Volume 5, Issue 3-1, May 2016
The Improvement of Steganography Function Based on the Least Significant Bit in RGB Color
Arman Nejahi, Farsad Zamani Boroujeni
Pages: 1-4     Published Online: Jun. 24, 2016
DOI: 10.11648/j.ajsea.s.2016050301.11
Abstract | Full-Text PDF (633KB) | Full-Text Html
View 3001                 Downloads 63
A Study on Image Mining; Its Importance and Challenges
Mohammad Hadi Yousofi, Mahdi Esmaeili, Majide Sadat Sharifian
Pages: 5-9     Published Online: Jun. 24, 2016
DOI: 10.11648/j.ajsea.s.2016050301.12
Abstract | Full-Text PDF (347KB) | Full-Text Html
View 3961                 Downloads 124
Evaluation of GPU Performance Compared to CPU for Implementing Algorithms with High Time Complexity
Neda Mohammadi
Pages: 10-14     Published Online: Jun. 24, 2016
DOI: 10.11648/j.ajsea.s.2016050301.13
Abstract | Full-Text PDF (1029KB) | Full-Text Html
View 3180                 Downloads 81
Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET)
Mahdi Zolfaghari, Mohammad Sadeghzadeh, Reza Frouzande, Ahmad Emami
Pages: 15-19     Published Online: Jun. 24, 2016
DOI: 10.11648/j.ajsea.s.2016050301.14
Abstract | Full-Text PDF (564KB) | Full-Text Html
View 3513                 Downloads 75
Analyzing Personality Behavior at Work Environment Using Data Mining Techniques
Sepideh Ahmadi Maldeh, Fateme Safara
Pages: 20-24     Published Online: Oct. 20, 2016
DOI: 10.11648/j.ajsea.s.2016050301.15
Abstract | Full-Text PDF (546KB) | Full-Text Html
View 2747                 Downloads 65
Optimization Algorithms Incorporated Fuzzy Q-Learning for Solving Mobile Robot Control Problems
Sima Saeed, Aliakbar Niknafs
Pages: 25-29     Published Online: Aug. 21, 2017
DOI: 10.11648/j.ajsea.s.2016050301.16
Abstract | Full-Text PDF (538KB)
View 1224                 Downloads 19
An Overview of Restoration Algorithms for Digital Images
Arman Nejahi, Aydin Parsa
Pages: 30-33     Published Online: Aug. 21, 2017
DOI: 10.11648/j.ajsea.s.2016050301.17
Abstract | Full-Text PDF (265KB)
View 1123                 Downloads 19
The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard
Zeinab Heidari, Morteza Elme Maryan
Pages: 34-39     Published Online: Aug. 21, 2017
DOI: 10.11648/j.ajsea.s.2016050301.18
Abstract | Full-Text PDF (282KB)
View 1153                 Downloads 21
Browse journals by subject