﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051923</doi_batch_id><timestamp>20260519232701</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>10</month><day>19</day><year>2022</year></publication_date><journal_volume><volume>10</volume></journal_volume><issue>40</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Propose an E-CRM Model based on Mobile Computing Technology in Pharma Distribution Industry</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Alireza</given_name><surname>Kamanghad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Gholamreza</given_name><surname>Hashemzade</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammadali</given_name><surname>Afshar kazemi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Nosratollah</given_name><surname>Shadnoosh</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>19</day><year>2022</year></publication_date><pages><first_page>287</first_page><last_page>299</last_page></pages><doi_data><doi>10.52547/jist.16209.10.40.287</doi><resource>http://jist.ir/en/Article/16209</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/16209</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/16209</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/16209</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/16209</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/16209</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/16209</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/16209</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] https://www.tasnimnews.com/fa/news/1394/07/20/886841.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] A. Mishra, D. Mishra, “Customer Relationship Management: Implementation Process Perspective”, Acta Polytechnica Hungaric, 6 (4), 83- 99, 2009.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] A. Jafarnejad, C. Loox and A. Monshi, “Towards Electronic Customer Relationship Management: An CRM Solutions Development Mythology”, Iranian Journal of Management Studies (IJMS), 1(1), 73-89, 2007.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]  S. Jirehbandei and A. Nemmaney Pour, “A New Model for e-CRM in e-Commerce using Live-Operator”, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering, Vol 5, 8, 1006-1008, 2011.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] P. Fottouhiyehpour, “Assessing the Readiness for implementing CRM in B2B Markets Using AHP Method”, (Master Thesis). Lulea University of Technology, Sweden, 2008.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] D. Verma and D. Singh Verma, “Managing Customer Relationship through Mobile CRM in Organized retail outlets”, International Journal of Engineering Trends and Technology (IJETT), Vol 4(5), 1697-1701, 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]  Turban et al, “Information Technology for Management: Transforming Organizations in the Digital Economy”, 6th ed. John Wiley &amp; Sons, 2008.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]   A. Motameni and E. Jafari, “The role of Human resource in CRM implementation”, The Managers Covenant, 49, 51-56, 2010.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] M. Karunanithy and K. Kajendra, “An Evolution of Customer Relationship Management: A Conceptual Approach”, Proceeding of Jaffna University International Research Conference (JUICE 2012), published March 2014, Sri Lanka, 49-54, 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] I. Dalla Pozza, O. Goetz, Oliver and J. Sahut,  “Implementation effects in the relationship between CRM and its performance”, Journal of Business Research, 89, 391-403, 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] I. Grazdane, “A Customer Relationship Management Approach for Optical Retail Business”, (Master Thesis), Helsinki Metropolitan University of Applied Sciences, 2013.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] K. Anderson, and C. Kerr, “Customer Relationship Management”, McGraw Hill Companies, Inc., 2006.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] K.A. Richards and E. Jones, “Customer relationship management: Finding value drivers”, Industrial Marketing Management, 37,120–130, 2008.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] N. Mohammadhossein, and Z. Nor Hedayati, “CRM Benefits for Customers: Literature Review”, International Journal of Engineering Research and Applications (IJERA), Vol 2, 6, 1578-1586, 2012.
[15] M. Aloka, M. Alkhateeb, M. Abbad, and F. Jaber, “Customer Relationship Management: A review and Classification”, Transactional Marketing Journal, 7, 2, 187-210, 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]  R. Lin, R. Chen, and K. Shun Chiu, “Customer relationship management and innovation capability: an empirical study”, Industrial Management &amp; Data Systems, 110(1), 111-133, 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]  M. Wang, “Measuring CRM service quality in the library context: a preliminary study”, The Electronic Library, 26(6), 896-911, 2007.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]  F. Nuradlin, R. Ferdiana, R. and S. Fauziati, “Current Trend and Literature on Electronic CRM Adoption”, International Conference on Electronic Representation and Algorithm, ICERA 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19] F. Tseng, T.T.L. Phan, T.C.E. Cheng and C. Teng, “Enhancing customer loyalty to mobile instant messaging: Perspectives of network effect and self-determination theories”, Telematics and Informatics, 35, 1133-1143, 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]  Word Economic Forum, “Deep Shift Technology Tipping Points and Societal Impact”, Retrieved from http://www3.weforum.org.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>/docs/WEF_GAC15_Technological_Tipping_Points_report_2015.pdf, 2015.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]  K. Schwab, “The Fourth Industrial Revolution”, Penguin Random House, UK, 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]   F. Gu, J. Niu, Z. Qi and M. Atiquzzaman, “Partitioning and Offloading in Smart Devices for Mobile Cloud Computing: State of the Art and Future Directions”, Journal of Network and Computer Applications, Accepted 19 June 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]   Z. Gani and W. Maung, “Mobile Applications in customer relationship management to enhance empowerment of knowledge  to customers”, Journal of Physics: Conference Series, 1502 0120235, 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]  G. Componovo, Y. Pigneur, A. Rangone, and F. Renga, “Mobile Customer Relationship management: An Explorative Investigation of the Italian Consumer Market”, 42- 48. 10.1109/ICMB, 2005.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]  S. San-Martin, N.H. Jimenez and B. Lopez-Catalan, “The firm’s benefits of mobile CRM from relationship marketing approach and the TOE model”, Spanish Journal of Marketing- ESIC 20, 18-29, 2016.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]  M. Rodriguez and K. Trainor, “A conceptual model of the drivers and outcomes of mobile CRM application adoption”, Journal of Research in Interactive Marketing, Vol 10 (1), 67-84, 2016.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] S. Tenny, G.D. brannan, J.M. Brannan &amp; N.C. Sharts-Hopko, “Qualitative Study”, In Statpearls, Statpearls Publishing, 2021.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
 [28] S. Li, X. You, H. Liu and P. Zhang, “DEMATEL Technique: A Systematic Review of the state-of-the-Art Literature on Methodologies and Applications”, Mathematical Problem in Engineering, 101-134, 2018.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] W. Lee and LS. Wong, “Determinants of Mobile Commerce Customer Loyalty in Malaysia”, Procedia- Social and Behavioral Sciences, 224: 60-67, 2016.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] MH. Ronaghi, A. Dehdarizadeh, S. Safaee and A. Asadpour, “An eCRM model for banking industry in Iran”, New Marketing Research Journal, Special Issue, 1-12, May 2012.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
 [31] R. Thakur, “Understanding Customer Engagement and Loyalty: A Case of Mobile Devices for Shopping”, Journal of retailing and Consumer Services, 32: 151-163, 2017.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>ARASP: An ASIP Processor for Automated Reversible Logic Synthesis</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Zeinab</given_name><surname>Kalantari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Marzieh</given_name><surname>Gerami</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad</given_name><surname>eshghi</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>19</day><year>2022</year></publication_date><pages><first_page>279</first_page><last_page>286</last_page></pages><doi_data><doi>10.52547/jist.16264.10.40.279</doi><resource>http://jist.ir/en/Article/16264</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/16264</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/16264</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/16264</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/16264</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/16264</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/16264</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/16264</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K. Kucukcakar, "An ASIP design methodology for embedded systems," in Proceedings of the Seventh International Workshop on Hardware/Software Codesign (CODES'99)(IEEE Cat. No. 99TH8450), 1999: IEEE, pp. 17-21.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Gries and K. Keutzer, Building ASIPs: The Mescal Methodology. Springer Science &amp; Business Media, 2006.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. F. Mirzaee and M. Eshghi, "Design of an ASIP IDEA crypto processor," in 2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications, 2011: IEEE, pp. 1-7.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	K. Shahbazi, M. Eshghi, and R. F. Mirzaee, "Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5," Engineering science and technology, an international journal, vol. 20, no. 4, pp. 1308-1317, 2017.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Venkanna, R. Rao, and P. C. Sekhar, "An Efficient Design of ASIP Using Pipelining Architecture," in International Conference on Intelligent Computing and Applications, 2019: Springer, pp. 117-128.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	D. Große, X. Chen, G. W. Dueck, and R. Drechsler, "Exact SAT-based Toffoli network synthesis," in Proceedings of the 17th ACM Great Lakes symposium on VLSI, 2007, pp. 96-101.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. Bu and P. Wang, "An improved KFDD based reversible circuit synthesis method," Integration, vol. 69, pp. 251-265, 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	T. Ahmed, A. Younes, and A. Elsayed, "Improving the quantum cost of reversible Boolean functions using reorder algorithm," Quantum Information Processing, vol. 17, no. 5, pp. 1-16, 2018.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Basak, A. Sadhu, K. Das, and K. K. Sharma, "Cost Optimization Technique for Quantum Circuits," International Journal of Theoretical Physics, vol. 58, no. 9, pp. 3158-3179, 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Z. Kalantari, M. Eshghi, M. Mohammadi, and S. Jassbi, "Low-cost and compact design method for reversible sequential circuits," The Journal of Supercomputing, vol. 75, no. 11, pp. 7497-7519, 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation> 
[11]	M. Lukac, M. Perkowski, and M. Pivtoraiko, “Evolutionary approach to quantum and reversible circuits synthesis,” Artificial Intelligence Review Journal, vol. 20, no. 3–4, pp. 361–417, 2003.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Lukac, M. Pivtoraiko, A. Mishchenko, and M. Perkowski, "Automated synthesis of generalized reversible cascades using genetic algorithms," 2002.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Haghparast, M. Mohammadi, K. Navi, and M. Eshghi, "Optimized reversible multiplier circuit," Journal of Circuits, Systems, and Computers, vol. 18, no. 02, pp. 311-323, 2009.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Mohammadi and M. Eshghi, "Heuristic methods to use don’t care in automated design of reversible and quantum logic circuits," Quantum Information Processing, vol. 7, no. 4, pp.175-192, 2008.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Y. Abubakar and L. T. Jung, "Synthesis of Reversible Logic Using Enhanced Genetic Programming Approach," in 2018 4th International Conference on Computer and Information Sciences (ICCOINS), 2018: IEEE, pp. 1-5.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	T. Atkinson, A. Karsa, J. Drake, and J. Swan, "Quantum program synthesis: Swarm algorithms and benchmarks," in European Conference on Genetic Programming, 2019: Springer, pp. 19-34.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. Landauer, "Irreversibility and heat generation in the computing process," IBM journal of research and development, vol. 5, no. 3, pp. 183-191, 1961.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	C. H. Bennett, "Logical reversibility of computation," IBM Journal of Research and Development, vol. 17, no. 6, pp. 525-532, 1973.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	R. P. Feynman, "Quantum mechanical computers," Foundations of Physics, pp. 507-531, 1986.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. P. Frank, "Introduction to reversible computing: motivation, progress, and challenges," in Proceedings of the 2nd Conference on Computing Frontiers, 2005, pp. 385-390.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	E. Fredkin and T. Toffoli, "Conservative logic," International Journal of theoretical physics, vol. 21, no. 3, pp. 219-253, 1982.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Novel Approach for Establishing Connectivity in Partitioned Mobile Sensor Networks using Beamforming Techniques</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Abbas</given_name><surname>Mirzaei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Shahram</given_name><surname>Zandian</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>19</day><year>2022</year></publication_date><pages><first_page>300</first_page><last_page>311</last_page></pages><doi_data><doi>10.52547/jist.16302.10.40.300</doi><resource>http://jist.ir/en/Article/16302</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/16302</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/16302</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/16302</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/16302</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/16302</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/16302</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/16302</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	O. Cheikhrouhou, A. Koubaa, M. Boujelben, M. Abid. “A lightweight user authentication scheme for wireless sensor networks.” InACS/IEEE International Conference on Computer Systems and Applications-AICCSA 2010 2010 May 16 (pp. 1-7). IEEE.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] Bhushan, Bharat, and Gadadhar Sahoo. "Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks." Wireless Personal Communications 98, no. 2 (2018): 2037-2077.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] AM Somarin, Y. Alaei, MR Tahernezhad, A. Mohajer, M. Barari. “An Efficient Routing Protocol for Discovering the Optimum Path in Mobile Ad Hoc Networks. Indian Journal of Science and Technology. 2015 Apr;8(S8):450-5.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] Radosavljević, Nemanja, and Đorđe Babić. "Overview of security threats, prevention and protection mechanisms in wireless sensor networks." J. Mechatron. Autom. Identif. Technol (2020): 1-6.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] L. Zhou, Y. Shan, X. Chen. “An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks”. In2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2019 Mar 15 (pp. 262-265). IEEE.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] J. Yang, ME. Aydin, J. Zhang, C. Maple. “UMTS base station location planning: a mathematical model and heuristic optimisation algorithms”. IET communications. 2007 Oct 1;1(5):1007-14.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] R. Mudumbai, G Barriac, U. Madhow. “On the feasibility of distributed beamforming in wireless networks.” IEEE Transactions on Wireless communications. 2007 May 21;6(5):1754-63.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] R. Mudumbai, DR. Iii, U. Madhow, “Poor HV. Distributed transmit beamforming: challenges and recent progress.” IEEE Communications Magazine. 2009 Feb 18;47(2):102-10.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] Mohajer, Amin, F. Sorouri, A. Mirzaei, A. Ziaeddini, K. Jalali Rad, and Maryam Bavaghar. "Energy-aware hierarchical resource management and Backhaul traffic optimization in heterogeneous cellular networks." IEEE Systems Journal (2022).</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] H. Fang, L. Xu, KK. Choo. “Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks.” Applied Mathematics and Computation. 2017 Mar 1;296:153-67.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] AS. Abuzneid, T. Sobh, M. Faezipour, A. Mahmood, J. James. “Fortified anonymous communication protocol for location privacy in WSN: a modular approach.” Sensors. 2015 Mar;15(3):5820-64.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] Mohajer, Amin, Mohammad Hasan Hajimobini, Abbas Mirzaei, and Ehsan Noori. "Trusted-CDS based intrusion detection system in wireless sensor network (TC-IDS)." Open Access Library Journal 1, no. 7 (2014): 1-10.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] V. Kumar, A. Kumar. “A novel approach for boosting base station anonymity in a wsn”. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS. 2017 Sep 1;8(9):114-20.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] U. Acharya, M. Younis. “Increasing base-station anonymity in wireless sensor networks. Ad Hoc Networks”. 2010 Nov 1;8(8):791-809.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] YA. Bangash, LF. Zeng, D. Feng . “MimiBS: Mimicking base-station to provide location privacy protection in wireless sensor networks”. Journal of Computer Science and Technology. 2017 Sep;32(5):991-1007.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] P. Gope, AK. Das, N. Kumar, Y. Cheng. “Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks”. IEEE transactions on industrial informatics. 2019 Jan 24;15(9):4957-68.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] D. Sharma, A. Goap, AK. Shukla, AP. Bhondekar. “Traffic heterogeneity analysis in an energy heterogeneous WSN routing algorithm”. InProceedings of 2nd International Conference on Communication, Computing and Networking 2019 (pp. 335-343). Springer, Singapore.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] AA. Mugheri, MA. Siddiqui, M. Khoso. “Analysis on Security Methods of Wireless Sensor Network (WSN)”. Sukkur IBA Journal of Computing and Mathematical Sciences. 2018 Jun 26;2(1):52-60.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] Z. Sun, M. Wei, Z. Zhang, G. Qu. “Secure Routing Protocol based on Multi-objective Ant-colony-optimization for wireless sensor networks”. Applied Soft Computing. 2019 Apr 1;77:366-75.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] H. Fakhrey, M. Johnston, F. Angelini, R. Tiwari. “The optimum design of location-dependent key management protocol for a multiple sink WSN using a random selected cell reporter. IEEE Sensors Journal”. 2018 Sep 24;18(24):10163-73.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] O. Oladayo, A. Ashraf. “A secure and energy-aware routing protocol for optimal routing in mobile wireless sensor networks (MWSNs)”. International Journal of Sensors Wireless Communications and Control. 2019 Dec 1;9(4):507-20.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] K. Indira, U. Sakthi. “An efficient anonymous authentication scheme to improve security and privacy in SDN based wireless sensor networks”. Indian Journal of Computer Science and Engineering. 2020.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] Mohajer, Amin, Mahya Sam Daliri, A. Mirzaei, A. Ziaeddini, M. Nabipour, and Maryam Bavaghar. "Heterogeneous Computational Resource Allocation for NOMA: Toward Green Mobile Edge-Computing Systems." IEEE Transactions on Services Computing (2022).</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] Lee, Jae Seang, Yoon-Sik Yoo, Hyungseok Choi, Taejoon Kim, and Jun Kyun Choi. "Group connectivity-based UAV positioning and data slot allocation for tactical MANET." IEEE Access 8 (2020): 220570-220584.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] Zhang, De-gan, Hao Wu, Peng-zhen Zhao, Xiao-huan Liu, Yu-ya Cui, Lu Chen, and Ting Zhang. "New approach of multi-path reliable transmission for marginal wireless sensor network." Wireless Networks 26, no. 2 (2020): 1503-1517.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] Jaber, Ghada, Rahim Kacimi, and Thierry Gayraud. "Efficient Interest Satisfaction in Content Centric Wireless Sensor Networks." In 2019 16th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC), pp. 1-5. IEEE, 2019.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] M. Bavaghar, A. Mohajer, S. Taghavi Motlagh. “Energy Efficient Clustering Algorithm for Wireless Sensor Networks”. Journal of Information Systems and Telecommunication (JIST). 2020 Jun;4(28):238.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] Liu, Hao, Rongbo Zhu, Jun Wang, and Wengang Xu. "Blockchain-Based Key Management and Green Routing Scheme for Vehicular Named Data Networking." Security and Communication Networks 2021 (2021).</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
 [29] Gai, Keke, Kim-Kwang Raymond Choo, Meikang Qiu, and Liehuang Zhu. "Privacy-preserving content-oriented wireless communication in internet-of-things." IEEE Internet of Things Journal 5, no. 4 (2018): 3059-3067.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] A. Mohajer, M. Barari, H. Zarrabi. “Big Data-based Self Optimization Networking in Multi Carrier Mobile Networks”. Bulletin de la Société Royale des Sciences de Liège. 2016 Jan 1;85:392-408.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] M. Dibaei, A. Ghaffari. “Full-duplex medium access control protocols in wireless networks: a survey”. Wireless Networks. 2020 May;26(4):2825-43.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] H. Jung, IH. Lee. “Secrecy performance analysis of analog cooperative beamforming in three-dimensional Gaussian distributed wireless sensor networks”. IEEE Transactions on Wireless Communications. 2019 Feb 12;18(3):1860-73.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] W. Ge, Z. Zhu, W. Hao, Y. Wang, Z. Wang, Q. Wu, Z. Chu.  “AN-Aided Secure Beamforming in Power-Splitting-Enabled SWIPT MIMO Heterogeneous Wireless Sensor Networks”. Electronics. 2019 Apr;8(4):459.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] A. Angappan, TP. Saravanabava, P. Sakthivel, KS. Vishvaksenan. “Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN”. Journal of Ambient Intelligence and Humanized Computing. 2020 Jul 7:1-2.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] S. Kumar, H. Kim. “Energy efficient scheduling in wireless sensor networks for periodic data gathering”. IEEE access. 2019 Jan 10;7:11410-26.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] I. Tomić, JA. McCann. “A survey of potential security issues in existing wireless sensor network protocols”. IEEE Internet of Things Journal. 2017 Sep 7;4(6):1910-23.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] Y. Yuan, L. Huo, Z. Wang, D. Hogrefe. “Secure APIT localization scheme against sybil attacks in distributed wireless sensor networks”. IEEE Access. 2018 May 15;6:27629-36.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38] Y. Liu, Z. Ding, M. Elkashlan, “Poor HV. Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer”. IEEE Journal on Selected Areas in Communications. 2016 Mar 31;34(4):938-53.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Detection of Attacks and Anomalies in the Internet of Things System using Neural Networks Based on Training with PSO Algorithms, Fuzzy PSO, Comparative PSO and Mutative PSO</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad </given_name><surname>Nazarpour</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>navid</given_name><surname>nezafati</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sajjad </given_name><surname>Shokouhyar</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>19</day><year>2022</year></publication_date><pages><first_page>270</first_page><last_page>278</last_page></pages><doi_data><doi>10.52547/jist.16307.10.40.270</doi><resource>http://jist.ir/en/Article/16307</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/16307</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/16307</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/16307</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/16307</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/16307</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/16307</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/16307</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>1-	Haji, Saad Hikmat, and Siddeeq Y. Ameen. "Attack and anomaly detection in IOT networks using machine learning techniques: A review." Asian Journal of Research in Computer Science (2021): 30-46.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
2-	Aversano, Lerina, et al. "Effective Anomaly Detection Using Deep Learning in IoT Systems." Wireless Communications and Mobile Computing 2021 (2021). (+).</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
3-	Khan, Arshiya, and Chase Cotton. "Detecting Attacks on IoT Devices using Featureless 1D-CNN." 2021 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2021.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
4-	Bello, Ibrahim, et al. "Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives." Journal of Ambient Intelligence and Humanized Computing 12.9 (2021): 8699-8717.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
5-	Foley, John, Naghmeh Moradpoor, and Henry Ochen. "Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset." Security and Communication Networks 2020 (2020).</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
6-	Ullah, Imtiaz, and Qusay H. Mahmoud. "Design and development of a deep learning-based model for anomaly detection in IoT networks." IEEE Access 9 (2021): 103906-103926.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
7-	Syed, Naeem Firdous, et al. "Denial of service attack detection through machine learning for the IOT." Journal of Information and Telecommunication (2020): 1-22.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
8-	Manimurugan, S., et al. "Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network." IEEE Access 8 (2020): 77396-77404.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
9-	Churcher, Andrew, et al. "An experimental analysis of attack classification using machine learning in iot networks." Sensors 21.2 (2021): 446. (+).</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
10-	Latif, Shahid, et al. "A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network." IEEE Access 8 (2020): 89337-89350.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
11-	Alkronz, EyadSameh, et al. "Prediction of Whether Mushroom is Edible or Poisonous Using Back-propagation Neural Network." (2019).</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
12-	Wang, Weilin, et al. "Estimation of PM2. 5 concentrations in China using a spatial back propagation neural network." Scientific reports 9.1 (2019): 1-10.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
13-	Mohammadi, Farzaneh, et al. "Modelling and optimizing pyrene removal from the soil by phytoremediation using response surface methodology, artificial neural networks, and genetic algorithm." Chemosphere 237 (2019): 124486.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
14-	Azimi, Yousef, Seyed Hasan Khoshrou, and MortezaOsanloo. "Prediction of blast induced ground vibration (BIGV) of quarry mining using hybrid genetic algorithm optimized artificial neural network." Measurement 147 (2019): 106874.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
15-	Cai, Jianghui, et al. "A Novel Clustering Algorithm Based on DPC and PSO." IEEE Access 8 (2020): 88200-88214.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
16-	Singh, Shakti, Prachi Chauhan, and NirbhowJap Singh. "Capacity optimization of grid connected solar/fuel cell energy system using hybrid ABC-PSO algorithm." International Journal of Hydrogen Energy (2020).</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
17-	Devarasiddappa, D., M. Chandrasekaran, and R. Arunachalam. "Experimental investigation and parametric optimization for minimizing surface roughness during WEDM of Ti6Al4V alloy using modified TLBO algorithm." Journal of the Brazilian Society of Mechanical Sciences and Engineering 42.3 (2020): 1-18.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
18-	Qiao, Weibiao, Hossein Moayedi, and Loke KokFoong. "Nature-inspired hybrid techniques of IWO, DA, ES, GA, and ICA, validated through a k-fold validation process predicting monthly natural gas consumption." Energy and Buildings (2020): 110023.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
19-	Prithi, S., and S. Sumathi. "LD2FA-PSO: A novel Learning Dynamic Deterministic Finite Automata with PSO algorithm for secured energy efficient routing in Wireless Sensor Network." Ad Hoc Networks 97 (2020): 102024.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
20-	Kacimi, MohandAkli, et al. "New mixed-coding PSO algorithm for a self-adaptive and automatic learning of Mamdani fuzzy rules." Engineering Applications of Artificial Intelligence 89 (2020): 103417.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
21-	Jallal, Mohammed Ali, Samira Chabaa, and AbdelouhabZeroual. "A novel deep neural network based on randomly occurring distributed delayed PSO algorithm for monitoring the energy produced by four dual-axis solar trackers." Renewable Energy 149 (2020): 1182-1196.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
22-	Niknam, Taher, Ehsan Azadfarsani, and Masoud Jabbari. "A new hybrid evolutionary algorithm based on new fuzzy adaptive PSO and NM algorithms for distribution feeder reconfiguration." Energy Conversion and Management 54.1 (2012): 7-16.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
23-	Niknam, Taher, Hassan DoagouMojarrad, and Majid Nayeripour. "A new fuzzy adaptive particle swarm optimization for non-smooth economic dispatch." Energy 35.4 (2010): 1764-1778.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
24-	M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, ‘‘A detailed analysis of the KDD CUP 99 data set,’’ Proc. 2nd IEEE Symp. Comput. Intell. Secur. Defense Appl. (CISDA), Ottawa, ON, Canada, Jul. 2009, pp. 1–6.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
25-	 A, Alghuried, ‘‘A model for anomalies detection in Internet of Things (IoT) using inverse weight clustering and decision tree,’’ M.S. thesis, School Comput., Dublin Inst. Technol., Dublin, Republic of Ireland, 2017.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Hybrid Approach based on PSO and Boosting Technique for Data Modeling in Sensor Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>hadi</given_name><surname>shakibian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Jalaledin</given_name><surname>Nasiri</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>19</day><year>2022</year></publication_date><pages><first_page>259</first_page><last_page>269</last_page></pages><doi_data><doi>10.52547/jist.19789.10.40.259</doi><resource>http://jist.ir/en/Article/19789</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/19789</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/19789</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/19789</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/19789</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/19789</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/19789</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/19789</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Sharma, Himanshu, Ahteshamul Haque, and Frede Blaabjerg. "Machine Learning in Wireless Sensor Networks for Smart Cities: A Survey." Electronics 10.9 (2021): 1012.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Liu, Longgeng, et al. "An algorithm based on logistic regression with data fusion in wireless sensor networks." EURASIP Journal on Wireless Communications and Networking 2017.1 (2017): 1-9. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Deng, Yulong, et al. "Temporal and spatial nearest neighbor values based missing data imputation in wireless sensor networks." Sensors 21.5 (2021): 1782.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Zuhairy, Ruwaida M., and Mohammed GH Al Zamil. "Energy-efficient load balancing in wireless sensor network: An application of multinomial regression analysis." International Journal of Distributed Sensor Networks 14.3 (2018): 1550147718764641.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Kumar, D. Praveen, Tarachand Amgoth, and Chandra Sekhara Rao Annavarapu. "Machine learning algorithms for wireless sensor networks: A survey." Information Fusion 49 (2019): 1-25.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Ghate, Vasundhara V., and Vaidehi Vijayakumar. "Machine learning for data aggregation in WSN: A survey." International Journal of Pure and Applied Mathematics 118.24 (2018): 1-12.</unstructured_citation></citation><citation key="ref7"><unstructured_citation> 
[7]	Ren, Xiaoxing, et al. "Distributed Subgradient Algorithm for Multi-Agent Optimization With Dynamic Stepsize." IEEE/CAA Journal of Automatica Sinica 8.8 (2021): 1451-1464.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Doan, Thinh T., Siva Theja Maguluri, and Justin Romberg. "Convergence rates of distributed gradient methods under random quantization: A stochastic approximation approach." IEEE Transactions on Automatic Control (2020).</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Zhang, Peng, and Gejun Bao. "An incremental subgradient method on Riemannian manifolds." Journal of Optimization Theory and Applications 176.3 (2018): 711-727.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Berahas, Albert S., Charikleia Iakovidou, and Ermin Wei. "Nested distributed gradient methods with adaptive quantized communication." 2019 IEEE 58th Conference on Decision and Control (CDC). IEEE, 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Xu, Xiangxiang, and Shao-Lun Huang. "An information theoretic framework for distributed learning algorithms." 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Perumal, T. Sudarson Rama, V. Muthumanikandan, and S. Mohanalakshmi. "Energy Efficiency Optimization in Clustered Wireless Sensor Networks via Machine Learning Algorithms." Machine Learning and Deep Learning Techniques in Wireless and Mobile Networking Systems. CRC Press, 2021. 59-77.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Kumar, D. Praveen, Tarachand Amgoth, and Chandra Sekhara Rao Annavarapu. "Machine learning algorithms for wireless sensor networks: A survey." Information Fusion 49 (2019): 1-25.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Mohanty, Lipika, et al. "Machine Learning-Based Wireless Sensor Networks." Machine Learning: Theoretical Foundations and Practical Applications. Springer, Singapore, 2021. 109-122.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Pundir, Meena, and Jasminder Kaur Sandhu. "A systematic review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent trend and future vision." Journal of Network and Computer Applications (2021): 103084.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Antonian, Edward and Peters, Gareth and Peters, Gareth and Chantler, Michael John and Yan, Hongxuan, GLS Kernel Regression for Network-Structured Data (August 9, 2021). Available at SSRN: https://ssrn.com/abstract=3901694.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Liu, Longgeng, et al. "An algorithm based on logistic regression with data fusion in wireless sensor networks." EURASIP Journal on Wireless Communications and Networking 2017.1 (2017): 1-9.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Wang, Heyu, Lei Xia, and Chunguang Li. "Distributed online quantile regression over networks with quantized communication." Signal Processing 157 (2019): 141-150.54532343WE332 .</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Wang, Heyu, and Chunguang Li. "Distributed quantile regression over sensor networks." IEEE Transactions on Signal and Information Processing over Networks 4.2 (2017): 338-348.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Danaee, Alireza, Rodrigo C. de Lamare, and Vitor H. Nascimento. "Energy-Efficient Distributed Recursive Least Squares Learning with Coarsely Quantized Signals." 2020 54th Asilomar Conference on Signals, Systems, and Computers. IEEE, 2020.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Danaee, Alireza, Rodrigo C. de Lamare, and Vitor H. Nascimento. "Energy-efficient distributed learning with coarsely quantized signals." IEEE Signal Processing Letters 28 (2021): 329-333.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Hellkvist, Martin, Ayça Özçelikkale, and Anders Ahlén. "Generalization error for linear regression under distributed learning." 2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 2020.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Shuman, David I., et al. "Distributed signal processing via Chebyshev polynomial approximation." IEEE Transactions on Signal and Information Processing over Networks 4.4 (2018): 736-751.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. Rabbat and R. Nowak, "Distributed Optimization in Sensor Networks," in Proceedings of the 3rd international symposium on Information processing in sensor networks, Berkeley, California, USA, (2004), pp. 20-27.</unstructured_citation></citation><citation key="ref25"><unstructured_citation> 
[25]	Bertsekas, Dimitri P., "Incremental gradient, subgradient, and proximal methods for convex optimization: a survey," Optimization for Machine Learning, No. 85, pp. 1-38, 2011.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Rabbat, and Nowak, R. "Quantized Incremental Algorithms for Distributed Optimization," IEEE Journal on Selected Areas in Communications, 23 (4) (2006), pp. 798-808.</unstructured_citation></citation><citation key="ref27"><unstructured_citation> 
[27]	S.H. Son, M. Chiang, S. R. Kulkarni, and S. C. Schwartz, "The Value of Clustering in Distributed Estimation for Sensor Networks," in proceedings of International Conference on Wireless Networks, Communications and Mobile Computing, Maui, Hawaii, 2 (2005), pp. 969-974.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	P.J. Marandi, N.M. Charkari, "Boosted Incremental Nelder-Mead Simplex Algorithm: Distributed Regression in Wireless Sensor Networks," IFIP Joint Conference on Mobile and Wireless Communications Networks, France, (2008), pp. 199-212.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	P.J. Marandi, M. Mansourizadeh, N. M. Charkari, "The Effect of Resampling on Incremental Nelder-Mead Simplex Algorithm: Distributed Regression over Wireless Sensor Network," in Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications, LNCS, 5258 (2008), Dallas, Texas, pp. 420-431.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	H. Shakibian and N. Moghadam Charkari, "D-PSO for Distributed Regression over Wireless Sensor Networks," Iranian Journal of Electrical and Computer Engineering, Vol. 11, No. 1, pp. 43-50, 2012.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	Shakibian, Hadi, and Nasrollah Moghadam Charkari. "In-cluster vector evaluated particle swarm optimization for distributed regression in WSNs." Journal of network and computer applications 42 (2014): 80-91.</unstructured_citation></citation><citation key="ref32"><unstructured_citation> 
[32]	Zhao, Jijun, Hao Liu, Zhihua Li, and Wei Li., "Periodic Data Prediction Algorithm in Wireless Sensor Networks," In Advances in Wireless Sensor Networks, pp. 695-701, 2013. 
[33]	Cheng, Long, et al. "An Indoor Localization Algorithm based on Modified Joint Probabilistic Data Association for Wireless Sensor Network." IEEE Transactions on Industrial Informatics (2020).</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	Shahbazian, Reza, and Seyed Ali Ghorashi. "Distributed cooperative target detection and localization in decentralized wireless sensor networks." The Journal of Supercomputing 73.4 (2017): 1715-1732.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	Zandhessami, Hessam, Mahmood Alborzi, and Mohammadsadegh Khayyatian. "Energy Efficient Routing-Based Clustering Protocol Using Computational Intelligence Algorithms in Sensor-Based IoT." Journal of Information Systems and Telecommunication (JIST) 1.33 (2021): 55.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	Daanoune, Ikram, Baghdad Abdennaceur, and Abdelhakim Ballouk. "A comprehensive survey on LEACH-based clustering routing protocols in Wireless Sensor Networks." Ad Hoc Networks (2021): 102409.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	Qi, Hong, et al. "Inversion of particle size distribution by spectral extinction technique using the attractive and repulsive particle swarm optimization algorithm." Thermal Science 19.6 (2015): 2151-2160.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	Mo, Simin, Jianchao Zeng, and Weibin Xu. "Attractive and repulsive fully informed particle swarm optimization based on the modified fitness model." Soft Computing 20.3 (2016): 863-884.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	Ursem, Rasmus K. "Diversity-guided evolutionary algorithms." International Conference on Parallel Problem Solving from Nature. Springer, Berlin, Heidelberg, 2002. 
[40]	A.P. Engelbrecht, Computational Intelligence: An introduction, 2ed., Wiley, 2007.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[41]	Madden, S., 2003. Intel Berkeley research lab data. USA: Intel Corporation, 2004 [2004-06-08]. http://berkeley, intel-research, net/labdata, html.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[42]	C. Guestrin, P. Bodi, R. Thibau, M. Paskin, and S. Madde, "Distributed Regression: An Eﬃcient Framework for Modeling Sensor Network data," in Proceedings of third international symposium on Information processing in sensor networks, Berkeley, California, USA, (2004), pp. 1-10.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[43]	Y. Shi, R.C. Eberhart, "Empirical study of particle swarm optimization," in Proceedings of the IEEE International Congress on Evolutionary Computation, 3 (1999), pp. 101-106.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[44]	Xu, Zhaoyi, Yanjie Guo, and Joseph Homer Saleh. "Multi-objective optimization for sensor placement: An integrated combinatorial approach with reduced order model and Gaussian process." Measurement 187 (2022): 110370.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[45]	Premkumar, M., and T. V. P. Sundararajan. "DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks." Microprocessors and Microsystems 79 (2020): 103278.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[46]	Mohanty, Sachi Nandan, et al. "Deep learning with LSTM based distributed data mining model for energy efficient wireless sensor networks." Physical Communication 40 (2020): 101097.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Energy-Efficient User Pairing and Power Allocation for Granted Uplink-NOMA in UAV Communication Systems</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Seyed Hadi</given_name><surname>Mostafavi-Amjad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Vahid</given_name><surname>Solouk</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hashem</given_name><surname>Kalbkhani</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>19</day><year>2022</year></publication_date><pages><first_page>312</first_page><last_page>323</last_page></pages><doi_data><doi>10.52547/jist.27369.10.40.312</doi><resource>http://jist.ir/en/Article/27369</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/27369</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/27369</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/27369</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/27369</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/27369</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/27369</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/27369</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	R. S. Stansbury, M. A. Vyas, and T. A. Wilson, "A survey of UAS technologies for command, control, and communication (C3)," in Unmanned Aircraft Systems: Springer, 2008, pp. 61-78.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	K. P. Valavanis and G. J. Vachtsevanos, Handbook of unmanned aerial vehicles. Springer, 2015.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Luo, S.-C. Chu, X. Wu, Z. Wang, and F. Xu, "Traffic collisions early warning aided by small unmanned aerial vehicle companion," Telecommunication systems, vol. 75, pp. 169-180, 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Y. Li et al., "Air-to-ground 3D channel modeling for UAV based on Gauss-Markov mobile model," AEU-International Journal of Electronics and Communications, vol. 114, p. 152995, 2020.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Aggarwal and N. Kumar, "Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges," Computer Communications, vol. 149, pp. 270-299, 2020.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Mozaffari, W. Saad, M. Bennis, Y.-H. Nam, and M. Debbah, "A tutorial on UAVs for wireless networks: Applications, challenges, and open problems," IEEE Communications Surveys &amp; Tutorials, vol. 21, no. 3, pp. 2334-2360, 2019.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	J. H. Sarker and A. M. Nahhas, "A secure wireless mission critical networking system for unmanned aerial vehicle communications," Telecommunication Systems, vol. 69, no. 2, pp. 237-251, 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Sudhakar, V. Vijayakumar, C. S. Kumar, V. Priya, L. Ravi, and V. Subramaniyaswamy, "Unmanned Aerial Vehicle (UAV) based Forest Fire Detection and monitoring for reducing false alarms in forest-fires," Computer Communications, vol. 149, pp. 1-16, 2020.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Q. Liu et al., "Joint power and time allocation in energy harvesting of UAV operating system," Computer Communications, vol. 150, pp. 811-817, 2020.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Y. Zeng, J. Xu, and R. Zhang, "Energy minimization for wireless communication with rotary-wing UAV," IEEE Transactions on Wireless Communications, vol. 18, no. 4, pp. 2329-2345, 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Y. Zeng and R. Zhang, "Energy-efficient UAV communication with trajectory optimization," IEEE Transactions on Wireless Communications, vol. 16, no. 6, pp. 3747-3760, 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Hua, Y. Wang, C. Li, Y. Huang, and L. Yang, "Energy-efficient optimization for UAV-aided cellular offloading," IEEE Wireless Communications Letters, vol. 8, no. 3, pp. 769-772, 2019.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. Yu, R. Zhang, Y. Gao, and L.-L. Yang, "Modularity-based dynamic clustering for energy efficient UAVs-aided communications," IEEE Wireless Communications Letters, vol. 7, no. 5, pp. 728-731, 2018.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Y. Cai, Z. Wei, R. Li, D. W. K. Ng, and J. Yuan, "Energy-efficient resource allocation for secure UAV communication systems," in 2019 IEEE Wireless Communications and Networking Conference (WCNC), 2019: IEEE, pp. 1-8. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M.-N. Nguyen, L. D. Nguyen, T. Q. Duong, and H. D. Tuan, "Real-time optimal resource allocation for embedded UAV communication systems," IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 225-228, 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Y. Chen, W. Feng, and G. Zheng, "Optimum placement of UAV as relays," IEEE Communications Letters, vol. 22, no. 2, pp. 248-251, 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, "Wireless communication using unmanned aerial vehicles (UAVs): Optimal transport theory for hover time optimization," IEEE Transactions on Wireless Communications, vol. 16, no. 12, pp. 8052-8066, 2017.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Alzenad, A. El-Keyi, F. Lagum, and H. Yanikomeroglu, "3-D placement of an unmanned aerial vehicle base station (UAV-BS) for energy-efficient maximal coverage," IEEE Wireless Communications Letters, vol. 6, no. 4, pp. 434-437, 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	R. Amorim et al., "Measured uplink interference caused by aerial vehicles in LTE cellular networks," IEEE Wireless Communications Letters, vol. 7, no. 6, pp. 958-961, 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	J. Gong, T.-H. Chang, C. Shen, and X. Chen, "Flight time minimization of UAV for data collection over wireless sensor networks," IEEE Journal on Selected Areas in Communications, vol. 36, no. 9, pp. 1942-1954, 2018.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	D. Yang, Q. Wu, Y. Zeng, and R. Zhang, "Energy tradeoff in ground-to-UAV communication via trajectory design," IEEE Transactions on Vehicular Technology, vol. 67, no. 7, pp. 6721-6726, 2018.
[22]	X. Liu, M. Chen, and C. Yin, "Optimized trajectory design in UAV based cellular networks for 3D users: A double Q-learning approach," 2019.
[23]	D. Zhai, R. Zhang, L. Cai, B. Li, and Y. Jiang, "Energy-efficient user scheduling and power allocation for NOMA-based wireless networks with massive IoT devices," IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1857-1868, 2018.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[24]	M. S. Ali, H. Tabassum, and E. Hossain, "Dynamic user clustering and power allocation for uplink and downlink non-orthogonal multiple access (NOMA) systems," IEEE access, vol. 4, pp. 6325-6343, 2016.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[25]	J. Cui, Z. Ding, P. Fan, and N. Al-Dhahir, "Unsupervised machine learning-based user clustering in millimeter-wave-NOMA systems," IEEE Transactions on Wireless Communications, vol. 17, no. 11, pp. 7425-7440, 2018.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[26]	M. Zeng, A. Yadav, O. A. Dobre, and H. V. Poor, "Energy-efficient joint user-RB association and power allocation for uplink hybrid NOMA-OMA," IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5119-5131, 2019.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[27]	S. Dhakal, P. A. Martin, and P. J. Smith, "NOMA with guaranteed weak user QoS: design and analysis," IEEE Access, vol. 7, pp. 32884-32896, 2019.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[28]	X. Mu, Y. Liu, L. Guo, and J. Lin, "Uplink Non-Orthogonal Multiple Access for UAV Communications," CoRR, 2019.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[29]	W. Mei and R. Zhang, "Uplink cooperative NOMA for cellular-connected UAV," IEEE Journal of Selected Topics in Signal Processing, vol. 13, no. 3, pp. 644-656, 2019.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[30]	R. Duan, J. Wang, C. Jiang, H. Yao, Y. Ren, and Y. Qian, "Resource allocation for multi-UAV aided IoT NOMA uplink transmission systems," IEEE Internet of Things Journal, vol. 6, no. 4, pp. 7025-7037, 2019.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[31]	Y. Liu, Z. Qin, Y. Cai, Y. Gao, G. Y. Li, and A. Nallanathan, "UAV communications based on non-orthogonal multiple access," IEEE Wireless Communications, vol. 26, no. 1, pp. 52-57, 2019.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[32]	M. Yang, B. Li, Z. Bai, and Z. Yan, "SGMA: Semi-granted multiple access for non-orthogonal multiple access (NOMA) in 5G networking," Journal of Network and Computer Applications, vol. 112, pp. 115-125, 2018.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[33]	Z. Ding, R. Schober, P. Fan, and H. V. Poor, "Simple semi-grant-free transmission strategies assisted by non-orthogonal multiple access," IEEE Transactions on Communications, vol. 67, no. 6, pp. 4464-4478, 2019.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[34]	Q. Zhang, M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, "Machine learning for predictive on-demand deployment of UAVs for wireless communications," in 2018 IEEE Global Communications Conference (GLOBECOM), 2018: IEEE, pp. 1-6. </unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[35]	M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, "Optimal transport theory for power-efficient deployment of unmanned aerial vehicles," in 2016 IEEE international conference on communications (ICC), 2016: IEEE, pp. 1-6.</unstructured_citation></citation><citation key="ref34"><unstructured_citation> 
[36]	H. Tabassum, M. S. Ali, E. Hossain, M. J. Hossain, and D. I. Kim, "Uplink vs. downlink NOMA in cellular networks: Challenges and research directions," in 2017 IEEE 85th vehicular technology conference (VTC Spring), 2017: IEEE, pp. 1-7. </unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[37]	D.-T. Do and M.-S. Van Nguyen, "Outage probability and ergodic capacity analysis of uplink NOMA cellular network with and without interference from D2D pair," Physical Communication, vol. 37, p. 100898, 2019.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[38]	A. Hussain, Y. S. Muhammad, M. Nauman Sajid, I. Hussain, A. Mohamd Shoukry, and S. Gani, "Genetic algorithm for traveling salesman problem with modified cycle crossover operator," Computational intelligence and neuroscience, vol. 2017, 2017.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A High Performance Dual Stage Face Detection Algorithm Implementation using FPGA Chip and DSP Processor</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M V Ganeswara</given_name><surname>Rao</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>P Ravi </given_name><surname>Kumar </surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>T </given_name><surname>Balaji</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>19</day><year>2022</year></publication_date><pages><first_page>241</first_page><last_page>248</last_page></pages><doi_data><doi>10.52547/jist.31803.10.40.241</doi><resource>http://jist.ir/en/Article/31803</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/31803</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/31803</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/31803</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/31803</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/31803</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/31803</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/31803</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Lei, Z. Gang, R. Si-Heon, Lee Choon-Young, Lee Sang-Ryong and K. -M. Bae, "The Platform of Image Acquisition and Processing System Based on DSP and FPGA," 2008 International Conference on Smart Manufacturing Application, 2008, pp. 470-473, doi: 10.1109/ICSMA.2008.4505567.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. Kotropoulos and I. Pitas, "Rule-based face detection in frontal views," 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1997, pp. 2537-2540 vol.4, doi: 10.1109/ICASSP.1997.595305. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] D. Nguyen, D. Halupka, P. Aarabi and A. Sheikholeslami, "Real-time face detection and lip feature extraction using field-programmable gate arrays," in IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 36, no. 4, pp. 902-912, Aug. 2006, doi: 10.1109/TSMCB.2005.862728. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. N. Arya, K. L. V. Sivanji, R. Reddy, S. Sivanantham, and K. Sivasankaran, “A face detection system implemented on FPGA based on RCT colour segmentation,” Proc. 2016 Online Int. Conf. Green Eng. Technol. IC-GET 2016, 2017, doi: 10.1109/GET.2016.7916781.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. Ben Fekih, A. E. B, and B. Juurlink, “An Efficient and Flexible FPGA Implementation of a Face Detection System,” pp. 243–254, 2015, doi: 10.1007/978-3-319-16214-0.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	H.-Y. Leung, L.-M. Cheng, and X. Y. Li, “A FPGA implementation of facial feature extraction,” J. Real-Time Image Process., vol. 10, no. 1, pp. 135–149, 2015, doi: 10.1007/s11554-012-0263-8.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] A. S. Kamewar, "Processing geospatial images using GPU," 2017 International Conference on Emerging Trends &amp; Innovation in ICT (ICEI), 2017, pp. 27-32, doi: 10.1109/ETIICT.2017.7977005. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. Batlle, “A New FPGA/DSP-Based Parallel Architecture for Real-Time Image Processing,” Real-Time Imaging, vol. 8, no. 5, pp. 345–356, 2002, doi: 10.1006/rtim.2001.0273.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	K. L. Y. Li et al., “A new parallel particle filter face tracking method based on heterogeneous system,” J. Real-Time Image Process., vol. 7, no. 3, pp. 153–163, 2012, doi: 10.1007/s11554-011-0225-6.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] L. Guo, “An embedded multimedia communication terminal based on DSP+FPGA,” Multimed. Tools Appl., vol. 76, no. 16, pp. 16949–16961, 2017, doi: 10.1007/s11042-016-3597-6.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Z. Ding, F. Zhao, T. Wang, W. Shu, and M.-Y. Wu, “Hecto-Scale Frame Rate Face Detection System for SVGA Source on FPGA Board,” 2011 IEEE 19th Annu. Int. Symp. Field-Programmable Cust. Comput. Mach., pp. 37–40, 2011, doi: 10.1109/FCCM.2011.16.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] Rein-Lien Hsu, M. Abdel-Mottaleb and A. K. Jain, "Face detection in color images," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 5, pp. 696-706, May 2002, doi: 10.1109/34.1000242. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	P. Viola and M. Jones, “Robust real-time face detection,” Int. J. Comput. Vis., vol. 57, no. 2, pp. 137–154, 2004, doi: 10.1023/B:VISI.0000013087.49260.fb.
[14]	F. Zhao, L. Yang, Y. Zhu, and P. Liao, “Ehancing the implementation of Adaboost algorithm on a DSP-based platform,” Int. Conf. Scalable Comput. Commun. - 8th Int. Conf. Embed. Comput. ScalCom-EmbeddedCom 2009, pp. 393–395, 2009, doi: 10.1109/EmbeddedCom-ScalCom.2009.77.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	 Ganeswara Rao M.V., Panakala R.K., Mallikarjuna Prasad A. (2018) A New VLSI Architecture for Skin Tone Detection in an Uncontrolled Background. In: Anguera J., Satapathy S., Bhateja V., Sunitha K. (eds) Microelectronics, Electromagnetics and Telecommunications. Lecture Notes in Electrical Engineering, vol 471. Springer, Singapore.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	Fekih H.B., Elhossini A., Juurlink B. (2015) An Efficient and Flexible FPGA Implementation of a Face Detection System. In: Sano K., Soudris D., Hübner M., Diniz P. (eds) Applied Reconfigurable Computing. ARC 2015. Lecture Notes in Computer Science, vol 9040. Springer, Cham.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	 Dong Zhang, S. Z. Li and D. Gatica-Perez, "Real-time face detection using boosting in hierarchical feature spaces," Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004., Cambridge, 2004, pp. 411-414 Vol.2.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	 Y. N. Chae, T. Han, Y.-H. Seo, and H. S. Yang, “An efficient face detection based on color-filtering and its application to smart devices,” Multimed. Tools Appl., vol. 75, no. 9, pp. 4867–4886, 2016, doi: 10.1007/s11042-013-1786-0.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	C. Kumar and M. S. Azam, “A multi-processing architecture for accelerating Haar-based face detection on FPGA,” 9th Int. Conf. Ind. Inf. Syst. ICIIS 2014, 2015, doi: 10.1109/ICIINFS.2014.7036525.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	S. Liao, A. K. Jain, and S. Z. Li, “A Fast and Accurate Unconstrained Face Detector,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 38, no. 2, pp. 211–223, 2016, doi: 10.1109/TPAMI.2015.2448075.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	 A. N. Rajagopalan, K. S. Kumar, J. Karlekar, R. M. M. M. Patil, U. B. Desai, and P. G. P. S. Chaudhuri, “Finding Faces in Photographs,” IEEE Int. Conf. Comput. Vis., no. 1, pp. 640–645, 1998, doi: 10.1109/ICCV.1998.710785.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	M. S. Lew, "Information theoretic view-based and modular face detection," Proceedings of the Second International Conference on Automatic Face and Gesture Recognition, Killington, VT, USA, 1996, pp. 198-203.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	A. J. Colmenarez and T. S. Huang, “Face Detection With Informat ion- Based Maximum Discrimination,” Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., pp. 782–787, 1997, doi: http://dx.doi.org/10.1109/CVPR.1997.609415.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	K. S. Park, R. H. Park, and Y. G. Kim, “Face detection using the 3x3 block rank patterns of gradient magnitude images and a geometrical face model,” Dig. Tech. Pap. - IEEE Int. Conf. Consum. Electron., no. c, pp. 793–794, 2011, doi: 10.1109/ICCE.2011.5722867.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	P. P. Paul and M. Gavrilova, “PCA based geometric modeling for automatic face detection,” Proc. - 2011 Int. Conf. Comput. Sci. Its Appl. ICCSA 2011, pp. 33–38, 2011.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	A. Majumder, L. Behera, and V. K. Subramanian, “Automatic and robust detection of facial features in frontal face images,” Proc. - 2011 UKSim 13th Int. Conf. Model. Simulation, UKSim 2011, pp. 331–336, 2011, doi: 10.1109/UKSIM.2011.69.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	J. Guo, C. Lin, M. Wu, C. Chang and H. Lee, "Complexity Reduced Face Detection Using Probability-Based Face Mask Prefiltering and Pixel-Based Hierarchical-Feature Adaboosting," in IEEE Signal Processing Letters, vol. 18, no. 8, pp. 447-450, Aug. 2011.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	Katkoori Arun Kumar and Ravi Boda, “A Threshold-based Brain Tumour Segmentation from MR Images using Multi-Objective Particle Swarm Optimization,” Journal of Information Systems and Telecommunication, Vol. 9, No. 4,  2021, pp. 218–225.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	Hamed Agahi and Kimia Rezaei, “An Automatic Thresholding Approach to Gravitation-Based Edge Detection in Grey-Scale Images,” Journal of Information Systems and Telecommunication, Vol. 9, No. 4, 2021, pp. 285–296.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	K. Li, Y. Tian, B. Wang, Z. Qi, and Q. Wang, "Bi-Directional Pyramid Network for Edge Detection," Electronics, vol. 10, no. 3, 2021, p. 329-333.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	D. Wang, J. Yin, C. Tang, X. Cheng, and B. Ge, "Color edge detection using the normalization anisotropic Gaussian kernel and multichannel fusion," IEEE Access, vol. 8, 2020, pp. 228277-228288,.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	Azamossadat Nourbakhsh, Mohammad-Shahram Moin and Arash  Sharifi, “Facial Images Quality Assessment based on ISO/ICAO Standard Compliance Estimation by HMAX Model,” Journal of Information Systems and Telecommunication, Vol. 7, No. 27, 2009, pp. 225–237.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	Azar Mahmoodzadeh, “Human Activity Recognition based on Deep Belief Network Classifier and Combination of Local and Global Features,” Journal of Information Systems and Telecommunication, Vol. 9, No. 36, 2021, pp. 45–52.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Novel Detector based on Compressive Sensing for Uplink Massive MIMO Systems </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mojtaba</given_name><surname>Amiri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Amir</given_name><surname>Akhavan</surname></person_name></contributors><publication_date media_type="online"><month>10</month><day>19</day><year>2022</year></publication_date><pages><first_page>249</first_page><last_page>256</last_page></pages><doi_data><doi>10.52547/jist.34192.10.40.249</doi><resource>http://jist.ir/en/Article/34192</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/34192</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/34192</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/34192</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/34192</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/34192</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/34192</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/34192</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, "Massive MIMO for next generation wireless systems," IEEE communications magazine, vol. 52, no. 2, pp. 186-195, 2014.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	E. Björnson, E. G. Larsson, and T. L. Marzetta, "Massive MIMO: Ten myths and one critical question," IEEE Communications Magazine, vol. 54, no. 2, pp. 114-123, 2016.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	E. Björnson, J. Hoydis, M. Kountouris, and M. Debbah, "Massive MIMO systems with non-ideal hardware: Energy efficiency, estimation, and capacity limits," IEEE Transactions on Information Theory, vol. 60, no. 11, pp. 7112-7139, 2014.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. A. Albreem, M. Juntti, and S. Shahabuddin, "Massive MIMO detection techniques: a survey," IEEE Communications Surveys &amp; Tutorials, vol. 21, no. 4, pp. 3109-3132, 2019.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. A. Albreem et al., "Low complexity linear detectors for massive MIMO: A comparative study," IEEE Access, vol. 9, pp. 45740-45753, 2021.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	L. Fang, L. Xu, and D. D. Huang, "Low Complexity Iterative MMSE-PIC Detection for Medium-Size Massive MIMO," IEEE Wireless Communications Letters, vol. 5, no. 1, pp. 108-111, 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Wu, C. Dick, J. R. Cavallaro, and C. Studer, "High-Throughput Data Detection for Massive MU-MIMO-OFDM Using Coordinate Descent," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 63, no. 12, pp. 2357-2367, 2016.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	L. Dai, X. Gao, X. Su, S. Han, I. C. L, and Z. Wang, "Low-Complexity Soft-Output Signal Detection Based on Gauss&amp;Side Method for Uplink Multiuser Large-Scale MIMO Systems," IEEE Transactions on Vehicular Technology, vol. 64, no. 10, pp. 4839-4845, 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	G. Peng, L. liu, P. Zhang, S. Yin, and S. Wei, "Low-Computing-Load, High-Parallelism Detection Method based on Chebyshev Iteration for Massive MIMO Systems with VLSI Architecture," IEEE Transactions on Signal Processing, vol. PP, no. 99, pp. 1-1, 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Elgabli, A. Elghariani, V. Aggarwal, and M. R. Bell, "A low-complexity detection algorithm for uplink massive MIMO systems based on alternating minimization," IEEE Wireless Communications Letters, vol. 8, no. 3, pp. 917-920, 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Amiri and M. F. Naeiny, "Low-Complexity Iterative Detection for Uplink Multiuser Large-Scale MIMO," Journal of Information Systems and Telecommunication (JIST), vol. 1, no. 29, p. 25, 2020.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Z. Gao, L. Dai, S. Han, I. Chih-Lin, Z. Wang, and L. Hanzo, "Compressive sensing techniques for next-generation wireless communications," IEEE Wireless Communications, vol. 25, no. 3, pp. 144-153, 2018.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Amiri and A. Akhavan, "An iterative detector based on sparse bayesian error recovery for uplink large-scale MIMO systems," AEU-International Journal of Electronics and Communications, vol. 138, p. 153848, 2021.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	R. Ran, J. Wang, S. K. Oh, and S. N. Hong, "Sparse-aware minimum mean square error detector for MIMO systems," IEEE Communications Letters, vol. 21, no. 10, pp. 2214-2217, 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Kwon, J. Wang, and B. Shim, "Multipath matching pursuit," IEEE Transactions on Information Theory, vol. 60, no. 5, pp. 2986-3001, 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	D. L. Donoho, Y. Tsaig, I. Drori, and J.-L. Starck, "Sparse solution of underdetermined systems of linear equations by stagewise orthogonal matching pursuit," IEEE transactions on Information Theory, vol. 58, no. 2, pp. 1094-1121, 2012.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Z. Zhang, Y. Xu, J. Yang, X. Li, and D. Zhang, "A survey of sparse representation: algorithms and applications," IEEE access, vol. 3, pp. 490-530, 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	H. Xu, C. Caramanis, and S. Mannor, "Robust regression and lasso," IEEE Transactions on Information Theory, vol. 56, no. 7, pp. 3561-3574, 2010.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Tan, I. W. Tsang, and L. Wang, "Matching pursuit LASSO part I: Sparse recovery over big dictionary," IEEE Transactions on Signal Processing, vol. 63, no. 3, pp. 727-741, 2014.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	R. Torkamani and R. A. Sadeghzadeh, "Wavelet-based Bayesian Algorithm for Distributed Compressed Sensing," Information Systems &amp; Telecommunication, p. 87, 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	W.-C. Chang and Y. T. Su, "Sparse Bayesian Learning Based Tensor Dictionary Learning and Signal Recovery with Application to MIMO Channel Estimation," IEEE Journal of Selected Topics in Signal Processing, vol. 15, no. 3, pp. 847-859, 2021.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	I. Daubechies, M. Defrise, and C. De Mol, "An iterative thresholding algorithm for linear inverse problems with a sparsity constraint," Communications on Pure and Applied Mathematics: A Journal Issued by the Courant Institute of Mathematical Sciences, vol. 57, no. 11, pp. 1413-1457, 2004.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	T. Blumensath and M. E. Davies, "Iterative thresholding for sparse approximations," Journal of Fourier analysis and Applications, vol. 14, no. 5-6, pp. 629-654, 2008.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	C. J. Miosso, R. von Borries, M. Argaez, L. Velázquez, C. Quintero, and C. Potes, "Compressive sensing reconstruction with prior information by iteratively reweighted least-squares," IEEE Transactions on Signal Processing, vol. 57, no. 6, pp. 2424-2431, 2009.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. Yang and Y. Zhang, "Alternating direction algorithms for l_1-problems in compressive sensing," SIAM journal on scientific computing, vol. 33, no. 1, pp. 250-278, 2011.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Elad, Sparse and redundant representations: from theory to applications in signal and image processing. Springer Science &amp; Business Media, 2010.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	S. Boyd, N. Parikh, and E. Chu, Distributed optimization and statistical learning via the alternating direction method of multipliers. Now Publishers Inc, 2011.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	A. Beck and M. Teboulle, "A fast iterative shrinkage-thresholding algorithm for linear inverse problems," SIAM journal on imaging sciences, vol. 2, no. 1, pp. 183-202, 2009.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>