DSpace Repository

Browsing CSIM digital library by Title

Browsing CSIM digital library by Title

Sort by: Order: Results:

  • Danai Treeratwattana
    Proxy server is a dedicated server to cache Internet objects, requested from clients. If the object does not exist in the proxy server, it will retrieve that object from the original server. Every time a client access to ...
  • Nuttamon Kanusattayanon
    Sending and receiving data over Unidirectional Link provide an alternative choice of delivery. With this architecture, we can send data to any places where there exists a satellite or radio signal. Since unidirectional ...
  • Kolkorn, Maturos (AIT, 2016-05)
    The law is complex and difficult to understand. It can lead to the different interpretation in the same situation. In addition, the law often relates to other laws. Thus, the formalization of the law into a logical rule ...
  • Le Vinh Chien (Asian Institute of Technology, 2003-12)
    “Http” is the most well-known protocol for communication on the web. But most of us do not know what are inside that protocol and how it works. Usually when some of us get an http message, we still do not know what the ...
  • Sumalee Saehear (Asian Institute of Technology, 2011-08)
    A Research Support System (RSS) is currently widely used in research institutions by providing researchers with facilities to collect and manage their publications and to find related scientific papers, reports, journals ...
  • Huy, Le Quang (2012-12)
    In this dissertation, we suggest a new application model of detection and resolving normative conflicts among norms of laws promulgated by the National Assembly of the Socialist Republic of Vietnam (NAV). The model includes ...
  • Napat Sukthong
    This research first proposes a general framework for retrieval and composition of temporal and spatial multimedia. This framework is based on MPEG-7 and SMIL standard those provide the tools to annotate the temporal and ...
  • Ullah, Kifayat (Asian Institute of Technology, 2009-05)
    Construction of new dams has been reduced due to lack of suitable sites. Because of increase in demand of water for energy, irrigation and other bene ts, optimal oper- ation of existing reservoirs is extremely important. ...
  • Somchok Sakjiraphong (Asian Institute of Technology, 2011-05)
    Lane detection is an important component of any intelligent transportation system for example a lane departure warning system which require knowledge of the vehicle with respect to lane boundary. This thesis propose a ...
  • Nguyen Duc Thanh
    Document Layout Analysis is an important st ep in OCR (Optical Character Recognition) system. However, because of diversity of documen t form such as font size, font style, line spacing, physical structure layout, ...
  • Chait, Ramy I. (AIT, 2016-05)
    Health is a major issue in today world, with a fast expansion of way of travel, disease a more efficient in spreading around the world. A relevant example is the Zika virus, indeed around May 2015 the zika virus was found ...
  • Woralak Kongdenfha
    Recently, the number of Internet users becomes dramatically increase. To sustain this growth by reducing high volume of traffic, localize concept is highly to be more focused. Bringing popular objects close to the user is ...
  • Ngo Le Minh
    The developm ent of a category of app lications that sim u ltaneously connect different users scattered over different locations has fostered a new kind of transpo r t p r otocols : r e liable ...
  • Tossapol Piboonkiatikul
    The Search Engine for XML Documents is a search engine tool that is used to locate the XML documents available in the World Wide Web. It allows users to enter the search terms to search for the XML documents available in ...
  • Tai, Xin
    Data clustering is regarded as a particular branch of data mining. In this thesis, data clustering refers to the problem of dividing N data points into K groups to minimize the intraà à à à à ­group difference, ...
  • Watcharapong Srinonghang
    The general secure hub does not detect the user authentication for network access. It is make complicate maintenance to administrator for updating the database of each user and not flexible to usin g the ...
  • Marttinen, Petri (Asian Institute of Technology, 2001-04)
    Wireless Application Protocol (WAP) is a new standard for cellular phone systems. It enables cellular phone based usage of Internet-model browsable services and information sources. The cellular platform offers great ...
  • Ngo Tuan Anh (Asian Institute of Technology, 2005-05)
    In the resent years, the number of online transactions increases rapidly. The World Wide Web and e-commerce bring a lot of advantages to both customers and merchants. Apart from the traditional commerce, people nowadays ...
  • Uddin, Zia (Asian Institute of Technology, 2009-05)
    In many cases, secret key management is the weakest link in a cryptographic system. Biometric data can help in providing a secure and user friendly way to manage crypto- graphic keys. One way to use biometrics for secret ...
  • Wichit Sombat
    The essence of securing information in the network environment is a major issue. Cryptographic algorithms are developed for such important task. They offer confidentiality, authentication, integrity, and non-repudiation. ...

Search DSpace


Advanced Search

Browse

My Account