Morteza Khademi

Learn More
(SSW) is one of the most secure techniques of audio watermarking. SSW hides information by spreading their spectrum which is called watermark and adding to a host signal as a watermarked signal. Spreading spectrum is done by a pseudo-noise (PN) sequence. In conventional SSW approaches, receiver must know PN sequence used at the transmitter and location of(More)
In this paper, a novel constructive-optimizer neural network (CONN) is proposed for the traveling salesman problem (TSP). CONN uses a feedback structure similar to Hopfield-type neural networks and a competitive training algorithm similar to the Kohonen-type self-organizing maps (K-SOMs). Consequently, CONN is composed of a constructive part, which grows(More)
In this paper, a new shell clustering method is presented to cluster model-based shells in 2-dimensions. Shells, that each one of them can be expressed by a center and non-negative radius in each angle (by considering polar coordinate system), can cluster by using the proposed model-based fuzzy c-shells (MFCS) clustering method. In this paper, firstly one(More)
Steganography is the art and science of data hiding. This article proposes an adaptive steganographic algorithm that embeds secret data in a compressed video stream using temporal and spatial features of the video signal and human visual system characteristics. Qualified-DCT coefficients of I-VOP and motion vectors of P-VOP and B-VOP are used for spatial(More)
In this paper a new method based on artificial neural networks (ANN), is introduced for identifying pathogenic antibodies in Systemic Lupus Erythmatosus (SLE). dsDNA binding antibodies have been implicated in the pathogenesis of this autoimmune disease. In order to identify these dsDNA binding antibodies, the protein sequences of 42 dsDNA binding and 608(More)
  • Malihe Soleimani, Faezeh Sanaei Nezhad, Hadi Mahdipour, Morteza Khademi
  • 2013
– This paper presents a new method in blind digital watermarking based on Discrete Cosine Transform (DCT). The image is quantized in 8×8 blocks, a DCT transform is applied to each block and a collection containing the first two AC coefficients from the DCT transform of the 8×8 image block (coefficient (2,1) and (1,2)) and the bias member, which is zero, is(More)
Recently, it has been shown that under a broad set of conditions, the commonly used distance functions will become unstable in high-dimensional data space; i.e., the distance to the farthest data point approaches the distance to the nearest data point of a given query point with increasing dimensionality. It has been shown that if dimensions are(More)