Author index
A B C D E F G H I J K L M N O P R S T U V W Y
| Author | Session | Start page | Title |
|---|---|---|---|
| A A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Abidi, Ali | ICSEC 2013 - ICSEC 2013 English Track Full Papers: MUL2.5 | Independent Component Analysis Based Assessment of Linked Gray and White Matter in the Initial Stages of Alzheimer's Disease Using Structural MRI Phase Images | |
| Albert, Dietrich | IT1.1 | Adaptive Learning in Moodle Using Competence-Based Knowledge Space Theory and IMS QTI | |
| Anantathanavit, Mana | COM1.1 | Radius Particle Swarm Optimization | |
| Anusas-amornkul, Tanapat | THA2.2 | A Comparative Study of Compression Algorithms for Each Data Type | |
| THA4.6 | Key Stroke Dynamics Authentication with Trajectory Dissimilarity | ||
| Arch-in, Ngamnij | THA1.4 | Epidemiological Alert System by Using Business Intelligence | |
| Arch-Int, Ngamnij | THA2.4 | Web Service Discovery Using Semantic-based Service Search Agent | |
| Arch-Int, Somjit | THA2.4 | Web Service Discovery Using Semantic-based Service Search Agent | |
| THA1.4 | Epidemiological Alert System by Using Business Intelligence | ||
| Archawaporn, Laksamon | IT2.2 | Erlang C Model for Evaluate Incoming Call Uncertainty in Automotive Call Centers | |
| Assawamekin, Namfon | IT1.4 | Design and Implementation of BitTorrent File System for Distributed Animation Rendering | |
| Aswakul, Chaodit | NET2.5 | Game Theoretic Analysis of Jamming Attack in Wireless Mesh Network with Delay Tolerance | |
| Atsawaraungsuk, Sarutte | COM3.2 | Evolutionary Circular Extreme Learning Machine | |
| B A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Benjapolakul, Watit | THA4.1 | Application of Game Theory to Vertical Handoff Decision Scheme Within Heterogeneous Mobile Communication Network | |
| NET1.4 | Of Order-Handoffs for Hyper-Erlang Traffics in Cellular Wireless Networks | ||
| Benromarn, Satawat | NET2.5 | Game Theoretic Analysis of Jamming Attack in Wireless Mesh Network with Delay Tolerance | |
| Bhirakit, Methus | DM1.2 | Prefix Filtering with Data Partitioning for Similarity Join | |
| Boonjing, Veera | COM2.6 | Support Vector Machine Accuracy Improvement with k-Means Clustering | |
| Boonmatham, Pheerasut | MUL1.2 | Musical-scale Characteristics for Traditional Thai Music Genre Classification | |
| Booranrom, Yoottana | THA5.1 | Smart Bedroom Prototype for the Elderly Using Kinect Camera Motion Captures | |
| Bora, Abhinandan | MUL2.2 | Proactive Ergonomics Through Digital Human Modeling and Simulation for Product Design Innovation: A Case Study | |
| Budprom, Nattida | THA1.2 | Database to Ontology Mapping System | |
| Bundasak, Supaporn | IT2.3 | Dimensionality Reduction on Slope One Predictor in the Food Recommender System | |
| Buranarach, Marut | WS1.1 | A Review and Comparison of Rule Languages and Rule-based Inference Engines for the Semantic Web | |
| Buthong, Nattorn | DM1.1 | Outlier Detection Score Based on Ordered Distance Difference | |
| Byung Han, Ryu | MUL3.2 | Impacts of Joint Packet Scheduling for Heterogeneous Component Carriers in Multi-carrier Systems | |
| C A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Chacavarnkitkuln, Torsakuln | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
| Chairukwattana, Rattanapong | DM1.6 | Efficient Evolution-Based Clustering of High Dimensional Data Streams with Dimension Projection | |
| Chaleeporn, Kesinee | THA3.2 | Affecting Behavior Analysis for the Treatment of Pulmonary Tuberculosis Using Data Mining Techniques: Case Study of Muang Sakon Nakhon Public Health Office | |
| Chantrapornchai, Chantana | WS1.3 | Large RDF Representation Framework for GPUs Case Study Key-Value Storage and Binary Triple Pattern | |
| PAR1.4 | Parallel Simulation of Magnetic Targeting of Nano-Carriers in Capillary Using OpenMP and MPI | ||
| MUL1.3 | Real-time Video Denoising for 2D Ultrasound Streaming Video on GPUs | ||
| MUL2.4 | On the Comparison of Digital Image Steganography Algorithm Based on DCT and Wavelet | ||
| Charnsripinyo, Chalermpol | NET1.6 | A Web-based Management System Design for Wireless Sensor Network Monitoring | |
| Chatvichienchai, Somchai | WS1.5 | Extracting Semantic Metadata for Effective Spreadsheet Search | |
| Chen, Mei-Juan | COM1.6 | Computation-Aware Algorithm Based on Inter-View Motion Vector Analysis for Multi-View Video Coding | |
| Chern, Hann-Tzong | NET1.5 | Enhanced RED-based Scheduling (ERBS) Scheme in WiMAX Network | |
| Chevakulmongkol, Wanwisa | COM2.1 | Handwritten Recognition on Pali Cards of Buddhadasa Indapanno | |
| Chi, Hao-Wen | COM1.6 | Computation-Aware Algorithm Based on Inter-View Motion Vector Analysis for Multi-View Video Coding | |
| Chiewchanwattana, S | THA3.3 | A Classification Improvement of Extreme Learning Machine Classifier by Feature Selection | |
| Chiewchanwattana, Sirapat | THA3.4 | Extreme Learning Machine for Pre-Hypertension Classification | |
| Chiewchanwattana, Sirapat | COM3.2 | Evolutionary Circular Extreme Learning Machine | |
| Choi, Won-Bin | NET3.2 | Vulnerability Analysis on Mobile VoIP Supplementary Service and MITM Attack | |
| Choksuchat, Chidchanok | WS1.3 | Large RDF Representation Framework for GPUs Case Study Key-Value Storage and Binary Triple Pattern | |
| Chompupatipong, Nattakon | COM3.1 | Improving the Running Time of the Nearest Neighbor Algorithm | |
| Chongstitvatana, Jaruloj | DM1.2 | Prefix Filtering with Data Partitioning for Similarity Join | |
| Chouvatut, Varin | MUL1.1 | Virtual Piano with Real-Time Interaction Using Automatic Marker Detection | |
| Chowdhury, Kaushik | NET3.1 | A Dual-band Wireless Energy Transfer Protocol for Heterogeneous Sensor Networks Powered by RF Energy Harvesting | |
| Chuasuwan, Ekapong | COM4.1 | The Feature Selection for Classification by Applying the Significant Matrix with SPEA2 | |
| Chumchob, Noppadol | MUL1.3 | Real-time Video Denoising for 2D Ultrasound Streaming Video on GPUs | |
| D A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Datta, Soumya Kanti | PAR2.4 | Smart Device Sensing Architectures and Applications | |
| Devi, Chandni | COM4.3 | Improved Termite Hill Routing Protocol Using ACO in WSN | |
| Devi, Purnima | COM4.3 | Improved Termite Hill Routing Protocol Using ACO in WSN | |
| Dolui, Koustabh | PAR2.4 | Smart Device Sensing Architectures and Applications | |
| Dolwithayakul, Banpot | PAR1.4 | Parallel Simulation of Magnetic Targeting of Nano-Carriers in Capillary Using OpenMP and MPI | |
| MUL1.3 | Real-time Video Denoising for 2D Ultrasound Streaming Video on GPUs | ||
| E A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Eiamkanitchat, Narissara | COM4.1 | The Feature Selection for Classification by Applying the Significant Matrix with SPEA2 | |
| F A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Fang, Liu | COM1.2 | Prediction Oriented Analysis of Optimal Replacement | |
| Fooprateepsiri, Rerkchai | THA5.2 | A Search and Recognition Approach Car License Plate Under Traffic CCTV Environment | |
| G A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Gatchalee, Pagon | WS1.2 | 7 | Ontology Development for SMEs E-commerce Website Based on Content Analysis and Its Recommendation System |
| Gilbert, Lester | IT1.1 | Adaptive Learning in Moodle Using Competence-Based Knowledge Space Theory and IMS QTI | |
| H A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Ham, You-Joung | NET3.2 | Vulnerability Analysis on Mobile VoIP Supplementary Service and MITM Attack | |
| Hiroyuki, Shioya | MUL3.3 | A Policy-Improving System with a Mixture Probability and Clustering Distributions to Unknown 3D-environments | |
| Homnan, Bongkarn | NET1.4 | Of Order-Handoffs for Hyper-Erlang Traffics in Cellular Wireless Networks | |
| Hongwarittorrn, Nuttanont | THA4.3 | How Good is Food as a CAPTCHA? | |
| THA4.5 | Effects of Image Priming on Recall of Password | ||
| Horata, Punyaphol | COM3.2 | Evolutionary Circular Extreme Learning Machine | |
| Horkaew, Paramate | MUL1.4 | On Building PCA/ ICA Deformable Facial Models | |
| Hournkumnuard, Kanok | PAR1.4 | Parallel Simulation of Magnetic Targeting of Nano-Carriers in Capillary Using OpenMP and MPI | |
| I A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Intarasothonchun, Silada | THA3.2 | Affecting Behavior Analysis for the Treatment of Pulmonary Tuberculosis Using Data Mining Techniques: Case Study of Muang Sakon Nakhon Public Health Office | |
| Israsena, Pasin | COM1.4 | Automatic Removal of EEG Artifacts Using ICA and Lifting Wavelet Transform | |
| Itthisan, Praramad | THA2.5 | Applying L-System for Thai Traditional Music Composing by Accent | |
| J A B C D E F G H I J K L M N O P R S T U V W Y | |||
| J, Sanjog | MUL2.2 | Proactive Ergonomics Through Digital Human Modeling and Simulation for Product Design Innovation: A Case Study | |
| Jandaeng, Chanankorn | NET3.3 | The Performance Measurement of Packet Scheduling Algorithm Based on Set Covering Problem | |
| Jaroensawad, Rattikarn | MUL1.6 | Handwritten Curve Approximation by a Bézier Curve with Featured Points | |
| Jewajinda, Yutana | COM3.3 | A Performance Evaluation of a Probabilistic Parallel Genetic Algorithm: FPGA Vs Multi-core Processor | |
| Jhou, Jhih-Syue | NET1.5 | Enhanced RED-based Scheduling (ERBS) Scheme in WiMAX Network | |
| Jindaluang, Wattana | MUL1.1 | Virtual Piano with Real-Time Interaction Using Automatic Marker Detection | |
| Jiranuwattanawong, Patcharaporn | THA1.3 | Facebook Application for Place Recommendation | |
| Jirayucharoensak, Suwicha | COM1.4 | Automatic Removal of EEG Artifacts Using ICA and Lifting Wavelet Transform | |
| Jitdamrong, Yoawalak | THA1.1 | An Information Integration of Community Organization Using Ontology | |
| K A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Kaenchan, Suttipong | MUL1.5 | Automatic Multiple Kinect Cameras Setting for Simple Walking Posture Analysis | |
| Kalayanamitr, Chienchuang | THA2.1 | 405 | The Core Retail Management Software with Big Data Integration |
| Kangkachit, Thanapat | DM1.6 | Efficient Evolution-Based Clustering of High Dimensional Data Streams with Dimension Projection | |
| Karmakar, Sougata | MUL2.2 | Proactive Ergonomics Through Digital Human Modeling and Simulation for Product Design Innovation: A Case Study | |
| Karnjanapoomi, Nathaporn | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
| Kasemvilas, Sumonta | NET2.1 | MVFactor: A Method to Decrease Processing Time for Factorization Algorithm | |
| Kaveelerdpotjana, Benjapun | DM1.3 | Farthest Boundary Clustering Algorithm: Half-orbital Extreme Pole | |
| Khawsa-ard, Nuttida | NET1.2 | Path-Reputation Based Technique in Reactive AODV Ad Hoc Sensor Networks Routing for Flood Warning Application | |
| Kijsipongse, Ekasit | IT1.4 | Design and Implementation of BitTorrent File System for Distributed Animation Rendering | |
| Kikuchi, Hiroaki | NET2.3 | Temporal Behavior Analysis of Malware/Bot Downloads Using Top-10 Processing | |
| Kimpan, Warangkhana | PAR1.1 | Online Code Editor on Private Cloud Computing | |
| Kitakoshi, Daisuke | MUL3.3 | A Policy-Improving System with a Mixture Probability and Clustering Distributions to Unknown 3D-environments | |
| Kittitornkun, Surin | NET2.3 | Temporal Behavior Analysis of Malware/Bot Downloads Using Top-10 Processing | |
| Koide, Noriaki | COM1.7 | Characterization of Personal Behavior with Enhanced Spherical Self Organizing Map | |
| Komolkiti, Patrachart | NET2.5 | Game Theoretic Analysis of Jamming Attack in Wireless Mesh Network with Delay Tolerance | |
| Kultangwattana, Wilaiporn | THA5.3 | Image Segmentation of Left Ventricle in Cardiac Magnetic Resonance Images by Using Active Contour Model | |
| Kumar B., Uday | MUL2.2 | Proactive Ergonomics Through Digital Human Modeling and Simulation for Product Design Innovation: A Case Study | |
| Kungpanichkul, Thanaporn | THA6.1 | A Comparison of Software Quality From Aspect Refactoring with Different Number of Duplicate Method Calls | |
| Kungpisdan, Supakorn | THA4.4 | Authentication Protocol on Wireless Sensor Networks Based on Hybrid Cryptographic Technique | |
| Kwon, Dongseung | MUL3.2 | Impacts of Joint Packet Scheduling for Heterogeneous Component Carriers in Multi-carrier Systems | |
| L A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Lamun, Panit | MUL3.1 | Voltage-mode Universal Biquadratic Filter Using a Single DDCCTA | |
| Lee, Hyung-Woo | NET3.2 | Vulnerability Analysis on Mobile VoIP Supplementary Service and MITM Attack | |
| Lertratsamewong, Voratep | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
| Li, Gwo-Long | COM1.6 | Computation-Aware Algorithm Based on Inter-View Motion Vector Analysis for Multi-View Video Coding | |
| Li, Zhoujun | WS1.2 | 7 | Ontology Development for SMEs E-commerce Website Based on Content Analysis and Its Recommendation System |
| Lin, Hsien-Tang | PAR2.5 | The Comprehensive Guiding and Navigation Services on Smart Phones | |
| Lin, Shu-Jing | COM2.5 | A Mobile Emotion Recognition System Based on Speech Signals and Facial Images | |
| Liu, Ynanming | NET1.5 | Enhanced RED-based Scheduling (ERBS) Scheme in WiMAX Network | |
| M A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Mahdavian, Maryam | IT1.3 | Developing a Model to Measure the Skills of ERP Implementation Team | |
| Mahdavian, Mehdi | IT1.3 | Developing a Model to Measure the Skills of ERP Implementation Team | |
| PAR2.3 | PID Controller Tuning and Optimizing for Greenhouse Lighting Application Considering Real-Time Pricing in the Smart Grid | ||
| Mansattha, Muhammad | THA4.2 | Applying Wireless Sensor Network Based on ZigBee/IEEE802.15.4 Standard for Railway Crossing System | |
| Meng, Ren | COM1.2 | Prediction Oriented Analysis of Optimal Replacement | |
| Meng, Zhang | COM1.2 | Prediction Oriented Analysis of Optimal Replacement | |
| Mesantea, Sirinapa | THA2.1 | 405 | The Core Retail Management Software with Big Data Integration |
| Mizuno, Osamu | IT2.1 | On Effects of Tokens in Source Code to Accuracy of Fault-prone Module Prediction | |
| Moknarong, Nutthamon | IT1.2 | Detecting Romanized Thai Tokens in Social Media Texts | |
| Monga, Himanshu | COM4.3 | Improved Termite Hill Routing Protocol Using ACO in WSN | |
| Mongkolnam, Pornchai | MUL1.5 | Automatic Multiple Kinect Cameras Setting for Simple Walking Posture Analysis | |
| THA5.1 | Smart Bedroom Prototype for the Elderly Using Kinect Camera Motion Captures | ||
| Muangkote, Nipotepat | THA3.4 | Extreme Learning Machine for Pre-Hypertension Classification | |
| Mukherjee, Srijani | PAR2.4 | Smart Device Sensing Architectures and Applications | |
| Mungsang, Chatchawan | THA1.4 | Epidemiological Alert System by Using Business Intelligence | |
| Munlin, Mudarmeen | COM1.1 | Radius Particle Swarm Optimization | |
| Musigawan, Pakarat | COM3.2 | Evolutionary Circular Extreme Learning Machine | |
| N A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Naderi, M. Yousof | NET3.1 | A Dual-band Wireless Energy Transfer Protocol for Heterogeneous Sensor Networks Powered by RF Energy Harvesting | |
| Nantajeewarawat, Ekawit | DM1.5 | A Design Pattern Knowledge Base and Its Application to Sequence Diagram Design | |
| Naruephiphat, Wibhada | NET1.6 | A Web-based Management System Design for Wireless Sensor Network Monitoring | |
| Nguyen, Hien | COM3.4 | Prediction of Stock Price Using an Adaptive Neuro-Fuzzy Inference System Trained by Firefly Algorithm | |
| Niemi, Tapio | IT2.4 | Data Integration for Phone Users' Mobility Analysis | |
| Niinimaki, Marko | IT2.4 | Data Integration for Phone Users' Mobility Analysis | |
| Nintanavongsa, Prusayon | NET3.1 | A Dual-band Wireless Energy Transfer Protocol for Heterogeneous Sensor Networks Powered by RF Energy Harvesting | |
| Nitsuwat, Supot | COM3.4 | Prediction of Stock Price Using an Adaptive Neuro-Fuzzy Inference System Trained by Firefly Algorithm | |
| O A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Oh, Sangchul | MUL3.2 | Impacts of Joint Packet Scheduling for Heterogeneous Component Carriers in Multi-carrier Systems | |
| P A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Patanasongsivilai, Jaturapat | THA6.3 | Applying Security Patterns and Aspect-Oriented Programming to Web Services | |
| Patgar, Suman | COM3.5 | Estimation of Recursive Order Number of a Photocopied Document Through Entropy From Gray Level Co-occurrence Matrix | |
| Pattarasophonkul, Nipat | THA4.5 | Effects of Image Priming on Recall of Password | |
| Phetmanee, Surasak | THA6.2 | Impact Analysis of Test Cases Based on Changes of a Web Application | |
| Phienthrakul, Tanasanee | COM2.1 | Handwritten Recognition on Pali Cards of Buddhadasa Indapanno | |
| Phiromlap, Srichol | COM2.4 | A Frequency-Based Updating Strategy in Compact Genetic Algorithm | |
| Phommasak, Uthai | MUL3.3 | A Policy-Improving System with a Mixture Probability and Clustering Distributions to Unknown 3D-environments | |
| Pongpinigpinyo, Sunee | MUL1.2 | Musical-scale Characteristics for Traditional Thai Music Genre Classification | |
| Pornpanomchai, Chomtip | MUL2.3 | Buddhist Amulet Coin Recognition by Genetic Algorithm | |
| Pramanpol, Pongpol | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
| Pramongkit, Prasopchoke | THA2.1 | 405 | The Core Retail Management Software with Big Data Integration |
| Praneetpolgrang, Prasong | THA2.1 | 405 | The Core Retail Management Software with Big Data Integration |
| Preechasuk, Jitdumrong | MUL2.4 | On the Comparison of Digital Image Steganography Algorithm Based on DCT and Wavelet | |
| Promboonruang, Suksun | THA3.1 | Improvement Query in Thesis and Research Database Using Particle Swarm Optimization | |
| Promvichai, Khajeewan | THA3.5 | A Comparison of Statistical Downscaling for Temperature in Thailand by Regression Analysis | |
| Promya, Ridnarong | NET1.6 | A Web-based Management System Design for Wireless Sensor Network Monitoring | |
| Punyabukkana, Proadpran | IT1.2 | Detecting Romanized Thai Tokens in Social Media Texts | |
| Pyeong-Jung, Song | MUL3.2 | Impacts of Joint Packet Scheduling for Heterogeneous Component Carriers in Multi-carrier Systems | |
| R A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Rakthanmanon, Thanawin | DM1.6 | Efficient Evolution-Based Clustering of High Dimensional Data Streams with Dimension Projection | |
| Ramonudom, Pornpimol | THA4.3 | How Good is Food as a CAPTCHA? | |
| Rattanabundan, Kamoltip | WS1.4 | Semantically Enabled Academic Paper Sharing Used in a Seminar Course | |
| Rattanajongjittakorn, Vazuthorn | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
| Rattanasawad, Thanyalak | WS1.1 | A Review and Comparison of Rule Languages and Rule-based Inference Engines for the Semantic Web | |
| Rimcharoen, Sunisa | THA2.3 | Acupuncture Expert System for Office Syndrome | |
| Rimcharoen, Sunisa | COM2.4 | A Frequency-Based Updating Strategy in Compact Genetic Algorithm | |
| Rimcharoen, Sunisa | COM2.3 | Web Page Template Design Using Interactive Genetic Algorithm | |
| Rizvi, Syed Abdul Rehman | MUL2.5 | Independent Component Analysis Based Assessment of Linked Gray and White Matter in the Initial Stages of Alzheimer's Disease Using Structural MRI Phase Images | |
| Rodhetbhai, Wasara | THA2.5 | Applying L-System for Thai Traditional Music Composing by Accent | |
| Rodkaew, Yodthong | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
| MUL2.1 | The Last Eternity, a 3D Role-Playing Game with a Cross-Platform Development | ||
| Rungraung, Ketsarin | PAR1.3 | A High Performance Computing for AOM Stock Trading Order Matching Using GPU | |
| S A B C D E F G H I J K L M N O P R S T U V W Y | |||
| SaiKeaw, Kanda | WS1.1 | A Review and Comparison of Rule Languages and Rule-based Inference Engines for the Semantic Web | |
| THA1.3 | Facebook Application for Place Recommendation | ||
| Saivichit, Assist. Prof. Chaiyachet | NET1.2 | Path-Reputation Based Technique in Reactive AODV Ad Hoc Sensor Networks Routing for Flood Warning Application | |
| Sathienpong, Sasipa | MUL1.5 | Automatic Multiple Kinect Cameras Setting for Simple Walking Posture Analysis | |
| Sawatdirat, Apiwat | THA5.4 | A Comparative of the Methods to Find Fingertips and Valleys Based on Images Processing | |
| Seresangtakul, Pusadee | THA1.2 | Database to Ontology Mapping System | |
| Shakya, Binita | DM1.5 | A Design Pattern Knowledge Base and Its Application to Sequence Diagram Design | |
| Sharma, Kanika | COM4.3 | Improved Termite Hill Routing Protocol Using ACO in WSN | |
| Sharma, Manik | PAR2.1 | Design and Comparative Analysis of DSS Queries in Distributed Environment | |
| Shengbing, Zhang | COM1.2 | Prediction Oriented Analysis of Optimal Replacement | |
| Shin, Yeon-seung | MUL3.2 | Impacts of Joint Packet Scheduling for Heterogeneous Component Carriers in Multi-carrier Systems | |
| Siddiqui, Adil | MUL2.5 | Independent Component Analysis Based Assessment of Linked Gray and White Matter in the Initial Stages of Alzheimer's Disease Using Structural MRI Phase Images | |
| Silawong, Chanapa | THA2.2 | A Comparative Study of Compression Algorithms for Each Data Type | |
| Singh, Gurdev | PAR2.1 | Design and Comparative Analysis of DSS Queries in Distributed Environment | |
| Singh, Gurvinder | PAR2.1 | Design and Comparative Analysis of DSS Queries in Distributed Environment | |
| Siri, Atikhom | NET2.4 | Analysis Model for Measuring Information Flow in Social Networks | |
| Siripongwutikorn, Peerapon | NET1.1 | Multipath Query Spreading Over Vehicular Ad-hoc Networks | |
| Sirirak, Chakkrit | THA2.3 | Acupuncture Expert System for Office Syndrome | |
| Siriteerakul, Teera | COM2.6 | Support Vector Machine Accuracy Improvement with k-Means Clustering | |
| Sitthirit, Warakorn | COM1.5 | Applying a Mixed Objective Model in a University Timetabling Solution Searching Technique | |
| Sitthisak, Onjira | IT1.1 | Adaptive Learning in Moodle Using Competence-Based Knowledge Space Theory and IMS QTI | |
| Sitthisarn, Siraya | WS1.4 | Semantically Enabled Academic Paper Sharing Used in a Seminar Course | |
| Sodanil, Maleerat | COM3.4 | Prediction of Stock Price Using an Adaptive Neuro-Fuzzy Inference System Trained by Firefly Algorithm | |
| Somchai, Chirapa | THA3.4 | Extreme Learning Machine for Pre-Hypertension Classification | |
| Somkantha, Krit | THA5.3 | Image Segmentation of Left Ventricle in Cardiac Magnetic Resonance Images by Using Active Contour Model | |
| Somsuk, Kritsanapong | NET2.1 | MVFactor: A Method to Decrease Processing Time for Factorization Algorithm | |
| Songpan, Wararat | THA1.4 | Epidemiological Alert System by Using Business Intelligence | |
| Soonklang, Tasanawan | MUL1.2 | Musical-scale Characteristics for Traditional Thai Music Genre Classification | |
| Sorn, Davy | COM2.3 | Web Page Template Design Using Interactive Genetic Algorithm | |
| Sornnuan, Somkiet | THA2.4 | Web Service Discovery Using Semantic-based Service Search Agent | |
| Sriharee, Gridaphat | THA1.1 | An Information Integration of Community Organization Using Ontology | |
| Srisupornwattana, Natdanai | MUL2.3 | Buddhist Amulet Coin Recognition by Genetic Algorithm | |
| Suchato, Atiwong | IT1.2 | Detecting Romanized Thai Tokens in Social Media Texts | |
| Sukpimontree, Phumipat | THA4.4 | Authentication Protocol on Wireless Sensor Networks Based on Hybrid Cryptographic Technique | |
| Sunat, Khamron | THA3.4 | Extreme Learning Machine for Pre-Hypertension Classification | |
| COM3.2 | Evolutionary Circular Extreme Learning Machine | ||
| Supnithi, Thepchai | WS1.1 | A Review and Comparison of Rule Languages and Rule-based Inference Engines for the Semantic Web | |
| WS1.2 | 7 | Ontology Development for SMEs E-commerce Website Based on Content Analysis and Its Recommendation System | |
| Suwannasart, Taratip | THA6.2 | Impact Analysis of Test Cases Based on Changes of a Web Application | |
| T A B C D E F G H I J K L M N O P R S T U V W Y | |||
| T, Vasudev | COM3.5 | Estimation of Recursive Order Number of a Photocopied Document Through Entropy From Gray Level Co-occurrence Matrix | |
| Thaiupathump, Trasapong | NET2.4 | Analysis Model for Measuring Information Flow in Social Networks | |
| Thalerngpol, Kriengkrai | THA2.3 | Acupuncture Expert System for Office Syndrome | |
| Thanavanich, Thanawut | PAR1.2 | Efficient Energy Aware Task Scheduling for Parallel Workflow Tasks on Hybrids Cloud Environment | |
| Thanawastien, Suchai | THA2.1 | 405 | The Core Retail Management Software with Big Data Integration |
| Thavaravej, Chaicharn | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
| Thongkrau, Theerayut | THA2.4 | Web Service Discovery Using Semantic-based Service Search Agent | |
| Thummavet, Phuwanai | NET1.3 | A Novel Personal Health Record System for Handling Emergency Situations | |
| Tiengrod, Panudda | DM1.4 | A Comparison of Spatial Interpolation Methods for Surface Temperature in Thailand | |
| Tufail, Ahsan | MUL2.5 | Independent Component Analysis Based Assessment of Linked Gray and White Matter in the Initial Stages of Alzheimer's Disease Using Structural MRI Phase Images | |
| U A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Uthayopas, Putchong | PAR1.2 | Efficient Energy Aware Task Scheduling for Parallel Workflow Tasks on Hybrids Cloud Environment | |
| PAR1.3 | A High Performance Computing for AOM Stock Trading Order Matching Using GPU | ||
| V A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Vasupongayya, Sangsuree | PAR2.2 | Evaluating a Two Dimensional Box Packing Algorithm on Batch Processing Cluster Job Scheduling Problem | |
| COM1.5 | Applying a Mixed Objective Model in a University Timetabling Solution Searching Technique | ||
| NET1.3 | A Novel Personal Health Record System for Handling Emergency Situations | ||
| Viratikul, Rungrat | THA4.1 | Application of Game Theory to Vertical Handoff Decision Scheme Within Heterogeneous Mobile Communication Network | |
| Virk, Rajinder | PAR2.1 | Design and Comparative Analysis of DSS Queries in Distributed Environment | |
| Vitayakailert, Vitavat | MUL1.4 | On Building PCA/ ICA Deformable Facial Models | |
| W A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Waiyamai, Kitsana | DM1.6 | Efficient Evolution-Based Clustering of High Dimensional Data Streams with Dimension Projection | |
| Wangomklang, Nichapa | THA3.3 | A Classification Improvement of Extreme Learning Machine Classifier by Feature Selection | |
| Wangsuk, Kasem | THA4.6 | Key Stroke Dynamics Authentication with Trajectory Dissimilarity | |
| Watanapa, Bunthit | MUL1.5 | Automatic Multiple Kinect Cameras Setting for Simple Walking Posture Analysis | |
| THA5.1 | Smart Bedroom Prototype for the Elderly Using Kinect Camera Motion Captures | ||
| Wattanapongsakorn, Naruemon | IT1.3 | Developing a Model to Measure the Skills of ERP Implementation Team | |
| PAR2.3 | PID Controller Tuning and Optimizing for Greenhouse Lighting Application Considering Real-Time Pricing in the Smart Grid | ||
| Wattanapornprom, Warin | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
| Wongdeethai, Singha | NET1.1 | Multipath Query Spreading Over Vehicular Ad-hoc Networks | |
| Wu, Yu-Hao | COM2.5 | A Mobile Emotion Recognition System Based on Speech Signals and Facial Images | |
| Y A B C D E F G H I J K L M N O P R S T U V W Y | |||
| Yang, Don-Lin | COM2.5 | A Mobile Emotion Recognition System Based on Speech Signals and Facial Images | |
| Yongyingprasert, Pichet | PAR2.2 | Evaluating a Two Dimensional Box Packing Algorithm on Batch Processing Cluster Job Scheduling Problem | |
| Younis, Muhammad Shahzad | MUL2.5 | Independent Component Analysis Based Assessment of Linked Gray and White Matter in the Initial Stages of Alzheimer's Disease Using Structural MRI Phase Images | |
| Yukonhiatou, Chaxiong | NET2.3 | Temporal Behavior Analysis of Malware/Bot Downloads Using Top-10 Processing | |
