﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051922</doi_batch_id><timestamp>20260519223249</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>2</month><day>3</day><year>2026</year></publication_date><journal_volume><volume>13</volume></journal_volume><issue>52</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Federated Learning for Privacy-Preserving Intrusion Detection: A Systematic Review, Taxonomy, Challenges and Future Directions</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Dattatray Raghunath</given_name><surname>Kale</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Swati</given_name><surname>Shirke-Deshmukh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Amulkumar</given_name><surname>Jadhav</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Shrihari </given_name><surname>Khatawkar </surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sunny</given_name><surname>Mohite</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sarang</given_name><surname>Patil</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Madhav</given_name><surname>Salunkhe</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Rahul</given_name><surname>Sonkamble</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>3</day><year>2026</year></publication_date><pages><first_page>333</first_page><last_page>345</last_page></pages><doi_data><doi>10.66224/jist.45751.13.52.333</doi><resource>http://jist.ir/en/Article/45751</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/45751</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/45751</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/45751</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/45751</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/45751</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/45751</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/45751</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	K. Kurniabudi, B. Purnama, S. Sharipuddin, D. Darmawijoyo, D. Stiawan, S. Samsuryadi, A. Heryanto, and R. Budiarto, “Network anomaly detection research: A survey,” Indonesian Journal of Electrical Engineering and Informatics (IJEEI), vol. 7, no. 2, pp. 1–10, 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] 	I. Manan, F. Rehman, H. Sharif, C. N. Ali, R. R. Ali, and A. Liaqat, “Cyber security intrusion detection using deep learning approaches and Bot-IoT dataset,” in Proc. 2023 4th Int. Conf. on Advancements in Computational Sciences (ICACS), Lahore, Pakistan, 2023, pp. 1–5.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] J. Lánský, S. Ali, M. Mohammadi, M. K. Majeed, S. H. Karim, S. Rashidi, M. Hosseinzadeh, and A. M. Rahmani, “Deep learning-based intrusion detection systems: A systematic review,” IEEE Access, vol. 9, pp. 101574–101599, 2021. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] S. Tyagi, I. S. Rajput, and R. Pandey, “Federated learning: Applications, security hazards and defense measures,” in Proc. 2023 Int. Conf. on Device Intelligence, Computing and Communication Technologies (DICCT), 2023, pp. 477–482.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] J. Konečný, H. B. McMahan, F. X. Yu, P. Richtárik, A. T. Suresh, and D. Bacon, “Federated learning: Strategies for improving communication efficiency,” arXiv preprint arXiv:1610.05492, 2016.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] T. Li, A. Sahu, A. Talwalkar, and V. Smith, “Federated learning: Challenges, methods, and future directions,” IEEE Signal Processing Magazine, vol. 37, no. 3, pp. 50–60, May 2019.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] D. A. Kumar and S. R. Venugopalan, “Intrusion detection systems: A review,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 5, pp. 356–370, 201.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] K. B. Gan, “Intrusion detection systems: Principles and perspectives,” J. Multidisciplinary Eng. Sci. Studies (JMESS), vol. 4, no. 11, pp. —, Nov. 2018.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] T. F. Lunt, “Foundations for intrusion detection,” in Proc. IEEE Computer Security Foundations Workshop (CSFW), 2000, pp.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] S. Mukkamala, A. H. Sung, and A. Abraham, “Designing intrusion detection systems: Architectures, challenges and perspectives,” Studies in Fuzziness and Soft Computing, vol. 190, pp. —, 2005.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] A. Pharate, H. Bhat, V. Shilimkar, and N. A. Mhetre, “Classification of intrusion detection system,” Int. J. Comput. Appl., vol. 118, no. 23, pp. 23–26, 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] N. Majeed, “A review and classification of intrusion detection system in data engineering,” —, 2021.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] R. Wankhede and V. Chole, “Intrusion detection system using classification technique,” Int. J. Comput. Appl., vol. 139, no. 25, pp. 25–28, 2016.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] S. Niksefat, P. Kaghazgaran, and B. Sadeghiyan, “Privacy issues in intrusion detection systems: A taxonomy, survey and future directions,” Comput. Sci. Rev., vol. 25, pp. 69–78, 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] H. El Zakaria, A. Hafid, and L. Khoukhi, “MiTFed: A privacy-preserving collaborative network attack mitigation framework based on federated learning using SDN and blockchain,” IEEE Trans. Netw. Sci. Eng., vol. 10, pp. 1985–2001, 2023, doi: 10.1109/TNSE.2023.3237367.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] Q. Lin, R. Ming, K. Zhang, and H. Luo, “Privacy-enhanced intrusion detection and defense for cyber-physical systems: A deep reinforcement learning approach,” Security Commun. Netw., 2022, doi: 10.1155/2022/4996427.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] S. Chen, Y. Wang, D. Yu, J. Ren, C. Xu, and Y. Zheng, “Privacy-enhanced decentralized federated learning at dynamic edge,” IEEE Trans. Comput., 2023, doi: 10.1109/TC.2023.3239542.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] “Federated learning with privacy-preserving ensemble attention distillation,” IEEE Trans. Med. Imaging, 2023, doi: 10.1109/TMI.2022.3213244.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] S. R. Spangler, “Privacy-enhancing technologies in federated learning for the Internet of Healthcare Things: A survey,” Electronics, 2023, doi: 10.3390/electronics12122703.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] A. Elhussein and G. Gursoy, “Privacy-preserving patient clustering for personalized federated learning,” arXiv preprint arXiv:2307.08847, 2023.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] Y. Wu, C.-F. Chiasserini, F. Malandrino, and M. Levorato, “Enhancing privacy in federated learning via early exit,” in Proc. ACM, 2023, doi: 10.1145/3584684.3597274.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] T. M. Beltrán et al., “Fedstellar: A platform for decentralized federated learning,” arXiv preprint arXiv:2306.XXXXX, 2023.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] “Federated learning for IoT devices with domain generalization,” IEEE Internet Things J., 2023, doi: 10.1109/JIOT.2023.3234977.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] X. Yang, S.-W. Xiang, C. Peng, W. Tan, Z. Li, N. Wu, and Y. Zhou, “Federated learning incentive mechanism design via Shapley value and Pareto optimality,” Axioms, vol. 12, no. 7, p. 636, 2023, doi: 10.3390/axioms12070636.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] Y. Cui et al., “Optimizing training efficiency and cost of hierarchical federated learning in heterogeneous mobile-edge cloud computing,” IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst., 2022.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] J. Zhang, C. Luo, M. Carpenter, and G. Min, “Federated learning for distributed IIoT intrusion detection using transfer approaches,” IEEE Trans. Ind. Informatics, 2022.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] A. Cholakoska, H. Gjoreski, V. Rakovic, D. Denkovski, M. Kalendar, B. Pfitzner, and B. Arnrich, “Federated learning for network intrusion detection in ambient assisted living environments,” IEEE Internet Comput., vol. 27, pp. 15–22, 2023, doi: 10.1109/MIC.2023.3264700.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] J. Nie, D. Xiao, L. Yang, and W. Wu, “FedCME: Client matching and classifier exchanging to handle data heterogeneity in federated learning,” arXiv preprint arXiv:2307.08574, 2023.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] V. Valadi, X. Qiu, P. Gusmão, N. D. Lane, and M. Alibeigi, “FedVal: Different good or different bad in federated learning,” arXiv preprint arXiv:2306.04040, 2023, doi: 10.48550/arXiv.2306.04040.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] G. Hu, Y. Teng, N. Wang, and F. R. Yu, “Clustered data sharing for non-IID federated learning over wireless networks,” arXiv preprint arXiv:2302.10747, 2023.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] J. Li, X. Tong, J. Liu, and L. Cheng, “An efficient federated learning system for network intrusion detection,” IEEE Syst. J., vol. 17, pp. 2455–2464, 2023, doi: 10.1109/JSYST.2023.3236995.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] M. Nakıp, B. C. Gül, and E. Gelenbe, “Decentralized online federated G-network learning for lightweight intrusion detection,” arXiv preprint arXiv:2306.13029, 2023.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] O. Belarbi, T. Spyridopoulos, E. Anthi, I. Mavromatis, P. Carnelli, and A. Khan, “Federated deep learning for intrusion detection in IoT networks,” in CEUR Workshop Proc., vol. 3125, pp. 85–99, 2023.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] E. M. Campos, P. F. Saura, A. González-Vidal, J. L. Ramos, J. B. Bernabé, G. Baldini, and A. F. Gómez-Skarmeta, “Evaluating federated learning for intrusion detection in Internet of Things: Review and challenges,” arXiv preprint arXiv:2108.00974, 2021.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] M. A. Ferrag, O. Friha, L. Maglaras, H. Janicke, and L. Shu, “Federated deep learning for cybersecurity in the Internet of Things: Concepts, applications, and experimental analysis,” IEEE Access, vol. 9, pp. —, 2021.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] M. Alazab, S. P. Rm, M. P., P. K. Maddikunta, T. R. Gadekallu, and V. Q. Pham, “Federated learning for cybersecurity: Concepts, challenges, and future directions,” IEEE Trans. Ind. Informatics, vol. 18, no. 5, pp. 3501–3509, 2022.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] S. Chatterjee and M. K. Hanawal, “Federated learning for intrusion detection in IoT security: A hybrid ensemble approach,” arXiv preprint arXiv:2106.15349, 2021.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38] P. Ruzafa-Alcázar, P. Fernández-Saura, E. Mármol-Campos, A. González-Vidal, J. L. Hernández-Ramos, J. Bernal-Bernabe, and A. F. Skarmeta, “Intrusion detection based on privacy-preserving federated learning for the industrial IoT,” IEEE Trans. Ind. Informatics, vol. 19, no. 2, pp. 1145–1154, 2023.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39] A. Alazab, A. Khraisat, S. Singh, T. Jan, and M. Alazab, “Enhancing privacy-preserving intrusion detection through federated learning,” Electronics, 2023.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40] N. A. Al-Marri, B. S. Ciftler, and M. M. Abdallah, “Federated mimic learning for privacy preserving intrusion detection,” in Proc. IEEE Int. Black Sea Conf. Commun. Netw. (BlackSeaCom), 2020, pp. 1–6.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41] W. Yang, B. Liu, C. Lu, and N. Yu, “Privacy preserving on updated parameters in federated learning,” in Proc. ACM Turing Celebration Conf.—China, 2020.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42] X. Zhao, L. Wang, L. Wang, and Z. Lu, “A privacy-enhanced federated learning scheme with identity protection,” in Proc. IEEE HPCC/DSS/SmartCity/DependSys, 2022, pp. 1188–1195.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43] A. Elhussein and G. Gursoy, “Privacy-preserving patient clustering for personalized federated learning,” arXiv preprint arXiv:2307.08847, 2023.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44] L. Zhang and H. Zhang, “Privacy-preserving federated learning on lattice quantization,” Int. J. Wavelets, Multiresolution Inf. Process., 2023, doi: 10.1142/S0219691323500200.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45] P. Ruzafa-Alcázar et al., “Intrusion detection based on privacy-preserving federated learning for the industrial IoT,” IEEE Trans. Ind. Informatics, vol. 19, no. 2, pp. 1145–1154, 2021.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46] Y. Liu, G. Wu, W. Zhang, and J. Li, “Federated learning-based intrusion detection on non-IID data,” in Lect. Notes Comput. Sci., pp. 313–329, 2023, doi: 10.1007/978-3-031-22677-9_17.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47] O. Belarbi et al., “Federated deep learning for intrusion detection in IoT networks,” arXiv preprint arXiv:2306.02715, 2023.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48] “Federated learning for IoMT applications: A standardization and benchmarking framework of intrusion detection systems,” IEEE J. Biomed. Health Informatics, 2023, doi: 10.1109/JBHI.2022.3167256.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49] H. Saadat, A. Aboumadi, A. Mohamed, A. Erbad, and M. Guizani, “Hierarchical federated learning for collaborative IDS in IoT applications,” in Proc. MECO, 2021, pp. 1–6.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50] R. Lazzarini, H. Tianfield, and V. Charissis, “Federated learning for IoT intrusion detection,” AI, vol. 4, no. 3, pp. 509–530, 2023.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51] Q. Tong, G. Liang, and J. Bi, “Effective federated adaptive gradient methods with non-IID decentralized data,” arXiv preprint arXiv:2009.06557, 2020.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52] E. M. Campos et al., “Evaluating federated learning for intrusion detection in Internet of Things: Review and challenges,” arXiv preprint arXiv:2108.00974, 2021.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53] K. Chen, X. Zhang, X. Zhou, Y. Xiao, and L. Zhou, “Privacy preserving federated learning for full heterogeneity,” ISA Trans., 2023, doi: 10.1016/j.isatra.2023.04.020.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[54] A. David, B. Bierbrauer, and N. D. Bastian, “Data-efficient federated learning for raw network traffic detection,” Proc. SPIE, vol. 12538, 2023, doi: 10.1117/12.2663092.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[55] “Federated learning for IoMT applications: A standardization and benchmarking framework of intrusion detection systems,” IEEE J. Biomed. Health Informatics, 2023, doi: 10.1109/JBHI.2022.3167256.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[56] M. M. Rashid et al., “A federated learning-based approach for improving intrusion detection in industrial Internet of Things networks,” Network, 2023, doi: 10.3390/network3010008.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[57] F. Marulli, L. Verde, S. Marrone, R. Barone, and M. S. Biase, “Evaluating efficiency and effectiveness of federated learning approaches in knowledge extraction tasks,” in Proc. IJCNN, 2021, pp. 1–6.</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[58] V. Valadi et al., “FedVal: Different good or different bad in federated learning,” arXiv preprint arXiv:2306.04040, 2023.</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[59] W. Song and T. Yan, “Federated learning framework for blockchain based on second-order precision,” in Proc. IEEE BigComp, 2023, doi: 10.1109/BigComp57234.2023.00054.</unstructured_citation></citation><citation key="ref60"><unstructured_citation>
[60] M. Wang et al., “TrFedDis: Trusted federated disentangling network for non-IID domain feature,” arXiv preprint arXiv:2301.12798, 2023.</unstructured_citation></citation><citation key="ref61"><unstructured_citation>
[61] A. D. Chowdary et al., “An ensemble multi-view federated learning intrusion detection for IoT,” IEEE Access, vol. 9, pp. 117734–117745, 2021.</unstructured_citation></citation><citation key="ref62"><unstructured_citation>
[62] R. Zhao et al., “Semi-supervised federated learning based intrusion detection method for Internet of Things,” IEEE Internet Things J., 2022.</unstructured_citation></citation><citation key="ref63"><unstructured_citation>
[63] H. Liang, D. Liu, X. Zeng, and C. Ye, “An intrusion detection method for advanced metering infrastructure system based on federated learning,” J. Mod. Power Syst. Clean Energy, vol. 11, no. 3, pp. 927–937, 2023.</unstructured_citation></citation><citation key="ref64"><unstructured_citation>
[64] J. Zhang, C. Luo, M. Carpenter, and G. Min, “Federated learning for distributed IIoT intrusion detection using transfer approaches,” IEEE Trans. Ind. Informatics, 2022.</unstructured_citation></citation><citation key="ref65"><unstructured_citation>
[65] J. Zhang et al., “Federated learning for distributed IIoT intrusion detection using transfer approaches,” IEEE Trans. Ind. Informatics, 2023, doi: 10.1109/TII.2022.3216575.</unstructured_citation></citation><citation key="ref66"><unstructured_citation>
[66] O. Belarbi et al., “Federated deep learning for intrusion detection in IoT networks,” arXiv preprint arXiv:2306.02715, 2023.</unstructured_citation></citation><citation key="ref67"><unstructured_citation>
[67] P. Li, “FedSD: A new federated learning structure used in non-IID data,” in Proc. IEEE ICASSP, 2023, doi: 10.1109/ICASSP49357.2023.10095595.</unstructured_citation></citation><citation key="ref68"><unstructured_citation>
[68] Z. Wang et al., “Poisoning-assisted property inference attack against federated learning,” IEEE Trans. Dependable Secure Comput., 2023, doi: 10.1109/TDSC.2022.3196646.</unstructured_citation></citation><citation key="ref69"><unstructured_citation>
[69] G. Yan et al., “DeFL: Defending against model poisoning attacks in federated learning via critical learning periods awareness,” in Proc. AAAI Conf. Artif. Intell., 2023, doi: 10.1609/aaai.v37i9.26271.</unstructured_citation></citation><citation key="ref70"><unstructured_citation>
[70] P. R. Ovi et al., “Confident federated learning to tackle label-flipped data poisoning attacks,” Proc. SPIE, 2023, doi: 10.1117/12.2663911.</unstructured_citation></citation><citation key="ref71"><unstructured_citation>
[71] L. Lavaur et al., “The evolution of federated learning-based intrusion detection and mitigation: A survey,” IEEE Trans. Netw. Serv. Manag., 2022, doi: 10.1109/TNSM.2022.3177512.</unstructured_citation></citation><citation key="ref72"><unstructured_citation>
[72] X. Wu et al., “Faster adaptive federated learning,” in Proc. AAAI Conf. Artif. Intell., vol. 37, no. 9, pp. 10379–10387, 2023.</unstructured_citation></citation><citation key="ref73"><unstructured_citation>
[73] J. Mills et al., “Accelerating federated learning with a global biased optimiser,” IEEE Trans. Comput., 2022.</unstructured_citation></citation><citation key="ref74"><unstructured_citation>
[74] Y. Rahulamathavan et al., “FheFL: Fully homomorphic encryption friendly privacy-preserving federated learning with Byzantine users,” arXiv preprint arXiv:2306.05112, 2023.</unstructured_citation></citation><citation key="ref75"><unstructured_citation>
[75] W. Mou et al., “A verifiable federated learning scheme based on secure multi-party computation,” in Lect. Notes Comput. Sci., 2021, doi: 10.1007/978-3-030-86130-8_16.</unstructured_citation></citation><citation key="ref76"><unstructured_citation>
[76] R. Subedi et al., “A client-server deep federated learning for cross-domain surgical image segmentation,” arXiv preprint arXiv:2306.08720, 2023.</unstructured_citation></citation><citation key="ref77"><unstructured_citation>
[77] W. Huang et al., “FedCKE: Cross-domain knowledge graph embedding in federated learning,” IEEE Trans. Big Data, 2022.</unstructured_citation></citation><citation key="ref78"><unstructured_citation>
[78] S. Liu and F. Xu, “Adaptive federated learning aggregation strategies based on mobile edge computing,” in Proc. ICMLCA, vol. 12636, pp. 65–73, SPIE, 2023.</unstructured_citation></citation><citation key="ref79"><unstructured_citation>
[79] A. Selamnia et al., “Edge computing-enabled intrusion detection for C-V2X networks using federated learning,” in Proc. IEEE GLOBECOM, 2022, pp. 2080–2085.</unstructured_citation></citation><citation key="ref80"><unstructured_citation>
[80] R. Yu and P. Li, “Toward resource-efficient federated learning in mobile edge computing,” IEEE Netw., vol. 35, pp. 148–155, 2021.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Adaptive PID and Fuzzy Logic Control for Yaw Attitude in LEO Satellites </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Stanley E</given_name><surname>Ajagba</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Udora N</given_name><surname>Nwawelu </surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Bonaventure O</given_name><surname>Ekengwu</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Nnaemeka C</given_name><surname>Asiegbu</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Dumtochukwu O</given_name><surname>Oyeka</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Maryrose M</given_name><surname>Ogbuka</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>3</day><year>2026</year></publication_date><pages><first_page>266</first_page><last_page>277</last_page></pages><doi_data><doi>10.66224/jist.48337.13.52.266</doi><resource>http://jist.ir/en/Article/48337</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/48337</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/48337</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/48337</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/48337</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/48337</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/48337</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/48337</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	C. C. Mbaocha, C. U. Eze, I. A. Ezenugu, and J. Onwumere, "Satellite Model for Yaw-axis Determination and Control using PID Compensator," International Journal of Scientific &amp; Engineering Research, Vol. 7, No. 7, 2016, pp. 1623-1629.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Shan, L. Xia, and S. Li, "Design and Simulation of Satellite Attitude Control Algorithm Based on PID," Journal of Physics: Conference Series, Vol. 2355, No. 012035, 2022. pp. 1-9.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Travis, "Introduction to Satellite Attitude Control," In Advances in Spacecraft Attitude Control, IntechOpen. 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. C. Eze, and I. A. Ezenugu, "Microsatellite Yaw-axis Attitude Control System using Model Reference Adaptive Control Based PID Controller, "International Journal of Electrical and Control Engineering Research, Vol. 4, No. 2, 2024, pp. 8-16.
[5]	A. T. Ajiboye, J. O. Popoola, O. Oniyide, and S. L. Ayinia, "PID Controller for Microsatellite Yaw-axis Attitude Control System Using ITAE Method," TELKOMNIKA Telecommunication, Computing, Electronics and Control, Vol. 18, No. 2, 2020, pp. 1001 – 1011.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[6]	P. C. Eze, B. O. Ekengwu, N. C. Asiegbu, and T. I. Ozue, "Adjustable Gain Enhanced Fuzzy Logic Controller for Optimal Wheel Slip Ratio Tracking in Hard Braking Control System," Advances in Electrical and Electronic Engineering, Vol. 19, No. 3, 2021, pp. 231 – 242.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[7]	P. C. Eze, A. E. Jonathan, B. C. Agwah, and E. A. Okoronkwo, "Improving the Performance Response of Mobile Satellite Dish Antenna Network within Nigeria," Journal of Electrical Engineering, Electronics, Control and Computer Science, Vol. 6, No. 21, 2020, pp. 25-30.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[8]	B. C. Agwah, and P. C. Eze, "An Intelligent Controller Augmented with Variable Zero Lag Compensation for Antilock Braking System," International Journal of Mechanical and Mechatronics Engineering, Vol. 6, No. 11, 2022, pp. 303-210.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[9]	P. C. Eze, J. K. Obichere, E. S. Mbonu, and O. J. Ononjo, "Positioning Control of Satellite Antenna for High Speed Response Performance," IPTEK, The Journal of Engineering, Vol. 10, No. 2, 2024, pp. 119-136.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10]	K. M. Portella, W. N. Schinestzki, R. M. Sehnem, L. B. da Luz, L. Q. Mantovani, R. R. Sacco, S. S. Kraemer, and P. Paglione, "Satellite Attitude Control Using Control Moment Gyroscopes," Journal of Aerospace Technology and Management, São José dos Campos, Vol. 12, 2020, pp. 94-105.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	A. Bello, K. S. Olfe, J. Rodríguez, J. M. Ezquerro, and V. Lapuerta, "Experimental Verification and Comparison of Fuzzy and PID Controllers for Attitude Control of Nanosatellites," Advances in Space Research, Vol. 71, 2023, pp. 3613-3630.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	J. Narkiewicz, M. Sochacki, and B. Zakrzewski, "Generic model of a satellite attitude control system. International Journal of Aerospace Engineering," Vol. 2020, pp. 1-17.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13] 	L. Jin, and Y. Li, "Model Predictive Control-based Attitude Control of Under Actuated spacecraft Using Solar Radiation Pressure," Aerospace, Vol. 9, 2022, pp. 1-20.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	Y. Qi, H. Jing, and X. Wu, "Variable structure PID Controller for Satellite Attitude Control Considering Actuator Failure," Applied Sciences, Vol. 12, 2022, pp. 1-19.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	E. U. Enejor, F. M. Dahunsi, K. F. Akingbade, and I. O. Nelson, "Low Earth Orbit Satellite Attitude Stabilization Using Linear Quadratic Regulator," European Journal of Electrical and Computer Science, Vol. 7, No. 3, 2023, pp. 17 – 29.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	Á. del Castañedo, D. Calvo, Á. Bello, and M. V. Lapuerta, "Optimization of Fuzzy Attitude Control for Nanosatellites," In: K. Arai, S. Kapoor, R. Bhatia (eds) Intelligent Systems and Applications. InelliSys 2018. Advances in Intelligent Systems and Computing, Vol 869. Springer, Cham.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17] 	P. C. Eze, C. A. Ugo, and D. S. Inaibo, "Positioning Control of DC Servomotor-based Antenna using PID Tuned Compensator," Journal of Engineering Sciences, Vol. 8, No. 1, 2021, pp. E9-E16. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	I. O. Akwukwaegbu, O. C. Nosiri, M. Olubiwe, C. F. Paulinus-Nwammuo, and E. Okonkwo, "Design of Model Following Control Integrating PID Controller for DC Servomotor-based Antenna Positioning System," SSRG International Journal of Electrical and Electronics Engineering, Vol. 10, No. 6, 2023, pp. 33-42.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	P. C. Eze, D. O. Njoku, O. C. Nwokonkwo, C. G. Onukwugha, J. N. Odii, and J. E. Jibiri, "Wheel Slip Equilibrium Point Model Reference Adaptive Control Based PID Controller for Antilock Braking System: A New Approach," International Journal of automotive and mechanical Engineering, Vol. 21, No 3, 2024, pp. 11581-11595.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20] 	P. C. Eze, C. A. Ugoh, C. P. Ezeabasili, B. O. Ekengwu, and L. E. Aghoghovbia, "Servor Position Control in Hard Disk Drive of a Computer Using MRAC Integrating PID Algorithm," American Journal of Science, Engineering and Technology, Vol. 2, No. 4, 2017, pp. 97-105.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	A. Daiifarshchi, and S. Bargandan, “Design of a Model Reference Adaptive Controller Using Modified MIT Rule for a Second Order System,” Journal of Artificial Intelligence in Electrical Engineering, Vol. 7, No. 25, 2018, pp. 7-14.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	M. A. Fawwaz, K. Bingi, R. Ibrahim, P. A. M. Devan, and B. R. Prusty, "Design of PIDD Controller for Robust Performance of Process Plants," Algorithms, Vol. 16, 2023, pp. 437.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Automatic Concept Extraction from Persian News Text Based On Deep Learning</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>ZahraSadat</given_name><surname>Hosseini</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>SayedGholamHassan </given_name><surname>Tabatabaei</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>3</day><year>2026</year></publication_date><pages><first_page>278</first_page><last_page>288</last_page></pages><doi_data><doi>10.66224/jist.48902.13.52.278</doi><resource>http://jist.ir/en/Article/48902</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/48902</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/48902</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/48902</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/48902</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/48902</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/48902</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/48902</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. Jones and M. S. Staveley, "Phrasier: A system for interactive document retrieval using keyphrases", in Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1999, pp. 160-167.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Zhang, N. Zincir-Heywood, and E. Milios, "World wide web site summarization", Web intelligence and agent systems: an international journal, Vol. 2, No. 1, 2004, pp. 39-53.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	E. Papagiannopoulou and G. Tsoumakas, "A review of keyphrase extraction", Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, Vol. 10, No. 2, 2020, p. e1339.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Chen, X. Zhang, Y. Wu, Z. Yan, and Z. Li ", Keyphrase generation with correlation constraints," arXiv preprint arXiv:1808.07185, 2018.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	F. Boudin, Y. Gallina, and A. Aizawa, "Keyphrase generation for scientific document retrieval", arXiv preprint arXiv:2106.14726, 2021.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Mehrabi, S. A. Mirroshandel, and H. Ahmadifar, "DeepSumm: A Novel Deep Learning-Based Multi-Lingual Multi-Documents Summarization System", Journal of Information Systems and Telecommunication (JIST), 2019, p. 204.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	K. Barker and N. Cornacchia, "Using noun phrase heads to extract document keyphrases", in Advances in Artificial Intelligence: 13th Biennial Conference of the Canadian Society for Computational Studies of Intelligence, 2000, pp. 40-52.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	I. H. Witten, G. W. Paynter, E. Frank, C. Gutwin, and C. G. Nevill-Manning, "KEA: Practical automatic keyphrase extraction",  in Proceedings of the fourth ACM conference on Digital libraries, 1999, pp. 254-255.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. N. Kim and M.-Y. Kan, "Re-examining automatic keyphrase extraction approaches in scientific articles", in Proceedings of the Workshop on Multiword Expressions: Identification, Interpretation, Disambiguation and Applications (MWE), 2009, pp. 9-16.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	C. Zhang, "Automatic keyword extraction from documents using conditional random fields", Journal of Computational Information Systems, 2008, vol. 4, no. 3, pp. 1169-1180.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Barla and M. Bieliková, "From ambiguous words to key-concept extraction", in 24th International Workshop on Database and Expert Systems Applications, 2013, pp. 63-67: IEEE.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	S. M. H. Khozani and H. Bayat, "Specialization of keyword extraction approach to persian texts", in International Conference of Soft Computing and Pattern Recognition (SoCPaR), 2011, pp. 112-116.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. R. El-Beltagy and A. Rafea, "KP-Miner: A keyphrase extraction system for English and Arabic documents", Information systems, 2009, Vol. 34, No. 1, pp. 132-144.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. Rose, D. Engel, N. Cramer, and W. Cowley, "Automatic keyword extraction from individual documents", in Text Mining: Applications and Theory, 2010, pp. 1-20.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	R. Campos et al., "Yake! collection-independent automatic keyword extractor", in Advances in Information Retrieval: 40th European Conference on IR Research, ECIR 2018, Vol. 40, 2018, pp. 806-810.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	R. Mihalcea and P. Tarau, "Textrank: Bringing order into text", in Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing, 2004, pp. 404-411.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	X. Wan, and J. Xiao, "Single document keyphrase extraction using neighborhood knowledge", in Proceedings of the 23rd AAAI Conference on Artificial Intelligence, Vol. 8, 2008, pp. 855-860. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. Bougouin, F. Boudin, and B. Daille, "Topicrank: Graph-based topic ranking for keyphrase extraction", in Proceedings of the International Joint Conference on Natural Language Processing (IJCNLP), 2013, pp. 543-551.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	T. Tomokiyo and M. Hurst, "A language model approach to keyphrase extraction", in Proceedings of the ACL 2003 workshop on Multiword expressions: analysis, acquisition and treatment, 2003, pp. 33-40.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Z. Liu, X. Chen, Y. Zheng, and M. Sun, "Automatic keyphrase extraction by bridging vocabulary gap", in Proceedings of the Fifteenth Conference on Computational Natural Language Learning, 2011, pp. 135-144.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	E. Doostmohammadi, M. H. Bokaei, and H. Sameti, "Perkey: A persian news corpus for keyphrase extraction and generation", in 2018 9th International Symposium on Telecommunications (IST), 2018, pp. 460-465.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	I. Hsu, G. Xiao, N. Premkumar, and P. Nanyun", Discourse-level relation extraction via graph pooling", arXiv preprint arXiv:2101.00124 ,2021.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	E. Oro, R. Massimo, and S. Domenico, "Ontology-based information extraction from pdf documents with xonto", International Journal on Artificial Intelligence Tools, Vol. 18, No. 05, 2009, pp. 673-695.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. Gayathri, and R. J. Kannan, "Ontology based concept extraction and classification of ayurvedic documents", Procedia Computer Science, Vol. 172, 2020, pp. 511-516.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	X. Yuan, T. Wang, R. Meng, K. Thaker, P. Brusilovsky, D. He, A. Trischler, "One size does not fit all: Generating and evaluating variable number of keyphrases", arXiv preprint arXiv:1810.05241, 2018.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	A. Swaminathan, R. K. Gupta, H. Zhang, D. Mahata, R. Gosangi, and R. R. Shah, "Keyphrase generation for scientific articles using gans (student abstract) ", in Proceedings of the AAAI Conference on Artificial Intelligence, 2020, Vol. 34, No. 10, pp. 13931-13932.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Z. Sun, J. Tang, P. Du, Z.-H. Deng, and J.-Y. Nie, "Divgraphpointer: A graph pointer network for extracting diverse keyphrases", in Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2019, pp. 755-764.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	R. Meng, S. Zhao, S. Han, D. He, P. Brusilovsky, and Y. Chi, "Deep keyphrase generation", arXiv preprint arXiv:1704.06879, 2017.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	Y. Zhang and W. Xiao, "Keyphrase generation based on deep seq2seq model", IEEE access, Vol. 6, 2018, pp. 46047-46057.</unstructured_citation></citation><citation key="ref30"><unstructured_citation> 
[30]	W. Chen, H. P. Chan, P. Li, L. Bing, and I. King, "An integrated approach for keyphrase generation via exploring the power of retrieval and extraction", arXiv preprint arXiv:1904.03454, 2019.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	E. Doostmohammadi, M. H. Bokaei, and H. Sameti, "Persian keyphrase generation using sequence-to-sequence models", in 2019 27th Iranian Conference on Electrical Engineering (ICEE), 2019, pp. 2010-2015.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	A. Glazkova, and D. Morozov, "Exploring Fine-tuned Generative Models for Keyphrase Selection: A Case Study for Russian", arXiv preprint arXiv:2409.10640, 2024.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	A. Glazkova, D. Morozov, and T. Garipov, "Key Algorithms for Keyphrase Generation: Instruction-Based LLMs for Russian Scientific Keyphrases", arXiv preprint arXiv:2410.18040, 2024.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	E. Thomas, and S. Vajjala, "Improving Absent Keyphrase Generation with Diversity Heads", in Findings of the Association for Computational Linguistics: NAACL 2024, 2024, pp. 1568-1584.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	M. Song, Y. Feng,  and L. Jing, "A Preliminary Empirical Study on Prompt-based Unsupervised Keyphrase Extraction", arXiv preprint arXiv:2405.16571, 2024.</unstructured_citation></citation><citation key="ref36"><unstructured_citation> 
[36]	L. Shen,  and X. Le, "An enhanced method on transformer-based model for one2seq keyphrase generation", Electronics, Vol. 12, No. 13, 2023, p. 2968.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
 [37]N. S. Shirwandkar and S. Kulkarni, "Extractive text summarization using deep learning", in 2018 fourth international conference on computing communication control and automation (ICCUBEA), 2018, pp. 1-5.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	M. E. Khademi, M. Fakhredanesh, and S. M. Hoseini, "Farsi conceptual text summarizer: a new model in continuous vector space", Journal of Information Systems and Telecommunication (JIST), Vol. 1, No. 25, 2019, p. 23.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	M. Afsharizadeh, H. Ebrahimpour-Komleh, A. Bagheri, and G. Chrupała, "A Survey on Multi-document Summarization and Domain-Oriented Approaches", Journal of Information Systems and Telecommunication (JIST), Vol. 1, No. 37, 2022, p. 68.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	M. Allahyari, S. Pouriyeh, M. Assefi, S. Safaei, E.D. Trippe, J.B. Gutierrez, and K. Kochut, "Text summarization techniques: a brief survey", arXiv preprint arXiv:1707.02268, 2017.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	S. Gupta, and S. K. Gupta, "Abstractive summarization: An overview of the state of the art", Expert Systems with Applications, Vol. 121, 2019, pp. 49-65.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	T. Zhang, V. Kishore, F. Wu, K. Q. Weinberger, and Y. Artzi, "Bertscore: Evaluating text generation with bert", arXiv preprint arXiv:1904.09675, 2019.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	J. Zhang, Y. Zhao, M. Saleh, and P. Liu, "Pegasus: Pre-training with extracted gap-sentences for abstractive summarization", in International Conference on Machine Learning, 2020, pp. 11328-11339: PMLR.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	L. Shen, and X. Le, "An enhanced method on transformer-based model for one2seq keyphrase generation", Electronics, Vol. 12, No. 13 , 2023, p. 2968.</unstructured_citation></citation><citation key="ref45"><unstructured_citation> 
[45]	N. Datta, "Extractive Text Summarization of Clinical Text Using Deep Learning Models", in 2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE), 2024, pp. 1-6. </unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46] F. Liu, C. Xiong, " A Generative Text Summarization Method Based on mT5 and Large Language Models", in 2023 Eleventh International Conference on Advanced Cloud and Big Data (CBD), 2023,  pp. 174-179.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	J. Devlin, M.-W. Chang, K. Lee, and K. Toutanova, "Bert: Pre-training of deep bidirectional transformers for language understanding", arXiv preprint arXiv:1810.04805, 2018.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	M. Farahani, M. Gharachorloo, M. Farahani, and M. Manthouri, "Parsbert: Transformer-based model for persian language understanding", Neural Processing Letters, Vol. 53, 2021, pp. 3831-3847.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	K. Cho, B. v. Merrienboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, and Y. Bengio, "Learning phrase representations using RNN encoder-decoder for statistical machine translation", arXiv preprint arXiv:1406.1078, 2014.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50]	A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. Gomez, Ł. Kaiser, and I. Polosukhin, "Attention is all you need. Advances in neural information processing systems", Advances in neural information processing systems, Vol. 30, 2017.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51]	D. Wang, C. Hansen, L.C. Lima, C. Hansen, M. Maistro, J.G. Simonsen, and C. Lioma, "Multi-Head Self-Attention with Role-Guided Masks", in Advances in Information Retrieval: 43rd European Conference on IR Research, ECIR 2021, Virtual Event, March 28–April 1, 2021, Proceedings, Part II 43,2021, pp. 432-439.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52]	T. Xiao, Y. Li, J. Zhu, Z. Yu, and T. Liu, "Sharing attention weights for fast transformer", arXiv preprint arXiv:1906.11024, 2019.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53]	S. Yildirim and M. Asgari-Chenaghlu, "Mastering Transformers: Build state-of-the-art models from scratch with advanced natural language processing techniques", Packt Publishing Ltd, 2021.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[54]	C. Raffel, N. Shazeer, A. Roberts, K. Lee, S. Narang, M. Matena, Y. Zhou, W. Li, and P.J. Liu, "Exploring the limits of transfer learning with a unified text-to-text transformer", The Journal of Machine Learning Research, Vol. 21, No. 1, 2020, pp. 5485-5551.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[55]	L. Xue, "mT5: A massively multilingual pre-trained text-to-text transformer", arXiv preprint arXiv:2010.11934, 2020.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Comprehensive Framework for Enhancing Intrusion Detection Systems through Advanced Analytical Techniques</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Chetan</given_name><surname>Gupta</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Amit</given_name><surname>Kumar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Neelesh Kumar</given_name><surname>Jain</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>3</day><year>2026</year></publication_date><pages><first_page>289</first_page><last_page>299</last_page></pages><doi_data><doi>10.66224/jist.49054.13.52.289</doi><resource>http://jist.ir/en/Article/49054</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/49054</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/49054</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/49054</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/49054</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/49054</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/49054</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/49054</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Louati, F., Ktata, F.B. et al. “Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks”. – In:  Cluster Computing, March 2024, Volume 27, pages 6823–6841. https://doi.org/10.1007/s10586-024-04306-9.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Gupta, C., Kumar, A. &amp; Jain, N.K. An Enhanced Hybrid Intrusion Detection Based on Crow Search Analysis Optimizations and Artificial Neural Network. Wireless Pers. Commun. 134, 43–68 (2024). https://doi.org/10.1007/s11277-024-10880-3.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Gupta, N., Jindal, V. et al. “A Survey on Intrusion Detection and Prevention Systems”. – In:  SN Computer Science. SCI. June 2023, Volume 4, article number 439. https://doi.org/10.1007/s42979-023-01926-7.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Gupta, C., Kumar, A. &amp; Jain, N.K. Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security. Peer-to-Peer Netw. Appl. 18, 98 (2025). https://doi.org/10.1007/s12083-025-01911-2.</unstructured_citation></citation><citation key="ref5"><unstructured_citation> 
[5]	AL-Syouf, R., Bani-Hani, R. &amp; AL-Jarrah, O.Y. “Machine learning approaches to intrusion detection in unmanned aerial vehicles (UAVs). – In:  Neural Computing &amp; Application”, August 2024 Volume 36, pages 18009–18041. https://doi.org/10.1007/s00521-024-10306-y.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Kumar, V., Kumar, V., Singh, N. et al. “P3IDF-EC: PCA-Based Privacy-Preserving Intrusion Detection Framework for Edge Computing”. – In:   SN COMPUT. SCI. August 2024. Volume 5. https://doi.org/10.1007/s42979-024-03152-1.</unstructured_citation></citation><citation key="ref7"><unstructured_citation> 
[7]	Behiry, M.H., Aly, M. “Cyberattack detection in wireless sensor networks using a hybrid feature reduction technique with AI and machine learning methods”. – In:   J Big Data, January 2024, volume 11. https://doi.org/10.1186/s40537-023-00870-w. </unstructured_citation></citation><citation key="ref8"><unstructured_citation> 
[8]	Altamimi, S., Abu Al-Haija, Q. “Maximizing intrusion detection efficiency for IoT networks using extreme learning machine”. – In: Discover Internet Things, July 2024, volume 4. https://doi.org/10.1007/s43926-024-00060-x. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Gupta, C., Kumar, A. &amp; Jain, N.K. Intelligent intrusion detection system based on crowd search optimization for attack classification in network security. EURASIP J. on Info. Security 2025, 22 (2025). https://doi.org/10.1186/s13635-025-00205-7.  </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Ajmal, S., Ashfaq, R.A.R., Raza, A. et al. “IDS-FRNN: an intrusion detection system with optimized fuzziness-based sample selection technique”. – In: Neural Computing &amp; Applications. September 2024. https://doi.org/10.1007/s00521-024-10333-9. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Patthi, S., Singh, S. et al. “2-layer classification model with correlated common feature selection for intrusion detection system in networks”. – In: Multimedia Tools and Applications January 2024 Volume 83, pages 61213–61238.  https://doi.org/10.1007/s11042-023-17781-w. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Al-Haija Qasem A, Saleh E et al. “Detecting port scan attacks using logistic regression”. – In: 4th International symposium on advanced electrical and communication technologies (ISAECT), pages 1–5. IEEE. https://doi.org/10.1109/ISAECT53699.2021.9668562.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>  
[13]	Zaben, S.O. “IDC-insight: boosting intrusion detection accuracy in IoT networks with Naïve Bayes and multiple classifiers”. – In:  International Journal of Information Technology June 2024. https://doi.org/10.1007/s41870-024-02026-2.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>  
[14]	Al-Haija Qasem A, McCurry Charles D, et al. “Intelligent self-reliant cyber-attacks detection and classification system for IOT communication using deep convolutional neural network”. – In: 12th international networking conference: INC 2020 12, pages 100–116. Springer. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Saurabh, K., Sharma, V., Singh, U. et al. “HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IoT”. – In: Arabian Journal for Science and Engineering, July 2024. https://doi.org/10.1007/s13369-024-08935-5. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Gupta, C., Kumar, A., Jain, N.K. (2023). A Detailed Analysis on Intrusion Detection Systems, Datasets, and Challenges. “Advances in Data Science and Computing Technologies”. Lecture Notes in Electrical Engineering, vol 1056. Springer, Singapore. https://doi.org/10.1007/978-981-99-3656-4_26.</unstructured_citation></citation><citation key="ref17"><unstructured_citation> 
[17]	Roshan, K. et al. Ensemble adaptive online machine learning in data stream: a case study in cyber intrusion detection system. – In: International Journal of Information Technology, February 2024. https://doi.org/10.1007/s41870-024-01727-y.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Najafli, S., Toroghi Haghighat, A. et al. “A novel reinforcement learning-based hybrid intrusion detection system on fog-to-cloud computing”. – In: The Journal of Supercomputing, August 2024, Volume 80, pages 26088–26110. https://doi.org/10.1007/s11227-024-06417-x.</unstructured_citation></citation><citation key="ref19"><unstructured_citation> 
[19]	Wang, K., Li, J. &amp; Wu, W. “A novel transfer extreme learning machine from multiple sources for intrusion detection”. – In: Peer-to-Peer Networking and Applications. October 2024, Volume 17, pages 33–47.  https://doi.org/10.1007/s12083-023-01569-8.</unstructured_citation></citation><citation key="ref20"><unstructured_citation> 
[20]	Ngo, VD. Vuong, TC, Van Luong, T. et al. “Machine learning-based intrusion detection feature selection versus feature extraction”. – In:  Cluster Computing, July 2024, Volume 27, pages 2365–2379. https://doi.org/10.1007/s10586-023-04089-5.</unstructured_citation></citation><citation key="ref21"><unstructured_citation> 
[21]	Mustafa, Z., Amin, R., Aldabbas, H. et al. “Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques”. – In:  Cluster Computing, April 2024Volume 27, pages 9635–9661. https://doi.org/10.1007/s10586-024-04430-6.</unstructured_citation></citation><citation key="ref22"><unstructured_citation> 
[22]	Madhuri, S., Lakshmi, S.V. “A machine learning-based normalized fuzzy subset linked model in networks for intrusion detection”. – In: Soft Computing. May 2023. https://doi.org/10.1007/s00500-023-08160-6. </unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Dubey, S., Gupta, C. (2024). An Effective Model for Binary and Multi-classification Based on RFE and XGBoost Methods. “Intrusion Detection System. Cyber Security and Digital Forensics”. Lecture Notes in Networks and Systems, vol. 896. Springer. https://doi.org/10.1007/978-981-99-9811-1_3. </unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Liu, Y., Zhang, K. &amp; Wang, Z. “Intrusion detection of manifold regularized broad learning system based on LU decomposition”. – In: The Journal of Supercomputing, June 2023 Volume 79, pages 20600–20648. https://doi.org/10.1007/s11227-023-05403-z.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Gupta, C., Kumar, A., Jain, N.K. (2025). Optimization Accuracy of Intrusion Detection System Based on Multilayered Neural Network. “Business Intelligence, Computational Mathematics, and Data Analytics. IBCD”. Communications in Computer and Information Science, vol 2413. Springer, Cham. https://doi.org/10.1007/978-3-031-87511-3_14. </unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Wang, X., Dai, L. &amp; Yang, G. “A network intrusion detection system based on deep learning in the IoT”. – In: The Journal of Supercomputing July 2024, Volume 80, pages 24520–24558. https://doi.org/10.1007/s11227-024-06345-w.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>  
[27]	Merzouk, M.A., Neal, C., Delas, J. et al. “Adversarial robustness of deep reinforcement learning-based intrusion detection”. – In: International Journal of Information Security August 2024 Volume 23, pages 3625–3651. https://doi.org/10.1007/s10207-024-00903-2. </unstructured_citation></citation><citation key="ref28"><unstructured_citation> 
[28]	Maseno, Jain, T., Gupta, C. (2022). Multi-Agent Intrusion Detection System Using Sparse PSO K-Mean Clustering and Deep Learning. “International Conference on Artificial Intelligence: Advances and Applications. Algorithms for Intelligent Systems”. Springer, Singapore. https://doi.org/10.1007/978-981-16-6332-1_10.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>  
[29]	Bhattacharya, S., S, S. R. K., Maddikunta, P. K. R., Kaluri, R., Singh, S., Gadekallu, T. R., Alazab, M., &amp; Tariq, U. (2020). A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU. Electronics, 9(2), 219. https://doi.org/10.3390/electronics9020219. </unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	Amaouche, S., AzidineGuezzaz, Benkirane, S. et al. IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety. Cluster Comput 27, 3521–3535 (2024). https://doi.org/10.1007/s10586-023-04157-w. </unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	Amaouche, S., AzidineGuezzaz, Benkirane, S. et al. IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety. Cluster Comput 27, 3521–3535 (2024). https://doi.org/10.1007/s10586-023-04157-w.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>   
[32]	Pourahmad, Zahra, Hooshmand, R.,Madani,S. Mohammad. (2024). “Strengthening of Power Grid Protection Systems Against Cyber-Attacks: A Comprehensive Review” Iranian Journal of Electrical and Computer Engineering.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	Abolfazl Sajadi,Bijan Alizadeh, (2024). “SQ-PUF: A Resistant PUF-Based Authentication Protocol against Machine-Learning Attack” Iranian Journal of Electrical and Computer Engineering.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	Boshra Pishgoo, Ahmad akbari azirani. (2022). “Improving IoT Botnet Anomaly Detection Based on Dynamic Feature Selection and Hybrid Processing”, Iranian Journal of Electrical and Computer Engineering, B- Computer Engineering, Issue 2.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Compilation of Avatar Development Roadmap in Iranian Banking with the Life Cycle Approach of System Development and Human-Computer Interaction</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Amir Bahador</given_name><surname>Morovat</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Farhad</given_name><surname>Nazari zadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ahmad</given_name><surname>Haghiri Dehbarez</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>3</day><year>2026</year></publication_date><pages><first_page>300</first_page><last_page>315</last_page></pages><doi_data><doi>10.66224/jist.49601.13.52.300</doi><resource>http://jist.ir/en/Article/49601</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/49601</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/49601</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/49601</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/49601</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/49601</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/49601</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/49601</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] De Brito Silva, M. J., &amp; De Oliveira Campos, P. (2024). Past, present, and future of avatar marketing: A systematic literature review and future research agenda. Computers in Human Behavior: Artificial Humans, 2(1), 100045. https://doi.org/10.1016/j.chbah.2024.100045.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] Oh, H. J., Kim, J., Chang, J. J., Park, N., &amp; Lee, S. (2023). Social benefits of living in the metaverse: The relationships among social presence, supportive interaction, social self-efficacy, and feelings of loneliness. Computers in Human Behavior, 139, 107498. https://doi.org/10.1016/j.chb.2022.107498.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] Mystakidis, S. (2022). Metaverse. Encyclopedia, 2(1), 486–497. https://doi.org/10.3390/encyclopedia2010031.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] Madhavi, M. K., Subramanian, M., &amp; Shenbagavalli, R. (2020). Blockchain technology: The new avatar in the world of banking and finance. International Journal of Advanced Research in Engineering and Technology, 11(12), 964–968. https://doi.org/10.34218/IJARET.11.12.2020.096.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] Sinfield, V., Ajmani, A., &amp; McShane, W. (2024). Strategic roadmapping to accelerate and risk-mitigate enabling innovations: A generalizable method and a case illustration for marine renewable energy. Technological Forecasting and Social Change, 201, 123761. https://doi.org/10.1016/j.techfore.2024.123761.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] Issa, T., &amp; Isaias, P. (2015). Usability and human computer interaction (HCI). In Sustainable design: HCI, usability and environmental concerns (pp. 19–36). Springer. https://doi.org/10.1007/978-1-4471-6753-2_2.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] Barta, S., Ibáñez-Sánchez, S., Orús, C., &amp; Flavián, C. (2024). Avatar creation in the metaverse: A focus on event expectations. Computers in Human Behavior, 156, 108192. https://doi.org/10.1016/j.chb.2024.108192.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] Garcia, M. L. (1997). Introduction to technology roadmapping: The semiconductor industry’s technology roadmapping process. USDOE Office of Financial Management and Controller.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] Sadeghi, M. T., Sobhani, F. M., &amp; Ghatari, A. R. (2018). Representing a model to measure absorbency of information technology in small and medium-sized enterprises. Journal of Information Systems and Telecommunication (JIST), 20(5), 242–251.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Shneiderman, B., Cohen, M., Jacobs, S., Plaisant, C., Diakopoulos, N., &amp; Elmqvist, N. (2017). Designing the user interface (6th ed.). Pearson International. https://elibrary.pearson.de/book/99.150005/9781292153926.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] Hu, B. (2024). Developing an avatar-based framework for unified client identification in banking systems using generative AI and graph neural networks. Innovation in Science and Technology, 3(4), 1–34. https://doi.org/10.56397/IST.2024.07.01.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] Oyetunji, D. J. (Unpublished). The role of artificial intelligence and machine learning in enhancing customer experience in Nigeria digital banks.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] Szolin, K., Kuss, D., Nuyens, F., &amp; Griffiths, M. (2022). Gaming disorder: A systematic review exploring the user-avatar relationship in videogames. Computers in Human Behavior, 128, 107124. https://doi.org/10.1016/j.chb.2021.107124.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] Miao, F., Kozlenkova, I. V., Wang, H., Xie, T., &amp; Palmatier, R. W. (2022). An emerging theory of avatar marketing. Journal of Marketing, 86(1), 67–90. https://doi.org/10.1177/0022242921996646.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] Sousa, K. S., &amp; Furtado, E. (Unpublished). RUPi – A unified process that integrates.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] Aguirre-Rodriguez, A., Bóveda-Lambie, A. M., &amp; Miniard, P. W. (2015). The impact of consumer avatars in internet retailing on self-congruity with brands. Marketing Letters, 26(4), 631–641. https://doi.org/10.1007/s11002-014-9296-z.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] Gammoh, F., Jiménez, F. R., &amp; Wergin, R. (2018). Consumer attitudes toward human-like avatars in advertisements: The effect of category knowledge and imagery. International Journal of Electronic Commerce, 22(3), 325–348. https://doi.org/10.1080/10864415.2018.1462939.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] Kerr, C., &amp; Phaal, R. (2022). Roadmapping and roadmaps: Definition and underpinning concepts. IEEE Transactions on Engineering Management, 69(1), 6–16. https://doi.org/10.1109/TEM.2021.3096012.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] Procter, L. (2021). I am/we are: Exploring the online self-avatar relationship. Journal of Communication Inquiry, 45(1), 45–64. https://doi.org/10.1177/0196859920961041.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] Xie, L., &amp; Lei, S. (2022). The nonlinear effect of service robot anthropomorphism on customers’ usage intention: A privacy calculus perspective. International Journal of Hospitality Management, 107, 103312. https://doi.org/10.1016/j.ijhm.2022.103312.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] Wang, X., Butt, A. H., Zhang, Q., Shafique, N., &amp; Ahmad, H. (2021). “Celebrity avatar” feasting on in-game items: A gamers’ play arena. SAGE Open, 11(2), 215824402110157. https://doi.org/10.1177/21582440211015716.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] Foster, K., McLelland, M. A., &amp; Wallace, L. K. (2022). Brand avatars: Impact of social interaction on consumer-brand relationships. Journal of Research in Industrial Medicine, 16(2), 237–258. https://doi.org/10.1108/JRIM-01-2020-0007.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] Triantoro, T., Gopal, R., Benbunan-Fich, R., &amp; Lang, G. (2020). Personality and games: Enhancing online surveys through gamification. Information Technology &amp; Management, 21(3), 169–178. https://doi.org/10.1007/s10799-020-00314-4.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24] Gonzales-Chavez, M. A., &amp; Vila-Lopez, N. (2021). Designing the best avatar to reach millennials: Gender differences in a restaurant choice. Industrial Management &amp; Data Systems, 121(6), 1216–1236. https://doi.org/10.1108/IMDS-03-2020-0156.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25] Takano, M., &amp; Taka, F. (2022). Fancy avatar identification and behaviors in the virtual world: Preceding avatar customization and succeeding communication. Computers in Human Behavior Reports, 6, 100176. https://doi.org/10.1016/j.chbr.2022.100176.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26] Kramer, M. (2018). Best practices in systems development lifecycle: An analysis based on the waterfall model. Review of Business &amp; Finance Studies, 9(1), 77–84. https://ssrn.com/abstract=3131958.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27] Preece, J., Rogers, Y., Sharp, H., Benyon, D., Holland, S., &amp; Carey, T. (1994). Human-computer interaction. Addison-Wesley.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28] Li, Y., Dai, G., Chen, G., Liu, J., Li, P., &amp; Ip, H. H. (2025). Avatar-mediated communication in collaborative virtual environments: A study on users’ attention allocation and perception of social interactions. Computers in Human Behavior, 108598. https://doi.org/10.1016/j.chb.2025.108598.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29] Holzwarth, M., Janiszewski, C., &amp; Neumann, M. M. (2006). The influence of avatars on online consumer shopping behavior. Journal of Marketing, 70(4), 19–36. https://doi.org/10.1509/jmkg.70.4.019.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30] Rasouli, M. R. (2012). The role of media in institutionalizing the culture of electricity consumption management. Journal of Communication Culture Science Promotion, 2(5), 93–105. [In Persian].</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31] Kostoff, R. N., &amp; Schaller, R. R. (2001). Science and technology roadmaps. IEEE Transactions on Engineering Management, 48(2), 132–143. https://doi.org/10.1109/17.922473.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32] Hffer, J. A., George, J. F., &amp; Valacich, J. S. (2005). Modern systems analysis and design (4th ed.). Prentice Hall.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33] Hugues, O., Fuchs, P., &amp; Nannipieri, O. (2011). New augmented reality taxonomy: Technologies and features of augmented environment. In B. Furht (Ed.), Handbook of augmented reality (pp. 47–63). Springer. https://doi.org/10.1007/978-1-4614-0064-6_2.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34] Milgram, P., &amp; Kishino, F. (1994). A taxonomy of mixed reality visual displays. IEICE Transactions on Information and Systems, E77-D(12), 1321–1329.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35] Carey, J., Galletta, D., Kim, J., Te’eni, D., Wildermuth, B., &amp; Zhang, P. (2004). The role of HCI in IS curricula: A call to action. Communications of the AIS, 13(23), 357–379. https://doi.org/10.17705/1CAIS.01323.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36] Hewett, T., Baecker, R., Card, S., Carey, T., Gasen, J., Mantei, M., et al. (1992). ACM SIHCHI curricula for human-computer interaction. Association for Computing Machinery. https://doi.org/10.1145/2594128.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] Zhang, P., Benbasat, I., Carey, J., Davis, F., Galletta, D., &amp; Strong, D. (2002). Human-computer interaction research in the MIS discipline. Communications of the AIS, 9(20), 334–355. https://doi.org/10.17705/1CAIS.00920.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38] Wright, P., Blythe, M., &amp; McCarthy, J. (2006). User experience and the idea of design in HCI. In S. W. Gilroy &amp; M. D. Harrison (Eds.), Interactive systems. Design, specification, and verification. DSV-IS 2005. Lecture Notes in Computer Science (Vol. 3941, p. 1). Springer. https://doi.org/10.1007/11752707_1.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39] Lam, C.-M. (2025). Building ethical virtual classrooms: Confucian perspectives on avatars and VR. Computers &amp; Education: X Reality, 6, 100092. https://doi.org/10.1016/j.cexr.2024.100092.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40] Andrew, P. S., &amp; Palmer, J. D. (1990). Software systems engineering. John Wiley &amp; Sons.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41] Torabi, M. A., Hasangholipour Yasori, T., &amp; Zare, M. J. (2023). Conceptualization and theorizing avatar marketing in Iran. Journal of Business Management, 15(2), 185–216. https://doi.org/10.22059/jibm.2022.344989.4399.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42] Hosseini, M., &amp; Kiadehi, E. F. (2014). Internet banking, cloud computing: Opportunities, threats. Journal of Information Systems and Telecommunication (JIST), 6, 1–10. https://doi.org/10.7508/jist.2014.02.002.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43] Silva, M. J. B., Delfino, L. O. R., Cerqueira, K. A., &amp; Campos, P. O. (2022). Avatar marketing: A study on the engagement and authenticity of virtual influencers on Instagram. Social Network Analysis and Mining, 12(1), 130. https://doi.org/10.1007/s13278-022-00966-w.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44] Lin, Y.-T., Doong, H.-S., &amp; Eisingerich, A. B. (2021). Avatar design of virtual salespeople: Mitigation of recommendation conflicts. Journal of Service Research, 24(1), 141–159. https://doi.org/10.1177/1094670520964872.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45] Yan, J., Ma, T., &amp; Nakamori, Y. (2011). Exploring the triple helix of academia-industry-government for supporting roadmapping in academia. International Journal of Management and Decision Making, 11(3), 249–267. https://doi.org/10.1504/IJMDM.2011.040702.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46] McDowell, W., &amp; Eames, M. (2006). Forecasts, scenarios, vision, backcasts and roadmaps to the hydrogen economy: A review of the hydrogen futures literature. Energy Policy, 34(11), 1236–1250. https://doi.org/10.1016/j.enpol.2005.12.006.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47] Jones, L. E., Hancock, T., Kazandjian, B., &amp; Voorhees, C. M. (2022). Engaging the avatar: The effects of authenticity signals during chat-based service recoveries. Journal of Business Research, 144, 703–716. https://doi.org/10.1016/j.jbusres.2022.01.012.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48] Ghafarzadegan, M., &amp; Peymankhah, S. (2007). A comparative analysis of common approaches in roadmap development in technology management. In The 5th International Conference on Management, Tehran, 2007. https://civilica.com/doc/43510.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49] Carroll, J. M., &amp; Rosson, M. B. (2003). Design rationale as theory. In HCI models, theories, and frameworks: Toward a multidisciplinary science (pp. 431–461). Elsevier. https://doi.org/10.1016/B978-155860808-5/50015-0.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50] Ziaeipour, E., Ghotri, A. R., &amp; Taghizadeh, A. (2023). Software-defined networking adoption model: Dimensions and determinants. Journal of Information Systems and Telecommunication (JIST), 44, 368–382. https://doi.org/10.61186/jist.40088.11.44.368.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51] Paul, S., Mohanty, S., &amp; Sengupta, R. (2022). The role of social virtual world in increasing psychological resilience during the on-going COVID-19 pandemic. Computers in Human Behavior, 127, 107036. https://doi.org/10.1016/j.chb.2021.107036.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52] Hanus, M. D., &amp; Fox, J. (2015). Persuasive avatars: The effects of customizing a virtual salesperson’s appearance on brand liking and purchase intentions. International Journal of Human-Computer Studies, 84, 33–40. https://doi.org/10.1016/j.ijhcs.2015.07.004.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Fabric Defect Identification based on KNN and PCA Algorithms</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Zahra</given_name><surname>Nouri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Farahnaz</given_name><surname>Mohanna</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mina</given_name><surname>Boluki</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>3</day><year>2026</year></publication_date><pages><first_page>326</first_page><last_page>332</last_page></pages><doi_data><doi>10.66224/jist.49914.13.52.326</doi><resource>http://jist.ir/en/Article/49914</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/49914</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/49914</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/49914</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/49914</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/49914</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/49914</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/49914</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] 	S. Mei, Y. Wang, and G. Wen, “Automated Fabric Defect Detection with a Multi-Scale Convolutional De-Noising Auto-Encoder Network Model,” Sensors, Vol. 18, No. 4, 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] 	J. F. Jing, H. Ma, and H. H. Zhang, “Automatic fabric defect detection using a deep convolutional neural network,” Coloration Technology, Vol. 135, No. 3, 2019, pp. 213–223.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] P. Guo, Y. Lin, Y. Wu, R. Hugh Gang, and Y. Li, “Intelligent quality control of surface defects in fabrics: A comprehensive research progress,” IEEE Access, Vol. 12, 2024, pp. 63777-63808.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] W. Wei, D. Deng, L Zeng, and C. Zhang, “Real-time implementation of fabric defect detection based on variational automatic encoder with structure similarity,” Real-Time Image Processing, Vol. 18, No. 3, 2021, pp. 807-823. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] L. Shao, E. Zhang, Q. Ma, and M. Lie, “Pixel-wise semi-supervised fabric detection method combined with multitask mean teacher,” IEEE Transactions on Instrumentation and Measurement, Vol. 71, 2506011, 2022.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] D. Mo, W. K. Wong, Z. Lai, and J. Zhou, “Weighted double-low-rank decomposition with application to fabric defect detection,” IEEE Transactions on Automation Science and Engineering, Vol. 18, No.3, 2021, pp. 1170-1190.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] Y. Li,  H. Luo, M. Yu, G. Jiang, and H. Cong, “Fabric defect detection algorithm using RDPSO-based optimal Gabor filter,” The Journal of The Textile Institute, Vol. 110, No. 4, 2019, pp. 487–495.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] W. Wang, N. Deng, and B. Xin, “Sequential detection of image defects for patterned fabrics,” IEEE Access, Vol. 8, 2020, pp. 174751-174762.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] Q. Liu, C. Wang, Y. Li, M. Gao, and J. Li, “A fabric defect detection method based on deep learning,” IEEE Access, Vol. 10, 2022, pp. 4284-4296.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Z. Zhu, G. Han, G. Jia, and L. Shu, “Modified DenseNet for automatic fabric defect detection with edge computing for minimizing latency,” IEEE Internet of Things Journal, Vol. 7, No. 10, 2020, pp. 9623-9636.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] H. Xie, Y. Zhang, and Z. Wu, “Fabric defect detection method combing image pyramid and direction template,” IEEE Access, Vol. 7, 2019, pp. 182320-182334.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] M. M. Khodier, S. M. Ahmed, and M. Sharaf Sayed, “Complex pattern jacquard fabrics defect detection using convolutional neural networks and multispectral imaging,” IEEE Access, Vol. 10, 2022, pp. 10653-10660.
[13] l. Song, r. Li, and S. Chen, “Fabric defect detection based on membership degree of regions,” IEEE Access, Vol. 8, 2020, pp. 48752-48760.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14] Y. Huang, J. Jing, and Z. Wang, “Fabric defect segmentation method based on deep learning,” IEEE Transactions on Instrumentation and Measurement, Vol. 70, 2021.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15] X. Kang, and F. Zhang, “A universal and adaptive fabric defect detection algorithm based on sparse dictionary learning,” IEEE Access, Vol. 8, 2020, pp. 221808 - 221830.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16] H. Lv, H. Zhang, M. Wang, J. Xu, X. Li, and C. Liu, “Hyperspectral imaging based nonwoven fabric-defect-detection method using LL-YOLOv5,” IEEE Access, Vol. 12, 2024, pp. 41988-41998.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17] C. Zhang, Y. Qi, and Y. Wang, “ Learning the color space for effective fabric defect detection,” IEEE Transactions on Emerging Topics in Computational Intelligence,  Vol. 8, No. 1, 2024, pp. 981-991.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18] S. Tian, P. Huang, H. Ma, J. Wang, X. Zhou, S. Zhang, J. Zhou, R. Huang, and Y. Li, “CASDD: Automatic surface defect detection using a complementary adversarial network,” IEEE Sensors Journal, Vol.  22, No. 20, 2024, pp. 19583-19595.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19] X. Luo, Q. Ni, R. Tao, and Y. Shi, “A lightweight detector based on attention mechanism for fabric defect detection,” IEEE Access, Vol. 11, 2023, pp. 33554-33569.
[20] Z. Xiang, Y. Shen, M. Ma, and M. Qian, “HookNet: Efficient multiscale context aggregation for high-accuracy detection of fabric,” IEEE Transactions on Instrumentation and Measurement, Vol. 72, 2023.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[21] Y. Zhao, Q. Liu, H. Su, J. Zhang, H. Ma, W. Zou, and S. Liu, “Attention-based multiscale feature fusion for efficient surface defect detection,” IEEE Transactions on Instrumentation and Measurement, Vol. 73, 2024.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[22] H. Chugh, M. Garg, S. Gupta, and S. Sharma, “Plant leaf image identification with texture features using microstructure descriptor,” in the 10th International Conference on Reliability, Infocom Technologies, and Optimization (Trend and Future Decisions), 2022.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
      DOI:10.1109/ICRITO56286.2022.9965064
[23] Z. Xia, Y. Chen, and C. Xu, “Multiview PCA: a methodology of feature extraction and dimension reduction for high-order data,” IEEE Transaction on Cybernetics, Vol. 52, No. 10, 2022, pp. 11068-11080.</unstructured_citation></citation><citation key="ref22"><unstructured_citation> 
[24] F. Nie, Z. Li, R. Wang, and X. Li, “An effective and efficient algorithm for k-means clustering with new formulation,” IEEE Transactions on Knowledge and Data Engineering, Vol. 35, No. 4, 2023, pp. 3433-3443.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[25] B. Yang, Z. Jia, J. Yang, and N. K. Kasabov, “Video snow removal based on self-adaptation snow detection and patch-based Gaussian mixture model,” IEEE Access, Vol. 8, 2020, pp. 60188-160201.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[26] I. Misra, M. Kumar Rahil, S. Manthira Moorthi, and Debajyoti Dhar, “Direct feature extraction and image co-registration of morphological structure from Bayer pattern raw planetary images,” Expert Systems and Application, Vol. 238, 2024.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[27] M. Boluki, and F. Mohanna, “Inspection of textile fabrics based on the optimal Gabor filter,” Signal, Image, and Video Processing, Vol. 15, 2021, pp. 1617-1625.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Optimally DBS Placement In 6G Communication Networks Using Improved Gray Wolf Optimization Algorithm to Enhance Network Energy Efficiency</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Hussein</given_name><surname>Shakir Diwan Al-Khulaifawi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahdi</given_name><surname>Nangir</surname></person_name></contributors><publication_date media_type="online"><month>2</month><day>3</day><year>2026</year></publication_date><pages><first_page>316</first_page><last_page>325</last_page></pages><doi_data><doi>10.66224/jist.50264.13.52.316</doi><resource>http://jist.ir/en/Article/50264</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/50264</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/50264</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/50264</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/50264</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/50264</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/50264</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/50264</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] M. Fathi, “An Analysis of the Signal-to-Interference Ratio in UAV-based Telecommunication Networks,” Journal of Information Systems and Telecommunication (JIST), vol. 1, no. 45, pp. 49, 2024. </unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] S. H. Mostafavi-Amjad, V. Solouk, and H. Kalbkhani, “Energy-efficient user pairing and power allocation for granted uplink-NOMA in UAV communication systems,” Journal of Information Systems and Telecommunication (JIST), vol. 4, no. 40, pp. 312, 2022. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] W. Shafik, M. Ghasemzadeh, and S. M. Matinkhah, “A fast machine learning for 5G beam selection for unmanned aerial vehicle applications,” Journal of Information Systems and Telecommunication (JIST), vol. 4, no. 28, pp. 262, 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] L. Liu, A. Wang, G. Sun, and J. Li, “Multiobjective optimization for improving throughput and energy efficiency in UAV-enabled IoT,” IEEE Internet of Things Journal, vol. 9, no. 20, pp. 20763-20777, 2022.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] H. B. Salameh, A. E. Masadeh, and G. El Refae, “Intelligent drone-base-station placement for improved revenue in B5G/6G systems under uncertain fluctuated demands,” IEEE Access, vol. 10, pp. 106740-106749, 2022.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] Y. Luo and G. Fu, “UAV based device to device communication for 5G/6G networks using optimized deep learning models,” Wireless Networks, pp. 1-15, 2023.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] S. Khosroabadi and H. A. Alaboodi, “Innovative Drone Base Station Placement in 6G Networks: A Marine Predators Algorithm Approach,” Journal of AI and Data Mining, vol. 13, no. 2, pp. 175-182, 2025.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] V. Loganathan, S. Veerappan, P. Manoharan, and B. Derebew, “Optimizing Drone-Based IoT Base Stations in 6G Networks Using the Quasi-opposition-Based Lemurs Optimization Algorithm,” International Journal of Computational Intelligence Systems, vol. 17, no. 1, pp. 218, 2024.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] H. Alsolai et al., “Optimization of Drone Base Station Location for the Next-Generation Internet-of-Things Using a Pre-Trained Deep Learning Algorithm and NOMA,” Mathematics, vol. 11, no. 8, pp. 1947, 2023. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] M. Q. Alsudani et al., “Positioning Optimization of UAV (Drones) Base Station in Communication Networks,” Malaysian Journal of Fundamental and Applied Sciences, vol. 19, no. 3, pp. 429-439, 2023. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] X. Zhu et al., “Multi-objective Deployment Optimization of UAVs for Energy-Efficient Wireless Coverage,” IEEE Transactions on Communications, 2024. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] J. Carvajal-Rodríguez et al., “3D Placement Optimization in UAV-Enabled Communications: A Systematic Mapping Study,” IEEE Open Journal of Vehicular Technology, 2024. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] F. Pasandideh et al., “An improved particle swarm optimization algorithm for UAV base station placement,” Wireless Personal Communications, vol. 130, no. 2, pp. 1343-1370, 2023. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] M. H. Zahedi et al., “Fuzzy based efficient drone base stations (DBSs) placement in the 5G cellular network,” Iranian Journal of Fuzzy Systems, vol. 17, no. 2, pp. 29-38, 2020.</unstructured_citation></citation><citation key="ref15"><unstructured_citation> 
[15] D. Pliatsios et al., “Drone-base-station for next-generation internet-of-things: A comparison of swarm intelligence approaches,” IEEE Open Journal of Antennas and Propagation, vol. 3, pp. 32-47, 2021. </unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>