DSpace Repository

Browsing CS Theses, 2000 by Issue Date

Browsing CS Theses, 2000 by Issue Date

Sort by: Order: Results:

  • Piti Cherntanomwong
    Virtual Private Networks (VPN) are used by companies for connecting between their headquarters and remotes branches because the company can eliminate the leased line cost, which is extremely expensive. However, VPN is ...
  • Rajpar, Masroor A.
    This study is about the analysis, designing and implementation requirements of electronic commerce application of doing the mission-critical business for organizations. This study propose how to design and implement ...
  • Pongtawat Chippimolchai
    Plug-and-Play Networking means that a component in the network has the ability to automatically configure itself according to its capabilities, its environment and changes in its environment. In the dynamic plug-and-play ...
  • J. Seng Ja
    The Gregory patch is a modification of the Bà à à à à à ©zier patch using Gregoryà à à à à ¢ s solution for the twist incompatibility in a Coons patch. The main feature of the Gregory patch is ...
  • Chindaporn Snunkreang
    With a tremendous growth of interest to access the Internet via mobile devices, Wireless Application Protocol (WAP), has been introduced as a bridge to connect between mobile Network and the Internet world. With the current ...
  • Tai, Xin
    Data clustering is regarded as a particular branch of data mining. In this thesis, data clustering refers to the problem of dividing N data points into K groups to minimize the intraà à à à à ­group difference, ...
  • Kyaw Hlaing Aye
    Bayesian belief networks have proven to be an effective technique for representing and reasoning with uncertain knowledge. A Bayesian network is a graphical representation of a probability distribution. Therefore statistical ...
  • Phan Minh Thang
    The emergence of XML as a standard for representation on the Web is expected to greatly facilitate the publication of electronic data by providing a simple syntax for data that is both human and machine-readable. While XML ...
  • Krit Witwiyaruj
    Ordered Binary Decision Diagram (OBDD) is a directed acyclic graph, which has been used as an efficient tool to reduce the amount of space and computation required for verifying digital circuits by removing redundant copies ...
  • Khin Ann Mon
    This study aims to understand the fundamental concepts of fuzzy concepts and access its usefulness in the studies of control systems along with the example of elevator group control system. The concept seems to be potentially ...
  • Prajogo, Agus Susanto
    The Internet not only provides data for users to browse, but also databases to query, and software agents to run. Due to the exponential increase of deployed agents on the Internet, automating the search and selection of ...
  • Thepparit Banditwattanawong
    It is percieved that only pure object-oriented techniques are inadequate to face challenges effectively in intelligent software development. To overcome this limitation, the agent concept has been used to extend traditional ...
  • Nguyen Kieu Oanh
    The Internet not only provides data for users to browse, but also databases to query, and software agents to run. Due to the exponential increase of deployed agents on the Internet, automating the search and selection of ...
  • Tserenbat, Baljinnyam
    Bayesian belief networks have proven to be an effective technique for representing and reasoning with uncertain knowledge. A Bayesian network is a graphical representation of a probability distribution. Therefore statistical ...
  • Pichai Lertprasitpun
    Since modern applications have applied Extensible Markup Language (XML) to encode their data and information, traditional databases including relational and object-oriented databases have been used to handle XML documents. ...
  • Rahman, Md. Anisur
    Java supports concurrent programming by means of threads that independently execute code. Such code operates on Java values and objects residing in a shared main memory. Every thread owns a private working memory in which ...
  • Nuttamon Kanusattayanon
    Sending and receiving data over Unidirectional Link provide an alternative choice of delivery. With this architecture, we can send data to any places where there exists a satellite or radio signal. Since unidirectional ...
  • Wichit Sombat
    The essence of securing information in the network environment is a major issue. Cryptographic algorithms are developed for such important task. They offer confidentiality, authentication, integrity, and non-repudiation. ...
  • Danai Treeratwattana
    Proxy server is a dedicated server to cache Internet objects, requested from clients. If the object does not exist in the proxy server, it will retrieve that object from the original server. Every time a client access to ...

Search DSpace


Advanced Search

Browse

My Account