DSpace Repository

Browsing CSIM digital library by Title

Browsing CSIM digital library by Title

Sort by: Order: Results:

  • Tempaiboolkul, Jutamas (AIT, 2013-05)
    Distributed data mining of association rules is an area of data mining which intends to find association rules over items geographically across the network. Several researches have been performed in this field as ...
  • Prajogo, Agus Susanto
    The Internet not only provides data for users to browse, but also databases to query, and software agents to run. Due to the exponential increase of deployed agents on the Internet, automating the search and selection of ...
  • Surasak Mungsing (Asian Institute of Technology, 2004-12)
    Service-oriented application is becoming attractive to service providers, particularly in emerging telecommunication networks, via the concept of virtual active network and distributed management by delegation. The concept ...
  • Chatchawan Gansaree (Asian Institute of Technology, 2002-12)
    TOT Corporation Public Company Limited (TOT) is the state enterprise agency provided a telephone service for a domestic telephone network in Thailand. TOT has provided a billing service called “TOT Express Service” based ...
  • Poosit Wibulsathien (Asian Institute of Technology, 2006)
    The business environment is changing rapidly due to technological breakthroughs, globalization, societal changes, and more. The changing business environment forces organizations to respond. Traditional response may not ...
  • K R, Sree Sainath Reddy (AIT, 2017-12)
    Mobile games are gaining immense popularity in the gaming industry. Deloitte Global predicted that by 2016, the revenue generated by mobile games (smartphone and tablet) will be around \$35 billion, but it exceeded the ...
  • Gangisetty, Sai Sathwik (AIT, 2017-07)
    To reduce traffic problems , violation reporting should be nearly universal and automatic. With study violation reporting, the violation can be reduced,helping to reduce traffic problems. Instead of conventional violation ...
  • Dhungel, Richa (Asian Institute of Technology, 2008-05)
    Selecting right software for use is very important to avoid long term loss in terms of budget and time. A wrong choice of software not only results in loss but also demoralizes users and involved stakeholders. The earlier ...
  • Piriya Utamachant
    Computer technology and expansion of global networks makes information available all over the world. While information technology has developed dramatically, new threats and attacks have also been introduced. The role of ...
  • Basit, Abdul (AIT, 2014-07)
    Small unmanned ground vehicles (SUGVs) and Unmanned Aerial Vehicles (UAVs) are useful for gathering information about environments where access by human beings is either impossible or dangerous. They are portable, light ...
  • Chomtip Pornpanomchai (Asian Institute of Technology, 2000-12)
    An automatic handwritten character recognition system is one of the most difficult tasks in image processing. A handwritten character recognition task has two main problems, an unlimited handwritten character style and an ...
  • Penpaka Rongmarood
    Knowledge representation frameworks are a fundamental part of knowledge management systems. Normally, a framwork consists of three interrelated components: knowledge modeling technique, knowledge representation ...
  • Tran Vinh (Asian Institute of Technology, 2005)
    Modern barter trade exchanges facilitate trade among member businesses by matching buyers and sellers and by managing the small-scale economy comprised of the member businesses. In order to study the functioning of barter ...
  • Shakya, Sanim (AIT, 2017-07)
    Pac-man is a real time arcade game, well known across the games and was developed in 1980. The game includes a main character called pac-man, whose is controlled by the player and the other characters are four ghosts which ...
  • Sudsri, Piyhawat (AIT, 2013-12)
    A Denial of Service (DoS) attack is a malicious attempt aiming to degrade the quality of services. The attacks simply overuse services by straining software, hardware, or network links beyond their capacity. The attacks ...
  • Duc, Phan Thanh (AIT, 2003-12)
    There are thousands institutes, universities using e-Learning as a formal method in training and there are millions people using e-Learning as a principal method to study. In addition, there are thousands institutes, ...
  • Chanawut Juntapoln (Asian Institute of Technology, 2011-05)
    Email transaction logs can be used to track the unusual events which might appear among message conversations. The problem is that to monitor every single email is taking a lot of effort especially when the size of email ...
  • Wongsuda Supaporn (Asian Institute of Technology, 2002)
    The number of mobile phone users has quickly exceeded the number of PC users. A new market has opened up in Thailand in recent years and is both exciting and innovative, since it can reach a massive number of potential ...
  • Chat Watcharapin (Asian Institute of Technology, 2000-12)
    Many software/hardware MPEG audio encoding schemes have been proposed to reduce encoding time. At present, software scheme that is used to encode the MPEG audio is implemented using sequential algorithm. Also real time ...

Search DSpace


Advanced Search

Browse

My Account