Loading...
Search for: world
0.008 seconds
Total 209 records

    World map of scientific misconduct

    , Article Science and Engineering Ethics ; 2017 , Pages 1-4 ; 13533452 (ISSN) Ataie Ashtiani, B ; Sharif University of Technology
    Springer Netherlands  2017
    Abstract
    A comparative world map of scientific misconduct reveals that countries with the most rapid growth in scientific publications also have the highest retraction rate. To avoid polluting the scientific record further, these nations must urgently commit to enforcing research integrity among their academic communities. © 2017 Springer Science+Business Media B.V  

    World map of scientific misconduct

    , Article Science and Engineering Ethics ; Volume 24, Issue 5 , 2018 , Pages 1653-1656 ; 13533452 (ISSN) Ataie Ashtiani, B ; Sharif University of Technology
    Springer Netherlands  2018
    Abstract
    A comparative world map of scientific misconduct reveals that countries with the most rapid growth in scientific publications also have the highest retraction rate. To avoid polluting the scientific record further, these nations must urgently commit to enforcing research integrity among their academic communities. © 2017, Springer Science+Business Media B.V  

    Attitudes toward world englishes among iranian english language learners

    , Article Asian Englishes ; 2018 , Pages 1-18 ; 13488678 (ISSN) Rezaei, S ; Khosravizadeh, P ; Mottaghi, Z ; Sharif University of Technology
    Routledge  2018
    Abstract
    The current study investigated the attitudes of 140 Iranian English language learners toward World Englishes. The participants were required to listen to recordings of the same natural speech from a series of speakers with five different accents. The results showed that the participants had a more positive attitude toward American and British English. On the other hand, African-American Vernacular English received the lowest level and Persian English and Australian English were in the middle of this scale. While American English was evaluated as the most socially attractive and African-American as the least socially attractive, British and African-American accents were evaluated as of the... 

    Attitudes toward world englishes among iranian english language learners

    , Article Asian Englishes ; Volume 21, Issue 1 , 2019 , Pages 52-69 ; 13488678 (ISSN) Rezaei, S ; Khosravizadeh, P ; Mottaghi, Z ; Sharif University of Technology
    Routledge  2019
    Abstract
    The current study investigated the attitudes of 140 Iranian English language learners toward World Englishes. The participants were required to listen to recordings of the same natural speech from a series of speakers with five different accents. The results showed that the participants had a more positive attitude toward American and British English. On the other hand, African-American Vernacular English received the lowest level and Persian English and Australian English were in the middle of this scale. While American English was evaluated as the most socially attractive and African-American as the least socially attractive, British and African-American accents were evaluated as of the... 

    Relationship of profitability of world’s top companies with entrepreneurship, competitiveness, and business environment indicators

    , Article Applied Economics ; Volume 53, Issue 23 , 2021 , Pages 2584-2597 ; 00036846 (ISSN) Khazaei, M ; Sharif University of Technology
    Routledge  2021
    Abstract
    Identifying the factors affecting profitability is important from the perspective of market players. One of the most important benchmarks of firm performance is accounting profit and effective factors analysis so that users of accounting information analyse the factors affecting profit, firm performance and various aspects of its performance and according to estimates Done, make your own decision on how to allocate resources. The main purpose of this study is to investigate the impact of some factors of competitiveness, entrepreneurship and business environment indicators on the profitability of the world’s top companies. For this purpose, 176 top companies in the world from 2013 to 2018... 

    ROSE: Role-based Signed Network Embedding

    , Article 29th International World Wide Web Conference, WWW 2020, 20 April 2020 through 24 April 2020 ; 2020 , Pages 2782-2788 Javari, A ; Derr, T ; Esmailian, P ; Tang, J ; Kevin Chen-C. C ; Chunghwa Telecom; et al.; Microsoft; Quanta Computer; Taiwan Mobile; ZOOM ; Sharif University of Technology
    Association for Computing Machinery, Inc  2020
    Abstract
    In real-world networks, nodes might have more than one type of relationship. Signed networks are an important class of such networks consisting of two types of relations: positive and negative. Recently, embedding signed networks has attracted increasing attention and is more challenging than classic networks since nodes are connected by paths with multi-types of links. Existing works capture the complex relationships by relying on social theories. However, this approach has major drawbacks, including the incompleteness/inaccurateness of such theories. Thus, we propose network transformation based embedding to address these shortcomings. The core idea is that rather than directly finding the... 

    Clustering search engine log for query recommendation

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 380-387 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Hosseini, M ; Abolhassani, H ; Sharif University of Technology
    2008
    Abstract
    As web contents grow, the importance of search engines became more critical and at the same time user satisfaction decreased. Query recommendation is a new approach to improve search results in web. In this paper we represent a method to help search engine users in attaining required information. Such facility could be provided by offering some queries associated with queries submitted by users in order to direct them toward their target. At first, all previous query contained in a query log should be clustered, therefore, all queries that are semantically similar will be detected. Then all queries that are similar to user's queries are ranked according to a relevance criterion. The method... 

    Investigating and Explaining Dr. Golshani’s Points of View about Religious Science

    , M.Sc. Thesis Sharif University of Technology Mosavi, Zahra (Author) ; Hassani, Hamid Reza (Supervisor)
    Abstract
    Entrance of secular science to Muslim societies has made them face a duality. That is because, on the one hand, they like to preserve their religious values; and on the other, prevalence of secular ideas prevents people from being committed to such values. Therefore, some Islamic scholars proposed religious science as opposed to Western secular science as a remedy to this crisis In case of religious science, explanatory model has the highest position, but disagreement over how to combine experimental and religious characteristics has led to different models in this area. One of the explanatory models of religious knowledge is that of Doctor Mehdi Golshani which has received due attention at... 

    Achievable throughput of wireless networks with local traffic

    , Article IEEE Wireless Communications and Networking Conference, WCNC ; 10 November , 2014 , Pages 3076-3081 ; ISSN: 15253511 ; ISBN: 9781479930838 Shariatpanahi, S. P ; Khalaj, B. H ; Shah-Mansouri, H ; Sharif University of Technology
    Abstract
    Many applications in wireless networks impose locally distributed traffic on the network. We consider the effect of traffic localization on throughput of large wireless networks in the scaling sense. We show that by careful exploitation of traffic localization, one can enhance the throughput of various schemes in wireless networks. Also, the important case of Small World traffic distribution in wireless networks is addressed. In this type of traffic, in addition to the local traffic, a non-negligible amount of global traffic should be handled by the network. It is shown that a non-negligible amount of network-wide traffic can be tolerated by network without any performance degradation in the... 

    Latecomer systems integration capability in complex capital goods: The case of Iran's electricity generation systems

    , Article Industrial and Corporate Change ; Vol. 23, issue. 3 , 2014 , pp. 689-716 ; ISSN: 09606491 Kiamehr, M ; Hobday, M ; Kermanshahy, A ; Sharif University of Technology
    Abstract
    This article introduces the concept of latecomer systems integration capability (LSIC) as a construct for theory development in the area of emergence and competitiveness of producers of complex capital goods from developing economies. The study draws on three bodies of the literature to conceptualize LSIC and then presents an in-depth case study of the development of LSIC in a major Iranian firm engaged in producing electricity generation systems. Although an exploratory study, the findings suggest that, in this case, LSIC evolved in a fairly short period of time from simple low-cost project management skills to innovative capabilities, supported by some sophisticated engineering and design... 

    Synchronizability of complex networks with community structure

    , Article International Journal of Modern Physics C ; Volume 23, Issue 4 , April , 2012 ; 01291831 (ISSN) Jalili, M ; Sharif University of Technology
    2012
    Abstract
    Many real-world networks show community structure characterized by dense intra-community connections and sparse inter-community links. In this paper we investigated the synchronization properties of such networks. In this work we constructed such networks in a way that they consist of a number of communities with scale-free or small-world structure. Furthermore, with a probability, the intra-community connections are rewired to inter-community links. Two synchronizability measures were considered as the eigenratio of the Laplacian matrix and the phase order parameter obtained for coupled nonidentical Kuramoto oscillators. We found a power-law relation between the eigenratio and the... 

    Utilizing mixed methods research in analyzing Iranian researchers' informarion search behaviour in the web and presenting the current pattern

    , Article Iranian Journal of Information Processing Management ; Volume 31, Issue 1 , 2015 , Pages 27-57 ; 22518223 (ISSN) Asadi, M ; Hariri, N ; Sharif University of Technology
    Iranian Research Institute for Scientific Information and Documentation  2015
    Abstract
    Using mixed method research the current study has analyzed Iranian researchers' information searching behavior on the Web. Based on extracted concepts, the model of their information searching behavior was revealed. Forty-four participants, including academic staff from universities and research centers were recruited for this study selected by purposive sampling. Data were gathered from questionnaires including ten questions and semi-structured interview. Each participant's memos were analyzed using grounded theory methods adapted from Strauss & Corbin (1998). Results showed that the main objectives of subjects were doing a research, writing a paper, studying, doing assignments, downloading... 

    Trust inference in web-based social networks using resistive networks

    , Article Proceedings- 3rd International Conference on Internet and Web Applications and Services, ICIW 2008, Athens, 8 June 2008 through 13 June 2008 ; 2008 , Pages 233-238 ; 9780769531632 (ISBN) Taherian, M ; Amini, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    By the immense growth of the Web-Based Social Networks (WBSNs), the role of trust in connecting people together through WBSNs is getting more important than ever. In other words, since the probability of malicious behavior in WBSNs is increasing, it is necessary to evaluate the reliability of a person before trying to communicate with. Hence, it is desirable to find out how much a person should trust another one in a network. The approach to answer this question is usually called trust inference. In this paper, we propose a new trust inference algorithm (Called RN-Trust) based on the resistive networks concept. The algorithm, in addition to being simple, resolves some problems of previously... 

    Attaining higher quality for density based algorithms

    , Article 1st International Conference on Web Reasoning and Rule Systems, RR 2007, Innsbruck, 7 June 2007 through 8 June 2007 ; Volume 4524 LNCS , 2007 , Pages 329-338 ; 03029743 (ISSN); 354072981X (ISBN); 9783540729815 (ISBN) Haghir Chehreghani, M ; Abolhassani, H ; Haghir Chehreghani, M ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    So far several methods have been proposed for clustering the web. On the other hand, many algorithms have been developed for clustering the relational data, but their usage for the Web is to be investigated. One main category of such algorithms is density based methods providing high quality results. In this paper first, a new density based algorithm is introduced and then it is compared with other algorithms of this category. The proposed algorithm has some interesting properties and capabilities such as hierarchical clustering and sampling, making it suitable for clustering the web data. © Springer-Verlag Berlin Heidelberg 2007  

    New relations and separations of conjectures about incompleteness in the finite domain

    , Article Journal of Symbolic Logic ; Volume 87, Issue 3 , 2022 , Pages 912-937 ; 00224812 (ISSN) Khaniki, E ; Sharif University of Technology
    Cambridge University Press  2022
    Abstract
    In [20] Krajíček and Pudlák discovered connections between problems in computational complexity and the lengths of first-order proofs of finite consistency statements. Later Pudlák [25] studied more statements that connect provability with computational complexity and conjectured that they are true. All these conjectures are at least as strong as [23-25].One of the problems concerning these conjectures is to find out how tightly they are connected with statements about computational complexity classes. Results of this kind had been proved in [20, 22].In this paper, we generalize and strengthen these results. Another question that we address concerns the dependence between these conjectures.... 

    Possibilism and Actualism in Quantified Modal Logic

    , M.Sc. Thesis Sharif University of Technology Okhovat Alavian, Mohammad Javad (Author) ; Nabavi, Lotfollah (Supervisor)
    Abstract
    In this thesis, different systems of quantified modal logic, philosophical theories of possibilism and actualism, and the interaction between these two theories and those systems have been studied.Modal claims, which talk about the world as it could have been and not the world as it is, have by far been under philosophical considerations. Possibilism and actualism, two philosophical theses that have their own point of view towards the world and its objects, analyze these claims and their relevant truth-assigning mechanisms in different ways.On the other hand, over the last century, modal sentences have been formulated, in sentencial and quantified levels, by precise logical systems, called... 

    Topology and vulnerability of the Iranian power grid

    , Article Physica A: Statistical Mechanics and its Applications ; Vol. 406, issue , July , 2014 , p. 24-33 ; ISSN: 03784371 Saniee Monfared, M. A ; Jalili, M ; Alipour, Z ; Sharif University of Technology
    Abstract
    In this paper we investigated the structural properties of the ultra high voltage power transmission network of Iran. We modeled the power grid as a network with 105 nodes and 142 connection links. We found that the Iranian power grid displays a relatively moderate clustering coefficient-much larger than that of corresponding random networks-and small characteristics path length comparable to that of corresponding random networks; i.e. the power grid is a small-world network with exponential degree distribution. Global efficiency was considered as an indicator of grid's performance and the influence of random and intentional nodal failures on the efficiency was investigated. We also studied... 

    Network reconstruction under compressive sensing

    , Article Proceedings of the 2012 ASE International Conference on Social Informatics, SocialInformatics ; 2013 , Pages 19-25 ; 9780769550152 (ISBN) Siyari, P ; Rabiee, H. R ; Salehi, M ; Mehdiabadi, M. E ; Academy of Science and Engineering (ASE) ; Sharif University of Technology
    2013
    Abstract
    Many real-world systems and applications such as World Wide Web, and social interactions can be modeled as networks of interacting nodes. However, in many cases, one encounters the situation where the pattern of the node-to-node interactions (i.e., edges) or the structure of a network is unknown. We address this issue by studying the Network Reconstruction Problem: Given a network with missing edges, how is it possible to uncover the network structure based on certain observable quantities extracted from partial measurements? We propose a novel framework called CS-NetRec based on a newly emerged paradigm in sparse signal recovery called Compressive Sensing (CS). The results demonstrate that... 

    Cascading failure tolerance of modular small-world networks

    , Article IEEE Transactions on Circuits and Systems II: Express Briefs ; Volume 58, Issue 8 , 2011 , Pages 527-531 ; 15497747 (ISSN) Babaei, M ; Ghassemieh, H ; Jalili, M ; Sharif University of Technology
    2011
    Abstract
    Many real-world networks have a modular structure, and their component may undergo random errors and/or intentional attacks. More devastating situations may happen if the network components have a limited load capacity; the errors and attacks may lead to a cascading component removal process, and consequently, the network may lose its desired performance. In this brief, we investigate the tolerance of cascading errors and attacks in modular small-world networks. This brief studies the size of the largest connected component of the networks when cascading errors or attacks occur. The robustness of the network is tested as a function of both the intermodular connection and intramodular... 

    Using design patterns for refactoring real-world models

    , Article Conference Proceedings of the EUROMICRO, 27 August 2009 through 29 August 2009 ; 2009 , Pages 436-441 ; 10896503 (ISSN) ; 9780769537849 (ISBN) Yaghoubi Shahir, H ; Kouroshfar, E ; Ramsin, R ; Sharif University of Technology
    Abstract
    Many software development methodologies are based on modeling the real world. In some of these methodologies, real-world models are gradually transformed into software models, while in others, the real world is only considered as a preliminary source of insight into the physical business domain. Real-world modeling was pushed to the sidelines due to anomalies in real-world modeling approaches; however, with the advent of the Model-Driven Architecture (MDA), real-world conceptual modeling is likely to regain its importance. We propose a method for using Design Patterns in the context of model transformation, where real-world models are refactored through application of these patterns....