Loading...
Search for: manage-information
0.008 seconds
Total 36 records

    Electronic commerce 2018 : a managerial and social networks perspective

    , Book Turban, Efraim ; Outland, Jonathan ; King, David R ; Lee, Jae Kyu ; Liang, Ting-Peng ; Turban, Deborrah C
    Springer International Publishing AG  2018

    New method for risk management in CRM security management

    , Article Third International Conference on Information Technology: New Generations, ITNG 2006, Las Vegas, NV, 10 April 2006 through 12 April 2006 ; Volume 2006 , 2006 , Pages 440-445 ; 0769524974 (ISBN); 9780769524979 (ISBN) Seify, M ; Sharif University of Technology
    2006
    Abstract
    In an increasing competitive world, marketing survival can be depended simply on timely new information on customers and market trend. One of the most important strategies in CRM (Customer Relationship Management) is to capture enough information from customers and using this information carefully [17, 19]. Of course security of this information is very important in CRM data management [2]. Data management is a method for scheduling and controlling data saving, recovering and processing. This activity has been done continually or periodically [2]. Security level of this information depends on the security policy of the organization. CRM security policy is the directives and practices for... 

    Feasibility study of Information Technology for medical university of Sabzevar

    , M.Sc. Thesis Sharif University of Technology Shahabipour, Ali (Author) ; Mostafavi, Mostafa (Supervisor)
    Abstract
    Statistics is an essential part of decision making and management in all organizations if the needed information is correct and updated. Due to lack of suitable information systems, it needs rework and spend extra time to gather information. Information Technology is used to summarize organizational information. It supports management of organization to make decision for strategic planning, tactical planning and operational programming by creation, storage, retrieve and distribute correct information to managers. For implementing these systems, there are many solutions. Selecting each one depends on conditions and potentials. Implementing integrated systems is expensive task therefore large... 

    A Novel Management Information System (MIS) Framework to Achieve E-Working Paradigm Based on Cloud Computing Theory

    , M.Sc. Thesis Sharif University of Technology Rahmani Lahoot, Asal (Author) ; Fatahi Valilai, Omid (Supervisor)
    Abstract
    E-Work is defined as collaborative, communication-enabled and computer-supported productive activities in distributed organizations consist of humans with robots and autonomous systems. From the levels of nano and micro systems and devices all the way to the level of global enterprise networks, productive work is reshaped by e-Work. The current literature emphasizes on the role of Knowledge management as an enabler of E-Working paradigm. The four main circles of knowledge in e-Work related are: ‘‘e-Work”, ‘‘Integration Coordination and Collaboration”, ‘‘Distributed Decision Support” and ‘‘Active Middleware”. It has been generally recognized that computer and communication science and... 

    Determination of the economical policy of a three-echelon inventory system with (R, Q) ordering policy and information sharing

    , Article International Journal of Advanced Manufacturing Technology ; Volume 55, Issue 5-8 , 2011 , Pages 831-841 ; 02683768 (ISSN) Hajiaghaei-Keshteli, M ; Sajadifar, S. M ; Haji, R ; Sharif University of Technology
    2011
    Abstract
    In this work, we consider a three-echelon serial inventory system with two warehouses (suppliers) and one retailer with information exchange. The retailer applies continuous review (R, Q) policy. The warehouses have online information on the inventory position and demand activities of the retailer. We present a new ordering policy to share information among inventory echelons. The warehouse I and II start with m 1 and m 2 initial batches of the same order size of the retailer, respectively. The warehouse I places an order to an outside source immediately after the retailer's inventory position reaches an amount equal to the retailer's order point plus a fixed value s 1, and the warehouse II... 

    Organizational secure knowledge flow model

    , Article 2015 7th Conference on Information and Knowledge Technology, IKT 2015, 26 May 2015 through 28 May 2015 ; May , 2015 , Page(s): 1 - 6 ; 9781467374859 (ISBN) Ghaem Tajgardoon, M ; Shalmani, M. T. M ; Habibi, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    With the advance and growth of knowledge management in the past two decades, currently knowledge is regarded as one of the most significant organizational assets. Today the success of businesses is dependent on the value that they give to knowledge and how they attempt to manage it. Hence, in such conditions, knowledge as a valuable asset of the organization must be well-protected. What is managed in knowledge management in organizations is actually not knowledge. What are managed are the knowledge-related processes thru which knowledge workers interact with each other. Hence, organizational knowledge protection does not mean protecting knowledge, but securing the management of knowledge and... 

    Analysis of digital DSP blocks using GDI technology

    , Article 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010, 8 October 2010 through 10 October 2010, Krackow ; 2010 , Pages 90-95 ; 9781424478170 (ISBN) Faed, M ; Mortazavi, M ; Faed, A ; Sharif University of Technology
    2010
    Abstract
    In parallel with enhancements in the technology of integrated circuits, transistors are implemented in silicon. Though the price is reduced; design is more complicated, which create the efficiency and power consumption. The reason why modern GDI-based circuit is the focus of attention is that in designing digital circuit, less power is required while more efficiency is obtained. Lowering the complexity of logic circuit can bring about reduction of power consumption, propagation delay and decrease circuit space. GDI-based integrated circuit resembles MOSFET transistors but have fewer transistors and higher performance capability. This study addresses two main areas which are Studying and... 

    Semantic log based replication model for optimizing heterogeneous DBMS interaction

    , Article 2009 1st International Conference on Advances in Databases, Knowledge, and Data Applications, DBKDA 2009, Gosier, 1 March 2009 through 6 March 2009 ; 2009 , Pages 138-142 ; 9780769535500 (ISBN) Farahmand Nejad, A ; Kharazmi, S ; Bayati, S ; Golmohammadi, S. K ; Abolhassani, H ; IARIA ; Sharif University of Technology
    2009
    Abstract
    The growth of database application usage requires DataBase Management Systems (DBMS) that are accessible, reliable, and dependable. One approach to handle these requirements is replication mechanism. Replication mechanism can be divided into various categories. Some related works consider two categories for replication mechanisms: heterogeneous and homogenous however majority of them classify them in three groups: physical, trigger-based and log based schema. Log-based replication mechanisms are the most widely used category among DBMS vendors. Adapting such approach for heterogeneous systems is a complex task, because of lack of log understanding in the other end. Semantic technologies... 

    Some notes on fix-free codes

    , Article CISS 2008, 42nd Annual Conference on Information Sciences and Systems, Princeton, NJ, 19 March 2008 through 21 March 2008 ; 2008 , Pages 1015-1018 ; 9781424422470 (ISBN) Kakhbod, A ; Nazari, A ; Zadimoghaddam, M ; Sharif University of Technology
    2008
    Abstract
    A variable-length code is called a fix-free code if it is both prefix-free and suffix-free. In this paper, we consider some basic properties of fix-free codes. We obtain one lower and one upper bound on the redundancy of the optimal fix-free code. Comparing these bounds, we derive an upper bound on the length of the most likely source symbol in terms of its probability. © 2008 IEEE  

    A new sufficient condition for 1-coverage to imply connectivity

    , Article 3rd International Conference on Digital Information Management, ICDIM 2008, London, 13 November 2008 through 16 November 2008 ; January , 2008 , Pages 495-499 ; 9781424429172 (ISBN) Khasteh, H ; Bagheri Shouraki, S ; Kiaei, A. A ; Sharif University of Technology
    2008
    Abstract
    An effective approach for energy conservation in wireless sensor networks is scheduling sleep intervals for extraneous nodes while the remaining nodes stay active to provide continuous service. For the sensor network to operate successfully the active nodes must maintain both sensing coverage and network connectivity, It proved before if the communication range of nodes is at least twice the sensing range, complete coverage of a convex area implies connectivity among the working set of nodes. In this paper we consider a rectangular region A =a *b , such that Rs ≤ a, Rs ≤ b where Rs is the sensing range of nodes. and put a constraint on minimum allowed distance between nodes( Rs ). according... 

    Restoration of damaged slices in images using matrix pseudo inversion

    , Article 22nd International Symposium on Computer and Information Sciences, ISCIS 2007, Ankara, 7 November 2007 through 9 November 2007 ; 2007 , Pages 98-103 ; 1424413648 (ISBN); 9781424413645 (ISBN) Ajorloo, H ; Manzuri Shalmani, M. T ; Lakdashti, A ; Sharif University of Technology
    2007
    Abstract
    A matrix pseudo inversion based method is developed for coding of images in real field in a way that at the receiver, one can restore the lost portions of the images. The proposed solution is similar to channel coding techniques, but it is done before source coding at the transmitter and after decoding of the compressed data at the receiver. Experiments show the effectiveness of the proposed solution in recove ring missed portions of the images and video frames. ©2007 IEEE  

    Improving density-based methods for hierarchical clustering of web pages

    , Article Data and Knowledge Engineering ; Volume 67, Issue 1 , 2008 , Pages 30-50 ; 0169023X (ISSN) Haghir Chehreghani, M ; Abolhassani, H ; Haghir Chehreghani, M ; Sharif University of Technology
    2008
    Abstract
    The rapid increase of information on the web makes it necessary to improve information management techniques. One of the most important techniques is clustering web data. In this paper, we propose a new 3-phase clustering method that finds dense units in a data set using density-based algorithms. The distances in the dense units are stored in order in structures such as a min heap. In the extraction stage, these distances are extracted one by one, and their effects on the clustering process are examined. Finally, in the combination stage, clustering is completed using improved versions of well-known single and average linkage methods. All steps of the methods are performed in O(n log n) time... 

    Risk management in CRM security management

    , Article 3rd Australian Information Security Management Conference, AISM, Perth, WA, 30 September 2005 through 30 September 2005 ; 2005 , Pages 95-102 ; 0729806111 (ISBN); 9780729806114 (ISBN) Seify, M ; Sharif University of Technology
    2005
    Abstract
    In an increasing competitive world, marketing survival can be depended simply on timely new information on customers and market trend. One of the most important strategies in CRM (Customer Relationship Management) is to capture enough information from customers and using this information carefully [Ryals, Tinsley]. Of course security of this information is very important in CRM data management [Bryan]. Data management is a method for scheduling and controlling data saving, recovering and processing. This activity has been done continually or periodically[Bryan]. Security level of this information depends on the security policy of the organization. CRM security policy is the directives and... 

    The evaluation of Business Intelligence maturity level in Iranian Banking Industry

    , Article Proceedings - 2010 IEEE 17th International Conference on Industrial Engineering and Engineering Management, IE and EM2010, 29 October 2010 through 31 October 2010 ; October , 2010 , Pages 466-470 ; 9781424464814 (ISBN) Najmi, M ; Sepehri, M ; Hashemi, S ; Sharif University of Technology
    2010
    Abstract
    Business intelligence (BI) is a managerial concept helping managers and organizations to manage information and make factual decisions. Some have introduced Business Intelligence as a process of turning data into information and then into knowledge. This concept has become a popular trend for businesses interested in adding value to their decision making processes. Measurement of maturity in implementing Business Intelligence process in organizations is considered a critical issue. Business intelligence like software development is a process, which expressed in terms of components such as artifacts and workflows. Capability Maturity Model Integrated (CMMI) is developed to define different... 

    Persian text classification based on topic models

    , Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 86-91 ; 9781467387897 (ISBN) Ahmadi, P ; Tabandeh, M ; Gholampour, I ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    With the extensive growth in information, text classification as one of the text mining methods, plays a vital role in organizing and management information. Most text classification methods represent a documents collection as a Bag of Words (BOW) model and then use the histogram of words as the classification features. But in this way, the number of features is very large; therefore performing text classification faces serious computational cost problems. Moreover, the BOW representation is unable to recognize semantic relations between words. Recently, topic-model approaches have been successfully applied for text classification to overcome the problems of BOW. Our main goal in this paper... 

    Holistic change management: importance and methodological challenges

    , Article 2017 IEEE Technology and Engineering Management Society Conference, TEMSCON 2017, 8 June 2017 through 10 June 2017 ; 2017 , Pages 272-276 ; 9781509011148 (ISBN) Shams, A ; Sharif, H ; Kermanshah, A ; Sharif University of Technology
    Abstract
    various researchers and practitioners have identified a range of problems and deficiencies with existing change-related frameworks, while each framework can include unique valuable elements in its people/process/technology aspects and theoretical foundations. In such a setting, we have adopted a holistic approach through examining an armada of existing frameworks and methodologies. Several decades of combined intercontinental experience of the authors (and much more from their academic/practice network) in the field of change management is culminating in development of a novel overarching framework referred to as Total Change Management (TCM). In the three years course of establishment of... 

    Exergoeconomic Composite Curves-from theory to practice

    , Article 11th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2007, Jointly with the 13th International Conference on Information Systems Analysis and Synthesis, ISAS 2007, Orlando, FL, 8 July 2007 through 11 July 2007 ; Volume 5 , 2007 , Pages 332-337 ; 1934272191 (ISBN); 9781934272190 (ISBN) Fani, M ; Farhanieh, B ; Mozafari, A. A ; International Institute of Informatics and Systemics (IIIS) ; Sharif University of Technology
    2007
    Abstract
    Exergoeconomic Composite Curves (EECC) - a synergy of Exergoeconomic and Composite Curves of Pinch Analysis is a novel method and propounded for the first time in this Paper. This is the first attempt to represent investment and annual operating and maintenance costs in addition to Exergy in a graphical form similar to Composite Curves. In this Paper a simplified methodology that represents the Exergy of chemical units of a process in a graphical form and preliminary investment strategy is developed for use with the EECC. The object has therefore been to study the possibilities to save money in Northern Pulp and Paper Mill, an Iranian mill with a capacity of 600 tons/day  

    The Analysis of Total Productive Maintenance Based on Computerized Maintenance Management System

    , M.Sc. Thesis Sharif University of Technology Behshad, Amir (Author) ; mostafavi, mostafa (Supervisor)
    Abstract
    The main purpose of this thesis is to analyze the total productive maintenance based on computerized maintenance management system. At first, a detailed study on total productive maintenance is performed and then the requirements of this maintenance strategy are specified. Also, a computerized maintenance management system is defined which can help total productive maintenance to reach to its requirements. Finally, a conceptual model and entity-relationship model for computerized maintenance management system data base has been created  

    Integrated demand side management game in smart energy hubs

    , Article IEEE Transactions on Smart Grid ; Volume 6, Issue 2 , 2015 , Pages 675-683 ; 19493053 (ISSN) Sheikhi, A ; Rayati, M ; Bahrami, S ; Ranjbar, A. M ; Sharif University of Technology
    Abstract
    The presence of energy hubs and the advancement in smart grid technologies have motivated system planners to deploy intelligent multicarrier energy systems entitled "smart energy hub" (S.E. Hub). In this paper, we model S.E. Hub, and propose a modern energy management technique in electricity and natural gas networks based on integrated demand side management (IDSM). In conventional studies, energy consumption is optimized from the perspective of each individual user without considering the interactions with each other. Here, the interaction among S.E. Hubs in IDSM program is formulated as a noncooperative game. The existence and uniqueness of a pure strategy Nash equilibrium (NE) is proved.... 

    Demand side management in a group of Smart Energy Hubs as price anticipators; The game theoretical approach

    , Article IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2015, 18 February 2015 through 20 February 2015 ; 2015 ; 9781479917853 (ISBN) Sheikhi, A ; Rayati, M ; Bahrami, S ; Ranjbar, A. M ; Sharif University of Technology
    Abstract
    In recent years, there have been significant developments of applications related to 'Energy Hub' and 'Smart Grid' concepts. Synergy effect of the coupling between electricity and natural gas infrastructures, and approaching energy systems to the smart grid environment leads us to introduce a new solution. This solution is entitled 'Smart Energy Hub' (S. E. Hub). Simply stated, the S. E. Hub models a multicarrier energy system in a smart grid environment. The evolution of the smart grid heavily relies on the utilization and the integration of modern information technologies. Therefore, we suggest that the information technology industry should be involved to facilitate the information...