﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051922</doi_batch_id><timestamp>20260519222841</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>3</month><day>5</day><year>2025</year></publication_date><journal_volume><volume>12</volume></journal_volume><issue>48</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Load Balancing Algorithms in Cloud, Fog Computing and Convergence of Fog and Cloud – A Survey</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Seyedeh Leili</given_name><surname>Mirtaheri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahya</given_name><surname>Azari Jafari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sergio</given_name><surname> Greco</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ehsan </given_name><surname>Arianian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Reza</given_name><surname>Mansouri</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2025</year></publication_date><pages><first_page>264</first_page><last_page>279</last_page></pages><doi_data><doi>10.61186/jist.38787.12.48.264</doi><resource>http://jist.ir/en/Article/38787</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/38787</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/38787</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/38787</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/38787</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/38787</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/38787</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/38787</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	P. Hu, S. Dhelim, H. Ning, and T. Qiu, “Survey on fog computing: architecture, key technologies, applications and open issues,” Journal of Network and Computer Applications, vol. 98, pp. 27–42, Nov. 2017, doi: 10.1016/j.jnca.2017.09.002.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] 	M. Verma, N. Bhardwaj, and A. K. Yadav, “Real Time Efficient Scheduling Algorithm for Load Balancing in Fog Computing Environment,” International Journal of Information Technology and Computer Science, vol. 8, no. 4, pp. 1–10, Apr. 2016, doi: 10.5815/ijitcs.2016.04.01.</unstructured_citation></citation><citation key="ref3"><unstructured_citation> 
[3] 	S. Verma, A. K. Yadav, D. Motwani, R. S. Raw and H. K. Singh, "An efficient data replication and load balancing technique for fog computing environment," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016, pp. 2888-2895. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] 	A. Alharthi, F. Yahya, R. J. Walters, and G. B. Wills, “An Overview of Cloud Services Adoption Challenges in Higher Education Institutions,” Proceedings of the 2nd International Workshop on Emerging Software as a Service and Analytics, 2015, doi: 10.5220/0005529701020109.</unstructured_citation></citation><citation key="ref5"><unstructured_citation> 
[5] 	S. Mathew, “Implementation of Cloud Computing in Education - A Revolution,” International Journal of Computer Theory and Engineering, pp. 473–475, 2012, doi: 10.7763/ijcte.2012.v4.511. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] 	H. Atlam, R. Walters, and G. Wills, “Fog Computing and the Internet of Things: A Review,” Big Data and Cognitive Computing, vol. 2, no. 2, p. 10, Apr. 2018, doi: 10.3390/bdcc2020010.</unstructured_citation></citation><citation key="ref7"><unstructured_citation> 
[7] 	A. Ahmed, et al. "Fog Computing Applications: Taxonomy and Requirements," arXiv, 26 July 2019. doi: 10.48550/arXiv.1907.11621. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] 	E. Jafarnejad Ghomi, A. Masoud Rahmani, and N. Nasih Qader, “Load-balancing algorithms in cloud computing: A survey,” Journal of Network and Computer Applications, vol. 88, pp. 50–71, Jun. 2017, doi: 10.1016/j.jnca.2017.04.007.</unstructured_citation></citation><citation key="ref9"><unstructured_citation> 
[9] 	Z. M. Elngomi and K. Khanfar "A Comparative Study of Load Balancing Algorithms: A Review Paper," International Journal of Computer Science and Mobile Computing, vol. 5, no. 6, pp. 448-458, Jun. 2016. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] 	M. N. Arab, S. L. Mirtaheri, E. M. Khaneghah, M. Sharifi, and M. Mohammadkhani, “Improving Learning-Based Request Forwarding in Resource Discovery through Load-Awareness,” Lecture Notes in Computer Science, pp. 73–82, 2011, doi: 10.1007/978-3-642-22947-3_7. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] 	A. Chandak and N. K. Ray, “A Review of Load Balancing in Fog Computing,” 2019 International Conference on Information Technology (ICIT), Dec. 2019, doi: 10.1109/icit48102.2019.00087. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] 	X. He, Z. Ren, C. Shi, and J. Fang, “A novel load balancing strategy of software-defined cloud/fog networking in the Internet of Vehicles,” China Communications, vol. 13, no. 2, pp. 140–149, 2016, doi: 10.1109/cc.2016.7405730. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] 	J. Wan, B. Chen, S. Wang, M. Xia, D. Li, and C. Liu, “Fog Computing for Energy-Aware Load Balancing and Scheduling in Smart Factory,” IEEE Transactions on Industrial Informatics, vol. 14, no. 10, pp. 4548–4556, Oct. 2018, doi: 10.1109/TII.2018.2818932.</unstructured_citation></citation><citation key="ref14"><unstructured_citation> 
[14] 	R. Bukhsh, N. Javaid, Z. Ali Khan, F. Ishmanov, M. Afzal, and Z. Wadud, “Towards Fast Response, Reduced Processing and Balanced Load in Fog-Based Data-Driven Smart Grid,” Energies, vol. 11, no. 12, p. 3345, Nov. 2018, doi: 10.3390/en11123345. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] 	S. H. Abbasi, N. Javaid, M. H. Ashraf, M. Mehmood, M. Naeem, and M. Rehman, “Load Stabilizing in Fog Computing Environment Using Load Balancing Algorithm,” Lecture Notes on Data Engineering and Communications Technologies, pp. 737–750, Oct. 2018, doi: 10.1007/978-3-030-02613-4_66. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] 	A. Kamalinia and A. Ghaffari, "Hybrid Task Scheduling Method for Cloud Computing by Genetic and PSO Algorithms," Journal of Information Systems and Telecommunication (JIST), vol 16, no. 4, pp. 1-10, Sep. 2016, doi: 10.7508/jist.2016.04.008. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] 	M. Verma and N. B. A. K. Yadav, “An architecture for load balancing techniques for fog computing environment,” International Journal of Computer Science and Communication, vol. 8, no. 2, pp. 43–49, 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation> 
[18] 	S. Sharma and H. Saini, “Efficient Solution for Load Balancing in Fog Computing Utilizing Artificial Bee Colony,” International Journal of Ambient Computing and Intelligence, vol. 10, no. 4, pp. 60–77, Oct. 2019, doi: 10.4018/ijaci.2019100104. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] 	M. Zahid, N. Javaid, K. Ansar, K. Hassan, M. KaleemUllah Khan, and M. Waqas, “Hill Climbing Load Balancing Algorithm on Fog Computing,” Advances on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 238–251, Oct. 2018, doi: 10.1007/978-3-030-02607-3_22. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] 	N. Tellez, M. Jimeno, A. Salazar, and E. D. Nino-Ruiz, “A Tabu Search Method for Load Balancing in Fog Computing,” International journal of artificial intelligence, vol. 16, pp. 106–135, 2018. 
[21] 	M. K. Hussein and M. H. Mousa, “Efficient Task Offloading for IoT-Based Applications in Fog Computing Using Ant Colony Optimization,” IEEE Access, vol. 8, pp. 37191–37201, 2020, doi: 10.1109/access.2020.2975741. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22] 	V. Arulkumar and N. Bhalaji, “Performance analysis of nature inspired load balancing algorithm in cloud environment,” Journal of Ambient Intelligence and Humanized Computing, Jan. 2020, doi: 10.1007/s12652-019-01655-x. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23] 	A. Gupta and R. Garg, “Load Balancing Based Task Scheduling with ACO in Cloud Computing,” 2017 International Conference on Computer and Applications (ICCA), Sep. 2017, doi: 10.1109/comapp.2017.8079781.</unstructured_citation></citation><citation key="ref23"><unstructured_citation> 
[24] 	W. T. Wen, C. D. Wang, D. S. Wu, and Y. Y. Xie, “An ACO-based Scheduling Strategy on Load Balancing in Cloud Computing Environment,” 2015 Ninth International Conference on Frontier of Computer Science and Technology, Aug. 2015, doi: 10.1109/fcst.2015.41. </unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25] 	P. Verma, S. Shrivastava, and R. K. Pateriya, “Enhancing load balancing in cloud computing by ant colony optimization method,” International Journal of Computer Engineering in Research Trends, vol. 4, no. 6, pp. 277–284, 2017. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26] 	K. R. Remesh Babu and P. Samuel, “Enhanced Bee Colony Algorithm for Efficient Load Balancing and Scheduling in Cloud,” Advances in Intelligent Systems and Computing, pp. 67–78, Dec. 2015, doi: 10.1007/978-3-319-28031-8_6. </unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27] 	S. Singhal, “Load Balancing in Cloud Computing using Mutative Bacterial Foraging Optimization,” Journal of Xidian University, vol. 14, no. 6, Jun. 2020, doi: 10.37896/jxu14.6/258. </unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28] 	M. Yakhchi, S. M. Ghafari, S. Yakhchi, M. Fazeli, and A. Patooghi, “Proposing a load balancing method based on Cuckoo Optimization Algorithm for energy management in cloud computing infrastructures,” 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), May 2015, doi: 10.1109/icmsao.2015.7152209.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29] 	B. Kruekaew and W. Kimpan, “Enhancing of Artificial Bee Colony Algorithm for Virtual Machine Scheduling and Load Balancing Problem in Cloud Computing,” International Journal of Computational Intelligence Systems, vol. 13, no. 1, p. 496, 2020, doi: 10.2991/ijcis.d.200410.002. </unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30] 	S. Sefati, M. Mousavinasab, and R. Zareh Farkhady, “Load balancing in cloud computing environment using the Grey wolf optimization algorithm based on the reliability: performance evaluation,” The Journal of Supercomputing, May 2021, doi: 10.1007/s11227-021-03810-8. </unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31] 	A. V and N. Bhalaji, “Load balancing in cloud computing using water wave algorithm,” Concurrency and Computation: Practice and Experience, vol. 34, no. 8, Sep. 2019, doi: 10.1002/cpe.5492.</unstructured_citation></citation><citation key="ref31"><unstructured_citation> 
[32] 	A. Pradhan and S. K. Bisoy, “A novel load balancing technique for cloud computing platform based on PSO,” Journal of King Saud University - Computer and Information Sciences, Oct. 2020, doi: 10.1016/j.jksuci.2020.10.016. </unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33] 	R. M. Alguliyev, Y. N. Imamverdiyev, and F. J. Abdullayeva, “PSO-based Load Balancing Method in Cloud Computing,” Automatic Control and Computer Sciences, vol. 53, no. 1, pp. 45–55, Jan. 2019, doi: 10.3103/s0146411619010024. </unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34] 	H. Sharma and G. Sekhon, "Load Balancing in Cloud Using Enhanced Genetic Algorithm," International Journal of Innovations and &amp; Advancement in Computer Science, vol. 6, no. 1, pp. 100–107, 2017. </unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35] 	D. Puthal, M. S. Obaidat, P. Nanda, M. Prasad, S. P. Mohanty, and A. Y. Zomaya, “Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing,” IEEE Communications Magazine, vol. 56, no. 5, pp. 60–65, May 2018, doi: 10.1109/mcom.2018.1700795. </unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36] 	X. Xu, Q. Liu, L. Qi, Y. Yuan, W. Dou, and A. X. Liu, “A Heuristic Virtual Machine Scheduling Method for Load Balancing in Fog-Cloud Computing,” 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), May 2018, doi: 10.1109/bds/hpsc/ids18.2018.00030. </unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37] 	A. B. Manju and S. Sumathy, “Efficient Load Balancing Algorithm for Task Preprocessing in Fog Computing Environment,” Smart Intelligent Computing and Applications, pp. 291–298, Nov. 2018, doi: 10.1007/978-981-13-1927-3_31. </unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38] 	A. Singh and N. Auluck, “Load balancing aware scheduling algorithms for fog networks,” Software: Practice and Experience, Jun. 2019, doi: 10.1002/spe.2722. </unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39] 	P. P. G. Gopinath and S. K. Vasudevan, “An In-depth Analysis and Study of Load Balancing Techniques in the Cloud Computing Environment,” Procedia Computer Science, vol. 50, pp. 427–432, 2015, doi: 10.1016/j.procs.2015.04.009. </unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[40] 	A. Kazeem Moses, A. Joseph Bamidele, O. Roseline Oluwaseun, S. Misra, and A. Abidemi Emmanuel, “Applicability of MMRR load balancing algorithm in cloud computing,” International Journal of Computer Mathematics: Computer Systems Theory, vol. 6, no. 1, pp. 7–20, Dec. 2020, doi: 10.1080/23799927.2020.1854864. </unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[41] 	T. C. Hung, L. N. Hieu, P. T. Hy, and N. X. Phi, “MMSIA,” Proceedings of the 3rd International Conference on Machine Learning and Soft Computing - ICMLSC 2019, 2019, doi: 10.1145/3310986.3311017. </unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[42] 	A. Aghdashi and S. L. Mirtaheri, “Novel dynamic load balancing algorithm for cloud-based big data analytics,” The Journal of Supercomputing, Aug. 2021, doi: 10.1007/s11227-021-04024-8. </unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[43] 	J. Baek, G. Kaddoum, S. Garg, K. Kaur, and V. Gravel, “Managing Fog Networks using Reinforcement Learning Based Load Balancing Algorithm,” 2019 IEEE Wireless Communications and Networking Conference (WCNC), Apr. 2019, doi: 10.1109/wcnc.2019.8885745. </unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[44] 	S. Sharma and H. Saini, “A novel four-tier architecture for delay aware scheduling and load balancing in fog environment,” Sustainable Computing: Informatics and Systems, vol. 24, p. 100355, Dec. 2019, doi: 10.1016/j.suscom.2019.100355. </unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[45] 	J. Zhao, K. Yang, X. Wei, Y. Ding, L. Hu, and G. Xu, “A Heuristic Clustering-Based Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 305–316, Feb. 2016, doi: 10.1109/tpds.2015.2402655. </unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[46] 	S. Kapoor and C. Dabas, “Cluster based load balancing in cloud computing,” 2015 Eighth International Conference on Contemporary Computing (IC3), Aug. 2015, doi: 10.1109/ic3.2015.7346656. </unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[47] 	S. Parida and Bakul Panchal, "An Efficient Dynamic Load Balancing Algorithm Using Machine Learning Technique in Cloud Environment," International journal of scientific research in science, engineering and technology, vol. 4, pp. 1184–1186, 2018. </unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[48] 	M. Li et al., “Distributed machine learning load balancing strategy in cloud computing services,” Wireless Networks, Jul. 2019, doi: 10.1007/s11276-019-02042-2. </unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[49] 	X. Sui, D. Liu, L. Li, H. Wang, and H. Yang, “Virtual machine scheduling strategy based on machine learning algorithms for load balancing,” EURASIP Journal on Wireless Communications and Networking, vol. 2019, no. 1, Jun. 2019, doi: 10.1186/s13638-019-1454-9. </unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[50] 	B. Kruekaew and W. Kimpan, “Multi-Objective Task Scheduling Optimization for Load Balancing in Cloud Computing Environment Using Hybrid Artificial Bee Colony Algorithm With Reinforcement Learning,” IEEE Access, vol. 10, pp. 17803–17818, 2022, doi: 10.1109/access.2022.3149955. </unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[51] 	D. Rathod and G. Chowdhary, “Load Balancing of Fog Computing Centers: Minimizing Response Time of High Priority Requests,” International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 11, pp. 2713–2716, Sep. 2019, doi: 10.35940/ijitee.k2171.0981119. </unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[52] 	S. Sthapit, J. R. Hopgood, and J. Thompson, “Distributed computational load balancing for real-time applications,” 2017 25th European Signal Processing Conference (EUSIPCO), Aug. 2017, doi: 10.23919/eusipco.2017.8081436. </unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[53] 	E. C. Pinto Neto, G. Callou, and F. Aires, “An algorithm to optimise the load distribution of fog environments,” 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Oct. 2017, doi: 10.1109/smc.2017.8122791.</unstructured_citation></citation><citation key="ref53"><unstructured_citation> 
[54] 	S. Ningning, G. Chao, A. Xingshuo, and Z. Qiang, “Fog computing dynamic load balancing mechanism based on graph repartitioning,” China Communications, vol. 13, no. 3, pp. 156–164, Mar. 2016, doi: 10.1109/cc.2016.7445510. </unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[55] 	J. Jijin, B.-C. Seet, P. H. J. Chong, and H. Jarrah, “Service load balancing in fog-based 5G radio access networks,” 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Oct. 2017, doi: 10.1109/pimrc.2017.8292300. </unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[56] 	H. A. Khattak et al., “Utilization and load balancing in fog servers for health applications,” EURASIP Journal on Wireless Communications and Networking, vol. 2019, no. 1, Apr. 2019, doi: 10.1186/s13638-019-1395-3. </unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[57] 	S. Hamrioui and P. Lorenz, “Load Balancing Algorithm for Efficient and Reliable IoT Communications within E-Health Environment,” GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Dec. 2017, doi: 10.1109/glocom.2017.8254435.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[58] 	J. L. Crespo-Mariño and E. Meneses-Rojas, Eds., High Performance Computing. Cham: Springer International Publishing, 2020. doi: 10.1007/978-3-030-41005-6. </unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[59] 	X. Xu et al., “Dynamic Resource Allocation for Load Balancing in Fog Environment,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1–15, 2018, doi: 10.1155/2018/6421607. </unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[60] 	D. Baburao, T. Pavankumar, and C. S. R. Prabhu, “Load balancing in the fog nodes using particle swarm optimization-based enhanced dynamic resource allocation method,” Applied Nanoscience, Jul. 2021, doi: 10.1007/s13204-021-01970-w.</unstructured_citation></citation><citation key="ref60"><unstructured_citation> 
[61] 	R. Beraldi, C. Canali, R. Lancellotti, and G. P. Mattia, “A Random Walk based Load Balancing Algorithm for Fog Computing,” 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), Apr. 2020, doi: 10.1109/fmec49853.2020.9144962. </unstructured_citation></citation><citation key="ref61"><unstructured_citation>
[62] 	E. Batista, G. Figueiredo, M. Peixoto, M. Serrano, and C. Prazeres, “Load Balancing in the Fog of Things Platforms Through Software-Defined Networking,” 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Jul. 2018, doi: 10.1109/cybermatics_2018.2018.00297.</unstructured_citation></citation><citation key="ref62"><unstructured_citation> 
[63] 	R. Beraldi and H. Alnuweiri, “Exploiting Power-of-Choices for Load Balancing in Fog Computing,” 2019 IEEE International Conference on Fog Computing (ICFC), Jun. 2019, doi: 10.1109/icfc.2019.00019. 
[64] 	V. R. Chandakanna and V. K. Vatsavayi, “A sliding window based Self-Learning and Adaptive Load Balancer,” Journal of Network and Computer Applications, vol. 56, pp. 188–205, Oct. 2015, doi: 10.1016/j.jnca.2015.07.001. </unstructured_citation></citation><citation key="ref63"><unstructured_citation>
[65] 	Y. Liu, C. Zhang, B. Li, and J. Niu, “DeMS: A hybrid scheme of task scheduling and load balancing in computing clusters,” Journal of Network and Computer Applications, vol. 83, pp. 213–220, Apr. 2017, doi: 10.1016/j.jnca.2015.04.017. </unstructured_citation></citation><citation key="ref64"><unstructured_citation>
[66] 	S. S. Patil and A. N. Gopal, "Dynamic Load Balancing Using Periodically Load Collection with Past Experience Policy on Linux Cluster System," American Journal of Mathematical and Computer Modelling, vol. 2, No. 2, pp. 60–75, 2017, doi: 10.11648/j.ajmcm.20170202.13. </unstructured_citation></citation><citation key="ref65"><unstructured_citation>
[67] 	V. Priya, C. Sathiya Kumar, and R. Kannan, “Resource scheduling algorithm with load balancing for cloud service provisioning,” Applied Soft Computing, vol. 76, pp. 416–424, Mar. 2019, doi: 10.1016/j.asoc.2018.12.021. </unstructured_citation></citation><citation key="ref66"><unstructured_citation>
[68] 	D. F. Altayeb and F. A. Mustafa, "Analysis on Load Balancing Algorithms Implementation on Cloud Computing," International Journal of Innovative Research in Advanced Engineering, vol. 6, no. 2, pp. 1-32, 2016. </unstructured_citation></citation><citation key="ref67"><unstructured_citation>
[69] 	S. L. Chen, Y. Y. Chen, and S. H. Kuo, “CLB: A novel load balancing architecture and algorithm for cloud services,” Computers &amp; Electrical Engineering, vol. 58, pp. 154–160, Feb. 2017, doi: 10.1016/j.compeleceng.2016.01.029. </unstructured_citation></citation><citation key="ref68"><unstructured_citation>
[70] 	S. L. Mirtaheri, L. Grandinetti, "Optimized Dynamic Load Balancing in Distributed Exascale Computing Systems," Ph.D. Thesis, Dept. of Electronics, Informatics and Systems Engineering, Univ. of Calabria, Italy, 2016, doi: 10.13126/unical.it/dottorati/1370. </unstructured_citation></citation><citation key="ref69"><unstructured_citation>
[71] 	A. Bhandari and K. Kaur, “An Enhanced Post-migration Algorithm for Dynamic Load Balancing in Cloud Computing Environment,” Advances in Intelligent Systems and Computing, pp. 59–73, Oct. 2018, doi: 10.1007/978-981-13-1544-2_6. </unstructured_citation></citation><citation key="ref70"><unstructured_citation>
[72] 	H. Naseri, S. Azizi, and A. Abdollahpouri, "BSFS: A Bidirectional Search Algorithm for Flow Scheduling in Cloud Data Centers," Journal of Information Systems and Telecommunication (JIST), vol. 3, no. 27, p. 175, Mar. 2020, doi: https://doi.org/10.7508/jist.2019.03.002. </unstructured_citation></citation><citation key="ref71"><unstructured_citation>
[73] 	M. Kaur and R. Aron, “Energy-aware load balancing in fog cloud computing,” Materials Today: Proceedings, Dec. 2020, doi: 10.1016/j.matpr.2020.11.121. </unstructured_citation></citation><citation key="ref72"><unstructured_citation>
[74] 	R. O. Aburukba, M. AliKarrar, T. Landolsi, and K. El-Fakih, “Scheduling Internet of Things requests to minimize latency in hybrid Fog–Cloud computing,” Future Generation Computer Systems, vol. 111, pp. 539–551, Oct. 2020, doi: 10.1016/j.future.2019.09.039. </unstructured_citation></citation><citation key="ref73"><unstructured_citation>
[75] 	J. Bisht and V. Subrahmanyam, “Survey on Load Balancing and Scheduling Algorithms in Cloud Integrated Fog Environment,” Proceedings of the 2nd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2020, 27-28 February 2020, Jamia Hamdard, New Delhi, India, 2021, doi: 10.4108/eai.27-2-2020.2303123. </unstructured_citation></citation><citation key="ref74"><unstructured_citation>
[76] 	A. Alarifi, F. Abdelsamie, and M. Amoon, “A fault-tolerant aware scheduling method for fog-cloud environments,” PLOS ONE, vol. 14, no. 10, p. e0223902, Oct. 2019, doi: 10.1371/journal.pone.0223902. </unstructured_citation></citation><citation key="ref75"><unstructured_citation>
[77] 	F. Alqahtani, M. Amoon, and A. A. Nasr, “Reliable scheduling and load balancing for requests in cloud-fog computing,” Peer-to-Peer Networking and Applications, vol. 14, no. 4, pp. 1905–1916, Mar. 2021, doi: 10.1007/s12083-021-01125-2. </unstructured_citation></citation><citation key="ref76"><unstructured_citation>
[78] 	F. Fakhar, "Investigate Network Simulation Tools in Designing and Managing Intelligent Systems," Journal of Information Systems and Telecommunication (JIST), vol. 28, no. 7, pp. 278-293, Jun. 2020, doi: 10.7508/jist.2019.04.004. </unstructured_citation></citation><citation key="ref77"><unstructured_citation>
[79] 	E. M. Khaneghah, S. L. Mirtaheri and M. Sharifi, "Evaluating the Effect of Inter Process Communication Efficiency on High Performance Distributed Scientific Computing," 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Shanghai, China, 2008, pp. 366-372, doi: 10.1109/EUC.2008.11. </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Sketch_Based Image Retrieval Using Convolutional Neural Network with Multi_Step Training </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Azita</given_name><surname>Gheitasi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hassan</given_name><surname>Farsi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sajad</given_name><surname>Mohamadzadeh</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2025</year></publication_date><pages><first_page>242</first_page><last_page>253</last_page></pages><doi_data><doi>10.61186/jist.41254.12.48.242</doi><resource>http://jist.ir/en/Article/41254</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/41254</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/41254</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/41254</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/41254</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/41254</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/41254</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/41254</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	D. Birari, D. Hiran, and V. Narawade, ''Survey on Sketch Based Image and Data Retrieval'', in ICCCE 2019 Springer, 2020, pp. 285-290.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Li, and W. Li, ''A survey of sketch-based image retrieval'', Machine Vision and Applications, Vol. 29, No. 7, 2018, pp. 1083-1100.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Mohammadzadeh, and H. Farsi, ''Image retrieval using color-texture features extracted from Gabor-Walsh wavelet pyramid'', Journal of Information Systems and Telecommunication, Vol. 2, No. 1, 2014, pp. 31-40.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	L. Liu, F. Shen, Y. Shen, X. Liu, and L. Shao, ''Deep sketch hashing: Fast free-hand sketch-based image retrieval'', in Proceedings of the IEEE conference on computer vision and pattern recognition, 2017, pp. 2862-2871.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Z. Hossein-Nejad, H. Agahi, and A. Mahmoodzadeh, ''Remote Sensing Image Registration based on a Geometrical Model Matching'', Journal of Information Systems and Telecommunication (JIST), Vol. 5, No. 36, 2021, pp. 41.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Zhang, F. Shen, L. Liu, F. Zhu, M. Yu, L. Shao, H. T. Shen, and L. Van Gool, ''Generative domain-migration hashing for sketch-to-image retrieval'', in Proceedings of the European conference on computer vision (ECCV), 2018, pp. 297-314.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Sain, A. K. Bhunia, Y. Yang, T. Xiang, and Y. Z. Song, ''Style me up: Towards style-agnostic sketch-based image retrieval'', in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 8504-8513.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Z. Dorrani, H. Farsi, and S. Mohamadzadeh, ''Image edge detection with fuzzy ant colony optimization algorithm'', International Journal of Engineering, Vol. 33, No. 12, 2020, pp. 2464-2470.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	E. Askari, and S. Motamed, ''Computational Model for Image Processing in the Minds of People with Visual Agnosia using Fuzzy Cognitive Map'', Journal of Information Systems and Telecommunication (JIST), Vol. 2, No. 42, 2023, pp. 102.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] T. Bui, L. Ribeiro, M. Ponti and J. Collomosse, ''Sketching out the details: Sketch-based image retrieval using convolutional neural networks with multi-stage regression'', Computers &amp; Graphics, 2018, Vol. 71, pp. 77-87.
[11] H. Farsi, and S. Mohamadzadeh, ''Combining Hadamard matrix, discrete wavelet transform and DCT features based on PCA and KNN for image retrieval'', Majlesi Journal of Electrical Engineering, Vol. 7, No. 1, 2013, pp. 9-15.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12] A. Del Bimbo, and P. Pala, ''Visual image retrieval by elastic matching of user sketches'', IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 19, No. 2, 1997, pp. 121-132.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13] Y. Chans, Z. Lie, D. P. Lopresti, and S. Y. Kung, ''Feature-based approach for image retrieval by sketch'', in Multimedia Storage and Archiving Systems II, 1997, Vol. 3229, pp. 220-231.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14] R. K. Rajendran, and S. F. Chang, ''Image retrieval with sketches and compositions'', in 2000 IEEE International Conference on Multimedia and Expo. ICME 2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No. 00TH8532), 2000, Vol. 2, pp. 717-720.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15] M. Rezaei, and M. Rezaei, ''Foreground-Back ground Segmentation using K-Means Clustering Algorithm and Support Vector Machin'', Journal of Information Systems and Telecommunication (JIST), Vol. 1, No. 41, 2023, pp. 65.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16] A. K. Bhunia, P. N. Chowdhury, A. Sain, Y. Yang, T. Xiang, and Y. Z. Song, ''More photos are all you need: Semi-supervised learning for fine-grained sketch-based image retrieval'', in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 4247-4256.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17] S. Dey, P. Riba, A. Dutta, J. Llados, and Y. Z. Song, ''Doodle to search: Practical zero-shot sketch-based image retrieval'', in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 2179-2188.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18] A. Gheitasi, H. Farsi, and S. Mohamadzadeh, ''Estimation of hand skeletal postures by using deep convolutional neural networks'', International Journal of Engineering, Vol. 33, No. 4, 2020, pp. 552-559.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, A. Rabinovich, ''Going deeper with convolutions'', in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 1-9.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20] Q. Yu, F. Liu, Y. Z. Song, T. Xiang, T. M. Hospedales, and C. C. Loy, ''Sketch me that shoe'', in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 799-807.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21] S. D. Bhattacharjee, J. Yuan, W. Hong, and X. Ruan, ''Query adaptive instance search using object sketches'', in Proceedings of the 24th ACM international conference on Multimedia, 2016, pp. 1306-1315.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22] F. Wang, L. Kang, and Y. Li, ''Sketch-based 3d shape retrieval using convolutional neural networks'', in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 1875-1883.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23] Y. Qi, Y. Z. Song, H. Zhang, and J. Liu, ''Sketch-based image retrieval via siamese convolutional neural network'', in 2016 IEEE International Conference on Image Processing (ICIP), 2016, pp. 2460-2464.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24] A. Fuentes, and J. M. Saavedra, ''Sketch-qnet: A quadruplet convnet for color sketch-based image retrieval'', in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 2134-2141.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25] K. R. V. Vakili_Zare, and H. Rezaei, ''K_Nearest Neighbor Classification Using Data and Deep Neural Networks'', in 3rd Internattional Conference on Soft Computing, 2019, pp. 1034-1040.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26] F. Schroff, D. Kalenichenko, and J. Philbin, ''Facenet: A unified embedding for face recognition and clustering'', in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 815-823.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27] X. Wang, and A. Gupta, ''Unsupervised learning of visual representations using videos'', in Proceedings of the IEEE international conference on computer vision, 2015, pp. 2794-2802.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28] A. Gordo, J. Almazan, J. Revaud, and D. Larlus, ''Deep image retrieval: Learning global representations for image search'', in European conference on computer vision, 2016, pp. 241-257.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29] P. Sangkloy, N. Burnell, C. Ham and J. Hays, ''The sketchy database: learning to retrieve badly drawn bunnies'', ACM Transactions on Graphics (TOG), Vol. 35, No. 4, 2016, pp. 1-12.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30] T. Bui, L. Ribeiro, M. Ponti, and J. Collomosse, ''Compact descriptors for sketch-based image retrieval using a triplet loss convolutional neural network'', Computer Vision and Image Understanding, Vol. 164, 2017, pp. 27-37.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31] J. M. Saavedra, ''Rst-shelo: sketch-based image retrieval using sketch tokens and square root normalization'', Multimedia Tools and Applications, Vol. 76, No. 1, 2017, pp. 931-951.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32] C. Bai, J. Chen, Q. Ma, P. Hao, and S. Chen, ''Cross-domain representation learning by domain-migration generative adversarial network for sketch-based image retrieval'', Journal of Visual Communication and Image Representation, Vol. 71, 2020, pp. 102835.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33] a. P. R. G. G. Rajput, ''Sketch Based Image Retrieval in Large Databases Using Edge Features'', International Journal of Recent Technology and Engineering (IJRTE), Vol. 08, 2020, pp. 2277-3878.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34] A. Dutta, and Z. Akata, ''Semantically tied paired cycle consistency for zero-shot sketch-based image retrieval'', in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 5089-5098.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35] Q. Liu, L. Xie, H. Wang, and A. L. Yuille, ''Semantic-aware knowledge preservation for zero-shot sketch-based image retrieval'', in Proceedings of the IEEE/CVF International Conference on Computer Vision, 2019, pp. 3662-3671.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36] T. Dutta, A. Singh, and S. Biswas, ''Style guide: zero-shot sketch-based image retrieval using style-guided image generation'', IEEE Transactions on Multimedia, Vol. 23, 2020, pp. 2833-2842.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37] P. Torres, and J. M. Saavedra, ''Compact and effective representations for sketch-based image retrieval'', in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 2115-2123.
[38] R. Chavhan, ''Zero-Shot Sketch Based Image Retrieval'', INDIAN INSTITUTE OF TECHNOLOGY BOMBAY, 2021.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[39] C. Deng, X. Xu, H. Wang, M. Yang, and D. Tao, ''Progressive cross-modal semantic network for zero-shot sketch-based image retrieval'', IEEE Transactions on Image Processing, Vol. 29, 2020, pp. 8892-8902.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[40]	O. Tursun, S. Denman, S. Sridharan, E. Goan, and C. Fookes, ''An efficient framework for zero-shot sketch-based image retrieval'', Pattern Recognition, Vol. 126, 2022, pp. 108528.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[41]	X. Zhang, Y. Huang, Q. Zou, Y. Pei, R. Zhang, and S. Wang, ''A hybrid convolutional neural network for sketch recognition'', Pattern Recognition Letters, Vol. 130, 2020, pp. 73-82.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[42] A. K. Bhunia, Y. Yang, T. M. Hospedales, T. Xiang, and, Y. Z. Song, ''Sketch less for more: On-the-fly fine-grained sketch-based image retrieval'', in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 9779-9788. </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Enhancing the Quality of ICT Regulation in Iran: A Study on the Application of the COBIT IT Governance Framework</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Ehsan</given_name><surname>Baraty</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Akbar</given_name><surname>Nabiollahi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Naser</given_name><surname>Khani</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2025</year></publication_date><pages><first_page>291</first_page><last_page>299</last_page></pages><doi_data><doi>10.61186/jist.45750.12.48.291</doi><resource>http://jist.ir/en/Article/45750</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/45750</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/45750</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/45750</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/45750</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/45750</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/45750</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/45750</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	T. C. T. Kahorongo, N. Reddy, and A. M. Karodia, “The Adoption of Information Technology in the Governance System of the Bank of Namibia,” Business and Management Studies, vol. 1, no. 2, 2015, doi: 10.11114/bms.v1i2.876.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	ITU Publications, The impact of policies, regulation, and institutions on ICT sector performance. Geneve: ITU, 2021.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	GIRO, Global ICT Regulatory Outlook 2020  (GIRO 2020). Geneva: ITU, 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	ISACA, “COBIT 2019 Framework: Introduction and Methodology, https://www.isaca.org/resources/cobit,” ISACA.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. Yeganeh, A. S. Mortazavi Kahangi, and A. Hadizadeh, “Identifying and analyzing macro actions in order to achieve regulatory goals in the country’s national information network,” Iranian Journal of Information Processing and Management, 2023.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	T. Olwal, M. Masonta, L. Mfupe, and M. Mzyece, “Broadband ICT policies in Southern Africa: Initiatives and dynamic spectrum regulation,” in 2013 IST-Africa Conference and Exhibition, IST-Africa 2013, IEEE Computer Society, 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	K. B. Danbatta and T. Zangina, “Performance analysis of telecommunications regulations in Nigeria: A quality of service approach,” Dutse Journal of Pure and Applied Sciences, vol. 8, no. 1a, 2022, doi: 10.4314/dujopas.v8i1a.17.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Suryanegara, “5G as disruptive innovation: Standard and regulatory challenges at a country level,” International Journal of Technology, vol. 7, no. 4, 2016, doi: 10.14716/ijtech.v7i4.3232.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Mohlameane and N. Ruxwana, “Exploring the impact of cloud computing on existing South African regulatory frameworks,” SA Journal of Information Management, vol. 22, no. 1, 2020, doi: 10.4102/sajim.v22i1.1132.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	G. Maccani, N. Connolly, S. McLoughlin, A. Puvvala, H. Karimikia, and B. Donnellan, “An emerging typology of IT governance structural mechanisms in smart cities,” Gov Inf Q, vol. 37, no. 4, 2020, doi: 10.1016/j.giq.2020.101499.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	H. N. Nguyen, “Regulating Cyberspace in Vietnam: Entry, Struggle, and Gain,” Columbia Journal of Asian Law, vol. 35, no. 2, 2022, doi: 10.52214/cjal.v35i2.10028.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	I. A. Raifu, I. A. Okunoye, and A. Aminu, “The effect of ICT on financial sector development in Africa: does regulatory quality matter?,” Inf Technol Dev, 2023, doi: 10.1080/02681102.2023.2233458.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Shrestha and D. Ram Adhikari, “Telecommunications Infrastructures and Services Development and Challenges in Nepal,” International Journal of Internet, Broadcasting and Communication, vol. 9, no. 2, pp. 27–36, 2017, [Online]. Available: https://doi.org/10.7236/IJIBC.2017.9.2.27.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. Adams and E. Akobeng, “ICT, governance and inequality in Africa,” Telecomm Policy, vol. 45, no. 10, 2021, doi: 10.1016/j.telpol.2021.102198.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	O. A. Shobande and L. Ogbeifun, “Has information and communication technology improved environmental quality in the OECD? —a dynamic panel analysis,” International Journal of Sustainable Development and World Ecology, vol. 29, no. 1, 2022, doi: 10.1080/13504509.2021.1909172.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. Chauhan and J. Mathew, “Evolution and Regulation of Telecommunication and Internet in India: A Study of the Policy governing the development of telecommunication and Internet in India,” Revista de Direito, Estado e Telecomunicacoes, vol. 15, no. 1, pp. 225–255, May 2023, doi: 10.26512/lstr.v15i1.45322.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Nikarya, M. Mazoochi, A. M. Montazeri, and F. Ayazi, “Investigating the Relationship between Regulatory Promotion Indicators and ICT Development,” Iranian Journal of Information Management, vol. 6, no. 2, pp. 47–66, 2021, doi: 10.22034/aimj.2021.132967.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Fasanghari, M. S. Amalnick, R. T. Anvari, and J. Razmi, “A robust data envelopment analysis method for business and IT alignment of enterprise architecture scenarios,” Journal of Information Systems and Telecommunication, vol. 1, no. 2, 2013, doi: 10.7508/jist.2013.02.004.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	K. Bamary, M. R. Behboudi, and T. Abbasnejad, “An ICT Performance Evaluation Model based on Meta-Synthesis Approach,” Journal of Information Systems and Telecommunication, vol. 10, no. 39, 2022, doi: 10.52547/jist.16445.10.39.229.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Chege, G. Wanyembi, and C. Nyamboga, “The Relationship Between the Business-IT Alignment Maturity and the Business Performance for the Banking Industry in Kenya,” International Journal of Scientific and Technical Research in Engineering, vol. 3, no. 7, 2018.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Abu-Musa, “Exploring the importance and implementation of COBIT processes in Saudi organizations: An empirical study,” Information Management &amp; Computer Security, vol. 17, no. 2, 2009, doi: 10.1108/09685220910963974.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	D. Henriques, R. Almeida, R. Pereira, M. M. da Silva, and I. S. Bianchi, “How IT governance can assist iot project implementation,” International Journal of Information Systems and Project Management, vol. 8, no. 3, 2020, doi: 10.12821/ijispm080302.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	I. G. Almusawi, “USING COBIT FRAMEWORK FOR REDUCING THE AUDIT RISKS OF ACCOUNTING INFORMATION SYSTEMS,” Akkad Journal Of Contemporary Accounting Studies, vol. 1, no. 1, 2022, doi: 10.55202/ajcas.v1i1.18.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	A. Ilmudeen and B. H. Malik, “A Review of Information Technology Governance, Business Strategy and Information Technology Strategy,” 2016.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	A. Badran, “Developing Smart Cities: Regulatory and Policy Implications for the State of Qatar,” International Journal of Public Administration, vol. 46, no. 7, 2023, doi: 10.1080/01900692.2021.2003811.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	H. F. Hsieh and S. E. Shannon, “Three approaches to qualitative content analysis,” Qual Health Res, vol. 15, no. 9, 2005, doi: 10.1177/1049732305276687.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	S. E. Baker and R. Edwards, “How many qualitative interviews is enough ?,” National Centre for Research Methods Review Paper, 2012, doi: 10.1177/1525822X05279903.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	K. A. Neuendorf, The Content Analysis Guidebook. 2020. doi: 10.4135/9781071802878.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	P. Stockwell, R. M. Colomb, A. E. Smith, and J. Wiles, “Use of an automatic content analysis tool: A technique for seeing both local and global scope,” International Journal of Human-Computer Studies, vol. 67, no. 5, 2009, doi: 10.1016/j.ijhcs.2008.12.001.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	M. Scharkow, “Content Analysis, Automatic,” in The International Encyclopedia of Communication Research Methods, Wiley, 2017, pp. 1–14. doi: 10.1002/9781118901731.iecrm0043.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	Janusz Kacprzyk, Standardisierte Inhaltsanalyse in der Kommunikationswissenschaft – Standardized Content Analysis in Communication Research. Warsaw, Poland: Springer Publications, 2023. doi: 10.1007/978-3-658-36179-2.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	H. Ahangarbahan and G. A. Montazer, “A fuzzy approach for ambiguity reduction in text similarity estimation (Case study: Persian web contents),” Journal of Information Systems and Telecommunication, vol. 3, no. 4, 2015, doi: 10.7508/jist.2015.04.002.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	E. F. McQuarrie and R. A. Krueger, “Focus Groups: A Practical Guide for Applied Research,” Journal of Marketing Research, vol. 26, no. 3, 1989, doi: 10.2307/3172912.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	M. Bloor, J. Frankland, M. Thomas, and K. Robson, Focus Groups in Social Research. 2012. doi: 10.4135/9781849209175.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	V. Braun and V. Clarke, “Using thematic analysis in psychology, Qualitative Research in Psychology,” J Chem Inf Model, vol. 3, no. 2, 2008.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	J. Grimmer and B. M. Stewart, “Text as data: The promise and pitfalls of automatic content analysis methods for political texts,” Political Analysis, vol. 21, no. 3, 2013, doi: 10.1093/pan/mps028.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	S. Harguem, “A conceptual framework on IT governance impact on organizational performance: A dynamic capability perspective,” 2021. doi: 10.36941/ajis-2021-0012.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	A. C. Amorim, M. Mira da Silva, R. Pereira, and M. Gonçalves, “Using agile methodologies for adopting COBIT,” Inf Syst, vol. 101, 2021, doi: 10.1016/j.is.2020.101496.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
 
</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Design and Analysis of a Secure Intelligent Blood Management Information System</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hessah </given_name><surname>Alhajri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mostafa Abd</given_name><surname>El-barr</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Kalim</given_name><surname>Qureshi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2025</year></publication_date><pages><first_page>300</first_page><last_page>312</last_page></pages><doi_data><doi>10.61186/jist.46368.12.48.300</doi><resource>http://jist.ir/en/Article/46368</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/46368</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/46368</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/46368</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/46368</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/46368</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/46368</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/46368</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] Advisera Expert Solutions Ltd., "How to Implement  NIST Cybersecurity Framework using ISO 27001", 2017, [Online] Available:http://www.infomania-services.fr/controle/file/181206101951000000_5892133709_1544091591.pdf.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] Akar, I. F., Mohammad, T. A., &amp; Ismail, M. "CBBR Centralized Blood Bank Repository", ResearchGate. Retrieved November 9, 2021, from https://www.researchgate.net/publication/319372139_CBBR_Centralized_Blood_Bank_Repository.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] Ramachandran, P.  Girija, N.,  Bhuvaneswari, T.,"Classification Blood Donors Using Data Mining  Techniques", International Journal of Computer Science and Engineering, Vol.1, Issue 1, 2011, pp.10-13.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] Chaudhari, S., Walekar, S.,  Ruparel, K.,  and Pandagale, V., "A Secure Cloud Computing Based Framework for the Blood bank", International Conference on Smart City and Emerging Technology (ICSCET), Mumbai, India, 2018, pp. 1-7.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] Madan, T., Bharwai, N., Kumar, N., "Blood Donation Management with Modern Engineering", International Computational Engineering and Networking, 2016, vol. 9(8), pp.27-31.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] Chetan Masram, Arshad Mulani, Rasika Bhitale, Jidnesh Koli, "Online Blood Bank Management System", International Research Journal of Engineering and Technology, Vol. 8, issue 06, 2021, pp.4220-4226.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] S Periyanagi, A Manikandan, M Muthukrishnan, M Ramakrishnan, "Bdoor App-Bood Donation Application using Android Studio", Journal of Physics: Conference Series, 2021, pp.1-12.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] AL-Kalbani, S. I. A. Kazmi and J. Pandey, "IoT Based Smart Network for Blood Bank," 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 2018, pp. 732-736.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] A. C. Adsul, V. K. Bhosale and R. M. Autee, "Automated blood bank system using Raspberry PI," 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, 2018, pp. 252-255.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Fathima, M., A. Valarmathi, " Blood Bank Mobile Application", International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 2, issue 2, 2017, pp. 1126-1130.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] Chawla, S., Dalal, T. "UBlood: Utilize every cell of Blood- A Proposed Mobile based Application Framework", International Journal of Computer Science and Information Technologies, Vol, 8(2), 2017, pp.292-294.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] Akkas Ali, K. M., Jahan, I., Islam, A., &amp; Parvez, "Blood Donation Management System", American Journal of Engineering Research (AJER), 2015, Vol4(6), pp.123-136.  [13] Raut, P., Parab, P., Suthar, Y., Narwani, S., &amp; 
Pandey, "Blood Bank Management System", International Journal of Advance.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14] Appari, Ajit, Johnson, "Information Security and Privacy in Healthcare: Current State of Research", International Journal of Internet and Enterprise Management, 2020, Vol. 6. Pp.279-314.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15] Athanase Nkunzimana, Boiko, Andrii &amp; Shendryk, Vira, "System Integration and Security of Information Systems", Procedia Computer Science, 2017, Vol.104. pp.35-42.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16] Boriev, Z &amp; Sokolov, S &amp; Nyrkov, "Review of modern biometric user authentication and their development prospects", IOP Conference Series Materials Science and Engineering. 2015, Vol. 91, pp.1-12.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17] Leila Rikhtechi, Vahid Rafe, Afshin Rezakhani,  “Secure Access Control in Security Information and Event Management System”, Journal of Information Systems and Telecommunication, 2021, pp. 67-78.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18] Pattanashetti, M. A., &amp; Pilli, G. S, "Novel Transfusion parameters in Blood bank for Thalassemia patients", Indian Journal of Pathology and Onco-logy, 2017, vol. 4(4), pp.396-399. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19] M. Puppala, T. He, X. Yu, S. Chen, R. Ogunti and S. T. C. Wong, "Data security and privacy management in healthcare applications and clinical data warehouse environment," IEEE-EMBS International Conference 
on Biomedical and Health Informatics (BHI), Las Vegas, NV, USA, 2016, pp. 5-8.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20] Zukime, M. &amp; Mat Junoh, Mohd Zukime &amp; Osman, Abdullah &amp; Ab. Halim, M. Suberi &amp; Halim, Ab &amp; Safizal Abdullah, M.. Data Security: Issues And Challenges for Disaster Management In The New Millennium. International Journal of Scientific &amp; Technology Research. 2014, 3.8.2277-8612.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21] Siddiq Iqbal, Sujatha B. R, "Secure Key Management Scheme for Hierarchical Network Using Combinatorial Design", Journal of Information Systems and Telecommunication, Vol. 10, No.1, January-March 2022, pp. 20-27.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22] Ashita Jain, Amit Nirmal, Nitish Sapre, Prof Shubhada Mone, “Online Blood Bank Management System     using Android”, International Journal of Innovative Studies in Sciences and Engineering Technology, Volume: 2 Issue: 2, 2016,  pp.55-58.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23] Mohit, “Review on Blood Bank Management Systems”, International Research Journal of Modernization in Engineering Technology and Science, Volume:03/Issue: 04/April-2021, pp. 172-174.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24] Ben Elmir, W., Allaoua Hemmak, A., and Senouci, B.,Smart Platform for Data Blood Bank Management:  Forecasting Demand in Blood Supply Chain Using Machine Learning”, Information January 2023, 14(1):1-31. https://doi.org/10.3390/info14010031.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25] Sri A., Pravallika, M. Kumar, O., Sridevi, K., Balaji, K., “A Systematic Review on Blood Bank Information Systems”, International Journal of Scientific Research &amp; Engineering Trends, Volume 10, Issue 2, Mar-Apr-2024, ISSN (Online): 2395-566X. https://doi.org/10.22214/ijraset.2023.49843.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26] Varghese A., Thilak, K., Saritha., M., “Technological advancements, digital transformation, and future trends in blood transfusion services”, International Journal of Advances in Medicine,  March-April 2024, Vol 11, Issue 2, pp. 147-152.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27] Ghouri AM, Khan HR, Mani V, Ul Haq MA, De Sousa, ABL., “An Artificial-Intelligence-Based Omnichannel Blood Supply Chain., 2023;1-58. DOI:10.22214/ijraset.2023.49843.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28] Mohammed R., Al-zebari, A., “Proposed A Web-Based Intelligent System to Manage the Blood Bank in Zakho District, Vol 8 No.3, June 2023, PP. 1267-1284. DOI:10.25212/lfu.qzj.8.5.46.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Energy-Aware Approach to Virtual Machine Consolidation Using Classification and the Dragonfly Algorithm in Cloud Data Centers </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Nastaran</given_name><surname>Evaznia</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Reza</given_name><surname>Ebrahimi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Davoud</given_name><surname>Bahrepour</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2025</year></publication_date><pages><first_page>280</first_page><last_page>290</last_page></pages><doi_data><doi>10.61186/jist.48021.12.48.280</doi><resource>http://jist.ir/en/Article/48021</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/48021</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/48021</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/48021</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/48021</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/48021</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/48021</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/48021</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] T. Alam, “Cloud Computing and Its Role in the Information Technology,” SSRN Electron. J., vol. 1, no. 2, 2020 , pp. 108–115, doi: 10.2139/ssrn.3639063.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Yenugula, S. Sahoo, and S. Goswami, “Cloud computing for sustainable development: An analysis of environmental, economic and social benefits,” J. Futur. Sustain., vol. 4, no. 1, 2024, pp. 59–66, doi: 10.5267/j.jfs.2024.1.005.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. M. Sadeeq, N. M. Abdulkareem, S. R. M. Zeebaree, D. M. Ahmed, A. S. Sami, and R. R. Zebari, “IoT and Cloud computing issues, challenges and opportunities: A review,” Qubahan Acad. J., vol. 1, no. 2, 2021, pp. 1–7, doi: https://doi.org/10.48161/qaj.v1n2a36.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. S. Fateminasab, S. Memarian, S. R. K. Tabbakh, and M. C. Romero-Ternero, “A Review on Open Data Storage and Retrieval Techniques in Blockchain-based Applications,” in 2024 10th International Conference on Web Research (ICWR), IEEE, 2024, pp. 297–302, doi: 10.1109/ICWR61162.2024.10533356.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	W. Yao, Z. Wang, Y. Hou, X. Zhu, X. Li, and Y. Xia, “An energy-efficient load balance strategy based on virtual machine consolidation in cloud environment,” Futur. Gener. Comput. Syst., vol. 146, 2023, pp. 222–233, doi: 10.1016/j.future.2023.04.014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. Tashtarian, M. F. Zhani, B. Fatemipour, and D. Yazdani, “CoDeC: A cost-effective and delay-aware SFC deployment,” IEEE Trans. Netw. Serv. Manag., vol. 17, no. 2, 2019, pp. 793–806, doi: 10.1109/TNSM.2019.2949753.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Shahryari, F. Tashtarian, and S.-A. Hosseini-Seno, “CoPaM: Cost-aware VM Placement and Migration for Mobile services in Multi-Cloudlet environment: An SDN-based approach,” Comput. Commun., vol. 191, 2022, pp. 257–273, doi: 10.1016/j.comcom.2022.05.005.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Shaw, E. Howley, and E. Barrett, “An energy efficient anti-correlated virtual machine placement algorithm using resource usage predictions,” Simul. Model. Pract. Theory, vol. 93, 2019, pp. 322–342, doi: 10.1016/j.simpat.2018.09.019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	C. Thiam and F. Thiam, “Energy efficient cloud data center using dynamic virtual machine consolidation algorithm,” in Business Information Systems: 22nd International Conference, BIS 2019, Seville, Spain, June 26–28, 2019, Proceedings, Part I 22, Springer, 2019, pp. 514–525, doi: 10.1007/978-3-030-20485.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	D. Bahrepour, N. Evaznia, and T. Khodabakhshi, “A New Resource Allocation Method Based on PSO in Cloud Computing,” Int. J. Web Res., vol. 7, no. 2, 2024 , pp. 13–21, doi: 10.22133/ijwr.2024.457539.1216.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	N. Evaznia and R. Ebrahimi, “Providing a Solution for Optimal Management of Resources using the Multi-objective Crow Search Algorithm in Cloud Data Centers,” in 2023 9th International Conference on Web Research (ICWR), IEEE, 2023, pp. 179–184, doi: 10.1109/ICWR57742.2023.10139192.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. S. F. Nasab, T. Z. Marjaneh, and D. Bahrepour, “Energy Efficiency and Establishing Service Level Agreement using Fuzzification of Virtual Machine Selection Policies for Migrating in Cloud Computing,” in 2023 9th International Conference on Web Research (ICWR), IEEE, 2023, pp.201–207, doi: 10.1109/ICWR57742.2023.10138982.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] A. Varasteh, F. Tashtarian, and M. Goudarzi, “On reliability-aware server consolidation in cloud datacenters,” in 2017 16th International Symposium on Parallel and Distributed Computing (ISPDC), IEEE, 2017, pp. 95–101, doi: 10.1109/ISPDC.2017.26.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] L. Helali and M. N. Omri, “A survey of data center consolidation in cloud computing systems,” Comput. Sci. Rev., vol. 39, 2021, p. 100366, doi: 10.1016/j.cosrev.2021.100366.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] R. Zolfaghari and A. M. Rahmani, “Virtual machine consolidation in cloud computing systems: Challenges and future trends,” Wirel. Pers. Commun., vol. 115, no. 3, 2020, pp. 2289–2326, doi: 10.1007/s11277-020-07682-8.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] M.-H. Malekloo, N. Kara, and M. El Barachi, “An energy efficient and SLA compliant approach for resource allocation and consolidation in cloud computing environments,” Sustain. Comput. Informatics Syst., vol. 17, 2018, pp. 9–24, doi: 10.1016/j.suscom.2018.02.001.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] U. Arshad, M. Aleem, G. Srivastava, and J. C.-W. Lin, “Utilizing power consumption and SLA violations using dynamic VM consolidation in cloud data centers,” Renew. Sustain. Energy Rev., vol. 167, 2022, p. 112782, doi: 10.1016/j.rser.2022.112782.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] H. F. Farimani, D. Bahrepour, S. R. K. Tabbakh, and R. Ghaemi, “A new meta-heuristic algorithm: Artificial Yellow Ground Squirrel (YGSA),” 2022, doi: 10.21203/rs.3.rs-1909482/v1.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] H. F. Farimani, D. Bahrepour, and S. R. K. Tabbakh, “Reallocation of virtual machines to cloud data centers to reduce service level agreement violation and energy consumption using the FMT method,” J. Inf. Syst. Telecommun., vol. 4, no. 28, 2020, p. 316.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] S. Mustafa, K. Bilal, S. U. R. Malik, and S. A. Madani, “SLA-aware energy efficient resource management for cloud environments,” IEEE Access, vol. 6, 2018, pp. 15004–15020, doi: 10.1109/ACCESS.2018.2808320.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] D. Dabhi and D. Thakor, “Energy and SLA-Aware VM Placement Policy for VM Consolidation Process in Cloud Data Centers,” in Sustainable Technology and Advanced Computing in Electrical Engineering: Proceedings of ICSTACE 2021, Springer, 2022, pp. 351–365, doi: 0.1007/978-981-19-4364-5_26.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] K. M, “Energy-Aware Virtual Machine Consolidation Algorithm for Enhanced QoS in Data Centers,” Int. Sci. J. Eng. Manag., vol. 03, no. 04, 2024, pp. 1–9, doi: 10.55041/ISJEM01696.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] U. Khalid, S. Ahmad, B. Chang, M. Nisar, J. Cha, and E. Munir, Energy Optimization in Cloud Computing Environmentthrough Virtual Machine Consolidation. 2023. doi: 10.21203/rs.3.rs-3284176/v1.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] A. Ali and T. T. Tin, “Unleashing the Power of Consolidate Cloud Computing: Secure and Energy-Efficient Virtual Machines at Your Service,” 2023, doi: 10.21203/rs.3.rs-3133236/v1.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] D. Alsadie and M. Alsulami, “Efficient Resource Management in Cloud Environments: A Modified Feeding Birds Algorithm for VM Consolidation,” Mathematics, vol. 12, no. 12, 2024, p. 1845, doi: 10.3390/math12121845.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] R. P. Patel and H. B. Bhadka, “Energy-Aware VMs Consolidation Computing Frameworks’ of Data Center in Cloud Computing Environment,” J. Sci. Technol., vol. 7, no. 1, 2022, pp. 82–91.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] N. Manikandan, P. Divya, and S. Janani, “BWFSO: hybrid Black-widow and Fish swarm optimization Algorithm for resource allocation and task scheduling in cloud computing,” Mater. Today Proc., vol. 62, 2022, pp. 4903–4908, doi: 10.1016/j.matpr.2022.03.535.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] R. Shaw, E. Howley, and E. Barrett, “Applying reinforcement learning towards automating energy efficient virtual machine consolidation in cloud data centers,” Inf. Syst., vol. 107, 2022, p. 101722, doi: 10.1016/j.is.2021.101722.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] A. Beloglazov and R. Buyya, “Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers,” Concurr. Comput. Pract. Exp., vol. 24, no. 13, 2012, pp. 1397–1420, doi: 10.1002/cpe.1867.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] Ç. İ. Acı and H. Gülcan, “A modified dragonfly optimization algorithm for single‐and multiobjective problems using Brownian motion,” Comput. Intell. Neurosci., vol. 2019, no. 1, 2019, p. 6871298, doi: 10.1155/2019/6871298.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] H. Xiao, Z. Hu, and K. Li, “Multi-objective VM consolidation based on thresholds and ant colony system in cloud computing,” IEEE Access, vol. 7, 2019, pp. 53441–53453, doi: 10.1109/ACCESS.2019.2912722.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. F. De Rose, and R. Buyya, “CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms,” Softw. Pract. Exp., vol. 41, no. 1, 2011, pp. 23–50, doi: 10.1002/spe.995.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] K. Park and V. S. Pai, “CoMon: a mostly-scalable monitoring system for PlanetLab,” ACM SIGOPS Oper. Syst. Rev., vol. 40, no. 1, 2006, pp. 65–74, doi: 10.1145/1113361.1113374.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Enhancing Speaker Identification System Based on MFCC Feature Extraction and Gated Recurrent Unit Network</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Sharif-Noughabi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyyed Mohammad </given_name><surname>Razavi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mehran </given_name><surname>Taghipour-gorjikolaie</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>5</day><year>2025</year></publication_date><pages><first_page>254</first_page><last_page>263</last_page></pages><doi_data><doi>10.61186/jist.48366.12.48.254</doi><resource>http://jist.ir/en/Article/48366</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/48366</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/48366</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/48366</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/48366</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/48366</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/48366</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/48366</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	S. Hourri and J. Kharroubi, “A Novel Scoring Method Based on Distance Calculation for Similarity Measurement in Text-Independent Speaker Verification,” Procedia Computer Science, vol. 148, pp. 256–265, 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] M. Chaiani, M. Bengherabi, S. A. Selouani and M. Boudraa, "Dysarthric speaker identification with constrained training durations," 2018 International Conference on Signal, Image, Vision and their Applications (SIVA), Guelma, Algeria, 2018, pp. 1-6.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] 	R. Jahangir et al., "Text-Independent Speaker Identification Through Feature Fusion and Deep Neural Network," in IEEE Access, vol. 8, pp. 32187-32202, 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
 [4] M. Barhoush, A. Hallawa and A. Schmeink, "Robust Automatic Speaker Identification System Using Shuffled MFCC Features," 2021 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT), Soyapango, El Salvador, 2021, pp. 1-6.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] S. Langari , H. Marvi, and M. Zahedi, “Efficient speech emotion recognition using modified feature extraction,” Informatics in Medicine Unlocked, vol. 20, p. 100424, Jan. 2020.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] X. Liu, M. Sahidullah and T. Kinnunen, "Optimized Power Normalized Cepstral Coefficients Towards Robust Deep Speaker Verification," 2021 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU), Cartagena, Colombia, 2021, pp. 185-190.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] P. Sandhya, V. Spoorthy, S. G. Koolagudi and N. V. Sobhana, "Spectral Features for Emotional Speaker Recognition," 2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC), Bengaluru, India, 2020, pp. 1-6.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] K. Aghajani and E. P. Afrakoti I., “Speech emotion recognition using Scalogram based deep structure,” International Journal of Engineering. Transactions B: Applications, vol. 33, no. 2, Feb. 2020.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] A. Abbaskhah, Hamed Sedighi, and Hossein Marvi, “Infant cry classification by MFCC feature extraction with MLP and CNN structures,” Biomedical Signal Processing and Control, vol. 86, pp. 105261–105261, Sep. 2023.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] A. Sezavar, H. Farsi, and S. Mohamadzadeh, “A New Model for Person Reidentification Using Deep CNN and Autoencoders,” Iranian Journal of Energy and Environment, vol. 14, no. 4, pp. 314–320, 2023.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] E. Ghasemi, S. M. Razavi, S. Mohamadzadeh, and M. Taghipour-Gorjikolaie, “Facial Expression Recognition through Suboptimal Filter Design Using a Metaheuristic Kidney Algorithm,” Journal of Electrical and Computer Engineering Innovations, vol. 12, no. 2, pp. 425–438,2024.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] A.Nagrani , J. S.Chung , and A. Zisserman, “Voxceleb: a large-scale speaker identification dataset”. arXiv preprint arXiv:1706.08612. 2017.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] J. W. Jung , H. S. Heo , I. H.Yang , H. J. Shim , and H. J. Yu, “Avoiding speaker overfitting in end-to-end dnns using raw waveform for text-independent speaker verification” . extraction, vol. 8, no. 12, pp. 23-24, 2018.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] G. Wei, Y. Zhang, H. Min, and Y. Xu, “End-to-end speaker identification research based on multi-scale SincNet and CGAN,” Neural Computing and Applications, vol. 35, no. 30, pp. 22209–22222, Aug. 2023.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] S. S.Tirumala and S. R.  Shahamiri, “A review on deep learning approaches in speaker identification”. In Proceedings of the 8th international conference on signal processing systems, Nov. 2016, pp. 142-147.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] K. A. Abdalmalak and A. Gallardo-Antolín, “Enhancement of a text-independent speaker verification system by using feature combination and parallel structure classifiers,” Neural Computing and Applications, vol. 29, no. 3, pp. 637–651, Jul. 2016.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] A. Ashar, M. S. Bhatti and U. Mushtaq, "Speaker Identification Using a Hybrid CNN-MFCC Approach," 2020 International Conference on Emerging Trends in Smart Technologies (ICETST), Karachi, Pakistan, 2020, pp. 1-4.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] B. K. P and R. K. M, “ELM speaker identification for limited dataset using multitaper based MFCC and PNCC features with fusion score,” Multimedia Tools and Applications, vol. 79, no. 39–40, pp. 28859–28883, Aug. 2020.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] M. K. Singh, “A text independent speaker identification system using ANN, RNN, and CNN classification technique,” Multimedia Tools and Applications, vol. 83, no. 16, pp. 48105–48117, Nov. 2023.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] M. R. Firmansyah, R. Hidayat and A. Bejo, "Comparison of Windowing Function on Feature Extraction Using MFCC for Speaker Identification," 2021 International Conference on Intelligent Cybernetics Technology &amp; Applications (ICICyTA), Bandung, Indonesia, 2021, pp. 1-5.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] S. Chakraborty and R. Parekh, "An improved approach to open set text-independent speaker identification (OSTI-SI)," 2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), Kolkata, India, 2017, pp. 51-56.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] E. S. Hassan et al., “Enhancing speaker identification through reverberation modeling and cancelable techniques using ANNs,” PLoS ONE, vol. 19, no. 2, p. e0294235, Feb. 2024.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] J. I. Ramírez-Hernández, A. Manzo-Martínez, F. Gaxiola, L. C. González-Gurrola, V. C. Álvarez-Oliva, and R. López-Santillán, “A comparison between MFCC and MSE features for Text-Independent speaker recognition using machine learning algorithms,” in Studies in computational intelligence, 2023, pp. 123–140.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] N. M. Almarshady, A. A. Alashban, and Y. A. Alotaibi, “Analysis and investigation of speaker identification problems using deep learning networks and the YOHO English Speech Dataset,” Applied Sciences, vol. 13, no. 17, p. 9567, Aug. 2023.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] S.Hizlisoy , and , R. S. Arslan , “Text independent speaker recognition based on MFCC and machine learning”. Selcuk University Journal of Engineering Sciences,  vol. 20, no. 3, pp. 73-78, 2021.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] V. S. R. Gade and S. Manickam, “Speaker recognition using Improved Butterfly Optimization Algorithm with hybrid Long Short Term Memory network,” Multimedia Tools and Applications, vol.13, pp.1-23,  Feb. 2024.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] A. Fikri and A. Zahra, “Speaker Identification in Multiple Languages: Regional, Indonesian, and English with Short Utterance,” International Journal of Emerging Technology and Advanced Engineering, vol. 13, no. 9, pp. 25–35, Oct. 2023.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] M. Hasheminejad , and H. Farsi, (2016). “Instance Based Sparse Classifier Fusion for Speaker Verification”. Journal of Information Systems and Telecommunication (JIST),  vol. 3, no. 15, pp. 1, 2016.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] R. Li , J. Y. Jiang , J. Liu , C. C. Hsieh , and W. Wang, “Automatic speaker recognition with limited data”. In Proceedings of the 13th International Conference on Web Search and Data Mining, Jan. 2020,   pp. 340-348.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] Md. A. Islam, W. A. Jassim, N. S. Cheok, and M. S. A. Zilany, “A robust speaker identification system using the responses from a model of the auditory periphery,” PLoS ONE, vol. 11, no. 7, p. e0158520, Jul. 2016.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] S. Nagarajan, S. S. S. Nettimi, L. S. Kumar, M. K. Nath, and A. Kanhe, “Speech emotion recognition using cepstral features extracted with novel triangular filter banks based on bark and ERB frequency scales,” Digital Signal Processing, vol. 104, p. 102763, Sep. 2020.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] J. Chung, Ç. Gülçehre, K. Cho, and Y. Bengio, “Empirical evaluation of gated recurrent neural networks on sequence modeling,” arXiv (Cornell University), Jan. 2014.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] N. Mohammadi, A. Rezakhani, H. H. S. Javadi, and P. Asghari, “FLHB-AC: Federated Learning History-Based Access Control using Deep Neural Networks in healthcare system,” Journal of Information Systems and Telecommunication (JIST), vol. 12, no. 46, pp. 90–104, Jun. 2024.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] A. Shewalkar, D. Nyavanandi, and S. A. Ludwig, “Performance Evaluation of Deep Neural Networks Applied to Speech Recognition: RNN, LSTM and GRU,” Journal of Artificial Intelligence and Soft Computing Research, vol. 9, no. 4, pp. 235–245, Oct. 2019.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] A. Barati, H. Farsi, and S. Mohamadzadeh, “Integration of the latent variable knowledge into deep image captioning with Bayesian modeling,” IET Image Processing, , vol. 17, no. 7, pp. 2256–2271,2024.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] H. S. Munir, S. Ren, M. Mustafa, C. N. Siddique, and S. Qayyum, “Attention based GRU-LSTM for software defect prediction,” PLoS ONE, vol. 16, no. 3, p. e0247444, Mar. 2021.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] C. Yin, D. Tang, F. Zhang, Q. Tang, Y. Feng, and Z. He, “Students learning performance prediction based on feature extraction algorithm and attention-based bidirectional gated".</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>