Loading...
Search for: standardization
0.008 seconds
Total 561 records

    Permissible emission limit estimation via iterative back-calculation: Case of Assaluyeh energy zone, southern Iran

    , Article Integrated Environmental Assessment and Management ; Volume 14, Issue 1 , 2018 , Pages 130-138 ; 15513793 (ISSN) Khajehpour, H ; Saboohi, Y ; Tsatsaronis, G ; Sharif University of Technology
    Wiley-Blackwell  2018
    Abstract
    In the present research work, an environmental policy procedure for setting a cap on emissions, as a crucial step in any total emission control system, has been provided and evaluated. It is shown that general regulations on emission intensities and rates do not guarantee that ambient air quality standards are met in intense industrial zones. Local emission limits are necessary to meet ambient air quality standards in these zones. To that end, we used dispersion simulators to back-calculate pollutant concentration thresholds for a large and intense energy system in the Assaluyeh region of southern Iran. Verified modeling results indicate 218 d of pollutant concentration threshold exceedance... 

    Impossible differential attack on seven-round AES-128

    , Article IET Information Security ; Volume 2, Issue 2 , 2008 , Pages 28-32 ; 17518709 (ISSN) Bahrak, B ; Aref, M. R ; Sharif University of Technology
    2008
    Abstract
    A specific class of differential cryptanalytic approach, named as impossible differential attack, has been successfully applied to several symmetric cryptographic primitives in particular encryption schemes such as Advanced Encryption Standard (AES). Such attacks exploit differences that are impossible at some intermediate state of the cipher algorithm. The best-known impossible differential attack against AES-128 has applied to six rounds. An attack on AES-128 up to seven rounds is proposed. The proposed attack requires 2115.5 chosen plaintexts and 2109 bytes of memory and performs 2119 seven-round AES encryptions. This is also the best-known attack on a reduced version of the AES-128 till... 

    Error resilient source coding for video communication

    , Article 2007 IEEE 15th Signal Processing and Communications Applications, SIU, Eskisehir, 11 June 2007 through 13 June 2007 ; 2007 ; 1424407192 (ISBN); 9781424407194 (ISBN) Ajorloo, H ; Lakdashti, A ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2007
    Abstract
    A novel error resilient source coding method is proposed for video codecs such as H.264 standard. The main idea is to develop an error resilient part similar to the channel coders at the source coder. This enables the receiver to recover a damaged slice of a frame, inter or intra coded, up to a certain size determined by the encoder. In contrast to another previously approach presented in the literature, our algorithm has significantly less artifacts on the video frames with a considerable increase in speed  

    A generalized method of differential fault attack against AES cryptosystem

    , Article 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2006, Yokohama, 10 October 2006 through 13 October 2006 ; Volume 4249 LNCS , 2006 , Pages 91-100 ; 03029743 (ISSN); 3540465596 (ISBN); 9783540465591 (ISBN) Moradi, A ; Manzuri Shalmani, M. T ; Salmasizadeh, M ; Sharif University of Technology
    Springer Verlag  2006
    Abstract
    In this paper we describe two differential fault attack techniques against Advanced Encryption Standard (AES). We propose two models for fault occurrence; we could find all 128 bits of key using one of them and only 6 faulty ciphertexts. We need approximately 1500 faulty ciphertexts to discover the key with the other fault model. Union of these models covers all faults that can occur in the 9th round of encryption algorithm of AES-128 cryptosystem, One of main advantage of proposed fault models is that any fault in the AES encryption from start (AddRoundKey with the main key before the first round) to MixColumns function of 9th round can be modeled with one of our fault models. These models... 

    A comparative evaluation of DECT, PACS, and PHS standards for wireless local loop applications

    , Article IEEE Communications Magazine ; Volume 39, Issue 5 , 2001 , Pages 156-163 ; 01636804 (ISSN) Momtahan, O ; Hashemi, H ; Sharif University of Technology
    2001
    Abstract
    In a comparative analysis performance and capacity of DECT, PACS, and PHS for wireless local loop applications have been investigated. This article reports the results of both qualitative and quantitative analyses. The qualitative evaluation consists of a detailed comparison of the parameters of each standard and their relevance in WLL applications. In the quantitative analysis detailed simulations were performed covering diverse sets of conditions. The results of both types of analysis are presented. A major conclusion is that all three standards provide satisfactory performance for WLL applications. For low traffic environments PACS, which can employ larger cells, performs better than the... 

    Comparative evaluation of DECT, PACS, and PHS standards for wireless local loop applications

    , Article IEEE Personal Communications ; Volume 7, Issue 3 , 2000 , Pages 35-41 ; 10709916 (ISSN) Momtahan, O ; Hashemi, H ; Sharif University of Technology
    2000
    Abstract
    In a comparative analysis performance and capacity of DECT, PACS, and PHS for WLL applications have been investigated. This article reports the results of both qualitative and quantitative analysis. The qualitative evaluation consists of a detailed comparison of the parameters of each standard and their relevance in WLL applications. In the quantitative analysis detailed simulations have been performed covering diversified sets of conditions. The results of both types of analysis are presented. A major conclusion is that all three standards provide satisfactory performance for WLL applications. For low-traffic environments PACS, which can employ larger cells, performs better than the other... 

    Feasibility Study of WIMAX in Access Network

    , M.Sc. Thesis Sharif University of Technology Hatami, Parastou (Author) ; Safaieh, Mohammad Reza (Supervisor)
    Abstract
    Nowadays in Iran service providers, are using copper lines in access networks. They rent these lines from a governmental telecommunication company during a complicated and time consuming process. In this thesis, the most common access technologies have been analyzed in order to find an alternative solution for copper lines. Based on the studies in this thesis, it is clear that Wimax technology can be an appropriate solution comparing with Wi-Fi and 3G from the point of quality and speed. The UNIDO methodology has been used in this economical assessment (feasibility study). In this methodology, all the running and fixed costs and revenue as well, have been estimated. In the next step,... 

    WiMAX-Based Passive Radar Systems

    , M.Sc. Thesis Sharif University of Technology Ghandehari, Mohammad (Author) ; Bastani, Mohammad Hasan (Supervisor) ; Behnia, Fereidoon (Co-Advisor)
    Abstract
    Passive radars using illuminators of opportunity have attracted much attention in recent years. The worldwide inter-operability for microwave access (WiMAX) signal is a new illumination source for passive radar. This paper presents a study to understand and to demonstrate the feasibility of using WiMAX signals for passive radar. The study includes WiMAX signal analysis, the design and implementation of a WiMAX-based passive radar demonstrator, the associated radar signal processing scheme, and some approaches to yield an effective removal of the undesired peaks in WiMAX ACF  

    Probing theoretical level effect on fluorine chemical shielding calculations

    , Article Concepts in Magnetic Resonance Part A: Bridging Education and Research ; Volume 42, Issue 4 , 2013 , Pages 140-153 ; 15466086 (ISSN) Ebrahimi, H. P ; Tafazzoli, M ; Sharif University of Technology
    2013
    Abstract
    The extensive quantum-chemical calculations are assessed for prediction of the 19F nuclear magnetic shielding constants. The methods within domain of density functional theory (DFT) and ab initio, Hartree-Fock (HF), and second-order Møller-Plesset perturbation theory (MP2) are employed for calculation of the 19F chemical shielding constants for a series of 30 small fluorine-containing molecules. The importance of inclusion of four factors, namely, electron correlation treatment, triple-ξ valence shell, diffuse function, and polarization function on calculating the fluorine NMR chemical shieldings for a variety of Pople's standard basis sets at gauge invariant atomic orbital (GIAO) and... 

    An approach to evaluation of 19F-NMR chemical shifts via basis functions analysis in fluorinated small compounds

    , Article Concepts in Magnetic Resonance Part A: Bridging Education and Research ; Volume 40 A, Issue 4 , 2012 , Pages 192-204 ; 15466086 (ISSN) Ebrahimi, H. P ; Tafazzoli, M ; Sharif University of Technology
    Wiley  2012
    Abstract
    An extensive GIAO (gauge-including atomic orbital) calculation has been made within Hartree-Fock (HF), density functional theory (DFT) and second-order Møller-Plesset perturbation theory (MP2), in conjunction with selected basis sets for the prediction of 19F chemical shift values of 26 different F nuclei in small fluorine-containing molecules. The effect of four factors, namely, electron correlation treatment, triple-ξ valence shell, diffuse function and polarization function were assessed using a systematic comparison of the results. Based on types of series, the optimized wave functions were proposed for different molecules. An additional comparison of the principal components of the... 

    Observation of a new Ξ b baryon

    , Article Physical Review Letters ; Volume 108, Issue 25 , 2012 ; 00319007 (ISSN) Chatrchyan, S ; Khachatryan, V ; Sirunyan, A. M ; Tumasyan, A ; Adam, W ; Bergauer, T ; Dragicevic, M ; Erö, J ; Fabjan, C ; Friedl, M ; Frühwirth, R ; Ghete, V. M ; Hammer, J ; Hörmann, N ; Hrubec, J ; Jeitler, M ; Kiesenhofer, W ; Knünz, V ; Krammer, M ; Liko, D ; Mikulec, I ; Pernicka, M ; Rahbaran, B ; Rohringer, C ; Rohringer, H ; Schöfbeck, R ; Strauss, J ; Taurok, A ; Wagner, P ; Waltenberger, W ; Walzel, G ; Widl, E ; Wulz, C. E ; Mossolov, V ; Shumeiko, N ; Suarez Gonzalez, J ; Bansal, S ; Cornelis, T ; De Wolf, E. A ; Janssen, X ; Luyckx, S ; Maes, T ; Mucibello, L ; Ochesanu, S ; Roland, B ; Rougny, R ; Selvaggi, M ; Staykova, Z ; Van Haevermaet, H ; Van Mechelen, P ; Van Remortel, N ; Van Spilbeeck, A ; Blekman, F ; Blyweert, S ; D'hondt, J ; Gonzalez Suarez, R ; Kalogeropoulos, A ; Maes, M ; Olbrechts, A ; Van Doninck, W ; Van Mulders, P ; Van Onsem, G.P ; Villella, I ; Charaf, O ; Clerbaux, B ; De Lentdecker, G ; Dero, V ; Gay, A. P. R ; Hreus, T ; Léonard, A ; Marage, P. E ; Reis, T ; Thomas, L ; Vander Velde, C ; Vanlaer, P ; Wang, J ; Adler, V ; Beernaert, K ; Cimmino, A ; Costantini, S ; Garcia, G ; Grunewald, M ; Klein, B ; Lellouch, J ; Marinov, A ; Mccartin, J ; Ocampo Rios, A. A ; Ryckbosch, D ; Strobbe, N ; Thyssen, F ; Tytgat, M ; Vanelderen, L ; Verwilligen, P ; Walsh, S ; Yazgan, E ; Zaganidis, N ; Basegmez, S ; Bruno, G ; Castello, R ; Ceard, L ; Delaere, C ; Du Pree, T ; Favart, D ; Forthomme, L ; Giammanco, A ; Hollar, J ; Lemaitre, V ; Liao, J ; Militaru, O ; Nuttens, C ; Pagano, D ; Pin, A ; Piotrzkowski, K ; Schul, N ; Vizan Garcia, J. M ; Beliy, N ; Caebergs, T ; Daubie, E ; Hammad, G. H ; Alves, G. A ; Correa Martins Junior, M ; De Jesus Damiao, D ; Martins, T ; Pol, M. E ; Souza, M. H. G ; Aldá Júnior, W. L ; Carvalho, W ; Custódio, A ; Da Costa, E. M ; De Oliveira Martins, C ; Fonseca De Souza, S ; Matos Figueiredo, D ; Mundim, L ; Nogima, H ; Oguri, V ; Prado Da Silva, W. L ; Santoro, A ; Soares Jorge, L ; Sznajder, A ; Bernardes, C. A ; Dias, F. A ; Fernandez Perez Tomei, T. R ; Gregores, E. M ; Lagana, C ; Marinho, F ; Mercadante, P. G ; Novaes, S. F ; Padula, S. S ; Genchev, V ; Iaydjiev, P ; Piperov, S ; Rodozov, M ; Stoykova, S ; Sultanov, G ; Tcholakov, V ; Trayanov, R ; Vutova, M ; Dimitrov, A ; Hadjiiska, R ; Kozhuharov, V ; Litov, L ; Pavlov, B ; Petkov, P ; Bian, J. G ; Chen, G. M ; Chen, H. S ; Jiang, C. H ; Liang, D ; Liang, S ; Meng, X ; Tao, J ; Wang, J ; Wang, X ; Wang, Z ; Xiao, H ; Xu, M ; Zang, J ; Zhang, Z ; Asawatangtrakuldee, C ; Ban, Y ; Guo, S ; Guo, Y ; Li, W ; Liu, S ; Mao, Y ; Qian, S. J ; Teng, H ; Wang, S ; Zhu, B ; Zou, W ; Avila, C ; Gomez, J. P ; Gomez Moreno, B ; Osorio Oliveros, A. F ; Sanabria, J. C ; Godinovic, N ; Lelas, D ; Plestina, R ; Polic, D ; Puljak, I ; Antunovic, Z ; Kovac, M ; Brigljevic, V ; Duric, S ; Kadija, K ; Luetic, J ; Morovic, S ; Attikis, A ; Galanti, M ; Mavromanolakis, G ; Mousa, J ; Nicolaou, C ; Ptochos, F ; Razis, P. A ; Finger, M ; Finger, M ; Assran, Y ; Elgammal, S ; Ellithi Kamel, A ; Khalil, S ; Mahmoud, M. A ; Radi, A ; Kadastik, M ; Müntel, M ; Raidal, M ; Rebane, L ; Tiko, A ; Azzolini, V ; Eerola, P ; Fedi, G ; Voutilainen, M ; Härkönen, J ; Heikkinen, A ; Karimäki, V ; Kinnunen, R ; Kortelainen, M. J ; Lampén, T ; Lassila-Perini, K ; Lehti, S ; Lindén, T ; Luukka, P ; Mäenpää, T ; Peltola, T ; Tuominen, E ; Tuominiemi, J ; Tuovinen, E ; Ungaro, D ; Wendland, L ; Banzuzi, K ; Karjalainen, A ; Korpela, A ; Tuuva, T ; Besancon, M ; Choudhury, S ; Dejardin, M ; Denegri, D ; Fabbro, B ; Faure, J. L ; Ferri, F ; Ganjour, S ; Givernaud, A ; Gras, P ; Hamel De Monchenault, G ; Jarry, P ; Locci, E ; Malcles, J ; Millischer, L ; Nayak, A ; Rander, J ; Rosowsky, A ; Shreyber, I ; Titov, M ; Baffioni, S ; Beaudette, F ; Benhabib, L ; Bianchini, L ; Bluj, M ; Broutin, C ; Busson, P ; Charlot, C ; Daci, N ; Dahms, T ; Dobrzynski, L ; Granier De Cassagnac, R ; Haguenauer, M ; Miné, P ; Mironov, C ; Nguyen, M ; Ochando, C ; Paganini, P ; Sabes, D ; Salerno, R ; Sirois, Y ; Veelken, C ; Zabi, A ; Agram, J. L ; Andrea, J ; Bloch, D ; Bodin, D ; Brom, J. M ; Cardaci, M ; Chabert, E. C ; Collard, C ; Conte, E ; Drouhin, F ; Ferro, C ; Fontaine, J. C ; Gelé, D ; Goerlach, U ; Juillot, P ; Le Bihan, A. C ; Van Hove, P ; Fassi, F ; Mercier, D ; Beauceron, S ; Beaupere, N ; Bondu, O ; Boudoul, G ; Brun, H ; Chasserat, J ; Chierici, R ; Contardo, D ; Depasse, P ; El Mamouni, H ; Fay, J ; Gascon, S ; Gouzevitch, M ; Ille, B ; Kurca, T ; Lethuillier, M ; Mirabito, L ; Perries, S ; Sordini, V ; Tosi, S ; Tschudi, Y ; Verdier, P ; Viret, S ; Tsamalaidze, Z ; Anagnostou, G ; Beranek, S ; Edelhoff, M ; Feld, L ; Heracleous, N ; Hindrichs, O ; Jussen, R ; Klein, K ; Merz, J ; Ostapchuk, A ; Perieanu, A ; Raupach, F ; Sammet, J ; Schael, S ; Sprenger, D ; Weber, H ; Wittmer, B ; Zhukov, V ; Ata, M ; Caudron, J ; Dietz-Laursonn, E ; Erdmann, M ; Güth, A ; Hebbeker, T ; Heidemann, C ; Hoepfner, K ; Klingebiel, D ; Kreuzer, P ; Lingemann, J ; Magass, C ; Merschmeyer, M ; Meyer, A ; Olschewski, M ; Papacz, P ; Pieta, H ; Reithler, H ; Schmitz, S. A ; Sonnenschein, L ; Steggemann, J ; Teyssier, D ; Weber, M ; Bontenackels, M ; Cherepanov, V ; Flügge, G ; Geenen, H ; Geisler, M ; Haj Ahmad, W ; Hoehle, F ; Kargoll, B ; Kress, T ; Kuessel, Y ; Nowack, A ; Perchalla, L ; Pooth, O ; Rennefeld, J ; Sauerland, P ; Stahl, A ; Aldaya Martin, M ; Behr, J ; Behrenhoff, W ; Behrens, U ; Bergholz, M ; Sharif University of Technology
    2012
    Abstract
    The observation of a new b baryon via its strong decay into Ξb-π + (plus charge conjugates) is reported. The measurement uses a data sample of pp collisions at √s=7TeV collected by the CMS experiment at the LHC, corresponding to an integrated luminosity of 5.3fb -1. The known Ξb- baryon is reconstructed via the decay chain Ξb-→J/ψΞ -→μ +μ -Λ0π -, with Λ0→pπ -. A peak is observed in the distribution of the difference between the mass of the Ξb-π + system and the sum of the masses of the Ξb- and π +, with a significance exceeding 5 standard deviations. The mass difference of the peak is 14.84±0.74(stat)±0.28(syst)MeV. The new state most likely corresponds to the JP=3/2 + companion of the Ξ b  

    Gauge invariant atomic orbital-density functional theory prediction of accurate gas phase 1H and 13C NMR chemical shifts

    , Article Concepts in Magnetic Resonance Part A: Bridging Education and Research ; Volume 38 A, Issue 6 , 2011 , Pages 269-279 ; 15466086 (ISSN) Ebrahimi, H. P ; Shaghaghi, H ; Tafazzoli, M ; Sharif University of Technology
    Abstract
    Hartree-Fock and density functional theory methods at gauge invariant atomic orbital approach with different simplest basis sets were employed for the computation of chemical shifts. The wave functions for calculating gas-phase 1H and 13C chemical shifts have been optimally selected using empirical models. The effects of electron correlation treatment, triple-ξ valance shell, diffuse function, and polarization function on calculated chemical shifts have been discussed. Through empirical scaling of shielding, accurate predictions of 1H chemical shifts are achieved for the molecules studied, when considering small Pople basis sets. Gas phase experimental 1H chemical shifts in alcohols, amines... 

    Modelling and improvement of non-standard queuing systems: A gas station case study

    , Article International Journal of Applied Decision Sciences ; Volume 4, Issue 4 , 2011 , Pages 324-340 ; 17558077 (ISSN) Teimoury, E ; Yazdi, M. M ; Haddadi, M ; Fathi, M ; Sharif University of Technology
    Abstract
    This research has modelled a queuing system with no standard states. In order to analyse these systems, some parameters such as the mean of waiting time and the length of queue are computed. These situations usually occur when there is delay in the service, for example, in the gas queuing system that cars are unable to leave after receiving the required services due to the presence of other cars in front of them. These kinds of non-standard queuing systems are usually applied to the assembly and production lines. In this paper, a queuing model for the special non-standard state queuing system is developed to be used in gas stations. The proposed model is implemented in fuel stations in Iran... 

    Structure formation in f(R) gravity: A distinguishing probe between the dark energy and modified gravity

    , Article Journal of Cosmology and Astroparticle Physics ; Volume 2010, Issue 12 , 2010 ; 14757516 (ISSN) Baghram, S ; Rahvar, S ; Sharif University of Technology
    2010
    Abstract
    In this work, we study the large scale structure formation in the modified gravity in the framework of Palatini formalism and compare the results with the equivalent smooth dark energy models as a tool to distinguish between these models. Through the inverse method, we reconstruct the dynamics of universe, modified gravity action and the structure formation indicators like the screened mass function and gravitational slip parameter. Consequently, we extract the matter density power spectrum for these two models in the linear regime and show that the modified gravity and dark energy models predictions are slightly different from each other at large scales. It is also shown that the growth... 

    Analysis of the downlink saturation throughput of an asymmetric IEEE 802.11n-based WLAN

    , Article 2016 IEEE International Conference on Communications, ICC 2016, 22 May 2016 through 27 May 2016 ; 2016 ; 9781479966646 (ISBN) Soleymani, M ; Maham, B ; Ashtiani, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Frame aggregation (FA) mechanisms improve the throughput of WLANs. In this paper, the effect of the FA mechanism on the throughput of wireless local area networks (WLANs) has been investigated. To this end, we propose an analytical model in order to analyze an IEEE 802.11n network comprised of an access point (AP) and several conventional nodes (CNs), all in the coverage area of each other. With respect to the heavier download traffic compared to the upload one, in our scenario, only the AP uses an FA mechanism and the other nodes use the basic IEEE 802.11 standard. In our proposed analytical model, the maximum downlink (DL) throughput is derived. Regarding the asymmetry among nodes, our... 

    A new trust-region method for solving systems of equalities and inequalities

    , Article Computational and Applied Mathematics ; Volume 36, Issue 1 , 2017 , Pages 769-790 ; 01018205 (ISSN) Saeidian, Z ; Peyghami, M. R ; Habibi, M ; Ghasemi, S ; Sharif University of Technology
    Springer Science and Business Media, LLC  2017
    Abstract
    In this paper, we propose a new trust-region method for solving nonlinear systems of equalities and inequalities. The algorithm combines both standard and adaptive trust-region frameworks to construct the steps of the algorithm. The trust-region subproblem is solved in the first iteration using a given initial radius. Then, in each iteration, the standard trust-region method is followed whenever the current trial step is accepted, otherwise, the subproblem is resolved using an adaptive scheme. The convergence results for the new proposed algorithm are established under some mild and standard assumptions. Numerical results on some least-squares test problems show the efficiency and... 

    Improving public-private partnership project procurement, addressing major shortfalls in the standard-form contract

    , Article International Journal of Procurement Management ; Volume 13, Issue 4 , 2020 , Pages 482-506 Alvanchi, A ; Hosseini, S. M. T ; Nili Ahmadabad, M. H ; AmiriDiba, A ; Sharif University of Technology
    Inderscience Publishers  2020
    Abstract
    Standard-form contracts facilitate the sophisticated public-private partnership (PPP) procurement process. Special care should be taken during the preparation of these documents since any remaining flaws affect subsequent projects. Reviewing the standard-form contract capabilities after its application help to identify its major flaws and improve the contract clauses. This research proposed a novel structured method to address this need and verified its capability. In the proposed method, a comprehensive list of risks is first created for the PPP projects in the specified project environment. The identified risks are prioritised to highlight the priority of the required adjustments in the... 

    High capacity Persian/Arabic text steganography

    , Article Journal of Applied Sciences ; Volume 8, Issue 22 , 2008 , Pages 4173-4179 ; 18125654 (ISSN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    One of the methods introduced for establishing hidden communication is steganography. Steganography is the art of hiding information in a cover media without attracting attention. Text documents are one of the common cover media used for steganography in past. Steganography in text is more difficult than other media because there is a little redundant information in text documents. In this study, we propose a high capacity text steganography method. Our method can hide about 400 bits in each kilobyte of text. In Persian and Arabic, each letter can have four different shapes regarding to its position in the word. In this method this feature of Persian and Arabic languages is used for... 

    Persian/arabic unicode text steganography

    , Article 4th International Symposium on Information Assurance and Security, IAS 2008, Napoli, 8 September 2008 through 10 September 2008 ; 2008 , Pages 62-66 ; 9780769533247 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Sending information secretly and communicating covertly have been of great interest for ages. On the other hand, text documents have been widely used and consequently various methods for hiding information in texts (Text Steganography) have been developed so far. In this paper a new method is proposed to hide information in digital Persian and Arabic Unicode texts. In Persian and Arabic, each letter can have four different shapes regarding to its position in the word. In this method by using this feature of Persian and Arabic languages and the way which documents are saved in the Unicode Standard, the information is hidden in Unicode text documents. This method has a good hiding capacity... 

    A comprehensive fuzzy TOPSIS model in multiple criteria decision making

    , Article 37th International Conference on Computers and Industrial Engineering 2007, Alexandria, 20 October 2007 through 23 October 2007 ; Volume 1 , 2007 , Pages 537-548 ; 9781627486811 (ISBN) Mahdavi, I ; Sadeghpour Gildeh, B ; Heidarzade, A ; Mahdavi Amiri, N ; Sharif University of Technology
    2007
    Abstract
    Decision making is the process of finding the best option among the feasible alternatives. In classical multiple criteria decision making (MCDM) methods, the ratings and the weights of the criteria are known precisely. Owning to vagueness of the decision data, the crisp data are inadequate for real-life situations. Since human judgments including preferences are often vague and cannot be expressed by exact numerical values, the application of fuzzy concepts in decision making is deemed to be relevant. Here, we apply a new distance formula to compute the standard deviation of fuzzy data to achieve crisp data by normalization. There is a flexibility to consider various fuzzy values as...