default search action
Asghar Beheshti 0001
Person information
- affiliation: Iran University of Science and Technology, Department of Electrical Engineering, Tehran
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Ali Ahmad Rahmani, Ali Asghar Beheshti Shirazi, Hamid Behnam:
Automatic breast mass segmentation in ultrasound images with U-Net and resolution enhancement blocks. Biomed. Signal Process. Control. 94: 106270 (2024) - 2023
- [j22]Hamid Azadegan, Ali Asghar Beheshti Shirazi:
Improving video quality by predicting inter-frame residuals based on an additive 3D-CNN model. J. Vis. Commun. Image Represent. 90: 103734 (2023) - [j21]Milad Rostami, Ali Asghar Beheshti Shirazi:
Hyperspectral Image Super-Resolution via Learning an Undercomplete Dictionary and Intra-Algorithmic Postprocessing. IEEE Trans. Geosci. Remote. Sens. 61: 1-15 (2023) - 2022
- [j20]Goudarz Saadati Moghadam, Aliasghar Beheshti Shirazi:
Direction of arrival (DOA) estimation with extended optimum co-prime sensor array (EOCSA). Multidimens. Syst. Signal Process. 33(1): 17-37 (2022) - 2021
- [j19]Alireza Mirrashid, Ali Asghar Beheshti Shirazi:
NIC: An innovative supervised machine learning computational framework having network-based interactional connections. Comput. Intell. 37(4): 1916-1943 (2021) - [j18]Alireza Mirrashid, Ali Asghar Beheshti Shirazi:
RQCSNet: A deep learning approach to quantized compressed sensing of remote sensing images. Expert Syst. J. Knowl. Eng. 38(8) (2021) - [j17]Neda Dolati, Ali Asghar Beheshti Shirazi, Hamid Azadegan:
A selective encryption for H.264/AVC videos based on scrambling. Multim. Tools Appl. 80(2): 2319-2338 (2021) - 2020
- [j16]Goudarz Saadati Moghadam, Aliasghar Beheshti Shirazi:
Passive beamforming in co-prime sensor arrays using NSCB method under original pattern perturbations minimization. Multidimens. Syst. Signal Process. 31(2): 527-547 (2020) - [j15]Maryam Hashemi, Alireza Mirrashid, Aliasghar Beheshti Shirazi:
Driver Safety Development: Real-Time Driver Drowsiness Detection System Based on Convolutional Neural Network. SN Comput. Sci. 1(5): 289 (2020) - [i11]Maryam Hashemi, Alireza Mirrashid, Aliasghar Beheshti Shirazi:
Deep learning based Driver Distraction and Drowsiness Detection. CoRR abs/2001.05137 (2020)
2010 – 2019
- 2019
- [j14]Iman Valiulahi, Farzad Parvaresh, Ali Asghar Beheshti Shirazi:
Eliminating Impulsive Noise in Pilot-Aided OFDM Channels via Dual of Penalized Atomic Norm. IEEE Commun. Lett. 23(11): 2059-2062 (2019) - [j13]Goudarz Saadati Moghadam, Aliasghar Beheshti Shirazi:
Novel method for digital beamforming in co-prime sensor arrays using product and min processors. IET Signal Process. 13(6): 614-623 (2019) - [i10]Iman Valiulahi, Farzad Parvaresh, Ali Asghar Beheshti Shirazi:
Eliminating Impulsive Noise in Pilot-Aided OFDM Channels via Dual of Penalized Atomic Norm. CoRR abs/1908.07729 (2019) - 2018
- [j12]Ali Akbar Attari, Ali Asghar Beheshti Shirazi:
Robust audio watermarking algorithm based on DWT using Fibonacci numbers. Multim. Tools Appl. 77(19): 25607-25627 (2018) - [c12]Goudarz Saadati Moghadam, Ali Asghar Beheshti Shirazi:
DOA Estimation with Co-Prime Arrays Based on Multiplicative Beamforming. IST 2018: 501-506 - [c11]Alireza Mirrashid, Ali Asghar Beheshti Shirazi:
Compressed Remote Sensing by Using Deep Learning. IST 2018: 549-552 - [i9]Ali Dalir, Ali Asghar Beheshti Shirazi, Morteza Hoseini Masoom:
Classification of Vehicles Based on Audio Signals using Quadratic Discriminant Analysis and High Energy Feature Vectors. CoRR abs/1804.01212 (2018) - 2017
- [c10]Ali Akbar Attari, Ali Asghar Beheshti Shirazi:
Robust and Blind Audio Watermarking in Wavelet Domain. ICGSP 2017: 69-73 - 2016
- [j11]Mehdi Ayat, Sattar Mirzakuchaki, Aliasghar Beheshti Shirazi:
Design of new digital blind feedforward timing recovery algorithm for linear modulations in digital communication receivers. IET Commun. 10(14): 1736-1743 (2016) - [j10]Mehdi Ayat, Sattar Mirzakuchaki, Aliasghar Beheshti Shirazi:
Design and Implementation of High Throughput, Robust, Parallel M-QAM Demodulator in Digital Communication Receivers. IEEE Trans. Circuits Syst. I Regul. Pap. 63-I(8): 1295-1304 (2016) - [j9]Mehdi Ayat, Mohammad Amin Karami, Sattar Mirzakuchaki, Aliasghar Beheshti Shirazi:
Design of Multiple Modulated Frequency Lock-In Amplifier for Tapping-Mode Atomic Force Microscopy Systems. IEEE Trans. Instrum. Meas. 65(10): 2284-2292 (2016) - 2012
- [j8]Majid Roohollah Ardestani, Ali Asghar Beheshti Shirazi:
Multiple description coding of scalable video stream based on unequal loss protection and optimal rate allocation. Sci. Iran. 19(3): 782-794 (2012) - 2011
- [j7]Majid Roohollah Ardestani, Ali Asghar Beheshti Shirazi, Mahmoud Reza Hashemi:
Low-complexity unbalanced multiple description coding based on balanced clusters for adaptive peer-to-peer video streaming. Signal Process. Image Commun. 26(3): 143-161 (2011) - [p1]Shahin Sohrabi, Ali Asghar Beheshti Shirazi:
A New Star Identification Algorithm Based on Fuzzy Algorithms. Computer Recognition Systems 4 2011: 657-665 - 2010
- [j6]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme. Int. J. Netw. Secur. 10(1): 51-56 (2010) - [j5]Behzad Omidali, Seyed Ali-Asghar Beheshti Shirazi:
Sensor Placement to Improve the Positioning Performance Based on Angle of Arrival (AOA). Wirel. Eng. Technol. 1(1): 41-45 (2010) - [c9]Majid Roohollah Ardestani, Ali Asghar Beheshti Shirazi, Mahmoud Reza Hashemi:
An improved low-complexity multiple description coding for peer-to-peer video streaming. ICME 2010: 255-260 - [c8]Majid Roohollah Ardestani, Ali Asghar Beheshti Shirazi, Mahmoud Reza Hashemi:
Rate-distortion modeling for scalable video coding. ICT 2010: 923-928 - [c7]Ali Ghayoor, Saeed Ghorbani, Ali Asghar Beheshti Shirazi:
Sub-pixel image registration based on physical forces. WCSP 2010: 1-5 - [i8]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
SSMS - A Secure SMS Messaging Protocol for the M-payment Systems. CoRR abs/1002.3171 (2010) - [i7]Mehdi Chehel Amirani, Mohsen Toorani, Asghar Beheshti:
A new approach to content-based file type detection. CoRR abs/1002.3174 (2010) - [i6]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
Solutions to the GSM Security Weaknesses. CoRR abs/1002.3175 (2010) - [i5]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments. CoRR abs/1002.3299 (2010) - [i4]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve. CoRR abs/1002.3303 (2010) - [i3]Mohsen Toorani, Asghar Beheshti:
A Directly Public Verifiable Signcryption Scheme based on Elliptic Curves. CoRR abs/1002.3316 (2010) - [i2]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme. CoRR abs/1004.3521 (2010) - [i1]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
An Elliptic Curve-based Signcryption Scheme with Forward Secrecy. CoRR abs/1005.1856 (2010)
2000 – 2009
- 2009
- [j4]Mohammad Zounemat-Kermani, Ali Asghar Beheshti Shirazi, Behzad Ataie-Ashtiani, Saeed-Reza Sabbagh-Yazdi:
Estimation of current-induced scour depth around pile groups using neural network and adaptive neuro-fuzzy inference system. Appl. Soft Comput. 9(2): 746-755 (2009) - [j3]Mehdi Chehel Amirani, Ali Asghar Beheshti Shirazi:
Evaluation of the Texture Analysis Using Spectral Correlation Function. Fundam. Informaticae 95(2-3): 245-262 (2009) - [j2]Mehdi Chehel Amirani, Ali Asghar Beheshti Shirazi:
A New Approach to Rotation Invariant Texture Analysis Based on Radon Transform. IEICE Trans. Inf. Syst. 92-D(9): 1736-1744 (2009) - [c6]Majid Roohollah Ardestani, Alireza Aminlou, Ali Asghar Beheshti Shirazi:
Unequal loss-protected multiple description coding of scalable source streams using a progressive approach. ICIP 2009: 901-904 - [c5]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
A directly public verifiable signcryption scheme based on elliptic curves. ISCC 2009: 713-716 - 2008
- [j1]Mehdi Chehel Amirani, Zahra Sadeghi Gol, Ali Asghar Beheshti Shirazi:
A New Approach to Shape-based Image Retrieval. Int. J. Comput. 7(3): 99-106 (2008) - [c4]Masoud Ghoreishi Madiseh, Michael L. McGuire, Stephen W. Neville, Ali Asghar Beheshti Shirazi:
Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios. CNSR 2008: 88-95 - [c3]Mohsen Toorani, Ali Asghar Beheshti Shirazi:
SSMS - A secure SMS messaging protocol for the m-payment systems. ISCC 2008: 700-705 - [c2]Mehdi Chehel Amirani, Mohsen Toorani, Ali Asghar Beheshti Shirazi:
A new approach to content-based file type detection. ISCC 2008: 1103-1108 - 2007
- [c1]Ali Shojaee Bakhtiari, Ali Asghar Beheshti Shirazi, Babak Zamanlooy:
An Efficient Biocryptosystem Based on the Iris Biometrics. PSIVT 2007: 334-345
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint