default search action
Maher A. Sid-Ahmed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j23]Mahnaz Shafii, Maher A. Sid-Ahmed:
Skew detection and correction based on an axes-parallel bounding box. Int. J. Document Anal. Recognit. 18(1): 59-71 (2015) - 2012
- [c32]Shruthi Kubatur, Maher A. Sid-Ahmed, Majid Ahmadi:
A neural network approach to online Devanagari handwritten character recognition. HPCS 2012: 209-214 - [c31]Mahnaz Shafii, Maher A. Sid-Ahmed, Majid Ahmadi:
A novel segmentation technique for splitting a typed Persian text to sub-words. ISCCSP 2012: 1-5 - 2011
- [j22]Abdul Adeel Mohammed, Rashid Minhas, Q. M. Jonathan Wu, Maher A. Sid-Ahmed:
Human face recognition based on multidimensional PCA and extreme learning machine. Pattern Recognit. 44(10-11): 2588-2597 (2011) - [c30]Abdul Adeel Mohammed, Q. M. Jonathan Wu, Maher A. Sid-Ahmed:
Human face classification based on localized blur descriptors. ICIP 2011: 1785-1788 - 2010
- [j21]Abdul Adeel Mohammed, Rashid Minhas, Q. M. Jonathan Wu, Maher A. Sid-Ahmed:
An efficient fingerprint image compression technique based on wave atoms decomposition and multistage vector quantization. Integr. Comput. Aided Eng. 17(1): 29-40 (2010) - [j20]Mohammed J. Islam, Q. M. Jonathan Wu, Majid Ahmadi, Maher A. Sid-Ahmed:
Investigating the Performance of Naive- Bayes Classifiers and K- Nearest Neighbor Classifiers. J. Convergence Inf. Technol. 5(2): 133-137 (2010) - [c29]Abdul Adeel Mohammed, Q. M. Jonathan Wu, Maher A. Sid-Ahmed:
Application of Wave Atoms Decomposition and Extreme Learning Machine for Fingerprint Classification. ICIAR (2) 2010: 246-255 - [c28]Michael Chukwu, Maher A. Sid-Ahmed:
Single input image super resolution with alias detection. ISSPA 2010: 488-491 - [c27]Mohammed J. Islam, Majid Ahmadi, Maher A. Sid-Ahmed:
Computer-Aided Detection and Classification of Masses in Digitized Mammograms Using Artificial Neural Network. ICSI (2) 2010: 327-334 - [i1]Mohammed J. Islam, Majid Ahmadi, Maher A. Sid-Ahmed:
An Efficient Automatic Mass Classification Method In Digitized Mammograms Using Artificial Neural Network. CoRR abs/1007.5129 (2010)
2000 – 2009
- 2009
- [j19]Houman Rastgar, Majid Ahmadi, Maher A. Sid-Ahmed:
A Stereo Vision-Based Bin Picking System Using Hopfield Neural Networks. J. Circuits Syst. Comput. 18(3): 443-463 (2009) - [c26]Abdul Adeel Mohammed, Rashid Minhas, Q. M. Jonathan Wu, Maher A. Sid-Ahmed:
Fingerprint image compression standard based on wave atoms decomposition and self organizing feature map. EIT 2009: 367-372 - [c25]Abdul Adeel Mohammed, Rashid Minhas, Q. M. Jonathan Wu, Maher A. Sid-Ahmed:
A Novel Technique for Human Face Recognition Using Nonlinear Curvelet Feature Subspace. ICIAR 2009: 512-521 - [c24]Rashid Minhas, Abdul Adeel Mohammed, Q. M. Jonathan Wu, Maher A. Sid-Ahmed:
3D Shape from Focus and Depth Map Computation Using Steerable Filters. ICIAR 2009: 573-583 - [c23]Abdul Adeel Mohammed, Rashid Minhas, Q. M. Jonathan Wu, Maher A. Sid-Ahmed:
A generic fingerprint image compression technique based on wave atoms decomposition. ICIP 2009: 2837-2840 - 2008
- [j18]Songtao Huang, Majid Ahmadi, Maher A. Sid-Ahmed:
A hidden Markov model-based character extraction method. Pattern Recognit. 41(9): 2890-2900 (2008) - [c22]Mohammed J. Islam, Majid Ahmadi, Maher A. Sid-Ahmed:
Image processing techniques for quality inspection of gelatin capsules in pharmaceutical applications. ICARCV 2008: 862-867 - [c21]Elham Shahinfard, Maher A. Sid-Ahmed, Majid Ahmadi:
A motion adaptive deinterlacing method with hierarchical motion detection algorithm. ICIP 2008: 889-892 - 2007
- [c20]Idris El-Feghi, M. Galhoud, Maher A. Sid-Ahmed, Majid Ahmadi:
Three-Level Gray-Scale Images Segmentation using Non-extensive Entropy. CGIV 2007: 304-307 - [c19]Idris El-Feghi, N. Adem, Maher A. Sid-Ahmed, Majid Ahmadi:
Improved Co-occurrence Matrix as a Feature Space for Relative Entropy-based Image Thresholding. CGIV 2007: 314-320 - [c18]Idris El-Feghi, H. Aboasha, Maher A. Sid-Ahmed, Majid Ahmadi:
Content-Based Image Retrieval based on efficient fuzzy color signature. SMC 2007: 1118-1124 - [c17]Zhengqiao Ji, Q. M. Jonathan Wu, Maher A. Sid-Ahmed:
An improved immune Q-learning algorithm. SMC 2007: 1636-1641 - 2006
- [j17]Idris El-Feghi, Maher A. Sid-Ahmed, Majid Ahmadi:
Automatic localization of craniofacial landmarks using multi-layer perceptron as a function approximator. Pattern Recognit. Lett. 27(6): 544-550 (2006) - [c16]Songtao Huang, Maher A. Sid-Ahmed, Majid Ahmadi, Idris El-Feghi:
A binarization method for scanned documents based on hidden Markov model. ISCAS 2006 - [c15]Houman Rastgar, Majid Ahmadi, Maher A. Sid-Ahmed:
3D position sensing using a Hopfield neural network stereo matching algorithm. ISCAS 2006 - [c14]Songtao Huang, Majid Ahmadi, Maher A. Sid-Ahmed:
An Edge Based Thresholding Method. SMC 2006: 1603-1608 - 2005
- [j16]Yasser Alginahi, D. Fekri, Maher A. Sid-Ahmed:
A Neural-based Page Segmentation System. J. Circuits Syst. Comput. 14(1): 109-122 (2005) - [c13]Yasser Alginahi, Maher A. Sid-Ahmed, Majid Ahmadi:
Extraction of objects and page segmentation of composite documents with non-uniform background. ICINCO 2005: 344-347 - 2004
- [j15]Idris El-Feghi, Maher A. Sid-Ahmed, Majid Ahmadi:
Automatic localization of craniofacial landmarks for assisted cephalometry. Pattern Recognit. 37(3): 609-621 (2004) - [c12]Li Liang, Majid Ahmadi, Maher A. Sid-Ahmed:
Design of complementary filter pairs with canonical signed-digit coefficients using genetic algorithm. ICECS 2004: 611-614 - [c11]Idris El-Feghi, Songtao Huang, Maher A. Sid-Ahmed, Majid Ahmadi:
Contrast enhancement of radiograph images based on local heterogeneity measures. ICIP 2004: 989-992 - [c10]Idris El-Feghi, Yasser Alginahi, Maher A. Sid-Ahmed, Majid Ahmadi:
Craniofacial landmarks extraction by Partial Least Squares Regression. ISCAS (4) 2004: 45-48 - 2003
- [c9]Idris El-Feghi, Maher A. Sid-Ahmed, Majid Ahmadi:
Automatic localization of craniofacial landmarks for assisted cephalometry. ISCAS (3) 2003: 630-633 - [c8]Idris El-Feghi, Maher A. Sid-Ahmed, Majid Ahmadi:
Automatic Identification and Localization of Craniofacial Landmarks Using Multi Layer Neural Network. MICCAI (1) 2003: 643-654 - 2000
- [j14]Idris El-Feghi, Majid Ahmadi, William C. Miller, Maher A. Sid-Ahmed, V. Ramachandran:
Design of Stable 3D Recursive Digital Filters Using 3-Variable Very Strictly Hurwitz Polynomial. J. Circuits Syst. Comput. 10(5-6): 219-228 (2000) - [c7]S. Beiraghi, Majid Ahmadi, Maher A. Sid-Ahmed, Malayappan Shridhar:
Application of Fuzzy Integrals in Fusion of Classifiers for Low Error Rate Handwritten Numerals Recognition. ICPR 2000: 2487-2490
1990 – 1999
- 1999
- [c6]Idris El-Feghi, Maher A. Sid-Ahmed, Majid Ahmadi:
Design of 3-D recursive digital filters using linear programming. ISSPA 1999: 973-976 - 1997
- [j13]Osama Abdel-Wahhab, Maher A. Sid-Ahmed:
A new scheme for training feed-forward neural networks. Pattern Recognit. 30(3): 519-524 (1997) - 1996
- [j12]John Cardillo, Maher A. Sid-Ahmed:
Target recognition in a cluttered scene using mathematical morphologu. Pattern Recognit. 29(1): 27-49 (1996) - 1995
- [j11]M. A. Abou-nasr, Maher A. Sid-Ahmed:
Fast learning and efficient memory utilization with a prototype based neural classifier. Pattern Recognit. 28(4): 581-593 (1995) - 1994
- [j10]John Cardillo, Maher A. Sid-Ahmed:
An image processing system for locating craniofacial landmarks. IEEE Trans. Medical Imaging 13(2): 275-289 (1994) - 1993
- [j9]Herbert J. Kaufman, Maher A. Sid-Ahmed:
Hardware realization of a 2D IIR semisystolic filter with application to real-time homomorphic filtering. IEEE Trans. Circuits Syst. Video Technol. 3(1): 2-14 (1993) - 1992
- [j8]Maher A. Sid-Ahmed:
A hardware structure for the automatic selection of multi-level thresholds in digital images. Pattern Recognit. 25(12): 1517-1528 (1992) - 1991
- [j7]John Cardillo, Maher A. Sid-Ahmed:
3-D Position Sensing Using a Passive Monocular Vision System. IEEE Trans. Pattern Anal. Mach. Intell. 13(8): 809-813 (1991) - 1990
- [j6]A. Namane, Maher A. Sid-Ahmed:
Character Scaling by Contour Method. IEEE Trans. Pattern Anal. Mach. Intell. 12(6): 600-606 (1990) - [j5]Fatma El-Khaly, Maher A. Sid-Ahmed:
Machine recognition of optically captured machine printed arabic text. Pattern Recognit. 23(11): 1207-1214 (1990) - [j4]James J. Soltis, T. J. Kent, Maher A. Sid-Ahmed:
Chebyshev approximations for the direct design of 2-D quarter-plane IIR filters. IEEE Trans. Acoust. Speech Signal Process. 38(3): 562-567 (1990) - [j3]Maher A. Sid-Ahmed:
Serial architectures for the implementation of 2-D digital filters and for template matching in digital images. IEEE Trans. Acoust. Speech Signal Process. 38(5): 853-857 (1990)
1980 – 1989
- 1989
- [j2]P. K. Lim, Maher A. Sid-Ahmed, Graham A. Jullien:
VLSI implementation of a digital image threshold selection architecture. Integr. 7(1): 77-91 (1989) - [j1]Maher A. Sid-Ahmed:
A systolic realization for 2-D digital filters. IEEE Trans. Acoust. Speech Signal Process. 37(4): 560-565 (1989) - 1984
- [c5]N. Rajendran, Maher A. Sid-Ahmed, James J. Soltis:
Multi-level thresholding and its application to feature extraction in machine parts. ICASSP 1984: 690-693 - 1983
- [c4]Malayappan Shridhar, N. Mohankrishnan, Maher A. Sid-Ahmed:
A comparison of distance measures for text-independent speaker identification. ICASSP 1983: 559-562 - 1982
- [c3]Sunil Patil, Maher A. Sid-Ahmed, Malayappan Shridhar:
Noise reduction in images using statistical filtering. ICASSP 1982: 1142-1145 - [c2]N. Mohankrishnan, Malayappan Shridhar, Maher A. Sid-Ahmed:
A composite scheme for text-independent speaker recognition. ICASSP 1982: 1653-1656 - [c1]N. Nagamuthu, Maher A. Sid-Ahmed, Malayappan Shridhar:
Design of 2-D recursive digital filters with specified magnitude and constant group-delay responses by spectral factorization. ICASSP 1982: 2050-2054
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint