Loading...
Search for: economic-and-social-effects
0.004 seconds
Total 139 records

    Measuring sustainable transportation for the world countries: The application of concordance analysis

    , Article Proceedings of the Eighth International Conference on Applications of Advanced Technologies in Transportaion Engineering, Beijing, 26 May 2004 through 28 May 2004 ; 2004 , Pages 334-339 Rassafi, A. A ; Vaziri, M ; Sharif University of Technology
    ASCE - American Society of Civil Engineers  2004
    Abstract
    In this paper, sustainability with respect to transportation sector of the selected countries has been evaluated. Seventy nine countries were initially selected for detailed analysis for the period of 1980-1995. The key dimensions of sustainable development i.e. social, environmental, and economic characteristics are used. Firstly, a set of sustainable transportation indicators has been introduced. Then composite indices of three non-transport groups with respect to four transport modes are calculated. The composite indices are aggregated by the concordance analysis technique to achieve comprehensive transport sustainability indices of countries, and according to these values, the countries... 

    Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6 December 2015 through 9 December 2015 ; Volume 9462 , December , 2015 , Pages 153-179 ; 03029743 (ISSN); 9783319266169 (ISBN) Abdelraheem, M. A ; Alizadeh, J ; Alkhzaimi, H. A ; Aref, M. R ; Bagheri, N ; Gauravaram, P ; Biryukov A ; Goyal V ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    In this paper we analyse two variants of SIMON family of light-weight block ciphers against variants of linear cryptanalysis and present the best linear cryptanalytic results on these variants of reducedround SIMON to date. We propose a time-memory trade-off method that finds differential/ linear trails for any permutation allowing low Hamming weight differential/ linear trails. Our method combines low Hamming weight trails found by the correlation matrix representing the target permutation with heavy Hamming weight trails found using a Mixed Integer Programming model representing the target differential/linear trail. Our method enables us to find a 17-round linear approximation for SIMON-48... 

    Assessment of modal transportation sustainability: Application of data envelopment and concordance analyses

    , Article Iranian Journal of Science and Technology, Transaction B: Engineering ; Volume 31, Issue 2 , 2007 , Pages 179-193 ; 03601307 (ISSN) Rassafi, A. A ; Vaziri, M ; Sharif University of Technology
    2007
    Abstract
    This study tries to characterize national transportation modes to assess balancing and sustainability. Using a pioneer measure for sustainable development (SD), and based on the conformity of the growths of all sectors with transportation modes, the countries are comparatively studied. The proposed measure, elasticity, for each pair of variables indicates the extent to which the two variables have been changing consistently. Indeed the elasticity values are measures of "harmonic development" reflecting sustainability. The study database consisted of key aspects of transportation sustainability in the form of national variables including transportation, economic, social and environmental... 

    E-policy making: A system approach based on evaluting ICT's impacts

    , Article 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2006, Shanghai, 21 June 2006 through 23 June 2006 ; 2006 , Pages 34-39 ; 1424403189 (ISBN); 9781424403189 (ISBN) Mohamadian, A ; Elahi, S ; Ghasemzadeh, F ; Sharif University of Technology
    2006
    Abstract
    Information and Communication Technologies (ICTs) are now widely accepted by developing countries as a critical tool in their efforts, so policy makers should develop ICT policies or e-policies in order to monitor and evaluate political, socio-economic and cultural impacts of ICT and also measure progress in the use of ICTs to achieve the development strategies and policies. The paper focuses on the ICT's impacts as an important part in developing e-policies, including a comprehensive model based on system approach, appropriate frameworks for determining affecting and affected elements of ICT and a conceptual framework for analyzing and prioritizing different dimensions of the society. The... 

    Review of cycles and indices of drought and their effect on water resources, ecological, biological, agricultural, social and economical issues in Iran

    , Article International Journal of Environmental Studies ; Volume 62, Issue 6 , 2005 , Pages 709-724 ; 00207233 (ISSN) Abbaspour, M ; Sabetraftar, A ; Sharif University of Technology
    2005
    Abstract
    This paper assesses the cycles and indices of drought in Iran and prepares general maps of the region, which are affected by droughts with 10- and 30-year reversible periods frequency of 1 and 3 years by utilizing statistical methods. To study the condition of drought, some indices have been applied in Yazd Province over a 48-year statistical period (1925-2000). Then with regard to existing statistics (1998-2001), the effect of drought on various issues during the most recent drought cycle have been assessed. © 2005 Taylor & Francis  

    Impact of a social humanoid robot as a therapy assistant in children cancer treatment

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 8755 , 2014 , Pages 11-22 ; ISSN: 03029743 ; ISBN: 9783319119724 Alemi, M ; Meghdari, A ; Ghanbarzadeh, A ; Moghadam, L. J ; Ghanbarzadeh, A ; Sharif University of Technology
    Abstract
    Treating cancer encompasses many invasive procedures that can be a source of distress in oncology patients. Distress itself can be a major obstruction in the path of acceptance of treatment and the patient's adaptation to it, thereby reducing its efficiency. These distress symptoms have been found to be prevalent in children suffering from cancer, in a spectrum from mild to critical. In the past years in response to this psychological suffering, researchers have proposed and tested several methods such as relaxation, hypnosis, desensitization, and distraction. This paper propounds a new approach by exploring the effect of utilizing a humanoid robot as a therapy-assistive tool in dealing with... 

    Weak visibility counting in simple polygons

    , Article Journal of Computational and Applied Mathematics ; Volume 288 , November , 2015 , Pages 215-222 ; 03770427 (ISSN) Nouri Bygi, M ; Daneshpajouh, S ; Alipour, S ; Ghodsi, M ; Sharif University of Technology
    Elsevier  2015
    Abstract
    For a simple polygon P of size n, we define weak visibility counting problem (WVCP) as finding the number of visible segments of P from a query line segment pq. We present different algorithms to compute WVCP in sub-linear time. In our first algorithm, we spend O(n7) time to preprocess the polygon and build a data structure of size O(n6), so that we can optimally answer WVCP in O(logn) time. Then, we reduce the preprocessing costs to O(n4+ε) time and space at the expense of more query time of O(log5n). We also obtain a trade-off between preprocessing and query time costs. Finally, we propose an approximation method to reduce the preprocessing costs to O(n2) time and space and O(n1/2+ε) query... 

    The Impact of Social Robotics on L2 Learners’ Anxiety and Attitude in English Vocabulary Acquisition

    , Article International Journal of Social Robotics ; Volume 7, Issue 4 , 2015 , Pages 523-535 ; 18754791 (ISSN) Alemi, M ; Meghdari, A ; Ghazisaedy, M ; Sharif University of Technology
    Abstract
    This study aimed to examine the effect of robot assisted language learning (RALL) on the anxiety level and attitude in English vocabulary acquisition amongst Iranian EFL junior high school students. Forty-six female students, who were beginners at the age of 12, participated in this study and were randomly assigned into two groups of RALL (30 students) and non-RALL (16 students). The textbook, the materials, as well as the teacher were the same in the two groups. However in the RALL group, the treatment was given by a teacher accompanied by a humanoid robot assistant. Two questionnaires of anxiety and attitude were utilized to measure the students’ anxiety and attitude (Horwitz et al. 1986;... 

    (t,k)-Hypergraph anonymization: An approach for secure data publishing

    , Article Security and Communication Networks ; Volume 8, Issue 7 , September , 2015 , Pages 1306-1317 ; 19390114 (ISSN) Asayesh, A ; Hadavi, M. A ; Jalili, R ; Sharif University of Technology
    John Wiley and Sons Inc  2015
    Abstract
    Privacy preservation is an important issue in data publishing. Existing approaches on privacy-preserving data publishing rely on tabular anonymization techniques such as k-anonymity, which do not provide appropriate results for aggregate queries. The solutions based on graph anonymization have also been proposed for relational data to hide only bipartite relations. In this paper, we propose an approach for anonymizing multirelation constraints (ternary or more) with (t,k) hypergraph anonymization in data publishing. To this end, we model constraints as undirected hypergraphs and formally cluster attribute relations as hyperedge with the t-means-clustering algorithm. In addition,... 

    On the secrecy of the cognitive interference channel with partial channel states

    , Article Transactions on Emerging Telecommunications Technologies ; Volume 27, Issue 11 , 2016 , Pages 1472-1485 ; 21615748 (ISSN) Bafghi, H. G ; Seyfe, B ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Wiley Blackwell  2016
    Abstract
    The secrecy problem in the state-dependent cognitive interference channel is considered in this paper. In our model, there are a primary and a secondary (cognitive) transmitter–receiver pairs, in which the cognitive transmitter has the message of the primary one as side information. In addition, the channel is affected by two channel state sequences, which are known at the cognitive transmitter and the corresponding receiver, separately. The cognitive transmitter should cooperate with the primary one, and it wishes to keep its message secure at the primary receiver. The achievable equivocation-rate regions for this channel are derived using two approaches: the binning scheme coding and... 

    On quota violations of OPEC members

    , Article Energy Economics ; Volume 68 , 2017 , Pages 410-422 ; 01409883 (ISSN) Ghoddusi, H ; Nili, M ; Rastad, M ; Sharif University of Technology
    Abstract
    Over the last decades quota violations have become a norm for OPEC countries. However, the academic literature on OPEC focuses more on its production behavior than on analyzing the quota allocation process or characterizing quota violation patterns. This paper offers a theoretical model with empirical evidence to explain OPEC members’ incentives for abiding or violating quotas. We first offer a cartel model with a quota allocation rule and an endogenous capacity choice. The model highlights the trade-off between building spare capacity to bargain for a higher legitimate quota versus risking quota violation punishment. Using the quarterly data from 1995 to 2007, we empirically support the... 

    Private authentication: optimal information theoretic schemes

    , Article 2019 IEEE Information Theory Workshop, ITW 2019, 25 August 2019 through 28 August 2019 ; 2019 ; 9781538669006 (ISBN) Kazempour, N ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    The main security service in the connected world of cyber physical systems necessitates to authenticate a large number of nodes privately. In this paper, the private authentication problem is considered, that consists of a certificate authority, a verifier, many legitimate users (prover) and any arbitrary number of illegitimate users. Each legitimate user wants to be authenticated (using his personal key) by the verifier, while simultaneously wants to stay completely anonymous (even to the verifier and the CA). On the other hand, an illegitimate user must fail to authenticate himself. We analyze this problem from an information theoretical perspective. First, we propose a general interactive... 

    Fundamental limit for gain and resolution in analog optical edge detection

    , Article Optics Express ; Volume 28, Issue 2 , 2020 , Pages 898-911 Karimi, P ; Khavasi, A ; Mousavi Khaleghi , S. S ; Sharif University of Technology
    OSA - The Optical Society  2020
    Abstract
    In this paper, the relation between gain and resolution of an ideal analog optical differentiator in two different cases and their fundamental limits are investigated. Based on this relation, a figure of merit for comparison of the designed differentiators in recent papers is proposed. The differentiators are optimized using this figure of merit, and they are compared with each other to determine the best one. Also, a new differentiator is presented based on the dielectric slab waveguide in which the trade-off between its gain and resolution is easily controllable, and its best operating point is determined. © 2020 Optical Society of America under the terms of the OSA Open Access Publishing... 

    Anonymous Mutual Authentication: An Information Theoretic Framework

    , Article 9th Iran Workshop on Communication and Information Theory, IWCIT 2021, 19 May 2021 through 20 May 2021 ; 2021 ; 9781665400565 (ISBN) Kazempour, N ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    We consider the anonymous mutual authentication problem, which consists of a certificate authority, single or multiple verifiers, many legitimate users (provers) and any arbitrary number of illegitimate users. The legal verifier and a legitimate user must be mutually authenticated to each other using the user's key, while the identity of the user must stay unrevealed. An attacker (illegitimate prover) as well as an illegal verifier must fail in authentication. A general interactive information theoretic framework in a finite field is proposed, where the normalized total key rate as a metric for reliability is defined. Maximizing this rate has a trade-off with establishing anonymity. The... 

    Model for R&D planning in energy sector

    , Article IEMC 2005: 2005 IEEE International Engineering Management Conference, St. John's, Newfoundland, 11 September 2005 through 13 September 2005 ; Volume II , 2005 , Pages 663-667 ; 078039139X (ISBN); 9780780391390 (ISBN) Shafiei, E ; Saboohi, Y ; Ghofrani, M. B ; Sharif University of Technology
    2005
    Abstract
    Optimal allocation of resources for R&D on new energy technologies is an important issue in the process of development of energy system models. In this study, a model of R&D planning in energy sector has been developed and it is then linked to the energy system model. Energy system model is used as a tool for the technology assessment and prioritization of new energy technologies is evaluated with the help of this model. Based on the economic and environmental impact of new technologies, the optimal allocation of resources for R&D of new technology is estimated with the help of the R&D planning model. The conceptual formulation of the model and its integration with the energy technology... 

    Caching gain in wireless networks with fading: A multi-user diversity perspective

    , Article IEEE Wireless Communications and Networking Conference, WCNC ; 2014 , p. 930-935 Shariatpanahi, S. P ; Shah Mansouri, H ; Khalaj, B. H ; Sharif University of Technology
    Abstract
    We consider the effect of caching in wireless networks where fading is the dominant channel effect. First, we propose a one-hop transmission strategy for cache-enabled wireless networks, which is based on exploiting multi-user diversity gain. Then, we derive a closed-form result for throughput scaling of the proposed scheme in large networks, which reveals the inherent trade-off between cache memory size and network throughput. Our results show that substantial throughput improvements are achievable in networks with sources equipped with large cache size. We also verify our analytical result through simulations  

    K-LDA: an algorithm for learning jointly overcomplete and discriminative dictionaries

    , Article European Signal Processing Conference ; 10 November 2014 , 2014 , pp. 775-779 ; ISSN: 22195491 ; ISBN: 9780992862619 Golmohammady, J ; Joneidi, M ; Sadeghi, M ; Babaie Zadeh, M ; Jutten, C ; Sharif University of Technology
    Abstract
    A new algorithm for learning jointly reconstructive and discriminative dictionaries for sparse representation (SR) is presented. While in a usual dictionary learning algorithm like K-SVD only the reconstructive aspect of the sparse representations is considered to learn a dictionary, in our proposed algorithm, which we call K-LDA, the discriminative aspect of the sparse representations is also addressed. In fact, K-LDA is an extension of K-SVD in the case that the class informations (labels) of the training data are also available. K-LDA takes into account these information in order to make the sparse representations more discriminate. It makes a trade-off between the amount of... 

    Design method for a reconfigurable CMOS LNA with input tuning and active balun

    , Article AEU - International Journal of Electronics and Communications ; Vol. 69, issue. 1 , January , 2014 , p. 424-431 Akbar, F ; Atarodi, M ; Saeedi, S ; Sharif University of Technology
    Abstract
    A method to design a tunable low noise amplifier (LNA) for multiband receivers is proposed. This paper also presents a single-ended to differential conversion (S2DC) topology which improves the LNA linearity without degrading its noise performance. Combining input tuning with S2DC in a single stage reduces power consumption of the LNA and decreases effects of supply noise. An LNA has been designed based on the proposed method for 2.3-4.8 GHz in a 0.18 μm CMOS technology. Simulations show an IIP3 of -3.2 dBm, a less than 3.7 dB noise figure (NF), a voltage gain of 24 dB in the whole frequency range. The LNA draws 13.1 mW from a 1.8 V supply. The results indicate that the proposed tuning... 

    On non-progressive spread of influence through social networks

    , Article Theoretical Computer Science ; Vol. 550, issue. C , 2014 , pp. 36-50 ; ISSN: 03043975 Fazli, M. A ; Ghodsi, M ; Habibi, J ; Jalaly, P ; Mirrokni, V ; Sadeghian, S ; Sharif University of Technology
    Abstract
    The spread of influence in social networks is studied in two main categories: progressive models and non-progressive models (see, e.g., the seminal work of Kempe et al. [8]). While the progressive models are suitable for modeling the spread of influence in monopolistic settings, non-progressive models are more appropriate for non-monopolistic settings, e.g., modeling diffusion of two competing technologies over a social network. Despite the extensive work on progressive models, non-progressive models have not been considered as much. In this paper, we study the spread of influence in the non-progressive model under the strict majority threshold: given a graph G with a set of initially... 

    Accurate and novel recommendations: an algorithm based on popularity forecasting

    , Article ACM Transactions on Intelligent Systems and Technology ; Vol. 5, issue. 4 , 2015 Javari, A ; Jalili, M ; Sharif University of Technology
    Abstract
    Recommender systems are in the center of network science, and they are becoming increasingly important in individual businesses for providing efficient, personalized services and products to users. Previous research in the field of recommendation systems focused on improving the precision of the system through designing more accurate recommendation lists. Recently, the community has been paying attention to diversity and novelty of recommendation lists as key characteristics of modern recommender systems. In many cases, novelty and precision do not go hand in hand, and the accuracy-novelty dilemma is one of the challenging problems in recommender systems, which needs efforts in making a...