DSpace Repository

Browsing CSIM digital library by Title

Browsing CSIM digital library by Title

Sort by: Order: Results:

  • Soe, Myo Thu (AIT, 2015-12)
    This research study develops a stolen object detection system that is based on motion detection with improved Camshift tracking algorithm. The algorithm takes the first frame of the video as a background model and calculates ...
  • Parinya Chalermsook
    In this work, we consider the protocol Transport Layer Security, the next generation of SSL. The meaning of every message is analyzed, and some properties are proved in the strand space model which moderately captures ...
  • Nguyen Viet Anh
    Authentication protocols play an important role in any distributed system, especially in the Internet. However, it is surprisingly strange that most protocols do not achieve their goals despite the fact that they ...
  • Pham Ngoc Hien (Asian Institute of Technology, 2007)
    This research is to review the structures of IT strategy planning and then to show steps by steps how to develop an IT strategy. According to the current IT status and the gap between business plan and IT capacities, an ...
  • Supaporn Lamnoi (Asian Institute of Technology, 2008)
    An e-Learning system becomes widely used in the academic community because of several advantages of learning anywhere and anytime. Most e-Learning systems in Thailand try to imitate web-based learning so that students can ...
  • Nath, Uttam Kumar Deb
    XML is becoming a potential candidate for the next generation web document format. A query language for extracting information from the XML documents is worthmentioning. Query languages from different communities and ...
  • Pokharel, Alok (AIT, 2013-05)
    Significant amount of work have been done over the years, to study the scientific network, and analyze the pattern of scientific collaboration through coauthorship network and study of knowledge flow through citation ...
  • Thanakorn, Piroonsith (2012-08)
    There are so many sources of guidance of court proceedings provided via varieties of media, for examples, internet, books, and videos. They are all useful but impracticable because we would in practice rather applicable ...
  • Sthapit, Rajendra R.
    Fuzzy Cognitive Maps allow concepts and relations among them to be fuzzy. They can represent a causal type of knowledge, which other kind of conventional knowledge representation schemes cannot process due to the presence ...
  • Jugkree Palakawong Na Ayuthaya (Asian Institute of Technology, 2000-12)
    The goal of this thesis is to explore the possibility of improving sorting performance using parallel computing. Normally, sorting is done on a single computer. The sorting time will directly depend on the sorting algorithm. ...
  • Kuinkel, Pratikshya (Asian Institute of Technology, 2010-05)
    Bibliography databases provide wide range of information which can be utilized in conducting various kind of analyses like tracking research trends, identifying researchers excelling in a particular subject area, identifying ...
  • Sakchai Tiyapanichakul (Asian Institute of Technology, 2008)
    At present, several organizations have increased their interest and concern in Information Technology management framework. The common framework which is already implemented in organizations is Service Level Management ...
  • Vo Duc Thuan (Asian Institute of Technology, 2008-06)
    Tourism investment is one of the important approaches in business. Investors always seek potential location for tourism investment and the authorities try to construct the information integration frameworks to support ...
  • Nguyen Tan Khoa (Asian Institute of Technology, 2007-05)
    The goal of surface mesh segmentation is to decompose the original surface mesh into smaller, visually meaningful regions or parts. This is a challenging problem in com- puter graphics. Nevertheless, it has a wide range ...
  • Talukdra, Jyotismita (AIT, 2013-05)
    Diagnosis of diseases from the database available is one of the vital and intricate jobs in medicine. With the advent of time, people are becoming more and more vulnerable to several diseases due to several reasons. One ...
  • Madireddy, Tejasree (AIT, 2017-07)
    Data mining is extracting knowledge from huge amounts of information. There are many number of data mining techniques in regression,classification,clustering and association. Particularly the data mining techniques from ...
  • Snepvangers, Martijn (Asian Institute of Technology, 2002)
    Corporate portals try to captu re knowledge, both tacit and explicit, that resides with the employees. This research argues that one of the success criteria for corporate portals is maintenance, or sustainable ...
  • Saeed-Ul-Hassan (Asian Institute of Technology, 2009)
    Research performance evaluation is of great concern in higher education. In order to improve higher education, most of the countries have placed an increased emphasis on the e ectiveness and e ciency of government supported ...
  • Saeed-Ul-Hassan (Asian Institute of Technology, 2009)
    Research performance evaluation is of great concern in higher education. In order to improve higher education, most of the countries have placed an increased emphasis on the e ectiveness and e ciency of government supported ...
  • Le Thi Thu Lan (Asian Institute of Technology, 2009)
    Faculty performance evaluation has direct impact on institutional resource planning. Particularly, the evaluation emphasizes not only on current performance but also on life time achievements of researchers in educational ...

Search DSpace


Advanced Search

Browse

My Account