﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051922</doi_batch_id><timestamp>20260519222841</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>8</month><day>20</day><year>2023</year></publication_date><journal_volume><volume>11</volume></journal_volume><issue>43</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A survey on NFC Payment: Applications, Research Challenges, and Future Directions</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mehdi</given_name><surname>Sattarivand</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Shahram</given_name><surname>Babaie</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Amir Masoud </given_name><surname>Rahmani</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>20</day><year>2023</year></publication_date><pages><first_page>232</first_page><last_page>240</last_page></pages><doi_data><doi>10.61186/jist.15994.11.43.232</doi><resource>http://jist.ir/en/Article/15994</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/15994</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/15994</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/15994</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/15994</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/15994</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/15994</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/15994</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	P. Chandrasekar and A. Dutta, “Recent Developments in Near Field Communication: A Study,” Wirel. Pers. Commun., pp. 1–20, Sep. 2020.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. Chabbi, R. Boudour, F. Semchedine, and D. Chefrour, “Dynamic array PIN:A novel approach to secure NFC electronic payment between ATM and smartphone,” Inf. Secur. J. A Glob. Perspect., vol. 29, no. 6, pp. 327–340, Nov. 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	P. Escobedo, M. Bhattacharjee, F. Nikbakhtnasrabadi, and R. Dahiya, “Flexible Strain and Temperature Sensing NFC Tag for Smart Food Packaging Applications,” IEEE Sens. J., vol. 21, no. 23, pp. 26406–26414, Dec. 2021.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	N. Song, Q. Wang, D. Jiao, H. Pan, L. Shi, and P. Ding, “Highly thermally conductive SiO2-coated NFC/BNNS hybrid films with water resistance,” Compos. Part A Appl. Sci. Manuf., vol. 143, p. 106261, Apr. 2021.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Tso, “Untraceable and Anonymous Mobile Payment Scheme Based on Near Field Communication,” Symmetry (Basel)., vol. 10, no. 12, p. 685, Dec. 2018.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	H. Seddiqi and S. Babaie, “A New Protection-based Approach for Link Failure Management of Software-Defined Networks,” IEEE Trans. Netw. Sci. Eng., pp. 1–10, 2021.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Chung, “Short distance data transmission method using inaudible high-frequencies between smart devices,” Telecommun. Syst., vol. 70, no. 4, pp. 583–594, Apr. 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	F. Liébana-Cabanillas, S. Molinillo, and M. Ruiz-Montañez, “To use or not to use, that is the question: Analysis of the determining factors for using NFC mobile payment systems in public transportation,” Technol. Forecast. Soc. Change, vol. 139, pp. 266–276, Feb. 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	E. L. Wadii, J. Boutahar, and S. E. L. Ghazi, “NFC Technology for Contactless Payment Echosystems,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 5, pp. 391–397, 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	R. Lyu, W. Cheng, and W. Zhang, “Modeling and Performance Analysis of OAM-NFC Systems,” IEEE Trans. Commun., vol. 69, no. 12, pp. 7986–8001, Dec. 2021.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	V. Coskun, K. Ok, and B. Ozdenizci, Near field communication (NFC): from theory to practice. John Wiley &amp; Sons, 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Besnoff, M. Abbasi, and D. S. Ricketts, “High data-rate communication in near-field RFID and wireless power using higher order modulation,” IEEE Trans. Microw. Theory Tech., vol. 64, no. 2, pp. 401–413, 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. de Reuver and J. Ondrus, “When Technological Superiority is not Enough: The Struggle to Impose the SIM Card as the NFC Secure Element for mobile payment platforms,” Telecomm. Policy, vol. 41, no. 4, pp. 253–262, 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. D. Steinberg, C. Slottved Kimbriel, and L. S. d’Hont, “Autonomous near-field communication (NFC) sensors for long-term preventive care of fine art objects,” Sensors Actuators A Phys., vol. 285, pp. 456–467, Jan. 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	N. Druml et al., “Secured miniaturized system-in-package contactless and passive authentication devices featuring NFC,” Microprocess. Microsyst., vol. 53, pp. 120–129, 2017.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Ghosh, A. Majumder, J. Goswami, A. Kumar, S. P. Mohanty, and B. K. Bhattacharyya, “Swing-Pay: One Card Meets All User Payment and Identity Needs: A Digital Card Module using NFC and Biometric Authentication for Peer-to-Peer Payment,” IEEE Consum. Electron. Mag., vol. 6, no. 1, pp. 82–93, 2017.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	P. Teengam et al., “NFC-enabling smartphone-based portable amperometric immunosensor for hepatitis B virus detection,” Sensors Actuators B Chem., vol. 326, p. 128825, Jan. 2021.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Y. W. Juen and D. Balachandran, “Predicting the diffusion of NFC-enabled smartphone payment in Malaysia,” Int. J. Model. Oper. Manag., vol. 8, no. 3, p. 266, 2021.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. E. Varjovi and S. Babaie, “Green Internet of Things (GIoT): Vision, applications and research challenges,” Sustain. Comput. Informatics Syst., p. 100448, Sep. 2020.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Naraparaju, P. Jalapati, and K. Nara, “Smart Poster for Tourism Promotion Through NFC Technology,” Springer, Singapore, 2019, pp. 507–519.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	U. Demir Alan and D. Birant, “Server-Based Intelligent Public Transportation System with NFC,” IEEE Intell. Transp. Syst. Mag., vol. 10, no. 1, pp. 30–46, 2018.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	K. S. Staykova and J. Damsgaard, “The race to dominate the mobile payments platform: Entry and expansion strategies,” Electron. Commer. Res. Appl., vol. 14, no. 5, pp. 319–330, 2015.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Y. J. Ng, “Near field communication (NFC) mobile payment in Malaysia: a partial least square-structural equation modelling (PLS-SEM) approach,” Int. J. Model. Oper. Manag., vol. 7, no. 2, p. 134, 2019.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	D. Veloz-Cherrez and J. Suárez, “NFC-Based Payment System Using Smartphones for Public Transport Service,” Springer, Cham, 2019, pp. 34–44.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	I. Ramos-de-Luna, F. Montoro-Ríose, and F. Liébana-Cabanillas, “Determinants of the intention to use NFC technology as a payment system: an acceptance model approach,” Inf. Syst. E-bus. Manag., vol. 14, no. 2, pp. 293–314, 2016.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Cocosila and H. Trabelsi, “An integrated value-risk investigation of contactless mobile payments adoption,” Electron. Commer. Res. Appl., vol. 20, pp. 159–170, 2016.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	X. Pu, F. T. S. Chan, A. Y. L. Chong, and B. Niu, “The adoption of NFC-based mobile payment services: an empirical analysis of Apple Pay in China,” Int. J. Mob. Commun., vol. 18, no. 3, p. 343, 2020.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	D. A. Ortiz-Yepes, “A review of technical approaches to realizing near-field communication mobile payments,” IEEE Secur. Priv., vol. 14, no. 4, pp. 54–62, 2016.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	M. M. Gharamaleki and S. Babaie, “A New Distributed Fault Detection Method for Wireless Sensor Networks,” IEEE Syst. J., vol. 14, no. 4, pp. 4883–4890, 2020.#
[30]	F. S. M. Tafti, S. Mohammadi, and M. Babagoli, “A new NFC mobile payment protocol using improved GSM based authentication,” J. Inf. Secur. Appl., vol. 62, p. 102997, Nov. 2021.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	C. Peres, M. Emam, H. Jafarzadeh, M. Belcastro, and B. O’Flynn, “Development of a Low-Power Underwater NFC-Enabled Sensor Device for Seaweed Monitoring,” Sensors, vol. 21, no. 14, p. 4649, Jul. 2021.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	A. B. M. Alim Al Islam, T. Chakraborty, T. A. Khan, M. Zoraf, and C. S. Hyder, “Towards defending eavesdropping on NFC,” J. Netw. Comput. Appl., vol. 100, pp. 11–23, Dec. 2017.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	C. Thammarat and W. Kurutach, “A lightweight and secure NFC-base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification,” Int. J. Commun. Syst., vol. 32, no. 12, p. e3991, Aug. 2019.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Deep Transformer-based Representation for Text Chunking</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Parsa</given_name><surname>Kavehzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad Mahdi </given_name><surname>Abdollah Pour</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Saeedeh</given_name><surname>Momtazi</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>20</day><year>2023</year></publication_date><pages><first_page>176</first_page><last_page>184</last_page></pages><doi_data><doi>10.61186/jist.19894.11.43.176</doi><resource>http://jist.ir/en/Article/19894</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/19894</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/19894</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/19894</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/19894</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/19894</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/19894</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/19894</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] Alan Akbik, Duncan Blythe, and Roland Vollgraf. Contextual string embeddings for sequence labeling. In Proceedings of the 27th International Conference on Computational Linguistics, pages 1638–1649, 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
 [2] Adnan Akhundov, Dietrich Trautmann, and Georg Groh. Sequence labeling: A practical approach. arXiv preprint arXiv:1808.03926, 2018.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] Avi Chawla, Nidhi Mulay, Vikas Bishnoi, and Gaurav Dhama. Improving the performance of transformer context encoders for ner. In 2021 IEEE 24th International Conference on Information Fusion (FUSION), pages 1–8. IEEE, 2021.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] Kyunghyun Cho, Bart Van Merrienboer, Caglar Gulcehre, Dzmitry Bahdanau, Fethi Bougares, Holger Schwenk, and Yoshua Bengio. Learning phrase representations using rnn encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078, 2014.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] Kevin Clark, Minh-Thang Luong, Christopher D Manning, and Quoc V Le. Semi-supervised sequence modeling with cross-view training. arXiv preprint arXiv:1809.08370, 2018.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] Ronan Collobert, Jason Weston, L ́eon Bottou, Michael Karlen, Koray Kavukcuoglu, and Pavel Kuksa. Natural language processing (almost) from scratch. Journal of machine learning research, 12(ARTICLE):2493–2537, 2011.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] Alexis Conneau, Kartikay Khandelwal, Naman Goyal, Vishrav Chaudhary, Guillaume Wenzek, Francisco Guzman, Edouard Grave, Myle Ott, Luke Zettlemoyer, and Veselin Stoyanov. Unsupervised cross-lingual representation learning at scale. arXiv preprint arXiv:1911.02116, 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] Zihang Dai, Guokun Lai, Yiming Yang, and Quoc V Le. Funnel-transformer: Filtering out sequential redundancy for efficient language processing. arXiv preprint arXiv:2006.03236, 2020.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805, 2018.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Sean R Eddy. Hidden markov models. Current opinion in structural biology, 6(3):361–365, 1996.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] Alex Graves and Jurgen Schmidhuber. Framewise phoneme classification with bidirectional lstm and other neural network architectures. Neural networks, 18(5-6):602–610, 2005.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] Kazuma Hashimoto, Caiming Xiong, Yoshimasa Tsuruoka, and Richard Socher. A joint many-task model: Growing a neural network for multiple nlp tasks. arXiv preprint arXiv:1611.01587, 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Zhiyong He, Zanbo Wang, Wei Wei, Shanshan Feng, Xianling Mao, and Sheng Jiang. A survey on recent advances in sequence labeling from deep learning models. arXiv preprint arXiv:2011.06727, 2020.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] Sepp Hochreiter and Jurgen Schmidhuber. Long short-term memory. Neural computation, 9(8):1735–1780, 1997.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] Zhiheng Huang, Wei Xu, and Kai Yu. Bidirectional lstm-crf models for sequence tagging. arXiv preprint arXiv:1508.01991, 2015.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] John Lafferty, Andrew McCallum, and Fernando CN Pereira. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. 2001.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] Guillaume Lample and Alexis Conneau. Cross-lingual language model pretraining. arXiv preprint arXiv:1901.07291, 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] Mike Lewis, Yinhan Liu, Naman Goyal, Marjan Ghazvininejad, Abdelrahman Mohamed, Omer Levy, Ves Stoyanov, and Luke Zettlemoyer. Bart: Denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension. arXiv preprint arXiv:1910.13461, 2019.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] Bofang Li, Tao Liu, Zhe Zhao, and Xiaoyong Du. Attention-based recurrent neural network for sequence labeling. In Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data, pages 340–348. Springer, 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] Jerry Chun-Wei Lin, Yinan Shao, Youcef Djenouri, and Unil Yun. Asrnn: a recurrent neural network with an attention model for sequence labeling. Knowledge-Based Systems, 212:106548, 2021.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] Liyuan Liu, Jingbo Shang, Frank F Xu, Xiang Ren, Huan Gui, Jian Peng, and Jiawei Han. Empower sequence labeling with task-aware neural language model. arXiv preprint arXiv:1709.04109, 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692, 2019.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] Chunping Ma, Huafei Zheng, Pengjun Xie, Chen Li, Linlin Li, and Luo Si. Dm nlp at semeval-2018 task 8: neural sequence labeling with linguistic features. In Proceedings of The 12th International Workshop on Semantic Evaluation, pages 707–711, 2018.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems, pages 3111–3119, 2013.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] Matthew E Peters, Waleed Ammar, Chandra Bhagavatula, and Russell Power. Semi-supervised sequence tagging with bidirectional language models. arXiv preprint arXiv:1705.00108, 2017.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] Matthew E Peters, Mark Neumann, Mohit Iyyer, Matt Gardner, Christopher Clark, Kenton Lee, and Luke Zettlemoyer. Deep contextualized word representations. arXiv preprint arXiv:1802.05365, 2018.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] Alec Radford, Jeffrey Wu, Rewon Child, David Luan, Dario Amodei, and Ilya Sutskever. Language models are unsupervised multitask learners. OpenAI blog, 1(8):9, 2019.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] Lev Ratinov and Dan Roth. Design challenges and misconceptions in named entity recognition. In Proceedings of the Thirteenth Conference on Computational Natural Language Learning (CoNLL-2009), pages 147–155, 2009.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] Adwait Ratnaparkhi. A linear observed time statistical parser based on maximum entropy models. arXiv preprint cmp-lg/9706014, 1997.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] Marek Rei. Semi-supervised multitask learning for sequence labeling. arXiv preprint arXiv:1704.07156, 2017.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] David E Rumelhart, Geoffrey E Hinton, and Ronald J Williams. Learning representations by back-propagating errors. nature, 323(6088):533–536, 1986.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] Erik F Sang and Sabine Buchholz. Introduction to the conll-2000 shared task: Chunking. arXiv preprint cs/0009008, 2000.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] Mike Schuster and Kuldip K Paliwal. Bidirectional recurrent neural networks. IEEE transactions on Signal Processing , 45(11):2673–2681, 1997.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] Anders Søgaard and Yoav Goldberg. Deep multi-task learning with low level tasks supervised at lower layers. In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), pages 231–235, 2016.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] Trieu H Trinh and Quoc V Le. A simple method for commonsense reasoning. arXiv preprint arXiv:1806.02847, 2018.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] Henry Tsai, Jason Riesa, Melvin Johnson, Naveen Arivazhagan, Xin Li, and Amelia Archer. Small and practical bert models for sequence labeling. arXiv preprint arXiv:1909.00100, 2019.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. Attention is all you need. In Advances in neural information processing systems, pages 5998–6008, 2017.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38] Yaqing Wang, Subhabrata Mukherjee, Haoda Chu, Yuancheng Tu, Ming Wu, Jing Gao, and Ahmed Hassan Awadallah. Meta self-training for few-shot neural sequence labeling. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery &amp; Data Mining, pages 1737–1747, 2021.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39] Wei Wei, Zanbo Wang, Xianling Mao, Guangyou Zhou, Pan Zhou, and Sheng Jiang. Position-aware self-attention based neural sequence labeling. Pattern Recognition, 110:107636, 2021.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40] Yingwei Xin, Ethan Hart, Vibhuti Mahajan, and Jean-David Ruvini. Learning better internal structure of words for sequence labeling. arXiv preprint arXiv:1810.12443, 2018.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41] Feifei Zhai, Saloni Potdar, Bing Xiang, and Bowen Zhou. Neural models for sequence chunking. arXiv preprint arXiv:1701.04027, 2017.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42] Yukun Zhu, Ryan Kiros, Rich Zemel, Ruslan Salakhutdinov, Raquel Urtasun, Antonio Torralba, and Sanja Fidler. Aligning books and movies: Towards story-like visual explanations by watching movies and reading books. In Proceedings of the IEEE international conference on computer vision, pages 19–27, 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Deep Learning-based Educational User Profile and User Rating Recommendation System for E-Learning</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Pradnya Vaibhav </given_name><surname>Kulkarni</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sunil</given_name><surname>Rai</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Rajneeshkaur</given_name><surname>Sachdeo</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Rohini</given_name><surname>Kale</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>20</day><year>2023</year></publication_date><pages><first_page>185</first_page><last_page>195</last_page></pages><doi_data><doi>10.61186/jist.27448.11.43.185</doi><resource>http://jist.ir/en/Article/27448</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/27448</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/27448</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/27448</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/27448</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/27448</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/27448</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/27448</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] Muthuprasad, T., Aiswarya, S., Aditya, K. S., and Jha, G. K, “Students’ perception and preference for online education in India during the COVID-19 pandemic”, Social Sciences &amp; Humanities Open, 3(1), 100101,2021.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] Baccouche, M., Mamalet, F., Wolf, C., Garcia, C., and Baskurt, “Sequential deep learning for human action recognition”, in international workshop on human behavior understanding (pp. 29-39). Springer, Berlin, Heidelberg, A, 2011, November.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] Benhamdi, S., Babouri, A., and Chiky, R. “Personalized recommender system for an e-Learning environment”, Education and Information Technologies, 22(4), 1455-1477, 2017.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] Bonk, C. J., Zhu, M., Kim, M., Xu, S., Sabir, N., and Sari, A. R,” Pushing toward a more personalized MOOC: Exploring instructor selected activities, resources, and technologies for MOOC design and implementation”, International Review of Research in Open and Distributed Learning, 19(4), 2018.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] Kim, S. W., and Gil, J. M,” Research paper classification systems based on TF-IDF and LDA schemes”, Human-centric Computing and Information Sciences, 9(1), 1-21,2019.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] Dahdouh, K., Oughdir, L., Dakkak, A., and Ibriz, A,” Smart courses recommender system for an online learning platform”, IEEE 5th International Congress on Information Science and Technology (CiSt) (pp. 328-333),2018.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] Gulzar, Z., Leema, A. A.,and Deepak, G,” Pcrs: Personalized course recommender system based on hybrid approach”, Procedia Computer Science, 125, 518-524, (2018).</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] Oladipo, I. D., Awotunde, J. B., AbdulRaheem, M., Ige, O. O., Balogun, G. B., Tomori, A. R., and Taofeek-Ibrahim, F. A.),” An improved course recommendation system based on historical grade data using logistic regression”, In International Conference on Applied Informatics (pp. 207-221), Springer, Cham,2021, October.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] Avazpour, I., Pitakrat, T., Grunske, L., and Grundy, J, “Dimensions and metrics for evaluating recommendation systems”, In Recommendation systems in software engineering (pp. 245-273). Springer, Berlin, Heidelberg, 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Aboagye, E., Yawson, J. A., and Appiah, K,” NCOVID-19 and E-learning: The challenges of students in tertiary institutions”, Social Education Research, 1-8, 2021.
[11] Jain, G., Mahara, T., and Tripathi, K. N.,” A survey of similarity measures for collaborative filtering-based recommender system”,Soft computing: theories and applications, 343-352,2020.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12] Jommanop, T., and Mekruksavanich, S,” E-learning recommendation model based on multiple intelligence”, in 2019 14th International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP) (pp. 1-6). IEEE, (2019, October).</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13] Khusro, S., Ali, Z., and Ullah, I,” Recommender systems: issues, challenges, and research opportunities”, in Information Science and Applications (ICISA) 2016 (pp. 1179-1189). Springer, Singapore,2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14] Kulkarni, P. V., Rai, S., and Kale, R, “Recommender system in eLearning: a survey”, In Proceeding of International Conference on Computational Science and Applications (pp. 119-126). Springer, Singapore,2020.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15] Lai, C. H., Liu, D. R., and Lin, S. R, ” Document recommendation with implicit feedback based on matrix factorization and topic model”, in 2018 IEEE International Conference on Applied System Invention (ICASI) (pp. 62-65). (2018, April). </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16] Lin, C. Y., Wang, L. C., and Tsai, K. H,” Hybrid real-time matrix factorization for implicit feedback recommendation systems”, IEEE Access, 6, 21369-21380,2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17] Kulkarni, P. V., Phatak, R., Bhate, B., Deshpande, R., and Rai, S,” Recommendation System for Enhancing eLearning using Deep Learning”, in 2019 IEEE Pune Section International Conference (PuneCon) (pp. 1-4). IEEE, (2019, December).</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18] Nwankpa, C., Ijomah, W., Gachagan, A., and Marshall, S,” Activation functions: Comparison of trends in practice and research for deep learning”, arXiv preprint arXiv:1811.03378,2018.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19] Pannu, M., Anane, R., Odetayo, M., and James, A. “Explicit user profiles in web search personalization”, in Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design (CSCWD) (pp. 416-421). IEEE, June 2011.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20] Portugal, I., Alencar, P., and Cowan, D,” The use of machine learning algorithms in recommender systems: A systematic review”, Expert Systems with Applications, 97, 205-227,2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21] Jentzen, A., Kuckuck, B., Neufeld, A., and von Wurstemberger, P,” Strong error analysis for stochastic gradient descent optimization algorithms”, IMA Journal of Numerical Analysis, 41(1), 455-492,2021.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22] Ezz, M., Elshenawy, A,” Adaptive recommendation system using machine learning algorithms for predicting student’s best academic program”, Education Information Technologies 25, 2733–2746. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23] Obeidat, R., Duwairi, R., and Al-Aiad, A,” A collaborative recommender system”,2019.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24] Vercellis, C,” Business intelligence: data mining and optimization for decision making”, John Wiley &amp; Sons.2011.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25] Wu, G., Swaminathan, V., Mitra, S., and Kumar, R. (2017, December),” Digital content recommendation system using implicit feedback data”, in 2017 IEEE International Conference on Big Data (Big Data) (pp. 2766-2771). IEEE, December,2017. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26] Xiao, Y., Li, X., Wang, H., Xu, M., and Liu, Y, “3-HBP: A three-level hidden Bayesian link prediction model in social networks”, IEEE Transactions on Computational Social Systems, 5(2), 430-443, 2018.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27] Yuan, C., and Yang, H,” Research on K-value selection method of K-means clustering algorithm”, J, 2(2), 226-235,2019.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28] Zhang, S., Yao, L., Sun, A., and Tay, Y,” Deep learning-based recommender system: A survey and new perspectives”, ACM Computing Surveys (CSUR), 52(1), 1-38,2019.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29] Zhang, Z., &amp; Sabuncu, M. R, “Generalized cross entropy loss for training deep neural networks with noisy labels”, in 32nd Conference on Neural Information Processing Systems (NeurIPS), January 2018.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30] Xu, G., Jia, G., Shi, L., and Zhang, Z, “Personalized Course Recommendation System Fusing with Knowledge Graph and Collaborative Filtering”, Computational Intelligence and Neuroscience, 2021.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31] Praserttitipong, D., and Srisujjalertwaja, W, “Elective course recommendation model for higher education program”, Songklanakarin Journal of Science &amp; Technology, 40(6),2018.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Content-based Retrieval of Tiles and Ceramics Images based on Grouping of Images and Minimal Feature Extraction</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Simin</given_name><surname>RajaeeNejad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Farahnaz</given_name><surname>Mohanna</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>20</day><year>2023</year></publication_date><pages><first_page>241</first_page><last_page>250</last_page></pages><doi_data><doi>10.61186/jist.34084.11.43.241</doi><resource>http://jist.ir/en/Article/34084</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/34084</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/34084</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/34084</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/34084</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/34084</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/34084</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/34084</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	T. Mehyar, and J. O. Atoum, “An enhancement on content-based image retrieval using color and texture features”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 3, No. 4, 2012, pp. 488-496. </unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] C. M. Ibraheem and G. U. Reddy, “Content based image retrieval using HSV color, shape, and GLCM texture”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, No. 10, 2015, pp. 1-6.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] P. Sharma, and D. Dubey, “Color averaging technique using dominant color for content based image retrieval”, International Journal of Computer Science, Vol. 10, No. 3, 2013, pp. 603-607.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] Ahmed J. Afifi, and Wesam M. Ashour, “Content-based image retrieval using invariant color and texture features”, in International Conference on Digital Image Computing Techniques and Applications, 2012, pp. 1-6.      DOI:10.1109/DICTA.2012.6411665.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] T. Prathiba, N. M. Mary Sindhuja, and S. Nisharani, “Content based image retrieval based on spatial constraints using Lab view”, International Journal of Engineering Research and Technology, Vol. 2, No. 1, 2013, pp. 1-6.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] V. Khandave, and N. Mishra, “CBIR by integration of color and texture features”, International Journal of Recent Development in Engineering and Technology, Vol. 2, No. 1, 2014, PP. 1-6.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] R. K. Lingadalli and N. Ramesh, “Content based image retrieval using color, shape and texture”, International Advanced Research Journal in Science, Engineering and Technology, Vol. 2, No. 6, 2015, pp. 40-48.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] A. Huneiti, and M. Daoud, “Content-based image retrieval using SOM and DWT”, Journal of Soft Engineering and Applications, Vol. 8, 2015, pp. 51-61.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] S. Kaur, and N. Kaur, “Content based image retrieval using color histogram and Wavelet based color histogram algorithms”, International Journal of Engineering Research and General Science, Vol. 4, No. 3, 2016, pp. 530-535.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] R. Bulli Babu, V. Vanitha, and K. Sai Anish, “Content based image retrieval using color, texture, shape and active re-ranking method”, Indian Journal of Science and Technology, Vol. 9, No. 17, 2016, pp. 1-5.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] N. Jain, and S.S. Salankar, “Content based image retrieval using combined color and texture features”, IOSR Journal of Electrical and Electronics Engineering, Vol. 11, No. 6, 2016, pp. 53-58.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] H. H. Bu, N. C. Kim, C. J. Moon, and J. H. Kim, “Content-based image retrieval using multi-resolution multi-direction filtering-based CLBP texture features and color autocorrelogram features”, Journal of Information Processing Systems, Vol.16, No. 4, 2020, pp. 991-1000.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] M. B. Suresh, and B. Mohankumar Naik, “Content based image retrieval using texture structure histogram and texture features”, International Journal of Computational Intelligence Research, Vol. 13, No. 9, 2017, pp. 2237-2245.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] M. B. Suresh, and B. Mohankumar Naik, “Content based image retrieval using color and texture content”, International Journal of Computer Trends and Technology, Vol. 48, No. 2, 2017, pp. 78-84.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] D. Sarala, T. Kanikdaley, S. Jogi, and R. K. Chaurasiya, “Content-based image retrieval using hierarchical color and texture similarity calculation”, International Journal of Advanced Trends in Computer Science and Engineering, Vol. 7, No. 2, 2018, pp. 11-16.</unstructured_citation></citation><citation key="ref16"><unstructured_citation> 
[16] J. Q. Alnihoud, “Image retrieval system based on color global and local features combined with GLCM for texture features”, International Journal of Advanced Computer Science and Applications, Vol. 9, No. 9, 2018, pp. 164-171.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] J. Pradhan, S. Kumar, A. Kumarpal, and H. Banka, “A hierarchical CBIR framework using adaptive tetrolet transform and novel histograms from color and shape features”, Digital Signal Processing, Vol. 82, 2018, pp. 258-281.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] S. Unar, X. Wang, C. Wang, and Y. Wang, “A decisive content based image retrieval approach for feature fusion in visual and textual images”, Journal of Knowledge-Based Systems, Vol. 179, 2019, pp. 8-20.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] K. T. Ahmed, S. Ummesafi, and M. Iqbal, “Content based image retrieval using image features information fusion”, Journal of Information Fusion, Vol. 51, 2019, pp.76-99.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] N. Hor and S. Fekri-Ershad, “Image retrieval approach based on local texture information derived from predefined patters and spatial domain information”, International Journal of Computer Science Engineering, Vol. 8, No. 6, 2019, pp.246-254.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] W. Xiong, Z. Xiong, Y. Zhang, Y. Cui, and X. Gu, “A deep cross-modality Hashing network for SAR and optical remote sensing images retrieval”, IEEE Journal of Selected Topics in Applied Earth Observation and Remote Sensing, Vol. 13, 2020, pp. 5284-5296.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] H. Zhang, M. Jiang, and Q. Kou, “Color image retrieval algorithm fusing color and principal curvatures information”, IEEE Access, Vol. 8, 2020, pp. 184945-184954.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] D. Niu, X. Zhao, X. Lin, and C. Zhang, “A novel image retrieval method based on multi-features fusion”, Signal Processing: Image Communication, Vol. 87, 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
 [24] M. Garg and G. Dhiman, “A novel content-based image retrieval approach for classification using GLCM features and texture fused LBP variations”, Neural Computing and Applications, Vol. 33, 2021, pp. 1311-1328.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] N. Varish, A. Kumar Pal, R. Hassan, M. K. Hasan, A. Khan, N. Parveen, D. Banerjee, V. Pellakuri, N. Ul Haq, and I. Memon, “Image retrieval scheme using quantized bins of color image components and adaptive Tetrolet transform”, IEEE Access, Vol. 8, 2020, pp. 117639-117665.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] Hussain Dawood, M. H. Alkinani, A. Raza, Hassan Dawood, R. Mehboob, and S. Shabbir, “Correlated microstructure descriptor for image retrieval”, IEEE Access, Vol. 7, 2019, pp. 55206-55228.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] Ali Ahmed, “Implementing relevance feedback for content-based medical image retrieval”, IEEE Access, Vol. 8, 202, pp. 79969-79976.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] L. K. Pavithra, and T. Sree Sharmila, “An improved seed point selection based unsupervised color clustering for content-based image retrieval application”, Computer Journal, 2020. DOI:10.1093/Comjnl/bxz017.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] K. T. Ahmed, S. Aslam, H. Afzal, S. Iqbal, A. Mehmood, and G. S. Choi, “Symmetric image contents analysis and retrieval using decimation, pattern analysis, orientation, and features fusion”, IEEE Access, Vol.9, 2021, pp. 57215-57242.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] S. Ram Dubey, “A decade survey of content based image retrieval using deep learning”, IEEE Transactions on Circuits and Systems for Video Technology, Vol.32, No. 5, 2021, pp. 2687-2704.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Implementation of Machine Learning Algorithms for Customer Churn Prediction</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Manal</given_name><surname>Loukili</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Fayçal</given_name><surname>Messaoudi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Raouya</given_name><surname>El Youbi</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>20</day><year>2023</year></publication_date><pages><first_page>196</first_page><last_page>208</last_page></pages><doi_data><doi>10.61186/jist.34208.11.43.196</doi><resource>http://jist.ir/en/Article/34208</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/34208</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/34208</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/34208</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/34208</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/34208</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/34208</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/34208</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] M. Loukili, F. Messaoudi, and M. El Ghazi, "Supervised Learning Algorithms for Predicting Customer Churn with Hyperparameter Optimization", International Journal of Advances in Soft Computing &amp; Its Applications, Vol. 14, No. 3, 2022, pp. 49-63. doi: 10.15849/IJASCA.221128.04.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] K. Matuszelański, and K. Kopczewska, "Customer Churn in Retail E-Commerce Business: Spatial and Machine Learning Approach". J. Theor. Appl. Electron. Commer. Res. 2022, 17, pp. 165-198. https://doi.org/10.3390/jtaer17010009.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] H. Abbasimehr, M Setak, and M Tarokh, "A neuro-fuzzy classifier for customer churn prediction", International Journal of Computer Applications, Vol. 19, No. 8, 2011, pp. 35-41.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. K. Ahmad, A. Jafar, and K. Aljoumaa, "Customer churn prediction in telecom using machine learning in big data platform". Journal of Big Data, Vol. 6, No. 1, 2019, pp. 28 .</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Hadden, A. Tiwari, R. Roy, and D. Ruta, "Churn prediction : Does technology matter", International Journal of Intelligent Technology, Vol. 1, No. 2, 2006, pp. 104-110.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	I. Brându¸soiu, G. Toderean, and H. Beleiu, "Methods for churn prediction in the pre-paid mobile telecommunications industry", in 2016 International conference on communications (COMM), IEEE, 2016, pp. 97-100.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] K. Coussement, and D. Van den Poel, "Churn prediction in subscription services: An application of support vector machines while comparing two parameter-selection techniques", Expert systems with applications, Vol. 34, No. 1, pp. 313-327.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. Hadden, A. Tiwari, R. Roy, and D. Ruta, "Computer assisted customer churn management: State-of-the-art and future trends", Computers &amp; Operations Research Vol. 34, No. 10, 2007, pp.  02-29.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	K. Dahiya, and S. Bhatia, "Customer churn analysis in telecom industry", in 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO), Trends and Future Directions, 2015, pp. 1-6.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] L. Bottou, "Large-scale machine learning with stochastic gradient descent", in Proceedings of COMPSTAT’2010, 2010, Physica-Verlag HD, pp. 177-186.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] S. Suthaharan, "Support Vector Machine in Machine learning Models and Algorithms for Big Data Classification", Integrated Series in Information Systems, Springer, New York, Vol. 36, 2016, pp. 207-235. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] S. F. Sabbeh, "Machine-learning techniques for customer retention: A comparative study", International Journal of Advanced Computer Science and Applications, Vol. 9, No. 2, 2018.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] H. C. Kim, S. Pang, H. M. Je, D. Kim, and S. Y. Bang, "Support vector machine ensemble with bagging", Berlin, Heidelberg, Springer, 2002, pp. 397-408.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] H. Abbasimehr, M. Setak, and M. J. Tarokh, "A Comparative Assessment of the Performance of Ensemble Learning in Customer Churn Prediction", Int. Arab J. Inf. Technol, Vol. 11, No. 6, 2014, pp. 599-606.
[15] S. Tavassoli, and H. Koosha, "Hybrid Ensemble Learning Approaches to Customer Churn Prediction", Kybernetes, 2021.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16] A. Mishra, and U. S. Reddy, "A comparative study of customer churn prediction in telecom industry using ensemble-based classifiers", in 2017 International Conference on Inventive Computing and Informatics (ICICI), 2017, IEEE, pp. 721-725.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17] N. Ali, D. Neagu, and P. Trundle, "Evaluation of k-nearest neighbour classifier performance for heterogeneous data sets", SN Applied Sciences, Vol. 1, 2019, pp. 1-15.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18] J. Ali, R. Khan, N. Ahmad, and I. Maqsood, "Random Forests and Decision Trees, International", Journal of Computer Science Issues, Vol. 9, No. 5, 2012, pp. 272-275.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19] A. Alamsyah, and N. Salma, "A Comparative Study of Employee Churn Prediction Model", in 2018 4th International Conference on Science and Technology, IEEE, 2018, pp. 1-4.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20] M. Loukili, F. Messaoudi, and M. El Ghazi, "Sentiment Analysis of Product Reviews for E-Commerce Recommendation based on Machine Learning", International Journal of Advances in Soft Computing &amp; Its Applications, Vol. 15, No. 1, 2023, pp. 1-13.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Long-Term Software Fault Prediction Model with Linear Regression and Data Transformation</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Momotaz </given_name><surname>Begum</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Jahid Hasan</given_name><surname>Rony</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Md. Rashedul</given_name><surname>Islam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Jia</given_name><surname>Uddin</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>20</day><year>2023</year></publication_date><pages><first_page>222</first_page><last_page>231</last_page></pages><doi_data><doi>10.61186/jist.36585.11.43.222</doi><resource>http://jist.ir/en/Article/36585</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/36585</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/36585</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/36585</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/36585</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/36585</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/36585</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/36585</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] J. Stilgoe, “Who Killed Elaine Herzberg?,” in Who’s Driving Innovation? New Technologies and the Collaborative State, J. Stilgoe, Ed. Cham: Springer International Publishing, 2020, pp. 1–6. doi: 10.1007/978-3-030-32320-2_1.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] 	B. P. Murthy, N. Krishna, T. Jones, A. Wolkin, R. N. Avchen, and S. J. Vagi, “Public Health Emergency Risk Communication and Social Media Reactions to an Errant Warning of a Ballistic Missile Threat — Hawaii, January 2018,” Morb. Mortal. Wkly. Rep., vol. 68, no. 7, pp. 174–176, Feb. 2019, doi: 10.15585/mmwr.mm6807a2.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] 	H. Pham, System Software Reliability. Springer Science &amp; Business Media, 2007.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] 	T. Menzies, Z. Milton, B. Turhan, B. Cukic, Y. Jiang, and A. Bener, “Defect prediction from static code features: current results, limitations, new approaches,” Autom. Softw. Eng., vol. 17, no. 4, pp. 375–407, Dec. 2010, doi: 10.1007/s10515-010-0069-5.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] 	A. L. Goel, “Software Reliability Models: Assumptions, Limitations, and Applicability,” IEEE Trans. Softw. Eng., vol. SE-11, no. 12, pp. 1411–1423, Dec. 1985, doi: 10.1109/TSE.1985.232177.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] 	A. A. Abdel-Ghaly, P. Y. Chan, and B. Littlewood, “Evaluation of competing software reliability predictions,” IEEE Trans. Softw. Eng., vol. SE-12, no. 9, pp. 950–967, Sep. 1986, doi: 10.1109/TSE.1986.6313050.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] 	S. Santosa, R. A. Pramunendar, D. P. Prabowo, and Y. P. Santosa, “Wood Types Classification using Back-Propagation Neural Network based on Genetic Algorithm with Gray Level Co-occurrence Matrix for Features Extraction,” 2019. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] 	Y. Wang, D. Niu, and L. Ji, “Short-term power load forecasting based on IVL-BP neural network technology,” Syst. Eng. Procedia, vol. 4, pp. 168–174, Jan. 2012, doi: 10.1016/j.sepro.2011.11.062.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] 	 “Long-term Software Fault Prediction with Robust Prediction Interval Analysi...: EBSCOhost.” </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] 	M. Begum and T. Dohi, “Optimal Release Time Estimation of Software System using Box-Cox Transformation and Neural Network,” Int. J. Math. Eng. Manag. Sci., vol. 3, pp. 177–194, Jun. 2018, doi: 10.33889/IJMEMS.2018.3.2-014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] 	M. Begum and T. Dohi, “Estimating prediction interval of cumulative number of software faults using back propagation algorithm,” May 2016.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] 	M. Begum and T. Dohi, optimal software release decision via artificial neural network approach with bug count data. 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] 	M. Begum and T. Dohi, “Prediction Interval of Cumulative Number of Software Faults Using Multilayer Perceptron,” vol. 619, pp. 43–58, Jan. 2016, doi: 10.1007/978-3-319-26396-0_4.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] 	M. Begum and T. Dohi, “A Neuro-Based Software Fault Prediction with Box-Cox Power Transformation,” J. Softw. Eng. Appl., vol. 10, no. 3, Art. no. 3, Mar. 2017, doi: 10.4236/jsea.2017.103017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] 	M. Begum and T. Dohi, “Optimal stopping time of software system test via artificial neural network with fault count data,” J. Qual. Maint. Eng., vol. 24, pp. 00–00, Jan. 2018, doi: 10.1108/JQME-12-2016-0082.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] 	Y. Kamei and E. Shihab, “Defect Prediction: Accomplishments and Future Challenges,” in 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), Mar. 2016, vol. 5, pp. 33–45. doi: 10.1109/SANER.2016.56.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] 	V. R. Basili, “The experimental paradigm in software engineering,” in Experimental Software Engineering Issues: Critical Assessment and Future Directions, Berlin, Heidelberg, 1993, pp. 1–12. doi: 10.1007/3-540-57092-6_91.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] 	T. M. Khoshgoftaar et al., “Predicting fault-prone modules with case-based reasoning,” in Proceedings The Eighth International Symposium on Software Reliability Engineering, Nov. 1997, pp. 27–35. doi: 10.1109/ISSRE.1997.630845.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] 	C. Catal, “Software fault prediction: A literature review and current trends,” Expert Syst. Appl., vol. 38, no. 4, pp. 4626–4636, Apr. 2011, doi: 10.1016/j.eswa.2010.10.024.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] 	K. Thantirige, A. K. Rathore, S. K. Panda, S. Mukherjee, M. A. Zagrodnik, and A. K. Gupta, “An open-switch fault detection method for cascaded H-bridge multilevel inverter fed industrial drives,” in IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society, Oct. 2016, pp. 2159–2165. doi: 10.1109/IECON.2016.7794032.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] 	M. Islam, M. Akhtar, and M. Begum, Long short-term memory (LSTM) networks based software fault prediction using data transformation methods. 2022, p. 6. doi: 10.1109/ICAEEE54957.2022.9836388.
[22] 	M. Islam, M. Begum and M. Akhtar, Recursive Approach for Multiple Step-Ahead Software Fault Prediction through Long Short-Term Memory (LSTM). p. 10.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23] 	H. K. Dam et al., “Lessons Learned from Using a Deep Tree-Based Model for Software Defect Prediction in Practice,” in 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), May 2019, pp. 46–57. doi: 10.1109/MSR.2019.00017.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24] 	D. Sharma and P. Chandra, “Linear regression with factor analysis in fault prediction of software,” J. Interdiscip. Math., vol. 23, pp. 11–19, Jan. 2020, doi: 10.1080/09720502.2020.1721641.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25] 	D. J. Pedregal, “Time series analysis and forecasting with ECOTOOL,” PLOS ONE, vol. 14, no. 10, p. e0221238, Oct. 2019, doi: 10.1371/journal.pone.0221238.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26] 	O. Nyarko-Boateng, A. F. Adekoya, and B. A. Weyori, “Predicting the actual location of faults in underground optical networks using linear regression,” Eng. Rep., vol. 3, no. 3, p. eng212304, 2021, doi: 10.1002/eng2.12304.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27] 	G. E. P. Box and D. R. Cox, “An Analysis of Transformations,” J. R. Stat. Soc. Ser. B Methodol., vol. 26, no. 2, pp. 211–252, 1964.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28] 	F. J. Anscombe, “The Transformation of Poisson, Binomial and Negative-Binomial Data,” Biometrika, vol. 35, no. 3/4, pp. 246–254, 1948, doi: 10.2307/2332343.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29] 	S. Weisberg, “Yeo-Johnson Power Transformations.” 2001.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30] 	E. S. Gardner, “Exponential smoothing: The state of the art—Part II,” Int. J. Forecast., vol. 22, no. 4, pp. 637–666, Oct. 2006, doi: 10.1016/j.ijforecast.2006.03.005.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31] 	X. Su, X. Yan, and C.-L. Tsai, “Linear regression,” WIREs Comput. Stat., vol. 4, no. 3, pp. 275–294, 2012, doi: 10.1002/wics.1198.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32] 	H. Okamura and T. Dohi, “SRATS: Software reliability assessment tool on spreadsheet (Experience report),” in 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), Nov. 2013, pp. 100–107. doi: 10.1109/ISSRE.2013.6698909.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33] 	M. R. Lyu, Ed., Handbook of Software Reliability Engineering. Los Alamitos, Calif.: New York: McGraw-Hill, 1996.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34] 	A. Rasoolzadegan, “A new approach to the quantitative measurement of software reliability,” 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Trip Timing Algorithm for GTFS Data with Redis Model to Improve the Performance</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mustafa</given_name><surname>Alzaidi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Aniko</given_name><surname>Vagner</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>20</day><year>2023</year></publication_date><pages><first_page>260</first_page><last_page>268</last_page></pages><doi_data><doi>10.61186/jist.36842.11.43.260</doi><resource>http://jist.ir/en/Article/36842</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/36842</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/36842</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/36842</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/36842</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/36842</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/36842</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/36842</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	T. Litman, “Integrating Public Health Objectives in Transportation Decision-Making,” American Journal of Health Promotion, vol. 18, no. 1, pp. 103–108, 2003, doi: 10.4278/0890-1171-18.1.103.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	T. Litman, “Exploring the Paradigm Shifts Needed To Reconcile Transportation and Sustainability Objectives,” Transp Res Rec, vol. 1670, no. 1, pp. 8–12, Jan. 1999, doi: 10.3141/1670-02.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. F. Sallis, L. D. Frank, B. E. Saelens, and M. K. Kraft, “Active transportation and physical activity: opportunities for collaboration on transportation and public health research,” Transp Res Part A Policy Pract, vol. 38, no. 4, pp. 249–268, 2004, doi: https://doi.org/10.1016/j.tra.2003.11.003.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	T. Shannon, B. Giles-Corti, T. Pikora, M. Bulsara, T. Shilton, and F. Bull, “Active commuting in a university setting: Assessing commuting habits and potential for modal change,” Transp Policy (Oxf), vol. 13, no. 3, pp. 240–253, 2006, doi: https://doi.org/10.1016/j.tranpol.2005.11.002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Golub and K. Martens, “Using principles of justice to assess the modal equity of regional transportation plans,” J Transp Geogr, vol. 41, pp. 10–20, 2014, doi: https://doi.org/10.1016/j.jtrangeo.2014.07.014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	K. Martens, A. Golub, and G. Robinson, “A justice-theoretic approach to the distribution of transportation benefits: Implications for transportation planning practice in the United States,” Transp Res Part A Policy Pract, vol. 46, no. 4, pp. 684–695, 2012, doi: https://doi.org/10.1016/j.tra.2012.01.004.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	K. Coffel et al., “Guidelines for Providing Access to Public Transportation Stations,” 2012.
[8]	M. Catala, S. Dowling, and D. M. Hayward, “Expanding the Google Transit Feed Specification to Support Operations and Planning,” 2011.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[9]	J. Wong, “Leveraging the General Transit Feed Specification for Efficient Transit Analysis,” Transportation Research Record: Journal of the Transportation Research Board, vol. 2338, pp. 11–19, Dec. 2013, doi: 10.3141/2338-02.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10]	J. Wong, L. Reed, K. Watkins, and R. Hammond, “Open Transit Data: State of the Practice and Experiences from Participating Agencies in the United States,” 2013.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	E. W. Dijkstra, “A note on two problems in connexion with graphs,” Numer Math (Heidelb), vol. 1, no. 1, pp. 269–271, 1959, doi: 10.1007/BF01386390.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	R. Bellman, “On a routing problem,” Q Appl Math, vol. 16, no. 1, pp. 87–90, 1958.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	R. W. Floyd, “Algorithm 97: Shortest path,” Commun ACM, vol. 5, no. 6, p. 345, 1962, doi: http://doi.acm.org/10.1145/367766.368168.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	D. B. Johnson, “Efficient Algorithms for Shortest Paths in Sparse Networks,” J. ACM, vol. 24, no. 1, pp. 1–13, Jan. 1977, doi: 10.1145/321992.321993.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	J. Mote, I. Murthy, and D. L. Olson, “A parametric approach to solving bicriterion shortest path problems,” Eur J Oper Res, vol. 53, no. 1, pp. 81–92, 1991, doi: https://doi.org/10.1016/0377-2217(91)90094-C.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	J. C. Namorado Climaco and E. Queirós Vieira Martins, “A bicriterion shortest path algorithm,” Eur J Oper Res, vol. 11, no. 4, pp. 399–404, 1982, doi: https://doi.org/10.1016/0377-2217(82)90205-3.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	E. Q. V. Martins, “On a multicriteria shortest path problem,” Eur J Oper Res, vol. 16, no. 2, pp. 236–245, 1984, doi: https://doi.org/10.1016/0377-2217(84)90077-8.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	C. Tung Tung and K. Lin Chew, “A multicriteria Pareto-optimal path algorithm,” Eur J Oper Res, vol. 62, no. 2, pp. 203–209, 1992, doi: https://doi.org/10.1016/0377-2217(92)90248-8.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	J. Brumbaugh-Smith and D. Shier, “An empirical investigation of some bicriterion shortest path algorithms,” Eur J Oper Res, vol. 43, no. 2, pp. 216–224, 1989, doi: https://doi.org/10.1016/0377-2217(89)90215-4.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	H. W. Corley and I. D. Moon, “Shortest Paths in Networks with Vector Weights,” J. Optim. Theory Appl., vol. 46, no. 1, pp. 79–86, May 1985, doi: 10.1007/BF00938761.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	H. G. Daellenbach and C. A. De Kluyver, “Note on Multiple Objective Dynamic Programming,” Journal of the Operational Research Society, vol. 31, no. 7, pp. 591–594, Jul. 1980, doi: 10.1057/jors.1980.114.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	A. J. V Skriver and K. Andersen, “A label correcting approach for solving bicriterion shortest-path problems,” Comput Oper Res, vol. 27, pp. 507–524, May 2000, doi: 10.1016/S0305-0548(99)00037-4.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	P. Dell’Olmo, M. Gentili, and A. Scozzari, “On Finding Dissimilar Pareto-Optimal Paths,” Eur J Oper Res, vol. 162, pp. 70–82, Apr. 2005, doi: 10.1016/j.ejor.2003.10.033.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	E. Machuca, L. Mandow, and J. Cruz, “An evaluation of heuristic functions for bicriterion shortest path problems,” New Trends in Artificial Intelligence. Proceedings of EPIA’09, Jan. 2009.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	L. Mandow and J. L. de la Cruz, “Frontier Search for Bicriterion Shortest Path Problems,” in Proceedings of the 2008 Conference on ECAI 2008: 18th European Conference on Artificial Intelligence, NLD: IOS Press, 2008, pp. 480–484.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	L. Mandow and J. L. Pérez de la Cruz, “Path recovery in frontier search for multiobjective shortest path problems,” J Intell Manuf, vol. 21, no. 1, pp. 89–99, 2010, doi: 10.1007/s10845-008-0169-2.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	R. Mart\’\i, J. Luis González Velarde, and A. Duarte, “Heuristics for the Bi-Objective Path Dissimilarity Problem,” Comput. Oper. Res., vol. 36, no. 11, pp. 2905–2912, Nov. 2009, doi: 10.1016/j.cor.2009.01.003.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	A. Raith and M. Ehrgott, “A comparison of solution strategies for biobjective shortest path problems,” Comput Oper Res, vol. 36, pp. 1299–1331, Apr. 2009, doi: 10.1016/j.cor.2008.02.002.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	J. Widuch, “A Label Correcting Algorithm for the Bus Routing Problem,” Fundam Inform, vol. 118, pp. 305–326, Aug. 2012, doi: 10.3233/FI-2012-716.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	C.-L. Liu, T.-W. Pai, C.-T. Chang, and C.-M. Hsieh, “Path-planning algorithms for public transportation systems,” in ITSC 2001. 2001 IEEE Intelligent Transportation Systems. Proceedings (Cat. No.01TH8585), 2001, pp. 1061–1066. doi: 10.1109/ITSC.2001.948809.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	A. V. MUSTAFA ALZAIDI, “Trip Planning Algorithm For Gtfs Data With Nosql Structure To Improve The Performance,” J Theor Appl Inf Technol, vol. Vol.99. No, no. 10 31st May 2021, pp. 2290–2300, May 2021.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	S. Farber, B. Ritter, and L. Fu, “Space–time mismatch between transit service and observed travel patterns in the Wasatch Front, Utah: A social equity perspective,” Travel Behav Soc, vol. 4, pp. 40–48, 2016, doi: https://doi.org/10.1016/j.tbs.2016.01.001.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	S. K. Fayyaz S., X. C. Liu, and G. Zhang, “An efficient General Transit Feed Specification (GTFS) enabled algorithm for dynamic transit accessibility analysis,” PLoS One, vol. 12, no. 10, pp. e0185333-, Oct. 2017, [Online]. Available: https://doi.org/10.1371/journal.pone.0185333.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	S. Motamed, A. Broumandnia, and A. Nourbakhsh, “Multimodal biometric recognition using particle swarm optimization-based selected features,” Journal of Information Systems and Telecommunication, vol. 1, pp. 79–87, Mar. 2013, doi: 10.7508/jist.2013.02.002.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	P. Goli and M. M. R. KARAMI, “Speech Intelligibility Improvement in Noisy Environments for Near-End Listening Enhancement,” 2016.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	G. M. Saeed, H. B. N. Babak, and L. Mojtaba, “Achieving Better Performance of S-MMA Algorithm in the OFDM Modulation,” 2013.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	Q. Zervaas, The Definitive Guide to GTFS (Consuming open public transportation data with the General Transit Feed Specifcation), First Edit. 2014. [Online]. Available: http://gtfsbook.com/gtfs-book-sample.pdf.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	N. Amirah, D. Mohamad, and A. Hilmy, Acceptable walking distance accessible to the nearest bus stop considering the service coverage. 2021. doi: 10.1109/ICOTEN52080.2021.9493435.
[39]	“Introduction to Redis – Redis.” https://redis.io/topics/introduction (accessed Jan. 18, 2021).</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[40]	S. Tapia-Fernández, D. García-García, and P. García-Hernandez, “Key Concepts, Weakness and Benchmark on Hash Table Data Structures,” Algorithms, vol. 15, no. 3, 2022, doi: 10.3390/a15030100.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
 
</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Spectrum Sensing of OFDM Signals Utilizing Higher Order Statistics under Noise Uncertainty Environments in Cognitive Radio Systems</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>MOUSUMI</given_name><surname>HAQUE</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Tetsuya</given_name><surname>Shimamura</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>20</day><year>2023</year></publication_date><pages><first_page>251</first_page><last_page>259</last_page></pages><doi_data><doi>10.61186/jist.37961.11.43.251</doi><resource>http://jist.ir/en/Article/37961</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/37961</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/37961</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/37961</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/37961</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/37961</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/37961</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/37961</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation> [1] FCC, “Spectrum Policy Task Force Report”, Federal Communications Commission, ET Docket No. 02–135, 2002.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] J. Mitola, “Cognitive radio: an integrated agent architecture for software defined radio”, Ph.D. Dissertation, Royal Institute of Technology, Stockholm, Sweden, 2000.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] S. Haykin, “Cognitive radio: brain-empowered wireless communications”, IEEE Journal on Selected Areas in Communications, Vol. 23, 2005, pp. 201–220.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] G. Ding, Y. Jiao, J. Wang, Y. Zou, Q. Wu, Y. Yao, and L. Hanzo, “Spectrum inference in cognitive radio networks: algorithms and applications”, IEEE Communications Surveys Tutorials, Vol. 20, 2018, pp. 150–182.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] M. Amjad, M. H. Rehmani, and S. Mao, “Wireless multimedia cognitive radio networks: a comprehensive survey”, IEEE Communications Surveys Tutorials, Vol. 20, 2018, pp. 1056–1103.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] F. Hu, B. Chen, and K. Zhu, “Full spectrum sharing in cognitive radio networks toward 5g: a survey”, IEEE Access, Vol. 6, 2018, pp. 15754–15776.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] P. C. Sofotasios, E. Rebeiz, L. Zhang, T. A. Tsiftsis, D. Cabric, and S. Freear, “Energy detection based spectrum sensing over kappa-mu and kappa-mu extreme fading channels”, IEEE Transection on Vehicle Technology, Vol. 62, 2013, pp. 1031–1040.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] F. F. Digham, M. S. Alouini, and M. K. Simon, “On the energy detection of unknown signals over fading channels”, IEEE Transactions on Communications, Vol. 55, 2007, pp. 21–24.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] R. Umar, A. U. H. Sheikh, and M. Deriche, “Unveiling the hidden assumptions of energy detector based spectrum sensing for cognitive radios”, IEEE Transections on Vehicle Technology, Vol. 59, July 2010, pp. 2940–2950.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] A. Tani, and R. Fantacci, “A low-complexity cyclostationary-based spectrum sensing for UWB and WiMAX coexistence with noise uncertainty”, IEEE Transactions on Signal Processing, Vol. 61, 2013, pp. 3931–3943.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] S. Kapoor, S. Rao, and G. Singh, “Opportunistic spectrum sensing by employing matched filter in cognitive radio network”, in Proceedings International Conference on Communication Systems and Network Technologies, 2011, pp. 580–583.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] S. M. Kay, Fundamentals of Statistical Signal Processing: Detection Theory, Prentice Hall, 1993.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] W. Han, C. Huang, J. Li, Z. Li, and S. Cui,       “Correlation-based spectrum sensing with oversampling in cognitive radio”, IEEE Journal on Selected Areas in Communications, Vol. 33, 2015, pp. 788–802.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] S. Chaudhari, V. Koivunen, and H. V. Poor, “Collaborative autocorrelation-based spectrum sensing of OFDM signals in cognitive radios”, in Proceedings Annual Conf. on Information Sciences and Systems (CISS), 2008, pp. 191–196.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] S. Chaudhari, V. Koivunen, and H. V. Poor, “Distributed autocorrelation based sequential detection of OFDM signals in cognitive radios”, in Proceedings IEEE International Conference on Cognitive Radio Oriented Wireless Networks and Commun. (CROWNCOM), 2008, pp. 1–6.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] S. Chaudhari, V. Koivunen, and H. V. Poor, “Autocorrelation-based decentralized sequential detection of OFDM signals in cognitive radios”, IEEE Transactions on Signal Processing, Vol. 57, 2009, pp. 2690–2700.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] J. M. Mendel, “Tutorial on higher-order statistics (spectra) in signal processing and system theory: theoretical results and some applications”, in Proceedings of the IEEE, 1991, Vol. 79, pp. 278–305.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] C. L. Nikias, and J. M. Mendel, “Signal processing with higher order spectra”, IEEE Signal Processing Magazine, Vol. 10, 1993, pp. 10–37.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] P. A. Delaney, and D. O. Walsh, “Performance analysis of the incoherent and skewness matched filter detectors in multipath environments”, IEEE Journal Oceanic Engineering, Vol. 20, 1995, pp. 80–84.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] M. Sanaullah, “A review of higher order statistics and spectra in communication systems”, Global Journal of Science Frontier Research Physics and Space Science, Vol. 13, 2013, pp. 31–50.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] M. Haque, Y. Sugiura, and T. Shimamura, “Spectrum Sensing Based on Higher Order Statistics for OFDM Systems over Multipath Fading Channels in Cognitive Radio”, Journal of Signal Processing, Vol. 23, 2019, pp. 257–266.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] G. Mahendru, A. K. Shukla, P. Banerjee, and L. M. Patnaik, “Adaptive double threshold based spectrum sensing to overcome sensing failure in presence of noise uncertainty”, in Proceedings of IEEE International Conference on Signal Processing and Integrated Networks (SPIN), 2019, pp. 466–471.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] J. Yao, M. Jin, Q. Guo, Y. Li, and J. Xi, “Effective energy detection for IoT systems against noise uncertainty at low SNR”, IEEE Internet of Things Journal, Vol. 6, 2019, pp. 2327–4662.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] H. Sadeghi, and P. Azmi, “Cyclic Correlation-Based Cooperative Detection for OFDM-Based Primary Users”, Journal of Information Systems and Telecommunication, Vol. 1, 2013, pp. 155-164.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] S. S. Kashef, P. Azmi, and H. Sadeghi, “GoF-Based Spectrum Sensing of OFDM Signals over Fading Channels”, Journal of Information Systems and Telecommunication, Vol. 2, 2014, pp. 103-112.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] E. E. A. Medina, and S. E. Barbin, “Performance of Spectrum Sensing Based on Energy Detection for Cognitive Radios”, in Proceedings of IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC), 2018, pp. 948–951.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] M. Alijani, and A. Osman, “Performance improvement of energy detection in cognitive radio under noise uncertainty”, in Proceedings of IEEE International Conference on Innovations in Information Technology (IIT), 2020, pp. 148–153.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] R. Gao, P. Qi, and Z. Zhang, “Frequency domain goodness of fit test based spectrum sensing method with dynamically varying noise”, China Communication, Vol. 17, 2020, pp. 172–179.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] B. Gajera, D. K. Patel, B. Soni, and M. Lopez-Benitez, “Performance evaluation of improved energy detection under signal and noise uncertainties in cognitive radio networks”, in Proceedings of IEEE International Conference on Signals and Systems (ICSigSys), 2019, pp. 131–137.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] G. Tomar, A. Bagwari, and J. Kanti, “Introduction to Cognitive Radio Networks and Applications”, Taylor &amp; Francis Group, 2017.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] S. Brown, “Measures of shape: skewness and kurtosis”, Available: http://brownmath.com/stat/shape.htm.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] D. N. Joanes, and C. A. Gill, “Comparing measures of sample skewness and kurtosis”, Journal of the Royal Statistical Society, Vol. 47, 1998, pp. 183–189.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] F. X. Socheleau, A. A. E. Bey, and S. Houcke, “Non data-aided SNR estimation of OFDM signals”, IEEE Communications Letters, Vol. 12, 2008, pp. 813–815.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] E. Hong, K. Kim, and D. Har, “Spectrum sensing by parallel pairs of cross-correlations and comb filters for OFDM systems with pilot tones”, IEEE Sensors Journal, Vol. 12, 2012, pp. 2380–2383.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
 [35] S. Dikmese, P. C. Sofotasios, M. Renfors, M. Valkama, and M. Ghogho, “Analysis of noise uncertainty and frequency selectivity effects in wideband multimode spectrum sensing”, in Proceedings of IEEE Global Communications Conference (GLOBECOM), 2015, pp. 36–40.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] R. Tandra, and A. Sahai, “SNR walls for signal detection”, IEEE Journal of Selected Topics in Signal Processing, Vol. 2, 2008, pp. 4–17.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Recognition of Facial and Vocal Emotional Expressions by SOAR Model</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Matin</given_name><surname>Ramzani Shahrestani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sara</given_name><surname>Motamed</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammadreza</given_name><surname>Yamaghani</surname></person_name></contributors><publication_date media_type="online"><month>8</month><day>20</day><year>2023</year></publication_date><pages><first_page>209</first_page><last_page>221</last_page></pages><doi_data><doi>10.61186/jist.39828.11.43.209</doi><resource>http://jist.ir/en/Article/39828</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/39828</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/39828</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/39828</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/39828</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/39828</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/39828</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/39828</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Senthilkumar, N., S. Karpakam, M. Gayathri Devi, R. Balakumaresan, and P. Dhilipkumar. "Speech emotion recognition based on Bi-directional LSTM architecture and deep belief networks." Materials Today: Proceedings 57 (2022): 2180-2184.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Crisp, Nicholas H., Peter CE Roberts, Sabrina Livadiotti, A. Macario Rojas, Vitor Toshiyuki Abrao Oiko, Steve Edmondson, S. J. Haigh et al. "In-orbit aerodynamic coefficient measurements using SOAR (Satellite for Orbital Aerodynamics Research)." Acta Astronautica 180 (2021): 85-99.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Vallejo, Carlos, Jun Ho Jang, Carlo Finelli, Efreen Montaño Figueroa, Lalita Norasetthada, Rodrigo T. Calado, Mehmet Turgut et al. "Efficacy and Safety of Eltrombopag Combined with Cyclosporine As First-Line Therapy in Adults with Severe Acquired Aplastic Anemia: Results of the Interventional Phase 2 Single-Arm Soar Study." Blood 138 (2021): 2174.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Whittaker, Jackie L., Linda K. Truong, Trish Silvester-Lee, Justin M. Losciale, Maxi Miciak, Andrea Pajkic, Christina Y. Le et al. "Feasibility of the SOAR (stop OsteoARthritis) program." Osteoarthritis and Cartilage Open 4, no. 1 (2022): 100239.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Laird, John Edwin, Keegan R. Kinkade, Shiwali Mohan, and Joseph Z. Xu. "Cognitive robotics using the soar cognitive architecture." In Workshops at the twenty-sixth AAAI conference on artificial intelligence. 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Stavros, J., and G. Saint. "SOAR: Chapter 18: Linking strategy and OD to sustainable performance." WJ Rothwell, JM Stavros, R. Sullivan, and A. Sullivan, Practicing organization development: A guide for leading change. San Francisco, CA: Jossey-Bass (2010).</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Lucey, Simon, Ahmed Bilal Ashraf, and Jeffrey F. Cohn. Investigating spontaneous facial action recognition through aam representations of the face. Vol. 2. INTECH Open Access Publisher, 2007.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Chang, Ya, Changbo Hu, Rogerio Feris, and Matthew Turk. "Manifold based analysis of facial expression." Image and Vision Computing 24, no. 6 (2006): 605-614.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Pantic, Maja, and Ioannis Patras. "Dynamics of facial expression: Recognition of facial actions and their temporal segments from face profile image sequences." IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 36, no. 2 (2006): 433-449.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Guo, Guodong, and Charles R. Dyer. "Learning from examples in the small sample case: face expression recognition." IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 35, no. 3 (2005): 477-488.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Anderson, Keith, and Peter W. McOwan. "A real-time automated system for the recognition of human facial expressions." IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 36, no. 1 (2006): 96-105.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Whitehill, Jacob, and Christian W. Omlin. "Haar features for FACS AU recognition." In 7th international conference on automatic face and gesture recognition (FGR06), pp. 5-pp. IEEE, 2006.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Pantic, Maja, and Ioannis Patras. "Dynamics of facial expression: Recognition of facial actions and their temporal segments from face profile image sequences." IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 36, no. 2 (2006): 433-449.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Zhao, Guoying, and Matti Pietikainen. "Dynamic texture recognition using local binary patterns with an application to facial expressions." IEEE transactions on pattern analysis and machine intelligence 29, no. 6 (2007): 915-928.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Dhall, Abhinav, Akshay Asthana, Roland Goecke, and Tom Gedeon. "Emotion recognition using PHOG and LPQ features." In 2011 IEEE International Conference on Automatic Face &amp; Gesture Recognition (FG), pp. 878-883. IEEE, 2011.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Black, Michael J., and Yaser Yacoob. "Recognizing facial expressions in image sequences using local parameterized models of image motion." International Journal of Computer Vision 25, no. 1 (1997): 23-48.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Soleymani, Mohammad, David Garcia, Brendan Jou, Björn Schuller, Shih-Fu Chang, and Maja Pantic. "A survey of multimodal sentiment analysis." Image and Vision Computing 65 (2017): 3-14.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Rosenbloom, Paul S., John E. Laird, Allen Newell, and Robert McCarl. "A preliminary analysis of the Soar architecture as a basis for general intelligence." Artificial Intelligence 47, no. 1-3 (1991): 289-325.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Livanos, Nicole. "Mobility for Healthcare Professional Workforce Continues to Soar." Journal of Nursing Regulation 10, no. 4 (2020): 54-56.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Ngai, Wang Kay, Haoran Xie, Di Zou, and Kee-Lee Chou. "Emotion recognition based on convolutional neural networks and heterogeneous bio-signal data sources." Information Fusion 77 (2022): 107-117.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Lu, Cheng, Yuan Zong, Wenming Zheng, Yang Li, Chuangao Tang, and Björn W. Schuller. "Domain invariant feature learning for speaker-independent speech emotion recognition." IEEE/ACM Transactions on Audio, Speech, and Language Processing 30 (2022): 2217-2230.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Cecchi, Ariel S. "Cognitive penetration of early vision in face perception." Consciousness and Cognition 63 (2018): 254-266.
[23]	Torfi, Amirsina, Seyed Mehdi Iranmanesh, Nasser Nasrabadi, and Jeremy Dawson. "3d convolutional neural networks for cross audio-visual matching recognition." IEEE Access 5 (2017): 22081-22091.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	Wu, Xun, Wei-Long Zheng, Ziyi Li, and Bao-Liang Lu. "Investigating EEG-based functional connectivity patterns for multimodal emotion recognition." Journal of neural engineering 19, no. 1 (2022): 016012.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	Jin, Qin, and Junwei Liang. "Video description generation using audio and visual cues." In Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval, pp. 239-242. 2016.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	Zhang, Shiqing, Shiliang Zhang, Tiejun Huang, Wen Gao, and Qi Tian. "Learning affective features with a hybrid deep model for audio–visual emotion recognition." IEEE Transactions on Circuits and Systems for Video Technology 28, no. 10 (2017): 3030-3043.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	Neverova, Natalia, Christian Wolf, Graham Taylor, and Florian Nebout. "Moddrop: adaptive multi-modal gesture recognition." IEEE Transactions on Pattern Analysis and Machine Intelligence 38, no. 8 (2015): 1692-1706.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	Koromilas, Panagiotis, and Theodoros Giannakopoulos. "Deep multimodal emotion recognition on human speech: A review." Applied Sciences 11, no. 17 (2021): 7962.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	Pantic, Maja, and Leon JM Rothkrantz. "Facial action recognition for facial expression analysis from static face images." IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 34, no. 3 (2004): 1449-1461.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	Martin, Olivier, Irene Kotsia, Benoit Macq, and Ioannis Pitas. "The eNTERFACE'05 audio-visual emotion database." In 22nd International Conference on Data Engineering Workshops (ICDEW'06), pp. 8-8. IEEE, 2006.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	Farhoudi, Zeinab, and Saeed Setayeshi. "Fusion of deep learning features with mixture of brain emotional learning for audio-visual emotion recognition." Speech Communication 127 (2021): 92-103.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	Bloch, Isabelle. "Information combination operators for data fusion: A comparative review with classification." IEEE Transactions on systems, man, and cybernetics-Part A: systems and humans 26, no. 1 (1996): 52-67.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	Zhang, Yongmian, and Qiang Ji. "Active and dynamic information fusion for facial expression understanding from image sequences." IEEE Transactions on pattern analysis and machine intelligence 27, no. 5 (2005): 699-714.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	James, Alex Pappachen, and Belur V. Dasarathy. "Medical image fusion: A survey of the state of the art." Information fusion 19 (2014): 4-19.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	Chen, JunKai, Zenghai Chen, Zheru Chi, and Hong Fu. "Emotion recognition in the wild with feature fusion and multiple kernel learning." In Proceedings of the 16th International Conference on Multimodal Interaction, pp. 508-513. 2014.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	Teissier, Pascal, Jordi Robert-Ribes, J-L. Schwartz, and Anne Guérin-Dugué. "Comparing models for audiovisual fusion in a noisy-vowel recognition task." IEEE Transactions on Speech and Audio Processing 7, no. 6 (1999): 629-642.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	Kumari, Jyoti, Reghunadhan Rajesh, and K. M. Pooja. "Facial expression recognition: A survey." Procedia computer science 58 (2015): 486-491.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	Ekman, Paul, and Wallace V. Friesen. "Facial action coding system." Environmental Psychology &amp; Nonverbal Behavior (1978).</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	Nazari, Elham, Rizwana Biviji, Amir Hossein Farzin, Parnian Asgari, and Hamed Tabesh. "Advantages and challenges of information fusion technique for big data analysis: proposed framework." Journal of Biostatistics and Epidemiology 7, no. 2 (2021): 189-216.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[40]	Su, Yangfeng, Jian Wang, Xuan Zeng, Zhaojun Bai, Charles Chiang, and Dian Zhou. "SAPOR: Second-order Arnoldi method for passive order reduction of RCS circuits." In IEEE/ACM International Conference on Computer Aided Design, 2004. ICCAD-2004., pp. 74-79. IEEE, 2004.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[41]	Sadeghi, Hamid, Abolghasem-Asadollah Raie, and Mohammad-Reza Mohammadi. "Facial expression recognition using texture description of displacement image." Journal of Information Systems and Telecommunication (JIST) 2, no. 4 (2014): 205-212.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[42]	Nikpoor, Mohsen, Mohammad Reza Karami-Mollaei, and Reza Ghaderi. "A new Sparse Coding Approach for Human Face and Action Recognition." Journal of Information Systems and Telecommunication (JIST) 1, no. 17 (2017): 1.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[43]	Navraan, Mina, Nasrollah Moghadam Charkari, and Muharram Mansoorizadeh. "Automatic Facial Emotion Recognition Method Based on Eye Region Changes." Journal of Information Systems and Telecommunication (JIST) 4, no. 4 (2016): 221-231.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[44]	Motamed, Sara, Saeed Setayeshi, Azam Rabiee, and Arash Sharifi. "Speech emotion recognition based on fusion method." Journal of Information Systems and Telecommunication 5 (2017): 50-56.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>