Search published articles


Showing 7 results for Aghaie

A. Aghaie,
Volume 20, Issue 1 (IJIEPR 2009)
Abstract

Modern business organizations have appreciated the significance of having competitive advantage through the delivery of continuous improvement towards the customers, and being knowledge-oriented. Indisputably, Knowledge Management (KM) plays a key role in the success of Customer Relationship Management (CRM). In this regard, Customer Knowledge Management (CKM) is a newly developed concept that deals with knowledge from customers rather than knowledge about customers. However, little research has been done on the application of CKM in e-business. In this paper, after an overview of the literature, an application of CKM in Customer Lifetime Value (CLV) measurement is studied in an e-retailer case where Corporate Image and Reputation are taken into consideration.
Arash Motaghedi-Larijani, Kamyar Sabri-Laghaie , Mahdi Heydari,
Volume 21, Issue 4 (IJIEPR 2010)
Abstract

  In this paper flexible job-shop scheduling problem (FJSP) is studied in the case of optimizing different contradictory objectives consisting of: (1) minimizing makespan, (2) minimizing total workload, and (3) minimizing workload of the most loaded machine. As the problem belongs to the class of NP-Hard problems, a new hybrid genetic algorithm is proposed to obtain a large set of Pareto-optimal solutions in a reasonable run time. The algorithm utilizes from a local search heuristic for improving the chance of obtaining more number of global Pareto-optimal solutions. The solution method uses from a perturbed global criterion function for guiding the search direction of the hybrid algorithm. Computational experiences show that the hybrid algorithm has superior performance in contrast to previous studies .


Reza Morovatdar , Abdolah Aghaie , Simak Haji Yakhchali ,
Volume 22, Issue 1 (IJIEPR 2011)
Abstract

  In order to have better insight of project characteristics, different kinds of fuzzy analysis for project networks have been recently proposed, most of which consider activities duration as the main and only source of imprecision and vagueness, but as it is usually experienced in real projects, the structure of the network is also subject to changes. In this paper we consider three types of imprecision namely activity duration, activity existence and precedence relation existence which make our general fuzzy project network. Subsequently, a corrected forward recursion is proposed for analysis of this network. Since the convexity and normalization of traditional fuzzy numbers are not satisfied, some corrected algebraic operations are also presented. Employing the proposed method for a real project reveals that our method results in more applicable and realistic times for activities and project makespan in comparison to

Classic fuzzy PERT.
Kamyar Sabri Laghaie, Mohammad Saidi Mehrabad, Arash Motaghedi Larijani,
Volume 22, Issue 4 (IJIEPR 2011)
Abstract

 In this paper a single server queuing production system is considered which is subject to gradual deterioration. The system is discussed under two different deteriorating conditions. A planning horizon is considered and server which is a D/M/1 queuing system is gradually deteriorates through time periods. A maintenance policy is taken into account whereby the server is restored to its initial condition before some distinct periods. This system is modeled to obtain optimal values of arrival rates and also optimal maintenance policy which minimizes production, holding and maintenance costs and tries to satisfy demands through time periods. The model is also considered to control customers’ sojourn times. For each deteriorating condition a model is developed. Models are solved by GA based algorithms and results for a sample are represented .


Shervin Asadzadeh , Abdollah Aghaie, Hamid Shahriari ,
Volume 24, Issue 2 (IJIEPR 2013)
Abstract

Monitoring the reliability of products in both the manufacturing and service processes is of main concern in today’s competitive market. To this end, statistical process control has been widely used to control the reliability-related quality variables. The so-far surveillance schemes have addressed processes with independent quality characteristics. In multistage processes, however, the cascade property must be effectively justified which entails establishing the relationship among quality variables with the purpose of optimal process monitoring. In some cases, measuring the values corresponding to specific covariates is not possible without great financial costs. Subsequently, the unmeasured covariates impose unobserved heterogeneity which decreases the detection power of a control scheme. The complicated picture arises when the presence of a censoring mechanism leads to inaccurate recording of the process response values. Hence, frailty and Cox proportional hazards models are employed and two regression-adjusted monitoring procedures are constructed to effectively account for both the observed and unobserved influential covariates in line with a censoring issue. The simulation-based study reveals that the proposed scheme based on the cumulative sum control chart outperforms its competing procedure with smaller out-of-control average run length values.
M. Reza Peyghami, Abdollah Aghaie, Hadi Mokhtari,
Volume 24, Issue 3 (IJIEPR 2013)
Abstract

In this paper, we consider a stochastic Time-Cost Tradeoff Problem (TCTP) in PERT networks for project management, in which all activities are subjected to a linear cost function and assumed to be exponentially distributed. The aim of this problem is to maximize the project completion probability with a pre-known deadline to a predefined probability such that the required additional cost is minimized. A single path TCTP is constructed as an optimization problem with decision variables of activity mean durations. We then reformulate the single path TCTP as a cone quadratic program in order to apply polynomial time interior point methods to solve the reformulation. Finally, we develop an iterative algorithm based on Monte Carlo simulation technique and conic optimization to solve general TCTP. The proposed approach has been tested on some randomly generated test problems. The results illustrate the good performance of our new approach.
Fatemeh Elhambakhsh, Kamyar Sabri-Laghaie,
Volume 33, Issue 1 (IJIEPR 2022)
Abstract

The fourth industrial revolution has changed our lives by enabling everyone to be interconnected virtually. A trustworthy system is required to secure large volume of stored data in IoT-based devices. Blockchain technology has led to transfer and to save data in a safe way. With this in mind, the blockchain-based cryptocurrencies have gained quite a bit of popularity because of their potential for financial transactions. In this regard, monitoring transactions network is very fruitful to find users’ abnormal behaviors. In this research, a novel procedure is used to monitor blockchain cryptocurrency transactions network. To do so, a random, binary graph model is used to simulate the transactions between users, and a SCAN method is used to detect the abnormal behaviors in the simulated model. Also, a multivariate exponentially weighted moving average (MEWMA) control chart is used to monitor centrality measures. The probability of signal is used to assess the performance of the SCAN method and that of the MEWMA control chart in distinguishing abnormalities. Then, the procedure is adopted to a Bitcoin transactions dataset.

Page 1 from 1