Loading...
Search for: knowledge
0.011 seconds
Total 299 records

    Unilateral semi-supervised learning of extended hidden vector state for Persian language understanding

    , Article NLP-KE 2011 - Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 27 November 2011 through 29 November 2011, Tokushima ; 2011 , Pages 165-168 ; 9781612847283 (ISBN) Jabbari, F ; Sameti, H ; Bokaei, M. H ; Chinese Association for Artificial Intelligence; IEEE Signal Processing Society ; Sharif University of Technology
    2011
    Abstract
    The key element of a spoken dialogue system is Spoken Language Understanding (SLU) part. HVS and EHVS are two most popular statistical methods employed to implement the SLU part which need lightly annotated data. Since annotation is a time consuming, we present a novel semi-supervised learning for EHVS to reduce the human labeling effort using two different statistical classifiers, SVM and KNN. Experiments are done on a Persian corpus, the University Information Kiosk corpus. The experimental results show improvements in performance of semi-supervised EHVS, trained by both labeled and unlabeled data, compared to EHVS trained by just initially labeled data. The performance of EHVS improves... 

    Towards a holistic view of humanities

    , Article International Journal of the Humanities ; Volume 9, Issue 5 , 2011 , Pages 247-256 ; 14479508 (ISSN) Khosravizadeh, P ; Gohari, O ; Gohari, N ; Ghaziani, G ; Sharif University of Technology
    Abstract
    The paper investigates the deep structure of the human mind by analyzing multiple intelligences theory. Regarding serious critiques proposed by a number of cognitive neuroscientists, psychologists, philosophers, and educational theorists (i.e. Sternberg 1983, 1991; Eysenck 1994; Scarr 1985; Klein 1998; Demetriou and Kazi 2006; Demetriou, Mouyi, and Spanoudis 2010, among others), it seems that the different types of intelligence introduced by Gardner (1983) have a shared feature. The authors believe that this particular shared feature can be counted as the key point of the underlying system of human knowledge. Since human cognition may be analyzed by means of universal structures of the mind,... 

    An anomaly-based botnet detection approach for identifying stealthy botnets

    , Article ICCAIE 2011 - 2011 IEEE Conference on Computer Applications and Industrial Electronics ; 2011 , Pages 564-569 ; 9781457720581 (ISBN) Arshad, S ; Abbaspour, M ; Kharrazi, M ; Sanatkar, H ; IEEE Malaysia; IEEE Malaysia Power Electron. (PEL)/; Ind. Electron. (IE)/Ind. Appl. (IA) Jt. Chapter; IEEE Engineering in Medicine and; Biology Malaysia Chapter ; Sharif University of Technology
    Abstract
    Botnets (networks of compromised computers) are often used for malicious activities such as spam, click fraud, identity theft, phishing, and distributed denial of service (DDoS) attacks. Most of previous researches have introduced fully or partially signature-based botnet detection approaches. In this paper, we propose a fully anomaly-based approach that requires no a priori knowledge of bot signatures, botnet C&C protocols, and C&C server addresses. We start from inherent characteristics of botnets. Bots connect to the C&C channel and execute the received commands. Bots belonging to the same botnet receive the same commands that causes them having similar netflows characteristics and... 

    DNE: A method for extracting cascaded diffusion networks from social networks

    , Article Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011, 9 October 2011 through 11 October 2011 ; October , 2011 , Pages 41-48 ; 9780769545783 (ISBN) Eslami, M ; Rabiee, H. R ; Salehi, M ; Sharif University of Technology
    2011
    Abstract
    The spread of information cascades over social networks forms the diffusion networks. The latent structure of diffusion networks makes the problem of extracting diffusion links difficult. As observing the sources of information is not usually possible, the only available prior knowledge is the infection times of individuals. We confront these challenges by proposing a new method called DNE to extract the diffusion networks by using the time-series data. We model the diffusion process on information networks as a Markov random walk process and develop an algorithm to discover the most probable diffusion links. We validate our model on both synthetic and real data and show the low dependency... 

    New ensemble method for classification of data streams

    , Article 2011 1st International eConference on Computer and Knowledge Engineering, ICCKE 2011, Mashhad, 13 October 2011 through 14 October 2011 ; 2011 , Pages 264-269 ; 9781467357135 (ISBN) Sobhani, P ; Beigy, H ; Sharif University of Technology
    Abstract
    Classification of data streams has become an important area of data mining, as the number of applications facing these challenges increases. In this paper, we propose a new ensemble learning method for data stream classification in presence of concept drift. Our method is capable of detecting changes and adapting to new concepts which appears in the stream  

    Incorporating a novel confidence scoring method in a Persian spoken dialogue system

    , Article SPA 2011 - Signal Processing: Algorithms, Architectures, Arrangements, and Applications - Conference Proceedings, 29 September 2011 through 30 September 2011, Poznan ; September , 2011 , Pages 74-78 ; 9781457714863 (ISBN) Sakhaee, E ; Sameti, H ; Babaali, B ; Sharif University of Technology
    2011
    Abstract
    Reliability assessment of phonemes, syllabi, words, concepts or utterances has become the key feature of Automatic Speech Recognition (ASR) engines in order to make a decision to accept or reject a hypothesis. In this paper, we propose utterance-level confidence annotation based on combination of features extracted from multiple knowledge sources in Persian language. The experiment was conducted first to examine the performance of individual features, then to combine them using statistical data analysis and density estimation methods to assign a confidence score to utterances. Using the data collected from a Persian spoken dialogue system, we show that combining features from independent... 

    Beyond the cut-set bound: Uncertainty computations in network coding with correlated sources

    , Article IEEE International Symposium on Information Theory - Proceedings, 31 July 2011 through 5 August 2011 ; July , 2011 , Pages 598-602 ; 21578104 (ISSN) ; 9781457705953 (ISBN) Gohari, A. A ; Yang, S ; Jaggi, S ; Sharif University of Technology
    2011
    Abstract
    Cut-set bounds on achievable rates for network communication protocols are not in general tight. In this paper we introduce a new technique for proving converses for the problem of transmission of correlated sources in networks, that results in bounds that are tighter than the corresponding cut-set bounds. We also define the concept of "uncertainty region" which might be of independent interest. We provide a full characterization of this region for the case of two correlated random variables. The bounding technique works as follows: on one hand we show that if the communication problem is solvable, the uncertainty of certain random variables in the network with respect to imaginary parties... 

    A simultaneous method for phase identification and equilibrium calculations in reactive mixtures

    , Article Chemical Engineering Research and Design ; Volume 89, Issue 10 , 2011 , Pages 1901-1908 ; 02638762 (ISSN) Avami, A ; Saboohi, Y ; Sharif University of Technology
    Abstract
    Phase identification is an important aspect of flash calculations which can affect the phase and chemical equilibria. A new simultaneous approach for reactive mixtures, based on τ-method which relies on modification equation for mole fraction summation, is introduced in this paper. In the proposed methodology, phase identification and solution of governing equations can be performed simultaneously and effectively. In addition, prior knowledge of the number of phases in advance is not required. Present methodology has been verified with the help of case studies and results are discussed in the present paper. The results indicate that the present method gives us information about presence of... 

    LAYMOD; a layered and modular platform for CAx collaboration management and supporting product data integration based on STEP standard

    , Article World Academy of Science, Engineering and Technology ; Volume 78 , 2011 , Pages 625-633 ; 2010376X (ISSN) Valilai, O. F ; Houshmand, M ; Sharif University of Technology
    2011
    Abstract
    Nowadays companies strive to survive in a competitive global environment. To speed up product development/modifications, it is suggested to adopt a collaborative product development approach. However, despite the advantages of new IT improvements still many CAx systems work separately and locally. Collaborative design and manufacture requires a product information model that supports related CAx product data models. To solve this problem many solutions are proposed, which the most successful one is adopting the STEP standard as a product data model to develop a collaborative CAx platform. However, the improvement of the STEP's Application Protocols (APs) over the time, huge number of STEP... 

    Web 1.0 to web 3.0 evolution: Reviewing the impacts on tourism development and opportunities

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7 September 2010 through 8 September 2010, Brescello ; Volume 6529 LNCS , 2011 , Pages 184-193 ; 03029743 (ISSN) ; 9783642183478 (ISBN) Eftekhari, M. H ; Barzegar, Z ; Isaai, M. T ; Sharif University of Technology
    Abstract
    The most important event following the establishmenet of the Internet network was the Web introduced by Tim Berners-Lee. Websites give their owners features that allow sharing with which they can publish their content with users and visitors. In the last 5 years, we have seen some changes in the use of web. Users want to participate in content sharing and they like to interact with each other. This is known as Web 2.0. In the last year, Web 2.0 has reached maturity and now we need a smart web which will be accordingly be called Web 3.0. Web 3.0 is based on semantic web definition. Changing the way of using the web has had a clear impact on E-Tourism and its development and also on business... 

    Pseudo-triangulating a simple polygon from its visibility graph

    , Article 2015 5th International Conference on Computer and Knowledge Engineering, ICCKE 2015, 29 October 2015 ; October , 2015 , Pages 106-111 ; 9781467392808 (ISBN) Emamy, Z. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Visibility graph of a simple polygon in a plain is a graph in which the number of its vertices corresponds with the number of vertices in the polygon and each of its edges corresponds with a pair of visible vertices in the polygon. Visibility graph reconstruction of a polygon is one of the old and important problems in computational geometry for which no algorithm has been offered yet. Considering that the problem of visibility graph reconstruction of a pseudo-triangle has been solved, we present an O(n2)-time algorithm for pseudo-triangulation of a simple polygon, using the visibility graph corresponding with the polygon (n is number of vertices of the polygon). To do so, first we present a... 

    Knowledge Management Application in Developing Marketing Management

    , M.Sc. Thesis Sharif University of Technology Ravanbakhsh, Ramak (Author) ; Shavandi, Hassan (Supervisor)
    Abstract
    In recent years the advent of internet and web has transformed the process of data collection and make organizational and environmental data more accessible. On the one hand, many organizations have realized that the knowledge in these huge databases is key to supporting the various organizational decisions. Particularly, the knowledge about customers from these databases is critical for the marketing function. But, much of this useful knowledge is hidden and untapped. On the other hand, the intense competition and increased choices available for customers have created new pressures on marketing decision-makers and there has emerged a need to manage customers in a long-term relationship.... 

    Understanding Consumer Knowledge of Product

    , M.Sc. Thesis Sharif University of Technology Yazdani, Elham (Author) ; Modares Yazdi, Abdolhamid (Supervisor)
    Abstract
    Human beings have always been tried to make new, innovative things to benefit from. The new things have been improved from a wheel to a smart car and the benefits have been improved from survival to survival plus fitness, happiness, sense of belonging, security and etc. Companies which have been following the human nature, and thinking of new, innovative products and consumers’ benefits cohesively, could gain competitive advantages. But the process of new product development has always been costly and due to the high failure rate it is risky. One of the main challenges in NPD projects is understanding consumer's behavior. Most companies try to identify consumer's needs by knowledge... 

    The Evaluation of Application of Unfolding Model of Turnover to Explain the Turnover of Knowledge Workers in Some Iranian Software Companies

    , M.Sc. Thesis Sharif University of Technology Rahdari, Hossein (Author) ; Alavi, Babak (Supervisor)
    Abstract
    Voluntary turnover has direct and indirect expenses for organizations and for this purpose; it has one of the richest literatures in academic works. Due to the especial role of knowledge workers in organizations, these expenses in knowledge-based organizations are more important and more costly than that of other organizations. One of the latest theories in the field of voluntarily turnover was introduced by Lee and Mitchell (1994) that was named “Unfolding Model of Turnover” to describe the process of decision of voluntary turnover. This theory is distinguished from its similar theories from two main aspects: First, they introduced new elements like shock. Second, they introduced... 

    An Integrated Methodology for Business Process Reengineering In Project-Based Organizations

    , M.Sc. Thesis Sharif University of Technology Nouri, Saeed (Author) ; Najmi, Manouchehr (Supervisor)
    Abstract
    The Study of antecedents and considering the status of Project-Based Organizations (PBOs) in our country such as MSA, Azarab, Sadad Machine, etc indicates that they are facing lots of problems in different aspects. This bad situation is in a way that amendment of part of sections guarantees the continuity of bad performance of these companies and we have to apply Business Process Reengineering and establishing a radical change in these firms. So the present research according to managers and experts opinions, several year observations of the writer and review of the literature of BPR, Project Management (PMBOK) and PBOs; and based on a library research, introduces the processes of PBOs in 3... 

    Organizational Learning Measurement in Organizational Processes: A Case Study in Assessing Learning in New Product Development in System Group Co.

    , M.Sc. Thesis Sharif University of Technology Borna, Behnam (Author) ; Mashayekhi, Alinaghi (Supervisor)
    Abstract
    Organizational learning is essential for organizations to grow and survive. Organizations can gain competitive advantage through proper organizational learning. Number of studies in this field in recent years shows the importance of this issue among practioners and academics. The first step in managing organzaitonal learning is its measurement. Organizations can be provided with solutions if an appropriate measurement tool is designed. The main question of this research is whether this tool can be designed or not so that organizational learning in organizational processes can be measured. Despite the significance of organizational learning measurement, the current studies in this field lack... 

    A Methology for Implementing ITIL V3 based on PMBOK

    , M.Sc. Thesis Sharif University of Technology Haji Hosseini, Hamid Reza (Author) ; Shadrokh, Shahram (Supervisor)
    Abstract
    PMBOK is a standard that is the subset of Project Management Knowledge and includes all areas. ITIL is a framework that allows IT organizations using best practices in IT Service Management. Both of them includes some process that during implementation and execution should act based on them. The goal of developing a methodology for implementing ITIL V3 based on PMBOK is executing a comparison mapping for connecting these two difference fields. IT managers know about ITIL implementation, but most of project managers are not familiar about it. If we guess that implementing ITIL V3 is a project, a project manager can do it based on PMBOK. With mapping these two fields, project managers are able... 

    Case Study of Absorption Capacity Growth Mechnisms in Farab and Bootan

    , M.Sc. Thesis Sharif University of Technology Izadi, Fereydoon (Author) ; Mashayekhi, Ali Naghi (Supervisor)
    Abstract
    In this study; technology transfer to the Farab and Butan fromabsorptive capacity perspective is under inquiry. First we have complete literature review until we can provide good understanding toward absorptive capacity concept in organizational level. George and Zahra model has been chosen as a base model. Farab and Butan have chosen because of their recent successes in knowledge transfer. Based on George and Zahra model we develop a semi-structured questionnair and run it in Farab and Butan. We have findings in how organization can transfer knowledge to their networks to increase their AC, also we have findings in different ways organizations transfer different kinds of knowledge  

    An Improvement to Statistical Zero-Knowledge Security Protocols

    , M.Sc. Thesis Sharif University of Technology Boorghany Farahany, Ahmad (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    In this thesis, we present a new identification protocol which is based on lattice problems. Lattice-based cryptographic algorithms are, in general, faster than those based on number theory. Moreover, instead of algorithms based on number theory problems, such as Factoring and Discrete Logarithm, lattice-based ones are resistant against quantum computers. In addition, lattice problems have worst-case/average-case hardness relation; so become suitable choices for cryptographic purposes. However, there are few lattice-based identification protocols which are efficient. The protocol introduced in this thesis, is statistical zero-knowledge which means no verifier, even computationally unbounded... 

    A Study on the Effect of Multi-domain Mental Conceptual Network on Metaphorical Creativity

    , M.Sc. Thesis Sharif University of Technology Sheikhzadeh, Maral (Author) ; Khosravizadeh, Parvaneh (Supervisor)
    Abstract
    This thesis was an attempt to find the effect of having multi-domain conceptual network on metaphorical creativity. The purpose of this research was to answer the following question: By extending and expanding the mental conceptual network, could one increase their potential creativity; In other words, is expansion of the mental conceptual network one of the parameters of creativity or not.To answer this question, a questionnaire and a test were developped. Through the questionnaire, we divided the sample group into the test and control groups. And the test indicated how creative each individual is.There were three different ways the sample group was divided. The criteria for dividing the...