[1] Y. Wang, Z. Cai, G. Yin, Y. Gao, and Q. Pan, "A trust measurement in social networks based on game theory," in International Conference on Computational Social Networks, 2015, pp. 236-247: Springer.
[2] J. Golbeck, "Trust on the world wide web: A survey," Found. Trends Web Sci. , vol. 1, no. 2, pp. 131–197, 2006.
[3] J. A. Golbeck, Computing And A Applying Trust In Web-Based Social Networks, PhD thesis, Department of Computer Science, University of Maryland, Maryland, College Park, MD, USA, 2005.
[4] S. Hamdi, A. L. Gancarski, A. Bouzeghoub, and S. B. Yahia, "Tison: Trust inference in trust-oriented social networks," ACM Transactions on Information Systems (TOIS), vol. 34, no. 3, p. 17, 2016.
[5] S. Chen, G. Wang, and W. Jia, "κ-FuzzyTrust: efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph," Information Sciences, vol. 318, pp. 123-143, 2015.
[6] (2017). Trust Project Network. Available: http://trust.mindswap.org.
[7] (1/15/2018) .FilmTrust. Available: https://www.librec.net/datasets/filmtrust.zip.
[8] J. Scott, Social Network Analysis. Sage, 2017.
[9] E. Elsalamouny, V. Sassone, and M. Nielsen, "HMM-based trust model," in 6th International Workshop on Formal Aspects on Security and Trust (FAST), vol. 5983, pp. 21–35 ,2010.
[10] R. Xiang, J. Neville, and M. Rogati, "Modeling relationship strength in online social networks," in 19th International Conference on World Wide Web (WWW’10), New York, 2010, pp. 981–990: ACM Press.
[11] A. Josang, "Probabilistic logic under uncertainty," in thethirteenth Australasian symposium on Theory of computing, Darlinghurst, Australia, 2007, vol. 65, pp. 101-110: Computer Society.
[12] J. Tang, Y. Chang, C. Aggarwal, and H. Liu, "A survey of signed network mining in social media," ACM Computing Surveys (CSUR), vol. 49, no. 3, p. 42, 2016.
[13] W. Sherchan, S. Nepal, and C. Paris, "A survey of trust in social networks," ACM Computing Surveys, vol. 45, no. 4, 2013.
[14] J. Golbeck and J. Hendler, " Inferring binary trust relationships in web-based social networks," ACM Transactions on Internet Technology, vol. 6, no. 4, 2006.
[15] C. N. Ziegler and G. Lausen, "Spreading activation models for trust propagation," in IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE’04), Los Alamitos, CA, 2004, pp. 83–97: IEEE Computer Society.
[16] U. Kuter and J. Golbeck, "Sunny: A new algorithm for trust inference in social networks using probabilistic confidence models," in National Conference on Artificial Intelligence, British Columbia, Canada, 2007, pp. 1377–1382: AAAI Press.
[17] S. Kim and S. Han, "The method of inferring Trust in Web-based social Network using Fuzzy logic," in International Workshop On Michine Intelligence Research, 2009, pp. 140-144.
[18] Y. Ma, L. Hongwei, G. Zaobin, and Z. Yizhu, "Trust Inference Path Search Combining Community Detection and Ant Colony Optimization," Springer International Publishing, pp. 687-698, 2014.
[19] H. Shakeri and A. Ghaemi Bafghi, "A layer model of a confidence-aware trust management system," International Journal of Information Science and Intelligent System, vol. 3, 2014.
[20] B. D. Ripley, Pattern Recognition And Neural Networks. Cambridge university press, 2007.
[21] I. H. Witten, E. Frank, M. A. Hall, and C. J. Pal, Data Mining: Practical Machine Learning Tools And Techniques. Morgan Kaufmann, 2016.
[22] X.-S. Yang and M. Karamanoglu, "Swarm intelligence and bio-inspired computation: an overview," in Swarm Intelligence and Bio-Inspired Computation: Elsevier, 2013, pp. 3-23.
[23] A. Fernandez, V. Lopez, M. J. del Jesus, and F. Herrera, "Revisiting evolutionary fuzzy systems: Taxonomy, applications, new trends and challenges," Knowledge-Based Systems, vol. 80, pp. 109-121, 2015.
[24] S. Karakatič and V. Podgorelec, "A survey of genetic algorithms for solving multi depot vehicle routing problem," Applied Soft Computing, vol. 27, pp. 519-532, 2015.
[25] K. Sastry, D. E. Goldberg, and G. Kendall, "Genetic algorithms," in Search methodologies: Springer, 2014, pp. 93-117.
[26] عباس صابری نوقابی و نادر هاتفی ترشیزی، «تنظیم بهینه رله دیستانس با در نظر گرفتن عدم قطعیت ها»، مجله مهندسی برق دانشگاه تبریز، جلد ۴۶، شماره ۱، 231-222، 1395.
[27] V. Pieterse and P. E. Black, Dictionary of Algorithms and Data Structures, 2 ed., 2008. [Online]. Available: http://www.nist.gov/dads/HTML/allSimplePaths.html.
[28] فرید کربلایی، حمیدرضا شعبانی و رضا ابراهیمپور، «ارزیابی برونخط پایداری گذرا به وسیله تعیین دقیق CCT با استفاده از شبکه عصبی با ورودیهای مبتنی بر توابع انرژی»، مجله مهندسی برق دانشگاه تبریز، جلد ۴۶، شماره ۱، 285-278، 1395.