default search action
Hedieh Sajedi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Sara Dadjouy, Hedieh Sajedi:
Artificial intelligence applications in the diagnosis of gallbladder neoplasms through ultrasound: A review. Biomed. Signal Process. Control. 93: 106149 (2024) - [j48]Iman Kianian, Hedieh Sajedi:
Brain age estimation with a greedy dual-stream model for limited datasets. Neurocomputing 596: 127974 (2024) - [i6]Sara Dadjouy, Hedieh Sajedi:
Gallbladder Cancer Detection in Ultrasound Images based on YOLO and Faster R-CNN. CoRR abs/2404.15129 (2024) - [i5]Amin Ahmadi Kasani, Hedieh Sajedi:
Hand bone age estimation using divide and conquer strategy and lightweight convolutional neural networks. CoRR abs/2405.14986 (2024) - [i4]Amin Ahmadi Kasani, Hedieh Sajedi:
Predict joint angle of body parts based on sequence pattern recognition. CoRR abs/2405.17369 (2024) - [i3]Iman Kianian, Hedieh Sajedi:
Brain Age Estimation with a Greedy Dual-Stream Model for Limited Datasets. CoRR abs/2407.04808 (2024) - 2023
- [j47]Amin Ahmadi Kasani, Hedieh Sajedi:
Hand bone age estimation using divide and conquer strategy and lightweight convolutional neural networks. Eng. Appl. Artif. Intell. 120: 105935 (2023) - [i2]Mohammad Zolfaghari, Hedieh Sajedi:
A survey on automated detection and classification of acute leukemia and WBCs in microscopic blood cells. CoRR abs/2303.03916 (2023) - 2022
- [j46]Mohammad Zolfaghari, Hedieh Sajedi:
A survey on automated detection and classification of acute leukemia and WBCs in microscopic blood cells. Multim. Tools Appl. 81(5): 6723-6753 (2022) - [j45]Fatemeh Nejati, Hedieh Sajedi, Alireza Zohourian:
Fragile Watermarking Based on QR Decomposition and Fourier Transform. Wirel. Pers. Commun. 122(1): 211-227 (2022) - [c14]Mohammad Zolfaghari, Hedieh Sajedi:
Unsupervised Anomaly Detection with an Enhanced Teacher for Student-Teacher Feature Pyramid Matching. CSICC 2022: 1-4 - [c13]Amir Aslan Aslani, Mohammad Zolfaghari, Hedieh Sajedi:
Automatic Counting Red Blood Cells in the Microscopic Images by EndPoints Method and Circular Hough Transform. IMCOM 2022: 1-5 - [c12]Niloofar Jazayeri, Farnaz Jazayeri, Hedieh Sajedi:
Medical Image Segmentation for Skin Lesion Detection via Topological Data Analysis. IMCOM 2022: 1-8 - [c11]Amin Ahmadi Kasani, Hedieh Sajedi:
Predict joint angle of body parts based on sequence pattern recognition. IMCOM 2022: 1-5 - [i1]Alireza Tavakoli, Zahra Honjani, Hedieh Sajedi:
Convolutional Neural Network-Based Image Watermarking using Discrete Wavelet Transform. CoRR abs/2210.06179 (2022) - 2021
- [j44]Ashena Gorgan Mohammadi, Pouya Mehralian, Amir Naseri, Hedieh Sajedi:
Parkinson's disease diagnosis: The effect of autoencoders on extracting features from vocal characteristics. Array 11: 100079 (2021) - [j43]Niloofar Jazayeri, Hedieh Sajedi:
DNAVS: an algorithm based on DNA-computing and vortex search algorithm for task scheduling problem. Evol. Intell. 14(4): 1763-1773 (2021) - [j42]Yasaman Mashhadi Hashem Marandi, Hedieh Sajedi, Sepehr Pirasteh:
A novel method to musicalize shape and visualize music and a novel technique in music cryptography. Multim. Tools Appl. 80(5): 7451-7477 (2021) - [c10]Nader Bazyari, Hedieh Sajedi:
A Reconcile of Density Based and Hierarchical Clustering Based on the Laws of Physics. IMCOM 2021: 1-8 - [c9]Zahra Jahanshiri, Mohammad Saniee Abadeh, Hedieh Sajedi:
Brain Age Estimation based on Brain MRI by an Ensemble of Deep Networks. IMCOM 2021: 1-6 - [c8]Arefeh Yavary, Hedieh Sajedi:
Document Embedding using piped ELM-GAN Model. IMCOM 2021: 1-4 - 2020
- [j41]Hedieh Sajedi, Fatemeh Mohammadipanah:
Developed Optimization Algorithms Based on Natural Taxis Behavior of Bacteria. Cogn. Comput. 12(6): 1187-1204 (2020) - [j40]Elham Hekmatnia, Hedieh Sajedi, Ali Habib Agahi:
A parallel classification framework for protein fold recognition. Evol. Intell. 13(3): 525-535 (2020) - [j39]Ali Pashaei, Mehdi Ghatee, Hedieh Sajedi:
Convolution neural network joint with mixture of extreme learning machines for feature extraction and classification of accident images. J. Real Time Image Process. 17(4): 1051-1066 (2020) - [j38]Nastaran Pardakhti, Hedieh Sajedi:
Brain age estimation based on 3D MRI images using 3D convolutional neural network. Multim. Tools Appl. 79(33-34): 25051-25065 (2020) - [j37]Hedieh Sajedi, Fatemeh Mohammadipanah, Ali Pashaei:
Image-processing based taxonomy analysis of bacterial macromorphology using machine-learning models. Multim. Tools Appl. 79(43-44): 32711-32730 (2020) - [j36]Arefeh Yavary, Hedieh Sajedi, Mohammad Saniee Abadeh:
Information verification in social networks based on user feedback and news agencies. Soc. Netw. Anal. Min. 10(1): 2 (2020)
2010 – 2019
- 2019
- [j35]Maryam Bahrami, Hedieh Sajedi:
Image concept detection in imbalanced datasets with ensemble of convolutional neural networks. Intell. Data Anal. 23(5): 1131-1144 (2019) - [j34]Seyedeh Fatemeh Razavi, Hedieh Sajedi:
SVSA: a Semi-Vortex Search Algorithm for solving optimization problems. Int. J. Data Sci. Anal. 8(1): 15-32 (2019) - [j33]Hedieh Sajedi:
An ensemble algorithm for discovery of malicious web pages. Int. J. Inf. Comput. Secur. 11(3): 203-213 (2019) - [j32]Seyyed AmirHosein Rahimi, Hedieh Sajedi:
Monitoring air pollution by deep features and extreme learning machine. J. Exp. Theor. Artif. Intell. 31(4): 517-531 (2019) - [j31]Hedieh Sajedi, Nastaran Pardakhti:
Age Prediction Based on Brain MRI Image: A Survey. J. Medical Syst. 43(8): 279:1-279:30 (2019) - [j30]Hedieh Sajedi, Fatemeh Mohammadipanah, Seyyed AmirHosein Rahimi:
Actinobacterial strains recognition by Machine learning methods. Multim. Tools Appl. 78(14): 20285-20307 (2019) - 2018
- [j29]Mohammad Razzaghnoori, Hedieh Sajedi, Iman Khani Jazani:
Question classification in Persian using word vectors and frequencies. Cogn. Syst. Res. 47: 16-27 (2018) - [j28]Mohammad Saleh Vahdatpour, Hedieh Sajedi, Farzad Ramezani:
Air pollution forecasting from sky images with shallow and deep classifiers. Earth Sci. Informatics 11(3): 413-422 (2018) - [j27]Sepideh Khajeh Haghverdi, Hedieh Sajedi, Sahamedin Bahrami Nasab:
Detecting Nash equilibria of strategic games by Vortex Search algorithm. Int. J. Hybrid Intell. Syst. 14(4): 225-232 (2018) - [j26]Behraz Farrokhi, Ehsanollah Kabir, Hedieh Sajedi:
Onset detection for tar solo. Int. J. Speech Technol. 21(4): 761-771 (2018) - [j25]Rasool Azimi, Hedieh Sajedi:
A decentralized gossip based approach for data clustering in peer-to-peer networks. J. Parallel Distributed Comput. 119: 64-80 (2018) - [j24]Hedieh Sajedi:
Adaptive Image Steganalysis. Multim. Tools Appl. 77(13): 17269-17284 (2018) - [j23]Rasool Azimi, Hedieh Sajedi:
Peer sampling gossip-based distributed clustering algorithm for unstructured P2P networks. Neural Comput. Appl. 29(2): 593-612 (2018) - [j22]Hedieh Sajedi:
Applications of data hiding techniques in medical and healthcare systems: a survey. Netw. Model. Anal. Health Informatics Bioinform. 7(1): 6 (2018) - 2017
- [j21]Rasool Azimi, Hedieh Sajedi, Mohadeseh Ghayekhloo:
A distributed data clustering algorithm in P2P networks. Appl. Soft Comput. 51: 147-167 (2017) - [j20]Rasool Azimi, Mohadeseh Ghayekhloo, Mahmoud Ghofrani, Hedieh Sajedi:
A novel clustering algorithm based on data transformation approaches. Expert Syst. Appl. 76: 59-70 (2017) - [j19]Hedieh Sajedi:
Image steganalysis using Artificial Bee Colony algorithm. J. Exp. Theor. Artif. Intell. 29(5): 949-966 (2017) - [j18]Farid Ghareh Mohammadi, Hedieh Sajedi:
Region based Image Steganalysis using Artificial Bee Colony. J. Vis. Commun. Image Represent. 44: 214-226 (2017) - [j17]Mehdi Azizi, Hedieh Sajedi:
Satellite Broadcast Scheduling Based on a Boosted Binary Differential Evolution. New Gener. Comput. 35(3): 225-251 (2017) - [j16]Hedieh Sajedi, Seyedeh Fatemeh Razavi:
DGSA: discrete gravitational search algorithm for solving knapsack problem. Oper. Res. 17(2): 563-591 (2017) - [c7]Shiva Kazempour Dehkordi, Hedieh Sajedi:
A prescription-based automatic medical diagnosis system using a stacking method. SISY 2017: 187-192 - [c6]Seyyed AmirHosein Rahimi, Hedieh Sajedi, Fatemeh Mohammadipanah:
Differentiation of identical actinobacterial strains by wavelet transform and artificial neural network. SISY 2017: 197-202 - [c5]Nastaran Pardakhti, Hedieh Sajedi:
Age prediction based on brain MRI images using feature learning. SISY 2017: 267-270 - [d1]Mohammad Razzaghnoori, Hedieh Sajedi, Iman Khani Jazani:
University of Tehran Question Dataset 2016 (UTQD.2016). UCI Machine Learning Repository, 2017 - 2016
- [j15]Farzad Nourmohammadzadeh Motlagh, Hedieh Sajedi:
MOSAR: A Multi-Objective Strategy for Hiding Sensitive Association Rules Using Genetic Algorithm. Appl. Artif. Intell. 30(9): 823-843 (2016) - [j14]Hedieh Sajedi:
Handwriting recognition of digits, signs, and numerical strings in Persian. Comput. Electr. Eng. 49: 52-65 (2016) - [j13]Hedieh Sajedi:
Biometric verification by palmprint using contourlet transform. Intell. Decis. Technol. 10(4): 443-451 (2016) - [j12]Seyedeh Fatemeh Razavi, Hedieh Sajedi, Mohammad Ebrahim Shiri:
Integration of colour and uniform interlaced derivative patterns for object tracking. IET Image Process. 10(5): 381-390 (2016) - [j11]Hedieh Sajedi, Mehran Bahador:
Persian Handwritten Number Recognition Using Adapted Framing Feature and Support Vector Machines. Int. J. Comput. Intell. Appl. 15(1): 1650004:1-1650004:19 (2016) - [j10]Hedieh Sajedi, Fatemeh Allameh:
Detection of malicious web pages by evolutionary ensemble learning. Int. J. Hybrid Intell. Syst. 13(3-4): 151-159 (2016) - [j9]Hedieh Sajedi:
Steganalysis based on steganography pattern discovery. J. Inf. Secur. Appl. 30: 3-14 (2016) - 2015
- [j8]Zahra Sadat Taghavi, Hedieh Sajedi:
Ensemble pruning based on oblivious Chained Tabu Searches. Int. J. Hybrid Intell. Syst. 12(3): 131-143 (2015) - 2014
- [j7]Hedieh Sajedi, Zahra Saadati:
A Hybrid Structure for Data Aggregation in Wireless Sensor Network. J. Comput. Eng. 2014: 395868:1-395868:7 (2014) - 2011
- [j6]Hedieh Sajedi, Mansour Jamzad:
HYSA: HYbrid steganographic approach using multiple steganography methods. Secur. Commun. Networks 4(10): 1173-1184 (2011) - 2010
- [j5]Hedieh Sajedi, Mansour Jamzad:
BSS: Boosted steganography scheme with cover image preprocessing. Expert Syst. Appl. 37(12): 7703-7710 (2010) - [j4]Hedieh Sajedi, Mansour Jamzad:
Using contourlet transform and cover selection for secure steganography. Int. J. Inf. Sec. 9(5): 337-352 (2010) - [j3]Hedieh Sajedi, Mansour Jamzad:
CBS: Contourlet-Based Steganalysis Method. J. Signal Process. Syst. 61(3): 367-373 (2010)
2000 – 2009
- 2009
- [j2]Hedieh Sajedi, Mansour Jamzad:
Secure steganography based on embedding capacity. Int. J. Inf. Sec. 8(6): 433-445 (2009) - [j1]Hedieh Sajedi, Mansour Jamzad:
ContSteg: Contourlet-Based Steganography Method. Wirel. Sens. Netw. 1(3): 163-170 (2009) - [c4]Hedieh Sajedi, Mansour Jamzad:
Secure Cover Selection Steganography. ISA 2009: 317-326 - 2008
- [c3]Hedieh Sajedi, Mansour Jamzad:
A Steganalysis Method Based on Contourlet Transform Coefficients. IIH-MSP 2008: 245-248 - [c2]Nima Asadi, Mansour Jamzad, Hedieh Sajedi:
Improvements of Image-Steganalysis Using Boosted Combinatorial Classifiers and Gaussian High Pass Filtering. IIH-MSP 2008: 1508-1511 - 2007
- [c1]Hedieh Sajedi, Mansour Jamzad:
A Contourlet-Based Face Detection Method in Color Images. SITIS 2007: 727-732
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-25 19:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint