, 2011.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Jahanbakhsh, S. V. Azhari, and H. Nemati, "Lyapunov stability of SIP systems and its application to overload control", Computer Communications, vol. 103, pp. 1-17, 2017/05/01/ 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Montazerolghaem, M. H. Yaghmaee Moghaddam, and F. Tashtarian, "Overload Control in SIP Networks: A Heuristic Approach Based on Mathematical Optimization", 2015.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	V. A. F. A. Daniel A. Menascé, Lawrence W. Dowdy, Performance by Design: Computer Capacity Planning by Example. Prentice Hall PTR, 2004.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. Khazaei and N. Mozayani, "A dynamic distributed overload control mechanism in SIP networks with holonic multi-agent systems", Telecommunication Systems, vol. 63, 12/30 2015.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. Khazaei, "Occupancy Overload Control by Q-learning", Singapore, 2019, pp. 765-776: Springer Singapore.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. Wang, J. Liao, T. Li, J. Wang, J. Wang, and Q. Qi, "Probe-based end-to-end overload control for networks of SIP servers", Journal of Network and Computer Applications, vol. 41, pp. 114-125, 5// 2014.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. Liao, J. Wang, T. Li, J. Wang, J. Wang, and X. Zhu, "A distributed end-to-end overload control mechanism for networks of SIP servers", Comput. Netw., vol. 56, no. 12, pp. 2847-2868, 2012.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	C. Shen, H. Schulzrinne, and E. Nahum, "Session Initiation Protocol (SIP) Server Overload Control: Design and Evaluation", Berlin, Heidelberg, 2008, pp. 149-173: Springer Berlin Heidelberg.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	M. Khazaei and N. Mozayani, "Overload management with regard to fairness in session initiation protocol networks by holonic multiagent systems", International Journal of Network Management, vol. 27, no. 3, p. e1969, 2017.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Measurement and Analysis of Radiation Levels from Base Transceiver Station in Sambas</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name> Fitri</given_name><surname>Imansyah</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Leonardus Sandy Ade</given_name><surname>Putra</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name> Eka </given_name><surname>Kusumawardhani </surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>27</day><year>2021</year></publication_date><pages><first_page>1</first_page><last_page>9</last_page></pages><doi_data><doi>10.52547/jist.9.36.1</doi><resource>http://jist.ir/en/Article/23148</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/23148</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/23148</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/23148</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/23148</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/23148</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/23148</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/23148</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	R. I. KOMINFO, “Peraturan Menteri Pekerjaan Umum Nomor 7 Tahun 2009 tentang Pedoman Pembangunan dan Penggunaan Bersama Menara Telekomunikasi.” 2009.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	K. P. Republik Indonesia, “Peraturan Menteri Pekerjaan Umum Nomor 7 Tahun 2009 tentang Pedoman Pembangunan dan Penggunaan Bersama Menara Telekomunikasi.” 2009.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Health Protection Agency, Health Effects from Radiofrequency Electromagnetic Fields. 2012.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. Bernardi et al., “Evaluation of human absorption in the near field of a BTS antenna,” IEEE MTT-S Int. Microw. Symp. Dig., vol. 3, pp. 1449–1452, 2004.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	T. A. A. Santana et al., “Measurement campaign on the electromagnetic environment in the central region of the City of Mossoro,” SBMO/IEEE MTT-S Int. Microw. Optoelectron. Conf. IMOC 2017, vol. 2017-Janua, no. 303, pp. 1–4, 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Linhares, M. A. B. Terada, and A. J. M. Soares, “Estimating the location of maximum exposure to electromagnetic fields associated with a radiocommunication station,” J. Microwaves, Optoelectron. Electromagn. Appl., vol. 12, no. 1, pp. 141–157, 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Riederer, “EMF exposure due to GSM base stations: measurements and limits,” pp. 402-405 Vol.1, 2008.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	IARC, “IARC classifies radiofrequency electromagnetic fields as possibly carcinogenic to humans,” World Heal. Organ., vol. 2008, no. May, pp. 1–6, 2011.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. Matthes, “EMF Safety Guidelines \r- The ICNIRP View - ,” ITU Work. Hum. Expo. Electromagn. F., no. May, 2013.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	E. A. Dialogue and E. Fields, “on Risks From,” Environ. Heal., pp. i–66, 2002.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. J. Schoemaker et al., “Mobile phone use and risk of acoustic neuroma: Results of the Interphone case-control study in five North European countries,” Br. J. Cancer, vol. 93, no. 7, pp. 842–848, 2005.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Wilén et al., “Electromagnetic Field Exposure and Health among RF Plastic Sealer Operators,” Bioelectromagnetics, vol. 25, no. 1, pp. 5–15, 2004.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	N. Kwan-hoong and D. Ph, “Radiation, Mobile Phones, Base Stations and Your Health.”</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	G. Ziegelberger et al., Guidelines for limiting exposure to electromagnetic fields (100 kHz to 300 GHz), vol. 118, no. 5. 2020.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Sector and O. F. Itu, “Guide on electromagnetic fields and health,” vol. 1, 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. E. van D. P. R. Repcholi, “Base stations and wireless networks: Exposures and health consequences,” Int. Work. Base Station. Wirel. Networks Expo. Heal. Consequences, pp. 1–168, 2005.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	G. J. Rubin, G. Hahn, B. S. Everitt, A. J. Cleare, and S. Wessely, “Are some people sensitive to mobile phone signals? Within participants double blind randomised provocation study,” Br. Med. J., vol. 332, no. 7546, pp. 886–889, 2006.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	K. K. Kesari, M. H. Siddiqui, R. Meena, H. N. Verma, and S. Kumar, “Cell phone radiation exposure on brain and associated biological systems,” Indian J. Exp. Biol., vol. 51, no. 3, p. 187—200, Mar. 2013.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	P. A. Valberg, E. van Deventer, and M. H. Repacholi, “Workgroup report: Base stations and wireless networks - Radiofrequency (RF) exposures and health consequences,” Environ. Health Perspect., vol. 115, no. 3, pp. 416–424, 2007.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	IEEE, IEEE Standard for Safety Levels With Respect to Human Exposure to Radio Frequency Electromagnetic Fields, 3 kHz to 300 GHz, vol. 2005, no. April. 2006.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Linhares, A. J. M. Soares, and M. A. B. Terada, “Determination of Measurement Points in Urban Environments for Assessment of Maximum Exposure to EMF Associated with a Base Station,” Int. J. Antennas Propag., vol. 2014, 2014.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	R. Vadlamudi and D. Sriram Kumar, “97 Dual Band, Dual Slant ±45° Polarized 2 × 2 MIMO (8T 8R) Antenna Array with Low Mutual Coupling for A-LTE(4G) Band 41/42/43(5G) BTS Application,” 2020 Int. Conf. Wirel. Commun. Signal Process. Networking, WiSPNET 2020, vol. 43, pp. 97–101, 2020.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	U. Bergqvist, G. Friedrich, Y. Hamnerius, and L. Martens, “Mobile Telecommunication Base Stations-Exposure to Electromagnetic Fields, Report of a Short Term Mission within COST 244bis,” Cost, p. 77, 2000.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	B. O. Ayinmode and I. P. Farai, “Risks Associated with Low Level Radiofrequency Exposure at Close Proximities to Mobile Phone Base Stations,” Pacific J. Sci. Technol., vol. 13, no. 2, pp. 330–335, 2012.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. To and P. By, “REPORT ON Secretary , DOT , Delhi Prepared By,” no. December, pp. 1–50, 2010.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title> Remote Sensing Image Registration based on a Geometrical Model Matching</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Zahra</given_name><surname>Hossein-Nejad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hamed</given_name><surname>Agahi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Azar</given_name><surname>Mahmoodzadeh</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>27</day><year>2021</year></publication_date><pages><first_page>41</first_page><last_page>50</last_page></pages><doi_data><doi>10.52547/jist.9.36.41</doi><resource>http://jist.ir/en/Article/24200</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/24200</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/24200</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/24200</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/24200</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/24200</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/24200</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/24200</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Wong and D. Clausi, "ARRSI: automatic registration of remote-sensing images," Geoscience and Remote Sensing, IEEE Transactions on, vol. 45, pp. 1483-1493, 2007.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	W.-J. Lee and S.-J. Oh, "Remote sensing image registration using equivariance features," in 2021 International Conference on Information Networking (ICOIN), 2021, pp. 776-781.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Z. Hossein-Nejad and M. Nasri, "A New Method in Image Matching Based on Spatial Relationships in Multi-Sensor Remote Sensing Images " Iranian Remote Sensing &amp; GIS, pp. 73-94, 2018.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Y. Liu, H. Cao, Y. Zhao, Q. He, Y. Yang, L. Wang, et al., "A Remote sensing image registration algorithm based on multiple constraints and a variational Bayesian framework," Remote Sensing Letters, vol. 12, pp. 296-305, 2021.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Z. Hossein-Nejad and M. Nasri, "A Review on Image Registration Methods, Concepts and applications," Journal of Machine Vision and Image Processing, pp. 39-67, 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	W. Lee, D. Sim, and S.-J. Oh, "A CNN-Based High-Accuracy Registration for Remote Sensing Images," Remote Sensing, vol. 13, p. 1482, 2021.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H.-M. Chen, M. K. Arora, and P. K. Varshney, "Mutual information-based image registration for remote sensing data," International Journal of Remote Sensing, vol. 24, pp. 3701-3706, 2003.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	X. Xie, Y. Zhang, X. Ling, and X. Wang, "A novel extended phase correlation algorithm based on Log-Gabor filtering for multimodal remote sensing image registration," International Journal of Remote Sensing, vol. 40, pp. 5429-5453, 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. I. Patel, V. K. Thakar, and S. K. Shah, "Image registration of satellite images with varying illumination level using HOG descriptor based SURF," Procedia computer science, vol. 93, pp. 382-388, 2016.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	P. Schwind, S. Suri, P. Reinartz, and A. Siebert, "Applicability of the SIFT operator to geometric SAR image registration," International Journal of Remote Sensing, vol. 31, pp. 1959-1980, 2010.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	G. Sreeja and O. Saraniya, "A Comparative Study on Image Registration Techniques for SAR Images," in 2019 5th International Conference on Advanced Computing &amp; Communication Systems (ICACCS), 2019, pp. 947-953.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Y. Ye, J. Shan, L. Bruzzone, and L. Shen, "Robust registration of multimodal remote sensing images based on structural similarity," IEEE Transactions on Geoscience and Remote Sensing, vol. 55, pp. 2941-2958, 2017.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Sedaghat, M. Mokhtarzade, and H. Ebadi, "Uniform robust scale-invariant feature matching for optical remote sensing images," IEEE Transactions on Geoscience and Remote Sensing, vol. 49, pp. 4516-4527, 2011.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Z. Hossein-Nejad and M. Nasri, "A-RANSAC: Adaptive random sample consensus method in multimodal retinal image registration," Biomedical Signal Processing and Control, vol. 45, pp. 325-338, 2018.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	C. Harris and M. Stephens, "A combined corner and edge detector," in Alvey vision conference, 1988, p. 50.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	D. G. Lowe, "Distinctive image features from scale-invariant keypoints," International journal of computer vision, vol. 60, pp. 91-110, 2004.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	H. Bay, A. Ess, T. Tuytelaars, and L. Van Gool, "Speeded-up robust features (SURF)," Computer vision and image understanding, vol. 110, pp. 346-359, 2008.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Z. Hossein-Nejad and M. Nasri, "RKEM: Redundant Keypoint Elimination Method in Image Registration," IET Image Processing, vol. 11, pp. 273-284, 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Sedaghat and N. Mohammadi, "High-resolution image registration based on improved SURF detector and localized GTM," International Journal of Remote Sensing, vol. 40, pp. 2576-2601, 2019.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Sedaghat and H. Ebadi, "Remote sensing image matching based on adaptive binning SIFT descriptor," IEEE transactions on geoscience remote Sensing Technology and Application, vol. 53, pp. 5283-5293, 2015.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Hasan, M. R. Pickering, and X. Jia, "Modified SIFT for multi-modal remote sensing image registration," in 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012, pp. 2348-2351.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	B. Kupfer, N. S. Netanyahu, and I. Shimshoni, "An Efficient SIFT-Based Mode-Seeking Algorithm for Sub-Pixel Registration of Remotely Sensed Images," Geoscience and Remote Sensing Letters, IEEE, vol. 12, pp. 379-383, 2015.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Z. Yi, C. Zhiguo, and X. Yang, "Multi-spectral remote image registration based on SIFT," Electronics Letters, vol. 44, pp. 107-108, 2008.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	K. Mikolajczyk and C. Schmid, "A performance evaluation of local descriptors," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 27, pp. 1615-1630, 2005.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	N. Y. Khan, B. McCane, and G. Wyvill, "SIFT and SURF performance evaluation against various image deformations on benchmark dataset," in 2011 International Conference on Digital Image Computing: Techniques and Applications, 2011, pp. 501-506.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	R. Bouchiha and K. Besbes, "Comparison of local descriptors for automatic remote sensing image registration," Signal, Image and Video Processing, vol. 9, pp. 463-469, 2015.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	M. Deshmukh and U. Bhosle, "A survey of image registration," International Journal of Image Processing (IJIP), vol. 5, p. 245, 2011.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	M. Hasan, X. Jia, A. Robles-Kelly, J. Zhou, and M. R. Pickering, "Multi-spectral remote sensing image registration via spatial relationship analysis on sift keypoints," in Geoscience and Remote Sensing Symposium (IGARSS), 2010 IEEE International, 2010, pp. 1011-1014.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	S. Saxena and R. K. Singh, "A survey of recent and classical image registration methods," International journal of signal processing, image processing and pattern recognition, vol. 7, pp. 167-176, 2014.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	S. Chen, S. Zheng, Z. Xu, C. Guo, and X. Ma, "AN IMPROVED IMAGE MATCHING METHOD BASED ON SURF ALGORITHM," International Archives of the Photogrammetry, Remote Sensing &amp; Spatial Information Sciences, vol. 42, 2018.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	P. Etezadifar and H. Farsi, "A New Sample Consensus Based on Sparse Coding for Improved Matching of SIFT Features on Remote Sensing Images," IEEE Transactions on Geoscience and Remote Sensing, 2020.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	W. He and X. Deng, "A modified SUSAN corner detection algorithm based on adaptive gradient threshold for remote sensing image," in 2010 International Conference on Optoelectronics and Image Processing, 2010, pp. 40-43.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	Z. Hossein-Nejad and M. Nasri, "An adaptive image registration method based on SIFT features and RANSAC transform," Computers &amp; Electrical Engineering, vol. 62, pp. 524-537, 2017.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Error Reconciliation based on Integer Linear Programming in Quantum Key Distribution</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>zahra</given_name><surname>eskandari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name> mohammad </given_name><surname>rezaee </surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>27</day><year>2021</year></publication_date><pages><first_page>51</first_page><last_page>59</last_page></pages><doi_data><doi>10.52547/jist.9.36.51</doi><resource>http://jist.ir/en/Article/27311</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/27311</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/27311</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/27311</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/27311</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/27311</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/27311</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/27311</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74(1), 145–195 (2002).</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys. 81(3), 1301–1350 (2009).</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Weier, H. Krauss, M. Rau, M. Fuerst, S. Nauerth, and H. Weinfurter, “Quantum eavesdropping without interception: an attack exploiting the dead time of single photon detectors,” New J. Phys. 13(7), 073024 (2011).</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	N. Jain, C. Wittmann, L. Lydersen, C. Wiechers, D. Elser, C. Marquardt, V. Makarov, and G. Leuchs, “Device calibration impacts security of quantum key distribution,” Phys. Rev. Lett. 107(11), 110501 (2011).</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	C. H. Bennet and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of the IEEE International Conference on Computers Systems and Signal Processing (IEEE, 1984), pp. 175–179.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	X.B. Wang, “Beating the photon-number-splitting attack in practical quantum cryptography,” Phys. Rev. Lett. 94(23), 230503 (2005).</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	P. Treeviriyanupab, T. Phromsaard, C.M. Zhang, M. Li, P. Sangwongngam, T. S. N. Ayutaya, N. Songneam, R. Rattanatamma, C. Ingkavet, W. Sanor, W. Chen, Z.F. Han, and K. Sripimanwat, “Rate-adaptive reconciliation and its estimator for quantum bit error rate,” in Proceedings of International Symposium on Communications and Information Technologies (IEEE, 2014), pp. 351–355.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	C. Gao, J. Dong, G. Yu, L. Chen, Multi-matrix error estimation and reconciliation for quantum key distribution. Optics Express. (2019).  27. 14545. 10.1364/OE.27.014545. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	C. Gao, Y. Guo, D. Jiang, L. Chen, Multi-matrix rate-compatible reconciliation for quantum key distribution. ArXiv(2020)., abs/2001.01074.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1982).</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5, 3–28 (1992).</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] Brassard, G., Salvail, L.: Secret-Key Reconciliation by Public Discussion, pp. 410–423. Springer, Berlin (1994).</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Furukawa, E., Yamazaki, K.: Application of existing perfect code to secret key reconciliation. In: Proceedings of International Symposium on Communication and Information Technologies, pp. 397– 400 (2001).</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] Buttler, W.T., Lamoreaux, S.K., Torgerson, J.R., Nickel, G.H., Donahue, C.H., Peterson, C.G.: Fast, efficient error reconciliation for quantum cryptography. Phys. Rev. A 67, 052303 (2003).</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] E. Kiktenko, A. Malyshev, A. Bozhedarov, N. Pozhar, M. Anufriev, and A. Fedorov, “Error estimation at the information reconciliation stage of quantum key distribution,” J. Russ. Laser Res. 39(6), 558–567 (2018).</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] C. H. Bennett, G. Brassard, and J.M. Robert, “Privacy amplification by public discussion,” SIAM J. Comput. 17(2), 210–229 (1988).</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, “Generalized privacy amplification,” IEEE Trans. Inf. Theory 41(6), 1915–1923 (1995).</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] R. G. Gallager, Low Density Parity-Check Codes. MIT Press, Cambridge, MA, 1963.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] S. Chung, T. J. Richardson, and R. L. Urbanke, “Analysis of sum-product decoding of low-density parity-check codes using a Gaussian approximation,” IEEE Trans. Inf. Theory 47(2), 657–670 (2001).</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] Mehic M., Niemiec M., Siljak H., Voznak M. (2020) Error Reconciliation in Quantum Key Distribution Protocols. In: Ulidowski I., Lanese I., Schultz U., Ferreira C. (eds) Reversible Computation: Extending Horizons of Computing. RC 2020. Lecture Notes in Computer Science, vol 12070. Springer, Cham.</unstructured_citation></citation><citation key="ref21"><unstructured_citation> 
[21] Niemiec, M. Error correction in quantum cryptography based on artificial neural networks. Quantum Inf Process 18, 174 (2019). https://doi.org/10.1007/s11128-019-2296-4.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] J. Feldman, "Decoding Error-Correcting Codes via Linear Programming". PhD thesis, M.I.T., Cambridge, MA, 2003.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] K. Yang, X. Wang, and J. Feldman, “A new linear programming approach to decoding linear block codes,” IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 1061–1072, Mar. 2008.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] H. Wei and A. H. Banihashemi, “An iterative check polytope projec tion algorithm for ADMM-based LP decoding of LDPC codes,” IEEE Commun. Lett., vol. 22, no. 1, pp. 29–32, Jan. 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] J. Bai, Y. C, Wang, and F. C. M. Lau, “Minimum-polytope-based linear programming decoder for LDPC Codes via ADMM approach”, IEEE Wireless Commun. Lett., vol. 8, no. 4, pp. 1032-1035, Aug. 2019.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] D. J. C. MacKay and R. M. Neal, “Good codes based on very sparse matrices,” in Cryptography and Coding, ser. Lecture Notes in Computer Science, C. Boyd, Ed. Heidelberg/Berlin: Springer, 1995, vol. 1025, pp. 100-111.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] D. J. C. MacKay and R. M. Neal, “Near Shannon-limit performance of low density parity check codes,” Electron. Lett., vol. 33, no. 6, pp. 457- 458, Mar. 1997.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] F. R. Kschischang, B. J. Frey, and H. A. Loeliger, “Factor graphs and the sum-product algorithm,” IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 498-519, Feb. 2001. 16.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] W. Ryan and S. Lin, Channel Codes: Classical and Modern. Cambridge University Press, 2009.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] T. Richardson and R. Urbanke, Modern Coding Theory. Cambridge University Press, 2008.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] R. M. Tanner, “A recursive approach to low complexity codes,” IEEE Trans. Inf. Theory 27(5), 533–547 (1981).</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] L. A. Wolsey and G. L. Nemhauser: Integer and Combinatorial Optimization Wiley-Interscience, November 1999.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>   
[33] Clovis C. Gonzaga, On the Complexity of Linear Programming, Resenhas IME-USP 1995, Vol. 2, No. 2, 197-207.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] EgonBalas, Sebastián Ceria, Gérard Cornuéjols: A lift-and-project cutting plane algorithm for mixed 0–1 programs, Mathematical Programming, Volume 58, January 1993, pp 295-324.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] H. Land , A. G. Doig, An Automatic Method of Solving Discrete Linear Programming Problems, July 1960, Econometrica 28(3):497-520.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] Ralph Gomory, Outline of an Algorithm for Integer Solutions to Linear Programs, September 1958, Bulletin of the American Mathematical Society 64(5):275-278.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] Pritchard, D., Chakrabarty, D. Approximability of Sparse Integer Programs. Algorithmica 61, 75–93 (2011). https://doi.org/10.1007/s00453-010-9431-z.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]Andres Iroume, SPARSITY IN INTEGER PROGRAMMING. PhD thesis, Georgia Institute of Technology, 2017.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39] Koutecký, Martin; Levin, Asaf; Onn, Shmuel (2018). A Parameterized Strongly Polynomial Algorithm for Block Structured Integer Programs. Michael Wagner: 14 pages. arXiv:1802.05859. doi:10.4230/LIPICS.ICALP.2018.85. S2CID 3336201.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]www.ibm.com/software/commerce/optimization/cplex-optimizer/.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41] www.gurobi.com/,</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42] J. Borghoff, Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan, IACR Cryptol. ePrint Arch. 2012.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43] EEE Standard for Information Technology—Local and Metropoli tan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Spec ifications Amendment 5: Enhancements for Higher Throughput, IEEE Standard 802.11n-2009, Oct. 2009.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44] Elkouss, D., Martinez-Mateo, J. &amp; Martin, V. Untainted Puncturing for Irregular Low-Density Parity-Check Codes. IEEE Wireless Communications Letters 1, 585–588 (2012).</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45] Guo, D., He, C., Guo, T. et al. Comprehensive high-speed reconciliation for continuous-variable quantum key distribution. Quantum Inf Process 19, 320 (2020).</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46] E. O. Kiktenko, A. O. Malyshev and A. K. Fedorov, "Blind Information Reconciliation With Polar Codes for Quantum Key Distribution," in IEEE Communications Letters, vol. 25, no. 1, pp. 79-83, Jan. 2021.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47] Liu, Z., Wu, Z. &amp; Huang, A. Blind information reconciliation with variable step sizes for quantum key distribution. Sci Rep 10, 171 (2020). https://doi.org/10.1038/s41598-019-56637-y.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48] K. Zhang, X. -Q. Jiang, Y. Feng, R. Qiu and E. Bai, "High Efficiency Continuous-Variable Quantum Key Distribution Based on Quasi-Cyclic LDPC Codes," 2020 5th International Conference on Communication, Image and Signal Processing (CCISP), 2020, pp. 38-42, doi: 10.1109/CCISP51026.2020.9273490.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49] B. Bilash, B. K. Park, C. Hoon Park and S. -W. Han, "Error-Correction Method Based on LDPC for Quantum Key Distribution Systems," 2020 International Conference on Information and Communication Technology Convergence (ICTC), 2020, pp. 151-153, doi: 10.1109/ICTC49870.2020.9289451.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50] Georgios Papachristoudis, John W. Fisher, Adaptive Belief Propagation, 32th International Conference on Machine Learning, Lille, France, 2015. JMLR: W&amp;CP volume 37.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51] Daniel Lokshtanov, New Methods in Parameterized Algorithms and Complexity, Dissertation for the degree of Philosophiae Doctor (PhD) University of Bergen Norway April 2009.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>