Loading...
Search for: implication
0.006 seconds

    Latarres, lattices with an arrow

    , Article Studia Logica ; 2017 , Pages 1-32 ; 00393215 (ISSN) Ardeshir, M ; Ruitenburg, W ; Sharif University of Technology
    Abstract
    A latarre is a lattice with an arrow. its axiomatization looks natural. Latarres have a nontrivial theory which permits many constructions of latarres. Latarres appear as an end result of a series of generalizations of better known structures. These include Boolean algebras and Heyting algebras. Latarres need not have a distributive lattice. © 2017 Springer Science+Business Media B.V  

    Latarres, Lattices with an Arrow

    , Article Studia Logica ; Volume 106, Issue 4 , 2018 , Pages 757-788 ; 00393215 (ISSN) Ardeshir, M ; Ruitenburg, W ; Sharif University of Technology
    Springer Netherlands  2018
    Abstract
    A latarre is a lattice with an arrow. Its axiomatization looks natural. Latarres have a nontrivial theory which permits many constructions of latarres. Latarres appear as an end result of a series of generalizations of better known structures. These include Boolean algebras and Heyting algebras. Latarres need not have a distributive lattice. © 2017, Springer Science+Business Media B.V  

    Simulation of the Price Cycles of Steel in Iran & Analysis of the Effects of Foreign Policies Using System Dynamics

    , M.Sc. Thesis Sharif University of Technology Farzamfar, Arshia (Author) ; Bahramgiri, Mohsen (Supervisor)
    Abstract
    Price cycles of metals have always been a major factor in making decisions for those actively participating in the market, among which steel, due to its nature and influence on economy and society, is of utmost importance. Therefore, the study and analysis of the steel market and understanding the contributing factors on price and potential policies affecting decisions are imperative.In this research, a model based on demand, supply, and other contributing factors on price has been developed in order to help with the analysis of price cycles and the effects of different policies as well as outside factors such as foreign policy effects. In order to do so, the literature of the topic both on... 

    Refinement of Formal Specification into Object Oriented Model

    , M.Sc. Thesis Sharif University of Technology Badiezadegan, Mohammad Amin (Author) ; Mirian Hosseinabadi, Hassan (Supervisor)
    Abstract
    Object oriented analysis and design hase become the paradigm of choice for many software builders. For, it has filled the gap between the problem domain and its solution. However, most of object oriented methods can not prove their model against the software specification and do not ensure that they realize what the customer needs. Formal method is one of the methods used for building softwares. Since a software is specified accurately by this method, the specification can be used to build the software in addition to being used as a test for the final software. A specification can be refined to code step by step. Since an object oriented model is close to problem domain in real world, a... 

    Analyzing factors effective on the development of relationship commitment

    , Article Proceedings of the 2012 International Conference on Artificial Intelligence, ICAI 2012, 16 July 2012 through 19 July 2012 ; Volume 1 , July , 2012 , Pages 398-404 ; 1601322186 (ISBN) ; 9781601322180 (ISBN) Dehdashti, Y ; Lotfi, N ; Karami, N ; Sharif University of Technology
    2012
    Abstract
    Due to the important role of commitment and trust in the relationship marketing, the factors which can directly result in a committed relationship along with the factors which can influence the commitment through influencing trust, according to the model of commitment and trust by (Morgan & Hunt, 1994) have been introduced and their level of importance has been investigated here. The article uses fuzzy cognitive maps (FCMs) in the proposed model to find the most important paths leading to relationship commitment. The FCM analyzes the responses of a group of 30 people including general practitioners in dentistry, managers of dental departments in some of the public clinics and hospitals who... 

    Security of multi-adjustable join schemes: separations and implications

    , Article IEEE Transactions on Dependable and Secure Computing ; Volume 19, Issue 4 , 2022 , Pages 2535-2545 ; 15455971 (ISSN) Rafiee, M ; Khazaei, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Database management systems (DBMS) are one of cloud services with major applications in industry and business. In the use of such services, since the cloud service provider cannot be entrusted with the plain data, the databases are typically encrypted prior to outsourcing. One of the most challenging issues in designing these services is supporting SQL join queries on the encrypted database. The multi-adjustable join scheme (M-Adjoin) [Khazaei-Rafiee 2020], an extension of Adjoin [Popa-Zeldovich 2012 and Mironov-Segev-Shahaf 2017], is a symmetric-key primitive that supports the join queries for a list of column labels on an encrypted database. In previous works, the following security... 

    On the Relationship between Mind and Matter from Quantum Perspective

    , M.Sc. Thesis Sharif University of Technology Tamassoki, Abouzar (Author) ; Shafiee, Afshin (Supervisor)
    Abstract
    In the present era consciousness problem and the relationship between mind and matter as one of the historical and difficult philosophical issues has entered in different scientific fields such as neuroscience, cognitive science and physics. With the introduction of quantum theory and offering its different interpretations, some claimed that understanding the consciousness problem will be possible in the light of quantum theory and some claimed that consciousness is necessary for correct understanding of the quantum theory. Henry Stapp and David Bohm, two prominent physicists with two different approaches to quantum theory try to describe this problem from their point of view. Henry Stapp... 

    Wettability alteration of oil-wet carbonate porous media using silica nanoparticles: Electrokinetic characterization

    , Article Industrial and Engineering Chemistry Research ; Volume 58, Issue 40 , 2019 , Pages 18601-18612 ; 08885885 (ISSN) Dehghan Monfared, A ; Ghazanfari, M. H ; Sharif University of Technology
    American Chemical Society  2019
    Abstract
    Application of nanoparticles for wettability alteration offers a practical approach to resolve some surface-related problems encountered in the nowadays technological process. Examples are underground/subsurface engineering implications, including the enhanced oil recovery from the oil-wet carbonate reservoirs. However, the common wettability evaluating techniques such as contact angle and flotation cannot be representative of the dynamic phenomena occurring at the pore scale and hence are unable to give accurate information about the process. Therefore, in the present work, the electrokinetic evaluations are utilized to explore the wettability alteration of initially oil-wet carbonate rock... 

    Simultaneous coordination of capacity building and price decisions in a decentralized supply chain

    , Article International Journal of Advanced Manufacturing Technology ; Volume 64, Issue 5-8 , 2013 , Pages 961-976 ; 02683768 (ISSN) Pezeshki, Y ; Baboli, A ; Akbari Jokar, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we investigate the simultaneous coordination of price and capacity building decisions in a dyadic supply chain. This problem is a combination of capacity reservation problem and pricing problem. While the coordination of supply chain with stochastic demand and fixed prices has received much attention in the literature, price-dependent and stochastic demand has been less considered. We study the latter case where a price-setting retailer faces a linear decreasing demand with respect to price. To capture the uncertainty of the demand, we add a stochastic variable to the demand function. In addition, we incorporate production rate and inventory cost on the supplier side. We... 

    Path-differentiated pricing in congestion mitigation

    , Article Transportation Research Part B: Methodological ; Volume 80 , October , 2015 , Pages 202-219 ; 01912615 (ISSN) Zangui, M ; Aashtiani, H. Z ; Lawphongpanich, S ; Yin, Y ; Sharif University of Technology
    Elsevier Ltd  2015
    Abstract
    Instead of charging tolls on individual links, this paper considers doing the same on paths. Path and link tolls are "valid" if they encourage motorists to use routes that collectively lead to a target distribution, e.g., one that minimizes travel delay. Because the numbers of valid link and path tolls are typically infinite, an objective in pricing tolls is to find a set of valid tolls that yields the least revenue to lessen the financial burden on motorists.Path tolls are generally more flexible than link tolls and this paper shows that this flexibility can substantially reduce the financial burden on motorists. Additionally, valid path tolls yielding the least revenue possess... 

    Design of fuzzy logic control system incorporating human expert knowledge for combine harvester

    , Article Expert Systems with Applications ; Volume 37, Issue 10 , 2010 , Pages 7080-7085 ; 09574174 (ISSN) Omid, M ; Lashgari, M ; Mobli, H ; Alimardani, R ; Mohtasebi, S ; Hesamifard, R ; Sharif University of Technology
    Abstract
    Many factors affect the yield loss in wheat harvesting with a grain combine harvester. Grain harvesting is a non-linear process, is of considerable complexity, and there is no mathematical model to describe the behavior of this complex system. In this paper, a fuzzy logic controller (FLC) incorporating human expert knowledge is designed for automatic adjustment and control of the harvester to achieve minimal grain losses especially at the position of straw walker and upper sieve. The FLC automatically adjusts cylinder speed, concave clearance, fan speed and forward speed of the combine based on the measured losses at straw walker and sieve sections. The designed FLC expert system consists... 

    Co-reconfiguration of product family and supply chain using leader–follower Stackelberg game theory: Bi-level multi-objective optimization

    , Article Applied Soft Computing Journal ; Volume 91 , 2020 Pakseresht, M ; Mahdavi, I ; Shirazi, B ; Mahdavi Amiri, N ; Sharif University of Technology
    Elsevier Ltd  2020
    Abstract
    This article deals with product Family: a group of products with similar modules produced based on assembling to order (ATO) approach to cover diverse customer needs. The demand level and the customer requirements of these products are dynamically changing, which necessitate a novel model for co-reconfiguration of the product family (PF) and the supply chain (SC). Therefore, this article aims to apply Leader–follower Stackelberg Game Theory in order to present a co-reconfiguration of PF and SC based on three objectives: maximizing the total profit, maximizing customer utility and minimizing the supply chain cost in a bi-level structure. Maximizing the total profit and maximizing customer... 

    On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme

    , Article 28th Annual International Cryptology Conference, CRYPTO 2008, Santa Barbara, CA, 17 August 2008 through 21 August 2008 ; Volume 5157 LNCS , 2008 , Pages 203-220 ; 03029743 (ISSN) ; 3540851739 (ISBN); 9783540851738 (ISBN) Eisenbarth, T ; Kasper, T ; Moradi, A ; Paar, C ; Salmasizadeh, M ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2008
    Abstract
    KeeLoq remote keyless entry systems are widely used for access control purposes such as garage openers or car door systems. We present the first successful differential power analysis attacks on numerous commercially available products employing KeeLoq code hopping. Our new techniques combine side-channel cryptanalysis with specific properties of the KeeLoq algorithm. They allow for efficiently revealing both the secret key of a remote transmitter and the manufacturer key stored in a receiver. As a result, a remote control can be cloned from only ten power traces, allowing for a practical key recovery in few minutes. After extracting the manufacturer key once, with similar techniques, we... 

    Using type-2 fuzzy function for diagnosing brain tumors based on image processing approach

    , Article 2010 IEEE World Congress on Computational Intelligence, WCCI 2010, 18 2010 through 23 July 2010 ; July , 2010 ; 9781424469208 (ISBN) Fazel Zarandi, M. H ; Zarinbal, M ; Zarinbal, A ; Turksen, I. B ; Izadi, M ; Sharif University of Technology
    2010
    Abstract
    Fuzzy functions are used to identify the structure of system models and reasoning with them. Fuzzy functions can be determined by any function identification method such as Least Square Estimates (LSE), Maximum Likelihood Estimates (MLE) or Support Vector Machine Estimates (SVM). However, estimating fuzzy functions using LSE method is structurally a new and unique approach for determining fuzzy functions. By using this approach, there is no need to know or to develop an in-depth understanding of essential concepts for developing and using the membership functions and selecting the t-norms, co-norms and implication operators. Furthermore, there is no need to apply fuzzification and...