﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051923</doi_batch_id><timestamp>20260519230600</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>3</month><day>23</day><year>2026</year></publication_date><journal_volume><volume>23</volume></journal_volume><issue>4</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A Dimensionality Reduction Approach Based on Deep Learning and Black-Winged Kite Algorithm for Android Malware Detection</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>mohsen</given_name><surname>Eghbali</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Mollakhalili Meybodi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>kamal</given_name><surname>mirzaie</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2026</year></publication_date><pages><first_page>219</first_page><last_page>232</last_page></pages><doi_data><doi>10.66224/ijece.46626.23.4.219</doi><resource>http://ijece.org/en/Article/46626</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/46626</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/46626</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/46626</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/46626</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/46626</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/46626</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/46626</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	X. Xiang, et al., "AppChainer: Investigating the chainability among payloads in android applications," Cybersecurity, vol. 6, no. 16, 2023.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Statista, Number of Apps Available in Leading App Stores as of 4th Quarter 2020, 2021, https://www.statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores, [Accessed 2022].</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	K. A. Kumar, A. Raman, C. Gupta, and R. R. Pillai, "The recent trends in malware evolution, detection and analysis for Android devices," Journal of Engineering Science &amp; Technology Review, vol. 13, no. 4, pp. 240-248, 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	BBC, One Billion Android Devices at Risk of Hacking, 2021, https://www.bbc.com/news/technology-51751950, [Accessed 2022].</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Z. Muhammad, F. Amjad, Z. Iqbal, A. R. Javed, &amp; T. R. Gadekallu, "Circumventing Google Play vetting policies: A stealthy cyberattack that uses incremental updates to breach privacy" Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 5, pp. 4785-4794, 2023.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	O. A. Alzubi, J. A. Alzubi, A. M. Al-Zoubi, M. A. Hassonah, and U. Kose, "An efficient malware detection approach with feature weighting based on Harris Hawks optimization," Cluster Computing, vol. 25, no. 1, pp. 1-19, Aug. 2022.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. H. R. Manzil and S. Manohar Naik, "Android malware category detection using a novel feature vector-based machine learning model," Cybersecurity, vol. 6, no. 1, 2023.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	H. AlOmari, Q. M. Yaseen, and M. A. Al-Betar, "A comparative analysis of machine learning algorithms for android malware detection," Procedia Computer Science, vol. 220, pp. 763-768, 2023.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. K. Smmarwar, G. P. Gupta, and S. Kumar, "Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review," Telematics and Informatics Reports, vol. 14, Article ID: 100130, Jun. 2024.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Aurangzeb, and M. Aleem, "Evaluation and classification of obfuscated Android malware through deep learning using ensemble voting mechanism," Scientific Reports, vol. 13, Article ID: 3093, 2023.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Y. Wu, et al., "DroidRL: Feature selection for android malware detection with reinforcement learning," Computers &amp; Security, vol. 128, Article ID: 103126, May 2023.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	N. Xie, Z. Qin, and X. Di, "GA-StackingMD: Android malware detection method based on genetic algorithm optimized stacking," Applied Sciences, vol. 13, no. 4, Article ID: 2629, Feb.-2 2023.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	P. Kumar, and S. Singh, "Security testing of Android apps using malware analysis and XGboost optimized by adaptive particle swarm optimization," SN Computer Science, vol. 5, no. 1, 92, Jan. 2024.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Djenna, A. Bouridane, S. Rubab, and I. M. Marou, "Artificial intelligence-based malware detection, analysis, and mitigation," Symmetry, vol. 15, no. 3, Article ID: 677, Mar. 2023.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Wang, W. C. Wang, X. X. Hu, L. Qiu, and H. F. Zang, "Black-winged kite algorithm: a nature-inspired meta-heuristic for solving benchmark functions and engineering problems," Artificial Intelligence Review, vol. 57, Article ID: 58, 53 pp., 2024.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	L. Abualigah, A. Diabat, S. Mirjalili, M. Abd Elaziz, and A. H. Gandomi, "The arithmetic optimization algorithm," Computer Methods in Applied Mechanics and Engineering, vol. 376, Article ID: 113609, Apr. 2021.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Nethala, et al., "A Deep Learning-Based ensemble framework for robust Android malware detection," IEEE Access, vol. 13, pp. 46673-46696, 2025.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. U. Rashid, et al., "Hybrid Android malware detection and classification using deep neural networks," International Journal of Computational Intelligence Systems, vol. 18, no. 1, pp. 1-26, 2025.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. S. Wasif, M. P. Miah, M. S. Hossain, M. J. Alenazi, and M. Atiquzzaman, "CNN-ViT synergy: An efficient Android malware detection approach through deep learning," Computers and Electrical Engineering, pt. A, vol. 123, Article ID: 110039, Apr. 2025.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	H. Kauser. Sk, &amp; M. Anu. V, "Hybrid deep learning model for accurate and efficient android malware detection using DBN-GRU," PloS One, vol. 20, no. 5, Article ID:  0310230, 2025.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Vu Minh, H. T. Nguyen, H. V. Le, T. D. Nguyen, and X. C. Do, "A static method for detecting android malware based on directed API call," International Journal of Web Information Systems, vol. 21, no. 3, pp. 183-204, May 2025.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Y. Zhao, S. Sun, X. Huang, &amp; J. Zhang, "An android malware detection method using frequent graph convolutional neural networks," Electronics, vol. 14, no. 6, Article ID: 1151, Mar-2 2025.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	X. Zhang, J. Wang, J. Xu, and C. Gu, "Detection of android malware based on deep forest and feature enhancement," IEEE Access, vol. 11, pp. 29344-29359, 2023.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	E. Mbunge, B. Muchemwa, J. Batani, and N. Mbuyisa, "A review of deep learning models to detect malware in Android applications," Cyber Security and Applications, vol. 1, Article ID: 100014, Dec. 2023.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	A. S. de Oliveira, and R. J. Sassi, Chimera: An Android Malware Detection Method Based on Multimodal Deep Learning and Hybrid Analysis, TechRxiv. preprint techrxiv.13359767.v1, 2020.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	S. Chen, B. Lang, H. Liu, Y. Chen, and Y. Song, "Android malware detection method based on graph attention networks and deep fusion of multimodal features," Expert Systems with Applications, pt. C, vol. 237, Article ID: 121617, Mar. 2024.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	G. Aldehim, et al., "Gauss-mapping black widow optimization with deep extreme learning machine for android malware classification model," IEEE Access, vol. 11, pp. 87062- 87070, 2023.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Y. Wu, J. Shi, P. Wang, D. Zeng, and C. Sun, "DeepCatra: Learning flow‐and graph‐based behaviours for Android malware detection," IET Information Security, vol. 17, no. 1, pp. 118-130, Jan. 2023.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	V. Ravi, and R. Chaganti, "EfficientNet deep learning meta-classifier approach for image-based android malware detection," Multimedia Tools and Applications, vol. 82, no. 16, pp. 24891-24917, Jul. 2023.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	A. R. Nasser, A. M. Hasan, and A. J. Humaidi, "DL-AMDet: Deep learning-based malware detector for android," Intelligent Systems with Applications, vol. 21, Article ID: 200318, Mar. 2024.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	F. Ullah, X. Cheng, L. Mostarda, and S. Jabbar, "Android-IoT malware classification and detection approach using deep url features analysis," Journal of Database Management, vol. 34, no. 2, pp. 1-26, Jan. 2023.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	S. Sharma, P. Ahlawat, and K. Khanna, "DeepMDFC: A deep learning based android malware detection and family classification method," Security and Privacy, vol. 7, no. 2, Article ID: 347, Mar./Apr. 2024.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	F. Taher, O. AlFandi, M. Al-kfairy, H. Al Hamadi, and S. Alrabaee, "DroidDetectMW: A hybrid intelligent model for Android malware detection," Applied Sciences, vol. 13, no. 13, Article ID: 7720, Jul.-1 2023.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	L. Hammood, İ. A. Doğru, and K. Kılıç, "Machine learning-based adaptive genetic algorithm for Android malware detection in auto-driving vehicles," Applied Sciences, vol. 13, no. 9, Article ID: 5403, May-1 2023.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	T. Wisanwanichthan and M. Thammawichai, "A lightweight intrusion detection system for IoT and UAV using deep neural networks with knowledge distillation," Computers, vol. 14, no. 7, Article ID: 291, Jul. 2025.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	P. S. Moghaddam, A. Vaziri, S. S. Khatami, F. Hernando-Gallego, and D. Martín, "Generative adversarial and transformer network synergy for robust intrusion detection in IoT environments," Future Internet, vol. 17, no. 6, Article ID: 258, Jun. 2025.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	H. Chen, Y. Bu, K. Zong, L. Huang, and W. Hao, "The effect of data skewness on the LSTM-based mooring load prediction model," Journal of Marine Science and Engineering, vol. 10, no. 12, Article ID: 10121931, Dec. 2022.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Fine-Grained and Locality-Aware Decentralized Framework for Cache Management in Serverless Computing</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Kahani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S.</given_name><surname>Abrishami</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Nadjaran Toosi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2026</year></publication_date><pages><first_page>278</first_page><last_page>284</last_page></pages><doi_data><doi>10.66224/ijece.49722.23.4.278</doi><resource>http://ijece.org/en/Article/49722</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/49722</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/49722</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/49722</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/49722</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/49722</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/49722</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/49722</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	G. P. Mattia and R. Beraldi, "P2PFaaS: A framework for FaaS peer-to-peer scheduling and load balancing in fog and edge computing," SoftwareX, vol. 21, Article ID: 101290, Feb. 2023.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. Wen, Z. Chen, X. Jin, and X. Liu, "Rise of the planet of serverless computing: A systematic review, "ACM Trans. Software Engineeing. Methodology, vol. 32, no. 5, Article ID: 13, 2023.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Shafiei, A. Khonsari, and P. Mousavi, "Serverless computing: A survey of opportunities, challenges, and applications, "ACM Computing Survey, vol. 54, no. 11S, Article ID: 239, Jan. 2022.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Amazon, Amazon S3, [Online] Available: https://aws.amazon.com/s3/ [Accessed Jan. 2024]</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	–, Cloudstate: Distributed State Management for Serverless, [Online]. Available: https://github.com/cloudstateio/cloudstate [Accessed Jan. 2024].</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	–, Stateful Functions: A Platform-Independent Stateful Serverless Stack, [Online]. Available: https://nightlies.apache.org/flink/flink-statefun-docs-master/ [Accessed Ja. 2024].</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. Zhang, A. Cardoza, P. B. Chen, S. Angel, and V. Liu, "Fault-tolerant and transactional stateful serverless workflows," in Proc. 4th USENIX Symp. on Operating Systems Design and Implementation, pp. 1187-1204, 4-6 Nov. Aug. 2020.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	V. Sreekanti, et al., "Cloudburst: stateful functions-as-a-service," Proc. of the VLDB Endowment, vol. 13, no. 11, pp. 2438-2452, 2020. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Z. Jia and E. Witchel, "Boki: Stateful serverless computing with shared logs," in Proc. of the ACM SIGOPS 28th Symp. on Operating Systems Principles, pp. 691-707, Virtual Event Germany, 26-29 Oct. 2021.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	D. Barcelona-Pons, P. Sutra, M. Sanchez-Artigas, G. Paris, and P. Garcia-Lopez, "Stateful serverless computing with crucial," ACM Trans. on Software Engineering and Methodology, vol. 31, no. 3, Article ID: 39, 38 pp., Jul. 2022.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	F. Romero, et al., "Faa$T: A transparent auto-scaling cache for serverless applications," in Proc. of the ACM Symp. on Cloud Computing, pp. 122-137, Seattle, WA, USA, 1-4 Nov. 2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Ao Wang, et al., "InfiniCache: exploiting ephemeral serverless functions to build a cost-effective memory cache," in Proc. of the 18th USENIX Conf, on File and Storage Technologies, pp. 267-282, Santa Clar, CA, USA, 24-27 Feb. 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. Zhang, et al., "InfiniStore: Elastic serverless cloud storage," Proc. of the VLDB Endowment, vol. 16, no. 7, p. 1629-1642, Mar. 2023.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	–,  Kubernetes, [Online]. Available: https://kubernetes.io/ [Accessed Jan. 2024].</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Klimovic, et al., "Pocket: Elastic ephemeral storage for serverless analytics," in Proc. of the 13th USENIX Symp. on Operating Systems Design and Implementation, pp. 428-444, Carlsbad, CA, USA, 8-10 Oct. 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	C. Wu, V. Sreekanti, and J. M. Hellerstein, "Transactional causal consistency for serverless computing," in Proc. of the 2020 ACM SIGMOD Int. Conf. on Management of Data, pp. 83-97, Portland, OR, USA, 14-19 Jun. 2020. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	D.Mvondo, et al., "OFC: an opportunistic caching system for FaaS platforms," in Proc. of the 16th European Conf. on Computer Systems, pp.  228-244, Virtual Event UKy, 26-28 Apr. 2021. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	–, OpenFaaS, [Online]. Available: https://docs.openfaas.com/architecture/gateway/  [Accessed Jan. 2024]</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	–, OpenEBS, [Online]. Available: https://openebs.io/docs/ [Accessed January 2024]</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	–, Sidecar Containers, 2023. [Online]. Available: https://kubernetes.io/docs/concepts/workloads/pods/sidecar-containers/. [Accessed 5 Sept. 2023]</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Fuerst and P. Sharma, "Locality-aware load-balancing for serverless clusters," in Proc. of the 31st Int. Symp. on High-Performance Parallel and Distributed Computing, pp. 227-239, Minneapolis, MN, USA, 27 Jun.-1 Jul. 2022.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Y. Lee and S. Choi, "A greedy load balancing algorithm for FaaS platforms," in Proc. of the 2021 5th Int. Conf. on Cloud and Big Data Computing, pp. 63-69, Liverpool, UK, 13-15 Aug. 2021. </unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	–, IPVS Scheduling Algorithm, [Online]. Available: https://keepalived-pqa.readthedocs.io/en/latest/scheduling_algorithms.html [Accessed Jan. 2024].</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. Kim and K. Lee, "FunctionBench: A suite of workloads for serverless cloud function service," in Proc. 2019 IEEE 12th Int. Conf. on Cloud Computing, pp. 502-504, Milan, Italy, 8-13 Jul. 2019.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. Elnikety, Azure Public Dataset, [Online]. Available: https://github.com/Azure/AzurePublicDataset/blob/master/AzureFunctionsInvocationTrace2021.md [Accessed Jan. 2024].</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Multi-Objective Machine Learning Approach for Controller Placement in Software-Defined Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Gholizadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>N.</given_name><surname>Mozayeni</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2026</year></publication_date><pages><first_page>267</first_page><last_page>277</last_page></pages><doi_data><doi>10.66224/ijece.49934.23.4.267</doi><resource>http://ijece.org/en/Article/49934</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/49934</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/49934</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/49934</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/49934</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/49934</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/49934</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/49934</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. Urrea and D. Benítez, "Software-defined networking solutions, architecture and controllers for the industrial internet of things: A review," Sensors, vol. 21, no.19, Article ID: 6585, 2021.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Maleh, Y. Qasmaoui, K. El Gholami, Y. Sadqi, and S. Mounir, "A comprehensive survey on sdn security: threats, mitigations, and future directions," Journal of Reliable Intelligent Environments, vol. 9, no. 2, pp.201-239, 2023.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. N. Alhaj and N. Dutta, "Analysis of security attacks in sdn network: A comprehensive survey," Contemporary Issues in Communication, Cloud and Big Data Analytics, pp.27-37, 2022.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	K. Nisar, et al., "A survey on the architecture, application, and security of software defined networking: Challenges and open issues," Internet of Things, vol. 12, Article ID: 100289, 2020.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Ahmad and A. H. Mir, "Scalability, consistency, reliability and security in sdn controllers: a survey of diverse sdn controllers, " Journal of Network and Systems Management, vol. 29, pp.1-59, 2021.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	B. Isong, R. R. S. Molose, A. M. Abu-Mahfouz, and N. Dladlu, "Comprehensive review of sdn controller placement strategies," IEEE Access, vol. 8, pp.170070-170092, 2020.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Rahouti et al., "SDN security review: Threat taxonomy, implications, and open challenges," IEEE Access, vol. 10, pp. 45820-45854, 2022.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	E. H. Bouzidi, A. Outtagarts, R. Langar, and R. Boutaba, "Dynamic clustering of software defined network switches and controller placement using deep reinforcement learning," Computer Networks, vol.207, Article ID: 108852, 2022.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	K. Saeed and M. O. Ullah, "Toward reliable controller placements in software-defined network using constrained multi-objective optimization technique," IEEE Access, vol. 10, pp.129865-129883, 2022.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	C. Liao, et al., "Modecp: A multi objective based approach for solving distributed controller placement problem in software defined network," Sensors, vol.22, no.15, Article ID: 5475, 2022.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. M. Kazemian and M. Mirabi, "Controller placement in software defined networks using multi-objective antlion algorithm, " The Journal of Supercomputing, vol. 78, no. 4, pp.5626-5649, 2022.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Y. Wu, S. Zhou, Y. Wei, and S. Leng, "Deep reinforcement learning for controller placement in software defined network," in Proc. IEEE Conf. on Computer Communications Workshops, pp.1254-1259, Toronto, Canada, 6-9 Jul. 2020. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. Mostafaei, M. Menth, and M. S. Obaidat, "A learning automaton-based controller placement algorithm for software-defined networks," in Proc. IEEE Global Communications Conf., 6 pp., Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. S. Nande, O. Lhamo, S. Biswas, R. Bassoli, and F. H. Fitzek, "Quantum machine learning for controller placement in software defined networks," in Proc. 28th European Wireless Conf., pp.382-387, Rome, Italy, 2-4 Oct. 2023.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Rahman, et al., "Virtualized controller placement for multi-domain optical transport networks using machine learning," Photonic Network Communications, vol. 40, pp.126-136, 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	V. Srivastava and R. S. Pandey, "Machine intelligence approach: To solve load balancing problem with high quality of service performance for multi controller based software defined network," Sustainable Computing: Informatics and Systems, vol. 30, Article ID: 100511, 2021.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	C. Kurra, V. P. Dadi, A. Awasthi, V. Janyani and R. B. Battula, "CAPFUL - Coherent dynamic controller placement method using deep reinforcement learning for SDN," in Proc. Int. Conf. on Communication, Computing, Networking, and Control in Cyber-Physical Systems, Dubai, United Arab Emirates, pp. 331-336, 10-12 Jun. 2025.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	B. Li, et al., "DDPG-based load-aware QoS guaranteed SDN controller placement for Internet of vehicles," IEEE Internet of Things Journal, vol. 12, no. 24, 15 Dec. 2025.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Kumari, A. Roy and A. Singh Sairam, "Optimizing SDN controller load balancing using online reinforcement learning," IEEE Access, vol. 12, pp. 131591-131604, 2024.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Farhan, et al., "ReCAP: Reliability–capacity aware joint controller placement and routing using a hybrid AI approach," IEEE Trans. on Reliability, vol. 74, no. 4, pp. 5686- 5700, 2025.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. Hyun and J. W. Hong, "Knowledge-defined networking using in-band network telemetry," in Proc. 19th Asia-Pacific Network Operations and Management Symp., pp. 54-57, Seoul, South Korea, 27-29 Sept. 2017.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	P.T.A. Quang, Y. Hadjadj-Aoul, and A. Outtagarts, "A deep reinforcement learning approach for VNF forwarding graph embedding," IEEE Trans. on Network and Service Management, vol. 16, no 4, pp. 1318-1331, Dec. 2019.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Hybrid Method for Stock Price Prediction in the Iranian Stock Market Using Optimized Deep Learning</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohsen</given_name><surname>Mahdaviasl</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Kolahkaj</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2026</year></publication_date><pages><first_page>257</first_page><last_page>266</last_page></pages><doi_data><doi>10.66224/ijece.49951.23.4.257</doi><resource>http://ijece.org/en/Article/49951</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/49951</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/49951</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/49951</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/49951</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/49951</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/49951</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/49951</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	E. D. O. Carosia, A. E. A. da Silva, and G. P. Coelho, "Predicting the Brazilian stock market with sentiment analysis, technical indicators and stock prices: A deep learning approach," Computational Economics, vol. 65, pp. 23512378, 2025.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Kolahkaj, A. Harounabadi, and M. Sadeghzade, "A recommender system for web mining using neural network and fuzzy algorithm," International Journal of Computer Applications, vol. 78, no. 8, pp. 20-24, Sept 2013.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Hemmati, H. M. Arzanagh, and A. M. Rahmani, "A taxonomy and survey of big data in social media," Concurrency and Computation: Practice and Experience, vol. 36, no. 1, Article ID: e7875, Jan. 2024.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. J. Awan, et al., "Social media and stock market prediction: A big data approach," Computers, Materials &amp; Continua, vol. 67, no. 2, pp. 2569-2583, 2021.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	W. Landis, S. Cha, and M. Shaalan, "On optimization of stock market prediction methods," in Proc. IEEE Int. Conf. Big Data, pp. 6116-6118, Los Angeles, CA, USA,9 -12 Dec. 2019.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Nabipour, P. Nayyeri, H. Jabani, A. Mosavi, and E. Salwana, "Deep learning for stock market prediction," Entropy, vol. 22, no. 8, Article ID: 840, Aug 2021.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. Selvamuthu, V. Kumar, and A. Mishra, "Indian stock market prediction using artificial neural networks on tick data," Financial Innovation, vol. 5, no. 16, 12 pp., 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	X. Pang, Y. Zhou, P. Wang, W. Lin, and V. Chang, "An innovative neural network approach for stock market prediction," The Journal of Supercomputing, vol. 76, pp. 2098-2118, 2020.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. N. Ashtiani and B. Raahmei, "News-based intelligent prediction of financial markets using text mining and machine learning: A systematic literature review," Expert Systems with Applications, vol. 217, Article ID: 119509, May 2023.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. T. Z. de Pauli, M. Kleina, and W. H. Bonat, "Comparing artificial neural network architectures for Brazilian stock market prediction," Annals of Data Science, vol. 7, 613-628, 2020.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Deng, Y. Zhu, Y. Yu, and X. Huang, "An integrated approach of ensemble learning methods for stock index prediction using investor sentiments," Expert Systems with Applications, pt. A, vol. 238, Article ID: 121710, Mar. 2024.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	X. Li, P. Wu, and W. Wang, "Incorporating stock prices and news sentiments for stock market prediction: A case of Hong Kong," Information Processing &amp; Management, vol. 57, no. 5, Article ID: 102212, Sept. 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	T. J. Strader, J. J. Rozycki, T. H. Root, and Y. H. J. Huang, "Machine learning stock market prediction studies: Review and research directions," Journal of International Technology and Information Management, vol. 28, no. 4, pp. 63-83, 2020.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Moghar and M. Hamiche, "Stock market prediction using LSTM recurrent neural network," Procedia Computer Science, vol. 170, pp. 1168-1173, 2020.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	P. Balasubramanian, P. Chinthan, S. Badarudeen, and H. Sriramanm "A systematic literature survey on recent trends in stock market prediction." Peer J Computer Science, vol. 10, Article ID: e1700, 2024.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Kolahkaj, "An image retrieval approach based on feature extraction and self-supervised learning," in Proc.  2nd. Int. Conf. on Distributed Computing and High Performance Computing, pp. 46-51, Qom, Iran, 2-3 Mar 2022.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	D. P. Goel, K. Mahajan, N. D. Nguyen, N. Srinivasan, and C. P. Lim, "Towards an efficient backbone for preserving features in speech emotion recognition: deep-shallow convolution with recurrent neural network," Neural Computing and Applications, vol. 35, no. 3, pp. 2457-2469, 2023.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	C. Szegedy, et al., "Going deeper with convolutions," in Proc. IEEE Conf. Comput. Vis. Pattern Recognition, Boston, MA, USA, 7-12 Jun. 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	I. K. Nti, A. F. Adekoya, and B. A. Weyori, "A novel multi-source information-fusion predictive framework based on deep neural networks for accuracy enhancement in stock market prediction," Journal of Big Data, vol. 8, Article ID: 17, 28 pp., 2021.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Bhoite, et al., "Stock market prediction using recurrent neural network and long short-term memory," in Proc. ICT Infrastructure and Computing: of ICT4SD, pp. 635-643, Goa, India, 29–30 Jul. 2022.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	C. Deng, Y. Huang, N. Hasan, and Y. Bao, "Multi-step-ahead stock price index forecasting using long short-term memory model with multivariate empirical mode decomposition," Information Sciences, vol. 607, pp. 297-321, Aug. 2022.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	P. Chhajer, M. Shah, and A. Kshirsagar, "The applications of artificial neural networks, support vector machines, and long–short term memory for stock market prediction," Decision Analytics Journal, vol. 2, Article ID: 100015, Mar. 2022.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	A. Kelotra and P. Pandey, "Stock market prediction using optimized deep-ConvLSTM model," Big Data, vol. 8, no. 1, pp. 5-24, Feb. 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. Kolahkaj, "A hybrid approach for intrusion detection in computer systems using optimized deep neural networks," Journal of Innovations in Computer Science and Engineering, vol. 2, Special Issues 4, pp. 70-78, 2025.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. A. Mohammad, M. Kolahkaj, "Detecting Network Anomalies Using the Rain Optimization Algorithm and Hoeffding Tree-Based Autoencoder," in Proc. 10th Int. Conf. on Web Research, pp. 137-141, Tehran, Iran, 24-25 Apr. 2024.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	A. A. Heidari, et al., "Harris hawks optimization: Algorithm and applications," Future Generation Computer Systems, vol. 97, pp. 849-872, Aug. 2019.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	P. R. Patil, D. Parasar, and S. Charhate, "Optimisation-enabled transfer learning framework for stock market prediction," Journal of Information &amp; Knowledge Management, vol. 23, no. 2, Article ID: 2450013, 2024.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	A. Thakkar and K. Chaudhari, "Fusion in stock market prediction: A decade survey on the necessity, recent developments, and potential future directions," Information Fusion, vol. 65, pp. 95-107, Jan. 2021.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	A. Kurani, P. Doshi, A. Vakharia, and M. Shah, "A comprehensive comparative study of artificial neural network (ANN) and support vector machines (SVM) on stock forecasting," Annals of Data Science, vol. 10, no. 1, pp. 183-208, 2023.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	Y. Zhao and G. Yang, "Deep learning-based integrated framework for stock price movement prediction," Applied Soft Computing, vol. 133, Article ID: 109921, Jan. 2023.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	R. Chiong, Z. Fan, Z. Hu, and S. Dhakal, "A novel ensemble learning approach for stock market prediction based on sentiment analysis and the sliding window method," IEEE Trans. on Computational Social Systems, vol. 10, pp. 1-12, Oct. 2022.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	A. Ghasemieh and R. Kashef, "An enhanced Wasserstein generative adversarial network with Gramian angular fields for efficient stock market prediction during market crash periods," Applied Intelligence, vol. 1, no. 22, pp. 1-22, 2023.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	A. Ponmalar and V. Dhanakoti, "An intrusion detection approach using ensemble support vector machine-based chaos game optimization algorithm in big data platform," Applied Soft Computing, vol. 116, Article ID: 108295, Feb. 2022.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	X. Li, J. Wang, J. Tan, S. Ji, and H. Jia, "A graph neural network-based stock forecasting method utilizing multi-source heterogeneous data fusion," Multimedia Tools and Applications, vol. 81, no. 30, pp. 43753-43775, 2022.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	S. Meng, et. al., Enhancing Exchange Rate Forecasting with Explainable Deep Learning Models, arXiv preprint arXiv:2410.19241, 2024.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	K. Yoosin, S. R. Jung, and I. Ghani, "Text opinion mining to analyze news for stock market prediction," International Journal of Advanced Soft Computing Applications, vol. 6, no. 1, pp. 1-13, Mar. 2014.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37] K. Nti, A. F. Adekoya, and B. A. Weyori, "Efficient stock-market prediction using ensemble support vector machine," Open Computer Science, vol. 10, no. 1, pp. 153-163, 2020.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	H. C. Bhanujyothi and I. J. Jacob, "A hybrid CNN-LSTM attention-based deep learning model for stock price prediction using technical indicators," Engineering, Technology &amp; Applied Science Research, vol. 15, no. 5, pp. 28012-28017, Oct. 2025.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	W. Huang, J. Zhao, and X. Wang, "Model-driven multimodal LSTM-CNN for unbiased structural forecasting of European Union allowances open-high-low-close price," Energy Economics, vol. 132, pp. 107459, Apr. 2024.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	J. Dong and S. Liang, "Hybrid CNN-LSTM-GNN neural network for A-share stock prediction," Entropy, vol. 27, no. 8, pp. 881, Aug. 2025.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	http://old.tsetmc.com/Site.aspx?ParTree=111C, accessed on Oct. 15, 2025.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	https://www.nseindia.com/, accessed on Oct. 15, 2025.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	S. Mehtab and J. Sen, Stock Price Prediction Using Convolutional Neural Networks on a Multivariate Time Series, arXiv preprint arXiv:2001.09769, 2020.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	W. Chen, H. Zhang, M. K. Mehlawat, and L. Jia, "Mean–variance portfolio optimization using machine learning-based stock price prediction," Applied Soft Computing, vol. 100, Article ID: 106943, Mar. 2021.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	P. Yan, "Research on stock price prediction based on the GWO-LSTM-ATT model," Frontiers in Computing and Intelligent Systems, vol. 3, pp. 107-114, 2024.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Proposing Two Data Augmentation Techniques for ASR with Limited Data: Gradual Masking and Word Frequency-Aware Masking</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Ma.</given_name><surname>Asadolahzade Kermanshahi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Akbari Azirani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>B.</given_name><surname>Nasersharif</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2026</year></publication_date><pages><first_page>233</first_page><last_page>245</last_page></pages><doi_data><doi>10.66224/ijece.50484.23.4.233</doi><resource>http://ijece.org/en/Article/50484</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/50484</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/50484</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/50484</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/50484</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/50484</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/50484</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/50484</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	R. Prabhavalkar, T. Hori, T. N. Sainath, R. Schlüter, and S. Watanabe, "End-to-end speech recognition: A survey, "IEEE/ACM Trans. on Audio, Speech, and Language Processing, vol. 32, pp. 325-351, 2024.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Gales and S. Young, "The application of hidden Markov models in speech recognition, "Foundations and Trends in Signal Processing, vol. 1, no. 3, pp. 195-304, Jul. 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	G. Hinton et al., "Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups," IEEE Signal Processing Magazine, vol. 29, no. 6, pp. 82-97, Nov. 2012.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Graves, N. Jaitly, and A. Mohamed, "Hybrid speech recognition with deep bidirectional LSTM," in Proc. IEEE Workshop on Automatic Speech Recognition and Understanding, Olomouc, Czech Republic, pp. 273-278 Olomouc, Czech Republic, 8-12 Dec. 2013.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Asadolahzade Kermanshahi and M. M. Homayounpour, "Improving phoneme sequence recognition using phoneme duration information in DNN-HSMM," Journal of AI and Data Mining, vol. 7, no. 1, pp. 137147, Jan.2019.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Gulati et al., "Conformer: Convolution-augmented transformer for speech recognition,” in Proc. INTERSPEECH, pp. 5036-5040, Shanghai, China, 25-29 Oct. 2020.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Baevski, H. Zhou, A. Mohamed, and M. Auli, "Wav2Vec 2.0: A framework for self-supervised learning of speech representations," in Proc. Advances in Neural Information Processing Systems, Vancouver, Canada, pp. 12449-12460, 2020.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Y. Zhang et al., Google USM: Scaling Automatic Speech Recognition Beyond 100 Languages, arXiv preprint arXiv:2303.01037, 2023.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Radford, et al., "Robust speech recognition via large-scale weak supervision," in Proc. of the 40th Int. Conf. on Machine Learning, pp. 28492-28518, Honolulu, HI, USA, 23-29 Jul. 2023.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Hussein, S. Watanabe, and A. Ali, "Arabic speech recognition by end-to-end, modular systems and human," Computer Speech &amp; Language, vol. 71, Article ID: 101272, Jan. 2022.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	D. S. Park et al., "Specaugment: A simple data augmentation method for automatic speech recognition," in Proc. 20th Annual Conf. of the Int. Speech Communication Association, pp. 2613-2617, Graz, Austria, 15-19 Sept. 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	T. Ko, V. Peddinti, D. Povey, and S. Khudanpur, "Audio augmentation for speech recognition," in Proc. 16th Annual Conf. of the Int. Speech Communication Association, Dresden, Germany, pp. 3586-3589, Dresden, Germany, 6-10 Sept. 2015.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	T. Ko, V. Peddinti, D. Povey, M. L. Seltzer, and S. Khudanpur, "A study on data augmentation of reverberant speech for robust speech recognition," in Proc. 42nd IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp. 5220-5224, New Orleans, LA, USA, 5-9 Mar. 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Bartelds, N. San, B. McDonnell, D. Jurafsky, and M. Wieling, "Making more of little data: Improving low-resource automatic speech recognition using data augmentation," in Proc. of the 61st Annual Meeting of the Association for Computational Linguistics, vol. 1, pp. 715-729, Toronto, Canada, 9-12 Jul. 2023.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	D. S. Park et al., "Improved noisy student training for automatic speech recognition," in Proc. 21st Annual Conf. of the Int. Speech Communication Association, pp. 2817-2821, Shanghai, China, 25-29 Oct. 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Y. Zhang et al., "Bigssl: Exploring the frontier of large-scale semi-supervised learning for automatic speech recognition, "IEEE Journal of Selected Topics in Signal Processing, vol. 16, no. 6, pp. 1519-1532, 2022.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. Baevski, A. Babu, W.-N. Hsu, and M. Auli, "Efficient self-supervised learning with contextualized target representations for vision, speech and language," in Proc. Int. Conf. on Machine Learning, pp. 1416-1429, Honolulu, Hawaii, USA, 23-29 Jul. 2023.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Asadolahzade Kermanshahi, Transfer Learning for ASR to Deal with Low-Resource Data Problem, Technical Report, Tehran, Iran, 2019. https://www.researchgate.net/publication/359159354_Transfer_Learning_for_ASR_to_Deal_with_Low-Resource_Data_Problem.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Asadolahzade Kermanshahi, A. Akbari, and B. Nasersharif, "Transfer learning for end-to-end ASR to deal with low-resource problem in Persian language," in Proc. 26th Int. Computer Conference, Computer Society of Iran, 5 pp., Tehran, Iran, 3-4 Mar. 2021.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	H. Kheddar, Y. Himeur, S. Al-Maadeed, A. Amira, and F. Bensaali, "Deep transfer learning for automatic speech recognition: Towards better generalization, "Knowledge-Based Systems, vol. 277, Article ID: 110851, Oct. 2023.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Babuet al., "XLS-R: Self-supervised cross-lingual speech representation learning at scale," in Proc. 23th Annual Conf. of the Int. Speech Communication Association, pp. 2278-2282, Incheon, South Korea, 18-20 Sept. 2022.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	V. Pratap, et al., "Scaling speech technology to 1,000+ languages," Journal of Machine Learning Research, vol. 25, Article ID: 97, 52 pp., 2024.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	X. Cui, V. Goel, and B. Kingsbury, "Data augmentation for deep neural network acoustic modeling," IEEE/ACM Trans. on Audio, Speech, and Language Processing, vol. 23, no. 9, pp. 1469-1477, Sept. 2015.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	C. Wang, et al., "Semantic mask for transformer based end-to-end speech recognition," in Proc. 21st Annual Conf. of the Int. Speech Communication Association, pp. 971-975, Shanghai, China, 25-29 Oct. 2020.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Y. Bengio, J. Louradour, R. Collobert, and J. Weston, "Curriculum learning," in Proc. of the 26th Annual Int. Conf. on Machine Learning, pp. 41-48, Montréal, Canada, 14-18 Jun. 2009.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	L. Meng, et al., "MixSpeech: Data augmentation for low-resource automatic speech recognition," in Proc. 46th IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp. 7008-7012, Toronto, Canada, 6-11 Jun. 2021.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	D. Fucci, M. Gaido, M. Negri, M. Cettolo, and L. Bentivogli, "No pitch left Behind: Addressing gender unbalance in automatic speech recognition through pitch manipulation," in Proc. Automatic Speech Recognition and Understanding Workshop, 8 pp., Taipei, Taiwan, 16-20 Dec. 2023.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	N. Jaitly and G. E. Hinton, "Vocal tract length perturbation (VTLP) improves speech recognition," in Proc. ICML Workshop on Deep Learning for Audio, Speech and Language, p. 21, Atlanta, GA, USA, 16-21 Jun. 2013.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	Y. Qian, H. Hu, and T. Tan, "Data augmentation using generative adversarial networks for robust speech recognition," Speech Communication, vol. 114, pp. 1-9, Nov. 2019.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	E. Casanova et al., "ASR data augmentation in low-resource settings using cross-lingual multi-speaker TTS and cross-lingual voice conversion," in Proc. 24th Annual Conf. of the Int. Speech Communication Association, pp. 1244-1248, Dublin, Ireland, 20-24 Aug. 2023.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	J. Sun et al., "Semantic data augmentation for end-to-end Mandarin speech recognition," in Proc. 21st Annual Conf. of the Int. Speech Communication Association, pp. 1269-1273, Brno, Czech Republic, 30 Aug.-3 Sept. 2021.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	T. K. Lam, M. Ohta, S. Schamoni, and S. Riezler, “On-the-Fly Aligned Data Augmentation for Sequence-to-Sequence ASR,"in Proc. 21st Annual Conf. of the Int. Speech Communication Association, pp. 1299-1303, Brno, Czech Republic, 30 Aug.-3 Sept. 2021.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	G. Wang, et al., "G-Augment: Searching for the meta-structure of data augmentation policies for ASR," in Proc. IEEE Spoken Language Technology Workshop, pp. 23-30, Doha, Qatar, 9-12 Jan. 2022.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	Z. Jin, et al., "Towards automatic data augmentation for disordered speech recognition," in Proc. 49th IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp. 10626-10630, Seoul, Korea, 14-19 Apr. 2024.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	R. Li, G. Ma, D. Zhao, R. Zeng, X. Li, and H. Huang, "A policy-based approach to the SpecAugment method for low resource E2E ASR," in Proc. Asia Pacific Signal and Information Processing Association, pp. 630-635, Chiang Mai, Thailand, 7-10 Nov. 2022.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	T. -Y. Hu, et al., "SapAugment: Learning asample adaptive policy for data augmentation," in Proc. 46th IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp. 4040-4044, Toronto, Canada, 6-11 Jun. 2021.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	A. Sriram, M. Auli, and A. Baevski, "Wav2Vec-Aug: Improved self-supervised training with limited data," in Proc. 20th Annual Conf. of the Int. Speech Communication Association, pp. 4950-4954, Incheon, South Korea, 18-20 Sept. 2022.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	D. Jiang, W. Li, M. Cao, W. Zou, and X. Li, "Speech SimCLR: Combining contrastive and reconstruction objective for self-supervised speech representation learning," in Proc. 21st Annual Conf. of the Int. Speech Communication Association, pp. 1544-1548, Brno, Czech Republic, 30 Aug.-3 Sept. 2021.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	J. Devlin, M.-W. Chang, K. Lee, and K. Toutanova, "Bert: Pre-training of deep bidirectional transformers for language understanding," in Proc. of Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 4171-4186, Minneapolis, MN, USA, 2-7 Jun. 2019.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	V. Panayotov, G. Chen, D. Povey, and S. Khudanpur, "Librispeech: an ASR corpus based on public domain audio books," in Proc. ICASSP, pp. 5206-5210, South Brisbane, Australia, 2015.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	A. Graves, S. Fernandez, F. Gomez, and J. Schmidhuber, "Connectionist temporal classiﬁcation: labelling unsegmented sequence data with recurrent neural networks," in Proc. of the 23rd Int. Conf. on Machine Learning, pp. 369-376, 25-29 Jun. 2006.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	S. Watanabe, et al., "ESPnet: End-to-end speech processing toolkit," in Proc. 19th Annual Conf. of the Int. Speech Communication Association, pp. 2207-2211, Hyderabad, India, 2018.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	[43]	M. McAuliffe, M. Socolof, S. Mihuc, M. Wagner, and M. Sonderegger, "Montreal forced aligner: trainable text-speech alignment using Kaldi.," in Proc.18th Annual Conf. of the Int. Speech Communication Association, pp. 498-502, 20-24 Aug. 2017.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	K. Le, T. V. Ho, D. Tran, and D. T. Chau, "SegAug: CTC-Aligned segmented augmentation for robust RNN-transducer based speech recognition," in Proc. 50th IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, 5 pp., Hyderabad, India, 6-11 Apr. 2025.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Challenges of Persian Scene Text  Detection and the Importance of a New Dataset for Evaluating Deep Learning Models</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Z.</given_name><surname>Raisi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>R.</given_name><surname>Damani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>E.</given_name><surname>Sarani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>V.</given_name><surname>Nazarhzehi Had</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>23</day><year>2026</year></publication_date><pages><first_page>246</first_page><last_page>256</last_page></pages><doi_data><doi>10.66224/ijece.51191.23.4.246</doi><resource>http://ijece.org/en/Article/51191</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/51191</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/51191</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/51191</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/51191</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/51191</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/51191</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/51191</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Zhu, C. Yao, and X. Bai, "Scene text detection and recognition: Recent advances and future trends," Front. Comp Sci., vol. 10, no. 1, pp. 19-36, 2016.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	H. Lin, P. Yang, and F. Zhang, "Review of scene text detection and recognition," Arch. Comput. Methods Eng, pp. 1-22, 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Z. Raisi, M. A. Naiel, P. Fieguth, S. Wardell, and J. Zelek, Text Detection and Recognition in the Wild: A Review, arXiv: arXiv:2006.04305, 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Z. Raisi and J. Zelek, "Text detection and recognition for robot localization," J. Electr. Comput. Eng. Innov. JECEI, vol. 12, no. 1, pp. 163174, 2024.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	X. Han, J. Gao, C. Yang, Y. Yuan, and Q. Wang, "Focus entirety and perceive environment for arbitrary-shaped text detection," IEEE Trans. Multimed., 2024.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Xu et al., "FSANet: Feature shuffle and adaptive channel attention network for arbitrary shape scene text detection," Neurocomputing, Article ID: 129443, 2025.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	K. Wang, B. Babenko, and S. Belongie, "End-to-end scene text recognition," in Proc. Int. Conf. on Comp. Vision, pp. 1457-1464, Barcelona, Spain, 6-13 Nov. 2011.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Bissacco, M. Cummins, Y. Netzer, and H. Neven, " PhotoOCR: Reading text in uncontrolled conditions," in Proc. IEEE Int. Conf. on Comp. Vision, pp. 785-792, Sydney, Australia, 1-8 Dec. 2013.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	X. Zhou et al., "EAST: An efficient and accurate scene text detector," in Proc. IEEE Conf. on Comp. Vision and Pattern Recognition, pp. 5551-5560, Honolulu, HI, USA, 21-26 Jul.2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Liao, B. Shi, and X. Bai, "Textboxes++: A single-shot oriented scene text detector," IEEE Trans Image Process, vol. 27, no. 8, pp. 3676-3690, Apr. 2018.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Y. Baek, B. Lee, D. Han, S. Yun, and H. Lee, "Character region awareness for text detection," in Proc. IEEE Conf. on Comp. Vision and Pattern Recognition, pp. 9365-9374, Long Beach, CA, USA, 16-17 Jun. 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Z. Raisi, M. A. Naiel, G. Younes, S. Wardell, and J. S. Zelek, "Transformer-Based text detection in the wild," in Proc. IEEE/CVF Conf. on Computer Vision and Pattern Recognition Workshops, pp. 3162-3171, Nashville, TN, USA,19-25 Jun. 2021.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Z. Raisi, G. Younes, and J. Zelek, "Arbitrary shape text detection using transformers,” in Proc. 26th Int. Conf. on Pattern Recognition, pp. 3238-3245, Montreal, Canada,2022.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Z. Raisi and J. Zelek, "Visual place recognition from end-to-end semantic scene text features," Front. Robot. AI, vol. 11, Article ID: 1424883, Sept. 2024.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	ز. حیدران داروقه امنیه، س. م. رستگار فاطمی، م. رستگارپور و گ. آقایی قزوینی،  "افزایش دقت شبکه¬های عصبی کانولوشنی مبتنی بر مدل چهار-جریان با فیلترهای پردازش تصویر و نگاشت خطی¬ساز فضای عدم تشابه"، نشریه روش¬های هوشمند در صنعت برق، سال 16، شماره 61، صص. 28-1، بهار 1404.
[16]	م. روحی، ج. مظلوم، م. ع. پورمینا و ب. قلمکاری،  "طبقه¬بندی سکته مغزی بر اساس روش یادگیری عمیق در سیستم تصویربرداری ریزموجی از مغز"، نشریه روش¬های هوشمند در صنعت برق، سال 15، شماره 57، صص. 132-121، بهار 1403.
[17]	ف. علی¬مرادی، ف. رحمانی، ل. ربیعی، م. خوانساریو م. مازوچی،  "ساخت مجموعه داده تصاویر برای تشخیص و بازشناسی متن در تصاویر، "فصلنامه اطلاعات و ارتباطات ایران، سال 14، شماره 53، صص. 95-78، پاییز-زمستان 1401.
[18]	S. Kheirinejad, N. Riaihi, and R. Azmi, "Persian text-based traffic sign detection with convolutional neural network: A new dataset," in Proc. 10th Int. Conf. on Computer and Knowledge Engineering, pp. 060-064, Mashhad, Iran, 29-30 Oct. 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[19]	A. Fateh, M. Rezvani, A. Tajary, and M. Fateh, "Persian printed text line detection based on font size," Multimed. Tools Appl., vol. 82, no. 2, pp. 2393-2418, Jan. 2023.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[20]	M. Rahmati, M. Fateh, M. Rezvani, A. Tajary, and V. Abolghasemi, "Printed Persian OCR system using deep learning," IET Image Process., vol. 14, no. 15, pp. 3920-3931, Dec. 2020.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[21]	B. Epshtein, E. Ofek, and Y. Wexler, "Detecting text in natural scenes with stroke width transform," in Proc. IEEE Conf. on Comp. Vision and Pattern Recognition, pp. 2963-2970, San Francisco, CA, USA, 13-18 Jun. 2010.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[22]	H. Chen, et al., "Robust text detection in natural images with edge-enhanced maximally stable extremal regions," in Proc. IEEE Int. Conf. on Image Processing, pp. 2609-2612, Barcelona, Spain,6-13 Nov. 2011.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[23]	S. Ren, K. He, R. Girshick, and J. Sun, “Faster R-CNN: Towards real-time object detection with region proposal networks," in Proc. Adv. in Neural Info. Process. Sys., pp. 91-99, Montreal, Canada, 7-12 Dec.2015.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[24]	M. Yaseen, What is YOLOv8: An In-Depth Exploration of the Internal Features of the Next-Generation Object Detector, arXiv preprint arXiv:2408.15857, 2024.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[25]	W. Liu, et al., "SSD: Single shot multibox detector," in Eur. Conf. on Comp. Vision, Springer, pp. 21-37, 2016.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[26]	J. Long, E. Shelhamer, and T. Darrell, "Fully convolutional networks for semantic segmentation," in Proc. IEEE Conf. on Comp. Vision and Pattern Recognition, 2015, pp. 3431–3440.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[27]	K. He, G. Gkioxari, P. Dollár, and R. Girshick, "Mask R-CNN," in Proc. IEEE Int. Conf. on Comp. Vision, pp. 2961-2969, 2017.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[28]	N. Carion, et al., End-to-End Object Detection with Transformers, arXiv Preprint arXiv200512872, 2020.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[29]	X. Zhu, W. Su, L. Lu, B. Li, X. Wang, and J. Dai, Deformable DETR: Deformable Transformers for End-to-End Object Detection, arXiv Preprint arXiv201004159, 2020.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[30]	Z. Tian, W. Huang, T. He, P. He, and Y. Qiao, "Detecting text in natural image with connectionist text proposal network," in Proc. Eur. Conf. on Comp. Vision, Springer, pp. 56-72, 2016.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[31]	S. Long, et al., "Textsnake: A flexible representation for detecting text of arbitrary shapes," in Proc. Eur. Conference. on Computer Vision, pp. 20-36, 2018.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[32]	D. Deng, H. Liu, X. Li, and D. Cai, "Pixellink: Detecting scene text via instance segmentation," in Proc. AAAI Conf. on Artif. Intell., 2018.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[33]	O. Ronneberger, P. Fischer, and T. Brox, “U-net: Convolutional networks for biomedical image segmentation," in Proc. Int. Conf. on Medical Image Computing and Computer-Assisted Intervention, Springer, pp. 234-241, 2015.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[34]	L. Yuan, et al., Florence: A New Foundation Model for Computer Vision, arXiv preprint arXiv:2111.11432, 2021.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[35]	B. Xiao, et al., Florence-2: Advancing a Unified Representation for a Variety of Vision Tasks, arXiv preprint arXiv:2311.06242, 2023.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[36]	S. Bai, et al., Qwen2.5-VL Technical Report, arXiv preprint arXiv:2502.13923, 2025. </unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[37]	J. Bai, et al., Qwen-VL: A Versatile Vision-Language Model for Understanding, Localization, Text Reading, and Beyond, arXiv preprint arXiv:2308.12966, 2023.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[38]	A. Hurst, et al., GPT-4o System Card, arXiv preprint arXiv:2410.21276, 2024.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[39]	K. Simonyan and A. Zisserman, "Very deep convolutional networks for large-scale image recognition," in Proc. Int. Conf. on Learning Representations, 2015.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[40]	O. Ronneberger, P. Fischer, and T. Brox, "U-Net: Convolutional networks for biomedical image segmentation," in Proc. Medical Image Computing and Computer-Assisted Intervention, pp. 234-241, 2015.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[41]	J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, You Only Look Once: Unified, Real-Time Object Detection, arXiv PreprintarXiv1506.02640, 2016.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[42]	D. Karatzas et al., "ICDAR 2013 robust reading competition," in Proc. Int. Conf. on Document Anal. and Recognition, pp. 1484-1493, 2013.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[43]	D. Karatzas et al., "ICDAR 2015 competition on robust reading," in Proc. Int. Conf. on Document Anal. and Recognition, pp. 1156-1160, 2015.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[44]	A. Veit, T. Matera, L. Neumann, J. Matas, and S. Belongie, Coco-Text: Dataset and Benchmark for Text Detection and Recognition in Natural Images, arXiv preprint. arXiv160107140, 2016.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[45]	A. Singh, et al., "TextOCR: Towards large-scale end-to-end reasoning for arbitrary-shaped scene text," in Proc. IEEE/CVF Conf. on Computer Vision and Pattern Recognition, pp. 8802-8812, 2021.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[46]	C. K. Ch’ng and C. S. Chan, "Total-text: A comprehensive dataset for scene text detection and recognition," in Proc. IAPR Int. Conf. on Document Anal. and Recognition, pp. 935-942, Kyoto, Japan, 9-11 Nov. 2017.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[47]	L. Yuliang, J. Lianwen, Z. Shuaitao, and Z. Sheng, Detecting Curve Text in the Wild: New Dataset and New Solution, arXiv preprint arXiv:1712.02170, 2017.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[48]	S. Long, S. Qin, Y. Fujii, A. Bissacco, and M. Raptis, "Hierarchical text spotter for joint text spotting and layout analysis," in Pro. of the IEEE/CVF Winter Conf. on Applications of Computer Vision, pp. 903-913, 2024.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[49]	T. Kil, S. Kim, S. Seo, Y. Kim, and D. Kim, "Towards unified scene text spotting based on sequence generation," in Proc. of the IEEE/CVF Conf. on Computer Vision and Pattern Recognition, pp. 15223–15232, 2023.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[50]	A. Gupta, A. Vedaldi, and A. Zisserman, "Synthetic Data for Text Localisation in Natural Images," in Proc. IEEE Conf. on Comp. Vision and Pattern Recognition, 2016. </unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[51]	M. Jaderberg, K. Simonyan, A. Vedaldi, and A. Zisserman, Synthetic Data and Artificial Neural Networks for Natural Scene Text Recognition, arXiv PreprINT. ArXiv14062227, 2014.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[52]	M. Iwamura, et al., "ICDAR2017 robust reading challenge on omnidirectional video,” in Proc. IAPR Int. Conf. on Document Anal. and Recognition, 2017, pp. 1448–1453.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[53]	C. -K. Chng, et al., ICDAR2019 Robust Reading Challenge on Arbitrary-Shaped Text (RRC-ArT), arXiv preprint arXiv1909.07145, 2019.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[55]	W. Wu, et al., "ICDAR 2023 competition on video text reading for dense and small text," in Proc. Int. Conf. on Document Analysis and Recognition, pp. 405-419, 2023.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[56]	Z. Wan, J. Zhang, L. Zhang, J. Luo, and C. Yao, "On vocabulary reliance in scene text recognition," in Proc. of the IEEE/CVF Conf. on Computer Vision and Pattern Recognition, pp. 11425-11434, 2020.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[57]	R. Zhang et al., "ICDAR 2019 robust reading challenge on reading Chinese text on signboard," in Proc. International Conf. on Document Analysis and Recognition, pp. 1577–1581, 2019. </unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[58]	M. Tounsi, I. Moalla, A. M. Alimi, and F. Lebouregois, "Arabic characters' recognition in natural scenes using sparse coding for feature representations," in Proc. 13th Int. Conference on Document Analysis and Recognition, pp. 1036-1040, 2015.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[59]	M. Tounsi, I. Moalla, and A. M. Alimi, "ARASTI: A database for Arabic scene text recognition," in Proc. 1st Int. Workshop on Arabic Script Analysis and Recognition, pp. 140-144, 2017. Asian Conf. on Pattern Recognition, pp. 747-752, 2017.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[61]	S. Sabour, N. Frosst, and G. E. Hinton, "Dynamic routing between capsules," in Proc. Advances in Neural Information Processing 
[60]	M. Jain, M. Mathew, and C. Jawahar, "Unconstrained OCR for Urdu using deep CNN-RNN hybrid networks," in Proc.  4th IAPRSystems, pp. 3856-3866, 2017.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[62]	A. Rahman, A. Ghosh, and C. Arora, "UTRNet: High-Resolution Urdu Text Recognition in Printed Documents," in Proc. Int. Conf. on Document Analysis and Recognition, pp. 305-324, 2023.</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[63]	E. Shabaninia, F. Eslami, A. Afkari-Fahandari, and H. Nezamabadi-pour, "SUT: a new multi-purpose synthetic dataset for Farsi document image analysis," in Proc. 13th Int. Conf. on Computer and Knowledge Engineering, pp. 253-258, 2023.</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[64]	F. Asadi-Zeydabadi, E. Shabaninia, H. Nezamabadi-Pour, and M. Shojaee, "Farsi optical character recognition using a transformer-based model," in Proc. 13th Int. Conf. on Computer and Knowledge Engineering, pp. 293-299, 2023.</unstructured_citation></citation><citation key="ref60"><unstructured_citation>
[65]	M. Mosannafat, F. Taherinezhad, H. Khotanlou, and E. Alighardash, "Farsi text detection and localization in videos and images," in Proc. 9th Iranian Joint Congress on Fuzzy and Intelligent Systems, 6 pp., Bam, Iran, 2-4 Mar. 2022. </unstructured_citation></citation><citation key="ref61"><unstructured_citation>
[66]	A. Salmasi and E. Kabir,"Farsi text in scene: A new dataset," in Proc. 13th Int. Conf. on Computer and Knowledge Engineering, pp. 510-514, Mashhad, Iran, Nov. 2023.</unstructured_citation></citation><citation key="ref62"><unstructured_citation>
[67]	A. Dutta and A. Zisserman, "The VIA annotation software for images, audio and video," in Proc. of the 27th ACM Int. Conf. on Multimedia, New York, NY, USA. doi: 10.1145/3343031.3350535.</unstructured_citation></citation><citation key="ref63"><unstructured_citation>
[68]	T.-Y. Lin et al., "Microsoft COCO: Common objects in context" in Proc. Euro. Conf. on Comp.Vision, pp. 740-755, Milan, Itay, 29 Sept.-4 Oct. 2014.</unstructured_citation></citation><citation key="ref64"><unstructured_citation>
[69]	A. Ramesh, P. Dhariwal, A. Nichol, C. Chu, and M. Chen, Hierarchical Text-Conditional Image Generation with Clip Latents, arXiv Preprint, arXiv220406125, 2022.</unstructured_citation></citation><citation key="ref65"><unstructured_citation>
[70]	J. Achiam et al., GPT-4 Technical Report, arXiv preprint arXiv230308774, 2023.</unstructured_citation></citation><citation key="ref66"><unstructured_citation>
[71]	D. Guo,et al., DeepSeek-R1: Incentivizing Reasoning Capability in LLMs via Reinforcement Learning, arXiv Preprint arXiv250112948, 2025.</unstructured_citation></citation><citation key="ref67"><unstructured_citation>
[72]	G. Team, et al., Gemini: A Family of Highly Capable Multimodal Models, arXiv Preprint, arXiv231211805, 2023.</unstructured_citation></citation><citation key="ref68"><unstructured_citation>
[73]	A. Kirillov et al., "Segment anything," in Proc. of the IEEE/CVF Int. Conf. on Computer Vision, pp. 4015-4026, 2023.</unstructured_citation></citation><citation key="ref69"><unstructured_citation>
[74]	A. Kortylewski, Q. Liu, H. Wang, Z. Zhang, and A. Yuille, "Combining compositional models and deep networks for robust object classification under occlusion," in Proc. IEEE Winter Conf. on Applications of Computer Vision, pp. 1333-1341, 2020.</unstructured_citation></citation><citation key="ref70"><unstructured_citation>
[75]	Z. Raisi and J. Zelek, "Occluded text detection and recognition in the wild," in Proc. 19th Conf. on Robots and Vision, pp. 140-150, Toronto, Canada, May 2022.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>