Somayeh Hashemi
Islamic Azad University
Key spaceDetection limitBaum–Welch algorithmPotentiometric titrationInternal medicineCodebookBitwise operationOncologySignature (logic)EncryptionCode wordArtificial intelligenceNanoparticleReceptorElectrodeCryptographyPattern recognitionInorganic chemistryChemistryProspective cohort studyForward algorithmVector quantizationk-means clusteringDiscrete cosine transformHidden Markov modelChaoticIon selective electrodeMastectomyTransmitter stationClinoptiloliteMetastasisCHAOS (operating system)Speech recognitionChaotic systemsFinite timeSecure communication systemReceptor expressionComputer networkFacial recognition systemMathematicsSecurity analysisWord error rateComputer scienceBase (topology)Radiation therapySecure communicationChromiumFeature extractionBreast cancerPulmonary surfactantCryptosystemMedicineCluster analysisSignature recognitionEstrogen receptorRobustness (computer science)
7Publications
3H-index
22Citations
Publications 7
Newest
#1Somayeh Hashemi (IAU: Islamic Azad University)H-Index: 3
#2Mohammad Ali Pourmina (IAU: Islamic Azad University)H-Index: 10
Last. Mahdi R. Alagheband (IAU: Islamic Azad University)H-Index: 6
view all 4 authors...
This paper proposes a new and efficient chaos-based cryptosystem for multiuser speech encryption. In this regards, Chua chaotic systems are added to the transmitters and receiver to generate the chaotic encryption/decryption keys. The User, who has been selected to send the speech information, encrypts voice information by the chaotic keys and sends it to the base station. To encrypt the speech signal, combination of Chaotic Matrix Operation for Randomization or Encryption and XOR operation is s...
1 CitationsSource
#1Somayeh Hashemi (IAU: Islamic Azad University)H-Index: 3
#2Mohammad Ali Pourmina (IAU: Islamic Azad University)H-Index: 10
Last. Mahdi R. Alagheband (IAU: Islamic Azad University)H-Index: 6
view all 4 authors...
This paper proposes a chaotic secure communication system between a base transmitter station and mobile equipment. To make the chaotic keys, the Chua chaotic systems are used in the mobile equipmen...
12 CitationsSource
#1Somayeh Hashemi (IAU: Islamic Azad University)H-Index: 3
#2Alireza Nezamzadeh-Ejhieh (Islamic Azad University, Isfahan)H-Index: 59
AbstractA novel modified hexadecyltrimethyl ammonium surfactant-modified nanoclinoptilolite electrode was constructed for the potentiometric determination of dichromate and showed a Nernstian response in the concentration range of 7.0 × 10−6 − 1.0 × 10−1 M. A Nernstian slope of 29.7 ± 0.9 m V per decade of dichromate concentration and a detection limit of 3.1 × 10−7 M dichromate were obtained for the proposed electrode. The proposed electrode exhibited a rapid response about 10 s over a period o...
5 CitationsSource
#1Iosr journalsH-Index: 1
#2Behrouz VaseghiH-Index: 4
Last. Somayeh HashemiH-Index: 3
view all 3 authors...
In this paper an on-line signature verification system, using vector quantization and Hidden Markov Model (VQ-HMM) is presented. After the signature acquisition, a Chebichef filter is used for noise reduction, and size and phase normalization is performed using Fourier transform. Each signature is segmented and mean velocity, acceleration and pressure are used as extracted features. K-means clustering is used for generation a codebook and VQ generates a code word for each signature. These code w...
1 CitationsSource
#1Behrouz VaseghiH-Index: 4
#2Somayeh HashemiH-Index: 3
This paper presents a new recognition system for offline signatures using Discrete Cosine Transform (DCT) and pseudo 2 Dimension Discrete Hidden Markov Model (P2D-DHMM). Each signature image is scanned in two ways. One way from right to left and one way from top to bottom by a sliding window and two sets of features are extracted. 2D-DCT coefficients as features are extracted. K-means clustering is used for generation two codebooks and then by the vector quantization (VQ) two code words for each...
2 Citations
#1Behrouz Vaseghi (IAU: Islamic Azad University)H-Index: 4
#2Somayeh Hashemi (IAU: Islamic Azad University)H-Index: 3
In this paper, we propose a pseudo 2 Dimension Discrete HMM (P2D-DHMM) for face verification. Each face image is scanned for frontal face in two ways. One way from top to bottom and one way from right to left by a sliding window and two set features are extracted. 2D-DCT coefficients as features are extracted. K-means clustering is used for generation two codebook and then by the vector quantization (VQ) two code words for each face image are generated. These code words are used as observation v...
5 CitationsSource
#1Seyed Mohammad Rabiee Hashemi (UT: University of Tehran)H-Index: 1
#1Seyed Mohammad Hashemi (UT: University of Tehran)H-Index: 2
Last. Somayeh Hashemi (IAU: Islamic Azad University)H-Index: 3
view all 2 authors...
Objective Breast cancer is a heterogeneous disease with variable biological and clinical characteristics. We conducted a study to evaluate P53, HER-2/neu and hormonal receptor expression as predictors of prognosis in breast cancer.
2 CitationsSource