Loading...
Search for: saniee-abadeh--m
0.123 seconds

    Applying data mining techniques to business process reengineering based on simultaneous use of two novel proposed approaches

    , Article International Journal of Business Process Integration and Management ; Volume 6, Issue 3 , 2013 , Pages 247-267 ; 17418763 (ISSN) Ghanadbashi, S ; Khanbabaei, M ; Saniee Abadeh, M ; Sharif University of Technology
    2013
    Abstract
    Business process reengineering (BPR) can help organisations to identify and improve their business processes. A major problem is the high volume of business process datasets with characteristics such as high dimensionality, noise, uncertainty in process datasets and complicated interactions among process variables. Data mining (DM) techniques facilitate the identification and analysis of business processes, and improve their performance by extracting the hidden knowledge in business process datasets. In this paper, we present the application of DM to BPR, based on two novel approaches. By a literature review, the first approach proposes DMbBPR model, mainly focuses on the applications of... 

    Misuse intrusion detection using a fuzzy-metaheuristic approach

    , Article 2nd Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, 13 May 2008 through 15 May 2008 ; 2008 , Pages 439-444 ; 9780769531366 (ISBN) Mohamadi, H ; Habibi, J ; Saniee Abadeh, M ; Sharif University of Technology
    2008
    Abstract
    In this paper, we use simulated annealing heuristics for constructing an intrusion detection system (IDS). The proposed IDS combines the learning ability of simulated annealing heuristics with the approximate reasoning method of fuzzy systems. The use of simulated annealing is an effort to effectively explore the large search space related to intrusion detection problems, and find the optimum set of fuzzy if-then rules. The aim of this paper is to present the capability of simulated annealing based fuzzy system to deal with intrusion detection classification problem as a new real-world application area. Experiments were performed with KDD-Cup99 intrusion detection benchmark data set. © 2008... 

    Computer intrusion detection using an iterative fuzzy rule learning approach

    , Article 2007 IEEE International Conference on Fuzzy Systems, FUZZY, London, 23 July 2007 through 26 July 2007 ; 2007 ; 10987584 (ISSN) ; 1424412102 (ISBN); 9781424412105 (ISBN) Saniee Abadeh, M ; Habibi, J ; Sharif University of Technology
    2007
    Abstract
    The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). The objective of this paper is to extract fuzzy classification rules for intrusion detection in computer networks. The proposed method is based on the iterative rule learning approach (IRL) to fuzzy rule base system design. The fuzzy rule base is generated in an incremental fashion, in that the evolutionary algorithm optimizes one fuzzy classifier rule at a time. The performance of final fuzzy classification system has been investigated using intrusion detection problem as a high-dimensional classification problem. Results show... 

    A parallel genetic local search algorithm for intrusion detection in computer networks

    , Article Engineering Applications of Artificial Intelligence ; Volume 20, Issue 8 , December , 2007 , Pages 1058-1069 ; 09521976 (ISSN) Saniee Abadeh, M ; Habibi, J ; Barzegar, Z ; Sergi, M ; Sharif University of Technology
    2007
    Abstract
    The security of networked computers plays a strategic role in modern computer systems. This task is so complicated because the determination of normal and abnormal behaviors in computer networks is hard, as the boundaries cannot be well defined. One of the difficulties in such a prediction process is the generation of false alarms in many anomaly based intrusion detection systems. However, fuzzy logic is an important solution to reduce the false alarm rate in determining intrusive activities. This paper proposes a parallel genetic local search algorithm (PAGELS) to generate fuzzy rules capable of detecting intrusive behaviors in computer networks. The system uses the Michigan's approach,... 

    Data mining with a simulated annealing based fuzzy classification system

    , Article Pattern Recognition ; Volume 41, Issue 5 , 2008 , Pages 1824-1833 ; 00313203 (ISSN) Mohamadi, H ; Habibi, J ; Saniee Abadeh, M ; Saadi, H ; Sharif University of Technology
    Elsevier Ltd  2008
    Abstract
    In this paper, the use of simulated annealing (SA) metaheuristic for constructing a fuzzy classification system is presented. In several previous investigations, the capability of fuzzy systems to solve different kinds of problems has been demonstrated. Simulated annealing based fuzzy classification system (SAFCS), hybridizes the learning capability of SA metaheuristic with the approximate reasoning method of fuzzy systems. The objective of this paper is to illustrate the ability of SA to develop an accurate fuzzy classifier. The use of SA in classification is an attempt to effectively explore and exploit the large search space usually associated with classification problems, and find the... 

    Intrusion detection using a fuzzy genetics-based learning algorithm

    , Article Journal of Network and Computer Applications ; Volume 30, Issue 1 , 2007 , Pages 414-428 ; 10848045 (ISSN) Saniee Abadeh, M ; Habibi, J ; Lucas, C ; Sharif University of Technology
    2007
    Abstract
    Fuzzy systems have demonstrated their ability to solve different kinds of problems in various applications domains. Currently, there is an increasing interest to augment fuzzy systems with learning and adaptation capabilities. Two of the most successful approaches to hybridize fuzzy systems with learning and adaptation methods have been made in the realm of soft computing. Neural fuzzy systems and genetic fuzzy systems hybridize the approximate reasoning method of fuzzy systems with the learning capabilities of neural networks and evolutionary algorithms. The objective of this paper is to describe a fuzzy genetics-based learning algorithm and discuss its usage to detect intrusion in a... 

    A novel fuzzy genetic annealing classification approach

    , Article EMS 2009 - UKSim 3rd European Modelling Symposium on Computer Modelling and Simulation, 25 November 2009 through 27 November 2009, Athens ; 2009 , Pages 87-91 ; 9780769538860 (ISBN) Baran Pouyan, M ; Mohamadi, H ; Saniee Abadeh, M ; Foroughifar, A ; Sharif University of Technology
    2009
    Abstract
    In this paper, a novel classification approach is presented. This approach uses fuzzy if-then rules for classification task and employs a hybrid optimization method to improve the accuracy and comprehensibility of obtained outcome. The mentioned optimization method has been formulated by simulated annealing and genetic algorithm. In fact, the genetic operators have been used as perturb functions at the core of simulated annealing heuristic. Results of proposed approach have been compared with several well-known methods such as Naïve Bayes, Support Vector Machine, Decision Tree, k-NN, and GBML, and show that our method performs the classification task as well as other famous algorithms. ©... 

    A real-time and robust algorithm for calculation of time to lane crossing

    , Article IFAC/EURON Symposium on Intelligent Autonomous Vehicles, 5 July 2004 through 7 July 2004 ; Volume 37, Issue 8 , 2004 , Pages 132-135 ; 14746670 (ISSN) Saniee, M ; Jamzad, M ; Habibi, J ; Sharif University of Technology
    IFAC Secretariat  2004
    Abstract
    A real-time collision warning system based on TLC1 computation is proposed. Multi-frame lane detection and analysis are adopted to make the TLC calculation algorithm more reliable. The proposed system is robust because of its capability to calculate the TLC in different brightness. The presented system can be used in an intelligent vehicle for warning or lateral control. Experimental results show that the proposed algorithm, calculates TLC acceptably. © 2004 IFAC  

    Topology and vulnerability of the Iranian power grid

    , Article Physica A: Statistical Mechanics and its Applications ; Vol. 406, issue , July , 2014 , p. 24-33 ; ISSN: 03784371 Saniee Monfared, M. A ; Jalili, M ; Alipour, Z ; Sharif University of Technology
    2014
    Abstract
    In this paper we investigated the structural properties of the ultra high voltage power transmission network of Iran. We modeled the power grid as a network with 105 nodes and 142 connection links. We found that the Iranian power grid displays a relatively moderate clustering coefficient-much larger than that of corresponding random networks-and small characteristics path length comparable to that of corresponding random networks; i.e. the power grid is a small-world network with exponential degree distribution. Global efficiency was considered as an indicator of grid's performance and the influence of random and intentional nodal failures on the efficiency was investigated. We also studied... 

    Design and analysis of genetic fuzzy systems for intrusion detection in computer networks

    , Article Expert Systems with Applications ; Volume 38, Issue 6 , June , 2011 , Pages 7067-7075 ; 09574174 (ISSN) Abadeh, M. S ; Mohamadi, H ; Habibi, J ; Sharif University of Technology
    2011
    Abstract
    The capability of fuzzy systems to solve different kinds of problems has been demonstrated in several previous investigations. Genetic fuzzy systems (GFSs) hybridize the approximate reasoning method of fuzzy systems with the learning capability of evolutionary algorithms. The objective of this paper is to design and analysis of various kinds of genetic fuzzy systems to deal with intrusion detection problem as a new real-world application area which is not previously tackled with GFSs. The resulted intrusion detection system would be capable of detecting normal and abnormal behaviors in computer networks. We have presented three kinds of genetic fuzzy systems based on Michigan, Pittsburgh and... 

    Induction of fuzzy classification systems using evolutionary ACO-Based algorithms

    , Article 1st Asia International Conference on Modelling and Simulation - Asia Modelling Symposium 2007, AMS 2007, 27 March 2007 through 30 March 2007 ; 2007 , Pages 346-351 ; 0769528457 (ISBN); 9780769528458 (ISBN) Abadeh, M. S ; Habibi, J ; Soroush, E ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2007
    Abstract
    In this paper we have proposed an evolutionary algorithm to induct fuzzy classification rules. The algorithm uses an ant colony optimization based local searcher to improve the quality of final fuzzy classification system. The proposed algorithm is performed on Intrusion Detection as a high-dimensional classification problem. Results show that the implemented evolutionary ACO-Based algorithm is capable of producing a reliable fuzzy rule based classifier for intrusion detection. © 2007 IEEE  

    Intrusion detection using a hybridization of evolutionary fuzzy systems and artificial immune systems

    , Article 2007 IEEE Congress on Evolutionary Computation, CEC 2007; Singapour 25 September 2007 through 28 September 2007 ; 2007 , Pages 3547-3553 ; 1424413400 (ISBN); 9781424413409 (ISBN) Saneei Abadeh, M ; Habibi, J ; Daneshi, M ; Jalali, M ; Khezrzadeh, M ; Sharif University of Technology
    2007
    Abstract
    This paper presents a novel hybrid approach for intrusion detection in computer networks. The proposed approach combines an evolutionary based fuzzy system with an artificial immune system to generate high quality fuzzy classification rules. The performance of final fuzzy classification system has been investigated using the KDD-Cup99 benchmark dataset. The results indicate that in comparison to several traditional techniques, such as C4.5, Naïve Bayes, k-NN and SVM, the proposed hybrid approach achieves better classification accuracies for most of the classes of the intrusion detection classification problem. Therefore, the resulted fuzzy classification rules can be used to produce a... 

    A fuzzy ranking method for automated highway driving

    , Article 2004 IEEE Intelligent Vehicles Symposium, Parma, 14 June 2004 through 17 June 2004 ; 2004 , Pages 218-221 Saniee, M ; Habibi, J ; Sharif University of Technology
    2004
    Abstract
    Real-time, fuzzy rule-based guidance systems for autonomous vehicles on limited-access highways are investigated. The goal of these systems is to plan trajectories that are safe, while satisfying the driver's requests based on stochastic information about the vehicle's state and the surrounding traffic. This paper presented a new method to implement an automated highway driving behaviour. The main advantage of the suggested system is its well-defined structure. To test the designed system, a simulation tool is implemented. By using the described tool, we can analyse the operation of the implemented decision making system in a simulated highway. Results show an acceptable performance of the... 

    Delta-based regression testing: A formal framework towards model-driven regression testing

    , Article Journal of Software: Evolution and Process ; Volume 27, Issue 12 , December , 2015 , Pages 913-952 ; 20477481 (ISSN) Nooraei Abadeh, M ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    John Wiley and Sons Ltd  2015
    Abstract
    The increase in complexity and rate of technological changes in modern software development has led to a demand for systematic methods that raise the abstraction level for system maintenance and regression testing. Model-driven development (MDD) has promised to reduce extra coding efforts in software maintenance activities using traceable change management. The research described in this paper presents a Z-notation-based framework, called delta-based regression testing (DbRT), for formal modeling of regression testing in the context of MDD. The framework proposes to propagate the changes from a software specification to testing artifacts in order to preserve consistency after system... 

    Heat transfer through horizontal microtube of nanofluids under magnetic field for thermal analysis systems

    , Article Journal of Magnetism and Magnetic Materials ; Volume 571 , 2023 ; 03048853 (ISSN) Abadeh, A ; Davoodabadi Farahani, S ; Barani, E ; Öztop, H. F ; Sharif University of Technology
    Elsevier B.V  2023
    Abstract
    According to the increasing desire towards heat transfer rate enhancement with various methods in different industries, this has been an interesting topic of many researchers. The effects of adding TiO2 and Al2O3 nanoparticles to water on heat transfer and fluid flow characteristics are investigated with a semi-analytical method in this study. Two nanofluids flow and heat transfer in a microtube are studied in presence of slip boundary conditions and magnetic fields. The nanoparticles volume fraction, magnetic fields strength, slip parameter and NBT coefficient (the ratio of Brownian to thermophoretic diffusions) effects on the nanoparticle's distribution, velocity profile, temperature... 

    Reliability and Redundancy Analysis at a Methanol Plant in the Khark Petrochemical Complex: Investigation, Modeling, and Improvement

    , M.Sc. Thesis Sharif University of Technology Modabber, Morteza (Author) ; Mohammadi, Somayeh (Supervisor) ; Saniee Monfared, Mohammad Ali (Supervisor)
    Abstract
    Today, reliability assessment of production systems is crucial for ensuring continuous production and minimizing operational and maintenance (O&M) costs. One way to assess reliability at the system level is to create a reliability block diagram (RBD) and estimate the failure rates of equipment over their operational periods. This approach has been utilized in this thesis, focusing on assessment of the reliability of various units within the methanol plant at Khark Petrochemical Complex. In this context, understanding the condition of the equipment criticality is essential for constructing the reliability block diagram. The Crespo model and total criticality per risk (CTR) measure have been... 

    Mental model development using collaborative 3D virtual environments

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 17 July 2016 through 22 July 2016 ; Volume 9749 , 2016 , Pages 279-290 ; 03029743 (ISSN) ; 9783319398617 (ISBN) Nazari Shirehjini, A. A ; Soltani Nejad, F ; Saniee Monfared, G ; Semsar, A ; Shirmohammadi, S ; Sharif University of Technology
    Springer Verlag  2016
    Abstract
    Smart environments are complex systems encompassing multitude of devices with complex interconnections and interactions. User must not only be able to figure out the devices’ functionalities, but also understand the architectural and semantic relations between various components. Providing such information leads to better understanding and user satisfaction, if users get the appropriate mental models. One way to train users about such smart environments is Interactive Realistic Virtual Reality based Simulations (IRVRS): multimedia rich collaborative 3D virtual environments. IRVRS also facilitate easy and inexpensive access to population masses, thus they can be used for conducting large... 

    Probability of missed detection as a criterion for receiver placement in MIMO PCL

    , Article IEEE National Radar Conference - Proceedings, 7 May 2012 through 11 May 2012, Atlanta, GA ; 2012 , Pages 0924-0927 ; 10975659 (ISSN) ; 9781467306584 (ISBN) Majd, M. N ; Chitgarha, M. M ; Radmard, M ; Nayebi, M. M ; Sharif University of Technology
    IEEE  2012
    Abstract
    Using multiple antennas at the transmit and receive sides of a passive radar brings both the benefits of MIMO radar and passive radar. However one of the obstacles arisen in such configuration is the receive antennas placement in proper positions so that the radar performance is improved. Here we just consider the case of positioning one receiver among multiple illuminators of opportunity. Indeed it is a start for the solution of optimizing the geometry of the multiple receivers in a passive radar  

    An efficient method for the ring opening of epoxides with aromatic amines by Sb(III) chloride under microwave irradiation

    , Article Journal of Chemical Research ; Issue 4 , 2008 , Pages 220-221 ; 03082342 (ISSN) Ghazanfari, D ; Hashemi, M. M ; Mottaghi, M. M ; Foroughi, M. M ; Sharif University of Technology
    2008
    Abstract
    SbCl3 supported on montmorillonite K-10 is an efficient catalyst for the ring opening of epoxides with aromatic amines under solvent-free conditions and microwave irradiation to give the corresponding b-amino alcohols in high yields with high regioselectivity  

    Resource allocation for uav-enabled integrated sensing and communication (isac) via multi-objective optimization

    , Article ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings ; Volume 2023-June , 2023 ; 15206149 (ISSN); 978-172816327-7 (ISBN) Rezaei, O ; Naghsh, M. M ; Karbasi, M ; Nayebi, M. M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2023
    Abstract
    In this paper, we consider an integrated sensing and communication (ISAC) system with wireless power transfer (WPT) where an unmanned aerial vehicle (UAV)-based radar serves a group of energy-limited communication users in addition to its sensing functionality. In this architecture, the radar senses the environment in phase 1 (namely sensing phase) and mean-while, the communications users (nodes) harvest and store the energy from the radar transmit signal. The stored energy is then used for information transmission from the nodes to UAV in phase 2, i.e., uplink phase. Performance of the radar system depends on the transmit signal as well as the receive filter; the energy of the transmit...