﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051922</doi_batch_id><timestamp>20260519222841</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>6</month><day>10</day><year>2023</year></publication_date><journal_volume><volume>11</volume></journal_volume><issue>42</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Performance Analysis and Activity Deviation Discovery in Event Log Using Process Mining Tool for Hospital System </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Shanmuga Sundari</given_name><surname>M</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Rudra Kalyan</given_name><surname>Nayak</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Vijaya Chandra </given_name><surname>Jadala</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sai Kiran </given_name><surname>Pasupuleti</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>10</day><year>2023</year></publication_date><pages><first_page>110</first_page><last_page>122</last_page></pages><doi_data><doi>10.52547/jist.24214.11.42.110</doi><resource>http://jist.ir/en/Article/24214</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/24214</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/24214</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/24214</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/24214</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/24214</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/24214</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/24214</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	G. Li and R. M. De Carvalho, “Process Mining in Social Media: Applying Object-Centric Behavioral Constraint Models,” IEEE Access, 2019, vol. 7, pp. 84360–84373, doi: 10.1109/ACCESS.2019.2925105.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	“Root Cause,” 2021. [Online]. Available: https://appian.com/process-mining/root-cause-analysis.html#:~:text=The root cause analysis aims,impact factors such as bottlenecks.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. Xu and J. Liu, “A Profile Clustering Based Event Logs Repairing Approach for Process Mining,” IEEE Access, 2019, vol. 7, pp. 17872–17881, doi: 10.1109/ACCESS.2019.2894905.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	G. Akhila, N. Madhubhavana, N. V. Ramareddy, M. Hurshitha, and N. Ravinder, “A survey on health prediction using human activity patterns through smart devices,” Int. J. Eng. Technol., 2018, doi: 10.14419/ijet.v7i1.1.9472.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	W. Li, Y. Fan, W. Liu, M. Xin, H. Wang, and Q. Jin, “A Self-Adaptive Process Mining Algorithm Based on Information Entropy to Deal with Uncertain Data,” IEEE Access, 2019, vol. 7, pp. 131681–131691, doi: 10.1109/ACCESS.2019.2939565.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Q. Zeng, H. Duan, and C. Liu, “Top-Down Process Mining from Multi-Source Running Logs Based on Refinement of Petri Nets,” IEEE Access, 2020, vol. 8, pp. 61355–61369, doi: 10.1109/ACCESS.2020.2984057.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Z. Huang et al., “Safety Assessment of Emergency Training for Industrial Accident Scenarios Based on Analytic Hierarchy Process and Gray-Fuzzy Comprehensive Assessment,” IEEE Access, 2020, vol. 8, pp. 144767–144777, doi: 10.1109/ACCESS.2020.3013671.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	W. Van der Aalst, Process mining: Data science in action. 2016.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. Tripathy et al., “Spectral Clustering Based Fuzzy C-Means Algorithm for Prediction of Membrane Cholesterol from ATP-Binding Cassette Transporters,” in Intelligent and Cloud Computing, Springer, 2021, pp. 439–448.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] C. Subbalakshmi, G. Ramakrishna, and S. Krishna Mohan Rao, “Evaluation of data mining strategies using fuzzy clustering in dynamic environment,” 2016, doi: 10.1007/978-81-322-2529-4_55.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] M. Anila and G. Pradeepini, “Study of prediction algorithms for selecting appropriate classifier in machine learning,” J. Adv. Res. Dyn. Control Syst., 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] G. Dorgo, K. Varga, and J. Abonyi, “Hierarchical frequent sequence mining algorithm for the analysis of alarm cascades in chemical processes,” IEEE Access, 2018, vol. 6, pp. 50197–50216, doi: 10.1109/ACCESS.2018.2868415.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] J. Jin, W. Sun, F. Al-Turjman, M. B. Khan, and X. Yang, “Activity pattern mining for healthcare,” IEEE Access, 2020, doi: 10.1109/ACCESS.2020.2981670.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] T. G. Erdogan and A. Tarhan, “Systematic Mapping of Process Mining Studies in Healthcare,” IEEE Access, 2018, doi: 10.1109/ACCESS.2018.2831244.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] W. Li, H. Zhu, W. Liu, D. Chen, J. Jiang, and Q. Jin, “An anti-noise process mining algorithm based on minimum spanning tree clustering,” IEEE Access, 2018, vol. 6, pp. 48756–48764, doi: 10.1109/ACCESS.2018.2865540.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] P. I. C. Kumari, P. Gayathri, N. Rajesh, S. Umar, G. C. Sekhar, and A. M. Abdul, “Designing of medical processor unit for intelligent network-based medical usage,” Indones. J. Electr. Eng. Comput. Sci., 2016, doi: 10.11591/ijeecs.v4.i3.pp532-537.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] M. J. Hasan, A. Rai, Z. Ahmad, and J. M. Kim, “A Fault Diagnosis Framework for Centrifugal Pumps by Scalogram-Based Imaging and Deep Learning,” IEEE Access, 2021, vol. 9, pp. 58052–58066, doi: 10.1109/ACCESS.2021.3072854.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] M. J. Hasan, D. Shon, K. Im, H. K. Choi, D. S. Yoo, and J. M. Kim, “Sleep state classification using power spectral density and residual neural network with multichannel EEG signals,” Appl. Sci., 2020, vol. 10, no. 21, pp. 1–13, doi: 10.3390/app10217639.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] M. J. Hasan, J. Uddin, and S. N. Pinku, “A novel modified SFTA approach for feature extraction,” 2016 3rd Int. Conf. Electr. Eng. Inf. Commun. Technol. iCEEiCT 2016, 2017, pp. 1–5, doi: 10.1109/CEEICT.2016.7873115.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] M. S. Sundari and R. K. Nayak, “Process mining in healthcare systems: A critical review and its future,” Int. J. Emerg. Trends Eng. Res., 2020, vol. 8, no. 9, pp. 5197–5208, doi: 10.30534/ijeter/2020/50892020.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] V. S. Reddy and B. T. Rao, “A combined clustering and geometric data perturbation approach for enriching privacy preservation of healthcare data in hybrid clouds,” Int. J. Intell. Eng. Syst., 2018, doi: 10.22266/ijies2018.0228.21.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] K. M. Hanga, Y. Kovalchuk, and M. M. Gaber, “A graph-based approach to interpreting recurrent neural networks in process mining,” IEEE Access, 2020, vol. 8, pp. 172923–172938, doi: 10.1109/ACCESS.2020.3025999.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] A. E. Marquez-Chamorro, K. Revoredo, M. Resinas, A. Del-Rio-Ortega, F. M. Santoro, and A. Ruiz-Cortes, “Context-Aware Process Performance Indicator Prediction,” IEEE Access, 2020, vol. 8, pp. 222050–222063, doi: 10.1109/ACCESS.2020.3044670.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] R. Tripathy, R. K. Nayak, P. Das, and D. Mishra, “Cellular cholesterol prediction of mammalian ATP-binding cassette (ABC) proteins based on fuzzy c-means with support vector machine algorithms,” J. Intell. Fuzzy Syst., 2020, vol. 39, no. 2, doi: 10.3233/JIFS-179934.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] A. Massmann, P. Gentine, and J. Runge, “Causal inference for process understanding in Earth sciences,” 2021, pp. 1–24, [Online]. Available: http://arxiv.org/abs/2105.00912.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] A. K. A. De Medeiros, A. J. M. M. Weijters, and W. M. P. Van Der Aalst, “Genetic process mining: An experimental evaluation,” Data Min. Knowl. Discov., 2007, doi: 10.1007/s10618-006-0061-7.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] E. Kim et al., “Discovery of outpatient care process of a tertiary university hospital using process mining,” Healthc. Inform. Res., 2013, vol. 19, no. 1, pp. 42–49, doi: 10.4258/hir.2013.19.1.42.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] P. Nets, A. Networks, and R. C. Language, “Modeling of Resource Allocation Mechanisms in Distributed Computing Systems using Petri Nets and Stochastic Activity Networks (SAN): a Review and Reo-based Suggestion.”</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] R. K. Nayak. Sundari, M. Shanmuga, Efficient Tracing and Detection of Activity Deviation in Event Log Using ProM in Health Care Industry, 2021, 5th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud (ISMAC 2021).</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] S. C. Sekaran, V. Saravanan, R. RudraKalyanNayak, and S. S. Shankar, “Human Health and Velocity Aware Network Selection Scheme for WLAN/WiMAX Integrated Networks with QoS,” Int. J. Innov. Technol. Explor. Eng. (IJITEE), ISSN, pp. 2278–3075.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] https://data.4tu.nl/articles/dataset/BPI_Challenge_2012/12689204/1.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] P. Selvaraj, V. K. Burugari, D. Sumathi, R. K. Nayak, and R. Tripathy, “Ontology based Recommendation System for Domain Specific Seekers,” Proc. 3rd Int. Conf. I-SMAC IoT Soc. Mobile, Anal. Cloud, I-SMAC 2019, no. December, 2019, pp. 341–345, doi: 10.1109/I-SMAC47947.2019.9032634.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Cache Point Selection and Transmissions Reduction using LSTM Neural Network</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Malihe</given_name><surname> Bahekmat</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad Hossein </given_name><surname>Yaghmaee Moghaddam</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>10</day><year>2023</year></publication_date><pages><first_page>123</first_page><last_page>134</last_page></pages><doi_data><doi>10.52547/jist.27279.11.42.123</doi><resource>http://jist.ir/en/Article/27279</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/27279</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/27279</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/27279</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/27279</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/27279</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/27279</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/27279</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1].	A. Khalifeh et al., “Wireless sensor networks for smart cities: Network design, implementation and performance evaluation, Electron” vol. 10, no. 2, pp. 1–28, 2021, doi: 10.3390/electronics10020218.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2].	A. Shankar, N. R. Sivakumar, M. Sivaram, A. Ambikapathy, T. K. Nguyen, and V. Dhasarathan, “Increasing fault tolerance ability and network lifetime with clustered pollination in wireless sensor networks,” J. Ambient Intell. Humaniz. Comput., vol. 12, no. 2, pp. 2285–2298, 2021, doi: 10.1007/s12652-020-02325-z.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3].	Kabashkin, I., Reliability of Cluster-Based Nodes in Wireless Sensor Networks of Cyber Physical Systems. Procedia Computer Science, 2019. 151: p. 313-320.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4].	W. Osamy, A. A. El-Sawy, and A. Salim, “CSOCA: Chicken Swarm Optimization Based Clustering Algorithm for Wireless Sensor Networks,” IEEE Access, vol. 8, pp. 60676–60688, 2020, doi: 10.1109/ACCESS.2020.2983483.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5].	S. K. S. L. Preeth, R. Dhanalakshmi, and P. M. Shakeel, “An intelligent approach for energy efficient trajectory design for mobile sink based IoT supported wireless sensor networks,” Peer-to-Peer Netw. Appl., vol. 13, no. 6, pp. 2011–2022, 2020, doi: 10.1007/s12083-019-00798-0.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6].	Zhou, Y., et al., Topology design and cross-layer optimization for wireless body sensor networks. Ad Hoc Networks, 2017. 59: p. 48-62.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7].	R. Arya and S. C. Sharma, “Analysis and optimization of energy of Sensor node using ACO in wireless sensor network,” Procedia Comput. Sci., vol. 45, no. C, pp. 681–686, 2015, doi: 10.1016/j.procs.2015.03.132.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8].	Singh, A., Sharma, S. and Singh, J., 2021. Nature-inspired algorithms for wireless sensor networks: A comprehensive survey. Computer Science Review, 39, p.100342. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9].	A. Singh, S. Sharma, and J. Singh, “Nature-inspired algorithms for Wireless Sensor Networks: A comprehensive survey,” Comput. Sci. Rev., vol. 39, 2021, doi: 10.1016/j.cosrev.2020.100342.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10].	H. Zhong, L. Shao, J. Cui, and Y. Xu, “An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks,” J. Parallel Distrib. Comput., vol. 111, pp. 1–12, 2018, doi: 10.1016/j.jpdc.2017.06.019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11].	N. Abbas and F. Yu, “Design and Implementation of a Video Surveillance System for Linear Wireless Multimedia Sensor Networks,” 2018 3rd IEEE Int. Conf. Image, Vis. Comput. ICIVC 2018, pp. 524–527, 2018, doi: 10.1109/ICIVC.2018.8492776.</unstructured_citation></citation><citation key="ref12"><unstructured_citation> 
[12].	M. Mohamed-Lamine, “New clustering scheme for wireless sensor networks,” 2013 8th Int. Work. Syst. Signal Process. Their Appl. WoSSPA 2013, pp. 487–491, 2013, doi: 10.1109/WoSSPA.2013.6602412.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13].	Meenakshi, D. and Kumar, S., 2012. "Energy Efficient Hierarchical Clustering Routing Protocol for Wireless Sensor Networks". Springer, pp. 409-420. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14].	N. Goel and G. Aujl, “Simulation and feasibility analysis: Hierarchical Energy Efficient Routing Protocol (HEERP) for Wireless Sensor Network,” Int. Conf. Commun. Signal Process. ICCSP 2013 - Proc., pp. 1143–1148, 2013, doi: 10.1109/iccsp.2013.6577235. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15].	T. Ducrocq, N. Mitton, and M. Hauspie, “Energy-based clustering for wireless sensor network lifetime optimization,” IEEE Wirel. Commun. Netw. Conf. WCNC, pp. 968–973, 2013, doi: 10.1109/WCNC.2013.6554695. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16].	R. Mhemed, N. Aslam, W. Phillips, and F. Comeau, “An energy efficient fuzzy logic cluster formation protocol in wireless sensor networks,” Procedia Comput. Sci., vol. 10, pp. 255–262, 2012, doi: 10.1016/j.procs.2012.06.035. </unstructured_citation></citation><citation key="ref17"><unstructured_citation> 
[17].	P. Zhang, G. Xiao, and H. P. Tan, “Clustering algorithms for maximizing the lifetime of wireless sensor networks with energy-harvesting sensors,” Comput. Networks, vol. 57, no. 14, pp. 2689–2704, 2013, doi: 10.1016/j.comnet.2013.06.003. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18].	Y. Shen and X. Li, “Wavelet neural network approach for dynamic power management in wireless sensor networks,” Proc. Int. Conf. Embed. Softw. Syst. ICESS 2008, pp. 376–381, 2008, doi: 10.1109/ICESS.2008.36. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19].	Oldewurtel F and Mahonen P. (2006) 'Neural Wireless Sensor Networks', In: International Conference on Systems and Networks Communications, ICSNC '06. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20].	L. Chou, D. C. Li, and W. Hong, "Improving energy‐efficient communications with a battery lifetime‐aware mechanism in IEEE802. 16e wireless networks," Concurr. Comput. Pract. Exp., vol. 25, no. 1, pp. 94–111, 2013. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21].	P. Mohanty and M. R. Kabat, “A hierarchical energy efficient reliable transport protocol for wireless sensor networks,” Ain Shams Eng. J., vol. 5, no. 4, pp. 1141–1155, 2014, doi: 10.1016/j.asej.2014.05.009.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22].	B. Sharma and T. C. Aseri, “A hybrid and dynamic reliable transport protocol for wireless sensor networks,” Comput. Electr. Eng., vol. 48, pp. 298–311, 2015, doi: 10.1016/j.compeleceng.2015.01.007.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23].	Tiglao, N.M.C. and A.M. Grilo. Transmission Window Optimization for Caching-Based Transport Protocols in Wireless Sensor Networks. 2015. Cham: Springer International Publishing.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24].	Alipio, M.I. and N.M.C. Tiglao, RT-CaCC: A Reliable Transport With Cache-Aware Congestion Control Protocol in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 2018. 17(7): p. 4607-4619.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Broadband Low-cost Reflectarray based on a New Phase Synthesis Technique and a Class of Cross Bow-Tie Cells</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mahmood</given_name><surname>Rafaei-Booket</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahdieh</given_name><surname>Bozorgi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyed Mostafa</given_name><surname>Musavi</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>10</day><year>2023</year></publication_date><pages><first_page>75</first_page><last_page>83</last_page></pages><doi_data><doi>10.52547/jist.32487.11.42.75</doi><resource>http://jist.ir/en/Article/32487</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/32487</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/32487</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/32487</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/32487</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/32487</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/32487</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/32487</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	J. Huang, and J. A. Encinar, Reflectarray Antennas, Hoboken. NJ: John Wiley &amp; Sons, 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] 	D. M. Pozar, “Bandwidth of reflectarrays,”, Electron Lett., Vol. 39, No. 21, 2003, pp. 1490-1490.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] M. Rafaei-Booket, and Z. Atlasbaf, “New Ku-band reflectarray antenna by using anisotropic superstrate on an artificial magnetic conductor,” International Journal of Microwave and Wireless Technologies, Vol. 9, 2016, pp. 831-841.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] M. Rafaei-Booket, Z. Atlasbaf, and M. Shahabadi, “Broadband reflectarray antenna on a periodically perforated substrate,” IEEE Trans. Antennas Propag., Vol. 64, No. 8, 2016, pp. 3711-3717.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] J. A. Encinar, and J. A. Zornoza, “Three-layer printed Reflectarrays for contoured beam space applications,” IEEE Trans. Antennas Propag., Vol. 52, No. 5, 2004, pp. 1138-1148.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] M. Rafaei-Booket, and Z. Atlasbaf, “Metallic grating embedded in an anisotropic slab for realization of a reflectarray antenna,” In 23th Iranian Conference on Electrical Engineering (ICEE), 2015, pp. 10-14.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] M. Bozorgi, and M. Rafaei-Booket, “Metallic array on a biased Ferrite substrate as a reflectarray antenna,” In 9th International Symposium on Telecommunications (IST), 2018, pp. 80-85.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] M. Rafaei-Booket, and S. M. Mousavi, “Efficient analysis method and design approach for broadband reflectarrays with isotropic/-artificial anisotropic substrates,” IET Microwaves, Antennas &amp; Propag., Vol. 14, No. 10, 2020, pp. 1108-1116.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] X. Li, Y. Wan, J. Liu, D. Jiang, T. Bai, K. Zhu, J. Zhuang, and W.-Q. Wang, “Broadband electronically scanned reflectarray antenna with liquid crystals,” IEEE Antennas and Wireless Lett., Vol. 20, No. 3, 2021, pp. 396-400.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] E. Carrasco, M. Barba, and J. A. Encinar, “Reflectarray element based on aperture-coupled patches with slots and lines of variable length,” IEEE Trans. Antennas Propag., Vol. 52, No. 3, 2007, pp. 820-825.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] E. Carrasco, J. A. Encinar, and M. Barba, “Bandwidth improvement in large Reflectarrays by using true-time delay,” IEEE Trans. Antennas Propag., Vol. 56, No. 8, 2008, pp. 2496-2503.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] E. Ozturk, and B. Saka, “Multilayer Minkowski reflectarray antenna with improved phase performance,” IEEE Trans. Antennas Propag., 2021, DOI: 10.1109/TAP.2021.3090533.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] M. R. Chaharmir, J. Shaker, N. Gagnon, and D. Lee, “Design of broadband, single layer dual band large reflectarray using multi open loop elements,” IEEE Trans. Antennas Propag., Vol. 58, No. 9, 2010, pp. 2875-2883.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] H. Rajagopalan, and Y. Rahmat-Samii, “On the reflection characteristics of a reflectarray element with low-loss and high-loss substrates,” IEEE Trans. Antennas Propag., Vol. 52, No. 4, 2010, pp. 73-85.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] F. Costa, and A. Monorchio, “Closed-form analysis of reflection losses in microstrip reflectarray antennas,” IEEE Trans. Antennas Propag., Vol. 60, No. 10, 2012, pp. 4650-4660.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] J. Ethier, M. R. Chaharmir, and J. Shaker, “Loss reduction in reflectarray designs using sub-wavelength coupled-resonant elements,” IEEE Trans. Antennas Propag., Vol. 60, No. 11, 2012, pp. 5456-5459.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] P. Nayeri, F. Yang, and A. Z. Elsherbani, “Braodband reflectarray antennas using double-layer subwavelength patch elements,” IEEE Antennas Propag. Lett., Vol. 9, 2010, pp. 1139-1142.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] M. Bozorgi, and Z. Atlasbaf, “Spectral solution for scattering analysis of periodic plasmonic nano-antennas on iso/-anisotropic substrate,” J. Lightwave Technol., Vol. 34, No. 11, 2016, pp. 2624-2630.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] Y. Mao, Sh. Xu, F. Yang, and A. Z. Elsherbani, “A novel phase synthesis approach for wideband reflectarray design,” IEEE Trans. Antennas Propag., Vol. 63, No. 9, 2015, pp. 4189-4193.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] H. Hasani, M. Kamyab, and A. Mirkamali, “Low cross-polarization reflectarray antenna,” IEEE Trans. Antennas Propag., Vol. 59, No. 5, 2011, pp. 1752-1756.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] M. Maddahali, and K. Forooraghi, “High efficiency reflectarray using smooth tapering in phase pattern on antenna surface,” Microwave and Optical Lett.,Vol. 55, No. 4, 2013, pp. 747-753.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] R. S. Malfajani, and B. A. Arand, “Dual-band orthogonally polarized single layer reflectarray antenna,” IEEE Trans. Antennas Propag., Vol. 65, No. 11, 2017, pp. 6145-6150.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] J. Huang, “Analysis of a microstrip reflectarray antenna for micro- spacecraft application,” TDA Progress Report, 1995.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] C. A. Balanis, Antenna Theory: Analysis and Design, 3rd ed. John Wiley &amp; Sons; 2005.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] M. Rafaei-Booket, and M. Bozorgi, “Low-cost inhomogeneous material for low-RCS reflectarray antenna implementation,” AEU- International Journal of Electronics and Communications, Vol. 149, 2022, pp. 154182.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Comparative Study of 5G Signal Attenuation Estimation Models</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Md Anoarul</given_name><surname>Islam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Manabendra</given_name><surname>Maiti</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Judhajit</given_name><surname>Sanyal</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Quazi Md</given_name><surname>Alfred</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>10</day><year>2023</year></publication_date><pages><first_page>84</first_page><last_page>93</last_page></pages><doi_data><doi>10.52547/jist.32544.11.42.84</doi><resource>http://jist.ir/en/Article/32544</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/32544</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/32544</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/32544</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/32544</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/32544</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/32544</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/32544</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] T. S. Rappaport et al., "Millimeter Wave Mobile Communications for 5G Cellular: It Will Work!," in IEEE Access, vol. 1, pp. 335-349, 2013, doi: 10.1109/ACCESS.2013.2260813.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] T. S. Rappaport, Y. Xing, G. R. MacCartney, A. F. Molisch, E. Mellios and J. Zhang, "Overview of Millimeter Wave Communications for Fifth-Generation (5G) Wireless Networks—With a Focus on Propagation Models," in IEEE Transactions on Antennas and Propagation, vol. 65, no. 12, pp. 6213-6230, Dec. 2017, doi: 10.1109/TAP.2017.2734243.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] H. H. Hussein, H. A. Elsayed &amp; S. M. Abd El-kader, “Intensive Benchmarking of D2D communication over 5G cellular networks: prototype, integrated features, challenges, and main applications,” Wireless Networks, vol. 26, pp. 3183–3202, 2020. https://doi.org/10.1007/s11276-019-02131-2.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] Y. Sun, J. Cao, M. Ma, Y. Zhang, H. Li and B. NIU, "EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet," in IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2020.2989784.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] S. N. Livieratos and P. G. Cottis, "Rain Attenuation Along Terrestrial Millimeter Wave Links: A New Prediction Method Based on Supervised Machine Learning," in IEEE Access, vol. 7, pp. 138745-138756, 2019, doi: 10.1109/ACCESS.2019.2939498.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] J. Huang, Y. Cao, X. Raimundo, A. Cheema and S. Salous, "Rain Statistics Investigation and Rain Attenuation Modeling for Millimeter Wave Short-Range Fixed Links," in IEEE Access, vol. 7, pp. 156110-156120, 2019, doi: 10.1109/ACCESS.2019.2949437.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] A. M. Al-Saman, M. Cheffena, M. Mohamed, M. H. Azmi and Y. Ai, "Statistical Analysis of Rain at Millimeter Waves in Tropical Area," in IEEE Access, vol. 8, pp. 51044-51061, 2020, doi: 10.1109/ACCESS.2020.2979683.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] Z. A. Shamsan, "Rainfall and Diffraction Modeling for Millimeter-Wave Wireless Fixed Systems," in IEEE Access, vol. 8, pp. 212961-212978, 2020, doi: 10.1109/ACCESS.2020.3040624.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] F. D. Diba, M. A. Samad and D. -Y. Choi, "The Effects of Rain on Terrestrial Links at K, Ka and E-Bands in South Korea: Based on Supervised Learning," in IEEE Access, vol. 9, pp. 9345-9355, 2021, doi: 10.1109/ACCESS.2021.3049825.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] A. A. H. Budalal, M. R. Islam, K. Abdullah and T. Abdul Rahman, "Modification of Distance Factor in Rain Attenuation Prediction for Short-Range Millimeter-Wave Links," in IEEE Antennas and Wireless Propagation Letters, vol. 19, no. 6, pp. 1027-1031, June 2020, doi: 10.1109/LAWP.2020.2987462.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] Z. A. Shamsan, "Dust Storm and Diffraction Modelling for 5G Spectrum Wireless Fixed Links in Arid Regions," in IEEE Access, vol. 7, pp. 162828-162840, 2019, doi: 10.1109/ACCESS.2019.2951855.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] H. B. H. Dutty and M. M. Mowla, "Channel Modeling at Unlicensed Millimeter Wave V Band for 5G Backhaul Networks," 2019 5th International Conference on Advances in Electrical Engineering (ICAEE), 2019, pp. 769-773, doi: 10.1109/ICAEE48663.2019.8975439.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] A. Hikmaturokhman, M. Suryanegara and K. Ramli, "A Comparative Analysis of 5G Channel Model with Varied Frequency: A Case Study in Jakarta," 2019 7th International Conference on Smart Computing &amp; Communications (ICSCC), 2019, pp. 1-5, doi: 10.1109/ICSCC.2019.8843632.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] S. K. M., S. A. Rao and N. Kumar, "Modeling and Link Budget Estimation of Directional mmWave Outdoor Environment for 5G," 2019 European Conference on Networks and Communications (EuCNC), 2019, pp. 106-111, doi: 10.1109/EuCNC.2019.8802001.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] Y. Dalveren, A. H. Alabish and A. Kara, "A Simplified Model for Characterizing the Effects of Scattering Objects and Human Body Blocking Indoor Links at 28 GHz," in IEEE Access, vol. 7, pp. 69687-69691, 2019, doi: 10.1109/ACCESS.2019.2919546.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] X. Cai, G. Zhang, C. Zhang, W. Fan, J. Li and G. F. Pedersen, "Dynamic Channel Modeling for Indoor Millimeter-Wave Propagation Channels Based on Measurements," in IEEE Transactions on Communications, vol. 68, no. 9, pp. 5878-5891, Sept. 2020, doi: 10.1109/TCOMM.2020.3001614.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] M. K. Arti, "Channel Estimation and Detection in Satellite Communication Systems," in IEEE Transactions on Vehicular Technology, vol. 65, no. 12, pp. 10173-10179, Dec. 2016, doi: 10.1109/TVT.2016.2529661.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] C. Lu et al., "A New Rain Attenuation Prediction Model for the Earth-Space Links," in IEEE Transactions on Antennas and Propagation, vol. 66, no. 10, pp. 5432-5442, Oct. 2018, doi: 10.1109/TAP.2018.2854181.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] J. X. Yeo, Y. H. Lee and J. T. Ong, "Rain Attenuation Prediction Model for Satellite Communications in Tropical Regions," in IEEE Transactions on Antennas and Propagation, vol. 62, no. 11, pp. 5775-5781, Nov. 2014, doi: 10.1109/TAP.2014.2356208.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] S. Mohanty, C. Singh and V. Tiwari, "Estimation of rain attenuation losses in signal link for microwave frequencies using ITU-R model," 2016 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), 2016, pp. 532-535, doi: 10.1109/IGARSS.2016.7729132.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] I. Shayea, T. Abd. Rahman, M. Hadri Azmi and M. R. Islam, "Real Measurement Study for Rain Rate and Rain Attenuation Conducted Over 26 GHz Microwave 5G Link System in Malaysia," in IEEE Access, vol. 6, pp. 19044-19064, 2018, doi: 10.1109/ACCESS.2018.2810855.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] S. Sun, T. S. Rappaport, M. Shafi, P. Tang, J. Zhang and P. J. Smith, "Propagation Models and Performance Evaluation for 5G Millimeter-Wave Bands," in IEEE Transactions on Vehicular Technology, vol. 67, no. 9, pp. 8422-8439, Sept. 2018, doi: 10.1109/TVT.2018.2848208.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] Md Anoarul Islam, Kausik Bhattacharya, Md. Abdul Alim Sheikh, P. K. Ghosh, Manabendra Maiti, Judhajit Sanyal, "Machine Learning Reinforced Ku-band Rain Attenuation Model for Tropical Locations", in 2019 Global Conference for Advancement in Technology (GCAT), Bangalore, India, October 18-20, 2019.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] M. A. Islam, M. Maiti, P. K. Ghosh &amp; J. Sanyal, “Machine Learning-Based Rain Attenuation Prediction Model,” In: Das N.R., Sarkar S. (eds) Computers and Devices for Communication. CODEC 2019. Lecture Notes in Networks and Systems, vol 147. Springer, Singapore. https://doi.org/10.1007/978-981-15-8366-7_3.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] N. O. Oyie and T. J. O. Afullo, "Measurements and Analysis of Large-Scale Path Loss Model at 14 and 22 GHz in Indoor Corridor," in IEEE Access, vol. 6, pp. 17205-17214, 2018, doi: 10.1109/ACCESS.2018.2802038.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] M. A. Islam, M. Maiti, Q. M. Alfred, P. Kumar Ghosh and J. Sanyal, "Attenuation Modelling and Machine Learning Based SNR Estimation for 5G Indoor Link," 2020 IEEE VLSI DEVICE CIRCUIT AND SYSTEM (VLSI DCS), 2020, pp. 275-278, doi: 10.1109/VLSIDCS47293.2020.9179924.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] Noman Shabbir, Lauri Kütt, Muhammad M. Alam, Priit Roosipuu, Muhammad Jawad, Muhammad B. Qureshi, Ali R. Ansari, Raheel Nawaz, “Vision towards 5G: Comparison of radio propagation models for licensed and unlicensed indoor femtocell sensor networks”, Physical Communication, Volume 47, 2021. https://doi.org/10.1016/j.phycom.2021.101371.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] D. Makoveyenko, S. Siden and V. Pyliavskyi, "Generalized 5G mmWave Propagation Model in an Urban Macro Environment," 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&amp;T), 2020, pp. 472-476, doi: 10.1109/PICST51311.2020.9468030.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] M. Sung et al., "RoF-Based Radio Access Network for 5G Mobile Communication Systems in 28 GHz Millimeter-Wave," in Journal of Lightwave Technology, vol. 38, no. 2, pp. 409-420, 15 Jan.15, 2020, doi: 10.1109/JLT.2019.2942636.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] H. Kim and S. Nam, "Transmission Enhancement Methods for Low-Emissivity Glass at 5G mmWave Band," in IEEE Antennas and Wireless Propagation Letters, vol. 20, no. 1, pp. 108-112, Jan. 2021, doi: 10.1109/LAWP.2020.3042524.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] J. Liu, D. W. Matolak, M. Mohsen and J. Chen, "Path Loss   Modeling and Ray-Tracing Verification for 5/31/90 GHz Indoor Channels," 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), 2019, pp. 1-6, doi: 10.1109/VTCFall.2019.8891181.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] H. A. Obeidat et al., "An indoor path loss prediction model using wall correction factors for wireless local area network and 5G indoor networks," in Radio Science, vol. 53, no. 4, pp. 544-564, April 2018, doi: 10.1002/2018RS006536.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] C. A. L. Diakhate, J. Conrat, J. Cousin and A. Sibille, "Millimeter-wave outdoor-to-indoor channel measurements at 3, 10, 17 and 60 GHz," 2017 11th European Conference on Antennas and Propagation (EUCAP), 2017, pp. 1798-1802, doi: 10.23919/EuCAP.2017.7928696.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] F. Yu et al., "Expansion RSS-based Indoor Localization Using 5G WiFi Signal," 2014 International Conference on Computational Intelligence and Communication Networks, 2014, pp. 510-514, doi: 10.1109/CICN.2014.117.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] H. Echigo, Y. Cao, M. Bouazizi and T. Ohtsuki, "A Deep Learning-Based Low Overhead Beam Selection in mmWave Communications," in IEEE Transactions on Vehicular Technology, vol. 70, no. 1, pp. 682-691, Jan. 2021, doi: 10.1109/TVT.2021.3049380.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] Gante, J., Falcão, G. &amp; Sousa, L. Deep Learning Architectures for Accurate Millimeter Wave Positioning in 5G. Neural Process Lett 51, 487–514 (2020). https://doi.org/10.1007/s11063-019-10073-1.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] H. Echigo, T. Ohtsuki, W. Jiang and Y. Takatori, "Fair Pilot Assignment Based on AOA and Pathloss with Location Information in Massive MIMO," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, 2017, pp. 1-6, doi: 10.1109/GLOCOM.2017.8254813.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38] H. Echigo and T. Ohtsuki, "Graph Coloring-Based Pilot Reuse with AOA and Distance in D2D Underlay Massive MIMO," 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 2018, pp. 1-6, doi: 10.1109/VTCSpring.2018.8417577.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39] S. Moon, H. Kim and I. Hwang, "Deep learning-based channel estimation and tracking for millimeter-wave vehicular communications," in Journal of Communications and Networks, vol. 22, no. 3, pp. 177-184, June 2020, doi: 10.1109/JCN.2020.000012.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40] J. Pudashine et al., "Probabilistic Attenuation Nowcasting for the 5G Telecommunication Networks," in IEEE Antennas and Wireless Propagation Letters, vol. 20, no. 6, pp. 973-977, June 2021, doi: 10.1109/LAWP.2021.3068393.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41] M. J. Hasan, A. Rai, Z. Ahmad and J. -M. Kim, "A Fault Diagnosis Framework for Centrifugal Pumps by Scalogram-Based Imaging and Deep Learning," in IEEE Access, vol. 9, pp. 58052-58066, 2021, doi: 10.1109/ACCESS.2021.3072854.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42] Hasan, Md J., Dongkoo Shon, Kichang Im, Hyun-Kyun Choi, Dae-Seung Yoo, and Jong-Myon Kim. 2020. "Sleep State Classification Using Power Spectral Density and Residual Neural Network with Multichannel EEG Signals" Applied Sciences 10, no. 21: 7639. https://doi.org/10.3390/app10217639.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43] M. J. Hasan, J. Uddin and S. N. Pinku, "A novel modified SFTA approach for feature extraction," 2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), 2016, pp. 1-5, doi: 10.1109/CEEICT.2016.7873115.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Representing a Novel Expanded Version of Shor’s Algorithm and a Real-Time Experiment using IBM Q-Experience Platform</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Sepehr </given_name><surname>Goodarzi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Afshin</given_name><surname>Rezakhani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahdi</given_name><surname>Maleki</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>10</day><year>2023</year></publication_date><pages><first_page>135</first_page><last_page>148</last_page></pages><doi_data><doi>10.52547/jist.33142.11.42.135</doi><resource>http://jist.ir/en/Article/33142</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/33142</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/33142</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/33142</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/33142</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/33142</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/33142</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/33142</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	P. Steffen, R. Giegerich, and M. Giraud, "GPU parallelization of algebraic dynamic programming," in International Conference on Parallel Processing and Applied Mathematics, 2009: Springer, pp. 290-299. </unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. Asano, T. Maruyama, and Y. Yamaguchi, "Performance comparison of FPGA, GPU and CPU in image processing," in 2009 international conference on field programmable logic and applications, 2009: IEEE, pp. 126-131. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	N. Lang, H. Mena, and J. Saak, "On the benefits of the LDLT factorization for large-scale differential matrix equation solvers," Linear Algebra and its Applications, vol. 480, pp. 44-71, 2015.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. Windley, "Transposing matrices in a digital computer," The Computer Journal, vol. 2, no. 1, pp. 47-48, 1959.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	D. Zhang, Z.-H. Zhou, and S. Chen, "Non-negative matrix factorization on kernels," in Pacific Rim International Conference on Artificial Intelligence, 2006: Springer, pp. 404-412. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	D. Prijatmoko et al., "Early detection of protein depletion in alcoholic cirrhosis: role of body composition analysis," Gastroenterology, vol. 105, no. 6, pp. 1839-1845, 1993.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	L. S. Ostrouchov, M. Heath, and C. Romine, "Modeling speedup in parallel sparse matrix factorization," Oak Ridge National Lab., TN (USA), 1990. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	K. Likharev, "Classical and quantum limitations on energy consumption in computation," International Journal of Theoretical Physics, vol. 21, no. 3, pp. 311-326, 1982.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	W. Wardah, M. G. Khan, A. Sharma, and M. A. Rashid, "Protein secondary structure prediction using neural networks and deep learning: A review," Computational biology and chemistry, vol. 81, pp. 1-8, 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	T. Theurer, N. Killoran, D. Egloff, and M. B. Plenio, "Resource theory of superposition," Physical review letters, vol. 119, no. 23, p. 230401, 2017.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	G. Gour and C. M. Scandolo, "Dynamical Entanglement," Physical Review Letters, vol. 125, no. 18, p. 180505, 2020.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	G. Kumar, R. Saha, M. K. Rai, R. Thomas, and T.-H. Kim, "Proof-of-work consensus approach in blockchain technology for cloud and fog computing using maximization-factorization statistics," IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6835-6842, 2019.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	G. Kwasniewski, T. Ben-Nun, A. N. Ziogas, T. Schneider, M. Besta, and T. Hoefler, "On the parallel I/O optimality of linear algebra kernels: near-optimal LU factorization," in Proceedings of the 26th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2021, pp. 463-464.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	D. O’Malley, V. V. Vesselinov, B. S. Alexandrov, and L. B. Alexandrov, "Nonnegative/binary matrix factorization with a d-wave quantum annealer," PloS one, vol. 13, no. 12, p. e0206653, 2018.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Catalán, J. R. Herrero, E. S. Quintana-Ortí, R. Rodríguez-Sánchez, and R. Van De Geijn, "A case for malleable thread-level linear algebra libraries: The LU factorization with partial pivoting," IEEE access, vol. 7, pp. 17617-17633, 2019.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	R. Atcheson, "A Generalization of QR Factorization To Non-Euclidean Norms," arXiv preprint arXiv:2101.09830, 2021.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Q. Cao et al., "Extreme-scale task-based cholesky factorization toward climate and weather prediction applications," in Proceedings of the Platform for Advanced Scientific Computing Conference, 2020, pp. 1-11. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	I. Yamazaki, A. Ida, R. Yokota, and J. Dongarra, "Distributed-memory lattice h-matrix factorization," The International Journal of High Performance Computing Applications, vol. 33, no. 5, pp. 1046-1063, 2019.
[19]	N. Heavner, P.-G. Martinsson, and G. Quintana-Ortí, "Computing rank-revealing factorizations of matrices stored out-of-core," arXiv preprint arXiv:2002.06960, 2020.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	T. Vander Aa, I. Chakroun, and T. Haber, "Distributed Bayesian probabilistic matrix factorization," Procedia Computer Science, vol. 108, pp. 1030-1039, 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	A. Fu, Z. Chen, Y. Mu, W. Susilo, Y. Sun, and J. Wu, "Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization," IEEE Transactions on Services Computing, 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	M. Gates, J. Kurzak, P. Luszczek, Y. Pei, and J. Dongarra, "Autotuning batch Cholesky factorization in CUDA with interleaved layout of matrices," in 2017 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), 2017: IEEE, pp. 1408-1417. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	A. Abdelfattah et al., "A survey of numerical linear algebra methods utilizing mixed-precision arithmetic," The International Journal of High Performance Computing Applications, p. 10943420211003313, 2021.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	M. Tang, M. Gadou, S. Rennich, T. A. Davis, and S. Ranka, "Optimized sparse Cholesky factorization on hybrid multicore architectures," Journal of computational science, vol. 26, pp. 246-253, 2018.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	Q. Cao et al., "Performance analysis of tile low-rank cholesky factorization using parsec instrumentation tools," in 2019 IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools), 2019: IEEE, pp. 25-32. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	M. Tang, M. Gadou, and S. Ranka, "A Multithreaded Algorithm for Sparse Cholesky Factorization on Hybrid Multicore Architectures," Procedia Computer Science, vol. 108, pp. 616-625, 2017.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	M. Green, K. Glover, D. Limebeer, and J. Doyle, "AJ-Spectral Factorization Approach to H_∞," SIAM Journal on Control and Optimization, vol. 28, no. 6, pp. 1350-1371, 1990.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	P. Smolensky, "Tensor product variable binding and the representation of symbolic structures in connectionist systems," Artificial intelligence, vol. 46, no. 1-2, pp. 159-216, 1990.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	D. P. DiVincenzo, "Quantum gates and circuits," Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences, vol. 454, no. 1969, pp. 261-276, 1998.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	D. M. Zajac et al., "Resonantly driven CNOT gate for electron spins," Science, vol. 359, no. 6374, pp. 439-442, 2018.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	D. Riste et al., "Detecting bit-flip errors in a logical qubit using stabilizer measurements," Nature communications, vol. 6, no. 1, pp. 1-6, 2015.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	F. Benatti and R. Floreanini, Irreversible quantum dynamics. Springer Science &amp; Business Media, 2003.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	S. Gulde et al., "Implementation of the Deutsch–Jozsa algorithm on an ion-trap quantum computer," Nature, vol. 421, no. 6918, pp. 48-50, 2003.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	M. Wolf and D. Terrell, "The high-tech industry, what is it and why it matters to our economic future," 2016.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	A. P. Carnevale, N. Smith, and M. Melton, "STEM: Science Technology Engineering Mathematics," Georgetown University Center on Education and the Workforce, 2011.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	A. Cross, "The IBM Q experience and QISKit open-source quantum computing software," in APS March Meeting Abstracts, 2018, vol. 2018, p. L58. 003.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Hoax Identification of Indonesian Tweeters using Ensemble Classifier</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Gus Nanang</given_name><surname>Syaifuddiin</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Rizal</given_name><surname>Arifin</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Desriyanti</given_name><surname>Desriyanti</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name> Ghulam Asrofi </given_name><surname>Buntoro</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Zulkham Umar </given_name><surname>Rosyidin</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ridwan Yudha </given_name><surname>Pratama</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ali </given_name><surname>Selamat</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>10</day><year>2023</year></publication_date><pages><first_page>94</first_page><last_page>101</last_page></pages><doi_data><doi>10.52547/jist.33532.11.42.94</doi><resource>http://jist.ir/en/Article/33532</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/33532</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/33532</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/33532</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/33532</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/33532</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/33532</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/33532</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	G. A. Buntoro, R. Arifin, G. N. Syaifuddiin, A. Selamat, O. Krejcar, and H. Fujita, “The implementation of the machine learning algorithm for the sentiment analysis of Indonesia’s 2019 presidential election,” IIUM Eng. J., vol. 22, no. 1, pp. 78–92, 2021, doi: https://doi.org/10.31436/iiumej.v22i1.1532.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. Pokhrel and R. Chhetri, “A Literature Review on Impact of COVID-19 Pandemic on Teaching and Learning,” High. Educ. Futur., vol. 8, no. 1, pp. 133–141, 2021, doi: https://doi.org/10.1177/2347631120983481.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Aristeidou and S. Cross, “Disrupted distance learning: the impact of Covid-19 on study habits of distance learning university students,” Open Learn. J. Open, Distance eLearning, vol. 36, no. 3, pp. 263–282, 2021, doi: https://doi.org/10.1080/02680513.2021.1973400.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. M. Zalat, M. S. Hamed, and S. A. Bolbol, “The experiences, challenges, and acceptance of e-learning as a tool for teaching during the COVID-19 pandemic among university medical staff,” PLoS One, vol. 16, no. 3, p. e0248758, 2021, doi: https://doi.org/10.1371/journal.pone.0248758.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	C. Saxena, H. Baber, and P. Kumar, “No Title,” J. Educ. Technol. Syst., vol. 49, no. 4, pp. 532–554, 2021, doi: https://doi.org/10.1177/0047239520977798.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. R. Alsoud and A. A. Harasis, “The Impact of COVID-19 Pandemic on Student’s E-Learning Experience in Jordan,” J. Theor. Appl. Electron. Commer. Res., vol. 16, no. 5, pp. 1404–141, 2021, doi: https://doi.org/10.3390/jtaer16050079.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Celliers and M. Hattingh, “A Systematic Review on Fake News Themes Reported in Literature,” in Responsible Design, Implementation and Use of Information and Communication Technology, 2020, pp. 223–234, doi: https://doi.org/10.1007/978-3-030-45002-1_19.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	T. Buchanan, “Why do people spread false information online? The effects of message and viewer characteristics on self-reported likelihood of sharing social media disinformation,” PLoS One, vol. 15, no. 10, p. e0239666, 2020, doi: https://doi.org/10.1371/journal.pone.0239666.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	T. Khan, A. Michalas, and A. Akhunzada, “Fake news outbreak 2021: Can we stop the viral spread?,” J. Netw. Comput. Appl., vol. 190, p. 103112, 2021, doi: https://doi.org/10.1016/j.jnca.2021.103112.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Montesi, “Understanding fake news during the Covid-19 health crisis from the perspective of information behaviour: The case of Spain,” J. Librariansh. Inf. Sci., vol. 53, no. 3, pp. 454–465, 2020, doi: https://doi.org/10.1177/0961000620949653.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. van der Linden, J. Roozenbeek, and J. Compton, “Inoculating Against Fake News About COVID-19,” Front. Psychol., vol. 11, p. 566790, 2020, doi: https://doi.org/10.3389/fpsyg.2020.566790.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Alasmari, A. Addawood, M. Nouh, W. Rayes, and A. Al-Wabil, “A Retrospective Analysis of the COVID-19 Infodemic in Saudi Arabia,” Futur. Internet, vol. 13, no. 10, p. 254, 2021, doi: https://doi.org/10.3390/fi13100254.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Y. I. Ferdiawan, P. A. D. Nurjanah, E. P. Krisdyan, A. Hidayatullah, H. J. M. Sirait, and N. A. Rakhmawati, “HOAX Impact to Community Through Social Media Indonesia,” Cakrawala, vol. 19, no. 1, pp. 121–124, 2019, doi: https://doi.org/10.31294/jc.v19i1.4452.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	K. Lutfiyah, “Hoax and Fake News During Covid-19: Is the Law Effective in Overcoming It?,” Indones. J. Int’l Clin. Leg. Educ., vol. 2, no. 3, pp. 345–360, 2020, doi: https://doi.org/10.15294/ijicle.v2i3.38422.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	N. M. Nasir, B. Baequni, and M. I. Nurmansyah, “Misinformation Related to Covid-19 in Indonesia,” J. Adm. Kesehat. Indones., vol. 8, no. 1, pp. 51–59, 2020, doi: http://dx.doi.org/10.20473/jaki.v8i0.2020.51-59.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Rasidin, D. Witro, B. Yanti, R. Purwaningsih, and W. Nurasih, “The Role of Government in Preventing The Spread if Hoax Related The 2019 Elections in Social Media,” Diakom, vol. 3, no. 2, pp. 127–3, 2020, doi: https://doi.org/10.17933/diakom.v3i2.76.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. J. Hasan, A. Rai, Z. Ahmad, and J.-M. Kim, “A Fault Diagnosis Framework for Centrifugal Pumps by Scalogram-Based Imaging and Deep Learning,” IEEE Access, vol. 9, pp. 58052–58066, 2021, doi: https://doi.org/10.1109/CEEICT.2016.7873115.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. J. Hasan, D. Shon, K. Im, H.-K. Choi, D.-S. Yoo, and J.-M. Kim, “Sleep State Classification Using Power Spectral Density and Residual Neural Network with Multichannel EEG Signals,” Appl. Sci., vol. 10, no. 21, p. 7639, 2020, doi: https://doi.org/10.3390/app10217639.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. J. Hasan, J. Uddin, and S. N. Pinku, “A novel modified SFTA approach for feature extraction,” in 2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), 2016, pp. 1–5, doi: https://doi.org/10.1109/CEEICT.2016.7873115.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	H. E. Wynne and Z. Z. Wint, “Content Based Fake News Detection Using N-Gram Models,” in Information Integration and Web-based Applications &amp; Services, 2019, pp. 669–673, doi: https://doi.org/10.1145/3366030.3366116.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	H. Ahmed, I. Traore, and S. Saad, “Detection of Online Fake News Using N-Gram Analysis and Machine Learning Techniques,” in Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017, pp. 127–138, doi: https://doi.org/10.1007/978-3-319-69155-8_9.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	H. Ahmed, I. Traore, and S. Saad, “Detecting opinion spams and fake news using text classification,” Secur. Priv., vol. 1, p. e9, 2018, doi: https://doi.org/10.1002/spy2.9.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Huang, “Detecting Fake News With Machine Learning,” J. Phys. Conf. Ser., vol. 1693, p. 012158, 2020, doi: https://doi.org/10.1088/1742-6596/1693/1/012158.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	B. Al Asaad and M. Erascu, “A Tool for Fake News Detection,” in 2018 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2018, pp. 379–386, doi: https://doi.org/10.1109/SYNASC.2018.00064.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. J. Awan et al., “Fake News Data Exploration and Analytics,” Electronics, vol. 10, p. 2326, 2021, doi: https://doi.org/10.3390/electronics10192326.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	S. Gupta and P. Meel, “Fake News Detection Using Passive-Aggressive Classifier,” in Inventive Communication and Computational Technologies, 2020, pp. 155–164, doi: https://doi.org/10.1007/978-981-15-7345-3_13.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	R. R. Mandical, N. Mamatha, N. Shivakumar, R. Monica, and A. N. Krishna, “Identification of Fake News Using Machine Learning,” in 2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), 2020, pp. 1–6, doi: https://doi.org/10.1109/CONECCT50063.2020.9198610.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	A. Chugh, Y. Arora, J. Singh, Shobhit, and Ronak, “Media Manipulation Detection System Using Passive Aggressive,” Int. J. Innov. Res. Comput. Sci. Technol., vol. 9, no. 3, pp. 48–52, 2021, doi: https://doi.org/10.21276/ijircst.2021.9.3.8.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	B. Zaman, A. Justitia, K. N. Sani, and E. Purwanti, “An Indonesian Hoax News Detection System Using Reader Feedback and Naïve Bayes Algorithm,” Cybern. Inf. Technol., vol. 20, no. 1, pp. 82–94, 2020, doi: https://doi.org/10.2478/cait-2020-0006.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	I. Y. R. Pratiwi, R. A. Asmara, and F. Rahutomo, “Study of hoax news detection using naïve bayes classifier in Indonesian language,” in 2017 11th International Conference on Information Communication Technology and System (ICTS), 2017, pp. 73–78, doi: https://doi.org/10.1109/ICTS.2017.8265649.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Computational Model for Image Processing in the Minds of People with Visual Agnosia using Fuzzy Cognitive Map</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Elham</given_name><surname>Askari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sara</given_name><surname>Motamed</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>10</day><year>2023</year></publication_date><pages><first_page>102</first_page><last_page>109</last_page></pages><doi_data><doi>10.52547/jist.34031.11.42.102</doi><resource>http://jist.ir/en/Article/34031</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/34031</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/34031</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/34031</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/34031</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/34031</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/34031</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/34031</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] M.J. Yang, T.J. Nail, J. Winer, “Left Parietal Tumors Presenting with Smartphone Icon Visual Agnosia: Two Cases of a Modern Presentation of Gerstmann Syndrome”, World Neurosurgery, Vol.142, 2020, pp. 233-238.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] N. Seijdel, H.S. Scholte, E.H.F.de. Haan, “Visual features drive the category-specific impairments on categorization tasks in a patient with object agnosia”, Neuropsychologia, Vol.161, 2021.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] MJ. Farah," Visual agnosia: Disorders of object recognition and what they tell us about normal vision", MIT Press, American Psychological Association, 1990, pp: 322-329.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] P.S. Vecera, S.K. Gilds, S, "What processing is impaired in appreceptive agnosia? Evidence from 	normal subjects", Journal of Cognitive Neuroscience, Vol. 10. NO. 5, 1998, pp.568–580.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] M. Goodale, AD. Milner AD, "Separate visual pathways for perception and action",Trends Neurosci, Vol. 15. No. 1, 1992, pp.5-20.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] E. Golderg,"Associative Agnosias and the functions of the left hemisphere",Vol. 12, 1990, pp: 467-484.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] R. Cecere, N. Dundon, C. Bertini,"When apperceptive agnosia is explained by a deficit of primary visual processing, Elsevier Ltd., 2014, pp:12-27.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] L. Iterson, L. T.L.Sie, P.B. Augustijn, A.C.S. Rooze, F.E. Jansen, “Acquired visual agnosia as an uncommon presentation of epileptic encephalopathy in a 6-year-old boy with CSWS”, Epilepsy &amp; Behavior Reports, 2021, Vol.16.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] K. Erikssona, A. Inenb, K. Hirvonenc, P. Nieminena, M. Koivikko,"Visual agnosia in a child with non-lesional occipito-temporal CSWS", Brain and Development, Vol.25, No.4, 2003, pp.262–267.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] E. Askari, S.K. Setarehdan, A. Sheikhani, M.R. Mohamadi, M. Teshnelab, "Modeling the connections of brain regions in children with autism using cellular neural networks and electroencephalography analysis", Artificial Intelligence in Medicine, Vol. 89, pp.40-50.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] R. Ptak, F. Lazeyras, “Functional connectivity and the failure to retrieve meaning from shape in visual object agnosia”, Brain and Cognition, Vol.131, 2019, pp.94-101.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] X. Duanmu, "Image Retrieval Using Color Moment Invariant", in Seventh International Conference on Information Technology,2010, pp: 200-203.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] F. yaghouti, S. motamed. “Recognition of Facial Expression of Emotions Based on Brain Emotional Learning (BEL) Model”, Advances in Cognitive Science, Vol. 20, No. 4, 2019, pp.46-61.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] J. Morén, “Emotion and learning- a computational model of the Amygdala”, Ph.D. thesis, Lund, Sweden: Lund University, 2002.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] E. Lotfi, “Mathematical modeling of emotional brain for classification problems, Proceeding of IAM”, Vol. 2, No. 1, 2013, pp.60-71. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] S.M. Khaligh Razavi, N. Kriegeskorte, “Deep supervised, but not unsupervised, models may explain IT cortical representation”, PLoS computational biology, Vol. 10. No. 11, 2014.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] R.M. Cichy, A. Khosla, D. Pantazis, A. Torralba, A. Oliva, “Comparison of deep neural networks to spatio-temporal cortical dynamics of human visual object recognition reveals hierarchical correspondence”, Scientific Reports, Vol. 6, No. 27755, 2016.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] U. Güçlü,, M.A.J. van Gerven, “Deep Neural Networks Reveal a Gradient in the Complexityof Neural Representations across the Ventral Stream”, The Journal of Neuroscience, Vol. 35, No. 27, 2015, pp. 10005-10014. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] N. Seijdel, H.S. Scholte, E.H.F. de Haan. “Visual features drive the category-specific impairments on categorization tasks in a patient with object agnosia”, Neuropsychologia, Vol. 161, 2021.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] H. Karnath, J. Rüter, A. Mandler, M. Himmelbach, "The anatomy of object recognition—Visual form agnosia caused by medial occipitotemporal stroke", The Journal of Neuroscience", Vol. 29, No. 18, 2009, pp: 5854–5862.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] B. Kolb, I. O. Whishaw, "Fundamentals of Human Neuropsychology 6th ed", New York, NY., Worth Publishers, ISBN 978-0-7167-9586-5, 2009,pp:325-331.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] H. Lissauer,"A case of visual agnosia with a contribution to theory", Cogn Neuropsychol, Vol.5, 1988, pp.153–192.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] B. LFinlay, “Focusing the eyes and recognizing objects: evo-devo and the sensitive period“, Current Opinion in Behavioral Sciences,Vol. 36, 2020, pp.36-41.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] H. Sufikarimi, K. Mohammadi, “Role of the secondary visual cortex in HMAX model for object recognition”, Cognitive System Research, Vol. 64, 2020, pp.15-28.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] M. Mishkin, L. G. Ungerleider, K. A. Macko, “Object vision and spatial vision: Two cortical pathways”, Trends in Neurosciences, Vol. 6, 1983, pp.414-417.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] P. Lazzaro, D. Murra, B. Schwortz, “Pattern recognition after image processing of low-contrast images, the case of the Shroud of Turin”, Pattern Recognition, Vol. 46, No. 7, 2013, pp.1964-1970.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] S. Etemad, M. Amirmazlaghani, “Color texture image retrieval based on Copula multivariate modeling in the Shearlet domain”, Engineering Applications of Artificial Intelligence, Vol. 102, 2021.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] C. Singh, E. Walia, K. PreetKaur, “Color texture description with novel local binary patterns for effective image retrieval”, Pattern Recognition, Vol.76, 2018, pp.50-68.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] J.K. Kamarainen, V. Kyrki, H. Kalviainen, “Invariance properties of gabor filter-based features-overview and applications”, IEEE Transactions on Image Processing, Vol. 15, 2006,  pp.1088-1099.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] EP. Georgiou, A. Kannappan, "Fuzzy cognitive map ensemble learning paradigm to solve classification problems: Application to autism identification", Applied Soft Computing, Vol. 12, 2012, pp:3798-3809.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Analysis of Covid-19 Pandemic Outbreak on Economy using Neural Network and Random Forest</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Md. Nahid </given_name><surname>Hasan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Tanvir </given_name><surname>Ahmed</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Md. </given_name><surname>Ashik</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Md. Jahid </given_name><surname>Hasan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Tahaziba </given_name><surname>Azmin</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Jia</given_name><surname>Uddin</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>10</day><year>2023</year></publication_date><pages><first_page>163</first_page><last_page>175</last_page></pages><doi_data><doi>10.52547/jist.34246.11.42.163</doi><resource>http://jist.ir/en/Article/34246</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/34246</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/34246</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/34246</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/34246</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/34246</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/34246</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/34246</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	M. K. Goyal and A. K. Gupta, “Integrated risk of pandemic: Covid-19 impacts, resilience and recommendations,” Berlin: Springer, 2020.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] D. Hanna and Y. Huang, “The impact of sars on asian economies,” Asian Economic Papers, vol. 3, no. 1, 2004, pp. 102–112.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] W.Y. Lin, Y.H. Hu, and C.F. Tsai, “Machine learning in financial crisis prediction: a survey,” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 42, no. 4, 2011, pp. 421– 436.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] M. R. Keogh-Brown and R. D. Smith, “The economic impact of sars: how does the reality match the predictions?,” Health policy, vol. 88, no. 1, 2008, pp. 110–120.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] R. D. Smith, M. R. Keogh-Brown, and T. Barnett, “Estimating the economic impact of pandemic influenza: an application of the computable general equilibrium model to the uk,” Social science and medicine, vol. 73, no. 2, 2011, pp. 235–244.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] M. Fern´andez-Delgado, E. Cernadas, S. Barro, and D. Amorim, “Do we need hundreds of classifiers to solve real world classification problems?,” The journal of machine learning research, vol. 15, no. 1, 2014, pp. 3133–3181.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] S. Balcaen and H. Ooghe, “35 years of studies on business failure: an overview of the classic statistical methodologies and their related problems,” The British Accounting Review, vol. 38, no. 1, 2006, pp. 63–93.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] P. R. Kumar and V. Ravi, “Bankruptcy prediction in banks and firms via statistical and intelligent techniques–a review,” European journal of operational research, vol. 180, no. 1, 2007, pp. 1–28.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] S. J. Fong, G. Li, N. Dey, R. G. Crespo, and E. Herrera-Viedma, “Composite monte carlo decision making under high uncertainty of novel coronavirus epidemic using hybridized deep learning and fuzzy rule induction,” Applied Soft Computing, vol. 93, 2020, pp. 106282.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] K. Bluwstein, M. Buckmann, A. Joseph, M. Kang, S. Kapadia, and O. Simsek, “Credit growth, the yield curve and financial crisis prediction: evidence from a machine learning approach,” 2020.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] R. Nyman, and P. Ormerod, “Predicting economic recessions using machine learning algorithms,” arXiv preprint arXiv:1701.01428, 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] L. Breiman, “Random forests,” Machine learning, vol. 45, no. 1, 2001, pp. 5–32.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] U. Gr¨omping, “Variable importance assessment in regression: linear regression versus random forest,” The American Statistician, vol. 63, no. 4, 2009, pp. 308–319.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] Z. Car, S. B. Šegota, N. Anđelić, I. Lorencin, and V.Mrzljak, "Modeling the spread of COVID-19 infection using a multilayer perceptron", Computational and mathematical methods in medicine, Hindawi, vol. 2020, 2020.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] J. A. Ohlson, “Financial ratios and the probabilistic prediction of bankruptcy”, Journal of accounting research, vol. 18, no. 1, 1980, pp. 109–131.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] R. C. West, “A factor-analytic approach to bank condition”, Journal of Banking and Finance, vol. 9, no. 2, 1985, pp. 253–266.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] A. F. Atiya, “Bankruptcy prediction for credit risk using neural networks: A survey and new results,” IEEE Transactions on neural networks, vol. 12, no. 4, 2001, pp. 929–935.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] J. H. Min and Y.-C. Lee, “Bankruptcy prediction using support vector machine with optimal choice of kernel function parameters,” Expert systems with applications, vol. 28, no. 4, 2005, pp. 603–614.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] K.-S. Shin, T. S. Lee, and H.-j. Kim, “An application of support vector machines in bankruptcy prediction model,” Expert systems with applications, vol. 28, no. 1, 2005, pp. 127–135.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] S. Sarkar, and R. S. Sriram, “Bayesian models for early warning of bank failures”, Management Science, vol. 47, no. 11, 2001, pp. 1457–1475.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] E. Fedorova, E. Gilenko, and S. Dovzhenko, “Bankruptcy prediction for russian companies: Application of combined classifiers”, Expert Systems with Applications, vol. 40, no. 18, 2013, pp. 7285–7293.
[22] J. Abell´an and C. J. Mantas, “Improving experimental studies about ensembles of classifiers for bankruptcy prediction and credit scoring,” Expert Systems with Applications, vol. 41, no. 8, 2014, pp. 3825–3830.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23] R. Chetty, J. N. Friedman, N. Hendren, M. Stepner, and T. O. I. Team, “The economic impacts of covid-19: Evidence from a new public database built using private sector data,” National Bureau of Economic Research, Working Paper 27431, June 2020.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24] R. M. Simon, J. Subramanian, M.-C. Li, and S. Menezes, “Using crossvalidation to evaluate predictive accuracy of survival risk classifiers based on high-dimensional data,” Briefings in bioinformatics, vol. 12, no. 3, 2011, pp. 203–214.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25] Haykin S., “Neural networks and learning machines,” 3/E: Pearson Education India, 2010.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26] I. Syarif, A. Prugel-Bennett, and G. Wills, “Svm parameter optimization using grid search and genetic algorithm to improve classification performance,” Telkomnika, vol. 14, no. 4, 2016, pp. 1502.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27] L. Fraiwan, K. Lweesy, N. Khasawneh, H. Wenz, and H. Dickhaus, “Automated sleep stage identification system based on time–frequency analysis of a single EEG channel and random forest classifier,” Computer methods and programs in biomedicine, vol. 108, no. 1, 2012, pp. 10-19.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28] V. Y. Kulkarni and P. K. Sinha, “Pruning of random forest classifiers: A survey and future directions,” in 2012 International Conference on Data Science and Engineering, IEEE, 2012, pp. 64–68.
[29] Y. E. Cakra and B. D. Trisedya, “Stock price prediction using linear regression based on sentiment analysis,” in 2015 international conference on advanced computer science and information systems, IEEE, 2015, pp. 147–154.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[30] B. Wang, L. Gao, and Z. Juan, “Travel mode detection using gps data and socioeconomic attributes based on a random forest classifier,” IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 5, 2017, pp. 1547–1558.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[31] F. A. Gers, J. Schmidhuber, and F. Cummins, “Neural Nets WIRN Vietri-99,” Continual prediction using LSTM with forget gates: Springer, 1999. </unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[32] K. Suri and R. Gupta, “Transfer learning for semg-based hand gesture classification using deep learning in a master-slave architecture,” in 3rd International Conference on Contemporary Computing and Informatics (IC3I), IEEE, 2018, pp. 178–183.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[33] S. Polyzos, A. Samitas, and A. E. Spyridou, “Tourism demand and the covid-19 pandemic: An lstm approach,” Tourism Recreation Research, vol. 46, no. 2, 2021, pp. 175–187.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[34] L. Breiman, “Bagging predictors,” Machine learning, vol. 24, no. 2, 1996, pp. 123–140.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[35] J. Kevric and A. Subasi, “Comparison of signal decomposition methods in classification of EEG signals for motor-imagery BCI system,” Biomedical Signal Processing and Control, vol. 31, 2017, pp. 398–406.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[36] Md. Monirul Islam, Mohammod Abul Kashem, Jia Uddin, “Fish Survival Prediction in an Aquatic Environment Using Random Forest Model,” IAES International Journal of Artificial Intelligence (IJ-AI), Indonesia, 2021, vol. 10, no. 3, pp. 614-622.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[37] J. Ferdoush, B. N. Mahmud, A. Chakrabarty, J. Uddin, “A Short-Term Hybrid Forecasting Model for Time Series Electrical-Load Data using Random Forest and Bidirectional Long Short-Term Memory” International Journal of Electrical and Computer Engineering, Indonesia, 2020, vol. 11, no. 1, pp. 763-771.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[38] R. Islam, J. Uddin, J.M. Kim, “An Acoustic Emission Sensor based Fault Diagnosis of Induction Motors using Gabor filter and Multiclass SVM”, Journal of Ad-hoc and Sensors Wireless Networks, Old city publisher, 2016, vol. 34, no. 1, pp. 273-287.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Novel Elite-Oriented Meta-Heuristic Algorithm: Qashqai Optimization Algorithm (QOA)</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mehdi</given_name><surname>Khadem</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Abbas</given_name><surname>Toloie Eshlaghy</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Kiamars</given_name><surname>Fathi Hafshejani</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>10</day><year>2023</year></publication_date><pages><first_page>149</first_page><last_page>162</last_page></pages><doi_data><doi>10.52547/jist.34612.11.42.149</doi><resource>http://jist.ir/en/Article/34612</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/34612</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/34612</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/34612</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/34612</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/34612</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/34612</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/34612</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S.-C. Chu, P.-W. Tsai, and J.-S. Pan, "Cat swarm optimization," in Pacific Rim international conference on artificial intelligence, 2006, pp. 854-858: Springer.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. van Leeuwen and J. Leeuwen, Algorithms and complexity. Elsevier, 1990.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	F. W. Glover and G. A. Kochenberger, Handbook of metaheuristics. Springer Science &amp; Business Media, 2006.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	C. Blum, A. Roli, and M. Sampels, Hybrid metaheuristics: an emerging approach to optimization. Springer, 2008.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	X.-S. Yang, Engineering optimization: an introduction with metaheuristic applications. John Wiley &amp; Sons, 2010.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	G. Dhiman and V. Kumar, "Spotted hyena optimizer: a novel bio-inspired based metaheuristic technique for engineering applications," Advances in Engineering Software, vol. 114, pp. 48-70, 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Dalwani and A. Agarwal, "Review on classification of nature inspired approach," International Journal of Computer &amp; Mathematical Sciences, IJCMS, ISSN 2347, vol. 8527, 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Memari, R. Ahmad, and A. R. A. Rahim, "Journal of Soft Computing and Decision Support Systems," Journal of Soft Computing and Decision, vol. 4, no. 6, 2017.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Birattari, L. Paquete, T. Stützle, and K. Varrentrapp, "Classification of metaheuristics and design of experiments for the analysis of components," Teknik Rapor, AIDA-01-05, 2001.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Askarzadeh, "Bird mating optimizer: an optimization algorithm inspired by bird mating strategies," Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 4, pp. 1213-1228, 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Mohr, "Quantum computing in complexity theory and theory of computation," Carbondale, IL, vol. 194, 2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	G. C. Armour and E. S. Buffa, "A heuristic algorithm and simulation approach to relative location of facilities," Management science, vol. 9, no. 2, pp. 294-309, 1963.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	B. Alatas, "ACROA: artificial chemical reaction optimization algorithm for global optimization," Expert Systems with Applications, vol. 38, no. 10, pp. 13170-13180, 2011.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Khadem, A. Toloie Eshlaghy, and K. Fathi Hafshejani, "Nature-inspired metaheuristic algorithms: literature review and presenting a novel classification," Journal of Applied Research on Industrial Engineering, 2021.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] M. E. Mohammad Pour Zarandi, Nonlinear optimization. Tehran University. (In Persian). https://www.adinehbook.com/gp/product/9640364754, 2013.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] “Virtual Library of Simulation Experiments: Test Functions and Datasets Optimization Test Problems.” [Online]. Available: https://www.sfu.ca/~ssurjano/optimization.html.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. M. Fathollahi-Fard, M. Hajiaghaei-Keshteli, and R. Tavakkoli-Moghaddam, "Red deer algorithm (RDA): a new nature-inspired meta-heuristic," Soft Computing, vol. 24, no. 19, pp. 14637-14665, 2020.
[18]	A. H. Kashan, R. Tavakkoli-Moghaddam, and M. Gen, "Find-Fix-Finish-Exploit-Analyze (F3EA) meta-heuristic algorithm: An effective algorithm with new evolutionary operators for global optimization," Computers &amp; Industrial Engineering, vol. 128, pp. 192-218, 2019.
[19]	A. Cheraghalipour, M. Hajiaghaei-Keshteli, and M. M. Paydar, "Tree Growth Algorithm (TGA): A novel approach for solving optimization problems," Engineering Applications of Artificial Intelligence, vol. 72, pp. 393-414, 2018.
[20]	S. Mirjalili and A. Lewis, "The whale optimization algorithm," Advances in engineering software, vol. 95, pp. 51-67, 2016.
[21]	S. Mirjalili, "Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems," Neural computing and applications, vol. 27, no. 4, pp. 1053-1073, 2016.
[22]	J. B. Odili, M. N. M. Kahar, and S. Anwar, "African buffalo optimization: a swarm-intelligence technique," Procedia Computer Science, vol. 76, pp. 443-448, 2015.
[23]	S. Mirjalili, "The ant lion optimizer," Advances in engineering software, vol. 83, pp. 80-98, 2015.
[24]	B. Javidy, A. Hatamlou, and S. Mirjalili, "Ions motion algorithm for solving optimization problems," Applied Soft Computing, vol. 32, pp. 72-79, 2015.
[25]	G.-G. Wang, X. Zhao, and S. Deb, "A novel monarch butterfly optimization with greedy strategy and self-adaptive," in 2015 Second International Conference on Soft Computing and Machine Intelligence (ISCMI), 2015, pp. 45-50: IEEE.
[26]	M. T. Adham and P. J. Bentley, "An artificial ecosystem algorithm applied to static and dynamic travelling salesman problems," in 2014 IEEE International Conference on Evolvable Systems, 2014, pp. 149-156: IEEE.
[27]	S. Mirjalili, S. M. Mirjalili, and A. Lewis, "Grey wolf optimizer," Advances in engineering software, vol. 69, pp. 46-61, 2014.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[28]	M. Hajiaghaei-Keshteli and M. Aminnayeri, "Solving the integrated scheduling of production and rail transportation problem by Keshtel algorithm," Applied Soft Computing, vol. 25, pp. 184-203, 2014.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[29]	A. Hatamlou, "Black hole: A new heuristic optimization approach for data clustering," Information sciences, vol. 222, pp. 175-184, 2013.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[30]	E. Cuevas, D. Oliva, D. Zaldivar, M. Pérez-Cisneros, and H. Sossa, "Circle detection using electro-magnetism optimization," Information Sciences, vol. 182, no. 1, pp. 40-55, 2012.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[31]	X.-S. Yang, "Flower pollination algorithm for global optimization," in International conference on unconventional computing and natural computation, 2012, pp. 240-249: Springer.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[32]	A. H. Gandomi and A. H. Alavi, "Krill herd: a new bio-inspired optimization algorithm," Communications in nonlinear science and numerical simulation, vol. 17, no. 12, pp. 4831-4845, 2012.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[33]	X.-S. Yang, "A new metaheuristic bat-inspired algorithm," in Nature inspired cooperative strategies for optimization (NICSO 2010): Springer, 2010, pp. 65-74.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[34]	X.-S. Yang and S. Deb, "Cuckoo search via Lévy flights," in 2009 World congress on nature &amp; biologically inspired computing (NaBIC), 2009, pp. 210-214: Ieee.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[35]	X.-S. Yang and S. Deb, "Eagle strategy using Lévy walk and firefly algorithms for stochastic optimization," in Nature inspired cooperative strategies for optimization (NICSO 2010): Springer, 2010, pp. 101-111.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[36]	E. Atashpaz-Gargari and C. Lucas, "Imperialist competitive algorithm: an algorithm for optimization inspired by imperialistic competition," in 2007 IEEE congress on evolutionary computation, 2007, pp. 4661-4667: Ieee.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[37]	B. Webster and P. J. Bernhard, "A local search optimization algorithm based on natural principles of gravitation," 2003.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[38]	M. M. Eusuff and K. E. Lansey, "Water distribution network design using the shuffled frog leaping algorithm," in Journal of Water Resources planning and management, , vol. 129, pp. 210-225, 2003.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[39]	H. A. Abbass, "MBO: Marriage in honey bees optimization-A haplometrosis polygynous swarming approach," in Proceedings of the 2001 congress on evolutionary computation (IEEE Cat. No. 01TH8546), 2001, vol. 1, pp. 207-214: IEEE.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[40]	R. Storn and K. Price, "Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces," Journal of global optimization, vol. 11, no. 4, pp. 341-359, 1997.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[41]	R. Eberhart and J. Kennedy, "A new optimizer using particle swarm theory," in MHS'95. Proceedings of the sixth international symposium on micro machine and human science, 1995, pp. 39-43: Ieee.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[42]	R. G. Reynolds, "An introduction to cultural algorithms," in Proceedings of the third annual conference on evolutionary programming, 1994, vol. 24, pp. 131-139: World Scientific.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[43]	D. E. Goldberg, "Genetic algorithms in search, optimization, and machine learning. Addison," Reading, 1989.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[44]	F. Glover, "Future paths for integer programming and links to artificial intelligence," Computers &amp; operations research, vol. 13, no. 5, pp. 533-549, 1986.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
 [45]	M. A. Hematalikeikha and M. Alinaghizadeh, "Educational and practical approach to the study of native architecture-case study: Study of Qashqai tribe housing as one example of a sustainable native culture of Iran," Procedia-Social and Behavioral Sciences, vol. 51, pp. 373-379, 2012.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[46]	M. GHARAKHLOU, "A study of cultural changes among the Qashqai tribes in Iran," 2006.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[47]	M. Yazdanpanah and M. Rostami, "Who Are the Qashqai People?."</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[48]	P. Oberling, "The Qashqā’i Nomads of Fārs," in The Qashqā’i Nomads of Fārs: De Gruyter Mouton, 2017.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[49]	S. Baluja and R. Caruana, "Removing the genetics from the standard genetic algorithm," in Machine Learning Proceedings 1995: Elsevier, 1995, pp. 38-46.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[50]	G. L. Cravo and A. R. S. Amaral, "A GRASP algorithm for solving large-scale single row facility layout problems," Computers &amp; Operations Research, vol. 106, pp. 49-61, 2019.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[51]	S. H. A. Rahmati, V. Hajipour, and S. T. A. Niaki, "A soft-computing Pareto-based meta-heuristic algorithm for a multi-objective multi-server facility location problem," Applied soft computing, vol. 13, no. 4, pp. 1728-1740, 2013.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[52]	A. Drira, H. Pierreval, and S. Hajri-Gabouj, "Facility layout problems: A literature analysis," IFAC Proceedings Volumes, vol. 39, no. 3, pp. 389-400, 2006.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[53]	H. M. Dbouk, K. Ghorayeb, H. Kassem, H. Hayek, R. Torrens, and O. Wells, "Facility placement layout optimization," Journal of Petroleum Science and Engineering, vol. 207, p. 109079, 2021.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[54]	X. Zhun, X. Liyun, and L. Xufeng, "An Improved Pigeon-inspired Optimization Algorithm for Solving Dynamic Facility Layout Problem with Uncertain Demand," Procedia CIRP, vol. 104, pp. 1203-1208, 2021.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[55] J. Torres, "QASHQAI PEOPLE: MEETING AUTHENTIC NOMADS OF IRAN", https://againstthecompass.com/en/qashqai-people-iranian-nomads (Last updated on Aug. 25, 2022).</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[56] “Iran Nomads Tour Living with the Qashqai Tribes," https://surfiran.com/iran-tour/iran-nomad-living-qashqai-tribes. (accessed Nov. 7, 2020).</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[57] “About Qashqai Nomads", https://surfiran.com/iran-tour/iran-nomad-living-qashqai-tribes. (accessed Oct. 2, 2021).</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>