Volume 5, Issue 3-1, May 2016
The Improvement of Steganography Function Based on the Least Significant Bit in RGB Color
Arman Nejahi, Farsad Zamani Boroujeni
Pages: 1-4     Published Online: Jun. 24, 2016
DOI: 10.11648/j.ajsea.s.2016050301.11
Abstract | Full-Text PDF (633KB) | Full-Text Html
View 2851                 Downloads 60
A Study on Image Mining; Its Importance and Challenges
Mohammad Hadi Yousofi, Mahdi Esmaeili, Majide Sadat Sharifian
Pages: 5-9     Published Online: Jun. 24, 2016
DOI: 10.11648/j.ajsea.s.2016050301.12
Abstract | Full-Text PDF (347KB) | Full-Text Html
View 3783                 Downloads 118
Evaluation of GPU Performance Compared to CPU for Implementing Algorithms with High Time Complexity
Neda Mohammadi
Pages: 10-14     Published Online: Jun. 24, 2016
DOI: 10.11648/j.ajsea.s.2016050301.13
Abstract | Full-Text PDF (1029KB) | Full-Text Html
View 2926                 Downloads 74
Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET)
Mahdi Zolfaghari, Mohammad Sadeghzadeh, Reza Frouzande, Ahmad Emami
Pages: 15-19     Published Online: Jun. 24, 2016
DOI: 10.11648/j.ajsea.s.2016050301.14
Abstract | Full-Text PDF (564KB) | Full-Text Html
View 3353                 Downloads 72
Analyzing Personality Behavior at Work Environment Using Data Mining Techniques
Sepideh Ahmadi Maldeh, Fateme Safara
Pages: 20-24     Published Online: Oct. 20, 2016
DOI: 10.11648/j.ajsea.s.2016050301.15
Abstract | Full-Text PDF (546KB) | Full-Text Html
View 2603                 Downloads 61
Optimization Algorithms Incorporated Fuzzy Q-Learning for Solving Mobile Robot Control Problems
Sima Saeed, Aliakbar Niknafs
Pages: 25-29     Published Online: Aug. 21, 2017
DOI: 10.11648/j.ajsea.s.2016050301.16
Abstract | Full-Text PDF (538KB)
View 1145                 Downloads 15
An Overview of Restoration Algorithms for Digital Images
Arman Nejahi, Aydin Parsa
Pages: 30-33     Published Online: Aug. 21, 2017
DOI: 10.11648/j.ajsea.s.2016050301.17
Abstract | Full-Text PDF (265KB)
View 1042                 Downloads 18
The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard
Zeinab Heidari, Morteza Elme Maryan
Pages: 34-39     Published Online: Aug. 21, 2017
DOI: 10.11648/j.ajsea.s.2016050301.18
Abstract | Full-Text PDF (282KB)
View 1071                 Downloads 18
Browse journals by subject