Brain tumor classification via convolutional neural network and extreme learning machines A Pashaei, H Sajedi, N Jazayeri 2018 8th International conference on computer and knowledge engineering …, 2018 | 251 | 2018 |
A hybrid data mining model of feature selection algorithms and ensemble learning classifiers for credit scoring FN Koutanaei, H Sajedi, M Khanbabaei Journal of Retailing and Consumer Services 27, 11-23, 2015 | 215 | 2015 |
Flood susceptibility mapping and assessment using a novel deep learning model combining multilayer perceptron and autoencoder neural networks M Ahmadlou, A Al‐Fugara, AR Al‐Shabeeb, A Arora, R Al‐Adamat, ... Journal of Flood Risk Management 14 (1), e12683, 2021 | 90 | 2021 |
Age prediction based on brain MRI image: a survey H Sajedi, N Pardakhti Journal of medical systems 43 (8), 279, 2019 | 69 | 2019 |
Cover selection steganography method based on similarity of image blocks H Sajedi, M Jamzad 2008 IEEE 8th International Conference on Computer and Information …, 2008 | 68 | 2008 |
Using contourlet transform and cover selection for secure steganography H Sajedi, M Jamzad International Journal of Information Security 9, 337-352, 2010 | 56 | 2010 |
Convolution neural network joint with mixture of extreme learning machines for feature extraction and classification of accident images A Pashaei, M Ghatee, H Sajedi Journal of Real-Time Image Processing 17 (4), 1051-1066, 2020 | 53 | 2020 |
Popularity prediction of images and videos on Instagram A Zohourian, H Sajedi, A Yavary 2018 4th international conference on web research (ICWR), 111-117, 2018 | 53 | 2018 |
BSS: Boosted steganography scheme with cover image preprocessing H Sajedi, M Jamzad Expert systems with Applications 37 (12), 7703-7710, 2010 | 52 | 2010 |
Contribution of machine learning approaches in response to SARS-CoV-2 infection MS Mottaqi, F Mohammadipanah, H Sajedi Informatics in Medicine Unlocked 23, 100526, 2021 | 46 | 2021 |
Secure steganography based on embedding capacity H Sajedi, M Jamzad International Journal of Information Security 8, 433-445, 2009 | 46 | 2009 |
Question classification in Persian using word vectors and frequencies M Razzaghnoori, H Sajedi, IK Jazani Cognitive Systems Research 47, 16-27, 2018 | 42 | 2018 |
Region based image steganalysis using artificial bee colony FG Mohammadi, H Sajedi Journal of Visual Communication and Image Representation 44, 214-226, 2017 | 36 | 2017 |
Steganalysis based on steganography pattern discovery H Sajedi Journal of information security and applications 30, 3-14, 2016 | 36 | 2016 |
A novel clustering algorithm based on data transformation approaches R Azimi, M Ghayekhloo, M Ghofrani, H Sajedi Expert Systems with Applications 76, 59-70, 2017 | 34 | 2017 |
Prediction of disease based on prescription using data mining methods SK Dehkordi, H Sajedi Health and Technology 9, 37-44, 2019 | 32 | 2019 |
Handwriting recognition of digits, signs, and numerical strings in Persian H Sajedi Computers & Electrical Engineering 49, 52-65, 2016 | 32 | 2016 |
Job scheduling in grid computing with cuckoo optimization algorithm M Rabiee, H Sajedi International Journal of Computer Applications 62 (16), 2013 | 31 | 2013 |
Diagnosis of rheumatoid arthritis using an ensemble learning approach Z Shiezadeh, H Sajedi, E Aflakie Comput. Sci. Inf. Technol.(CS & IT) 5 (15), 139-148, 2015 | 30 | 2015 |
Adaptive steganography method based on contourlet transform H Sajedi, M Jamzad 2008 9th International Conference on Signal Processing, 745-748, 2008 | 29 | 2008 |