﻿<?xml version="1.0" encoding="utf-8"?><ONIXDOISerialArticleWorkRegistrationMessage xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.editeur.org/onix/DOIMetadata/2.0 https://www.medra.org/schema/onix/DOIMetadata/2.0/ONIX_DOIMetadata_2.0.xsd" xmlns="http://www.editeur.org/onix/DOIMetadata/2.0"><Header><FromCompany>Sinaweb</FromCompany><FromPerson>Sinaweb DOI</FromPerson><FromEmail>doi@sinaweb.net</FromEmail><ToCompany>mEDRA</ToCompany><SentDate>20260519</SentDate><MessageNote>DOI Registration</MessageNote><NotificationResponse>01</NotificationResponse></Header><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.61186/jist.38322.12.45.1</DOI><DOIWebsiteLink>http://jist.ir/Article/38322</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>4546</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>4546</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>12</JournalVolumeNumber><JournalIssueNumber>45</JournalIssueNumber><JournalIssueDesignation>3</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>202403</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>An Efficient Sentiment Analysis Model for Crime Articles’ Comments using a Fine-tuned BERT Deep Architecture and Pre-Processing Techniques</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Sovon Chakraborty</PersonName><PersonNameInverted>Chakraborty , Sovon</PersonNameInverted><NamesBeforeKey>Sovon</NamesBeforeKey><KeyNames>Chakraborty</KeyNames></Contributor><Contributor><SequenceNumber>2</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Muhammad Borhan Uddin Talukdar</PersonName><PersonNameInverted>Borhan Uddin Talukdar , Muhammad</PersonNameInverted><NamesBeforeKey>Muhammad</NamesBeforeKey><KeyNames>Borhan Uddin Talukdar</KeyNames></Contributor><Contributor><SequenceNumber>3</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Portia  Sikdar</PersonName><PersonNameInverted>Sikdar , Portia </PersonNameInverted><NamesBeforeKey>Portia </NamesBeforeKey><KeyNames>Sikdar</KeyNames></Contributor><Contributor><SequenceNumber>4</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Jia Uddin</PersonName><PersonNameInverted>Uddin , Jia</PersonNameInverted><NamesBeforeKey>Jia</NamesBeforeKey><KeyNames>Uddin</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>202403</PublicationDate><CopyrightStatement><CopyrightYear>2024</CopyrightYear><CopyrightOwner><PersonName>Jia Uddin</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.61186/jist.39051.12.45.12</DOI><DOIWebsiteLink>http://jist.ir/Article/39051</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>4546</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>4546</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>12</JournalVolumeNumber><JournalIssueNumber>45</JournalIssueNumber><JournalIssueDesignation>3</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>202403</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>Fear Recognition Using Early Biologically Inspired Features Model</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName> Elham  Askari</PersonName><PersonNameInverted> Askari ,  Elham</PersonNameInverted><NamesBeforeKey> Elham</NamesBeforeKey><KeyNames> Askari</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>202403</PublicationDate><CopyrightStatement><CopyrightYear>2024</CopyrightYear><CopyrightOwner><PersonName> Elham  Askari</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.61186/jist.40851.12.45.20</DOI><DOIWebsiteLink>http://jist.ir/Article/40851</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>4546</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>4546</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>12</JournalVolumeNumber><JournalIssueNumber>45</JournalIssueNumber><JournalIssueDesignation>3</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>202403</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>Optimization of Query Processing in Versatile Database Using Ant Colony Algorithm </TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>hasan Asil</PersonName><PersonNameInverted>Asil , hasan</PersonNameInverted><NamesBeforeKey>hasan</NamesBeforeKey><KeyNames>Asil</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>202403</PublicationDate><CopyrightStatement><CopyrightYear>2024</CopyrightYear><CopyrightOwner><PersonName>hasan Asil</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.61186/jist.39109.12.45.29</DOI><DOIWebsiteLink>http://jist.ir/Article/39109</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>4546</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>4546</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>12</JournalVolumeNumber><JournalIssueNumber>45</JournalIssueNumber><JournalIssueDesignation>3</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>202403</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>TPALA: Two Phase Adaptive Algorithm based on Learning Automata for job scheduling in cloud Environment</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Abolfazl Esfandi</PersonName><PersonNameInverted>Esfandi , Abolfazl</PersonNameInverted><NamesBeforeKey>Abolfazl</NamesBeforeKey><KeyNames>Esfandi</KeyNames></Contributor><Contributor><SequenceNumber>2</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Javad Akbari Torkestani</PersonName><PersonNameInverted>Akbari Torkestani , Javad</PersonNameInverted><NamesBeforeKey>Javad</NamesBeforeKey><KeyNames>Akbari Torkestani</KeyNames></Contributor><Contributor><SequenceNumber>3</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Abbas Karimi</PersonName><PersonNameInverted>Karimi , Abbas</PersonNameInverted><NamesBeforeKey>Abbas</NamesBeforeKey><KeyNames>Karimi</KeyNames></Contributor><Contributor><SequenceNumber>4</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Faraneh Zarafshan</PersonName><PersonNameInverted>Zarafshan , Faraneh</PersonNameInverted><NamesBeforeKey>Faraneh</NamesBeforeKey><KeyNames>Zarafshan</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>202403</PublicationDate><CopyrightStatement><CopyrightYear>2024</CopyrightYear><CopyrightOwner><PersonName>Javad Akbari Torkestani</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.61186/jist.40976.12.45.41</DOI><DOIWebsiteLink>http://jist.ir/Article/40976</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>4546</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>4546</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>12</JournalVolumeNumber><JournalIssueNumber>45</JournalIssueNumber><JournalIssueDesignation>3</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>202403</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>Image Fake News Detection using Efficient NetB0 Model</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Yasmine Almsrahad</PersonName><PersonNameInverted>Almsrahad , Yasmine</PersonNameInverted><NamesBeforeKey>Yasmine</NamesBeforeKey><KeyNames>Almsrahad</KeyNames></Contributor><Contributor><SequenceNumber>2</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Nasrollah  Moghaddam Charkari</PersonName><PersonNameInverted>Moghaddam Charkari , Nasrollah </PersonNameInverted><NamesBeforeKey>Nasrollah </NamesBeforeKey><KeyNames>Moghaddam Charkari</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>202403</PublicationDate><CopyrightStatement><CopyrightYear>2024</CopyrightYear><CopyrightOwner><PersonName>Yasmine Almsrahad</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.61186/jist.40342.12.45.49</DOI><DOIWebsiteLink>http://jist.ir/Article/40342</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>4546</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>4546</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>12</JournalVolumeNumber><JournalIssueNumber>45</JournalIssueNumber><JournalIssueDesignation>3</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>202403</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>An Analysis of the Signal-to-Interference Ratio in UAV-based Telecommunication Networks</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>hamid jafaripour</PersonName><PersonNameInverted>jafaripour , hamid</PersonNameInverted><NamesBeforeKey>hamid</NamesBeforeKey><KeyNames>jafaripour</KeyNames></Contributor><Contributor><SequenceNumber>2</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Mohammad Fathi</PersonName><PersonNameInverted>Fathi , Mohammad</PersonNameInverted><NamesBeforeKey>Mohammad</NamesBeforeKey><KeyNames>Fathi</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>202403</PublicationDate><CopyrightStatement><CopyrightYear>2024</CopyrightYear><CopyrightOwner><PersonName>hamid jafaripour</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.61186/jist.41465.12.45.62</DOI><DOIWebsiteLink>http://jist.ir/Article/41465</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>4546</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>4546</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>12</JournalVolumeNumber><JournalIssueNumber>45</JournalIssueNumber><JournalIssueDesignation>3</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>202403</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>Proposing an FCM-MCOA Clustering Approach Stacked with Convolutional Neural Networks for Analysis of Customers in Insurance Company</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Motahareh Ghavidel</PersonName><PersonNameInverted>Ghavidel , Motahareh</PersonNameInverted><NamesBeforeKey>Motahareh</NamesBeforeKey><KeyNames>Ghavidel</KeyNames></Contributor><Contributor><SequenceNumber>2</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>meisam Yadollahzadeh tabari</PersonName><PersonNameInverted>Yadollahzadeh tabari , meisam</PersonNameInverted><NamesBeforeKey>meisam</NamesBeforeKey><KeyNames>Yadollahzadeh tabari</KeyNames></Contributor><Contributor><SequenceNumber>3</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Mehdi Golsorkhtabaramiri</PersonName><PersonNameInverted>Golsorkhtabaramiri , Mehdi</PersonNameInverted><NamesBeforeKey>Mehdi</NamesBeforeKey><KeyNames>Golsorkhtabaramiri</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>202403</PublicationDate><CopyrightStatement><CopyrightYear>2024</CopyrightYear><CopyrightOwner><PersonName>meisam Yadollahzadeh tabari</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork><DOISerialArticleWork><NotificationType>06</NotificationType><DOI>10.61186/jist.44445.12.45.72</DOI><DOIWebsiteLink>http://jist.ir/Article/44445</DOIWebsiteLink><RegistrantName>Sinaweb</RegistrantName><RegistrationAuthority>mEDRA</RegistrationAuthority><SerialPublication><SerialWork><Title><TitleType>01</TitleType><TitleText>Journal of Information Systems and Telecommunication (JIST) </TitleText></Title><Title><TitleType>05</TitleType><TitleText>jist</TitleText></Title><Publisher><PublishingRole>01</PublishingRole><PublisherIdentifier><PublisherIDType>01</PublisherIDType><IDValue>4546</IDValue></PublisherIdentifier><PublisherName>RICEST</PublisherName></Publisher><CountryOfPublication>IR</CountryOfPublication></SerialWork><SerialVersion><ProductIdentifier><ProductIDType>01</ProductIDType><IDValue>4546</IDValue></ProductIdentifier><ProductForm>JB</ProductForm></SerialVersion></SerialPublication><JournalIssue><JournalVolumeNumber>12</JournalVolumeNumber><JournalIssueNumber>45</JournalIssueNumber><JournalIssueDesignation>3</JournalIssueDesignation><JournalIssueDate><DateFormat>01</DateFormat><Date>202403</Date></JournalIssueDate></JournalIssue><ContentItem><SequenceNumber>1</SequenceNumber><TextItem><TextItemType>10</TextItemType></TextItem><Title><TitleType>01</TitleType><TitleText>Persian Ezafe Recognition Using Neural Approaches</TitleText></Title><Contributor><SequenceNumber>1</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Habibollah Asghari</PersonName><PersonNameInverted>Asghari , Habibollah</PersonNameInverted><NamesBeforeKey>Habibollah</NamesBeforeKey><KeyNames>Asghari</KeyNames></Contributor><Contributor><SequenceNumber>2</SequenceNumber><ContributorRole>A01</ContributorRole><PersonName>Heshaam Faili</PersonName><PersonNameInverted>Faili , Heshaam</PersonNameInverted><NamesBeforeKey>Heshaam</NamesBeforeKey><KeyNames>Faili</KeyNames></Contributor><Language><LanguageRole>01</LanguageRole><LanguageCode>eng</LanguageCode></Language><PublicationDate>202403</PublicationDate><CopyrightStatement><CopyrightYear>2024</CopyrightYear><CopyrightOwner><PersonName>Habibollah Asghari</PersonName></CopyrightOwner></CopyrightStatement></ContentItem></DOISerialArticleWork></ONIXDOISerialArticleWorkRegistrationMessage>