Volume 5, Issue 3-1, May 2016
The Improvement of Steganography Function Based on the Least Significant Bit in RGB Color
Arman Nejahi, Farsad Zamani Boroujeni
Pages: 1-4     Published Online: Jun. 24, 2016
DOI: 10.11648/j.ajsea.s.2016050301.11
Abstract | Full-Text PDF (633KB) | Full-Text Html
View 3149                 Downloads 66
A Study on Image Mining; Its Importance and Challenges
Mohammad Hadi Yousofi, Mahdi Esmaeili, Majide Sadat Sharifian
Pages: 5-9     Published Online: Jun. 24, 2016
DOI: 10.11648/j.ajsea.s.2016050301.12
Abstract | Full-Text PDF (347KB) | Full-Text Html
View 4192                 Downloads 134
Evaluation of GPU Performance Compared to CPU for Implementing Algorithms with High Time Complexity
Neda Mohammadi
Pages: 10-14     Published Online: Jun. 24, 2016
DOI: 10.11648/j.ajsea.s.2016050301.13
Abstract | Full-Text PDF (1029KB) | Full-Text Html
View 3370                 Downloads 89
Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET)
Mahdi Zolfaghari, Mohammad Sadeghzadeh, Reza Frouzande, Ahmad Emami
Pages: 15-19     Published Online: Jun. 24, 2016
DOI: 10.11648/j.ajsea.s.2016050301.14
Abstract | Full-Text PDF (564KB) | Full-Text Html
View 3682                 Downloads 77
Analyzing Personality Behavior at Work Environment Using Data Mining Techniques
Sepideh Ahmadi Maldeh, Fateme Safara
Pages: 20-24     Published Online: Oct. 20, 2016
DOI: 10.11648/j.ajsea.s.2016050301.15
Abstract | Full-Text PDF (546KB) | Full-Text Html
View 2891                 Downloads 69
Optimization Algorithms Incorporated Fuzzy Q-Learning for Solving Mobile Robot Control Problems
Sima Saeed, Aliakbar Niknafs
Pages: 25-29     Published Online: Aug. 21, 2017
DOI: 10.11648/j.ajsea.s.2016050301.16
Abstract | Full-Text PDF (538KB)
View 1311                 Downloads 22
An Overview of Restoration Algorithms for Digital Images
Arman Nejahi, Aydin Parsa
Pages: 30-33     Published Online: Aug. 21, 2017
DOI: 10.11648/j.ajsea.s.2016050301.17
Abstract | Full-Text PDF (265KB)
View 1209                 Downloads 22
The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard
Zeinab Heidari, Morteza Elme Maryan
Pages: 34-39     Published Online: Aug. 21, 2017
DOI: 10.11648/j.ajsea.s.2016050301.18
Abstract | Full-Text PDF (282KB)
View 1238                 Downloads 21
Browse journals by subject