﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051923</doi_batch_id><timestamp>20260519230600</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>5</month><day>12</day><year>2026</year></publication_date><journal_volume><volume>24</volume></journal_volume><issue>1</issue></journal_issue><journal_article publication_type="full_text"><titles><title>An intelligent technique based on jellyfish algorithm for priority-based task scheduling in IoT/Fog networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Sohrabi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Sakhaei</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Nassiri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>R.</given_name><surname>Mohammadi</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>12</day><year>2026</year></publication_date><pages><first_page>1</first_page><last_page>13</last_page></pages><doi_data><doi>10.66224/ijece.48922.24.1.1</doi><resource>http://ijece.org/en/Article/48922</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/48922</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/48922</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/48922</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/48922</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/48922</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/48922</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/48922</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>مراجع</unstructured_citation></citation><citation key="ref2"><unstructured_citation>[1] 	Salehnia, Taybeh, et al. "An optimal task scheduling method in IoT-Fog-Cloud network using multi-objective moth-flame algorithm." Multimedia Tools and Applications 83.12 (2024): 34351-34372.‏</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[2] 	Shukri, Sarah E., et al. "Enhanced multi-verse optimizer for task scheduling in cloud computing environments." Expert Systems with Applications 168 (2021): 114230.‏</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[3] 	Bezdan, Timea, et al. "Multi-objective task scheduling in cloud computing environment by hybridized bat algorithm." Journal of Intelligent &amp; Fuzzy Systems 42.1 (2022): 411-423.‏</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[4] 	Amer, Dina A., et al. "Elite learning Harris hawks optimizer for multi-objective task scheduling in cloud computing." The Journal of Supercomputing 78.2 (2022): 2793-2818.‏</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[5] 	Fortino, Giancarlo, et al. "Iot platforms and security: An analysis of the leading industrial/commercial solutions." Sensors 22.6 (2022): 2196.‏</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[6] 	Ullah, Inam, et al. "Integration of data science with the intelligent IoT (IIoT): current challenges and future perspectives." Digital Communications and Networks (2024).‏ </unstructured_citation></citation><citation key="ref8"><unstructured_citation>[7] 	Laroui, Mohammed, et al. "Edge and fog computing for IoT: A survey on current research activities &amp; future directions." Computer Communications 180 (2021): 210-231.‏</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[8] 	Milojicic, Dejan. "The edge-to-cloud continuum." Computer 53.11 (2020): 16-25.‏</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[9] 	Bonomi, Flavio, et al. "Fog computing and its role in the internet of things." Proceedings of the first edition of the MCC workshop on Mobile cloud computing. 2012.‏</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[10] 	Mukherjee, Mithun, Lei Shu, and Di Wang. "Survey of fog computing: Fundamental, network applications, and research challenges." IEEE Communications Surveys &amp; Tutorials 20.3 (2018): 1826-1857.‏</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[11] 	Attiya, Ibrahim, et al. "An improved hybrid swarm intelligence for scheduling iot application tasks in the cloud." IEEE Transactions on Industrial Informatics 18.9 (2022): 6264-6272.‏</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[12] 	Lim, JongBeom. "Latency-aware task scheduling for IoT applications based on artificial intelligence with partitioning in small-scale fog computing environments." Sensors 22.19 (2022): 7326.‏</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[13] 	Hussain, Syed Mujtiba, and Gh Rasool Begh. "Hybrid heuristic algorithm for cost-efficient QoS aware task scheduling in fog–cloud environment." Journal of Computational Science 64 (2022): 101828.‏</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[14] 	Mokni, Ibtissem, and Sonia Yassa. "A multi-objective approach for optimizing IoT applications offloading in fog–cloud environments with NSGA-II." The Journal of Supercomputing (2024): 1-39.‏</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[15] 	Attiya, Ibrahim, et al. "An intelligent chimp optimizer for scheduling of IoT application tasks in fog computing." Mathematics 10.7 (2022): 1100.‏</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[16] 	Yin, Zhenyu, et al. "A multi-objective task scheduling strategy for intelligent production line based on cloud-fog computing." Sensors 22.4 (2022): 1555.‏</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[17] 	Available online: https://eucloudedgeiot.eu/ (accessed on 14 February 2023).</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[18] 	Liu, Lindong, et al. "A task scheduling algorithm based on classification mining in fog computing environment." Wireless Communications and Mobile Computing 2018.1 (2018): 2102348.‏</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[19] 	Attar, Ameenabegum H., and Ashok Sutagundar. "A survey on resource management for fog-enhanced services and applications." Int. J. Sci. Res 17.2 (2018): 138.‏</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[20] 	Jing, Weipeng, et al. "QoS-DPSO: QoS-aware task scheduling for cloud computing system." Journal of Network and Systems Management 29 (2021): 1-29.‏</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[21] 	Abohamama, Abdelaziz Said, Amir El-Ghamry, and Eslam Hamouda. "Real-time task scheduling algorithm for IoT-based applications in the cloud–fog environment." Journal of Network and Systems Management 30.4 (2022): 54.‏</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[22] 	Yadav, Ashish Mohan, Kuldeep Narayan Tripathi, and S. C. Sharma. "An enhanced multi-objective fireworks algorithm for task scheduling in fog computing environment." Cluster Computing (2022): 1-16.‏</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[23] 	Bisht, Jyoti, and Venkata Subrahmanyam Vampugani. "Load and cost-aware min-min workflow scheduling algorithm for heterogeneous resources in fog, cloud, and edge scenarios." International Journal of Cloud Applications and Computing (IJCAC) 12.1 (2022): 1-20.‏</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[24] 	Cheng, Feng, et al. "Cost-aware job scheduling for cloud instances using deep reinforcement learning." Cluster Computing (2022): 1-13.‏</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[25] 	Nabi, Said, et al. "AdPSO: adaptive PSO-based task scheduling approach for cloud computing." Sensors 22.3 (2022): 920.‏</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[26] 	Ghafari, Reyhane, and Najme Mansouri. "Cost-aware and energy-efficient task scheduling based on grey wolf optimizer." Journal of Mahani Mathematical Research 12.1 (2023): 257-288.‏</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[27] 	Mangalampalli, Sudheer, Ganesh Reddy Karri, and Ahmed A. Elngar. "An efficient trust-aware task scheduling algorithm in cloud computing using firefly optimization." Sensors 23.3 (2023): 1384.‏</unstructured_citation></citation><citation key="ref29"><unstructured_citation>[28] 	Azizi, Sadoon, et al. "Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach." Journal of network and computer applications 201 (2022): 103333.‏</unstructured_citation></citation><citation key="ref30"><unstructured_citation>[29] 	Arshed, Jawad Usman, and Masroor Ahmed. "Race: resource aware cost-efficient scheduler for cloud fog environment." IEEE Access 9 (2021): 65688-65701.‏</unstructured_citation></citation><citation key="ref31"><unstructured_citation>[30] 	Nikoui, Tina Samizadeh, et al. "Cost-aware task scheduling in fog-cloud environment." 2020 CSI/CPSSI International Symposium on Real-Time and Embedded Systems and Technologies (RTEST). IEEE, 2020.‏</unstructured_citation></citation><citation key="ref32"><unstructured_citation>[31] 	Hussein, Mohamed K., and Mohamed H. Mousa. "Efficient task offloading for IoT-based applications in fog computing using ant colony optimization." IEEE Access 8 (2020): 37191-37201.‏</unstructured_citation></citation><citation key="ref33"><unstructured_citation>[32] 	Arshed, Jawad Usman, et al. "GA‐IRACE: Genetic Algorithm‐Based Improved Resource Aware Cost‐Efficient Scheduler for Cloud Fog Computing Environment." Wireless Communications and Mobile Computing 2022.1 (2022): 6355192.‏</unstructured_citation></citation><citation key="ref34"><unstructured_citation>[33] 	Sun, Yan, Fuhong Lin, and Haitao Xu. "Multi-objective optimization of resource scheduling in fog computing using an improved NSGA-II." Wireless Personal Communications 102 (2018): 1369-1385.‏</unstructured_citation></citation><citation key="ref35"><unstructured_citation>[34] 	Elsedimy, Elsayed, and Fahad Algarni. "MOTS‐ACO: An improved ant colony optimiser for multi‐objective task scheduling optimisation problem in cloud data centres." IET Networks 11.2 (2022): 43-57.‏</unstructured_citation></citation><citation key="ref36"><unstructured_citation>[35] 	Mirmohseni, Seyedeh Maedeh, Chunming Tang, and Amir Javadpour. "FPSO-GA: a fuzzy metaheuristic load balancing algorithm to reduce energy consumption in cloud networks." Wireless Personal Communications 127.4 (2022): 2799-2821.‏</unstructured_citation></citation><citation key="ref37"><unstructured_citation>[36] 	Jangu, Nupur, and Zahid Raza. "Improved Jellyfish Algorithm-based multi-aspect task scheduling model for IoT tasks over fog integrated cloud environment." Journal of Cloud Computing 11.1 (2022): 98.‏</unstructured_citation></citation><citation key="ref38"><unstructured_citation>[37] 	Hazra, Abhishek, et al. "Cooperative transmission scheduling and computation offloading with collaboration of fog and cloud for industrial IoT applications." IEEE Internet of Things Journal 10.5 (2022): 3944-3953.‏</unstructured_citation></citation><citation key="ref39"><unstructured_citation>[38] 	Jangu, Nupur, and Zahid Raza. "Improved Jellyfish Algorithm-based multi-aspect task scheduling model for IoT tasks over fog integrated cloud environment." Journal of Cloud Computing 11.1 (2022): 98.‏</unstructured_citation></citation><citation key="ref40"><unstructured_citation>[39] 	Vispute, Shilpa Dinesh, and Priyanka Vashisht. "Energy-efficient task scheduling in fog computing based on particle swarm optimization." SN Computer Science 4.4 (2023): 391.‏</unstructured_citation></citation><citation key="ref41"><unstructured_citation>[40] 	Bansal, Sumit, and Himanshu Aggarwal. "A hybrid particle whale optimization algorithm with application to workflow scheduling in cloud–fog environment." Decision Analytics Journal 9 (2023): 100361.‏</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Resource Management Method for Fog-DSDN Networks Using Microservices Architecture and Echo State Networks (ESN)</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Payamani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ehsan</given_name><surname>Matinfar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>E.</given_name><surname>Maghami</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Janbozorgi</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>12</day><year>2026</year></publication_date><pages><first_page>14</first_page><last_page>26</last_page></pages><doi_data><doi>10.66224/ijece.49971.24.1.14</doi><resource>http://ijece.org/en/Article/49971</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/49971</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/49971</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/49971</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/49971</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/49971</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/49971</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/49971</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	L. G. F. da Silva, D. F. H. Sadok, and P. T. Endo, "Resource optimizing federated learning for use with IoT: A systematic review," Journal of Parallel and Distributed Computing, vol. 175, pp. 92-108, May 2023.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. Li, et al., "Deep reinforcement learning based controller placement and optimal edge selection in SDN-based multi-access edge computing environments," Journal of Parallel and Distributed Computing, vol. 193, Article ID: 104948, Nov. 2024.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	X. Zhou, J. Yang, Y. Li, S. Li, and Z. Su, "Deep reinforcement learning-based resource scheduling for energy optimization and load balancing in SDN-driven edge computing," Computer Communications, vol. 226-227, Article ID: 107925, Oct. 2024.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Mahmoudi, B. Barekatain, Z. Beheshti, A. A. Quintana, and M. R. Velayati, "A new method for load balancing in DSDN-Based data centers using adaptive clustering and normal cone-based estimation approaches," Expert Systems with Applications, Article ID: 127606, Jun. 2025.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	F. Briatore and M. Braggio, "Edge, Fog and Cloud Computing framework for flexible production," Procedia Computer Science, vol. 253, pp. 2206-2218, 2025.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. Jin, "An effective method for prospective scheduling of tasks in cloud-fog computing with an energy consumption management approach based on Q-learning," Engineering Applications of Artificial Intelligence, vol. 151, Article ID: 110705, Jul. 2025.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. M. Rahmani, et al., "Optimizing task offloading with metaheuristic algorithms across cloud, fog, and edge computing networks: A comprehensive survey and state-of-the-art schemes," Sustainable Computing: Informatics and Systems, vol. 45, Article ID: 101080, Jan. 2025.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	E. Matinfar, M. Mahmoudi, and B. Barekatain, "ELDM-EDSDN: A novel resource allocation method in edge-DSDN-based networks using improved manifold approach," The Journal of Supercomputing, vol. 81, no. 14, Article ID: 1341, 2025.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Kabeer, I. Yusuf, and N. A. Sufi, "Distributed software defined network-based fog to fog collaboration scheme," Parallel Computing, vol. 117, Article ID: 103040, Sept.  2023.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	I. Ahammad, M. A. R. Khan, and Z. U. Salehin, "QoS performance enhancement policy through combining fog and SDN," Simulation Modelling Practice and Theory, vol. 109, Article ID: 102292, May 2021.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. O. Ogundoyin and I. A. Kamil, "Optimization techniques and applications in fog computing: An exhaustive survey," Swarm and Evolutionary Computation, vol. 66, Article ID: 100937, Oct.  2021.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Al Muhtadi, R. A. Alamri, F. A. Khan, and K. Saleem, "Subjective logic-based trust model for fog computing," Computer Communications, vol. 178, pp. 221-233, Oct. 2021.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. J. Kadhim, S. A. H. Seno, J. I. Naser, and J. Hajipour, "DMPFS: Delay-efficient multicasting based on parked vehicles, fog computing and SDN in vehicular networks," Vehicular Communications, vol. 36, Article ID: 100488, Aug. 2022.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	K. A. Darabkh, B. Z. Alkhader, A. F. Khalifeh, F. Jubair, and M. Abdel-Majeed, "ICDRP-F-SDVN: An innovative cluster-based dual-phase routing protocol using fog computing and software-defined vehicular network," Vehicular Communications, vol. 34, Article ID: 100453, Apr. 2022.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	E. Hosseini, M. Nickray, and S. Ghanbari, "Optimized task scheduling for cost-latency trade-off in mobile fog computing using fuzzy analytical hierarchy process," Computer Networks, vol. 206, Article ID: 108752, Apr. 2022.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Azizi, M. Shojafar, J. Abawajy, and R. Buyya, "Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach," Journal of Network and Computer Applications, vol. 201, Article ID: 103333, May 2022.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	B. Sarma, R. Kumar, and T. Tuithung, "Machine learning enabled network and task management in SDN based Fog architecture," Computers and Electrical Engineering, vol. 108, Article ID: 108705, May 2023.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. M. Islam, F. Ramezani, H. Y. Lu, and M. Naderpour, "Optimal placement of applications in the fog environment: A systematic literature review," Journal of Parallel and Distributed Computing, vol. 174, pp. 46-69, Apr. 2023.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Z. H. Ali, N. El-Rashidy, M. A. Elhosseini, and S. M. Ayyad, "SDN-based reliable emergency message routing schema using Digital Twins for adjusting beacon transmission in VANET," Journal of Network and Computer Applications, vol. 230, Article ID: 103944, Oct. 2024.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	E. Matinfar, et al., "FABLSTM: Aan optimal resource allocation in SDVN networks with contextual variables integration," The Journal of Supercomputing, vol. 81, no. 15, Article ID: 1454, Oct. 2025.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	D. Adanza, et al., "Enabling traffic forecasting with cloud-native SDN controller in transport networks," Computer Networks, vol. 250, Article ID: 110565, Aug. 2024.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Lightweight Hybrid Framework for IoT Security Using Optimized Random Forest and Adaptive Feature Selection in Edge-Cloud Architecture</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohsen</given_name><surname>Ashrafi</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>12</day><year>2026</year></publication_date><pages><first_page>38</first_page><last_page>48</last_page></pages><doi_data><doi>10.66224/ijece.51262.24.1.38</doi><resource>http://ijece.org/en/Article/51262</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/51262</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/51262</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/51262</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/51262</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/51262</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/51262</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/51262</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Hasan, M. Islam, and I. Islam, "Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches," Internet of Things, vol. 7Article ID: 100059, Jan. 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	H. Mazarei, M. Dadvar, and M. H. Atabakzadeh, "Distributed denial of service attacks detection in Internet of Things using the majority voting approach," J. Commun. Eng., vol. 13, no. 49, pp.23-48, Jun. 2023.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Sharifi and S. Gheisari, "Design of anomaly-bbased intrusion detection system using support vector machine and grasshopper optimization algorithm in IoT," J. Commun. Eng., vol. 12, no. 46, pp. 42-58, May 2023.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Eghbali, M. R. Mollakhalili Meybodi, and M. H. Atabakzadeh, "Detection of DDoS attacks in SDN switches with deep learning and swarm intelligence approach," J. South. Commun. Eng., vol. 13, no. 49, pp. 23-48, Apr. 2024.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	B. M. Pampapathi, M. Guptha, and M. S. Hema, "Towards an effective deep learning-based intrusion detection system in the Internet of Things," Telecommun. Informatics, vol. 7Article ID: 100009, Mar. 2022.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	F. Pishdad and R. Ebrahimi Atani, "Prevention and detection of botnet attacks in IoT using ensemble learning methods," Monadi: J. Cyberspace Secur., vol. 13, no. 2, pp. 45-55, Feb. 2024.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
 [7]	M. Naji, H. Zougagh, Y. Saadi, H. Garmani, and Y. Oukissou, "Attack and anomaly detection in IoT sensors using machine learning approaches," in Proc. 23rd Int. Conf. on Intelligent Systems Design and Applications, pp. 331-340, Held Online, 11-13 Dec. 2023.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	K. Mithran and C. Gopi, "Anomaly detection in IoT sensor networks using machine learning," in Proc. 22nd Int. Conf. on Intelligent Systems Design and Applications, pp. 331-340, Held Online, 12-14 Dec. 2022.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	R. Thamaraiselvi and S. A. Selva Mary, "Attack and anomaly detection in IoT networks using machine learning," Int. J. Comput. Sci. Mob. Comput., vol. 9, no. 10, pp. 95-103, Nov. 2020.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Shaikh and G. Negalur, "Attack and anomaly detection in IoT sites using machine learning techniques," Int. J. Res. Appl. Sci. Eng. Technol., vol. 10, no. 7, Article ID: 3029, Aug. 2022.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. A. Obaidli, D. Mansour, S. M. Abdulhamid, N. B. Halima, and A. Al-Ghushami, "Machine learning approach to anomaly detection attacks classification in IoT devices," in Proc. 1st Int. Conf. Adv. Innovations Smart Cities, 6 pp., Jeddah, Saudi Arabia. 23-25 Jan. 2023.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	C. Cyrus, IoT Ccyberattacks escalate in 2021, according to Kaspersky, IoT World Today, www.iotworldtoday.com/security/iotcyberattacks-escalate-in-2021-according-to-kaspersky, Sept. 2021.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	R. Al Attar, M. alkasassbeh, M. Al-Dala’ien, and M. Alohaly, Detecting Anomalies in IoT Devices: A Machine Learning-Based Solution, arXiv preprint arXiv:2404.0499, Oct. 2024.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	V. Prakash, O. Odedina, A. Kumar, L. Garg, and S. Bawa, "A secure framework for the Internet of Things anomalies using machine learning," Discover Internet of Things, vol. 4, Article ID: 33, 2024.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	I. Alrashdi, et al., "AD-IoT: Anomaly detection of IoT cyberattacks in smart city," in Proc. IEEE 9th Annual Computing and Communication Workshop Conf., pp. 305-310, Las Vegas, Nevada, USA, 7-9 Jan. 2019.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	P. K. Yadav and A. C. Kumar, "Analysis of machine learning model for anomaly and attack detection in IoT devices," in Proc. 4th Int. Conf. on Inventive Research in. Computing Applications, pp. 387-392, Coimbatore, India, 21-23 Sept. 2022.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Khan and M. Alkhathami, "Anomaly detection in IoT-based healthcare: machine learning for enhanced security," Scientific Reports, vol. 14, no. 1, Article ID: 5872, Mar. 2024.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	T. P. Jayesh et al., "A Hybrid Machine Learning Approach to Anomaly Detection in Industrial IoT," in Proc. 3rd Int. Conf. on Advances in Computing, Communication, Embedded and Secure Systems, 4 pp., Kalady, India, 18-20 May 2023.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	E. Altulaihan, M. A. Almaiah, and A. Aljughaiman, "Anomaly detection IDS for detecting DoS attacks in IoT networks based on machine learning algorithms," Sensors, vol. 24, no. 2, Article ID: 713, Jun. 2024.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	B. B. Gupta, et al., "A novel hybrid convolutional neural network- and gated recurrent unit-based paradigm for IoT network traffic attack detection in smart cities," Sensors, vol. 23, no. 21, Article ID: 8686, Sept. 2023.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. A. Diro and N. Chilamkurti, "Distributed attack detection scheme using deep learning approach for Internet of Things," Future Gener. Comput. Syst., vol. 82, pp. 761–768, Dec. 2018.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	I. T. Al-Halboosi, B. M. Elbagoury, S. El-Regaily, and E.-S. M. El-Horbaty, "A hybrid-transformer-based cyber-attack detection in IoT networks," Int. J. Interact. Mob. Technol., vol. 18, no. 14, pp. 90-102, May 2024.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	H. Kamal and M. Mashaly, "Enhanced hybrid deep learning models-based anomaly detection method for two-stage binary and multi-class classification of attacks in intrusion detection systems," Algorithms, vol. 18, no. 2, Article ID: 69, Jul. 2025.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. O. Pahl and F. X. Aubet, "All eyes on you: Distributed multi- dimensional IoT microservice anomaly detection," in Proc. Int. Conf. on Network and Service Management, pp. 72-80, Rome, Italy, 5-9 Nov. 2018.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Semi-Supervised Learning Framework for Accurate Test Case Classification Using Language Embeddings and Semantic Text Features</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>MohammadHoseein </given_name><surname>Parvaneh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>maryam</given_name><surname>nooraei </surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>12</day><year>2026</year></publication_date><pages><first_page>58</first_page><last_page>66</last_page></pages><doi_data><doi>10.66224/ijece.51312.24.1.58</doi><resource>http://ijece.org/en/Article/51312</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/51312</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/51312</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/51312</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/51312</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/51312</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/51312</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/51312</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Devlin, M.-W. Chang, K. Lee, and K. Toutanova, "BERT: Pre-training of deep bidirectional transformers for language understanding," in Proc The 16th Annual Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, vol. 1, pp. 4171-4186, 16 pp., New Orleans, LA, USA, 1-6 Jun. 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	X. Zhang, J. Zhao, and Y. LeCun, "Character-level convolutional networks for text classification," in Proc. of the 28th Annual Conf. on Neural Information Processing Systems, pp. 560-567, Montreal, Canada, 8-13 Dec. 2015.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	T. Joachims, "Transductive inference for text classification using support vector machines," in Proc. of the 16th Int. Conf. on Machine Learning, pp. 200-209, Bled, Slovenia, 27-30 Jun. 1999. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	K. Bennett and A. Demiriz, "Semi-supervised support vector machines," in Proc. of the 12th Int. Conf. on Neural Information Processing Systems, pp. 368-374, Denver, CO, USA, 30 Nov.-5 Dec. 1998.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	D. -H. Lee, "Pseudo-label: The simple and efficient semi-supervised learning method for deep neural networks," in Workshop on Challenges in Representation Learning, p. 896, Atlanta, GA, USA, 2013.</unstructured_citation></citation><citation key="ref6"><unstructured_citation> 
[6]	X. Zhu, J. Lafferty, and Z. Ghahramani, "Combining active learning and semi-supervised learning using gaussian fields and harmonic functions," in Proc. ICML 2003 Workshop on the Continuum from Labeled to Unlabeled Data in Machine Learning and Data Mining, vol. 3, pp. 58-65, Washington, DC, USA, 21-21 Aug. 2003.</unstructured_citation></citation><citation key="ref7"><unstructured_citation> 
[7]	O. Chapelle, B. Schölkopf, and A. Zien, "A discussion of semi-supervised learning and transduction," in Semi-Supervised Learning: MIT Press, pp. 473-478, 2006.</unstructured_citation></citation><citation key="ref8"><unstructured_citation> 
[8]	Y. Liu, et al., Roberta: A Robustly Optimized Bert Pretraining Approach, arXiv preprint arXiv:1907.11692, 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation> 
[9]	P. He, X. Liu, J. Gao, and W. Chen, Deberta: Decoding-Enhanced Bert with Disentangled Attention, arXiv preprint arXiv: 2006.03654, 2020.</unstructured_citation></citation><citation key="ref10"><unstructured_citation> 
[10]	O. Levy and Y. Goldberg, "Dependency-based word embeddings," in Proc. of the 52nd Annual Meeting of the Association for Computational Linguistics, vol. 2: Short Papers, pp. 302-308, Baltimore, MD, USA, 23-24 Jun. 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>  
[11]	Q. Xie, M. -T. Luong, E. Hovy, and Q. V. Le, "Self-training with noisy student improves Imagenet classification," in Proc. of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 10687-10698, Seattle, WA, USA, 13-19 Jun. 2020.</unstructured_citation></citation><citation key="ref12"><unstructured_citation> 
[12]	A. Oliver, A. Odena, C. A. Raffel, E. D. Cubuk, and J. Goodfellow, "Realistic evaluation of deep semi-supervised learning algorithms," in Proc. of the 32nd Int. Conf. on Neural Information Processing Systems, pp. 3239-3250, Montréal, Canada, 3-8 Dec. 2018.</unstructured_citation></citation><citation key="ref13"><unstructured_citation> 
[13]	F. Pedregosa, et al., "Scikit-learn: Machine learning in Python," Journal of Machine Learning Research, vol. 12, pp. 2825-2830, 2011.</unstructured_citation></citation><citation key="ref14"><unstructured_citation> 
[14]	D. Berthelot, et al., "Mixmatch: A holistic approach to semi-supervised learning," in Proc. of the 33rd Int. Conf. on Neural Information Processing Systems, pp. 5049-5059, Montréal, Canada, 8-14 Dec. 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation> 
[15]	M. N. J. A. S. E. Abadeh, "Knowledge-enhanced software refinement: leveraging reinforcement learning for search-based quality engineering," Automated Software Engineering, vol. 31, Article ID: 57, 2024.</unstructured_citation></citation><citation key="ref16"><unstructured_citation> 
[16]	A. Radford, et al., "Language models are unsupervised multitask learners," OpenAI Blog, vol. 1, no. 8, p. 9, 2019.</unstructured_citation></citation><citation key="ref17"><unstructured_citation> 
[17]	S. Ruder, M. E. Peters, S. Swayamdipta, and T. Wolf, "Transfer learning in natural language processing," in Proc. of the 2019 Conf. of the North American Chapter of the Association for Computational Linguistics: Tutorials, pp. 15-18, Florence, Italy, 28 Jul.-2 Aug. 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation> 
[18]	G. Quétant, P. Molchanov, and S. J. Voloshynovskiy, TwinTURBO: Semi-Supervised Fine-Tuning of Foundation Models via Mutual Information Decompositions for Downstream Task and Latent Spaces, arXiv preprint arXiv:2503.07851, 2025.</unstructured_citation></citation><citation key="ref19"><unstructured_citation> 
[19]	H. Chen, W. Han, and S. Poria, "SAT: Improving semi-supervised text classification with simple instance-adaptive self-training," in Proc. of the Findings of the Association for Computational Linguistics, pp. 6141-6146, Dublin, Ireland, 22-27 May 2022.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>  
[20]	E. Kotei and R. J. I. Thirunavukarasu, "A systematic review of transformer-based pre-trained language models through self-supervised learning," Information, vol. 14, no. 3, Article ID: 187, Mar. 2023.</unstructured_citation></citation><citation key="ref21"><unstructured_citation> 
[21]	W. Yang, R. Zhang, J. Chen, and J. Sheng, "Calibrating Pseudo-Labeling with Class Distribution for Semi-supervised Text Classification," in Proc. of the 2025 Conf. on Empirical Methods in Natural Language Processing, pp. 13026-13039, Suzhou, China, 4-9 Nov.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>  2025. 
[22]	I. Sirbu, R. -A. Popovici, C. Caragea, Ș. Trăușan-Matu, and T. Rebedea, "MultiMatch: Multihead consistency regularization matching for semi-supervised text classification," in Proc. of the Conf. on Empirical Methods in Natural Language Processing, pp. 2792-2808, Suzhou, China, 4-9 Nov. 2025.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>  
[23]	J. M. Duarte and L. A. Berton, "A review of semi-supervised learning for text classification," Artificial Intelligence Review, vol. 56, pp. 9401-9469, 2023.</unstructured_citation></citation><citation key="ref24"><unstructured_citation> 
[24]	K. Sohn, et al., "Fixmatch: Simplifying semi-supervised learning with consistency and confidence," in Proc. 34th Conf. on Neural Information Processing Systems, pp. 596-608, Vancouver, Canada, 6-12 Dec. 2020.</unstructured_citation></citation><citation key="ref25"><unstructured_citation> 
[25]	A. Hatefi, X. -S. Vu, M. Bhuyan, and F. Drewes, The Efficiency of Pre-training with Objective Masking in Pseudo Labeling for Semi-Supervised Text Classification, arXiv preprint arXiv:2505.06624, 2025.</unstructured_citation></citation><citation key="ref26"><unstructured_citation> 
[26]	S. Cheng, W. Chen, W. Liu, and H. Qu, "Improving lightweight semi-supervised text classification via teacher intervention," Applied Soft Computing, vol. 184, pt. B, Article ID: 113844, Dec. 2025.</unstructured_citation></citation><citation key="ref27"><unstructured_citation> 
[27]	Y. Grandvalet and Y. Bengio, "Semi-supervised learning by entropy minimization," in Proc. of the 18th Int. Conf. on Neural Information Processing Systems, pp. 529-536, Vancouver, Canada, 13-16, Dec. 2004.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Design a Novel Emotion Assessment Approach for Cancer Care Based on Large Language Models</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>N.</given_name><surname>Fareghzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Ghobadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>P.</given_name><surname>Rahmani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Bazargani</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>12</day><year>2026</year></publication_date><pages><first_page>27</first_page><last_page>37</last_page></pages><doi_data><doi>10.66224/ijece.51872.24.1.27</doi><resource>http://ijece.org/en/Article/51872</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/51872</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/51872</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/51872</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/51872</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/51872</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/51872</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/51872</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	B. Pang and L. Lee, "Opinion mining and sentiment analysis," Foundations and Trends in Information Retrieval, vol. 2, no. 1-2, pp. 1-135, 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. Winman, "Health psychology," Journal of Philosophy and Theology, vol. 9, no. 33-34, pp. 109-129, May 2004.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	R. S. Lazarus and S. Folkman, Stress, Appraisal, and Coping, Springer Publishing Company, 1984.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	A. Krebber, et al., "Prevalence of depression in cancer patients: A meta‐analysis of diagnostic interviews and self‐report instruments," Psycho‐Oncology, vol. 23, no. 2, pp. 121-130, Feb. 2014.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	C. Strapparava, "WordNet-Affect: an affective extension of WordNet," in Proc. of the 4th Int. Conf. on Language Resources and Evaluation, pp. 1083-1086, Lisbon, Portugal, 26-28 May 2004.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Baccianella, A. Esuli, and F. Sebastiani, "Sentiwordnet 3.0: An enhanced lexical resource for sentiment analysis and opinion mining," in Proc. of the 7th Int. Conf. on Language Resources and Evaluation, pp. 2200-2204, Valletta, Malta, 17-23 May 2010.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. Seal, U. Roy, and R. Basak, "Sentence-level emotion detection from text Based on semantic rules," in Information and Communication Technology for Sustainable Development, Advances in Intelligent Systems and Computing, vol. 933, pp. 423-430, Jul. 2020.</unstructured_citation></citation><citation key="ref8"><unstructured_citation> 
[8]	M. Bazargani, N. Fareghzadeh, M. Afzali, S. Karimi, "A hybrid cumulative knowledge framework for friend recommendation in social networks", International Journal of Nonlinear Analysis and Applications, vol. 17, no. 1, pp. 43-54, Jan. 2026.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	L. Wikarsa and S. N. Thahir, "A text mining application of emotion classifications of Twitter's users using Naïve Bayes method," in Proc. 1st. Int. Conf. on Wireless and Telematics, 6 pp., Manado, Indonesia, 17-18 Nov. 2015.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Yazdani, et al., "Use of sentiment analysis for capturing hospitalized cancer patients' experience from free-text comments in the Persian language." BMC Medical Informatics and Decision Making, vol.  23, no. 1, Article ID: 275, Dec. 2023.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Y. K. Meena, P. M. Kumar, V. V. Kumar., "Classification of online patient reviews based on effectiveness using machine learning algorithms," in Proc. 3rd Int. Conf. on Trends in Electronics and Informatics, pp. 838-842, Apr. 2019.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	N. Bahrawi., "Sentiment analysis using random forest algorithm-online social media based," Journal of Information Technology and Its Utilization, vol. 2, no. 2, pp. 29-33, Dec. 2019.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	L. Breiman, "Random Forests," Machine Learning, vol. 45, no. 1, pp. 5-32, Oct. 2001.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	س. ذ. هاشمی‌پور، "تشخیص سرطان سینه با استفاده از الگوریتم جنگل تصادفی،" هشتمین کنگره ملی تازه‌های مهندسی برق و کامپیوتر ایران، 6 صص.، تهران، ايران، 28-27 اردیبهشت 1400.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	T. M. Cover and P. E. Hart, "Nearest neighbor pattern classification," IEEE Trans. on Information Theory, vol. 13, no. 1, pp. 21-27, Jan. 1967.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. D. W. Sumari, A. F. Huda, and M. A. Fauzi, "Sentiment analysis of patient’s satisfaction in health services using k-nearest neighbor and Chi-Square," Journal of Computer Science, vol. 17, no. 1, pp. 57-65, Jan. 2021.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	ن. فارغ¬زاده، م. بازرگانی  ن. جعفری، "تشخیص سرطان سینه با استفاده از الگوریتم جنگل تصادفی،" اسلام شناسی و قرآن پژوهی در جهان معاصر، شناسه مقاله: e734628، بهمن 1404.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	T. Young, D. Hazarika, S. Poria, and E. Cambria, "Recent trends in deep learning based natural language processing," IEEE Computational Intelligence Magazine, vol. 13, no. 3, pp. 55-75, Aug. 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Y. Kim, "Convolutional neural networks for sentence classification," in Proc. of the 2014 Conf. on Empirical Methods in Natural Language Processing, pp. 1746-1751, Doha, Qatar, 25-29 Oct. 2014.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Hochreiter and J. Schmidhuber, "Long short-term memory," Neural Computation, vol. 9, no. 8, pp. 1735-1780, Nov. 1997.
[21]	K. Cho, et al., "Learning phrase representations using RNN encoder-decoder for statistical machine translation in Proc. of the Conf. on Empirical Methods in Natural Language Processing, pp. 1724-1734, Doha, Qatar, 25-29 Oct. 2014.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	C. Wang, J. Yang, M. Yu, L. Lv, and X. Wang, "A hybrid CNN-LSTM model for sentiment analysis of online reviews," in Proc. of the 12th Int. Conf. on Intelligent Computation Technology and Automation, pp. 248-252, Xiangtan, China, 26-27 Oct. 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	B. K. Crannell, E. Clark, C. C. Jones, and D. G. T. III, "Characterizing cancer-related patient-reported comments on Twitter," in Proc. of the IEEE Int. Conf. on Healthcare Informatics, pp. 526-532, Chicago, IL, USA, 4-7 Oct. 2016.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	A. C. Sosea and C. Caragea, "CancerEmo: A dataset for fine-grained emotion detection," in Proc. of the 28th Int. Conf. on Computational Linguistics, pp. 5987-6000, Barcelona, Spain, 8-13 Dec. 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	A. Vaswani, et al., "Attention is all you need," in Proc. of the 31st Annual Conf. on Neural Information Processing Systems, pp. 5998-6008, Long Beach, CA, USA, 4-9 Dec. 2017.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	J. Devlin, M. W. Chang, K. Lee, and K. Toutanova, "BERT: Pre-training of deep bidirectional transformers for language understanding," in Proc. of the Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 4171-4186, Minneapolis, MN, USA, 2-7 Jun. 2019.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	A. Radford, J. Wu, R. Child, D. Luan, D. Amodei, and I. Sutskever, "Language models are unsupervised multitask learners," OpenAI Blog, vol. 1, no. 8, 2019.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	J. Lee, et al., "BioBERT: a pre-trained biomedical language representation model for biomedical text mining," Bioinformatics, vol. 36, no. 4, pp. 1234-1240, Feb. 2020.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	Z. Wang, K. E. Daniel, L. E. Barnes, and P. I. Chow, CALLM: Understanding Cancer Survivors' Emotions and Intervention Opportunities via Mobile Diaries and Context-Aware Language Models, arXiv preprint arXiv:2503.10707, 2025.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	H. Guo, Y. Zhang, and J. Luo, “ClinicalBERT for sentiment analysis and entity extraction in electronic health records,” IEEE Journal of Biomedical and Health Informatics, vol. 27, no. 4, pp. 1821-1832, Apr. 2023.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	A. Allam, G. T. Jones, K. E. Stewart, and D. J. L. Jones, "Sentiment analysis of clinical narratives to identify patients with depression and anxiety: A systematic review," JMIR Medical Informatics, vol. 9, no. 7, Article ID: e25860, Jul. 2021.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	J. Li, R. Wang, and S. Zhao, "A transformer-based multi-task framework for sentiment analysis in digital health applications," Expert Systems with Applications, vol. 201, Article ID: 117091, Sept. 2022.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	H. Sharifi, H. Faili, and M. Asad, "Challenges and opportunities in Persian natural language processing," Journal of Signal and Data Processing, vol. 16, no. 1, pp. 3-28, Mar. 2019.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	M. Rasooli, M. Kouhpaee, and O. Fehresti, "Linguistic challenges of Persian-English machine translation," in Proc. of the 13th Conf. of the European Chapter of the Association for Computational Linguistics, pp. 24-33, Avignon, France, 23-27 Apr. 2012.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	A. Roshanfekr, M. A. M. Abadi, and S. A. Mirroshandel, "Deep learning for sentiment analysis of Persian texts," in Proc.  3rd Int. Conf. on Web Research, pp. 101-106, Tehran, Iran, 19-20 Apr. 2017.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	H. Asgarian, H. S. Aghdasi, and M. H. Sadreddini, "ArmanEmo: A New Dataset for Emotion Detection in Persian Texts," in Proc. of the 5th Int. Conf. on Web Research, pp. 136-141, Tehran, Iran, 24-25 Apr. 2019.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	M. Yazdani, A. R. Hamidi, and S. Kohan, "Sentiment analysis of hospitalized patients' comments in Persian using machine learning," Journal of Health and Biomedical Informatics, vol. 10, no. 2, pp. 123-134, Sept. 2023.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	S. M. H. Ghavanini, M. R. H. Ghavanini, and A. M. E. Moghadam, "Sentiment analysis of Persian social media texts: A survey," in Proc. of the 26th Int. Computer Conf. Computer Society of Iran, 6 pp., Tehran, Iran, 3-4 Mar. 2021.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	E. Bagheri, M. H. Saraee, and F. de la Prieta, "Challenges of sentiment analysis in informal Persian texts: a survey," Artificial Intelligence Review, vol. 55, no. 1, pp. 1-36, Jan. 2022.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[40]	H. Sharifi, H. Faili, and M. Asad, "A survey on the state of resources and tools for Persian natural language processing," Journal of Advances in Computer Research, vol. 11, no. 1, pp. 15-32, Feb. 2020.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[41]	A. Jafer, "A survey on sentiment analysis for low-resource languages," ACM Trans. on Asian and Low-Resource Language Information Processing, vol. 20, no. 4, Article ID: 65, Jul. 2021.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[42]	R. Plutchik, "The nature of emotions: Human emotions have deep evolutionary roots, a fact that may explain their complexity and provide tools for clinical practice," American Scientist, vol. 89, no. 4, pp. 344-350, Jul./Aug.  2001.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Multi-Objective Metaheuristic Approach for Improving Coverage and Connectivity in Wireless Sensor Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Basirnezhad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Houshmand</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. A.</given_name><surname>Hosseini</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Jalali</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>12</day><year>2026</year></publication_date><pages><first_page>49</first_page><last_page>57</last_page></pages><doi_data><doi>10.66224/ijece.52048.24.1.49</doi><resource>http://ijece.org/en/Article/52048</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/52048</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/52048</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/52048</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/52048</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/52048</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/52048</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/52048</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Amutha, S. Sharma, and J. Nagar,"WSN Strategies based on sensors, deployment, sensing models, coverage and energy efficiency: Review, approaches and open issues," Wireless Personal Communications, vol. 111, no. 2, pp. 1089-1115, Oct. 2020.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. So-In, T. G. Nguyen, and N.G. Nguyen, "An efficient coverage hole-healing algorithm for area-coverage improvements in mobile sensor networks," Peer-to-Peer Networking and Applications, vol. 12, no. 3, pp. 541-552, Aug. 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	S. Abdollahzadeh, and N. J. Navimipour, "Deployment strategies in the wireless sensor network: A comprehensive review," Computer Communications, vol. 91-92, pp. 1-16, Oct. 2016.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	V. Chowdary and T. Bera, "Types of coverage in wireless sensor network: A survey," vol. 8, no. 4, pp. 463-467, Feb. 2022.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	N. Saadi, et al., "Maximum lifetime target coverage in wireless sensor networks," Wireless Personal Communications, vol.  111, no. 3, pp. 1525-1543, Jul. 2020.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Katti, "Target coverage in random wireless sensor networks using cover sets," Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 3, pp. 734-746, Mar. 2022.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H.T.T. Binh, et al., "Metaheuristics for maximization of obstacles constrained area coverage in heterogeneous wireless sensor networks, "Applied Soft Computing, vol. 86, Article ID: 105939, Nov. 2020.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Priyadarshi, B. Gupta, and A. Anurag, "Wireless sensor networks deployment: A result oriented analysis," Wireless Personal Communications, vol. 113, no. 2, pp. 843-866, 2020.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	L. Kong, et al., "Surface coverage in sensor networks," IEEE Trans. on Parallel and Distributed Systems, vol. 25, no. 1, pp. 234-243, Jan. 2014. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	H. M. Ammari, "Connected k-coverage in two-dimensional wireless sensor networks using hexagonal slicing and area stretching," Journal of Parallel and Distributed Computing, vol. 153, no. 2, pp. 89-109, Jul. 2021.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Al-Turjman, F.M., H.S. Hassanein, and M. Ibnkahla, "Quantifying connectivity in wireless sensor networks with grid-based deployments," Journal of Network and Computer Applications, vol. 36, no. 1, pp. 368-377, Jan. 2013.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Liu, Y., et al., "A virtual square grid-based coverage algorithm of redundant node for wireless sensor network," Journal of Network and Computer Applications, vol. 36, no. 2, pp. 811-817, Mar. 2013. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	F. Abbasi, A. Mesbahi, and J.M. Velni, "A new voronoi-based blanket coverage control method for moving sensor networks," IEEE Trans. on Control Systems Technology, vol. 27, no. 1, pp. 409-417, Mar. 2019.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Boukerche and X. Fei, "A voronoi approach for coverage protocols in wireless sensor networks," in Proc. IEEE Global Telecommunications Conf., vol. 5, pp. 5190-5194, Washington, DC, USA, 26-30 Nov. 2007. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Fortune, "Voronoi diagrams and DELAUNAY triangulations," in Computing in Euclidean Geometry, pp. 225-265, World Scientific Publishing, 1995. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. Jiang, Z. Song, H. Zhang, and W. Dou,"Voronoi-based improved algorithm for connected coverage problem in wireless sensor networks," in Proc. of the 2005 Int. Conf. on Embedded and Ubiquitous Computing, pp. 224-233, Nagasaki, Japan, 6-9 Dec. 2005.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	X. Deng, et al., "An optimized node deployment solution based on a virtual spring force algorithm for wireless sensor network applications," Sensors, vol. 19, no. 8, Article ID: 1817, Sept. 2019. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	[18]	Y. Li, B. Zhang, and S. Chai, "An energy balanced-virtual force algorithm for mobile-WSNs," in Proc. IEEE Int. Conf. on Mechatronics &amp; Automation, Beijing, China, pp. 1779-1784, 2-5 Aug. 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	Liu, S., R. Zhang, and Y. Shi, "Design of coverage algorithm for mobile sensor networks based on virtual molecular force," Computer Communications, vol. 150, pp. 269-277, Jan. 2020.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Wang, et al., "A virtual force algorithm-Lévy-embedded grey wolf optimization algorithm for wireless sensor network coverage optimization," Sensors, vol. 19, no. 12, Article ID:2735, Sept. 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	X. Wang, S. Wang, and D. Bi, "Virtual force-directed particle swarm optimization for dynamic deployment in wireless sensor networks," in Proc. Int. Conf. on Intelligent Computing, pp. 292-303, Qingdao, China, 21-24 Aug. 2007.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	C. C. Yang and J. H. Wen, "A hybrid local virtual force algorithm for sensing deployment in wireless sensor network," in Proc. 7th Int. Conf. on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 617-621, Taichung, Taiwan, 3-5 Jul 2013.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Y. Yao, et al., "Coverage enhancement strategy for WSNs based on virtual force-directed ant lion optimization algorithm," IEEE Sensors Journal, vol. 21, no. 17, pp. 19611-19622, Oct. 2021.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Zou, Y. and K. Chakrabarty, "Sensor deployment and target localization in distributed sensor networks, "ACM Trans. Embeded Computer Systems, vol. 3, no. 1, pp. 61-91, Feb. 2004.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	K. Mougou, et al., "Redeployment of randomly deployed wireless mobile sensor nodes," in Proc. IEEE 76th Vehicular Technology Conf. VTC Fall, 5 pp., Québec, Canada, 3-6 Sept. 2012.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	X. Yu, et al., "A node deployment algorithm based on Van Der Waals force in wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 9, no. 10, Article ID: 505710, 2013.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	M. Song, L. Yong, W. Li, and T. A. Gulliver, "Improving wireless sensor network coverage using the VF-BBO algorithm," in Proc. IEEE Pacific Rim Conf. on Communications, Computers and Signal Processing, pp. 318-321, Victoria, Canada, 27-29 Aug. 2013.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	J. Xie, et al., "A sensor deployment approach using improved Virtual force algorithm based on area intensity for multisensor networks," Mathematical Problems in Engineering, vol. 2019, Article ID: 8015309, Mar. 2019.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	X. Qi, et al., "A wireless sensor node deployment scheme based on embedded virtual force resampling particle swarm optimization algorithm," Applied Intelligence, vol. 52, no.7, pp. 7420-7441, Sept. 2022.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	Q. Wen, et al., "Coverage enhancement algorithm for WSNs based on vampire bat and improved virtual force," IEEE Sensors Journal, vol. 22, no. 8, pp. 8245-8256, Sept. 2022. </unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	V. Kiani and M. Imanparast, "A bi-objective virtual-force local search PSO algorithm for improving sensing deployment in wireless sensor networks," Journal of AI and Data Mining, vol. 11, no. 1, pp. 1-12, Jan. 2023.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	W. A. Farias, et al.,"Voronoi-based approach to increase connectivity and coverage in randomly deployed wireless sensor networks," in Proc. 8th Int. Symp. on Instrumentation Systems, Circuits and Transducers, 6 pp., Joao Pesoa, Brazil, 2-6 Sept. 2024.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	W. -H., Liao, Y. Kao, and R. -T. Wu, "Ant colony optimization-based sensor deployment protocol for wireless sensor networks," Expert Systems with Applications, vol. 38, no. 6, p. 6599-6605, Jun. 2011.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	C. Öztürk, D. Karaboǧa, and B. Gorkemli, "Artificial bee colony algorithm for dynamic deployment of wireless sensor networks," Turkish Journal of Electrical Engineering and Computer Sciences, vol. 20, no. 1, pp. 255-262, Mar. 2012.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	G. Wang, et al., "Dynamic deployment of wireless sensor networks by biogeography based optimization algorithm," Journal of Sensor and Actuator Networks, vol. 1, no. 2, pp. 86-96, Apr. 2012. </unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	S. Özdemir, B.a.A. Attea, and Ö. A. Khalil, "Multi-objective evolutionary algorithm based on decomposition for energy efficient coverage in wireless sensor networks, "Wireless Personal Communications, vol. 71, no. 1, pp. 195-215, Mar. 2013.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	M. Abo-Zahhad, et al., "Coverage maximization in mobile wireless sensor networks utilizing immune node deployment algorithm," in Proc. IEEE 27th Canadian Conf. on Electrical and Computer Engineering, 6 pp., Toronto, Canada, 4-7 May 2014.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	K. Y. Bendigeri, and J. D. Mallapur, Energy Aware Node Placement Algorithm for Wireless Sensor Network, 2014.
[39]	S. Gupta, P. Kuila, and P. Jana, "Genetic algorithm for k-connected relay node placement in wireless sensor networks," in Proc. of the 2nd Int. Conf. on Computer and Communication Technologies, vol. 1, pp. 721-729, Hyderabad, India, 24-26 Jul. 2016. 
[40]	J. George and R. M. Sharma, "Relay node placement in wireless sensor networks using modified genetic algorithm," in Proc. 2nd Int. Conf. on Applied and Theoretical Computing and Communication Technology, pp. 551-556, Bengaluru, India, 21-23 Jul. 2016.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[41]	Y. El Khamlichi, et al., "A hybrid algorithm for optimal wireless sensor network deployment with the minimum number of sensor nodes," Algorithms, vol. 10, no. 3, pp. 80-88, Sept. 2017. </unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[42]	O. M. Alia and A. Al-Ajouri, "Maximizing wireless sensor network coverage with minimum cost using harmony search algorithm," IEEE Sensors Journal, vol. 17, no. 3, p. 882-896, Jun. 2017. 
[43]	R. Ozdag and M. Canayaz, "A new dynamic deployment approach based on whale optimization algorithm in the optimization of coverage rates of wireless sensor networks," European Journal of Technic, vol. 7, no. 1, pp. 119-130, Feb. 2017.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[44]	E. Tuba, M. Tuba, and M. Beko, "Mobile wireless sensor networks coverage maximization by firefly algorithm," in Proc. 27th Int. Conf. Radioelektronika, 5 pp., Brno, Czech Republic, 19-20 Apr. 2017.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[45]	B. Cao, et al., "Deployment optimization for 3D industrial wireless sensor networks based on particle swarm optimizers with distributed parallelism," Journal of Network and Computer Applications, vol. 103, pp. 225-238, Feb. 2018.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[46]	N. T. Hanh, et al., "An efficient genetic algorithm for maximizing area coverage in wireless sensor networks," Information Sciences, vol. 488, pp. 58-75, Jul. 2019.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[47]	Y. Yue, L. Cao, and Z. Luo, "Hybrid artificial bee colony algorithm for improving the coverage and connectivity of wireless sensor networks," Wireless Personal Communications, vol. 108, no. 3, pp. 1719-1732, May 2019.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[48]	S. S. Mohar, S. Goyal, and R. Kaur, "Optimized sensor nodes deployment in wireless sensor network using bat algorithm," Wireless Personal Communications, vol. 116, no. 4, pp. 2835-2853, Aug. 2021.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[49]	D. Arivudainambi, R. Pavithra, and P. Kalyani, "Cuckoo search algorithm for target coverage and sensor scheduling with adjustable sensing range in wireless sensor network," Journal of Discrete Mathematical Sciences and Cryptography, vol. 24, no. 4, pp. 975-996, Jul. 2021. </unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[50]	L. Cao, et al., "A novel coverage optimization strategy for heterogeneous wireless sensor networks Based on connectivity and reliability," IEEE Access, vol. 9, pp. 18424-18442, 2021.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[51]	G. Zhou, T. Zhang, and Y Zhou, "Elite opposition-based bare bones Mayfly algorithm for wireless sensor networks coverage optimization," Arabian Journal for Science and Engineering, vol. 50, pp.719-739, 2025.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[52]	Y. Wei, et al., "SSMA: simplified slime mould algorithm for optimization wireless sensor network coverage problem," Systems Science &amp; Control Engineering, vol. 10, no. 1, pp. 662-685, Feb. 2022.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[53]	H. A. Wasay and P. K. Priya, "Effective coverage optimization techniques in WSN using the Harris hawk algorithm," in Proc. Int. Conf. on Recent Trends in Microelectronics, Automation, Computing and Communications Systems, pp. 281-286, Heydarabad, India, 28-30 Dec. 2023.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[54]	H. Chen, et al., "A multi-strategy improved sparrow search algorithm for coverage optimization in a WSN," Sensors, vol. 23, no. 8, Article ID: 4124, Apr.-2 2023.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[55]	T. -K. Dao, T. -D. Nguyen, and V. -T. Nguyen, "An improved honey badger algorithm for coverage optimization in wireless sensor network," Journal of Internet Technology, vol. 24, no. 2, pp. 363-377, Mar. 2023.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[56]	L. Chen, et al., "Balancing the trade-off between cost and reliability for wireless sensor networks: a multi-objective optimized deployment method," Applied Intelligence, vol. 53, no. 8, pp. 9148-9173, Jun. 2023.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[57]	S. K., De, et al., "Coverage area maximization using MOFAC-GA-PSO hybrid algorithm in energy efficient WSN design," IEEE Access, vol. 11, pp. 99901-99917, 2023.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[58]	Y. Ou, et al., "An improved grey wolf optimizer with multi-strategies coverage in wireless sensor networks," Symmetry, vol. 16, no. 3, pp. 19-26, Apr.  2024. </unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[59]	S. Sun, Y. Chen, and L. Dong, "An optimization method for wireless sensor networks coverage based on genetic algorithm and reinforced whale algorithm," Mathematical Biosciences and Engineering, vol. 21, no. 2, pp. 2787-2812, 2024.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[60]	M. A. Akbari, et al., "The cheetah optimizer: A nature-inspired metaheuristic algorithm for large-scale optimization problems," Scientific Reports, vol. 12, Article ID: 10953, Jun. 2022.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>