﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051923</doi_batch_id><timestamp>20260519232507</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>8</month><day>3</day><year>2022</year></publication_date><journal_volume><volume>10</volume></journal_volume><issue>39</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Reducing Energy Consumption in Sensor-Based Internet of Things Networks Based on Multi-Objective Optimization Algorithms</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>sedighimanesh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hessam </given_name><surname>Zandhessami</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahmood </given_name><surname>Alborzi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammadsadegh </given_name><surname>Khayyatian</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>3</day><year>2022</year></publication_date><pages><first_page>180</first_page><last_page>190</last_page></pages><doi_data><doi>10.52547/jist.15639.10.39.180</doi><resource>http://jist.ir/en/Article/15639</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15639</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15639</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15639</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15639</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15639</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15639</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15639</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. Rani, R. Talwar, J. Malhotra, S. H. Ahmed, M. Sarkar, and H. Song, “A novel scheme for an energy efficient internet of things based on wireless sensor networks,” Sensors (Switzerland), 2015, doi: 10.3390/s151128603.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	F. K. Shaikh and S. Zeadally, “Energy harvesting in wireless sensor networks: A comprehensive review,” Renewable and Sustainable Energy Reviews. 2016, doi: 10.1016/j.rser.2015.11.010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	F. Gregorio, G. González, C. Schmidt, and J. Cousseau, “Internet of Things,” in Signals and Communication Technology, 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. P. Ray, “A survey on Internet of Things architectures,” Journal of King Saud University - Computer and Information Sciences. 2018, doi: 10.1016/j.jksuci.2016.10.003.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Sethi and S. R. Sarangi, “Internet of Things: Architectures, Protocols, and Applications,” Journal of Electrical and Computer Engineering. 2017, doi: 10.1155/2017/9324035.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Y. Chang, “A Distributed Cluster Computing Energy-Efficient Routing Scheme for Internet of Things Systems,” Wirel. Pers. Commun., vol. 82, no. 2, pp. 757–776, 2015, doi: 10.1007/s11277-014-2251-8.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	T. M. Behera, S. K. Mohapatra, U. C. Samal, M. S. Khan, M. Daneshmand, and A. H. Gandomi, “Residual energy-based cluster-head selection in WSNs for IoT application,” IEEE Internet Things J., 2019, doi: 10.1109/JIOT.2019.2897119.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Shukla and S. Tripathi, “An Effective Relay Node Selection Technique for Energy Efficient WSN-Assisted IoT,” Wirel. Pers. Commun., vol. 112, no. 4, pp. 2611–2641, 2020, doi: 10.1007/s11277-020-07167-8.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Sedighimanesh, H. Zandhesami, and A. Sedighimanesh, “Presenting the Hybrid Algorithm of Honeybee - Harmony in Clustering and Routing of Wireless Sensor Networks,” Int. J. Sensors, Wirel. Commun. Control, 2018, doi: 10.2174/2210327908666181029094346.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Sedighimanesh* and H. Z. H. and A. Sedighimanesh, “Routing Algorithm based on Clustering for Increasing the Lifetime of Sensor Networks by Using Meta-Heuristic Bee Algorithms,” International Journal of Sensors, Wireless Communications and Control, vol. 10, no. 1. pp. 25–36, 2020, doi: http://dx.doi.org/10.2174/2210327909666190129154802.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Kochhar, P. Kaur, P. Singh, and S. Sharma, “Protocols for wireless sensor networks: A survey,” Journal of Telecommunications and Information Technology. 2018, doi: 10.26636/jtit.2018.117417.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Z. Cui, Y. Cao, X. Cai, J. Cai, and J. Chen, “Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things,” J. Parallel Distrib. Comput., 2019, doi: 10.1016/j.jpdc.2017.12.014.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	N. N. Srinidhi, S. M. Dilip Kumar, and K. R. Venugopal, “Network optimizations in the Internet of Things: A review,” Engineering Science and Technology, an International Journal. 2019, doi: 10.1016/j.jestch.2018.09.003.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	T. Salman and R. Jain, “Networking protocols and standards for internet of things,” in Internet of Things and Data Analytics Handbook, 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Srivastava, M. Singh, and S. Gupta, “Wireless Sensor Network: A Survey,” in 2018 International Conference on Automation and Computational Engineering, ICACE 2018, 2019, doi: 10.1109/ICACE.2018.8687059.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	B. Bhushan and G. Sahoo, “Routing protocols in wireless sensor networks,” in Studies in Computational Intelligence, 2019.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	G. Xie and F. Pan, “Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks with Obstacles,” IEEE Access, 2016, doi: 10.1109/ACCESS.2016.2558196.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on, 2000, p. 10 pp. vol. 2.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Sedighimanesh and A. Sedighimanesh, “Reducing Energy Consumption of the SEECH Algorithm in Wireless Sensor Networks Using a Mobile Sink and Honey Bee Colony Algorithm,” Law, State Telecommun. Rev. / Rev. Direito, Estado e Telecomunicações; Vol 10 No 1, 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	R. I. Tandel, “Leach Protocol in Wireless Sensor Network: A Survey,” Int. J. Comput. Sci. Inf. Technol., 2016.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	K. M. sedighimanesh mohammad, Zandhessami Hessam, Alborzi Mahmood, “Energy Efficient Routing-Based Clustering Protocol Using Computational Intelligence Algorithms in Sensor-Based IoT,” J. Inf. Syst. Telecommun., vol. 33, no. 9, 2021, doi: 10.52547/jist.9.33.55.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	V. Chauhan and S. Soni, “Mobile sink-based energy efficient cluster head selection strategy for wireless sensor networks,” J. Ambient Intell. Humaniz. Comput., 2019, doi: 10.1007/s12652-019-01509-6.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Bhola, S. Soni, and G. K. Cheema, “Genetic algorithm based optimized leach protocol for energy efficient wireless sensor networks,” J. Ambient Intell. Humaniz. Comput., vol. 11, no. 3, pp. 1281–1288, 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	S. Rani, S. H. Ahmed, and R. Rastogi, “Dynamic clustering approach based on wireless sensor networks genetic algorithm for IoT applications,” Wirel. Networks, 2020, doi: 10.1007/s11276-019-02083-7.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	F. Fanian and M. Kuchaki Rafsanjani, “Cluster-based routing protocols in wireless sensor networks: A survey based on methodology,” J. Netw. Comput. Appl., vol. 142, pp. 111–142, Sep. 2019, doi: 10.1016/J.JNCA.2019.04.021.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	S. A. Sert, H. Bagci, and A. Yazici, “MOFCA: Multi-objective fuzzy clustering algorithm for wireless sensor networks,” Appl. Soft Comput., vol. 30, pp. 151–165, 2015.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	K. Sundaran, V. Ganapathy, and P. Sudhakara, “Fuzzy logic based Unequal Clustering in wireless sensor network for minimizing Energy consumption,” in 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), 2017, pp. 304–309, doi: 10.1109/ICCCT2.2017.7972283.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	A. Vatankhah and S. Babaie, “An optimized Bidding-based coverage improvement algorithm for hybrid wireless sensor networks,” Comput. Electr. Eng., vol. 65, pp. 1–17, 2018, doi: https://doi.org/10.1016/j.compeleceng.2017.12.031.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	S. Babaie, N. Zekrizadeh, and S. Nobahary, “NHEEP: A New Hybrid Energy Efficient PartitioningApproach for Wireless Sensor Network Clustering,” Int. J. Inf. Electron. Eng., vol. 2, no. 3, p. 323, 2012.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	A. Kousar, N. Mittal, and P. Singh, “An Improved Hierarchical Clustering Method for Mobile Wireless Sensor Network Using Type-2 Fuzzy Logic,” in Lecture Notes in Electrical Engineering, 2020, doi: 10.1007/978-3-030-30577-2_11.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	D. Wu, “On the Fundamental Differences Between Interval Type-2 and Type-1 Fuzzy Logic Controllers,” IEEE Trans. Fuzzy Syst., vol. 20, no. 5, pp. 832–848, 2012, doi: 10.1109/TFUZZ.2012.2186818.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	W. W. Tan and T. W. Chua, “Uncertain rule-based fuzzy logic systems: introduction and new directions (Mendel, JM; 2001)[book review],” IEEE Comput. Intell. Mag., vol. 2, no. 1, pp. 72–73, 2007.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	H. Hagras, “Type-2 FLCs: A new generation of fuzzy controllers,” IEEE Comput. Intell. Mag., vol. 2, no. 1, pp. 30–43, 2007.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	D. W. W. W. Tan, “A simplified type-2 fuzzy logic controller for real-time control,” ISA Trans., vol. 45, no. 4, pp. 503–516, 2006.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	D. Wu and W. W. Tan, “Genetic learning and performance evaluation of interval type-2 fuzzy logic controllers,” Eng. Appl. Artif. Intell., vol. 19, no. 8, pp. 829–841, 2006.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	N. N. Karnik, J. M. Mendel, and Q. Liang, “Type-2 fuzzy logic systems,” IEEE Trans. Fuzzy Syst., 1999, doi: 10.1109/91.811231.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	D. Wu, “An interval type-2 fuzzy logic system cannot be implemented by traditional type-1 fuzzy logic systems,” in Proc. World Conference on Soft Computing, 2011.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	X. Wang, L. Wang, and Y. Wu, “An Optimal Algorithm for Prufer Codes.,” J. Softw. Eng. Appl., vol. 2, no. 2, pp. 111–115, 2009.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	S. Mirjalili, “Genetic algorithm,” in Studies in Computational Intelligence, 2019.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Rough Sets Theory with Deep Learning for Tracking in Natural Interaction with Deaf</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Ebrahimi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hossein</given_name><surname>Ebrahimpour-Komeleh</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>3</day><year>2022</year></publication_date><pages><first_page>211</first_page><last_page>221</last_page></pages><doi_data><doi>10.52547/jist.16060.10.39.211</doi><resource>http://jist.ir/en/Article/16060</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/16060</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/16060</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/16060</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/16060</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/16060</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/16060</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/16060</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] H. Tang, H. Liu, W. Xiao and N. Sebe, "Fast and robust dynamic hand gesture recognition via key frames extraction and feature fusion", Neurocomputing, Vol. 331, 2019, pp. 424-433.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] L. Kraljevi´c, M. Russo, M. Paukovi´c and M. Šari´c, “A Dynamic Gesture Recognition Interface for Smart Home Control based on Croatian Sign Language”, Appl. Sci. 2020, 10, 2300.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] A. Wadhawan and P. Kumar, "Sign Language Recognition Systems: A Decade Systematic Literature Review", Arch Computat Methods Eng 2019, https://doi.org/10.1007/s11831-019-09384-2.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] P. Kim, "MATLAB Deep Learning: With Machine Learning, Neural Networks and Artificial Intelligence", Apress, 2017.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] A.E. Hassanien, A. Abraham, J.F. Peters, G. Schaefer, Henry C., "Rough sets and near sets in medical imaging: a review", IEEE Transactions on Information Technology in Biomedicine, Vol. 13(6), 2009, pp. 955-968.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] V. Sattari-Naeini, and A. Moaref, "Fuzzy-rough Information Gain Ratio Approach to Filter-wrapper Feature Selection", International Journal of Engineering, Vol. 30(9), 2017, pp. 1326-1333.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] D. Li, C. R. Opazo, X. Yu and H. Li, "Word-level Deep Sign Language Recognition from Video: A New Large-scale Dataset and Methods Comparison", Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2020, pp. 1459-1469.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] A. H. Mazinan, J. Hassanian, “A Hybrid Object Tracking for Hand Gesture Approach based on MS-MD and its Application,” Journal of Information Systems and Telecommunication (JIST), 2015, Vol. 3, No. 4.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] S. Ildarabadi, M. Ebrahimi, H. R. Pourreza, "Improvement Tracking Dynamic Programming using Replication Function for Continuous Sign Language Recognition", International Journal of Engineering Trends and Technology (IJETT), Vol 7(3), 2014, pp. 97-101.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] P. Chiranjeevi, S. Sengupta, “Rough-Set-Theoretic Fuzzy Cues-Based Object Tracking Under Improved Particle Filter Framework”, IEEE transactions on fuzzy systems, Vol. 24, 2016, No. 3.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] J. B. Zhang, T. R. Li, &amp; H. M. Chen. "Composite rough sets for dynamic data mining", Information Science, Vol. 257, 2014, pp. 81–100.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] Y.  Xu, A.  Sep, Y.  Ban, R.  Horaud, L.  Leal-Taixe and X.  Alameda-Pineda, “How to train your deep multi-object tracker", Proc. IEEE/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 6787-6796, Jun. 2020.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Edge Detection and Identification using Deep Learning to Identify Vehicles</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Zohreh</given_name><surname>Dorrani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hassan</given_name><surname>Farsi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sajad</given_name><surname>Mohammadzadeh</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>3</day><year>2022</year></publication_date><pages><first_page>201</first_page><last_page>210</last_page></pages><doi_data><doi>10.52547/jist.16385.10.39.201</doi><resource>http://jist.ir/en/Article/16385</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/16385</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/16385</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/16385</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/16385</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/16385</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/16385</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/16385</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] Z. Qu, SY. Wang, L. Liu, and DY. Zhou, "Visual Cross-Image Fusion Using Deep Neural Networks for Image Edge Detection", IEEE Access., Vol. 7, No. 1, 2019, pp. 57604-57615.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	 Z. Dorrani, and M. S. Mahmoodi, "Noisy images edge detection: Ant colony optimization algorithm", Journal of AI and Data Mining, Vol. 4, No. 1, 2016, pp. 77-83.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	SM. Ismail, LA. Said, AG. Radwan, and AH Madian. "A novel image encryption system merging fractional-order edge detection and generalized chaotic maps, Signal Processing, Vol. 167, No.1, 2020, pp. 107280.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	 N. Balamuralidhar, S. Tilon, and Francesco Nex. "MultEYE: Monitoring System for Real-Time Vehicle Detection, Tracking and Speed Estimation from UAV Imagery on Edge-Computing Platforms", Remote Sensing Vol. 13, No. 4, 2021, pp. 573.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	 B. Wang, LL. Chen, ZY. Zhang, "A novel method on the edge detection of infrared image", Optik, Vol. 180, No.1, 2019, pp. 610-614.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Choudhury, S.P. Chattopadhyay, and T.K. Hazra, "Vehicle detection and counting using haar feature based classifier", In receding’s of the 8th Annual Industrial Automation and Electromechanical Engineering Conference, 2017, Vol. 8, pp. 106–109.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. Sang, Z. Wu, P. Guo, H. Hu, H. Xiang, Q. Zhang, Cai, B. "An Improved YOLOv2 for Vehicle Detection", Sensors, Vol.18, No. 12, 2018, pp. 4272.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	W.U. Qiong, and L. Sheng-bin, "Single Shot MultiBox Detector for Vehicles and Pedestrians Detection and Classification", in 2nd International Seminar on Applied Physics, Optoelectronics and Photonics   Inc. Lancaster, 2017, Vol. 2, pp. 1-7.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Ren, K. He, R. Girshick, and J. Sun, "Faster R-CNN: Towards real-time object detection with region proposal networks", IEEE Trans. Pattern Anal, Vol. 39, No.6, 2017, pp. 1137–1149.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] A. Dubey, and S. Rane, "Implementation of an intelligent traffic control system and real time traffic statistics broadcasting", In Proceedings of the International conference of Electronics, Communication and Aerospace Technology, 2017, Vol.1, pp. 33–37.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] SM. Bhandarkar, Y. Zhang, and WD. Potter, "An edge detection technique using genetic algorithm-based optimization", Pattern Recognit, Vol. 27, No. 9, 1994, pp.1159–1180.
[12] R. Chaudhary, A. Patel, S. Kumar, and S. Tomar, "Edge detection using particle swarm optimization technique", International Conference on Computing, Communication and Automation IEEE, 2017, Vol.1, pp.363–367. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13] DS. Lu, CC. Chen, "Edge detection improvement by ant colony optimization", Pattern Recognit Lett. Vol. 9, No. 4, 2008, pp. 416–425.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14] S. Xie, and Z. Tu. "Holistically-nested edge detection", In Proceedings of the IEEE international conference on computer vision, 2015, Vol. 125, pp. 3–18.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15] S. Rajaraman, and A. Chokkalinga, "Chromosomal edge detection using modified bacterial foraging algorithm", Int J Bio-Science Bio-Technology, Vol. 6, No. 1, 2014, pp. 111–122.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16] OP. Verma, M. Hanmandlu, AK. Sultania, and AS. Parihar, "A novel fuzzy system for edge detection in noisy image using bacterial foraging", Multidimens Syst Signal Process, Vol. 24, No. 1, 2013, pp.181–198.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17] ME. Yüksel, "Edge detection in noisy images by neuro-fuzzy processing", Int J Electroni Commun, Vol. 61, No. 2, 2007, pp. 82–89.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18] M. Setayesh, M. Zhang, and M. Johnston, "Edge detection using constrained discrete particle swarm optimization in noisy images", IEEE Congress of Evolutionary Computation (CEC), 2011, pp. 246–253.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19] Y. Wang, Y. Li, Y. Song, and X. Rong, "The influence of the activation function in a convolution neural network model of facial expression recognition", Applied Sciences, Vol. 10. No. 5, 2020, pp. 1897.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20] A. Sezavar, H. Farsi, and S. Mohamadzadeh. "Content-based image retrieval by combining convolutional neural networks and sparse representation", Multimedia Tools and Applications, Vol. 78, No. 15, 2019, pp. 20895-20912.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21] Z. Song, L. Fu, J. Wu, Z. Liu, R. Li, and Y. Cui, "Kiwifruit detection in field images using Faster R-CNN with VGG16", IFAC-Papers On Line, Vol. 52, No. 30, 2019, pp. 76-81.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22] S. Manali, and M. Pawar, "Transfer learning for image classification", Second International Conference on Electronics, Communication and Aerospace Technology, 2018, Vol. 2, pp. 656-660.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23] W. Long, X. Li, and L. Gao, "A transfer convolutional neural network for fault diagnosis based on ResNet-50", Neural Computing and Applications, Vol. 32, No. 1, 2019, pp. 1-14.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24] P. Ghosal, L. Nandanwar, and S. Kanchan, "Brain tumor classification using ResNet-101 based squeeze and excitation deep neural network", Second International Conference on Advanced Computational and Communication Paradigms (ICACCP). IEEE, 2019, Vol.2, pp. 1-6.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25] A. Sezavar, H. Farsi, and S. Mohamadzadeh. "A modified grasshopper optimization algorithm combined with CNN for content based image retrieval", International Journal of Engineering 32.7, 2019, 924-930.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26] R. Nasiripour, H. Farsi, S. Mohamadzadeh. "Visual saliency object detection using sparse learning", IET Image Processing, Vol. 13, No. 13, 2019, pp. 2436-2447.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27] H. Zamanian, H. Farsi, and S. Mohamadzadeh. "Improvement in Accuracy and Speed of Image Semantic Segmentation via Convolution Neural Network Encoder-Decoder", Information Systems &amp; Telecommunication, Vol. 6, No. 3, 2018, pp. 128-135.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28] R. Guerrero-Gomez-Olmedo, and RJ Lopez-Sastre, "Vehicle tracking by simultaneous detection and viewpoint estimation. "International Work-Conference on the Interplay Between Natural and Artificial Computation", Springer, 2013, pp. 306-316.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29] Y. Wang, P.M. Jodoin, F. Porikli, J. Konrad, Y. Benezeth, and P. Ishwar, "CDnet 2014: An expanded change detection benchmark dataset", inProc. IEEE Conf. Comput. Vis. Pattern Recognit. Workshops, 2014, pp. 393–400.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30] Z. Dorrani, H. Farsi, and S. Mohamadzadeh. "Image Edge Detection with Fuzzy Ant Colony Optimization Algorithm", International Journal of Engineering, Vol. 33, No. 12, 2020, pp. 2464-2470.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31] D. Impedovo, F. Balducci, V. Dentamaro, and G. Pirlo, "Vehicular traffic congestion classification by visual features and deep learning approaches: a comparison", Sensors, Vol. 19, No. 23, 2019, pp. 5213-5225.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32] C. Wen, P. Liu, W. Ma, Z. Jian, C. Lv, and J. Hong, "Edge detection with feature re-extraction deep convolutional neural network", Journal of Visual Communication and Image Representation, Vol. 57, No. 1, 2018, pp. 84-90.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Recognition of Attention Deficit/Hyperactivity Disorder (ADHD) Based on Electroencephalographic Signals Using Convolutional Neural Networks (CNNs)</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Sara</given_name><surname>Motamed</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Elham</given_name><surname>Askari</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>3</day><year>2022</year></publication_date><pages><first_page>222</first_page><last_page>228</last_page></pages><doi_data><doi>10.52547/jist.16399.10.39.222</doi><resource>http://jist.ir/en/Article/16399</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/16399</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/16399</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/16399</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/16399</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/16399</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/16399</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/16399</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] A. Shirazi, J. Alaghbandrad, “Treatment of Attention Deficit Hyperactivity Disorder (ADHD) With a Cognitive Behavioral Approach”, Journal of Advances in Cognitive Science. Vol. 2, 1379, pp. 29- 34.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] C. H. Chen, J. D. Lee, M. C. Lin, “Classification of Underwater Signals Using Neural Networks”, Journal of Science and Engineering. Vol. 3, 2000, pp. 31-48.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] B. P. Howell, S. Wood, S. Koksal, “Passive Sonar Recognition and Analysis Using Hybrid Neural Networks”, IEEE Proceedings Oceans. Vol. 4, 2003, pp. 1917- 1924. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] H. H. Jasper, P. Solomon, C. Bradley, “Electroencephalographic Analyses of Behavior Problem Children”, Am. J. Psychiatry. Vol. 95, 1938, pp. 641–658.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] A. Lenartowicz, S. K. Loo, “Use of EEG to Diagnose ADHD”, Curr. Psychiatry Rep. Vol. 16, 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] M. Fabiani, G. Gratton, K. D. Federmeier, “Event-Related Brain Potentials: Methods, Theory, and Applications, in Handbook of Psychophysiology”, 3rd Edn (New York, NY: Cambridge University Press), 2007, pp. 85–119.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] B. Kim, J. Roh, S. Dong, S. Lee, “Hierarchical Committee of Deep Convolutional Neural Networks for Robust Facial Expression Recognition”, Journal on Multimodal User Interfaces. 2016, pp. 1–17. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] G. F. Woodman, “A Brief Introduction to the Use of Event-Related Potentials in Studies of Perception and Attention”, Psychophysics, 2010, Vol. 72, pp. 2031–2046.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] E. Kroupi, S. Frisch, A. Castellano, M. David, I. S. Montplaisir, J. Gagnon, “Deep Networks Using Auto-Encoders for PD prodromal analysis”, In Proceedings of the HBP Student Conference on Transdisciplinary Research Linking Neuroscience, Brain Medicine and Computer Science, Vienna, 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] T. H. Grandy, M. Werkle-Bergner, C. Chicherio, F. Schmiedek, M. Lövdén, U. Lindenberger. “Peak Individual Alpha Frequency Qualifies as a Stable Neurophysiological Trait Marker in Healthy Younger and Older Adults”, Psychophysiology, 2013, pp. 570–582.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] https://school.brainhackmtl.org/project/adhdsubtype-project.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] S. Haykin, “Neural Networks, a Comprehensive Foundation”, Prentice Hall, Vol. 4n No. 2, 1999, pp. 191-192.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] H. Abdi, L. J. Williams, “Principal Component Analysis”, Wiley Interdisciplinary Reviews: Computational Statistics, Vol. 2, 2010, pp. 433-459.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] K. Boyd, K. H. Eng, “Area Under the Precision-recall Curve: Point Estimates and Confidence Intervals”, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013, pp. 451–466.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] J. Davis, M. Goadrich, “The Relationship between Precision-Recall and ROC Curves”, Proceedings of the 23rd International Conference on Machine Learning, 2006, pp. 233–240.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] F. Li, X. Li, F. Wang, D. Zhang, Y. Li, F. He, “A Novel P300 Classification of Algorithm based on a Principal Component Analysis-Convolutional Neural Network”, Applied Science, 2019, pp. 2-15.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] M. Robertson, S. Furlong, B. Voytek, C. Boettiger, M. Sheridan, “EEG Power Spectral Slope Differs by ADHD Status and Stimulant Medication Exposure in Early Childhood”, Journal of Neurophysiology, 2019, pp. 2427-2437.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] M. R. Mohammadi, A. Khaleghi, A. M. Nasrabadi, “EEG Classification of ADHD and Normal Children using Non-Linear Features and Neural Network”,  The Korean Society of Medical &amp; Biological Engineering and Springer, Vol. 6, 2016, pp. 66-73.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An ICT Performance Evaluation Model based on Meta-Synthesis Approach </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Khatrehe</given_name><surname>Bamary</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad Reza</given_name><surname>Behboudi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Tayebeh</given_name><surname>Abbasnjad</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>3</day><year>2022</year></publication_date><pages><first_page>229</first_page><last_page>240</last_page></pages><doi_data><doi>10.52547/jist.16445.10.39.229</doi><resource>http://jist.ir/en/Article/16445</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/16445</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/16445</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/16445</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/16445</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/16445</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/16445</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/16445</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation> [1] J. L. García-Alcaraz, V. Martínez-Loya, J. R. Díaz-Reza, J. Blanco-Fernández, E. Jiménez-Macías, and A. J. G. Lopez. “Effect of ICT integration on SC flexibility, agility and company’ performance: the Mexican maquiladora experience” Wireless Networks, Vol. 26, No.7, 2020, pp. 4805-4818.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] M. Arslandere, İ. Tuncer, and A. D. A. Serkan. “The Impact of ICT Use in Promotional Activities on Export Performance: An Empirical Investigation”, Business &amp; Management Studies: An International Journal, Vol. 8, No.2, 2020, pp. 2384 – 2413.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] A. Rimmimgton, G. Dickens, and C. Pasqire. “Impact of Information and Communication Technology (ICT) on construction projects”, Organization, technology &amp; management in construction: an international journal, Vol. 7, No.3, 2015, pp. 1367-1382.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] X. Chaojun, Y. Wei, H. Chenlin, and S. Congying. “Design and Validation of School ICT Monitoring &amp; Evaluation Framework: A Case Study”, American Journal of Education and Information Technology. Vol. 4, No.2, 2020, pp. 78.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] T. B. Gyamerah. “Using e-learning to improve the performance of first year nursing students in ICT”. GSJ, Vol. 8, No.6, 2020, pp.-250-257.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] I. Apulu, and A. Latham."An Evaluation of the Impact of Information and Communication Technologies: Two Case Study Examples". International Business Research, Vol. 3, No. 4, 2011, pp. 3-9.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] M. Okumu Ujunju, G. Wanyembi, and F. Wabwoba." Evaluating the Role of Information and Communication Technology (ICT) Support towards Processes of Management in Institutions of Higher Learning", (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No.7, 2012, pp. 55-58.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] A. M. Sayaf, M. M. Alamri, M. A. Alqahtani and W. M. Al-Rahmi. "Information and Communications Technology Used in Higher Education: An Empirical Study on Digital Learning as Sustainability". Sustainability, Vol. 13, No. 13, 2021.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] H. Toya, and M. Skidmore. "Information/communication technology and natural disaster vulnerability", Economics Letters, 2015, pp. 143-145.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] A. André." The Information Technology Revolution in Health Care", In: André A. (eds) Digital Medicine. Health Informatics. Springer, Cham, 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] S. Dutta, and B. Bilbao-Osorio. “The Global Information Technology Report 2015”, World Economic Forum, Vol. 1, No.1, 2015, pp. 200-42.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] K. Milis, and R. Mercken. “The use of the balanced scorecard for the evaluation of information and communication technology projects”, International Journal of Project Management, Vol. 22, No.2, 2004, pp. 87-97.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] S. Haanappel, R. Drost, F. Harmsen,, S. Brinkkemper, and J. M. Versendaal. “A framework for IT performance management”, Available from www: http://www. Cs. Uu. Nl/research/ techreps /repo/CS, 2011(006).</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] J. Becker, R. Knackstedt, and J. Pöppelbuß, "Developing maturity models for IT management", Business &amp; Information Systems Engineering, Vol.1, No.5, 2009, pp. 213-222.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] J. McKay, P. Marshall, and L. Smith. “Steps towards effective IT governance: strategic IS planning, evaluation and benefits management”, PACIS 2003 Proceedings, 65.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] E. H. Arribas, and P. S. Inchusta. “Evaluation models of information technology in Spanish companies: a cluster analysis”, Information &amp; Management, Vol. 36, No.3, 1999, pp. 151-164.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
 [17] A. Albadvi, A. Keramati, and J. Razmi. “Assessing the impact of information technology on firm performance considering the role of intervening variables: organizational infrastructures and business processes reengineering”. International Journal of Production Research, Vol. 45, No.5, 2007, pp. 2697-2734.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
 [18] B. C. Stahl. “Information technology, responsibility, and anthropology”, In Proceedings of the 35th Annual Hawaii International Conference on System Sciences. IEEE, 2002, pp.1-10.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] K. L. Kraemer &amp; J. N. Danziger, "The impacts of computer technology on the worklife of information workers". Social Science Computer Review, Vol. 8, No. 4, 1990, pp. 592-613.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] C. A. Gorse, &amp; S. Emmitt. Investigating interpersonal communication during construction progress meetings: challenges and opportunities. Engineering, Construction and Architectural Management., Vol .10, No. 2, 2003, pp 233-245.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] O. Zizlavsky. “The balanced scorecard: Innovative performance measurement and management control system”, Journal of technology management &amp; innovation, Vol. 9, No.3, 2014, pp. 210-222.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] N. Y. Wijayanti, W. Setiawan, and R. A. Sukamto. “Performance Assessment of IT Governance with Balanced Score Card and COBIT 4.1 of Universitas Pendidikan Indonesia”, Journal of Physics: Conference Series, Vol. 812, No. 1, 2017, p. 012072. IOP Publishing.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] M. Uii, H. Gusaptono, M. Effendi and N. Charibaldi. “The Information Technology (IT) Adoption Process and E- Readiness to Use within Yogyakarta Indonesian Small Medium Enterprises (SME)”, International Journal of Information and Communication Technology Research, Vol. 2, No. 1, 2012, pp. 1-12.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] F. Salehi1, B. Abdollahbeigi1 and S, Sajjady. “Impact of Effective IT Governance on Organizational Performance and Economic Growth in Canada”, Asian Journal of Economics, Finance and Management, Vol. 3, No. 2, 2021, pp, 14-19.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] M. Simonsson, and P. Johnson. “Defining IT governance-a consolidation of literature”, The 18th conference on advanced information systems engineering, Vol. 6, 2006, pp, 1-19.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
 [26] P. Weill, and J. W. Ross. “IT governance on one page”. No 349, 2004, pp, 1-18. Available at SSRN: https://ssrn.com/abstract=664612.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] B. Tuttle, and S. D. Vandervelde. “An empirical examination of CobiT as an internal control framework for information technology”, International Journal of Accounting information systems, Vol. 8, No.4, 2007, pp. 240-236.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] I. Arfyanti1, N. Nursobah, R. Rajiansyah.“IT Governance Of Senayan Library Management System (Slims) Library and Archives Department Of East Kalimantan Province Using COBIT 5.0”, Jurnal Ilmiah MATRIK, Vol. 23, No.2, 2021, pp. 159-166.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] G. Ridley, J.Young, and P. Carroll. “COBIT and its Utilization: A framework from the literature”, 37th Annual Hawaii International Conference on System Sciences, Proceedings of the IEEE, 2004, pp, 1-8.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] R. P. Dhaniawaty, and E. Susilawati. “The Evaluation of Information Technology Investment Management using the Domain of Portfolio Management (PM) Val IT Framework 2.0 in PT. XYZ. IOP Conference Series”, Materials Science and Engineering Vol. 407, No. 1, 2018, p. 012129. IOP Publishing.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] M. Kozina, and D. Popovic. “VAL IT framework and ICT benefits”, Central European Conference on Information and Intelligent Systems. Faculty of Organization and Informatics Varazdin. 2010, pp. 221.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] S. Sahibudin, M. Sharifi, and M. Ayat. “Combining ITIL, COBIT and ISO/IEC 27002 in order to design a comprehensive IT framework in organizations”, Second Asia International Conference on Modelling &amp; Simulation (AMS). 2008, pp. 749-753.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] M. B. Al Mourad and M. Hussain, "The Impact of Cloud Computing on ITIL Service Strategy Processes," International Journal of Computer and Communication Engineering vol. 3, no. 5, 2014, pp. 367-371.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] M. Marrone, F. Gacenga, A. Cater-Steel, and L. Kolbe. “IT service management: A cross-national study of ITIL adoption”, CAIS, 34, 49.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] M. H. Koniyo "Identification of components for evaluation e-government governance framework according to regional government characteristics" The 5th Annual Applied Science and Engineering Conference. vol. 1098, No. 5, 2021, pp. 1-8.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Dynamic Tree- Based Routing: Applied in Wireless Sensor Network and IOT</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mehdi</given_name><surname>Khazaei</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>3</day><year>2022</year></publication_date><pages><first_page>191</first_page><last_page>200</last_page></pages><doi_data><doi>10.52547/jist.22504.10.39.191</doi><resource>http://jist.ir/en/Article/22504</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/22504</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/22504</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/22504</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/22504</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/22504</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/22504</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/22504</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. S. BenSaleh, R. Saida, Y. H. Kacem, and M. Abid, "Wireless Sensor Network Design Methodologies: A Survey," Journal of Sensors, vol. 2020, p. 9592836, 2020/01/25 2020.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, "Wireless sensor networks: a survey on recent developments and potential synergies," The Journal of Supercomputing, vol. 68, no. 1, pp. 1-48, 2014/04/01 2014.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	X. Liu, "Atypical Hierarchical Routing Protocols for Wireless Sensor Networks: A Review," IEEE Sensors Journal, vol. 15, no. 10, pp. 5372-5383, 2015.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	L. Chan, K. Gomez Chavez, H. Rudolph, and A. Hourani, "Hierarchical routing protocols for wireless sensor network: a compressive survey," Wireless Networks, vol. 26, no. 5, pp. 3291-3314, 2020/07/01 2020.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Ding, X. Cheng, and G. Xue, "Aggregation tree construction in sensor networks," in 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484), 2003, vol. 4, pp. 2168-2172 Vol.4.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	K. Hyun-sook and H. Ki-jun, "A power efficient routing protocol based on balanced tree in wireless sensor networks," In First International Conference on Distributed Frameworks for Multimedia Applications, 2005, pp. 138-143.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. Ö. Tan and I. Körpeoǧlu, "Power efficient data gathering and aggregation in wireless sensor networks," SIGMOD Rec., vol. 32, no. 4, pp. 66–71, 2003.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	W. Qiu, E. Skafidas, and P. Hao, "Enhanced tree routing for wireless sensor networks," Ad Hoc Networks, vol. 7, no. 3, pp. 638-650, 2009/05/01/ 2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	T. Nguyen Duy and V. Nguyen Dinh, "SSTBC: Sleep scheduled and tree-based clustering routing protocol for energy-efficient in wireless sensor networks," in The 2015 IEEE RIVF International Conference on Computing &amp; Communication Technologies - Research, Innovation, and Vision for Future (RIVF), 2015, pp. 180-185.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Y. Lu and L. D. Xu, "Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2103-2115, 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] M. Kocakulak and I. Butun, "An overview of Wireless Sensor Networks towards internet of things," In 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), 2017, pp. 1-6.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] M. B. Yassen, S. Aljawaerneh, and R. Abdulraziq, "Secure low energy adaptive clustering hierarchal based on internet of things for wireless sensor network (WSN): Survey," In 2016 International Conference on Engineering &amp; MIS (ICEMIS), 2016, pp. 1-9.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] A. Mir and A. Khachane, "Sensing Harmful Gases in Industries Using IOT and WSN," In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), 2018, pp. 1-3.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] S. Bera, S. Misra, S. K. Roy, and M. S. Obaidat, "Soft-WSN: Software-Defined WSN Management System for IoT Applications," IEEE Systems Journal, vol. 12, no. 3, pp. 2074-2081, 2018.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] M. M. Afsar and M.-H. Tayarani-N, "Clustering in sensor networks: A literature survey," Journal of Network and Computer Applications, vol. 46, pp. 198-226, 2014/11/01/ 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] A. Fahad et al., "A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis," IEEE Transactions on Emerging Topics in Computing, vol. 2, no. 3, pp. 267-279, 2014.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] J. Blanckenstein, J. Klaue, and H. Karl, "A Survey of Low-Power Transceivers and Their Applications," IEEE Circuits and Systems Magazine, vol. 15, no. 3, pp. 6-17, 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] M. Abdoos, A. Esmaeili, and N. Mozayani, "Holonification of a Network of Agents Based on Graph Theory," Berlin, Heidelberg, 2012, pp. 379-388: Springer Berlin Heidelberg.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] M. Khazaei and N. Mozayani, "Overload management with regard to fairness in session initiation protocol networks by holonic multiagent systems," International Journal of Network Management, vol. 27, no. 3, p. e1969, 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] M. Khazaei and N. Mozayani, "A dynamic distributed overload control mechanism in SIP networks with holonic multi-agent systems," Telecommunication Systems, vol. 63, no. 3, pp. 437-455, 2016/11/01 2016.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] I. E. Antoniou and E. T. Tsompa, "Statistical Analysis of Weighted Networks," Discrete Dynamics in Nature and Society, vol. 2008, p. 375452, 2008/05/06 2008.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] O. Fercoq, "Perron vector optimization applied to search engines," Applied Numerical Mathematics, vol. 75, pp. 77-99, 2014/01/01/ 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] A. Esmaeili, N. Mozayani, and M. R. J. Motlagh, "Multi-level holonification of multi-agent networks," in 2014 Iranian Conference on Intelligent Systems (ICIS), 2014, pp. 1-5.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] J. Wang, J. Liao, T. Li, J. Wang, J. Wang, and Q. Qi, "Probe-based end-to-end overload control for networks of SIP servers," Journal of Network and Computer Applications, vol. 41, pp. 114-125, 2014/05/01/ 2014.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] J. Liao, J. Wang, T. Li, J. Wang, J. Wang, and X. Zhu, "A distributed end-to-end overload control mechanism for networks of SIP servers," Computer Networks, vol. 56, no. 12, pp. 2847-2868, 2012/08/16/ 2012.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks," IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660-670, 2002.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] M. Khazaei, “Analytical Model to Create Proxy Server Sessions in Multimedia Networks, “Journal of Information Systems and Telecommunication, vol. 9, Special Issue, pp. 10-20, 2021.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Membrane Cholesterol Prediction from Human Receptor using Rough Set based Mean-Shift Approach</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Rudra Kalyan</given_name><surname>Nayak</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ramamani </given_name><surname>Tripathy</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hitesh </given_name><surname>Mohapatra</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Amiya </given_name><surname>Kumar Rath</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Debahuti </given_name><surname>Mishra</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>3</day><year>2022</year></publication_date><pages><first_page>161</first_page><last_page>168</last_page></pages><doi_data><doi>10.52547/jist.27327.10.39.161</doi><resource>http://jist.ir/en/Article/27327</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/27327</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/27327</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/27327</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/27327</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/27327</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/27327</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/27327</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]  D. M. Rosenbaum, S. G. Rasmussen, and B. K. Kobilka, “The structure and function of G-protein-coupled receptors,” Nature, vol. 459, no. 7245, pp. 356-363, May 2009.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	  C. Ellis, “The state of GPCR research in 2004,” Nature Reviews Drug Discovery, vol. 3, no. 7, pp. 577-626, 2004.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	  C. J. Baier, J. Fantini, and F. J. Barrantes, “Disclosure of cholesterol recognition motifs in transmembrane domains of the human nicotinic acetylcholine receptor,” Scientific reports, vol. 1, no. 1, pp. 1-7, 2011.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	  X. Sun and G. R. Whittaker, “Role for influenza virus envelope cholesterol in virus entry and infection,” Journal of virology, vol. 77, no. 3, pp. 12543-12551, 2003.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	  T. J. Pucadyil, A. Chattopadhyay, “Role of cholesterol in the function and organization of G-protein coupled receptors,” Progress in lipid research, vol. 45, no. 4, pp. 295-333, 2006.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	  S. Putluri,  M. Z. Rahman, C. S. Amara, and N. Putluri, “New exon prediction techniques using adaptive signal processing algorithms for genomic analysis, IEEE Access, vol. no. 7, pp. 80800-80812, 2019.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	  T. A. Masoodi, N. A. Shaik, S. Burhan, Q. Hasan, G. Shafi, and V. R. Talluri, “Structural prediction, whole exome sequencing and molecular dynamics simulation confirms p. G118D somatic mutation of PIK3CA as functionally important in breast cancer patients,” Computational biology and chemistry, vol. 80, no. 2, pp. 472-479, 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	  A. Ahilan, G. Manogaran, C. Raja, S. Kadry, S. N. Kumar, C. A. Kumar, T. Jarin, S. Krishnamoorthy, P. M. Kumar, G. C. Babu, and N. S. Murugan, “Segmentation by fractional order darwinian particle swarm optimization based multilevel thresholding and improved lossless prediction based compression algorithm for medical images,” IEEE Access, vol. 7, pp. 89570-89580, 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	  N. Jayanthi, B. V. Babu, and N. S. Rao, “Survey on clinical prediction models for diabetes prediction,” Journal of Big Data, vol. 4, no. 1, pp. 1-5, 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]  M. Anila, and G. Pradeepini, “Study of prediction algorithms for selecting appropriate classifier in machine learning,” Journal of Advanced Research in Dynamical and Control Systems, vol. 9, pp. 257-268,  2017.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]  R. Tripathy, D.  Mishra, and V. B. Konkimalla, “A novel fuzzy C-means approach for uncovering cholesterol consensus motif from human G-protein coupled receptors (GPCR),” Karbala International Journal of Modern Science, vol. 1, no. 4, pp. 212-224, 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]  R. Tripathy, D. Mishra, V. B. Konkimalla, and R. K. Nayak, “A computational approach for mining cholesterol and their potential target against GPCR seven helices based on spectral clustering and fuzzy c-means algorithms,” Journal of Intelligent &amp; Fuzzy Systems, vol. 35, no. 1, pp. 305-314, 2018.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]  R. M. Epand, A. Thomas, R. Brasseur, and R. F. Epand, “Cholesterol interaction with proteins that partition into membrane domains: an overview,” Cholesterol Binding and Cholesterol Transport Proteins, pp. 253-278, 2010.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]  R. M. Epand, “Cholesterol and the interaction of proteins with membrane domains. Progress in lipid research,” vol. 45, no. 4, pp. 279-294, 2006.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]  D. Gurram, and M. N. Rao, ‘A comparative study of support vector machine and logistic regression for the diagnosis of thyroid dysfunction,” International Journal of Engineering &amp; Technology, vol. 7, no. 1.1, pp. 326-328, 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]  H. Jyothula, S. K. Rao, and V. Vallikumari, “Two phase active counter mechanism embedded with particle swarm optimization technique for segmentation of bio-medical images,” Journal of Advanced Research in Dynamical and Control Systems, vol. 9, no. 6, pp. 232-242, 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]  S. Razia, M. R. Narasingarao, and P. Bojja, “Development and analysis of support vector machine techniques for early prediction of breast cancer and thyroid,” Journal of Advanced Research in Dynamical and Control Systems, vol. 9, no. 6, pp. 869-878, 2017.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]  P. Siva Kumar, V. Sarvani, P. Prudhvi Raj, K. Suma, and D. Nandu, “Prediction of heart disease using multiple regression analysis and support vector machines,” Journal of Advanced Research in Dynamical and Control Systems, vol. 9, no. 18, pp. 675-682, 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]  N. Rajesh, T. Maneesha, S. Hafeez, and H. Krishna, “Prediction of heart disease using machine learning algorithms,” International Journal of Engineering &amp; Technology(UAE),  vol. 7, no. 2.32, pp. 363-366, 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]  Q. B. Gao QB, Z. Z. Wang, “Classification of G-protein coupled receptors at four levels,” Protein Engineering, Design and Selection, vol. 19, no. 11, pp. 511-516, 2006.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]  Q. Gu, Y. S. Ding, and T. L. Zhang, “Prediction of G-protein-coupled receptor classes in low homology using Chou's pseudo amino acid composition with approximate entropy and hydrophobicity patterns,” Protein and peptide letters, vol. 17, no. 5, pp. 559-567, 2010.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]  M. Bhasin, and G. P. Raghava, “GPCRsclass: a web tool for the classification of amine type of G-protein-coupled receptors,” Nucleic acids research, vol. 33, no. 2, pp. W143-147, 2005.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]  http://www.uniprot.org
[24]  Z. Pawlak, “Rough sets,” International journal of computer &amp; information sciences, vol. 11, no. 5, pp. 341-356, 1982.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]  A. Skowron, J. Komorowski, Z. Pawlak, and L. Polkowski, “Rough sets perspective on data and knowledge,” In Handbook of data mining and knowledge discovery, pp. 134-149, 2002.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]  Z. Pawlak, and A. Skowron, “Rough membership functions,” In Advances in the Dempster-Shafer theory of evidence, pp. 251-271, 1994.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]  L. Polkowski, “Rough sets,” Heidelberg: Physica-Verlag, 2002.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]  L. Polkowski, and A. Skowron, “Rough mereological calculi of granules: A rough set approach to computation,” Computational Intelligence, vol. 17, no. 3, pp. 472-492, 2001.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]  M. A. Carreira-Perpinan, “Gaussian mean-shift is an EM algorithm,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 5, pp. 767-776, 2007.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]  H. E. Cetingul, and R. Vidal, “Intrinsic mean shift for clustering on Stiefel and Grassmann manifolds” In 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1896-1902, 2009, IEEE.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]  C. C. Chang, and C. J. Lin, “IJCNN 2001 challenge: Generalization ability and text decoding,” In IJCNN'01 International Joint Conference on Neural Networks, Proceedings (Cat. No. 01CH37222), vol. 2, pp. 1031-1036, 2001, IEEE.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]  Y. Cheng, “Mean shift, mode seeking, and clustering,” IEEE transactions on pattern analysis and machine intelligence, vol. 17, no. 8, pp. 790-799, 1995.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]  R. T. Collins, “Mean-shift blob tracking through scale space,” In 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Proceedings, vol. 2, pp. II-234, 2003, IEEE.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]  D. Comaniciu, and P. Meer, “Mean shift: A robust approach toward feature space analysis,” IEEE Transactions on pattern analysis and machine intelligence, vol. 24, no. 5, pp. 603-619, 2002.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]  D. S. Wilks, “Statistical methods in the atmospheric sciences,” Academic press, 2011.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]  M. A. Carreira-Perpinán, “Fast nonparametric clustering with Gaussian blurring mean-shift” In Proceedings of the 23rd international conference on Machine learning, pp. 153-160, 2006.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]  M. A. Carreira-Perpinan, “Acceleration strategies for Gaussian mean-shift image segmentation,” In 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06), vol. 1, pp. 1160-1167, 2006, IEEE.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Corpus for Evaluation of Cross Language Text Re-use Detection Systems</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Salar</given_name><surname>Mohtaj</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Habibollah</given_name><surname>Asghari</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>3</day><year>2022</year></publication_date><pages><first_page>169</first_page><last_page>179</last_page></pages><doi_data><doi>10.52547/jist.33583.10.39.169</doi><resource>http://jist.ir/en/Article/33583</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/33583</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/33583</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/33583</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/33583</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/33583</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/33583</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/33583</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation> [1] A. Barrón-Cedeño, P. Rosso, D. Pinto, and A. Juan, “On Cross-lingual Plagiarism Analysis using a Statistical Model“, Proceedings of the ECAI’08 workshop on uncovering plagiarism, authorship and social software misuse, Patras, Greece, 22 July 2008 (Vol. 377). CEUR-WS.org.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] N. Ehsan, and A. Shakery, “Candidate document retrieval for cross-lingual plagiarism detection using two-level proximity information”, Information Processing and Management, vol. 52, no. 6, pp. 1004-1017, 2016.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] C. Callison-Burch, “Paraphrasing and translation”, Doctoral Dissertation, School of Informatics, University of Edinburgh, 2007.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] M. Potthast, A. Barrón-Cedeño, A. Eiselt, B. Stein, and P.  Rosso, “Overview of the 2nd international competition on plagiarism detection”. In CLEF 2010 labs and workshops, notebook papers, 22-23 September 2010, Padua, Italy (Vol. 1176). CEUR-WS.org.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] M. Potthast, B. Stein, A. Eiselt, A. Barrón-Cedeño, and P.  Rosso, “Overview of the 1st international competition on plagiarism detection”. In 3rd PAN workshop; Uncovering plagiarism, authorship and social software misuse (PAN 09), San Sebastian, Spain, 10 September 2009, pp. 1–9.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] A. Barrón-Cedeño, P. Rosso, S. L. Devi, P. D. Clough, and M. Stevenson, “PAND@FIRE: Overview of the cross-language !ndian text re-use detection competition.“ Multi-lingual information access in south asian languages - second international workshop, FIRE 2010, gandhinagar, india, february 19-21, 2010 and third international workshop, FIRE 2011, Bombay, India, 2-4 December 2011, revised selected papers (Vol. 7536, pp. 59–70). Springer. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] M. S., Arefin, Y. Morimoto, and M. A. Sharif. “BAENPD: A Bilingual Plagiarism Detector”, Journal of Computers. vol. 8, no. 5, pp. 1145-1156, 2013.
[8] D. Pinto, J. Civera, A. Barrón-Cedeño, A. Juan, and P. Rosso. “A statistical approach to cross-lingual natural language tasks” Journal of Algorithms, vol 64, no. 1, pp. 51-60, 2009.
[9] M. Potthast, A. Eiselt, A. Barrón-Cedeño, B. Stein, B., and P. Rosso, “Overview of the 3rd international competition on plagiarism detection”. In CLEF 2011 labs and workshop, notebook papers, 19-22 September 2011, Amsterdam, the Netherlands (Vol. 1177). CEUR-WS.org.
[10] W. A. Gale, and K. W. Church, “A program for aligning sentences in bilingual corpora." Computational Linguistics, vol. 19, no. 1 pp. 75-102. 1993.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[11] R. C. Pereira, V. P. Moreira, and R. Galante, “A new approach for cross-language plagiarism analysis”. Multi-lingual and multimodal information access evaluation: International conference of the cross-language evaluation forum, CLEF 2010, Padua, Italy, 20-23 September 2010. Proceedings (Vol. 6360, pp. 15–26). Springer. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[12] M. Potthast, A. Barrón-Cedeño, B. Stein, and P. Rosso, “Cross-language plagiarism detection”, Language Resources and Evaluation, vol. 45, no. 1, pp. 45–62, 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[13] Z. Ceska, M. Toman, and K. Jezek, “Multi-lingual plagiarism detection”. In 13th international conference on Artiﬁcial intelligence: Methodology, systems, and applications, (AIMSA 2008), Varna, Bulgaria, September 4-6, 2008. Proceedings (Vol. 5253, pp. 83–92). Springer. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[14] M. Potthast, M., Hagen, M., Völske, M. and B. Stein, “Crowdsourcing interaction logs to understand text reuse from the web”, In Proceedings of the 51st annual meeting of the Association for Computational Linguistics (ACL) (Volume 1: Long Papers), Sofia, Bulgaria, 4-9 August 2013, pp. 1212-1221.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[15] H. Asghari, O. Fatemi, S. Mohtaj, H. Faili, and P. Rosso. “On the use of word embedding for cross language plagiarism detection”, Intelligent Data Analysis, vol. 23, no. 3, pp. 661-680, 2019.
[16] E. Al-Thwaib, B. H. Hammo, and S. Yagi, “An academic Arabic corpus for plagiarism detection: Design, construction and experimentation”, International Journal of Educational Technology in Higher Education, vol. 17, no. 1, pp.1-26. 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[17] K. Khoshnavataher, V. Zarrabi, S. Mohtaj, S., and H.  Asghari, “Developing monolingual Persian corpus for extrinsic plagiarism detection using artificial obfuscation”, Notebook for PAN at CLEF 2015.
[18] M. Potthast, B. Stein, A. Barrón-Cedeño, and P. Rosso. “An evaluation framework for plagiarism detection”, In COLING 2010: 23rd International Conference on Computational Linguistics, 23-27 August 2010, Beijing, China, posters volume, pp. 997-1005.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[19] S. F. Adafre, and M. De Rijke, “Finding similar sentences across multiple languages in Wikipedia”. In Proceedings of the 11th conference of the European chapter of the Association for Computational Linguistics, 4 April 2006, Trento, Italy, pp. 62–69.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[20] P. G. Otero, and I. G. L´opez, “Wikipedia as multi-lingual source of comparable corpora”, In Proceedings of the 3rd Workshop on Building and Using Comparable Corpora, LREC, pp. 21–25, 2010.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[21] T. Wang, R. Di, and J. Song, “A Novel Online Encyclopedia-Oriented Approach for Large-Scale Knowledge Base Construction”, J. Softw., vol. 9, no 2, pp. 482–489, 2014.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[22] P. Resnik, “Mining the web for bilingual text”, In Proceedings of the 27th annual meeting of the Association for Computational Linguistics (ACL), university of Maryland, College Park, Maryland, USA, 20-26 June 1999. pp. 527-534.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[23] H. Zamani, H. Faili, A. Shakery, “Sentence alignment using local and global information”, Computer Speech &amp; Language, 39, pp. 88-107, 2016. doi: 10.1016/j.csl.2016.03.002.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[24] A. Barrón-Cedeño, M. L. Paramita, P. D. Clough, and P. Rosso, “A comparison of approaches for measuring cross-lingual similarity of Wikipedia articles”. Advances in information retrieval - 36th European Conference on IR Research, (ECIR 2014), Amsterdam, the Netherlands, 13-16 April 2014. Proceedings (Vol. 8416), pp. 424–429, Springer. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[25] M. Rosvall, and C. T. Bergstrom, C. T. “Maps of random walks on complex networks reveal community structure”. Proceedings of the National Academy of Sciences of the USA, 105(4), 2008, pp. 1118–1123.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[26] S. Fortunato, and A. Lancichinetti, “Community detection algorithms: A comparative analysis: invited presentation, extended abstract. In 4th international conference on performance evaluation methodologies and tools, VALUETOOLS’09, Pisa, Italy, 20-22 October 2009, pp. 1-2. ICST/ACM. </unstructured_citation></citation><citation key="ref22"><unstructured_citation> 
[27] A. Farghaly, “Computer processing of Arabic script-based languages: current state and future directions”. In Proceedings of the workshop on computational approaches to Arabic script-based languages, Stroudsburg, PA, USA, 28 August 2004, pp. 1-1.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[28] S. Mohtaj, B. Roshanfekr, A. Zafarian, and H. Asghari. “Parsivar: A language processing toolkit for Persian”, In Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018), 7-12 May 2018, Miyazaki, Japan, pp. 1112-1118.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[29] M. Potthast, T. Gollub, M. Hagen, J. Kiesel, M. Michel, M., A. Oberlander, B. Stein, B. “Overview of the 4th international competition on plagiarism detection”. In CLEF 2012 evaluation labs and workshop, online working notes, Rome, Italy, 17-20 September 2012 (Vol. 1178). CEUR-WS.org. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[30] P. Clough and M. Stevenson, “Developing a corpus of plagiarized short answers”, Language Resources and Evaluation, vol. 45, no 1, pp. 5–24, 2011.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[31] M. L. Paramita, P. D. Clough, A. Aker, A., and R. J. Gaizauskas. “Correlation between similarity measures for inter-language linked Wikipedia articles”. In Proceedings of the eighth international conference on language resources and evaluation, (LREC 2012), Istanbul, Turkey, 23-25 May 2012, pp. 790–797.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[32] H. Asghari, K. Khoshnava, O. Fatemi, and H. Faili, “Developing bilingual plagiarism detection corpus using sentence aligned parallel corpus”, Notebook for PAN at CLEF, 2015.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>