Loading...
Search for:
vaezi--erfan
0.093 seconds
Total 82 records
Entanglement Hamiltonian of interacting systems: Local temperature approximation and beyond
, Article Physical Review Research ; Volume 3, Issue 1 , 2021 ; 26431564 (ISSN) ; Najafzadeh, H ; Vaezi, M. S ; Vaezi, A ; Sharif University of Technology
American Physical Society
2021
Abstract
We investigate the second quantization form of the entanglement Hamiltonian (EH) of various subregions for the ground state of several interacting lattice fermions and spin models. The relation between the EH and the model Hamiltonian itself is an unsolved problem for the ground state of generic local Hamiltonians. In this paper, we demonstrate that the EH is practically local and its dominant components are related to the terms present in the model Hamiltonian up to a smooth spatially varying temperature even for (a) discrete lattice systems, (b) systems with no emergent conformal or Lorentz symmetry, and (c) subsystems with nonflat boundaries, up to relatively strong interactions. We show...
A Process Mining Approach to Analyze Customer Journeys to Improve Customer Experience
, M.Sc. Thesis Sharif University of Technology ; Hassannayebi, Erfan (Supervisor)
Abstract
With the growth of the number of online service providers and the need to innovate in these services, in this study, the processes and the journeys taken by visitors of a website that provides employment services and employment insurance has been analyzed. In this research, process mining techniques and predictive process monitoring were implemented. With the use of a supervised and unsupervised learning algorithm, it attempted to identify the customer journeys' output and the existing patterns that lead to the complaint. In the first step, the website event log is extracted. Afterward, by using frequency-based encoding methods, the journeys traveled by users were clustered based on the...
Predictive Business Process Monitoring Using Machine Learning Algorithms
, M.Sc. Thesis Sharif University of Technology ; Hassannayebi, Erfan (Supervisor)
Abstract
In order to survive in today's business world, which is changing at a very fast pace, organizations can detect deviations even before they occur, quickly and with a high percentage of confidence, by analyzing their processes, in order to prevent disruptions in the processes. by monitoring the information systems that automatically execute business processes, it is possible to ensure the correct implementation of the existing processes. For this purpose, various techniques for monitoring business processes have been presented so that managers have a comprehensive and real view of how implement processes and be able to identify possible deviations in the future and try to fix them because the...
Data-Driven Prediction for Monitoring Business Process Pperformances Based on Classification Algorithms
, M.Sc. Thesis Sharif University of Technology ; Hassannayebi, Erfan (Supervisor)
Abstract
In recent years, several studies have been conducted in the field of data mining techniques in the field of process mining with the aim of improving the performance of organizations. Predictive process monitoring is a data-driven approach that helps business managers to improve the status and conditions of their organization. In this approach, the event log, which includes a set of completed examples of a process, is received as input, and machine learning methods are used to predict the outcome and results of the organization's processes before the process is completed. This prediction can include the prediction of the final result, the next event, the time remaining until the completion of...
Programmable oscillation of C60 inside carbon nanotubes subjected to strain gradient
, Article Journal of Applied Physics ; Volume 134, Issue 23 , 2023 ; 00218979 (ISSN) ; Sharif University of Technology
American Institute of Physics Inc
2023
Abstract
Programmable locomotion of molecules inside the carbon nanotube (CNT) has a significant role in controlling the reactions and delivery systems based on nanotubes. Using molecular dynamics (MD) simulations as well as the theoretical approach, we evaluate the oscillation of C60 inside the CNTs that are subjected to strain gradients from both sides. The molecular dynamics simulations are implemented by LAMMPS open-source software. Using this program, the van der Waals (vdW) interactions are established between C60 and nanotube, and the simulations are performed in canonical ensemble. The strain gradient applied on CNT provides the restoring force of the oscillation of C60. The potential energy...
Operations Optimization in Supply Chain Systems using Simulation and Reinforcement Learning
, M.Sc. Thesis Sharif University of Technology ; Hassan Nayebi, Erfan (Supervisor)
Abstract
The inventory costs constitute a significant portion of the supply chain costs. Therefore, choosing an optimal inventory policy for orders is of great importance. The aim of this research is to find the optimal inventory policy for a distribution center in a three-tier supply chain consisting of a manufacturer, a distribution center, and a retailer. This research simulates a supply chain in agent-based framework and optimizes it using reinforcement learning. The optimization KPI in this research is the mean daily cost of the supply chain. Finally, the result obtained from reinforcement learning is compared with the optimized result of AnyLogic and the mean daily cost in the model optimized...
Predictive Process Monitoring Based on Optimized Deep Learning Methods
, M.Sc. Thesis Sharif University of Technology ; Hassannayebi, Erfan (Supervisor)
Abstract
Business processes are an essential part of every business as they provide insights on how to optimize and make them more efficient. Predictive Business Process Monitoring has garnered significant attention in recent years due to its capability to forecast process outcomes and predict the next activity within an ongoing process. In the last few years, there have been works that focused on deep learning and its applications in predicting the next activity. Some research used Long Term Short Memory, while others used Convolutional Neural Networks. However, long term short term memory models have the constraint of relatively slow training, while Convolutional Neural Networks are fast but may...
Customer Journey Analytics using Process Mining Based on the Markov Model
,
M.Sc. Thesis
Sharif University of Technology
;
Hassan Nayebi, Erfan
(Supervisor)
Abstract
The analysis of customer journeys has gained significant attention due to the critical role of customer behavior data in enhancing business decision-making and formulating strategies for customer acquisition and retention. By segmenting customers based on their journey patterns, businesses can offer personalized recommendations, thereby improving customer engagement and loyalty. Additionally, predicting the next steps in a customer’s journey based on historical data allows for timely and appropriate interventions at various touchpoints. By understanding where customers are in their journey, businesses can provide targeted recommendations that increase the likelihood of converting potential...
A System Dynamic Simulation Approach to Investigate Economic And Environment Factors Based on VUCA framework: A Case Study in Petrochemical Industry
, M.Sc. Thesis Sharif University of Technology ; Hassannayebi, Erfan (Supervisor)
Abstract
To maintain adaptability, businesses should anticipate changes in their environment. The commonly employed forecasting method within corporate circles is the bottom-up approach, which relies on historical data for projecting future trends. However, research suggests that this approach often falls short of accurately reflecting real-world events. This has led to the adoption of dynamic systems modeling, a technique grounded in the assumption of stable conditions. This method effectively replicates the system's current state, thereby assisting in predicting future behaviors over a longer timeframe. The dynamic systems modeling approach was employed in this study, underscoring the imperative...
Analytical performance modeling of elastic optical links with aligned spectrum allocation
, Article Computer Networks ; Volume 88 , September , 2015 , Pages 40-50 ; 13891286 (ISSN) ; Akar, N ; Sharif University of Technology
Elsevier
2015
Abstract
Abstract Elastic optical networking has recently been proposed for use in optical transport networks to cope with increasingly heterogeneous and dynamic demand patterns. In this paper, we study the blocking performance of a multi-class elastic optical link for which a demand needs to be allocated a contiguous subset of the entire spectrum. This problem is different than the well-known blocking problem in multi-class multi-server loss systems due to the contiguous allocation constraint. We first propose a non-work-conserving aligned spectrum allocation policy which is shown to outperform the conventional first fit-based work-conserving allocation policy without alignment. Subsequently, for...
How to extend visibility polygons by mirrors to cover invisible segments
, Article 11th International Conference and Workshops on Algorithms and Computation, WALCOM 2017, 29 March 2017 through 31 March 2017 ; Volume 10167 LNCS , 2017 , Pages 42-53 ; 03029743 (ISSN); 9783319539249 (ISBN) ; Ghodsi, M ; Sharif University of Technology
Springer Verlag
2017
Abstract
Given a simple polygon P with n vertices, the visibility polygon (V P) of a point q (V P(q)), or a segment (formula present) (V P(pq)) inside P can be computed in linear time. We propose a linear time algorithm to extend V P of a viewer (point or segment), by converting some edges of P into mirrors, such that a given non-visible segment (formula present) can also be seen from the viewer. Various definitions for the visibility of a segment, such as weak, strong, or complete visibility are considered. Our algorithm finds every edge such that, when converted to a mirror, makes (formula present) visible to our viewer. We find out exactly which interval of (formula present) becomes visible, by...
Development of a rubric for evaluating creative writing: a multi-phase research
, Article New Writing ; 2018 ; 14790726 (ISSN) ; Rezaei, S ; Sharif University of Technology
Routledge
2018
Abstract
Drawing on a modified version of Delphi technique, the researchers in this study tried to develop a rubric comprising the main criteria to be considered in the evaluation of works of fiction. Review of the related literature, as well as the administration of a Likert scale questionnaire, and a series of unstructured interviews with experts in the fields of literature and creative writing, led to the identification of ten elements which were used in the construction of the first version of the rubric. To ensure its validity, a number of distinguished creative writing professors were asked to review this assessment tool and comment on its appropriateness for measuring the intended construct....
Visibility extension via mirror-edges to cover invisible segments
, Article Theoretical Computer Science ; Volume 789 , 2019 , Pages 22-33 ; 03043975 (ISSN) ; Ghodsi, M ; Sharif University of Technology
Elsevier B.V
2019
Abstract
Given a simple polygon P with n vertices, the visibility polygon (VP) of a point q, or a segment pq‾ inside P can be computed in linear time. We propose a linear time algorithm to extend the VP of a viewer (point or segment), by converting some edges of P into mirrors, such that a given non-visible segment uw‾ can also be seen from the viewer. Various definitions for the visibility of a segment, such as weak, strong, or complete visibility are considered. Our algorithm finds every edge that, when converted to a mirror, makes uw‾ visible to our viewer. We find out exactly which interval of uw‾ becomes visible, by every edge middling as a mirror, all in linear time. In other words, in this...
Development of a rubric for evaluating creative writing: a multi-phase research
, Article New Writing ; Volume 16, Issue 3 , 2019 , Pages 303-317 ; 14790726 (ISSN) ; Rezaei, S ; Sharif University of Technology
Routledge
2019
Abstract
Drawing on a modified version of Delphi technique, the researchers in this study tried to develop a rubric comprising the main criteria to be considered in the evaluation of works of fiction. Review of the related literature, as well as the administration of a Likert scale questionnaire, and a series of unstructured interviews with experts in the fields of literature and creative writing, led to the identification of ten elements which were used in the construction of the first version of the rubric. To ensure its validity, a number of distinguished creative writing professors were asked to review this assessment tool and comment on its appropriateness for measuring the intended construct....
Delay-optimal static relaying policy in a slotted aloha wireless network
, Article 2018 Iran Workshop on Communication and Information Theory, IWCIT 2018, 25 April 2018 through 26 April 2018 ; 2018 , Pages 1-6 ; 9781538641491 (ISBN) ; Ashtiani, F ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2018
Abstract
We consider a slotted Aloha-based wireless communication network comprising a source and an active relay, both transmitting to a common destination. The relay node is able to relay the unsuccessfully transmitted packets of the source node, if it can detect them. We find the analytical closed form optimal static relaying policy in order to minimize the average transmission delay (ATD) of source packets, while ATD of its own packets is constrained. A static relaying policy is determined by acceptance and relaying probabilities of the relay node. According to acceptance probability, the relay node decides whether to accept an unsuccessfully transmitted packet from source or not, while the...
Delay-Optimal cooperation policy in a slotted aloha full-duplex wireless network: static approach
, Article IEEE Systems Journal ; Volume 14, Issue 2 , 2020 , Pages 2257-2268 ; Ashtiani, F ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2020
Abstract
We consider a cooperative wireless communication network comprising two full-duplex (FD) nodes transmitting to a common destination based on slotted Aloha protocol. Each node has exogenous arrivals and also may relay some of the unsuccessfully transmitted packets of the other node. In this article, we find the optimal static policies of nodes in order to minimize the sum of the average transmission delays, while the average transmission delay of each node is constrained. The static policy of each node specifies the probability of accepting an unsuccessfully transmitted packet of the other node and how the node prioritizes its transmissions. We show that in the optimal policies, just the node...
Throughput Analysis in Multi Hop Cellular Networks
, M.Sc. Thesis Sharif University of Technology ; Ashtiani, Farid (Supervisor)
Abstract
OFDMA multi-hop cellular network (MCN) is the topic of a wide range of research today. In this thesis, we analyse this type of networks, regarding shadowing status, mobility patterns and different service requirements. In the multi-hop (MH) scenario, six fixed relays are set up in each cell, which split the cell into seven subcells. For mobility modeling, each subcell is split into several sub-regions. Mobile nodes are able to maintain at each sub-region with a random time distribution and migrate from it to one of its neighboring sub-regions. We also consider three types of services requiring specific number of subcarriers with specific BERs. The set of subcarriers is distributed among...
Expanding Visibility Polygons by Mirrors
, M.Sc. Thesis Sharif University of Technology ; Ghodsi, Mohammad (Supervisor)
Abstract
We consider extending the visibility polygon of a given point q inside a simple polygon by converting one or some of the edges to mirrors. It is known that the visibility polygon of a point inside a polygon in the presence of a mirror can be computed in linear time. We propose a linear time algorithm that checks whether a given segment inside a simple polygon is visible by a given point q via a mirror-edge, and finds all such edges. And we prove that finding edges to add exactly k unit squares to the visibility polygon of a query point q in most cases is NP-complete and its minimization is NP-hard. These cases contain single and muliple, either with secular or difuse reflections. Moreover,...
Cooperative Networks from the MAC Layer Viewpoint
, Ph.D. Dissertation Sharif University of Technology ; Ashtiani, Farid (Supervisor)
Abstract
Cooperative networks have attracted much attention in the last decade. Being introduced to mitigate the inefficiencies in the physical layer, cooperation can also be beneficial in upper layers, such as MAC layer. Using cooperative communications is specifically more challenging in the random access networks, where collision is a main concern. Delay, as one of the main performance metrics in random access networks, can decrease significantly by using cooperative communications. Transmission delay, i.e., the required time for delivering one packet form its source to destination, is an important metric in many communication networks, such as the networks in which each node generates and...
Visibility Via Reflection
, Ph.D. Dissertation Sharif University of Technology ; Ghodsi, Mohammad (Supervisor)
Abstract
This document deals with the following results in details:Given a simple polygon P with $n$ vertices, the visibility polygon (VP) of a point q, or a segment pq inside P can be computed in linear time. It is known that the visibility polygon of a point inside a polygon in the presence of a mirror can be computed in linear time. We propose a linear time algorithm to extend the VP of a viewer (point or segment) by converting some edges of P into mirrors (reflecting-edges with specular type of reflection), such that a given non-visible segment uw can also be seen from the viewer.Various definitions for the visibility of a segment, such as weak, strong, or complete visibility, are considered. Our...