DSpace Repository

Browsing CSIM digital library by Title

Browsing CSIM digital library by Title

Sort by: Order: Results:

  • Penpaka Rongmarood
    Knowledge representation frameworks are a fundamental part of knowledge management systems. Normally, a framwork consists of three interrelated components: knowledge modeling technique, knowledge representation ...
  • Tran Vinh (Asian Institute of Technology, 2005)
    Modern barter trade exchanges facilitate trade among member businesses by matching buyers and sellers and by managing the small-scale economy comprised of the member businesses. In order to study the functioning of barter ...
  • Shakya, Sanim (AIT, 2017-07)
    Pac-man is a real time arcade game, well known across the games and was developed in 1980. The game includes a main character called pac-man, whose is controlled by the player and the other characters are four ghosts which ...
  • Sudsri, Piyhawat (AIT, 2013-12)
    A Denial of Service (DoS) attack is a malicious attempt aiming to degrade the quality of services. The attacks simply overuse services by straining software, hardware, or network links beyond their capacity. The attacks ...
  • Duc, Phan Thanh (AIT, 2003-12)
    There are thousands institutes, universities using e-Learning as a formal method in training and there are millions people using e-Learning as a principal method to study. In addition, there are thousands institutes, ...
  • Chanawut Juntapoln (Asian Institute of Technology, 2011-05)
    Email transaction logs can be used to track the unusual events which might appear among message conversations. The problem is that to monitor every single email is taking a lot of effort especially when the size of email ...
  • Wongsuda Supaporn (Asian Institute of Technology, 2002)
    The number of mobile phone users has quickly exceeded the number of PC users. A new market has opened up in Thailand in recent years and is both exciting and innovative, since it can reach a massive number of potential ...
  • Chat Watcharapin (Asian Institute of Technology, 2000-12)
    Many software/hardware MPEG audio encoding schemes have been proposed to reduce encoding time. At present, software scheme that is used to encode the MPEG audio is implemented using sequential algorithm. Also real time ...
  • Budsapawanich, Punnawit (May, 2013-05)
    Email message is one of the most important communication technologies commonly used in business and everyday life. While email has enabled worldwide communication and brought tremendous convenience, email forgery is a ...
  • Narisara Boonruang
    The study of self-stabilization has been very at tractive to computer sc ientists over the past 25 years. Intuitively, self-stabilization is the ab ility of the system to be initialized in any state of the system, ...
  • Pham Duc Cuong (Asian Institute of Technology, 2005)
    Electronic negotiations have been an active research topic for many years. Most of the research work on this area focuses either on the abstract and theoretical models or on the system architectures for standalone negotiation ...
  • Laoorom Chiempiriyakul (Asian Institute of Technology, 2010-08)
    In order to prevent the pandemic of Avian Influenza, making decisions on Avian Influenza control strategy is a significant and complex task because each strategy has its own different devastating impact. With the capability ...
  • Do Vinh Truc (Asian Institute of Technology, 2003)
    E-learning has been becoming more important in information technology. Not only utilization of courses in E-learning, but also helping students for studying is one of requirements today. This thesis builds a program that ...
  • Saw, Bu (AIT, 2013-12)
    In this research, method and feasibility of developing agent-based location sharing social applications using JADE LEAP platform is studied for the Android OS. JADE LEAP add-on is FIPA standard compliant multi-agent platform ...
  • Patcharee Basu
    The World Wide Web (WWW) continues to grow at an exponential rate, leading to the problems of access latency and overloaded servers. The distributed cooperative caching concept is applied throughout the Internet community ...
  • Gharti, Shashi (Asian Institute of Technology, 2010-05)
    Increasing crime threatens our communities. To ensure security, surveillance cameras are placed in many public places. Video surveillance cameras require humans to watch the videos and monitor for suspicious events occurring ...
  • Ekpanayapong, Sarawadee (AIT, 2002)
  • Nguyen Cao Hong Ngoc (Asian Institute of Technology, 2009-05)
    In universities, institutes or any organizations, managing a large amount of documents and extracting useful information is always a big challenge. There are some requirements for automatically extracting name of participants ...
  • Mayuna Badeka (Asian Institute of Technology, 2005)
    This thesis studied whether most people need content in their language, whether people have problems using the Internet due to language, which language do they use on the Internet and whether they will learn English to use ...

Search DSpace


Advanced Search

Browse

My Account