﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022923</doi_batch_id><timestamp>14050229231835</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>7</month><day>24</day><year>2019</year></publication_date><journal_volume><volume>17</volume></journal_volume><issue>1</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Optimizing the Selection and Composition of QoS-Aware Web Services by Considering Dependency, Conflict, and Correlation between Web Services</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>mahdi</given_name><surname>farzandway</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>F.</given_name><surname>Shams</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>24</day><year>2019</year></publication_date><pages><first_page>1</first_page><last_page>15</last_page></pages><doi_data><doi>10.66224/ijece.28556.17.1.1</doi><resource>http://ijece.org/fa/Article/28556</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28556</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28556</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28556</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28556</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28556</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28556</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28556</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	S. Y. Lina, C. H. Laia, C. H. Wub, and C. C. Lob, &amp;quot;A trustworthy QoS-based collaborative filtering approach for web service discovery,&amp;quot; J. of Systems and Software, vol. 93, pp. 217-228, Jul. 2014</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	P. Wang, K. M. Chao, and C. C. Lo, &amp;quot;On optimal decision for
 QoS-aware composite service selection,&amp;quot; Expert Systems with Applications, vol. 37, no. 1, pp. 440-449, Jan. 2010.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. E. Yilmaz and K. Pinar, &amp;quot;Improved genetic algorithm based approach for QoS aware web service composition,&amp;quot; in Proc. IEEE Int. Conf. on Web Services, ICWS’14, pp. 463-470, Anchorage, AK, USA, 27 Jun.-2 Jul. 2014.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. Ardagna and B. Pernici, &amp;quot;Adaptive service composition in flexible processes,&amp;quot; IEEE Trans. on Software Engineering, vol. 33, no. 6, pp. 369-384, Jun. 2007.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	U. Shehu, G. Epiphaniou, and G. A. Safdar, &amp;quot;A survey of QoS-aware web service composition techniques,&amp;quot; International J. of Computer Applications, vol. 89, no. 12, pp. 10-17, Mar. 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. A. Amiri and H. Serajzadeh, &amp;quot;QoS aware web service composition based on genetic algorithm,&amp;quot; in Proc. 5th Int. Symp. on Telecommunications, IST’10,, pp. 502-507, Tehran, Iran, 4-6 Dec. 2010.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Alrifai, T. Risse, and W. Nejdl, &amp;quot;A hybrid approach for efficient web service composition with end-to-end QoS constraints,&amp;quot; ACM Trans. on the Web, vol. 6, no. 2, Article 7, May 2012.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	L. Wang, J. Shen, and J. Yong, &amp;quot;A survey on bio-inspired algorithms for web service composition,&amp;quot; in Proc. IEEE 16th Int. Conf. on Computer Supported Cooperative Work in Design, CSCWD12, pp. 569-574, Wuhan, China, 23- 25 May  2012.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	D. Silva, A. Sawczuk, E. Moshi, H. Ma, and S. Hartmann, &amp;quot;A QoS-aware web service composition approach based on genetic programming and graph databases,&amp;quot; in Proc. Int. Conf. on Database and Expert Systems Applications, DEXA&amp;#39;17, pp. 37-44, Lyon, France, 28-31 Aug.  2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Zhou and X. Yao, &amp;quot;A hybrid artificial bee colony algorithm for optimal selection of QoS-based cloud manufacturing service composition,&amp;quot; The International J. of Advanced Manufacturing Technology, vol. 88, no. 9-12, pp. 3371-3387, Feb. 2017.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Zavvar, et al., &amp;quot;Measuring service quality in service-oriented architectures using a hybrid particle swarm optimization algorithm and artificial neural network (PSO-ANN),&amp;quot; in Proc. 3th Int. Conf. on Web Research, ICWR’17, pp. 78-83, Tehran, Iran, 19-20 Apr. 2017.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Jula, Z. Othman, and E. Sundararajan, &amp;quot;Imperialist competitive algorithm with PROCLUS classifier for service time optimization in cloud computing service composition,&amp;quot; Expert Systems with Applications, vol. 42, no. 1, pp. 135-145, Jan. 2015.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	ش. پویا، &amp;quot;ترکیب وب‌سرویس‌ها بر اساس معیارهای کیفی سرویس با استفاده از الگوریتم ژنتیک،&amp;quot; اولین همايش ملی رویکردهای نوین در مهندسی کامپیوتر و بازیابی اطلاعات ایران، 8  صص.، رشت، ايران، 17-17 مهر ۱۳۹۲.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	D. Wang, Y. Yang, and Z. Mi, &amp;quot;A genetic-based approach to 
web service composition in geo-distributed cloud environment,&amp;quot; Computers &amp;amp; Electrical Engineering, vol. 43, no. C, pp. 129-141, Apr. 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	F. Gao, E. Curry, M. I. Ali, S. Bhiri, and A. Mileo, &amp;quot;Qos-aware complex event service composition and optimization using genetic algorithms,&amp;quot; in Proc. Int. Conf. on Service-Oriented Computing, ICSOC&amp;#39;14, pp. 386-393, Paris, France, 3-6 Nov. 2014.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. C. Jaeger and G. Muhl, &amp;quot;QoS-based selection of services: the implementation of a genetic algorithm,&amp;quot; in Proc. Communication in Distributed Systems, 15 ITG-GI Symp., 12 pp., Bern, Switzerland, 26 Feb. 2 Mar.. 2007.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Su, C. Zhang, and J. Chen, &amp;quot;An improved genetic algorithm for web services selection,&amp;quot; in Proc. 7th IFIP WG 6.1 Int. Conf. on Distributed Applications and Interoperable Systems, pp. 284-295 Paphos, Cyprus, 6-8 Jun. 2007.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Tang and L. Ai, &amp;quot;A hybrid genetic algorithm for the optimal constrained web service selection problem in web service composition,&amp;quot; in Proc. IEEE Congress on Evolutionary Computation, 8 pp., Barcelona, Spain, 18-23 Jul.  2010.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	G. Canfora and M. Di Penta, &amp;quot;A framework for QoS-aware binding and re-binding of composite web services,&amp;quot; J. of Systems and Software, vol. 81, no. 10, pp. 1754-1769, Oct. 2008.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	F. Mardukhi, N. Nematbakhsh, K. Zamanifar, and A. Barati, &amp;quot;QoS decomposition for service composition using genetic algorithm,&amp;quot; Applied Soft Computing, vol. 13, no. 7, pp. 3409-3421, Jul. 2013.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	L. J. Zhang and B. Li, &amp;quot;Requirements driven dynamic services composition for web services and grid solution,&amp;quot; J. of Grid Computing, vol. 2, no. 2, pp. 121-140, Jun. 2004.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	G. Canfora, M. Di Penta, R. Esposito, and M. L. Villani, &amp;quot;An approach for QoS-aware service composition based on genetic algorithms,&amp;quot; in Proc. of the 7th Annual Conf. on Genetic and Evolutionary Computation, ACM, pp. 1069-1075, Washington DC, USA, 25-29 Jun.  2005.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. Deng, H. Wu, D. Hu, and J. Zhao, &amp;quot;Service selection for composition with QoS correlations,&amp;quot; IEEE Trans. on Services Computing, vol. 9, no. 2, pp. 291-302, Mar.-Apr. 2016.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	L. Ai and M. Tang, &amp;quot;A penalty-based genetic algorithm for QoS-aware web service composition with inter-service dependencies and conflicts,&amp;quot; in Proc. IEEE Int. Conf. on Computational Intelligence for Modelling Control &amp;amp; Automation, pp. 738-743, Vienna, Austria, 10-12 Dec. 2008.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Non-Parametric Proximity-Based Method for Outlier Detection</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Y.</given_name><surname>Salehi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>نگین</given_name><surname>دانشپور</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>24</day><year>2019</year></publication_date><pages><first_page>16</first_page><last_page>24</last_page></pages><doi_data><doi>10.66224/ijece.28557.17.1.16</doi><resource>http://ijece.org/fa/Article/28557</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28557</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28557</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28557</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28557</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28557</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28557</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28557</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	D. Hawkins, Identification of Outliers, Springer Sci. Bus. Media, 1980.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. Han, M. Kamber, and J. Pei, Data Mining: Concepts and Techniques, 3rd Ed. Elsevier Inc, Morgan Kaufmann, 2012.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Gupta, J. Gao, and C. C. Aggarwal, &amp;quot;Outlier detection for temporal data: a survey,&amp;quot; IEEE Trans. on Knowledge and Data Engineering, vol. 25, no. 9, pp. 2250-2267, Dec.. 2013.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	M. Salehi, C. Leckie, J. C. Bezdek, and L. Fellow, &amp;quot;Fast memory efficient local outlier detection in data streams,&amp;quot; IEEE Trans. on Knowledge and Data Engineering, vol. 28, no. 12, pp. 3246-3260, Aug. 2016.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	K. Yamanishi, J. Takeuchi, and G. Williams, &amp;quot;On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms,&amp;quot; Data Mining and Knowledge Discovery, vol. 8, no. 3, pp. 275-300, May 2004.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Huang, Q. Zhu, L. Yang, D. Cheng, and Q. Wu, &amp;quot;A novel outlier cluster detection algorithm without top-n parameter,&amp;quot; Knowledge-Based Systems, vol. 121, pp. 32-40, 1 Apr. 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	G. Gan and M. K. Ng, &amp;quot;K-means clustering with outlier removal,&amp;quot; Pattern Recognition Letter, vol. 90, pp. 8-14, Apr. 2017.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. M. Breunig, H. Kriegel, R. T. Ng, and J. Sander, &amp;quot;LOF: identifying density-based local outliers,&amp;quot; in Proc. ACM SIGMOD Int. Conf. on Management of Data, pp. 93-104, Dalles, TX,USA, 15-18 May 2000.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	E. Schubert, A. Zimek, and H. Kriegel, &amp;quot;Local outlier detection reconsidered : a generalized view on locality with applications to spatial, video, and network outlier detection,&amp;quot; Data Mining and Knowledge Discovery, vol. 28, no. 1, pp. 190-237, Jan. 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	W. Jin, A. K. H. Tung, J. Han, and W. Wang, &amp;quot;Ranking outliers using symmetric neighborhood relationship,&amp;quot; in Proc. of the 10th Pacific-Asia Conf.on Advances in Knowledge Discovery and Data Mining, Singapore, Singapore, 9-12 Apr. 2006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	H. Kriegel, P. Kroger, E. Schubert, and A. Zimek, &amp;quot;LoOP: local outlier probabilities,&amp;quot; in Proc. of the 18th ACM Conf. on Information and Knowledge Management, pp. 1649-1652, Hong Kong, China, 2-8 Nov. 2009.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	K. Zhang, M. Hutter, and H. Jin, &amp;quot;A new local distance-based outlier detection approach for scattered real-world data,&amp;quot; in Advances in Knowledge Discovery and Data Mining, pp. 1-15, 2009.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	E. Schubert and H. Kriegel, &amp;quot;Generalized outlier detection with flexible kernel density estimates,&amp;quot; in Proc. of the SIAM Int. Conf. on Data Mining, 9 pp., Philadelphia, PN, USA, 24-26 Apr. 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	V. Hautam and K. Ismo, &amp;quot;Outlier detection using k-nearest neighbour graph,&amp;quot; in Proc. of the 17th Int. Conf. on Pattern Recognition, ICPR&amp;#39;04, vol. 3, pp. 430-433, Cambridge, UK, 26-26 Aug. 2004.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	F. Angiulli and C. Pizzuti, &amp;quot;Fast Outlier Detection in High Dimensional Spaces,&amp;quot; in Principles of Data Mining and Knowledge Discovery, pp. 15-27, 2002.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Papadimitriou, P. B. Gibbons, C. Faloutsos, and C. Faloutsos, &amp;quot;LOCI: fast outlier detection using the local correlation integral,&amp;quot; in Proc. 19th Int. Conf. on Data Engineering, pp. 315-326, Bangalore, India, 5-8 Mar. 2003.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Q. Zhu, J. Feng, and J. Huang, &amp;quot;Natural neighbor: a self-adaptive neighborhood method without parameter K,&amp;quot; Pattern Recognition Letter, vol. 80, no. 1, pp. 30-36, Sept. 2016.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	R. L. Burden, J. D. Faires, and A. M. Burden, Numerical Analysis, 10th Ed. Cengage Learning US, 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	C. F. Gerald and P. O. Wheatley, Applied Numerical Analysis, 7th Ed. Pearson Addison-Wesley, 2006.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Zimek, R. J. G. B. Campello, and J. Sander, &amp;quot;Ensembles for unsupervised outlier detection: challenges and research questions,&amp;quot; ACM SIGKDD Explorations Newsletter, vol. 15, no. 1, pp. 11-22, Mar. 2014.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	G. O. Campos, et al., &amp;quot;On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study,&amp;quot; Data Mining and Knowledge Discovery, vol. 30, no. 4, pp. 891-927, Jul. 2016.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Automatic Image Annotation by Block Principal Pivoting</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>H.</given_name><surname>Rikabi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>N.</given_name><surname>Soufi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Sadoghi Yazdi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A. H. </given_name><surname>Taherinia</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>24</day><year>2019</year></publication_date><pages><first_page>25</first_page><last_page>36</last_page></pages><doi_data><doi>10.66224/ijece.28558.17.1.25</doi><resource>http://ijece.org/fa/Article/28558</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28558</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28558</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28558</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28558</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28558</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28558</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28558</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Kim and H. Park, "Fast nonnegative matrix factorization: an active-set-like method and comparisons," SIAM J. on Scientific Computing, vol. 33, no. 6, pp. 3261-3281, 2011.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	C. F. Tsai and C. Hung, "Automatically annotating images with keywords: a review of image annotation systems," Recent Patents on Computer Science, vol. 1, no. 1, pp. 55-68, Jan. 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. Li and J. Z. Wang, "Real-time computerized annotation of pictures," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 30, no. 6, pp. 985-1002, Jun. 2008.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. Putthividhy, H. T. Attias, and S. S. Nagarajan, "Topic regression multi-modal latent Dirichlet allocation for image annotation," in Proc IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'10, pp. 3408-3415, San Francisco, CA, USA, 13-18 Jun. 2010.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. M. Kalayeh, H. Idrees, and M. Shah, "NMF-KNN: image annotation using weighted multi-view non-negative matrix factorization," in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'14, pp. 184-191, Columbus, OH, USA, 23-28 Jun. 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Z. Li, et al., "Learning semantic concepts from image database 
with hybrid generative/discriminative approach," Engineering Applications of Artificial Intelligence, vol. 26, no. 9, pp. 2143-2152, Oct. 2013.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Guillaumin, T. Mensink, J. Verbeek, and C. Schmid, "Tagprop: discriminative metric learning in nearest neighbor models for image auto-annotation," in Proc. IEEE 12th Int. Conf. on Computer Vision, pp. 309-316, Kyoto, Japan, 29 Sept.-2 Oct. 2009.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. D. Lee and H. S. Seung, "Learning the parts of objects by non-negative matrix factorization," Nature, vol. 401, no. 6755, pp. 788-791, 21 Oct. 1999.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	A. Eweiwi, M. S. Cheema, and C. Bauckhage, "Discriminative joint non-negative matrix factorization for human action classification," in Proc. German Conf. on Pattern Recognition, GPRC'13, pp. 61-70, vol 8142. Springer, Berlin, 2013.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Liu, C. Wang , J. Gao, and J. Ha, "Multi-view clustering via joint nonnegative matrix factorization," in Proc. of the SIAM Int.l Conf. on Data Mining, SIAM, pp. 252-260, Austin, TX, USA, 2-4 May 2013.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Chen, A. Zheng, and K. Weinberger, "Fast image tagging," in Proc. 30th Int. Conf. on Machine Learning, 9 pp., Atlanta, GA, USA, Jan.  2013.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	R. Rad and M. Jamzad, "Automatic image annotation by a loosely joint non-negative matrix factorization," IET Computer Vision, 
vol. 9, no. 6, pp. 806-813, Dec. 2015.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	R. Rad and M. Jamzad, "Image annotation using multi-view non-negative matrix factorization with different number of basis vectors," J. of Visual Communication and Image Representation, vol. 46, pp. 1-12, Jul. 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. T. Chao and Y. S. Chen, "Keyboard recognition from scale-invariant feature transform," in Proc. IEEE In. Conf. on Consumer Electronics-Taiwan, ICCE-TW'17, pp. 205-206, Taipei, Taiwan,12-14 Jun. 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	P. Duygulu, K. Barnard, J. F. G. de Freitas, and D. A. Forsyth, "Object recognition as machine translation: learning a lexicon for a fixed image vocabulary," in Proc. European Conf. on Computer Vision, vol. 4, pp. 97-112, May 28-31 2002.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	Y. Verma and C. Jawahar, "Image annotation using metric learning in semantic neighbourhoods," in Proc. European Conf. on Computer Vision, ECCV'12, vol. 3, pp. 836-849, Florence, Italy, 7-13 Oct. 2012.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Moran and V. Lavrenko, "A sparse kernel relevance model for automatic image annotation," International J. of Multimedia Information Retrieval, vol. 3, no. 4, pp. 209-229, Nov. 2014.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Y. Yang, W. Zhang, and Y. Xie, "Image automatic annotation via multi-view deep representation," J. of Visual Communication and Image Representation, vol. 53, pp. 368-377, Nov. 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	V. N. Murthy, E. F. Can, and R. Manmatha, "A hybrid model for automatic image annotation," in Proc. of Int. Conf. on Multimedia Retrieval, ICMR'14, pp. 369-376, Glasgow, United Kingdom, 1-4 Apr. 2014.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Z. Lu and Y. Peng, "Image annotation by semantic sparse recoding of visual content," in Proc. of the 20th ACM Int. Conf. on Multimedia, pp. 499-508, Nara, Japan, 29 Oct.-2-Nov. 2012.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Y. Xiang, X. Zhou, T. –S. Chua, and C. –W. Ngo, "A revisit of generative model for automatic image annotation using Markov random fields," in Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'09, pp. 1153-1160, Miami, FL, USA, 20-25 Jun. 2009.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	A. Makadia, V. Pavlovic, and S. Kumar, " A new baseline for image annotation," Proc. IEEE Conf. on Computer Vision and Pattern Recognition, CVPR'08, vol. 3, pp. 316-329, Marseille, France, 12-18 Oct. 2008.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improved Realization of Controlled Unitary Gates in the One-Way Quantum Computation Model Using the Extended Measurement Calculus</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Houshmand</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>hooshmand</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>24</day><year>2019</year></publication_date><pages><first_page>37</first_page><last_page>46</last_page></pages><doi_data><doi>10.66224/ijece.28560.17.1.37</doi><resource>http://ijece.org/fa/Article/28560</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28560</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28560</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28560</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28560</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28560</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28560</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28560</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, 10th Anniversary Ed.: Cambridge University Press, 2010.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Nakahara and T. Ohmi, Quantum Computing: from Linear Algebra to Physical Realizations, 1st Edition, Boca Raton, Taylor &amp;amp; Francis, 2008.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	G. Benenti, G. Casati, and G. Strini, Principles of Quantum Computation and Information: Basic Concepts, World Scientific, 2004.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. W. Shor, &amp;quot;Algorithms for quantum computation: discrete logarithms and factoring,&amp;quot; in Proc. of the 35th Annual Symp. on Foundations of Computer Science, IEEE Conf., pp. 124-134, Santa Fe, NM, USA, 20-22 Nov. 1994.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	L. K. Grover, &amp;quot;A fast quantum mechanical algorithm for database search,&amp;quot; in Proc. STOC&amp;#39;96 of the 28th Annual ACM Symposium on Theory of Computing, pp. 212-219, Philadelphia, PA, USA, 22-24 May 1996.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	V. V. Shende, S. S. Bullock, and I. L. Markov, &amp;quot;Synthesis of quantum-logic circuits,&amp;quot; in Proc. ASP-DAC&amp;#39;05 of the Asia and South Pacific Design Automation Conf., pp. 272-275, Shanghai, China, 18-21 Jan. 2005.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	D. G. Angelakis, M. Christandl, and A. Ekert, &amp;quot;An introduction to measurement-based quantum computation,&amp;quot; NATO Science Series, III: Computer and Systems Sciences, Quantum Information Processing-from Theory to Experiment, vol. 199, pp. 137-158, 2006.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	H. J. Briegel, D. E. Browne, W. Dur, R. Raussendorf, and M. V. den Nest, &amp;quot;Measurement-based quantum computation,&amp;quot; Nature Physics, vol. 5, no. 1, pp. 19-26, Jan. 2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	D. Gottesman and I. Chuang, &amp;quot;Quantum teleportation as a universal computational primitive,&amp;quot; Nature, vol. 402, pp. 390-393, 1999.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	R. Raussendorf and H. J. Briegel, &amp;quot;A one-way quantum computer,&amp;quot; Physical Review Letters, vol. 86, no. 22, pp. 5188-5191, 28 May 2001.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	P. Walther, K. J. Resch, T. Rudolph, E. Schenck, H. Weinfurter, 
V. Vedral, M. Aspelmeyer, and A. Zeilinger, &amp;quot;Experimental one-way quantum computing,&amp;quot; Nature, vol. 434, no. 7030, pp. 169-176, 10 Mar. 2005.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	R. Stock and D. F. V. James, &amp;quot;Scalable, high-speed measurement-based quantum computer using trapped ions,&amp;quot; Physical Review Letters, vol. 102, no. 17, p. 170501, 1 May 2009.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Tame, B. Bell, C. Di Franco, W. Wadsworth, and J. Rarity, &amp;quot;Experimental realization of a one-way quantum computer algorithm solving simon&amp;#39;s problem,&amp;quot; Physical Review Letters, vol. 113, no. 20, p. 200501, 14 Nov. 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. Houshmand, M. Sedighi, M. Saheb Zamani, and K. Majoei, &amp;quot;Quantum circuit synthesis targeting to improve one-way quantum computation pattern cost metrics,&amp;quot; ACM J. on Emerging Technologies in Computing Systems, vol. 13, no. 4, Article 55, 11 May 2017.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Barenco, C. Bennett, R. Cleve, D. DiVincenzo, N. Margolus, P. Shor, T. Sleator, J. Smolin, and H. Weinfurter, &amp;quot;Elementary gates 
for quantum computation,&amp;quot; Physical Review A, vol. 52, no. 55, pp. 3457-3467, 1 Nov. 1995.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	V. Danos, E. Kashefi, and P. Panangaden, &amp;quot;The measurement calculus,&amp;quot; J. of ACM, vol. 54, no. 2, Article 8, 2 Apr. 2007.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. Broadbent and E. Kashefi, &amp;quot;Parallelizing quantum circuits,&amp;quot; Theoretical Computer Science, vol. 410, no. 26, pp. 2489-2510, 6 Jun. 2009.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	E. Pius, Automatic Parallelization of Quantum Circuits Using the Measurement-Based Quantum Computing Mode, M.Sc. Thesis in High-Performance Computing, University of Edinburgh, 2010.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Houshmand, M. S. Zamani, M. Sedighi, and M. H. Samavatian, &amp;quot;Automatic translation of quantum circuits to optimized one-way quantum computation patterns,&amp;quot; Quantum Information Processing, vol. 13, no. 11, pp. 2463-2482, 15Nov. 2014.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	V. Danos, E. Kashefi, and P. Panangaden, &amp;quot;Parsimonious and robust realizations of unitary maps in the one-way model,&amp;quot; Physical Review A, vol. 72, no. 6, p. 064301, 6 Dec. 2005.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Trisetyarso and R. V. Meter, &amp;quot;Circuit design for a measurement-based quantum carry-lookahead adder,&amp;quot; International J. of Quantum Information, vol. 8, no. 5, pp. 843-867, 15 Mar. 2010.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	A. Trisetyarso, Theoretical Study towards Realization of Measurement-Based Quantum Computers, Ph.D Thesis, Keio University, 2011.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	R. D. da Silva and E. F. Galvao, &amp;quot;Compact quantum circuits from one-way quantum computation,&amp;quot; Physical Review A, vol. 88, no. 1, p. 012319, 19 Jul. 2013.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	م. اسلامی، م. صاحب‌الزمانی، م. صدیقی و م. هوشمند، &amp;quot;بهینه‌سازی مدارهای کوانتومی با استفاده از مدل محاسبات کوانتومی یک‌طرفه مبتنی بر هندسه الگو،&amp;quot; نشريه مهندسي برق و مهندسي کامپيوتر ايران- ب، جلد 13، شماره 4، 
صص. 239-248، زمستان 1395.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	V. Bergholm, J. J. Vartiainen, M. Mottonen, and M. M. Salomaa, &amp;quot;Quantum circuits with uniformly controlled one-qubit gates,&amp;quot; Physical Review A, vol. 71, no. 5, pp. 23-30, 27 May 2005.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Houshmand, M. Houshmand, and J. F. Fitzsimons, &amp;quot;Minimal qubit resources for the realisation of measurement-based quantum computation,&amp;quot; Physical Review A, vol. 98, no. 1, p. 012318, 17 Jul. 2018.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	V. Danos, E. Kashefi, P. Panangaden, and S. Perdrix, &amp;quot;Extended measurement calculus,&amp;quot; Semantic Techniques in Quantum Computation, Cambridge University Press, pp. 235-310, 2009.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	A. M. Steane, &amp;quot;Error correcting codes in quantum theory,&amp;quot; Physical Review Letters, vol. 77, no. 5, p. 793, 29 Jul. 1996.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	D. Bacon, &amp;quot;Operator quantum error-correcting subsystems for self-correcting quantum memories,&amp;quot; Physical Review A, vol. 73, no. 1, p. 012340, Jan. 2006.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	M. Houshmand, S. Hosseini-Khayat, and M. M. Wilde, &amp;quot;Minimal-memory, noncatastrophic, polynomial-depth quantum convolutional encoders,&amp;quot; IEEE Trans. on Information Theory, vol. 59, no. 2, pp. 1198-1210, Feb. 2013.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	V. Kliuchnikov, D. Maslov, and M. Mosca, &amp;quot;Fast and efficient exact synthesis of single qubit unitaries generated by clifford and T gates,&amp;quot; Quantum Information and Computation, vol. 13, no. 7-8, pp. 607-630, Jul. 2013.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	B. Giles and P. Selinger, &amp;quot;Exact synthesis of multiqubit clifford+T circuits,&amp;quot; Physical Review A, vol. 87, no. 3, p. 032332, Mar. 2013.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	C. C. Lin, A. Chakrabarti, and N. K. Jha, &amp;quot;FTQLS: fault-tolerant quantum logic synthesis,&amp;quot; IEEE Trans. on Very Large Scale Integration (VLSI) Systems, vol. 22, no. 6, pp. 1350-1363, Jul. 2014.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	M. Silva, V. Danos, E. Kashefi, and H. Ollivier, &amp;quot;A direct approach to fault-tolerance in measurement-based quantum computation via teleportation,&amp;quot; New J. of Physics, vol. 9, no. 6, pp. 192-203, Jun. 2007.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Lightweight Intrusion Detection System Based on Two-Level Trust for Wireless Sensor Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>sadeghizade</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>O. R.</given_name><surname>Marouzi</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>24</day><year>2019</year></publication_date><pages><first_page>47</first_page><last_page>56</last_page></pages><doi_data><doi>10.66224/ijece.28561.17.1.47</doi><resource>http://ijece.org/fa/Article/28561</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28561</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28561</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28561</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28561</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28561</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28561</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28561</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. G. Ball, B. Qela, and S. Wesolkowski, &amp;quot;A review of the use of computational intelligence in the design of military surveillance networks,&amp;quot; Recent Advances in Computational Intelligence in Defense and Security, vol. 621, pp. 663-693, Dec. 2015.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. He, N. Kumar, J. Chen, C. C. Lee, and N. Chilamkurti, &amp;quot;Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks,&amp;quot; Multimedia Systems, vol. 21, 
no. 1, pp. 49-60, Feb. 2015.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Li and H. J. Lin, &amp;quot;Design and implementation of smart home control systems based on wireless sensor networks and power line communications,&amp;quot; IEEE Trans. on Industrial Electronics, vol. 62, no. 7, pp. 4430-4442, Jul. 2015.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, &amp;quot;A survey on sensor networks,&amp;quot; IEEE Communications Magazine, 
vol. 40, no. 8, pp. 102-114, Aug. 2002.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	H. C. Qu, S. Jian, X. M. Tang, and P. Wang, &amp;quot;Hybrid computational intelligent methods incorporating into network intrusion detection,&amp;quot; J. of Computational and Theoretical Nanoscience, vol. 12, no. 12, pp. 5492-5496, Dec. 2015.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	X. Chen, K. Makki, K. Yen, and N. Pissinou, &amp;quot;Sensor network security: a survey,&amp;quot; IEEE Communications Surveys &amp;amp; Tutorials, 
vol. 11, no. 2, pp. 52-73, Jun. 2009.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	G. Padmavathi and D. Shanm, &amp;quot;A survey of attacks, security mechanisms and challenges in wireless sensor networks,&amp;quot; International J. of Computer Science and Information Security, 
vol. 4, no. 1, pp. 1-9, Aug. 2009.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Y. Maleh and A. Ezzati, &amp;quot;A review of security attacks and intrusion detection schemes in wireless sensor network,&amp;quot; International J. of Wireless &amp;amp; Mobile Networks, vol. 5, no. 6, 12 pp., Dec. 2013.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	E. J. Kumar Patel and K. Tripathi, &amp;quot;Sinkhole attack detection and prevention in WSN &amp;amp; improving the performance of AODV protocol,&amp;quot; International J. of Innovative Research in Computer 
and Communication Engineering, vol. 4, no. 5, pp. 9660-9669, May 2016.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	V. C. Manju, &amp;quot;Sybil attack prevention in wireless sensor network,&amp;quot; International J. of Computer Networking, Wireless and Mobile Communications, vol. 4, no. 2, pp. 125-132, Apr. 2014.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	P. Amish and V. B. Vaghela, &amp;quot;Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol,&amp;quot; Procedia Computer Science, vol. 79, pp. 700-707, 2016.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. A. Salam and N. Halemani, &amp;quot;Performance evaluation of wireless sensor networks under hello_flood attack,&amp;quot; International J. of Computer Networks &amp;amp; Communications, vol. 8, no. 2, 
pp. 77-78, Mar. 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Liu, M. Dong, K. Ota, and J. Long, &amp;quot;PHACK-an efﬁcient scheme for selective forwarding attack detection in WSNs,&amp;quot; Sensors, vol. 15, no. 12, pp. 30942-30963, Dec. 2015.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Y. Zhang, W. Lee, and Y. A. Huang, &amp;quot;Intrusion detection techniques for mobile wireless networks,&amp;quot; J. of Wireless Networks, vol. 9, no. 5, pp. 545-556, Sept. 2003.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Ghosal and S. Halder, &amp;quot;A survey on energy efficient intrusion detection in wireless sensor networks,&amp;quot; J. of Ambient Intelligence and Smart Environments, vol. 9, no. 2, pp. 239-261, Feb. 2017.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	S. Duhan and P. khandnor, &amp;quot;Intrusion detection system in wireless sensor networks a comprehensive review,&amp;quot; in Proc. Int. Conf. on Electrical, Electronics, and Optimization Techniques, ICEEOT&amp;#39;16, pp. 2707-2712, Chennai, India, 3-5 Mar. 2016.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. Abduvaliyev, S. K. Pathan, J. Zhou, R. Roman, and W. C. Wong, &amp;quot;On the vital areas of intrusion detection systems in wireless sensor networks,&amp;quot; IEEE Communications Surveys &amp;amp; Tutorials, vol. 15, 
no. 3, pp. 1223-1237, Third Quarter 2013.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. Shin, T. Kwon, G. Y. Jo, Y. Park, and H. Rhy, &amp;quot;An experimental study of hierarchical intrusion detection for wireless industrial sensor networks,&amp;quot; IEEE Trans. on Industrial Informatics, vol. 6, no. 4, 
pp. 744-757, Nov. 2010.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Agah and S. K. Das, &amp;quot;Preventing DoS attacks in wireless sensor networks: a repeated game theory approach,&amp;quot; International J. of Network Security, vol. 5, no. 2, pp. 145-153, 2007.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	V. Bhuse and A. Gupta, &amp;quot;Anomaly intrusion detection in wireless sensor networks,&amp;quot; J. of High Speed Networks, vol. 15, no. 1, pp. 33-51, Jan. 2006.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	C. F. Hsieh, R. C. Chen, and Y. F. Huang, &amp;quot;Applying an ontology to a patrol intrusion detection system for wireless sensor networks,&amp;quot; International J. of Distributed Sensor Networks, vol. 10, no. 1, pp. 1-14, Jan. 2014.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Y. Maleh, A. Ezzati, Y. Qasmaoui, and M. Mbida, &amp;quot;A global hybrid intrusion detection system for wireless sensor networks,&amp;quot; Procedia Computer Science, vol. 52, pp. 1047-1052, Jun. 2015.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Wang, S. Jiang, and A. O. Fapojuwo, &amp;quot;A protocol layer trust-based intrusion detection scheme for wireless sensor networks,&amp;quot; Sensors, vol. 17, no. 6, Article 1227, May 2017.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. M. Ozcelik, E. Irmak, and S. Ozdemir, &amp;quot;A hybrid trust based intrusion detection system for wireless sensor networks,&amp;quot; in Proc. Int. Symp. on Networks, Computers and Communications, ISNCC’17, 6 pp., Marrakech, Morocco, 16-18 May 2017.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	K. K. Waraich and B. Singh, &amp;quot;Performance analysis of AODV routing protocol with and without malicious attack in mobile adhoc networks,&amp;quot; International J. of Advanced Science and Technology, vol. 82, no. 6, pp. 63-70, Sep. 2015.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	H. Ehsan and F. A. Khan, &amp;quot;Malicious AODV: implementation and analysis of routing attacks in MANETs,&amp;quot; in Proc. IEEE 11th Int. Conf. on Trust, Security and Privacy in Computing and Communications, pp. 1181-1187, Liverpool, UK, 25-27 Jun. 2012.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improve Identity-based Encryption Algorithm and Its Productivity in Providing Privacy of Cloud-Based Electronic Health Systems</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>M.</given_name><surname>Alipour</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sh.</given_name><surname>Bakhtiari Chehelcheshmeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sh.</given_name><surname>Heidarian</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>24</day><year>2019</year></publication_date><pages><first_page>57</first_page><last_page>67</last_page></pages><doi_data><doi>10.66224/ijece.28562.17.1.57</doi><resource>http://ijece.org/fa/Article/28562</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28562</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28562</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28562</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28562</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28562</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28562</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28562</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Z. A. Khan, S. Sivakumar, W. Phillips, and N. Aslam, &amp;quot;A new patient monitoring framework and Energy-aware Peering Routing Protocol (EPR) for body area network communication,&amp;quot; J. Ambient Intell. Humaniz. Comput., vol. 5, no. 3, pp. 409-423, Jun. 2014.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	X. A. Wang, J. Ma, F. Xhafa, M. Zhang, and X. Luo, &amp;quot;Cost-effective secure E-health cloud system using identity based cryptographic techniques,&amp;quot; Futur. Gener. Comput. Syst., vol. 67, pp. 242-254, Feb. 2017.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	D. Boneh and M. Franklin, &amp;quot;Identity-based encryption from the Weil pairing,&amp;quot; in Proc. 21st Annual Int. Cryptology Conf., 
pp. 213-229, 19-23 Aug. 2001.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	X. Boyen, &amp;quot;A tapestry of identity-based encryption: practical frameworks compared,&amp;quot; Int. J. Appl. Cryptogr., vol. 1, no. 1, pp. 3-21, Feb. 2008.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. Shamir, &amp;quot;Identity-based cryptosystems and signature schemes,&amp;quot; in Proc. of CRYPTO 84 on Advances in Cryptology, vol. 84, pp. 47-53, Santa Barbara, CA, USA, 1984.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	D. A. N. Boneh and M. Franklin, &amp;quot;Downloaded 12/27/12 to 138.26.31.3. Redistribution subject to SIAM license or copyright, see http://www.siam.org/journals/ojsa.php,&amp;quot; vol. 32, no. 3, pp. 586-615, 2003.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	R. Sakai and M. Kasahara, &amp;quot;ID based cryptosystems with pairing on elliptic curve,&amp;quot; IACR Cryptol. ePrint Arch., Article 54, 2003.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	D. Boneh and X. Boyen, &amp;quot;Efficient selective-ID secure identity-based encryption without random oracles,&amp;quot; in Proc. Int. Conf. on the Theory and Applications of Cryptographic Techniques, pp. 223-238, Aarhus, Denmark, 22-25 May 2005.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	C. Gentry, &amp;quot;Practical identity-based encryption without random oracles,&amp;quot; in Proc. Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, pp. 445-464, St. Petersburg, Russia, 28 May-1 Jun. 2006.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	D. Boneh and X. Boyen, &amp;quot;Efficient selective identity-based encryption without random oracles,&amp;quot; Journal of Cryptology,  vol. 24, no. 4, pp. 659-693, Oct. 2011.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	D. Galindo, &amp;quot;Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman,&amp;quot; in Pairing, pp. 367-376, 2010.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	Y. Chen, S. Luo, J. Hu, and Z. Chen, &amp;quot;A novel commutative blinding identity based encryption scheme,&amp;quot; in Proc. Int. Symp. on Foundations and Practice of Security, pp. 73-89, Paris, France, 12-13 May  2011.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	J. H. Park, K. Lee, and D. H. Lee, &amp;quot;New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem,&amp;quot; Inf. Sci., vol. 325, pp. 256-270, 20 Dec. 2015.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	W. Susilo, F. Guo, and Y. Mu, &amp;quot;Efficient dynamic threshold identity-based encryption with constant-size ciphertext,&amp;quot; Theor. Comput. Sci., vol. 1, no. 1, pp. 49-59, Jan. 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. Bakhtiari-Chehelcheshmeh and M. Hosseinzadeh, &amp;quot;A new certificateless and secure authentication scheme for ad hoc networks,&amp;quot; Wirel. Pers. Commun., vol. 94, no. 4, pp. 2833-2851, Jun.  2017.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	V. Della Mea, &amp;quot;What is e-Health (2): the death of telemedicine?,&amp;quot; J. Med. Internet Res., vol. 3, no. 2, Article 22, Apr.-Jun. 2001.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	H. Lohr, A. R. Sadeghi, and M. Winandy, &amp;quot;Securing the e-health cloud,&amp;quot; in Proc. of the 1st ACM Int. Health Informatics Symp., IHI’10, pp. 220-229, Arlington, VA, USA, 10-11 Nov. 2010.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	W. T. Riley, et al., &amp;quot;Health behavior models in the age of mobile interventions: are our theories up to the task?,&amp;quot; Transl. Behav. Med., vol. 1, no. 1, pp. 53-71, Mar. 2011.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	R. Istepanian, S. Laxminarayan, and C. S. Pattichis, M-Health, Springer, 2014.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	H. Yan, H. Huo, Y. Xu, and M. Gidlund, &amp;quot;Wireless sensor network based e-health system-implementation and experimental results,&amp;quot; IEEE Trans. Consum. Electron., vol. 56, no. 4, pp. 2288-2295, Nov. 2010.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. O&amp;#39;donoghue and J. Herbert, &amp;quot;Data management within mHealth environments: patient sensors, mobile devices, and databases,&amp;quot; J. Data Inf. Qual., vol. 4, no. 1, Article 5, Oct. 2012.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	L. Neuhauser and G. L. Kreps, &amp;quot;Online cancer communication: meeting the literacy, cultural and linguistic needs of diverse audiences,&amp;quot; Patient Educ. Couns., vol. 71, no. 3, pp. 365-377, Jun. 2008.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	L. Neuhauser and G. L. Kreps, &amp;quot;E-health communication and behavior change: promise and performance,&amp;quot; Soc. Semiot., vol. 20, no. 1, pp. 9-27, 2010.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	G. L. Kreps, &amp;quot;Strategic use of communication to market cancer prevention and control to vulnerable populations,&amp;quot; Health Mark. Q., vol. 25, no. 1-2, pp. 204-216, 2008.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, &amp;quot;Patient controlled encryption: ensuring privacy of electronic medical records,&amp;quot; in Proc. of the ACM Workshop on Cloud Computing Security, CCSW&amp;#39;09, pp. 103-114, Chicago, IL, USA, 13- 13 Nov.  2009.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Y. Xue, X. Mao, Y. Guo, and S. Lv, &amp;quot;The research advance of facial expression recognition in human computer interaction,&amp;quot; J. Image Graph., vol. 5, pp. 764-772, 2009.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	M. Barua, X. Liang, R. Lu, and X. Shen, &amp;quot;ESPAC: enabling security and patient-centric access control for e-health in cloud computing,&amp;quot; Int. J. Secur. Networks, vol. 6, no. 2-3, pp. 67-76, Nov. 2011.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	L. Guo, C. Zhang, J. Sun, and Y. Fang, &amp;quot;PAAS: a privacy-preserving attribute-based authentication system for ehealth networks,&amp;quot; in Proc. IEEE 32nd Int. Conf. on Distributed Computing Systems, ICDCS’12, pp. 224-233, Macau, China, 18-21 Jun. 2012.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, &amp;quot;Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,&amp;quot; IEEE Trans. Parallel Distrib. Syst., 
vol. 24, no. 1, pp. 131-143, Jan. 2013.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	H. Yan, J. Li, X. Li, G. Zhao, S. Y. Lee, and J. Shen, &amp;quot;Secure access control of E-health system with attribute-based encryption,&amp;quot; Intell. Autom. Soft Comput., vol. 22, no. 3, pp. 345-352, 2016.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	M. Green and G. Ateniese, &amp;quot;Identity-based proxy re-encryption,&amp;quot; in Proc.  5th Int. Conf. on Applied Cryptography and Network Security, pp. 288-306, Zhuhai, China, 5-8 Jun. 2007.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	A. De Caro, V. Iovino, and A. Renato, JPBC : Java Pairing Based Cryptography, pp. 850-855, 2011.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An On-Chip Detection Mechanism to Detect  Scan-Based Attack in Crypto-Chips</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>F.</given_name><surname>Jamali Zavareh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>H.</given_name><surname>Beitollahi</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>24</day><year>2019</year></publication_date><pages><first_page>68</first_page><last_page>76</last_page></pages><doi_data><doi>10.66224/ijece.28563.17.1.68</doi><resource>http://ijece.org/fa/Article/28563</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28563</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28563</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28563</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28563</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28563</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28563</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28563</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Bo, W. Kaijie, and R. Karri, &amp;quot;Scan-based side-channel attack on dedicated hardware implementations of data encryption standard,&amp;quot; 
in Proc. IEEE Int. Test Conf., ITC&amp;#39;04, pp. 339-344, Washington DC, USA, 26-28 Oct. 2004.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Bo, W. Kaijie, and R. Karri, &amp;quot;Secure scan: a design-for-test architecture for crypto chips,&amp;quot; IEEE Trans. CAD Integr. Cir. Syst., vol. 25, no. 10, pp. 2287-2293, Oct. 2006.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Kodera, M. Yanagisawa, and N. Togawa, &amp;quot;Scan-based attack against DES cryptosystems using scan signatures,&amp;quot; in Proc. Asia Pacific Conf. Cir. Syst., APCCAS&amp;#39;12, pp. 2-5, Kaohsiung, Taiwan, 2-5 Dec. 2012.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	R. Nara, N. Togawa, M. Yanagisawa, and T. Ohtsuki, &amp;quot;A scan-based attack based on discriminators for AES cryptosystems,&amp;quot; IEICE Trans. on Fundamentals Electronics, Communications and Computer Sciences, vol. E92-A, no. 12, pp. 3229-3237, Dec. 2009.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Nara, N. Togawa, M. Yanagisawa, and T. Ohtsuki, &amp;quot;Scan-based attack against elliptic curve cryptosystems,&amp;quot; in Proc. of Asia and South Pacific Des. Autom. Conf., ASP-DAC&amp;#39;10, pp. 407-412, Taipei, Taiwan, 18-21 Jan. 2010.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	R. Nara, K. Satoh, M. Yanagisawa, and N. Togawa, &amp;quot;Scan-based sidechannel attack against RSA cryptosystems using scan signatures,&amp;quot; IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, vol. E93-A, no. 12, pp. 2481-2489, Dec. 2010.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	K. S. Kumar, K. Lodha, S. R. Sahoo, and K. K. Mahapatra, &amp;quot;On-chip comparison based secure output response compactor for scan-based attack resistance,&amp;quot; in Proc. Int. Conf. on VLSI Systems, Architecture, Technology and Applications, VLSI-SATA&amp;#39;15, 6 pp., Bangalore, India, 8-10 Jan. 2015.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Mehta, D. Saif, and R. Rashidzadeh, &amp;quot;A hardware security solution against scan-based attacks,&amp;quot; IEEE Int. Symp. on Circuits and Systems, ISCAS&amp;#39;16, pp. 1698-1701, May 2016.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	J. Da Rolt, A. Das, G. Di Natale, M. L. Flottes, B. Rouzeyre, and I. Verbauwhede, &amp;quot;Test versus security: past and present,&amp;quot; IEEE Trans. on Emerging Topics in Computing, vol. 2, no. 1, pp. 50-62, Mar. 2014.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. D. Rolt, G. D. Natale, M. L. Flottes, and B. Rouzeyre, &amp;quot;Scan attacks and countermeasures in presence of scan response compactors,&amp;quot; in Proc. 16th IEEE European Test Symp., ETS&amp;#39;11, Annecy, France, pp. 19-24, May 2011.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. D. Rolt, G. D. Natale, M. Flottes, and B. Rouzeyre, &amp;quot;Are advanced DFT structures sufficient for preventing scan-attacks?&amp;quot; in Proc. of the IEEE VLSI Test Symp., VTS&amp;#39;12, pp. 246-251, Maui, HI, USA, Apr. 2012.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. D. Rolt, G. D. Natale, M. Flottes, and B. Rouzeyre, &amp;quot;Are advanced DFT structures sufficient for preventing scan-attacks?&amp;quot; in Proc. IEEE VLSI Test Symp., VTS&amp;#39;12, pp. 246-251, Maui, HI, USA, 23-25 Apr. 2012.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Cui, Y. Luo, and C. H. Chang, &amp;quot;Static and dynamic obfuscations of scan data against scan-based side-channel attacks,&amp;quot; IEEE Trans. on Information Forensics and Security, vol. 12, no. 2, pp. 363-376, Feb. 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	G. Sengar, D. Mukhopadhyay, and D. R. Chowdhury, &amp;quot;Secured flipped scan-chain model for crypto-architecture,&amp;quot; IEEE Trans. on Computer Aided Design of Integrated Circuits and Systems, vol. 26, no. 11, pp. 2080-2084, Nov. 2007.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Y. Shi, N. Togawa, M. Yanagisawa, and T. Ohtsuki, &amp;quot;Robust secure scan design against scan-based differential cryptanalysis,&amp;quot; IEEE Trans. on Very Large Scale Integration (VLSI) Systems, vol. 20, 
no. 1, pp. 176-181, Jan. 2012.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Agrawal, S. Karmakar, D. Saha, and D. Mukhopadhyay, &amp;quot;Scan based side channel attacks on stream ciphers and their counter-measures,&amp;quot; in Proc. 9th Annual Int. Conf. on Cryptology in India, Kharagpu, India, pp. 226-238, Dec. 2009.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Y. Atobe, Y. Shi, M. Yanagisawa, and N. Togawa, &amp;quot;Dynamically changeable secure scan architecture against scan_based side channel attack,&amp;quot; in Proc. Int. SoC Design Conf., ISOCC&amp;#39;12, pp. 155-158, Jeju Island, Korea, 4-7 Nov. 2012.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	Y. Atobe, Y. Shi, M. Yanagisawa, and N. Togawa, &amp;quot;Secure scan design with dynamically configurable connection,&amp;quot; in Proc. 19th IEEE Pacific Rim Int. Sym. Dependable Computing, PRDC&amp;#39;13, pp. 256-262, Vancouver, Canada, 2-4 Dec. 2013.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	D. Hly, et al., &amp;quot;Scan design and secure chip,&amp;quot; in Proc. 10th IEEE Int. On-Line Testing Symp., pp. 219-226, 14-14 Jul. 2004.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	J. D. Rolt, G. Di Natale, M. L. Flottes, and B. Rouzeyre, &amp;quot;Thwarting scan-based attacks on secure-ICs with on-chip comparison,&amp;quot; IEEE Trans. on Very Large Scale Integration (VLSI) Systems, vol. 22, 
no. 4, pp. 947-951, Apr. 2014.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	B. Yang, K. Wu, and R. Karri, &amp;quot;Secure scan: a design-for-test architecture for crypto chips,&amp;quot; in Proc. of 42nd Annual Conf. on Design Automation, pp. 135-140, Anaheim, CA, USA, 13-17 Jun. 2005.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Paul, R. S. Chakraborty, and S. Bhunia, &amp;quot;VIm-scan: a low overhead scan design approach for protection of secret key in scan-based secure chips,&amp;quot; in Proc. the 25th IEEE VLSI Test Symp., pp. 455-460, Berkeley, CA, USA, 6-10 May 2007.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	J. Lee, M. Tehranipoor, C. Patel, and J. Plusquellic, &amp;quot;Securing designs against scan-based side-channel attacks, &amp;quot; IEEE Trans. on Dependable and Secure Computing, vol. 4, no. 4, pp. 325-336, Oct. 2007.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. Lee, M. Tehranipoor, C. Patel, and J. Plusquellic, &amp;quot;Securing designs against scan-based side-channel attacks,&amp;quot; IEEE Trans. on Dependable and Secure Computing, vol. 4, no. 4, pp. 325-336, Oct. 2007.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. Li, J. Jiang, H. Cheng, M. Zhang, and S. Wei, &amp;quot;An efficient hardware random number generator based on the MT method,&amp;quot; in 12th IEEE Int. Conf. on Computer and Information Technology, pp. 1011-1015, Chengdu, China, 27-29 Oct. 2012.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	B. Sileshi, C. Ferrer, and J. Oliver, &amp;quot;Accelerating hardware Gaussian random number generation using Ziggurat and CORDIC algorithms,&amp;quot; in Proc. IEEE Int. Conf. on Sensors, pp. 2122-2125, Valencia, Spain, 2-5 Nov. 2014.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	I. Cicek and G. Dundar, &amp;quot;A hardware efficient chaotic ring oscillator based true random number generator,&amp;quot; in Proc.18th IEEE Int. Conf. on Electronics, Circuits, and Systems, pp. 430-433, Beirut, Lebanon, 11-14 Dec. 2011.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Robot Path Planning using Clonal Selection Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.A.</given_name><surname>daneshnia</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>S.</given_name><surname>Golzari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A.</given_name><surname>Harifi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>A. A. </given_name><surname>Rezaee</surname></person_name></contributors><publication_date media_type="online"><month>7</month><day>24</day><year>2019</year></publication_date><pages><first_page>77</first_page><last_page>85</last_page></pages><doi_data><doi>10.66224/ijece.28564.17.1.77</doi><resource>http://ijece.org/fa/Article/28564</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/28564</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/28564</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/28564</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/28564</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/28564</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/28564</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/28564</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. C. Latombe, Robot Motion Planning, Springer, pp. 100-107, 1991.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	D. J. Cook, &amp;quot;Adding intelligence to robot arm path planning using a graph-match analogical reasoning system,&amp;quot; in Proc. of the lEEE/RSJ Int.l Conf. on Intelligent Robots and Systems, pp. 657-662,  Raleigh, NC, USA, 7-10 Jul. 1992.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Miao and Y. C. Tian, &amp;quot;Robot path planning in dynamic environments using a simulated annealing based approach,&amp;quot; in Proc. 10th Int. Conf. on Control, Automation, Robotics and Vision, ICARCV&amp;#39;08, pp. 1253-1258, Hanoi, Vietnam, 17-20 Dec. 2008.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	H. M. Choset, Principles of Robot Motion: Theory, Algorithms, and Implementation, MIT Press, 2005.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	E. Masehian and D. Sedighizadeh, &amp;quot;Classic and heuristic approaches in robot motion planning-a chronological review,&amp;quot; World Academy of Science, Engineering and Technology, vol. 23, no. 5, pp. 255-260, 2007.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	T. Back, Evolutionary Algorithms in Theory and Practice: Evolution Strategies, Evolutionary Programming, Genetic Algorithms, Oxford University Press, 1996.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. C. Huang, &amp;quot;Intelligent motion control for omnidirectional mobile robots using ant colony optimization,&amp;quot; Applied Artificial Intelligence, vol. 27, no. 3, pp. 151-169, 2013.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. A. Contreras-Cruz, V. Ayala-Ramirez, and U. H. Hernandez-Belmonte, &amp;quot;Mobile robot path planning using artificial bee colony and evolutionary programming,&amp;quot; Applied Soft Computing, vol. 30, pp. 319-328, May 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	N. Zeng, H. Zhang, Y. Chen, B. Chen, Y. Liu, and B. Shen, &amp;quot;Path planning for intelligent robot based on switching local evolutionary PSO algorithm,&amp;quot; Assembly Automation, vol. 36, no. 2, pp. 120-126, 2016.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Reza, S. K. Satapathy, S. Pattnaik, and D. R. Panda, &amp;quot;Optimized point robot path planning in cluttered environment using GA,&amp;quot; in Proc. of Fifth Int. Conf. on Soft Computing for Problem Solving, vol.436, pp. 475-485, 2016.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	W. Qu, S. Jia, and X. Zhao, &amp;quot;Environment exploration and recognition for mobile robot using immune algorithm and objectness measure,&amp;quot; in Proc. IEEE Int. Conf. on Mechatronics and Automation, ICMA&amp;#39;15, pp. 2226-2231, Beijing, China, 2-5 Aug. 2015.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. H. Walker and S. M. Garrett, &amp;quot;Dynamic function optimisation: comparing the performance of clonal selection and evolution strategies,&amp;quot; in Proc. Int. Conf. Artificial Immune Systems, ICARIS&amp;#39;03, pp. 273-284, 2003.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	G. C. Silva and D. Dasgupta, A Survey of Recent Works in Artificial Immune Systems, in Handbook on Computational Intelligence: vol. 2, Evolutionary Computation, Hybrid Systems, and Applications, Ed: World Scientific, pp. 547-586, 2016.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Raza and B. R. Fernandez, &amp;quot;Immuno-inspired robotic applications: a review,&amp;quot; Applied Soft Computing, vol. 37, pp. 490-505, 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	X. Hu, &amp;quot;Clonal selection based mobile robot path planning,&amp;quot; in Proc. IEEE Int. Conf. on Automation and Logistics, ICAL&amp;#39;08, pp. 437-442, Qingdao, China, 1-3 Sept. 2008.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	L. Wang and B. Hirsbrunner, &amp;quot;An evolutionary algorithm with population immunity and its application on autonomous robot control,&amp;quot; in Proc. Congress on Evolutionary Computation, CEC&amp;#39;03, the vol. 1, pp. 397-404, Canberra, Australia, 2003.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	N. K. Jerne, &amp;quot;The immune system,&amp;quot; Scientific American, vol. 229, no. 1, pp. 52-63, Jul. 1973.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	C. A. Janeway, &amp;quot;The immune system evolved to discriminate infectious nonself from noninfectious self,&amp;quot; Immunology Today, 
vol. 13, no. 1, pp. 11-16, 1992.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. D. Mannie, &amp;quot;Immunological self/nonself discrimination,&amp;quot; Immunologic Research, vol. 19, no. 1, pp. 65-87, Feb. 1999.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	P. Marrack and J. W. Kappler, &amp;quot;How the immune system recognizes the body,&amp;quot; Scientific American, vol. 269, no. 3, pp. 80-89, Sept. 1993.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. D. Farmer, N. H. Packard, and A. S. Perelson, &amp;quot;The immune system, adaptation, and machine learning,&amp;quot; Physica D: Nonlinear Phenomena, vol. 22, no. 1-3, pp. 187-204, Oct./Nov. 1986.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	A. A. Freitas and J. Timmis, &amp;quot;Revisiting the foundations of artificial immune systems for data mining,&amp;quot; IEEE Trans. on Evolutionary Computation, vol. 11, no. 4, pp. 521-540, Aug. 2007.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	Y. Tenne and S. W. Armfield, &amp;quot;A novel evolutionary algorithm 
for efficient minimization of expensive black-box functions 
with assisted-modelling,&amp;quot; in Proc. IEEE Congress on Evolutionary Computation, CEC&amp;#39;06, pp. 3219-3226, Vancouver, BC, Canada, 16-21 Jul. 2006.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	L. Xu, M. Y. Chow, J. Timmis, and L. S. Taylor, &amp;quot;Power distribution outage cause identification with imbalanced data using artificial immune recognition system (AIRS) algorithm,&amp;quot; IEEE Trans. on Power Systems, vol. 22, no. 1, pp. 198-204, Feb. 2007.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	J. Greensmith, U. Aickelin, and S. Cayzer, &amp;quot;Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection,&amp;quot; Artificial Immune Systems, vol. 3267, pp. 153-167, 2005.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	E. Hart and J. Timmis, &amp;quot;Application areas of AIS: the past, the present and the future,&amp;quot; Applied Soft Computing, vol. 8, no. 1, pp. 191-201, Jan. 2008.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Y. Zhong, L. Zhang, J. Gong, and P. Li, &amp;quot;A supervised artificial immune classifier for remote-sensing imagery,&amp;quot; IEEE Trans. on Geoscience and Remote Sensing, vol. 45, no. 12, pp. 3957-3966, Dec. 2007.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	U. Aickelin and S. Cayzer, &amp;quot;The danger theory and its application to artificial immune systems,&amp;quot; arXiv preprint arXiv: 0801.3549, 2008.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	M. Ayara, J. Timmis, R. de Lemos, L. N. de Castro, and R. Duncan, &amp;quot;Negative selection: how to generate detectors,&amp;quot; in Proc. of the 1st Int. Conf. on Artificial Immune Systems, ICARIS&amp;#39;02, pp. 89-98, Canterbury, UK, Sept. 2002.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	L. N. De Castro and F. J. Von Zuben, &amp;quot;Learning and optimization using the clonal selection principle,&amp;quot; IEEE Trans. on Evolutionary Computation, vol. 6, no. 3, pp. 239-251, Jun. 2002.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	A. Coutinho, &amp;quot;The network theory: 21 years later,&amp;quot; Scandinavian J. of Immunology, vol. 42, no. 1, pp. 3-8, Jul. 1995.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	J. Kim and P. J. Bentley, &amp;quot;Immune memory in the dynamic clonal selection algorithm,&amp;quot; in Proc. of the 1st Int.l Conf. on Artificial Immune Systems, ICARIS&amp;#39;02, vol. 1, pp. 59-67, Canterbury, UK, Sept. 2002.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	J. Kim and P. J. Bentley, &amp;quot;A model of gene library evolution in the dynamic clonal selection algorithm,&amp;quot; in Proc. of the 1st Int. Conf. on Artificial Immune Systems, ICARIS&amp;#39;02, pp. 175-182, Canterbury, UK, Sept. 2002.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	A. Secker, A. A. Freitas, and J. Timmis, &amp;quot;AISEC: an artificial immune system for e-mail classification,&amp;quot; in Proc. The Congress on Evolutionary Computation, CEC&amp;#39;03, vol. 1, pp. 131-138, Dec. 2003.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	J. Timmis, T. Knight, L. N. de Castro, and E. Hart, Computation in Cells and Tissues, Berlin: Springer, pp.51-91, 2004.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	R. Larson and R. P. Hostetler, Precalculus: A Concise Course: Cengage Learning, 2006.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	L. Deng, X. Ma, J. Gu, and Y. Li, &amp;quot;Mobile robot path planning using polyclonal-based artificial immune network,&amp;quot; J. of Control Science and Engineering, vol. 2013, Article ID 416715, 13 pp., 2013.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	C. Huizar, O. Montiel-Ross, R. Sepulveda, and F. J. D. Delgadillo, &amp;quot;Path planning using clonal selection algorithm,&amp;quot; Recent Advances on Hybrid Intelligent Systems, vol. 451, pp. 303-312, 2013.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	H. Miao and Y. C. Tian, &amp;quot;Dynamic robot path planning using an enhanced simulated annealing approach,&amp;quot; Applied Mathematics and Computation, vol. 222, pp. 420-437, Oct. 2013.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	H. Mo and L. Xu, &amp;quot;Research of biogeography particle swarm optimization for robot path planning,&amp;quot; Neurocomputing, vol. 148, 
pp. 91-99, Jan. 2015.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>