American Journal of Software Engineering and Applications

Volume 5, Issue 3, May 2016

  • The Improvement of Steganography Function Based on the Least Significant Bit in RGB Color

    Arman Nejahi, Farsad Zamani Boroujeni

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 1-4
    Received: 6 January 2016
    Accepted: 7 January 2016
    Published: 24 June 2016
    DOI: 10.11648/j.ajsea.s.2016050301.11
    Downloads:
    Views:
    Abstract: When files are created, there are always bits that are not really needed and are not at least important. These bits have the capability of being changed with the information which must be hidden in the file, without damage and changes in the file. There are different methods of image steganography, among which Least Significant Bit (LSB) method is ... Show More
  • A Study on Image Mining; Its Importance and Challenges

    Mohammad Hadi Yousofi, Mahdi Esmaeili, Majide Sadat Sharifian

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 5-9
    Received: 6 January 2016
    Accepted: 7 January 2016
    Published: 24 June 2016
    DOI: 10.11648/j.ajsea.s.2016050301.12
    Downloads:
    Views:
    Abstract: Image mining is an interdisciplinary field that is based on specialties such as machine vision, image processing, image retrieval, data mining, machine learning, databases and artificial intelligence. Although many studies have been conducted in each of these areas, research on image mining and emerging issues is in its infancy. For instance, data ... Show More
  • Evaluation of GPU Performance Compared to CPU for Implementing Algorithms with High Time Complexity

    Neda Mohammadi

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 10-14
    Received: 2 February 2016
    Accepted: 6 February 2016
    Published: 24 June 2016
    DOI: 10.11648/j.ajsea.s.2016050301.13
    Downloads:
    Views:
    Abstract: Nowadays a number of applications with high volume of calculations are constantly increasing. Central Processing Unit (CPU) consists of finite number of cores. Degree of parallelism and implementation speed are issues that data high volume on CPU is low. Using the thread concept in programming, algorithms which have the parallelism capabilities, ca... Show More
  • Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET)

    Mahdi Zolfaghari, Mohammad Sadeghzadeh, Reza Frouzande, Ahmad Emami

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 15-19
    Received: 6 March 2016
    Accepted: 7 March 2016
    Published: 24 June 2016
    DOI: 10.11648/j.ajsea.s.2016050301.14
    Downloads:
    Views:
    Abstract: Mobile Adhoc Networks, because collections of moving node and wireless is formed and also due to the dynamic changes in the communication topology, which is quite vulnerable target a wide range of attacks were shown; one of the attacks, Gray hole attack that is easy on reactive routing protocols such as Dynamic Source Routing protocol runs out. Gra... Show More
  • Analyzing Personality Behavior at Work Environment Using Data Mining Techniques

    Sepideh Ahmadi Maldeh, Fateme Safara

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 20-24
    Received: 12 September 2016
    Accepted: 17 September 2016
    Published: 20 October 2016
    DOI: 10.11648/j.ajsea.s.2016050301.15
    Downloads:
    Views:
    Abstract: Character is the influencing factor of human behavior. This research aims to analyze the relationship between different types of characters. The statistical society sample for this study is the employees of the Iran Mahd Parta Pajhohan technical complex. Two hundred employees have been divided into four clusters including: Type D (Dominant), Type I... Show More
  • Optimization Algorithms Incorporated Fuzzy Q-Learning for Solving Mobile Robot Control Problems

    Sima Saeed, Aliakbar Niknafs

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 25-29
    Received: 14 September 2016
    Accepted: 23 September 2016
    Published: 21 August 2017
    DOI: 10.11648/j.ajsea.s.2016050301.16
    Downloads:
    Views:
    Abstract: Designing the fuzzy controllers by using evolutionary algorithms and reinforcement learning is an important subject to control the robots. In the present article, some methods to solve reinforcement fuzzy control problems are studied. All these methods have been established by combining Fuzzy-Q Learning with an optimization algorithm. These algorit... Show More
  • An Overview of Restoration Algorithms for Digital Images

    Arman Nejahi, Aydin Parsa

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 30-33
    Received: 14 September 2016
    Accepted: 23 September 2016
    Published: 21 August 2017
    DOI: 10.11648/j.ajsea.s.2016050301.17
    Downloads:
    Views:
    Abstract: Image restoration refers to the process of restoration of lost or corrupted data in the image. In recent years, numerous methods with different functions in the reconstruction of noisy images or text replacement, hiding waste in the context of transferring of corrupted image, object removal in the context of editing, or removing the image prohibiti... Show More
  • The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard

    Zeinab Heidari, Morteza Elme Maryan

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 34-39
    Received: 14 September 2016
    Accepted: 23 September 2016
    Published: 21 August 2017
    DOI: 10.11648/j.ajsea.s.2016050301.18
    Downloads:
    Views:
    Abstract: Network attacks are one of the most complicated and major problems in the web. There is a strong need for promoting web security, particularly in the wireless network domain. In this paper, the network security based on the IEEE 802.11 standard has been promoted and discussed. We present our idea on the integration of both access points and a proxy... Show More