DSpace Repository

Browsing CSIM digital library by Title

Browsing CSIM digital library by Title

Sort by: Order: Results:

  • K R, Sree Sainath Reddy (AIT, 2017-12)
    Mobile games are gaining immense popularity in the gaming industry. Deloitte Global predicted that by 2016, the revenue generated by mobile games (smartphone and tablet) will be around \$35 billion, but it exceeded the ...
  • Gangisetty, Sai Sathwik (AIT, 2017-07)
    To reduce traffic problems , violation reporting should be nearly universal and automatic. With study violation reporting, the violation can be reduced,helping to reduce traffic problems. Instead of conventional violation ...
  • Dhungel, Richa (Asian Institute of Technology, 2008-05)
    Selecting right software for use is very important to avoid long term loss in terms of budget and time. A wrong choice of software not only results in loss but also demoralizes users and involved stakeholders. The earlier ...
  • Piriya Utamachant
    Computer technology and expansion of global networks makes information available all over the world. While information technology has developed dramatically, new threats and attacks have also been introduced. The role of ...
  • Basit, Abdul (AIT, 2014-07)
    Small unmanned ground vehicles (SUGVs) and Unmanned Aerial Vehicles (UAVs) are useful for gathering information about environments where access by human beings is either impossible or dangerous. They are portable, light ...
  • Chomtip Pornpanomchai (Asian Institute of Technology, 2000-12)
    An automatic handwritten character recognition system is one of the most difficult tasks in image processing. A handwritten character recognition task has two main problems, an unlimited handwritten character style and an ...
  • Penpaka Rongmarood
    Knowledge representation frameworks are a fundamental part of knowledge management systems. Normally, a framwork consists of three interrelated components: knowledge modeling technique, knowledge representation ...
  • Tran Vinh (Asian Institute of Technology, 2005)
    Modern barter trade exchanges facilitate trade among member businesses by matching buyers and sellers and by managing the small-scale economy comprised of the member businesses. In order to study the functioning of barter ...
  • Shakya, Sanim (AIT, 2017-07)
    Pac-man is a real time arcade game, well known across the games and was developed in 1980. The game includes a main character called pac-man, whose is controlled by the player and the other characters are four ghosts which ...
  • Sudsri, Piyhawat (AIT, 2013-12)
    A Denial of Service (DoS) attack is a malicious attempt aiming to degrade the quality of services. The attacks simply overuse services by straining software, hardware, or network links beyond their capacity. The attacks ...
  • Duc, Phan Thanh (AIT, 2003-12)
    There are thousands institutes, universities using e-Learning as a formal method in training and there are millions people using e-Learning as a principal method to study. In addition, there are thousands institutes, ...
  • Chanawut Juntapoln (Asian Institute of Technology, 2011-05)
    Email transaction logs can be used to track the unusual events which might appear among message conversations. The problem is that to monitor every single email is taking a lot of effort especially when the size of email ...
  • Wongsuda Supaporn (Asian Institute of Technology, 2002)
    The number of mobile phone users has quickly exceeded the number of PC users. A new market has opened up in Thailand in recent years and is both exciting and innovative, since it can reach a massive number of potential ...
  • Chat Watcharapin (Asian Institute of Technology, 2000-12)
    Many software/hardware MPEG audio encoding schemes have been proposed to reduce encoding time. At present, software scheme that is used to encode the MPEG audio is implemented using sequential algorithm. Also real time ...
  • Budsapawanich, Punnawit (May, 2013-05)
    Email message is one of the most important communication technologies commonly used in business and everyday life. While email has enabled worldwide communication and brought tremendous convenience, email forgery is a ...
  • Narisara Boonruang
    The study of self-stabilization has been very at tractive to computer sc ientists over the past 25 years. Intuitively, self-stabilization is the ab ility of the system to be initialized in any state of the system, ...
  • Pham Duc Cuong (Asian Institute of Technology, 2005)
    Electronic negotiations have been an active research topic for many years. Most of the research work on this area focuses either on the abstract and theoretical models or on the system architectures for standalone negotiation ...
  • Laoorom Chiempiriyakul (Asian Institute of Technology, 2010-08)
    In order to prevent the pandemic of Avian Influenza, making decisions on Avian Influenza control strategy is a significant and complex task because each strategy has its own different devastating impact. With the capability ...
  • Do Vinh Truc (Asian Institute of Technology, 2003)
    E-learning has been becoming more important in information technology. Not only utilization of courses in E-learning, but also helping students for studying is one of requirements today. This thesis builds a program that ...

Search DSpace


Advanced Search

Browse

My Account