Loading...
Search for: knowledge
0.007 seconds
Total 296 records

    Improving direct load control implementation by an inititative load control method

    , Article EPDC 2013 - 18th Electric Power Distribution Network Conference ; 2013 ; ISBN: 9781480000000 Rastegar, M ; Fotuhi-Firuzabad, M ; Moeini-Aghtaie, M ; Sharif University of Technology
    Abstract
    Demand response (DR) as a state-of-the-art program is accommodated in the energy efficiency contexts of the smart grid. Lack of the customer knowledge about how to respond to the time-differentiated tariffs and offered controlling signals is the major obstacle in the way of broad DR implementing. As a solution, an optimization method, namely load control (LC), is proposed to automatically control the on/off status of the responsive appliances in a smart home. This paper focuses on the direct load control (DLC) program in the category of incentive-based DR programs. LC is extended to consider inconvenience cost of the DLC implementation for DLC program participants. Outputs of the extended LC... 

    Web driven alert verification

    , Article 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; Sep , 2014 , p. 180-185 Najafi, A ; Sepahi, A ; Jalili, R ; Sharif University of Technology
    Abstract
    A web attack is an attack against a web server through the HTTP Protocol. By analyzing known web attacks, we find out that each one has its own behavior. Vestiges of their behavior could be detected in non-body parts of the HTTP Protocol. Such information can be used to verify web alerts generated by Web Application Firewalls (WAFs) and Web Intrusion Detection Systems (Web IDSs). In this paper, we propose a method to verify web alerts generated by mentioned sensors. The goal of the alert verification component is to eliminate or tag alerts that do not represent successful attacks. Our approach is based on analyzing HTTP Transaction metadata, including Request method, Request Headers, Status... 

    Simple and efficient method to measure vessel tortuosity

    , Article Proceedings of the 3rd International Conference on Computer and Knowledge Engineering, ICCKE 2013, Mashhad: Iran ; 2013 , Pages 219-222 ; 9781479920921 (ISBN) Pourreza, H. R ; Pourreza, M ; Banaee, T ; Sharif University of Technology
    2013
    Abstract
    Retinal vessels tortuosity is one of the important signs of cardiovascular diseases such as diabetic retinopathy and hypertension. In this paper we present a simple and efficient algorithm to measure the grade of tortuosity in retinal images. This algorithm consists of four main steps,vessel detection, extracting vascular skeleton via thinning, detection of vessel crossovers and bifurcations and finally calculating local and global tortuosity. The last stage is based on a circular mask that is put on every skeleton point of retinal vessels. While the skeleton of vessel splits the circle in each position, the local tortuosity is considered to be the bigger to smaller area ratio. The proposed... 

    Energy-aware scheduling algorithm for precedence-constrained parallel tasks of network-intensive applications in a distributed homogeneous environment

    , Article Proceedings of the 3rd International Conference on Computer and Knowledge Engineering, ICCKE 2013 ; 2013 , Pages 368-375 ; 9781479920921 (ISBN) Ebrahimirad, V ; Rajabi, A ; Goudarzi, M ; Sharif University of Technology
    2013
    Abstract
    A wide range of scheduling algorithms used in the data centers have traditionally concentrated on enhancement of performance metrics. Recently, with the rapid growth of data centers in terms of both size and number, the power consumption has become a major challenge for both industry and society. At the software level, energy-aware task scheduling is an effective technique for power reduction in the data centers. However, most of the currently proposed energy-aware scheduling approaches are only paying attention to computation cost. In the other words, they ignore the energy consumed by the network equipment, namely communication cost. In this paper, the problem of scheduling... 

    Applying data mining techniques to business process reengineering based on simultaneous use of two novel proposed approaches

    , Article International Journal of Business Process Integration and Management ; Volume 6, Issue 3 , 2013 , Pages 247-267 ; 17418763 (ISSN) Ghanadbashi, S ; Khanbabaei, M ; Saniee Abadeh, M ; Sharif University of Technology
    2013
    Abstract
    Business process reengineering (BPR) can help organisations to identify and improve their business processes. A major problem is the high volume of business process datasets with characteristics such as high dimensionality, noise, uncertainty in process datasets and complicated interactions among process variables. Data mining (DM) techniques facilitate the identification and analysis of business processes, and improve their performance by extracting the hidden knowledge in business process datasets. In this paper, we present the application of DM to BPR, based on two novel approaches. By a literature review, the first approach proposes DMbBPR model, mainly focuses on the applications of... 

    Incorporating betweenness centrality in compressive sensing for congestion detection

    , Article ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings ; 2013 , Pages 4519-4523 ; 15206149 (ISSN); 9781479903566 (ISBN) Ayatollahi Tabatabaii, H. S ; Rabiee, H. R ; Rohban, M. H ; Salehi, M ; Sharif University of Technology
    2013
    Abstract
    This paper presents a new Compressive Sensing (CS) scheme for detecting network congested links. We focus on decreasing the required number of measurements to detect all congested links in the context of network tomography. We have expanded the LASSO objective function by adding a new term corresponding to the prior knowledge based on the relationship between the congested links and the corresponding link Betweenness Centrality (BC). The accuracy of the proposed model is verified by simulations on two real datasets. The results demonstrate that our model outperformed the state-of-the-art CS based method with significant improvements in terms of F-Score  

    Improving direct load control implementation by an inititative load control method

    , Article EPDC 2013 - 18th Electric Power Distribution Network Conference ; 2013 , Pages 1-5 ; 9781479900923 (ISBN) Rastegar, M ; Fotuhi Firuzabad, M ; Moeini Aghtaie, M ; Sharif University of Technology
    2013
    Abstract
    Demand response (DR) as a state-of-the-art program is accommodated in the energy efficiency contexts of the smart grid. Lack of the customer knowledge about how to respond to the time-differentiated tariffs and offered controlling signals is the major obstacle in the way of broad DR implementing. As a solution, an optimization method, namely load control (LC), is proposed to automatically control the on/off status of the responsive appliances in a smart home. This paper focuses on the direct load control (DLC) program in the category of incentive-based DR programs. LC is extended to consider inconvenience cost of the DLC implementation for DLC program participants. Outputs of the extended LC... 

    Erratum to A linear genetic programming approach for the prediction of solar global radiation

    , Article Neural Computing and Applications ; Volume 23, Issue 3-4 , 2013 , Pages 1205- ; 09410643 (ISSN) Shavandi, H ; Saeidi Ramiyani, S ; Sharif University of Technology
    2013

    Analytical and learning-based spectrum sensing time optimisation in cognitive radio systems

    , Article IET Communications ; Volume 7, Issue 5 , 2013 , Pages 480-489 ; 17518628 (ISSN) Shokri Ghadikolaei, H ; Abdi, Y ; Nasiri Kenari, M ; Sharif University of Technology
    2013
    Abstract
    In this study, the average throughput maximisation of a secondary user (SU) by optimising its spectrum sensing time is formulated, assuming that a priori knowledge of the presence and absence probabilities of the primary users (PUs) is available. The energy consumed to find a transmission opportunity is evaluated, and a discussion on the impacts of the number of PUs on SU throughput and consumed energy are presented. To avoid the challenges associated with the analytical method, as a second solution, a systematic adaptive neural network-based sensing time optimisation approach is also proposed. The proposed scheme is able to find the optimum value of the channel sensing time without any... 

    A measurement framework for directed networks

    , Article IEEE Journal on Selected Areas in Communications ; Volume 31, Issue 6 , June , 2013 , Pages 1007-1016 ; 07338716 (ISSN) Salehi, M ; Rabiee, H. R ; Sharif University of Technology
    2013
    Abstract
    Partially-observed network data collected by link-tracing based sampling methods is often being studied to obtain the characteristics of a large complex network. However, little attention has been paid to sampling from directed networks such as WWW and Peer-to-Peer networks. In this paper, we propose a novel two-step (sampling/estimation) framework to measure nodal characteristics which can be defined by an average target function in an arbitrary directed network. To this end, we propose a personalized PageRank-based algorithm to visit and sample nodes. This algorithm only uses already visited nodes as local information without any prior knowledge about the latent structure of the network.... 

    A genetic algorithm for a creativity matrix cubic space clustering: A case study in Mazandaran Gas Company

    , Article Applied Soft Computing Journal ; Volume 13, Issue 4 , 2013 , Pages 1661-1673 ; 15684946 (ISSN) Aalaei, A ; Fazlollahtabar, H ; Mahdavi, I ; Mahdavi Amiri, N ; Yahyanejad, M. H ; Sharif University of Technology
    2013
    Abstract
    Creativity is a promoting factor in organizations. Having employees in structured and organized configurations in a creative manner, helps in improving the productivity. We investigate different structural aspects of teams' network organization and the creativity within a knowledge development program (KDP). The proposed methodology being equipped with a heuristic clustering technique, classifies the employees with respect to creativity parameters and configures a creativity matrix. Applying the creativity matrix, clustering is performed via mathematical programming. For large problems, a genetic algorithm (GA) is developed to solve the mathematical model. We also employ the Taguchi method... 

    Introducing proxy zero-knowledge proof and utilization in anonymous credential systems

    , Article Security and Communication Networks ; Volume 6, Issue 2 , 2013 , Pages 161-172 ; 19390122 (ISSN) Jannati, H ; Salmasizadeh, M ; Mohajeri, J ; Moradi, A ; Sharif University of Technology
    2013
    Abstract
    In pseudonym systems, users by means of pseudonyms anonymously interact with organizations to obtain credentials. The credential scheme constructed by Lysyanskaya and Camenisch is among the most complete credential systems, in which "all-or-nothing" sharing scheme is used to prevent users sharing their credentials. If a user cannot directly show a credential issued by an organization, she or he has to give her or his own secret key to someone else as a proxy; afterward, the proxy can show the credential on behalf of the user. Thus, according to the all-or-nothing property of the system, having the user's secret key, the proxy can use all credentials of the user for itself. To solve this... 

    Non-delegatable strong designated verifier signature using a trusted third party without pairings

    , Article Conferences in Research and Practice in Information Technology Series ; Volume 138 , 2013 , Pages 13-25 ; 14451336 (ISSN) ; 9781921770234 (ISBN) Asaar, M. R ; Vardasbi, A ; Salmasizadeh, M ; Sharif University of Technology
    Australian Computer Society  2013
    Abstract
    Strong designated verifier signature (SDVS) is characterized by two properties; namely the nontransferability and the privacy of the signer's identity (PSI). Non-transferability prevents anyone else other than the designated verifier to verify the signature, while PSI prevents a third party to distinguish between two different signers. In this paper, we propose a non-delegatable SDVS which uses a trusted third party for the key generation. Our signature scheme does not use bilinear pairings which makes it suitable for the resource constraint applications. Using one-way homomorphic functions, our scheme is presented at an abstract level, the unification of which was noticed by Maurer in the... 

    Non-monotonocity in OrBAC through default and exception policy rules

    , Article 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012 ; 2012 , Pages 87-94 ; 9781467323864 (ISBN) Javadi, S. A ; Amini, M ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    Context-awareness is an essential requirement of modern access control models. Organization-Based Access Control (OrBAC) model is a powerful context-aware access control model defined by first-order logic. However, due to the monotonicity nature of the first-order logic, OrBAC suffers from the incapability of making decision based on incomplete context information as well as the definition of default and exception policy rules. This paper proposes augmenting non-monotonicity features to OrBAC using MKNF+ logic, which is a combination of Description Logic (DL) and Answer Set Programming (ASP). Along with the use of DL to define ontology for main entities and context information in OrBAC;... 

    Modeling geometric non-linearities in the free vibration of a planar beam flexure with a tip mass

    , Article Proceedings of the ASME Design Engineering Technical Conference, 12 August 2012 through 12 August 2012 ; Volume 4, Issue PARTS A AND B , August , 2012 , Pages 363-371 ; 9780791845035 (ISBN) Moeenfard, H ; Awtar, S ; Sharif University of Technology
    2012
    Abstract
    The objective of this work is to create an analytical framework to study the non-linear dynamics of beam flexures with a tip mass undergoing large deflections. Hamilton's principal is utilized to derive the equations governing the nonlinear vibrations of the cantilever beam and the associated boundary conditions. Then, using a single mode approximation, these non-linear partial differential equations are reduced to two coupled non-linear ordinary differential equations. These equations are solved analytically using combination of the method of multiple time scales and homotopy perturbation analysis. Closed-form, parametric analytical expressions are presented for the time domain response of... 

    A Bayesian approach to the data description problem

    , Article Proceedings of the National Conference on Artificial Intelligence, 22 July 2012 through 26 July 2012 ; Volume 2 , July , 2012 , Pages 907-913 ; 9781577355687 (ISBN) Ghasemi, A ; Rabiee, H. R ; Manzuri, M. T ; Rohban, M. H ; Sharif University of Technology
    2012
    Abstract
    In this paper, we address the problem of data description using a Bayesian framework. The goal of data description is to draw a boundary around objects of a certain class of interest to discriminate that class from the rest of the feature space. Data description is also known as one-class learning and has a wide range of applications. The proposed approach uses a Bayesian framework to precisely compute the class boundary and therefore can utilize domain information in form of prior knowledge in the framework. It can also operate in the kernel space and therefore recognize arbitrary boundary shapes. Moreover, the proposed method can utilize unlabeled data in order to improve accuracy of... 

    Multivariate curve resolution alternating least-squares as a tool for analyzing crude oil extracted asphaltene samples

    , Article Energy and Fuels ; Volume 26, Issue 9 , 2012 , Pages 5663-5671 ; 08870624 (ISSN) Ghatee, M. H ; Hemmateenejad, B ; Sedghamiz, T ; Khosousi, T ; Ayatollahi, S ; Seiedi, O ; Sayyad Amin, J ; Sharif University of Technology
    ACS  2012
    Abstract
    Asphaltene deposition in the early stage of the oil reservoir life and later during any stimulation process emerges critical problems to the petroleum industry. Deposition of asphaltene aggregates raises strict problems in industries and demands markedly a practical and scientific knowledge of the mechanisms of aggregation and precipitation. Fluorescence emission spectroscopy has been widely used to illuminate the fundamental properties of crude oils and asphaltenes. It proposes analysis of some details of equilibrium, dynamic behavior, and aggregation composition of crude oil under specific condition. In this work, the fluorescence spectra of crude-oil extracted asphaltene samples were... 

    The influence of vertical deflection of the supports in modeling squeeze film damping in torsional micromirrors

    , Article Microelectronics Journal ; Volume 43, Issue 8 , 2012 , Pages 530-536 ; 00262692 (ISSN) Moeenfard, H ; Taghi Ahmadian, M ; Sharif University of Technology
    Elsevier  2012
    Abstract
    The objective of this work is to create an analytical framework to study the problem of squeezed film damping in micromirrors considering the bending of the supporting torsion microbeams. Using mathematical and physical justifications, nonlinear Reynolds equation governing the behavior of the squeezed gas underneath the mirror is linearized. The resulting linearized equation is then nondimensionalized and analytically solved for two cases of the infinitesimal and finite tilting angle of the mirror. The obtained pressure distribution from the solution of the Reynolds equation is then utilized for finding the squeezed film damping force and torque applied to the mirror. The results show that... 

    Slow switching and authority of self-knowledge

    , Article Procedia - Social and Behavioral Sciences ; Volume 32 , 2012 , Pages 443-449 ; 18770428 (ISSN) Bikaraan Behesht, H ; Sharif University of Technology
    2012
    Abstract
    Based on content externalism, the question of whether self-knowledge is authoritative or not has launched a real controversy in the philosophy of mind. Boghossian proposed slow switching argument in defense of incompatibility of the two views. This argument has been criticized by some philosophers through different approaches. Vahid is one of them. He claimed that Boghossian's argument appeals to some controversial assumptions without which it cannot achieve its conclusion. In this article, I criticize Vahid's response to slow switching argument and show that self-knowledge in Vahid's response differs in having authority and therefore in function from that of Boghossian  

    Developing a hybrid artificial intelligence model for outpatient visits forecasting in hospitals

    , Article Applied Soft Computing Journal ; Volume 12, Issue 2 , 2012 , Pages 700-711 ; 15684946 (ISSN) Hadavandi, E ; Shavandi, H ; Ghanbari, A ; Abbasian Naghneh, S ; Sharif University of Technology
    Abstract
    Accurate forecasting of outpatient visits aids in decision-making and planning for the future and is the foundation for greater and better utilization of resources and increased levels of outpatient care. It provides the ability to better manage the ways in which outpatient's needs and aspirations are planned and delivered. This study presents a hybrid artificial intelligence (AI) model to develop a Mamdani type fuzzy rule based system to forecast outpatient visits with high accuracy. The hybrid model uses genetic algorithm for evolving knowledge base of fuzzy system. Actually it extracts useful patterns of information with a descriptive rule induction approach based on Genetic Fuzzy Systems...