American Journal of Software Engineering and Applications

Special Issue

Advances in Computer Science and Information Technology in Developing Countries

  • Submission Deadline: Nov. 30, 2016
  • Status: Submission Closed
  • Lead Guest Editor: Amin Mobasheri
About This Special Issue
Recent advances in Computer Science and Information Technologies follow certain research line regarding tackling items of importance and interest in developing countries. This special issue would explore this research trend specifically in Iran, as one of the main developing countries that actively contributes to the field of computer science and information technology. Authors are welcome to submit their original research work before the deadline. The topics of interest include (but are not limited to):

1. Computer science
2. Software engineering
3. Information technology
4. Databases
5. Information Science
6. Big data
7. Image processing
Lead Guest Editor
  • Amin Mobasheri

    OTB Research Institute, Delft University of Technology, Delft, Netherlands

Published Articles
  • Optimization Algorithms Incorporated Fuzzy Q-Learning for Solving Mobile Robot Control Problems

    Sima Saeed , Aliakbar Niknafs

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 25-29
    Received: Sep. 14, 2016
    Accepted: Sep. 23, 2016
    Published: Aug. 21, 2017
    DOI: 10.11648/j.ajsea.s.2016050301.16
    Downloads:
    Views:
    Abstract: Designing the fuzzy controllers by using evolutionary algorithms and reinforcement learning is an important subject to control the robots. In the present article, some methods to solve reinforcement fuzzy control problems are studied. All these methods have been established by combining Fuzzy-Q Learning with an optimization algorithm. These algorit... Show More
  • An Overview of Restoration Algorithms for Digital Images

    Arman Nejahi , Aydin Parsa

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 30-33
    Received: Sep. 14, 2016
    Accepted: Sep. 23, 2016
    Published: Aug. 21, 2017
    DOI: 10.11648/j.ajsea.s.2016050301.17
    Downloads:
    Views:
    Abstract: Image restoration refers to the process of restoration of lost or corrupted data in the image. In recent years, numerous methods with different functions in the reconstruction of noisy images or text replacement, hiding waste in the context of transferring of corrupted image, object removal in the context of editing, or removing the image prohibiti... Show More
  • The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard

    Zeinab Heidari , Morteza Elme Maryan

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 34-39
    Received: Sep. 14, 2016
    Accepted: Sep. 23, 2016
    Published: Aug. 21, 2017
    DOI: 10.11648/j.ajsea.s.2016050301.18
    Downloads:
    Views:
    Abstract: Network attacks are one of the most complicated and major problems in the web. There is a strong need for promoting web security, particularly in the wireless network domain. In this paper, the network security based on the IEEE 802.11 standard has been promoted and discussed. We present our idea on the integration of both access points and a proxy... Show More
  • Analyzing Personality Behavior at Work Environment Using Data Mining Techniques

    Sepideh Ahmadi Maldeh , Fateme Safara

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 20-24
    Received: Sep. 12, 2016
    Accepted: Sep. 17, 2016
    Published: Oct. 20, 2016
    DOI: 10.11648/j.ajsea.s.2016050301.15
    Downloads:
    Views:
    Abstract: Character is the influencing factor of human behavior. This research aims to analyze the relationship between different types of characters. The statistical society sample for this study is the employees of the Iran Mahd Parta Pajhohan technical complex. Two hundred employees have been divided into four clusters including: Type D (Dominant), Type I... Show More
  • The Improvement of Steganography Function Based on the Least Significant Bit in RGB Color

    Arman Nejahi , Farsad Zamani Boroujeni

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 1-4
    Received: Jan. 06, 2016
    Accepted: Jan. 07, 2016
    Published: Jun. 24, 2016
    DOI: 10.11648/j.ajsea.s.2016050301.11
    Downloads:
    Views:
    Abstract: When files are created, there are always bits that are not really needed and are not at least important. These bits have the capability of being changed with the information which must be hidden in the file, without damage and changes in the file. There are different methods of image steganography, among which Least Significant Bit (LSB) method is ... Show More
  • A Study on Image Mining; Its Importance and Challenges

    Mohammad Hadi Yousofi , Mahdi Esmaeili , Majide Sadat Sharifian

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 5-9
    Received: Jan. 06, 2016
    Accepted: Jan. 07, 2016
    Published: Jun. 24, 2016
    DOI: 10.11648/j.ajsea.s.2016050301.12
    Downloads:
    Views:
    Abstract: Image mining is an interdisciplinary field that is based on specialties such as machine vision, image processing, image retrieval, data mining, machine learning, databases and artificial intelligence. Although many studies have been conducted in each of these areas, research on image mining and emerging issues is in its infancy. For instance, data ... Show More
  • Evaluation of GPU Performance Compared to CPU for Implementing Algorithms with High Time Complexity

    Neda Mohammadi

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 10-14
    Received: Feb. 02, 2016
    Accepted: Feb. 06, 2016
    Published: Jun. 24, 2016
    DOI: 10.11648/j.ajsea.s.2016050301.13
    Downloads:
    Views:
    Abstract: Nowadays a number of applications with high volume of calculations are constantly increasing. Central Processing Unit (CPU) consists of finite number of cores. Degree of parallelism and implementation speed are issues that data high volume on CPU is low. Using the thread concept in programming, algorithms which have the parallelism capabilities, ca... Show More
  • Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET)

    Mahdi Zolfaghari , Mohammad Sadeghzadeh , Reza Frouzande , Ahmad Emami

    Issue: Volume 5, Issue 3-1, May 2016
    Pages: 15-19
    Received: Mar. 06, 2016
    Accepted: Mar. 07, 2016
    Published: Jun. 24, 2016
    DOI: 10.11648/j.ajsea.s.2016050301.14
    Downloads:
    Views:
    Abstract: Mobile Adhoc Networks, because collections of moving node and wireless is formed and also due to the dynamic changes in the communication topology, which is quite vulnerable target a wide range of attacks were shown; one of the attacks, Gray hole attack that is easy on reactive routing protocols such as Dynamic Source Routing protocol runs out. Gra... Show More