Author index
A B C D E F G H I J K L M N O P R S T U V W Y
Author | Session | Start page | Title |
---|---|---|---|
A A B C D E F G H I J K L M N O P R S T U V W Y | |||
Abidi, Ali | ICSEC 2013 - ICSEC 2013 English Track Full Papers: MUL2.5 | Independent Component Analysis Based Assessment of Linked Gray and White Matter in the Initial Stages of Alzheimer's Disease Using Structural MRI Phase Images | |
Albert, Dietrich | IT1.1 | Adaptive Learning in Moodle Using Competence-Based Knowledge Space Theory and IMS QTI | |
Anantathanavit, Mana | COM1.1 | Radius Particle Swarm Optimization | |
Anusas-amornkul, Tanapat | THA2.2 | A Comparative Study of Compression Algorithms for Each Data Type | |
THA4.6 | Key Stroke Dynamics Authentication with Trajectory Dissimilarity | ||
Arch-in, Ngamnij | THA1.4 | Epidemiological Alert System by Using Business Intelligence | |
Arch-Int, Ngamnij | THA2.4 | Web Service Discovery Using Semantic-based Service Search Agent | |
Arch-Int, Somjit | THA2.4 | Web Service Discovery Using Semantic-based Service Search Agent | |
THA1.4 | Epidemiological Alert System by Using Business Intelligence | ||
Archawaporn, Laksamon | IT2.2 | Erlang C Model for Evaluate Incoming Call Uncertainty in Automotive Call Centers | |
Assawamekin, Namfon | IT1.4 | Design and Implementation of BitTorrent File System for Distributed Animation Rendering | |
Aswakul, Chaodit | NET2.5 | Game Theoretic Analysis of Jamming Attack in Wireless Mesh Network with Delay Tolerance | |
Atsawaraungsuk, Sarutte | COM3.2 | Evolutionary Circular Extreme Learning Machine | |
B A B C D E F G H I J K L M N O P R S T U V W Y | |||
Benjapolakul, Watit | THA4.1 | Application of Game Theory to Vertical Handoff Decision Scheme Within Heterogeneous Mobile Communication Network | |
NET1.4 | Of Order-Handoffs for Hyper-Erlang Traffics in Cellular Wireless Networks | ||
Benromarn, Satawat | NET2.5 | Game Theoretic Analysis of Jamming Attack in Wireless Mesh Network with Delay Tolerance | |
Bhirakit, Methus | DM1.2 | Prefix Filtering with Data Partitioning for Similarity Join | |
Boonjing, Veera | COM2.6 | Support Vector Machine Accuracy Improvement with k-Means Clustering | |
Boonmatham, Pheerasut | MUL1.2 | Musical-scale Characteristics for Traditional Thai Music Genre Classification | |
Booranrom, Yoottana | THA5.1 | Smart Bedroom Prototype for the Elderly Using Kinect Camera Motion Captures | |
Bora, Abhinandan | MUL2.2 | Proactive Ergonomics Through Digital Human Modeling and Simulation for Product Design Innovation: A Case Study | |
Budprom, Nattida | THA1.2 | Database to Ontology Mapping System | |
Bundasak, Supaporn | IT2.3 | Dimensionality Reduction on Slope One Predictor in the Food Recommender System | |
Buranarach, Marut | WS1.1 | A Review and Comparison of Rule Languages and Rule-based Inference Engines for the Semantic Web | |
Buthong, Nattorn | DM1.1 | Outlier Detection Score Based on Ordered Distance Difference | |
Byung Han, Ryu | MUL3.2 | Impacts of Joint Packet Scheduling for Heterogeneous Component Carriers in Multi-carrier Systems | |
C A B C D E F G H I J K L M N O P R S T U V W Y | |||
Chacavarnkitkuln, Torsakuln | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
Chairukwattana, Rattanapong | DM1.6 | Efficient Evolution-Based Clustering of High Dimensional Data Streams with Dimension Projection | |
Chaleeporn, Kesinee | THA3.2 | Affecting Behavior Analysis for the Treatment of Pulmonary Tuberculosis Using Data Mining Techniques: Case Study of Muang Sakon Nakhon Public Health Office | |
Chantrapornchai, Chantana | WS1.3 | Large RDF Representation Framework for GPUs Case Study Key-Value Storage and Binary Triple Pattern | |
PAR1.4 | Parallel Simulation of Magnetic Targeting of Nano-Carriers in Capillary Using OpenMP and MPI | ||
MUL1.3 | Real-time Video Denoising for 2D Ultrasound Streaming Video on GPUs | ||
MUL2.4 | On the Comparison of Digital Image Steganography Algorithm Based on DCT and Wavelet | ||
Charnsripinyo, Chalermpol | NET1.6 | A Web-based Management System Design for Wireless Sensor Network Monitoring | |
Chatvichienchai, Somchai | WS1.5 | Extracting Semantic Metadata for Effective Spreadsheet Search | |
Chen, Mei-Juan | COM1.6 | Computation-Aware Algorithm Based on Inter-View Motion Vector Analysis for Multi-View Video Coding | |
Chern, Hann-Tzong | NET1.5 | Enhanced RED-based Scheduling (ERBS) Scheme in WiMAX Network | |
Chevakulmongkol, Wanwisa | COM2.1 | Handwritten Recognition on Pali Cards of Buddhadasa Indapanno | |
Chi, Hao-Wen | COM1.6 | Computation-Aware Algorithm Based on Inter-View Motion Vector Analysis for Multi-View Video Coding | |
Chiewchanwattana, S | THA3.3 | A Classification Improvement of Extreme Learning Machine Classifier by Feature Selection | |
Chiewchanwattana, Sirapat | THA3.4 | Extreme Learning Machine for Pre-Hypertension Classification | |
Chiewchanwattana, Sirapat | COM3.2 | Evolutionary Circular Extreme Learning Machine | |
Choi, Won-Bin | NET3.2 | Vulnerability Analysis on Mobile VoIP Supplementary Service and MITM Attack | |
Choksuchat, Chidchanok | WS1.3 | Large RDF Representation Framework for GPUs Case Study Key-Value Storage and Binary Triple Pattern | |
Chompupatipong, Nattakon | COM3.1 | Improving the Running Time of the Nearest Neighbor Algorithm | |
Chongstitvatana, Jaruloj | DM1.2 | Prefix Filtering with Data Partitioning for Similarity Join | |
Chouvatut, Varin | MUL1.1 | Virtual Piano with Real-Time Interaction Using Automatic Marker Detection | |
Chowdhury, Kaushik | NET3.1 | A Dual-band Wireless Energy Transfer Protocol for Heterogeneous Sensor Networks Powered by RF Energy Harvesting | |
Chuasuwan, Ekapong | COM4.1 | The Feature Selection for Classification by Applying the Significant Matrix with SPEA2 | |
Chumchob, Noppadol | MUL1.3 | Real-time Video Denoising for 2D Ultrasound Streaming Video on GPUs | |
D A B C D E F G H I J K L M N O P R S T U V W Y | |||
Datta, Soumya Kanti | PAR2.4 | Smart Device Sensing Architectures and Applications | |
Devi, Chandni | COM4.3 | Improved Termite Hill Routing Protocol Using ACO in WSN | |
Devi, Purnima | COM4.3 | Improved Termite Hill Routing Protocol Using ACO in WSN | |
Dolui, Koustabh | PAR2.4 | Smart Device Sensing Architectures and Applications | |
Dolwithayakul, Banpot | PAR1.4 | Parallel Simulation of Magnetic Targeting of Nano-Carriers in Capillary Using OpenMP and MPI | |
MUL1.3 | Real-time Video Denoising for 2D Ultrasound Streaming Video on GPUs | ||
E A B C D E F G H I J K L M N O P R S T U V W Y | |||
Eiamkanitchat, Narissara | COM4.1 | The Feature Selection for Classification by Applying the Significant Matrix with SPEA2 | |
F A B C D E F G H I J K L M N O P R S T U V W Y | |||
Fang, Liu | COM1.2 | Prediction Oriented Analysis of Optimal Replacement | |
Fooprateepsiri, Rerkchai | THA5.2 | A Search and Recognition Approach Car License Plate Under Traffic CCTV Environment | |
G A B C D E F G H I J K L M N O P R S T U V W Y | |||
Gatchalee, Pagon | WS1.2 | 7 | Ontology Development for SMEs E-commerce Website Based on Content Analysis and Its Recommendation System |
Gilbert, Lester | IT1.1 | Adaptive Learning in Moodle Using Competence-Based Knowledge Space Theory and IMS QTI | |
H A B C D E F G H I J K L M N O P R S T U V W Y | |||
Ham, You-Joung | NET3.2 | Vulnerability Analysis on Mobile VoIP Supplementary Service and MITM Attack | |
Hiroyuki, Shioya | MUL3.3 | A Policy-Improving System with a Mixture Probability and Clustering Distributions to Unknown 3D-environments | |
Homnan, Bongkarn | NET1.4 | Of Order-Handoffs for Hyper-Erlang Traffics in Cellular Wireless Networks | |
Hongwarittorrn, Nuttanont | THA4.3 | How Good is Food as a CAPTCHA? | |
THA4.5 | Effects of Image Priming on Recall of Password | ||
Horata, Punyaphol | COM3.2 | Evolutionary Circular Extreme Learning Machine | |
Horkaew, Paramate | MUL1.4 | On Building PCA/ ICA Deformable Facial Models | |
Hournkumnuard, Kanok | PAR1.4 | Parallel Simulation of Magnetic Targeting of Nano-Carriers in Capillary Using OpenMP and MPI | |
I A B C D E F G H I J K L M N O P R S T U V W Y | |||
Intarasothonchun, Silada | THA3.2 | Affecting Behavior Analysis for the Treatment of Pulmonary Tuberculosis Using Data Mining Techniques: Case Study of Muang Sakon Nakhon Public Health Office | |
Israsena, Pasin | COM1.4 | Automatic Removal of EEG Artifacts Using ICA and Lifting Wavelet Transform | |
Itthisan, Praramad | THA2.5 | Applying L-System for Thai Traditional Music Composing by Accent | |
J A B C D E F G H I J K L M N O P R S T U V W Y | |||
J, Sanjog | MUL2.2 | Proactive Ergonomics Through Digital Human Modeling and Simulation for Product Design Innovation: A Case Study | |
Jandaeng, Chanankorn | NET3.3 | The Performance Measurement of Packet Scheduling Algorithm Based on Set Covering Problem | |
Jaroensawad, Rattikarn | MUL1.6 | Handwritten Curve Approximation by a Bézier Curve with Featured Points | |
Jewajinda, Yutana | COM3.3 | A Performance Evaluation of a Probabilistic Parallel Genetic Algorithm: FPGA Vs Multi-core Processor | |
Jhou, Jhih-Syue | NET1.5 | Enhanced RED-based Scheduling (ERBS) Scheme in WiMAX Network | |
Jindaluang, Wattana | MUL1.1 | Virtual Piano with Real-Time Interaction Using Automatic Marker Detection | |
Jiranuwattanawong, Patcharaporn | THA1.3 | Facebook Application for Place Recommendation | |
Jirayucharoensak, Suwicha | COM1.4 | Automatic Removal of EEG Artifacts Using ICA and Lifting Wavelet Transform | |
Jitdamrong, Yoawalak | THA1.1 | An Information Integration of Community Organization Using Ontology | |
K A B C D E F G H I J K L M N O P R S T U V W Y | |||
Kaenchan, Suttipong | MUL1.5 | Automatic Multiple Kinect Cameras Setting for Simple Walking Posture Analysis | |
Kalayanamitr, Chienchuang | THA2.1 | 405 | The Core Retail Management Software with Big Data Integration |
Kangkachit, Thanapat | DM1.6 | Efficient Evolution-Based Clustering of High Dimensional Data Streams with Dimension Projection | |
Karmakar, Sougata | MUL2.2 | Proactive Ergonomics Through Digital Human Modeling and Simulation for Product Design Innovation: A Case Study | |
Karnjanapoomi, Nathaporn | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
Kasemvilas, Sumonta | NET2.1 | MVFactor: A Method to Decrease Processing Time for Factorization Algorithm | |
Kaveelerdpotjana, Benjapun | DM1.3 | Farthest Boundary Clustering Algorithm: Half-orbital Extreme Pole | |
Khawsa-ard, Nuttida | NET1.2 | Path-Reputation Based Technique in Reactive AODV Ad Hoc Sensor Networks Routing for Flood Warning Application | |
Kijsipongse, Ekasit | IT1.4 | Design and Implementation of BitTorrent File System for Distributed Animation Rendering | |
Kikuchi, Hiroaki | NET2.3 | Temporal Behavior Analysis of Malware/Bot Downloads Using Top-10 Processing | |
Kimpan, Warangkhana | PAR1.1 | Online Code Editor on Private Cloud Computing | |
Kitakoshi, Daisuke | MUL3.3 | A Policy-Improving System with a Mixture Probability and Clustering Distributions to Unknown 3D-environments | |
Kittitornkun, Surin | NET2.3 | Temporal Behavior Analysis of Malware/Bot Downloads Using Top-10 Processing | |
Koide, Noriaki | COM1.7 | Characterization of Personal Behavior with Enhanced Spherical Self Organizing Map | |
Komolkiti, Patrachart | NET2.5 | Game Theoretic Analysis of Jamming Attack in Wireless Mesh Network with Delay Tolerance | |
Kultangwattana, Wilaiporn | THA5.3 | Image Segmentation of Left Ventricle in Cardiac Magnetic Resonance Images by Using Active Contour Model | |
Kumar B., Uday | MUL2.2 | Proactive Ergonomics Through Digital Human Modeling and Simulation for Product Design Innovation: A Case Study | |
Kungpanichkul, Thanaporn | THA6.1 | A Comparison of Software Quality From Aspect Refactoring with Different Number of Duplicate Method Calls | |
Kungpisdan, Supakorn | THA4.4 | Authentication Protocol on Wireless Sensor Networks Based on Hybrid Cryptographic Technique | |
Kwon, Dongseung | MUL3.2 | Impacts of Joint Packet Scheduling for Heterogeneous Component Carriers in Multi-carrier Systems | |
L A B C D E F G H I J K L M N O P R S T U V W Y | |||
Lamun, Panit | MUL3.1 | Voltage-mode Universal Biquadratic Filter Using a Single DDCCTA | |
Lee, Hyung-Woo | NET3.2 | Vulnerability Analysis on Mobile VoIP Supplementary Service and MITM Attack | |
Lertratsamewong, Voratep | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
Li, Gwo-Long | COM1.6 | Computation-Aware Algorithm Based on Inter-View Motion Vector Analysis for Multi-View Video Coding | |
Li, Zhoujun | WS1.2 | 7 | Ontology Development for SMEs E-commerce Website Based on Content Analysis and Its Recommendation System |
Lin, Hsien-Tang | PAR2.5 | The Comprehensive Guiding and Navigation Services on Smart Phones | |
Lin, Shu-Jing | COM2.5 | A Mobile Emotion Recognition System Based on Speech Signals and Facial Images | |
Liu, Ynanming | NET1.5 | Enhanced RED-based Scheduling (ERBS) Scheme in WiMAX Network | |
M A B C D E F G H I J K L M N O P R S T U V W Y | |||
Mahdavian, Maryam | IT1.3 | Developing a Model to Measure the Skills of ERP Implementation Team | |
Mahdavian, Mehdi | IT1.3 | Developing a Model to Measure the Skills of ERP Implementation Team | |
PAR2.3 | PID Controller Tuning and Optimizing for Greenhouse Lighting Application Considering Real-Time Pricing in the Smart Grid | ||
Mansattha, Muhammad | THA4.2 | Applying Wireless Sensor Network Based on ZigBee/IEEE802.15.4 Standard for Railway Crossing System | |
Meng, Ren | COM1.2 | Prediction Oriented Analysis of Optimal Replacement | |
Meng, Zhang | COM1.2 | Prediction Oriented Analysis of Optimal Replacement | |
Mesantea, Sirinapa | THA2.1 | 405 | The Core Retail Management Software with Big Data Integration |
Mizuno, Osamu | IT2.1 | On Effects of Tokens in Source Code to Accuracy of Fault-prone Module Prediction | |
Moknarong, Nutthamon | IT1.2 | Detecting Romanized Thai Tokens in Social Media Texts | |
Monga, Himanshu | COM4.3 | Improved Termite Hill Routing Protocol Using ACO in WSN | |
Mongkolnam, Pornchai | MUL1.5 | Automatic Multiple Kinect Cameras Setting for Simple Walking Posture Analysis | |
THA5.1 | Smart Bedroom Prototype for the Elderly Using Kinect Camera Motion Captures | ||
Muangkote, Nipotepat | THA3.4 | Extreme Learning Machine for Pre-Hypertension Classification | |
Mukherjee, Srijani | PAR2.4 | Smart Device Sensing Architectures and Applications | |
Mungsang, Chatchawan | THA1.4 | Epidemiological Alert System by Using Business Intelligence | |
Munlin, Mudarmeen | COM1.1 | Radius Particle Swarm Optimization | |
Musigawan, Pakarat | COM3.2 | Evolutionary Circular Extreme Learning Machine | |
N A B C D E F G H I J K L M N O P R S T U V W Y | |||
Naderi, M. Yousof | NET3.1 | A Dual-band Wireless Energy Transfer Protocol for Heterogeneous Sensor Networks Powered by RF Energy Harvesting | |
Nantajeewarawat, Ekawit | DM1.5 | A Design Pattern Knowledge Base and Its Application to Sequence Diagram Design | |
Naruephiphat, Wibhada | NET1.6 | A Web-based Management System Design for Wireless Sensor Network Monitoring | |
Nguyen, Hien | COM3.4 | Prediction of Stock Price Using an Adaptive Neuro-Fuzzy Inference System Trained by Firefly Algorithm | |
Niemi, Tapio | IT2.4 | Data Integration for Phone Users' Mobility Analysis | |
Niinimaki, Marko | IT2.4 | Data Integration for Phone Users' Mobility Analysis | |
Nintanavongsa, Prusayon | NET3.1 | A Dual-band Wireless Energy Transfer Protocol for Heterogeneous Sensor Networks Powered by RF Energy Harvesting | |
Nitsuwat, Supot | COM3.4 | Prediction of Stock Price Using an Adaptive Neuro-Fuzzy Inference System Trained by Firefly Algorithm | |
O A B C D E F G H I J K L M N O P R S T U V W Y | |||
Oh, Sangchul | MUL3.2 | Impacts of Joint Packet Scheduling for Heterogeneous Component Carriers in Multi-carrier Systems | |
P A B C D E F G H I J K L M N O P R S T U V W Y | |||
Patanasongsivilai, Jaturapat | THA6.3 | Applying Security Patterns and Aspect-Oriented Programming to Web Services | |
Patgar, Suman | COM3.5 | Estimation of Recursive Order Number of a Photocopied Document Through Entropy From Gray Level Co-occurrence Matrix | |
Pattarasophonkul, Nipat | THA4.5 | Effects of Image Priming on Recall of Password | |
Phetmanee, Surasak | THA6.2 | Impact Analysis of Test Cases Based on Changes of a Web Application | |
Phienthrakul, Tanasanee | COM2.1 | Handwritten Recognition on Pali Cards of Buddhadasa Indapanno | |
Phiromlap, Srichol | COM2.4 | A Frequency-Based Updating Strategy in Compact Genetic Algorithm | |
Phommasak, Uthai | MUL3.3 | A Policy-Improving System with a Mixture Probability and Clustering Distributions to Unknown 3D-environments | |
Pongpinigpinyo, Sunee | MUL1.2 | Musical-scale Characteristics for Traditional Thai Music Genre Classification | |
Pornpanomchai, Chomtip | MUL2.3 | Buddhist Amulet Coin Recognition by Genetic Algorithm | |
Pramanpol, Pongpol | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
Pramongkit, Prasopchoke | THA2.1 | 405 | The Core Retail Management Software with Big Data Integration |
Praneetpolgrang, Prasong | THA2.1 | 405 | The Core Retail Management Software with Big Data Integration |
Preechasuk, Jitdumrong | MUL2.4 | On the Comparison of Digital Image Steganography Algorithm Based on DCT and Wavelet | |
Promboonruang, Suksun | THA3.1 | Improvement Query in Thesis and Research Database Using Particle Swarm Optimization | |
Promvichai, Khajeewan | THA3.5 | A Comparison of Statistical Downscaling for Temperature in Thailand by Regression Analysis | |
Promya, Ridnarong | NET1.6 | A Web-based Management System Design for Wireless Sensor Network Monitoring | |
Punyabukkana, Proadpran | IT1.2 | Detecting Romanized Thai Tokens in Social Media Texts | |
Pyeong-Jung, Song | MUL3.2 | Impacts of Joint Packet Scheduling for Heterogeneous Component Carriers in Multi-carrier Systems | |
R A B C D E F G H I J K L M N O P R S T U V W Y | |||
Rakthanmanon, Thanawin | DM1.6 | Efficient Evolution-Based Clustering of High Dimensional Data Streams with Dimension Projection | |
Ramonudom, Pornpimol | THA4.3 | How Good is Food as a CAPTCHA? | |
Rattanabundan, Kamoltip | WS1.4 | Semantically Enabled Academic Paper Sharing Used in a Seminar Course | |
Rattanajongjittakorn, Vazuthorn | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
Rattanasawad, Thanyalak | WS1.1 | A Review and Comparison of Rule Languages and Rule-based Inference Engines for the Semantic Web | |
Rimcharoen, Sunisa | THA2.3 | Acupuncture Expert System for Office Syndrome | |
Rimcharoen, Sunisa | COM2.4 | A Frequency-Based Updating Strategy in Compact Genetic Algorithm | |
Rimcharoen, Sunisa | COM2.3 | Web Page Template Design Using Interactive Genetic Algorithm | |
Rizvi, Syed Abdul Rehman | MUL2.5 | Independent Component Analysis Based Assessment of Linked Gray and White Matter in the Initial Stages of Alzheimer's Disease Using Structural MRI Phase Images | |
Rodhetbhai, Wasara | THA2.5 | Applying L-System for Thai Traditional Music Composing by Accent | |
Rodkaew, Yodthong | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
MUL2.1 | The Last Eternity, a 3D Role-Playing Game with a Cross-Platform Development | ||
Rungraung, Ketsarin | PAR1.3 | A High Performance Computing for AOM Stock Trading Order Matching Using GPU | |
S A B C D E F G H I J K L M N O P R S T U V W Y | |||
SaiKeaw, Kanda | WS1.1 | A Review and Comparison of Rule Languages and Rule-based Inference Engines for the Semantic Web | |
THA1.3 | Facebook Application for Place Recommendation | ||
Saivichit, Assist. Prof. Chaiyachet | NET1.2 | Path-Reputation Based Technique in Reactive AODV Ad Hoc Sensor Networks Routing for Flood Warning Application | |
Sathienpong, Sasipa | MUL1.5 | Automatic Multiple Kinect Cameras Setting for Simple Walking Posture Analysis | |
Sawatdirat, Apiwat | THA5.4 | A Comparative of the Methods to Find Fingertips and Valleys Based on Images Processing | |
Seresangtakul, Pusadee | THA1.2 | Database to Ontology Mapping System | |
Shakya, Binita | DM1.5 | A Design Pattern Knowledge Base and Its Application to Sequence Diagram Design | |
Sharma, Kanika | COM4.3 | Improved Termite Hill Routing Protocol Using ACO in WSN | |
Sharma, Manik | PAR2.1 | Design and Comparative Analysis of DSS Queries in Distributed Environment | |
Shengbing, Zhang | COM1.2 | Prediction Oriented Analysis of Optimal Replacement | |
Shin, Yeon-seung | MUL3.2 | Impacts of Joint Packet Scheduling for Heterogeneous Component Carriers in Multi-carrier Systems | |
Siddiqui, Adil | MUL2.5 | Independent Component Analysis Based Assessment of Linked Gray and White Matter in the Initial Stages of Alzheimer's Disease Using Structural MRI Phase Images | |
Silawong, Chanapa | THA2.2 | A Comparative Study of Compression Algorithms for Each Data Type | |
Singh, Gurdev | PAR2.1 | Design and Comparative Analysis of DSS Queries in Distributed Environment | |
Singh, Gurvinder | PAR2.1 | Design and Comparative Analysis of DSS Queries in Distributed Environment | |
Siri, Atikhom | NET2.4 | Analysis Model for Measuring Information Flow in Social Networks | |
Siripongwutikorn, Peerapon | NET1.1 | Multipath Query Spreading Over Vehicular Ad-hoc Networks | |
Sirirak, Chakkrit | THA2.3 | Acupuncture Expert System for Office Syndrome | |
Siriteerakul, Teera | COM2.6 | Support Vector Machine Accuracy Improvement with k-Means Clustering | |
Sitthirit, Warakorn | COM1.5 | Applying a Mixed Objective Model in a University Timetabling Solution Searching Technique | |
Sitthisak, Onjira | IT1.1 | Adaptive Learning in Moodle Using Competence-Based Knowledge Space Theory and IMS QTI | |
Sitthisarn, Siraya | WS1.4 | Semantically Enabled Academic Paper Sharing Used in a Seminar Course | |
Sodanil, Maleerat | COM3.4 | Prediction of Stock Price Using an Adaptive Neuro-Fuzzy Inference System Trained by Firefly Algorithm | |
Somchai, Chirapa | THA3.4 | Extreme Learning Machine for Pre-Hypertension Classification | |
Somkantha, Krit | THA5.3 | Image Segmentation of Left Ventricle in Cardiac Magnetic Resonance Images by Using Active Contour Model | |
Somsuk, Kritsanapong | NET2.1 | MVFactor: A Method to Decrease Processing Time for Factorization Algorithm | |
Songpan (Rungworawut), Wararat | THA1.4 | Epidemiological Alert System by Using Business Intelligence | |
Soonklang, Tasanawan | MUL1.2 | Musical-scale Characteristics for Traditional Thai Music Genre Classification | |
Sorn, Davy | COM2.3 | Web Page Template Design Using Interactive Genetic Algorithm | |
Sornnuan, Somkiet | THA2.4 | Web Service Discovery Using Semantic-based Service Search Agent | |
Sriharee, Gridaphat | THA1.1 | An Information Integration of Community Organization Using Ontology | |
Srisupornwattana, Natdanai | MUL2.3 | Buddhist Amulet Coin Recognition by Genetic Algorithm | |
Suchato, Atiwong | IT1.2 | Detecting Romanized Thai Tokens in Social Media Texts | |
Sukpimontree, Phumipat | THA4.4 | Authentication Protocol on Wireless Sensor Networks Based on Hybrid Cryptographic Technique | |
Sunat, Khamron | THA3.4 | Extreme Learning Machine for Pre-Hypertension Classification | |
COM3.2 | Evolutionary Circular Extreme Learning Machine | ||
Supnithi, Thepchai | WS1.1 | A Review and Comparison of Rule Languages and Rule-based Inference Engines for the Semantic Web | |
WS1.2 | 7 | Ontology Development for SMEs E-commerce Website Based on Content Analysis and Its Recommendation System | |
Suwannasart, Taratip | THA6.2 | Impact Analysis of Test Cases Based on Changes of a Web Application | |
T A B C D E F G H I J K L M N O P R S T U V W Y | |||
T, Vasudev | COM3.5 | Estimation of Recursive Order Number of a Photocopied Document Through Entropy From Gray Level Co-occurrence Matrix | |
Thaiupathump, Trasapong | NET2.4 | Analysis Model for Measuring Information Flow in Social Networks | |
Thalerngpol, Kriengkrai | THA2.3 | Acupuncture Expert System for Office Syndrome | |
Thanavanich, Thanawut | PAR1.2 | Efficient Energy Aware Task Scheduling for Parallel Workflow Tasks on Hybrids Cloud Environment | |
Thanawastien, Suchai | THA2.1 | 405 | The Core Retail Management Software with Big Data Integration |
Thavaravej, Chaicharn | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
Thongkrau, Theerayut | THA2.4 | Web Service Discovery Using Semantic-based Service Search Agent | |
Thummavet, Phuwanai | NET1.3 | A Novel Personal Health Record System for Handling Emergency Situations | |
Tiengrod, Panudda | DM1.4 | A Comparison of Spatial Interpolation Methods for Surface Temperature in Thailand | |
Tufail, Ahsan | MUL2.5 | Independent Component Analysis Based Assessment of Linked Gray and White Matter in the Initial Stages of Alzheimer's Disease Using Structural MRI Phase Images | |
U A B C D E F G H I J K L M N O P R S T U V W Y | |||
Uthayopas, Putchong | PAR1.2 | Efficient Energy Aware Task Scheduling for Parallel Workflow Tasks on Hybrids Cloud Environment | |
PAR1.3 | A High Performance Computing for AOM Stock Trading Order Matching Using GPU | ||
V A B C D E F G H I J K L M N O P R S T U V W Y | |||
Vasupongayya, Sangsuree | PAR2.2 | Evaluating a Two Dimensional Box Packing Algorithm on Batch Processing Cluster Job Scheduling Problem | |
COM1.5 | Applying a Mixed Objective Model in a University Timetabling Solution Searching Technique | ||
NET1.3 | A Novel Personal Health Record System for Handling Emergency Situations | ||
Viratikul, Rungrat | THA4.1 | Application of Game Theory to Vertical Handoff Decision Scheme Within Heterogeneous Mobile Communication Network | |
Virk, Rajinder | PAR2.1 | Design and Comparative Analysis of DSS Queries in Distributed Environment | |
Vitayakailert, Vitavat | MUL1.4 | On Building PCA/ ICA Deformable Facial Models | |
W A B C D E F G H I J K L M N O P R S T U V W Y | |||
Waiyamai, Kitsana | DM1.6 | Efficient Evolution-Based Clustering of High Dimensional Data Streams with Dimension Projection | |
Wangomklang, Nichapa | THA3.3 | A Classification Improvement of Extreme Learning Machine Classifier by Feature Selection | |
Wangsuk, Kasem | THA4.6 | Key Stroke Dynamics Authentication with Trajectory Dissimilarity | |
Watanapa, Bunthit | MUL1.5 | Automatic Multiple Kinect Cameras Setting for Simple Walking Posture Analysis | |
THA5.1 | Smart Bedroom Prototype for the Elderly Using Kinect Camera Motion Captures | ||
Wattanapongsakorn, Naruemon | IT1.3 | Developing a Model to Measure the Skills of ERP Implementation Team | |
PAR2.3 | PID Controller Tuning and Optimizing for Greenhouse Lighting Application Considering Real-Time Pricing in the Smart Grid | ||
Wattanapornprom, Warin | COM2.2 | A Nondominated Adversarial Search Algorithm for a Three-player Chess Game | |
Wongdeethai, Singha | NET1.1 | Multipath Query Spreading Over Vehicular Ad-hoc Networks | |
Wu, Yu-Hao | COM2.5 | A Mobile Emotion Recognition System Based on Speech Signals and Facial Images | |
Y A B C D E F G H I J K L M N O P R S T U V W Y | |||
Yang, Don-Lin | COM2.5 | A Mobile Emotion Recognition System Based on Speech Signals and Facial Images | |
Yongyingprasert, Pichet | PAR2.2 | Evaluating a Two Dimensional Box Packing Algorithm on Batch Processing Cluster Job Scheduling Problem | |
Younis, Muhammad Shahzad | MUL2.5 | Independent Component Analysis Based Assessment of Linked Gray and White Matter in the Initial Stages of Alzheimer's Disease Using Structural MRI Phase Images | |
Yukonhiatou, Chaxiong | NET2.3 | Temporal Behavior Analysis of Malware/Bot Downloads Using Top-10 Processing |