Search for: mashayekhi--h
0.006 seconds

    Towards a general framework for evaluating software development methodologies

    , Article Proceedings - International Computer Software and Applications Conference, 19 July 2010 through 23 July 2020 ; July , 2010 , Pages 208-217 ; 07303157 (ISSN) ; 9780769540856 (ISBN) Hesari, S ; Mashayekhi, H ; Ramsin, R ; Sharif University of Technology
    It has become essential to scrutinize and evaluate software development methodologies, mainly because of their increasing number and variety. Evaluation is required to gain a better understanding of the features, strengths, and weaknesses of the methodologies. The results of such evaluations can be leveraged to identify the methodology most appropriate for a specific context. Moreover, methodology improvement and evolution can be accelerated using these results. However, despite extensive research, there is still a need for a feature/criterion set that is general enough to allow methodologies to be evaluated regardless of their types. We propose a general evaluation framework which addresses... 

    CEBAC: A decentralized cooperation enforcement based access control framework in MANETs

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 427-434 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Saremi, F ; Mashayekhi, H ; Movaghar, A ; Jalili, R ; Sharif University of Technology
    Prevention of unauthorized access to services in mobile ad hoc networks is a more sophisticated problem than access control in other networks, due to interconnection facilities and lack of any fixed network infrastructure in such networks. Therefore regarding the nature of these networks, controlling access to services should be in a decentralized manner providing good performance and preserving network security. In this paper, we propose a decentralized Cooperation Enforcement Based Access Control (CEBAC) framework for mobile ad hoc networks. CEBAC comprises several groups of Service Authorizers, each issuing Credentials for access to a specific kind of services. The User Authorization for... 

    Mining distributed frequent itemsets using a gossip based protocol

    , Article Proceedings - IEEE 9th International Conference on Ubiquitous Intelligence and Computing and IEEE 9th International Conference on Autonomic and Trusted Computing, UIC-ATC 2012 ; 2012 , Pages 780-785 Bagheri, M ; Mirian Hosseinabadi, S. H ; Mashayekhi, H ; Habibi, J ; Sharif University of Technology
    Recently, there has been a growing attention in frequent itemset mining in distributed systems. In this paper, we present an algorithm to extract frequent itemsets from large distributed datasets. Our algorithm uses gossip as the communication mechanism and does not rely on any central node. In gossip based communication, nodes repeatedly select other random nodes in the system, and exchange information with them. Our algorithm proceeds in rounds and provides all nodes with the required support counts of itemsets, such that each node is able to extract the global frequent itemsets. For local iteration and generation of candidate itemsets, a trie data structure is used, which facilitates the... 

    Factors influencing adoption of e-payment systems: an empirical study on Iranian customers

    , Article Information Systems and e-Business Management ; Volume 15, Issue 1 , 2017 , Pages 89-116 ; 16179846 (ISSN) Barkhordari, M ; Nourollah, Z ; Mashayekhi, H ; Mashayekhi, Y ; Ahangar, M. S ; Sharif University of Technology
    Springer Verlag  2017
    Internet technology has influenced the banking systems because of its capability to enhance performance of financial operations. A major concern of Internet banking systems is the customers’ perception of security and trust. This study presents an experimental investigation on important factors influencing trust in e-payments systems in Iran. A set of potentially determinant factors of trust is developed and organized in three major groups: technical and transaction procedures, access to security guidelines, and usability. The direct effect of the factors on perceived trust, along with their indirect effect through perceived security, is evaluated in an empirical study. The data are... 

    A data mining approach for diagnosis of coronary artery disease

    , Article Computer Methods and Programs in Biomedicine ; Volume 111, Issue 1 , 2013 , Pages 52-61 ; 01692607 (ISSN) Alizadehsani, R ; Habibi, J ; Hosseini, M. J ; Mashayekhi, H ; Boghrati, R ; Ghandeharioun, A ; Bahadorian, B ; Sani, Z. A ; Sharif University of Technology
    Cardiovascular diseases are very common and are one of the main reasons of death. Being among the major types of these diseases, correct and in-time diagnosis of coronary artery disease (CAD) is very important. Angiography is the most accurate CAD diagnosis method; however, it has many side effects and is costly. Existing studies have used several features in collecting data from patients, while applying different data mining algorithms to achieve methods with high accuracy and less side effects and costs. In this paper, a dataset called Z-Alizadeh Sani with 303 patients and 54 features, is introduced which utilizes several effective features. Also, a feature creation method is proposed to...