﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051923</doi_batch_id><timestamp>20260519232533</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>7</month><day>26</day><year>2025</year></publication_date><journal_volume><volume>13</volume></journal_volume><issue>50</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Linearity Enhanced Noise Cancelling Low Noise Amplifier for Ultra-Wideband Application</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Nileshkumar K</given_name><surname>Patel</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>HASMUKH P</given_name><surname>KORINGA</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>26</day><year>2025</year></publication_date><pages><first_page>77</first_page><last_page>90</last_page></pages><doi_data><doi>10.61882/jist.45666.13.50.77</doi><resource>http://jist.ir/en/Article/45666</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/45666</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/45666</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/45666</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/45666</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/45666</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/45666</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/45666</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Z. Liu, C. C. Boon, X. Yu, C. Li, K. Yang, and Y. Liang, “A 0.061-mm21-11-GHz noise-canceling low-noise amplifier employing active feedforward with simultaneous current and noise reduction,” IEEE Trans. Microw. Theory Tech., vol. 69, no. 6, pp. 3093–3106, 2021, doi: 10.1109/TMTT.2021.3061290.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	“2.2 UWB IET Circuits  Devices   Syst - 2020 - Hayati - Ultra‐wideband complementary metal‐oxide semiconductor low noise amplifier.pdf.” </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Arshad, R. Ramzan, K. Muhammad, and Q. U. Wahab, “A sub-10mw, noise cancelling, wideband LNA for UWB applications,” AEU - Int. J. Electron. Commun., vol. 69, no. 1, pp. 109–118, 2015, [Online]. Available: http://dx.doi.org/10.1016/j.aeue.2014.08.002.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Q. Wan, Q. Wang, and Z. Zheng, “Design and analysis of a 3.1-10.6 GHz UWB low noise amplifier with forward body bias technique,” AEU - Int. J. Electron. Commun., vol. 69, no. 1, pp. 119–125, 2015, [Online]. Available: http://dx.doi.org/10.1016/j.aeue.2014.08.001.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Z. Liu and C. C. Boon, “A 0.092-mm22-12-GHz Noise-Cancelling Low-Noise Amplifier With Gain Improvement and Noise Reduction,” IEEE Trans. Circuits Syst. II Express Briefs, vol. 69, no. 10, pp. 4013–4017, 2022, doi: 10.1109/TCSII.2022.3185455.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	H. Yu, Y. Chen, C. C. Boon, S. Member, P. Mak, and R. P. Martins, “LNA With Dual Complementary pMOS – nMOS Configuration,” vol. 68, no. 1, pp. 144–159, 2020.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Z. Pan, C. Qin, Z. Ye, Y. Wang, and Z. Yu, “Wideband Inductorless Low-Power LNAs with Gm Enhancement and Noise-Cancellation,” IEEE Trans. Circuits Syst. I Regul. Pap., vol. 65, no. 1, pp. 26–38, 2018, doi: 10.1109/TCSI.2017.2710057.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	B. Razavi, RF Microelectronics (Prentice Hall Communications Engineering and Emerging Technologies Series), 2nd ed. USA: Prentice Hall Press, 2011.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Bozorg and R. B. Staszewski, “A 0.02-4.5-GHz LN(T)A in 28-nm CMOS for 5G Exploiting Noise Reduction and Current Reuse,” IEEE J. Solid-State Circuits, vol. 56, no. 2, pp. 404–415, 2021, doi: 10.1109/JSSC.2020.3018680.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] P. B. T. Huynh, J. H. Kim, and T. Y. Yun, “Dual-Resistive Feedback Wideband LNA for Noise Cancellation and Robust Linearization,” IEEE Trans. Microw. Theory Tech., vol. 70, no. 4, pp. 2224–2235, 2022, doi: 10.1109/TMTT.2021.3139331.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] H. Yu, Y. Chen, C. C. Boon, C. Li, P. I. Mak, and R. P. Martins, “A 0.044-mm2 0.5-To-7-GHz Resistor-Plus-Source-Follower-Feedback Noise-Cancelling LNA Achieving a Flat NF of 3.3±0.45 dB,” IEEE Trans. Circuits Syst. II Express Briefs, vol. 66, no. 1, pp. 71–75, 2019, doi: 10.1109/TCSII.2018.2833553.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] J. Yan et al., “A 0.2-3 GHz Inductor-Less LNA Using Noise-Canceling and Dual-Resistor Feedback Technique,” IEEE Trans. Circuits Syst. II Express Briefs, vol. 72, no. 3, pp. 469–473, 2025, doi: 10.1109/TCSII.2025.3531994.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] T. Han, Z. Li, and M. Tian, “An inductor-less CMOS broadband balun gm-boosting LNA exploiting noise cancellation techniques,” Analog Integr. Circuits Signal Process., vol. 104, no. 2, pp. 121–129, 2020, doi: 10.1007/s10470-020-01665-2.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] D. Kim, S. Jang, J. Lee, and D. Im, “A Broadband PVT-Insensitive All-nMOS Noise-Canceling Balun-LNA for Subgigahertz Wireless Communication Applications,” IEEE Microw. Wirel. Components Lett., vol. 31, no. 2, pp. 165–168, 2021, doi: 10.1109/LMWC.2020.3042233.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] G. Feng et al., “Pole-Converging Intrastage Bandwidth Extension Technique for Wideband Amplifiers,” IEEE J. Solid-State Circuits, vol. 52, no. 3, pp. 769–780, 2017, doi: 10.1109/JSSC.2016.2641459.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] P. E. Allen and D. R. Holberg, CMOS Analog Circuit Design. Oxford University Press, 2016.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] S. Shahrabadi, “Ultrawideband LNA 1960–2019: Review,” IET Circuits, Devices Syst., vol. 15, no. 8, pp. 697–727, 2021, doi: 10.1049/cds2.12071.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] N. K. Patel and H. P. Koringa, “Systematic Analysis of Linearization Techniques for Wideband RF Low-Noise Amplifier,” in Advances in VLSI and Embedded Systems, 2023, pp. 27–44.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] R. Zhou, S. Liu, J. Liu, Y. Liang, and Z. Zhu, “A 0.1-3.5-GHz Inductorless Noise-Canceling CMOS LNA with IIP3 Optimization Technique,” IEEE Trans. Microw. Theory Tech., vol. 70, no. 6, pp. 3234–3243, 2022, doi: 10.1109/TMTT.2022.3161279.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] J. Chen, B. Guo, B. Zhang, and G. Wen, “A Highly Linear Wideband CMOS LNTA Employing Noise/Distortion Cancellation and Gain Compensation,” Circuits, Syst. Signal Process., vol. 36, no. 2, pp. 474–494, 2017, doi: 10.1007/s00034-016-0320-9.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] Z. Liu, C. C. Boon, C. Li, K. Yang, Y. Dong, and T. Guo, “A 0.0078mm2 3.4mW Wideband Positive-feedback-Based Noise-Cancelling LNA in 28nm CMOS Exploiting G_m Boosting,” Dig. Tech. Pap. - IEEE Int. Solid-State Circuits Conf., vol. 2022-Febru, pp. 142–144, 2022, doi: 10.1109/ISSCC42614.2022.9731719.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] B. Guo, J. Chen, Y. Wang, H. Jin, and G. Yang, “A wideband complementary noise cancelling CMOS LNA,” Dig. Pap. - IEEE Radio Freq. Integr. Circuits Symp., vol. 2016-July, pp. 142–145, 2016, doi: 10.1109/RFIC.2016.7508271.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] A. Bozorg and R. B. Staszewski, “A 20 MHz-2 GHz Inductorless Two-Fold Noise-Canceling Low-Noise Amplifier in 28-nm CMOS,” IEEE Trans. Circuits Syst. I Regul. Pap., vol. 69, no. 1, pp. 42–50, 2022, doi: 10.1109/TCSI.2021.3092960.
[24] A. D. Martinez-Perez, F. Aznar, D. Flandre, and S. Celma, “Design-Window Methodology for Inductorless Noise-Cancelling CMOS LNAs,” IEEE Access, vol. 10, pp. 29482–29492, 2022, doi: 10.1109/ACCESS.2022.3158356.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25] Z. Liu, C. Chye Boon, and Y. Dong, “A 0.6 V, 1.74 mW, 2.9 dB NF Inductorless Wideband LNA in 28-nm CMOS Exploiting Noise Cancellation and Current Reuse,” IEEE Trans. Circuits Syst. I Regul. Pap., vol. 71, no. 8, pp. 3561–3572, 2024, doi: 10.1109/TCSI.2024.3408901.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26] M. A. Karami, M. Lee, R. Mirzavand, and K. Moez, “A 0.1-20.1-GHz Wideband Noise-Canceling gm-Boosted CMOS LNA with Gain-Reuse,” IEEE Trans. Microw. Theory Tech., vol. 72, no. 5, pp. 2990–3000, 2024, doi: 10.1109/TMTT.2023.3323042.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>NeuroIS: a State-of- the- Art Analysis </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name> Nahid</given_name><surname> Entezarian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad</given_name><surname>Mehraeen</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>26</day><year>2025</year></publication_date><pages><first_page>139</first_page><last_page>153</last_page></pages><doi_data><doi>10.61882/jist.47292.13.50.139</doi><resource>http://jist.ir/en/Article/47292</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/47292</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/47292</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/47292</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/47292</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/47292</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/47292</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/47292</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] J. Xiong, &amp; M. Zuo “What does existing NeuroIS research   focus on?” Information systems, 2020, 89, pp. 101462.‏ https://doi.org/10.1016/j.is.2019.101462.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] R. LIMA BAIMA, L. Berto, &amp; T. Roth “Expanding the Scope-Cognitive Robotics Meets NeuroIS”. Lecture Notes in Information Systems and Organisation, 2024.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
 [3] N. Entezarian, R. Bagheri, J. Rezazadeh, J. Ayoade," NeuroIS: A Systematic Review of NeuroIS through Bibliometric Analysis". Metrics. 2025; 2(1):4. https://doi.org/10.3390/metrics2010004
[4] R. Riedl &amp; P. M. Léger, “Fundamentals of neuroIS”. Studies in neuroscience, psychology and behavioral economics, 2016, p.127.‏</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[5] F. Vogel, "The genetic basis of the normal human electroencephalogram (EEG)." Humangenetik 10 (1970): 91-114.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>‏
 [6] J. J. Vidal, "Toward direct brain-computer communication." Annual review of Biophysics and Bioengineering 2.1 (1973): 157-180.‏</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[7] J. R. Wolpaw, N. Birbaumer,  W. J. Heetderks, D. J. McFarland, P. H. Peckham, G. Schalk,  ... &amp;  T.M. Vaughan, "Brain-computer interface technology: a review of the first international meeting." IEEE transactions on rehabilitation engineering 8.2 (2000): 164-173.‏</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
 [8] F. D. Davis, R. Riedl,  J. Vom Brocke, P. M. Léger,  A. B. Randolph, &amp; G. R. Müller-Putz (Eds.). (2025). Information Systems and Neuroscience: NeuroIS Retreat 2024, Vienna, Austria (Vol. 66). Springer Nature.‏</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
 [9] L. Bi, F. Xin-An, and L. Yili, "EEG-based brain-controlled mobile robots: a survey." IEEE transactions on human-machine systems 43.2 (2013): 161-17.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
 [10] A. Randolph, K. Saurav, and J. Melody. "Towards predicting control of a brain-computer interface." (2006).‏</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
  [11] R. Riedl, P. M. Léger, R. Riedl &amp; P.M. Léger, “Introduction to NeuroIS”. Fundamentals of NeuroIS: Information Systems and the Brain, 2016, pp. 1-24.‏</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12] T. Taffese, “A review of using EEG and EMG psychophysiological measurements in user experience research”, 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13] A. Nissen &amp; C. Krampe, “Exploring Gender Differences on ecommerce Websites: A Behavioral and Neural Approach Utilizing fNIRS”. In Information Systems and Neuroscience: NeuroIS Retreat 2020. Springer International Publishing, 2020, pp. 220-232.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14] B. Anderson, A. Vance, C.B., Kirwan, J.L. Jenkins &amp; D. Eargle, From Warning to Wallpaper: Why the Brain Habituates to Security Warnings, 2016a. https://doi.org/10.1080/07421222.2016.1243947.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
 [15] B.B. Anderson, J.L. Jenkins, A. Vance, C.B. Kirwan &amp; D. Eargle, Your memory is working against you: How eye tracking and memory explain habituation to security warnings. Decision Support Systems, 92, 2016b, PP. 3-13. https://doi.org/10.1016/j.dss.2016.09.010.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
 [16] N. Z. Quazilbash, Z. Asif &amp; S. Rizvi, “Variations in Neural Correlates of Human Decision Making–a Case of Book Recommender Systems”. KSII Transactions on Internet &amp; Information Systems, 2023, 17(3).‏</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17] T. Jones, A.B. Randolph, K. Cortes &amp; C. Terrell, “Using NeuroIS tools to understand how individual characteristics relate to cognitive behaviors of students”. In Information Systems and Neuroscience: NeuroIS Retreat 2020, Springer International Publishing, 2020, pp. 181-184.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
  [18] E. Lux, F. Hawlitschek, M.T. Adam &amp; J. Pfeiffer, “Using live biofeedback for decision support: Investigating influences of emotion regulation in financial decision making”, 2015.‏</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19] C.M. Durugbo &amp; Z. Al-Balushi, "Supply chain management in times of crisis: a systematic review". Management Review Quarterly, 2023, 73(3), PP. 1179-1235.‏</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
  [20] S. Gregor, A.C. Lin, T. Gedeon, A. Riaz &amp; D. Zhu, “Neuroscience and a nomological network for the understanding and assessment of emotions in information systems research”. Journal of Management Information Systems, 2014, 30(4), pp.13-48.‏</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21] J. Vom Brocke, R. Riedl &amp; P.M. Léger, “Application Strategies for Neuroscience in Information Systems Design Science Research”. J. Comput. Inf. Syst, 2013, 53(3), 1-13.‏</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
 [22] A. Dimoka, P.A. Pavlou, &amp; F .D. Davis “Research commentary—NeuroIS: The potential of cognitive neuroscience for information systems research”. Information Systems Research, 2011, 22(4), pp.687-702.‏</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23] C. Liapis, “A primer to human threading”. Computers in human behavior, 2011, 27(1), pp.138-143.‏</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
 [24] J.H. Ahn, Y.S. Bae J. Ju, and W. Oh, Attention adjustment, renewal, and equilibrium seeking in online search: an eye-tracking approach. J. Manage. Inf. Syst. 35, 2018, PP.1218–1250. https://doi.org /10.1080/07421222.2018.1523595.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25] M. Salahshour Rad, M. Nilashi &amp; H. Mohamed Dahlan, "Information technology adoption: a review of the literature and classification". Universal Access in the Information Society, 2018, 17, 361-390.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
  [26] I. B. Sassi, S. Mellouli &amp; S.B. Yahia, S. B. “Context-aware recommender systems in mobile environment: On the road of future research. Information Systems, 2017, 72, pp.27-61.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27] S. Benedetto, A. Carbone, V. Drai-Zerbib, M. Pedrotti &amp; T. Baccino, "Effects of luminance and illuminance on visual fatigue and arousal during digital reading". Computers in human behavior, 41, 2014, PP.112-119.‏</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
 [28] A. Riaz, S. Gregor, S. Dewan &amp; Q. Xu, “The interplay between emotion, cognition and information recall from websites with relevant and irrelevant images: A Neuro-IS study”. Decision Support Systems, 2018, 111, pp.113-123.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
 [29] M. Wrzesien, A. Rodríguez, B.  Rey, M.  Alcañiz, R.M. Baños &amp; M. D .Vara, "How the physical similarity of avatars can influence the learning of emotion regulation strategies in teenagers". Computers in Human Behavior, 2015, 43, pp.101-111.‏</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30] R. Riedl, “On the biology of technostress: literature review and research agenda”. ACM SIGMIS database: the DATABASE for advances in information systems, 2012, 44(1), pp.18-55.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31] R. Riedl, P.N. Mohr, P.H. Kenning, F.D. Davis &amp; H. R.  Heekeren, “Trusting humans and avatars: A brain imaging study based on evolution theory”. Journal of Management Information Systems, 2014, pp.83-114.
 [32] A. Dimoka, “What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study”. MIS Quarterly, 2010, pp.373-396.‏</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
 [33] Q. Hu, R. West &amp; L. Smarandescu, “The role of self-control in information security violations: Insights from a cognitive neuroscience perspective”. Journal of Management Information Systems, 2015, 31(4), pp.6-48. https://doi.org/10.1016/j.chb.2010.07.011.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
 [34] Q. Wang, L. Meng, M. Liu, Q. Wang &amp; Q. Ma, “How do social-based cues influence consumers’ online purchase decisions? An event-related potential study”. Electronic Commerce Research, 2016, 16, 1-26.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[35] D. Zazon, L. Fink, S. Gordon, &amp; N. Nissim, "Can NeuroIS improve executive employee recruitment? Classifying levels of executive functions using resting state EEG and data science methods." Decision support systems 168 (2023): 113930.‏</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
 [36] C. Reßing, F.M. Oschinsky, M. Klesel, B. Niehaves, R. Riedl,  P. Suwandjieff, ... &amp; G. R. Müller-Putz,."Investigating Mind-Wandering Episodes While Using Digital Technologies: An Experimental Approach Based on Mixed-Methods." NeuroIS Retreat. Cham: Springer International Publishing, 2022. 301-309.‏</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
 [37] J. Vom Brocke, A. Hevner,  P.M. Léger,  P. Walla, P., &amp; R. Riedl, “Advancing a NeuroIS research agenda with four areas of societal contributions”. European Journal of Information Systems, 2020, 29(1), pp. 9-24.‏
 [38] J. Vom Brocke &amp; T. P. Liang, “Guidelines for neuroscience studies in information systems research”. Journal of Management Information Systems, 2014, 30(4), pp. 211-234. https://doi.org/10.2753/MIS0742-1222300408
 [39] P. Walla, “Affective processing guides behavior and emotions communicate feelings: Towards a guideline for the NeuroIS community”. In Information Systems and Neuroscience: Gmunden Retreat on NeuroIS 2017, Springer International Publishing. 2018, pp. 141-150.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[40] N. Aldunate &amp; R. González-Ibáñez, “An integrated review of emoticons in computer-mediated communi –cation”. Frontiers in psychology, 7, 2017, p.2061.‏</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[41] N. Milic, “Consumer grade brain-computer interfaces: An entry path into NeuroIS Domains”. In Information Systems and Neuroscience: Gmunden Retreat on NeuroIS 2016. Springer International Publishing. 2017, pp. 185-193.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
 [42] E.R. Fanfan, J. Blankenship, S. Chakravarty &amp; A.B. Randolph, “Enhancing Wireless Non-invasive Brain-Computer Interfaces with an Encoder/Decoder Machine Learning Model Pair”. In NeuroIS Retreat, Cham: Springer International Publishing, 2022, pp. 53-59.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
 [43] S. Guertin-Lahoud, C. Coursaris, J. Boasen, T.  Demazure, S.L. Chen, N. Dababneh, &amp; P.M. Leger, Evaluating user experience in multisensory meditative virtual reality: A pilot study, 2021.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
 [44] M. Schenkluhn, C. Peukert &amp;   C. Weinhardt, “A Look behind the Curtain: Exploring the Limits of Gaze Typing”. In NeuroIS Retreat, Cham: Springer International Publishing, 2022‏, pp. 251-259.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
 [45] A. Greif-Winzrieth, C. Peukert, P. Toreini &amp; C. Weinhardt, “The View of Participants on the Potential of Conducting NeuroIS Studies in the Wild”. In NeuroIS Retreat, Cham: Springer International Publishing, 2022, pp. 123-131.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[46] F. J. Stangl &amp; R. Riedl, “Measurement of heart rate and heart rate variability in NeuroIS research: Review of empirical results”. NeuroIS Retreat, 2022a, pp. 285-299.‏ https://doi.org/10.1007/978-3-031-13064-9_29
 [47] F. J. Stangl &amp; R. Riedl, “Measurement of heart rate and heart rate variability with wearable devices: A systematic review, 2022b.‏</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
 [48] F. J. Stangl &amp; R. Riedl, “Measurement of heart rate and heart rate variability: A review of NeuroIS research with a focus on applied methods”. NeuroIS Retreat, 2022c, pp. 269-283. https://doi.org/10.1007/978-3-031-13064-9_28 .</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
 [49] H. Hamidi, “Safe use of the internet of things for privacy enhancing". Journal of Information Systems and Telecommunication, 2016, 4.3, pp. 145-151.‏</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[50] A. Hudon, T. Demazure, A. Karran, P.M. Léger &amp; S. Sénécal, "Explainable artificial intelligence (XAI): how the visualization of AI predictions affects user cognitive load and confidence." Information Systems and Neuroscience: NeuroIS Retreat 2021. Springer International Publishing, 2021.‏</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[51] N. Gordon &amp; K.W. Moore, “The Effects of Artificial Intelligence (AI) Enabled Personality Assessments during Team Formation on Team Cohesion”. NeuroIS Retreat, 2022, pp.311-318.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
 [52] G. Beraldo, L. Tonin, A. Cesta &amp; E. Menegatti, "Brain-driven telepresence robots: a fusion of user’s commands with robot’s intelligence". In International Conference of the Italian Association for Artificial Intelligence, Cham: Springer International Publishing, 2020, November, pp. 235-248.
 [53] R. Riedl &amp; T. Fischer, “System response time as a stressor in a digital world: Literature review and theoretical model”. In HCI in Business, Government, and Organizations: 5th International Conference, HCIBGO 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings 5. Springer International Publishing. 2018, pp. 175-186. https://doi.org/10.1007/978-3-319-91716-0_14
 [54] B. Kirwan, B. Anderson, D. Eargle, J. Jenkins &amp; A. Vance, A.”Using fMRI to measure stimulus generalization of software notification to security warnings”. In Information Systems and Neuroscience: NeuroIS Retreat 2019, Springer International Publishing, 2020, pp. 93-99.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
 [55] K.J. Fadel, T.O. Meservy &amp; C.B. Kirwan, “Information filtering in electronic networks of practice: An fMRI investigation of expectation (dis) confirmation”. Journal of the Association for Information Systems, 2022, 23(2), pp. 491-520.‏ https://doi.org/10.17705/1jais.00731.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
 [56] A. Lakhiwal, H. Bala &amp; P.M. Léger, “Ambivalence is better than indifference: behavioral and neurophysiological assessment of ambivalence in online environments”. Forthcoming, MIS Quarterly, 2022.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
 [57] S. Bosshard &amp; P. Walla, "Sonic Influence on Initially Neutral Brands: Using EEG to Unveil the Secrets of Audio Evaluative Conditioning".  Brain Sciences, 13(10), 2023, P.1393.‏   https://doi.org/10.3390/brainsci13101393
 [58] J. Uddin, “An Autoencoder based Emotional Stress State Detection Approach by using Electroencephalography Signals”. Journal of Information Systems and Telecommunication (JIST), 2023, 1.41, p. 24.‏</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
 [59] B. Kirby, K. Malley &amp; R. West, “Neural activity related to information security decision making: effects of who is rewarded and when the reward is received”. In Information Systems and Neuroscience: NeuroIS Retreat 2018. Springer International Publishing, 2019, pp. 19-27.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[60] W. Liu, Y. Cao &amp; R.W. Proctor, "The roles of visual complexity and order in first impressions of webpages: An ERP study of webpage rapid evaluation”. International Journal of Human–Computer Interaction, 2022, 38(14), pp. 1345-1358.‏</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
 [61] L. R. P. Roselli &amp; A. T. de Almeida, "Improvements in the FITradeoff Decision Support System for ranking order problematic based in a behavioral study with NeuroIS tools". In NeuroIS Retreat, Cham: Springer International Publishing, 2020, pp. 121-132. https://doi.org/10.1007/978-3-030-60073-0_14.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
 [62] M.R. Mohammadi, A.A. Raie, “Pose-invariant eye gaze estimation using geometrical features of iris and pupil images”. Journal of Information Systems and Telecommunication (JIST), 2013, 3, p. 1.‏</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
 [63] F. Popp, B. Lutz &amp; D. Neumann, "Information Overload and Argumentation Changes in Product Reviews: Evidence from NeuroIS”. In NeuroIS Retreat, Cham: Springer International Publishing, 2022a, pp. 9-21https://doi.org/10.1007/978-3-031-13064-9_2.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
 [64] C.L. Lin, Z. Chen, X.  Jiang, G. L. Chen &amp; P. Jin,” Roles and research trends of neuroscience on major information systems journal: a bibliometric and content analysis”. Frontiers in Neuroscience, 2022, 16, pp. 872532.‏
 [65] M. Nadj, R. Rissler, M.T. Adam, M.T. Knierim, M.X.  Li, A.  Maedche &amp; R. Riedl, “WHAT DISRUPTS FLOW IN OFFICE WORK? THE IMPACT OF FREQUENCY AND RELEVANCE OF IT-MEDIATED INTERRUPTIONS”. MIS Quarterly, 2023, 47(4).‏</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
 [66] T. Kalischko &amp; R.  Riedl, “Physiological Measurement in the Research Field of Electronic Performance Monitoring: Review and a Call for NeuroIS Studies”. Information Systems and Neuroscience: NeuroIS Retreat 2020, 2020, pp.233-243.‏</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
 [67] A. Blicher, R. Gleasure, I. Constantiou &amp; J. Clement, How Does the Content of Crowdfunding Campaign Pictures Impact Donations for Cancer Treatment. In NeuroIS Retreat, Cham: Springer International Publishing, 2022, PP. 61-71.</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
 [68] M. Chang, S. Pavlevchev, A.N. Flöck, &amp; P. Walla, “The effect of body positions on word-recognition: a multi-methods NeuroIS study”. In Information Systems and Neuroscience: NeuroIS Retreat 2019, Springer International Publishing, 2020, pp. 327-335.</unstructured_citation></citation><citation key="ref60"><unstructured_citation>
 [69] P. Léné, A.J. Karran, E. Labonté-Lemoyne, S. Sénécal, M. Fredette,  K.J. Johnson &amp; P.M. Léger, “Wavelet Transform Coherence: An Innovative Method to Investigate Social Interaction in NeuroIS”. In Information Systems and Neuroscience: NeuroIS Retreat 2019, Springer International Publishing, 2020, pp. 147-154.</unstructured_citation></citation><citation key="ref61"><unstructured_citation>
 [70] W. Yan, M. Zhang &amp; Y. Liu, Y. “Regulatory effect of drawing on negative emotion: a functional near-infrared spectroscopy study”. The Arts in Psychotherapy, 2021, 74, 101780.</unstructured_citation></citation><citation key="ref62"><unstructured_citation>
 [71] C. Berger, M.T. Knierim &amp; C. Weinhardt, Detecting flow experiences in the field using video-based head and face activity recognition: a pilot study. In Information Systems and Neuroscience: NeuroIS Retreat 2021, Springer International Publishing.‏ 2021, pp. 120-127. </unstructured_citation></citation><citation key="ref63"><unstructured_citation>
 [72] S. Mannina, &amp; S. Addas, “Mixed Emotions: Evaluating Reactions to Dynamic Technology Feedback with NeuroIS”. In NeuroIS Retreat. Cham: Springer International Publishing, 2022, pp. 201-209
 [73] T.A. Nguyen, C.K. Coursaris, P.M. Léger, S. Sénécal &amp; M. Fredette, “Effectiveness of banner ads: An eye tracking and facial expression analysis”. In HCI in Business, Government and Organizations: 7th International Conference, HCIBGO 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings 22, Springer International Publishing, 2020, pp. 445-455.</unstructured_citation></citation><citation key="ref64"><unstructured_citation>
 [74] F. Giroux, P. M Léger, D. Brieugne, F. Courtemanche, F. Bouvier,  S.L. Chen, ... &amp; S. Sénécal, “Guidelines for collecting automatic facial expression detection data synchronized with a dynamic stimulus in remote moderated user tests”. In: Human-Computer Interaction. Theory, Methods and Tools: Thematic Area, HCI 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings, Part I 23. Springer International Publishing, 2021. pp. 243-254.‏ </unstructured_citation></citation><citation key="ref65"><unstructured_citation>
 [75] B. Lutz, M.T. Adam, S. Feuerriegel, N. Pröllochs &amp; D. Neumann, "Affective information processing of fake news: Evidence from NeuroIS”, European Journal of Information Systems, 2023, pp. 1-20.</unstructured_citation></citation><citation key="ref66"><unstructured_citation>
 [76] B. Lutz, M.T. Adam, S. Feuerriegel, N. Pröllochs &amp; D. Neumann, "Identifying linguistic cues of fake news associated with cognitive and affective processing: Evidence from NeuroIS”. In Information Systems and Neuroscience: NeuroIS Retreat 2020, Springer International Publishing, 2020, pp. 16-23.</unstructured_citation></citation><citation key="ref67"><unstructured_citation>
 [77] V. Dorner &amp; C.E. Uribe Ortiz, “New Measurement Analysis for Emotion Detection Using ECG Data”. In NeuroIS Retreat, Cham: Springer International Publishing, 2022, pp. 219-227.</unstructured_citation></citation><citation key="ref68"><unstructured_citation>
 [78] S.A. Brown &amp; R.W. Sias, THE FAULT IN OUR STARS: MOLECULAR GENETICS AND INFORMATION TECHNOLOGY USE.  MIS Quarterly, 2023, 47(2).‏ https://doi.org/10.25300/MISQ/2022/17075.</unstructured_citation></citation><citation key="ref69"><unstructured_citation>
 [79] G.J. Browne &amp; E.A. Walden, Is There a Genetic Basis for Information Search Propensity? A Genotyping Experiment. MIS Quarterly, 2020, 44(2).‏</unstructured_citation></citation><citation key="ref70"><unstructured_citation>
 [80] B. Mai &amp; H. Kim “The Relationships Between Emotional States and Information Processing Strategies in IS Decision Support—A NeuroIS Approach”. In Information Systems and Neuroscience: NeuroIS Retreat 2019, Springer International Publishing, 2020, pp. 337-343.</unstructured_citation></citation><citation key="ref71"><unstructured_citation>
 [81] A. Randolph, S.  Mekbib, J. Calvert, K. Cortes, &amp; C. Terrell “Application of NeuroIS tools to understand cognitive behaviors of student learners in biochemistry”. In Information Systems and Neuroscience: NeuroIS Retreat 2019. Springer International Publishing, 2020, pp. 239-243.</unstructured_citation></citation><citation key="ref72"><unstructured_citation>
 [82] T. Demazure, A. J. Karran, J. Boasen,  P.M. Léger, &amp;  S. Sénécal, “Distributed remote EEG data collection for NeuroIS research: a methodological framework”. In International Conference on Human-Computer Interaction, Cham: Springer International Publishing. 2021, July, pp.3-22.</unstructured_citation></citation><citation key="ref73"><unstructured_citation>
 [83] K. Subramaniam, J.  Boasen, F. Giroux, S. Sénécal, P. M. Léger &amp; M. Paquette, “Increased Audiovisual Immersion Associated with Mirror Neuron System Enhancement Following High Fidelity Vibrokinetic Stimulation”. In NeuroIS Retreat, Cham: Springer International Publishing, 2022, pp. 81-88.</unstructured_citation></citation><citation key="ref74"><unstructured_citation>
[84] D. Camargo-Vargas, M. Callejas-Cuervo, &amp; A. C. Alarcón-Aldana, “Brain-computer interface prototype to support upper limb rehabilitation processes in the human body”. International Journal of Information Technology, 2023, 15(7), pp. 3655-3667.‏</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Transmission Parameter-based Demodulation in Visible Light Communications using Deep Learning</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Sarah</given_name><surname>Ayashm</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Seyed Sadra</given_name><surname>Kashef</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Morteza</given_name><surname>Valizadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hasti</given_name><surname>Akhavan</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>26</day><year>2025</year></publication_date><pages><first_page>122</first_page><last_page>129</last_page></pages><doi_data><doi>10.61882/jist.47404.13.50.122</doi><resource>http://jist.ir/en/Article/47404</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/47404</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/47404</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/47404</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/47404</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/47404</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/47404</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/47404</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	V. Chandrasekhar, J. G. Andrews and A. Gatherer, "Femtocell networks: a survey", IEEE Communications Magazine, vol. 46, no. 9, 2008, pp. 59-67. Available: 10.1109/MCOM.2008.4623708.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Qi Bi, G. L. Zysman and H. Menkes, "Wireless mobile communications at the start of the 21st century", IEEE Communications Magazine, vol. 39, no. 1, 2001, pp. 110-116. Available: 10.1109/35.894384.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Ma, L. Lampe and S. Hranilovic, "Integration of indoor visible light and power line communication systems", in 2013 IEEE 17th International Symposium on Power Line Communications and Its Applications, Johannesburg, South Africa, 2013, pp. 291-296, Available: 10.1109/ISPLC.2013.6525866.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Luo, L. Fan, and H. Li, “Indoor positioning systems based on visible light communication: State of the art,” IEEE Communications Surveys &amp; Tutorials, vol. 19, no. 4, 2017, pp. 2871-2893.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Z. M. Kassas and T. E. Humphreys, “Observability analysis of collaborative opportunistic navigation with pseudo range measurements”, IEEE Transactions on Intelligent Transportation Systems, vol. 15, no. 1, 2014, pp. 260-273.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	H. Huang, A. Yang, L. Feng, G. Ni, and P. Guo, “Artificial neural network-based visible light positioning algorithm with a diuse optical channel”, Chin. Opt. Lett., vol. 15, no. 5, 2017, pp. 050601.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. Zou, B. Huang, X. Lu, H. Jiang, and L. Xie, “A robust indoor positioning system based on the Procrustes analysis and weighted extreme learning machine”, Trans. Wireless. Comm., vol. 15, 2016, pp. 1252-1266.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Önder, A. Akan and H. Doğan, "Neural network based receiver design for Software Defined Radio over unknown channels", 2013 8th International Conference on Electrical and Electronics Engineering (ELECO), Bursa, Turkey, 2013, pp. 297-300, Available: 10.1109/ELECO.2013.6713848.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Ma et al., "Signal Demodulation With Machine Learning Methods for Physical Layer Visible Light Communications: Prototype Platform, Open Dataset, and Algorithms", IEEE Access, vol. 7, 2019, pp. 30588-30598, Available: 10.1109/ACCESS.2019.2903375.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	H. Hosseinzadeh, F. Razzazi, and A. Haghbin, “Tracking Performance of Semi-Supervised Large Margin Classifiers in Automatic Modulation Classification”, Journal of Information Systems and Telecommunication (JIST), vol. 4, no. 8, 2014, pp. 1.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	K. Majeed and S. Hranilovic, "Passive Indoor Visible Light Positioning System Using Deep Learning", IEEE Internet of Things Journal, vol. 8, no. 19, 2021, pp. 14810-14821, , Available: 10.1109/JIOT.2021.3072201.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	B. Lin, Q. Lai, Z. Ghassemlooy and X. Tang, "A Machine Learning Based Signal Demodulator in NOMA-VLC",  Journal of Lightwave Technology, vol. 39, no. 10, 2021, pp. 3081-3087, Available: 10.1109/JLT.2021.3058591.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Y. Shi, D. Yan, P. Liu, Y. Chen, C. Li and Z. Lu, "A Review of Machine Learning Based Techniques for Demodulation",  2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), Chongqing, China, 2020, pp. 2292-2296, Available: 10.1109/ITAIC49862.2020.9339005.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	H. Wang et al., "Deep Learning for Signal Demodulation in Physical Layer Wireless Communications: Prototype Platform, Open Dataset, and Analytics," in IEEE Access, vol. 7, pp. 30792-30801, 2019, Available: 10.1109/ACCESS.2019.2903130.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Kiranyaz, T. Ince, and M. Gabbouj, “Real-time patient-specific ECG classification by 1-d convolutional neural networks,” IEEE Transactions on Biomedical Engineering, vol. 63, no. 3, 2015, pp. 664675.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	G. Hinton, L. Deng, D. Yu, G. E. Dahl, A.-r. Mohamed, N. Jaitly, A. Senior, V. Vanhoucke, P. Nguyen, T. N. Sainath, et al., “Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups”, IEEE Signal processing magazine, vol. 29, no. 6, 2012, pp. 82-97.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S.Ayashm, M.Chehel Amirani, &amp; M.Valizadeh, “Analysis of ECG Signal by Using an FCN Network for Automatic Diagnosis of Obstructive Sleep Apnea”, Circuits Syst Signal Process, vol. 41, 2022, pp. 6411–6426. https://doi.org/10.1007/s00034-022-02091-7</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	X. Yu, M. O. Efe and O. Kaynak, "A general backpropagation algorithm for feedforward neural networks learning", IEEE Transactions on Neural Networks, vol. 13, no. 1, 2002, pp. 251-254, Available: 10.1109/72.977323.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Optimizing Hyperparameters for Customer Churn Prediction with PSO-Enhanced Composite Deep Learning Techniques</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Sedighimanesh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ali</given_name><surname>Sedighimanesh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hessam </given_name><surname>Zandhessami</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>26</day><year>2025</year></publication_date><pages><first_page>91</first_page><last_page>110</last_page></pages><doi_data><doi>10.61882/jist.48088.13.50.91</doi><resource>http://jist.ir/en/Article/48088</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/48088</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/48088</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/48088</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/48088</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/48088</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/48088</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/48088</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	N. Jajam, N. P. Challa, K. S. L. Prasanna, and C. H. V. S. Deepthi, “Arithmetic Optimization With Ensemble Deep Learning SBLSTM-RNN-IGSA Model for Customer Churn Prediction,” IEEE Access, vol. 11, 2023, doi: 10.1109/ACCESS.2023.3304669.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	F. Mozaffari, I. R. Vanani, P. Mahmoudian, and B. Sohrabi, “Application of Machine Learning in the Telecommunications Industry: Partial Churn Prediction by using a Hybrid Feature Selection Approach,” Journal of Information Systems and Telecommunication, vol. 11, no. 4, 2023, doi: 10.61186/jist.38419.11.44.331.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. W. Fujo, S. Subramanian, and M. A. Khder, “Customer churn prediction in telecommunication industry using deep learning,” Information Sciences Letters, vol. 11, no. 1, 2022, doi: 10.18576/isl/110120.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Khattak, Z. Mehak, H. Ahmad, M. U. Asghar, M. Z. Asghar, and A. Khan, “Customer churn prediction using composite deep learning technique,” Sci Rep, vol. 13, no. 1, p. 17294, 2023.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	I. Ullah, B. Raza, A. K. Malik, M. Imran, S. U. Islam, and S. W. Kim, “A Churn Prediction Model Using Random Forest: Analysis of Machine Learning Techniques for Churn Prediction and Factor Identification in Telecom Sector,” IEEE Access, vol. 7, 2019, doi: 10.1109/ACCESS.2019.2914999.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. A. Panimalar and A. Krishnakumar, “A review of churn prediction models using different machine learning and deep learning approaches in cloud environment,” 2023. doi: 10.14456/jcst.2023.12.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	L. Geiler, S. Affeldt, and M. Nadif, “A survey on machine learning methods for churn prediction,” 2022. doi: 10.1007/s41060-022-00312-5.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. De, P. Prabu, and J. Paulose, “Effective ML Techniques to Predict Customer Churn,” in Proceedings of the 3rd International Conference on Inventive Research in Computing Applications, ICIRCA 2021, 2021. doi: 10.1109/ICIRCA51532.2021.9544785.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	P. Gopal and N. Bin MohdNawi, “A Survey on Customer Churn Prediction using Machine Learning and data mining Techniques in E-commerce,” in 2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering, CSDE 2021, 2021. doi: 10.1109/CSDE53843.2021.9718460.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Sadeghi, M. N. Dehkordi, B. Barekatain, and N. Khani, “Improve customer churn prediction through the proposed PCA-PSO-K means algorithm in the communication industry,” Journal of Supercomputing, vol. 79, no. 6, 2023, doi: 10.1007/s11227-022-04907-4.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Vijaya and E. Sivasankar, “An efficient system for customer churn prediction through particle swarm optimization based feature selection model with simulated annealing,” Cluster Comput, vol. 22, 2019, doi: 10.1007/s10586-017-1172-1.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	I. Al-Shourbaji, N. Helian, Y. Sun, S. Alshathri, and M. A. Elaziz, “Boosting Ant Colony Optimization with Reptile Search Algorithm for Churn Prediction,” Mathematics, vol. 10, no. 7, 2022, doi: 10.3390/math10071031.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Idris, A. Iftikhar, and Z. ur Rehman, “Intelligent churn prediction for telecom using GP-AdaBoost learning and PSO undersampling,” Cluster Comput, vol. 22, 2019, doi: 10.1007/s10586-017-1154-3.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Dalli, “Impact of Hyperparameters on Deep Learning Model for Customer Churn Prediction in Telecommunication Sector,” Math Probl Eng, vol. 2022, 2022, doi: 10.1155/2022/4720539.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. R. Ismail, M. K. Awang, M. N. A. Rahman, and M. Makhtar, “A multi-layer perceptron approach for customer churn prediction,” International Journal of Multimedia and Ubiquitous Engineering, vol. 10, no. 7, 2015, doi: 10.14257/ijmue.2015.10.7.22.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. O. Abdulsalam, J. F. Ajao, B. F. Balogun, and M. O. Arowolo, “A Churn Prediction System for Telecommunication Company Using Random Forest and Convolution Neural Network Algorithms,” ICST Transactions on Mobile Communications and Applications, vol. 6, no. 21, 2022, doi: 10.4108/eetmca.v6i21.2181.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	I. A. Adeniran, C. P. Efunniyi, O. S. Osundare, A. O. Abhulimen, and U. OneAdvanced, “Implementing machine learning techniques for customer retention and churn prediction in telecommunications,” Computer Science &amp; IT Research Journal, vol. 5, no. 8, 2024.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Z. Alotaibi and M. A. Haq, “Customer churn prediction for telecommunication companies using machine learning and ensemble methods,” Engineering, Technology &amp; Applied Science Research, vol. 14, no. 3, pp. 14572–14578, 2024.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Y. Zhang, S. Wang, and G. Ji, “A Comprehensive Survey on Particle Swarm Optimization Algorithm and Its Applications,” 2015. doi: 10.1155/2015/931256.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. N. Ab Wahab, S. Nefti-Meziani, and A. Atyabi, “A comprehensive review of swarm optimization algorithms,” PLoS One, vol. 10, no. 5, 2015, doi: 10.1371/journal.pone.0122827.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. Fang, W. Liu, L. Chen, S. Lauria, A. Miron, and X. Liu, “A Survey of Algorithms, Applications and Trends for Particle Swarm Optimization,” International Journal of Network Dynamics and Intelligence, 2023, doi: 10.53941/ijndi0201002.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Agrawal, A. Das, A. Gaikwad, and S. Dhage, “Customer Churn Prediction Modelling Based on Behavioural Patterns Analysis using Deep Learning,” in 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018, 2018. doi: 10.1109/ICSCEE.2018.8538420.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	A. Amin, F. Al-Obeidat, B. Shah, A. Adnan, J. Loo, and S. Anwar, “Customer churn prediction in telecommunication industry using data certainty,” J Bus Res, vol. 94, 2019, doi: 10.1016/j.jbusres.2018.03.003.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	N. I. Mohammad, S. A. Ismail, M. N. Kama, O. M. Yusop, and A. Azmi, “Customer Churn Prediction in Telecommunication Industry Using Machine Learning Classifiers,” in ACM International Conference Proceeding Series, 2019. doi: 10.1145/3387168.3387219.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	A. Jatain, S. B. Bajaj, P. Vashisht, and A. Narang, “Artificial Intelligence Based Predictive Analysis of Customer Churn,” </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Holistic Approach to Stress Identification: Integrating Questionnaires and Physiological Signals through Machine Learning</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mrunal</given_name><surname>Fatangare</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hemlata</given_name><surname>Ohal</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>26</day><year>2025</year></publication_date><pages><first_page>111</first_page><last_page>121</last_page></pages><doi_data><doi>10.61882/jist.48271.13.50.111</doi><resource>http://jist.ir/en/Article/48271</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/48271</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/48271</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/48271</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/48271</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/48271</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/48271</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/48271</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	 Alberdi, A. Aztiria, and A. Basarab, “Towards an     automatic early stress recognition system for office   environments based on multimodal measurements: A review,” Feb. 01, 2016, Academic Press Inc. doi: 10.1016/j.jbi.2015.11.007.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	L. Saturday and H. Selye, “Stress and the General Adaptation Syndrome,” Br Med J, pp. 1383–1392, Jun. 1950.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Gedam and S. Paul, “A Review on Mental Stress Detection Using Wearable Sensors and Machine Learning Techniques,” 2021, Institute of Electrical and Electronics Engineers Inc. doi: 10.1109/ACCESS.2021.3085502.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. A. Singh, K. Gupta, M. Rajeshwari, and T. Janumala, “Detection of Stress Using Biosensors,” 2018. [Online]. Available:www.sciencedirect.comwww.materialstoday.com/proceedings
[5]	S. Cohen, T. Kamarck, and R. Mermelstein, “A Global Measure of Perceived Stress,” 1983.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[6]	M. Masuda and T. H. Holmes, “The Social Readjustment Rating Scale: A Cross-Cultural Study Of Japanese And Americans *p,” Pergamon Press, 1967.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[7]	P. F. Lovibond and S. H. Lovibond, “The structure of negative Emotion States: Comparision of the depression anxiety Stress Scales (DASS) with the Beck Depression and Anxiety Inventories,” BehaP. Res. Ther, vol. 33, no. 3, pp. 335–343, 1995.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[8]	E. Askari, “Fear Recognition Using Early Biologically Inspired Features Model,” Journal of Information Systems and Telecommunication (JIST), vol. 12, no. 45, pp. 12–19, Mar. 2024, doi: 10.61186/jist.39051.12.45.12.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[9]	Jia Uddin, “An Autoencoder based Emotional Stress Detection approach using Electroencephalography Signals,” Journal of Information Systems and Telecommunication, vol. 11, no. 1, pp. 24–30, Mar. 2023.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10]	N. Jadhav, “Hierarchical Weighted Framework for Emotional Distress Detection using Personalized Affective Cues,” Journal of Information Systems and Telecommunication (JIST), vol. 10, no. 38, pp. 89–101, Apr. 2022, doi: 10.52547/jist.16499.10.38.89.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	B. S. Mcewen, A. E. Mirsky, and M. M. Hatch, “Physiology and Neurobiology of Stress and Adaptation: Central Role of the Brain,” the American Physiological Society, pp. 873–904, 2007, doi: 10.1152/physrev.00041.2006.-The.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	G. P. Chrousos, “Stress and disorders of the stress system,” Jul. 2009. doi: 10.1038/nrendo.2009.106.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	M. Kivimäki, M. Virtanen, M. Elovainio, A. Kouvonen, A. Väänänen, and J. Vahtera, “Work stress in the etiology of coronary heart disease - A meta-analysis,” Scand J Work Environ Health, vol. 32, no. 6, pp. 431–442, 2006, doi: 10.5271/sjweh.1049.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	M. Malik et al., “Heart rate variability: Standards of measurement, physiological interpretation, and clinical use,” Circulation, vol. 93, no. 5, pp. 1043–1065, Mar. 1996, doi: 10.1161/01.cir.93.5.1043.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	J. F. Thayer and R. D. Lane, “A model of neurovisceral integration in emotion regulation and dysregulation,” 2000. [Online]. Available: www.elsevier.com/locate/jad.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	A. K. Jain, R. P. Duin, J. Mao, and S. Member, “Statistical Pattern Recognition: A Review,” IEEE Trans Pattern Anal Mach Intell, vol. 22, no. 1, pp. 4–37, Jan. 2000.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	Isabelle Guyon and Andr´e Elisseeff, “An Introduction to Variable and Feature Selection,” Journal of Machine Learning Research, vol. 1, pp. 1157–1182, 2003, doi: 10.1162/153244303322753616.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	G. Chandrashekar and F. Sahin, “A survey on feature selection methods,” Computers and Electrical Engineering, vol. 40, no. 1, pp. 16–28, Jan. 2014, doi: 10.1016/j.compeleceng.2013.11.024.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	Y. Saeys, I. Inza, and P. Larrañaga, “A review of feature selection techniques in bioinformatics,” Oct. 01, 2007, Oxford University Press. doi: 10.1093/bioinformatics/btm344.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	S. T. Charles and L. L. Carstensen, “Social and emotional aging,” Annu Rev Psychol, vol. 61, pp. 383–409, Jan. 2010, doi: 10.1146/annurev.psych.093008.100448.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	Ohal, Hemlata, et al. "Electroencephalogram Based Stress Detection Using Machine Learning." International Conference on Computational Intelligence in Data Science. Cham: Springer Nature Switzerland, 2024, doi: 10.1007/978-3-031-69986-3_38.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	R. Mukkamala et al., “Toward Ubiquitous Blood Pressure Monitoring via Pulse Transit Time: Theory and Practice,” IEEE Trans Biomed Eng, vol. 62, no. 8, pp. 1879–1901, Aug. 2015, doi: 10.1109/TBME.2015.2441951.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	A. Shahid, K. Wilkinson, S. Marcu, and C. M. Shapiro, “Perceived Stress Questionnaire (PSQ),” in STOP, THAT and One Hundred Other Sleep Scales, New York, NY: Springer New York, 2011, pp. 273–274. doi: 10.1007/978-1-4419-9893-4_64.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	ISMA, “Stress Questionnaire,” 2017. [Online]. Available: www.isma.org.uk.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	J. Sharma, N. Gupta, N. Khandelwal, and M. Gautam, “A Multimodal Approach for Stress Detection through Questionnaire and Emotion Analysis.,” in 2024 15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024, Institute of Electrical and Electronics Engineers Inc., 2024. doi: 10.1109/ICCCNT61001.2024.10725040.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	C. Brouwers et al., “Positive affect dimensions and their association with inflammatory biomarkers in patients with chronic heart failure,” Biol Psychol, vol. 92, no. 2, pp. 220–226, Feb. 2013, doi: 10.1016/j.biopsycho.2012.10.002.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	A. Baharum, S. H. Tanalol, C. X. Jian, M. Omar, N. A. M. Noor, and N. M. M. Yusop, “Stress catcher application for mobile stress monitoring using questionnaire-based,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 16, no. 2, pp. 917–924, 2019, doi: 10.11591/ijeecs.v16.i2.pp917-924.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	M. Abd Al-Alim, R. Mubarak, N. M. Salem, and I. Sadek, “A machine-learning approach for stress detection using wearable sensors in free-living environments,” Comput Biol Med, vol. 179, Sep. 2024, doi: 10.1016/j.compbiomed.2024.108918.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	P. Mukherjee and A. Halder Roy, “A deep learning-based approach for distinguishing different stress levels of human brain using EEG and pulse rate,” Comput Methods Biomech Biomed Engin, vol. 27, no. 16, pp. 2303–2324, Dec. 2024, doi: 10.1080/10255842.2024.2275547.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	J. Allen, “Photoplethysmography and its application in clinical physiological measurement,” Mar. 01, 2007, Institute of Physics Publishing. doi: 10.1088/0967-3334/28/3/R01.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	C. Setz, B. Arnrich, J. Schumm, R. La Marca, G. Tröster, and U. Ehlert, “Discriminating stress from cognitive load using a wearable eda device,” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 2, pp. 410–417, Mar. 2010, doi: 10.1109/TITB.2009.2036164.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	Fatangare, Mrunal, and Sukhada Bhingarkar. "Investigating an Efficient Filter to Implement Automated Nadi Pariksha by Analysing Time and Frequency Domain Features with Machine Learning Approach." International Research Journal of Multidisciplinary Technovation 7.2 (2025): 223-244, doi: 10.54392/irjmt25216.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	A. Singh, K. Singh, A. Kumar, A. Shrivastava, and S. Kumar, “Machine Learning Algorithms for Detecting Mental Stress in College Students,” Dec. 2024, doi: 10.1109/I2CT61223.2024.10544243.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	S. Sriramprakash, V. D. Prasanna, and O. V. R. Murthy, “Stress Detection in Working People,” in Procedia Computer Science, Elsevier B.V., 2017, pp. 359–366. doi: 10.1016/j.procs.2017.09.090.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	S. Khalid, “A Survey of Feature Selection and Feature Extraction Techniques in Machine Learning,” 2014. doi: 10.1109/SAI.2014.6918213 [Online]. Available: www.conference.thesai.org.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	Awasthi, Kushagra, Pranav Nanda, and K. V. Suma. "Performance analysis of Machine Learning techniques for classification of stress levels using PPG signals." 2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). IEEE, 2020. doi:  10.1109/CONECCT50063.2020.9198481.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	T. M. Cover and P. E. Hart, “Approximate formulas for the information transmitted bv a discrete communication channel,” 1952. Doi: 10.1109/TIT.1967.1053945.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	H. S. Kim, M. Kim, J. Kim, K. Park, D. S. Yoon, and J. Jo, “A Study on the Subjective Questionnaire-based Stress Assessment using k-means Clustering,” in International Conference on ICT Convergence, IEEE Computer Society, 2022, pp. 2131–2133. doi: 10.1109/ICTC55196.2022.9953015.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	V. Kalai Vani and F. Ghouse, “Exploring Predictive Models for Stress Detection: A Machine Learning Approach,” Institute of Electrical and Electronics Engineers (IEEE), Sep. 2024, pp. 477–483. doi: 10.1109/icipcn63822.2024.00084.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Designing a Hybrid Algorithm that Combines Deep Learning and PSO for Proactive Detection of Attacks in IoT Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Zahra</given_name><surname>Bakhshali</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Alireza</given_name><surname>Pourebrahimi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ahmad</given_name><surname>Ebrahimi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Nazanin </given_name><surname>Pilevari</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>26</day><year>2025</year></publication_date><pages><first_page>130</first_page><last_page>138</last_page></pages><doi_data><doi>10.61882/jist.48455.13.50.130</doi><resource>http://jist.ir/en/Article/48455</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/48455</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/48455</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/48455</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/48455</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/48455</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/48455</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/48455</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Haras and T. Skotnicki, “Thermoelectricity for IoT – A review,” 2018. doi: 10.1016/j.nanoen.2018.10.013.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Ullah, N. Javaid, O. Samuel, M. Imran, and M. Shoaib, “CNN and GRU based Deep Neural Network for Electricity Theft Detection to Secure Smart Grid,” in 2020 International Wireless Communications and Mobile Computing, IWCMC 2020, 2020. doi: 10.1109/IWCMC48107.2020.9148314.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. M. Banaamah and I. Ahmad, “Intrusion Detection in IoT Using Deep Learning,” Sensors, vol. 22, no. 21, 2022, doi: 10.3390/s22218417.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	C. U. Om Kumar, S. Marappan, B. Murugeshan, and P. M. R. Beaulah, “Intrusion Detection Model for IoT Using Recurrent Kernel Convolutional Neural Network,” Wirel Pers Commun, vol. 129, no. 2, 2023, doi: 10.1007/s11277-022-10155-9.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. A. Khan, “HCRNNIDS: Hybrid convolutional recurrent neural network-based network intrusion detection system,” Processes, vol. 9, no. 5, 2021, doi: 10.3390/pr9050834.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Dushimimana, T. Tao, R. Kindong, and A. Nishyirimbere, “Bi-directional Recurrent Neural network for Intrusion Detection System (IDS) in the internet of things (IoT),” International Journal of Advanced Engineering Research and Science, vol. 7, no. 3, 2020, doi: 10.22161/ijaers.73.68.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	N. W. Khan et al., “A hybrid deep learning-based intrusion detection system for IoT networks,” Mathematical Biosciences and Engineering, vol. 20, no. 8, 2023, doi: 10.3934/mbe.2023602.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. M. Jagannath, R. B. Mohite, M. K. Gupta, and O. S. Lamba, “Implementation of Machine Learning and Deep Learning for Securing the Devices in IOT Systems,” Indian J Sci Technol, vol. 16, no. 9, pp. 640–647, May 2023, doi: 10.17485/IJST/v16i9.99.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, “Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks,” in 2018 4th IEEE Conference on Network Softwarization and Workshops, NetSoft 2018, 2018. doi: 10.1109/NETSOFT.2018.8460090.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. A. Alabady, F. Al-Turjman, and S. Din, “A Novel Security Model for Cooperative Virtual Networks in the IoT Era,” Int J Parallel Program, vol. 48, no. 2, 2020, doi: 10.1007/s10766-018-0580-z.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. A. Alahmadi et al., “DDoS Attack Detection in IoT-Based Networks Using Machine Learning Models: A Survey and Research Directions,” 2023. doi: 10.3390/electronics12143103.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	L. Xiao, X. Wan, X. Lu, Y. Zhang, and D. Wu, “IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?,” IEEE Signal Process Mag, vol. 35, no. 5, 2018, doi: 10.1109/MSP.2018.2825478.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Jain, V. Saihjpal, N. Singh, and S. B. Singh, “An Overview of Variants and Advancements of PSO Algorithm,” 2022. doi: 10.3390/app12178392.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	J. Fang, W. Liu, L. Chen, S. Lauria, A. Miron, and X. Liu, “A Survey of Algorithms, Applications and Trends for Particle Swarm Optimization,” International Journal of Network Dynamics and Intelligence, 2023, doi: 10.53941/ijndi0201002.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Aribisala, M. S. Khan, and G. Husari, “Feed-Forward Intrusion Detection and Classification on a Smart Grid Network,” in 2022 IEEE 12th Annual Computing and Communication Workshop and Conference, CCWC 2022, 2022. doi: 10.1109/CCWC54503.2022.9720898.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	W. H. Lin, P. Wang, B. H. Wu, M. S. Jhou, K. M. Chao, and C. C. Lo, “Behaviorial-Based Network Flow Analyses for Anomaly Detection in Sequential Data Using Temporal Convolutional Networks,” in Lecture Notes on Data Engineering and Communications Technologies, vol. 41, 2020. doi: 10.1007/978-3-030-34986-8_12.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Chattopadhyay, “Modelling of intrusion detection system using artificial intelligence—evaluation of performance measures,” Studies in Fuzziness and Soft Computing, vol. 319, 2015, doi: 10.1007/978-3-319-12883-2_11.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Credit Risk Prediction: An Application of Federated Learning</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name> Sara</given_name><surname>Houshmand</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Amir</given_name><surname>albadvi</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>26</day><year>2025</year></publication_date><pages><first_page>154</first_page><last_page>164</last_page></pages><doi_data><doi>10.61882/jist.49000.13.50.154</doi><resource>http://jist.ir/en/Article/49000</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/49000</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/49000</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/49000</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/49000</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/49000</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/49000</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/49000</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] A. Jangir, "German Credit Card Data" [Data set], Kaggle. Available:https://www.kaggle.com/datasets/arunjangir245/german-credit-card. Accessed: Dec. 6, 2024.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] A. Oualid, Y. Maleh, and L. Moumoun, “FEDERATED LEARNING TECHNIQUES APPLIED TO CREDIT RISK MANAGEMENT: A SYSTEMATIC LITERATURE REVIEW,” EDPACS, vol. 68, no. 1, pp. 42–56, Jul. 2023, doi: 10.1080/07366981.2023.2241647.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] D. Gao, C. Ju, X. Wei, Y. Liu, T. Chen, and Q. Yang, “HHHFL: Hierarchical Heterogeneous Horizontal Federated Learning for Electroencephalography,” arXiv.org, Sep. 11, 2019. http://arxiv.org/abs/1909.05784.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] F. Mozaffari, I. Raeesi Vanani, P. Mahmoudian, and B. Sohrabi, “Application of Machine Learning in the Telecommunications Industry: Partial Churn Prediction by using a Hybrid Feature Selection Approach,” Journal of Information Systems and Telecommunication (JIST), vol. 11, no. 44, pp. 331–346, Dec. 2023, doi: https://doi.org/10.61186/jist.38419.11.44.331.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] J. Ding, E. Tramel, A. K. Sahu, S. Wu, S. Avestimehr, and T. Zhang, “Federated Learning Challenges and Opportunities: An outlook,” arXiv.org, Feb. 01, 2022. http://arxiv.org/abs/2202.00807.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] J. Zhou et al., “A Survey on Federated Learning and its Applications for Accelerating Industrial Internet of Things,” arXiv.org, Apr. 21, 2021. http://arxiv.org/abs/2104.10501.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] L. Li, Y. Fan, M. Tse, and K.-Y. Lin, “A review of applications in federated learning,” Computers &amp; Industrial Engineering, vol. 149, p. 106854, Sep. 2020, doi: 10.1016/j.cie.2020.106854.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] LaoTse, "Credit Risk Dataset" [Data set], Kaggle. Available: https://www.kaggle.com/datasets/laotse/credit-risk-dataset. Accessed: December 6, 2024.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] M. Goutier, C. Diebel, M. Adam, and A. Benlian, “Federated Learning for credit risk assessment,” Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences, Jan. 2024, doi: 10.24251/hicss.2023.048.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] M. Loukili, F. Messaoudi, and R. El Youbi, “Implementation of Machine Learning Algorithms for Customer Churn Prediction,” Journal of Information Systems and Telecommunication (JIST), vol. 11, no. 43, pp. 196–208, Aug. 2023, doi: https://doi.org/10.61186/jist.34208.11.43.196.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] M. Rasouli, "Implementation and comparison of machine learning methods in the credit risk assessment of financial institution customers," 8th International Conference on Industrial Engineering and Systems, 2022.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] R. Mehta, "Credit Risk Analysis" [Data set], Kaggle. Available: https://www.kaggle.com/datasets/rameshmehta/credit-risk-analysis?resource=download. Accessed: Dec. 6, 2024.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] N. Mohammadi, A. Rezakhani, H. Haj Seyyed Javadi, and P. Asghari, “FLHB-AC: Federated Learning History-Based Access Control Using Deep Neural Networks in Healthcare System,” Journal of Information Systems and Telecommunication (JIST), vol. 12, no. 46, pp. 90–104, Jun. 2024, doi: https://doi.org/10.61186/jist.44500.12.46.90.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] P. Rouintan, "Factors affecting credit risk: A case study of bank customers; Keshavarzi Bank," 2006.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] P. Sharifi, V. Jain, M. A. Poshtkohi, E. Seyyedi, and V. Aghapour, “Banks Credit Risk Prediction with Optimized ANN Based on Improved Owl Search Algorithm,” Mathematical Problems in Engineering, vol. 2021, pp. 1–10, Dec. 2021, doi: 10.1155/2021/8458501.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] Parisrohan, "Credit Score Classification" [Data set], Kaggle. Available: https://www.kaggle.com/datasets/parisrohan/credit-score-classification?resource=download. Accessed: December 6, 2024.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] M. Rosuli, "Implementation and comparison of machine learning methods in assessing the credit risk of customers in financial and credit institutions," 8th International Conference on Industrial Engineering and Systems, 2022.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] S. Bharati, M. R. H. Mondal, P. Podder, and V. B. S. Prasath, “Federated learning: Applications, challenges and future directions,” International Journal of Hybrid Intelligent Systems, vol. 18, no. 1–2, pp. 19–35, Apr. 2022, doi: 10.3233/his-220006.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] S. Jain, "Loan Prediction Based on Customer Behavior" [Data set], Kaggle. Available: https://www.kaggle.com/datasets/subhamjain/loanprediction-based-on-customer-behavior?select=Training+Data.csv. Accessed: Dec. 6, 2024.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] TensorFlow, "TensorFlow: An end-to-end open-source machine learning platform." Available: https://www.tensorflow.org/. Accessed: December 6, 2024.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] Wst, "Neural network credit scoring models," Computers &amp; Operations Research, vol. 27, no. 11–12, pp. 1131–1152, 2000.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] Y. Li, "Credit risk prediction based on machine learning methods," in Proc. 14th Int. Conf. Comput. Sci. Educ. (ICCSE), Aug. 2019, pp. 1011–1013, doi: 10.1109/ICCSE.2019.8845525.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] Y. Shastri, "A step-by-step guide to federated learning in computer vision," V7labs.com, V7, Apr. 21, 2023. Available: https://www.v7labs.com/blog/federated-learning-guide. Accessed: June 30, 2023.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] Y. Zhao, M. Li, L. Lai, N. Suda, D. Civin, and V. Chandra, “Federated Learning with Non-IID Data,” arXiv (Cornell University), Jan. 2018, doi: 10.48550/arxiv.1806.00582.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] Z. Iqbal and H. Y. Chan, "Concepts, key challenges and open problems of federated learning," Int. J. Eng. (IJE), doi: 10.5829/ije.20..a.11.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] Z. Wang, J. Xiao, L. Wang, and J. Yao, “A novel federated learning approach with knowledge transfer for credit scoring,” Decision Support Systems, vol. 177, p. 114084, Sep. 2023, doi: 10.1016/j.dss.2023.114084.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] Z. Xu, J. Cheng, L. Cheng, X. Xu, and M. Bilal, “MSES credit Risk Assessment model based on federated learning and feature selection,” Computers, Materials &amp; Continua/Computers, Materials &amp; Continua (Print), vol. 75, no. 3, pp. 5573–5595, Jan. 2023, doi: 10.32604/cmc.2023.037287.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] H. Zhang, J. Bosch, and H. H. Olsson, "Federated Learning Systems: Architecture Alternatives," in Proc. 27th Asia-Pacific Software Engineering Conf. (APSEC), 2020, pp. 385–394, doi: 10.1109/APSEC51365.2020.00047.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] Y. Zhang, H. Xie, B. Bai, W. Yu, L. Li, and Y. Gao, "A survey on federated learning," Knowledge-Based Systems, vol. (Volume not provided).</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>