-
Optimization Algorithms Incorporated Fuzzy Q-Learning for Solving Mobile Robot Control Problems
Sima Saeed
,
Aliakbar Niknafs
Issue: Volume 5, Issue 3-1, May 2016
Pages: 25-29
Received: 14 September 2016
Accepted: 23 September 2016
Published: 21 August 2017
DOI:
10.11648/j.ajsea.s.2016050301.16
Downloads:
Views:
Abstract: Designing the fuzzy controllers by using evolutionary algorithms and reinforcement learning is an important subject to control the robots. In the present article, some methods to solve reinforcement fuzzy control problems are studied. All these methods have been established by combining Fuzzy-Q Learning with an optimization algorithm. These algorithms include the Ant colony, Bee Colony and Artificial Bee Colony optimization algorithms. Comparing these algorithms on solving Track Backer-Upper problem –a reinforcement fuzzy control problem– shows that Artificial Bee Colony Optimization algorithm has the best efficiency in combining with fuzzy- Q Learning.
Abstract: Designing the fuzzy controllers by using evolutionary algorithms and reinforcement learning is an important subject to control the robots. In the present article, some methods to solve reinforcement fuzzy control problems are studied. All these methods have been established by combining Fuzzy-Q Learning with an optimization algorithm. These algorit...
Show More
-
An Overview of Restoration Algorithms for Digital Images
Arman Nejahi
,
Aydin Parsa
Issue: Volume 5, Issue 3-1, May 2016
Pages: 30-33
Received: 14 September 2016
Accepted: 23 September 2016
Published: 21 August 2017
DOI:
10.11648/j.ajsea.s.2016050301.17
Downloads:
Views:
Abstract: Image restoration refers to the process of restoration of lost or corrupted data in the image. In recent years, numerous methods with different functions in the reconstruction of noisy images or text replacement, hiding waste in the context of transferring of corrupted image, object removal in the context of editing, or removing the image prohibition on the transfer of image-based perspectives are presented which are distinct from the photos taken by the cameras. This article attempts to investigate the most appropriate and satisfactory method among different algorithms of image restoration. Scattered frequencies are considered to remove restoration problem with the emergence of sporadic cases and intensive observations. Scattering-based techniques are more suitable for filling large context areas. The algorithm is based on the assumption that the image (or patch) on a specified basis, spread (i.e., discrete cosine transform (DCT) or shock waves) with the goal that the restored image to be physically acceptable and satisfactory in appearance.
Abstract: Image restoration refers to the process of restoration of lost or corrupted data in the image. In recent years, numerous methods with different functions in the reconstruction of noisy images or text replacement, hiding waste in the context of transferring of corrupted image, object removal in the context of editing, or removing the image prohibiti...
Show More
-
The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard
Zeinab Heidari
,
Morteza Elme Maryan
Issue: Volume 5, Issue 3-1, May 2016
Pages: 34-39
Received: 14 September 2016
Accepted: 23 September 2016
Published: 21 August 2017
DOI:
10.11648/j.ajsea.s.2016050301.18
Downloads:
Views:
Abstract: Network attacks are one of the most complicated and major problems in the web. There is a strong need for promoting web security, particularly in the wireless network domain. In this paper, the network security based on the IEEE 802.11 standard has been promoted and discussed. We present our idea on the integration of both access points and a proxy as well as the AES algorithm to provide the network security to a certain degree that the attacker cannot have influence on the network easily.
Abstract: Network attacks are one of the most complicated and major problems in the web. There is a strong need for promoting web security, particularly in the wireless network domain. In this paper, the network security based on the IEEE 802.11 standard has been promoted and discussed. We present our idea on the integration of both access points and a proxy...
Show More
-
Analyzing Personality Behavior at Work Environment Using Data Mining Techniques
Sepideh Ahmadi Maldeh
,
Fateme Safara
Issue: Volume 5, Issue 3-1, May 2016
Pages: 20-24
Received: 12 September 2016
Accepted: 17 September 2016
Published: 20 October 2016
DOI:
10.11648/j.ajsea.s.2016050301.15
Downloads:
Views:
Abstract: Character is the influencing factor of human behavior. This research aims to analyze the relationship between different types of characters. The statistical society sample for this study is the employees of the Iran Mahd Parta Pajhohan technical complex. Two hundred employees have been divided into four clusters including: Type D (Dominant), Type I (Influential), Type S (Steady) and Type C (Conscientious). The analysis of the data has taken place at two levels, which are known as descriptive and inferential statistics. K means algorithm has been used to cluster employees, and as a result, most of the employees are DC personality types. The results help in improving the operation of the organizations as well as leading a healthy relationship between employees.
Abstract: Character is the influencing factor of human behavior. This research aims to analyze the relationship between different types of characters. The statistical society sample for this study is the employees of the Iran Mahd Parta Pajhohan technical complex. Two hundred employees have been divided into four clusters including: Type D (Dominant), Type I...
Show More
-
The Improvement of Steganography Function Based on the Least Significant Bit in RGB Color
Arman Nejahi
,
Farsad Zamani Boroujeni
Issue: Volume 5, Issue 3-1, May 2016
Pages: 1-4
Received: 6 January 2016
Accepted: 7 January 2016
Published: 24 June 2016
DOI:
10.11648/j.ajsea.s.2016050301.11
Downloads:
Views:
Abstract: When files are created, there are always bits that are not really needed and are not at least important. These bits have the capability of being changed with the information which must be hidden in the file, without damage and changes in the file. There are different methods of image steganography, among which Least Significant Bit (LSB) method is the most common one and we intend to use this method for making stego image. A LSB replacement-based newly developed method (the least significant bit) has been presented in 24 bit color images. We propose a newly developed method of information security in RGB color images using a combined method composed of a two-component method based on the replacement and adaptation of LSB for hiding information and providing more security level. We have used Advanced Encryption Standard (AES) for resisting against attacks, a combined filtering and different disorders.
Abstract: When files are created, there are always bits that are not really needed and are not at least important. These bits have the capability of being changed with the information which must be hidden in the file, without damage and changes in the file. There are different methods of image steganography, among which Least Significant Bit (LSB) method is ...
Show More
-
A Study on Image Mining; Its Importance and Challenges
Mohammad Hadi Yousofi
,
Mahdi Esmaeili
,
Majide Sadat Sharifian
Issue: Volume 5, Issue 3-1, May 2016
Pages: 5-9
Received: 6 January 2016
Accepted: 7 January 2016
Published: 24 June 2016
DOI:
10.11648/j.ajsea.s.2016050301.12
Downloads:
Views:
Abstract: Image mining is an interdisciplinary field that is based on specialties such as machine vision, image processing, image retrieval, data mining, machine learning, databases and artificial intelligence. Although many studies have been conducted in each of these areas, research on image mining and emerging issues is in its infancy. For instance, data mining techniques can not automatically extract useful information from the large amount of data set like images. In this paper, by presenting the unique features of image mining, we discussed about the general procedure of the analysis and the main techniques of image analysis. Finally we explored different image mining systems, and knowledge extraction from images to achieve progress and development in this area.
Abstract: Image mining is an interdisciplinary field that is based on specialties such as machine vision, image processing, image retrieval, data mining, machine learning, databases and artificial intelligence. Although many studies have been conducted in each of these areas, research on image mining and emerging issues is in its infancy. For instance, data ...
Show More
-
Evaluation of GPU Performance Compared to CPU for Implementing Algorithms with High Time Complexity
Issue: Volume 5, Issue 3-1, May 2016
Pages: 10-14
Received: 2 February 2016
Accepted: 6 February 2016
Published: 24 June 2016
DOI:
10.11648/j.ajsea.s.2016050301.13
Downloads:
Views:
Abstract: Nowadays a number of applications with high volume of calculations are constantly increasing. Central Processing Unit (CPU) consists of finite number of cores. Degree of parallelism and implementation speed are issues that data high volume on CPU is low. Using the thread concept in programming, algorithms which have the parallelism capabilities, can be executed in parallel. There are many issues which in order to solving them, finding similar items in a metric space and grouping them in these issues is necessary. Computational complexity finding nearest neighbors is a challenge for run time. To evaluate the performance of GPUs speed in searching nearest neighbors, GPGPU and CUDA are used and compared with CPU usage. In this paper parallel implementation of the algorithm on GPU with access to its shared memory, is compared with parallel implementation of the algorithm on CPU through threads. It is understood that threads use graphics card's shared memory for communications, storing temporary data and retrieving data. Therefore, the parallelism on GPU is more useful than parallelism on CPU in High-Dimensional spaces. Finally, it is discussed that GPU reduces complexity to a considerable amount and is scalable.
Abstract: Nowadays a number of applications with high volume of calculations are constantly increasing. Central Processing Unit (CPU) consists of finite number of cores. Degree of parallelism and implementation speed are issues that data high volume on CPU is low. Using the thread concept in programming, algorithms which have the parallelism capabilities, ca...
Show More
-
Methods for Detection and Removal of Grayhole Attack in Mobile Adhoc Network (MANET)
Mahdi Zolfaghari
,
Mohammad Sadeghzadeh
,
Reza Frouzande
,
Ahmad Emami
Issue: Volume 5, Issue 3-1, May 2016
Pages: 15-19
Received: 6 March 2016
Accepted: 7 March 2016
Published: 24 June 2016
DOI:
10.11648/j.ajsea.s.2016050301.14
Downloads:
Views:
Abstract: Mobile Adhoc Networks, because collections of moving node and wireless is formed and also due to the dynamic changes in the communication topology, which is quite vulnerable target a wide range of attacks were shown; one of the attacks, Gray hole attack that is easy on reactive routing protocols such as Dynamic Source Routing protocol runs out. Gray hole attack, not the malware behavioral honest during the process of discovery route, but later, the malicious node is leveling; and can route discovery process to transmit information on the network, stirred and network performance to reduce the loss of data. Therefore using this method of detection and removal of malicious attacks, is useful to increase network efficiency and ensure correct data in ad hoc networks is transmitting. In this paper we introduce the attack and investigate the last gray hole existing methods for detecting and removing it is addressed. The paper is concluded with discussion on the results.
Abstract: Mobile Adhoc Networks, because collections of moving node and wireless is formed and also due to the dynamic changes in the communication topology, which is quite vulnerable target a wide range of attacks were shown; one of the attacks, Gray hole attack that is easy on reactive routing protocols such as Dynamic Source Routing protocol runs out. Gra...
Show More