Farzanegan Pub Farzanegan DOI info@joce.ir mEDRA 20240329 DOI Registration 01
06 10.22034/zagros.2019.1008.1727 https://rcsj.ir/user/articles/107 Farzanegan Pub mEDRA <TitleType>01</TitleType> <TitleText>ورود تکنولوژی Iot (اینترنت هوشمند) به دنیای صنعت کشاورزی و دامپروری</TitleText> <TitleType>05</TitleType> <TitleText>ورود تکنولوژی Iot (اینترنت هوشمند) به دنیای صنعت کشاورزی و دامپروری</TitleText> 01 01 107 zagros Publisher IR 01 107 JB 22 1 4 01 202403 7 10 <TitleType>01</TitleType> <TitleText>ورود تکنولوژی Iot (اینترنت هوشمند) به دنیای صنعت کشاورزی و دامپروری</TitleText> 01 1- Rajabioun, Ramin. "Cuckoo optimization algorithm." Applied soft computing 11, no. 8 (2011): 5508-5518. 2- Richmond, W. K. (1965). Teachers and machines: an introduction to the theory and practice of programmed learning. Collins. 3- Shaikh, M. A. M., Prendinger, H., & Mitsuru, I. (2007, September). Assessing sentiment of text by semantic dependency and contextual valence analysis. In International conference on affective computing and intelligent interaction (pp. 191-202). Springer, Berlin, Heidelberg. 4- Zheng, H., & Zhou, Y. (2012). A novel cuckoo search optimization algorithm based on Gauss distribution. Journal of Computational Information Systems, 8(10), 4193-4200. 5- Rautray, R., & Balabantaray, R. C. (2018). An evolutionary framework for multi document summarization using Cuckoo search approach: MDSCSA. Applied computing and informatics, 14(2), 134-144. 6- Sarkar, K. (2013). Automatic Single Document Text Summarization Using Key Concepts in Documents. JIPS, 9(4), 602-620. 7- Nenkova, A. (2005). Automatic text summarization of newswire: Lessons learned from the document understanding conference 8- Mosa, Mohamed Atef, Arshad Syed Anwar, and Alaa Hamouda. "A survey of multiple types of text summarization based on swarm intelligence optimization techniques." (2018). 9- Rouane, Oussama, Hacene Belhadef, and Mustapha Bouakkaz. "Combine clustering and frequent itemsets mining to enhance biomedical text summarization." Expert Systems with Applications 135 (2019): 362-373. 1 A01 مژگان خزانه داری، احمد سلحشور مژگان خزانه داری، احمد سلحشور C. مژگان خزانه داری، احمد سلحشور 01 eng 202403 2024 C. zagros 06 10.22034/zagros.2019.1123.0746 https://rcsj.ir/user/articles/100 Farzanegan Pub mEDRA <TitleType>01</TitleType> <TitleText>تولید آرایه پوشش بهینه با ترکیب الگوریتم های توده ذرات و تبرید شبیه سازی شده</TitleText> <TitleType>05</TitleType> <TitleText>تولید آرایه پوشش بهینه با ترکیب الگوریتم های توده ذرات و تبرید شبیه سازی شده</TitleText> 01 01 100 zagros Publisher IR 01 100 JB 22 1 4 01 202403 7 10 <TitleType>01</TitleType> <TitleText>تولید آرایه پوشش بهینه با ترکیب الگوریتم های توده ذرات و تبرید شبیه سازی شده</TitleText> 01 1.Fatemeh Fathi,Dr Masod Taleb Ziabari,Dr Marzieh Faridi Masule(2019),Encrypting Information about the security of messengers,http/csc2019.guilan.ac. 2. Anglano, C., Canonico, M., & Guazzone, M. (2017). Forensic analysis of telegram messenger on android smartphones. Digital Investigation, 23, 31-49. 3. Anglano, C., Canonico, M., Guazzone, M., 2017. Configuration and Use of Android Virtual Devices for the Forensic Analysis of Android Applications. Technical Report TR-INF-2017-06-02-UNIPMN. 4. Anglano, C., Canonico, M., & Guazzone, M. (2016). Forensic analysis of the chatsecure instant messaging application on android smartphones. Digital investigation, 19, 44-59¬. 5. Susanka, T., Jan. 2017. Security Analysis of the Telegram IM. Master's thesis. Czech Technical University in Prague, Faculty of Information Technology. 1 A01 سجاد اسفندیاری، وحید رافع، محمود فرخیان سجاد اسفندیاری، وحید رافع، محمود فرخیان C. سجاد اسفندیاری، وحید رافع، محمود فرخیان 01 eng 202403 2024 C. zagros 06 10.22034/zagros.2019.1008.1727 https://rcsj.ir/user/articles/101 Farzanegan Pub mEDRA <TitleType>01</TitleType> <TitleText>تأثیر نوع خدمات رایانش ابری بر مزایای کسب‌وکار با نقش واسطه‌ای فعالیت‌های زنجیره ارزش در شرکت‌های فناوری اطلاعات و ارتباطات شهر تهران</TitleText> <TitleType>05</TitleType> <TitleText>تأثیر نوع خدمات رایانش ابری بر مزایای کسب‌وکار با نقش واسطه‌ای فعالیت‌های زنجیره ارزش در شرکت‌های فناوری اطلاعات و ارتباطات شهر تهران</TitleText> 01 01 101 zagros Publisher IR 01 101 JB 22 1 4 01 202403 7 10 <TitleType>01</TitleType> <TitleText>تأثیر نوع خدمات رایانش ابری بر مزایای کسب‌وکار با نقش واسطه‌ای فعالیت‌های زنجیره ارزش در شرکت‌های فناوری اطلاعات و ارتباطات شهر تهران</TitleText> 01 [1] R. L. Grossman, “The case for cloud computing,” IT professional, vol. 11, no. 2, pp. 23-27, 2009. [2] Dinh, Hoang T., et al. "A survey of mobile cloud computing: architecture, applications, and approaches." Wireless communications and mobile computing 13.18 (2013): 1587-1611. [3] Y. Jadeja, and K. Modi, "Cloud computing-concepts, architecture and challenges." pp. 877-880. [4] Avram, Maricela-Georgiana. "Advantages and challenges of adopting cloud computing from an enterprise perspective." Procedia Technology 12 (2014): 529-534. [5] Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-the-art and research challenges,” Journal of internet services and applications, vol. 1, no. 1, pp. 7-18, 2010. [6] Zhang, Congyingzi, Robert Green, and Mansoor Alam. "Reliability and Utilization Evaluation of a Cloud Computing System Allowing Partial Failures." Cloud Computing (CLOUD), 2014 IEEE 7th International Conference on. IEEE, 2014. [7] S. Malik, and F. Huet, "Adaptive fault tolerance in real time cloud computing." pp. 280-287. [8] Zhani, Mohamed Faten, and Raouf Boutaba. "Survivability and fault tolerance in the cloud." Cloud Services, Networking, and Management. John Wiley & Sons, Inc, 2015. 295-308. [9] Patra, Prasenjit Kumar, Harshpreet Singh, and Gurpreet Singh. "Fault tolerance techniques and comparative implementation in cloud computing." International Journal of Computer Applications 64.14 (2013). [10] Cheraghlou, Mehdi Nazari, Ahmad Khadem-Zadeh, and Majid Haghparast. "A survey of fault tolerance architecture in cloud computing." Journal of Network and Computer Applications 61 (2016): 81-92. [11] Kumar, Karthik, et al. "Resource allocation for real-time tasks using cloud computing." Computer Communications and Networks (ICCCN), 2011 Proceedings of 20th International Conference on. IEEE, 2011. [12] T. Tan, R. T. Ma, M. Winslett, Y. Yang, Y. Yu, and Z. Zhang, "Resa: realtime elastic streaming analytics in the cloud." pp. 1287-1288. [13] Zhu, Xiaomin, et al. "Real-time tasks oriented energy-aware scheduling in virtualized clouds." IEEE Transactions on Cloud Computing 2.2 (2014): 168-180. [14] W. Zhao, P. Melliar-Smith, and L. E. Moser, "Fault tolerance middleware for cloud computing." pp. 67-74. [15] Jhawar, Ravi, Vincenzo Piuri, and Marco Santambrogio. "A comprehensive conceptual system-level approach to fault tolerance in cloud computing." Systems Conference (SysCon), 2012 IEEE International. IEEE, 2012. [16] Johnson, Barry W. Design & analysis of fault tolerant digital systems. Addison-Wesley Longman Publishing Co., Inc., 1988. [17] Laprie, Jean-Claude. "Dependable computing and fault-tolerance." Digest of Papers FTCS-15 (1985): 2-11. [18] Ganesh, Amal, M. Sandhya, and Sharmila Shankar. "A study on fault tolerance methods in cloud computing." Advance Computing Conference (IACC), 2014 IEEE International. IEEE, 2014. [19] Rimal, Bhaskar Prasad, Eunmi Choi, and Ian Lumb. "A taxonomy and survey of cloud computing systems." INC, IMS and IDC (2009): 44-51. [20] A. Bala, and I. Chana, “Fault tolerance-challenges, techniques and implementation in cloud computing,” IJCSI International Journal of Computer Science Issues, vol. 9, no. 1, pp. 1694-0814, 2012. [21] A. Ganesh, M. Sandhya, and S. Shankar, "A study on fault tolerance methods in Cloud Computing." pp. 844-849. [22] I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. U. Khan, “The rise of “big data” on cloud computing: Review and open research issues,” Information Systems, vol. 47, pp. 98-115, 2015. [23] V. N. Inukollu, S. Arsi, and S. R. Ravuri, “Security issues associated with big data in cloud computing,” International Journal of Network Security & Its Applications, vol. 6, no. 3, pp. 45, 2014. [24] Z. Zheng, T. C. Zhou, M. R. Lyu, and I. King, "FTCloud: A component ranking framework for fault-tolerant cloud applications." pp. 398-407. [25] V. Kaushal, and A. Bala, “Autonomic fault tolerance using haproxy in cloud environment,” Int. J. of Advanced Engineering Sciences and Technologies, vol. 7, no. 2, pp. 54-59, 2011. [26] Zhang, Yilei, Zibin Zheng, and Michael R. Lyu. "BFTCloud: A byzantine fault tolerance framework for voluntary-resource cloud computing." Cloud Computing (CLOUD), 2011 IEEE International Conference on. IEEE, 2011. [27] S. S. Lakshmi, “Fault Tolerance in Cloud Computing,” IJESR International Journal Of Engineering Sciences Research, vol. 4, 2013 1 A01 میثم کافوری، جمشید سالار میثم کافوری، جمشید سالار C. میثم کافوری، جمشید سالار 01 eng 202403 2024 C. zagros 06 10.22034/zagros.2019.1008.1727 https://rcsj.ir/user/articles/102 Farzanegan Pub mEDRA <TitleType>01</TitleType> <TitleText>روش جدید دسته‌بندی خودکار تصاویر مبنی بر الگوریتم بهبود یافته ازدحام سالپ</TitleText> <TitleType>05</TitleType> <TitleText>روش جدید دسته‌بندی خودکار تصاویر مبنی بر الگوریتم بهبود یافته ازدحام سالپ</TitleText> 01 01 102 zagros Publisher IR 01 102 JB 22 1 4 01 202403 7 10 <TitleType>01</TitleType> <TitleText>روش جدید دسته‌بندی خودکار تصاویر مبنی بر الگوریتم بهبود یافته ازدحام سالپ</TitleText> 01 Corchado, E. and Á. Herrero, Neural visualization of network traffic data for intrusion detection. Applied Soft Computing, 2011. 11(2): p. 2042-2056. 2. Hofmeyr, S.A., S. Forrest, and A. Somayaji, Intrusion detection using sequences of system calls. Journal of computer security, 1998. 6(3): p. 151-180. 3. Folino, G. and P. Sabatino, Ensemble based collaborative and distributed intrusion detection systems: A survey. Journal of Network and Computer Applications, 2016. 66: p. 1-16. 4. Sultana, N., et al., Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Networking and Applications, 2019. 12(2): p. 493-501. 5. Wu, S.-Y. and E.J.E.S.w.A. Yen, Data mining-based intrusion detectors. 2009. 36(3): p. 5605-5612. 6. Pandeeswari, N. and G. Kumar, Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mobile Networks and Applications, 2016. 21(3): p. 494-505. 7. Škrjanc, I., et al., Evolving fuzzy and neuro-fuzzy approaches in clustering, regression, identification, and classification: A survey. Information Sciences, 2019. 490: p. 344-368. 8. Abraham, A. and R. Jain, Soft computing models for network intrusion detection systems, in Classification and clustering for knowledge discovery. 2005, Springer. p. 191-207. 9. Faraoun, K. and A. Boukelif, Neural networks learning improvement using the K-means clustering algorithm to detect network intrusions. INFOCOMP Journal of Computer Science, 2006. 5(3): p. 28-36. 10. Dash, T., A study on intrusion detection using neural networks trained with evolutionary algorithms. Soft Computing, 2017. 21(10): p. 2687-2700. 11. Jonnalagadda, R.S.K. and R.P. Reddy, A literature survey and comprehensive study of intrusion detection. International Journal of Computer Applications, 2013. 81(16): p. 40-47. 12. Pfahringer, B., Winning the KDD99 classification cup: bagged boosting. SIGKDD explorations, 2000. 1(2): p. 65-66. 13. Ambusaidi, M.A., et al., Building an intrusion detection system using a filter-based feature selection algorithm. IEEE transactions on computers, 2016. 65(10): p. 2986-2998. 14. Beghdad, R., Critical study of supervised learning techniques in predicting attacks. Information Security Journal: A Global Perspective, 2010. 19(1): p. 22-35. 15. Gomez, J. and D. Dasgupta. Evolving fuzzy classifiers for intrusion detection. in Proceedings of the 2002 IEEE Workshop on Information Assurance. 2002. New York: IEEE Computer Press. 16. Jirapummin, C., N. Wattanapongsakorn, and P. Kanthamanon. Hybrid neural networks for intrusion detection system. in Proc. of ITC–CSCC. 2002. 17. Horeis, T., Intrusion detection with neural networks–combination of self-organizing maps and radial basis function networks for human expert integration. Computational Intelligence Society Student Research Grants, 2003. 18. Han, S.-J. and S.-B. Cho, Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 2005. 36(3): p. 559-570. 19. Chen, Y., A. Abraham, and B. Yang, Hybrid flexible neural‐tree‐based intrusion detection systems. International journal of intelligent systems, 2007. 22(4): p. 337-352. 20. Toosi, A.N. and M. Kahani, A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Computer communications, 2007. 30(10): p. 2201-2212. 21. Ghosh, S., et al., Network anomaly detection using a fuzzy rule-based classifier. Computer, Communication and Electrical Technology, 2017: p. 61-65. 22. Negnevitsky, M. and A. Intelligence, A guide to intelligent systems. Artificial Intelligence, 2nd edition, pearson Education, 2005. 23. Jang, J.-S., ANFIS: adaptive-network-based fuzzy inference system. IEEE transactions on systems, man, and cybernetics, 1993. 23(3): p. 665-685. 24. Beghdad, R., Critical study of neural networks in detecting intrusions. Computers & security, 2008. 27(5-6): p. 168-175. 25. Panda, M., A. Abraham, and M.R. Patra, Hybrid intelligent systems for detecting network intrusions. Security and Communication Networks, 2015. 8(16): p. 2741-2749. 1 A01 احمد کاظمی، مهدی صادق زاده، امیر شیخ احمدی احمد کاظمی، مهدی صادق زاده، امیر شیخ احمدی C. احمد کاظمی، مهدی صادق زاده، امیر شیخ احمدی 01 eng 202403 2024 C. zagros 06 10.22034/zagros.2019.1008.1727 https://rcsj.ir/user/articles/104 Farzanegan Pub mEDRA <TitleType>01</TitleType> <TitleText>تاثیر فناوری اطلاعات در عملکرد مدیریت منابع انسانی</TitleText> <TitleType>05</TitleType> <TitleText>تاثیر فناوری اطلاعات در عملکرد مدیریت منابع انسانی</TitleText> 01 01 104 zagros Publisher IR 01 104 JB 22 1 4 01 202403 7 10 <TitleType>01</TitleType> <TitleText>تاثیر فناوری اطلاعات در عملکرد مدیریت منابع انسانی</TitleText> 01 [1] Falkenberg, B., Mprrison, M. (2015). “Why More is Different?.” Springer. [2] Foote, R. (2007) “Mathematics and Complex Systems.” Science. Vol. 318, No. 5849, PP. 410-412. [3] Thurner, S., Klimek, P., Hanel, R. (2018) “Introduction to the Theory of Complex Systems.” Oxford University Press. [4] Wolfram, S. (2002). “A New Kind of Science.” Wolframe Media. [5] Gallavotti, G., Reiter, W.L., Yngvason, J. (2007). “Boltzmann’s Legacy.” European Mathematical Society. [6] Tao, T. (2008). “Structure and Randomness.” American Mathematical Society. [7] Copeland, B. J., Posy, C. J., Shagrir, O. (2013). “Computability: Turing, Godel, Church and Beyond.” MIT Press. [8] Kari, J. J., Rozenberg, G., Back, T., Kok, J. N. (Eds.) (2012). “Handbook of Natural Computing.” Springer. [9] Brandt, F., Conitzer, V., Endriss, U., Lang, J., Procaccia, A. D. (2016). “Handbook of Computational Social Choice.” Cambridge University Press. [10] Birrell, E., Pass, R. (2011). “Approximately Strategy-Proof Voting.” Proceeding of the 22nd International Joint Conference on Artificial Intelligence. July. Barcelona. Spain. [11] Arora, S., Barak, B. (2009). “Computational Complexity: A Modern Approach.” Cambridge University Press. [12] Stays, j. (2012). “Boolean Function Complexity: Advances and Frontiers.” Springer. [13] Capcarrere, M. (2002). “Cellular Automata and Other Cellular Systems: Design & Evolution.” Phd Thesis. ETH. [14] Boccara, N. (2010). “Modeling Complex Systems.” 2nd Edition. Springer. [15] Land, M. et al, (1995). “No Perfect Two-State Cellular Automata for Density Classification Task Exists” Physical Review Letters. Vol. 74, PP. 5148-5150. [16] Mohri, M., Rostamizadeh, A., Talwalkar, A. (2018). “Foundations of Machine Learning.” Second edition. MIT Press. 1 A01 میثم کافوری میثم کافوری C. میثم کافوری 01 eng 202403 2024 C. zagros 06 10.22034/zagros.2019.1008.1727 https://rcsj.ir/user/articles/103 Farzanegan Pub mEDRA <TitleType>01</TitleType> <TitleText>مطالعه مروري بر توليد نمونه آزمون کمينه در آزمون تعاملي</TitleText> <TitleType>05</TitleType> <TitleText>مطالعه مروري بر توليد نمونه آزمون کمينه در آزمون تعاملي</TitleText> 01 01 103 zagros Publisher IR 01 103 JB 22 1 4 01 202403 7 10 <TitleType>01</TitleType> <TitleText>مطالعه مروري بر توليد نمونه آزمون کمينه در آزمون تعاملي</TitleText> 01 [1] M. Ammar, G. Russello, and B. Crispo, "Internet of Things: A survey on the security of IOT frameworks," Journal of Information Security and Applications, vol. 38, pp. 8-27, 2018. [2] N. M. Radwan, "A Study: The Future of the Internet of Things and its Home Applications," International Journal of Computer Science and Information Security (IJCSIS), vol. 18, no. 1, 2020. [3] S. Chowdhury, R. Jain, M. Thimmaiah, R. Prajwal, and K. Rakesh, "IOT based home automation and security systems: A literature survey," International Journal of Advance Research, Ideas and Innovations in Technology, vol. 5, no. 2, 2019. [4] H. Hosseinian, H. Damghani, L. Damghani, G. Nezam, and H. Hosseinian, "Home appliances energy management based on the IOT system," International Journal of Nonlinear Analysis and Applications, vol. 10, no. 1, pp. 167-175, 2019. [5] S. P. Yadav, A. Kumbhare, and R. Parab, "Smart Home Application using Internet of Things," perception, vol. 6, no. 02, 2019. [6] Z. Zhao et al., "A novel framework of three-hierarchical offloading optimization for MEC in industrial IOT networks," IEEE Transactions on Industrial Informatics, vol. 16, no. 8, pp. 5424-5434, 2019. [7] A.-R. Sadeghi, C. Wachsmann, and M. Waidner, "Security and privacy challenges in industrial internet of things," in 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), 2015, pp. 1-6: IEEE. [8] T. Perković, S. Damjanović, P. Šolić, L. Patrono, and J. J. Rodrigues, "Meeting Challenges in IOT: Sensing, Energy Efficiency, and the Implementation," in Fourth International Congress on Information and Communication Technology, 2020, pp. 419-430: Springer. [9] K. D. Kumar, M. Sudhakara, and R. K. Poluru, "Towards the Integration of Blockchain and IOT for Security Challenges in IOT: A Review," in Transforming Businesses With Bitcoin Mining and Blockchain Applications: IGI Global, 2020, pp. 45-67. [10] S. Stankovski, G. Ostojić, L. Tarjan, M. Stanojević, and M. Babić, "CHALLENGES OF IOT PAYMENTS IN SMART SERVICES," Annals of DAAAM & Proceedings, vol. 30, 2019. [11] Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, and S. Shieh, " IOT security: ongoing challenges and research opportunities," in 2014 IEEE 7th international conference on service-oriented computing and applications, 2014, pp. 230-234: IEEE. [12] K. Tabassum, A. Ibrahim, and S. A. El Rahman, "Security issues and challenges in IOT," in 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1-5: IEEE. [13] F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, "Machine learning in IOT security: current solutions and future challenges," IEEE Communications Surveys & Tutorials, 2020. [14] M. A. Khan and K. Salah, " IOT security: Review, blockchain solutions, and open challenges," Future Generation Computer Systems, vol. 82, pp. 395-411, 2018. [15] S. Zeadally and M. Tsikerdekis, "Securing Internet of Things (IOT) with machine learning," International Journal of Communication Systems, vol. 33, no. 1, p. e4169, 2020. [16] F. Mclay, "Privacy law: How to save face: Data and privacy safeguards," Governance Directions, vol. 70, no. 4, p. 202, 2018. [17] M. T. Gardner, C. Beard, and D. Medhi, "Using SEIRS epidemic models for IOT botnets attacks," in DRCN 2017-Design of Reliable Communication Networks; 13th International Conference, 2017, pp. 1-8: VDE. [18] L. Munoz Gonzalez and E. Lupu, "The secret of machine learning," 2018. [19] L. E. Kane, J. J. Chen, R. Thomas, V. Liu, and M. Mckague, "Security and Performance in IOT: A Balancing Act," IEEE Access, vol. 8, pp. 121969-121986, 2020. [20] P. Williams, P. Rojas, and M. Bayoumi, "Security Taxonomy in IOT–A Survey," in 2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), 2019, pp. 560-565: IEEE. [21] Y. Yang, X. Zheng, W. Guo, X. Liu, and V. Chang, "Privacy-preserving smart IOT-based healthcare big data storage and self-adaptive access control system," Information Sciences, vol. 479, pp. 567-592, 2019. [22] N. Nesa, T. Ghosh, and I. Banerjee, "Non-parametric sequence-based learning approach for outlier detection in IOT," Future Generation Computer Systems, vol. 82, pp. 412-421, 2018. [23] F. Li, J. Hong, and A. A. Omala, "Efficient certificateless access control for industrial internet of things," Future Generation Computer Systems, vol. 76, pp. 285-292, 2017. [24] B. Chatterjee, D. Das, S. Maity, and S. Sen, "RF-PUF: Enhancing IOT security through authentication of wireless nodes using in-situ machine learning," IEEE Internet of Things Journal, vol. 6, no. 1, pp. 388-398, 2018. [25] H. Liu and B. Lang, "Machine learning and deep learning methods for intrusion detection systems: A survey," Applied Sciences, vol. 9, no. 20, p. 4396, 2019. [26] R. Doshi, N. Apthorpe, and N. Feamster, "Machine learning ddos detection for consumer internet of things devices," in 2018 IEEE Security and Privacy Workshops (SPW), 2018, pp. 29-35: IEEE. [27] J. Canedo and A. Skjellum, "Using machine learning to secure IOT systems," in 2016 14th annual conference on privacy, security and trust (PST), 2016, pp. 219-222: IEEE. [28] P. C. M. Arachchige, P. Bertok, I. Khalil, D. Liu, S. Camtepe, and M. Atiquzzaman, "A trustworthy privacy preserving framework for machine learning in industrial IOT systems," IEEE Transactions on Industrial Informatics, vol. 16, no. 9, pp. 6092-6102, 2020. 1 A01 سجاد اسفندياري، وحيد رافع سجاد اسفندياري، وحيد رافع C. سجاد اسفندياري، وحيد رافع 01 eng 202403 2024 C. zagros 06 10.22034/zagros.2019.1008.1727 https://rcsj.ir/user/articles/109 Farzanegan Pub mEDRA <TitleType>01</TitleType> <TitleText>تشخیص حملات ترافیک انتقالی شبکه با استفاده از منطق فازی مبتنی بر گروه مدل مخفی مارکوف</TitleText> <TitleType>05</TitleType> <TitleText>تشخیص حملات ترافیک انتقالی شبکه با استفاده از منطق فازی مبتنی بر گروه مدل مخفی مارکوف</TitleText> 01 01 109 zagros Publisher IR 01 109 JB 22 1 4 01 202403 7 10 <TitleType>01</TitleType> <TitleText>تشخیص حملات ترافیک انتقالی شبکه با استفاده از منطق فازی مبتنی بر گروه مدل مخفی مارکوف</TitleText> 01 1- Rajabioun, Ramin. "Cuckoo optimization algorithm." Applied soft computing 11, no. 8 (2011): 5508-5518. 2- Richmond, W. K. (1965). Teachers and machines: an introduction to the theory and practice of programmed learning. Collins. 3- Shaikh, M. A. M., Prendinger, H., & Mitsuru, I. (2007, September). Assessing sentiment of text by semantic dependency and contextual valence analysis. In International conference on affective computing and intelligent interaction (pp. 191-202). Springer, Berlin, Heidelberg. 4- Zheng, H., & Zhou, Y. (2012). A novel cuckoo search optimization algorithm based on Gauss distribution. Journal of Computational Information Systems, 8(10), 4193-4200. 5- Rautray, R., & Balabantaray, R. C. (2018). An evolutionary framework for multi document summarization using Cuckoo search approach: MDSCSA. Applied computing and informatics, 14(2), 134-144. 6- Sarkar, K. (2013). Automatic Single Document Text Summarization Using Key Concepts in Documents. JIPS, 9(4), 602-620. 7- Nenkova, A. (2005). Automatic text summarization of newswire: Lessons learned from the document understanding conference 8- Mosa, Mohamed Atef, Arshad Syed Anwar, and Alaa Hamouda. "A survey of multiple types of text summarization based on swarm intelligence optimization techniques." (2018). 9- Rouane, Oussama, Hacene Belhadef, and Mustapha Bouakkaz. "Combine clustering and frequent itemsets mining to enhance biomedical text summarization." Expert Systems with Applications 135 (2019): 362-373. 1 A01 سیده معصومه موسوی، سیده طاهره موسوی سیده معصومه موسوی، سیده طاهره موسوی C. سیده معصومه موسوی، سیده طاهره موسوی 01 eng 202403 2024 C. zagros 06 10.22034/zagros.2019.1008.1727 https://rcsj.ir/user/articles/105 Farzanegan Pub mEDRA <TitleType>01</TitleType> <TitleText>ترکیب تصاویر با کمک ترکیب فازی، موجک و آنتروپی تصویر</TitleText> <TitleType>05</TitleType> <TitleText>ترکیب تصاویر با کمک ترکیب فازی، موجک و آنتروپی تصویر</TitleText> 01 01 105 zagros Publisher IR 01 105 JB 22 1 4 01 202403 7 10 <TitleType>01</TitleType> <TitleText>ترکیب تصاویر با کمک ترکیب فازی، موجک و آنتروپی تصویر</TitleText> 01 [01] Heydari, A., Tavakoli, M. a., & Heydari, Z. (2014, December 31). Detection of review spam:A survey. Expert Systems With Applications, 1- 9. doi:10.1016/j.eswa.2014.12.029 [02] Kaya, Y., & Ertugrul, O. F. (2016, Junuary 11). A novel approach for spam email detection based on shifted binary patterns. wiley online library, 1216-1225. doi:10.1002/sec.1412 [03] Idris, I., & Selamat, A. (2014). Improved email spam detection model with nagative selection algorithm and particle swarm optimization. Applied Soft Computing, 1 - 17. doi:10.1016j.asoc.2014.05.002 [04] Bhowmick, A., & Hazarika, S. M. (2016, Jun 3). Machine Learning for E-mail spsm Filtering:Review,Techniques and Trends. manuscript No., 1 - 27. [05] Klaibar, S. M., & Razavi, S. N. (2014). Spam filtering by using Genetic based Feature Selection. International Jornal of Computer Applications Technology and Research, 3(12, 839 - 843, 2014, ISSN:- 2319 - 8656), 839 - 843. Retrieved from www.ijcat.com [06] Bayati, E., Sadeghzadeh, M., & Kumarci, F. (2014, January 1). Improving the Methods of Email Classification through the Fuzzy Decition Tree. Academic and Applied Studies, 4(1), 38 - 50. Retrieved from www.academians.org [07] Prilepok, M., Jezowicz, T., Platos, J., & Snacel, V. (2012). Spam detection using Compression and PSO. Fourth International on Computational Aspects of Social Networks(CASoN) (pp. 263 - 270). IEEE. [08] Saad, O., Darwish, A., & Faraj, R. (2012, Febuary). A survey of machine learning techniques for Spam filtering. IJCSNS International Jornal of Computer and Network Security, 12 No.2, 66- 72. [09] Almeida, T. A., Almeida, J., & Yamakami, A. (2010, December 2). Spam filtering:how the dimensionality reduction affects the accuracy of Naive Bayes classifiers. The Brazilian Computer Society, 183 - 200. doi:10.1007/s13174-010-0014-7 [10] Su, M.-C., Lo, H.-H., & Hsu, F.-H. (2010). A neural tree and its application to spam detection. Expert Systems With Applications, 7966 - 7985. doi:10.1016/j.eswa.2010.04.038 [11] Upasana, *. C. (2010). A Survey of Text Classification Techniques for E-mail Filtering. Second International Conference on Machine Learning and Computing (pp. 32 - 36). IEEE computer socity. doi:10.1109/ICMLC.2010.61 [12] Blanzieri, E., & Bryl, A. (2009, July 10). A survey of learning -based techniques of email spam filtering. [13] Metsis, V., Androutsopoulos, I., & Paliouras, G. (2006). Spam Filtering with Naive Bayes - Which Naive Bayes? Third Conference on Email and Anti-Spam, (pp. 1 - 9). California USA. Retrieved July 27 - 28, 2006 [14] Lee, S. M., Kim, D. S., Kim, J. H., & Park, J. S. (2010). Spam Detection Using Feature Selection and Parameters Optimization. International Conference on Complex,Intelligent and Software Intensive Systems (pp. 883 - 885). IEEE computer society. doi:10.1109/CISIS.2010.116 [15]Geerthik.s. (2013). Survey on Internet Spam: Classification and Analysis. Int.J.Computer Technology & Applications, 4(3),384-391, 384 - 391. Retrieved from www.ijcta.com [16]M.Basavaraju, D. (n.d.). A Novel Method of Spam Mail Detection using Text Based Clustering Approach. International Journal of Computer Applications (0975 - 8887), 5- no.4,August 2010. [17]Rekha, S. N. (2014, may). A Review on Different Spam Detection Approaches. International Journal of Trends and Technology (IJETT), 11 Number 6, 315 - 318. Retrieved from www.ijettjournal.org [18]Savita Teli, S. B. (2014). Effective Spam Detection Method for Email. International Conference on Advances in Engineering & Technology (ICAET-2014), (pp. 68 - 72). Retrieved from www.iosrjournals.org [19]Anjali Sharma, D. J. (2015, may). Data Pre-Processing in Spam Detection. IJSTE - International Journal of Science Technology & Engineering, 1(11/ 007), 33 - 37. Retrieved from www.ijste.org [20]Isabella Miszalsaka, W. Z. (2007, February 20-24). Selected Methods of Spam Filtering in Email. Department of Microelectronics and Computer Science,Technical University of Lopez, aj,Politechniki 507 - 513. Retrieved from wojtekz@dmcs.pl [21]Ge Song, L. S. (n.d.).(2008) Email Spam Detection. 1 - 16. [22]Benjamin Markines, C. C. (2009, April 21). Social Spam Detection. AIRweb, 1 - 7. Retrieved from bmarkine@cs.indiana.edu [23]Sadegh Kharazmi, A. F. (2007, Nov 20 - 21). Spam Email detection Using Bayesian Spanning Tree. IDMC'07 ,Amir Kabir University, 1 - 6. [24]Zahrasadat Torabi, M. N. (2012). New Approach for Spam Detection with Suport Vector Machine And Feature Selection . First National Conference of Technology Developments on Elecronical , Electronics and Computer Engineering, (pp. 1 - 12). [27] G.Brown, T. M. (2008). Social networks and context-aware spam. In ACM Conference on Supporttive Work. [29] Gao, Y. (Dec. 2010). A Comprehansive Approach to Image Spam Detection: From Server to Client Solution, Information Forensics and Security. IEEE Transations. [30] Gao, Y. (2008). Image spam hunter, Acoustics, Speech and Signal Processing. ICASSP 2008. IEEE International Conference on April 2008. [31] N. Immorlica, K. J. (Redmond, 2006). Click Fraud Resistant Methods for Learning Click- Through Rates. Technical report, Microsoft Research. [32] L.Page, S. B. (1998). The page rank citation ranking: Bringing order to the web. [33] T. Fawcet. December (2003) Achallenge problem for data mining. KDD Explorations, in vivo spam filtering. [34] Veloso, A. (Oct. 2006). Lazy Associative Classification for Content-based Spam Detection. Web Congress, 2006, IEEE conference publication. [35] Z. Gyongyi, H. G.-M. (2005). Web Spam technology. In First International Workshop on Adversarial Information Retrieval on the Web(AIR Web). [36] K. Chellapilla, A. M. (Banff, Canada, 2007). A taxonomy of javascript redirection spam. In Proceedings of the 3rd international workshop on Adversarial information retrieval on the web, AIR Web 07. [37] Azam, N. (((2014))). Comparative Study of Features Space Reduction Techniques for Spam Detection. Department of Computer Engineering College of Electrical and Mechanical National University of Sciences and Technology. [38] M. Basavaraju, D. R. (n.d.). A Novel Method of Spam Mail Detection using Text BasedClustering Approach. International Journal of Computer Applications (0975 - 8887) Volume 5-No.4, August 2010. [39] Thamarai Subramaniam, H. A. (4 October, 2010). Overview of textual anti-spam filtering techniques. International Jornal of the Physical Sciences Vol. 5(12), pp. 1869-1882. [40] P. Cunningham, N. N. (Retrieved December 28, 2011). A Case-Based Approach to Spam Filtering that Can Track Concept Drift. Retrieved from https:/www.cstcd.ie/publications/tech-reports/reports.03/TCD-CS-2003-16.pdf [41] F. Roli, G. F. (Retrieved December 28, 2011). The emerging role of visual pattern recognition in spam filtering: challenge and opportunity for IAPR researchers. Retrieved from http://www.iapr.org/members/newaletter/newsletter07-92/index_files/page465.htm [42] G. Ashokkumar, s. D. (Anna University, Channai-6000 025, India). Spam Filtering. Department of Computer Science and Engineering. [43] Erik Cuevas, M. C.-C. ((2013)). A swarm optimization algorithm inspired in the behavior of the social-spider. Expert Systems with Applications 40 , 6374–6384. [44] Sang Min Lee، Dong Seong Kim، Ji Ho Kim، و Jong Sou Park. (2010) Spam Detection Using Feature Selection and Parameters Optimization. International Conference on Complex,Intelligent and Software Intensive Systems (883-885) IEEE computer society. doi:101109/CISIS.2010.116 [45] Enayat Bayati, Mehdi Sadeghzadeh, Farshad Kumarci. 1) January( .(2014) Improving the Methods of Email Classification through the Fuzzy Decition Tree. Academic and Applied Studies 38-40. www.academians.org [46] Sorayya Mirzapour Kalaibar, S. N. (((2014)), Volume 3– Issue 12, 2014, ISSN:- 2319–8656). Spam filtering by using Genetic based Feature Selection. International Journal of Computer Applications Technology and Research, 839 - 843. [47] Ngnotchouye, S. L. ((2017)). Firefly Algorithm for Discrete Optimization Problems: A Survey. KSCE Journal of Civil Engineering 21(2), Received September 5, 2016/Revised October 21, 2016/Accepted November 2, 2016, 535-545. [48] Mohd Herwan Sulaiman, H. D. ((2012)). Modified Firefly Algorithm in Solving Economic Dispatch Problems with Practical Constraints. 2012 IEEE International Conference on Power and Energy (PECon), 2-5 December 2012, Kota Kinabalu Sabah, Malaysia. [49] Yilmaz Kaya , Omer Faruk Ertugrul. ( 11 Junuary, ( 2016 .) A novel approach for spam email detection based on shifted binary patterns. wiley online library , 1216 - 1225 . doi:10.1002/sec.1412 [51] Seyedeh Zahra Mirjalili, S. S. ((11 February 2015)). Designing evolutionary feedforward neural networks using A Hybrid Firefly Algorithm and social spider optimization algorithm. Neural Comput & Applic. [52] Mohamed A. Tawhid, A. F. ((Springer-Verlag Berlin Heidelberg 2016)). A hybrid social spider optimization and genetic algorithm for minimizing molecular potential energy function. Soft Comput, DOI 10.1007/–00500-016-2208-9. [53] Yongquan Zhou, Y. Z.-B. ((2017)). A simplex method-based social spider optimization algorithm for clustering analysis. Engineering Applications of Artificial Intelligence 64, 67–82. [54] Harley Vera-Olivera, J. L.-A.-R. (n.d.). Social Spider Algorithm Approach for Clustering. National University of San Antonio Abad del Cusco. [55] Salima Ouadfel, A. T.-A. ((2016)). Social spiders optimization and flower pollination algorithm for multilevel image thresholding: A performance study. Expert Systems With Applications 55 , 566–584. [56] K. B. Gavali, A. (ISSN Print: 0976-6340 and ISSN Online: 0976-6359, ((October 2017)). job shop scheduling with the aid of hybrid social spider optimization and gray wolf optimization with industrial scheduling case study. International Journal of Mechanical Engineering and Technology (IJMET), Volume 8, Issue 10, Article ID: IJMET_08_10_031, 274–284. [57] W.T. Elsayed, Y. H.-b. ((2016)). Modified social spider algorithm for solving the economic dispatch problem. Engineering Science and Technology, an International Journal, 2215-0986/, 2016 Karabuk University. Publishing services by Elsevier B.V., http://dx.doi.org/10.1016/j.jestch.2016.09.002. [58] Arora, S. G. (S. Berretti et al. (eds.), Intelligent Systems Technologies and Applications,Advances in Intelligent Systems and Computing 384,((2016)). A Hybrid Firefly Algorithm and Social Spider. Computer Science Department, DAV University, Jalandhar, Punjab, India,Springer International Publishing Switzerland 2016, DOI: 10.1007/978-3-319-23036-8_2. [59] Mohamed Abu ElSoud, A. M. ((2016)). Computational Intelligence Optimization Algorithm Based on Meta-heuristic Social-Spider: Case Study on CT Liver Tumor Diagnosis. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4,. [60] Danillo R. Pereira, M. A. ((2014)). A Social-Spider Optimization Approach for Support Vector Machines Parameters Tuning. IEEE, 978-1-4799-4458-3/14/2014 IEEE. [61] Urvashi Prakash Shukla, S. J. ((2016)). Parallel social spider clustering algorithm for high dimensional datasets. Engineering ApplicationsofArtificial Intelligence56, 75–90. [62] Hossam M. Zawbaa, E. E. ((2015)). A wrapper approach for feature selection based on swarm optimization algorithm inspired from the behavior of social-spiders. 978-1-4673-9360-7/15 2015 IEEE [63] Yu, J. J. ((2015 IEEE)). Parameter Sensitivity Analysis of Social Spider Algorithm. Student Member, IEEE and Victor O.K. Li, Fellow, IEEE Department of Electrical and Electronic Engineering, The University of Hong Kong, 978-1-4799-7492-4/15. [64] Dr.R.Prabhakar M.Basavaraju. (2010) A Novel Method of Spam Mail Detection using Text Based Clustering Approach. International Journal of Computer Applications no5. 4,August 2010. [65] Qiang Zhang, H. L. ((2013)). A New Extreme Learning Machine Optimized by Firefly Algorithm. 2013 Sixth International Symposium on Computational Intelligence and Design. [66] Gandomi AH, Y. X. ((2011)). Mixed variable structural optimization using firefly algorithm. Comput Struct 2011,89(23–24), 2325–36. [67] Yang, X. ((2010)). Engineering optimization: an introduction with metaheuristic applications. John Wiley & Sons, USA. [68] Hui Wang, W. W. ((2016)). Adaptive Firefly Algorithm with Alternative Search. 2016 IEEE Congress on Evolutionary Computation (CEC), 978-1-5090-0623-6/16 2016 IEEE. [69] XS, Y. ((2010)). Engineering optimization: an introduction with metaheuristic applications. John Wiley & Sons. [70] Hassanzadeh and Meybody.(2012) A survey of learning -based techniques of email spam filtering. doi:10/1007/ s-9109-009-104626. [71] Vangelis Metsis، Ion Androutsopoulos، و Goorgios Paliouras.(2006) Spam Filtering with Naive Bayes - Which Naive Bayes? Third Conference on Email and Anti-Spam، (1-9) California USA.27-28 July, 2006 [72] X.S. Yang. ((2008)). Nature-Inspired Metaheuristic Algorithms. Luniver Press. [73] J. Senthilnath, S. O. ((2011)). Clustering using firefly algorithm: Performance study. Swarm and Evolutionary Computation 1 , 164–171. [74] Yang, X. ((vol. 5792, 2009)). Firefly algorithms for multimodal optimization. SAGA, Lecture Notes in Computer,Stochastic Algorithms:Foundationsand Applications Sciences, 169–178. [75] Yang, X. S. ((2010)). Firefly algorithm، stochastic Test Functions and Design ptimization. Int. J. bio-inspired computation. [76] Tahereh Hassanzadeh, M. R. ((2012)). A New Hybrid Approach for Data Clustering using Firefly Algorithm and K-means. The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012), 978-1-4673-1479-4/12 2012 IEEE. [77] Adorio, E. D. ((2005)). Mvf-multivariate test functions library in c for unconstrained global optimization. [78] Yang, X.-S. ((2014)). Swarm Intelligence Based Algorithms: A Critical Analysis. Evolutionary Intelligence 7)1), 17–28 . [79] Apostolopoulos, T. V. ((2010)). Application of the firefly algorithm for solving the economic emissions load dispatch problem. International Journal of Combinatorics 2011 . [80] Horng, M.-H. ((2012)). Vector quantization using the firefly algorithm for image compression. Expert Systems with Applications 39(1), 1078–1091 . [81] Khadwilard, A. e. ((2011)). Application of firefly algorithm and its parameter setting for job shop scheduling. First Symposius on Hands-On Research and Development, 89–97 . [82] Sayadi, M. R.-N. ((2010)). A discrete firefly meta-heuristic with local search for makespan minimization in permutation flow shop scheduling problems. International Journal of Industrial Engineering Computations 1(1), 1–10. [83] Senthilnath, J. O. ((2011)). Clustering using firefly algorithm: performance study. Swarm and Evolutionary Computation 1(3), 164–171 . [84] James J.Q, V. O. ((The University of Hong Kong , October 2013)). A Social Spider Algorithm for Global Algorithm. Technical Report No. TR 2013-004. [85] Palit, S. S. (15–17 September 2011, India, ((2011)). A cryptanalytic attack on the knapsack cryptosystem using binary Firefly algorithm. 2nd Int. Conference on Computer and Communication Technology (ICCCT), 428–432 . [86] Lukasik, S. z. (Springer, Heidelberg ((2009)). Firefly algorithm for continuous constrained optimization tasks. Nguyen, N.T., Kowalczyk, R., Chen, S.-M. (eds.) ICCCI 2009. LNCS, vol. 5796, 97–106. [87] Senthilnath, J. O. ((2011)). Clustering using firefly algorithm: performance study. Swarm and Evolutionary Computation 1(3), 164–171 . [88] Sayadi, M. R.-N. ((2010)). A discrete firefly meta-heuristic with local search for makespan minimization in permutation flow shop scheduling problems. International Journal of Industrial Engineering Computations 1(1), 1–10. [89] Zeng B, L. M. ((2014)). Research on assembly sequence planning based on improved firefly algorithm. Comput Integr Manuf Syst 20(4), In Chinese, 799–806. [90] Arora, S. G. (S. Berretti et al. (eds.), Intelligent Systems Technologies and Applications,Advances in Intelligent Systems and Computing 384,((2016)). A Hybrid Firefly Algorithm and Social Spider. Computer Science Department, DAV University, Jalandhar, Punjab, India,Springer International Publishing Switzerland 2016, DOI: 10.1007/978-3-319-23036-8_2. [91] Mohamed Abu ElSoud, A. M. ((2016)). Computational Intelligence Optimization Algorithm Based on Meta-heuristic Social-Spider: Case Study on CT Liver Tumor Diagnosis. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4,. [92] Yu, J. J. ((2015 IEEE)). Parameter Sensitivity Analysis of Social Spider Algorithm. Student Member, IEEE and Victor O.K. Li, Fellow, IEEE Department of Electrical and Electronic Engineering, The University of Hong Kong, 978-1-4799-7492-4/15. [93] Erik Cuevas, M. C. ((2015)). A Computational Intelligence Optimization Algorithm Based on the Behavior of the Social-Spider. Springer International Publishing Switzerland 2015, A.T. Azar and Vaidyanathan (eds.), Computational Intelligence Applications, in Modeling and Control, Studies in Computational Intelligence 575, DOI 10.1007/978-3-319-11017-2_6. [94] Mohamed Abd El Aziz, A. E. ((18 December 2016)). An improved social spider optimization algorithm based on rough sets for solving minimum number attribute reduction problem. Neural Comput & Applic, DOI 10.1007/s00521-016-2804-8. [97] Yongquan Zhou, Y. Z.-B. ((2017)). A simplex method-based social spider optimization algorithm for clustering analysis. Engineering Applications of Artificial Intelligence 64 , 67–82. [98] Harley Vera-Olivera, J. L.-A.-R. (n.d.). Social Spider Algorithm Approach for Clustering. National University of San Antonio Abad del Cusco. [99] Salima Ouadfel, A. T.-A. ((2016)). Social spiders optimization and flower pollination algorithm for multilevel image thresholding: A performance study. Expert Systems With Applications 55 , 566–584. [100] K. B. Gavali, A. (ISSN Print: 0976-6340 and ISSN Online: 0976-6359, ((October 2017)). JOB SHOP SCHEDULING WITH THE AID OF HYBRID SOCIAL SPIDER OPTIMIZATION AND GRAY WOLF OPTIMIZATION WITH INDUSTRIAL SCHEDULING CASE STUDY. International Journal of Mechanical Engineering and Technology (IJMET), Volume 8, Issue 10, Article ID: IJMET_08_10_031, 274–284. [101] W.T. Elsayed, Y. H.-b. ((2016)). Modified social spider algorithm for solving the economic dispatch problem. Engineering Science and Technology, an International Journal, 2215-0986/, 2016 Karabuk University. Publishing services by Elsevier B.V., http://dx.doi.org/10.1016/j.jestch.2016.09.002. [102] T.Ravi Chandran, A. B. ((2016)). A Social Spider Optimization Approach for Clustering Text Documents. International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB16), 978-1-4673-9745-2 ©2016 IEEE. [103] Danillo R. Pereira, M. A. ((2014)). A Social-Spider Optimization Approach for Support Vector Machines Parameters Tuning. IEEE, 978-1-4799-4458-3/14/2014 IEEE. [104] Urvashi Prakash Shukla, S. J. ((2016)). Parallel social spider clustering algorithm for high dimensional datasets. Engineering ApplicationsofArtificial Intelligence56, 75–90. [105] Erik Cuevas, M. C.-C. ((2013)). A swarm optimization algorithm inspired in the behavior of the social-spider. Expert Systems with Applications 40 , 6374–6384. [107] Eva Tuba, L. M. ((2016)). Support Vector Machine Parameter Tuning using Firefly Algorithm. 26th Conference Radioelektronika 2016, April 19-20, Kosice, Slovak Republic, 978-1-5090-1674-7/16/2016 IEEE. [110] A.H. Gandomi, X.-S. Y. ((2013)). Firefly algorithm with chaos. Commun Nonlinear Sci Numer Simulat18 , http://dx.doi.org/10.1016/j.cnsns.2012.06.009, 89–98. [111] Daniela Sanchez, P. M. ((5 June 2017)). Optimization of modular granular neural networks using a firefly algorithm for human recognition. Engineering Applications of Artificial Intelligence 64 , http://dx.doi.org/10.1016/j.engappai.2017.06.007 , 172–186. [112] Mohammed Alweshah, S. A. ((2015 )). Hybridizing firefly algorithms with a probabilistic neural network for forsolving classification problems. Applied Soft Computing, 2015 Published by Elsevier B.V., http://dx.doi.org/10.1016/j.asoc.2015.06.018, 1568-4946. [113] A. Rahmani, S. M. ((2014)). A hybrid Firefly-Genetic Algorithm for the capacitated facility location problem. Information Sciences (2014), http://dx.doi.org/10.1016/j.ins.2014.06.002, 0020-0255 /2014 Elsevier Inc. All rights reserved. [114] Majdi M. Mafarja, S. M. ((22 April 2017)). Hybrid Whale Optimization Algorithm with Simulated Annealing for Feature Selection. Neurocomputing, S0925-2312(17)30807-X, DOI:10.1016/j.neucom.2017.04.053, , NEUCOM 18405. [115] Mingfu Li, Y. Z. ((17 June 2015)). The modified firefly algorithm considering fireflies’ visual range and its application in assembly sequences planning. Int J Adv Manuf Technol, DOI:10.1007/s001700157457-8. [116] Nadia Nekouie, M. Y. ((18 February 2016)). A new method in multimodal optimization based A new method in multimodal optimization based. Artif Intell Rev, DOI 10.1007/s10462-016-9463-0, Springer Science+Business Media Dordrecht 2016. [117] Heydari, A., Tavakoli, M. a., & Heydari, Z. (2014, December 31). Detection of review spam:A survey. Expert Systems With Applications, 1- 9. doi:10.1016/j.eswa.2014.12.029 [119] Ismaila Idris, Ali Selamat. (2014) Improved email spam detection model with nagative selection algorithm and particle swarm optimization. Applied Soft Computing،pp1-17. [120] Alexy Bhowmick , Shyamanta M. Hazarika. ( 3 Jun, ( 2016 .) Machine Learning for E-mail spsm Filtering: Review,Techniques and Trends. manuscript No. pp 1 - 27 . [121] Sorayya Mirzapour Klaibar , Seyed Naser Razavi. ( 2014 .) Spam filtering by using Genetic based Feature Selection. International Jornal of Computer Applications Technology and Research 3(839( pp 839 - 843 .www.ijcat.com. [123] Michal Prilepok , Tomas Jezowicz , Jan Platos , Vaclav Snacel. ( 2012 .) Spam detection using Compression and PSO. Fourth International on Computational Aspects of Social Networks(CASoN) (pp 263 -270 .) IEEE. [124] Omar Saad , Ashraf Darwish , Ramadan Faraj.( Febuary, ( 2012 .) A survey of machine learning techniques for Spam filtering. IJCSNS International Jornal of Computer and Network Security , 12 No.2 pp 66 - 72 . [127] S. Chakravarty Upasana. ( 2010 .) A Survey of Text Classification Techniques for E-mail Filtering. Second International Conference on Machine Learning and Computing (pp32 - 36.) IEEE computer socity. [128] Enrico Blanzieri, Anton Bryl. ( 10 July), ( 2009 .) A survey of learning -based techniques of email spam filtering. 63 - 92 . doi:10.1007/s10462 - 009 - 9109 - 6 [129] Vangelis Metsis , Ion Androutsopoulos , Goorgios Paliouras. ( 2006 .) Spam Filtering with Naive Bayes - Which Naive Bayes? Third Conference on Email and Anti-Spam (pp 1 - 9 .) California USA. . 27 -28 July,2006 [130] Sebastiani, F. (2002). Machine learning in automated text categorization. ACM computing surveys (CSUR), 34(1), 1-47. [131] Geerthik.s.(2013) Survey on Internet Spam: Classification and Analysis. Int.J.Computer Technology Applications،-.www.ijcta.com [132] Dr.R.Prabhakar M.Basavaraju.(2010) A Novel Method of Spam Mail Detection using Text Based Clustering Approach. International Journal of Computer Applications (0975 – 8887( (5 - no.4,August 2010( [133] Sandeep Negi Rekha. (may, (2014) A Review on Different Spam Detection Approaches. International Journal of Trends and Technology (IJETT)، 11 Number ,315-318, www.ijettjournal.org [134] Santoshkumar Biradar Savita Teli. (2004) Effective Spam Detection Method for Email. International Conference on Advances in Engineering & Technology (ICAET-2014)، . (pp 68-72) www.iosrjournals.org [135] Dr.Manisha,Manisha,Dr.Rekha Jain Anjali Sharma. (may, (2015). Data Pre-Processing in Spam Detection. IJSTE - International Journal of Science Technology & Engineerin, pp37-33 www.ijste.org [136] Wojciech Zabierrowski,Anderzej Napieralski Isabella Miszalsaka.) 20-24 February( , (2007). Selected Methods of Spam Filtering in Email. Department of Microelectronics and Computer Science,Technical University of Lopez, aj,Politechniki 11, 513-507,924-90.wojtekz@dmcs.pl [137] Lauren Steimle Ge Song (2010). Email Spam Detection. pp1-6. [138] Ciro Cattuto,Filippo Menczer Benjamin Markines. (  April),(2009). Social Spam Detection. AIRweb، pp1-7, bmarkine@cs.indiana.edu [139] Ali Farahmandnejhad,Shahab Behjati Sadegh Kharazmi  Nov), (2007). Spam Email detection Using Bayesian Spanning Tree. IDMC' ,Amir Kabir University، pp1-6. [140] MohammadHosein Nadimi,Akbar NabiollahiZahrasadat Torabi. (2012) New Approach for Spam Detection with Suport Vector Machine And Feature Selection . First National Conference of Technology Developments on Elecronical , Electronics and Computer Engineering، (pp1-12). [141] Harris Interactive Public relation research. (2008) A study of social networks scams. [142] S.Moyer and N.Hamiel. (2008) satan is on my friend list: Attacking social networks. http://www.blackhat.com/html/bh-usa-08/bh-usa-08-archeve.html [143] T.Howe, M. Ihbe, A. Prakash, and K. Borders G.Brown. (2008) Social networks and context-aware spam. In ACM Conference on Supporttive Work. [144] Rajabioun, R. ((2011)). Cuckoo optimization algorithm. Appl. Soft Comput. 11, 5508–5518 (2011). [145] Yan Gao. (Dec. (2010) A Comprehansive Approach to Image Spam Detection: From Server to Client Solution, Information Forensics and Security. IEEE Transations. [146] Yan Gao. (2008) Image spam hunter, Acoustics, Speech and Signal Processing. ICASSP 2008. IEEE International Conference on April 2008 [147] K. Jain, M. Mahdian, and K. Talwar N. Immorlica. (Redmond, (2006) Click Fraud Resistant Methods for Learning Click- Through Rates. Technical report, Microsoft Research. [148] S. Brin, R.Motwani, and T. Winograd. L.Page.(1998) The page rank citation ranking: Bringing order to the web. [149] T. Fawcet. December. (2003) Achallenge problem for data mining. KDD Explorations, in vivo spam filtering. [150] Adriano Veloso. Oct. (2006) Lazy Associative Classification for Content-based Spam Detection. Web Congress, 2006, IEEE conference publication. [151] H. Garcia-Molina Z. Gyongyi. (2005) Web Spam technology. In First International Workshop on Adversarial Information Retrieval on the Web(AIR Web). [152] A. Maykov K. Chellapilla. (Banff, Canada, (2007) A taxonomy of javascript redirection spam. In Proceedings of the 3rd international workshop on Adversarial information retrieval on the web, AIR Web 07 [153] Nouman Azam. (2014) Comparative Study of Features Space Reduction Techniques for Spam Detection. Department of Computer Engineering College of Electrical and Mechanical National University of Sciences and Technology. [154] Dr. R. Prabhakar M. Basavaraju. (2010) A Novel Method of Spam Mail Detection using Text BasedClustering Approach. International Journal of Computer Applications (0975-8887) Volume 5-No.4, August 2010 [155] Hamid A. jalab and Alaa Y. Taqa , Thamarai Subramaniam (4 October), (2010) Overview of textual anti-spam filtering techniques. International Jornal of the Physical Sciences Vol5-(12).pp 1882-1869 [156] N. Nowlan P. Cunningham. (Retrieved December 28, (2011) A Case-Based Approach to Spam Filtering that Can Track Concept Drift.https:/www.cstcd.ie/publications/tech-reports/reports.03/TCD-CS-16-2002.pdf [157] G. Fumera F. Roli. (Retrieved December 28), (2011) The emerging role of visual pattern recognition in spam filtering: challenge and opportunity for IAPR researchers. http://www.iapr.org/members/newaletter/newsletter/index_files/page.htm [158] S. Dhineskumar G. Ashokkumar. (Anna University, Channai, India). Spam Filtering. Department of Computer Science and Engineering. [159] B. Schoelkopf, N. Cristianini. (2010) Support vector machines and kernel methods, the new generation of learning machines. Artificial Intelligence Magazine. [160] E. Frank I. Witten. (2000) Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann. [161] V. Vapnik. (1998) The Nature of Statistical Learning Theory. Springer; 2 edition (December 14, 1998). [162] S. Wu S. Amari. (1999) Improving support vector machine classifiers by modifying kernel functions. Neural Networks, ,pp 783-789 [163] R. O. Duda، P. Hart، و David G. Stork. (2010) Pattern Classification 2nd edition. Wiley. [164] C. Miller. (Retrieved December 28, (2011). Neural Network-based Antispam Heuristics. Symantec Enterprise Securit. www.symantec.com [165] C. Wu. (2009). Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks. Expert Syst. [166] Ron Kohavi. (1996). Scaling up the Accuracy of Naive Bayes Classifier: a Decition tree Hybrid. Data mining and visualization, Silicin Graphics, Inc. [167] L. A. Zadeh. (1975) The Concept of a Linguistic Variable and Its Application To Approximate Reasoning-I. Information Science، pp 199-249. [168] M. El-Alfy, Feares S. Al-Qunaieer EL-sayed (2008). A Fuzzy Similarity Approach for Automated Spam Filtering. Procs of the IEEE/ACS. [169] Y. Hao et al. (Eds.) Jong-Wan Kim and Sin-Jae Kang. (2005). Feature selection by Fuzzy Inference and its Application to Spam mail filtering. CIS 05, Part I, pp.361-363, Springer-Verlag Berlin Heidelberg. [170] Deb, Hossain Fuad. (2005) A Trainable Fuzzy Spam Detection System. PDCN 2005, Innsbruck, Austria. [171] S. Forrest, M.R. Glickman J. Balthrop. (2002) Revisiting LISYS: parameters and normal behavior. Proceedings of the 2002 Congress on Evolutionary Computing. [172] et al. F Gonzalez.(2003). An evolutionary approach to generate fuzzy anomaly (attack) signatures. IEEE Systems, Man and Cybernetics Society Information Assurance Workshop . [173] Uyar M, Tekin R, Yildirim S. Kaya Y. (2014) 1D-local binary pattern based feature extraction for classification of epileptic EEG signals. . Applied Mathematics and Computation. pp219-243. [174] Michal Prilepok, T. J. (((2012)) Fourth International Conference, IEEE). Spam Detection using compression and PSO. computational Aspects of Social Networks (CASoN), 263-270. [175] Enrico Blanzieri, A. B. ((2009)). A Survey of learning-based Techniques of email spam filtering. Springer Science+Business Media B.V 2009, 63-92, DOI 10.1007/s 10462-009-9109-6. [176] Ismaila Idris, A. S. (((2014))). Improved email spam detection model with negative selectionalgorithm and particle swarm optimization. Contents lists available at ScienceDirect, 2014 Published by Elsevier B.V., 1568-4946, http://dx.doi.org/10.1016/j.asoc.2014.05.002. [177] Sang Min Lee, D. S. (((2010))). Spam Detection Using Feature Selection and Parameters Optimization. International Conference on Complex, Intelligent and Software Intensive Systems. [178] Enayat Bayati, M. S. (((2014))- Vol. 4(1) January 2014). Improving the Methods of Email Classification. Journal of Academic and Applied Studies (Special Issue on Applied Sciences). [180] Omar Saad، Ashraf Darwish، و Ramadan Faraj. (Febuary, (2012) A survey of machine learning techniques for Spam filtering. IJCSNS International Jornal of Computer and Network Security، No2. pp72-76. [181] Guzella, T. S. (2009). A review of machine learning approaches to spam filtering. Expert Systems with Applications 36(7), 10206-10222. [ 182] Ertuğrul, Y. K. (((2016)),Security Comm. Networks 2016; 9:1216–1225). A novel approach for spam email detection based on shifted binary patterns. SECURITY AND COMMUNICATION NETWORKS, Published online 11 January 2016 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.1412. [183] Kim, K. I. (2003). Texture-based approach for text detection in images using support vector machines and continuously adaptive mean shift algorithm. Pattern Analysis and Machine Intelligence,IEEE Transactions on 25(12), 1631-1639. [184] Savita Teli, S. B. (2014). Effective Spam Detection Method for Email. International Conference on Advances in Engineering & Technology (ICAET-2014), (pp. 68 - 72). Retrieved from www.iosrjournals.org [185] Temitayo, F. S. (2012). Hybrid GA-SVM for Efficient Feature Selection in E-mail Classification. Computer Engineering and Intelligent Systems, Vol. 3, No .3. [186] Mu-Chun Su، HSU-Hsun Lo، و Fu-Hau Hsu (2010). A neural tree and its application to spam detection. Expert Systems With Applications،pp7955-7986. [187] Yip, C. &. ((2008)). Cooperative capture of large prey solves scaling challenge faced by spider societies. Proceedings of the National Academy of Sciences of the United States of America, 11818–11822. [188] Bonabeau, E. D. ((1999)). Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press, New York. [189] Kassabalidis, I. E.-S. ((2001)). Swarm intelligence for routing in communication networks. Global Telecommunications Conference, GLOBECOM’01, 6, IEEE, 3613–3617. [190] Gordon, D. ((2003)). The organization of work in social insect colonies. Complexity 8(1), 43–46. [191] Lubin, T. ((2007)). The evolution of sociality in spiders. Brockmann, H.J. (ed.) Advances in the Study of Behavior, vol. 37, Academic Press, Burlington , 83–145. [192] Uetz, G. ((1997)). Colonial web-building spiders: balancing the costs and benefits of group-living. Choe, E.J., Crespi, B. (eds.) The Evolution of Social Behavior in Insects and Arachnids, Cambridge University Press, Cambridge , 458–475. [193] Aviles, L. ((1986)). Sex-ratio bias and possible group selection in the social spider Anelosimus eximius. Am. Nat. 128(1), 1–12. [194] Burgess, J. ( (1982)). Social spacing strategies in spiders. Rovner, P.N. (ed.) Spider communication: mechanisms and ecological significance, Princeton University Press, Princeton, 317–351. [195] Maxence, S. ((2010)). Social organization of the colonial spider Leucauge sp. in the Neotropics:vertical stratification within colonies. J. Arachnol. 38, 446–451. [196] Subbulakshmi CV, D. S. ((2015)). Medical dataset classification: a machine learning paradigm integrating particle swarm optimization with extreme learning machine classifier. Sci World, J doi:10.1155/2015/418060. [197] Hui Wanga, b. W. (June 13, 2017). A Hybrid Multi-Objective Firefly Algorithm for Big Data Optimization. Preprint submitted to Applied Soft Computing, http://dx.doi.org/doi:10.1016/j.asoc.2017.06.029. [198]Anjali Sharma, D. J. (2015, may). Data Pre-Processing in Spam Detection. IJSTE - International Journal of Science Technology & Engineering, 1(11/ 007), 33 - 37. Retrieved from www.ijste.org [199] C.Xiao-li, L. P.-y.-f. (2009). A method of spam filtering based on weighted sipport vector machines. IEEE International Symposium on IT in Medicine&Education,1, 947-950. [200] B. Baharudin, L. H. (2010). A review of machine learning algorithms for text-documents classification. JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, Vol. 1,N. 1, 4-20. [201] LIU, H. F. (2010). A hybrid algorithm for text classification problem. [202] X. Wu, V. J. (2007). Top 10 Algorithma in Data Mining. Knowledge and Information Systems, Vol. 14, N. 1, 1-37. [203] Awad, W. E. (2011). Mashine Learning methods for E-mail Classification. International Journal of Computer Applications, Vol. 16, No.1. [204] Yuguo, L. Z. (2011). A word sequence kernels used in spam-filtering. Scientific Research and Essays Vol. 6, 1275-1280. [205] Drucker, H. S. (1999). Support vector machines for spam categorization. Neural Networks, IEEE Transactions on 10(5), 1048-1054. [206] ندیمی,. ز( اسفند 1391). مروری بر ارزیابی ماشین بردار پشتیبان در تشخیص و طبقه بندی ایمیل اسپم. همایش ملی کاربرد سیستم های هوشمند (محاسبات نرم) در علوم و صنایع، دانشگاه آزاد اسلامی واحد قوچان 1 A01 سعید امیری، احمد مصلی نژاد، احسان امیری سعید امیری، احمد مصلی نژاد، احسان امیری C. سعید امیری، احمد مصلی نژاد، احسان امیری 01 eng 202403 2024 C. zagros 06 10.22034/zagros.2019.1008.1727 https://rcsj.ir/user/articles/108 Farzanegan Pub mEDRA <TitleType>01</TitleType> <TitleText>ارائه مدلي جديد جهت برنامه ريزي نوبت کاري پرستاران در مجموعه هاي پزشکي به کمک الگوريتم هاي فرا ابتکاري</TitleText> <TitleType>05</TitleType> <TitleText>ارائه مدلي جديد جهت برنامه ريزي نوبت کاري پرستاران در مجموعه هاي پزشکي به کمک الگوريتم هاي فرا ابتکاري</TitleText> 01 01 108 zagros Publisher IR 01 108 JB 22 1 4 01 202403 7 10 <TitleType>01</TitleType> <TitleText>ارائه مدلي جديد جهت برنامه ريزي نوبت کاري پرستاران در مجموعه هاي پزشکي به کمک الگوريتم هاي فرا ابتکاري</TitleText> 01 G. Carlsson, “Topology and Data,” Bull.Amer.Math.Soc, pp. 255-308, 2009. G. Singh, “Algorithms for topological analysis of data,” Stanford University, 2008. W. Guo و A. Banerjee, “Identification of key features using topological data analysis for accurate prediction of manufacturing system outputs,” journal of manfacturing system, pp. 225-234, 2017. M. Perkins, “Visualizing Topological Space of Gene Expression Dynamics(Doctoral dissertation),” ProQuset Dissertations Publishing, 2019. شریفی و همکاران, “ویژگی های توپولوژیکی شبکه سهام در بازار بورس تهران(مطالعه موردی اثر برجام),” 1395. دهناوی و همکاران, “بررسی تاثیر کاهش بعد بر فضای ویژگی های توپولوژیک شبکه ی ژن ساخته شده از میکرو آرایه به منظور پیش گویی عود سرطان سینه، مجله دانشکده پزشکی اصفهان,” 1394. Balakrishnan.N, “Methods and Application of Statistics in Clinical Trials,” در Hoboken:Wiley, 2014. “Statistical Learning with Sparsity The lasso and Generalizations,” CRC Press, Hoboken, 2015. J. K. Brittany, T. Fasy Fabrizio Lecci و Clement Maria Vincent Rouvreau, “TDA:Statistical Tools For Topological Data Analysis,” Web Site Https://cran.r-project.org/web/packages/TDA/index.html, 2015. M. W. Dey.T.K, “Multiscale Mapper: A Framework for Topological Summarization of Data and Maps,” EprintarXiv:1504.03763, 2015. 1 A01 محمدرضا فدوی امیری، زهرا جعفری محمدرضا فدوی امیری، زهرا جعفری C. محمدرضا فدوی امیری، زهرا جعفری 01 eng 202403 2024 C. zagros 06 10.22034/zagros.2020.0924.0805 https://rcsj.ir/user/articles/131 Farzanegan Pub mEDRA <TitleType>01</TitleType> <TitleText>کاربرد هوش مصنوعی در حوزه کلان داده: مروری بر تحقیقات اخیر</TitleText> <TitleType>05</TitleType> <TitleText>کاربرد هوش مصنوعی در حوزه کلان داده: مروری بر تحقیقات اخیر</TitleText> 01 01 131 zagros Publisher IR 01 131 JB 22 1 4 01 202403 7 10 <TitleType>01</TitleType> <TitleText>کاربرد هوش مصنوعی در حوزه کلان داده: مروری بر تحقیقات اخیر</TitleText> 01 [1] D. Helbing (ed.), (2019), Will Democracy Survive Big Data and Artificial Intelligence?, © Springer International Publishing AG, part of Springer Nature 2019, https://doi.org/10.1007/978-3-319-90869-4_7 [2] Li Da Xu & Lian Duan, (2018), Big data for cyber physical systems in industry 4.0: a survey, Enterprise Information Systems, DOI: 10.1080/17517575.2018.1442934 [3] De Mauro, A., M. Greco, and M. Grimaldi. 2016. “A Formal Definition of Big Data Based on Its Essential Features.”, Library Review 65 (3): 122–135. doi:10.1108/LR-06-2015-0061 [4] Ali Reza Alaei, Susanne Becken and Bela Stantic, (2017), Sentiment Analysis in Tourism: Capitalizing on Big Data, Journal of Travel Research, DOI: 10.1177/0047287517747753 [5] Watson, H. J. (2019). Update Tutorial: Big Data Analytics: Concepts, Technology, and Applications. Communications of the Association for Information Systems, 44, pp-pp. https://doi.org/10.17705/1CAIS.04421 [6] Duan, Y., Edwards, J. S., & Dwivedi, Y. K. (2019). Artificial intelligence for decision making in the era of Big Data – evolution, challenges and research agenda. International Journal of Information Management, 48, 63–71 [7] Darren Edge, Jonathan Larson, Christopher White, (2018), Bringing AI to BI: Enabling Visual Analytics of Unstructured Data in a Modern Business Intelligence Platform, ACM 978-1-4503-5621-3/18/04…$15.00, https://doi.org/10.1145/3170427.3174367 [8] Tanaporn Panrungsri, Esther Sangiamkul, (2017), Business Intelligence Model for Disaster Management: A Case Study in Phuket, Thailand, WiPe Paper – Operational applications and perspectives, Proceedings of the 14th ISCRAM Conference – Albi, France, pages:727-738 [9] Shah J. Miah, Shahadat KhanShaheb Ali,(2017), Aalysis of interaction between Businesis in Telligence and SMES: Learn from each other, JISTEM - Journal of Information Systems and Technology Management, Vol. 14, No. 2, May/Aug., 2017 pp. 151-168 [10] M. Sigala et al. (eds.), Big Data and Innovation in Tourism, Travel, and Hospitality, © Springer Nature Singapore Pte Ltd. 2019, https://doi.org/10.1007/978-981-13-6339-9_13 [11] Li Tu Shuai Liu, Yan Wang, Chi Zhang , Ping Li, (2019), An optimized cluster storage method for real‑time big data in Internet of Things, © Springer Science+Business Media, LLC, part of Springer Nature 2019, The Journal of Supercomputing ,https://doi.org/10.1007/s11227-019-02773-1 [12] Diego García-Gil, Julián Luengo , Salvador García , Francisco Herrera, (2019), Enabling Smart Data: Noise filtering in Big Data classification,Information Sciences 479 (2019) 135–152. [13] Weisheng Lu, (2019), Big data analytics to identify illegal construction waste dumping: A Hong Kong study, Resources, Conservation & Recycling 141 (2019) 264–272. [14] Dariush Khezrimotlagh , Joe Zhu , Wade D. Cook , Mehdi Toloo , Data Envelopment Analysis and Big Data, European Journal of Operational Research (2018), doi: https://doi.org/10.1016/j.ejor.2018.10.044 [15] Leo Willyanto Santoso, (2017), Yulia, Data Warehouse with Big Data Technology for Higher Education, 4th Information Systems International Conference 2017, ISICO 2017, 6-8 November 2017, Bali, Indonesia , Procedia Computer Science 124 (2017) 93–99. 1 A01 محمدرضا وظیفه، سهیلا سارانی محمدرضا وظیفه، سهیلا سارانی C. محمدرضا وظیفه، سهیلا سارانی 01 eng 202403 2024 C. zagros