﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051923</doi_batch_id><timestamp>20260519232533</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>1</month><day>10</day><year>2023</year></publication_date><journal_volume><volume>11</volume></journal_volume><issue>41</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Providing a New Smart Camera Architecture for Intrusion Detection in Wireless Visual Sensor Network</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Meisam</given_name><surname>Sharifi Sani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Amid</given_name><surname>Khatibi</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>10</day><year>2023</year></publication_date><pages><first_page>31</first_page><last_page>40</last_page></pages><doi_data><doi>10.52547/jist.15672.11.41.31</doi><resource>http://jist.ir/en/Article/15672</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15672</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15672</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15672</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15672</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15672</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15672</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15672</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] V. D. Kale, “Recent Research Trends in Cloud computing,” vol. 6, no. 2, pp. 406–409, 2013.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] A. Boukerche et al., “A new solution for the time-space localization problem in wireless sensor network using UAV,” in Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications - DIVANet ’13, 2013, pp. 153–160, doi: 10.1145/2512921.2512937.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] W. Schriebl, T. Winkler, A. Starzacher, and B. Rinner, “A pervasive smart camera network architecture applied for multi-camera object classification,” in 2009 3rd ACM/IEEE International Conference on Distributed Smart Cameras, ICDSC 2009, 2009, doi: 10.1109/ICDSC.2009.5289377.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] B. Rinner, T. Winkler, M. Quaritsch, B. Rinner, W. Schriebl, and W. Wolf, The evolution from single to pervasive smart cameras Epigenetic regulation of stress induced drug tolerance View project VECTO-Vehicle Energy Consumption Calculation Tool View project THE EVOLUTION FROM SINGLE TO PERVASIVE SMART CAMERAS. 2008.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] P. Chen et al., “Citric: A low-bandwidth wireless camera network platform,” in 2008 2nd ACM/IEEE International Conference on Distributed Smart Cameras, ICDSC 2008, 2008, doi: 10.1109/ICDSC.2008.4635675.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] P. Saastamoinen, S. Huttunen, V. Takala, M. Heikkil&amp;#228;, and J. Heikkil&amp;#228;, “Scallop: An open peer-to-peer framework for distributed sensor networks,” in 2008 2nd ACM/IEEE International Conference on Distributed Smart Cameras, ICDSC 2008, 2008, doi: 10.1109/ICDSC.2008.4635712.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] S. A. M. Sharif and V. Jeoti, “Video wireless sensor network: Co-operative vision based localization method,” in Proceedings - 2nd Asia International Conference on Modelling and Simulation, AMS 2008, 2008, pp. 570–573, doi: 10.1109/AMS.2008.77.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] W. Dargie and C. Poellabauer, Fundamentals of Wireless Sensor Networks. 2010.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] P. Huang, L. Xiao, S. Soltani, M. W. Mutka, and N. Xi, “The evolution of MAC protocols in wireless sensor networks: A survey,” IEEE Commun. Surv. Tutorials, vol. 15, no. 1, pp. 101–120, 2013, doi: 10.1109/SURV.2012.040412.00105.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] K. Langendoen and N. Reijers, “Distributed localization in wireless sensor networks: a quantitative comparison,” Comput. Networks, vol. 43, no. 4, pp. 499–518, Nov. 2003, doi: 10.1016/S1389-1286(03)00356-6.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] F. Gherardi and L. Aquiloni, “Sexual selection in crayfish: A review,” Crustac. Monogr., vol. 15, no. August, pp. 213–223, 2011, doi: 10.1163/ej.9789004174252.i-354.145.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] A. Wyner and J. Ziv, “The rate-distortion function for source coding with side information at the decoder,” IEEE Trans. Inf. Theory, vol. 22, no. 1, pp. 1–10, Jan. 1976, doi: 10.1109/TIT.1976.1055508.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] S. Soro and W. Heinzelman, “A Survey of Visual Sensor Networks,” Adv. Multimed., vol. 2009, pp. 1–21, 2009, doi: 10.1155/2009/640386.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] M. Malathi, “Cloud computing concepts,” in 2011 3rd International Conference on Electronics Computer Technology, 2011, vol. 6, pp. 236–239, doi: 10.1109/ICECTECH.2011.5942089.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] I. F. Akyildiz, T. Melodia, and K. R. Chowdhury, “Wireless multimedia sensor networks: applications and testbeds,” in Proceedings of the IEEE, 2008, vol. 96, no. 10, pp. 1588–1605, doi: 10.1109/JPROC.2008.928756.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] M. Ahmadi and S. M. Jameii, “A Secure Routing Algorithm for Underwater Wireless Sensor Networks,” Int. J. Eng., vol. 31, no. 10, pp. 1659–1665, Oct. 2018, doi: 10.5829/ije.2018.31.10a.07.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] M. Quaritsch, B. Rinner, and B. Strobl, “Improved agent-oriented middleware for distributed smart cameras,” 2007 1st ACM/IEEE Int. Conf. Distrib. Smart Cameras, ICDSC, no. May 2014, pp. 297–304, 2007, doi: 10.1109/ICDSC.2007.4357537.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] A. Doblander, A. Zoufal, and B. Rinner, “A novel software framework for embedded multiprocessor smart cameras,” ACM Trans. Embed. Comput. Syst., vol. 8, no. 3, pp. 1–30, Apr. 2009, doi: 10.1145/1509288.1509296.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] S. R. Taghizadeh and S. Mohammadi, “LEBRP - A lightweight and energy balancing routing protocol for energy-constrained wireless ad hoc networks,” Int. J. Eng. Trans. A Basics, vol. 27, no. 1, pp. 33–38, 2014, doi: 10.5829/idosi.ije.2014.27.01a.05.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] C.-F. Lin, S.-M. Yuan, M.-C. Leu, and C.-T. Tsai, “A Framework for Scalable Cloud Video Recorder System in Surveillance Environment,” in 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012, pp. 655–660, doi: 10.1109/UIC-ATC.2012.72.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] J. Kim, N. Park, G. Kim, and S. Jin, “CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-Transformation in the Emerging Multimedia,” Electronics, vol. 8, no. 4, p. 412, Apr. 2019, doi: 10.3390/electronics8040412.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] A. Tekeoglu and A. S. Tosun, “Investigating Security and Privacy of a Cloud-Based Wireless IP Camera: NetCam,” in 2015 24th International Conference on Computer Communication and Networks (ICCCN), 2015, vol. 2015-Octob, pp. 1–6, doi: 10.1109/ICCCN.2015.7288421.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] L. Valent&amp;#237;n, S. A. Serrano, R. Oves Garc&amp;#237;a, A. Andrade, M. A. Palacios-Alonso, and L. Enrique Sucar, “A CLOUD-BASED ARCHITECTURE FOR SMART VIDEO SURVEILLANCE,” ISPRS - Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci., vol. XLII-4/W3, no. 4W3, pp. 99–104, Sep. 2017, doi: 10.5194/isprs-archives-XLII-4-W3-99-2017.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] K. K. Basu, “Organisational culture and leadership in ERP implementation,” Int. J. Strateg. Chang. Manag., vol. 6, no. 3/4, p. 292, 2015, doi: 10.1504/IJSCM.2015.075919.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] D. Bijwe, “International Journal of Computer Science and Mobile Computing Database in Cloud Computing-Database-as-a Service (DBaas) with its Challenges,” Int. J. Comput. Sci. Mob. Comput., vol. 4, no. 2, pp. 73–79, 2015.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] Garc&amp;#237;a S, Grill M, Stiborek J, Zunino A, An Empirical Comparison of Botnet Detection Methods, Computers &amp;amp; Security (2014), doi: 10.1016/j.cose.2014.05.011.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>



 

</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Customized Web Spider for Why-QA Pairs Corpus Preparation</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Manvi </given_name><surname>Breja</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>10</day><year>2023</year></publication_date><pages><first_page>41</first_page><last_page>47</last_page></pages><doi_data><doi>10.52547/jist.15700.11.41.41</doi><resource>http://jist.ir/en/Article/15700</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15700</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15700</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15700</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15700</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15700</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15700</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15700</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] S. Verberne, L.W.J. Boves, N.H.J. Oostdijk and P.A.J.M. Coppen, “Data for question answering: the case of why”, 2006. </unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] shuzi, “GitHub - shuzi/insuranceQA: A question answering corpus in insurance domain”, 2015. [Online]. Available: https://github.com/shuzi/insuranceQA. [Accessed Feb. 9, 2021].</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] D. Cohen, L. Yang,, and W. B. Croft,  “Wikipassageqa: A benchmark collection for research on non-factoid answer passage retrieval”, In The 41st International ACM SIGIR Conference on Research &amp;amp; Development in Information Retrieval, 2018, pp. 1165-1168.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] A. Dulceanu, T. Le Dinh, W. Chang, T. Bui, D.S. Kim, M.C.Vu, and S. Kim, “PhotoshopQuiA: A corpus of non-factoid questions and answers for why-question answering”, In  Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018), 2018, pp. 2763-2770. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] Stack Overflow - Where Developers Learn, Share, &amp;amp; Build Careers. [Online]. Available: https://stackoverflow.com/. [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] Adobe Support Community. [Online]. Available: https://forums.adobe.com/welcome. [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] Graphic Design Stack Exchange. [Online]. Available https://graphicdesign.stackexchange.com. [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] Super User Stack Exchange [Online]. Available https://superuser.com.  [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] Adobe Photoshop Family [Online]. Available https://feedback.photoshop.com. [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] K. Jiang,, D. Wu and H. Jiang., “FreebaseQA: a new factoid QA data set matching Trivia-style question-answer pairs with freebase”, In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers), June 2019, pp. 318-323. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] T. Kočisk&amp;#253;, J. Schwarz, P. Blunsom, C. Dyer, K. M. Hermann, G. Melis and E. Grefenstette, “The narrativeqa reading comprehension challenge”,  Transactions of the Association for Computational Linguistics, vol. 6, pp. 317-328, 2018. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] H. Hashemi, M. Aliannejadi, H. Zamani and W.B. Croft, “ANTIQUE: A non-factoid question answering benchmark.”. In European Conference on Information Retrieval, Springer, Cham, 2020, pp. 166-173. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Yahoo ! answers [Online]. Available https://answers.yahoo.com/.  [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] A. Colas, S. Kim, F. Dernoncourt,, S. Gupte, D.Z. Wang and D.S. Kim, “TutorialVQA: Question Answering Dataset for Tutorial Videos” [Online]. Available arXiv preprint arXiv:1912.01046, 2019. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] Answers [Online]. Available https://www.answers.com/. .  [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] S. Verberne, “Data Download,” [Online]. Available: http://sverberne.ruhosting.nl/wordpress/research/data-download/. [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] Quora [Online]. Available https://www.quora.com/ . [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] Ask [Online]. Available https://www.ask.com/.  [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] Scrapy [Online]. Available  https://scrapy.org/. [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] BeautifulSoup [Online]. Available https://pypi.org/project/beautifulsoup4/. [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] A. Rahman and V. Ng, “Coreference resolution with world knowledge”, In Proceedings of the 49th annual meeting of the association for computational linguistics: human language technologies, 2011, pp. 814-824. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] A. Anandkumar, D. P.  Foster, D. Hsu, S.M. Kakade and Y.K. Liu, “A spectral algorithm for latent dirichlet allocation”, Algorithmica, vol. 72, no. 1, 2015, pp. 193-214. </unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] D. M. Blei, A.Y. Ng and M. I. Jordan, “Latent dirichlet allocation.”, Journal of machine Learning research, 2003, pp. 993-1022. </unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] D.S. Chang and K.S. Choi, “Causal relation extraction using cue phrase and lexical pair probabilities”, In International Conference on Natural Language Processing, Springer, Berlin, Heidelberg, 2004, pp. 61-70. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] M. Breja and S.K. Jain, “Why-type Question Classification in Question Answering System”, In FIRE (Working Notes), 2017, pp. 149-153. </unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] M. Breja and S.K. Jain, “Analysis of Why-Type Questions for the Question Answering System”, In European Conference on Advances in Databases and Information Systems, Springer, Cham, 2018,  pp. 265-273. </unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] H. Fu and Y. Fan, “Music information seeking via social Q&amp;amp;A: An analysis of questions in music StackExchange community”, In Proceedings of the 16th ACM/IEEE-CS on Joint Conference on Digital Libraries, 2016, pp. 139-142. </unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] Financial Opinion Mining and Question Answering [Online] Available https://sites.google.com/view/fiqa/home/. [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] A.F.U.R. Khilji, R. Manna, S.R. Laskar, P. Pakray, D. Das, S. Bandyopadhyay and A. Gelbukh, “Question classification and answer extraction for developing a cooking QA system”, Computaci&amp;#243;n y Sistemas, vol. 24, no. 2, 2020, pp. 921-927. </unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] V. Koeman, L. A. Dennis, M. Webster, M. Fisher and K. Hindriks, “The Why did you do that?&amp;quot; Button: Answering Why-questions for end users of Robotic Systems”, In 7th International Workshop on Engineering Multi-Agent Systems (EMAs 2019), 2019, pp. 152-172. </unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] Yahoo! Language Data [Online]. Available https://webscope.sandbox.yahoo.com/catalog.php?datatype=l. [Accessed Feb. 9, 2021]. </unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] E. Hovy, U. Hermjakob, and D. Ravichandran, “A question/answer typology with surface text patterns”, In Proceedings of the Hum an Language Technology conference (HLT), San Diego, CA, 2002. </unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] A. Mishra and S.K. Jain, “A survey on question answering systems with classification”, Journal of King Saud University-Computer and Information Sciences, vol. 28, no. 3, 2016, pp.345-361. </unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] The Baron [Online]. Available https://www.thebaron.info/archives/technology/reuters-technical-development-chronology-1991-1994, [Accessed March, 02, 2021] </unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] G. Smith, “Newspapers on CD-ROM”, In Serials The Journal for the Serials Community, vol. 5, no. 3, 1992, pp. 17-22. </unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] M. Breja and S.K. Jain, “Analyzing Linguistic Features for Classifying Why-Type Non-Factoid Questions”, International Journal of Information Technology and Web Engineering (IJITWE), vol. 16, no. 3, 2021, pp.21-38.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] M. Breja and S.K. Jain, “Why-Type Question to Query Reformulation for Efficient Document Retrieval”, International Journal of Information Retrieval Research (IJIRR), vol. 12, no. 1, 2022, pp.1-18.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38] M. Breja and S.K. Jain, “Analyzing Linguistic Features for Answer Re-Ranking of Why-Questions”, Journal of Cases on Information Technology (JCIT), vol. 24, no. 3, 2022, pp.1-16.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39] M. Breja and S.K. Jain, “A survey on non-factoid question answering systems”, International Journal of Computers and Applications,2021, pp.1-8.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40] Y. Niu , “Analysis of semantic classes: toward non-factoid question answering”. University of Toronto, 2007.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>








</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Foreground-Back ground Segmentation using K-Means Clustering Algorithm and Support Vector Machine</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Masoumeh</given_name><surname>Rezaei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>mansoureh</given_name><surname>rezaei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Masoud</given_name><surname>Rezaei</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>10</day><year>2023</year></publication_date><pages><first_page>65</first_page><last_page>74</last_page></pages><doi_data><doi>10.52547/jist.16507.11.41.65</doi><resource>http://jist.ir/en/Article/16507</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/16507</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/16507</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/16507</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/16507</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/16507</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/16507</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/16507</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]  X. Y. Wang, W. W. Sun, Z. F. Wu, H. Y. Yang, "Color image segmentation using PDTDFB domain hidden Markov tree model",  Applied Soft Computing, Vol. 29, 2015, pp. 138-152.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] A. Dirami, K. Hammouche, M. Diaf, P. Siarry, P., "Fast multilevel thresholding for image segmentation through a multiphase level set method", Signal processing, 93(1), 2013, pp. 139-153.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] H. Cai, Z. Yang, X. Cao, W. Xia, X. Xu, "A new iterative triclass thresholding technique in image segmentation", IEEE transactions on image processing, Vol. 23, No. 3, 2014, pp.1038-1046.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] L. U. Ambata and E. P. Dadios, "Foreground Background Separation and Tracking", International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment (HNICEM), 2019, pp. 1-6.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] F. A. Khan, M. Nawaz, M. Imran, A. U. Rahman and F. Qayum, "Foreground detection using motion histogram threshold algorithm in high-resolution large datasets", Multimedia Systems, 2020, pp. 1-12.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] M. Castillo-Martinez, F. J. GallegosFunes, B. E. Carvajal-   Gamez, G. Urriolagoitia-Sosa, A. J. Rosales-Silva, "Color index based thresholding method for background and foreground segmentation of plant images", Computers and Electronics in Agriculture,  Vol. 178, 2020, p. 105783.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] J. Canny, "A computational approach to edge detection", IEEE Transactions on pattern analysis and machine intelligence, Vol. 93, No. 6, 1986, pp. 679-698.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] J. M. Prewitt, "Object enhancement and extraction", Picture processing and Psychopictorics, Vol. 10, No. 1, 1970, pp. 15-19.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] R. C. Gonzalez and R. E. Woods, "Digital image processing", 2002.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] T. Uemura and G. Koutaki and K. Uchimura, "T. Uemura and G. Koutaki and K. Uchimura", International Journal of Innovative computing, Information and control, Vol. 7, No. 10, 2011, pp. 6073-6083.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] D. Díaz-Pernil, A. Berciano, F. Peña-Cantillana and M. A. Gutiérrez-Naranjo, "Segmenting images with gradient-based edge detection using membrane computing", Pattern Recognition Letters, Vol. 34, No. 8, 2013, pp. 846-855.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] C. Panagiotakis, I. Grinias and G. Tziritas, "Natural image segmentation based on tree equipartition, bayesian flooding and region merging", IEEE Transactions on Image Processing, Vol. 20, No. 8, 2011, pp. 2276-2287.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] J. Ning, D. Zhang and C. Wu and F. Yue, "Automatic tongue image segmentation based on gradient vector flow and region merging", Neural Computing and Applications, Vol. 21, No. 8, 2012, pp. 1819-1826.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] L. Wang,  H. Wu and C. Pan, "Region-based image segmentation with local signed difference energy", Pattern Recognition Letters, Vol. 34, No. 6, 2013, pp. 637-645.</unstructured_citation></citation><citation key="ref15"><unstructured_citation> 
[15] S. E. Ebadi and E. Izquierdo, "Foreground segmentation with tree-structured sparse RPCA", IEEE transactions on pattern analysis and machine intelligence, Vol. 40, No. 9,  2017, pp. 2273-2280.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] Y. Boykov, O. Veksler and R. Zabih, "Fast approximate energy minimization via graph cuts", IEEE Transactions on pattern analysis and machine intelligence, Vol. 23, No. 11, 2001, pp. 1222-1239.
[17] T.M. Nguyen and Q. J. Wu, "Fast and robust spatially constrained Gaussian mixture model for image segmentation", IEEE transactions on circuits and systems for video technology, Vol. 23, No. 4,  2012, pp. 621-635.</unstructured_citation></citation><citation key="ref17"><unstructured_citation> 
[18] O. O. Karadag and F. T. Y. Vural, "Image segmentation by fusion of low level and domain specific information via Markov Random Fields", Pattern Recognition Letters, Vol. 46, 2014, pp. 75-82. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19] N. Dhanachandra, K. Manglem and Y. J. Chanu, "Image segmentation using K-means clustering algorithm and subtractive clustering algorithm", Procedia Computer Science, Vol. 54, 2015, pp. 764-771. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20] Y. Yang, Y. Wang and X. Xue, "A novel spectral clustering method with superpixels for image segmentation", Optik, Vol. 127, No. 1, 2016, pp. 161-167.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21] L. A. Lim and H. Y. Keles, "Foreground segmentation using convolutional neural networks for multiscale feature encoding", Pattern Recognition Letters, Vol. 112,  2018, pp. 256-262.</unstructured_citation></citation><citation key="ref21"><unstructured_citation> 
[22] A. Shahbaz and K. H. Jo, "Deep Foreground Segmentation using Convolutional Neural Network", IEEE 28th International Symposium on Industrial Electronics (ISIE), 2019, p. 103334. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23] P. Patil and S. Murala, "Fggan: A cascaded unpaired learning for background estimation and foreground segmentation", IEEE Winter Conference on Applications of Computer Vision (WACV), 2019, pp. 1770-1778. </unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24] D. Sakkos and E. S. Ho and H. P. Shum, "Illumination-aware multi-task GANs for foreground segmentation", IEEE Access, Vol. 7, 2019, pp. 10976-10986. </unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25] J. Liang and Y. Xue and J. Wang, "Genetic programming based feature construction methods for foreground object segmentation", Engineering Applications of Artificial Intelligence", Vol. 89, 2020, p. 103334. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26] Z. Yu, H. S. Wong and G. Wen, "A modified support vector machine and its application to image segmentation", Image and Vision Computing, Vol. 29, No. 1, 2011, pp. 29-40.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27] X. Y. Wang, Q. Y. Wang, H. Y. Yang and J. Bu, "Color image segmentation using automatic pixel classification with support vector machine", Neurocomputing, Vol. 74, No. 18, 2011, pp. 3898-3911.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28] X. Bai and W. Wang, "Saliency-SVM: An automatic approach for image segmentation", Neurocomputing, Vol. 136, 2014, pp. 243-255.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29] M. K. Sangale and N. B. Kadu, "Real-time Foreground Segmentation and Boundary Matting for Live Videos using SVM". </unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30] C. Tang and M. O. Ahmad and C. Wang, "Foreground segmentation in video sequences with a dynamic background", 11th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2018, pp. 1-6. </unstructured_citation></citation><citation key="ref30"><unstructured_citation> 
[31] L. U. Shuhan and S. J. YE, "Using an image segmentation and support vector machine method for identifying two locust species and instars", Journal of Integrative Agriculture, Vol. 19, No. 5, 2020, pp. 1301-1313.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32] N. Dhanachandra, K. Manglem, and Y. Chanu, "Image segmentation using K-means clustering algorithm and subtractive clustering algorithm". Procedia Computer Science, 54, 2015, pp. 764-771.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33] W. Chen, C. He, C. Ji, M. Zhang, S. and Chen, "An improved K-means algorithm for underwater image background segmentation", Multimedia Tools and Applications, 80(14), 2021, pp. 21059-21083.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34] Y. Yang, H. Bilen, Q. Zou, W. Y. Cheung, X. Ji, "Learning Foreground-Background Segmentation from Improved Layered GANs", In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (pp. 2524-2533), 2022.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35] B. E. Boser, I. M. Guyon and V. N. Vapnik, "A training algorithm for optimal margin classifiers", In Proceedings of the fifth annual workshop on Computational learning theory, 1992, pp. 144-152. </unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36] V. N. Vapnik, "Statistical learning theory", Wiley, New York, 1998. </unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37] M. A. Aizerman,"Theoretical foundations of the potential function method in pattern recognition learning",Automation and remote control, Vol. 25, 1964, pp.821-837. </unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38] S. Lloyd,"Least squares quantization in PCM", IEEE transactions on information theory, Vol. 28, No. 2, 1982, pp. 129-137. </unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39] C. Guo and L. Zhang, "A novel multiresolution spatiotemporal saliency detection model and its applications in image and video compression", IEEE transactions on image processing, Vol. 19, No. 1, 2009, pp. 185-198. </unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[40] P. Soille, "Morphological image analysis: principles and applications", Springer Science and Business Media, 2013. </unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[41] R. Achanta and Sh. Hemami and F. Estrada and S. Susstrunk, "Frequency-tuned salient region detection",
      IEEE conference on computer vision and pattern recognition, 2009, pp. 1597-1604. </unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[42] R. Unnikrishnan, C. M. Pantofaru and M. Hebert, "Toward objective evaluation of image segmentation algorithms", IEEE transactions on pattern analysis and machine intelligence, Vol. 29, No. 6, 2007, pp.929-944. </unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[43] M. Meila,"Comparing clusterings—an information based distance",Journal of multivariate analysis, Vol. 98, No. 5, 2007, pp. 873-895.</unstructured_citation></citation><citation key="ref43"><unstructured_citation> 
[44] D. Martin and C. Fowlkes and D. Tal and J. Malik, "A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics", Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001, Vol. 2, 2001, pp. 416-423. </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Mathematical Modeling of Flow Control Mechanism in Wireless Network-on-Chip</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Fardad</given_name><surname>Rad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Marzieh</given_name><surname>Gerami</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>10</day><year>2023</year></publication_date><pages><first_page>48</first_page><last_page>56</last_page></pages><doi_data><doi>10.52547/jist.19923.11.41.48</doi><resource>http://jist.ir/en/Article/19923</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/19923</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/19923</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/19923</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/19923</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/19923</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/19923</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/19923</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] International Technology Roadmap for Semiconductors. Available: http://www.itrs.net.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] A. Ben Achballah, S. Ben Othman and S. Ben Saoud, “Problems and challenges of emerging technology networks−on−chip: A review”, Microprocessors and Microsystems, vol 53, pp. 1-20, 2017.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] J. Lin Jr, H.-T. Wu, Y. Su, L. Gao, A. Sugavanam, and J. E. Brewer, "Communication using antennas fabricated in silicon integrated circuits," Solid-State Circuits, IEEE Journal of, vol. 42, pp. 1678-1687, 2007.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] S. Deb, A. Ganguly, P. P. Pande, B. Belzer, and D. Heo, "Wireless NoC as interconnection backbone for multicore chips: Promises and challenges," Emerging and Selected Topics in Circuits and Systems, IEEE Journal on, vol. 2, pp. 228-239, 2012.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] D. Zhao and Y. Wang, "SD-MAC: Design and synthesis of a hardware-efficient collision-free QoS-aware MAC protocol for wireless network-on-chip," Computers, IEEE Transactions on, vol. 57, pp. 1230-1245, 2008.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] S.-B. Lee, S.-W. Tam, I. Pefkianakis, S. Lu, M. F. Chang, and C. Guo, "A scalable micro wireless interconnect structure for CMPs," in Proceedings of the 15th annual international conference on Mobile computing and networking, pp. 217-228, 2009.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] K. Kempa, J. Rybczynski, Z. Huang, K. Gregorczyk, A. Vidan and B. Kimball, "Carbon nanotubes as optical antennae," Advanced Materials, vol. 19, pp. 421-426, 2007.</unstructured_citation></citation><citation key="ref8"><unstructured_citation> 
[8] Abadal, S., Llatser, I., Mestres, A., Solé-Pareta, J., Alarcón, E. and Cabellos-Aparicio, “Fundamentals of Graphene-Enabled Wireless On-Chip Networking,” In Modeling, Methodologies, and Tools for Molecular and Nano-scale Communications, pp. 293-317, 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] K. Chang, S. Deb, A. Ganguly, X. Yu, S. P. Sa,h and P. P. Pande, "Performance evaluation and design trade-offs for wireless network-on-chip architectures," ACM Journal on Emerging Technologies in Computing Systems (JETC), vol. 8, p. 23, 2012.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] M. Palesi, M. Collotta, A. Mineo, and V. Catania, "An Efficient Radio Access Control Mechanism for Wireless Network-On-Chip Architectures," Journal of Low Power Electronics and Applications, vol. 5, pp. 38-56, 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] Dehghani, A. and Jamshidi, K.,” A fault-tolerant hierarchical hybrid mesh-based wireless network-on-chip architecture for multicore platforms,” The Journal of Supercomputing, vol. 71, no. 8, pp. 3116-3148, 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] U. Y. Ogras and R. Marculescu, “It’s a small world after all": NoC performance optimization via long-range link insertion," Very Large-Scale Integration (VLSI) Systems, IEEE Transactions on, vol. 14, pp. 693-706, 2006.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Hu, W. H., Wang, C., and Bagherzadeh, N,” Design and analysis of a mesh-based wireless network-on-chip,” The Journal of Supercomputing, vol. 71, no. 8, pp. 2830-2846, 2015.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] Ogras, U. Y. and Marculescu, R,” Analysis and optimization of prediction-based flow control in networks-on-chip,” In Modeling, Analysis and Optimization of Network-on-Chip Communication Architectures, pp. 105-133, 2013.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] A. Pullini, F. Angiolini, D. Bertozzi, and L. Benini, "Fault tolerance overhead in network-on-chip flow control schemes," in Integrated Circuits and Systems Design, 18th Symposium on, pp. 224-229, 2005.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] J. W. van den Brand, C. Ciordas, K. Goossens, and T. Basten, "Congestion-controlled best-effort communication for networks-on-chip," in Proceedings of the conference on Design, automation, and test in Europe, pp. 948-953, 2007.
[17] A. Rezaei, M. Daneshtalab and D. Zhao,” CAP-W: Congestion-Aware Platform for Wireless-based Network-on-Chip in Many-Core Era,” Microprocessors and Microsystems, vol. 52, pp. 23-33, 2017.
[18] T. Marescaux, A. Rangevall, V. Nollet, A. Bartic, and H. Corporaal, "Distributed Congestion Control for Packet-Switched Networks on Chip," in ParCo, pp. 761-768, 2005.
[19] F. Jafari, M. S. Talebi, A. Khonsari, and M. Yaghmaee, "A Novel Congestion Control Scheme in Network-on-Chip Based on Best Effort Delay-Sum Optimization," in Parallel Architectures, Algorithms, and Networks, International Symposium on, pp. 191-196, 2008.
[20] Talebi, M. S., Jafari, F., Khonsari, A. and Yaghmaee, M. H,” Proportionally fair flow control mechanism for best-effort traffic in network-on-chip architectures”, International Journal of Parallel, Emergent, and Distributed Systems, vol. 25, no. 4, pp. 345-362, 2010.
 [21] Durand, Y., Bernard, C. and Clermidy, F,” Distributed Dynamic Rate Adaptation on a Network on Chip with Traffic Distortion,” In Embedded Multicore/Many-core Systems-on-Chip (MCSoC), pp. 225-232, 2016.
[22] Y. Wang and D. Zhao, "Distributed flow control and buffer management for Wireless Network-on-Chip," in Circuits and Systems, 2009. ISCAS 2009. IEEE International Symposium on, pp. 1353-1356, 2009.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[23] C. Wang, W.-H. Hu, and N. Bagherzadeh, "A wireless network-on-chip design for multicore platforms," in Parallel, Distributed and Network-Based Processing (PDP), 19th Euromicro International Conference on, pp. 409-416, 2011.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[24] D. Zhao and R. Wu, "Overlaid mesh topology design and deadlock-free routing in wireless network-on-chip," in Networks on Chip (NoCs), Sixth IEEE/ACM International Symposium on, pp. 27-34, 2012.
[25] S. H. Low and D. E. Lapsley, "Optimization flow control—I: basic algorithm and convergence," IEEE/ACM Transactions on Networking (TON), vol. 7, pp. 861-874, 1999.
[26] F. P. Kelly, A. K. Maulloo, and D. K. Tan, "Rate control for communication networks: shadow prices, proportional fairness and stability," Journal of the Operational Research Society, pp. 237-252, 1998.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[27] S. Boyd and L. Vandenberghe, Convex optimization: Cambridge university press, 2004.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[28] S. Boyd, "Convex Optimization II Lecture Notes," Ed: Stanford University, 2006.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[29] M. Grant, S. Boyd, and Y. Ye, "CVX: Matlab software for disciplined convex programming," ed, 2008.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[30] Mohtavipour, S. M., Mollajafari, M. and Naseri, A, ‘‘a novel packet exchanging strategy for preventing HoL-blocking in fat trees,’’ Cluster Computing, pp: 1-22, 2019.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[31] Mortazavi, H., Akbar, R., Safaei, F. and Rezaei. A., ‘‘a fault-tolerant and congestion-aware architecture for wireless networks-on-chip,’’ Wireless Networks, vol. 25, no. 6, pp. 3675-3687, 2019.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[32] Yazdanpanah, F., AfsharMazayejani, R., Alaei, M., Rezaei, A. and Daneshtalab, M., “An energy-efficient partition-based XYZ-planar routing algorithm for a wireless network-on-chip”, The Journal of Supercomputing, vol. 75, no. 2, pp. 837–861, 2019.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[33] Rezaei, A., Daneshtalab, M., Zhao and D. CAP-W, “Congestionaware platform for wireless-based network-on-chip in many-core era”, Microprocessors and Microsystems, vol. 52, pp. 23–33, 2017.
[34] S. M. Mamaghani and M. A. J. Jamali, ‘‘A load-balanced congestion-aware routing algorithm based on time interval in wireless network-on-chip,’’ Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 7, pp. 2869-2882, 2019.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Study and Realization of an Alarm System by Coded Laser Barrier Analyzed by the Wavelet Transform</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>meriane</given_name><surname>brahim</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Salah</given_name><surname>Rahmouni</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Issam</given_name><surname>Tifouti</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>10</day><year>2023</year></publication_date><pages><first_page>57</first_page><last_page>64</last_page></pages><doi_data><doi>10.52547/jist.24198.11.41.57</doi><resource>http://jist.ir/en/Article/24198</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/24198</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/24198</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/24198</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/24198</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/24198</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/24198</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/24198</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	Muhammad Asyraf Zainal Arifin “Automation   Security System with Laser Lights Alarm on Web Pages and Mobile Apps ” 978-1-5386-8546-4/19/$31.00 ©2019 IEEE.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] 	A. S. Life. 2019’s Best Home Security Systems. Available:https://www.asecurelife.com/best-home-security-system/,Accessed on 7/1/2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] 	A. Tseloni, R. Thompson, L. Grove, N. Tilley, and G. Farrell, "The effectiveness of burglary security devices," Security Journal, vol. 30, pp. 646-664, 2017.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] 	Ashis Rai ‘’ Low Cost Laser Light Security System in Smart Home ‘’ 978-1-7281-2443-8/19/$31.00 ©2019 IEEE.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] 	Arianne B ‘’ Design and Implementation of an Arduino-Based Security System Using Laser Light ‘’  LPU-Laguna Journal of Engineering and Computer Studies Vol. 4 No. 2 October 2019.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] 	S.Rahmouni, L. Zighed, S.Chaguetmi, M. Daoudi, M. Khelifa, M. Karyaoui, R. Chtourou. ‘’ Correlation between photoluminescence and ellipsometric measurements of porous silicon layers‘’.(Optoelectron. Adv. Mat.) . Vol.12, 9-10 ; P 553-558. (2018).</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] 	Md. Moyeed Abrar ‘’ Design and Implementation of AstableMultivibrator using 555 Timer ‘’  IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) , Volume 12, Issue 1 Ver. II (Jan. – Feb. 2017), PP 22-29.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] 	J. Kim “Time-frequency characterization of hand-transmitted, impulsive vibrations using analytic wavelet transform,” Journal of Sound and Vibration, vol.308, pp. 98-111, Nov 2007.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] 	Singh, S.D. Joshi, R.K. Patney, K. Saha, ‘’ The Fourier decomposition method for nonlinear and non-stationary time series analysis ‘’, Proc. R. Soc. A 473 (2017) 2016.0871.
[10] Mohammad RasoulKahrizi "Long-Term Spectral Pseudo-Entropy (LTSPE): A New Robust Feature For Speech Activity Detection"Journal of Information Systems and Telecommunication, Vol. 6, No. 4, October-December 2018.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11] B Meriane ‘’Denoising and Enhancement Speech Signal Using Wavelet ‘’ Journal of Information Systems and Telecommunication, Vol. 9, No. 1, January-March 2021.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12] RaziehTorkamani, Sadeghzadeh "Wavelet-based Bayesian Algorithm for Distributed Compressed Sensing", Journal of Information Systems and Telecommunication, Vol. 7, No. 2, April-June 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13] Ruiqiang Guo, Lu Song "Space Laser Chaotic Security System", 978-1-5386-3573-5/17/$31.00 ©2017 IEEE.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14] Anil Khatak, Manoj Kumar, Sanjeev Dhull ‘’ An Improved CMOS Design of Op-Amp Comparator with Gain Boosting Technique for Data Converter Circuits ‘’ Journal of Low Power Electronics and Applications, 2018, 8, 33.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Autoencoder based Emotional Stress State Detection Approach by using Electroencephalography Signals</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Jia</given_name><surname>Uddin</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>10</day><year>2023</year></publication_date><pages><first_page>24</first_page><last_page>30</last_page></pages><doi_data><doi>10.52547/jist.32267.11.41.24</doi><resource>http://jist.ir/en/Article/32267</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/32267</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/32267</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/32267</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/32267</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/32267</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/32267</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/32267</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] R. E. Bender, and L. B. Alloy, “Life stress and kindling in bipolar disorder: review of the evidence and integration with emerging biopsychosocial theories”, Clinical psychology review, Vol. 31, No. 3, 2011, pp. 383–398.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	T. G. Pickering, “Mental stress as a causal factor in the development of hypertension and cardiovascular disease”, Current hypertension reports, Vol. 3, No. 3, 2001, pp. 249–254.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	T. C. Major, and J. M. Conrad, “A survey of brain computer interfaces and their applications”, in IEEE SOUTHEASTCON 2014, 2014, pp. 1–8.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	N. Elsayed, Z. S. Zaghloul, and M. Bayoumi, “Brain computer interface: EEG signal preprocessing issues and solutions”, Int. J. Comput. Appl, Vol. 169, No. 3, 2017, pp. 12–16.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. E. Wheeler, R. J. Davidson, and A. J. Tomarken, “Frontal brain asymmetry and emotional reactivity: A biological substrate of affective style”, Psychophysiology, Vol. 30, No. 1, 1993, pp. 82–89.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. C. Atencio et al., “Computing stress-related emotional state via frontal cortex asymmetry to be applied in passive-ssBCI”, in 5th ISSNIP-IEEE Biosignals and Biorobotics Conference: Biosignals and Robotics for Better and Safer Living (BRC), 2014, pp. 1–6. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	F.P. George et al. “Recognition of emotional states using EEG signals based on time-frequency analysis and SVM classifier”, International Journal of Electrical and Computer Engineering, Vol. 9, No. 2, 2019, pp. 1012-1020.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	T. F. Bastos-filho, A. Ferreira, A.C. Atencio, S. Arjunan, and D. Kumar, “Evaluation of Feature Extraction Techniques in Emotional State Recognition”, in 4th International conference on intelligent human computer interaction (IHCI), 2012, pp. 1-6.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	N. Jatupaiboon, S. Pan-ngum, and P. Israsena, “Real-time EEG-based happiness detection system”, The Scientific World Journal, 2013, pp. 1-12.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] M. J. Hasan, and J. M. Kim, “A hybrid feature pool-based emotional stress state detection algorithm using EEG signals”, Brain sciences, 2019, Vol. 9, No. 12, pp. 1-15.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] D. Shon, K. Im, J. Park, D. Lim, B. Jang, and J. Kim, “Emotional Stress State Detection Using Genetic Algorithm-Based Feature Selection on EEG Signals”, Int. J. of environmental research and public health, 2018, Vol. 15, No. 11, pp. 1-11.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] S. Koelstra, C. Muhl, M. Soleymani, J.S. Lee, A. Yazdani, T. Ebrahimi, T. Pun, A. Nijholt, and I. Patras, “Deap: A database for emotion analysis; using physiological signals”, IEEE transactions on affective computing, 2011, Vol. 3, No. 1, pp.18-31.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Y. P. Lin, C. H. Wang, T. P. Jung, T. L. Wu, S. K. Jeng, J. R. Duann, and J. H. Chen, “EEG-based emotion recognition in music listening”, IEEE Transactions on Biomedical Engineering, 2010, Vol 57, No. 7, pp. 1798-1806.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] R. Jenke, A. Peer, and M. Buss, “Feature extraction and selection for emotion recognition from EEG”, IEEE Transactions on Affective Computing, 2014, Vol. 5, No. 3, pp. 327-39.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] M. Sohaib, C.-H. Kim, and J.-M. Kim, “A Hybrid Feature Model and Deep-Learning-Based Bearing Fault Diagnosis”, Sensors, 2017, Vol. 17, No. 12, pp. 1-16.</unstructured_citation></citation><citation key="ref16"><unstructured_citation> 
[16] J. A. Russell, “A circumplex model of affect”, Journal of Personality and Social Psychology, 1980, Vol. 39, No. 6, pp. 1161–1178.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] S.H. Oh, Y.R. Lee, and H.N. Kim, “A novel EEG feature extraction method using Hjorth parameter”, Int. Journal of Electronics and Electrical Engineering, 2014, Vol. 2, No. 2, pp. 106-110.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] P.C. Petrantonakis, and L.J. Hadjileontiadis, “Emotion Recognition from EEG Using Higher Order Crossings”, IEEE Transactions on Information Technology in Biomedicine, 2010, Vol. 14, No. 2, pp. 186–197.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] H. Shao, H. Jiang, H. Zhao, and F. Wang, “A novel deep autoencoder feature learning method for rotating machinery fault diagnosis”, Mechanical Systems and Signal Processing, 2017, Vol. 95, pp. 187-204.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Developing A Contextual Combinational Approach for Predictive Analysis of Users Mobile Phone Trajectory Data in LBSNs</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Fatemeh </given_name><surname>Ghanaati</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Gholamhossein</given_name><surname>Ekbatanifard </surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Kamrad</given_name><surname>Khoshhal Roudposhti </surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>10</day><year>2023</year></publication_date><pages><first_page>12</first_page><last_page>23</last_page></pages><doi_data><doi>10.52547/jist.32593.11.41.12</doi><resource>http://jist.ir/en/Article/32593</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/32593</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/32593</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/32593</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/32593</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/32593</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/32593</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/32593</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] L. Huang, Y. Ma, Sh. Wang, Y. Liu, “An Attention-based Spatiotemporal LSTM Network for Next POI Recommendation”, Journal of IEEE Transactions on Services Computing, vol. 12, 2019, pp. 1-13.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] J. Manotumruksa, C. Macdonald, I. Ounis, “A Contextual Attention Recurrent Architecture for Context- Aware Venue Recommendation”, in 18th ACM SIGIR Conference on Research and Development in Information Retrieval, 2018, pp. 555-564.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] K. Kala, M. Nandhini,” Context Category Specific sequence aware Point of Interest Recommender System with Multi Gated Recurrent Unit”, Journal of Ambient Intelligence and Humanized Computing, 2019, https://doi.org/10.1007/s12652-019-01583-w.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] C. Liu, J. Liu, J. Wang, S. Xu, H. Han, Y. Chen, “An Attention-Based Spatiotemporal Gated Recurrent Unit Network for Point-of-Interest Recommendation”, International Journal of Geo-Information, vol. 8, No. 8, 2019, pp.355-373.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] S. Wang, Z. Bao, J. Culpepper, G. Cong, “A Survey on Trajectory Data Management, Analytics, and Learning”, ACM Computing Surveys, vol. 54, No.3, 2020, pp. 1-33.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] J. Feng Y. Li, C. Zhang, F. Sun, F. Meng, A. Guo, D. Jin, “DeepMove: Predicting Human Mobility with Attentional Recurrent Networks”, in 18th ACM IW3C2 Conference on International World Wide Web, 2018, pp. 1459-1468.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] Q. Guo, Z .Sun, J. Zhang, Y. Theng, “An Attentional Recurrent Neural Network for Personalized Next Location Recommendation”, in 34th ACM AAAI Conference on Artificial Intelligence, 2020, pp. 83-90.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] D.Yao,C. Zhang, J. Huang, J. Bi, “SERM: A Recurrent Model for Next Location Prediction in Semantic Trajectories”, in 17th ACM CIKM Conference on Information and Knowledge Management, 2017 ,pp. 2411-2414.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] L. Zhang, Z. Sun, J. Zhang, H. Kloeden, F. Klanner, “Modeling hierarchical category transition for next POI recommendation with uncertain check-ins”, Journal of Information Sciences, Elsevier, vol.515, 2019, pp. 169-190.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] L. Chang, W. Chen, J. Huang, Ch. Bin, W. Wang, “Exploiting multi-attention network with contextual influence for point-of-interest recommendation”, Journal of Applied Intelligence, vol. 51, 2021, pp. 1904–1917.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] L. Huang, Y. Ma, Y. Liu, K. He, “DAN-SNR: A Deep Attentive Network for Social-Aware Next Point-of-Interest Recommendation”, Journal of ACM Transactions on Internet Technology, Vol.21, No.2, 2020, pp. 1–27.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] G. Christoforidis, P. Kefalas, A. Papadopoulos, Y. Manolopoulos, “RELINE: Point-of-Interest Recommendations using Multiple Network Embeddings”, Journal of Knowledge and Information Systems, Vol. 63, No.4, 2019, pp. 791-817.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] J. Manotumruksa, C. Macdonald, I. Ounis, “A Deep Recurrent Collaborative Filtering Framework for Venue Recommendation”, in 17th ACM CIKM Conference on Information and Knowledge Management, 2017, pp. 1429-1438.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] D. Yang, D Zhang, V. Zheng, Z. Yu, “Modeling User Activity Preference by Leveraging User Spatial Temporal Characteristics in LBSNs”, Journal of IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol.45, No.1, 2014, pp. 129 – 142.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] M. Quadrana, P. Cremonesi, D. Jannach, “Sequence-Aware Recommender Systems”, Journal of ACM Computing Surveys, Vol.51, No.4, 201, pp. 1–36.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>  
[16] Q. Cui, Y. Tang, S. Wu, L. Wang, “Distance2Pre: Personalized Spatial Preference for Next Point-of-Interest Prediction”, in PAKDD Conference on Knowledge Discovery and Data Mining, 2019, pp. 289-301.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] Q. Gao, F. Zhou, G. Trajcevski, K. Zhang, T. Zhong, F. Zhang, “Predicting Human Mobility via Variational Attention”, in IW3C2 Conference on International World Wide Web Conference Committee, 2019, pp. 2750–2756.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] A.Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. Gomez, L. Kaiser, and  I. Polosukhin, “Attention Is All You Need”, in 31th  NIPS Conference on Neural Information Processing System, 2017, pp. 5998-6008.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] Y. Chen, C. Long, G.Cong, C. Li, “Context-aware Deep Model for Joint Mobility and Time Prediction”,in 13th ACM WSDM Conference on Web Search and Data Mining, 2020, pp. 106-114.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] S. Rendle, C. Freudenthaler, Z. Gantner, L. Thieme, “BPR: Bayesian Personalized Ranking from Implicit Feedback”, in 25th ACM UAI Conference on Uncertainty in Artificial Intelligence, 2009, pp. 452–461.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] E.Cho, S. Myers, J. Leskovec, “Friendship and Mobility: User Movement in Location-Based Social Networks”, in 17th ACM KDD Conference on Knowledge Discovery and Data Mining, 2011, pp. 1082–1090.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] P. Zhao, H. Zhu, Y. Liu, J. Xu, F. Zhuang, V. Sheng, X. Zhou, “Where to Go Next: A Spatio-Temporal Gated Network for Next POI Recommendation”,. in 33th AAAI Conference on Artificial Intelligence, 2019, pp. 5877-5884.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] A M. Islam, M. M. Mohammad, S. S. Das, M. E. Ali, “A Survey on Deep Learning Based Point-Of-Interest (POI) Recommendations”, 2020, arXiv:2011.10187v1.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] C. Zheng, D. Tao, “Attention-Based Dynamic Preference Model for Next Point-of-Interest Recommendation”. in 15th Springer WASA Conference on Wireless Algorithms, Systems, and Applications, 2020, pp. 768–780.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] D. K. Bokde, Sh. Girase, D. Mukhopadhyay, “Role of Matrix Factorization Model in Collaborative Filtering Algorithm: A Survey”, International Journal of Advance Foundation and Research in Computer, vol.1, 2014, pp. 111-118.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] M. Gan, L. Gao, “Discovering Memory-Based Preferences for POI Recommendation in Location-Based Social Networks”, International Journal of Geo-Information (IJGI), Vol.8, No.6, 2019, pp. 279-294.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] X. Meng, J. Fang, “A Diverse and Personalized POI Recommendation Approach by Integrating Geo-Social Embedding Relations”, Journal of IEEE Access, Vol.8, 2020, pp. 226309- 226323.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] Q. Yuan, G. Cong, Z. Ma, A. Sun, N. Thalmann, “Time-aware Point-of-interest Recommendation”, in 36th ACM SIGIR Conference on Research and development in Information Retrieval, 2013, pp. 363–372.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] P. Wang, H. Wang, H. Zhang, F. Lu, S. Wu, “A Hybrid Markov and LSTM Model for Indoor Location Prediction”, Journal of IEEE Access, Vol.7, 2019, pp. 185928 – 185940.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] J. Li, G. Liu, C. Yan, C. Jiang, “LORI: A Learning-to-Rank-Based Integration Method of Location Recommendation”, IEEE Transactions on Computational Social Systems, Vol.6, No.3, 2019, pp. 430 – 440. </unstructured_citation></citation><citation key="ref31"><unstructured_citation> 
[31] L.Yao, Q. Z. Sheng, Y. Qin, X. Wang, A. Shemshadi, Q. He, “Context-aware Point-of-Interest Recommendation Using Tensor Factorization with Social Regularization”, in 38th.ACM SIGIR Conference on Research and Development in Information Retrieval, 2015, pp. 1007–1010.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] X. He, L. Liao, H. Zhang, L. Nie, X. Hu, T. Chua, “Neural collaborative filtering”, in 26th ACM IW3C2Conference on World Wide Web Conference Committee, 2017, pp. 173-182.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>   
[33] Q. Liu, S.Wu, L. Wang, T. Tan, “Predicting the Next Location: A Recurrent Model with Spatial and Temporal Contexts”, in 30th ACM AAAI Conference, 2016 , pp. 194–200.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] S. Kumar, M.I. Nezhurina, “An ensemble classification approach for prediction of user’s next location based on Twitter data”, Journal of Ambient Intelligence and Humanized Computing, Vol.10, No. 11, 2018, pp. 4503-4513.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] Q. Liu, S. Wu, D. Wang, Z. Li, L. Wang, “Context-Aware Sequential Recommendation”, in ICDM Conference on Data Mining, IEEE, 2016, pp. 1053-1058. </unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] D. Bokde, S. Girase, D. Mukhopadhya, “Matrix Factorization Model in Collaborative Filtering Algorithms: A Survey”, Procedia Computer Science, Vol.49, 2015, pp. 136-146.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] D. Lian, Y. Wu, Y. Ge, X. Xie, E. Chen, “Geography-Aware Sequential Location Recommendation”, in 26th ACM ICGKDD Conference on Knowledge Discovery and Data Mining, 2020, pp. 2009–2019.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38] K. Yang, J. Zhu, “Next POI Recommendation via Graph Embedding Representation from H-Deepwalk on Hybrid Network”, Journal of IEEE Access, Vol 7, 2019, pp. 171105 – 171113.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39] D. P. Kingma, J.L. Ba, “A Method for Stochastic Optimization”, in International Conference for Learning Representations, 2015, arXiv:1412.6980v.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Breast Cancer Classification Approaches - A Comparative Analysis</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohan</given_name><surname>Kumar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sunil Kumar</given_name><surname>Khatri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Masoud</given_name><surname>Mohammadian</surname></person_name></contributors><publication_date media_type="online"><month>1</month><day>10</day><year>2023</year></publication_date><pages><first_page>1</first_page><last_page>11</last_page></pages><doi_data><doi>10.52547/jist.33395.11.41.1</doi><resource>http://jist.ir/en/Article/33395</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/33395</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/33395</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/33395</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/33395</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/33395</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/33395</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/33395</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	D. Hanahan and R. A. Weinberg, “Hallmarks of Cancer: The Next Generation,” Cell, vol. 144, no. 5, pp. 646–674, Mar. 2011.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. Katuwal, P. Jousilahti, and E. Pukkala, “Causes of death among women with breast cancer: A follow‐up study of 50 481 women with breast cancer in Finland,” Int. J. Cancer, vol. 149, no. 4, pp. 839–845, Aug. 2021</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. F. Khorshid and A. M. Abdulazeez, “breast cancer diagnosis based on k-nearest neighbors: A review,” PalArch’s J. Archaeol. Egypt/Egyptology, vol. 18, no. 4, pp. 1927–1951, 2021</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Tawam Hospital |Medical News. (n.d.). Retrieved November 19, 2014, fromhttp://www.tawamhospital.ae/english/news/print.aspx?NewsID= 367</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Karabatak, “A new classifier for breast cancer detection based on Naive Bayesian,” Measurement, vol. 72, pp. 32–36, 2015</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A-Al. Nahid and Y. Kong, “Involvement of machine learning for breast cancer image classification: a survey,” Comput. Math. Methods Med., 2017</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Kumar, S. K. Khatri, and M. Mohammadian, “Breast cancer identification and prognosis with machine learning techniques-An elucidative review,” J. Interdiscip. Math., vol. 23, no. 2, pp. 503–521, 2020,</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Joshi and A. Mehta, “Comparative Analysis of Various Machine Learning Techniques for Diagnosis of Breast Cancer,” Int. J. Emerg. Technol., vol. 8, no. 1, pp. 522–526, 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	B. Soni, A. Bora, A. Ghosh, and A. Reddy, “RFSVM: A Novel Classification Technique for Breast Cancer Diagnosis,” Int. J. Innov. Technol. Explor. Eng., 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	O. L. Mangasarian, W. N. Street, and W. H. Wolberg, “Breast cancer diagnosis and prognosis via linear programming,” Oper. Res., vol. 43, no. 4, pp. 570–577, 1995</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Zhi-H. Zhou and Y. Jiang, “Medical diagnosis with C4. 5 rule preceded by artificial neural network ensemble,” IEEE Trans. Inf. Technol. Biomed., vol. 7, no. 1, pp. 37–42, 2003,</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	T. Ornthammarath, “Artificial neural networks applied to the seismic design of deep tunnels,” Università degli Studi di Pavia, 2007.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	D. Delen, G. Walker, and A. Kadam, “Predicting breast cancer survivability: a comparison of three data mining methods,” Artif. Intell. Med., vol. 34, no. 2, pp. 113–127, Jun. 2005</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Jini Marsilin, “An Efficient CBIR Approach for Diagnosing the Stages of Breast Cancer Using KNN Classifier,” Bonfring Int. J. Adv. Image Process., vol. 2, no. 1, pp. 01–05, Mar. 2012</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Belciug, A-B Salem, F. Gorunescu, and M. Gorunescu, “Clustering-based approach for detecting breast cancer recurrence,” in 2010 10th International Conference on Intelligent Systems Design and Applications, pp. 533–538,Nov. 2010, </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M.Lichman, “UC Irvine Machine Learning Repository,” 2015. http://archive.ics.uci.edu/ml.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	V. Chaurasia and S. Pal, “Data Mining Techniques: To Predict and Resolve Breast Cancer Survivability,” Int. J. Comput. Sci. Mob. Comput., vol. 3, no. 1, pp. 10–22, 2014.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Christobel, Angeline, and Y. Sivaprakasam, “An empirical comparison of data mining classification methods,” vol. 3, no. 2, 2011</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. Abonyi and F. Szeifert, “Supervised fuzzy clustering for the identification of fuzzy classifiers,” Pattern Recognit. Lett., vol. 24, no. 14, pp. 2195–2207, 2003</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	D. Lavanya, “Ensemble Decision Tree Classifier For Breast Cancer Data,” Int. J. Inf. Technol. Converg. Serv., vol. 2, no. 1, pp. 17–24, Feb. 2012</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Abad, Monica, James Carlisle Genavia, Jaybriel Lincon Somcio, and Larry Vea. "An Innovative Approach on Driver's Drowsiness Detection through Facial Expressions using Decision Tree Algorithms." In 2021 IEEE 12th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON), pp. 0571-0576. IEEE, 2021.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	J. A. Cruz and D. S. Wishart, “Applications of machine learning in cancer prediction and prognosis,” Cancer Inform., vol. 2, p. 117693510600200030, 2006</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	A. C. Tan and D. Gilbert, “Ensemble machine learning on gene expression data for cancer classification,” 2003</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	G. L. Tsirogiannis, D. Frossyniotis, J. Stoitsis, S. Golemati, A. Stafylopatis, and K. S. Nikita, “Classification of medical data with a robust multi-level combination scheme,” in 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541), 2004</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	G. Sudhamathy, M. Thilagu, and G. Padmavathi, “Comparative analysis of R package classifiers using breast cancer dataset,” Int J Eng Technol, vol. 8, pp. 2127–2136, 2016.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Frank A. UCI machine learning repository. http://archive. ics. uci. edu/ml. 2010.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	WHO, WHO position paper on mammography screening. World Health Organization, 2014.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	D. Bazazeh and R. Shubair, “Comparative study of machine learning algorithms for breast cancer detection and diagnosis,” in 2016 5th international conference on electronic devices, systems and applications (ICEDSA), pp. 1–4, 2016</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	I. Castiglioni et al., “AI applications to medical images: From machine learning to deep learning,” Phys. Medica, vol. 83, pp. 9–24, Mar. 2021</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	R. Abdlaty, J. Hayward, T. Farrell, and Q. Fang, “Skin erythema and pigmentation: a review of optical assessment techniques,” Photodiagnosis Photodyn. Ther., vol. 33, p. 102127, Mar. 2021, </unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	M. R. Islam, M. A. Kabir, A. Ahmed, A. R. M. Kamal, H. Wang, and A. Ulhaq, “Depression detection from social network data using machine learning techniques,” Heal. Inf. Sci. Syst., vol. 6, no. 1, p. 8, Dec. 2018</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	M. D. Skowronski and J. G. Harris, “Acoustic detection and classification of microchiroptera using machine learning: Lessons learned from automatic speech recognition,” J. Acoust. Soc. Am., vol. 119, no. 3, pp. 1817–1833, Mar. 2006</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	L. Deng and X. Li, “Machine Learning Paradigms for Speech Recognition: An Overview,” IEEE Trans. Audio. Speech. Lang. Processing, vol. 21, no. 5, pp. 1060–1089, May 2013</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	“Cardio-Vascular Disease Prediction based on Ensemble Technique Enhanced using Extra Tree Classifier for Feature Selection,” Int. J. Recent Technol. Eng., vol. 8, no. 3, pp. 3236–3242, Sep. 2019</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	Kaggle.com, “Breast Cancer Wisconsin (Diagnostic) Data Set,” 2021. https://www.kaggle.com/uciml/breast-cancer-wisconsin-data.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	S. Zhang, X. Li, M. Zong, X. Zhu, and R. Wang, “Efficient kNN Classification With Different Numbers of Nearest Neighbors,” IEEE Trans. Neural Networks Learn. Syst., vol. 29, no. 5, pp. 1774–1785, May 2018</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	M. Faisal, A. Scally, R. Howes, K. Beatson, D. Richardson, and M. A. Mohammed, “A comparison of logistic regression models with alternative machine learning methods to predict the risk of in-hospital mortality in emergency medical admissions via external validation,” Health Informatics J., vol. 26, no. 1, pp. 34–44, Mar. 2020</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	V. Tatan, “Your Beginner Guide to Basic Classification Models: Logistic Regression and SVM,” 2019.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	O. Maier, M. Wilms, J. von der Gablentz, U. M. Kramer, T. F. Munte, and H. Handels, “Extra tree forests for sub-acute ischemic stroke lesion segmentation in MR sequences,” J. Neurosci. Methods, vol. 240, pp. 89–100, 2015</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	S. B. Kotsiantis, “Decision trees: a recent overview,” Artif. Intell. Rev., vol. 39, no. 4, pp. 261–283, 2013</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	F. Bray, J. Ferlay, I. Soerjomataram, R. L. Siegel, L. A. Torre, and A. Jemal, “Global cancer statistics 2018: GLOBOCAN estimates of incidence and mortality worldwide for 36 cancers in 185 countries,” CA. Cancer J. Clin., vol. 68, no. 6, pp. 394–424, Nov. 2018</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	J. L. Speiser, M. E. Miller, J. Tooze, and E. Ip, “A comparison of random forest variable selection methods for classification prediction modeling,” Expert Syst. Appl., vol. 134, pp. 93–101, Nov. 2019</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	J. J. Rodriguez, L. I. Kuncheva, and C. J. Alonso, “Rotation forest: A new classifier ensemble method,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 10, pp. 1619–1630, 2006</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	M. Maria and C. Yassine, “Machine learning based approaches for modeling the output power of photovoltaic array in real outdoor conditions,” Electronics, vol. 9, no. 2, p. 315, 2020</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	S. S. Shajahaan, S. Shanthi, and V. ManoChitra, “Application of data mining techniques to model breast cancer data,” Int. J. Emerg. Technol. Adv. Eng., vol. 3, no. 11, pp. 362–369, 2013.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	S. Raschka, “An overview of general performance metrics of binary classifier systems,” arXiv Prepr. arXiv1410.5330, 2014</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	Madooei, Ali, Ramy Mohammed Abdlaty, Lilian Doerwald-Munoz, Joseph Hayward, Mark S. Drew, Qiyin Fang, and Josiane Zerubia. "Hyperspectral image processing for detection and grading of skin erythema." In Medical Imaging 2017: Image Processing, vol. 10133, pp. 577-583. SPIE, 2017.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	R. Abdlaty et al., “Hyperspectral Imaging and Classification for Grading Skin Erythema,” Front. Phys., vol. 6, Aug. 2018</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>