DSpace Repository

Browsing CSIM digital library by Title

Browsing CSIM digital library by Title

Sort by: Order: Results:

  • Khin Swe Nwe (Asian Institute of Technology, 2007-05)
    Security is one of the most persistent problems in an organization. Like others, our Computer Science laboratory under School of Engineering and Technology (SET), Asian Institute of Technology (AIT), has setup an access ...
  • Nguyen Nhu Khai (Asian Institute of Technology, 2007)
    This thesis considers an overall picture of “Folksonomy” and “Taxonomy” then does qualitative evaluation between two systems in addition to an integration model of faceted-folksonomy, and lastly proposes and develops a ...
  • Amin, M. Ashraful
    Although many system s exist for autom a tic classification of faces according to their em otional expression, these system s do not explicitly estim ate the strength of given expressions. In th is thes is ...
  • Yongsiriwit, Karn (AIT, 2013-05)
    The rapidly changing of the business environment involves the flexible adaptation of business processes. It would not be efficient for companies to design or redesign their business processes without the consideration ...
  • Rehman, Mariam (AIT, 2013-05)
    Governments are working continuously in order to improve services for their citizens. The success of E-Government initiatives is highly dependent on the willingness of the citizens‟ to adopt E-Government services. The ...
  • Jarumon Charoensatayatham (Asian Institute of Technology, 2008)
    Mobile commerce has become the newest channel which can eliminate the limitation of electronic commerce. The cellular phone or PDA can provide the beneficial of mobility. While customers were doing the transactions, they ...
  • Hossain, A. K. M. Mahtab
    Mobile IPv6 provides IP layer m o bility m a na gem e nt for IPv6 networks. Despite m a ny advantages it offers in co m p arison to Mobile IP v4, handover m a nage m e nt still rem a ins an issue ...
  • Le Hong Hai
    Sketches are often used in medicine. Sketchin g provides an effectiv e means of illustration. Physicians commonly use sketches when taking notes in patient records and to help convey diagnoses and treatments to ...
  • Shakya, Niraj (AIT, 2014-05)
    In computer vision the technique when information is obtained from the devices or sensors and then those information is used to make a map or store the information in a map is known as simultaneous localization and mapping ...
  • Nguyen Viet Minh Quang (Asian Institute of Technology, 2007-05)
    A Search Engine is very important in any information system; it can help us easy to search available information quickly. In Content Management System, we also need a search engine to find information from itself and from ...
  • Euam Chantarasombat (Asian Institute of Technology, 2009-01)
    This study presents the implementation of a decision support system which assists in financial aid policy design. The system applies the concept of dynamic queries; enables user to assess the efficacy of financial aid ...
  • Sithu Naing
    Resource Description Framework (RDF) recommended by the World Wide Web Consortium , is to model meta-data about the resources of the web. RDF is a fundamental lower layer of the semantic web. It describes graphs of ...
  • Punthip Paetyangkul (Asian Institute of Technology, 2007-08)
    Hand gestures are a natural and powerful way to interact with computers. This research study discusses the use of finger on a video sequence for interaction with a complex background, in particular, the Bangkok map. The ...
  • Phan Van Tri
    The Internet is a global information world containing valuable knowledge and information. In its public spaces, people interact commercially and socially with strangers as well as with acquaintances and friends. Thus, ...
  • Chippimolchai, Pongtawat (AIT, 2000-08)
    Plug-and-Play Networking means that a component in the network has the ability to automatically configure itself according to its capabilities, its environment and changes in its environment. In the dynamic plug-and-play ...
  • Bossaporn Eampornchai
    A web service composition is ca tegorized into two types, that is, st atic and dynamic web service composition. The static one selects the se rvices to be composed at design time. The dynamic one selects those at ...
  • Saksinchai, Nitchanun (AIT, 2015-07)
    The incompressible Navier-Stokes equations provide a well-known mathematical model to describe the motion of fluid. Though the Navier-Stokes model is physically accurate, solving its equations require numerical algorithms ...
  • Wijayarathna, Peruma Hewa Sharm Sriman (AIT, 2017-09)
    The growth of the information and the decision-making systems are currently in vogue in the global environment. The emerging areas such as Big Data and Cloud computing are playing a major technological role in handling ...
  • Rathachai, Chawuthai (2012-05)
    To ensure long-term accessibility of digital information, particularly the born digital information, many organizations have started to develop operating systems for digital archives. However, conventional users might not ...
  • Nguyen Trung Hieu
    Secure electronic transaction pro t ocol is an im portant security protocol used to secure bankcard paym ents on internet. Beside authenti cation, authority & priv acy requirem ent this protocol needs to m eet ...

Search DSpace


Advanced Search

Browse

My Account