Loading...
Search for:
amini--alireza
0.12 seconds
Total 896 records
Gaining Competitive Advantages on E-CRM in Financial Institutions in Iran Through B2B Model
, M.Sc. Thesis Sharif University of Technology ; Miremadi, Alireza (Supervisor) ; Amini Lari, Mansour (Supervisor)
Abstract
Due to violent and ferocious competition and global changes of new trends, directions and new ways of doing business, financial institutions grapple with new challenges and opportunities in today business. The advancement in technology, information and communication has forced banks and financial institutions into hard competition. In this new era technology, people as the customer are the elements on which the banks are concentrating them to manage customer relationship. In this complicated situation, Electronic customer relationship management (E-CRM) is seen applicatory and beneficial solution to improve customers‟ service, develop a profitable and long term relationship and retain...
The Impact of eCRM on Loyalty and Retention of Customers in Iranian Mobile Telecommunication Sector
, M.Sc. Thesis Sharif University of Technology ; Miremadi, Alireza (Supervisor) ; Amini Lari, Mansour (Co-Advisor)
Abstract
Today, almost all the Iranian mobile telecommunication companies should rely heavily on customer loyalty and customer retention as essential and vital tools to provide a competitive advantage in this competitive telecommunication world by offering value and upper hand service with respect to the existing demand in the Iranian market, hence these determinants arise the need for studying eCRM, Loyalty and Retention in order to achieve customer satisfaction in the Iranian mobile telecommunication field. 400 customers who use the Iranian mobile telecom operators’ services (Hamrah-e Avval, Irancell, and Talia) have been asked as respondents in this research. The study is based mainly on primary...
Copper(II) acetate
, Article Synlett ; Volume 23, Issue 13 , 2012 , Pages 1995-1996 ; 09365214 (ISSN) ; Sharif University of Technology
2012
Abstract
(A) Chakraborty and co-workers have developed a green method for the bulk ring-opening polymerization of lactides in the presence of Cu(OAc)2 as a good catalyst to synthesize polymers with different end-terminal groups.3 These polymerizations are highly controlled leading to the formation of polymers with the expected number of average molecular weights and narrow molecular weight distribution. (B) Garden and co-workers have found that the oxidative addition of anilines with 1,4-naphthoquinone to give N-aryl-2-amino-1,4-naphthoquinones can be performed in the presence of catalytic amounts of copper(II) acetate.4 All the reactions are generally more efficient in that they are cleaner, higher...
Solving rank one revised linear systems by the scaled ABS method
, Article ANZIAM Journal ; Volume 46, Issue 2 , 2004 , Pages 225-236 ; 14461811 (ISSN) ; Sharif University of Technology
2004
Abstract
In mathematical programming, an important tool is the use of active set strategies to update the current solution of a linear system after a rank one change in the constraint matrix. We show how to update the general solution of a linear system obtained by use of the scaled ABS method when the matrix coefficient is subjected to a rank one change. © Australian Mathematical Society 2004
Rcci Curvature for Metric-Measure Space via Optimal Transport
, M.Sc. Thesis Sharif University of Technology ; Bahraini, Alireza (Supervisor) ; Ranjbar Motlagh, Alireza (Co-Advisor)
Abstract
One of the important questions in mathematics is generalized. In case of metric spaces, one of the questions is: Can we extend notions of Riemannian geometry to arbitrary metric spaces smoothly? Ricci curvature is one of the most important concepts in differential geometry. Ricci curvature is defined for the Riemannian manifold and has many applications in mathematics and physics like Einstein’s equation in relativity theory. There is a good notion for a metric space having “sectional curvature bounded below by K” or “sectional curvature bounded above by K”, due to Alexandrov. Can we define the concept of Ricci curvature in metric space? A motivation for this question comes from Gromov’s...
, M.Sc. Thesis Sharif University of Technology ; Khaloo, Alireza (Supervisor)
Abstract
Seismic design codes reduce loads by using response modification factor. Because of the reserved strength in structural elements and capacity of structure to dissipate energy, structures can be designed for lower seismic loads. This factor has modified over time. In this thesis, the effect of the reduction in behavior factor on the response of two kinds of reinforced concrete systems were evaluated. Moment resisting frames and dual systems with different heights and regularity in plan, heve been design according to the behavior factor which is recommended in the 3rd edition of the Iranian codes of practice for seismic resistance design of buildings (Standard No. 2800). Drift and...
Prediction of Financial Markets Using Combination of Artificial Intelligence and Technical Analysis
, M.Sc. Thesis Sharif University of Technology ; Haji, Alireza (Supervisor)
Abstract
Generally, nowadays, machine learning methods are used in many different areas for their superiority over other methods of prediction. Although being a tough task, stock market prediction with machine learning approaches is being spread due to satisfying results published ever yday. Machine learning methods usually use varied kinds of data ,including structured data such as market data, technical indicators and some fundamental data as well as unstructured one entailing text and graph data in order to enhance their predictability capacity. In this thesis we aimed to find out more about the importance and the contribution of structured data in prediction and we tried to attain a framework...
Dextran-graft-poly(hydroxyethyl methacrylate) gels: A new biosorbent for fluoride removal of water
, Article Designed Monomers and Polymers ; Volume 16, Issue 2 , 2013 , Pages 127-136 ; 1385772X (ISSN) ; Mousavi, S. A ; Amini Fazl, A ; Amini Fazl, M. S ; Ahmari, R ; Sharif University of Technology
2013
Abstract
Synthesis of dextran-graft-poly(hydroxyethyl methacrylate) gels as a new fluoride biosorbent was considered in this work. For this propose, the Taguchi experimental design method was used for optimizing the synthetic conditions of the gels to reach high level of fluoride absorbency. The effects of three main parameters including concentrations of monomer (hydroxyethyl methacrylate), crosslinking agent (ethylene glycol dimethacrylate), and initiator (ammonium persulfate) on the final properties of the prepared gels were investigated. The proposed mechanism for grafting and chemically crosslinking reactions was proved with equilibrium water absorption, Fourier-transformed infrared, scanning...
Optimization of synthetic conditions of a novel collagen-based superabsorbent hydrogel by Taguchi method and investigation of its metal ions adsorption
, Article Journal of Applied Polymer Science ; Volume 102, Issue 5 , 2006 , Pages 4878-4885 ; 00218995 (ISSN) ; Salimi, H ; Amini Fazl, M. S ; Kurdtabar, M ; Amini Fazl, A. R ; Sharif University of Technology
2006
Abstract
A novel biopolymer-based superabsorbent hydrogel was synthesized through chemical crosslinking by graft copolymerization of partially neutralized acrylic acid onto the hydrolyzed collagen, in the presence of a crosslinking agent and a free radical initiator. The Taguchi method, a robust experimental design, was employed for the optimization of the synthesis reaction based on the swelling capacity of the hydrogels. This method was applied for the experiments and standard L16 orthogonal array with three factors and four levels were chosen. The critical parameters that have been selected for this study are crosslinker (N,N′-methylene bisacrylamide), initiator (potassium persulfate), and monomer...
A Semantic-Aware Authorization Model Based on Deontic Logic
, Ph.D. Dissertation Sharif University of Technology ; Jalili, Rasoul (Supervisor)
Abstract
Semantic technology provides an abstraction layer above existing computational environments, especially the Web, to give information a well-defined meaning. Moving toward semantic-aware environments imposes new security requirements. One of the most important requirement is the authorization and security policy inference based on the existing semantic relationships in the abstract (conceptual) layer. Most of the authorization models proposed for these environments so far are incomplete and their inference rules are not guaranteed to be consistent, sound, and complete. To have a sound and complete system for policy specification and inference, in this thesis, a family of modal logics, called...
Deterministic Compressed Sensing
, Ph.D. Dissertation Sharif University of Technology ; Marvasti, Farrokh (Supervisor)
Abstract
The emerging field of compressed sensing deals with the techniques of combining the two blocks of sampling and compression into a single unit without compromising the performance. Clearly, this is not feasible for any general signal; however, if we restrict the signal to be sparse, it becomes possible. There are two main challenges in compressed sensing, namely the sampling process and the reconstruction methods. In this thesis, we will focus only on the deterministic sampling process as opposed to the random sampling. The sampling methods discussed in the literature are mainly linear, i.e., a matrix is used as the sampling operator. Here, we first consider linear sampling methods and...
Interpretation of the Seven Errors in Bulk Material Sampling with the Aim of Providing a Guideline (Protocol) for Sampling From Liquids - Case of Edible Oil
, M.Sc. Thesis Sharif University of Technology ; Mahlooji, Hashem (Supervisor)
Abstract
Sampling is so deep-rooted in our habits that it usually takes place unconsciously. A large number of books and articles have been published in this field. The connection between sampling and quality control is the reason that many industries have focused their attention on sampling; however, only a few numbersare familiar with bulk material sampling related issues. Describing this theory along with its seven errors is the main object of this research. Using this theory, characteristics of the lot of interest was analyzed. Creating necessary conditions for assuring sampling correctness is very critical and if these conditions cannot be provided, implementing some part of the theory issues...
Synthesis and Characterization of Various Transition Metal Complexes and the Application in Oxidation, Heck, Suzuki, Sonogashira and Olefin Metathesis
, Ph.D. Dissertation Sharif University of Technology ; Bagherzadeh, Mojtaba (Supervisor)
Abstract
In nature, catalysis is of vital importance in a wide variety of biochemical processes catalyzed by metalloenzymes. The functions performed by the metalloenzymes and their significance have inspired a range of biomimetic studies, and intense efforts have been concentrated on the synthesis of low molecular weight complexes to model the spectroscopic features of such enzymes. Concomitantly, a challenging frontier in the field of biomimetic chemistry is the development of highly reactive model compounds that are able to effect rapid and selective substrate conversion. Some important catalytic transformations that have gained attention in recent years involve the carbon-carbon coupling, olefin...
Database Schema Extraction Prevention Through DBMS Error Handling
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Nowadays large volume of sensitive data of organizations are stored in the databases. Thus, databases are attractive to the attackers to execute different types of attacks with different purposes. The useful information that attackers try to achieve in the preliminary steps of the attacks against the databases, is the database structure or schema. One of the popular approach to extract the schema of a database is to analyze the returned error messages from its DBMS. Hence, a solution to prevent schema disclosure via the error messages is customizing and modifying them. To achieve this goal, in this thesis, we propose a framework to handle and customize the error messages automatically and...
Privacy Preserving Access Control for Service Composition in Cloud Computing
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Cloud computing is a new computing environment where computing infrastructure, platform and software are provided as a service. Rapid growth of cloud environments has increased the importance of security requirements and challenges for both service providers and users in cloud. Two main security issues in software as a service (SaaS) delivery model are access control and privacy preserving in basic web services and also in composite services obtaining through the automatic composition and inference of policies from the ones specified for basic services. In this thesis, we present a privacy preserving access control model and framework for service composition in SaaS delivery model of cloud...
Sparsity and infinite divisibility
, Article IEEE Transactions on Information Theory ; Volume 60, Issue 4 , 2014 , Pages 2346-2358 ; ISSN: 00189448 ; Unser, M ; Sharif University of Technology
2014
Abstract
We adopt an innovation-driven framework and investigate the sparse/compressible distributions obtained by linearly measuring or expanding continuous-domain stochastic models. Starting from the first principles, we show that all such distributions are necessarily infinitely divisible. This property is satisfied by many distributions used in statistical learning, such as Gaussian, Laplace, and a wide range of fat-tailed distributions, such as student's-t and α-stable laws. However, it excludes some popular distributions used in compressed sensing, such as the Bernoulli-Gaussian distribution and distributions, that decay like exp (-O(|x|p)) for 1 < p < 2. We further explore the implications of...
An Access Control System for Time Series Data in NoSQL Databases
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
An important class of applications which have been rapidly growing recently is the one that create and use time series data. These types of data sets are ordered based on the timestamps associated to their data items. In practice, traditional relational databases are unable to satisfy the requirements of these data sets; however, NoSQL databases with column-wide data structure are appropriate infrastructure for them. These databases are very efficient in read and write operations (especially for time series data, which are ordered) and are able to store unstructured data. Time series data may contain valuable and sensitive information; hence, they should be protected from the information...
Deterministic construction of binary, bipolar, and ternary compressed sensing matrices
, Article IEEE Transactions on Information Theory ; Volume 57, Issue 4 , April , 2011 , Pages 2360-2370 ; 00189448 (ISSN) ; Marvasti, F ; Sharif University of Technology
2011
Abstract
In this paper, we establish the connection between the Orthogonal Optical Codes (OOC) and binary compressed sensing matrices. We also introduce deterministic bipolar m × n RIP fulfilling ± 1 matrices of order k such that m ≤ script O sign (k(log2 n) log2 k/ln log2 k). The columns of these matrices are binary BCH code vectors where the zeros are replaced by -1. Since the RIP is established by means of coherence, the simple greedy algorithms such as Matching Pursuit are able to recover the sparse solution from the noiseless samples. Due to the cyclic property of the BCH codes, we show that the FFT algorithm can be employed in the reconstruction methods to considerably reduce the computational...
Information-flow Analysis in Android Apps for Protecting User Privacy
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
The rapid growth of Android operating system alongside its open-source nature has made it as the most popular operating system of mobile devices. On the other hand, regarding the increasing computational power of mobile devices, a wide variety of applications are coming to this type of devices. Meanwhile unfortunately many malicious softwares trying to keep up with other applications, are targeting this popular operating system. Therefore with regard to the fact that this type of devices usually store private and sensitive information of their users, security of mobile operating systems is considered very important. Having this matter in mind, the goal of this research work has been...
Novel View Synthesis Using Light Field Camera
, M.Sc. Thesis Sharif University of Technology ; Amini, Arash (Supervisor)
Abstract
In the last two decades, novel view synthesis has become increasingly important in the movie and game industries. The new generated views correspond to virtual viewpoints, where no real camera has taken snapshot. Depending on the amount of available information from the scene, different approaches have been proposed to create novel views. If the depth information is available, then by knowing camera relative motion, novel views can be constructed. The conventional cameras only record the intensity of the captured scene, and discard the depth information. In the recent concept of light field cameras, by locating an array of micro-lenses between the camera sensor and the main lens, one can...