Mohammad Mahdi Dehshibi

Mohammad Mahdi Dehshibi
University Carlos III de Madrid | UC3M · Department of Computer Science and Engineering

Doctor of Philosophy

About

68
Publications
38,004
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
622
Citations
Citations since 2017
28 Research Items
438 Citations
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
Introduction
Mohammad Mahdi Dehshibi is an AQU Associate Professor with a PhD in AI. His research interests include Deep Learning, Affective Computing, and Unconventional Computing. He has collaborated on three EU-funded projects (FUNGAR, COgITOR, and BODYinTRANSIT) as a senior data and ML scientist. He is also a visiting scholar at the Unconventional Computing Lab (UWE, Bristol) and a member of the editorial board of the International Journal of Parallel, Emergent, and Distributed Systems.
Additional affiliations
March 2022 - present
University Carlos III de Madrid
Position
  • Research Scientist
Description
  • I'm responsible for data analysis in BODYinTRANSIT EU-funded bids.
October 2019 - February 2020
University of the West of England, Bristol
Position
  • Researcher
October 2018 - March 2022
Universitat Oberta de Catalunya
Position
  • PostDoc Position
Education
March 2012 - September 2017
March 2009 - September 2011
Qazvin Islamic Azad University
Field of study
  • Software engineering

Publications

Publications (68)
Preprint
Full-text available
There is a growing body of studies on applying deep learning to biometrics analysis. Certain circumstances, however, could impair the objective measures and accuracy of the proposed biometric data analysis methods. For instance, people with chronic pain (CP) unconsciously adapt specific body movements to protect themselves from injury or additional...
Article
Full-text available
Trees employ impulses of electrical activity to coordinate actions of their bodies and long-distance communication. There are indications that the vascular system might act as a network of pathways for traveling electrical impulses. A question arises about the correlation and interplay between the molecular (microscopic) level and the macroscopic o...
Conference Paper
Full-text available
When English clubs and the game’s governing bodies and organizations turned off their Facebook, Twitter, and Instagram accounts from April 30 to May 1, 2021, the fight against online racism regained a new momentum. However, the Tokyo Olympics revealed new aspects of online bullying that athletes may face during major sporting events. Despite the sig...
Conference Paper
Full-text available
Many samples are necessary to train a convolutional neural network (CNN) to achieve optimum performance while maintaining generalizability. Several studies, however, have indicated that not all input data in large datasets are informative for the model, and using them for training can degrade the model's performance and add uncertainty. Furthermore...
Preprint
Full-text available
This work is dedicated to the review and perspective of the new direction that we call "Neuropunk revolution" resembling the cultural phenomenon of cyberpunk. This new phenomenon has its foundations in advances in neuromorphic technologies including memristive and bio-plausible simulations, BCI, and neurointerfaces as well as unconventional approac...
Article
Full-text available
A reactive bacterial glove is a cotton glove colonised by Acetobacter aceti, an example of biofabrication of a living electronic sensing device. The bacterial colony, supported by a cellulose-based hydrogel, forms a several millimetres-thick living coating on the surface of the glove. This paper proposes a novel method for analysing the complex ele...
Preprint
Full-text available
Electrical activity is used by plants in long term signalling and information transfer between the distant parts of the plant. Biopotential recordings from trees in a natural environment have been so far less discussed in scientific literature. Here we present our data about the open science experiment TRee-hUMAn iNterface (TRUMAN) located in Panev...
Preprint
Full-text available
To equip Convolutional Neural Networks (CNNs) with explainability, it is essential to interpret how opaque models take specific decisions, understand what causes the errors, improve the architecture design, and identify unethical biases in the classifiers. This paper introduces ADVISE, a new explainability method that quantifies and leverages the r...
Article
Full-text available
Early diagnosis of Alzheimer's disease and its prodromal stage, also known as mild cognitive impairment (MCI), is critical since some patients with progressive MCI will develop the disease. We propose a multi-stream deep convolutional neural network fed with patch-based imaging data to classify stable MCI and progressive MCI. First, we compare MRI...
Article
Fungal electronics is a family of living electronic devices made of mycelium bound composites or pure mycelium. Fungal electronic devices are capable of changing their impedance and generating spikes of electrical potential in response to external control parameters. Fungal electronics can be embedded into fungal materials and wearables or used as...
Article
Full-text available
The re-emergence of mosquito-borne diseases (MBDs), which kill hundreds of thousands of people each year, has been attributed to increased human population, migration, and environmental changes. Convolutional neural networks (CNNs) have been used by several studies to recognise mosquitoes in images provided by projects such as Mosquito Alert to ass...
Article
Full-text available
Nowadays, a significant part of our time is spent sharing multimodal data on social media sites such as Instagram, Facebook and Twitter. The particular way through which users present themselves to social media can provide useful insights into their behaviours, personalities, perspectives, motives and needs. This paper proposes to use multimodal da...
Article
Full-text available
Monitoring the spread of disease-carrying mosquitoes is a first and necessary step to control severe diseases such as dengue, chikungunya, Zika or yellow fever. Previous citizen science projects have been able to obtain large image datasets with linked geo-tracking information. As the number of international collaborators grows, the manual annotati...
Article
Full-text available
Oyster fungi Pleurotus djamor generate actin potential like spikes of electrical potential. The trains of spikes might manifest propagation of growing mycelium in a substrate, transportation of nutrients and metabolites and communication processes in the mycelium network. The spiking activity of the mycelium networks is highly variable compared to...
Article
Full-text available
Smart wearables sense and process information from the user's body and environment and report results of their analysis as electrical signals. Conventional electronic sensors and controllers are commonly, sometimes augmented by recent advances in soft electronics. Organic electronics and bioelectronics, especially with living substrates, offer a gr...
Article
Full-text available
For reconstructing CT images in the clinical setting, 'effective energy' is usually used instead of the total X-ray spectrum. This approximation causes an accuracy decline. We proposed to quantize the total X-ray spectrum into irregular intervals to preserve accuracy. A phantom consisting of the skull, rib bone, and lung tissues was irradiated with...
Preprint
Full-text available
One of the significant problem in peer-to-peer databases is collision problem. These databases do not rely on a central leader that is a reason to increase scalability and fault tolerance. Utilizing these systems in high throughput computing cause more flexibility in computing system and meanwhile solve the problems in most of the computing systems...
Preprint
Full-text available
Sharing multimodal information (typically images, videos or text) in Social Network Sites (SNS) occupies a relevant part of our time. The particular way how users expose themselves in SNS can provide useful information to infer human behaviors. This paper proposes to use multimodal data gathered from Instagram accounts to predict the perceived prot...
Preprint
Full-text available
An excitable chemical medium --- Belousov-Zhabotinsky (BZ) reaction --- is proven to be a fruitful substrate for prototyping unconventional computing devices. These include image processors, logical circuits, and robot controllers. We study a BZ potential for characterising a geometry of street networks on a fragment of Tehran street map. The city...
Preprint
Full-text available
Decanol droplets in a thin layer of sodium decanoate with sodium chloride exhibit bifurcation branching growth due to interplay between osmotic pressure, diffusion and surface tension. We aimed to evaluate if morphology of the branching droplets changes when the droplets are subject to electrical potential difference. We analysed graph-theoretic st...
Article
Full-text available
A recent challenge in computer vision is exploring the cardinality of a relationship among multiple visual entities to answer questions like whether the subjects in a photograph have a kin relationship. This paper tackles kinship recognition from the aging viewpoint in which the system could find the parent of a child where the input image of the p...
Article
Unconventional computing is about breaking boundaries in thinking, acting and computing. Typical topics of this non-typical field include, but are not limited to physics of computation, non-classical logics, new complexity measures, novel hardware, mechanical, chemical and quantum computing. Unconventional computing encourages a new style of thinki...
Article
Full-text available
In the field of image analysis, segmentation is one of the most important preprocessing steps. One way to achieve segmentation is the use of threshold selection, where each pixel that belongs to a determined class, based on the mutual visual characteristics, is labeled according to the selected threshold. In this work, a combination of two pioneer...
Article
Full-text available
Numismatics sorts out historical aspects of money. Identification and classification of coins, as a part of their duties, need years of experience. This research aims at using the knowledge of numismatics for developing an image-based classification of ancient Sassanian dynasty coins. A straightforward method is to take coins observe and reverse-si...
Article
Full-text available
Malware is defined as any type of malicious code that is the potent to harm a computer or a network. Modern malwares are accompanied with mutation characteristics, namely polymorphism and metamorphism. They let malwares to generate enormous number of variants. Rising number of metamorphic malwares entails hardship in analyzing them for signature ex...
Article
Full-text available
To understand how the Persian language developed over time, we uncover the dynamics of the complexity of Persian orthography. We represent Persian words by L-systems and calculate complexity measures of these generative systems. The complexity measures include degrees of nonconstructability, generative complexity, and morphological richness; the me...
Conference Paper
Full-text available
Ahstract-Face recognition has been a long standing problem in computer vision. Histograms of Oriented Gradients (HOGs) and Local Binary Patterns (LBPs) have proven to be an effective descriptor for object recognition in general and face recognition in particular. In this paper, we investigate a simple but powerful approach to make robust use of HOG...
Conference Paper
Full-text available
Nowadays, no one can neglect the effect of smartphone applications in the daily life. Diversity of these applications are enormously increased, from entertainment to education. In the meantime, informative applications have their pros. In this research, producing a painter finder app has been taken into account. Finding adequate information about p...
Conference Paper
Full-text available
Conventionally, music sharing has been done through two ways: aural transmission and in the form of written documents which is normally called musical scores. As many of these paper based scores have not been published they are subj ected to be damaged. To preserve the music an application that has the capability of digitalizing these symbolic imag...
Conference Paper
Full-text available
Complementary medicine emphasizes therapies which are claimed to improve quality of life, prevent disease, and address conditions that conventional medicine has limited success in curing. Iridology is an alternative medicine technique which examines patterns, colors, and other characteristics of the iris to determine information about a patient's s...
Article
Full-text available
Lyndenmayer systems (L-systems) allow us to grow sophisticated patterns by applying just few simple rules. The L-systems are now universal tools for abstract representation of plant development. Can the L-systems be used to " grow " Persian words and sentences? Yes. We demonstrate this by introducing grammars and rules to generate 108 words of a Pe...
Conference Paper
Full-text available
Ancient coins classification has attracted increasing attention for the benefits which it brings to numismatic community. However, high between-class similarity and, in the meantime, high within-class variability make the problem a particular challenge. This issue highlights the importance of extracting discriminative features for ancient coins cla...
Conference Paper
Full-text available
An L-System is a parallel rewriting system and a type of formal grammar, which was introduced to be used in describing the behavior of plant cells, modeling the growth processes of plant development, the morphology of organisms, and generating self-similar fractals. The mentioned applications lie in the field of pattern formation. However, to the b...
Article
Full-text available
Viseme (Visual Phoneme) classification and analysis in every language are among the most important preliminaries for conducting various multimedia researches such as talking head, lip reading, lip synchronization, and computer assisted pronunciation training applications. With respect to the fact that analyzing visemes is a language dependent proce...
Book
Full-text available
The science of pattern formation deals with the visible, (statistically) orderly outcomes of self-organization and the common principles behind similar patterns in nature. Cell pattern formation has an important role in both artificial and natural development. Different methods have been utilized for pattern formation such as geometrical, Cellular...
Conference Paper
Full-text available
Viseme (Visual Phoneme) clustering and analysis in every language is among the most important preliminaries for conducting various multimedia researches as talking head, lip reading, lip synchronization and computer assisted pronunciation training applications. With respect to the fact that clustering and analyzing visemes are language dependent pr...
Conference Paper
Full-text available
In this paper, we propose a method for kernel–based object tracking in order to deal with partial occlusion. We use particle filter to estimate target position accurately. The incremental Bhattacharyya Dissimilarity (IBD) based stage is designed to consistently distinguish the particles located in the object region from the others placed in the bac...
Conference Paper
Full-text available
Viseme (Visual Phoneme) clustering and analysis in every language is among the most important preliminaries for conducting various multimedia researches as talking head, lip reading, lip synchronization and computer assisted pronunciation training applications. With respect to the fact that clustering and analyzing visemes are language dependent pr...
Conference Paper
Full-text available
In this paper, we propose a method for kernel-based object tracking in order to deal with partial occlusion. We use particle filter to estimate target position accurately. The incremental Bhattacharyya Dissimilarity (IBD) based stage is designed to consistently distinguish the particles located in the object region from the others placed in the bac...
Article
Full-text available
There are numerous multimedia applications such as talking head, lip reading, lip synchronization, and computer assisted pronunciation training, which entices researchers to bring clustering and analyzing viseme into focus. With respect to the fact that clustering and analyzing visemes are language dependent process, we concentrated our research on...
Article
Full-text available
Projection Functions have been widely used for facial feature extraction and optical/handwritten character recognition due to their simplicity and efficiency. Because these transformations are not one-to-one, they may result in mapping distinct points into one point, and consequently losing detailed information. Here, we solve this problem by defin...
Conference Paper
Full-text available
Swarm intelligence algorithms have been extensively used in clustering based applications e.g. image segmentation which is one of the fundamental components in image analysis and pattern recognition domains. Particle swarm optimization is amongst swarm intelligence algorithms that performs based on population and random search. In this paper, a hyb...
Conference Paper
Full-text available
Objective function or the constraints and consequently the optimal value of the problem can be changed during time in Dynamic optimization problems. There are several challenges in dynamic environments, so that algorithms designed for optimization in these environments would utilize several mechanisms in order to conquer the challenges. In this pap...
Conference Paper
Full-text available
Immunocytochemistry (ICC) is a microscopic imaging technique that is used to assess the presence of a specific antigen in cells utilizing a specific antibody for allowing visualization and examination processes. Number of cells in an ICC image is considered as one of the most important indicators in the examination process. In this paper, an image...
Conference Paper
Full-text available
Facial image analysis is one of the areas that have been received considerable attention in recent decades. In addition to areas such as face recognition, gender classification, emotion recognition, and age estimation, there are new applications that have not been studied yet. Family similarity recognition is a new trend that has been studied in th...
Data
In this paper, a new algorithm for age-group recognition from frontal face image is presented. The algorithm classifies subjects into four different age categories in four key stages: Pre-processing, facial feature extraction by a novel geometric feature-based method, face feature analysis, and age classification. In order to apply the algorithm to...
Article
Full-text available
Although the capability and productivity of Cellular Automata (CA) entice researchers to bring them into focus, a few works have been reported on utilization of CA in the field of script generation. The focus of this research is not only on generating a type of ancient Persian script, so-called Ma'qeli, using block cellular automata with Margolus n...
Article
Full-text available
Despite the success of License Plate Recognition (LPR) methods in the past decades, this problem is quite a challenge due to the diversity of plate formats and multiform outdoor illumination conditions during image acquisition. This paper presents a real-time and robust method for Persian license plate location and recognition. The proposed method...
Article
Full-text available
Solving pattern recognition problems using imbalanced databases is a hot topic, which entices researchers to bring it into focus. Therefore, we consider this problem in the application of Sassanid coins classification. Our focus is not only on proposing EigenCoin manifold with Bhattacharyya distance for the classification task, but also on testing...
Conference Paper
Full-text available
In this paper we present a novel and efficient method, called shoulder point detection (SPD), for computing a planar rational quadratic Bezier curve to approximate a target shape defined by a set of dense and noisy data points. Our contribution is utilizing from one of the exclusive properties of Conic Splines, called the shoulder point(SP) for spe...
Article
Full-text available
This paper introduces a framework for clustering similar family members for the first time. Three features include "The Whole Face", "The Facial Features Perimeter", and "The Ratio between Facial Features" have been used. A color based method is utilized for face localization, an anthropometric based method is used for features perimeter extraction...
Conference Paper
Full-text available
In recent years, much research has been devoted to the visual codebook based texture analysis and image recognition due to its robustness against affine transformation and illumination variation. Our focus in this research is not on whether the texture analyzer algorithm by the affine invariable descriptors of local patches follows a codebook const...
Article
Full-text available
Abstract—this paper aims at successful tracking of volleyball athletes during competition using only a single camera. Due to the wide range of possible motions and non-rigid shape changes, the tracking task becomes quite complex. We propose a novel method based on adaptive background subtraction by two concurrent frames. The proposed method detects...
Article
Full-text available
This paper sorts out the problem of Persian Vowel viseme clustering. Clustering audio-visual data has been discussed for a decade or so. However, it is an open problem due to shortcoming of appropriate data and its dependency to target language. Here, we propose a speaker-independent and robust method for Persian viseme class identification as our...
Article
In this paper, a new algorithm for age-group recognition from frontal face image is presented. The algorithm classifies subjects into four different age categories in four key stages: Pre-processing, facial feature extraction by a novel geometric feature-based method, face feature analysis, and age classification. In order to apply the algorithm to...
Conference Paper
Full-text available
Facial feature extraction is one of the most important challenges in the area of facial image processing. This paper introduces a new method for locating eye features that is capable of processing images rapidly while achieving high detection rates. The proposed method is applicable to an n-dimensional space. Therefore, a new representation is cons...
Conference Paper
Full-text available
This paper introduces a database of over 3,600 color images which we collected from 616 different human faces. It includes facial images of people between ages 2-85. Face images of persons with different ages is needed to generate a reliable age classification algorithm. Four different poses, two different expressions, and one image with glasses we...