Morteza Khademi

ORCID: 0000-0002-0872-3217
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Video Coding and Compression Technologies
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Image and Video Quality Assessment
  • Neural Networks and Applications
  • Nonlinear Dynamics and Pattern Formation
  • Advanced Image Fusion Techniques
  • Advanced Data Compression Techniques
  • Cooperative Communication and Network Coding
  • EEG and Brain-Computer Interfaces
  • Visual Attention and Saliency Detection
  • Fault Detection and Control Systems
  • Advanced MIMO Systems Optimization
  • ECG Monitoring and Analysis
  • Blind Source Separation Techniques
  • Optical Imaging and Spectroscopy Techniques
  • Cardiac electrophysiology and arrhythmias
  • Metaheuristic Optimization Algorithms Research
  • Photoacoustic and Ultrasonic Imaging
  • Network Traffic and Congestion Control
  • Neural dynamics and brain function
  • Robotic Path Planning Algorithms
  • stochastic dynamics and bifurcation
  • Chaos control and synchronization

Ferdowsi University of Mashhad
2011-2022

University of Wollongong
2002

<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> In this paper, a novel constructive-optimizer neural network (CONN) is proposed for the traveling salesman problem (TSP). CONN uses feedback structure similar to Hopfield-type networks and competitive training algorithm Kohonen-type self-organizing maps (K-SOMs). Consequently, composed of constructive part, which grows tour an optimizer part optimize it. algorithm, initial created first...

10.1109/tsmcb.2006.888421 article EN IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics) 2007-07-13

Abstract Despite all its irrefutable benefits, the development of steganography methods has sparked ever-increasing concerns over abuse in recent decades. To prevent inimical usage steganography, steganalysis approaches have been introduced. Since motion vector manipulation leads to random and indirect changes statistics videos, MV-based video center attention years. In this paper, we propose a 54-dimentional feature set exploiting spatio-temporal features vectors blindly detect stego...

10.1007/s11042-020-10001-9 article EN cc-by Multimedia Tools and Applications 2020-11-08

In this paper a novel approach for cardiac arrhythmias detection is proposed. The proposed method based on using independent component analysis (ICA) and wavelet transform to extract important features. Using the extracted features different machine learning classification schemas, MLP RBF neural networks K-nearest neighbor, are used classify 274 instance signals from MIT-BIH database. Simulations show that multilayer with Levenberg-Marquardt (LM) back propagation algorithm provide optimal...

10.1109/iembs.2006.259292 article EN International Conference of the IEEE Engineering in Medicine and Biology Society 2006-08-01

Spread spectrum audio watermarking (SSW) is one of the most secure techniques watermarking. SSW hides information by spreading their which called watermark and adding to a host signal as watermarked signal. Spreading done pseudo-noise (PN) sequence. In conventional approaches, receiver must know PN sequence used at transmitter location in for detecting hidden information. It contributed high feature this method since any unauthorized user who doesn't access couldn't detect paper novel...

10.1109/cec.2006.1688305 article EN IEEE International Conference on Evolutionary Computation 2006-09-22

Objective video quality assessment plays an important role in a variety of processing applications such as compression, transmission, visualization, and display. This paper proposes no-reference model based on visual memory understanding. Inspired by the findings neuroscience researchers, who argue there is large overlap between active human brain area when performing saliency detection tasks, maps are employed here to assist assessment. To this end, we first generate using CLBP (Complete...

10.1109/tbc.2019.2957670 article EN IEEE Transactions on Broadcasting 2019-12-31

Abstract Steganography is the art and science of data hiding. This article proposes an adaptive steganographic algorithm that embeds secret in a compressed video stream using temporal spatial features signal human visual system characteristics. Qualified‐DCT coefficients I‐VOP motion vectors P‐VOP B‐VOP are used for video, respectively. Embedded‐data extracted without original there no need full decompression. Experimental results demonstrate proposed has high imperceptibility capacity....

10.1002/ima.20207 article EN International Journal of Imaging Systems and Technology 2009-11-06

In this paper, phase synchronization and the frequency of two synchronized van der Pol oscillators with delay coupling are studied. The dynamics such a system obtained using describing function method, necessary conditions for also achieved. Finding vicinity is major advantage method over other traditional methods. equations based on justify phenomenon coupled either higher, between, or lower than highest, in lowest natural aggregate oscillators. Several numerical examples simulate different...

10.1088/1674-1056/22/7/070502 article EN Chinese Physics B 2013-07-01

Many variants of fuzzy c-means (FCM) clustering method are applied to crisp numbers but only a few them extended non-crisp numbers, mainly due the fact that latter needs complicated equations and exhausting calculations. Vector form

10.3233/ifs-2012-0561 article EN Journal of Intelligent & Fuzzy Systems 2013-01-01

This paper proposes an exact and robust genetic algorithm-based method for the calibration of soccer camera. According to FIFA official field layout we defined a model court. Camera is done through finding homography transform between input frame which followed with DLT decomposition. The intersection lines in form feature points by means algorithm, found correspondence those points. Our algorithm was applied couple video frames achieved results demonstrate its robustness, accuracy high performance.

10.1109/iccp.2008.4648363 article EN 2008-08-01

In this paper a new method based on artificial neural networks (ANN), is introduced for identifying pathogenic antibodies in Systemic Lupus Erythmatosus (SLE). dsDNA binding have been implicated the pathogenesis of autoimmune disease. order to identify these antibodies, protein sequences 42 and 608 non-dsDNA were extracted from Kabat database encoded using physicochemical property their amino acids namely Hydrophilicity. Encoded used as training patterns general regression network (GRNN)....

10.6026/97320630005058 article EN cc-by Bioinformation 2010-07-06

10.1007/s00521-011-0571-0 article EN Neural Computing and Applications 2011-04-08

Spread spectrum watermarking (SSW) is one of the most widespread methods. In this paper, characterization SSW from information theoretic point view performed. Previous works on channel capacity analysis systems are reviewed. Since method designed so that host signal unknown to embedding encoder, Costa's results for not directly applicable. and detection modeled as a transmits in presence noise model derived reliable transmission rate hidden obtained. addition, case additive watermark...

10.1109/ispacs.2006.364861 article EN 2006-12-01

Summary Pilot contamination is a major limitation in estimating the uplink channel state massive MIMO systems using time division duplex communication method. This has huge impediment to harnessing main advantages of such as spectral and energy efficiencies. In this article, new low‐complexity subspace‐based method proposed for eliminating pilot estimation, which exploits virtual modeling combined with problem formulation technique. On contrary most existing approaches availability...

10.1002/dac.4544 article EN International Journal of Communication Systems 2020-08-10

In this paper, a smart pilot sequence assignment method is proposed to minimize inter-cell interference generated in massive multi-input multi-output (MIMO) system due contamination uplink TDD (Time Division Duplex) mode. The employs zero-one integer linear programming as the algorithm. amount of intercell imposed on target cell users considered assigning cost. introduced cost composed steering vectors desired cell, and sum channel correlation matrices adjacent cells. By exploiting virtual...

10.1109/tsp.2021.3070987 article EN IEEE Transactions on Signal Processing 2021-01-01
Coming Soon ...