Mahdi Hariri

Mahdi Hariri
University of Zanjan · Department of Electrical and Computer Engineering

Doctor of Philosophy on Electrical and Computer Engineering

About

25
Publications
3,940
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
80
Citations
Introduction
Mahdi Hariri currently works at the technical faculty in University of Zanjan. He is a faculty member of electrical and computer engineering department.
Additional affiliations
September 2018 - present
University of Zanjan
Position
  • Lecturer
January 2011 - August 2018
Islamic Azad University - Zanjan Branch
Position
  • Lecturer
January 2006 - August 2018
University of Zanjan and Islamic Azad university of Zanjan, Zanjan Iran
Position
  • Lecturer

Publications

Publications (25)
Article
Full-text available
Multibiometric systems have been recently developed in order to overcome some weaknesses of single biometric authentication systems, but security of these systems against spoofing has not received enough attention. In this paper, we propose a novel practical method for simulation of possibilities of spoof attacks against a biometric authentication...
Article
Full-text available
Dealing with uncertainty is one of the most critical problems in complicated pattern recognition subjects. In this paper, we modify the structure of a useful Unsupervised Fuzzy Neural Network (UFNN) of Kwan and Cai, and compose a new FNN with 6 types of fuzzy neurons and its associated self organizing supervised learning algorithm. This improved fi...
Article
Full-text available
The wide use of high-performance image acquisition devices and powerful image-processing software has made it easy to tamper images for malicious purposes. Image splicing, which has constituted a menace to integrity and authenticity of images, is a very common and simple trick in image forgery. Therefore, image-splicing detection is one the signifi...
Conference Paper
Full-text available
A common way of tampering in digital images is known as splicing, Where a selected region from an image is pasted into another or same image. In this paper we propose a method to detect image manipulation. Firstly the algorithm converts input RGB image into YCbCr color channel, afterwards chrominance component is divided into non-overlapping blocks...
Conference Paper
Full-text available
Digital images are easy to manipulate and edit due to advances in computers and image editing software. Copy-move forgery is one of the most popular tampering artifacts in digital images that used by image forgers. In this paper, a DCT-based method is developed to detect image forgery considering the complexity of input image. To detect duplicate r...
Conference Paper
Full-text available
In the field of remote sensing, images in different spectral bands are considered for different applications. In the preprocessing of satellite images, one of the most important issues is to improve the contrast of images, which helps to increase the accuracy of land detection and segmentation. In remote sensing images after radiometric and atmosph...
Conference Paper
Full-text available
Remote sensing with the least amount of direct contact with objects and terrain Measures and studies their data. This data is not easy to use and needs to be processed and provided by satellite image processing methods for users. One of the applications of satellite imagery is the vegetation identification, which the multi-spectral satellite images...
Conference Paper
Full-text available
Detection and classification of various types of ships that pass through a waterway is one of the issues that have been considered by many researchers nowadays. Detection and classification of the ships can be considered from many aspects such as security, control, and military, which in each of the cases mentioned, special measures are taken with...
Conference Paper
Full-text available
تشخيص عنبيه يکي از امن ترين و معتبرترين روش ها در ميان روش هاي شناسايي بيومتريک است. كه اين روش براساس اسکن چشم و شناسايي قرنيه مي باشد. قطعه بندي خودكار عنبيه چشم و همچنين استخراج ويژگي هاي مقاوم در برابر عوامل ايجاد خطا )زاويه، فاصله، شرايط روشنايي و ...( از موارد مورد توجه براي ناحيه بندي عنبيه است. در روش قطعه بندي ارائه شده به منظور يافتن مرز...
Conference Paper
Full-text available
سرطان سينه یکی از شایعترین عوامل مرگومير در ميان بانوان در دنيا به شمار میآید. تشخيص و جداسازی تومورهای سرطانی در تصاویر ماموگرافی، نيازمند دقت، تجربه و زمان است و این مسئله همواره برای رادیولوژیستها وپزشکان متخصص یک چالش عمده محسوب میشود. در این مطالعه روشی جهت جداسازی تصاویر ماموگرافی براساس تکنيکهای استخراج ویژگی در پردازش تصویر پيشنهاد میشود. ا...
Conference Paper
Full-text available
In local methods for the matching of stereo images, determine the optimal window size plays an important role in accurate estimation of disparity map. To achieve the optimum window size we will use the modified 45° rotation skeleton-based region method (RSBR). Pixels within a similar range in terms of color and levels intensity probably have the sa...
Conference Paper
Full-text available
Fingerprint recognition systems are used in many government and military application programs. Fake fingerprints are considered a major threat to such systems. A method of coping with the invasion of fingerprint forging is to detect whether the fingerprint texture is alive or not. Among various such methods, Local Binary Patterns (LBP) operator is...
Conference Paper
Full-text available
Breast cancer is one of the most common causes of death among women around the world. Mammography is considered the most effective method for early detection of breast cancer. It is difficult for radiologists to detect breast tumor in mammographic pictures. In this study, we propose a method for classifying the mammograms based on support vector ma...
Article
Full-text available
Less important role of banknotes was expected in transactions by advent of electronic tools in banking systems ;however, banknotes have kept their status despite all electronic facilities such as Internet banking, all types credit and ATM cards . ATM ,banknote sorting machines ,banknote accuracy detection machines , and specialized banknote detecti...
Article
Full-text available
Nowadays biometric authentication systems have been more developed, especially in secure and financial systems; so cracking a biometric authentication system is now a growing concern. But their security has not received enough attention. Imitating a biometric trait of a genuine user to deceive a system, spoofing, is the most important attacking met...
Conference Paper
در این مقاله بصورت تجربی میزان آسیب پذیری سیستمهای بیومتریک چندگانه)Multimodal Biometric Systems) را در مقابل حملات نفوذی(Spoofing Attacks) بررسی نموده ایم.
Article
Full-text available
Fingerprint recognition is an interesting subject in biometric. As theirs pattern complication, classifying and identifying them with uncertainty are critical problems in pattern recognition. Fingerprint feature extraction is most important process for identifying them as well. In this paper besides of using effective methods for extraction of feat...
Conference Paper
Full-text available
سیستم های چندپردازنده سیستمهایی با بش از یک پردازنده هستند که امروزه با توجه به تنزل قیمت سخت افزار استفاده از انها به شکل صعودی مرسوم تر می شود. از انجایی که یک سری دستورات خاص در ارگان های خاص بایستی به شکل بلادرنگ به اجرا درایند بنابراین استفاده از این سیستم ها پر رنگ تر می شود. تا کنون دو ساختار کلی برای این سیستم ها پیشنهاد شده است. که هر کدام...
Conference Paper
Full-text available
Fingerprint feature extraction and classification is always an interesting subject, in this paper besides of using effective methods for extraction of features a Fuzzy Neural Network has been introduced for classification and identification. For generating input patterns to feed the matching network, the algorithm extracts singular points and minut...
Conference Paper
Full-text available
The uncertainty is the important problem in complex and flexible patterns, like fingerprints, recognition. In this paper we use fuzzy neurons to design an efficient flexible Fuzzy Neural Network for patterns classification and identification......
Conference Paper
Full-text available
دانش اولیه برای ایجاد یک سیستم را معمو ً لا ا طلاعات ومعرفت افراد خبره وبا تج ربه تشکیل می دهد .به طورکلی منابع دانش عبارتند ازفرد خبره واطلاعات علمی و منطقی دقیق حوزهمورد بررسی .برای اینکه اطلاعات فردخبره رابه نحوی فرموله کرده ودر سیستم خودبکاربریم،منطق فازی رااستفاده می نماییم؛ منتهی برای کلاسه بندی و تشخیص، شبکهعصبی بسیارپرکاربردوکارساز است.لذاب...

Network

Cited By

Projects

Projects (4)
Project
Try to Segment various fields like vegetation in multi spectral Landsat images.