Loading...
Search for: information-technology
0.008 seconds
Total 140 records

    A novel multi-sender algorithm based on multi-cast concept for P2P networks

    , Article 2006 International Symposium on Communications and Information Technologies, ISCIT, Bangkok, 18 October 2006 through 20 October 2006 ; 2006 , Pages 143-147 Firooz, M. H ; Ronasi, K ; Pakravan, M. R ; Avanaki, A. N ; Sharif University of Technology
    2006
    Abstract
    Unlike those on Internet, the media providers on P2P networks are ordinary nodes whose contribution bandwidth is limited. Multi-sender methods are the best solutions known to video streaming on P2P networks. In this paper, we propose use of a multi-cast method on the top of an arbitrary multi-sender method so that all requesting peers receive almost the same expected bit-rate. That is while the existing multi-sender methods maximize the bit-rate delivered to the first receiver and cannot provide acceptable bit-rates to the next requesting nodes. © 2006 IEEE  

    Proposing a Methodology for Combination of ITIL and Enterprise Architecture

    , M.Sc. Thesis Sharif University of Technology Salehi, Arezoo (Author) ; Habibi, Jafar (Supervisor)
    Abstract
    Today, with the development of information systems and the use of information technology in organizations and the act of IT department to become out of isolation mode and also alignment of IT with the strategies and goals of the business units, many believe that the information should flow in organization without any borders. In addition to having common points, each of these frameworks have different features that make organizations have difficulties in choosing between them. It should be noted that the implementation of two or more frameworks together, can waste time and money, cause lots of rework, and also can lead conflicting outcomes in their organizations. Enterprise architecture... 

    Strategic alignment: ITIL perspective

    , Article ICCTD 2010 - 2010 2nd International Conference on Computer Technology and Development, Proceedings, 2 November 2010 through 4 November 2010 ; November , 2010 , Pages 550-555 ; 9781424488438 (ISBN) Bagher Esmaili, H ; Gardesh, H ; Shadrokh Sikari, S ; Sharif University of Technology
    2010
    Abstract
    The literature suggests that organizations cannot be competitive if their business and information technology strategies are not aligned. Yet achieving strategic alignment continues to be a major concern for business executives. A number of alignment models have been offered in the literature, primary among them the Strategic Alignment model (SAM) and IT Governance (via ITIL). As there is no published research that attempts to present how effective ITIL V3 is to align business and IT in strategic level, this paper reports on determining aligning roles of ITIL by applying it to the SAM framework. In this regard, the (TIL Strategic Alignment model is proposed to describe ITIL V3 approach of... 

    Customer Satisfaction’s Index Identification in E-learning Courses Case Study in a Virtual University

    , M.Sc. Thesis Sharif University of Technology Rastegar, Hossein (Author) ; Eissaei, Mohammad Taghi (Supervisor)
    Abstract
    E-learning is a broad set of methodologies and software’s, based on information technology, which provides learning opportunities for people of different backgrounds regardless of their location and time. E-learning has not only recently experienced a major uptake in business and academia, but has also proven itself as a necessity for most learners in different fields. This said, it is needless to mention that it has also encountered some difficulties and setbacks along its way to educational dominance. User satisfaction or customer satisfaction is one of the major means by which one can evaluate the success of such programs. Organizations on the other hand are incorporating behavioral... 

    Proposing a Methodology for Integrating ITIL and COBIT within IT Enterprise Architecture

    , M.Sc. Thesis Sharif University of Technology Samiei, Ehsan (Author) ; Habibi, Jafar (Supervisor)
    Abstract
    The purpose of IT management and governance is to empower the alignment between IT and business in organizations. IT management and governance focuses on the optimal utilization of IT resources in order to support business processes, address the organization’s needs and meet the organization’s goals. Even though every IT governance framework emphasizes on a particular dimension of this extensive domain, the common nature of all these frameworks, which is IT and business alignment, would make the efforts put into integrating them desirable and reasonable. Implementing different IT governance frameworks in separate projects, not only results in redundant or inconsistent outputs and artifacts,... 

    Integrating ITIL and COBIT Within the VeriSM Model

    , M.Sc. Thesis Sharif University of Technology Zali, Hanieh (Author) ; Habibi, Jafar (Supervisor)
    Abstract
    Nowadays, separate use of traditional service management frameworks and approaches will not meet the needs of businesses and customers. This is because of the very fast change in the environment and the move to the digital age. The integration of traditional approaches into modern ones significantly helps organizations adapt to new needs and changes in the environment. In this research, first, the basic concepts of the ITIL framework as the most widely used IT services management framework have been studied. Then, the COBIT framework as the most accepted IT governance framework has been investigated. The VeriSM approach also has been used as a solution for service management in the digital... 

    Bandwidth adapted hierarchical multicast overlay

    , Article Proceedings - 5th International Multi-Conference on Computing in the Global Information Technology, ICCGI 2010, 20 September 2010 through 25 September 2010 ; 2010 , Pages 262-267 ; 9780769541815 (ISBN) Bagheri, M ; Movaghar, A ; Khodaparast, A. A ; Sharif University of Technology
    Abstract
    As the infrastructure-centric model of peer-to-peer streaming, recent overlay construction schemes compose a hierarchical topology of peers by grouping them into clusters. There is a server in each cluster that receives data from the source and relays it to its cluster members. In this paper, we propose an alternative infrastructure-centric peer-to-peer framework called BAHMO that constructs a hierarchical multicast tree. BAHMO does not utilize server bandwidth and rely only on peer bandwidth for data transfers. It achieves both the stability of the infrastructure-centric model and the bandwidth efficiency of the fully-distributed model. Bandwidth assignment for inter-cluster data transfers... 

    A Methology for Implementing ITIL V3 based on PMBOK

    , M.Sc. Thesis Sharif University of Technology Haji Hosseini, Hamid Reza (Author) ; Shadrokh, Shahram (Supervisor)
    Abstract
    PMBOK is a standard that is the subset of Project Management Knowledge and includes all areas. ITIL is a framework that allows IT organizations using best practices in IT Service Management. Both of them includes some process that during implementation and execution should act based on them. The goal of developing a methodology for implementing ITIL V3 based on PMBOK is executing a comparison mapping for connecting these two difference fields. IT managers know about ITIL implementation, but most of project managers are not familiar about it. If we guess that implementing ITIL V3 is a project, a project manager can do it based on PMBOK. With mapping these two fields, project managers are able... 

    Proposing a Framework for IT Strategic Planning in Iranian Public Universities

    , M.Sc. Thesis Sharif University of Technology Ghaffari, Reza (Author) ; Kermanshah, Ali (Supervisor) ; Isaai, Mohammad Taghi (Supervisor)
    Abstract
    Information Technology Strategic Planning (ITSP) is performing strategic planning in Information Technology in alignment with overall goals' of organizations. An ITSP framework is consisted of stages, instructions, and models that should be used during an ITSP project. In this research an appropriate framework for public universities which are under supervision of Ministry of Science, Research and Technology of Iran, is proposed –and not selected nor presented. Process, models, methodology and altogether framework of ITSP projects (in case of out-sourcing or doing in-house), have a vital role in the success of project. Therfore, Iranian public universities and also other educational and... 

    Strategic alignment: ITIL perspective

    , Article Proceedings of the International Conference on Electronic Business (ICEB), 1 December 2010 through 4 December 2010, Shanghai ; 2010 , Pages 457-462 ; 16830040 (ISSN) Bagher Esmaili, H ; Gardesh, H ; Shadrokh Sikari, S ; Sharif University of Technology
    2010
    Abstract
    The literature suggests that organizations cannot be competitive if their business and information technology strategies are not aligned. Yet achieving strategic alignment continues to be a major concern for business executives. A number of alignment models have been offered in the literature, primary among them the Strategic Alignment model (SAM) and IT Governance (via ITIL). As there is no published research that attempts to present how effective ITIL V3 is to align business and IT in strategic level, this paper reports on determining aligning roles of ITIL by applying it to the SAM framework. In this regard, the ITIL Strategic Alignment model is proposed to describe ITIL V3 approach of... 

    Holistic change management: importance and methodological challenges

    , Article 2017 IEEE Technology and Engineering Management Society Conference, TEMSCON 2017, 8 June 2017 through 10 June 2017 ; 2017 , Pages 272-276 ; 9781509011148 (ISBN) Shams, A ; Sharif, H ; Kermanshah, A ; Sharif University of Technology
    Abstract
    various researchers and practitioners have identified a range of problems and deficiencies with existing change-related frameworks, while each framework can include unique valuable elements in its people/process/technology aspects and theoretical foundations. In such a setting, we have adopted a holistic approach through examining an armada of existing frameworks and methodologies. Several decades of combined intercontinental experience of the authors (and much more from their academic/practice network) in the field of change management is culminating in development of a novel overarching framework referred to as Total Change Management (TCM). In the three years course of establishment of... 

    Challenging the effectiveness of information technology strategies in Iran's public sector: A case study

    , Article 6th European Conference on e-Government, ECEG 2006, Marburg, 27 April 2006 through 28 April 2006 ; 2006 , Pages 243-252 ; 20491034 (ISSN); 1905305184 (ISBN); 9781905305186 (ISBN) Khalesi Zadeh, M ; Feyzi, A ; Feiz, A ; Sharif University of Technology
    2006
    Abstract
    The Iranian government has started and performed several Information Technology (IT) development plans and projects during recent years with the aim of taking advantage of IT in developing governmental services and increasing their efficiency. This case study intends to investigate the overall effectiveness of the implemented plans according to viewpoints of experts. A survey was conducted in The 1st International Conference on Information and Communication Technology Management in which the attendants were experts from academia and public sector. The questions were designed to obtain their views and standpoints about various issues concerning the success of IT plans in different segments... 

    Compensating interpolation distortion by new optimized modular method

    , Article 2011 18th International Conference on Telecommunications, ICT 2011 ; 2011 , Pages 346-350 ; 9781457700248 (ISBN) Ayremlou, A ; Tofighi, M ; Marvasti, F ; IBM Cyprus; University of Cyprus; Cyprus Tourism Organisation ; Sharif University of Technology
    Abstract
    A modular method was suggested before to recover a band limited signal from the sample and hold and linearly interpolated (or, in general, an nth-order-hold) version of the regular samples. In this paper a novel approach for compensating the distortion of any interpolation based on modular method has been proposed. In this method the performance of the modular method is optimized by adding only some simply calculated coefficients. This approach causes drastic improvement in terms of signal-to-noise ratios with fewer modules compared to the classical modular method. Simulation results clearly confirm the improvement of the proposed method and also its superior robustness against additive... 

    Selecting a reliable steganography method

    , Article MCIT'2010 : International Conference on Multimedia Computing and Information Technology, 2 March 2010 through 4 March 2010, SharjahMCIT'2010 ; 2010 , Pages 69-72 ; 9781424470037 (ISBN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    2010
    Abstract
    Due to the various contents of images, the stego images produced by a steganography method may have different levels of undetectability against steganalyzers. In other words, a steganography method may cause less detectable statistical artifacts on some images compared to other images. In this paper, we analyze different features of images to find the similarity between proper cover images for each steganography method Similarity between images is modeled in form of fuzzy if-then rules using an evolutionary algorithm. Subsequently for hiding secret data in a cover image, we suggest a reliable steganography method that results in an undetectable stego image against most recently reported... 

    Landmark extraction from echocardiography sequence based on corner detection algorithms using gradient vector matcher

    , Article 2009 International Association of Computer Science and Information Technology - Spring Conference, IACSIT-SC 2009, Singapore, 17 April 2009 through 20 April 2009 ; 2009 , Pages 510-516 ; 9780769536538 (ISBN) Siyah Mansoory, M ; Behnam, H ; Fatemi Zadeh, E ; Sharif University of Technology
    2009
    Abstract
    Landmark extraction is used as the first step of many vision tasks such as tracking, image registration, localization, image matching and recognition. Furthermore, landmarks are used to reduce the data flow and consequently the computational costs. In this paper we extracted landmarks from echocardiography sequence, our algorithm is based on corner extraction, and then we evaluate our algorithm with applying some test. For this purpose, we evaluated the detectors according to their repeatability, stability and landmark localization under changes in noise. © 2009 IEEE  

    Various aspects of open source software development

    , Article International Symposium on Information Technology 2008, ITSim, Kuala Lumpur, 26 August 2008 through 29 August 2008 ; Volume 3 , 2008 ; 9781424423286 (ISBN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    In recent years Open Source Software programs have caused great changes in software world. Open Source software development is something beyond a method of software development or technology. As a result, using open source software development has diverse aspects. In this article the open source software development has been studied and investigated through reviewing some of the carried out works. © 2008 IEEE  

    Spam Detection using Dynamic Weighted Voting based on Clustering

    , Article 2008 2nd International Symposium on Intelligent Information Technology Application, IITA 2008, Shanghai, 21 December 2008 through 22 December 2008 ; Volume 2 , January , 2008 , Pages 122-126 ; 9780769534978 (ISBN) Famil Saeedian, M ; Beigy, H ; Sharif University of Technology
    2008
    Abstract
    In the last decade spam detection has been addressed as a text classification or categorization problem. In this paper we propose a new dynamic weighted voting method based on the combination of clustering and weighted voting, and apply it to the task of spam filtering. In order to classify a new sample, it first compares with all cluster centroids and its similarity to each cluster is identified; Classifiers in the vicinity of the input sample obtain greater weight for the final decision of the ensemble. The evaluation shows that the algorithm outperforms pure SVM. © 2008 IEEE  

    PIRS: Pseudo inversion based recovery of speech signals

    , Article ISSPIT 2007 - 2007 IEEE International Symposium on Signal Processing and Information Technology, Cairo, 15 December 2007 through 18 December 2007 ; 2007 , Pages 285-290 ; 9781424418350 (ISBN) Ajorloo, H ; Lakdashti, A ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2007
    Abstract
    Communication of speech over error prone channels such as wireless channels and internet usually suffers from loss of large number of adjacent samples. In this paper, we propose to make artificial correlation between speech samples which distorts it. By choosing appropriate parameters, one can control this distortion to lie below acceptable ranges. Using this correlation, the receiver can recover lost samples up to a certain limit using our proposed algorithm. Experimental results show that our solution overcomes a previous one reported in the literature specially when the amount of lost samples are below the mentioned limit. ©2007 IEEE  

    E-policy making: A system approach based on evaluting ICT's impacts

    , Article 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2006, Shanghai, 21 June 2006 through 23 June 2006 ; 2006 , Pages 34-39 ; 1424403189 (ISBN); 9781424403189 (ISBN) Mohamadian, A ; Elahi, S ; Ghasemzadeh, F ; Sharif University of Technology
    2006
    Abstract
    Information and Communication Technologies (ICTs) are now widely accepted by developing countries as a critical tool in their efforts, so policy makers should develop ICT policies or e-policies in order to monitor and evaluate political, socio-economic and cultural impacts of ICT and also measure progress in the use of ICTs to achieve the development strategies and policies. The paper focuses on the ICT's impacts as an important part in developing e-policies, including a comprehensive model based on system approach, appropriate frameworks for determining affecting and affected elements of ICT and a conceptual framework for analyzing and prioritizing different dimensions of the society. The... 

    Zamin, an agent based artificial life model

    , Article Proceedings - HIS'04: 4th International Conference on Hybrid Intelligent Systems, Kitakyushu, 5 December 2004 through 8 December 2004 ; 2005 , Pages 160-165 ; 0769522912 (ISBN) Halavati, R ; Shouraki, S. B ; Zadeh, S. H ; Ziaie, P ; Lucas, C ; Ishikawa M ; Hashimoto S ; Paprzycki M ; Barakova E ; Yoshida K ; Koppen M ; Corne D.M ; Abraham A ; Sharif University of Technology
    2005
    Abstract
    Zamin artificial life model is designed to be a general purpose environment for researches on evolution of learning methods, living strategies and complex behaviors and is used in several studies thus far. As a main target for Zamin's design has been its expandability and ease of problem definition, a new agent based structure for this artificial world is introduced in this paper, which is believed to be much easier to use and extend. In this new model, all control and world running processes are done by agents. Therefore, any change in world processes does not require recoding the main engine and can be done just by altering the behavior of one or some agents. To have an easier interface...