Image
Saeed Kasmani, Ph.D.

Saeed Kasmani, Ph.D.

Greater Sydney Area
8K followers 500+ connections

Image Image Image

About

Most enterprise AI projects never make it past the pilot stage. I've spent 15+ years…

Articles by Saeed

Activity

8K followers

See all activities

Experience & Education

  • Image

    IBM

View Saeed’s full experience

See their title, tenure and more.

Join with email

Already on LinkedIn?

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Publications

  • A-CCNN: adaptive ccnn for density estimation and crowd counting

    ICIP 2018/ IEEE

    Crowd counting, for estimating the number of people in a crowd using vision-based computer techniques, has attracted much interest in the research community. Although many attempts have been reported, real-world problems, such as huge variation in subjects' sizes in images and serious occlusion among people, make it still a challenging problem. In this paper, we propose an Adaptive Counting Convolutional Neural Network (A-CCNN) and consider the scale variation of objects in a frame adaptively…

    Crowd counting, for estimating the number of people in a crowd using vision-based computer techniques, has attracted much interest in the research community. Although many attempts have been reported, real-world problems, such as huge variation in subjects' sizes in images and serious occlusion among people, make it still a challenging problem. In this paper, we propose an Adaptive Counting Convolutional Neural Network (A-CCNN) and consider the scale variation of objects in a frame adaptively so as to improve the accuracy of counting. Our method takes advantages of contextual information to provide more accurate and adaptive density maps and crowd counting in a scene. Extensively experimental evaluation is conducted using different benchmark datasets for object-counting and shows that the proposed approach is effective and outperforms state-of-the-art approaches.

    Other authors
    See publication Image
  • Structured Inhomogeneous Density Map Learning for Crowd Counting

    arXiv preprint arXiv:1801.06642

    In this paper, we aim at tackling the problem of crowd counting in extremely high-density scenes, which contain hundreds, or even thousands of people. We begin by a comprehensive analysis of the most widely used density map-based methods, and demonstrate how easily existing methods are affected by the inhomogeneous density distribution problem, e.g., causing them to be sensitive to outliers, or be hard to optimized. We then present an extremely simple solution to the inhomogeneous density…

    In this paper, we aim at tackling the problem of crowd counting in extremely high-density scenes, which contain hundreds, or even thousands of people. We begin by a comprehensive analysis of the most widely used density map-based methods, and demonstrate how easily existing methods are affected by the inhomogeneous density distribution problem, e.g., causing them to be sensitive to outliers, or be hard to optimized. We then present an extremely simple solution to the inhomogeneous density distribution problem, which can be intuitively summarized as extending the density map from 2D to 3D, with the extra dimension implicitly indicating the density level. Such a solution can be implemented by a single Density-Aware Network, which is not only easy to train, but also can achieve the state-of-art performance on various challenging datasets.

    Other authors
    • Hanhui Li
    • Xiangjian He
    • Hefeng Wu
    • Ruomei Wang
    • Xiaonan Luo
    • Liang Lin
    See publication Image
  • A new multi-objective cluster ensemble based on modularity maximization

    Journal of Engineering Research (JER)

    Conventional clustering algorithms utilize only one single criterion that may not conform to diverse shapes of the underlying clusters. But in this paper, we hire two important criteria and propose a new multi-objective cluster ensemble model to empower finding clusters of different types. The first criteria are the well-known sum of squared error. The second criterion is modularity which is originally a measure of evaluating communities in social networks. We maximize modularity as a consensus…

    Conventional clustering algorithms utilize only one single criterion that may not conform to diverse shapes of the underlying clusters. But in this paper, we hire two important criteria and propose a new multi-objective cluster ensemble model to empower finding clusters of different types. The first criteria are the well-known sum of squared error. The second criterion is modularity which is originally a measure of evaluating communities in social networks. We maximize modularity as a consensus function of cluster ensemble. In order to further improvement, we also modify Non Dominant Sorting Genetic Algorithm (NSGAII) and propose a specialized crossover operator for it. Experimental results over seven UCI real data sets show that the proposed method significantly outperforms other clustering methods.

    Other authors
    See publication Image
  • Intrusion Detection Based on Joint of K-Means and KNN

    JCIT (Journal of Convergence Information Technology)

    Other authors
    • Sharifi
    • Alireza Pourebrahimi
    See publication Image
  • Availability challenge of cloud system under DDOS attack

    Indian Journal of Science and Technology

    Abstract Cloud computing is a distributed architecture that has shared resources, software,
    and information is provided to computers and other devices on a scalable platform and
    demand. Availability of the cloud services is one of the key security issues in it. Distributed
    Denial of Service (DDoS) is an attack that threats the availability of the cloud services. In this
    paper, effect of the DDoS attack on the cloud is investigated. Therefore, a model for attack
    based on the…

    Abstract Cloud computing is a distributed architecture that has shared resources, software,
    and information is provided to computers and other devices on a scalable platform and
    demand. Availability of the cloud services is one of the key security issues in it. Distributed
    Denial of Service (DDoS) is an attack that threats the availability of the cloud services. In this
    paper, effect of the DDoS attack on the cloud is investigated. Therefore, a model for attack
    based on the DDoS is designed, and then we simulate a cloud system on the ...

    Other authors
    • Sharifi
    • Alirezanejad
    • Baharak Shakeri Aski
    • Mohammad Ghiami
    See publication Image
  • A new robust digital image watermarking technique based on joint DWT-DCT transformation

    Third International Conference on Convergence and Hybrid Information Technology, 2008. ICCIT'08.


    Abstract In this paper, a new robust digital image watermarking algorithm based on Joint
    DWT-DCT Transformation is proposed. The imperceptibility is provided as well as higher
    robustness against common signal processing attacks. A binary watermarked image is
    embedded in certain sub-bands of a 3-level DWT transformed of a host image. Then, DCT
    transform of each selected DWT sub-band is computed and the PN-sequences of the
    watermark bits are embedded in the coefficients of…


    Abstract In this paper, a new robust digital image watermarking algorithm based on Joint
    DWT-DCT Transformation is proposed. The imperceptibility is provided as well as higher
    robustness against common signal processing attacks. A binary watermarked image is
    embedded in certain sub-bands of a 3-level DWT transformed of a host image. Then, DCT
    transform of each selected DWT sub-band is computed and the PN-sequences of the
    watermark bits are embedded in the coefficients of the corresponding DCT middle ...

    Other authors
    • Ahmadreza Naghsh-Nilchi
    See publication Image
  • A New Method for Improving the Performance of K Nearest Neighbor using Clustering Technique.

    Journal of Convergence Information Technology - JCIT

    Abstract In this paper, a new classification method is presented which uses clustering
    techniques to augment the performance of K-Nearest Neighbor algorithm. This new method
    is called Nearest Cluster approach, NC. In this algorithm the neighbor samples are ...

    Other authors
    See publication Image
  • Robust Digital Image Watermarking Based on Joint DWT-DCT.

    International Journal of Digital Content Technology and its Applications (JDCTA)

    Other authors
    • Ahmad R Naghsh-Nilchi
    See publication Image
  • A Pre-Filtering Method to Improve Watermark Detection Rate in DCT Based Watermarking

    International Arab Journal of Information Technology (IAJIT)

    Abstract: In image processing pre-processing is used for preparing or improving
    performance of operations. In order to improve performance of extraction algorithms in
    Discrete Cosine Transform (DCT) based watermarking method, a new prefiltering method ...

    Other authors
    • Sharifi
    See publication Image
  • Effect of Locations of Using High Boost Filtering on the Watermark Recovery in Spatial Domain Watermarking

    Indian Journal of Science & Technology


    Abstract Generally, High Boost filter is used to emphasize high frequency components
    representing the image details without eliminating low frequency components representing
    the basic form of the signal. The dissimilarity between the watermark and unwatermarked
    parts of the image are increased by this filter. Thus, watermark could be recovered
    significantly better by recovery algorithm. In this paper, a comparison is taken place between
    the effects of different places of…


    Abstract Generally, High Boost filter is used to emphasize high frequency components
    representing the image details without eliminating low frequency components representing
    the basic form of the signal. The dissimilarity between the watermark and unwatermarked
    parts of the image are increased by this filter. Thus, watermark could be recovered
    significantly better by recovery algorithm. In this paper, a comparison is taken place between
    the effects of different places of preforming High Boost filter on the reliability of the ...

    Other authors
    • Vahid Saffari
    • Sharifi
    • Alirezanejad
    See publication Image
Join now to see all publications

Courses

  • Advanced AI

    -

  • Computer Vision

    -

  • Digital Image processing

    -

  • Digital Signal Processing

    -

  • Machine Learning

    -

  • Neural Network

    -

  • Statistical Pattern Recognition

    -

  • Symbolic Processing - Logic, Theorem proving & Term rewriting

    -

Projects

  • Towards Development of Automated Diagnostic Tools for Pneumoconiosis Detection from Chest Radiographs

    - Present

    In this project, we have been working on the application of Deep Learning on accurately processing the medical image to find potential signs of certain diseases. In order to develop a program for this purpose, we have been using python, Nvidia digits and Keras Deep Learning packages in Ubuntu Linux OS.

  • Rail Manufacturing CRC and Sydney Trains with UTS Project about human activity analysis

    - Present

    In this project, we have been utilizing Deep Learning models to analyse CCTV camera. The purpose of this project is to extract valuable information from current infrastructure and provide better and more secure services for customers. I have been using python, Caffe and Tensorflow Deep Learning to do this project.

  • Developed an end-to-end demo for Consumer complaint classification based on NLP

    -

  • Developed an end to end AI-based Solution for detection and localising defect in the sewer and stormwater pipe

    -

  • Duplicate defect detection by Machine Learning model

    -

  • Water level estimation for sewer and storm water pipe

    -

  • Face matching and profiling

    -

  • Person and object detection and localisation

    -

Honors & Awards

  • Published over 25 papers in well-known journals and conferences

    -

  • Reached over 430 citations for the published papers

    -

  • Winner of ICIP 2019 VIP cup in Taipei

    IEEE, ICIP 2019

    #UTS and #PolyU joint team win the Championship of 2019 VIP cup in Taipei. I was the supervisor of the UTS team.
    The final was held earlier yesterday at #ICIP2019 ( ICIP is the world's largest and most comprehensive technical conference focused on image and video processing and computer vision).

  • One-Off Scholarship

    Graduate Research School

  • Data61 Top-up Scholarship

    CSIRO \ Data61

    Data61, the digital powerhouse formed by the merging of CSIRO's digital productivity business unit and National ICT Australia (NICTA), offers a world-class Ph.D. experience to eligible Ph.D. candidates working in data-related disciplines such as Analytics, Cyber-Physical Systems, Software, and Computational Systems and Decision Sciences.

  • International Research Scholarship (IRS) - International Research Scholarships

    UTS

    The UTS International Research Scholarship (UTS IRS) is provided by the University of Technology, Sydney (UTS) as part of its long term commitment to internationalization with a particular view to enhancing its international links and profile in research. It is aimed at attracting high-quality international students to work in areas of research strength at UTS.

  • UTS President's Scholarship

    UTS

    The UTS President's scholarship (UTSP) is provided by the University of Technology Sydney to international Higher Degree Research students who demonstrate exceptional research potential. UTSPs are provided to assist with students' general living costs. The UTSP scholarship is not transferable to another institution.

  • Best Researcher of Islamic Azad University

    Azad University

    I have been selected as the Best Researcher of Islamic Azad University, Ramsar Branch from 2015. I received this award due to my excellent achievements for completing two research projects and publishing several journal papers.

  • Best Researcher of Islamic Azad University

    Azad University

    I have been selected as the Best Researcher of Islamic Azad University, Ramsar Branch from 2013. I received this award due to my excellent achievements for completing two research projects and publishing several journal papers.

  • "First Class Honour" Graduate in BSc

    -

    Graduated with “First Class Honour” and 4rd rank over more than 50 students (BSc)

  • Ranked Top 3% in National University Entrance

    ExamNational Organisation for Educational Testing

    Ranked Top 3% (321 over more than 12,000 graduate computer science and IT applicants) in National Entrance Exam

    p.s. "The National University Entrance Exam is a very competitive standardized test so that every applicant needs to pass it to gain admission to higher education in Iran".
    (Source: http://en.wikipedia.org/wiki/Iranian_University_Entrance_Exam)

Languages

  • English

    Full professional proficiency

  • Persian

    Native or bilingual proficiency

Recommendations received

View Saeed’s full profile

  • See who you know in common
  • Get introduced
  • Contact Saeed directly
Join to view full profile
Image

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses