﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051922</doi_batch_id><timestamp>20260519222841</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>4</month><day>21</day><year>2022</year></publication_date><journal_volume><volume>10</volume></journal_volume><issue>38</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A Novel Effort Estimation Approach for Migration of SOA Applications to Microservices</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Vinay</given_name><surname>Raj</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sadam</given_name><surname>Ravichandra</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>21</day><year>2022</year></publication_date><pages><first_page>80</first_page><last_page>88</last_page></pages><doi_data><doi>10.52547/jist.15561.10.38.80</doi><resource>http://jist.ir/en/Article/15561</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15561</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15561</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15561</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15561</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15561</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15561</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15561</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]  Vinay Raj and R. Sadam, “Patterns for Migration of SOA Based Applications to Microservices Architecture,” Journal of Web Engineering, Jul. 2021, doi: 10.13052/jwe1540-9589.2051.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]  J. Yin, H. Chen, S. Deng, Z. Wu, and C. Pu, “A Dependable ESB Framework for Service Integration,” IEEE Internet Computing, vol. 13, no. 2, pp. 26–34, Mar. 2009, doi: 10.1109/mic.2009.26.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]  V. Raj and R. Sadam, “Evaluation of SOA-Based Web Services and Microservices Architecture Using Complexity Metrics,” SN Computer Science, vol. 2, no. 5, Jul. 2021, doi: 10.1007/s42979-021-00767-6.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]  T. Cerny, M. J. Donahoo, and M. Trnka, “Contextual understanding of microservice architecture,” ACM SIGAPP Applied Computing Review, vol. 17, no. 4, pp. 29–45, Jan. 2018, doi: 10.1145/3183628.3183631.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] Z. Xiao, I. Wijegunaratne and X. Qiang, "Reflections on SOA and Microservices," 2016 4th International Conference on Enterprise Systems (ES), 2016, pp. 60-67, doi: 10.1109/ES.2016.14.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] J. Thones, “Microservices,” IEEE Software, vol. 32, no. 1, pp. 116–116, Jan. 2015, doi: 10.1109/ms.2015.11.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] D. Taibi, V. Lenarduzzi, C. Pahl, and A. Janes, “Microservices in agile software development: a workshop-based study into issues, advantages, and disadvantages,” in Proceedings of the XP2017 Scientific Workshops, 2017, pp. 1–5. doi: 10.1145/3120459.3120483.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] D. Taibi, V. Lenarduzzi, and C. Pahl, “Processes, Motivations, and Issues for Migrating to Microservices Architectures: An Empirical Investigation,” IEEE Cloud Computing, vol. 4, no. 5, pp. 22–32, Sep. 2017, doi: 10.1109/mcc.2017.4250931.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] J. Soldani, D. A. Tamburri, and W.-J. Van Den Heuvel, “The pains and gains of microservices: A Systematic grey literature review,” Journal of Systems and Software, vol. 146, pp. 215–232, Dec. 2018, doi: 10.1016/j.jss.2018.09.082.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] X. Larrucea, I. Santamaria, R. Colomo-Palacios, and C. Ebert, “Microservices,” IEEE Software, vol. 35, no. 3, pp. 96–100, May 2018, doi: 10.1109/ms.2018.2141030.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] P. C. Pendharkar, G. H. Subramanian, and J. A. Rodger, “A probabilistic model for predicting software development effort,” IEEE Transactions on Software Engineering, vol. 31, no. 7, pp. 615–624, Jul. 2005, doi: 10.1109/tse.2005.75.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] G. H. Subramanian, P. C. Pendharkar, and M. Wallace, “An empirical study of the effect of complexity, platform, and program type on software development effort of business applications,” Empirical Software Engineering, vol. 11, no. 4, pp. 541–553, Oct. 2006, doi: 10.1007/s10664-006-9023-3.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] S. M. Satapathy, S. K. Rath, and B. P. Acharya, “Early stage software effort estimation using random forest technique based on use case points,” IET Software, vol. 10, no. 1, pp. 10–17, Feb. 2016, doi: 10.1049/iet-sen.2014.0122.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] S. M. Satapathy, B. P. Acharya, and S. K. Rath, “Early Stage Software Effort Estimation using Random Forest Technique based on Optimized Class Point Approach”, INFOCOMP Journal of Computer Science, vol. 13, no. 2, pp. 22–33, Dec. 2014.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] M. R. Braz and S. R. Vergilio, "Software Effort Estimation Based on Use Cases," 30th Annual International Computer Software and Applications Conference (COMPSAC'06), 2006, pp. 221-228, doi: 10.1109/COMPSAC.2006.77.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] S. Diev, “Use cases modeling and software estimation,” ACM SIGSOFT Software Engineering Notes, vol. 31, no. 6, p. 1, Nov. 2006, doi: 10.1145/1218776.1218780.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] P. Mohagheghi, B. Anda and R. Conradi, "Effort estimation of use cases for incremental large-scale software development," Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005., 2005, pp. 303-311, doi: 10.1109/ICSE.2005.1553573.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] G. Canfora, A. R. Fasolino, G. Frattolillo, and P. Tramontana, “A wrapping approach for migrating legacy system interactive functionalities to Service Oriented Architectures,” Journal of Systems and Software, vol. 81, no. 4, pp. 463–480, Apr. 2008, doi: 10.1016/j.jss.2007.06.006.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] Z. A. Siddiqui and K. Tyagi, “A critical review on effort estimation techniques for service-oriented-architecture-based applications,” International Journal of Computers and Applications, vol. 38, no. 4, pp. 207–216, Oct. 2016, doi: 10.1080/1206212x.2016.1237132.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] V. Raj and R. Sadam, “A Framework for Migration of SOA based Applications to Microservices Architecture,” Journal of Computer Science and Technology, vol. 21, no. 2, p. e18, Oct. 2021, doi: 10.24215/16666038.21.e18.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] E. A. Farrag, R. Moawad, and I. F. Imam, “An Approach for Effort Estimation of Service Oriented Architecture (SOA) Projects,” Journal of Software, vol. 11, no. 1, pp. 44–63, 2016, doi: 10.17706/jsw.11.1.44-63.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] A. Yanchuk, A. Ivanyukovich, and M. Marchese, “Towards a Mathematical Foundation for Service-Oriented Applications Design,” Journal of Software, vol. 1, no. 1, Jul. 2006, doi: 10.4304/jsw.1.1.32-39.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] G. Karner, “Resource estimation for objectory projects,” Objective Systems SF AB, vol. 17, pp. 1–9, 1993.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] P. Bhallamudi, S. Tilley and A. Sinha, "Migrating a Web-based application to a service-based system - an experience report," 2009 11th IEEE International Symposium on Web Systems Evolution, 2009, pp. 71-74, doi: 10.1109/WSE.2009.5630392.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] F.S. Aliee, S. Oviesi. A way to improve Adaptive Maintenance in Enterprise Architecture. Journal of Information Systems and Telecommunication;8(1):1-4.2020;doi: 10.7508/jist.2020.01.001.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] V. Raj and S. Ravichandra, "Microservices: A perfect SOA based solution for Enterprise Applications compared to Web Services," 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information &amp; Communication Technology (RTEICT), 2018, pp. 1531-1536, doi: 10.1109/RTEICT42901.2018.9012140.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] V. Raj and R. Sadam, “Performance and complexity comparison of service oriented architecture and microservices architecture,” International Journal of Communication Networks and Distributed Systems, vol. 27, no. 1, p. 100, 2021, doi: 10.1504/ijcnds.2021.116463.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Self-Organization Map (SOM) Algorithm for DDoS Attack Detection in Distributed Software Defined Network (D-SDN)</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohsen</given_name><surname>Rafiee</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Alireza </given_name><surname>shirmarz</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>21</day><year>2022</year></publication_date><pages><first_page>120</first_page><last_page>131</last_page></pages><doi_data><doi>10.52547/jist.15644.10.38.120</doi><resource>http://jist.ir/en/Article/15644</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15644</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15644</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15644</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15644</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15644</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15644</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15644</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Shirmarz and A. Ghaffari, “An Autonomic Software Defined Network (SDN) Architecture With Performance Improvement Considering,” J. Inf. Syst. Telecommun., vol. 8, no. 2, pp. 1–9, 2020.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Shirmarz and A. Ghaffari, “Performance issues and solutions in SDN-based data center: a survey,” J. Supercomput., 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Shirmarz and A. Ghaffari, “An adaptive greedy flow routing algorithm for performance improvement in a software‐defined network,” Int. Numer. Model. Electron. networks, Devices, Fields-Wiley online Libr., no. March, pp. 1–21, 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	R. Masoudi and A. Ghaffari, “Software defined networks: A survey,” J. Netw. Comput. Appl., vol. 67, pp. 1–25, 2016.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Z. Zhao et al., “Autonomic communications in software-driven networks,” IEEE J. Sel. Areas Commun., vol. 35, no. 11, pp. 2431–2445, 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Shirmarz and A. Ghaffari, “Taxonomy of controller placement problem ( CPP ) optimization in Software Defined Network ( SDN ): a survey,” J. Ambient Intell. Humaniz. Comput., no. 0123456789, 2021.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. G. Alireza Shirmarz, “Automatic Software Defined Network (SDN) Performance Management Using TOPSIS Decision-Making Algorithm,” J. Grid Comput., 2021.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, “Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy,” Proc. - Int. Carnahan Conf. Secur. Technol., vol. 2019-Octob, 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	T. Cisco and A. Internet, “Cisco Annual Internet Report,” 2020.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] “Legal Implications of DDoS Attacks and the Internet of Things (IoT),” 2016. [Online]. Available: https://www.dataprotectionreport.com/2016/12/legal-implications-of-ddos-attacks-and-the-internet-of-things-iot/.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] “Defending against Distributed Denial of Service (DDoS) attacks,” 2020. [Online]. Available: https://www2.deloitte.com/ca/en/pages/risk/articles/DDoSattacks.html.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] “UNB Dataset.” [Online]. Available: www . unb . ca / cic / datasets / ddos - 2019 . html.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Q. Niyaz, W. Sun, and M. Alam, “Impact on SDN Powered Network Services Under Adversarial Attacks,” Procedia - Procedia Comput. Sci., vol. 62, no. Scse, pp. 228–235, 2015.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] Teuvo Kohonen, The Basic SOM. 2001.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] T. V Phan, N. K. Bao, and M. Park, “Author ’ s Accepted Manuscript Performance Bottleneck Handler for Large-sized Software- Defined Networks under Flooding Attacks Reference : Distributed-SOM : A Novel Performance Bottleneck Handler for Large-sized,” J. Netw. Comput. Appl., 2017.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] Teuvo Kohonen, “The self-organizing map,” in Proceedings of the IEEE, 1990, pp. 1464–1480.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] B. Yuan, D. Zou, S. Yu, H. Jin, W. Qiang, and J. Shen, “Defending against flow table overloading attack in software-defined networks,” IEEE Trans. Serv. Comput., vol. 12, no. 2, pp. 231–246, 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] M. Clayton, C. Batt, M. Clayton, and C. Batt, Communications and networking. 2019.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] M. Xuanyuan, V. Ramsurrun, and A. Seeam, “Detection and mitigation of DDoS attacks using conditional entropy in software-defined networking,” Proc. 11th Int. Conf. Adv. Comput. ICoAC 2019, pp. 66–71, 2019.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] A. Ahalawat, S. S. Dash, A. Panda, and K. S. Babu, “Entropy Based DDoS Detection and Mitigation in OpenFlow Enabled SDN,” Proc. - Int. Conf. Vis. Towar. Emerg. Trends Commun. Networking, ViTECoN 2019, pp. 1–5, 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] S. M. Mousavi and M. St-hilaire, “Early Detection of DDoS Attacks against SDN Controllers,” in International Conference on Computing, Networking and Communications, Communications and Information Security Symposiu, 2015, pp. 77–81.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] S. M. S. Mousavi and M. St-Hilaire, “Early Detection of DDoS Attacks in Software Defined Networks Controller‏,” Thesis‏, pp. 77–81, 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. Wang, Y. Lu, and J. Qin, “A dynamic MLP-based DDoS attack detection method using feature selection and feedback,” Comput. Secur., vol. 88, p. 101645, 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] T. V. Phan, N. K. Bao, and M. Park, “Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks,” J. Netw. Comput. Appl., vol. 91, pp. 14–25, 2017.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack detection using NOX/OpenFlow,” in Proceedings - Conference on Local Computer Networks, LCN, 2010, pp. 408–415.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] A. Detection, S. Networking, and S. K. Dey, “Effects of Machine Learning Approach in Flow-Based,” 2019.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] R. Santos, D. Souza, W. Santo, A. Ribeiro, and E. Moreno, “Machine learning algorithms to detect DDoS attacks in SDN,” Concurr. Comput. , vol. 32, no. 16, pp. 1–14, 2020.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] T. M. Nam et al., “Self-organizing map-based approaches in DDoS flooding detection using SDN,” Int. Conf. Inf. Netw., vol. 2018-Janua, pp. 249–254, 2018.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] T. Khalil, “A Survey of Feature Selection and Feature Extraction Techniques in Machine Learning,” pp. 372–378, 2014.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] S. Rowshanrad, V. Abdi, and M. Keshtgari, “Performance evaluation of SDN controllers: Floodlight and Opendaylight,” Int. Islam. Univ. Malaysia Eng. J., vol. 17, no. 2, pp. 47–57, 2016.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] R. Braga, E. Mota, and A. Passito, “Lightweight DDoS Flooding Attack Detection Using NOX/ OpenFlow,” in 35th Annual IEEE Conference on Local Computer Networks, 2010, no. January 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Defect Detection using Depth Resolvable Statistical Post Processing in Non-Stationary Thermal Wave Imaging</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>G.V.P. Chandra </given_name><surname>Sekhar Yadav</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>V. S. </given_name><surname>Ghali</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Naik R. </given_name><surname>Baloji</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>21</day><year>2022</year></publication_date><pages><first_page>132</first_page><last_page>140</last_page></pages><doi_data><doi>10.52547/jist.15690.10.38.132</doi><resource>http://jist.ir/en/Article/15690</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15690</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15690</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15690</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15690</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15690</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15690</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15690</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] X. Maldague, Theory and practice of infrared technology for nondestructive testing, New York: Wiley, 2001.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] H. Benítez, C. Ibarra-Castanedo, A. Bendada, X. Maldague, H. Loaiza, and E. Caicedo, “Definition of a new thermal contrast and pulse correction for defect quantification in pulsed thermography”, Infrared Physics &amp; Technology, Vol. 51, No. 3, 2008, pp. 160-167. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] A. Castelo, A. Mendioroz, R. Celorrio, and A. Salazar, “Optimizing the Inversion Protocol to Determine the Geometry of Vertical Cracks from Lock-in Vibrothermography”, Journal of Nondestructive Evaluation, Vol. 36, No. 1, 2016.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] C. Ibarra-Castanedo, N. Avdelidis, and X. Maldague, “Quantitative pulsed phase thermography applied to steel plates”, Thermosense XXVII, 2005.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] R. Mulaveesala, and S. Tuli, “Theory of frequency modulated thermal wave imaging for nondestructive subsurface defect detection”, Applied Physics Letters, Vol. 89, No. 19, 2006, p. 191913.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] G. V. Subbarao, and R. Mulaveesala, “Quadratic Frequency Modulated Thermal Wave Imaging for Non-Destructive Testing”, Progress In Electromagnetics Research M, Vol. 26, 2012, pp. 11-22.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] B. Suresh, S. Subhani, A. Vijayalakshmi, V. Vardhan, and V. S. Ghali, “Chirp Z transform based enhanced frequency resolution for depth resolvable non stationary thermal wave imaging”, Review of Scientific Instruments, Vol. 88, No. 1, 2017, p. 014901.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] A. Sharma, R. Mulaveesala, and V. Arora, “Novel Analytical Approach for Estimation of Thermal Diffusivity and Effusivity for Detection of Osteoporosis”, IEEE Sens. J., Vol.20, No. 11, 2020, pp. 6046–6054. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] V. S. Ghali, S. Panda, and R. Mulaveesala, “Barker coded thermal wave imaging for defect detection in carbon fibre-reinforced plastics”, Insight - Non-Destructive Testing and Condition Monitoring, Vol. 53, No. 11, 2011, pp. 621-624.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] B. Suresh, S. Subhani, V. S. Ghali, and R. Mulaveesala, “Subsurface detail fusion for anomaly detection in non-stationary thermal wave imaging”, Insight - Non-Destructive Testing and Condition Monitoring, Vol. 59, No. 10, 2017, pp. 553-558.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] G.V.P. Chandra Sekhar Yadav, V. S. Ghali, B. Sonali Reddy, B. Omprakash, and Ch. Chaitanya Reddy, “Greens Function Based Analytical Model for Enhanced Defect Detection Using Depth Resolvable Non-Stationary Thermal Wave Imaging”, Journal of Green Engineering, Vol. 10, No. 12, 2020, pp. 12933-12947.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] S. Subhani, and V. S. Ghali, “Measurement of thermal diffusivity of fiber reinforced polymers using quadratic frequency modulated thermal wave imaging”, Infrared Physics &amp; Technology, Vol. 99, 2019, pp. 187-192.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] S. Subhani, B. Suresh, and V. S. Ghali, “Quantitative subsurface analysis using frequency modulated thermal wave imaging”, Infrared Physics &amp; Technology, Vol. 88, 2018, pp. 41-47.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] M. Pasha, B. Suresh, K. Rajesh Babu, S. Subhani, and G. V. Subbarao, “Barker coded modulated thermal wave imaging for defect detection of glass fiber reinforced plastic”, ARPN Journal of Engineering and Applied Sciences, Vol. 13, No. 10, 2018, pp. 3475-3480. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] G.V.P. Chandra Sekhar Yadav, V. Ghali, and N. Baloji, "A Time Frequency-Based Approach for Defect Detection in Composites Using Nonstationary Thermal Wave Imaging", Russian Journal of Nondestructive Testing, Vol. 57, No. 6, 2021, pp. 486-499.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] M. Pasha, G. V. Subbarao, B. Suresh, and S. Tabassum, “Inspection of Defects in CFRP based on Principal Components”, International Journal of Recent Technology and Engineering, Vol. 8, No. 3, 2019, pp. 2367-2370. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] V. S. Ghali, B. Suresh, and A. Hemanth, “Data Fusion for Enhanced Defect Detectability in Non-Stationary Thermal Wave Imaging”, IEEE Sensors Journal, Vol. 15, No. 12, 2015, pp. 6761-6762.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] B. Suresh, J. Sai kiran, and G. V. Subbarao, “Automatic detection of subsurface anomalies using non-linear chirped thermography”, International Journal of Innovative Technology and Exploring Engineering, Vol. 8, No. 6, 2019, pp. 1247-1249. 
[19] M. Parvez M, J. Shanmugam, and V. S. Ghali, “Decision tree-based subsurface analysis using Barker coded thermal wave imaging”, Infrared Physics &amp; Technology, Vol. 109, 2020, p. 103380.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20] A. Vijaya Lakshmi, V. Gopitilak, M. Parvez, S. Subhani, and V. S. Ghali, “Artificial neural networks based quantitative evaluation of subsurface anomalies in quadratic frequency modulated thermal wave imaging”, Infrared Physics &amp; Technology, Vol. 97, 2019, pp. 108-115.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21] S. Subhani, G. V. P. Chandra Sekhar Yadav, and V. S. Ghali, “Defect characterisation using pulse compression-based quadratic frequency modulated thermal wave imaging”, IET Science, Measurement &amp; Technology, Vol. 14, No. 2, 2020, pp. 165-172.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22] B. Suresh, M. Manorama, M. Bhupesh, K. Sai Kiran, G. V. P. Chandra Sekhar Yadav, and V. S.  Ghali, “Advanced Signal Processing Approaches for Quadratic Frequency Modulated Thermal Wave Imaging”, International Journal of Emerging Trends in Engineering Research, Vol. 7, No. 11, 2019, pp. 599-603.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23] S. Subhani, B. Suresh, and V. S. Ghali, “Orthonormal projection approach for depth-resolvable subsurface analysis in non-stationary thermal wave imaging”, Insight - Non-Destructive Testing and Condition Monitoring, Vol. 58, No. 1, 2016, pp. 42-45.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24] A. Vijaya Lakshmi, K. Nagendra Babu, M. Sree Ram Deepak, A. Sai Kumar, G. V. P. Chandra Sekhar Yadav, V. Gopi Tilak, and V. S. Ghali, “A Machine Learning based Approach for Defect Detection and Characterization in Non-Linear Frequency Modulated Thermal Wave Imaging”, International Journal of Emerging Trends in Engineering Research, Vol. 7, No. 11, 2019, pp. 517-522.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25] A. Vijaya Lakshmi, V. S. Ghali, M. Parvez, G. V. P. Chandra Sekhar Yadav, and V. Gopi Tilak, “Fuzzy C-Means Clustering Based Anomalies Detection in Quadratic Frequency Modulated Thermal Wave Imaging”, International Journal of Recent Technology and Engineering, Vol. 8, No. 3, 2019, pp. 4047-4051.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26] A. Vijaya Lakshmi, V. S. Ghali, S. Subhani, and N. Baloji, “Automated quantitative subsurface evaluation of fiber reinforced polymers”, Infrared Physics &amp; Technology, Vol. 110, 2020, p. 103456.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Smart Pre-Seeding Decision Support System for Agriculture</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name> Ahmed Wasif</given_name><surname>Reza</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Kazi </given_name><surname>Saymatul Jannat</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>MD.Shariful </given_name><surname>Islam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Surajit </given_name><surname>Das Barman</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>21</day><year>2022</year></publication_date><pages><first_page>102</first_page><last_page>110</last_page></pages><doi_data><doi>10.52547/jist.15698.10.38.102</doi><resource>http://jist.ir/en/Article/15698</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15698</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15698</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15698</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15698</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15698</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15698</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15698</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	K. Raviteja, and M. Supriya, “IoT-Based Agriculture Monitoring System”, Data Engineering and Communication Technology, Vol. 1079, 2020, pp. 473-483.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] S. Ratnaparkhi, S. Khan, C. Arya, S. Khapre, P. Singh, M. Diwakar, and A. Shankar, “Smart agriculture sensors in IOT: A review”, in Materials Today: Proceedings, 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] P. M. Jyothi, and D. Nandan, “Utilization of the Internet of Things in Agriculture: Possibilities and Challenges”, Soft Computing: Theories and Applications, 2020, pp. 837-848.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] M. A. Ferrag, L. Shu, X. Yang, A. Derhab, and L. Maglaras, “Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges”, IEEE Access, Vol. 8, 2020, pp. 32031-32053.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] N. Gondchawar, and R. S. Kawitkar “IoT based Smart Agriculture”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, No. 6, 2016, pp. 838-842.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] T. Robles, R. Alcarria, D. Martin, M. Navarro, R. Calero, S. Iglesias, and M. Lopez, "An IoT based reference architecture for smart water management processes", Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, Vol. 6, No. 1, 2015, pp. 4-23.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] L. Zhao, L. He, X. Jin, and W. Yu, “Design of Wireless Sensor Network Middleware for Agricultural Applications”, in International Conference on Computer and Computing Technologies in Agriculture, 2012, pp. 270-279.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] K. R. Anusha, and K. R. Shobha, "Design and Implementation of Wireless Sensor Network for Precision Agriculture", International Journal Scientific Engineering and Applied Science, Vol. 1, 2015, pp. 521-527.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] S. A. Jaishetty, and R. Patil, "IoT Sensor Network Based Approach for Agricultural Field Monitoring and Control", International Journal of Research in Engineering and Technology, Vol. 5, No. 06, 2016, pp. 2319-1163.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] P. Sanjeevi, and P. Viswanathan, “NUTS scheduling approach for cloud data centers to optimize energy consumption”, Computing, Vol. 99, No. 12, 2017, pp. 1179-1205.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] P. Sanjeevi, and P. Viswanathan, “Smart homes IoT techniques for dynamic provision of cloud benefactors”, International Journal of Critical Computer-Based Systems, Vol. 7, No. 3, 2017, pp. 209-224.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] G. Kesavan, P. Sanjeevi, and P. Viswanathan, “A 24 hours IoT framework for monitoring and managing home automation”, in International Conference on Inventive Computation Technologies (ICICT), 2016, Vol. 1, pp. 367-371.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] M. A. Supreetha, M. R. Mundada, and J. N. Pooja, “Design of a smart water-saving irrigation system for agriculture based on a wireless sensor network for better crop yield”, in International Conference on Communications and Cyber Physical Engineering, 2018, pp. 93-104.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] M. A. Mattar, T. K. Z. El-Abedin, A. A. Alazba, and H. M. Al-Ghobari HM, “Soil water status and growth of tomato with partial root-zone drying and deficit drip irrigation techniques”, Irrigation Science, Vol. 38, No. 2, 2020, pp. 163-176.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] A. Kapoor, S. I. Bhat, S. Shidnal, and A. Mehra, "Implementation of IoT (Internet of Things) and Image Processing in Smart Agriculture", in International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), 2016, pp. 21-26.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] K. Spandana, and S. Pabboju, S. “Applications of IoT for Soil Quality,” in International Conference on Intelligent Computing and Communication Technologies, 2019, pp. 277-286.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] A. Badhe, S. Kharadkar, R. Ware, P. Kamble, and S. Chavan, “IOT based smart agriculture and soil nutrient detection system”, International Journal on Future Revolution in Computer Science &amp; Communication Engineering, Vol. 4, No. 4, 2018, pp. 774-777.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] H. Z. Wang, G. W. Lin, J. Q. Wang, W. L. Gao, Y. F. Chen, and Q. L. Duan, “Management of big data in the internet of things in agriculture based on cloud computing”, applied mechanics and materials, Vol. 548, 2014, pp. 1438-1444.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New High-Capacity Audio Watermarking Based on Wavelet Transform using the Golden Ratio and TLBO Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Ali</given_name><surname>Zeidi joudaki</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Marjan</given_name><surname>Abdeyazdan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad</given_name><surname>Mosleh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad</given_name><surname>Kheyrandish</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>21</day><year>2022</year></publication_date><pages><first_page>151</first_page><last_page>160</last_page></pages><doi_data><doi>10.52547/jist.15957.10.38.151</doi><resource>http://jist.ir/en/Article/15957</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15957</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15957</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15957</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15957</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15957</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15957</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15957</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Swanson MD, Zhu B, Tewfik AH, Boney L. Robust audio watermarking using perceptual masking. Signal processing. 1998, pp.337-355.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Liu W, Hu AQ. A sub-band excitation substitute based scheme for narrowband speech watermarking. Frontiers of Information Technology &amp; Electronic Engineering. 2017, pp.627-643. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE transactions on information forensics and security. 2016, pp.2594-2608.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Nguyen TS, Chang CC, Yang XQ. A reversible image authentication scheme based on fragile watermarking in the discrete wavelet transform domain. AEU-International Journal of Electronics and Communications. 2016, pp.1055-1061.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Sun L, Xu J, Liu S, Zhang S, Li Y, Shen CA. A robust image watermarking scheme using Arnold transform and BP neural network. Neural Computing and Applications. 2018, pp.2425-2440.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	slam M, Roy A, Laskar RH. SVM-based robust image watermarking technique in LWT domain using different sub-bands. Neural Computing and Applications. 2020, pp.1379-1403.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Katzenbeisser S, Petitcolas FA. Digital watermarking. Artech House, London. 2000; 2.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Nejad MY, Mosleh M, Heikalabad SR. LSB-based quantum audio watermarking using MSB as arbiter. International Journal of Theoretical Physics. 2019, pp.3828-3851.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Rasti P, Samiei S, Agoyi M, Escalera S, Anbarjafari G. Robust non-blind color video watermarking using QR decomposition and entropy analysis. Journal of Visual Communication and Image Representation. 2016, pp.838-847.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Bhardwaj A, Verma VS, Jha RK. Robust video watermarking using significant frame selection based on the coefficient difference of lifting wavelet transform. Multimedia Tools and Applications. 2018, pp.19659-19678.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Ali M, Ahn CW. An optimal image watermarking approach through cuckoo search algorithm in the wavelet domain. International Journal of System Assurance Engineering and Management. 2018, pp.602-611.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Mehta R, Rajpal N, Vishwakarma VP. Robust image watermarking scheme in lifting wavelet domain using GA-LSVR hybridization. International Journal of Machine Learning and Cybernetics. 2018, pp.145-161.</unstructured_citation></citation><citation key="ref13"><unstructured_citation> 
[13]	Fallahpour M, Megias D. Robust high-capacity audio watermarking based on FFT amplitude modification. IEICE TRANSACTIONS on Information and Systems. 2010, pp.87-93.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Kumsawat P. An efficient digital audio watermarking scheme based on genetic algorithm. In2010 10th International Symposium on Communications and Information Technologies 2010, pp. 481-485.</unstructured_citation></citation><citation key="ref15"><unstructured_citation> 
[15]	Martínez-Noriega R, Nakano M, Kurkoski B, Yamaguchi K. High payload audio watermarking: toward channel characterization of MP3 compression. Journal of Information Hiding and Multimedia Signal Processing. 2011, pp. 91-107.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Bath V, Sengupta I, Das A. A new audio watermarking scheme based on singular value decomposition and quantization. Circuits, Systems, and Signal Processing. 2011, pp.915-927.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Fallahpour M, Megías D. High capacity logarithmic audio watermarking based on the human auditory system. In2012 IEEE International Symposium on Multimedia 2012, pp. 28-31.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Mohsenfar SM, Mosleh M, Barati A. Audio watermarking method using QR decomposition and genetic algorithm. Multimedia Tools and Applications. 2015, pp.759-779.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Hu HT, Hsu LY, Chou HH. Perceptual-based DWPT-DCT framework for selective blind audio watermarking. Signal processing. 2014, pp.316-327.</unstructured_citation></citation><citation key="ref20"><unstructured_citation> 
[20]	Chen ST, Hsu CY, Huang HN. Wavelet-domain audio watermarking using optimal modification on low-frequency amplitude. IET signal processing. 2015, pp.166-176.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Nair UR, Birajdar GK. Audio watermarking in wavelet domain using Fibonacci numbers. In2016 International Conference on Signal and Information Processing (IConSIP), 2016, pp. 1-5.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Erfani Y, Pichevar R, Rouat J. Audio watermarking using spikegram and a two-dictionary approach. IEEE transactions on information forensics and security. 2016, pp.840-852.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Hemis M, Boudraa B, Megías D, Merazi-Meksen T. Adjustable audio watermarking algorithm based on DWPT and psychoacoustic modeling. Multimedia Tools and Applications. 2018, pp.11693-11725.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Kaur A, Dutta MK. An optimized high payload audio watermarking algorithm based on LU-factorization. Multimedia Systems. 2018, pp.341-353.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Saadi S, Merrad A, Benziane A. Novel secured scheme for blind audio/speech norm-space watermarking by Arnold algorithm. Signal Processing. 2019, pp.74-86.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Pourhashemi SM, Mosleh M, Erfani Y. Audio watermarking based on the synergy between Lucas regular sequence and Fast Fourier Transform. Multimedia Tools and Applications. 2019, pp.22883-22908.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Mahdi Mosleh, Saeed Setayeshi , Behrang Barekatain, Mohammad Mosleh. A novel audio watermarking scheme based on fuzzy inference system in DCT domain. Multimedia Tools and Applications. 2021, pp. 20423–20447 .</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Ahmed Hussain Ali, Loay Edwar George, Mohd Rosmadi Mokhtar. An Adaptive High Capacity Model for Secure Audio Communication Based on Fractal Coding and Uniform Coefficient Modulation. Circuits, Systems, and Signal Processing. 2020. pp.  pages5198–5225.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	Cai, Y.M., Guo, W.Q. and Ding, H.Y., 2013. Dwt-svd. Journal of Software, 8(7), p.1801.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	Brannock, E., Weeks, M. and Harrison, R., 2008, April. Watermarking with wavelets: simplicity leads to robustness. In IEEE SoutheastCon 2008, pp. 587-592.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	Pandey, V., 2014. Analysis of image compression using wavelets. International Journal of Computer Applications, 103(17).</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	Lerch, A. (2002). Zplane development, EAQUAL-Evaluate Audio QUALity, version: 0.1. 3alpha. Retrieved July 2018, from http://www.mp3-tech.org/programmer/misc.html.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	Akhlaghi M, Emami F, Nozhat N. Binary TLBO algorithm assisted for designing plasmonic nano bi-pyramids-based absorption coefficient. Journal of Modern Optics. 2014, pp.1092-1096.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	Akhlaghi M, Emami F, Nozhat N, "Binary TLBO algorithm assisted for designing plasmonic nano bi-pyramids-based absorption coefficient", Journal of Modern Optics, 2014, pp.1092-1096.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	Akhlaghi M. Optimization of the plasmonic nano-rods-based absorption coefficient using TLBO algorithm. Optik. 2015, pp.5033-5037.</unstructured_citation></citation><citation key="ref36"><unstructured_citation> 
[36]	Balvasi M, Akhlaghi M, Shahmirzaee H, "Binary TLBO algorithm assisted to investigate the supper scattering plasmonic nanotubes", Superlattices and Microstructures. 2016, pp.26-33.</unstructured_citation></citation><citation key="ref37"><unstructured_citation> 
[37]	Kaboli M, Akhlaghi M, “Binary teaching-learning-based optimization algorithm was used to investigate the superscattering plasmonic nanodisk", Optics and Spectroscopy. 2016, pp.958-63.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Nonlinear Regression Model Based on Fractional Bee Colony Algorithm for Loan Time Series</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Farid</given_name><surname>Ahmadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad</given_name><surname>Pourmahmood Aghababa</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hashem</given_name><surname>Kalbkhani</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>21</day><year>2022</year></publication_date><pages><first_page>141</first_page><last_page>150</last_page></pages><doi_data><doi>10.52547/jist.16015.10.38.141</doi><resource>http://jist.ir/en/Article/16015</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/16015</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/16015</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/16015</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/16015</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/16015</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/16015</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/16015</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Zhang, G. Yu, and D. Yang, "Predicting nonperforming loan of business bank by multiple classifier fusion algorithms," Journal of Interdisciplinary Mathematics, vol. 19, no. 4, pp. 657-667, 2016.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Belgrave, G. Kester, and M. Jackman, "Industry Specific Shocks and Nonperforming Loans in Barbados," The Review of Finance and Banking, vol. 4, no. 2, 2012.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Y. Tang, H. Chen, B. Wang, M. Chen, M. Chen, and X. Yang, "Discriminant analysis of zero recovery for China's NPL," Advances in Decision Sciences, vol. 2009, 2009.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. L. Lin, "A new two-stage hybrid approach of credit risk in banking industry," Expert Systems with Applications, vol. 36, no. 4, pp. 8333-8341, 2009.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. O. Adewusi, T. B. Oyedokun, and M. O. Bello, "Application of artificial neural network to loan recovery prediction," International Journal of Housing Markets and Analysis, vol. 9, no. 2, pp. 222-238, 2016.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	G. Kou, Y. Peng, and C. Lu, "MCDM approach to evaluating bank loan default models," Technological and Economic Development of Economy, vol. 20, no. 2, pp. 292-311, 2014.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	P. Saha, I. Bose, and A. Mahanti, "A knowledge based scheme for risk assessment in loan processing by banks," Decision Support Systems, vol. 84, pp. 78-88, 2016.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Z. Bitvai and T. Cohn, "Predicting peer-to-peer loan rates using bayesian nonlinear regression," in Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015, pp. 2203-2209. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. Calabrese, "Predicting bank loan recovery rates with a mixed continuous‐discrete model," Applied stochastic models in business and industry, vol. 30, no. 2, pp. 99-114, 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	T. Chen, X. Li, and J. He, "Complex dynamics of credit risk contagion with time-delay and correlated noises," in Abstract and Applied Analysis, 2014, vol. 2014: Hindawi. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	T. Chen, J. He, and J. Wang, "Bifurcation and chaotic behaviour of credit risk contagion based on Fitzhugh–Nagumo system," International Journal of Bifurcation and Chaos, vol. 23, no. 07, p. 1350117, 2013.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. Lahmiri, "On fractality and chaos in Moroccan family business stock returns and volatility," Physica A: Statistical Mechanics and its Applications, vol. 473, pp. 29-39, 2017.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Radhakrishnan, A. Duvvuru, S. Sultornsanee, and S. Kamarthi, "Phase synchronization based minimum spanning trees for analysis of financial time series with nonlinear correlations," Physica A: Statistical Mechanics and its Applications, vol. 444, pp. 259-270, 2016.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Q. Tian, P. Shang, and G. Feng, "The similarity analysis of financial stocks based on information clustering," Nonlinear Dynamics, vol. 85, no. 4, pp. 2635-2652, 2016.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	B. B. Nair, P. S. Kumar, N. Sakthivel, and U. Vipin, "Clustering stock price time series data to generate stock trading recommendations: An empirical study," Expert Systems with Applications, vol. 70, pp. 20-36, 2017.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	H.-L. Yang and H.-C. Lin, "Applying the hybrid model of EMD, PSR, and ELM to exchange rates forecasting," Computational Economics, vol. 49, no. 1, pp. 99-116, 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	H. Ye and A. Bellotti, "Modelling recovery rates for nonperforming loans," Risks, vol. 7, no. 1, p. 19, 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Y. Tanoue and S. Yamashita, "Loss given default estimation: a two-stage model with classification tree-based boosting and support vector logistic regression," Journal of Risk, vol. 21, no. 4, 2019.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Otair and E. Hattab, "An implementation of a new type of online auction," International Journal of E-Business Research (IJEBR), vol. 4, no. 2, pp. 88-102, 2008.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	N. S. Sidnal and S. S. Manvi, "Intelligent Agent Based Model for Auction Service Discovery in Mobile E-Commerce," International Journal of E-Business Research (IJEBR), vol. 8, no. 1, pp. 76-97, 2012.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Y. Lu, Z. Zeng, H. Wu, G. G. Chua, and J. Zhang, "An intelligent system for taxi service: Analysis, prediction and visualization," AI Communications, vol. 31, no. 1, pp. 33-46, 2018.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	E. Trandafili and M. Biba, "A review of machine learning and data mining approaches for business applications in social networks," International Journal of E-Business Research (IJEBR), vol. 9, no. 1, pp. 36-53, 2013.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	R. Chandra and S. Chand, "Evaluation of co-evolutionary neural network architectures for time series prediction with mobile application in finance," Applied Soft Computing, vol. 49, pp. 462-473, 2016.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. A. Elnaggar, M. A. EL Azeem, and F. A. Maghraby, "Machine Learning Model for Predicting Non-performing Agricultural Loans," in The International Conference on Artificial Intelligence and Computer Vision, 2020: Springer, pp. 395-404.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. K. Oli, "Deprived Sector Lending and Non-Performing Loans in Nepal," Applied Economics and Finance, vol. 8, no. 4, pp. 1-10, 2021.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	F. Medeiros Assef and M. T. Arns Steiner, "Ten-year evolution on credit risk research: a Systematic Literature Review approach and discussion," Ingeniería e Investigación, vol. 40, no. 2, pp. 50-71, 2020.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	G. Teles, J. Rodrigues, R. A. Rabê, and S. A. Kozlov, "Artificial neural network and Bayesian network models for credit risk prediction," Journal of Artificial Intelligence and Systems, vol. 2, no. 1, pp. 118-132, 2020.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	S. Deng, R. Li, Y. Jin, and H. He, "CNN-based feature cross and classifier for loan default prediction," in 2020 International Conference on Image, Video Processing and Artificial Intelligence, 2020, vol. 11584: International Society for Optics and Photonics, p. 115841K.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	N. Sopitpongstorn, P. Silvapulle, J. Gao, and J.-P. Fenech, "Local logit regression for loan recovery rate," Journal of Banking &amp; Finance, vol. 126, p. 106093, 2021.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	M. R. Pradhan, S. Akter, and A. Al Marouf, "Performance Evaluation of Traditional Classifiers on Prediction of Credit Recovery," in Advances in Electrical and Computer Technologies: Springer, 2020, pp. 541-551.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	A. Min, M. Scherer, A. Schischke, and R. Zagst, "Modeling Recovery Rates of Small-and Medium-Sized Entities in the US," Mathematics, vol. 8, no. 11, p. 1856, 2020.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	A. Al Imran and M. N. Amin, "Loan Charge-Off Prediction Including Model Explanation for Supporting Business Decisions," in International Conference on Intelligent Systems Design and Applications, 2020: Springer, pp. 1281-1291.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	L. Li and D. Huang, "A Loan risk assessment model with consumption features for online finance," in Journal of Physics: Conference Series, 2021, vol. 1848, no. 1: IOP Publishing, p. 012068.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	N. Siddique and H. Adeli, "Simulated annealing, its variants and engineering applications," International Journal on Artificial Intelligence Tools, vol. 25, no. 06, p. 1630001, 2016.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	S. Parusheva, "Social Media Banking Usage From Banks' Perspective," International Journal of E-Business Research (IJEBR), vol. 15, no. 1, pp. 38-54, 2019.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	V. D. W. Aryanto, Y. Wismantoro, and K. Widyatmoko, "Implementing Eco-Innovation by Utilizing the Internet to Enhance Firm's Marketing Performance: Study of Green Batik Small and Medium Enterprises in Indonesia," in Disruptive Technology: Concepts, Methodologies, Tools, and Applications: IGI Global, 2020, pp. 1290-1307.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	J. Liu, C. Wu, and Y. Li, "Improving Financial Distress Prediction Using Financial Network-Based Information and GA-Based Gradient Boosting Method," Computational Economics, vol. 53, no. 2, pp. 851-872, 2019.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	D. Karaboga, "An idea based on honey bee swarm for numerical optimization," Technical report-tr06, Erciyes university, engineering faculty, computer …, 2005.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	Y. Xu, P. Fan, and L. Yuan, "A simple and efficient artificial bee colony algorithm," Mathematical Problems in Engineering, vol. 2013, 2013.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	I. Podlubny, Fractional differential equations: an introduction to fractional derivatives, fractional differential equations, to methods of their solution and some of their applications. Elsevier, 1998.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Optimized kernel Nonparametric Weighted Feature Extraction for Hyperspectral Image Classification</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Hasheminejad</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>21</day><year>2022</year></publication_date><pages><first_page>111</first_page><last_page>119</last_page></pages><doi_data><doi>10.52547/jist.16105.10.38.111</doi><resource>http://jist.ir/en/Article/16105</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/16105</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/16105</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/16105</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/16105</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/16105</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/16105</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/16105</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	H. Li, H. Zhou, L. Pan, and Q. Du, “Gabor feature-based composite kernel method for hyperspectral image classification,” vol. 54, no. 10, 2018, doi: 10.1049/el.2018.0272.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. Hong, X. Wu, P. Ghamisi, J. Chanussot, N. Yokoya, and X. X. Zhu, “Invariant Attribute Profiles: A Spatial-Frequency Joint Feature Extractor for Hyperspectral Image Classification,” IEEE Trans. Geosci. Remote Sens., pp. 1–18, 2020, doi: 10.1109/TGRS.2019.2957251.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Suresh and S. Lal, “A Metaheuristic Framework based Automated Spatial-Spectral Graph for Land Cover Classification from Multispectral and Hyperspectral Satellite Images,” Infrared Phys. Technol., vol. 105, no. January, p. 103172, 2020, doi: 10.1016/j.infrared.2019.103172.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. Xiang et al., “Hyperspectral anomaly detection by local joint subspace process and support vector machine,” Int. J. Remote Sens., vol. 41, no. 10, pp. 3798–3819, 2020.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Ghamisi, J. Plaza, Y. Chen, J. Li, and A. J. Plaza, “Advanced spectral classifiers for hyperspectral images: A review,” IEEE Geosci. Remote Sens. Mag., vol. 5, no. 1, pp. 8–32, 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	L. Fang, Z. Liu, and W. Song, “Deep Hashing Neural Networks for Hyperspectral,” IEEE Geosci. Remote Sens. Lett., vol. PP, pp. 1–5, 2019, doi: 10.1109/LGRS.2019.2899823.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	E. M. Paoletti, M. J. Haut, J. Plaza, and A. Plaza, “Deep&amp;Dense Convolutional Neural Network for Hyperspectral Image Classification,” Remote Sens., vol. 10, no. 9, pp. 1–21, 2018, doi: 10.3390/rs10091454.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	H. Lee, M. Kim, D. Jeong, S. Delwiche, K. Chao, and B.-K. Cho, “Detection of cracks on tomatoes using a hyperspectral near-infrared reflectance imaging system,” Sensors, vol. 14, no. 10, pp. 18837–18850, 2014.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	B.-C. Kuo and D. A. Landgrebe, “Nonparametric weighted feature extraction for classification,” IEEE Trans. Geosci. Remote Sens., vol. 42, no. 5, pp. 1096–1105, 2004.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. R. Almeida, L. P. L. Logrado, J. J. Zacca, D. N. Correa, and R. J. Poppi, “Raman hyperspectral imaging in conjunction with independent component analysis as a forensic tool for explosive analysis: The case of an ATM explosion,” Talanta, vol. 174, pp. 628–632, 2017.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Z. Chen, J. Jiang, X. Jiang, X. Fang, and Z. Cai, “Spectral-spatial feature extraction of hyperspectral images based on propagation filter,” Sensors (Switzerland), vol. 18, no. 6, pp. 1–16, 2018, doi: 10.3390/s18061978.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Jiang, J. Ma, C. Chen, Z. Wang, Z. Cai, and L. Wang, “SuperPCA: A Superpixelwise PCA Approach for Unsupervised Feature Extraction of Hyperspectral Imagery,” IEEE Trans. Geosci. Remote Sens., vol. 56, no. 8, pp. 4581–4593, Aug. 2018, doi: 10.1109/TGRS.2018.2828029.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. Su, S. Member, B. Zhao, Q. Du, P. Du, and S. Member, “With Local Correlation Features for Hyperspectral Image Classification,” IEEE Trans. Geosci. Remote Sens., vol. PP, pp. 1–12, 2018, doi: 10.1109/TGRS.2018.2866190.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	G. Camps-Valls and L. Bruzzone, “Kernel-based methods for hyperspectral image classification,” IEEE Trans. Geosci. Remote Sens., vol. 43, no. 6, pp. 1351–1362, Jun. 2005, doi: 10.1109/TGRS.2005.846154.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Khodadadzadeh, P. Ghamisi, C. Contreras, and R. Gloaguen, “Subspace Multinomial Logistic Regression Ensemble for Classification of Hyperspectral Images,” in IGARSS 2018 - 2018 IEEE International Geoscience and Remote Sensing Symposium, Jul. 2018, pp. 5740–5743, doi: 10.1109/IGARSS.2018.8519404.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Song, H. Zhou, J. Zhou, K. Qian, K. Cheng, and Z. Zhang, “Hyperspectral anomaly detection based on anomalous component extraction framework,” Infrared Phys. Technol., vol. 96, pp. 340–350, 2019, doi: 10.1016/j.infrared.2018.12.008.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	E. Blanzieri and F. Melgani, “Nearest Neighbor Classification of Remote Sensing Images With the Maximal Margin Principle,” IEEE Trans. Geosci. Remote Sens., vol. 46, no. 6, pp. 1804–1811, Jun. 2008, doi: 10.1109/TGRS.2008.916090.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	D. Tuia and G. Camps-Valls, “Semisupervised Remote Sensing Image Classification With Cluster Kernels,” IEEE Geosci. Remote Sens. Lett., vol. 6, no. 2, pp. 224–228, Apr. 2009, doi: 10.1109/LGRS.2008.2010275.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Y. Chen, N. M. Nasrabadi, and T. D. Tran, “Hyperspectral Image Classiﬁcation via.pdf,” vol. 51, no. 1, pp. 217–231, 2013.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	X. Weng, W. Lei, and X. Ren, “Kernel sparse representation for hyperspectral unmixing based on high mutual coherence spectral library,” Int. J. Remote Sens., vol. 41, no. 4, pp. 1286–1301, 2020, doi: 10.1080/01431161.2019.1666215.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Y. Xu, Z. Wu, J. Chanussot, and Z. Wei, “Nonlocal Patch Tensor Sparse Representation for Hyperspectral Image Super-Resolution,” IEEE Trans. Image Process., vol. 28, no. 6, pp. 3034–3047, 2019, doi: 10.1109/TIP.2019.2893530.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	G. Cheng, Z. Li, J. Han, X. Yao, and L. Guo, “Exploring Hierarchical Convolutional Features for Hyperspectral Image Classification,” IEEE Trans. Geosci. Remote Sens., vol. PP, pp. 1–11, 2018, doi: 10.1109/TGRS.2018.2841823.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. E. Paoletti, J. M. Haut, J. Plaza, and A. Plaza, “ISPRS Journal of Photogrammetry and Remote Sensing A new deep convolutional neural network for fast hyperspectral image classification,” ISPRS J. Photogramm. Remote Sens., vol. 145, pp. 120–147, 2018, doi: 10.1016/j.isprsjprs.2017.11.021.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	B. Pan, Z. Shi, and X. Xu, “ISPRS Journal of Photogrammetry and Remote Sensing MugNet : Deep learning for hyperspectral image classification using limited samples,” ISPRS J. Photogramm. Remote Sens., 2017, doi: 10.1016/j.isprsjprs.2017.11.003.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	O. Okwuashi and C. E. Ndehedehe, “Deep support vector machine for hyperspectral image classification,” Pattern Recognit., vol. 103, pp. 2–25, 2020, doi: 10.1016/j.patcog.2020.107298.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	B. C. Kuo, C. H. Li, and J. M. Yang, “Kernel nonparametric weighted feature extraction for hyperspectral image classification,” IEEE Trans. Geosci. Remote Sens., vol. 47, no. 4, pp. 1139–1155, 2009, doi: 10.1109/TGRS.2008.2008308.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	L. Sun, C. Ma, Y. Chen, H. J. Shim, Z. Wu, and B. Jeon, “Adjacent superpixel-based multiscale spatial-spectral kernel for hyperspectral classification,” IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens., vol. 12, no. 6, pp. 1905–1919, 2019.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	T. Zhan, L. Sun, Y. Xu, G. Yang, Y. Zhang, and Z. Wu, “Hyperspectral classification via superpixel kernel learning-based low rank representation,” Remote Sens., vol. 10, no. 10, p. 1639, 2018.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	J. Liu, Z. Wu, Z. Xiao, and J. Yang, “Region-based relaxed multiple kernel collaborative representation for hyperspectral image classification,” IEEE Access, vol. 5, pp. 20921–20933, 2017.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	Y. Xu, B. Du, F. Zhang, and L. Zhang, “Hyperspectral image classification via a random patches network,” ISPRS J. Photogramm. Remote Sens., vol. 142, pp. 344–357, 2018.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Hierarchical Weighted Framework for Emotional Distress Detection using Personalized Affective Cues</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Nagesh</given_name><surname>Jadhav</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>21</day><year>2022</year></publication_date><pages><first_page>89</first_page><last_page>101</last_page></pages><doi_data><doi>10.52547/jist.16499.10.38.89</doi><resource>http://jist.ir/en/Article/16499</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/16499</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/16499</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/16499</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/16499</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/16499</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/16499</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/16499</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] Gu Simeng, Wang Fushun, Patel Nitesh P., Bourgeois James A., Huang Jason H, “A Model for Basic Emotions Using Observations of Behavior in Drosophila,” Frontiers in Psychology, vol. 10, 2019, pp.781.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] Rana R, Latif S, Gururajan R, Gray A, Mackenzie G, Humphris G, Dunn J, “Automated screening for distress: A perspective for the future,” The European Journal of Cancer Care, vol. 28(4), 2019, pp. 1-13.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] Riba, M. B. et al., “Distress Management Version 3.2019 ,”  NCCN Clinical Practice Guidelines in Oncology, Journal of the National Comprehensive Cancer Network, vol.17(10), 2019, pp.1229–1249.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] A. Mehrabian and S.R. Ferris, “Inference of attitudes from nonverbal communication in two channels,” International Journal of consulting psychology, vol. 31(3), 1967, pp. 248–252.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] T. Thomas, M. Domínguez and R. Ptucha, "Deep independent audio-visual affect analysis," in 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2017, pp. 1417-1421.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] 	J. A. Miranda, M. F. Canabal, J. M. Lanza-Gutiérrez, M. P. García and C. López-Ongil, "Toward Fear Detection using Affect Recognition," in 2019 XXXIV Conference on Design of Circuits and Integrated Systems (DCIS), November 2019, pp. 1-4.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] Lang He, Dongmei Jiang, and Hichem Sahli. “Multimodal depression recognition with dynamic visual and audio cues,” Proc. 2015 International Conference on Affective Computing and Intelligent Interaction, IEEE Computer Society, USA, 2015, pp. 260–266.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] Guangxia Xu, Weifeng Li, Jun Liu, “A social emotion classification approach using multi-model fusion,” Future Generation Computer Systems, vol. 102, 2020, pp. 347-356.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]Zeinab Farhoudi, Saeed Setayeshi, “Fusion of deep learning features with mixture of brain emotional learning for audio-visual emotion recognition,” Speech Communication,” vol. 127, 2021, pp. 92-103.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Do LN., Yang HJ., Nguyen, HD. et al. “Deep neural network-based fusion model for emotion recognition using visual data,” Journal of Supercomputing, vol.77, 2021, pp. 1-18.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] Neha Jain, Shishir Kumar, Amit Kumar, Pourya Shamsolmoali, Masoumeh Zareapoor, “Hybrid deep neural networks for face emotion recognition,” Pattern Recognition Letters, vol. 115, 2018, pp. 101-106.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] Heysem Kaya, Furkan Grpnar, and Albert Ali Salah, “Video-based emotion recognition in the wild using deep transfer learning and score fusion,” Image Vision Computing, vol. 65, 2017, pp. 66–75.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Shiqing Zhang, Xin Tao, Yuelong Chuang, Xiaoming Zhao, “Learning deep multimodal affective features for spontaneous speech emotion recognition, Speech Communication,” vol. 127, 2021, pp. 73-81.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] Jingwei Yan, Wenming Zheng, Zhen Cui, Chuangao Tang, Tong Zhang, Yuan Zong, “Multi-cue fusion for emotion recognition in the wild,” Neurocomputing, vol. 309, 2018, pp. 27-35.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] Ilyes Bendjoudi, Frederic Vanderhaegen, Denis Hamad, Fadi Dornaika, “Multi-label, multi-task CNN approach for context-based emotion recognition,” Information Fusion, November 2020, in press.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] Man Hao, Wei-Hua Cao, Zhen-Tao Liu, Min Wu, Peng Xiao, “Visual-audio emotion recognition based on multi-task and ensemble learning with multiple features,” Neurocomputing, vol. 391, 2020, pp. 42-51.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] Tzirakis, P., Trigeorgis, G., Nicolaou, M.A., Schuller, B., Zafeiriou, S., “End-to-End Multimodal Emotion Recognition Using Deep Neural Networks,” IEEE Journal of Selected Topics in Signal Processing, vol. 11, 2017, pp. 1301-1309.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] N. Majumder, D. Hazarika, A. Gelbukh, E. Cambria, S. Poria, “Multimodal sentiment analysis using hierarchical fusion with context modeling, Knowledge-Based Systems,” vol. 161, 2018, pp. 124-133.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] Soujanya Poria, Erik Cambria, Amir Hussain, Guang-Bin Huang, “Towards an intelligent framework for multimodal affective data analysis,” Neural Networks, vol. 63, 2015, pp. 104-116.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] Yaxiong Ma, Yixue Hao, Min Chen, Jincai Chen, Ping Lu, Andrej Košir, “Audio-visual emotion fusion (AVEF): A deep efficient weighted approach,” Information Fusion, vol. 46, 2019, pp. 184-192.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] Jie Guo, Bin Song, Peng Zhang, Mengdi Ma, Wenwen Luo, Junmei lv, “Affective video content analysis based on multimodal data fusion in heterogeneous networks,” Information Fusion, vol. 51, 2019, pp. 224-232.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] Soujanya Poria, Erik Cambria, Newton Howard, Guang-Bin Huang, Amir Hussain, “Fusing audio, visual and textual clues for sentiment analysis from multimodal content,” Neurocomputing, vol. 174, Part A, 2016, pp. 50-59.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] F. Noroozi, M. Marjanovic, A. Njegus, S. Escalera and G. Anbarjafari, "Audio-Visual Emotion Recognition in Video Clips," IEEE Transactions on Affective Computing, vol. 10, 2019, pp. 60-75.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] S. Zhang, S. Zhang, T. Huang, W. Gao and Q. Tian, "Learning Affective Features with a Hybrid Deep Model for Audio–Visual Emotion Recognition," IEEE Transactions on Circuits and Systems for Video Technology, vol. 28, 2018, pp. 3030-3043.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] Li, R., Liu, Z., “Stress detection using deep neural networks.,” BMC Medical Informatics and Decision Making vol. 20, 2020, pp. 285.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] P. Bobade and M. Vani, "Stress Detection with Machine Learning and Deep Learning using Multimodal Physiological Data," in 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), 2020, pp. 51-57.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] Zhang, H., Feng, L., Li, N., Jin, Z., &amp; Cao, L., “Video-Based Stress Detection through Deep Learning.,” Sensors, vol. 20(19), 2020, pp.  5552.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] I. J. Goodfellow et al., “Challenges in representation learning: A report on three machine learning contests,” Neural Networks, Special Issue on Deep Learning of Representations, vol. 64, 2015, pp. 59-63.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] Lyons, Michael, Kamachi, Miyuki, &amp; Gyoba, Jiro, “The Japanese Female Facial Expression (JAFFE) Dataset,” Zenodo. 1998.</unstructured_citation></citation><citation key="ref30"><unstructured_citation> 
[30] Lucey et al., "The Extended Cohn-Kanade Dataset (CK+): A complete dataset for action unit and emotion-specified expression," in 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops, 2010, pp. 94-101.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] K. He, X. Zhang, S. Ren and J. Sun, "Deep Residual Learning for Image Recognition," Proc. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770-778, 2016.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] Mehmet Berkehan Akçay, Kaya Oğuz, “Speech emotion recognition: Emotional models, databases, features, preprocessing methods, supporting modalities, and classifiers, Speech Communication,” vol. 116, 2020, pp. 56-76.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] Zheng, F., Zhang, G. &amp; Song, Z., “Comparison of different implementations of MFCC,” Journal of Computer Science &amp; Technology, vol.16, 2001, pp. 582–589.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] Livingstone SR, Russo FA, “The Ryerson Audio-Visual Database of Emotional Speech and Song (RAVDESS): A dynamic, multimodal set of facial and vocal expressions in North American English,” PLoS ONE vol 13(5), 2018.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] Pichora-Fuller, M. Kathleen; Dupuis, Kate, "Toronto emotional speech set (TESS)", Scholars Portal Dataverse, V1, 2020.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] Jacob Devlin, Ming-Wei Chang, Kenton Lee, Kristina Toutanova; “BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding,” in 17th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, June 2019.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] I. Mureşan, A. Stan, M. Giurgiu and R. Potolea, "Evaluation of sentiment polarity prediction using a dimensional and a categorical approach," in 7th Conference on Speech Technology and Human - Computer Dialogue (SpeD), 2013, pp. 1-6.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38] Diman Ghazi, Diana Inkpen &amp; Stan Szpakowicz, “Detecting Emotion Stimuli in Emotion-Bearing Sentences”. in 16th International Conference on Intelligent Text Processing and Computational Linguistics (CICLing 2015), Cairo, Egypt.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39] Li Yanran, Su Hui, Shen Xiaoyu, Li Wenjie, Cao Ziqiang, Niu Shuzi; “DailyDialog: A Manually Labelled Multi-turn Dialogue Dataset,” in Eighth International Joint Conference on Natural Language Processing (Volume 1: Long Papers),2017,nov,Asian Federation of Natural Language Processing,Taipei, Taiwan,Pages pp. 986-995.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40] M. Wöllmer, M. Kaiser, F. Eyben, B. Schuller, G. Rigoll, “LSTM-Modeling of continuous emotions in an audiovisual affect recognition framework,” Image and Vision Computing, vol. 31, 2013, pp. 153-163.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41] S. Chen and Q. Jin. “Multi-Modal Dimensional Emotion Recognition Using Recurrent Neural Networks”, Proc. 5th International Workshop on Audio/Visual Emotion Challenge. AVEC ’15. Brisbane, Australia: Association for Computing Machinery, 2015, pp. 49-56.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>