﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022923</doi_batch_id><timestamp>14050229231836</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>3</month><day>20</day><year>2018</year></publication_date><journal_volume><volume>16</volume></journal_volume><issue>1</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Handover Management between Femtocell and Macrocell Using Geo-Based Spectral Clustering</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>T.</given_name><surname>Bahraini</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Zamiri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Sadoghi Yazdi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>20</day><year>2018</year></publication_date><pages><first_page>1</first_page><last_page>14</last_page></pages><doi_data><doi>10.66224/ijece.28306.16.1.1</doi><resource>http://ijece.org/fa/Article/28306</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28306</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28306</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28306</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28306</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28306</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28306</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28306</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	ع. طهماسبی و ح. طاهری، &amp;quot;بررسی روند تکامل شبکه‌های G/UMTS3 بر مبنای استانداردهای GPP3،&amp;quot; سیزدهمین کنفرانس دانشجویی مهندسی برق ایران، دانشگاه تربیت مدرس، 8 صص.، تهران، شهریور 1389.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	3GPP TR 23.234 v7.1.0, Universal Moblie Telecommunications system (UMTS); 3GPP System to WLAN Interworking; interworking; System Description (Release 7), Mar. 2008, http://www.3gpp.org/DynaReport/23234.htm</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. Zhang and G. D. L. Roche, Femtocells Technologies and Deployment, A John Wiley and Sons, Ltd, Publication, United Kingdom, 2010.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	X. Yan, Y. A. Sekercioglu, and S. Narayanan, &amp;quot;A survey of vertical handover desion algorithm in fourth generation heterogeneous wireless networks,&amp;quot; Computer Networks, vol. 54, no. 11, pp. 1848-1863, Aug. 2010.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Lee, K. Sriram, K. Kim, J. Lee, Y. H. Kim, and N. Golmie, &amp;quot;Vertical handoff decision algorithm for providing optimized performance in heterogeneous wireless network,&amp;quot; IEEE Trans. on Vehicular Technology, vol. 58, no. 2, pp. 865-881, Feb.. 2008.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	D. Wong, Handoff Algorithms Using Pattern Recognition, Ph.D Thesis, Stanford University, 1998.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. Xenakis, N. Passas, L. Merakos, and C. Verikoukis, &amp;quot;Mobility management for femtocells in LTE-advanced: key aspects and survey of handover decision algorithms,&amp;quot; IEEE Communications Surveys &amp;amp; Tutorials, vol. 16, no. 1, pp. 64-91, 1st Quarter 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	T. E. Mathonsi and O. P. Kogeda, &amp;quot;Handoff delay reduction model for heterogeneous wireless networks,&amp;quot; in Proc. IST-Africa Week Conf., 7 pp., Durban, , South Africa, 11-13 May 2016.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	T. Bilen, B. Canberk, and K. R. Chowdhury, &amp;quot;Handover management in software-defined ultra-dense 5G networks,&amp;quot; IEEE Network, vol. 31, no. 4, pp. 49-55, Jul./Aug. 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	W. Wang, Q. Liao, and Q. Zhang, &amp;quot;COD: a cooperative cell outage detection architecture for self-organizing femtocell networks,&amp;quot; IEEE Trans. on Wireless Communications, vol. 13, no. 11, pp. 6007-6014, Nov. 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	H. Sinky, B. Hamdaoui, and M. Guizani, &amp;quot;Proactive multipath TCP for seamless handoff in heterogeneous wireless access networks,&amp;quot; IEEE Trans. on Wireless Communications, vol. 15, no. 7, pp. 4754-4764, Jul. 2016.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Y. Li, B. Cao, and C. Wang, &amp;quot;Handover schemes in heterogeneous LTE networks: challenges and opportunities,&amp;quot; IEEE Wireless Communications, vol. 23, no. 2, pp. 112-117, Apr. 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. Kalbkhani, S. Yousefi, and M. G. Shayesteh, &amp;quot;Adaptive handover algorithm in heterogeneous femtocellular networks based on received signal strength and signal-to-interference-plus-noise ratio prediction,&amp;quot; IET Communications, vol. 8, no. 17, pp. 3061-3071, Nov. 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	V. Kantubukta, S. Maheshwari, S. Mahapatra, and C. S. Kumar, &amp;quot;Energy and quality of service aware fuzzy-technique for order preference by similarity to ideal solution based vertical handover decision algorithm for heterogeneous wireless networks,&amp;quot; IET Networks, vol. 2, no. 3, pp. 103-114, Sep. 2013.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	N. Sinclair, D. Harle, I. A. Glover, and R. C. Atkinson, &amp;quot;A kernel methods approach to reducing handover occurrences within LTE,&amp;quot; in Proc. 18th European Wireless Conf., 8 pp., Poznan, Poland, 18-20 Apr. 2012.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Z. Sanip, D. Harle, R. Atkinson, and N. Sinclair, &amp;quot;KernelSOM handover optimisation: outdoor performance evaluations,&amp;quot; in Proc. Int. Conf. on Computer, Communications, and Control Technology. I4CT’15, pp. 459-463, Kuching, Malaysia, 21-23 Apr. 2015.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	N. Sinclair, D. Harle, I. A. Glover, J. Irvine, and R. C. Atkinson, &amp;quot;An advanced SOM algorithm applied to handover management within LTE,&amp;quot; IEEE Trans. on Vehicular Technology, vol. 62, no. 5, pp. 1883-1894, Jun. 2013.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	P. Munoz, R. Barco, and I. de la Bandera, &amp;quot;On the potential of handover parameter optimization for self-organizing networks,&amp;quot; Vehicular Technology, IEEE Trans. on, vol. 62, no. 5, pp. 1895-1905, Jun. 2013.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	U. von Luxburg, &amp;quot;A tutorial on spectral clustering,&amp;quot; Statistics and Computing, vol. 17, no. 4, pp. 395-416, Dec. 2007.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Bao, C. Guo, and S. Chai, &amp;quot;A note on spectral clustering method based on normalized cut criterion,&amp;quot; in Proc. Chinese Conf. on Pattern Recognition, 5 pp., 4-6 Nov. 2009.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	T. Jansen, I. Balan, J. Turk, I. Moerman, and T. K. Kurner, &amp;quot;Handover parameter optimization in LTE self-organizing networks,&amp;quot; in Proc.  72nd IEEE Veh. Technol. Conf., 5 pp., Sept. 2010.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>How to Identify Requirements under Uncertainty for Self-Adaptive Software Systems Development</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>R.</given_name><surname>Moeinfar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ahmad</given_name><surname>Abdollahzadeh Barforoush</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. M.</given_name><surname>Hashemi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>20</day><year>2018</year></publication_date><pages><first_page>15</first_page><last_page>27</last_page></pages><doi_data><doi>10.66224/ijece.28307.16.1.15</doi><resource>http://ijece.org/fa/Article/28307</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28307</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28307</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28307</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28307</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28307</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28307</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28307</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	B. Chen, X. Peng, Y. Yu B. Nuseibeh, and W. Zhao, &amp;quot;Self-adaptation through incremental generative model transformations at runtime,&amp;quot; in Proc. 36th ACM/IEEE Int. Conf. on Software Engineering, 12 pp., Hyderabad, India, 31 May-7 Jun. 2014.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	K. Welsh, R. Casallas, and P. Sawyer, &amp;quot;Understanding the scope of uncertainty in dynamically adaptive systems,&amp;quot; In: R. Wieringa and A. Persson, eds., Requirements Engineering: Foundation for Software Quality, Lecture Notes in Computer Science, vol. 6182, pp. 2-16,  2010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	N. M. Villegas, H. A. Muller, and G. Tamura, &amp;quot;Optimizing run-time SOA governance through context-driven SLAs and dynamic monitoring,&amp;quot; in Proc. IEEE Int. Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems, MESOCA&amp;#39;11, 10 pp., Williamsburg, VA, USA, 26-26 Sept. 2011.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. O. Kephart and D. M. Chess, &amp;quot;The vision of autonomic computing,&amp;quot; Computer, vol. 36, no. 1, pp. 41-50, Jan. 2003.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. Tajalli, J. Garcia, and G. Edwards, &amp;quot;PLASMA: a plan-based layered architecture for software model-driven adaptation,&amp;quot; in Proc. of the IEEE/ACM Int. Conf. on Automated Software Engineering, ASE&amp;#39;10, pp. 467-476, Antwerp, Belgium, 20-24 Sept. 2010.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Elkhodary, N. Esfahani, and S. Malek, &amp;quot;FUSION: a framework for engineering self-tuning self-adaptive software systems,&amp;quot; ACM SIGSOFT Int. Symp. on Foundations of Software Engineering, FSE&amp;#39;10, pp. 7-16, Santa Fe, NM, USA, 7-11 Nov. 2010.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	B. Morin, O. Barais, G. Nain, and J. M. Jezequel, &amp;quot;Taming dynamically adaptive systems using models and aspects,&amp;quot; in Proc. Int Conf. on Software Engineering, ICSE&amp;#39;09, pp. 122-132, Vancouver, BC, Canada, 16-24 May 2009.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Lemos, et al., &amp;quot;Software engineering for 
self-adaptive systems: a second research roadmap,&amp;quot; In R. de Lemos et al., eds., Self-Adaptive Systems, LNCS 7475, Springer-Verlag, Berlin, pp. 1-32, 2011.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	B. H. Cheng, et al., &amp;quot;Software engineering for self-adaptive systems: a research roadmap,&amp;quot; In: B. H. C. Cheng, R. de Lemos, H. Giese, P. Inverardi, and J.Magee, eds., Software Engineering for Self-Adaptive Systems, LNCS 5525, p. 1-26, Springer-Verlag, 2009.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	N. Bencomo and A. Blaggoun, &amp;quot;A world full of surprise: bayesian theory of surprise to quantify degrees of uncertainty,&amp;quot; in Companion Proc. of the 36th Int. Conf. on Software Engineering, pp. 460-463, Hyderabad, India, 31 May-7 Jun. 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Shaw, The Role of Design Spaces, IEEE Computer Society, 2012.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	N. Bencomo, A. Blaggoun, and V. Issarny, &amp;quot;Dynamic decision networks for decision-making in self-adaptive systems: a case study,&amp;quot; in Proc. of the 8th Int. Symp. on Software Engineering for Adaptive and Self-Managing Systems, SEAMS&amp;#39;13,  pp. 113-122, San Francisco, CA, USA, 20-21 May 2013.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	T. Preisler and W. Renz, &amp;quot;Structural adaptations for self-organizing multi-agent systems,&amp;quot; International Journal on Advances in Intelligent Systems, vol. 8, no. 3-4, 8 pp., 2015.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Ahmad, N. Belloir, and J. Brue, &amp;quot;Modeling and verification of functional and non-functional requirements of ambient self-adaptive systems,&amp;quot; J. of Software and Systems, vol. 107, pp. 50-70, Sept. 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Hassan, N. Bencomo, and R. Bahsoon, &amp;quot;Minimizing nasty surprises with better informed decision-making in self-adaptive systems,&amp;quot; in Proc. of the 10th Int. Symp. on Software Engineering for Adaptive and Self-Managing System,s SEAM&amp;#39;15, pp. 134-144, Florence, Italy, 16-24 May 2015.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. L. H. Garcia Paucar, N. Bencomo, and K. Kam Fung Yuen, &amp;quot;Runtime models based on dynamic decision networks: enhancing the decision-making in the domain of ambient assisted living applications,&amp;quot; in Proc. of the 11th Int. Workshop on MoDELS, pp. 9-17, Saint Malo, France, 4-4 Oct. 2016.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	N. Bencomo and A. Blaggoun, &amp;quot;Supporting decision-making for self-adaptive systems: from goal models to dynamic decision networks,&amp;quot; In J. Doerr, A. L. Opdahl, eds., Requirements Engineering: Foundation for Software Quality, LNC7830. Springer, Berlin, 2013.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. Kramer and J. Magee, &amp;quot;Self-managed systems: an architectural challenge,&amp;quot; in Proc. of Future of Software Engineering, FOSE&amp;#39;07,  pp. 259-268, 23-25 May 2007.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	K. Welsh, P. Sawyer, and N. Bencomo, &amp;quot;Towards requirements aware systems run-time resolution of design-time assumption,&amp;quot; in Proc. of the 26th IEEE/ACM Int. Conf. on Automated Software Engineering, ASE&amp;#39;11, pp. 560-563, Washington, DC, USA, 6-10 Nov. 2011.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. J. Ramirez, et al., &amp;quot;Relaxing claims coping with uncertainty while evaluating assumptions at runtime,&amp;quot; In R. B.: France, J. Kazmeier, R. Breu, C. Atkinson, eds., LNCS 7590, pp. 53-69, 30 Sept.-5 Oct. 2012.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. Whittle, P. Sawyer, N. Bencomo, B. H. C. Cheng, and J. Bruel, &amp;quot;RELAX: incorporating uncertainty into the specification of self-adaptive systems,&amp;quot; in Proc. of the 2009 17th IEEE Int. Requirements Engineering Conf., RE&amp;#39;09, pp. 79-78, Atlanta, GA, USA, 31 Aug.-4 Sept. 2009.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. J. I. Herzig and C. J. J. Paredis, &amp;quot;Bayesian reasoning over models,&amp;quot; in Proc. Workshop on Model-Driven Engineering, Verification, and Validation, pp. 69-80, Valencia, Spain, 30 Sept. 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	L. Pimentel, D. Ros, and M. Seruffo, &amp;quot;Wired/wireless internet communications,&amp;quot; in Proc. Int. Conf. on Wired/Wireless Internet Communication, Malaga, Spain, 25-27 May, 2015.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	T. L. Saaty, &amp;quot;Decision making for leaders: the analytic hierarchy process for decisions in a complex world,&amp;quot; International J. of Services Sciences, vol. 1, no. 1, pp. 83-98, 2008.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	L. Bass, P. Clements, and R. Kazman, Software Architecture in Practice (3rd Edition), SEI Series in Software Engineering, Addison-Wesley Professional, 2012.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Geometrical Self-Organizing Map Classifier Based on Active Learning for Steganalysis in the Video Environment by Spending at Least a Label</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Sadoghi Yazdi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Mohiaddini</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Khademi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>20</day><year>2018</year></publication_date><pages><first_page>28</first_page><last_page>40</last_page></pages><doi_data><doi>10.66224/ijece.28308.16.1.28</doi><resource>http://ijece.org/fa/Article/28308</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28308</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28308</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28308</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28308</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28308</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28308</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28308</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	N. Zarmehi and M. A. Akhaee, "Digital video steganalysis toward spread spectrum data hiding," IET Image Processing, vol. 10, no. 1, pp. 1-8, Dec. 2015.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Kolakalur, I. Kagalidis, and B. Vuksanovic, "Wavelet based color video steganography," IACSIT International J. of Engineering and Technology, vol. 8, no. 3, pp. 165-169, Jun. 2016.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Karimi, M. G. Shayesteh, and M. A. Akhaee, "Steganalysis of JPEG images using enhanced neighbouring joint density features," IET Image Processing, vol. 9, no. 7, pp. 545-552, Jul. 2015.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	U. Budia, D. Kundur, and T. Zourntos, "Digital video steganalysis exploiting statistical visibility in the temporal domain," IEEE Trans. on Information Forensics and Security, vol. 1, no. 4, pp. 502-516, Dec. 2006.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. S. Jainsky, D. Kundur, and D. R. Halverson, "Towards digital video steganalysis using asymptotic memoryless detection," in Proc. of the 9th Int. Workshop on Multimedia and Security, pp. 161-168, Dallas, TX, USA, 20-21 Sept. 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	V. Pankajakshan and A. T. S. Ho, "Improving video steganalysis using temporal correlation," in Proc. of the 3rd Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP'07, vol. 1, pp. 287-290, Kaohsiung, Taiwan, 26-28 Nov. 2007.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. Su, C. Zhang, L. Wang, and C. Zhang, "A new video steganalysis based on mode detection," in Proc. of the Int. Conf. on Audio, Language and Image Processing, pp. 1507-1510, Shanghai, China, 7-9 Jul. 2008.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	K. Tasdemir, F. Kurugollu, and S. Sezer, "Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes," IEEE Trans. on Image Processing, vol. 25, no. 7, pp. 3316-3328, Jul. 2016.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	G. Xuan, et al., "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions," in Proc. of the 7th Information Hiding Workshop, Lecture Notes in Computer Science, vol 3727, pp. 262-277, Jun. 2005.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Y. Q. Shi, et al., "Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network," in Proc. of the IEEE Int. Conf. on Multimedia and Expo, pp. 269-272, Amsterdam, Netherlands, 6-6 Jul. 2005.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	ج. مرتضوی مهریزی، م. خادمي و ه. صدوقی یزدی، "نهان‌کاوی کور ویدئو با رویکرد یادگیری شبه‌ناظر برای الگوریتم‌های نهان‌نگاری ویدئوی مبتنی بر بردارهای حرکت،" نشريه مهندسي برق و مهندسي كامپيوتر ايران، ب- مهندسي کامپیوتر، سال 13، شماره 2، صص. 100-89، زمستان 1394.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Y. Cao, X. Zhao, and D. Feng, "Video steganalysis exploiting motion vector reversion-based features," IEEE Trans. on Signal Processing, vol. 19, no. 1, pp. 35-38, Nov. 2012.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Y. Deng, Y. Wu, H. Duan, and L. Zhou, "Digital video steganalysis based on motion vector statistical characteristics," International Journal for Light and Electron Optics, vol. 124, no. 14, Jul.  pp. 1705-1710, 2013.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Y. S. Su, C. Zhang, and C. Zhang, "A video steganalytic algorithm against motion vector-based steganography," Signal Process., vol. 91, no. 18, pp. 1901-1909, Aug. 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	X. Xu, J. Dong, W. Wang, and T. Tan, "Video steganalysis based on the constraints of motion vectors," in Proc. IEEE Int.Conf. on Image Processing, ICIP'13, pp. 4422-4426, Melbourne, VIC, Australia, 15-18 Sept. 2013.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	H. A. Aly, "Data hiding in motion vectors of compressed video based on their associated prediction error," IEEE Trans. on Information Forensics and Security, vol. 6, no. 1, pp. 14-18, Nov. 2011.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	C. Xu, X. Ping, and T. Zhang, "Steganography in compressed video stream," in Proc. IEEE First Int. Conf. Innovative Computing, Information and Control, ICICIC'06, vol. 1, pp. 269-272, Beijing, China, 30 Aug.-1 Sept. 2006.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	D. Y. Fang and L. W. Chang, "Data hiding for digital video with phase of motion vector," in Proc. IEEE Int. Symp. Circuits and Systems, pp. 1422-1425, Island of Kos, Greece, 21-24 May 2006.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	D. Alahakoon and K. Halgamunge, "Dynamic self-organizaing maps with controlled growth for knowledge discovery," IEEE Trans. on Neural Networks, vol. 11, no. 3, pp. 601-614, May 2000.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Hsu and S. K. Halgamunge, "Class structure visualization with semi-supervised growing self-organizing maps," Neurocomputing, vol. 71, no. 16-18, pp. 3124-3130, Oct. 2008.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	B. Settles, Active Learning Literature Survey, Computer Sciences Technical Report 1648 University of Wisconsin-Madison Updated on: Jan. 2010.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	B. Settles, R. J. Brachman, W. W. Cohen, and T. Dietterich, Active Learning, Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan &amp; Claypool Publishers, 2012.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	H. Wu and S. Prasad, "Dirichlet process based active learning and discovery of unknown classes for hyperspectral image classification," IEEE Trans. on Geoscience and Remote Sensins, vol. 54, no. 8, 
pp. 4882-4895, Aug. 2016.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Q. Shi, B. Du, and L. Zhang, "Spatial coherence based batch-mode activelearning for remote sensing image classification," IEEE Trans. Image Process., vol. 24, no. 7, pp. 2037-2050, Jul. 2015.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Z. Zhang, E. Pasolli, H. Lexie Yang, and M. M. Crawford, "Multimetric active learning for classification of remote sensing data," IEEE Geoscience and Remote Sensing Letters, vol. 13, no. 7, pp. 1007-1011, Jul. 2016.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	L. Wan, K. Tang, M. Li, Y. Zhong, and A. K. Qin, "Collaborative active and semisupervised learning for hyperspectral remote sensing image classification," IEEE Trans. on Geoscience and Remote Sensing, vol. 53, no. 5, pp. 2384-2396, May 2015.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	E. Pasolli, H. L. Yang, and M. M. Crawford, "Active-metric learning for classification of remotely sensed hyperspectral images," IEEE Trans. on Geoscience and Remote Sensing, vol. 54, no. 4, pp. 1925-1939, Apr. 2016.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	H. Lin and P. Li, "Circuit performance classification with active learning guided sampling for support vector machines," IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, 
vol. 34, no. 9, pp. 1467-1480, Sep. 2015.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	A. Mehrizi and H. Sadoghi Yazdi, "Semi-supervised GSOM integrated with extreme learning machine intelligent data analysis," Intelligent Data Analysis, vol. 20, no. 5, pp. 1115-1132, Sept. 2016.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Efficient Hybrid Routing Protocol in Underwater Wireless Sensor Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>J.</given_name><surname>Tavakoli</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>N.</given_name><surname>Moghim</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>20</day><year>2018</year></publication_date><pages><first_page>41</first_page><last_page>50</last_page></pages><doi_data><doi>10.66224/ijece.28309.16.1.41</doi><resource>http://ijece.org/fa/Article/28309</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28309</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28309</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28309</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28309</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28309</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28309</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28309</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	N. Goyal, M. Dave, and A. K. Verma, &amp;quot;Improved data aggregation for cluster based underwater wireless sensor networks,&amp;quot; Proc. Natl. Acad. Sci., India, Sect, A Phys. Sci, vol. 4, no. 5, pp. 235-245, Jun. 2017.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. Zidi, F. Bouabdallah, and R. Boutaba, &amp;quot;Routing design avoiding energy holes in underwater acoustic sensor networks,&amp;quot; Wireless Communications and Mobile Computing, vol. 16, no. 14, pp. 2035-2051, Feb. 2016.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Khasawneh, M. Shaﬁe Bin Abd Latiff, O. Kaiwartya, and H. Chizari, &amp;quot;A reliable energy-efﬁcient pressure-based routing protocol for underwater wireless sensor network,&amp;quot; Wireless Networks, vol. 4, 
no. 6, pp. 1-15, Feb. 2017.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	N. Z. Zenia, et al., &amp;quot;Energy-efﬁciency and reliability in MAC and routing protocols for underwater wireless sensor network: a survey,&amp;quot; J. of Network and Computer Applications, vol. 71, no. 10 pp. 72-85, Aug. 2016.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Lee, Y. Jeong, E. Moon, and D. Kim, &amp;quot;An efﬁcient MOP decision method using hop interval for RPL-based underwater sensor networks,&amp;quot; Wireless Personal Communications, vol. 93, no. 4, pp. 1027-1041, Apr. 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Ahmad, A. Sheeraz, M. Alam, I. Azim Niaz, and N. Javaid, &amp;quot;On energy efficiency in underwater wireless sensor networks with cooperative routing,&amp;quot; Annals of Telecommunications, vol. 72, no. 3-4, pp. 173-188, Apr. 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	N. Goyal, M. Dave, and A. Verma, &amp;quot;Fuzzy based clustering and aggregation technique for under water wireless sensor networks,&amp;quot; in Proc. Int. Conf. on Electronics and Communication System, lCECS&amp;#39;14, 6 pp., Coimbatore, India, 13-14 Feb. 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Souiki, M. Hadjila, and M. Feham, &amp;quot;Fuzzy based clustering and energy efficient routing for underwater wireless sensor networks,&amp;quot; International J. of Computer Networks &amp;amp; Communications, vol. 7, no. 2, pp. 33-44, Mar. 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	T. Khoa and O. Seung-Hyun, &amp;quot;A data aggregation based efficient clustering scheme in underwater wireless sensor networks,&amp;quot; In: Y. S. Jeong, Y. H. Park, C. H. Hsu, and J. Park, eds,) Ubiquitous Information Technologies and Applications, LNEE 280. Springer, Berlin, pp. 541-548, 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Wahid and D. Kim, &amp;quot;An energy efﬁcient localization-free routing protocol for underwater wireless sensor networks,&amp;quot; International J. of Distributed Sensor Networks, Article ID 307246, 11 pp., Apr. 2012.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. Joshi, S. Dhongdi, R. Sethunathan, P. Nahar, and K. R. Anupama, &amp;quot;Energy efficient clustering based network protocol stack for 3D airborne monitoring system,&amp;quot; J. of Computer Networks and Communications, Article ID 8921261, 13 pp., Feb. 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Li, X. Jiang, and I. -T. Lu, &amp;quot;Energy balance routing algorithm based on virtual MIMO scheme for wireless sensor networks,&amp;quot; J. of Sensors, vol. 2014, 8 pp., Article 589249, 2014.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Ahmed, et al., &amp;quot;Co-UWSN: cooperative energy-efﬁcient protocol for underwater WSNs,&amp;quot; International J. of Distributed Sensor Networks, vol. 2015, Article No. 75, Jan. 2015.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	N. Goyal, M. Dave, and A. K. Verma, &amp;quot;Data aggregation in underwater wireless sensor network: recent approaches and issues,&amp;quot; J. of King Saud University-Computer and Information Sciences, 
2 May 2017, doi:10.1016/j.jksuci.2017.04.007</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	K. Ovaliadis and N. Savage, &amp;quot;Cluster protocols in underwater sensor networks: a research review,&amp;quot; J. of Engineering Science and Technology Review, vol. 7, no. 3, pp. 171-175, 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Hong, C. Yookun, and H. Junyoung, &amp;quot;Enhancing the reliability of head nodes in underwater sensor networks,&amp;quot; Sensors, vol. 12, 
no. 2, pp. 1194-1210, Jan. 2012.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Kumar and R. Sethi, &amp;quot;An improved clustering machanism to improve nework life for underwater WSN,&amp;quot; International J. of Emerging Trends &amp;amp; Technology in Computer Science, vol. 2, no. 3, pp. 43-47, May/Jun. 2013.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. K. Murugaraja, R. Kumar Ramesh, and A. Anbarasan, &amp;quot;A distributed cost effective cluster algorithm,&amp;quot; International J. of Computer Science and Management Research, vol. 2, no. 12, pp. 2374-2377, May 2013.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. H. Chenn, et al., &amp;quot;A self-healing clustering algorithm for underwater sensor networks,&amp;quot; Int. J. Cluster Computing. Springer, vol. 14, no. 1, pp. 91-99, Mar. 2011.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. Saxena, S. Mishra, and M. Singh, &amp;quot;Clustering based on node density in heterogeneous under-water sensor network,&amp;quot; I. J. Information Technology and Computer Science, vol. 2, pp. 49-55, Jun. 2013.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	M. Ayaz, A. Abdullah, and L. T. Jung, &amp;quot;Temporary cluster based routing for underwater wireless sensor networks,&amp;quot; in Proc. Int. Symp. on Information Technology, ITSim, vol. 2, pp. 1009-1014, 15-17 Jun. 2010.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. H. Anisi, G. Abdul-Salaam, M. Yamani, A. W. Abdul Wahab, and I. Ahmedi, &amp;quot;Energy harvesting and battery power based routing in wireless sensor networks,&amp;quot; Wireless Networks, vol. 23, no. 1, pp. 249-266, Jan. 2017.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. Srujana, N. P. Mathews, and V. P. Harigovindan, &amp;quot;Multi-source energy harvesting system for underwater wireless sensor networks,&amp;quot; Procedia Computer Science, vol. 46, pp. 1041-1048, Dec. 2015.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>The Effect of Topic Pattern of Teen Users’ Search Behavior on Query Recommendation</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Ghasemzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad</given_name><surname>Ghasemzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Zareh</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>20</day><year>2018</year></publication_date><pages><first_page>51</first_page><last_page>60</last_page></pages><doi_data><doi>10.66224/ijece.28310.16.1.51</doi><resource>http://ijece.org/fa/Article/28310</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28310</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28310</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28310</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28310</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28310</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28310</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28310</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. T. Mulik and H. Palkar, &amp;quot;A survey on development of search engine,&amp;quot; Int. Advanced Research J. in Science, Engineering and Technology, vol. 4, no. 4, pp. 116-117, Jan. 2017.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Madden, A. Lenhart, M. Duggan, S. Cortesi, and U. Gasser, Teens and Technology 2013, Washington, DC: Pew Research Center&amp;#39;s Internet &amp;amp; American Life Project, 2013.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Druin, E. Foss, H. Hutchinson, E. Golub, and L. Hatley, &amp;quot;Children&amp;#39;s roles using keyword search interfaces at home,&amp;quot; in Proc. of the 28th Int. Conf. on Human Factors in Computing Systems-CHI&amp;#39;10, pp. 413-422, Atlanta, GA, USA, 10-15 Apr. 2010.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. Bilal, &amp;quot;Children&amp;#39;s use of the Yahooligans! web search engine. III. cognitive and physical behaviors on fully self-generated search tasks,&amp;quot; J. of the American Society for Information Science and Technology, vol. 53, no. 13, pp. 1170-1183, Nov. 2002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	D. Bilal, &amp;quot;Children&amp;#39;s use of the Yahooligans! web search engine: II. cognitive, physical, and affective behaviors on fact-based search tasks,&amp;quot; J. of the American Society for Information Science and Technology, vol. 52, no. 2, pp. 118-136, Oct. 2001.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Caramia, G. Felici, and A. Pezzoli, &amp;quot;Improving search results with data mining in a thematic search engine,&amp;quot; Computers and Operations Research, vol. 31, no. 14, pp. 2387-2404, Dec. 2004.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Baeza-Yates, C. Hurtado, and M. Mendoza, &amp;quot;Query recommendation using query logs in search engines,&amp;quot; in Proc. of the Int. Conf. on Current Trends in Database Technology, EDBT&amp;#39;04, pp. 588-596, Heraklion, Greece, 14-18 Mar. 2004.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	E. Foss, et al., &amp;quot;Children&amp;#39;s search roles at home: implications for designers, researchers, educators, and parents,&amp;quot; J. of the American Society for Information Science and Technology, vol. 63, no. 3, 
pp. 558-573, Mar. 2012.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. M. Gaber, A. Zaslavsky, and S. Krishnaswamy, &amp;quot;Mining data streams: a review,&amp;quot; SIGMOD Rec., vol. 34, no. 2, pp. 18-26, Jun. 2005.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Y. Liu, J. Miao, M. Zhang, S. Ma, and L. Ru, &amp;quot;How do users describe their information need: query recommendation based on snippet click model,&amp;quot; Expert Systems with Applications, vol. 38, 
no. 11, pp. 13847-13856, Oct. 2011.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Wen, J. Nie, and H. Zhang, &amp;quot;Clustering user queries of a search engine,&amp;quot; in Proc. 10th Int. Conf. on World Wide Web, WWW&amp;#39;01, pp. 162-168, Hong Kong, China, 1-5 May. 2001.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	C. Silverstein, H. Marais, M. Henzinger, and M. Moricz, &amp;quot;Analysis of a very large web search engine query log,&amp;quot; ACM SIGIR Forum, vol. 33, no. 1, pp. 6-12, Fall 1999.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Spink, D. Wolfram, M. B. J. Jansen, and T. Saracevic, &amp;quot;Searching the web: the public and their queries,&amp;quot; J. of the American Society for Information Science and Technology, vol. 52, no. 3, pp. 226-234, Feb. 2001.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	G. Pass, A. Chowdhury, and C. Torgeson, &amp;quot;A picture of search,&amp;quot; in Proc. of the 1st Int. Conf. on Scalable Information Systems, InfoScale&amp;#39;06, vol. 152, 7 pp., Hong Kong, 30 May- 1 Jun. 2006.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	D. J. Brenes and D. Gayo-Avello, &amp;quot;Stratified analysis of AOL query log,&amp;quot; Information Sciences, vol. 179, no. 12, pp. 1844-1858, May 2009.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	R. Jones and K. L. Klinkner, &amp;quot;Beyond the session timeout: automatic hierarchical segmentation of search topics in query logs,&amp;quot; in Proc. of the 17th ACM Conf. on Information and Knowledge Management, pp. 699-708, Napa Valley, CA, USA, 26-30 Oct. 2008.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. Kumar and A. Tomkins, &amp;quot;A characterization of online browsing behavior,&amp;quot; in Proc. of the 19th Int. Conf. on World Wide Web, WWW&amp;#39;10, pp. 561-570, Raleigh, NC, USA, 26-30 Apr. 2010.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Z. Cheng, B. Gao, and T. Liu, &amp;quot;Actively predicting diverse search intent from user browsing behaviors,&amp;quot; in Proc. of the 19th Int. Conf. on World Wide Web, WWW&amp;#39;10, pp. 221-230, Raleigh, NC, USA, 26-30 Apr. 2010.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. D. Torres, D. Hiemstra, I. Weber, and P. Serdyukov, &amp;quot;Query recommendation for children,&amp;quot; in Proc. of the 21th ACM Int. Conf. on Information and Knowledge Management, CIKM&amp;#39;12, pp.  2010-2014, Maui, HI, USA, 29 Oct. 2- Nov. 2012.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	S. D. Torres, D. Hiemstra, and T. Huibers, &amp;quot;Vertical selection in the information domain of children,&amp;quot; in Proc. of the 13th ACM/IEEE-CS Joint Conf. on Digital Libraries, JCDL&amp;#39;13, pp. 57-66, 22-26 Jul. 2013.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	S. D. Torres, D. Hiemstra, I. Weber, and P. Serdyukov, &amp;quot;Query recommendation in the information domain of children,&amp;quot; J. of the Association for Information Science and Technology, vol. 65, no. 7, pp. 1368-1384, Jul. 2014.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Y. Wang and E. Agichtein, &amp;quot;Query ambiguity revisited: clickthrough measures for distinguishing informational and ambiguous queries,&amp;quot; in the Annual Conf. of the North American Chapter of the Association for Computational Linguistics, pp. 361-364, 2-4 Jun. 2010.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	H. Duan, E. Kiciman, and C. Zhai, &amp;quot;Click patterns: an empirical representation of complex query intents,&amp;quot; in Proc. of the 21st ACM Int. Conf. on Information and Knowledge Management, CIKM&amp;#39;12, pp. 1035-1044, Maui, HI, USA, 29 Oct.- 2 Nov. 2012.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	D. Beeferman and A. Berger, &amp;quot;Agglomerative clustering of a search engine query log,&amp;quot; in Proc. of the 6th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, KDD&amp;#39;00, pp. 407-416, Boston, MA, USA, 20-23 Aug. 2000.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. Hosseini and H. Abolhassani, &amp;quot;Clustering search engine log for query recommendation,&amp;quot; in Proc.-Advances in Computer Science and Engineering, vol. 6, pp. 380-387, Kish Island, Iran, 9-11 Mar. 2008.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Alteyx Inc., &amp;quot;Ateryx Designer x64,&amp;quot; Boulder, Colorado, 2015. Availabe: http://www.alteryx.com.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	&amp;quot;Weka 3: Data Mining Software in Java,&amp;quot; Machine Learning Group at the University of Waikato, Hamilton, New Zealand, 2015. Availabe: http://www.cs.waikato.ac.nz/~ml/weka/.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	R. Wetzker, C. Zimmermann, and C. Bauckhage, &amp;quot;Analyzing social bookmarking systems: a del.icio.us cookbook,&amp;quot; in Proc. of the ECAI Mining Social Data Workshop, pp. 26-30, Jul. 2008.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Adaptive Educational Hypermedia Web Pages Recommending Based on Learning Automata and User Feedback for Resource-Based Learning</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Tahmasebi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Faranak</given_name><surname>Fotouhi-Dgazvini</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Esmaeili</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>20</day><year>2018</year></publication_date><pages><first_page>61</first_page><last_page>70</last_page></pages><doi_data><doi>10.66224/ijece.28311.16.1.61</doi><resource>http://ijece.org/fa/Article/28311</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28311</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28311</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28311</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28311</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28311</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28311</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28311</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. J. Hannafin and J. Hill, &amp;quot;Resource-based learning,&amp;quot; in Handbook of Research on Educational Communications and Technology, vol. 3, pp. 525-536, 2007.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	W. Chen, Z. Niu, X. Zhao, and Y. Li, &amp;quot;A hybrid recommendation algorithm adapted in e-learning environments,&amp;quot; World Wide Web, vol. 17, pp. 271-284, 2014.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	B. Mobasher, &amp;quot;Web usage mining and personalization,&amp;quot; In Practical Handbook of Internet Computing, Munindar P. Singh, ed., CRC Press. 2005, pp. 2-31.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	O. C. Santos and J. G. Boticario, &amp;quot;Modeling recommendations for the educational domain,&amp;quot; Procedia Computer Science, vol. 1, pp. 2793-2800, 2010.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Sikka, A. Dhankhar, and C. Rana, &amp;quot;A survey paper on e-learning recommender system,&amp;quot; International J. of Computer Applications, vol. 47, no. 9,  pp. 27-30, Jun. 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Lu, D. Wu, M. Mao, W. Wang, and G. Zhang, &amp;quot;Recommender system application developments: a survey,&amp;quot; Decision Support Systems, vol. 74, pp. 12-32, Jun. 2015.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Tadlaoui, K. Sehaba, and S. George, &amp;quot;Recommendation of learning resources based on social relations,&amp;quot; in Proc. of the 7th Int. Conf. on Computer Supported Education, CSEDU&amp;#39;15, 8pp., Lisbon, Portugal, May. 2015.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	P. Resnick and H. R. Varian, &amp;quot;Recommender systems,&amp;quot; Communications of the ACM, vol. 40, no. 3, pp. 56-58, Mar. 1997.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Kunaver and T. Pozrl, &amp;quot;Diversity in recommender systems-a survey,&amp;quot; Knowledge-Based Systems, vol. 123, pp. 154-162, May 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Bobadilla, A. Hernando, F. Ortega, and J. Bernal, &amp;quot;A framework for collaborative filtering recommender systems,&amp;quot; Expert Systems with Applications, vol. 38, no. 12, pp. 14609-14623, Nov./Dec. 2011.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	X. Su and T. M. Khoshgoftaar, &amp;quot;A survey of collaborative filtering techniques,&amp;quot; Advances in Artificial Intelligence, vol. 2009, p. 4, 2009.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. J. Pazzani and D. Billsus, &amp;quot;Content-based recommendation systems,&amp;quot; in the Adaptive Web, Ed: Springer, pp. 325-341, 2007.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	P. Lops, M. De Gemmis, and G. Semeraro, &amp;quot;Content-based recommender systems: State of the art and trends,&amp;quot; in Recommender systems handbook, Ed: Springer, 2011, pp. 73-105.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	R. Burke, &amp;quot;Hybrid recommender systems: survey and experiments,&amp;quot; User Modeling and User-Adapted Interaction, vol. 12, no. 4, pp. 331-370, Nov. 2002.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	R. Burke, &amp;quot;Hybrid web recommender systems,&amp;quot; in the adaptive web, ed: Springer, pp. 377-408, 2007.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	H. Drachsler, Navigation support for learners in informal learning networks, 2009.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	K. Wei, J. Huang, and S. Fu, &amp;quot;A survey of e-commerce recommender systems,&amp;quot; in Proc. Int. Conf. on Service Systems and Service Management, 5 pp., Chengdu, China, 9-11 Jun. 2007.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. B. Schafer, J. Konstan, and J. Riedl, &amp;quot;Recommender systems in e-commerce,&amp;quot; in Proc. of the 1st ACM Conf. on Electronic Commerce, pp. 158-166, Denver, CL, USA, 3-5 Nov. 1999.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	W. Xiao, S. Yao, and S. Wu, &amp;quot;Improving on recommend speed of recommender systems by using expert users,&amp;quot; in Proc.  Control and Decision Conf., CCDC’16, 2016 Chinese, pp. 2425-2430, Yinchuan, Chin,a 28-30 May 2016.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Edmunds and A. Morris, &amp;quot;The problem of information overload in business organisations: a review of the literature,&amp;quot; International J. of Information Management, vol. 20, no. 1, pp. 17-28, Feb. 2000.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	D. Fonseca, R. T. Kompen, E. Labrador, and E. Villegas, &amp;quot;Technology-enhanced learning: good educational practices,&amp;quot; Global Implications of Emerging Technology Trends, 93-114, 22 pp., Jan. 2018.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Graf, &amp;quot;Adaptivity in learning management systems focussing on learning styles,&amp;quot; Vienna University of Technology, 2007.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	F. Ricci, L. Rokach, and B. Shapira, Introduction to recommender systems handbook: Springer, 2011.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	N. Manouselis, H. Drachsler, R. Vuorikari, H. Hummel, and R. Koper, &amp;quot;Recommender systems in technology enhanced learning,&amp;quot; Recommender Systems Handbook, Ed: Springer, pp. 387-415, 2011.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	N. Manouselis and C. Costopoulou, &amp;quot;Analysis and classification of multi-criteria recommender systems,&amp;quot; World Wide Web, vol. 10, no. 4, pp. 415-441, Dec. 2007.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	G. Adomavicius and A. Tuzhilin, &amp;quot;Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions,&amp;quot; IEEE Trans. on Knowledge and Data Engineering, 
vol. 17, no. 6, pp. 734-749, Jun. 2005.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	D. H. Park, H. K. Kim, I. Y. Choi, and J. K. Kim, &amp;quot;A literature review and classification of recommender systems research,&amp;quot; Expert Systems with Applications, vol. 39, no. 11, pp. 10059-10072, Sept. 2012.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	L. Lu, M. Medo, C. H. Yeung, Y. C. Zhang, Z. K. Zhang, and T. Zhou, &amp;quot;Recommender systems,&amp;quot; Physics Reports, vol. 519, no. 1, pp. 1-49, Oct. 2012.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	N. Manouselis, H. Drachsler, K. Verbert, and O. C. Santos, Recommender Systems for Technology Enhanced Learning: Research Trends and Applications: Springer Science &amp;amp; Business Media, 2014.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	N. Manouselis, H. Drachsler, K. Verbert, and E. Duval, Recommender Systems for Learning: Springer Science &amp;amp; Business Media, 2012.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	K. Verbert, N. Manouselis, X. Ochoa, M. Wolpers, H. Drachsler, 
I. Bosnic, et al., &amp;quot;Context-aware recommender systems for learning: a survey and future challenges,&amp;quot; IEEE Trans. on Learning Technologies, vol. 5, no. 4, pp. 318-335, Dec. 2012.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	G. Adomavicius and A. Tuzhilin, Context-Aware Recommender Systems, in Recommender Systems Handbook, Ed: Springer, pp. 217-253, 2011.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	M. Talabeigi, R. Forsati, and M. R. Meybodi, &amp;quot;A dynamic web recommender system based on cellular learning automata,&amp;quot; in Proc. 2nd Int. Conf. on  Computer Engineering and Technology, ICCET&amp;#39;10, vol. 7, pp. 755-761, 16-18 Apr. 2010.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	M. Talabeigi, R. Forsati, and M. R. Meybodi, &amp;quot;A hybrid web recommender system based on cellular learning automata,&amp;quot; in Proc. IEEE Int. Conf. on Granular Computing, GrC’10, pp. 453-458, San Jose, CA, USA, 14-16 Aug. 2010.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	C. C. Cingi, &amp;quot;Computer aided education,&amp;quot; Procedia-Social and Behavioral Sciences, vol. 103, pp. 220-229, 26 Nov. 2013.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	R. M. Felder and R. Brent, &amp;quot;Understanding student differences,&amp;quot; J. of Engineering Education, vol. 94, no. 1, pp. 57-72, Jan. 2005.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	M. J. Huang, H. S. Huang, and M. Y. Chen, &amp;quot;Constructing a personalized e-learning system based on genetic algorithm and case-based reasoning approach,&amp;quot; Expert Systems with Applications, 
vol. 33, no. 3, pp. 551-564, Oct. 2007.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	P. Brusilovsky and E. Millan, &amp;quot;User models for adaptive hypermedia and adaptive educational systems,&amp;quot; The Adaptive Web, vol. 4321, pp. 3-53, 2007.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	F. Dag and A. Gecer, &amp;quot;Relations between online learning and learning styles,&amp;quot; Procedia-Social and Behavioral Sciences, vol. 1, no. 1, pp. 862-871, Jan. 2009.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	T. J. Sewall, The Measurement of Learning Style: A Critique of Four Assessment Tools, 1986.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	R. Riding and I. Cheema, &amp;quot;Cognitive styles-an overview and integration,&amp;quot; Educational Psychology, vol. 11, no. 3-4, pp. 193-215, Jan 1991.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	R. R. Rabbat, Bayesian Expert systems and Multi-Agent Modeling for Learner-Centric Web-Based Education, Ph.D. Dissertation, Massachusetts Institute of Technology, Feb. 2005.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	C. W. Allinson and J. Hayes, &amp;quot;The cognitive style index: a measure of intuition‐analysis for organizational research,&amp;quot; J. of Management Studies, vol. 33, no. 1, pp. 119-135, Jan. 1996.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	R. Dunn, R. I. Sklar, J. Beaudry, and J. Bruno, &amp;quot;Effects of matching and mismatching minority developmental college students&amp;#39; hemispheric preferences on mathematics scores,&amp;quot; The J. of Educational Research, vol. 83, no. 5, pp. 283-288, Jan. 1990.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	R. M. Felder and L. K. Silverman, &amp;quot;Learning and teaching styles in engineering education,&amp;quot; Engineering Education, vol. 78, no. 7, pp. 674-681, Sept. 1988.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	E. Ozpolat and G. B. Akar, &amp;quot;Automatic detection of learning styles for an e-learning system,&amp;quot; Computers &amp;amp; Education, vol. 53, no. 2, pp. 355-367, Sept. 2009.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	C. A. Carver, R. A. Howard, and W. D. Lane, &amp;quot;Enhancing student learning through hypermedia courseware and incorporation of student learning styles,&amp;quot; IEEE Trans. on Education, vol. 42, no. 1, pp. 33-38, Feb. 1999.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	H. Hong and D. Kinshuk, &amp;quot;Adaptation to student learning styles in web based educational systems,&amp;quot; in Proc. World Conf. on Educational Media and Technology, EdMedia&amp;#39;04, pp. 491-496, Jan. 2004.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	M. S. Zywno, &amp;quot;A contribution to validation of score meaning for Felder-Soloman&amp;#39;s index of learning styles,&amp;quot; in Proc. of the American Society for Engineering Education annual Conf. &amp;amp; Exposition, 16 pp., Jun. 2003.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50]	R. M. Felder and J. Spurlin, &amp;quot;Applications, reliability and validity of the index of learning styles,&amp;quot; International J. of Engineering Education, vol. 21, no. 1, pp. 103-112, 2005.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51]	P. Paredes and P. Rodriguez, &amp;quot;Considering sensing-intuitive dimension to exposition-exemplification in adaptive sequencing,&amp;quot; in Proc. Int. Conf. on Adaptive Hypermedia and Adaptive Web-Based Systems, vol. 2347, pp. 556-559, May 2002.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52]	S. Wolfram, &amp;quot;Cellular automata as models of complexity,&amp;quot; Nature, vol. 311, pp. 419-424, Oct. 1984.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53]	J. Kari, &amp;quot;Theory of cellular automata: a survey,&amp;quot; Theoretical Computer Science, vol. 334, no. 1-3, pp. 3-33, Apr 2005.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[54]	J. A. Torkestani, &amp;quot;An adaptive learning automata-based ranking function discovery algorithm,&amp;quot; J. of Intelligent Information Systems, vol. 39, no. 2, pp. 441-459, Oct. 2012.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[55]	K. S. Narendra and M. A. Thathachar, Learning Automata: An Introduction: Courier Corporation, 2012.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[56]	K. S. Narendra and M. A. Thathachar, &amp;quot;Learning automata-a survey,&amp;quot; IEEE Trans. on Systems, Man, and Cybernetics, vol. 4, no. 4, pp. 323-334, Jul. 1974.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[57]	M. A. Thathachar and P. S. Sastry, &amp;quot;Varieties of learning automata: an overview,&amp;quot; IEEE Trans. on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 32, no. 6, pp. 711-722, Dec. 2002.</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[58]	X. N. Lam, T. Vu, T. D. Le, and A. D. Duong, &amp;quot;Addressing cold-start problem in recommendation systems,&amp;quot; in Proc. of the 2nd Int. Conf. on Ubiquitous Information Management and Communication, pp. 208-211, Suwon, Korea, 31 Jan.-1 Feb. 2008.</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[59]	M. Claypool, A. Gokhale, T. Miranda, P. Murnikov, D. Netes, and M. Sartin, &amp;quot;Combining content-based and collaborative filters in an online newspaper,&amp;quot; in Proc. of ACM SIGIR Workshop on Recommender Systems, 8 pp., Berkely, CA, USA, 19 Aug. 1999.</unstructured_citation></citation><citation key="ref60"><unstructured_citation>
[60]	R. R. Schmeck, Learning Strategies and Learning Styles, Springer Science &amp;amp; Business Media, 2013.</unstructured_citation></citation><citation key="ref61"><unstructured_citation>
[61]	H. M. Truong, &amp;quot;Integrating learning styles and adaptive e-learning system: current developments, problems and opportunities,&amp;quot; Computers in Human Behavior, pt. B, vol. 55, pp. 1185-1193, Feb. 2016.</unstructured_citation></citation><citation key="ref62"><unstructured_citation>
[62]	R. M. Felder and B. A. Soloman, &amp;quot;Index of learning styles (ILS),&amp;quot; Online at http://www4.ncsu.edu/unity/lockers/users/f/felder/public/ILSpage.html, 1999.</unstructured_citation></citation><citation key="ref63"><unstructured_citation>
[63]	S. Martin, &amp;quot;Teachers using learning styles: torn between research and accountability?&amp;quot; Teaching and Teacher Educationvol. 26, no. 8, pp. 1583-1591, Nov. 2010.</unstructured_citation></citation><citation key="ref64"><unstructured_citation>
[64]	T. A. S. F. (ASF), &amp;quot;The Apache Lucene TM project,&amp;quot; 2016.</unstructured_citation></citation><citation key="ref65"><unstructured_citation>
[65]	M. Erdt, A. Fernandez, and C. Rensing, &amp;quot;Evaluating recommender systems for technology enhanced learning: a quantitative survey,&amp;quot; IEEE Trans. on Learning Technologies, vol. 8, no. 4, pp. 326-344, Jun. 2015.</unstructured_citation></citation><citation key="ref66"><unstructured_citation>
[66]	H. Drachsler, H. G. Hummel, and R. Koper, &amp;quot;Identifying the goal, user model and conditions of recommender systems for formal and informal learning,&amp;quot; J. of Digital Information, vol. 10, no. 2, pp. 4-24, Mar. 2009.</unstructured_citation></citation><citation key="ref67"><unstructured_citation>
[67]	T. Qin, T. Y. Liu, J. Xu, and H. Li, &amp;quot;LETOR: a benchmark collection for research on learning to rank for information retrieval,&amp;quot; Information Retrieval, vol. 13, no. 4, pp. 346-374, Aug. 2010.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New BGP-based Load Distribution Approach in Geographically Distributed Data Centers</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Esmaeili</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>B.</given_name><surname>Bakhshi</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>20</day><year>2018</year></publication_date><pages><first_page>71</first_page><last_page>78</last_page></pages><doi_data><doi>10.66224/ijece.28312.16.1.71</doi><resource>http://ijece.org/fa/Article/28312</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28312</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28312</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28312</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28312</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28312</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28312</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28312</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	H. Goudarzi and M. Pedram, &amp;quot;Force-directed geographical load balancing and scheduling for batch jobs in distributed datacenters,&amp;quot; in Proc. IEEE Int. Conf. on Cluster Computing, CLUSTER&amp;#39;13, 8 pp., Indianapolis, IN, USA, 23-27 Sept. 201 2013.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	-, About Data Centers, www.tia942.org/content/162/289/About_Data_Centers (Accessed on 11 May 2017).</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Goudarzi, S. Hatami, and M. Pedram, &amp;quot;Demand-side load scheduling incentivized by dynamic energy prices,&amp;quot; in Proc. IEEE Int. Conf. on Smart Grid Communications, SmartGridComm&amp;#39;11, pp. 351-356, Brussels, Belgium, 17-20 Oct. 2011.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	H. Uppal and D. Brandon, OpenFlow Based Load Balancing, Networking Project Report, University of Washington, 2010.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	D. Kreutz, et al., &amp;quot;Software-defined networking: a comprehensive survey,&amp;quot; Proceedings of the IEEE, vol. 103, no. 1, pp. 14-76, Jan. 2015.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	N. Gude, et al., &amp;quot;NOX: towards an operating system for networks,&amp;quot; ACM SIGCOMM Computer Communication Review, vol. 38, no. 3, pp. 105-110, Jul. 2008.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	A. Serra, D. Gaiti, G. Barroso, and J. Boudy, &amp;quot;Assuring QoS differentiation and load balancing on web servers clusters,&amp;quot; in Proc. IEEE Conf. on Control Applications, CCA&amp;#39;05, pp. 885-890, Toronto, Canada, 28-31 Aug. 2005.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	H. Zhang and X. Guo, &amp;quot;SDN-based load balancing strategy for server cluster,&amp;quot; in Proc. IEEE 3rd Int. Conf. on Cloud Computing and Intelligence Systems, pp. 662-667, Shenzhen, China, 27-29 Nov. 2014.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	F. Semchedine, L. Bouallouche-Medjkoune, O. Sayeh, S. Ayoub, and D. A&amp;#239;ssani, &amp;quot;DNS-based load balancing with cache for geographically distributed web server systems,&amp;quot; in Proc. Global Summit on Computer &amp;amp; Information Technology, GSCIT&amp;#39;14, 6 pp., Sousse, Tunisia, 14-16 Jun. 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Dilley, B. Maggs, J. Parikh, H. Prokop, R. Sitaraman, and B. Weihl, &amp;quot;Globally distributed content delivery,&amp;quot; IEEE Internet Computing, vol. 6, no. 5, pp. 50-58, Sep./Oct. 2002.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Jain, et al., &amp;quot;B4: experience with a globally-deployed software defined WAN,&amp;quot; ACM SIGCOMM Computer Communication Review, vol. 43, no. 4, pp. 3-14, Oct. 2013.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Network Working Group, The Common Gateway Interface (CGI) Version 1.1, https://tools.ietf.org/html/rfc2526 (Accessed on 11 May 2017).</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	H. Hashim and A. Manan, &amp;quot;Active anycast method for server load balancing,&amp;quot; in Proc. Student Conf. on Research and Development, pp. 105-108, Shah Alam, Malaysia, Malaysia 17-17 Jul. 2002.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	R. L. Pereira and T. Vazao, &amp;quot;Network layer implemented anycast load balancing,&amp;quot; in Proc. IEEE Symp. on Computers and Communications, pp. 387-393, Las Vegas, NV, USA, 1-4 Jul. 2007.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Network Working Group, A Border Gateway Protocol 4 (BGP-4), https://tools.ietf.org/html/rfc4271 (Accessed on 11 May 2017).</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker, &amp;quot;NOX: towards an operating system for networks,&amp;quot; ACM SIGCOMM Computer Communication Review, vol. 38, no. 3, pp. 105-110, Jul. 2008.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Kaur, S. Japinder, and S. Navtej, &amp;quot;Network programmability using POX controller,&amp;quot; in Proc. IEEE Int. Conf. on Communication, Computing &amp;amp; Systems, ICCCS&amp;#39;14, 2014.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. A. Dixit, F. Hao, S. Mukherjee, T. V. Lakshman, and R. Kompella, &amp;quot;Elasticon: an elastic distributed sdn controller,&amp;quot; in Proc. ACM/IEEE Symp. on Architectures for Networking and Communications Systems, pp. 17-20, Marina del Rey, CA, USA, 20-21 Oct. 2014.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Krishnamurthy, S. P. Chandrabose, and A. Gember-Jacobson, &amp;quot;Pratyaastha: an efficient elastic distributed SDN control plane,&amp;quot; ACM Workshop on Hot Topics in Software Defined Networking, pp. 133-138, Chicago, Illinois, USA, 22-22 Aug. 2014.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	V. Yazici, M. O. Sunay, and A. O. Ercan, &amp;quot;Controlling a software defined network via distributed controllers,&amp;quot; in Proc. NEM Summit, Implementing Future Media Internet towards New Horizons, 6 pp., 2012.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A New EPC-C1G2 Based Anti-Collision Algorithm to Address Tags’ Starvation in RFID Systems</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A.</given_name><surname>Abbasian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Safkhani</surname></person_name></contributors><publication_date media_type="online"><month>3</month><day>20</day><year>2018</year></publication_date><pages><first_page>79</first_page><last_page>87</last_page></pages><doi_data><doi>10.66224/ijece.28313.16.1.79</doi><resource>http://ijece.org/fa/Article/28313</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28313</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28313</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28313</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28313</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28313</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28313</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28313</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Park, M. Y. Chung, and T. J. Lee, &amp;quot;Identiﬁcation of RFID tags in framed-slotted ALOHA with robust estimation and binary selection,&amp;quot; IEEE Communications Letters, vol. 11, no. 5, pp. 452-454, May 2007.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	L. Zhang, W. Xiang, and X. Tang, &amp;quot;An adaptive anti-collision protocol for large-scale RFID tag identification,&amp;quot; IEEE Wireless Communications Letters, vol. 3, no. 6, pp. 601-604, Dec. 2014.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	L. Qiu, Z. Huang, S. Zhang, and W. Wang, &amp;quot;Location-aware anti-collision protocol for energy efficient passive RFID system,&amp;quot; in Proc. Int. Conf. on Indoor Positioning and Indoor Navigation, IPIN&amp;#39;14, 6 pp., Busan, South Korea, 27-30 Oct. 2014.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	K. Finkenzeller, RFID Handbook, Fundamentals and Applications in Contactless Smart Cards and Identification, John Wiley and Sons Ltd., pp. 206-219, 2003.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Capetanakis, &amp;quot;Tree algorithms for packet broadcast channels,&amp;quot; IEEE Trans. on Information Theory, vol. 25, no. 5, pp. 505-515, Sept. 1979.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	N. Bagheri, P. Alenaby, and M. Safkhani, &amp;quot;A new anti-collision protocol based on information of collided tags in RFID systems,&amp;quot; International J. of Communication Systems, vol. 30, no. 3, e2975, Feb. 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. G. Zhang, G. Li, Z. H. Pan, and Y. P. Liang, &amp;quot;A new anti-algorithm for RFID Tag,&amp;quot; International J. of Communication Systems, vol. 27, no. 11, pp. 3312-3322, Apr. 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. Liu, Z. W. Zhongxiang, J. Tan, H. Min, and J. Wang, &amp;quot;ALOHA algorithm considering the slot duration difference in RFID system,&amp;quot; in Proc. IEEE Int. Conf. on RFID, pp. 56-63, Orlando, FL, USA, 27-28 Apr. 2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	F. Baloch and R. Pendse, &amp;quot;A new anti-collision protocol for RFID networks,&amp;quot; in Proc. Wireless Telecommunications Symp., WTS’14, 5 pp., Washington, DC, USA, 9-11 Apr. 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Xiaolin, F. Quanyuan, and M. Chengzhen, &amp;quot;An efficient anti-collision protocol for RFID tag identification,&amp;quot; IEEE Communications Letters, vol. 14, no. 11, pp. 1014-1016, Nov. 2010.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	EPCglobal Inc., EPC Radio-Frequency Identity Protocols Class-1 Generation- 2 UHF RFID Protocol for Communications at 860 MHz - 960MHz Version 2.0.0, Nov. 2013.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>