Loading...
Search for: knowledge
0.019 seconds
Total 299 records

    Knowledge based dynamic password

    , Article 2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation ; Volume 2018-January , 2018 , Pages 0367-0372 ; 9781538626405 (ISBN) Nasehi Basharzad, S ; Fazeli, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Login section is one of the most important parts of each system. This section is usually achieved through a username-password entering method. Since in these methods, user's security relays on how strong the password is, accordingly it is important how the password is provided. There are lots of different approaches in this regard which can be categorized in two main subgroups: Static and Dynamic passwords. Dynamic passwords are taking the lead in password generation context, since static password approaches suffer from some disadvantages like their vulnerability to easily get cracked, high possibility of oblivion and etc. In this paper, we introduce a novel dynamic password providing idea,... 

    Photovoltaic parameter estimation using heuristic optimization

    , Article 2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation ; Volume 2018-January , 2018 , Pages 0792-0797 ; 9781538626405 (ISBN) Mirzapour, O ; Karimi Arpanahi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Photovoltaic (PV) panel accurate modeling is essential for operational studies and generation estimation under actual conditions and power electronic control device designs in grid connected or isolated power systems. Inaccuracy in modeling parameters such as photon's current, diode's saturation current, series and parallel resistances and diodes ideality coefficients causes errors in modeling and simulating photovoltaic panel's operation. In this paper, photovoltaic panel's parameters are estimated according to characteristic curves obtained from experiments. Heuristic optimization methods are utilized to calculate parameters for both singlediode and double-diode models. Results indicate... 

    Decentralized multivariable PID controller with pre compensator for gas turbine system

    , Article 2017 IEEE 4th International Conference on Knowledge-Based Engineering and Innovation, KBEI 2017 ; Volume 2018-January , 2018 , Pages 0074-0082 ; 9781538626405 (ISBN) Mousavi, H ; Azizi, A ; Nourisola, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    In this paper, a restricted structure of PID controller is proposed for automobile gas turbine by considering a LQG cost function. So PID Controller coefficients are calculated by minimizing this cost function. One of the most important characteristics of this approach, its ability to design various structure PID controllers by solving optimization problem only for one time, moreover it can approximate main optimization problem by a repetitive Quadratic optimization Problem (QP). This approach is convex optimization and has an analytic solution; therefore its calculations are not complicated. In defined cost function, there are two weighting functions, control error and control action; they... 

    System risk importance analysis using bayesian networks

    , Article International Journal of Reliability, Quality and Safety Engineering ; Volume 25, Issue 1 , 2018 ; 02185393 (ISSN) Noroozian, A ; Baradaran Kazemzade, R. B ; Akhavan Niaki, S. T ; Zio, E ; Sharif University of Technology
    World Scientific Publishing Co. Pte Ltd  2018
    Abstract
    Importance measures (IMs) are used for risk-informed decision making in system operations, safety, and maintenance. Traditionally, they are computed within fault tree (FT) analysis. Although FT analysis is a powerful tool to study the reliability and structural characteristics of systems, Bayesian networks (BNs) have shown explicit advantages in modeling and analytical capabilities. In this paper, the traditional definitions of IMs are extended to BNs in order to have more capability in terms of system risk modeling and analysis. Implementation results on a case study illustrate the capability of finding the most important components in a system. © 2018 World Scientific Publishing Company  

    Planning for investment in energy innovation: Developing an analytical tool to explore the impact of knowledge flow

    , Article International Journal of Energy Economics and Policy ; Volume 8, Issue 2 , 2018 , Pages 7-19 ; 21464553 (ISSN) Miremadi, I ; Saboohi, Y ; Sharif University of Technology
    Econjournals  2018
    Abstract
    The major objective of this study is to provide an analytical tool to identify the role of investment on innovation in the process of new technologies development. To achieve this goal, a model of knowledge flow is developed and the effects of national and international knowledge spillovers are investigated. Results show that when knowledge spillovers are modelled in the Nordic countries, the required investment on domestic energy R&D decreases and the cumulative knowledge increases to 10.7 billion USD by 2030. This is a significant economic potential for technological innovation which can be considered for both energy researchers and energy planners. Finally, some important policy insights... 

    Binary fading interference channel with no CSIT

    , Article IEEE Transactions on Information Theory ; Volume 63, Issue 6 , 2017 , Pages 3565-3578 ; 00189448 (ISSN) Vahid, A ; Maddah Ali, M. A ; Avestimehr, A. S ; Zhu, Y ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    We study the capacity region of the two-user binary fading (or erasure) interference channel, where the transmitters have no knowledge of the channel state information. We develop new inner bounds and outer bounds for this problem. We identify three regimes based on the channel parameters: weak, moderate, and strong interference regimes. Interestingly, this is similar to the generalized degrees of freedom of the two-user Gaussian interference channel, where transmitters have perfect channel knowledge. We show that for the weak interference regime, treating interference as erasure is optimal while for the strong interference regime, decoding interference is optimal. For the moderate... 

    Blind index coding

    , Article IEEE Transactions on Information Theory ; Volume 63, Issue 4 , 2017 , Pages 2076-2097 ; 00189448 (ISSN) Kao, D.T.H ; Maddah Ali, M. A ; Avestimehr, A. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    We introduce the blind index coding (BIC) problem, in which a single sender communicates distinct messages to multiple users over a shared channel. Each user has partial knowledge of each message as side information. However, unlike classical index coding, in BIC, the sender is uncertain of what side information is available to each user. In particular, the sender only knows the amount of bits in each user's side information but not its content. This problem can arise naturally in caching and wireless networks. In order to blindly exploit side information in the BIC problem, we develop a hybrid coding scheme that XORs uncoded bits of a subset of messages with random combinations of bits from... 

    Innovative performance of Iranian knowledge-based firms: Large firms or SMEs?

    , Article Technological Forecasting and Social Change ; May , 2016 ; 00401625 (ISSN) Noori, J ; Bagheri Nasrabadi, M ; Yazdi, N ; Babakhan, A. R ; Sharif University of Technology
    Elsevier Inc  2016
    Abstract
    The debate over innovativeness of large firms and SMEs, which was bolded by Schumpeter, still continues under mixed empirical evidences. There are several implications for this debate including policy orientation in support of large firms or SMEs. But there is a scarce of studies in developing countries and no such study in Iran yet. The present study has explored the proportionality of increase of innovation activity versus firm size within 522 Iranian knowledge-based firms categorized in 9 industries. Innovation activity was measured by R&D expenditure while firm size stood for number of employees. Using log-log regression in the first phase, it was found that R&D expenditure confirms a... 

    Towards a knowledge-based approach for creating software architecture patterns ontology

    , Article 2016 International Conference on Engineering and MIS, ICEMIS 2016, 22 September 2016 through 24 September 2016 ; 2016 ; 9781509055791 (ISBN) Rabinia, Z ; Moaven, S ; Habibi, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Software architecture patterns present solutions for software architecture problems and help to document architectural design decisions. Complexity and variability of patterns, and the required expertise for selecting an appropriate pattern, would cause some difficulties in utilizing architectural patterns. Using an ontology for registering architectural patterns is an efficient step in solving those problems. However, the mentioned difficulties make the process of constructing the architectural patterns ontology even more complicated. This paper proposes an approach that considers the construction of the architectural patterns ontology from four perspectives in order to overcome this... 

    Relationship among culture of excellence, organisational performance and knowledge sharing: Proposed conceptual framework

    , Article International Journal of Productivity and Quality Management ; Volume 19, Issue 4 , 2016 , Pages 446-465 ; 17466474 (ISSN) Rezaei, G ; Gholami, H ; Shaharou, A. B. M ; Zameri Mat Saman , M ; Zakuan, N ; Najmi, M ; Sharif University of Technology
    Inderscience Enterprises Ltd  2016
    Abstract
    In today's competitive market, culture of excellence (CoE) and knowledge sharing (KS) are vital factors for organisations to thrive in the ever-expanding global market-economy. However, most previous studies have paid less attention to CoE especially in developing countries. In addition, they gave less attention to KS as a mediator in the CoE performance model. The purpose of this paper is to investigate the relationship among CoE, KS, and organisational performance (OP) in the sector of industrial companies in Iran, and to develop a conceptual framework based on extensive review of the literature. Based on a review of the literature, a link was established between CoE and OP. Furthermore,... 

    A knowledge flow framework for e-government in Iran

    , Article Information Development ; Volume 32, Issue 4 , 2016 , Pages 1216-1227 ; 02666669 (ISSN) Tajgardoon, M. G ; Manzuri Shalmani, M. T ; Habibi, J ; Sharif University of Technology
    SAGE Publications Ltd  2016
    Abstract
    Iran’s fifth Four Year Development Plan (2011-2015) and other high level acts in recent years have paid more attention to the topic of knowledge management. This in turn has encouraged the government agencies to pay special attention to this topic for the development of their regulations and future plans. The information technology field has not been an exception to this trend, and in September 2014 an Administrative and Technical Criteria Act (ATCA) was approved for the development of an agile and effective e-government in Iran. Under Article 40 of ATCA all executive bodies of government are required to design and implement a comprehensive knowledge management system within the next 2... 

    Temporal segmentation of traffic videos based on traffic phase discovery

    , Article Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, 25 April 2016 through 29 April 2016 ; 2016 , Pages 1197-1202 ; 9781509002238 (ISBN) Ahmadi, P ; Kaviani, R ; Gholampour, I ; Tabandeh, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In this paper, the topic model is adopted to learn traffic phases from video sequence. Phase detection is applied to determine where a video clip is in the traffic light sequence. Each video clip is labeled by a certain traffic phase, based on which, videos are segmented clip by clip. Using topic models, without any prior knowledge of the traffic rules, activities are detected as distributions over quantized optical flow vectors. Then, traffic phases are discovered as clusters over activities according to the traffic signals. We employ the Fully Sparse Topic Model (FSTM) as the topic model. The results show that our method can successfully discover both activities and traffic phases which... 

    Critic learning in multi agent credit assignment problem

    , Article Journal of Intelligent and Fuzzy Systems ; Volume 30, Issue 6 , 2016 , Pages 3465-3480 ; 10641246 (ISSN) Rahaie, Z ; Beigy, H ; Sharif University of Technology
    IOS Press  2016
    Abstract
    Multi-agent systems can be seen as an apparatus for testing the performance of real distributed systems. One problem encountered in multi-agent systems with the learning capability is credit assignment. This paper presents two methods for solving this problem. The first method assigns credit to the agents according to the history of the interaction while the second method assigns credit to the agents according to the knowledge of agents, and thus the shares of the agents are extracted from the feedback of the environment. The computer experiments show that critic learning has a positive impact in credit assignment problem  

    An efficient statistical zero-knowledge authentication protocol for smart cards

    , Article International Journal of Computer Mathematics ; Volume 93, Issue 3 , 2016 , Pages 453-481 ; 00207160 (ISSN) Dousti, M.S ; Jalili, R ; Sharif University of Technology
    Taylor and Francis Ltd  2016
    Abstract
    We construct an efficient statistical zero-knowledge authentication protocol for smart cards based on general assumptions. We show how it can be instantiated using lattice-based primitives, which are conjectured to be secure against quantum attacks. We illustrate the practicality of our protocol on smart cards in terms of storage, computation, communication, and round complexities. Furthermore, we compare it to other lattice-based authentication protocols, which are either zero-knowledge or have a similar structure. The comparison shows that our protocol improves the best previous protocol in several aspects  

    Pseudo-triangulating a simple polygon from its visibility graph

    , Article 2015 5th International Conference on Computer and Knowledge Engineering, ICCKE 2015, 29 October 2015 ; October , 2015 , Pages 106-111 ; 9781467392808 (ISBN) Emamy, Z. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Visibility graph of a simple polygon in a plain is a graph in which the number of its vertices corresponds with the number of vertices in the polygon and each of its edges corresponds with a pair of visible vertices in the polygon. Visibility graph reconstruction of a polygon is one of the old and important problems in computational geometry for which no algorithm has been offered yet. Considering that the problem of visibility graph reconstruction of a pseudo-triangle has been solved, we present an O(n2)-time algorithm for pseudo-triangulation of a simple polygon, using the visibility graph corresponding with the polygon (n is number of vertices of the polygon). To do so, first we present a... 

    Organizational secure knowledge flow model

    , Article 2015 7th Conference on Information and Knowledge Technology, IKT 2015, 26 May 2015 through 28 May 2015 ; May , 2015 , Page(s): 1 - 6 ; 9781467374859 (ISBN) Ghaem Tajgardoon, M ; Shalmani, M. T. M ; Habibi, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    With the advance and growth of knowledge management in the past two decades, currently knowledge is regarded as one of the most significant organizational assets. Today the success of businesses is dependent on the value that they give to knowledge and how they attempt to manage it. Hence, in such conditions, knowledge as a valuable asset of the organization must be well-protected. What is managed in knowledge management in organizations is actually not knowledge. What are managed are the knowledge-related processes thru which knowledge workers interact with each other. Hence, organizational knowledge protection does not mean protecting knowledge, but securing the management of knowledge and... 

    An efficient PD data mining method for power transformer defect models using SOM technique

    , Article International Journal of Electrical Power and Energy Systems ; Volume 71 , October , 2015 , Pages 373-382 ; 01420615 (ISSN) Darabad, V. P ; Vakilian, M ; Blackburn, T. R ; Phung, B. T ; Sharif University of Technology
    Elsevier Ltd  2015
    Abstract
    Suggestion and application of a set of new features for on-line Partial Discharge (PD) monitoring, where there is no information about the type of PD is a challenging task for condition assessment of power equipments, such as a power transformer. This is looked for in this paper. So far, in past various techniques have been employed to develop a comprehensive PD monitoring system, however limited success has been achieved. One of the challenging issues in this field is the discovering of proper features capable of differentiating the involvement of possible types of PD sources. In order to examine the efficiency of the method established in this paper, which is based on application of a set... 

    Lesson learned knowledge in project management

    , Article Science and Information Conference, SAI 2015, 28 July 2015 through 30 July 2015 ; July , 2015 , Pages 949-953 ; 9781479985470 (ISBN) Sepehri, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Every project is temporary and unique in nature. However, knowledge and lessons learned in projects may be used in other projects to improve the project management services. A learned lesson comes from past and current projects, captured through well-defined organizational processes. It aims to capture an essence of an experience which may be utilized to modify the project processes, or the situations for which that lesson applies. Although lessons learned is used in many industries and is an essential part of Project Management Body of Knowledge, no effective process has been defined to capture, validate, and reuse projects' lessons learned. A three stage system was developed and used to... 

    Commonsense knowledge extraction for persian language: a combinatory approach

    , Article Iranian Journal of Information Processing Management ; Volume 31, Issue 1 , 2015 , Pages 109-124 ; 22518223 (ISSN) Moradi, M ; Vazirnezhad, B ; Bahrani, M ; Sharif University of Technology
    Iranian Research Institute for Scientific Information and Documentation  2015
    Abstract
    The Putting human commonsense knowledge into computers has always been a long standing dream of artificial intelligence (AI). The cost of several tens of millions of dollars and time have been covered so that the computers could know about "objects falling, not rising.", "running is faster than walking". The large database was built, automated and semi-automated methods were introduced and volunteers' efforts were utilized to achieve this, but an automated, high-throughput and low-noise method for commonsense collection still remains as the holy grail of AI. The aim of this study was to build commonsense knowledge ontology using three approaches namely Hearst method, machine translation and... 

    Presenting an approach for conducting knowledge architecture within large-scale organizations

    , Article PLoS ONE ; Volume 10, Issue 5 , May , 2015 ; 19326203 (ISSN) Varaee, T ; Habibi, J ; Mohaghar, A ; Sharif University of Technology
    Public Library of Science  2015
    Abstract
    Knowledge architecture (KA) establishes the basic groundwork for the successful implementation of a short-term or long-term knowledge management (KM) program. An example of KA is the design of a prototype before a new vehicle is manufactured. Due to a transformation to large-scale organizations, the traditional architecture of organizations is undergoing fundamental changes. This paper explores the main strengths and weaknesses in the field of KA within large-scale organizations and provides a suitable methodology and supervising framework to overcome specific limitations. This objective was achieved by applying and updating the concepts from the Zachman information architectural framework...