Loading...
Search for: information-and-communication-technologies
0.007 seconds

    Observational equivalence in system estimation: contractions in complex networks

    , Article IEEE Transactions on Network Science and Engineering ; 2017 ; 23274697 (ISSN) Doostmohammadian, M ; Rabiee, H. R ; Zarrabi, H ; Khan, U ; Sharif University of Technology
    Abstract
    Observability of complex systems/networks is the focus of this paper, which is shown to be closely related to the concept of contraction. Indeed, for observable network tracking it is necessary/sufficient to have one node in each contraction measured. Therefore, nodes in a contraction are equivalent to recover for loss of observability, implying that contraction size is a key factor for observability recovery. Here, developing a polynomial order contraction detection algorithm, we analyze the distribution of contractions, studying its relation with key network properties. Our results show that contraction size is related to network clustering coefficient and degree heterogeneity.... 

    Digital divides,the Internet and social media uses among Afghans in Iran

    , Article Technology in Society ; Volume 70 , 2022 ; 0160791X (ISSN) Jauhiainen, J. S ; Eyvazlu, D ; Junnila, J ; Virnes, A ; Sharif University of Technology
    Elsevier Ltd  2022
    Abstract
    The studies on forced migrants' digitally mediated communication and transnational practices have not sufficiently addressed contexts in which migrants are imposed with strong regulations on their physical mobility and information and communication technology (ICT), Internet, and social media uses. This article studied Internet and social media uses, digital divides (access, use, and the impact of Internet and social media), and digital transnational practices among Afghans in Iran. More than three million Afghans live in different legal, economic, and social positions in Iran. The analysis was based on surveys with 2003 Afghan refugees, other legally authorized Afghan immigrants, and... 

    , M.Sc. Thesis Sharif University of Technology Asghari, Mohsen (Author) ;

    Investigating Ethical Consequences of the Information and Communication Technologies (ICT) with Respect to Luciano Floridi’s Philosophy and Ethics of Information

    , M.Sc. Thesis Sharif University of Technology Safdari Sharabiani, Abootaleb (Author) ; Taghvai, Mostafa (Supervisor)
    Abstract
    The main purpose of this dissertation is to give an ethical evaluation of one of the consequences of ICT. Since these technologies are present in every corner of our personal and social life, recognizing their ethical and social consequences are of vital importance. The present dissertation, which is set up in 3 chapters, is allocated for evaluating one of these consequences. In the first chapter which is the first step of our overall argument indeed, one of recent theories in Cognitive Psychology and memory studies, namely Working Memory will be introduced. In the second chapter, introducing another theory in Cognitive Psychology namely Cognitive Load Theory, the role of Working Memory in... 

    The Impact of Digital Technologies on CO2 Emissions: A Comparison between Developed and Developing Countries

    , M.Sc. Thesis Sharif University of Technology Mahmoudi, Sanaz (Author) ; Miremadi, Iman (Supervisor)
    Abstract
    The importance and vitality of focusing on sustainable transition and reducing carbon dioxide emissions are clear to everyone today. However, until recently, the impact of digitization as a major global trend involving the application of digital technologies to change and optimize various elements of business, society, and daily life on the environment and carbon dioxide emissions has been underestimated. Despite the growing amount of research in this field, according to current studies, the connection between digitization and carbon dioxide emissions is not clear. To achieve environmental and sustainable development goals, fossil fuel consumption and greenhouse gas (GHG) emissions must be... 

    Evaluating the Effect of E-government on the Relationship between Corruption and Financial Access of the SMEs

    , M.Sc. Thesis Sharif University of Technology Boroumand, Mohammad (Author) ; Najmi, Manoochehr (Supervisor) ; Tasavori, Misagh (Supervisor)
    Abstract
    Corruption is one of the environmental destructive factors, which has a long history among firms. Lots of research has been done regarding the impact of corruption at both the micro and macro levels. Some researchers believe that corruption can have severe negative impacts on the firms and even to the macro-economic level. However, others believe that corruption can act as a tool by which firms can do their stuff more effectively and efficiently. For combating corruption, governments have always taken action. In recent years, by virtue of technological advancements and ICT (information and communication technologies) tools, governments have employed them to reduce the level of corruption. In... 

    Control of car-like (wheeled) multi robots for following and hunting a moving target

    , Article Scientia Iranica ; Volume 18, Issue 4 B , August , 2011 , Pages 950-965 ; 10263098 (ISSN) Sayyaadi, H ; Kouhi, H ; Salarieh, H ; Sharif University of Technology
    2011
    Abstract
    The main purpose of this paper is to design a decentralized controller for some car-like (wheeled) multi robots to follow and hunt a moving target. Considering geometric dimensions, mass and moment of inertia, robots are very similar to actual cars in which the outputs of the controller are steering and driving wheel torques. All robots are equipped with range and bearing sensors along with antenna, to communicate radio wave signals. A Kalman filter is implemented to estimate relative position, state variables of the target and state variables of other robots. The controller is designed to carry out the group maneuver of the system, based on the system dynamics analysis of inertial agents,... 

    Observational equivalence in system estimation: contractions in complex networks

    , Article IEEE Transactions on Network Science and Engineering ; Volume 5, Issue 3 , 2018 , Pages 212-224 ; 23274697 (ISSN) Doostmohammadian, M ; Rabiee, H. R ; Zarrabi, H ; Khan, U ; Sharif University of Technology
    IEEE Computer Society  2018
    Abstract
    Observability of complex systems/networks is the focus of this paper, which is shown to be closely related to the concept of contraction. Indeed, for observable network tracking it is necessary/sufficient to have one node in each contraction measured. Therefore, nodes in a contraction are equivalent to recover for loss of observability, implying that contraction size is a key factor for observability recovery. Here, using a polynomial order contraction detection algorithm, we analyze the distribution of contractions, studying its relation with key network properties. Our results show that contraction size is related to network clustering coefficient and degree heterogeneity. Particularly, in... 

    Software watermarking by equation reordering

    , Article 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA, Damascus, 7 April 2008 through 11 April 2008 ; 2008 ; 1424417511 (ISBN); 9781424417513 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Watermarking is the process of hiding information in a media and usually used to for copyright protection. In software watermarking, the information is added to the source code of program and can be extracted from compiled executable code. In this paper, a new software watermarking algorithm is proposed by equation reordering. In this method, the order of operands in an equation is changed according to the information we want to hide in a way that the result of the equation is unchanged. One of the main advantages of this method is that no code added to the program, so the size and speed of the program not changed  

    Towards an integrated framework of knowledge management between project and organization level

    , Article 9th European Conference on Knowledge Management, ECKM 2008, Southampton, 4 September 2008 through 5 September 2008 ; December , 2008 , Pages 481-490 ; 20488963 (ISSN); 9781905305537 (ISBN) Rezazadeh Mehrizi, M. H ; Tehrani, H ; Kazemi, M ; Sharif University of Technology
    2008
    Abstract
    In project-based organizations, many practical cases show there is a considerable knowledge gap between project-level and organization level. To bridge such gap, organizations can exploit knowledge intensive human resources, new organizational structures and new information and communication technologies. But all these three dimensions could have trivial effect when there is no central attention toward the content of knowledge that is to be managed. In this paper, we postulated a three layer framework for this problem that its main contribution is that the content of knowledge is at the center of attention, while all other three dimensions of any knowledge management system (HR, Organization... 

    Challenging the effectiveness of information technology strategies in Iran's public sector: A case study

    , Article 6th European Conference on e-Government, ECEG 2006, Marburg, 27 April 2006 through 28 April 2006 ; 2006 , Pages 243-252 ; 20491034 (ISSN); 1905305184 (ISBN); 9781905305186 (ISBN) Khalesi Zadeh, M ; Feyzi, A ; Feiz, A ; Sharif University of Technology
    2006
    Abstract
    The Iranian government has started and performed several Information Technology (IT) development plans and projects during recent years with the aim of taking advantage of IT in developing governmental services and increasing their efficiency. This case study intends to investigate the overall effectiveness of the implemented plans according to viewpoints of experts. A survey was conducted in The 1st International Conference on Information and Communication Technology Management in which the attendants were experts from academia and public sector. The questions were designed to obtain their views and standpoints about various issues concerning the success of IT plans in different segments... 

    An identity based authentication protocol for smart grid environment using physical uncloneable function

    , Article IEEE Transactions on Smart Grid ; Volume 12, Issue 5 , 2021 , Pages 4426-4434 ; 19493053 (ISSN) Sanaullah Badar, H. M ; Qadri, S ; Shamshad, S ; Faizan Ayub, M ; Mahmood, K ; Kumar, N ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Smart grid plays an important role in managing demand response management in modern smart city using Information and Communication Technologies (ICTs). In smart grid environment, sensors are widely used for surveillance. These are deployed on the high tension power supply lines which help to share the information to control center about line breakage or any other flaw. Besides the cyber-attacks, sensors may also experience physical attacks as they are deployed on high-tension power lines in an open environment. Moreover, an attacker can also impersonate the information exchanged between sensors, gateways and control centers. Therefore, the most indispensable requirement is to prevent these... 

    Cloud-Based Global Supply Chain: A Conceptual Model and Multilayer Architecture

    , Article Journal of Manufacturing Science and Engineering, Transactions of the ASME ; Volume 137, Issue 4 , 2015 ; 10871357 (ISSN) Akbaripour, H ; Houshmand, M ; Valilai, O. F ; Sharif University of Technology
    American Society of Mechanical Engineers (ASME)  2015
    Abstract
    The cloud manufacturing (C-Manufacturing) paradigm, as an advanced form of networked manufacturing, has recently been proposed based on a combination of existing manufacturing systems and emerging technologies, such as cloud computing, virtual manufacturing, agile manufacturing, manufacturing grid, Internet-of-things (IOT), and service-oriented technologies. In this study, through investigating the main goals of C-Manufacturing and today's hyper-competitive global marketplace circumstances, a prospective conceptual model called cloud-based global supply chain (CBGSC) has been developed which can overcome or mitigate the issues and risks associated with supply chain processes on a global... 

    Fast and robust tracker in distance learning applications using uncalibrated stereo cameras

    , Article 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA, Damascus, 7 April 2008 through 11 April 2008 ; 2008 ; 1424417511 (ISBN); 9781424417513 (ISBN) Khalili, A. H ; Lotfi, T ; Kasaei, S ; Sharif University of Technology
    2008
    Abstract
    This paper presents a novel and fast homography-based tracking method to segment and track the instructor placed in front of a class board using two synchronized views. In the proposed method we estimate the instructor as a planar object and track its planar parameters. At first, the homography of board and fundamental geometry of two views are extracted using six point correspondences. The homography transformation matrix of object is calculated by obtaining three point correspondences in parallax region introduced with homography of the board. The parameters to be tracked by Kalman filter are obtained frame by frame by object's homography decomposition. Our proposed method is robust... 

    Routing algorithms study and comparing in interconnection networks

    , Article 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA, Damascus, 7 April 2008 through 11 April 2008 ; 2008 ; 1424417520 (e-ISBN); 9781424417513 (ISBN) Barati, H ; Movaghar, A ; Barati, A ; Azizi Mazreah, A ; Sharif University of Technology
    2008
    Abstract
    A routing algorithm defines a route which packet traverses to get to destination. In this research we study some kind of routing algorithms that are used in internal connections networks of multi-processor and multi-computers systems. Then we discuss about some routing algorithms which have been implemented network on chip architecture. First, we present a group of routing algorithms based on various criterions, and review so-called category. Afterwards, we study adaptive and deterministic routing algorithms and express circular model applying in internal connections networks and its governing rules in order to prevent dead lock. Then we survey adaptive algorithms such as Deflection routing,... 

    Notice of violation of IEEE publication principles: a new automatic clustering algorithm via deadline timer for wireless ad-hoc sensor networks

    , Article 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA, 7 April 2008 through 11 April 2008, Damascus ; 2008 ; 9781424417513 (ISBN) Bazregar, A ; Movaghar, A ; Barati, A ; Eslami Nejhad, M. R ; Barati, H ; Sharif University of Technology
    2008
    Abstract
    This paper proposes a decentralized algorithm to organize an ad-hoc sensor network into clusters. Each sensor operates independently, monitoring communication among others. Those sensors which have many neighbors that are not already part of a cluster are likely candidates to creating a new cluster by declaring themselves to be a new cluster-head. The Clustering Algorithm via Deadline Timer (CADT) provides a protocol whereby this can be achieved and the process continues until all sensors are part of a cluster. Because of the difficulty of analyses simplified models are used to study and abstract its performance. A simple formula to estimate the number of clusters which will be formed in an... 

    A new fuzzy connectedness relation for image segmentation

    , Article 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA, Damascus, 7 April 2008 through 11 April 2008 ; 2008 ; 9781424417513 (ISBN) Hasanzadeh, M ; Kasaei, S ; Mohseni, H ; Sharif University of Technology
    2008
    Abstract
    In the image segmentation field, traditional techniques do not completely meet the segmentation challenges mostly posed by inherently fuzzy images. Fuzzy connectedness and fuzzy clustering are considered as two well-known techniques for introducing fuzzy concepts to the problem of image segmentation. Fuzzy connectedness-based Segmentation methods consider spatial relation of image pixels by "hanging togetherness" a notion based on intensity homogeneity. But, they do not inherently utilize feature information of image pixels. On the other hand, as the segmentation domain of fuzzy clustering-based methods is the feature space they do not consider spatial relations among image pixels. Recently,...