﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051922</doi_batch_id><timestamp>20260519222841</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>6</month><day>24</day><year>2024</year></publication_date><journal_volume><volume>12</volume></journal_volume><issue>46</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A Comparison Analysis of Conventional Classifiers and Deep Learning Model for Activity Recognition in Smart Homes based on Multi-label Classification</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>John</given_name><surname>Kasubi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Manjaiah D. </given_name><surname>Huchaiah </surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ibrahim</given_name><surname>Gad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad Kazim </given_name><surname>Hooshmand</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>24</day><year>2024</year></publication_date><pages><first_page>127</first_page><last_page>137</last_page></pages><doi_data><doi>10.61186/jist.36294.12.46.127</doi><resource>http://jist.ir/en/Article/36294</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/36294</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/36294</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/36294</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/36294</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/36294</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/36294</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/36294</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	De-La-Hoz-Franco, E, et al. "Sensor-based datasets for human activity recognition–a systematic review of the literature." IEEE Access 6 (2018): 59192-59210.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	 Fang, Z., Wang, Y., Peng, L., &amp; Hong, H. Integration of convolutional neural network and conventional machine learning classifiers for landslide susceptibility mapping. Computers &amp; Geosciences, (2020):139, 104470.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	Jyotiyana, M, Nishtha, K, and Munish, K. "A Deep Learning Approach for Classification and Diagnosis of Parkinson's Disease." (2021).</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	Mohammadi, Mehdi, et al. "Deep learning for IoT big data and streaming analytics: A survey." IEEE Communications Surveys &amp; Tutorials 20.4 (2018): 2923-2960.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	Hassan, Mohammed Mehedi, et al. "A robust human activity recognition system using smartphone sensors and deep learning." Future Generation Computer Systems 81 (2018): 307-313.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	Natani, A, Abhishek, S, Thinagaran, P, and Suman, S. "Deep learning for multi-resident activity recognition in ambient sensing smart homes." In 2019 IEEE 8th Global conference on consumer electronics (GCCE), pp. 340-341. IEEE, 2019. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	Bhattacharjee, S, Swapnil, K, and Aleena, S. "A comparative study of supervised learning techniques for human activity monitoring using smart sensors." 2018 Second International Conference on Advances in Electronics, Computers, and Communications (ICAECC). IEEE, 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	Jindong, W, Yiqiang, C, Shuji, H, Xiaohui, P, and Lisha, H. Deep learning for sensor-based activity recognition: A survey. Pattern Recognition Letters, 119:3-11, 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	Daniele, L, Michele, B, Luca, R, and Emanuele, F. A sequential deep learning application for recognizing human activities in smart homes. Neurocomputing, 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	Homay, D, M and Huseyin, P. Human activity recognition in Smart Homes with the deep learning approach. In 2019 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG), pages 149-153. IEEE, 2019. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	Vakili, M, M, G and Masoumeh, R. "Performance Analysis and Comparison of Machine and Deep Learning Algorithms for IoT Data Classification." arXiv preprint arXiv:2001.09636 (2020).</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	Alshammari, Talal, et al. "Evaluating machine learning techniques for activity classification in smart home environments." Int. J. Comput. Electr. Autom. Control Inf. Eng 12 (2018): 48-54.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	Son N T, Dung N, Tung-Son, N, Xuan-Son, V, Long, H, Qing, Z, and Mohan, K. On multi-resident activity recognition in ambient smart- homes. Arti_cial Intelligence Review, pages 1-17, 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	 Park, J, Kiyoung, J, and Sung-Bong, Y. "Deep neural networks for activity recognition with multi-sensor data in a smart home." 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). IEEE, 2018.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	Akour, Mohammed, et al. "The effectiveness of using deep learning algorithms in predicting daily activities." International Journal 8.5 (2019).</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	Yun, J, and Jiyoung, W. "A Comparative Analysis of Deep Learning and Machine Learning on Detecting Movement Directions Using PIR Sensors." IEEE Internet of Things Journal 7.4 (2019): 2855-2868.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	Djavanshir, G. R., Chen, X., &amp; Yang, W. A Review of Artificial Intelligence's Neural Networks (Deep Learning) Applications in Medical Diagnosis and Prediction. IT Professional, 23(3), 58-62, 2021.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	Chen, K., Zhang, D., Yao, L., Guo, B., Yu, Z., &amp; Liu, Y. Deep Learning for Sensor-based Human Activity Recognition: Overview, Challenges, and Opportunities. ACM Computing Surveys (CSUR), 54(4), 1-40, 2021.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	Liaqat, S., Dashtipour, K., Shah, S. A., Rizwan, A., Alotaibi, A. A., Althobaiti, T., &amp; Ramzan, N. Novel Ensemble Algorithm for Multiple Activity Recognition in Elderly People Exploiting Ubiquitous Sensing Devices. IEEE Sensors Journal, 2021.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	Siirtola, P., &amp; Röning, J. Context-aware incremental learning-based method for personalized human activity recognition. Journal of Ambient Intelligence and Humanized Computing, 1-15, 2021.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	Tarafdar, P., &amp; Bose, I. Recognition of human activities for wellness management using a smartphone and a smartwatch: a boosting approach. Decision Support Systems, 140, 113426, 2021.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	Sekiguchi, R, Kenji, A, Takumi, Y, Masayasu, K, and Masaki, K. "Ensemble learning for human activity recognition." In Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers, pp. 335-339. 2020.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	Indumathi, V, and S. Prabakeran. "A Comparative Analysis on Sensor-Based Human Activity Recognition Using Various Deep Learning Techniques." In Computer Networks, Big Data and IoT, pp. 919-938. Springer, Singapore, 2021.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	 Jian, Q, Shisheng, G, Pengyun, C, Peilun, W, and Guolong, C. "A Robust Real-time Human Activity Recognition method Based on Attention-Augmented GRU." In 2021 IEEE Radar Conference (RadarConf21), pp. 1-5. IEEE, 2021.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	Hashim, B, A Mohammed, and R. Amutha. "Machine Learning-based Human Activity Recognition using Neighbourhood Component Analysis." In 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), pp. 1080-1084. IEEE, 2021.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	Liu, Y, Yong, M, Keyu, C, Yiming, L, and Jinghuan, G. "Daily activity feature selection in smart homes based on Pearson correlation coefficient." Neural Processing Letters (2020): 1-17.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	Montazery, M, and Nic W. "Scaling-invariant maximum margin preference learning." International Journal of Approximate Reasoning 128 (2021): 69-101.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	Hamad, R, A, Masashi, K, and Jens, L. "Efficacy of imbalanced data handling methods on deep learning for smart homes environments." SN Computer Science 1, no. 4 (2020): 1-10.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	 Hande, A and Cem, E. Multi-resident activity tracking and recognition in smart environments. Journal of Ambient Intelligence and Humanized Computing, 8(4):513-529, 2017.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	Yacouby, R, and Dustin, A. "Probabilistic Extension of Precision, Recall, and F1 Score for More Thorough Evaluation of Classification Models." </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Aspect-Level Sentiment Analysis Based on LDA Topic Modeling</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Sina</given_name><surname>Dami</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ramin</given_name><surname>Alimardani</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>24</day><year>2024</year></publication_date><pages><first_page>117</first_page><last_page>126</last_page></pages><doi_data><doi>10.61186/jist.38104.12.46.117</doi><resource>http://jist.ir/en/Article/38104</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/38104</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/38104</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/38104</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/38104</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/38104</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/38104</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/38104</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>Luo F, Li C, Cao Z. Affective-feature-based sentiment analysis using SVM classifier. In2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD) 2016 May 4 (pp. 276-281). IEEE.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>Ma Y, Peng H, Cambria E. Targeted aspect-based sentiment analysis via embedding commonsense knowledge into an attentive LSTM. InThirty-second AAAI conference on artificial intelligence 2018 Apr 26.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>Dami S. News Events Prediction Based on Casual Inference in First-Order Logic (FOL). Journal of Soft Computing and Information Technology. 2016 Dec 21;5(4):11-25.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>Dami S, Barforoush AA, Shirazi H. News events prediction using Markov logic networks. Journal of Information Science. 2018 Feb;44(1):91-109.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>Rezaei A, Dami S, Daneshjoo P. Multi-document extractive text summarization via deep learning approach. In2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI) 2019 (pp. 680-685). IEEE.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>Dami S, Yahaghizadeh M. Efficient event prediction in an IOT environment based on LDA model and support vector machine. In2018 6th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS) 2018 Feb (pp. 135-138). IEEE.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>Emami H, Dami S, Shirazi H. K-Harmonic Means Data Clustering With Imperialist Competitive Algorithm. University Politehnica of Bucharest-Scientific Bulletin, Series C: Electrical Engineering and Computer Science. 2015 Feb;77(7).</unstructured_citation></citation><citation key="ref8"><unstructured_citation>García-Pablos A, Cuadros M, Rigau G. W2VLDA: almost unsupervised system for aspect based sentiment analysis. Expert Systems with Applications. 2018 Jan 1;91:127-37.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>Goswami S, Nandi S, Chatterjee S. Sentiment analysis based potential customer base identification in social media. InContemporary Advances in Innovative and Applicable Information Technology 2019 (pp. 237-243). Springer, Singapore.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>Araque O, Corcuera-Platas I, Sánchez-Rada JF, Iglesias CA. Enhancing deep learning sentiment analysis with ensemble techniques in social applications. Expert Systems with Applications. 2017 Jul 1;77:236-46.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>Zhou Q, Xu Z, Yen NY. User sentiment analysis based on social network information and its application in consumer reconstruction intention. Computers in Human Behavior. 2019 Nov 1;100:177-83.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>Moraes R, Valiati JF, Neto WP. Document-level sentiment classification: An empirical comparison between SVM and ANN. Expert Systems with Applications. 2013 Feb 1;40(2):621-33.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>Shirsat VS, Jagdale RS, Deshmukh SN. Sentence level sentiment identification and calculation from news articles using machine learning techniques. InComputing, Communication and Signal Processing 2019 (pp. 371-376). Springer, Singapore.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>Al-Smadi M, Qawasmeh O, Al-Ayyoub M, Jararweh Y, Gupta B. Deep Recurrent neural network vs. support vector machine for aspect-based sentiment analysis of Arabic hotels’ reviews. Journal of computational science. 2018 Jul 1;27:386-93.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>Ozyurt B, Akcayol MA. A new topic modeling based approach for aspect extraction in aspect based sentiment analysis: SS-LDA. Expert Systems with Applications. 2021 Apr 15;168:114231.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>Parveen N, Santhi MV, Burra LR, Pellakuri V, Pellakuri H. Women’s e-commerce clothing sentiment analysis by probabilistic model LDA using R-SPARK. Materials Today: Proceedings. 2021 Jan 6.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>Xie R, Chu SK, Chiu DK, Wang Y. Exploring public response to COVID-19 on Weibo with LDA topic modeling and sentiment analysis. Data and Information Management. 2021;5(1):86-99.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>Ali T, Marc B, Omar B, Soulaimane K, Larbi S. Exploring destination's negative e-reputation using aspect based sentiment analysis approach: Case of Marrakech destination on TripAdvisor. Tourism Management Perspectives. 2021 Oct 1;40:100892.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>AlGhamdi N, Khatoon S, Alshamari M. Multi-aspect oriented sentiment classification: Prior knowledge topic modelling and ensemble learning classifier approach. Applied Sciences. 2022 Apr 18;12(8):4066.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>Venugopalan M, Gupta D. An enhanced guided LDA model augmented with BERT based semantic strength for aspect term extraction in sentiment analysis. Knowledge-based systems. 2022 Jun 21;246:108668.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>Chen P, Sun Z, Bing L, Yang W. Recurrent attention network on memory for aspect sentiment analysis. InProceedings of the 2017 conference on empirical methods in natural language processing 2017 Sep (pp. 452-461).</unstructured_citation></citation><citation key="ref22"><unstructured_citation>Dou ZY. Capturing user and product information for document level sentiment analysis with deep memory network. InProceedings of the 2017 Conference on Empirical Methods in Natural Language Processing 2017 Sep (pp. 521-526).</unstructured_citation></citation><citation key="ref23"><unstructured_citation>Mahadevaswamy UB, Swathi P. Sentiment analysis using bidirectional LSTM network. Procedia Computer Science. 2023 Jan 1;218:45-56.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>Edara DC, Vanukuri LP, Sistla V, Kolli VK. Sentiment analysis and text categorization of cancer medical records with LSTM. Journal of Ambient Intelligence and Humanized Computing. 2023 May;14(5):5309-25.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>Iparraguirre-Villanueva O, Alvarez-Risco A, Herrera Salazar JL, Beltozar-Clemente S, Zapata-Paulini J, Yáñez JA, Cabanillas-Carbonell M. The public health contribution of sentiment analysis of Monkeypox tweets to detect polarities using the CNN-LSTM model. Vaccines. 2023 Jan 31;11(2):312.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>Mohbey KK, Meena G, Kumar S, Lokesh K. A CNN-LSTM-Based Hybrid Deep Learning Approach for Sentiment Analysis on Monkeypox Tweets. New Generation Computing. 2023 Aug 14:1-9.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>Xu J, Chen D, Qiu X, Huang X. Cached long short-term memory neural networks for document-level sentiment classification. arXiv preprint arXiv:1610.04989. 2016 Oct 17.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>Wang J, Yu LC, Lai KR, Zhang X. Dimensional sentiment analysis using a regional CNN-LSTM model. InProceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers) 2016 Aug (pp. 225-230).</unstructured_citation></citation><citation key="ref29"><unstructured_citation>Wang J, Yu LC, Lai KR, Zhang X. Tree-structured regional CNN-LSTM model for dimensional sentiment analysis. IEEE/ACM Transactions on Audio, Speech, and Language Processing. 2019 Dec 11;28:581-91.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>Amin J, Sharif M, Raza M, Saba T, Sial R, Shad SA. Brain tumor detection: A long short-term memory (LSTM)-based learning model. Neural Computing and Applications. 2020 Oct;32(20):15965-73.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>Dami S, Yahaghizadeh M. Predicting cardiovascular events with deep learning approach in the context of the internet of things. Neural Computing and Applications. 2021 Jan 3:1-8.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>Dami S, Esterabi M. Predicting stock returns of Tehran exchange using LSTM neural network and feature engineering technique. Multimedia Tools and Applications. 2021 May;80(13):19947-70.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>Dami S. Internet of things-based health monitoring system for early detection of cardiovascular events during COVID-19 pandemic. World Journal of Clinical Cases. 2022 Sep 9;10(26):9207.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>Aurangzeb K, Ayub N, Alhussein M. Aspect Based Multi-Labeling Using SVM Based Ensembler. IEEE Access. 2021 Feb 1;9:26026-40.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>Yang Y, Jiang J. Adaptive bi-weighting toward automatic initialization and model selection for HMM-based hybrid meta-clustering ensembles. IEEE transactions on cybernetics. 2018 Mar 27;49(5):1657-68.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>Liao S, Wang J, Yu R, Sato K, Cheng Z. CNN for situations understanding based on sentiment analysis of twitter data. Procedia computer science. 2017 Jan 1;111:376-81.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>Kumar V, Pujari AK, Padmanabhan V, Kagita VR. Group preserving label embedding for multi-label classification. Pattern Recognition. 2019 Jun 1;90:23-34.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>Wu G, Zheng R, Tian Y, Liu D. Joint ranking SVM and binary relevance with robust low-rank learning for multi-label classification. Neural Networks. 2020 Feb 1;122:24-39.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>Ni J, Li J, McAuley J. Justifying recommendations using distantly-labeled reviews and fine-grained aspects. InProceedings of the 2019 conference on empirical methods in natural language processing and the 9th international joint conference on natural language processing (EMNLP-IJCNLP) 2019 Nov (pp. 188-197).</unstructured_citation></citation><citation key="ref40"><unstructured_citation>Wan M, Ni J, Misra R, McAuley J. Addressing marketing bias in product recommendations. InProceedings of the 13th international conference on web search and data mining 2020 Jan 20 (pp. 618-626).</unstructured_citation></citation><citation key="ref41"><unstructured_citation>Jahanbakhsh Gudakahriz S, Eftekhari Moghaddam AM, Mahmoudi F. An Experimental Study on Performance of Text Representation Models for Sentiment Analysis. Journal of Information Systems and Telecommunication (JIST). 2020 Jul;1(29):45.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>Chandra N, Ahuja L, Khatri SK, Monga H. Utilizing Gated Recurrent Units to Retain Long Term Dependencies with Recurrent Neural Network in Text Classification. Journal of Information Systems and Telecommunication (JIST). 2021 May;2(34):89.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>Xiong H, Yan H, Zeng Z, Wang B. Dependency Parsing and Bidirectional LSTM-CRF for Aspect-level Sentiment Analysis of Chinese. InJIST (Workshops &amp; Posters) 2018 (pp. 90-93)</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Acoustic Echo Canceller using Moving Window to Track Energy Variations of Double-Talk-Detector</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mouldi </given_name><surname>MAKDIR</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohamed </given_name><surname>BOUAMAR</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mourad</given_name><surname>BENZIANE</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>24</day><year>2024</year></publication_date><pages><first_page>105</first_page><last_page>116</last_page></pages><doi_data><doi>10.61186/jist.40125.12.46.105</doi><resource>http://jist.ir/en/Article/40125</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/40125</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/40125</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/40125</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/40125</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/40125</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/40125</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/40125</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Benesty, T. Gänsler, D. R. Morgan, M. M. Sondhi, S. L. Gay, “Advances in network and acoustic echo cancellation. Digital Signal Processing,” Springer, Berlin, Heidelberg, 2001.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. M. Sondhi, “An adaptive echo canceler,” The Bell Syst, Technical journal, Vol. 46, No. 3, 1967,  pp. 497–511.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. M. Gil-Cacho, “Adaptive filtering algorithms for Acoustic Echo Cancellation and Acoustic feedback control in speech communication applications,” PhD. Thesis, University of Belgium Ku Leuven, 2013.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Haykin, “Adaptive filter Theory,” Prentice-Hall, Inc, Upper Saddle River, NJ, USA, 1996.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Benesty, T. Gänsler, “Audio signal processing for next generation multimedia communication systems,” Kluwer Academic Publishers, 2004.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. Huang, J. Zhang, S. Zhang, “Combined-step size affine projection sign algorithm for robust adaptive filtering in impulsive interference environments,” IEEE Transactions on Circuits and Systems II: Express Briefs, Vol. 63, No. 5, 2015, pp. 493-497.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. R. Chien, J. Li-You, “Convex combined adaptive filtering algorithm for acoustic echo cancellation in hostile environments,” IEEE Access, Vol. 6, 2018, pp. 16138-16148.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. Duttweiler, “A twelve-channel digital echo canceler,” IEEE Transactions on Communications, Vol. 26, No. 5, 1978, pp.  647-653.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Ye, B. X. Wu, “A new double-talk detection algorithm based on the orthogonality theorem,” IEEE Transactions on Communications, Vol. 39, No. 39, 1991, pp. 1542-1545.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Benesty, D. R. Morgan, J. H. Cho, “A new class of double-talk detectors based on cross-correlation,” IEEE Transactions on Speech and Audio Processing, Vol. 8, No. 2, 2000, pp. 168-172.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. A. Iqbal, J. W. Stokes, S. L. Grant, “Normalized double-talk detection based on microphone and AEC error cross- correlation,” IEEE International Conference on Multimedia and Expo, 2007, pp. 360-363.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	P. S. R. Diniz, “Adaptive Filtering Algorithms and Practical Implementation,” Springer, 2013.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Hajiabadi, “Acoustic Noise Cancellation Using an Adaptive Algorithm Based on Correntropy Criterion and Zero Norm Regularization,” JIST Journal of Information Systems and Telecommunication, Vol. 3, No. 3, 2015, pp. 150-156.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Hun, Choi.Hyeon-Deok, Bae, “Subband Afﬁne Projection Algorithm for Acoustic Echo Cancellation System,” EURASIP Journal on Advances in Signal Processing, 2007, pp. 1-12.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	B. H. Yang, “An adaptive filtering algorithm for non-Gaussian signals in alpha-stable distribution,” Traitement du Signal, Vol. 37, No. 1, 2020, pp.69-75.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>  
[16]	S. Hannah, D. Samiappan , R. Kumar , A. Anand, A. Kar,  “Variable tap-length non-parametric variable step-size NLMS adaptive filtering algorithm for acoustic echo cancellation,” Applied Acoustics, Vol. 159, 2020.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Hamidia, A. Amrouche, “A new robust double-talk detector based on the Stockwell transform for acoustic echo cancellation,” Digital Signal Processing, Vol. 60, 2017, pp. 99-112.
[18]	V. Thien-An, H. Ding, M. Bouchard, “A survey of double-talk detection schemes for echo cancellation applications,” Canadian Acoustics, Vol. 32, No. 3, 2004, pp. 144-145.
[19]	M. Benziane, M. Bouamar, M. Makdir, “Doubletalk detection based on enhanced Geigel algorithm for acoustic echo cancellation,” In 2018 6th International Conference on Control Engineering &amp; Information Technology (CEIT), 2018, pp. 1-5.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[20]	T. Gänsler, J. Benesty, “A frequency-domain double-talk detector based on a normalized cross-correlation vector,” Signal Processing, Vol. 81, No 8, 2001, pp. 1783–1787.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[21]	J. Benesty, T. Gänsler, “A multichannel acoustic echo canceler double-talk detector based on a normalized cross-correlation matrix*,” European Transactions on Telecommunications, Vol. 13, No 2, 2002, pp. 95–101.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[22]	T. Gänsler, J. Benesty, “The fast normalized cross-correlation double-talk detector,” Signal Process, Vol. 86, No. 6, 2006, pp. 1124–1139.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[23]	T. Gansler, M. Hansson, C.J.Ivarsson, G. Salomonsson, “A double-talk detector based on coherence,”IEEE Transactions on Communications, Vol. 44, No. 11, 1996, pp. 1421-1427.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[24]	H. Bao, Y. Yang, J. Liu, X. Ba, Q. Yuan, “A robust algorithm of double talk detection based on voice activity detection,” Proc. Inter. conf. on Audio Language and Image Processing, 2010, pp. 12–15.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[25]	S. Cecchi, L. Romoli, F. Piazza,  “Multichannel Double-Talk Detector based on Fundamental Frequency Estimation,” IEEE Signal Processing Letters, Vol. 23, No. 1, 2016, pp. 94-97.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[26]	Y. Zhenhai, F. Yang, J. Yang, “Optimum step-size control for a variable step-size stereo acoustic echo canceller in the frequency domain,” Speech Communication, Vol. 124, 2020, pp. 21–27.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[27]	S. J. Park, C. G. Cho, C. Lee, D. H. Youn, S. H. Park, “Integrated echo and noise canceller for hands free applications,” IEEE Transactions on circuits and systems, Part II, Analog and Digital Signal Processing, Vol. 49, No. 3, 2002, pp. 188-195. </unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[28]	Y. Hua, “Adaptive filter theory and applications,” PhD. Thesis, South-East university, China, 1989.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[29]	Honig, M.L., Messerschmitt, D.G., “Adaptive Filters,” Kluwer, 1984.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[30]	M. Benziane, M. Bouamar, M. Makdir, “Simple and Efficient Double-Talk-Detector for Acoustic Echo Cancellation,” Traitement du signal, Vol. 37, No. 4, 2020, pp. 585-592.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[31]	ITU-T. “Digital Network Echo Cancellers,” Recommendation G.168, International Telecommunication Union; Geneva, 2007.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[32]	Y. Hu, P. C. Loizou, “Subjective comparison and evaluation of speech enhancement algorithms,” Speech Communication , Vol. 49, No. 7, 2007, pp. 588-601.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[33]	H. Wonchul, K. Taehwan, B. Keunsung, “Robust double-talk detection in the acoustic echo canceller using normalized error signal power,” Proc. ISSPA’07.UAE, 2007, pp. 1-4.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[34]	J.H. Cho, D.R. Morgan, J. Benesty., “An objective technique for evaluating doubletalk detectors in acoustic echo cancelers,” IEEE Transactions on Speech and Audio Processing, Vol. 7, No. 6, 1999, pp. 718–724.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[35]	ITU-T. “Digital Network Echo Cancellers,” Recommendation G.131, International Telecommunication Union; Geneva, 2003.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Designing a Semi-Intelligent Crawler for Creating a Persian Question Answering Corpus Called Popfa</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hadi</given_name><surname>Sharifian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Nasim</given_name><surname>Tohidi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Chitra</given_name><surname>Dadkhah</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>24</day><year>2024</year></publication_date><pages><first_page>138</first_page><last_page>151</last_page></pages><doi_data><doi>10.61186/jist.40961.12.46.138</doi><resource>http://jist.ir/en/Article/40961</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/40961</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/40961</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/40961</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/40961</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/40961</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/40961</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/40961</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	R. French, "The Turing Test: The first 50 years," Trends in Cognitive Sciences, vol. 4, no. 3, pp. 115-122, 2000. </unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2] 	Khalifeh Zadeh, Zahra; Zare Chahooki, Mohammad Ali;, "An Effective Method of Feature Selection in Persian Text for Improving the Accuracy of Detecting Request in Persian Messages on Telegram," Journal of Information Systems and Telecommunication (JIST), vol. 8, no. 32, pp. 249-262, 2021. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3] 	Tohidi, Nasim; Hasheminejad, Seyed Mohammad Hossein, "A Practice of Human-Machine Collaboration for Persian Text Summarization," in The 27th International Computer Conference, Tehran, 2022. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4] 	Hoseinmardy, Ali; Momtazi, Saeedeh;, "Recognizing Transliterated English Words in Persian Texts," Journal of Information Systems and Telecommunication (JIST), vol. 8, no. 30, pp. 84-92, 2020. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5] 	Tohidi, Nasim; Dadkhah, Chitra; Rustamov, Rustam B., "Optimizing Persian multi-objective question answering system," International Journal on Technical and Physical Problems of Engineering (IJTPE), vol. 13, no. 46, 2021. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6] 	Tohidi, Nasim; Dadkhah, Chitra; Rustamov, Rustam B., "Optimizing the Performance of Persian Multi-objective question answering system," in The 16th International Conference on Technical and Physical Problems of Engineering, Istanbul, Turkey, 2020. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7] 	C. P. Masica, The Indo-Aryan Languages, New York: Cambridge University Press, 1993. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8] 	Khashabi, Daniel; Cohan, Arman; Shakeri, Siamak; Hosseini, Pedram; Pezeshkpour, Pouya; Alikhani, Malihe; Aminnaseri, Moin; Bitaab, Marzieh; Brahman, Faeze; Ghazarian, Sarik; Gheini, Mozhdeh; Kabiri, Arman; Karimi Mahabagdi, Rabeeh; Memarrast, Omid; et al., "ParsiNLU: A Suite of Language Understanding Challenges for Persian," Transactions of the Association for Computational Linguistics, vol. 9, p. 1147–1162, 2021. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9] 	E. M. Voorhees, "The TREC-8 Question Answering Track Report (1999)," in In Proceedings of TREC-8, 1999. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10] 	Tohidi, Nasim; Hasheminejad, Seyed Mohammad Hossein, "MOQAS: Multi-objective question answering system," Journal of Intelligent &amp; Fuzzy Systems, vol. 36, no. 4, pp. 3495-3512, 2019. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11] 	Khodadi, I.; Saniee Abadeh, M., "Genetic programming-based feature learning for question answering," Elsevier, Information Processing and Management, vol. 40, 2015. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12] 	Joshi, Mandar; Choi, Eunsol; Weld, Daniel; Zettlemoyer, Luke, "TriviaQA: A Large Scale Distantly Supervised Challenge Dataset for Reading Comprehension," in Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, Vancouver, Canada, 2017. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13] 	Muttaleb Hasan, Ali; Zakaria, Lailatul Qadri, "Question classification using support vector machine and pattern matching," Journal of Theoretical and Applied Information Technology , vol. 87, no. 2, pp. 259-265, 2005. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14] 	Veisi, Hadi; Fakour Shandi, Hamed, "A Persian Medical Question Answering System," International Journal on Artificial Intelligence Tools, vol. 29, no. 6, 2020. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15] 	Aleahmad, Abolfazl; Amiri, Hadi; Darrudi, Ehsan; Oroumchian, Farhad;, "Hamshahri: A standard Persian text collection," Knowledge-Based Systems, vol. 22, no. 5, pp. 382-387, 2009. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16] 	Mollaei, Ali; Rahati Quchani, Saeed; Estaji, Azam, "Question classification in Persian language based on conditional random fields," in 2nd International eConference on Computer and Knowledge Engineering (ICCKE), 2012. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17] 	Sherkat, Ehsan; Farhoodi, Mojgan, "A Hybrid Approach for Question Classification in Persian Automatic Question Answering Systems," in 4th International eConference on Computer and Knowledge Engineering (ICCKE), Mashahd, Iran, 2014. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18] 	A. P. Ben Veyseh, "Cross-Lingual Question Answering Using Common Semantic Space," in Proceedings of the 2016 Workshop on Graph-based Methods for Natural Language Processing, San Diego, California, 2016. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19] 	Boreshban, Yasaman; Yousefinasa, Hamed; Mirroshandel, Seyed Abolghasem, "Providing a Religious Corpus of Question Answering System in Persian," Signal and Data Processing, vol. 15, no. 1, pp. 87-102, 2018. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20] 	Etezadi, Romina; Shamsfard, Mehrnoush, "PeCoQ: A Dataset for Persian Complex Question Answering over Knowledge Graph," in 11th International Conference on Information and Knowledge Technology (IKT), Tehran, Iran, 2020. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21] 	Abadani, Negin; Mozafari, Jamshid; Fatemi, Afsaneh; Nematbakhsh, Mohamadali; Kazemi, Arefeh, "ParSQuAD: Persian Question Answering Dataset based on Machine Translation of SQuAD 2.0," International Journal of Web Research, vol. 4, no. 1, pp. 34-46, 2021. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22] 	Kazemi, Arefeh; Mozafari, Jamshid; Nematbakhsh, Mohammad Ali, "PersianQuAD: The Native Question Answering Dataset for the Persian Language," IEEE Access, vol. 10, pp. 26045-26057, 2022. </unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23] 	Darvishi, Kasra; Shahbodagh, Newsha; Abbasiantaeb, Zahra; Momtazi, Saeedeh, "PQuAD: A Persian Question Answering Dataset," arXiv:2202.06219, 2022. </unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24] 	Jurafsky, Daniel; Martin, James H., Speech and Language Processing, Upper Saddle River, NJUnited States: Prentice Hall, 2019. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25] 	Radev, Dragomir R.; Qi, Hong; Wu, Harris; Fan, Weiguo, "Evaluating Web-based Question Answering Systems," in The Third International Conference on Language Resources and Evaluation (LREC’02), Las Palmas, Canary Islands - Spain, 2002. </unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26] 	Järvelin, Kalervo; Kekäläinen, Jaana, "Cumulated gain-based evaluation of IR techniques," ACM Transactions on Information Systems, vol. 20, no. 4, pp. 422-446, 2002. </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Ensemble learning of daboosting based on deep weighting for classification of hand-written numbers in Persian</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>amir</given_name><surname>asil</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>hamed</given_name><surname>Alipour</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Shahram</given_name><surname>mojtahedzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>hasan</given_name><surname>Asil</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>24</day><year>2024</year></publication_date><pages><first_page>162</first_page><last_page>169</last_page></pages><doi_data><doi>10.61186/jist.41053.12.46.162</doi><resource>http://jist.ir/en/Article/41053</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/41053</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/41053</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/41053</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/41053</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/41053</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/41053</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/41053</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Maziyar Kazemi, Muhammad Yousefnezhad, Saber Nourian, "Persian Handwritten Letter Recognition Using Ensemble SVM Classifiers Based on Feature Extraction", National Conference on Intelligent Systems and Information and Communications Technology, At Tabriz, Iran, Volume: 12</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	Addakiri K., Bahaj M. (2012) "On-line Handwritten Arabic Character Recognition using Artificial Neural Network", International Journal of Computer Applications (IJCA), Volume 55. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	Alizadeh H., Yous efnezhad M., Minaei-Bidgoli B. (2015)"Wisdom of Crowds Cluster Ensemble", Intelligent Data Analysis, IOS Press, Vol. 19(3).</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	sadafsafavi,mehrdad jalali,Recommendation model of places of interest according to people's behavior pattern based on friends list based on deep learning,Journal of Information Systems and Telecommunication (JIST),2021-11-17,http://ijece.org/en/Article/29095</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	Jamshid bagherzadeh, hasan asil, proposing a New Method of Image Classification Based on the AdaBoost Deep Belief Network Hybrid Method, TELKOMNIKA, Vol 17, No 5, 2019</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	Mohammad Ebrahim Khademi,Mohammad Fakhredanesh,Farsi Conceptual Text Summarizer: A New Model in Continuous Vector Space,Journal of Information Systems and Telecommunication (JIST),2019-11-04,http://jist.ir/en/Article/15222</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	Cheng Ju and Aur´elien Bibaut and Mark J. van der Laan, The Relative Performance of Ensemble Methods with Deep Convolutional Neural Networks for Image Classification, cornell University,2017: arXiv:1704.01664v1 [stat.ML] 5 Apr 2017</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	amin Ollah Mah Abadi, Abdolmajid Jazemian,” Fuzzy diagnosis of Persian handwritten numbers”، THE CSI JOURNAL ON COMPUTER SCIENCE AND ENGINEERING, no 4, 2006</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	Najmeh Ghanbari, mohamad Razavi, hasan Nabavi,” A Smart Properties Selection Method Based on Binary Gravitational Search Algorithm in Persian Handwriting Number Recognition System”, Electrical and Computer Engineering of Iran, 2011</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	esmaiel miri,mohamad razavi, javad razavi, “The effect of clustering on the recognition of Persian manuscript cultivars with fuzzy classifier” ,2016</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	ehsan jabir, reza jabir, reza ebrahimpour,” A combination of two-class clauses for recognizing Persian manuscript cultivars”, 16th Iranian Electrical Engineering Conference, 2007</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	Corinna Cortes, Mehryar Mohri, Umar Syed, Deep Boosting, e 31 st International Conference on Machine Learning, Beijing, China, 2014</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	Jafar tanha, Ensemble approaches to semi-supervised learning, UvA-DARE (Digital Academic Repository),2013,http://hdl.handle.net/11245/1.393046</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	Ji Zhu, Hui Zou, Saharon Rosset and Trevor Hastie, Multi-class AdaBoost, Statistics and Its Interface Volume 2, 2009 349–360</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	Freund, Y. and Schapire, R. A decision theoretic generalization of on-line learning and an application to boosting. Journal of Computer and System Sciences, 1997 119–139 MR1473055</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	Friedman, J. Greedy function approximation: a gradient boosting machine. Annals of Statistics, 2001 1189–1232. MR1873328</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	Friedman, J., Hastie, T., and Tibshirani, R. Additive logistic regression: a statistical view of boosting. Annals of Statistics 2000, 337–407. MR1790002</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	Jamshid bagherzadeh, hasan asil, proposing a New Method of Image Classification Based on the AdaBoost Deep Belief Network Hybrid Method, TELKOMNIKA, Vol 17, No 5, 2019</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	N-ary Decomposition for Multi-class Classification. Machine Learning Journal (MLJ), 2019</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	Learning with Annotation of Various Degrees, IEEE Transactions on Neural Network and Learning Systems (TNNLS), 2019. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	Farrokhi, Alireza and Razavi, Seyed Nasser, Recognition of handwritten digits using deep learning, International Conference on Nonlinear Systems and Optimization of Electrical and Computer Engineering, 2014, https://civilica.com/doc/383305</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	Mehdi Noroozi and Paolo Favaro. “Unsupervised learning of visual representations by solving jigsaw puzzles”. In European Conference on Computer vision.Pages 69–84. Springer. 2016</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	Karen Simonyi and Andrew Zisserman. Very deep convolutional networks for large scale image recognition. ArXiv preprint arXiv: 1409.1556, 2014.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	Pourqasem, Hossein and Hel Forosh, Mohammad Sadegh and Daneshvar, Sablan, Semantic classification of text images based on text value model, 2017, https://civilica.com/doc/1372237</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	Aslimi Zamanjani, Javad and Shakur, Mohammad Hossein and Rahmani, Mohsen, Classification of noisy texture images using deep neural network and complete local binary pattern, 2021, https://civilica.com/doc/1362855</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	Shahabinejad, Athara and Iftikhari, Mehdi, Image classification using deep convolutional neural networks based on distributed attention and Bayes inference, 5th National Technology Conference in Electrical and Computer Engineering, 2021, https:// civilica.com/doc/1281540</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	Babaian, Vahidah and Madiri, Shaghaigh and Behlgardi, Seyedah Kausar, Classification of images using deep neural networks, The 5th National Conference on the Application of New Technologies in Engineering Sciences, Torbat Heydarieh, 2018, https://civilica.com/doc /1202833</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	Transfer Hashing: From Shallow to Deep, IEEE Transactions on Neural Network and Learning Systems (TNNLS), 2018</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[29]	Harri Valpola. From neural PCA to deep unsupervised learning. In Adv. in Independent Component Analysis and Learning Machines, pages 143–171. Elsevier, 2015.arXiv:1411.7783.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[30]	Learning Common and Feature-Specific Patterns: A Novel Multiple-Sparse-Representation-Based Tracker. IEEE Trans. Image Processing 27(4): 2022-2037 (2018)</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[31]	Aaron vandenOord, NalKalchbrenner, Pixel Recurrent Neural Networks, international Conference on Machine Learning, New York, NY, USA, 2016 ,2016,arXiv:1601.06759v3</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[32]	Jamishid Bagherzadeh, Hasan Asil, A review of various semi-supervised learning models with a deep learning and memory approach, Iran Journal of Computer Science, 2018</unstructured_citation></citation><citation key="ref33"><unstructured_citation>[33]	Alex Krizhevsky, IlyaSutskever, and Geoffrey E Hinton.Imagenet classiﬁcation with deep convolutional neural networks. IN Advances in neural information processing systems, pages 1097–1105, 2012.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>[34]	Christian Szegedy, Wei Liu, YangqingJia, Pierre Sermanet, Scott Reed, DragomirAnguelov, DumitruErhan, </unstructured_citation></citation><citation key="ref35"><unstructured_citation>[35]	Andrej Karpathy, George Toderici, SankethShetty, Thomas Leung, Rahul Sukthankar, and Li Fei-Fei. Large-scale video classiﬁcation with convolutional neural networks. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2014.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>[36]	Christian Szegedy, Wei Liu, YangqingJia, Pierre Sermanet, Scott Reed, DragomirAnguelov, DumitruErhan, Vincent Vanhoucke, and Andrew Rabinovich. Going deeper with convolutions. ArXiv preprint arXiv: 1409.4842, 2014.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>[37]	M.M. Javidi Fatemeh SharifizadehFatemeh Sharifizadeh,” A Modified Decision Templates Method for Persian Handwritten Digit Recognition A Modified Decision Templates Method for Persian Handwritten Digit Recognition”, Journal of American Science, 2012                                 </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Whispered Speech Emotion Recognition with Gender Detection using BiLSTM and DCNN</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Aniruddha</given_name><surname>Mohanty</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ravindranath C.</given_name><surname>Cherukuri</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>24</day><year>2024</year></publication_date><pages><first_page>152</first_page><last_page>161</last_page></pages><doi_data><doi>10.61186/jist.43703.12.46.152</doi><resource>http://jist.ir/en/Article/43703</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/43703</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/43703</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/43703</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/43703</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/43703</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/43703</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/43703</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	Slobodan T Jovicic and Zoran Saric, “Acoustic analysis of consonants in whispered speech,” Journal of voice, vol 22, no. 3, pp. 263–274, 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2] 	Mamta Kumari and Israj Ali, “An efficient algorithm for gender detection using voice samples,” in 2015 Communication, Control and Intelligent Systems (CCIS), Mathura, Utter Pradesh, 2015, pp. 221–226, doi: 10.1109/CCIntelS.2015.7437912.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3] Sara Motamed, Saeed Setayeshi, Azam Rabiee and Arash Sharifi, “Speech Emotion Recognition Based on Fusion Method,” Journal of Information Systems and Telecommunication (JIST), vol. 3, pp. 50--56, 2017, doi: 10.7508/jist.2017.17.007. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4] JS Li, CC Huang, ST Sheu and MW Lin, “Speech emotion recognition and its applications,” in Proc. of Taiwan Institute of Kansei Conference, 2010, pp. 187–192. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5] Antonio Guerrieri, Eleonora Braccili, Federica Sgro and Giulio Nicolo Meldolesi “Gender identification in a two-level hierarchical speech emotion recognition system for an Italian Social Robot,” Sensors, vol. 22, no. 5, pp. 1714, 2022, doi: https://doi.org/10.3390/s22051714.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6] Milton Sarria-Paja, Tiago H Falk and Douglas  O’Shaughnessy, “Whispered speaker verification and gender detection using weighted instantaneous frequencies,” in 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 7209–7213, 2013, doi: 10.1109/ICASSP.2013.6639062. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7] Jun Deng, Sascha Fruhholz, Zixing Zhang and Bojrn Schuller, “Recognizing emotions from whispered speech based on acoustic feature transfer learning,” IEEE Access, vol.  5, pp. 5235–5246, 2017. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8] Marius Cotescu, Thomas Drugman, Goeric Huybrechts, Jaime Lorenzo-Trueba, and Alexis Moinet, “Voice conversion for whispered speech synthesis,” IEEE Signal Processing Letters, vol. 27, pp. 186–190, 2019, doi: 10.1109/LSP.2019.2961213. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9] Puneet Mishra and Ruchir Sharma, “Gender differentiated convolutional neural networks for speech emotion recognition,” in 2020 12th International Congress on Ultra-Modern Telecommuni- cations and Control Systems and Workshops (ICUMT), 2020, pp. 142–148, doi: 10.1109/ICUMT51630.2020.9222412</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10] Mustaqeem Soonil Kwon, “Optimal feature selection based speech emotion recognition using two-stream deep convolutional neural network,” International Journal of Intelligent Systems, vol 36, no. 9, pp. 5116– 5135, 2021, doi:  </unstructured_citation></citation><citation key="ref11"><unstructured_citation>https://doi.org/10.1002/int.22505</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[11] J. Ancilin and A. Milton, “Improved speech emotion recognition with mel frequency magnitude coefficient,” Applied Acoustics, vol. 179, pp. 108046, 2021, doi: https://doi.org/10.1016/j.apacoust.2021.108046. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>[12] S. Jothimani and K. Premalatha, “Mff-saug: Multi feature fusion with spectrogram augmentation of speech emotion recognition using convolution neural network,” Chaos, Solitons &amp; Fractals, vol. 162, pp. 112512, 2022, doi: https://doi.org/10.1016/j.chaos.2022.112512. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>[13] Bhanusree Yalamanchili, Srinivas Kumar Samayamantula, and Koteswara Rao Anne, “Neural network-based blended ensemble learning for speech emotion recognition,” Multidimensional Systems and Signal Processing, vol. 33, no. 4, pp. 1323--1348, 2022, doi: https://doi.org/10.1007/s11045-022-00845-9. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>[14] Tiantian Feng, Rajat Hebbar and Shrikanth Narayanan, “Trustser: On the trustworthiness of fine-tuning pre-trained speech embeddings for speech emotion recognition,” arXiv preprint arXiv:2305.11229, 2023, doi: https://doi.org/10.48550/arXiv.2305.11229</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[15] Darekar, RV and Chavan, Meena and Sharanyaa, S and Ranjan, Nihar M. “A hybrid meta-heuristic ensemble based classification technique speech emotion recognition,” Advances in Engineering Software, vol. 180, pp. 103412, 2023.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[16] Rekimoto Jun, “Dualvoice: A speech interaction method using whisper-voice as commands,” in CHI Conference on Human Factors in Computing Systems Extended Abstracts, pp. 1–6, 2022, doi: https://doi.org/10.1145/3491101.3519700.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[17]Harshit Dolka, Arul Xavier V M and Sujitha Juliet,“ Speech emotion recognition using ANN on MFCC features,” in 2021 3rd international conference on signal processing and communication (ICPSC), Coimbatore, India, 2021, pp. 431–435, doi: 10.1109/ICSPC51351.2021.9451810.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[18] M. Kiran Reddy and K. Sreenivasa Rao, “Robust pitch extraction method for the hmm-based speech synthesis system,” IEEE signal processing letters, vol.  24, no. 8, pp. 1133–1137, 2017, doi: 10.1109/LSP.2017.2712646. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>[19] Joyjit Chatterjee, Vajja Mukesh, Hui-Huang Hsu, Garima Vyas and Zhen Liu, “Speech emotion recognition using cross- correlation and acoustic features,” in 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, 2018, pp. 243–249, doi: https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00050. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>[20] Sangeetha Rajesh and N J Nalini, “Musical instrument emotion recognition using deep recurrent neural network,” Procedia Computer Science, vol. 167, pp. 16--25, 2020, doi: https://doi.org/10.1016/j.procs.2020.03.178.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[21] Mohammed Aly and Nouf Saeed Alotaibi, “A novel deep learning model to detect covid-19 based on wavelet features extracted from mel- scale spectrogram of patients’ cough and breathing sounds,” Informatics in Medicine Unlocked, vol.  32, pp. 101049, 2022, doi: https://doi.org/10.1016/j.imu.2022.101049.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[22] Zakariya Qawaqneh, Arafat Abu Mallouh, and Buket D.Barkana,“Age and gender classification from speech and face images by jointly fine-tuned deep neural networks,” Expert Systems with Applications, vol. 85, pp. 76–86, 2017, doi: https://doi.org/10.1016/j.eswa.2017.05.037. </unstructured_citation></citation><citation key="ref24"><unstructured_citation>23] Anusha Koduru, Hima Bindu Valiveti and Anil Kumar Budati, “Feature extraction algorithms to improve the speech emotion recognition rate,” International Journal of Speech Technology, vol. 23, no. 1, pp. 45–55, 2020, doi: https://doi.org/10.1007/s10772-020-09672-4. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>[24] Shaoyun Zhang and Chao Li, “Research on feature fusion speech emotion recognition technology for smart teaching,” Mobile Information Systems, vol. 2022, 2022, doi:  https://doi.org/10.1155/2022/7785929.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[25] Ramesh G, Prasanna G B, Santosh V Bhat, Chandrashekar Naik and Champa H N, “An Efficient Method for Handwritten Kannada Digit Recognition based on PCA and SVM Classifier,” Journal of Information Systems and Telecommunication (JIST), vol. 3, no. 35, pp. 169 2021, doi: 20.1001.1.23221437.2021.9.35.3.2.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[26] Alex Graves, Navdeep Jaitly, and Abdel-rahman Mohamed, “Hybrid speech recognition with deep bidirectional lstm,” in 2013 IEEE workshop on automatic speech recognition and understanding, Olomouc, Czech Republic, 2013,  pp. 273–278, doi: 10.1109/ASRU.2013.6707742. </unstructured_citation></citation><citation key="ref28"><unstructured_citation>[27] Neena Aloysius and M. Geetha, “A review on deep convolutional neural networks,” in 2017 international conference on communication and signal processing (ICCSP), 2017, pp. 0588–0592, doi: 10.1109/ICCSP.2017.8286426. </unstructured_citation></citation><citation key="ref29"><unstructured_citation>[28] Sai Bharath Chandra Gutha, M. Ali Basha Shaik, Teja Udayakumar and Ajit Ashok Saunshikhar, “Improved feed forward attention mechanism in bidirectional recurrent neural networks for robust sequence classification,” in 2020 International Conference on Signal Processing and Communications (SPCOM), IEEE, pp. 1—5, 2020, doi: 10.1109/SPCOM50965.2020.9179606 </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>FLHB-AC: Federated Learning History-Based Access Control Using Deep Neural Networks in Healthcare System</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Nasibeh</given_name><surname>Mohammadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Afshin</given_name><surname>Rezakhani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hamid</given_name><surname>Haj Seyyed Javadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Parvaneh</given_name><surname>asghari</surname></person_name></contributors><publication_date media_type="online"><month>6</month><day>24</day><year>2024</year></publication_date><pages><first_page>90</first_page><last_page>104</last_page></pages><doi_data><doi>10.61186/jist.44500.12.46.90</doi><resource>http://jist.ir/en/Article/44500</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/44500</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/44500</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/44500</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/44500</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/44500</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/44500</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/44500</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Haux, R. Health information systems–past, present, future. International journal of medical informatics, 75(3-4), 268-281, 2006.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Ravidas, S., Lekidis, A., Paci, F., &amp; Zannone, N. Access control in Internet-of-Things: A survey. Journal of Network and Computer Applications, 144, 79-101, 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Ding, S., Cao, J., Li, C., Fan, K., &amp; Li, H.  A novel attribute-based access control scheme using blockchain for IoT. IEEE Access, 7, 38431-38441, 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Hu, V. C., Kuhn, D. R., Ferraiolo, D. F., &amp; Voas, J.  Attribute-based access control. Computer, 48(2), 85-88, 2015.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Wouters, O. J., Shadlen, K. C., Salcher-Konrad, M., Pollard, A. J., Larson, H. J., Teerawattananon, Y., &amp; Jit, M.  Challenges in ensuring global access to COVID-19 vaccines: production, affordability, allocation, and deployment. The Lancet, 397(10278), 1023-1034, 2021.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Hu, V. C., Ferraiolo, D., Kuhn, R., Friedman, A. R., Lang, A. J., Cogdell, M. M., ... &amp; Scarfone, K.  Guide to attribute-based access control (abac) definition and considerations (draft). NIST special publication, 800(162), 1-54, 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Zaremba, W., Sutskever, I., &amp; Vinyals, O. Recurrent neural network regularization. arXiv preprint arXiv:1409.2329, 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Sherstinsky, A. (2020). Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Physica D: Nonlinear Phenomena, 404, 132306, 2020.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Salehinejad, H., Sankar, S., Barfett, J., Colak, E., &amp; Valaee, S. Recent advances in recurrent neural networks. arXiv preprint arXiv:1801.01078, 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Lipton, Z. C., Berkowitz, J., &amp; Elkan, C.  A critical review of recurrent neural networks for sequence learning. arXiv preprint arXiv:1506.00019, 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] Zhang, C., Xie, Y., Bai, H., Yu, B., Li, W., &amp; Gao, Y.  A survey on federated learning. Knowledge-Based Systems, 216, 106775, 2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] Aledhari, M., Razzak, R., Parizi, R. M., &amp; Saeed, F. Federated learning: A survey on enabling technologies, protocols, and applications. IEEE Access, 8, 140699-140725, 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Dhanvijay, M. M., &amp; Patil, S. C. Internet of Things: A survey of enabling technologies in healthcare and its applications. Computer Networks, 153, 113-131, 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] Alam, M. M., Malik, H., Khan, M. I., Pardy, T., Kuusik, A., &amp; Le Moullec, Y. A survey on the roles of communication technologies in IoT-based personalized healthcare applications. IEEE Access, 6, 36611-36631, 2018.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] Wang, H., Zhang, X., Xia, Y., &amp; Wu, X. An intelligent blockchain-based access control framework with federated learning for genome-wide association studies. Computer Standards &amp; Interfaces, 84, 103694, 2023.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] Shojafar, M., Mukherjee, M., Piuri, V., &amp; Abawajy, J. Guest editorial: Security and privacy of federated learning solutions for industrial IoT applications. IEEE Transactions on Industrial Informatics, 18(5), 3519-3521, 2021.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] Mazzocca, C., Romandini, N., Colajanni, M., &amp; Montanari, R. FRAMH: A Federated Learning Risk-Based Authorization Middleware for Healthcare. IEEE Transactions on Computational Social Systems, 2022.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] Bhansali, P. K., Hiran, D., Kothari, H., &amp; Gulati, K. Cloud-based secure data storage and access control for the internet of medical things using federated learning. International Journal of Pervasive Computing and Communications, (ahead-of-print), 2022.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] Dhiman, G., Juneja, S., Mohafez, H., El-Bayoumy, I., Sharma, L. K., Hadizadeh, M., ... &amp; Khandaker, M. U. Federated learning approach to protect healthcare data over big data scenario. Sustainability, 14(5), 2500, 2022.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] Jabal, A. A., Bertino, E., Lobo, J., Verma, D., Calo, S., &amp; Russo, A. FLAP--A Federated Learning Framework for Attribute-based Access Control Policies. arXiv preprint arXiv:2010.09767, 2020.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] Ghimire, B., &amp; Rawat, D. B.  Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things. IEEE Internet of Things Journal, 2022.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] Savazzi, S., Nicoli, M., Bennis, M., Kianoush, S., &amp; Barbieri, L. Opportunities of federated learning in connected, cooperative, and automated industrial systems. IEEE Communications Magazine, 59(2), 16-21, 2021.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] Geng, J., Kanwal, N., Jaatun, M. G., &amp; Rong, C.  DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities. In Evaluation and Assessment in Software Engineering (pp. 329-335), 2021.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] Alam, T., &amp; Gupta, R.  Federated Learning and Its Role in the Privacy Preservation of IoT Devices. Future Internet, 14(9), 246, 2022.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] Kim, T. Y., &amp; Cho, S. B.  Optimizing CNN-LSTM neural networks with PSO for anomalous query access control. Neurocomputing, 456, 666-677, 2021.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] Ye, X., Yu, Y., &amp; Fu, L.  Multi-Channel Opportunistic Access for Heterogeneous Networks Based on Deep Reinforcement Learning. IEEE Transactions on Wireless Communications, 21(2), 794-807, 2021.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] Otoum, Y., Liu, D., &amp; Nayak, A.  DL‐IDS: a deep learning–based intrusion detection framework for securing IoT. Transactions on Emerging Telecommunications Technologies, 33(3), e3803, 2022.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] Kumar, A., Abhishek, K., Bhushan, B., &amp; Chakraborty, C. Secure access control for manufacturing sector with application of ethereum blockchain. Peer-to-Peer Networking and Applications, 14(5), 3058-3074, 2021.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] Zhong, H., Zhou, Y., Zhang, Q., Xu, Y., &amp; Cui, J.  An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. Future Generation Computer Systems, 115, 486-496, 2021.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] Kumar, R., &amp; Tripathi, R. Scalable and secure access control policy for healthcare system using blockchain and enhanced Bell–LaPadula model. Journal of Ambient Intelligence and Humanized Computing, 12(2), 2321-2338, 2021.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] Egala, B. S., Pradhan, A. K., Badarla, V., &amp; Mohanty, S. P.Fortified-chain: a blockchain-based framework for security and privacy-assured internet of medical things with effective access control. IEEE Internet of Things Journal, 8(14), 11717-11731, 2021.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] Singh, A., &amp; Chatterjee, K. LoBAC: A Secure Location-Based Access Control Model for E-Healthcare System. In Advances in Machine Learning and Computational Intelligence (pp. 621-628). Springer, Singapore, 2021.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] Younis, M., Lalouani, W., Lasla, N., Emokpae, L., &amp; Abdallah, M. Blockchain-enabled and data-driven smart healthcare solution for secure and privacy-preserving data access. IEEE Systems Journal, 2021.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] Ghayvat, H., Pandya, S., Bhattacharya, P., Zuhair, M., Rashid, M., Hakak, S., &amp; Dev, K. CP-BDHCA: Blockchain-based Confidentiality-Privacy preserving Big Data scheme for healthcare clouds and applications. IEEE Journal of Biomedical and Health Informatics, 26(5), 1937-1948, 2021.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] Yaqoob, I., Salah, K., Jayaraman, R., &amp; Al-Hammadi, Y. Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Computing and Applications, 34(14), 11475-11490, 2022.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] Azad, M. A., Arshad, J., Mahmoud, S., Salah, K., &amp; Imran, M.. A privacy‐preserving framework for smart context‐aware healthcare applications. Transactions on Emerging Telecommunications Technologies, 33(8), e3634, 2022.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] Balaji, N. V. An attack Resistant Privacy-Preserving Access Control Scheme for Outsourced E-pharma Data in Cloud. International Journal of Next-Generation Computing, 13(3), 2022.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38] Tao, Q., &amp; Cui, X. B-FLACS: blockchain-based flexible lightweight access control scheme for data sharing in cloud. Cluster Computing, 1-11, 2022.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39] Pal, S., Dorri, A., &amp; Jurdak, R. Blockchain for IoT access control: Recent trends and future research directions. Journal of Network and Computer Applications, 103371, 2022.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40] Ghillani, D. Deep Learning and Artificial Intelligence Framework to Improve the Cyber Security. Authorea Preprints, 2022.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41] Chinnasamy, P., &amp; Deepalakshmi, P. HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud. Journal of Ambient Intelligence and Humanized Computing, 13(2), 1001-1019, 2022.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42] Astillo, P. V., Duguma, D. G., Park, H., Kim, J., Kim, B., &amp; You, I. Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System. Future Generation Computer Systems, 128, 395-405, 2022.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43] Li, Q., Wen, Z., Wu, Z., Hu, S., Wang, N., Li, Y., ... &amp; He, B. A survey on federated learning systems: vision, hype and reality for data privacy and protection. IEEE Transactions on Knowledge and Data Engineering, 2021.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44] Karimi, L., Aldairi, M., Joshi, J., &amp; Abdelhakim, M. An automatic attribute based access control policy extraction from access logs. IEEE Transactions on Dependable and Secure Computing, 2021.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45] Hu, V. Machine Learning for Access Control Policy Verification (No. NIST Internal or Interagency Report (NISTIR) 8360 (Draft)). National Institute of Standards and Technology, 2021.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46] Cotrini, C., Weghorn, T., &amp; Basin, D. Mining ABAC rules from sparse logs. In 2018 IEEE European Symposium on Security and Privacy (EuroS&amp;P) (pp. 31-46). IEEE, 2018.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47] Amazon.com, “Amazon employee access challenge.” Kaggle.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48] Montanez, Ken, “Amazon access samples.” UCI Machine Learning Repository: Amazon Access Samples Data Set.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49] Rikhtechi, L., Rafe, V., &amp; Rezakhani, A. Secured access control in security information and event management systems. Journal of Information Systems and Telecommunication, 9(33), 67-78, 2021.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50] Rathna, R., Gladence, L. M., Cynthia, J. S., &amp; Anu, V. M Energy efficient cross layer MAC protocol for wireless sensor networks in remote area monitoring applications. Journal of Information Systems and Telecommunication (JIST), 3(35), 207, 2021.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>