DSpace Repository

Browsing by Title

Browsing by Title

Sort by: Order: Results:

  • Duc, Phan Thanh (AIT, 2003-12)
    There are thousands institutes, universities using e-Learning as a formal method in training and there are millions people using e-Learning as a principal method to study. In addition, there are thousands institutes, ...
  • Chanawut Juntapoln (Asian Institute of Technology, 2011-05)
    Email transaction logs can be used to track the unusual events which might appear among message conversations. The problem is that to monitor every single email is taking a lot of effort especially when the size of email ...
  • Wongsuda Supaporn (Asian Institute of Technology, 2002)
    The number of mobile phone users has quickly exceeded the number of PC users. A new market has opened up in Thailand in recent years and is both exciting and innovative, since it can reach a massive number of potential ...
  • Chat Watcharapin (Asian Institute of Technology, 2000-12)
    Many software/hardware MPEG audio encoding schemes have been proposed to reduce encoding time. At present, software scheme that is used to encode the MPEG audio is implemented using sequential algorithm. Also real time ...
  • Budsapawanich, Punnawit (May, 2013-05)
    Email message is one of the most important communication technologies commonly used in business and everyday life. While email has enabled worldwide communication and brought tremendous convenience, email forgery is a ...
  • Narisara Boonruang
    The study of self-stabilization has been very at tractive to computer sc ientists over the past 25 years. Intuitively, self-stabilization is the ab ility of the system to be initialized in any state of the system, ...
  • Pham Duc Cuong (Asian Institute of Technology, 2005)
    Electronic negotiations have been an active research topic for many years. Most of the research work on this area focuses either on the abstract and theoretical models or on the system architectures for standalone negotiation ...
  • Laoorom Chiempiriyakul (Asian Institute of Technology, 2010-08)
    In order to prevent the pandemic of Avian Influenza, making decisions on Avian Influenza control strategy is a significant and complex task because each strategy has its own different devastating impact. With the capability ...
  • Do Vinh Truc (Asian Institute of Technology, 2003)
    E-learning has been becoming more important in information technology. Not only utilization of courses in E-learning, but also helping students for studying is one of requirements today. This thesis builds a program that ...
  • Saw, Bu (AIT, 2013-12)
    In this research, method and feasibility of developing agent-based location sharing social applications using JADE LEAP platform is studied for the Android OS. JADE LEAP add-on is FIPA standard compliant multi-agent platform ...
  • Patcharee Basu
    The World Wide Web (WWW) continues to grow at an exponential rate, leading to the problems of access latency and overloaded servers. The distributed cooperative caching concept is applied throughout the Internet community ...
  • Gharti, Shashi (Asian Institute of Technology, 2010-05)
    Increasing crime threatens our communities. To ensure security, surveillance cameras are placed in many public places. Video surveillance cameras require humans to watch the videos and monitor for suspicious events occurring ...
  • Ekpanayapong, Sarawadee (AIT, 2002)
  • Nguyen Cao Hong Ngoc (Asian Institute of Technology, 2009-05)
    In universities, institutes or any organizations, managing a large amount of documents and extracting useful information is always a big challenge. There are some requirements for automatically extracting name of participants ...
  • Mayuna Badeka (Asian Institute of Technology, 2005)
    This thesis studied whether most people need content in their language, whether people have problems using the Internet due to language, which language do they use on the Internet and whether they will learn English to use ...
  • Nguyen Canh Toan
    Today’s enterprise netw orks are composed of multiple types of in terconnected networks. On top of these enterprise networks, there exist various systems and services supporting a wide variety of applications ...
  • Tanit Chaiyasit (Asian Institute of Technology, 2006)
    As XML becomes the standard format for presenting resources in the Web environment, the increasing demands for XML security technology arises too. Since XML is also being used for data representation of data storage, this ...
  • Chonlatorn Chunhavikasit
    W ithout non-repudiation and fa irness property, the electr onic payment (e-payment) systems do not have a chance of acceptance from users. This thesis proposes an e-payment protocol regarding non-repudiati on ...
  • Dong, Dong
    This thesis takes a first step towards the design and normalization theory for XML database. As relational databases, an XML database may contain redundancies; consequently, the redundancies may result in data ...

Search DSpace

Browse

My Account