﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051923</doi_batch_id><timestamp>20260519232701</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>11</month><day>11</day><year>2024</year></publication_date><journal_volume><volume>12</volume></journal_volume><issue>47</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Elymus Repens Optimization (ERO); A Novel Agricultural-Inspired Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mahdi</given_name><surname>Tourani</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>11</day><year>2024</year></publication_date><pages><first_page>170</first_page><last_page>182</last_page></pages><doi_data><doi>10.61186/jist.41748.12.47.170</doi><resource>http://jist.ir/en/Article/41748</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/41748</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/41748</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/41748</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/41748</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/41748</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/41748</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/41748</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1].	S.A. Mirjalili, "The Ant Lion Optimizer", Advances in Engineering Software , Vol. 83 , pp. 80–98, 2015.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2].	F. MiarNaeimi, G.R. Azizyan, M. Rashki, "Horse herd optimization algorithm: A nature-inspired algorithm for high-dimensional optimization problems", Knowledge-Based Systems, Vol. 213, pp. 1-17, 2021.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3].	J.H. Holland, Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence, MIT press, 1992.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4].	J.R. Koza, Genetic Programming: On the Programming of Computers By Means of Natural Selection, MIT press, 1992.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5].	F. Glover, "Tabu search—Part I" , ORSA J. Comput. Vol. 1, No. 3, pp.190–206, 1989.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6].	I. Rechenberg, J.M. Zurada, R.J. Marks II, C. Goldberg, Evolution strategy, in computational intelligence: Imitating life, in: Computational Intelligence Imitating Life, IEEE Press, Piscataway, 1994.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7].	N.J. Radcliffe, P.D. Surry, "Formal Memetic Algorithms", in: AISB Workshop on Evolutionary Computing, Springer, pp. 1–16, 1994.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8].	R.G. Reynolds, "An introduction to cultural algorithms", in: Proceedings of the Third Annual Conference on Evolutionary Programming, World Scientific, pp. 131–139,1994.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9].	S. Kirkpatrick, C.D. Gelatt, M.P. Vecchi, "Optimization by simulated annealing", Science, Vol. 220 , No. 4598, pp. 671–680, 1983.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10].	R. Storn, K. Price, "Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces", J. Global Optim. Vol. 11, No.4, pp. 341–359, 1997.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11].	X. Yao, Y. Liu, G. Lin, "Evolutionary programming made faster", IEEE Trans. Evol. Comput. Vol. 3 , No. 2, pp. 82–102, 1999.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12].	Y.K. Kim, J.Y. Kim, Y. Kim, "A coevolutionary algorithm for balancing and sequencing in mixed model assembly lines", Appl. Intell. Vol. 13 , No. 3, pp. 247–258, 2000.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13].	A. Sinha, D.E. Goldberg, "A Survey of Hybrid Genetic and Evolutionary Algorithms", IlliGAL report, Vol. 2003004, 2003.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14].	 E. Atashpaz-Gargari, C. Lucas, "Imperialist competitive algorithm: An algorithm for optimization inspired by imperialistic competition", in: 2007 IEEE Congress on Evolutionary Computation, IEEE, pp. 4661–4667, 2007.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15].	D. Simon, "Biogeography-based optimization", IEEE Trans. Evol. Comput. Vol. 12 , No. 6, pp. 702–713, 2008.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16].	E. Cuevas, A. Echavarría, M.A. Ramírez-Ortegón, "An optimization algorithm inspired by the states of matter that improves the balance between exploration and exploitation", Appl. Intell. Vol. 40, No. 2 , pp. 256–272, 2014.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17].	S. Mirjalili, "SCA: A sine cosine algorithm for solving optimization problems", Knowl.-Based Syst., Vol. 96, pp. 120–133, 2016.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18].	F. MiarNaeimi, G. Azizyan, M. Rashki, "Multi-level cross entropy optimizer (MCEO): An evolutionary optimization algorithm for engineering problems", Eng. Comput., Vol. 34 , No. 4, 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19].	H. Du, X. Wu, J. Zhuang, "Small-world optimization algorithm for function optimization", in: International Conference on Natural Computation, Springer, pp. 264–273, 2006.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20].	R.A. Formato, "Central force optimization: A new metaheuristic with applications in applied electromagnetics", in: Progress in Electromagnetics Research, PIER 77, pp. 425–491,2007.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21].	 M.H. Tayarani-N, M.R. Akbarzadeh-T, "Magnetic optimization algorithms a new synthesis", in: 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence), pp. 2659–2664, 2008.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22].	E. Rashedi, H. Nezamabadi-Pour, S. Saryazdi, "GSA: A gravitational search algorithm", Inf. Sci., Vol. 179, No. 13, pp. 2232–2248, 2009.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23].	 A. Kaveh, S. Talatahari, "A novel heuristic optimization method: Charged system search", Acta Mech. Vol. 213, pp. 267–289, 2010.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24].	A.Y.S. Lam, V.O.K. Li, "Chemical-reaction-inspired metaheuristic for optimization", IEEE Trans. Evol. Comput., Vol. 14, No 3, pp. 381–399, 2010.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25].	A. Hatamlou, "Black hole: A new heuristic optimization approach for data clustering", Inf. Sci., Vol. 222 , pp. 175–184, 2013.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26].	F.F. Moghaddam, R.F. Moghaddam, M. Cheriet, "Curved space optimization: A random search based on general relativity theory", arXiv, Vol. 1208, No. 2214, 2012.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27].	A. Kaveh, T. Bakhshpoori, "Water evaporation optimization: A novel physically inspired optimization algorithm", Comput. Struct., Vol. 167, pp. 69–85, 2016.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28].	H. Varaee, M.R. Ghasemi, "Engineering optimization based on ideal gas molecular movement algorithm", Eng. Comput. Vol. 33 , No. 1, pp. 71–93, 2017.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29].	S. Mirjalili, S.M. Mirjalili, A. Hatamlou, "Multi-verse optimizer: A natureinspired algorithm for global optimization", Neural Comput. Appl., Vol. 27 , No. 2, pp. 495–513, 2016.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30].	A. Kaveh, M.I. Ghazaan, "A new meta-heuristic algorithm: Vibrating particles system", Sci. Iran. Trans. A Civ. Eng., Vol. 24, No 2, pp. 551-566, 2017.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31].	R. Eberhart, J. Kennedy, "A new optimizer using particle swarm theory", in: MHS’95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science, IEEE, pp. 39–43, 1995.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32].	S. Saremi, S. Mirjalili, A. Lewis, "Grasshopper optimisation algorithm: Theory and application", Adv. Eng. Softw., Vol. 105, pp. 30–47, 2017.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33].	S. Mirjalili, "Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm", Knowl.-Based Syst., Vol. 89, pp.228–249, 2015.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34].	X.L. Li, "A New Intelligent Optimization-Artificial Fish Swarm Algorithm", (Doctor thesis), Zhejiang University of Zhejiang, China, 2003.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35].	D. Karaboga, "An Idea Based on Honey Bee Swarm for Numerical Optimization", Technical report-tr06, Erciyes university, engineering faculty, computer., 2005.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36].	M. Roth, "Termite: A swarm intelligent routing algorithm for mobile wireless ad-hoc networks", Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy, 2005.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37].	M. Dorigo, M. Birattari, T. Stutzle, "Ant colony optimization", IEEE Comput. Intell. Mag. Vol. 1, No. 4, pp. 28–39, 2006.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38].	M. Eusuff, K. Lansey, F. Pasha, "Shuffled frog-leaping algorithm: A memetic meta-heuristic for discrete optimization", Eng. Optim., Vol. 38, No. 2, pp. 129–154, 2006.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39].	A. Mucherino, O. Seref, "Monkey search: A novel metaheuristic search for global optimization", in: AIP Conference Proceedings, American Institute of Physics, pp. 162–173, 2007.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40].	Y. Shiqin, J. Jianjun, Y. Guangxing, "A dolphin partner optimization", in: Intelligent Systems, GCIS’09. WRI Global Congress On, IEEE, pp. 124–128, 2009.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41].	X.S. Yang, "Firefly algorithm, stochastic test functions and design optimisation", arXiv, Vol. 1003, No. 1409, 2010.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42].	 X.S. Yang, "A new metaheuristic bat-inspired algorithm", in: Nature Inspired Cooperative Strategies for Optimization (NICSO 2010), Springer, pp. 65–74, 2010.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43].	A. Askarzadeh, A. Rezazadeh, "A new heuristic optimization algorithm for modeling of proton exchange membrane fuel cell: Bird mating optimizer", Int. J. Energy Res., Vol. 37, No. 10, pp.1196–1204, 2013.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44].	W.T. Pan, "A new fruit fly optimization algorithm: Taking the financial distress model as an example", Knowl.-Based Syst., Vol. 26, pp. 69–74, 2012.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45].	B. Wang, X. Jin, B. Cheng, "Lion pride optimizer: An optimization algorithm inspired by lion pride behavior", Sci. China Inf. Sci., Vol. 55, No. 10, pp. 2369–2389, 2012.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46].	A.H. Gandomi, A.H. Alavi, "Krill herd: A new bio-inspired optimization algorithm", Commun. Nonlinear Sci., Vol. 17 , No. 12, pp. 4831–4845, 2012.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47].	 S. Mirjalili, S.M. Mirjalili, A. Lewis, "Grey wolf optimizer", Adv. Eng. Softw., Vol. 69 , pp. 46–61, 2014.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48].	A.H. Gandomi, X.S. Yang, A.H. Alavi, "Cuckoo search algorithm: A metaheuristic approach to solve structural optimization problems", Eng. Comput., Vol. 29, No. 1, pp. 17–35, 2013.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49].	S. Mirjalili, "Dragonfly algorithm: A new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems", Neural Comput. Appl., Vol. 27, No. 4 , pp. 1053–1073, 2016.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50].	S. Mirjalili, "A. Lewis, The whale optimization algorithm", Adv. Eng. Softw., Vol. 95, pp. 51–67, 2016.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51].	S. Mirjalili, A.H. Gandomi, S.Z. Mirjalili, S. Saremi, H. Faris, S.M. Mirjalili, "Salp swarm algorithm: A bio-inspired optimizer for engineering design problems", Adv. Eng. Softw., Vol. 114, pp.163–191, 2017.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52].	A.A. Heidari, S. Mirjalili, H. Faris, I. Aljarah, M. Mafarja, H. Chen, "Harris hawks optimization: Algorithm and applications", Future Gener. Comput. Syst., Vol. 97 pp. 849–872, 2019.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53].	 G. Azizyan, F. Miarnaeimi, M. Rashki, N. Shabakhty, "Flying squirrel optimizer (FSO): A novel SI-based optimization algorithm for engineering problems", Iran. J. Optim., Vol. 11, No. 2, pp.177–205, 2019.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[54].	N. Moosavian, B.K. Roodsari, "Soccer league competition algorithm: A novel meta-heuristic algorithm for optimal design of water distribution networks", Swarm Evol. Comput., Vol. 17, pp. 14–24, 2014.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[55].	A.A. Volk, R.W. Epps, D.T. Yonemoto, S. B.Masters, F. N. Castellano, K. G. Reyes ,  M. Abolhasani.,"AlphaFlow: autonomous discovery and optimization of multi-step chemistry using a self-driven fluidic lab guided by reinforcement learning",Nat Commun, Vol. 14, 2023. </unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[56].	A.M.K. Nambiar, C. P. Breen,T. Hart, T. Kulesza, T. F. Jamison, K. F. Jensen". Bayesian optimization of computer-proposed multistep synthetic routes on an automated robotic flow platform", ACS Cent. Sci. Vol. 8,pp. 825–836, 2022.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[57].	Y. Jiang, D. Salley, A. Sharma, G. Keenan, M. Mullin -, L. Cronin," An artificial intelligence enabled chemical synthesis robot for exploration and optimization of nanomaterials", Sci. Adv. , Vol. 8, 2022.</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[58].	D. Karan, G. Chen, N. Jose, J. Bai, P. McDaid, A.A. Lapkin, " A machine learning-enabled process optimization of ultra-fast flow chemistry with multiple reaction metrics", Reaction Chemistry &amp; Engineering, vol. 9, pp. 619-629, 2024.</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[59].	G.-N. Ahn, J.H. Kang, H.J. Lee, B.E. Park, M. Kwon, G.S. Na, H. Kim, D.H. Seo, D.P. Kim., "Exploring ultrafast flow chemistry by autonomous self-optimizing platform", Chem. Eng. J., Vol. 453, 2023.</unstructured_citation></citation><citation key="ref60"><unstructured_citation>
[60].	M. Gholami, S.M. Muyeen, S. Lin,"Optimizing microgrid efficiency: Coordinating commercial and residential demand patterns with shared battery energy storage,Journal of Energy Storage,Volume 88,2024.</unstructured_citation></citation><citation key="ref61"><unstructured_citation>
[61].	D. Borkowski, P. Oramus, M. Brzezinka, "Battery energy storage system for grid-connected photovoltaic farm – energy management strategy and sizing optimization algorithm", J. Energy Storage, Vol. 72 , 2023.</unstructured_citation></citation><citation key="ref62"><unstructured_citation>
[62].	K. Ullah, J. Quanyuan, G. Geng, R.A. Khan, S. Aslam, W. Khan," Optimization of demand response and power-sharing in microgrids for cost and power losses", Energies, Vol. 15, 2022.</unstructured_citation></citation><citation key="ref63"><unstructured_citation>
[63].	S. Sakina Zaidi, S.S. Haider Zaidi, B.M. Khan, L. Moin,"Optimal designing of grid-connected microgrid systems for residential and commercial applications in Pakistan", Heliyon, Vol. 9 , 2023.</unstructured_citation></citation><citation key="ref64"><unstructured_citation>
[64].	R. Asri, H. Aki, D. Kodaira," Optimal operation of shared energy storage on islanded microgrid for remote communities", Sustain. Energy, Grids Networks,Vol.  35 , 2023.</unstructured_citation></citation><citation key="ref65"><unstructured_citation>
[65].	Q. Huang, H. Ding, N. Razmjooy, "Oral cancer detection using convolutional neural network optimized by combined seagull optimization algorithm", Biomedical Signal Processing and Control, Vol. 87, Part B, 2024.</unstructured_citation></citation><citation key="ref66"><unstructured_citation>
[66].	M. M. Emam, E. H. Houssein, N. A.Samee, M. A. Alohali, M. E. Hosney, " Breast cancer diagnosis using optimized deep convolutional neural network based on transfer learning technique and improved Coati optimization algorithm", Expert Systems with Applications, Vol. 255, Part B,2024.</unstructured_citation></citation><citation key="ref67"><unstructured_citation>
[67].	S. Almutairi, S. Manimurugan, B. G. Kim, M.M. Aborokbah, C. Narmatha, "Breast cancer classification using Deep Q Learning (DQL) and gorilla troops optimization (GTO)", Applied Soft Computing, Vol. 142, 2023</unstructured_citation></citation><citation key="ref68"><unstructured_citation>
[68].	M. M. Emam, N. A. Samee, M. M. Jamjoom, E. H. Houssein, "Optimized deep learning architecture for brain tumor classification using improved Hunger Games Search Algorithm", Computers in Biology and Medicine, Vol. 160, 2023.</unstructured_citation></citation><citation key="ref69"><unstructured_citation>
[69].	W. Zou, X. Luo, M. Gao, C. Yu, X. Wan, S. Yu, Y. Wu, A. Wang, W. Fenical, Z. Wei, Y. Zhao, Y. Lu, " Optimization of cancer immunotherapy on the basis of programmed death ligand-1 distribution and function", Vol. 181 , Themed Issue: Cancer Microenvironment and Pharmacological Interventions, pp.  257-272, 2024.</unstructured_citation></citation><citation key="ref70"><unstructured_citation>
[70].	J. Palmer, G. Sagar, "Agropyron repens (L.) Beauv. (Triticum repens L.; Elytrigia repens (L.) Nevski)", J. Ecol., Vol. 51, pp. 783–794, 1963.</unstructured_citation></citation><citation key="ref71"><unstructured_citation>
[71].	P.A. Werner, R. Rioux, "The biology of Canadian weeds. 24. Agropyron repens (L.) Beauv. Can." J. Plant Sci., Vol. 57, pp. 905–919, 1977.</unstructured_citation></citation><citation key="ref72"><unstructured_citation>
[72].	L.G. Holm, D.L. Plucknett., J.V. Pancho, J.P. Herberger, The World’s Worst Weeds, University Press: Honolulu, HI, USA, 1977.</unstructured_citation></citation><citation key="ref73"><unstructured_citation>
[73].	 C. Andreasen, I.M. Skovgaard, "Crop and soil factors of importance for the distribution of plant species on arable fields in Denmark", Agric. Ecosyst. Environ., Vol. 133, pp. 61–67, 2009.</unstructured_citation></citation><citation key="ref74"><unstructured_citation>
[74].	J. Salonen, T. Hyvönen, H.A. Jalli, "Composition of weed flora in spring cereals in Finland—A fourth survey", Agric. Food Sci., Vol. 20, 2011.</unstructured_citation></citation><citation key="ref75"><unstructured_citation>
[75].	P. A. Werneri , R. Rioux, "The Biology of Canadian Weeds. 24. Agropyron Repens (L.) Beauv", Canadian Journal of Plant Science, Vol. 57, pp. 905-919.</unstructured_citation></citation><citation key="ref76"><unstructured_citation>
[76].	 K.M. Ibrahim, P.M. Peterson, Grasses of Washington, D.C., Published by Smithsonian Institution Scholarly Press, Washington D.C., 2014.</unstructured_citation></citation><citation key="ref77"><unstructured_citation>
[77].	X. Yao, Y. Liu, G. Lin, "Evolutionary Programming Made Faster", IEEE Transactions on Evolutionary Computation, Vol. 3, No. 2, pp. 82-102, 1999.</unstructured_citation></citation><citation key="ref78"><unstructured_citation>
[78].	E. Rashedi, H. Nezamabadi-pour, S. Saryazdi, " GSA: A Gravitational Search Algorithm", Information Sciences, Vol. 179, pp. 2232–2248, 2009.</unstructured_citation></citation><citation key="ref79"><unstructured_citation>
[79].	X. Yang, " Firefly algorithms for multimodal optimization", International conference on stochastic algorithms foundations and applications, pp.169–178, 2009.</unstructured_citation></citation><citation key="ref80"><unstructured_citation>
[80].	Y. Li, Y. Zhao, Y. Shang, J. Liu " An improved firefly algorithm with dynamic self-adaptive adjustment", PLoS ONE, Vol. 16 ,2021.</unstructured_citation></citation><citation key="ref81"><unstructured_citation>
[81].	D. Wang, D. Tan, L. Liu, " Particle swarm optimization algorithm: an overview", Soft Comput., Vol. 22, pp. 387–408 , 2018.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Economic Impacts and Global Successes through the Internet of Everything (IoE) in the World Countries</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Seyed Omid</given_name><surname>Azarkasb</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyed Hossein</given_name><surname>Khasteh</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>11</day><year>2024</year></publication_date><pages><first_page>228</first_page><last_page>240</last_page></pages><doi_data><doi>10.61186/jist.44181.12.47.228</doi><resource>http://jist.ir/en/Article/44181</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/44181</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/44181</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/44181</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/44181</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/44181</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/44181</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/44181</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. Khamseh, M.A. Mirfallah Lialestani, R. Radfar, “Digital Transformation Model, Based on Grounded Theory”, Journal of Information Systems and Telecommunication (JIST), 2021,Vol. 9, No. 36, pp. 275-284.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Khazaei, “Dynamic Tree-Based Routing: Applied in Wireless Sensor Network and IoT”, Journal of Information Systems and Telecommunication (JIST), 2022, Vol. 10, No. 39, pp. 191-200.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Ranjbarfard, S.R. Mirsalari, “IT Capability Evaluation through the IT Capability Map”, Journal of Information Systems and Telecommunication (JIST), 2021, Vol. 8, No. 32, pp. 207-218.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	K. Bamary, M.R. Behboudi, T. Abbasnjad, “An ICT Performance Evaluation Model based on Meta-Synthesis Approach”, Journal of Information Systems and Telecommunication (JIST), 2022, Vol. 10, No. 39, pp. 229-240.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	FREEDOM and SAFETY, “This is The Internet of Everything”, https://freedomandsafety.com/en/file/ioepng, Site Visited: 2024.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	James Macaulay, Lauren Buckalew, Gina Chung, “Internet of Everything in Logistics”, a collaborative report by DHL and Cisco on implications and use cases for the logistics industry, 2015.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	P.N. Huu, L.H. Bao, “Proposing Real-time Parking System for Smart Cities using Two Cameras”, Journal of Information Systems and Telecommunication (JIST), 2021, Vol. 9, No. 36, pp. 252-262.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	N.P. Singh, A. Kanakamalla, S.A. Shahzad, G.D. Asi, S. Suman, “Remote Monitoring System of Heart Conditions for Elderly Persons with ECG Machine using IoT Platform”, Journal of Information Systems and Telecommunication (JIST), 2022, Vol. 10, No. 37, pp. 11-19.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Little, S. Kechiche, Y. Zhong, A. Gharibian, “Realising the Potential of IoT in MENA”, GSMA Intelligence report, 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Radwa Ahmed Osman, “Empowering Internet-of-Everything (IoE) Networks through Synergizing Lagrange Optimization and Deep Learning for Enhanced Performance”, ElSEVIER, Physical Communication, 2024, Vol. 63, Article ID 102309.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	D. J. Langleya, J. Van Doorn, I. C.L. Ng, S. Stieglitz, A. Lazovik,  A. Boonstra, “The Internet of Everything: Smart Things and Their Impact on Business Models”, ElSEVIER, Journal of Business Research, 2021, Vol. 122, pp. 853-863.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Y. Koucheryavy, A. Aziz, “Internet of Things, Smart Spaces, and Next Generation Networks and Systems”, Springer Link, 23rd International Conference, NEW2AN, and 16th Conference, ruSMART, 2023, Part II Dubai, United Arab Emirates, Proceedings.
[13]	OpenSignal, “Benchmarking the Global 5G Experience”, 2021.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	Cisco, “Dubai Harnesses IoE to Make Roads Safer and to Increase Usage of Public Transportation”, Cisco Jurisdiction Profile, 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	C. Reberger, F. Atallah, M. Zeidan, S. Ei, “AED 17.9 bn Opportunity for Dubai: 2014-2019”, 2020.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	S. Eid, “Dubai Smart City: IoE Value at Stake in the Public Sector”, Cisco Consulting Services Lead for Middle East Africa Russia CIS, 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	Speedtest, “United Arab Emirates Median Country Speeds July 2023”, https://www.speedtest.net/global-index/united-arab-emirates, 2023.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	M. Little, S. Kechiche, Y. Zhong, A. Gharibian, “Realising the potential of IoT in MENA”, GSMA InteIlligence report, 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	OPENSIGNAL, “TURKEY Mobile Network Experience Report”, https://www.opensignal.com/reports/2020/12/turkey/mobile-network-experience, 2021. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	H.H. Çelikyay, “The Studies through Smart Cities Model: The Case of Istanbul”, International Journal of Research in Business and Social Science, 2017, Vol.6, No.1, pp.149-163.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	G. Bodur, S. Gumus, N. Gul Gursoy, “Perceptions of Turkish Health Professional Students Toward the Effects of the Internet of Things (IOT) Technology in the Future”, ElSEVIER, Nurse Education Today, 2019, Vol. 79, pp. 98-104. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	W. Wu, L. Shen, Z. Zhao, A. Rachana Harish, R.Y. Zhong, G.Q. Huang, “Internet of Everything and Digital Twin Enabled Service Platform for Cold Chain Logistics”, ElSEVIER, Journal of Industrial Information Integration, 2023, Vol. 33, Article ID 100443.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	A. Bouverot, “How China is Scaling the Internet of Things”, An insight report from the GSMA Connected Living Programme, 2015. </unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	J. Chen, and et al, “China’s Internet of Things”, Research Report Prepared on Behalf of the U.S.-China Economic and Security Review Commission, 2018.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	Jing Dai, Wen Che, Jia Jia Lim, Yongyi Shou, “Service Innovation of Cold Chain Logistics Service Providers: A Multiple-Case Study in China”, ElSEVIER, Industrial Marketing Management, 2020, Vol. 89, pp. 143-156.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	S. Chen, H. Xu, D. Liu, Hu, H. Wang, “A Vision of IoT: Applications, Challenges, and Opportunities with China Perspective”, IEEE Internet of Things Journal, 2014, Vol. 1, No. 4, pp. 349-359.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	Statista, “COVID-19 Barometer 2020”, https://www.statista.com/study/72001/covid-19-barometer, 2020.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	Ant Group, KrASIA, https://kr-asia.com/ant-group-searches-for-direction-in-a-new-era-of-chinese-fintec, Site Visited: 2024. </unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	M. Granryd, “How Greater China is Set to Lead the Global industrial IoT”, A GSMA Internet of Things report, 2018.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	M. Farhan, T.N. Reza, F.R. Badal, M.R. Islam, S.M. Muyeen, Z. Tasneem, M.M. Hasan, M.F. Ali, M.H. Ahamed, S.H. Abhi, M.M. Islam, S.K. Sarker, S.K. Das, P. Das, “Towards Next Generation Internet of Energy System: Framework and trends”, ElSEVIER, Energy and AI, 2023, Vol. 14, Article ID 100306.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	M. Waszkiewicz, “Internet of Things South Korea”, Market Intelligence Report, Department for International Trade Report, prepared by Intralink Limited, 2018. </unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	M. Lee, “An Empirical Study of Home IoT Services in South Korea: The Moderating Effect of the Usage Experience”, International Journal of Human-Computer Interaction, 2018, Vol. 35, Issue. 3, pp. 1-13. </unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	R. Triggs, “Which Country Has the Fastest Mobile Network?”, https://www.androidauthority.com/worlds-fastest-networks-709140/, 2017.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	S. Muralidharan, A. Roy, N. Saxena, “An Exhaustive Review on Internet of Things from Korea’s Perspective”, Springer Link, Wireless Personal Communications, 2016,  Vol. 90, pp. 1463-1486.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	IoT Business News, “The Countries with the Most IoT Devices, Ranked”, https://iotbusinessnews.com/2016/03/31/97541-countries-iot-devices-ranked, 2016.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	Ministry of Science, ICT and Future Planning, “Master Plan for Building the Internet of Things (IoT), That Leads the Hyper-Connected, Digital Revolution”, Software Policy Bureau, New Internet Industry Division, 2014.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	Internet World Stats, “Internet 2021 Usage in Asia, the World's Fifth Largest Market”, Usage and Population Statistics, https://www.internetworldstats.com, 2021.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	Business Korea, Korea's Premium Business News Portal, “S. Korea’s IoT Sales Reach 8.6 Tril. Won in 2018”, http://www.businesskorea.co.kr, 2019.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	Statista, “Total Number of Internet of Things (IoT) Patent Applications Worldwide as of 2019, by Country”, https://www.statista.com/statistics/992140/worldwide-internet-of-things-patent-applications-country, 2019.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[40]	Statista Global Consumer Survey, https://www.statista.com/global-consumer-survey, site visited: 2024.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[41]	S. Chatterjee, A.K. Kar, “Regulation and Governance of the Internet of Things in India”, Digital Policy, Regulation and Governance, 2018, Vol. 20 No. 5, pp. 399-412.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[42]	Statista Consumer Market Outlook, https://www.statista.com/outlook/consumer-markets, Site Visited: 2024.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[43]	S. Chatterjee, A.K. Kar, Y. K. Dwivedi, “Intention to Use IoT by Aged Indian Consumers”, Journal of Computer Information Systems, 2022, Vol. 62, No. 4, pp. 655-666.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[44]	Statista Global Consumer Survey, https://www.statista.com/global-consumer-survey, Site Visited: 2024.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[45]	S., A.K. Kar, M.P. Gupta, “Success of IoT in Smart Cities of India: An empirical Analysis”, ElSEVIER, Government Information Quarterly, 2018, Vol. 35, Issue. 3, pp. 349-361.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[46]	India Open Government Data (OGD), https://data.gov.in, Site Visited: 2024.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[47]	Ministry of Electronics &amp; Information Technology, Government of India, “IoT Policy Document”, Department of Electronics &amp; Information Technology (DeitY), https://www.meity.gov.in, 2016.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[48]	S. Chatterjee, A.K. Kar, S.Z.  Mustafa, “Securing IoT Devices in Smart Cities of India: from Ethical and Enterprise Information System Management Perspective”, Enterprise Information Systems, 2021, Vol. 15, No. 4, pp. 585-615.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[49]	Statista Technology Market Outlook, https://de.statista.com/outlook/technology-outlook, Site Visited: 2024.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[50]	S.O. Azarkasb, S.H. Khasteh, “Strategies and Ecosystem Transformations in the Internet of Everything in Malaysia”, Journal of Industry &amp; University, ISC, 2024, Vol. 55-56, pp. 187-204.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[51]	RICOH, “5 Pillars of Malaysia Cyber Security Strategy 2020-2024”, https://www.ricoh.com.my, 2023.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[52]	TELECOM Review, “Malaysia’s Digital Transformation Powered by New Technologies”, https://www.telecomreviewasia.com/news/featured-articles/4001-malaysia-s-digital-transformation-powered-by-new-technologies/, 2024.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[53]	B-K Chery, B-K Ng, C-Y Wong, “Governing the Progress of Internet-of-Things: Ambivalence in the Quest of Technology Exploitation and User Rights Protection”, ELSEVIER, Technology in Society, 2021, Vol. 64, Article ID 101463.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[54]	Y.Yuan, T. C. Cheah, “A Study of Internet of Things Enable Hesalthcare Acceptance in Malaysia”,  Journal of critical reviews, Journal of Critical Reviewe, 2020, Vol. 7, Issue.  3. </unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[55]	A.H. Abdul Halim, and et all, “National Internet of Things (IoT) Strategic Roadmap”,  MIMOS BERHAD, Technology Park Malaysia, 2015.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[56]	M. A. Musarat, W.S. Alalou, A.M. Khan, S. Ayub, b, Na. Jousseaume, “A Survey-Based Approach of Framework Development for Improving the Application of Internet of Things in the Construction Industry of Malaysia”, ELSEVIER, Results in Engineering, 2024, Vol. 21, Article ID 101823.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[57]	MIMOS BERHAD, Technology Park Malaysia, “National Internet of Things (IoT) Strategic Roadmap: A Summary”, 2015.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>


</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Survey of Intrusion Detection Systems Based On Deep Learning for IoT Data</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mehrnaz</given_name><surname>Moudi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Arefeh</given_name><surname>Soleimani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>AmirHossein</given_name><surname> Hojjati nia</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>11</day><year>2024</year></publication_date><pages><first_page>197</first_page><last_page>207</last_page></pages><doi_data><doi>10.61186/jist.44521.12.47.197</doi><resource>http://jist.ir/en/Article/44521</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/44521</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/44521</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/44521</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/44521</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/44521</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/44521</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/44521</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, "A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications", IEEE internet of things journal, Vol. 4, No. 5, 2017, pp. 1125-1142.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	U. Farooq, N. Tariq, M. Asim, T. Baker, and A. Al-Shamma'a, "Machine learning and the Internet of Things security: Solutions and open challenges", Journal of Parallel and Distributed Computing, Vol. 162, 2022, pp. 89-104.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Adnan, A. Muhammed, A. A. Abd Ghani, A. Abdullah, and F. Hakim, "An intrusion detection system for the internet of things based on machine learning: Review and challenges", Symmetry, Vol. 13, No. 6, 2021, pp. 1011. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	K. Lakshmanna et al., "A review on deep learning techniques for IoT data", Electronics, Vol. 11, No. 10, pp. 1604, 2022. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. A. Alsoufi, S. Razak, M. M. Siraj, I. Nafea, F. A. Ghaleb, F. Saeed, and M. Nasser, "Anomaly-based intrusion detection systems in iot using deep learning: A systematic literature review", Applied sciences, Vol. 11, No. 18, 2021, pp. 8383.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	T. Hossain, M. Ariful Islam, A. B. R. Khan, and M. Sadekur Rahman, "A Robust and Accurate IoT-Based Fire Alarm System for Residential Use", in International Conference of Computer Networks, Big Data and IoT (ICCBI), 2021, Singapore.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	B. Lahasan and H. Samma, "Optimized deep autoencoder model for internet of things intruder detection", IEEE Access, Vol. 10, 2022, pp. 8434-8448.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Ullah et al., "A new intrusion detection system for the internet of things via deep convolutional neural network and feature engineering", Sensors, Vol. 22, No. 10, 2022, pp. 3607.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	N. Tariq, M. Asim, Z. Maamar, M. Z. Farooqi, N. Faci, and T. Baker, "A mobile code-driven trust mechanism for detecting internal attacks in sensor node-powered IoT", Journal of Parallel and Distributed Computing, Vol. 134, 2019, pp. 198-206.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	P. Prasdika and B. Sugiantoro, "A review paper on big data and data mining concepts and techniques", International Journal on Informatics for Development, Vol. 7, No. 1, 2018, pp. 36-38.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends", Computer networks, Vol. 51, No. 12, 2007, pp. 3448-3470.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	D. Minh, H. X. Wang, Y. F. Li, and T. N. Nguyen, "Explainable artificial intelligence: a comprehensive review", Artificial Intelligence Review, Vol. 55, 2022, pp. 3503-3568.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	G. Kumar, K. Kumar, and M. Sachdeva, "The use of artificial intelligence based techniques for intrusion detection: a review", Artificial Intelligence Review, Vol. 34, 2010, pp. 369-387.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	C. Janiesch, P. Zschech, and K. Heinrich, "Machine learning and deep learning", Electronic Markets, Vol. 31, No. 3, 2021, pp. 685-695.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Paleyes, R.-G. Urma, and N. D. Lawrence, "Challenges in deploying machine learning: a survey of case studies", ACM Computing Surveys, Vol. 55, No. 6, 2022, pp. 1-29.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Dong, P. Wang, and K. Abbas, "A survey on deep learning and its applications", Computer Science Review, Vol. 40, 2021, pp. 100379.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. B. Saad, A. Ksentini, and B. Brik, "A Trust architecture for the SLA management in 5G networks", in IEEE-International Conference on Communications (ICC), 2021, Canada, pp. 1-6.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. Thakkar and R. Lohiya, "Role of swarm and evolutionary algorithms for intrusion detection system: A survey", Swarm and evolutionary computation, Vol. 53, 2020, pp. 100631.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Thakkar and R. Lohiya, "A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges", Archives of Computational Methods in Engineering, Vol. 28, 2021, pp. 3211-3243.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Y. Yue, S. Li, P. Legg, and F. Li, "Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey", Security and communication Networks, Vol. 2021, 2021, pp. 1-13.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. Porras, J. Khakurel, A. Knutas, and J. Pänkäläinen, "Security challenges and solutions in the internet of things", Nordic and Baltic Journal of Information and Communications Technologies, Vol. 2018, No. 1, 2018, pp. 177-206.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	J. Wurm, K. Hoang, O. Arias, A.-R. Sadeghi, and Y. Jin, "Security analysis on consumer and industrial IoT devices", in 21st Asia and South Pacific design automation conference (ASP-DAC), 2016, China, pp. 519-524.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. Bharati and P. Podder, "Machine and deep learning for iot security and privacy: applications, challenges, and future directions", Security and Communication Networks, Vol. 2022, 2022, pp. 1-41.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. Mohammadi, A. Al-Fuqaha, S. Sorour, and M. Guizani, "Deep learning for IoT big data and streaming analytics: A survey", IEEE Communications Surveys &amp; Tutorials, Vol. 20, No. 4, 2018, pp. 2923-2960.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. Franklin, "The elements of statistical learning: data mining, inference and prediction", The Mathematical Intelligencer, Vol. 27, No. 2, 2005, pp. 83-85.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	G. E. Hinton and R. R. Salakhutdinov, "Reducing the dimensionality of data with neural networks", science, Vol. 313, No. 5786, 2006, pp. 504-507.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Z. M. Fadlullah, F. Tang, B. Mao, N. Kato, O. Akashi, T. Inoue, and K. Mizutani, "State-of-the-art deep learning: Evolving machine intelligence toward tomorrow’s intelligent network traffic control systems", IEEE Communications Surveys &amp; Tutorials, Vol. 19, No. 4, 2017, pp. 2432-2455.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	H. Li, K. Ota, and M. Dong, "Learning IoT in edge: Deep learning for the Internet of Things with edge computing", IEEE network, Vol. 32, No. 1, 2018, pp. 96-101.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	H. Kim, S. Park, H. Hong, J. Park, and S. Kim, "A Transferable Deep Learning Framework for Improving the Accuracy of Internet of Things Intrusion Detection", Future Internet, Vol. 16, No. 3, 2024, pp. 80.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	E. Osa, P. E. Orukpe, and U. Iruansi, "Design and implementation of a deep neural network approach for intrusion detection systems", e-Prime-Advances in Electrical Engineering, Electronics and Energy, Vol. 7, 2024, pp. 100434.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	K. Psychogyios, A. Papadakis, S. Bourou, N. Nikolaou, A. Maniatis, and T. Zahariadis, "Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data", Future Internet, Vol. 16, No. 3, 2024, pp. 73.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	Ü. Çavuşoğlu, D. Akgun, and S. Hizal, "A novel cyber security model using deep transfer learning", Arabian Journal for Science and Engineering, Vol. 49, No. 3, 2024, pp. 3623-3632.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	Y. Yang, J. Cheng, Z. Liu, H. Li, and G. Xu, "A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching", Journal of Cloud Computing, Vol. 13, No. 1, 2024, pp. 31.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	V. Hnamte, H. Nhung-Nguyen, J. Hussain, and Y. Hwa-Kim, "A novel two-stage deep learning model for network intrusion detection: LSTM-AE", IEEE Access, Vol. 11, 2023, pp. 37131-37148.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	N. Alenezi and A. Aljuhani, "Intelligent Intrusion Detection for Industrial Internet of Things Using Clustering Techniques", Computer Systems Science &amp; Engineering, Vol. 46, No. 3, 2023, pp. 2899-2915.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	U. K. Lilhore et al., "HIDM: Hybrid intrusion detection model for industry 4.0 Networks using an optimized CNN-LSTM with transfer learning", Sensors, Vol. 23, No. 18, 2023, pp. 7856.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	J. Figueiredo, C. Serrão, and A. M. de Almeida, "Deep learning model transposition for network intrusion detection systems", Electronics, Vol. 12, No. 2, 2023, pp. 293.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	R. Chaganti, W. Suliman, V. Ravi, and A. Dua, "Deep learning approach for SDN-enabled intrusion detection system in IoT networks", Information, Vol. 14, No. 1, 2023, pp. 41. </unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	S. K. Gupta, M. Tripathi, and J. Grover, "Hybrid optimization and deep learning based intrusion detection system", Computers and Electrical Engineering, Vol. 100, 2022, pp. 107876.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	A. Basati and M. M. Faghih, "DFE: Efficient IoT network intrusion detection using deep feature extraction", Neural Computing and Applications, Vol. 34, No. 18, 2022, pp. 15175-15195.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	A. Sagu, N. S. Gill, P. Gulia, J. M. Chatterjee, and I. Priyadarshini, "A hybrid deep learning model with self-improved optimization algorithm for detection of security attacks in IoT environment", Future Internet, Vol. 14, No. 10, 2022, pp. 301.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	I. Idrissi, M. Mostafa Azizi, and O. Moussaoui, "A lightweight optimized deep learning-based host-intrusion detection system deployed on the edge for IoT", International Journal of Computing and Digital System, Vol. 11, No. 1, 2021, pp. 209-216.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	Y. Masoudi-Sobhanzadeh and S. Emami-Moghaddam, "A real-time IoT-based botnet detection method using a novel two-step feature selection technique and the support vector machine classifier", Computer Networks, Vol. 217, 2022, pp. 109365.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	K. Malik, F. Rehman, T. Maqsood, S. Mustafa, O. Khalid, and A. Akhunzada, "Lightweight internet of things botnet detection using one-class classification", Sensors, Vol. 22, No. 10, 2022, pp. 3646.</unstructured_citation></citation><citation key="ref45"><unstructured_citation> 
[45]	S. Diddi, S. Lohidasan, S. Arulmozhi, and K. R. Mahadik, "Standardization and Ameliorative effect of Kalyanaka ghrita in β-amyloid induced memory impairment in wistar rats", Journal of Ethnopharmacology, Vol. 300, 2023, pp. 115671.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	I. Idrissi, M. Boukabous, M. Azizi, O. Moussaoui, and H. El Fadili, "Toward a deep learning-based intrusion detection system for IoT against botnet attacks", IAES International Journal of Artificial Intelligence, Vol. 10, No. 1, 2021, pp. 110.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	H. Alkahtani and T. H. Aldhyani, "Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms", Complexity, Vol. 2021, 2021, pp. 1-18.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	L. Liu, P. Wang, J. Lin, and L. Liu, "Intrusion detection of imbalanced network traffic based on machine learning and deep learning", IEEE Access, Vol. 9, 2020, pp. 7550-7563.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	J. Ashraf, A. D. Bakhshi, N. Moustafa, H. Khurshid, A. Javed, and A. Beheshti, "Novel deep learning-enabled LSTM autoencoder architecture for discovering anomalous events from intelligent transportation systems", IEEE Transactions on Intelligent Transportation Systems, Vol. 22, No. 7, 2020, pp. 4507-4518.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50]	B. Borisenko, S. Erokhin, A. Fadeev, and I. Martishin, "Intrusion detection using multilayer perceptron and neural networks with long short-term memory", in Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO), 2021, Russia, pp. 1-6. </unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51]	T. H. Hai and L. H. Nam, "A practical comparison of deep learning methods for network intrusion detection", in  International Conference on Electrical, Communication, and Computer Engineering (ICECCE), 2021, Malaysia, pp. 1-6. </unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52]	T. Pooja and P. Shrinivasacharya, "Evaluating neural networks using Bi-Directional LSTM for network IDS (intrusion detection systems) in cyber security", Global Transitions Proceedings, Vol. 2, No. 2, 2021, pp. 448-454.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53]	S. N. Mighan and M. Kahani, "A novel scalable intrusion detection system based on deep learning", International Journal of Information Security, Vol. 20, No. 3, 2021, pp. 387-403.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[54]	H. Jia, J. Liu, M. Zhang, X. He, and W. Sun, "Network intrusion detection based on IE-DBN model", Computer Communications, Vol. 178, 2021, pp. 131-140.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[55]	R. Biswas and S. Roy, "Botnet traffic identification using neural networks", Multimedia Tools and Applications, Vol. 80, 2021, pp. 24147-24171.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[56]	F. Laghrissi, S. Douzi, K. Douzi, and B. Hssina, "Intrusion detection systems using long short-term memory (LSTM)", Journal of Big Data, Vol. 8, No. 1, 2021, pp. 65.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[57]	M. S. ElSayed, N.-A. Le-Khac, M. A. Albahar, and A. Jurcut, "A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique", Journal of Network and Computer Applications, Vol. 191, 2021, pp. 103160.</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[58]	C. Joshi, R. K. Ranjan, and V. Bharti, "A Fuzzy Logic based feature engineering approach for Botnet detection using ANN", Journal of King Saud University-Computer and Information Sciences, Vol. 34, No. 9, 2022, pp. 6872-6882.</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[59]	K. Sethi, Y. V. Madhav, R. Kumar, and P. Bera, "Attention based multi-agent intrusion detection systems using reinforcement learning", Journal of Information Security and Applications, Vol. 61, 2021, pp. 102923.</unstructured_citation></citation><citation key="ref60"><unstructured_citation>
[60]	R. V. Mendonca, J. C. Silva, R. L. Rosa, M. Saadi, D. Z. Rodriguez, and A. Farouk, "A lightweight intelligent intrusion detection system for industrial internet of things using deep learning algorithms", Expert Systems, Vol. 39, No. 5, 2022, pp. e12917.</unstructured_citation></citation><citation key="ref61"><unstructured_citation>
[61]	F. Hussain et al., "A framework for malicious traffic detection in IoT healthcare environment", Sensors, Vol. 21, No. 9, 2021, pp. 3025.</unstructured_citation></citation><citation key="ref62"><unstructured_citation>
[62]	I. Vaccari, S. Narteni, M. Aiello, M. Mongelli, and E. Cambiaso, "Exploiting Internet of Things protocols for malicious data exfiltration activities", IEEE Access, Vol. 9, 2021, pp. 104261-104280.</unstructured_citation></citation><citation key="ref63"><unstructured_citation>
[63]	Y. Imrana, Y. Xiang, L. Ali, and Z. Abdul-Rauf, "A bidirectional LSTM deep learning approach for intrusion detection", Expert Systems with Applications, Vol. 185, 2021, pp. 115524.</unstructured_citation></citation><citation key="ref64"><unstructured_citation>
[64]	I. A. Khan, N. Moustafa, D. Pi, W. Haider, B. Li, and A. Jolfaei, "An enhanced multi-stage deep learning framework for detecting malicious activities from autonomous vehicles", IEEE Transactions on Intelligent Transportation Systems, Vol. 23, No. 12, 2021, pp. 25469-25478.</unstructured_citation></citation><citation key="ref65"><unstructured_citation>
[65]	G. D. L. T. Parra, P. Rad, K.-K. R. Choo, and N. Beebe, "Detecting Internet of Things attacks using distributed deep learning", Journal of Network and Computer Applications, Vol. 163, 2020, pp. 102662.</unstructured_citation></citation><citation key="ref66"><unstructured_citation>
[66]	S. Latif, Z. Idrees, Z. Zou, and J. Ahmad, "DRaNN: A deep random neural network model for intrusion detection in industrial IoT", in International Conference On UK-China Emerging Technologies (UCET), 2020, Glasgow, UK, pp. 1-4.</unstructured_citation></citation><citation key="ref67"><unstructured_citation>
[67]	M. Roopak, G. Y. Tian, and J. Chambers, "An intrusion detection system against ddos attacks in iot networks", in 10th annual computing and communication workshop and conference (CCWC), 2020, USA, pp. 0562-0567.</unstructured_citation></citation><citation key="ref68"><unstructured_citation>
[68]	S. Smys, A. Basar, and H. Wang, "Hybrid intrusion detection system for internet of things (IoT)", Journal of ISMAC, Vol. 2, No. 04, 2020, pp. 190-199.</unstructured_citation></citation><citation key="ref69"><unstructured_citation>
[69]	S. M. Kasongo and Y. Sun, "Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset", Journal of Big Data, Vol. 7, 2020, pp. 1-20.</unstructured_citation></citation><citation key="ref70"><unstructured_citation>
[70]	Y. Li et al., "Robust detection for network intrusion of industrial IoT based on multi-CNN fusion", Measurement, Vol. 154, 2020, pp. 107450.</unstructured_citation></citation><citation key="ref71"><unstructured_citation>
[71]	R. Abou Khamis and A. Matrawy, "Evaluation of adversarial training on different types of neural networks in deep learning-based idss", in International Symposium On Networks, Computers And Communications (ISNCC), 2020, Canada, IEEE, pp. 1-6.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>GOA-ISR: A Grasshopper Optimization Algorithm for Improved Image Super-Resolution</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Bahar</given_name><surname>Ghaderi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hamid</given_name><surname>Azad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hamed</given_name><surname>Agahi</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>11</day><year>2024</year></publication_date><pages><first_page>241</first_page><last_page>249</last_page></pages><doi_data><doi>10.61186/jist.44920.12.47.241</doi><resource>http://jist.ir/en/Article/44920</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/44920</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/44920</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/44920</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/44920</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/44920</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/44920</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/44920</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	B. Ghaderi and H. Azad, "Deep Learning Algorithms in Super-Resolution Images," Journal of Circuits, Data and Systems Analysis, vol. 1, no. 1, p. 47, 2023.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	P. Behjati, P. Rodriguez, C. Fernández, I. Hupont, A. Mehri, and J. Gonzàlez, "Single image super-resolution based on directional variance attention network," Pattern Recognition, vol. 133, p. 108997, 2023.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	T. Goto, T. Fukuoka, F. Nagashima, S. Hirano, and M. Sakurai, "Super-resolution System for 4K-HDTV," in 2014 22nd International Conference on Pattern Recognition, 2014: IEEE, pp. 4453-4458. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Rapuano, G. Iovane, and M. Chinnici, "A scalable Blockchain based system for super resolution images manipulation," in 2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application (DependSys), 2020: IEEE, pp. 8-15. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. Dastmalchi and H. Aghaeinia, "Super-resolution of very low-resolution face images with a wavelet integrated, identity preserving, adversarial network," Signal Processing: Image Communication, p. 116755, 2022.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	I. Taghavi et al., "Ultrasound super-resolution imaging with a hierarchical Kalman tracker," Ultrasonics, vol. 122, p. 106695, 2022.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	P. Wang, B. Bayram, and E. Sertel, "A comprehensive review on deep learning based remote sensing image super-resolution methods," Earth-Science Reviews, p. 104110, 2022.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	K. Zhu, H. Guo, S. Li, and X. Lin, "Online tool wear monitoring by super-resolution based machine vision," Computers in Industry, vol. 144, p. 103782, 2023.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Hou and H. Andrews, "Cubic splines for image interpolation and digital filtering," IEEE Transactions on acoustics, speech, and signal processing, vol. 26, no. 6, pp. 508-517, 1978.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Li and T. Q. Nguyen, "Markov random field model-based edge-directed image interpolation," IEEE Transactions on Image Processing, vol. 17, no. 7, pp. 1121-1128, 2008.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Sun, J. Zhu, and M. F. Tappen, "Context-constrained hallucination for image super-resolution," in 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2010: IEEE, pp. 231-238. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	L. Wang, S. Xiang, G. Meng, H. Wu, and C. Pan, "Edge-directed single-image super-resolution via adaptive gradient magnitude self-interpolation," IEEE Transactions on Circuits and Systems for Video Technology, vol. 23, no. 8, pp. 1289-1299, 2013.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	W. T. Freeman, T. R. Jones, and E. C. Pasztor, "Example-based super-resolution," IEEE Computer graphics and Applications, vol. 22, no. 2, pp. 56-65, 2002.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	C. Dong, C. C. Loy, K. He, and X. Tang, "Learning a deep convolutional network for image super-resolution," in European conference on computer vision, 2014: Springer, pp. 184-199.</unstructured_citation></citation><citation key="ref15"><unstructured_citation> 
[15]	K. Zhang, J. Li, H. Wang, X. Liu, and X. Gao, "Learning local dictionaries and similarity structures for single image super-resolution," Signal Processing, vol. 142, pp. 231-243, 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	N. Kumar and A. Sethi, "Fast learning-based single image super-resolution," IEEE Transactions on Multimedia, vol. 18, no. 8, pp. 1504-1515, 2016.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. Jiang, C. Wang, X. Liu, and J. Ma, "Deep learning-based face super-resolution: A survey," ACM Computing Surveys (CSUR), vol. 55, no. 1, pp. 1-36, 2021.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	P. P. Gajjar and M. V. Joshi, "New learning based super-resolution: use of DWT and IGMRF prior," IEEE Transactions on Image Processing, vol. 19, no. 5, pp. 1201-1213, 2010.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. S. Rajput, V. K. Bohat, and K. Arya, "Grey wolf optimization algorithm for facial image super-resolution," Applied Intelligence, vol. 49, no. 4, pp. 1324-1338, 2019.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	K. Nguyen, C. Fookes, S. Sridharan, M. Tistarelli, and M. Nixon, "Super-resolution for biometrics: A comprehensive survey," Pattern Recognition, vol. 78, pp. 23-42, 2018.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	N. Wang, D. Tao, X. Gao, X. Li, and J. Li, "A comprehensive survey to face hallucination," International journal of computer vision, vol. 106, no. 1, pp. 9-30, 2014.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Y. Tang, P. Yan, Y. Yuan, and X. Li, "Single-image super-resolution via local learning," International Journal of Machine Learning and Cybernetics, vol. 2, no. 1, pp. 15-23, 2011.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	K. Zhang, X. Gao, D. Tao, and X. Li, "Single image super-resolution with non-local means and steering kernel regression," IEEE Transactions on Image Processing, vol. 21, no. 11, pp. 4544-4556, 2012.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	K. Zhang, X. Gao, D. Tao, and X. Li, "Single image super-resolution with multiscale similarity learning," IEEE transactions on neural networks and learning systems, vol. 24, no. 10, pp. 1648-1659, 2013.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Z. Wang, Y. Yang, Z. Wang, S. Chang, J. Yang, and T. S. Huang, "Learning super-resolution jointly from external and internal examples," IEEE Transactions on Image Processing, vol. 24, no. 11, pp. 4359-4371, 2015.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	X. Lu, H. Yuan, Y. Yuan, P. Yan, L. Li, and X. Li, "Local learning-based image super-resolution," in 2011 IEEE 13th International Workshop on Multimedia Signal Processing, 2011: IEEE, pp. 1-5. </unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	L. An and B. Bhanu, "Image super-resolution by extreme learning machine," in 2012 19th IEEE international conference on image processing, 2012: IEEE, pp. 2209-2212. </unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	M. Bevilacqua, A. Roumy, C. Guillemot, and M. L. Alberi-Morel, "Low-complexity single-image super-resolution based on nonnegative neighbor embedding," 2012.#
[29]	S. Saremi, S. Mirjalili, and A. Lewis, "Grasshopper optimisation algorithm: theory and application," Advances in engineering software, vol. 105, pp. 30-47, 2017.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	I. J. Cox, M. L. Miller, J. A. Bloom, and C. Honsinger, Digital watermarking. Springer, 2002.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	P. Tumuluru and B. Ravi, "GOA-based DBN: Grasshopper optimization algorithm-based deep belief neural networks for cancer classification," International Journal of Applied Engineering Research, vol. 12, no. 24, pp. 14218-14231, 2017.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	P.-H. Dinh, "A novel approach based on grasshopper optimization algorithm for medical image fusion," Expert Systems with Applications, vol. 171, p. 114576, 2021.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	J. H. Holland, "Genetic algorithms," Scientific american, vol. 267, no. 1, pp. 66-73, 1992.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	R. Eberhart and J. Kennedy, "A new optimizer using particle swarm theory," in MHS'95. Proceedings of the sixth international symposium on micro machine and human science, 1995: Ieee, pp. 39-43. </unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	A. Kamalinia and A. Ghaffari, "Hybrid task scheduling method for cloud computing by genetic and PSO algorithms," J. Inf. Syst. Telecommun, vol. 4, pp. 271-281, 2016.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	X.-S. Yang, "Firefly algorithms for multimodal optimization," in International symposium on stochastic algorithms, 2009: Springer, pp. 169-178. </unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	A. Mahmoodzadeh, H. Agahi, and M. Salehi, "Handwritten Digits Recognition Using an Ensemble Technique Based on the Firefly Algorithm," Journal of Information Systems and Telecommunication (JIST), vol. 3, no. 23, p. 136, 2019.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	X.-S. Yang, "A new metaheuristic bat-inspired algorithm," in Nature inspired cooperative strategies for optimization (NICSO 2010): Springer, 2010, pp. 65-74.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	E. Rashedi, E. Rashedi, and H. Nezamabadi-Pour, "A comprehensive survey on gravitational search algorithm," Swarm and evolutionary computation, vol. 41, pp. 141-158, 2018.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[40]	M. Tourani, "Improvement of Firefly Algorithm using Particle Swarm Optimization and Gravitational Search Algorithm," Journal of Information Systems and Telecommunication (JIST), vol. 2, no. 34, p. 123, 2021.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[41]	C. M. Topaz, A. J. Bernoff, S. Logan, and W. Toolson, "A model for rolling swarms of locusts," The European Physical Journal Special Topics, vol. 157, no. 1, pp. 93-109, 2008.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[42]	S. M. Rogers, T. Matheson, E. Despland, T. Dodgson, M. Burrows, and S. J. Simpson, "Mechanosensory-induced behavioural gregarization in the desert locust Schistocerca gregaria," Journal of Experimental Biology, vol. 206, no. 22, pp. 3991-4002, 2003.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[43]Y. ChangH, "XiongY. Super-resolutionthroughneighborembedding," Proceedingsofthe2004IEEEComputer Society C o nference on ComputerVision and Pattern Rec ogni—tion, pp. 275-282, 2004.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[44]J. Yang, J. Wright, T. S. Huang, and Y. Ma, "Image super-resolution via sparse representation," IEEE transactions on image processing, vol. 19, no. 11, pp. 2861-2873, 2010.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[45]J. Gu, H. Lu, W. Zuo, and C. Dong, "Blind super-resolution with iterative kernel correction," in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 1604-1613. </unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[46]X. Gao, K. Zhang, D. Tao, and X. Li, "Image super-resolution with sparse neighbor embedding," IEEE Transactions on Image Processing, vol. 21, no. 7, pp. 3194-3205, 2012.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[47]W. Dong, L. Zhang, G. Shi, and X. Wu, "Image deblurring and super-resolution by adaptive sparse domain selection and adaptive regularization," IEEE Transactions on image processing, vol. 20, no. 7, pp. 1838-1857, 2011.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[48]T. Dai, J. Cai, Y. Zhang, S.-T. Xia, and L. Zhang, "Second-order attention network for single image super-resolution," in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2019, pp. 11065-11074. </unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[49]E. Agustsson and R. Timofte, "Ntire 2017 challenge on single image super-resolution: Dataset and study," in Proceedings of the IEEE conference on computer vision and pattern recognition workshops, 2017, pp. 126-135. </unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[50]F. Akhlaghian Tab, K. Ghaderi, and P. Moradi, "A New Robust Digital Image Watermarking Algorithm Based on LWT-SVD and Fractal Images," Journal of Information Systems and Telecommunication (JIST), vol. 1, no. 9, p. 1, 2015.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[51]K. Li, S. Yang, R. Dong, X. Wang, and J. Huang, "Survey of single image super‐resolution reconstruction," IET Image Processing, vol. 14, no. 11, pp. 2273-2290, 2020.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[52]V. K. Bohat and K. Arya, "An effective gbest-guided gravitational search algorithm for real-parameter optimization and its application in training of feedforward neural networks," Knowledge-Based Systems, vol. 143, pp. 192-207, 2018.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[53]	S.-C. Chu, Z.-C. Dou, J.-S. Pan, L. Kong, V. Snášel, and J. Watada, "DWSR: an architecture optimization framework for adaptive super-resolution neural networks based on meta-heuristics," Artificial Intelligence Review, vol. 57, no. 2, p. 23, 2024.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[54]	Y. Meraihi, A. B. Gabis, S. Mirjalili, and A. Ramdane-Cherif, "Grasshopper optimization algorithm: theory, variants, and applications," IEEE Access, vol. 9, pp. 50001-50024, 2021.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[55]	J.-B. Huang, A. Singh, and N. Ahuja, "Single image super-resolution from transformed self-exemplars," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 5197-5206.</unstructured_citation></citation><citation key="ref55"><unstructured_citation> 
[56]	D. Martin, C. Fowlkes, D. Tal, and J. Malik, "A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics," in Proceedings eighth IEEE international conference on computer vision. ICCV 2001, 2001, vol. 2: IEEE, pp. 416-423. </unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[57]	R. Zeyde, M. Elad, and M. Protter, "On single image scale-up using sparse-representations," in Curves and Surfaces: 7th International Conference, Avignon, France, June 24-30, 2010, Revised Selected Papers 7, 2012: Springer, pp. 711-730.</unstructured_citation></citation><citation key="ref57"><unstructured_citation> 

</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improving Opinion Mining Through Automatic Prompt Construction</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Arash</given_name><surname>Yousefi Jordehi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahsa</given_name><surname> Hosseini Khasheh Heyran</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Saeed</given_name><surname>Ahmadnia</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyed Abolghassem</given_name><surname>Mirroshandel</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Owen</given_name><surname>Rambow</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>11</day><year>2024</year></publication_date><pages><first_page>216</first_page><last_page>227</last_page></pages><doi_data><doi>10.61186/jist.46273.12.47.216</doi><resource>http://jist.ir/en/Article/46273</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/46273</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/46273</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/46273</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/46273</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/46273</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/46273</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/46273</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] A. Frank and A. Marasović, "SRL4ORL: Improving Opinion Role Labeling Using Multi-Task Learning with Semantic Role Labeling," in Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, New Orleans, Louisiana, 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] B. Zhang, Y. Zhang, R. Wang, Z. Li and M. Zhang, "Syntax-Aware Opinion Role Labeling with Dependency Graph Convolutional Networks," in Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, Online, 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] Q. Xia, B. Zhang, R. Wang, Z. Li, Y. Zhang, F. Huang, L. Si and M. Zhang, "A Unified Span-Based Approach for Opinion Mining with Syntactic Constituents," in Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Online, 2021.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] S. Ahmadnia, A. Yousefi Jordehi, M. Hosseini Khasheh Heyran, S. Mirroshandel and O. Rambow, "Opinion Mining Using Pre-Trained Large Language Models: Identifying the Type, Polarity, Intensity, Expression, and Source of Private States," in Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024), Torino, Italia, 2024.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] J. Wiebe, "Identifying subjective characters in narrative," in COLING 1990 Volume 2: Papers presented to the 13th International Conference on Computational Linguistics, 1990.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] J. Wiebe, T. Wilson and M. Bell, "Identifying collocations for recognizing opinions," in Proceedings of the ACL-01 Workshop on Collocation: Computational Extraction, Analysis, and Exploitation, 2001.</unstructured_citation></citation><citation key="ref7"><unstructured_citation> 
[7] T. A. Wilson, Fine-grained subjectivity and sentiment analysis: recognizing the intensity, polarity, and attitudes of private states, University of Pittsburgh, 2008.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] M. Zhang, P. Liang and G. Fu, "Enhancing Opinion Role Labeling with Semantic-Aware Word Representations from Semantic Role Labeling," in Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies,, Minneapolis, Minnesota, 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] S. Wu, H. Fei, F. Li, D. Ji, M. Zhang, Y. Liu and C. Teng, "Mastering the explicit opinion-role interaction: Syntax-aided neural transition system for unified opinion role labeling," in Proceedings of the AAAI conference on artificial intelligence, Online, 2022.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Z. Gao, A. Feng, X. Song and X. Wu, "Target-Dependent Sentiment Classification With BERT," IEEE Access, vol. 7, pp. 154290-154299, 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] Y. Z. R. W. Z. L. M. Z. Bo Zhang, "Syntax-Aware Opinion Role Labeling with Dependency Graph Convolutional Networks," in Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, Online, 2020.</unstructured_citation></citation><citation key="ref12"><unstructured_citation> 
[12] W. Zhang, X. Li, Y. Deng, L. Bing and W. Lam, "Towards Generative Aspect-Based Sentiment Analysis," in Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, Online, 2021.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] X. Bao, W. Zhongqing, X. Jiang, R. Xiao and S. Li, "Aspect-based Sentiment Analysis with Opinion Tree Generation," in Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, Vienna, 2022.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] P. Kavehzadeh, M. M. Abdollah Pour and S. Momtazi, "Deep Transformer-based Representation for Text Chunking," Journal of Information Systems and Telecommunication (JIST), vol. 3, pp. 176-184, 2023.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] S. Chakraborty, M. Borhan Uddin Talukdar, P. Sikdar and J. Uddin, "An Efficient Sentiment Analysis Model for Crime Articles’ Comments using a Fine-tuned BERT Deep Architecture and Pre-Processing Techniques," Journal of Information Systems and Telecommunication (JIST), vol. 12, pp. 1-11, 2024.</unstructured_citation></citation><citation key="ref16"><unstructured_citation> 
[16] N. Jadhav, "Hierarchical Weighted Framework for Emotional Distress Detection using Personalized Affective Cues," Journal of Information Systems and Telecommunication (JIST), vol. 10, pp. 89-101, 2022.</unstructured_citation></citation><citation key="ref17"><unstructured_citation> 
[17] Liu, C. Raffel, N. Shazeer, A. Roberts, K. Lee, S. Narang, M. Matena, Y. Zhou, W. Li and P. J., "Exploring the Limits of Transfer Learning with a Unified Text-to-Text Transformer," Journal of Machine Learning Research (JMLR), vol. 21, no. 140, pp. 1-67, 2020.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] M. Lewis, Y. Liu, N. Goyal, M. Ghazvininejad, A. Mohamed, O. Levy, V. Stoyanov and L. Zettlemoyer, "BART: Denoising Sequence-to-Sequence Pre-training for Natural Language Generation, Translation, and Comprehension," in Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, Online, 2020.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] H. W. Chung, L. Hou, S. Longpre, B. Zoph, Y. Tay, W. Fedus, Y. Li, X. Wang, M. Dehghani, S. Brahma, A. Webson, S. S. Gu, Z. Dai, M. Suzgun, X. Chen, A. Chowdhery, A. Castro-Ros and Marie, "Scaling instruction-finetuned language models," arXiv preprint arXiv:2210.11416, 2022.</unstructured_citation></citation><citation key="ref20"><unstructured_citation> 
[20] E. Breck, Y. Choi and C. Cardie, "Identifying expressions of opinion in context.," in International Joint Conference on Artificial Intelligence, Hyderabad India, 2007.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] B. Yang and C. Cardie, "Joint Inference for Fine-grained Opinion Extraction," in Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, Sofia, Bulgaria, 2013.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]B. Yang and C. Cardie, "Joint Modeling of Opinion Expression Extraction and Attribute Classification," Transactions of the Association for Computational Linguistics, p. 505–516, 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation> 
[23] A. Katiyar and C. Cardie, "Investigating LSTMs for Joint Extraction of Opinion Entities and Relations," in Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, Berlin, Germany, 2016.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] W. Quan, J. Zhang and X. T. Hu, "End-to-end joint opinion role labeling with bert," in IEEE International Conference on Big Data (Big Data), 2019.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] M. Zhang, Q. Wang and G. Fu, "End-to-end neural opinion extraction with a transition-based model," Information Systems, vol. 80, pp. 56-63, 2019.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] J. Devlin, M.-W. Chang, K. Lee and K. Toutanova, "Bert: Pre-training of deep bidirectional transformers for language understanding," in Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Minneapolis, Minnesota, 2019.</unstructured_citation></citation><citation key="ref27"><unstructured_citation> 
[27]O. Vinyals, M. Fortunato and N. Jaitly, "Pointer networks," Advances in neural information processing systems, vol. 28, 2015.</unstructured_citation></citation><citation key="ref28"><unstructured_citation> 
[28] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, {. Kaiser and I. Polosukhin, "Attention is all you need," Advances in neural information processing systems}, vol. 30, 2017.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] B. Lester, R. Al-Rfou and N. Constant, "The Power of Scale for Parameter-Efficient Prompt Tuning," in Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, Online and Punta Cana, Dominican Republic, 2021.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] D. C. Senadeera and J. Ive, "Controlled text generation using T5 based encoder-decoder soft prompt tuning and analysis of the utility of generated text in AI," in arXiv preprint arXiv:2212.02924, 2022.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Enhancing IoT Security: A Comparative Analysis of Hybrid Hyperparameter Optimization for Deep Learning-Based Intrusion Detection Systems</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Heshamt</given_name><surname>Asadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahmood </given_name><surname>Alborzi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hessam </given_name><surname>Zandhessami</surname></person_name></contributors><publication_date media_type="online"><month>11</month><day>11</day><year>2024</year></publication_date><pages><first_page>183</first_page><last_page>196</last_page></pages><doi_data><doi>10.61186/jist.46793.12.47.183</doi><resource>http://jist.ir/en/Article/46793</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/46793</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/46793</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/46793</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/46793</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/46793</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/46793</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/46793</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. S. Sani and A. K. Bardsiri, “Providing a New Smart Camera Architecture for Intrusion Detection in Wireless Visual Sensor Network,” Journal of Information Systems and Telecommunication, vol. 11, no. 1, 2023, doi: 10.52547/jist.15672.11.41.31.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	H. Nandanwar and R. Katarya, “Deep learning enabled intrusion detection system for Industrial IOT environment,” Expert Syst Appl, vol. 249, p. 123808, Sep. 2024, doi: 10.1016/j.eswa.2024.123808.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. F. Elrawy, A. I. Awad, and H. F. A. Hamed, “Intrusion detection systems for IoT-based smart environments: a survey,” Journal of Cloud Computing, vol. 7, no. 1, p. 21, Dec. 2018, doi: 10.1186/s13677-018-0123-6.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Kaushik and H. Al-Raweshidy, “A novel intrusion detection system for internet of things devices and data,” Wireless Networks, vol. 30, no. 1, pp. 285–294, Jan. 2024, doi: 10.1007/s11276-023-03435-0.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Rathna, L. M. Gladence, J. S. Cynthia, and V. M. Anu, “Energy Efficient Cross Layer MAC Protocol for Wireless Sensor Networks in Remote Area Monitoring Applications,” Journal of Information Systems and Telecommunication, vol. 9, no. 35, 2021, doi: 10.52547/jist.9.35.207.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Alosaimi and S. M. Almutairi, “An Intrusion Detection System Using BoT-IoT,” Applied Sciences, vol. 13, no. 9, p. 5427, Apr. 2023, doi: 10.3390/app13095427.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	V. Choudhary, S. Tanwar, and T. Choudhury, “Evaluation of contemporary intrusion detection systems for internet of things environment,” Multimed Tools Appl, vol. 83, no. 3, pp. 7541–7581, Jan. 2024, doi: 10.1007/s11042-023-15918-5.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Awajan, “A Novel Deep Learning-Based Intrusion Detection System for IoT Networks,” Computers, vol. 12, no. 2, p. 34, Feb. 2023, doi: 10.3390/computers12020034.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. Chaganti, W. Suliman, V. Ravi, and A. Dua, “Deep Learning Approach for SDN-Enabled Intrusion Detection System in IoT Networks,” Information, vol. 14, no. 1, p. 41, Jan. 2023, doi: 10.3390/info14010041.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	E. Anthi, L. Williams, M. Slowinska, G. Theodorakopoulos, and P. Burnap, “A Supervised Intrusion Detection System for Smart Home IoT Devices,” IEEE Internet Things J, vol. 6, no. 5, pp. 9042–9053, Oct. 2019, doi: 10.1109/JIOT.2019.2926365.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	T. Saba, A. Rehman, T. Sadad, H. Kolivand, and S. A. Bahaj, “Anomaly-based intrusion detection system for IoT networks through deep learning model,” Computers and Electrical Engineering, vol. 99, p. 107810, Apr. 2022, doi: 10.1016/j.compeleceng.2022.107810.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi, and A. Razaque, “Deep recurrent neural network for IoT intrusion detection system,” Simul Model Pract Theory, vol. 101, p. 102031, May 2020, doi: 10.1016/j.simpat.2019.102031.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Nazarpour, N. Nezafati, and S. Shokouhyar, “Detection of Attacks and Anomalies in the Internet of Things System using Neural Networks Based on Training with PSO Algorithms, Fuzzy PSO, Comparative PSO and Mutative PSO,” Journal of Information Systems and Telecommunication, vol. 10, no. 40, 2022, doi: 10.52547/jist.16307.10.40.270.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Heidari and M. A. Jabraeil Jamali, “Internet of Things intrusion detection systems: a comprehensive review and future directions,” Cluster Comput, vol. 26, no. 6, pp. 3753–3780, Dec. 2023, doi: 10.1007/s10586-022-03776-z.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	D. Musleh, M. Alotaibi, F. Alhaidari, A. Rahman, and R. M. Mohammad, “Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT,” Journal of Sensor and Actuator Networks, vol. 12, no. 2, p. 29, Mar. 2023, doi: 10.3390/jsan12020029.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. Kumar, K. Abhishek, M. R. Ghalib, A. Shankar, and X. Cheng, “Intrusion detection and prevention system for an IoT environment,” Digital Communications and Networks, vol. 8, no. 4, pp. 540–551, Aug. 2022, doi: 10.1016/j.dcan.2022.05.027.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. U. Jan, S. Ahmed, V. Shakhov, and I. Koo, “Toward a Lightweight Intrusion Detection System for the Internet of Things,” IEEE Access, vol. 7, pp. 42450–42471, 2019, doi: 10.1109/ACCESS.2019.2907965.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	H. Alazzam, A. Sharieh, and K. E. Sabri, “A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer,” Expert Syst Appl, vol. 148, p. 113249, Jun. 2020, doi: 10.1016/j.eswa.2020.113249.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	R. Zhao et al., “A Novel Intrusion Detection Method Based on Lightweight Neural Network for Internet of Things,” IEEE Internet Things J, vol. 9, no. 12, pp. 9960–9972, 2022, doi: 10.1109/JIOT.2021.3119055.
[20]	S. M. Kasongo, “A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework,” Comput Commun, vol. 199, pp. 113–125, Feb. 2023, doi: 10.1016/j.comcom.2022.12.010.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	V. Hnamte, H. Nhung-Nguyen, J. Hussain, and Y. Hwa-Kim, “A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE,” IEEE Access, vol. 11, pp. 37131–37148, 2023, doi: 10.1109/ACCESS.2023.3266979.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>