Loading...
Search for: knowledge-based-system
0.006 seconds
Total 38 records

    Knowledge based dynamic password

    , Article 2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation ; Volume 2018-January , 2018 , Pages 0367-0372 ; 9781538626405 (ISBN) Nasehi Basharzad, S ; Fazeli, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Login section is one of the most important parts of each system. This section is usually achieved through a username-password entering method. Since in these methods, user's security relays on how strong the password is, accordingly it is important how the password is provided. There are lots of different approaches in this regard which can be categorized in two main subgroups: Static and Dynamic passwords. Dynamic passwords are taking the lead in password generation context, since static password approaches suffer from some disadvantages like their vulnerability to easily get cracked, high possibility of oblivion and etc. In this paper, we introduce a novel dynamic password providing idea,... 

    A new way of automatic design of software (simulating human intentional activity)

    , Article 5th International Conference on New Trends on in Software Methodologies, Tools and Techniques, SoMeT_06, Quebec City, QC, 25 October 2006 through 27 October 2006 ; 2006 ; 9781586036737 (ISBN) Koono, Z ; Abolhassani, H ; Chen, H ; Sharif University of Technology
    2006
    Abstract
    This paper reports on a new method of automatic design. It is a simulation of "human intentional activity," appearing in management, business, various designs and physical work. It is achieved by repetitive hierarchical decomposition of human concepts using (mainly) natural language expressions. Three typical ways (skill, rule and knowledge based) to create the hierarchical decomposition have been implemented and evaluated quantitatively as a CASE tool. The rule-level operation achieves nearly 100% automatic detailing  

    Ontology-Based Android Malware Forensics

    , M.Sc. Thesis Sharif University of Technology Gholami, Esmaeil Gholami (Author) ; Amini, Morteza (Supervisor)
    Abstract
    Today, smart devices have become an integral part of everyday life. The Android operating system is also the most popular operating system of these devices, and as a result, various malwares are produced and distributed for this operating system every day. This makes it especially important to investigate these malwares. This includes finding people involved in the development and distribution of malware, as well as discovering other malwares created by them. Discovering other involved entities, such as social media accounts, websites, Android store accounts, and taking steps to prevent malware from being distributed by them is another aspect of this story. In order to deal with organized... 

    Incorporating betweenness centrality in compressive sensing for congestion detection

    , Article ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings ; 2013 , Pages 4519-4523 ; 15206149 (ISSN); 9781479903566 (ISBN) Ayatollahi Tabatabaii, H. S ; Rabiee, H. R ; Rohban, M. H ; Salehi, M ; Sharif University of Technology
    2013
    Abstract
    This paper presents a new Compressive Sensing (CS) scheme for detecting network congested links. We focus on decreasing the required number of measurements to detect all congested links in the context of network tomography. We have expanded the LASSO objective function by adding a new term corresponding to the prior knowledge based on the relationship between the congested links and the corresponding link Betweenness Centrality (BC). The accuracy of the proposed model is verified by simulations on two real datasets. The results demonstrate that our model outperformed the state-of-the-art CS based method with significant improvements in terms of F-Score  

    Innovative performance of Iranian knowledge-based firms: Large firms or SMEs?

    , Article Technological Forecasting and Social Change ; May , 2016 ; 00401625 (ISSN) Noori, J ; Bagheri Nasrabadi, M ; Yazdi, N ; Babakhan, A. R ; Sharif University of Technology
    Elsevier Inc  2016
    Abstract
    The debate over innovativeness of large firms and SMEs, which was bolded by Schumpeter, still continues under mixed empirical evidences. There are several implications for this debate including policy orientation in support of large firms or SMEs. But there is a scarce of studies in developing countries and no such study in Iran yet. The present study has explored the proportionality of increase of innovation activity versus firm size within 522 Iranian knowledge-based firms categorized in 9 industries. Innovation activity was measured by R&D expenditure while firm size stood for number of employees. Using log-log regression in the first phase, it was found that R&D expenditure confirms a... 

    Towards a method engineering approach for business process reengineering

    , Article IET Software ; Volume 10, Issue 2 , 2016 , Pages 27-44 ; 17518806 (ISSN) Ghanadbashi, S ; Ramsin, R ; Sharif University of Technology
    Institution of Engineering and Technology 
    Abstract
    Business process reengineering (BPR) assists organisations in improving their internal functions to better achieve their business objectives. Various methodologies have been developed for applying BPR, through which organisational processes are identified, analysed, and improved. However, the need still remains for custom methodologies which are tailored to fit the specific characteristics of organisations and BPR projects. Process patterns are abstract representations of common and effective processes that can be reused as method parts for building custom methodologies; an approach that is commonly referred to as situational method engineering (SME). This study aims to use SME in the... 

    Adaptive fuzzy sliding mode control using multiple models approach

    , Article IEEE International Conference on Engineering of Intelligent Systems, ICEIS 2006, Islamabad, 22 April 2006 through 23 April 2006 ; 2006 ; 1424404568 (ISBN); 9781424404568 (ISBN) Sadati, N ; Ghadami, R ; Sharif University of Technology
    2006
    Abstract
    In this paper, an adaptive fuzzy sliding mode controller using multiple models approach is presented. By using the multiple models technique the nominal part of the control signal is constructed according to the most appropriate model at different environments. Adaptive single-input single-output (SISO) fuzzy system is used to approximate the discontinuous part of control signal; control gain, in a classical sliding mode controller. The key feature of this scheme is that prior knowledge of the system uncertainties is not required to guarantee the stability. Also the chattering phenomenon in sliding mode control is alleviated and steady tracking error is eliminated. Moreover, a theoretical... 

    Managing reengineering operations

    , Article 2006 IEEE International Conference on Management of Innovation and Technology, ICMIT 2006, Singapore, 21 June 2006 through 23 June 2006 ; Volume 1 , 2006 , Pages 268-269 ; 1424401488 (ISBN); 9781424401482 (ISBN) Afshar, A ; Sepehri, M ; Sharif University of Technology
    2006
    Abstract
    Fifteen years after introduction of Business Process Reengineering (BPR) and a series of successful and not-so-successful BPR implementation, a revised methodology is needed to incorporate cases of major and sudden organizational or environmental changes with BPR. The new methodology can also be particularly applicable to project oriented businesses. September 11, Tsunami, and other major world events show that nothing is constant but change. A reengineered process may only stay as the environment factors stay the same. Therefore, the processes can no longer be the central focus of reengineering, but the output needs. Technology has enabled us to refocus and apply reengineering constantly to... 

    On understanding the relation of knowledge and confidence to requirements quality

    , Article 27th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2021, 12 April 2021 through 15 April 2021 ; Volume 12685 LNCS , 2021 , Pages 208-224 ; 03029743 (ISSN) ; 9783030731274 (ISBN) Dehghani, R ; Wnuk, K ; Mendez, D ; Gorschek, T ; Ramsin, R ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    [Context and Motivation] Software requirements are affected by the knowledge and confidence of software engineers. Analyzing the interrelated impact of these factors is difficult because of the challenges of assessing knowledge and confidence. [Question/Problem] This research aims to draw attention to the need for considering the interrelated effects of confidence and knowledge on requirements quality, which has not been addressed by previous publications. [Principal ideas/results] For this purpose, the following steps have been taken: 1) requirements quality was defined based on the instructions provided by the ISO29148:2011 standard, 2) we selected the symptoms of low qualified... 

    Does knowledge base complexity affect spatial patterns of innovation? An empirical analysis in the upstream petroleum industry

    , Article Technological Forecasting and Social Change ; Volume 143 , 2019 , Pages 273-288 ; 00401625 (ISSN) Maleki, A ; Rosiello, A ; Sharif University of Technology
    Elsevier Inc  2019
    Abstract
    Using network analysis, we investigate if an industry's complex and integrated knowledge base leads to a higher spatial concentration (or dispersal)of innovative activities. This is important because the extant literature provides competing claims about how knowledge base complexity impacts on the spatial distribution of industrial innovation. To help empirically resolve this issue, we draw on longitudinal data (1970–2010)on the upstream petroleum industry and build indexes of entropy and complexity to render knowledge base dynamics, assess the spatial concentration of innovation, and study industry structural transformations. We first find a correlation – once a crucial distinction between... 

    Web driven alert verification

    , Article 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; Sep , 2014 , p. 180-185 Najafi, A ; Sepahi, A ; Jalili, R ; Sharif University of Technology
    Abstract
    A web attack is an attack against a web server through the HTTP Protocol. By analyzing known web attacks, we find out that each one has its own behavior. Vestiges of their behavior could be detected in non-body parts of the HTTP Protocol. Such information can be used to verify web alerts generated by Web Application Firewalls (WAFs) and Web Intrusion Detection Systems (Web IDSs). In this paper, we propose a method to verify web alerts generated by mentioned sensors. The goal of the alert verification component is to eliminate or tag alerts that do not represent successful attacks. Our approach is based on analyzing HTTP Transaction metadata, including Request method, Request Headers, Status... 

    An efficient PD data mining method for power transformer defect models using SOM technique

    , Article International Journal of Electrical Power and Energy Systems ; Volume 71 , October , 2015 , Pages 373-382 ; 01420615 (ISSN) Darabad, V. P ; Vakilian, M ; Blackburn, T. R ; Phung, B. T ; Sharif University of Technology
    Elsevier Ltd  2015
    Abstract
    Suggestion and application of a set of new features for on-line Partial Discharge (PD) monitoring, where there is no information about the type of PD is a challenging task for condition assessment of power equipments, such as a power transformer. This is looked for in this paper. So far, in past various techniques have been employed to develop a comprehensive PD monitoring system, however limited success has been achieved. One of the challenging issues in this field is the discovering of proper features capable of differentiating the involvement of possible types of PD sources. In order to examine the efficiency of the method established in this paper, which is based on application of a set... 

    Towards a knowledge based approach to style driven architecture design

    , Article Procedia Computer Science, 5 March 2015 through 6 March 2015 ; Volume 62 , 2015 , Pages 236-244 ; 18770509 (ISSN) Moaven, S ; Habibi, J ; Alidoosti, R ; Parvizi Mosaed, A ; Bahrami, M ; Sharif University of Technology
    Abstract
    Nowadays, knowledge is the key to success in all software engineering processes. This valuable knowledge, obtained through analysis, design, development, and maintenance processes of the system, should be saved and reused in designing and developing current and similar systems. Using pre-existing knowledge is a practical approach which reduces design complexity, improves software architecture design and manages software quality. In this paper, we describe an approach to create architecture design knowledge using a hierarchical structure of architectural styles based on quality attributes. Knowledge is most importance asset of our approach that reuses similar domains, correlates architectures... 

    2PLoc: Preserving privacy in location-based services

    , Article Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust, 20 August 2010 through 22 August 2010 ; August , 2010 , Pages 707-712 ; 9780769542119 (ISBN) Amoli, A. S ; Kharrazi, M ; Jalili, R ; Sharif University of Technology
    2010
    Abstract
    Location-based services are becoming popular for mobile users. The mobile users' location plays a key role to provide the service from one side, but it can be considered as a dimension of their privacy and so necessary to keep it anonymous to the other parties. Since one important issue is to achieve an accurate service, it is important to use the mobile's accurate location. Using the location accurately raises some concerns on behalf of the user's privacy. One solution for meeting this requirement is using tickets by the means of a third party. The tickets should have some properties for not letting a mobile user to cheat and use the ticket more than one time. This paper proposes a protocol... 

    Towards a knowledge-based approach for creating software architecture patterns ontology

    , Article 2016 International Conference on Engineering and MIS, ICEMIS 2016, 22 September 2016 through 24 September 2016 ; 2016 ; 9781509055791 (ISBN) Rabinia, Z ; Moaven, S ; Habibi, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Software architecture patterns present solutions for software architecture problems and help to document architectural design decisions. Complexity and variability of patterns, and the required expertise for selecting an appropriate pattern, would cause some difficulties in utilizing architectural patterns. Using an ontology for registering architectural patterns is an efficient step in solving those problems. However, the mentioned difficulties make the process of constructing the architectural patterns ontology even more complicated. This paper proposes an approach that considers the construction of the architectural patterns ontology from four perspectives in order to overcome this... 

    Multiscale nonlinear constitutive modeling of carbon nanostructures based on interatomic potentials

    , Article Computers, Materials and Continua ; Volume 10, Issue 1 , 2009 , Pages 41-64 ; 15462218 (ISSN) Ghanbari, J ; Naghdabadi, R ; Sharif University of Technology
    Abstract
    Continuum-based modeling of nanostructures is an efficient and suitable method to study the behavior of these structures when the deformation can be considered homogeneous. This paper is concerned about multiscale nonlinear tensorial constitutive modeling of carbon nanostructures based on the interatomic potentials. The proposed constitutive model is a tensorial equation relating the second Piola-Kirchhoff stress tensor to Green-Lagrange strain tensor. For carbon nanotubes, some modifications are made on the planar representative volume element (RVE) to account for the curved atomic structure resulting a non-planar RVE. Using the proposed constitutive model, the elastic behavior of the... 

    A road map for knowledge management systems design using axiomatic design approach

    , Article MATEC Web of Conferences, 13 September 2017 through 15 September 2017 ; Volume 127 , 2017 ; 2261236X (ISSN) Houshmand, M ; Amani, M ; Slatineanu, L ; Sharif University of Technology
    Abstract
    Successful design and implementation of knowledge management systems have been the main concern of many researchers. It has been reported that more than 50% of knowledge management systems have failed, therefore, it is required to seek for a new and comprehensive scientific approach to design and implement it. In the design and implementation of a knowledge management system, it is required to know 'what we want to achieve' and 'how and by what processes we will achieve it'. A literature review conducted and axiomatic design theory selected for this purpose. For the first time, this paper develops a conceptual design of knowledge management systems by means of a hierarchical structure,... 

    Innovative performance of iranian knowledge-based firms: large firms or SMEs?

    , Article Technological Forecasting and Social Change ; Volume 122 , 2017 , Pages 179-185 ; 00401625 (ISSN) Noori, J ; Bagheri Nasrabadi, M ; Yazdi, N ; Babakhan, A. R ; Sharif University of Technology
    Abstract
    The debate over innovativeness of large firms and SMEs, which was bolded by Schumpeter, still continues under mixed empirical evidences. There are several implications for this debate including policy orientation in support of large firms or SMEs. But there is a scarce of studies in developing countries and no such study in Iran yet. The present study has explored the proportionality of increase of innovation activity versus firm size within 522 Iranian knowledge-based firms categorized in 9 industries. Innovation activity was measured by R&D expenditure while firm size stood for number of employees. Using log–log regression in the first phase, it was found that R&D expenditure confirms a... 

    A survey on underwater wireless sensor networks routing algorithms

    , Article 2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation, KBEI 2017 ; Volume 2018-January , 2018 , Pages 0373-0378 ; 9781538626405 (ISBN) Fazeli, M ; Nasehi Basharzad, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Considering their special features and numerous applications, sensor networks are noticed so much nowadays. A sub-group of these applications is underwater sensor networks, which encounter some challenges like reliable transportation, routing, MAC, positioning, limited bandwidth, high and variable propagation delay, defective underwater channels and low battery capacity. Acoustic technologies are a particular technology which can make strong underwater communications for Civilian and military applications. These networks are used in oceans for environmental monitoring, under sea discovery, unexpected events prevention, ships assisting, tactical monitoring and naval mine detection, but there... 

    Fuzzy expert systems and challenge of new product pricing

    , Article Computers and Industrial Engineering ; Volume 56, Issue 2 , 2009 , Pages 616-630 ; 03608352 (ISSN) Haji, A ; Assadi, M ; Sharif University of Technology
    2009
    Abstract
    This paper is focused on the representation and treatment of knowledge and data uncertainty within the context of an important industrial challenge, i.e., new product pricing. The most well known participating factor in pricing process is cost meanwhile the other factors like customer value and firm's strategy should be considered in the pricing process, as well. Besides, there are other important factors like the risks that consumer bear in purchasing new product which must be carefully analyzed and considered. Nonetheless, many of these factors are blended with uncertainty. In recent decades, fuzzy logic was well developed and implemented in many applications to treat vagueness in...