﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022923</doi_batch_id><timestamp>14050229231836</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>4</month><day>20</day><year>2019</year></publication_date><journal_volume><volume>16</volume></journal_volume><issue>4</issue></journal_issue><journal_article publication_type="full_text"><titles><title>A Method to Get WSN Nodes Data by Web Clients through IoT Gateway Based on CoAP Protocol</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M. R.</given_name><surname>Nikseresht</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Haj Seyyed Javadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mahdi</given_name><surname>Mollamotalebi</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>20</day><year>2019</year></publication_date><pages><first_page>253</first_page><last_page>270</last_page></pages><doi_data><doi>10.66224/ijece.28429.16.4.253</doi><resource>http://ijece.org/fa/Article/28429</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28429</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28429</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28429</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28429</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28429</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28429</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28429</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	E. T. Winter and E. P. Thubert, &amp;quot;RFC 6550 RPL: IPv6 routing protocol for low-power and lossy networks,&amp;quot; IETF Stand. Track, 2012.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	W. Colitti, K. Steenhaut, N. De Caro, B. Buta, and V. Dobrota, &amp;quot;Evaluation of constrained application protocol for wireless sensor networks,&amp;quot; in Proc. 18th IEEE Work. Local Metrop. Area Networks, LANMAN’11, 6 pp., Chapel Hill, NC, USA, 13-14 Oct. 2011.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Z. Shelby, K. Hartke, and C. Bormann, RFC 7252 The Constrained Application Protocol (CoAP), Rfc 7252, p. 112, 2014.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	W. Li-Hong, T. Hai-Kun, and Y. G. Hua, &amp;quot;Sensors access scheme design based on internet of things gateways,&amp;quot; in Proc. Fifth Int. Conf. Intell. Syst. Des. Eng. Appl., pp. 901-904, Hunan, China, 15-16 Jun.. 2014.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Castro, A. J. Jara, and A. F. Skarmeta, &amp;quot;Enabling end-to-end CoAP-based communications for the web of things,&amp;quot; J. Netw. Comput. Appl., vol. 59, no. C, pp. 230-236, Jan. 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	H. Kuo, &amp;quot;Design and implementation of light-weight smart home gateway for social web of things,&amp;quot; in Proc. 6th Int. Conf. on Ubiquitous and Future Networks, ICUFN&amp;#39;14, pp. 425-430, Shanghai, China, 8-10 Jul. 2014.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Minerva, A. Biru, and D. Rotondi, &amp;quot;Towards a definition of the internet of things (IoT),&amp;quot; IEEE Internet Things, Rev. 1, 2017.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Ludovici and A. Calveras, &amp;quot;A proxy design to leverage the interconnection of CoAP wireless sensor networks with web applications,&amp;quot; Sensors, vol. 15, no. 1, pp. 1217-1244, Jan. 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	T. Leva, O. Mazhelis, and H. Suomi, &amp;quot;Comparing the cost-efficiency of CoAP and HTTP in web of things applications,&amp;quot; Decis. Support Syst., vol. 63, pp. 23-38, Oct. 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	C. Bormann, A. P. Castellani, and Z. Shelby, &amp;quot;CoAP: an application protocol for billions of tiny internet nodes,&amp;quot; IEEE Internet Comput., vol. 16, no. 2, pp. 62-67, Mar./Apr. 2012.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	C. Science, &amp;quot;Toward the Internet of things tpplication and management: a Practical approach,  in Proc of IEEE Int. Symp. on a World of Wireless, Mobile and Multimedia Networks, Sydney, NSW, Australia, 19-19 Jun. 2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	I. Ishaq, et al., &amp;quot;IETF standardization in the field of the internet of things (IoT): a survey, J. Sens. Actuator Netw., vol. 2, no. 2, pp. 235-287, 2013.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Laine, &amp;quot;RESTful Web Services for the Internet of Things,&amp;quot; pp. 2-4.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	I. Standard and I. C. Society, &amp;quot;Local and metropolitan area networks-Part 15. 4: low-rate wireless personal area networks (LR-WPANs) IEEE Computer Society,&amp;quot; vol. 2011, no. September, 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, &amp;quot;Internet of things: a survey on enabling technologies, protocols and applications,&amp;quot; IEEE Commun. Surv. Tutorials, vol. 4, no. 99, pp. 2347-2376, Fourth Quarter 2015.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	N. S. Bhat, &amp;quot;Design and implementation of IEEE 802.15.4 Mac protocol on FPGA,&amp;quot; pp. 4-8, 2011.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. and C. B. Zach, 6LoWPAN: The Wireless Embedded Internet. 2011.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	G. Mulligan, &amp;quot;The 6LoWPAN architecture,&amp;quot; 6LoWPAN Work. Gr. Internet Eng. Task Force, p. 78, 2007.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	&amp;quot;ARM IoT Tutorial CoAP: The web of things protocol,&amp;quot; 2014. [Online]. Available: https://community.arm.com/servlet/JiveServlet/previewBody/8633-102-2-15471/ARM CoAP Tutorial April 30 2014.pdf. [Accessed: 04-Aug-2016].</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. Kovatsch, S. Duquennoy, and A. Dunkels, &amp;quot;A low-power CoAP for Contiki,&amp;quot; in Proc. 8th IEEE Int. Conf. Mob. Ad-hoc Sens. Syst. MASS.11, pp. 855-860, Valencia, Spain, 17-22 Oct. 2011.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	W. Colitti, K. Steenhaut, and N. De Caro, &amp;quot;Integrating wireless sensor networks with the web,&amp;quot; in Proc. Conf. Inf. Process. Sens. Networks, IP+ SN&amp;#39;11, pp. 2-6, Chicago, IL, USA, 12–14 Apr. 2011.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Duquennoy, N. Wirstrom, N. Tsiftes, and A. Dunkels, &amp;quot;Leveraging IP for Sensor Network Deployment,&amp;quot; Sics.Se, 2011.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. Elias and S. Shivashankar, &amp;quot;A REST based design for web of things in smart environments,&amp;quot; in Proc. 2nd IEEE Int. Conf. on Parallel, Distributed and Grid Computing, pp. 337-342, Solan, India, 6-8 Dec. 2012.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	W. Colitti, K. Steenhaut, N. De Caro, B. Buta, and V. Dobrota, &amp;quot;REST enabled wireless sensor networks for seamless integration with web applications,&amp;quot; in Proc. IEEE Eighth Int. Conf. Mob. Ad-Hoc Sens. Syst., pp. 867-872, Valencia, Spain, 17-22 Oct. 2011.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Y. Park, N. T. Dinh, and Y. Kim, &amp;quot;A network monitoring system in 6LoWPAN networks,&amp;quot; in Proc. 4th Int. Conf. Commun. Electron. ICCE11, pp. 69-73, Hue, Vietnam, 1-3 Aug. 2012.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	O. Bergmann, K. T. Hillmann, and S. Gerdes, &amp;quot;A CoAP-gateway for smart homes,&amp;quot; in Proc. Int. Conf. Comput. Netw. Commun. ICNC&amp;#39;12, pp. 446-450, Maui, HI, USA, 30 Jan.-2 Feb. 2012.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	J. Melorose, R. Perroy, and S. Careas, &amp;quot;Conditional observe in CoAP draft-li-core-conditional-observe-05,&amp;quot; Internet-Draft, vol. 5, 2014.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	D. Sacramento and N. Correia, &amp;quot;Aggregation and scheduling in CoAP/observe based wireless sensor networks,&amp;quot; in Proc. IEEE Int. Conf. on Communications, ICC&amp;#39;15, pp. 2263-2269, London, UK, 8-12 Jun. 2015.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	M. R. Palattella, et al., &amp;quot;Standardized protocol stack for the internet of (important) things,&amp;quot; IEEE Commun. Surv. Tutorials, vol. 15, no. 3, pp. 1389-1406, Third Quarter 2013.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	-, An Introduction to Cooja, [Online]. Available: https://github.com/contiki-os/contiki/wiki/An-Introduction-to-Cooja. [Accessed: 04-Mar-2017].</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	&amp;quot;Contiki.org,&amp;quot; [Online]. Available: http://www.contiki-os.org/index.html. [Accessed: 11-Sep-2016].</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	C. Lerche, K. Hartke, and M. Kovatsch, &amp;quot;Industry adoption of the internet of things: a constrained application protocol survey,&amp;quot; in Proc. IEEE Int. Conf. Emerg. Technol. Fact. Autom., ETFA&amp;#39;12, 6 pp., Krakow, Poland, 17-21 Sept. 2012.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	M. Amiri, Measurements of Energy Consumption and Execution Time of Different Operations on Tmote Sky Sensor Motes, Ph.D. Thesis, p. 46, 2010.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Sustainable Tree-Based Scheduling in Solar Powered Wireless Mesh Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Barghi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. V.</given_name><surname>Azhari</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>20</day><year>2019</year></publication_date><pages><first_page>271</first_page><last_page>281</last_page></pages><doi_data><doi>10.66224/ijece.28430.16.4.271</doi><resource>http://ijece.org/fa/Article/28430</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28430</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28430</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28430</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28430</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28430</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28430</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28430</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	I. F. Akyildiz, X. Wang, and W. Wang, &amp;quot;Wireless mesh networks: a survey,&amp;quot; Comput. Networks, vol. 47, no. 4, pp. 445-487, Mar. 2005.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	IEEE Standards Association, 802.11-2012-IEEE Standard for Information Technology Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks Speciﬁc Requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY), Sept. 2012.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Barghi and S. V. Azhari, &amp;quot;A practical sleep coordination and management scheme with duty cycle control for energy sustainable IEEE 802.11s wireless mesh networks,&amp;quot; Wirel. Networks, vol. 21, no. 2, pp. 1-26, Feb. 2018.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Malekpour Shahraki, H. Barghi, S. V. Azhari, and S. Asaiyan, &amp;quot;Distributed and energy efficient scheduling for IEEE802.11s wireless EDCA networks,&amp;quot; Wirel. Pers. Commun., vol. 90, no. 1, pp. 301-323, 2016.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	B. Hohlt, L. Doherty, and E. Brewer, &amp;quot;Flexible power scheduling for sensor networks,&amp;quot; in Proc. of the 3rd Int. Symp. on Information Processing in Sensor Networks, IPSN&amp;#39;04, p. 205-214, 2004.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	E. S. Kim and C. A. Glass, &amp;quot;Perfect periodic scheduling for three basic cycles,&amp;quot; J. of Scheduling, vol. 17, no. 1, pp. 47-65, Feb. 2014.
[7]	E. S. Kim and C. A. Glass, &amp;quot;Perfect periodic scheduling for binary tree routing in wireless networks,&amp;quot; Eur. J. Oper. Res., vol. 247, no. 2, pp. 389-400, 1 Dec. 2015.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[8]	P. Shrivastava and S. B. Pokle, &amp;quot;Energy efficient scheduling strategy for data collection in wireless sensor networks,&amp;quot; in Proc. Int. Conf. on Electronic Systems, Signal Processing and Computing Technologies, pp. 170-173, Nagpur, India, 9-11 Jan. 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[9]	D. Ghosh, A. Gupta, and P. Mohapatra, &amp;quot;Admission control and interference-aware scheduling in multi-hop WiMAX networks,&amp;quot; in Proc. IEEE Int. Conf. on Mobile Adhoc and Sensor Systems, MASS&amp;#39;07, 9 pp., Pisa, Italy, 8-11 Oct. 2007.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10]	J. Zou and D. Zhao, &amp;quot;Real-time CBR traffic scheduling in IEEE 802.16-based wireless mesh networks,&amp;quot; Wirel. Networks, vol. 15, 
no. 1, pp. 65-72, Jan. 2009.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	I. Rhee, A. Warrier, J. Min, and L. Xu, &amp;quot;DRAND: distributed randomized TDMA scheduling for wireless ad hoc networks,&amp;quot; IEEE Trans. Mob. Comput., vol. 8, no. 10, pp. 190-201, Oct. 2009.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	Z. Wang, J. Li, L. Kang, C. Wang, and Y. Zhang, &amp;quot;Low-latency TDMA sleep scheduling in wireless sensor networks,&amp;quot; in Proc. 2015 IEEE/CIC Int. Conf. on Communications in China, ICCC&amp;#39;15, 6 pp., Shenzhen, China, 2-4 Nov. 2016.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	A. Kansal, J. Hsu, and S. Zahedi, &amp;quot;Power management in energy harvesting sensor networks,&amp;quot; ACM Trans. Embed. Comput. Syst., vol. 6, no. 4, pp. 1-35, Sept. 2007.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	C. M. Vigorito, D. Ganesan, and A. G. Barto, &amp;quot;Adaptive control of duty cycling in energy-harvesting wireless sensor networks,&amp;quot; in Proc. IEEE Int. Conf. on Sensing, Communication, and Networking, IEEE SECON&amp;#39;07, pp. 21-30, San Diego, CA, USA, 18-21 Jun. 2007.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	X. Fafoutis and N. Dragoni, &amp;quot;ODMAC: an on-demand MAC protocol for energy harvesting-wireless sensor networks,&amp;quot; in Proc. of the 8th ACM Symp. on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, PE-WASUN&amp;#39;11, pp. 49-56, Miami Beach, FL, USA, 31 Oct.- 4 Nov. 2011.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	S. Tang, J. Wu, G. Chen, C. Wang, X. Liu, T. Li, and X. Y. Li, &amp;quot;On minimum delay duty-cycling protocol in sustainable sensor network,&amp;quot; in Proc. Int. Conf. on Network Protocols, ICNP&amp;#39;12, 9 pp., Oct. 2012.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	B. Buchli, F. Sutton, J. Beutel, and L. Thiele, &amp;quot;Dynamic power management for long-term energy neutral operation of solar energy harvesting systems,&amp;quot; in Proc. 12th ACM Conf. Embedded Networked Sensor Systems, SenSys&amp;#39;14, pp. 31-45, Memphis, TN, USA, 3-6 Nov. 2014.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	L. X. Cai, T. H. Luan, J. W. Mark, and H. V. Poor, &amp;quot;Sustainability analysis and resource management for wireless mesh networks with renewable energy supplies,&amp;quot; IEEE J. Sel. Areas Commun., vol. 32, no. 2, pp. 345-355, Feb. 2014.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	M. K. Jakobsen, J. Madsen, and M. R. Hansen, &amp;quot;DEHAR: a distributed energy harvesting aware routing algorithm for ad-hoc multi-hop wireless sensor networks,&amp;quot; in Proc. IEEE Int. Symp. on World of Wireless Mobile and Multimedia Networks, WoWMoM&amp;#39;10, 9 pp., Montrreal, QC, Canada, 14-17 Jun. 2010.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	P. K. Srinivas, &amp;quot;SLR: sustainable longevity routing protocol for 
ad hoc networks,&amp;quot; in Proc. IEEE Int. Conf. on, Signal Processing, Communication and Computing, ICSPCC&amp;#39;13, 6 pp., KunMing, China, 5-8 Aug. 2013.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	C. Moser, J. Chen, and L. Thiele, &amp;quot;An energy management framework for energy harvesting embedded systems,&amp;quot; ACM J. Emerg. Technol. Comput. Syst., vol. 6, no. 2, Article No. 7, 21 pp., Jun. 2010.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	X. Shen, et al., &amp;quot;EFCon: energy flow control for sustainable wireless sensor networks,&amp;quot; Ad Hoc Networks, vol. 11, no. 4, pp. 1421-1431, Jun. 2011.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	G. H. Badawy, A. A. Sayegh, and T. D. Todd, &amp;quot;Fair flow control in solar powered WLAN mesh networks,&amp;quot; in Proc. IEEE Wireless Communications and Networking Conf., WCNC&amp;#39;09, 6 pp., Budapest, Hungary, 5-8 Apr. 2009.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	D. P. Consumption, D. Halperin, B. Greenstein, A. Sheth, and 
D. Wetherall, &amp;quot;Demystifying 802.11n power consumption,&amp;quot; in 
Proc. of the Workshop on Power Aware Computing and Systems HotPower&amp;#39;10, Article No. 1, pp. 2-6, Vancouver, BC, Canada, 2010.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Pattern-Matching Method for Estimating WCET of Multi-Path Monotonic Loops</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mehdi</given_name><surname>Sakhaei-nia</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S.</given_name><surname>parsa</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>20</day><year>2019</year></publication_date><pages><first_page>282</first_page><last_page>290</last_page></pages><doi_data><doi>10.66224/ijece.28431.16.4.282</doi><resource>http://ijece.org/fa/Article/28431</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28431</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28431</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28431</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28431</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28431</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28431</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28431</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	R. Wilhelm, et al., &amp;quot;The worst-case execution time problem-overview of approaches and survey of tools,&amp;quot; Trans. on Embedded Computing Sys., vol. 7, no. 3, Article No. 36, Apr. 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. Chapman, Static Timing Analysis and Program Proof, Ph.D. Dissertation, Univ. of York, 1995.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. Gustafsson, A. Ermedahl, C. Sandberg, and B. Lisper, &amp;quot;Automatic derivation of loop bounds and infeasible paths for WCET analysis using abstract execution,&amp;quot; in Proc. 27th IEEE Real-Time Systems Symp., RTSS&amp;#39;06, pp. 57-66, Rio de Janeiro, Brazil, 5-8 Dec. 2006.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Michiel, A. Bonenfant, H. Casse, and P. Sainrat, &amp;quot;Static loop bound analysis of C programs based on flow analysis and abstract interpretation,&amp;quot; in Proc. IEEE Int. Conf. on Embedded and Real-Time Computing Systems and Applications, RTCSA&amp;#39;08, pp. 161-166, Kaohsiung, Taiwan, 25-27 Aug. 2008.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	پ. سخائی‌نیا، &amp;quot;روشی مبتنی بر تطبیق الگو برای تخمین بیشترین زمان 
اجرای حلقه‌ها،&amp;quot; هشتمین کنفرانس بین‌المللی فناوری اطلاعات و دانش، 
صص. 766-760، همدان، شهريور 1395.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	C. Healy, M. Sjodin, V. Rustagi, D. Whalley, and R. Engelen, &amp;quot;Supporting timing analysis by automatic bounding of loop iterations,&amp;quot; J. of Real-Time Systems, vol. 18, no. 2-3, pp. 129-156, May 2000.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Tidorum Bound-T tool homepage. www.tidorum.fi/bound-t, 2008.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	N. Holsti, L. Thomas, and S. Saarinen, &amp;quot;Worst-case execution-time analysis for digital signal processors,&amp;quot; in Proc. of 10th European Signal Processing Conf., EUSIPCO&amp;#39;00, 14 pp., Tampere, Finland, 4-8 Sept. 2000.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Prantl, M. Schordan, and J. Knoop, &amp;quot;TuBound-a conceptually new tool for worst-case execution time analysis,&amp;quot; in Proc. 8th Int. Workshop on Worst-Case Execution Time Analysis, WCET&amp;#39;08, volpp. 141-148, Prague, Czech Republic, 2008.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	-, aiT Tool: The Industry Standard for Static Timing Analysis, 2007. http://www.absint.com/ait/</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	C. Cullmann and F. Martin, &amp;quot;Data-flow based detection of loop bounds,&amp;quot; in Proc. 7th Int. Workshop on Worst-Case Execution Time Analysis, WCET&amp;#39;07, 6 pp., Italy, Jul. 2007.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Knoop, L. Kovacs, and J. Zwirchmayr, &amp;quot;Symbolic loop bound computation for WCET analysis, in Perspectives of Systems Informatics, E. Clarke, I. Virbitskaite, and A. Voronkov, Eds. Springer Berlin Heidelberg, pp. 227-242, 2012.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Biere, J. Knoop, L. Kovacs, and J. Zwirchmayr, &amp;quot;The auspicious couple: symbolic execution and WCET analysis,&amp;quot; in Proc. of the 13th International Workshop on Worst-Case Execution Time Analysis, vol. 30, pp. 53-63, 9-9 Jul. 2013.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	S. Parsa and M. Sakhaei-Nia, &amp;quot;Modeling flow information of loops using compositional condition of controls,&amp;quot; The J. of Supercomputing, vol. 71, no. 2, pp. 508-536, Feb. 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Bygde, A. Ermedahl, and B. Lisper, &amp;quot;An efficient algorithm for parametric WCET calculation,&amp;quot; J. of Systems Architecture, vol. 57, no. 6, pp. 614-624, Jun. 2011.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Parsa and M. Sakhaei-Nia, &amp;quot;PLEA: parametric loop bound estimation in WCET analysis,&amp;quot; Turkish J. of Electrical Engineering &amp;amp; Computer Sciences, vol. 24, no. 4, pp. 2135-2149, Apr. 2016.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	L. N. D. Moura and N. Bjorner, &amp;quot;Z3: an efficient SMT solver,&amp;quot; TACAS, vol. 4963, pp. 337-340, Springer, 2008.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	D. Kebbal and P. Sainrat, &amp;quot;Combining symbolic execution and path enumeration in worst-case execution time analysis,&amp;quot; in Proc. 6th Int. Workshop on Worst-Case Execution Time Analysis, WCET&amp;#39;06, vol. 4, 6 pp., Jul. 2006.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. Gustafsson, A. Betts, A. Ermedahl, and B. Lisper, &amp;quot;The malardalen WCET benchmarks: past, present and future,&amp;quot; in Proc. 10th Int. Workshop on Worst-Case Execution Time Analysis, WCET&amp;#39;10, vol. 15, pp. 136-146, 2010.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Incremental Opinion Mining Using Active Learning over a Stream of Documents</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>F.</given_name><surname>Noorbehbahani</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>20</day><year>2019</year></publication_date><pages><first_page>291</first_page><last_page>300</last_page></pages><doi_data><doi>10.66224/ijece.28432.16.4.291</doi><resource>http://ijece.org/fa/Article/28432</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28432</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28432</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28432</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28432</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28432</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28432</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28432</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K. Ravi and V. Ravi, &amp;quot;A survey on opinion mining and sentiment analysis: tasks, approaches and applications,&amp;quot; Knowledge-Based Syst., vol. 89, pp. 14-46, Nov. 2015.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. A. Balazs and J. D. Velasquez, &amp;quot;Opinion mining and information fusion: a survey,&amp;quot; Inf. Fusion, vol. 27, pp. 95-110, Jan. 2016.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	B. Pang, L. Lee, and S. Vaithyanathan, &amp;quot;Thumbs up?: sentiment classification using machine learning techniques,&amp;quot; in Proc. of the ACL-02 Conf. on Empirical Methods in Natural Language Processing, vol. 10, pp. 79-86, 2002.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	R. McDonald, K. Hannan, T. Neylon, M. Wells, and J. Reynar, &amp;quot;Structured models for fine-to-coarse sentiment analysis,&amp;quot; in Proc. of the 45th Annual Meeting of the Association of Computational Linguistics, pp. 432-439, Prague, Czech Republic, 2007.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Y. Dang, Y. Zhang, and H. Chen, &amp;quot;A lexicon-enhanced method for sentiment classification: an experiment on online product reviews,&amp;quot; IEEE Intell. Syst., vol. 25, no. 4, pp. 46-53, Jul./Aug. 2010.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Blitzer, M. Dredze, and F. Pereira, &amp;quot;Biographies, bollywood, boom-boxes and blenders: domain adaptation for sentiment classification,&amp;quot; in Proc. of the 45th Annual Meeting of the Association of Computational Linguistics, pp. 440-447, 2007.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Rushdi-Saleh, M. T. Maritn-Valdivia, A. M. Raez, and L. A. U. Lpez, &amp;quot;Experiments with SVM to classify opinions in different domains,&amp;quot; Expert Syst. Appl., vol. 38, no. 12, pp. 14799-14804, Nov. /Dec. 2011.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	B. Pang and L. Lee, &amp;quot;A sentimental education: sentiment analysis using subjectivity summarization based on minimum cuts,&amp;quot; in Proc. of the 42nd Annual Meeting on Association for Computational Linguistics, Article No. 271, 8 pp., Barcelona, Spain, 21-26 Jul. 2004.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	M. Taboada and J. Grieve, &amp;quot;Analyzing appraisal automatically,&amp;quot; in Proc. of the AAAI Spring Symp. on Exploring Attitude and Affect in Text: Theories and Applications, pp. 158-161, Mar. 2004.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	X. Bai, &amp;quot;Predicting consumer sentiments from online text,&amp;quot; Decis. Support Syst., vol. 50, no. 4, pp. 732-742, Mar. 2011.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Z. Zhang, Q. Ye, Z. Zhang, and Y. Li, &amp;quot;Sentiment classification of internet restaurant reviews written in Cantonese,&amp;quot; Expert Syst. Appl., vol. 38, no. 6, pp. 7674-7682, Jun. 2011.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	L. K. W. Tan, J. C. Na, Y. L. Theng, and K. Chang, &amp;quot;Phrase-level sentiment polarity classification using rule-based typed dependencies and additional complex phrases consideration,&amp;quot; J. Comput. Sci. Technol., vol. 27, no. 3, pp. 650-666, Jan. 2012.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	G. Wang, J. Sun, J. Ma, K. Xu, and J. Gu, &amp;quot;Sentiment classification: the contribution of ensemble learning,&amp;quot; Decis. Support Syst., vol. 57, pp. 77-93, Jan. 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	R. Moraes, J. F. Valiati, and W. P. G. Neto, &amp;quot;Document-level sentiment classification: an empirical comparison between SVM and ANN,&amp;quot; Expert Syst. Appl., vol. 40, no. 2, pp. 621-633, 1 Feb. 2013.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. S. H. Basari, B. Hussin, I. G. P. Ananta, and J. Zeniarja, &amp;quot;Opinion mining of movie review using hybrid method of support vector machine and particle swarm optimization,&amp;quot; Procedia Eng., vol. 53, pp. 453-462,  2013.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Ghiassi, J. Skinner, and D. Zimbra, &amp;quot;Twitter brand sentiment analysis: a hybrid system using N-gram analysis and dynamic artificial neural network,&amp;quot; Expert Syst. Appl., vol. 40, no. 16, pp. 6266-6282, Nov. 2013.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. Smailovic, M. Grcar, N. Lavrac, and M. Znidarsic, &amp;quot;Stream-based active learning for sentiment analysis in the financial domain,&amp;quot; Inf. Sci., vol. 285, pp. 181-203, 20 Nov. 2014.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Zimmermann, E. Ntoutsi, and M. Spiliopoulou, &amp;quot;Incremental active opinion learning over a stream of opinionated documents,&amp;quot; Proc. Workshop on Issues of Sentiment Discovery and Opinion Mining, WISDOM&amp;#39;15, 10 pp., Sydney, Australia, 10 Aug. 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	E. Serrao and M. Spiliopoulou, &amp;quot;Active stream learning with an oracle of unknown availability for sentiment prediction,&amp;quot; in Proc. Workshop on Interactive Adaptive Learning, IAL&amp;#39;18, pp. 36-47, Dublin, Ireland, 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	I. Zliobaite, A. Bifet, B. Pfahringer, and G. Holmes, &amp;quot;Active learning with drifting streaming data,&amp;quot; IEEE Trans. Neural Netw. Learn. Syst., vol. 25, no. 1, pp. 27-39, Jan. 2014.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. McCallum and K. Nigam, &amp;quot;A comparison of event models for Naive Bayes text classification,&amp;quot; in Proc. AAAI-98 Workshop on Learning for Text Categorization, pp. 41-48, 1998.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	J. D. Rennie, L. Shih, J. Teevan, and D. R. Karger, &amp;quot;Tackling the poor assumptions of Naive Bayes text classifiers,&amp;quot; in Proc. of the 20th Int. Conf. on Machine Learning ICML&amp;#39;03, pp. 616-623, Washington, DC, USA, 21-24 Nov. 2003.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	T. R. Hoens, R. Polikar, and N. V. Chawla, &amp;quot;Learning from streaming data with concept drift and imbalance: an overview,&amp;quot; Prog. AI, vol. 1, no. 1, pp. 89-101, 2012.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. Gama, P. Medas, G. Castillo, and P. Rodrigues, &amp;quot;Learning with drift detection,&amp;quot; in Proc. of Advances in Artificial Intelligence, SBIA, vol. 3171, pp. 286-295, 2004.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	I. H. Witten, E. Frank, L. Trigg, M. Hall, G. Holmes, and S. J. Cunningham, &amp;quot;Weka: practical machine learning tools and techniques with java implementations,&amp;quot; 1999.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	G. H. John and P. Langley, &amp;quot;Estimating continuous distributions in bayesian classifiers,&amp;quot; in Proc. 11th Conf. on Uncertainty in Artificial Intelligence, pp. 338-345, Montreal, QC, Canada, 18-20 Aug. 1995.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	R. Quinlan, C4.5: Programs for Machine Learning, San Mateo, CA: Morgan Kaufmann Publishers, 1993.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	W. W. Cohen, &amp;quot;Fast effective rule induction,&amp;quot; in Proc. 12th Int. Conf. on Machine Learning, pp. 115-123, Tahoe City, CA, USA, 9-12 Jul. 1995.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	C. C. Chang and C. J. Lin, LIBSVM-A Library for Support Vector Machines, 2001.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Reduce Dimensions of CDF Steganalysis Approach Using a Graph Theory Based Feature Selection Method</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Azadifar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S. H.</given_name><surname>Khasteh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. H.</given_name><surname>Edrisi</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>20</day><year>2019</year></publication_date><pages><first_page>301</first_page><last_page>309</last_page></pages><doi_data><doi>10.66224/ijece.28433.16.4.301</doi><resource>http://ijece.org/fa/Article/28433</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28433</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28433</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28433</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28433</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28433</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28433</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28433</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. M. Badr, G. Ismaial, and A. H. Khalil, &amp;quot;A review on steganalysis techniques: from image format point of view,&amp;quot; International J. of Computer Applications, vol. 102, no. 4, pp. 11-19, Sep. 2014.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	V. Bhasin, P. Bedi, and A. Singhal, &amp;quot;Feature selection for steganalysis based on modified stochastic diffusion search using Fisher score,&amp;quot; in Proc. Int. Conf. on Advances in Computing, Communications and Informatics, ICACCI&amp;#39;14, pp. 2323-2330, New Delhi, India, 24-27 Sept. 2014.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Y. Miche, B. Roue, A. Lendasse, and P. Bas, &amp;quot;A feature selection methodology for steganalysis,&amp;quot; in B. Gunsel, A. K. Jain, A. M. Tekalp, B. Sankur (Eds.) Multimedia Content Representation, Classification and Security: Int. Workshop, MRCS 2006, Springer, Berlin, Heidelberg, pp. 49-56, Sep. 2006.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	T. Pevn, P. Bas, and J. Fridrich, &amp;quot;Steganalysis by subtractive pixel adjacency matrix,&amp;quot; Trans. Info. For. Sec., vol. 5, no. 2, pp. 215-224, Jun. 2010.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Westfeld and A. Pfitzmann, Attacks on Steganographic Systems, Information Hiding, 2000.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Fridrich, M. Goljan, and R. Du, &amp;quot;Reliable detection of LSB steganography in color and grayscale images,&amp;quot; in Proc. of the Workshop on Multimedia and Security, MM&amp;amp;Sec&amp;#39;01, pp. 27-30, Ottawa, ON, Canada, 5-5 Oct 2001.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Dumitrescu, X. Wu, and Z. Wang, &amp;quot;Detection of LSB steganography via sample pair analysis,&amp;quot; Information Hiding, 
vol. 51, no. 7, pp. 1995-2007, Jul. 2003.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Westfeld, Detecting Low Embedding Rates,&amp;quot; in: F. A. P. Petitcolas (Ed.) Information Hiding: 5th International Workshop, IH 2002, Springer Berlin Heidelberg, Berlin, 2003.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. M. S. Tarzjani and S. Ghaemmaghami, &amp;quot;Detection of LSB  replacement and LSB matching steganography using Gray level run length matrix,&amp;quot; in Proc. of 5th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 787-790, Kyoto, Japan, 12-14 Sept. 2009.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Goljan, J. Fridrich, and T. Holotyak, &amp;quot;New blind steganalysis and its implications,&amp;quot; Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, pp. 1-13, 2006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Harmsen and W. Pearlman, “Steganalysis of additive-noise modelable information hiding,” in Proc. SPIE Security Watermarking Multimedia Contents, vol. 5020, pp. 131-142, 2003.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Z. Zhang and E. R. Hancock, &amp;quot;Hypergraph based information-theoretic feature selection,&amp;quot; Pattern Recognition Letters, vol. 33, no. 15, pp. 1991-1999, 1 Nov. 2012.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	P. Zhu, W. Zhu, Q. Hu, C. Zhang, and W. Zuo, &amp;quot;Subspace clustering guided unsupervised feature selection,&amp;quot; Pattern Recognition, vol. 66, pp. 364-374, Jun. 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	H. Peng, F. Long, and C. Ding, &amp;quot;Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy,&amp;quot; IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 27, no. 8, pp. 1226-1238, Aug. 2005.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. Belkin and P. Niyogi, &amp;quot;Laplacian eigenmaps and spectral techniques for embedding and clustering,&amp;quot; Proc. of the 14th Int. Conf. on Neural Information Processing Systems: Natural and Synthetic, NIPS&amp;#39;01, pp. 585-592, Vancouver, BC, Canada, 3-8 Dec. 2002.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. Shi and J. Malik, &amp;quot;Normalized cuts and image segmentation,&amp;quot; IEEE Trans. Pattern Anal. Machine Intell, vol. 22, no. 8, pp. 888-905, Aug. 2000.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	F. Chung, &amp;quot;Spectral graph theory,&amp;quot; in Regional Conf. Series in Mathematics American Mathematical Society, vol. 92, pp. 1-212, 1997.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Q. Gu, Z. Li, and J. Han, &amp;quot;Generalized fisher score for feature selection,&amp;quot; in Proc. of the Int. Conf. on Uncertainty in Artificial Intelligence, pp. 266-273, Barcelona, Spain, 14-17 Jul. 2011.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	X. He, D. Cai, and P. Niyogi1, &amp;quot;Laplacian score for feature selection,&amp;quot; in Proc. of the 18th Int. Conf. on Neural Information Processing System, NIPS&amp;#39;05, pp. 507-514, Vancouver, BC, Canada, 5-8 Dec. 2005.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	H. Cheng, W. Deng, C. Fu, Y. Wang, and Z. Qin, &amp;quot;Graph-based semi-supervised feature selection with application to automatic 
spam image identification,&amp;quot; In: Yu Y., Yu Z., Zhao J. (eds) Computer Science for Environmental Engineering and EcoInformatics. CSEEE 2011. Communications in Computer and Information Science, vol. 159. Springer, Berlin, pp. 259-264, 2011.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Q. Song, J. Ni, and G. Wang, &amp;quot;A fast clustering-based feature subset selection algorithm for high-dimensional data,&amp;quot; IEEE Trans. on Knowledge and Data Engineering, vol. 25, no. 1, pp. 1-14, Jan. 2013.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Bandyopadhyay, T. Bhadra, P. Mitra, and U. Maulik, &amp;quot;Integration of dense subgraph finding with feature clustering for unsupervised feature selection,&amp;quot; Pattern Recognition Letters, vol. 40, pp. 104-112, 15 Apr. 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. Tabakhi and P. Moradi, &amp;quot;Relevance-redundancy feature selection based on ant colony optimization,&amp;quot; Pattern Recognition, vol. 48, no. 9, pp. 2798-2811, Sept. 2015.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	P. Moradi and M. Rostami, &amp;quot;A graph theoretic approach for unsupervised feature selection,&amp;quot; Engineering Applications of Artificial Intelligence, vol. 44, pp. 33-45, Sept. 2015.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. Che, Y. Yang, L. Li, X. Bai, S. Zhang, and C. Deng, &amp;quot;Maximum relevance minimum common redundancy feature selection for nonlinear data,&amp;quot; Information Sciences, vol. 409-410, pp. 68-86, Oct. 2017.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Ghaemi and M. R. Feizi-Derakhshi, &amp;quot;Feature selection using forest optimization algorithm,&amp;quot; Pattern Recognition, vol. 60, pp. 121-129, Dec. 2016.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	A. K. Farahat, A. Ghodsi, and M. S. Kamel, &amp;quot;Efficient greedy feature selection for unsupervised learning,&amp;quot; Knowledge and Information Systems, vol. 35, no. 2, pp. 285-310, May 2013.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	A. J. Ferreira and M. A. T. Figueiredo, &amp;quot;An unsupervised approach to feature discretization and selection,&amp;quot; Pattern Recognition, vol. 45, no. 9, pp. 3048-3060, Sept. 2012.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	Q. Wu, J. K. Hao, and F. Glover, &amp;quot;Multi-neighborhood tabu search for the maximum weight clique problem,&amp;quot; Ann Oper Res, vol. 196, no. 1, pp. 611-634, Jul. 2012.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	U. Brandes, &amp;quot;On variants of shortest-path betweenness centrality and their generic computation,&amp;quot; Social Networks, vol. 30, no. 2, pp. 136-145, May 2008.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	M. Mandal and A. Mukhopadhyay, &amp;quot;Unsupervised non-redundant feature selection: a graph-theoretic approach,&amp;quot; in Proc. of the Int. Conf. on Frontiers of Intelligent Computing: Theory and Applications, FICTA&amp;#39;13, pp. 373-380, 2013.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. Witten, The WEKA data mining software, Available from: &amp;lt;http://www.cs.waikato.ac.nz/ml/weka&amp;gt;.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	J. H. J. Xiao, K. Ehinger, A. Oliva, and A. Torralba, &amp;quot;SUN database: large-scale scene recognition from abbey to zoo,&amp;quot; in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, pp. 3485	-3492, San Francisco, CA, USA , 13-18 Jun. 2010.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	M. Friedman, &amp;quot;A comparison of alternative tests of significance for the problem of m rankings,&amp;quot; Annals of Math. Statistics, vol. 11, no. 1, pp. 86-92, 1940.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Enhancing Speed, Area and Power Consumption of Carry Select Adders Using a New Grouping Structure</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>A. </given_name><surname>Mohammad Nezhad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M. </given_name><surname>Taghizadeh Firoozjaee</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>20</day><year>2019</year></publication_date><pages><first_page>310</first_page><last_page>318</last_page></pages><doi_data><doi>10.66224/ijece.28434.16.4.310</doi><resource>http://ijece.org/fa/Article/28434</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28434</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28434</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28434</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28434</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28434</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28434</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28434</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	B. Parhami, Computer Arithmetic: Algorithms and Hardware Designs, 2nd Ed. New York, NY, USA: Oxford Univ. Press, 2010.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Z. Chen and I. Koren, &amp;quot;Techniques for yield enhancement of VLSI adders,&amp;quot; in Proc. Int. Conf. Appl. Speciﬁc Array Process., pp. 222-229, Strasbourg, France, 24-26 Jul. 1995.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	O. J. Bedrij, &amp;quot;Carry-select adder,&amp;quot; IRE Trans. on Electronic Computers, vol. 11, no. 3, pp. 340-346, Jun. 1962.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. A. Akbar and J. Lee, &amp;quot;Self-repairing adder using fault localization,&amp;quot; Microelectronics Reliability, vol. 54, no. 6-7, pp. 1443-1451, Jun./Jul. 2014.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. M. Rabaey, Digital Integrated Circuits-A Design Perspective, Prentice Hall Press, 2001.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. Kim and L. S. Kim, &amp;quot;64-bit carry-select adder with reduced area,&amp;quot; Electronics Letters, vol. 37, no. 10, pp. 614-615, May 2001.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Y. He, C. H. Chang, and J. Gu, &amp;quot;An area-efﬁcient 64-bit square root carry-select adder for low power application,&amp;quot; in Proc. IEEE Int. Symp. Circuits and Systems, pp. 4082-4085, Kobe, Japan, 23-26 May 2005.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	U. S. Kumar, K. K. M. Salih, and K. Sajith, &amp;quot;Design and implementation of carry select adder without using multiplexers,&amp;quot; 
in Proc. Int. Conf. on Emerging Technology Trends in Electronics, Communication and Networking, 5 pp., Gujarat, India, 19-21 Dec. 2012.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	B. Ramkumar and H. M. Kittur, &amp;quot;Low-power and area-efficient carry select adder,&amp;quot; IEEE Trans. Very Large Scale Integration (VLSI) Systems, vol. 20, no. 2, pp. 371-375, Feb. 2012.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	I. C. Wey, C. C. Ho, Y. S. Lin, and C. C. Peng, &amp;quot;An area-efficient carry select adder design by sharing the common Boolean logic term,&amp;quot; in Proc. Int. Multiconference of Engineering and Computer Scientist, IMECS&amp;#39;12, vol. 2, pp. 1091-1094, Hong Kong, Hong Kong, 14-16 Mar. 2012.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Manju and V. Sornagopal, &amp;quot;An efficient SQRT architecture of carry select adder design by common Boolean logic,&amp;quot; in Proc. IEEE Int. Conf. on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System, 5 pp., Tiruvannamalai, India, 7-9 Jan. 2013.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	G. K. Reddy and D. S. B. Rao, &amp;quot;A comparative study on low-power and high speed carry select adder,&amp;quot; in Proc. IEEE 9th Int. Conf. on Intelligent Systems and Control, ISCO&amp;#39;15, 7 pp., oimbatore, India, 9-10 Jan. 2015.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	B. K. Mohanty and S. K. Patel, &amp;quot;Area-delay-power efficient carry-select adder,&amp;quot; IEEE Trans. Circuits and Systems-II: Express Briefs, vol. 61, no. 6, pp. 418-422, Jun. 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Bahadori, M. Kamal, A. Afzali-Kusha, and M. Pedram, &amp;quot;An energy and area efficient yet high-speed square-root carry select adder structure,&amp;quot; Computers &amp;amp; Electrical Engineering, vol. 58, pp. 101-112, Feb. 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	N. H. E. Weste and K. Eshraghian, Principle of CMOS VLSI Design: A Systems Perspective, Pearson Education, 3rd Edition, 2005.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	D. P. Vasudevan, P. K. Lala, and J. P. Parkerson, &amp;quot;Self-checking carry-select adder design based on two-rail encoding,&amp;quot; IEEE Trans. Circuits and Systems I: Regular Papers, vol. 54, no. 12, pp. 2696-2705, Dec. 2007.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Improvement in Microblog Hashtag Recommendation Based on Topic Vector</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mir Saman</given_name><surname>Tajbakhsh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>J.</given_name><surname>Bagherzadeh</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>20</day><year>2019</year></publication_date><pages><first_page>319</first_page><last_page>326</last_page></pages><doi_data><doi>10.66224/ijece.28435.16.4.319</doi><resource>http://ijece.org/fa/Article/28435</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28435</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28435</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28435</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28435</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28435</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28435</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28435</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	N. Eltantawy and J. B. Wiest, &amp;quot;Social media in the Egyptian revolution: reconsidering resource mobilization theory,&amp;quot; International J. of Communication, vol. 5, no. 1, 18 pp, 2011.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. Laniado and P. Mika, &amp;quot;Making sense of twitter,&amp;quot; in Proc. 9th Inte. Semantic Web Conf., ISWC&amp;#39;10, pp. 470-485, Shanghai, China, 7-10 Nov. 2010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	E. Otsuka, S. A. Wallace, and D. Chiu, &amp;quot;Design and evaluation of a twitter hashtag recommendation system,&amp;quot; in Proc. of the 18th International Database Engineering &amp;amp; Applications Symposium, 
pp. 330-333, Yokohama, Japan, 7-9 Jul. 2014.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	J. Hillebrand, Twitter Hashtag Analysis: Do People Really Use Them?, 08 Aug 2016, https://www.quintly.com/blog/2014/08/ twitter-hashtag-analysis/[Accessed 8 Aug. 2016].</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	D. A. Melis and M. Saveski, &amp;quot;Topic modeling in twitter: aggregating tweets by conversations,&amp;quot; in Proc. 10th Int. AAAI Conf. on Web and Social Media, ICWSM&amp;#39;16, pp. 519-522, Cologne, Germany, 17-20 May 2016.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R. Mehrotra, S. Sanner, W. Buntine, and L. Xie, &amp;quot;Improving LDA topic models for microblogs via automatic tweet labeling and pooling,&amp;quot; in Proc. of 36th Annual ACM Special Interest Group on Information Retrieval Conf., SIGIR&amp;#39;13, pp. 889-892, Dublin, Ireland, 28 Jul.-1 Aug. 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	N. F. N. Rajani, K. McArdle, and J. Baldridge, &amp;quot;Extracting topics based on authors, recipients and content in microblogs,&amp;quot; in Proc. 
of the 37th Int. ACM SIGIR Conf. on Research &amp;amp; Development in Information Retrieval, SIGIR&amp;#39;14, pp. 1171-1174, New York, NY, USA, 6-11 Jul. 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	F. Godin, V. Slavkovikj, W. De Neve, B. Schrauwen, and R. V. Walle, &amp;quot;Using topic models for twitter hashtag recommendation,&amp;quot; in Proc. of the 22nd Int. Conf. on World Wide Web, WWW&amp;#39;13 Companion, pp. 593-596, New York, NY, USA, 13-17 May 2013.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>

[9]	Z. Ding, X. Huang, and Q. Zhang, &amp;quot;Automatic hashtag recommendation for microblogs using topic-specific translation model,&amp;quot; in Proc. 24th Int. Conf. on Computational Linguistics COLING&amp;#39;12, pp. 265-274, Bombay, India, 11-16 Dec. 2012.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. She and L. Chen, &amp;quot;TOMOHA: topic model-based hashtag recommendation on twitter,&amp;quot; in Proc. of the 23rd Int. Conf. on World Wide Web, WWW&amp;#39;14 Companion, pp. 371-372, New York, NY, USA, 07-11 Apr. 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Y. Gong, Q. Zhang, and X. Huang, &amp;quot;Hashtag recommendation using dirichlet process mixture models incorporating types of hashtags,&amp;quot; inProc. of the Conf. on Empirical Methods in Natural Language Processing, pp. 401-410, Lisbon, Portugal, 17-21 Sept. 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	F. Ricci, L. Rokach, B. Sharpira, and P. B. Kantor, Recommender Systems Handbook, Springer, 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	D. Jannach, M. Zanker, A. Felfernig, and G. Fredrich, Recommender Systems: An Introduction, Cambridge University Press, Sep. 2010.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	م. رجب‌زاده و ر. رافع، &amp;quot;ارائه یک سیستم توصیه‌گر ترکیبی برای تجارت الکترونیک،&amp;quot; مجله مهندسی برق دانشگاه تبریز، جلد ۴۵، شماره ۴، 
صص. ۸۵-۹۱، زمستان ۱۳۹۴.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	M. S. Tajbakhsh and J. Bagherzadeh, &amp;quot;Microblogging hashtag recommendation system based on semantic TF-IDF: twitter use case,&amp;quot; in Proc. 3rd International Symposium on Social Networks Analysis, Management and Security, SNAMS&amp;#39;16, pp. 252-257, Vienne, Austria, 22-24 Sept. 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	م. محسنی، م. ازوجی و ر. قادری، &amp;quot;قطعه‌بندی تصویر مبتنی بر برش نرمالیزه گراف از دیدگاه میزان اطلاعات جداکننده،&amp;quot; مجله مهندسی برق دانشگاه تبریز، جلد ۴۶، شماره ۱، صص. ۳۰۳-۳۱۰، بهار ۱۳۹۵.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	D. M. Blei, A. Y. Ng, and M. I. Jordan, &amp;quot;Latent dirichlet allocation,&amp;quot; J. of Machine Learning Research, vol. 3, no. 1, pp. 993-1022, Mar. 2003.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	G. Casella and E. I. George, &amp;quot;Explaining the gibbs sampler,&amp;quot; The American Statistician, vol. 46, no. 3, pp. 167-174, Dec. 1990.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	E. Zangerle, W. Gassler, and G. Specht, &amp;quot;On the impact of text similarity functions on hashtag recommendations in microblogging environments,&amp;quot; Social Network Analysis and Mining, vol. 3, no. 4, pp. 889-898, Dec. 2013.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	R. Li, S. Wang, H. Deng, R. Wang, and K. C. Chang, &amp;quot;Towards social user profiling: unified and discriminative influence model for inferring home locations,&amp;quot; in Proc. of the 18th ACM SIGKDD Inte. Conf. on Knowledge Discovery and Data Mining, 
pp. 1023-1031, Beijing, China, 12-16 Aug. 2012. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. W. Perry, A. Kent, and M. M. Berry, &amp;quot;Machine literature searching X Machine language, factors underlying its design and development,&amp;quot; American Documentation, vol. 6, no. 4, pp. 242-254, Oct. 1995.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Energy-Aware Scheduling for Real-Time Unicore Mixed-Criticality Systems</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S. H.</given_name><surname>Sadeghzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>yasser</given_name><surname>sedaghat</surname></person_name></contributors><publication_date media_type="online"><month>4</month><day>20</day><year>2019</year></publication_date><pages><first_page>327</first_page><last_page>334</last_page></pages><doi_data><doi>10.66224/ijece.28436.16.4.327</doi><resource>http://ijece.org/fa/Article/28436</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28436</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28436</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28436</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28436</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28436</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28436</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28436</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	C. B. Watkins and R. Walter, &amp;quot;Transitioning from federated avionics architectures to integrated modular avionics,&amp;quot; in Proc. IEEE/AIAA 26th Digital Avionics Systems Conf., DASC&amp;#39;07, 10 pp., Dallas, TX, USA, 21-25 Oct. 2007.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. Ramaker, W. Krug, and W. Phebus, &amp;quot;Application of a civil integrated modular architecture to military transport aircraft,&amp;quot; in Proc. IEEE/AIAA 26th Digital Avionics Systems Conf., DASC&amp;#39;07, 10 pp., Dallas, TX, USA, 21-25 Oct. 2007.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. Chen, C. Du, and P. Han, &amp;quot;Scheduling independent partitions in integrated modular avionics systems,&amp;quot; PloS one 11, 2016.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. K. Baruah, V. Bonifaci, G. D. Angelo, H. Li, A. Marchettispaccamela, N. Megow, and L. Stougie, &amp;quot;Scheduling real-time mixed-criticality jobs,&amp;quot; IEEE Trans. Comput., vol. 61, no. 8, 
pp. 1140-1152, Aug. 2012.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	F. Santy, L. George, P. Thierry, and J. Goossens, &amp;quot;Relaxing mixed-criticality scheduling strictness for task sets scheduled with FP,&amp;quot; Proc. 24th Euromicro Conf. on Real-Time Systems Real-Time Systems, ECRTS&amp;#39;12, pp. 155-165, Pisa, Italy, 11-13 Jul. 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Baruah, V. Bonifaci, G. DAngelo, H. Li, A. Marchetti-Spaccamela, S. Van Der Ster, and L. Stougie, &amp;quot;The preemptive uniprocessor scheduling of mixed-criticality implicit-deadline sporadic task systems,&amp;quot; in Proc. Euromicro Conf. on Real-Time Systems, ECRTS&amp;#39;12, pp. 145-154, Pisa, Italy, 11-13 Jul. 2012.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	T. Park and S. Kim, &amp;quot;Dynamic scheduling algorithm and its schedulability analysis for certifiable dual-criticality systems,&amp;quot; in Proc. Int. Conf. on Embedded Software, EMSOFT&amp;#39;11, pp. 253-262, Taipei, Taiwan, 9-14 Oct. 2011.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Baruah, H. Li, and L. Stougie, &amp;quot;Towards the design of certifiable mixed-criticality systems,&amp;quot; in Proc. Real-Time and Embedded Technology and Applications Symp., RTAS&amp;#39;10, pp. 13-22, Stockholm, Sweden, 12-15 Apr. 2010</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Baruah and S. Vestal, &amp;quot;Schedulability analysis of sporadic tasks with multiple criticality specifications,&amp;quot; in Proc. Euromicro Conf. on Real-Time Systems, ECRTS&amp;#39;08, pp. 147-155, Prague, Czech Republic, 2-4 Jul. 2008.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Taherin, M. Salehi, and A. Ejlali, &amp;quot;Stretch: exploiting service level degradation for energy management in mixed-criticality systems,&amp;quot; in Proc. Real-Time and Embedded Systems and Technologies, RTEST&amp;#39;15, 8 pp., Tehran, Iran, 2-7 Oct. 2015.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Schreiner, K. Gruttner, S. Rosinger, and A. Rettberg, &amp;quot;Autonomous flight control meets custom payload processing: a mixed-critical avionics architecture approach for civilian UAVs,&amp;quot; in Proc. IEEE 17th Int. Symp. on Object/Component/Service-Oriented Real-Time Distributed Computing, ISORC&amp;#39;14, pp. 348-357, Reno, NV, USA, 10-12 Jun.  2014.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Huang, et al., &amp;quot;Analysis and optimization of fault-tolerant task scheduling on multiprocessor embedded systems,&amp;quot; in Proc. of the 9th IEEE Int. Conf. on Hardware/ Software Codesign and System Synthesis, CODES+ISSS&amp;#39;11, pp. 247-256, Taipei, Taiwan, 9-14 Oct. 2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Y. Zhang and K. Chakrabarty, &amp;quot;Dynamic adaptation for fault tolerance and power management in embedded real-time systems,&amp;quot; ACM Trans. on Embedded Computing Systems, vol. 3, no. 2, pp. 336-360, May  2004.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	P. Marwedel, Embedded System Design, Vol. 1, New York: Springer, 2006.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	N. H. Weste and K. Eshraghian, Principles of CMOS VLSI Design: A Systems Perspective, 2nd Edition, Addision-Wesley Publishing, California, l994.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. Ejlali, B. M. Al-Hashimi, and P. Eles, &amp;quot;Low-energy standby-sparing for hard real-time systems,&amp;quot; IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, vol. 31, no. 3, pp. 329-342, Mar. 2012.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	D. Zhu, R. Melhem, and D. Mosse, &amp;quot;The effects of energy management on reliability in real-time embedded systems,&amp;quot; in Proc. IEEE/ACM Int. Conf. on Computer-Aided Design, ICCAD&amp;#39;04, pp. 35-40, San Jose, CA, USA, 7-11 Nov.2004.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	D. Zhu, &amp;quot;Reliability-aware dynamic energy management in dependable embedded real-time systems,&amp;quot; in Proc. Real-Time and Embedded Technology and Applications Symp., pp. 397-407, San Jose, CA, USA, 4-7 Apr. 2006.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. Hua, P. R. Pari, and G. Qu, &amp;quot;Dual-processor design of energy efficient fault-tolerant system,&amp;quot; in Proc. IEEE 17th Int. Conf. on Application-specific Systems, Architectures and Processors, ASAP&amp;#39;06, pp. 42-54, Steamboat Springs, CO, USA, 11-13 Sept. 2006.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Y. Zhang and K. Chakrabarty, &amp;quot;Energy-aware adaptive checkpointing in embedded real-time systems,&amp;quot; in Proc. of the Conf. on Design, Automation and Test in Europe, vol. 1, pp. 10918-10929, Munich, Germany, 7-7 Mar. 2003.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Ziv and J. Bruck, An Online Algorithm for Checkpointing Placement, 1995.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	H. Lee, H. Shin, and S. L. Min, &amp;quot;Worst case timing requirement of real-time tasks with tim. on Real-Time Computing Systems and Applications. RTCSA&amp;#39;99, pp. 410-421, Hong Kong, China,13-15 Dec. 1999.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	A. Duda, &amp;quot;The effects of checkpointing on program execution time,&amp;quot; Information Processing Letters, vol. 16, no. 5, pp. 221-229, Jun. 1983.
[24]	D. Zhu and H. Aydin, &amp;quot;Energy management for real-time embedded systems with reliability requirements,&amp;quot; in Proc. of the IEEE/ACM Inte. Conf. on Computer-Aided Design, ACM, pp. 528-534, San Jose, CA, USA, 5-9 Nov, 2008.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	M. A. Haque, H. Aydin, and D. Zhu, &amp;quot;Energy-aware standby-sparing for fixed-priority real-time task sets,&amp;quot; Sustainable Computing: Informatics and Systems, vol. 6, no. 16, pp. 81-93, Jun. 2015.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	R. Davis and A. Wellings, &amp;quot;Dual priority scheduling,&amp;quot; in Proc. 16th IEEE Real-Time Systems Symp., pp. 100-109, Pisa, Italy, 5-7 Dec. 1995.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	P. Pillai and K. G. Shin, &amp;quot;Real-time dynamic voltage scaling for low-power embedded operating systems,&amp;quot; ACM SIGOPS Operating Systems Review, vol. 35, no. 5, pp. 89-102, Dec. 2001.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	X. Qi, D. Zhu, and H. Aydin, &amp;quot;Global scheduling based reliability-aware power management for multiprocessor real-time systems,&amp;quot; Real-Time Systems, vol. 47, no. 2, pp. 109-142, Mar. 2011.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	P. Huang, P. Kumar, G. Giannopoulou, and L. Thiele, &amp;quot;Energy efficient dvfs scheduling for mixed-criticality systems,&amp;quot; in Proc. of the 14th Int. Conf. on Embedded Software, pp. 11-23, Jaypee Greens, India, 12-17 Oct. 2014.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	V. Legout, J. Mathieu, and P. Laurent, &amp;quot;Mixed-criticality multiprocessor real-time systems: energy consumption vs deadline misses,&amp;quot; in Proc. 1st Workshop on Real-Time Mixed Criticality Systems, ReTiMiCS&amp;#39;13, 6 pp., Taipei, Taiwan, Aug. 2013.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	M. Volp, M. Hahnel, and A. Lackorzynski, &amp;quot;Has energy surpassed timeliness? scheduling energy-constrained mixed-criticality systems,&amp;quot; Proc. IEEE 20th Real-Time and Embedded Technology and Applications Symp. RTAS&amp;#39;14, pp. 275-284, Berlin, Germany, 15-17 Apr. 2014.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	H. Kopetz, &amp;quot;Real-time systems: design principles for distributed embedded applications,&amp;quot; Springer Science &amp;amp; Business Media, 2011.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	A. Burns and R. I. Davis, Mixed-Criticality Systems-A Review, Dep. Comput. Sci. Univ. York, Tech. Rep, pp. 1-61, 2016.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	B. Zhao, A. Hakan, and D. Zhu, &amp;quot;Enhanced reliability-aware power management through shared recovery technique,&amp;quot; in Proc. of the Inte. Conf. on Computer-Aided Design, pp. 63-70, New York, NY, USA, 2-5 Nov. 2009.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	M. A. Haque, H. Aydin, and D. Zhu, &amp;quot;On reliability management of energy-aware real-time systems through task replication,&amp;quot; IEEE Trans. on Parallel and Distributed Systems, vol. 28, no. 3, pp. 813-825, Mar. 2017.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	V. Moghaddas, M. Fazeli, and A. Patooghy, &amp;quot;Reliability-oriented scheduling for static-priority real-time tasks in standby-sparing systems,&amp;quot; Microprocessors and Microsystems, vol. 45, no. 1, pp. 208-215, Aug. 2016.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	F. Zhang and A. Burns, &amp;quot;Schedulability analysis for real-time systems with EDF scheduling,&amp;quot; IEEE Trans. on Computers, vol. 58, no. 9, pp. 1250-1258, Sept. 2009.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	S. Pagani and J. J. Chen, &amp;quot;Energy efficient task partitioning based on the single frequency approximation scheme,&amp;quot; in Proc. IEEE 34th Real-Time Systems Symp, RTSS&amp;#39;13, Vancouver, BC, Canada, 3-6 Dec. 2013.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	L. Niu, &amp;quot;System-level energy-efficient scheduling for hard real-time embedded systems,&amp;quot; in Proc. IEEE Design, Automation &amp;amp; Test in Europe Conf. &amp;amp; Exhibition, DATE&amp;#39;11, 4 pp., Grenoble, France, 14-18 Mar. 2011.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[40]	S. Narayana, P. Huang, G. Giannopoulou, L. Thiele, and R. V. Prasad, &amp;quot;Exploring energy saving for mixed-criticality systems on multi-cores,&amp;quot; in Proc. IEEE Real-Time and Embedded Technology and Applications Symp, RTAS&amp;#39;16, 12 pp., Vienna, Austria, 11-14 Apr. 2016.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[41]	Z. Li, C. Guo, X. Hua, and S. Ren, &amp;quot;Reliability guaranteed energy minimization on mixed-criticality systems,&amp;quot; J. Syst. Softw., vol. 112, no. 8, pp. 1-10, Feb. 2016.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>