Loading...
Search for: management-information-systems
0.007 seconds

    Electronic commerce 2018 : a managerial and social networks perspective

    , Book Turban, Efraim ; Outland, Jonathan ; King, David R ; Lee, Jae Kyu ; Liang, Ting-Peng ; Turban, Deborrah C
    Springer International Publishing AG  2018

    Feasibility study of Information Technology for medical university of Sabzevar

    , M.Sc. Thesis Sharif University of Technology Shahabipour, Ali (Author) ; Mostafavi, Mostafa (Supervisor)
    Abstract
    Statistics is an essential part of decision making and management in all organizations if the needed information is correct and updated. Due to lack of suitable information systems, it needs rework and spend extra time to gather information. Information Technology is used to summarize organizational information. It supports management of organization to make decision for strategic planning, tactical planning and operational programming by creation, storage, retrieve and distribute correct information to managers. For implementing these systems, there are many solutions. Selecting each one depends on conditions and potentials. Implementing integrated systems is expensive task therefore large... 

    A Novel Management Information System (MIS) Framework to Achieve E-Working Paradigm Based on Cloud Computing Theory

    , M.Sc. Thesis Sharif University of Technology Rahmani Lahoot, Asal (Author) ; Fatahi Valilai, Omid (Supervisor)
    Abstract
    E-Work is defined as collaborative, communication-enabled and computer-supported productive activities in distributed organizations consist of humans with robots and autonomous systems. From the levels of nano and micro systems and devices all the way to the level of global enterprise networks, productive work is reshaped by e-Work. The current literature emphasizes on the role of Knowledge management as an enabler of E-Working paradigm. The four main circles of knowledge in e-Work related are: ‘‘e-Work”, ‘‘Integration Coordination and Collaboration”, ‘‘Distributed Decision Support” and ‘‘Active Middleware”. It has been generally recognized that computer and communication science and... 

    Analysis of digital DSP blocks using GDI technology

    , Article 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010, 8 October 2010 through 10 October 2010, Krackow ; 2010 , Pages 90-95 ; 9781424478170 (ISBN) Faed, M ; Mortazavi, M ; Faed, A ; Sharif University of Technology
    2010
    Abstract
    In parallel with enhancements in the technology of integrated circuits, transistors are implemented in silicon. Though the price is reduced; design is more complicated, which create the efficiency and power consumption. The reason why modern GDI-based circuit is the focus of attention is that in designing digital circuit, less power is required while more efficiency is obtained. Lowering the complexity of logic circuit can bring about reduction of power consumption, propagation delay and decrease circuit space. GDI-based integrated circuit resembles MOSFET transistors but have fewer transistors and higher performance capability. This study addresses two main areas which are Studying and... 

    Semantic log based replication model for optimizing heterogeneous DBMS interaction

    , Article 2009 1st International Conference on Advances in Databases, Knowledge, and Data Applications, DBKDA 2009, Gosier, 1 March 2009 through 6 March 2009 ; 2009 , Pages 138-142 ; 9780769535500 (ISBN) Farahmand Nejad, A ; Kharazmi, S ; Bayati, S ; Golmohammadi, S. K ; Abolhassani, H ; IARIA ; Sharif University of Technology
    2009
    Abstract
    The growth of database application usage requires DataBase Management Systems (DBMS) that are accessible, reliable, and dependable. One approach to handle these requirements is replication mechanism. Replication mechanism can be divided into various categories. Some related works consider two categories for replication mechanisms: heterogeneous and homogenous however majority of them classify them in three groups: physical, trigger-based and log based schema. Log-based replication mechanisms are the most widely used category among DBMS vendors. Adapting such approach for heterogeneous systems is a complex task, because of lack of log understanding in the other end. Semantic technologies... 

    Exergoeconomic Composite Curves-from theory to practice

    , Article 11th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2007, Jointly with the 13th International Conference on Information Systems Analysis and Synthesis, ISAS 2007, Orlando, FL, 8 July 2007 through 11 July 2007 ; Volume 5 , 2007 , Pages 332-337 ; 1934272191 (ISBN); 9781934272190 (ISBN) Fani, M ; Farhanieh, B ; Mozafari, A. A ; International Institute of Informatics and Systemics (IIIS) ; Sharif University of Technology
    2007
    Abstract
    Exergoeconomic Composite Curves (EECC) - a synergy of Exergoeconomic and Composite Curves of Pinch Analysis is a novel method and propounded for the first time in this Paper. This is the first attempt to represent investment and annual operating and maintenance costs in addition to Exergy in a graphical form similar to Composite Curves. In this Paper a simplified methodology that represents the Exergy of chemical units of a process in a graphical form and preliminary investment strategy is developed for use with the EECC. The object has therefore been to study the possibilities to save money in Northern Pulp and Paper Mill, an Iranian mill with a capacity of 600 tons/day  

    The Analysis of Total Productive Maintenance Based on Computerized Maintenance Management System

    , M.Sc. Thesis Sharif University of Technology Behshad, Amir (Author) ; mostafavi, mostafa (Supervisor)
    Abstract
    The main purpose of this thesis is to analyze the total productive maintenance based on computerized maintenance management system. At first, a detailed study on total productive maintenance is performed and then the requirements of this maintenance strategy are specified. Also, a computerized maintenance management system is defined which can help total productive maintenance to reach to its requirements. Finally, a conceptual model and entity-relationship model for computerized maintenance management system data base has been created  

    O2DSS: A framework for ontology-based decision support systems in pervasive computing environment

    , Article 2nd Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, 13 May 2008 through 15 May 2008 ; 2008 , Pages 41-45 ; 9780769531366 (ISBN) Saremi, A ; Esmaeili, M ; Habibi, J ; Ghaffari, A ; Sharif University of Technology
    2008
    Abstract
    Applications in pervasive computing environment exploit information about the context of use, such as the location, tasks and preferences of the user, in order to adapt their behavior in response to changing operating environments and user requirements. Utilizing context with aid of ontology in data and model, decision support systems can provide better and more desirable support to their users. The effects and advantages of exploiting ontology in user modeling and DSS is discussed. We propose a framework of a Ontology-based Decision Support System (O2DSS), including ontology in model base, database and their advantages. © 2008 IEEE  

    LOADER: A location-aware distributed virtual environment architecture

    , Article 2008 IEEE International Conference on Virtual Environments, Human-Computer Interfaces, and Measurement Systems, IEEE VECIMS 2008, Istanbul, 14 July 2008 through 16 July 2008 ; 2008 , Pages 97-101 ; 9781424419289 (ISBN) Hariri, B ; Shirmohammadi, S ; Pakravan, M. R ; Sharif University of Technology
    2008
    Abstract
    This article proposes a new architecture for distributed data management and update massage exchange in massively multiuser virtual environments. The key points in the design of such environments are scalability and QoS-aware message delivery. Therefore it requires robust distributed algorithms in a dynamic peer-to-peer system with frequent node arrivals and departures. Our proposed approach is mainly based on distributed hash tables (DHTs) in order to achieve a decentralized system where any participating node can efficiently retrieve the updates associated with a given object. Therefore, the responsibility of maintaining the mapping from names to values is distributed among the nodes in a... 

    A decision support system for software architecture-style selection

    , Article 6th ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2008, Prague, 20 August 2008 through 22 August 2008 ; 2008 , Pages 213-220 ; 9780769533025 (ISBN) Moaven, S ; Ahmadi, H ; Habibi, J ; Kamandi, A ; Sharif University of Technology
    2008
    Abstract
    Due to the enlargement and complexity of software systems and the need for maintenance and update, success of systems depends strongly on their architecture. Software architecture has been a key element in software development process in two past decades. Therefore, choosing the correct architecture is a critical issue in software engineering domain, with respect to the extremely extension of architecturedriven designs. Moreover, software architecture selection is a multi-criteria decision-making problem in which different goals and objectives should be considered. In this paper, a Decision Support System (DSS) has been designed which provides software architects with more precise and... 

    Improving density-based methods for hierarchical clustering of web pages

    , Article Data and Knowledge Engineering ; Volume 67, Issue 1 , 2008 , Pages 30-50 ; 0169023X (ISSN) Haghir Chehreghani, M ; Abolhassani, H ; Haghir Chehreghani, M ; Sharif University of Technology
    2008
    Abstract
    The rapid increase of information on the web makes it necessary to improve information management techniques. One of the most important techniques is clustering web data. In this paper, we propose a new 3-phase clustering method that finds dense units in a data set using density-based algorithms. The distances in the dense units are stored in order in structures such as a min heap. In the extraction stage, these distances are extracted one by one, and their effects on the clustering process are examined. Finally, in the combination stage, clustering is completed using improved versions of well-known single and average linkage methods. All steps of the methods are performed in O(n log n) time... 

    Adaptive predictive functional control applied as an AQM controller in TCP/IP networks

    , Article 10th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2006, Jointly with the 12th International Conference on Information Systems Analysis and Synthesis, ISAS 2006, Orlando, FL, 16 July 2006 through 19 July 2006 ; Volume 5 , 2006 , Pages 92-97 ; 9806560701 (ISBN); 9789806560703 (ISBN) Bigdeli, N ; Haeri, M ; International Institute of Informatics and Systemics (IIIS) ; Sharif University of Technology
    2006
    Abstract
    Predictive functional control (PFC) as a new AQM strategy for dynamically varying TCP/AQM networks is introduced. The inherent ability of dealing with system transmission delay makes PFC applicable for congestion control in computer networks and simple structure and algebraic control law of PFC make it more efficient then other model predictive control (MPC) schemes. The model used here is the fluid-flow model developed by Towsley et al. Simulation results are presented to compare the out-performance of the proposed method with respect to those of PI and RED controllers as the most commonly employed AQM controllers. Besides, an indirect self tuning adaptive PFC scheme has been designed in... 

    A new fuzzy logic algorithm application in the design of signalized intersection control system

    , Article 10th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2006, Jointly with the 12th International Conference on Information Systems Analysis and Synthesis, ISAS 2006, Orlando, FL, 16 July 2006 through 19 July 2006 ; Volume 3 , 2006 , Pages 83-88 ; 980656068X (ISBN); 9789806560680 (ISBN) Shafahi, Y ; Kermanshahi, S ; Sharif University of Technology
    2006
    Abstract
    The Population Growth, Land-use Development and the Increase in Vehicle Ownership in big cities have caused an increase in Travel Demand and the volume of vehicles passing through Urban Routes. Travel Time in the urban route network due to increase in congestion in one of the most important problems in Metropolises. A considerable part of Travel Time in the Metropolitan routes network is related to delay time in intersections. Thus, controlling methods for intersections in order to decrease such delays is of a great importance. The application of Fuzzy Logic as a control basis in engineering issues has a proper background. In this study, a method for controlling such signalized intersections... 

    Hybrid clustering-based 3D face modeling upon non-perfect orthogonality of frontal and profile views

    , Article 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010, 8 October 2010 through 10 October 2010, Krackow ; 2010 , Pages 578-584 ; 9781424478170 (ISBN) Ghahari, A ; Mosleh, M ; Sharif University of Technology
    2010
    Abstract
    Multi view imaging has attracted increasing attention recently and has become one of the potential avenues in future video systems. We aim to make more reliable and robust automatic feature extraction and natural 3D feature construction from 2D features detected on a pair of frontal and profile view face images. We propose several heuristic algorithms to minimize possible errors introduced by prevalent non-perfect orthogonal condition and non-coherent luminance. In our approach, we first extract the 2D features that are visible to both cameras in both views. Then, we estimate the coordinates of the features in the hidden profile view based on the visible features extracted in the two... 

    Automatic MPEG4 compatible face representation using clustering-based modeling schemes

    , Article 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010, 8 October 2010 through 10 October 2010, Krackow ; 2010 , Pages 96-102 ; 9781424478170 (ISBN) Ghahari, A ; Mosleh, M ; Sharif University of Technology
    2010
    Abstract
    Multi view imaging has attracted increasing attention recently and has become one of the potential avenues in future video systems. We aim to make more reliable and robust automatic feature extraction and natural 3D feature construction from 2D features detected on a pair of frontal and profile view face images. We propose several heuristic algorithms to minimize possible errors introduced by prevalent non-perfect orthogonal condition and non-coherent luminance. In our approach, we first extract the 2D features that are visible to both cameras in both views. Then, we estimate the coordinates of the features in the hidden profile view based on the visible features extracted in the two... 

    Type-II fuzzy route choice modeling

    , Article Annual Conference of the North American Fuzzy Information Processing Society - NAFIPS, 12 July 2010 through 14 July 2010 ; July , 2010 ; 9781424478576 (ISBN) Shafahi, Y ; Zarinbal Masouleh, A ; Zarinbal Masouleh, M ; Sharif University of Technology
    2010
    Abstract
    Route choice modeling is one of the most important parts of traffic assignment problem. Recently, this model is used to describe the reactions of drivers to Traveler Information Systems in order to develop accurate Advanced Traffic Management and Information System (ATMIS). Therefore accurate model is necessary. In this paper we proposed a new model based on Type-II fuzzy logic to model route choice problem. This model can take account of the imprecision, uncertainties and vagueness lying in the dynamic choice process and makes more accurate modeling of drivers' behavior than deterministic, stochastic and Type-I fuzzy models. In our proposed model we consider average speed and cost... 

    Topological analysis of multi-phase attacks using expert systems

    , Article Journal of Information Science and Engineering ; Volume 24, Issue 3 , 2008 , Pages 743-767 ; 10162364 (ISSN) Shahriari, H. R ; Ganjisaffar, Y ; Jalili, R ; Habibi, J ; Sharif University of Technology
    2008
    Abstract
    With the increasing number and complexity of network attacks, the demand for automatic vulnerability analysis tools has increased. The prerequisite of making these tools is to have a formal and precise model of network configurations and vulnerabilities. Utilizing this model, network administrators can analyze the effects of vulnerabilities on the network and complex attack scenarios can be detected before happening. In this paper, we present a general logic-based framework for modeling network configurations and topologies. Then, a number of important and wide-spread network vulnerabilities are modeled as general inference rules based on the framework definitions. We implemented the...