CS Theses, 2000: Recent submissions

  • Chippimolchai, Pongtawat (AIT, 2000-08)
    Plug-and-Play Networking means that a component in the network has the ability to automatically configure itself according to its capabilities, its environment and changes in its environment. In the dynamic plug-and-play ...
  • Pongtawat Chippimolchai
    Plug-and-Play Networking means that a component in the network has the ability to automatically configure itself according to its capabilities, its environment and changes in its environment. In the dynamic plug-and-play ...
  • Tai, Xin
    Data clustering is regarded as a particular branch of data mining. In this thesis, data clustering refers to the problem of dividing N data points into K groups to minimize the intraà à à à à ­group difference, ...
  • Tserenbat, Baljinnyam
    Bayesian belief networks have proven to be an effective technique for representing and reasoning with uncertain knowledge. A Bayesian network is a graphical representation of a probability distribution. Therefore statistical ...
  • Wichit Sombat
    The essence of securing information in the network environment is a major issue. Cryptographic algorithms are developed for such important task. They offer confidentiality, authentication, integrity, and non-repudiation. ...
  • Prajogo, Agus Susanto
    The Internet not only provides data for users to browse, but also databases to query, and software agents to run. Due to the exponential increase of deployed agents on the Internet, automating the search and selection of ...
  • Thepparit Banditwattanawong
    It is percieved that only pure object-oriented techniques are inadequate to face challenges effectively in intelligent software development. To overcome this limitation, the agent concept has been used to extend traditional ...
  • Nguyen Kieu Oanh
    The Internet not only provides data for users to browse, but also databases to query, and software agents to run. Due to the exponential increase of deployed agents on the Internet, automating the search and selection of ...
  • Rahman, Md. Anisur
    Java supports concurrent programming by means of threads that independently execute code. Such code operates on Java values and objects residing in a shared main memory. Every thread owns a private working memory in which ...
  • Nyo Maw
    Internet access is transforming the way the world operates. The World Wide Web and e- mail are becoming the lingua franca of modern living. In the meantime, the rapidly ...
  • Wacharapol Pokavanich
    Reliable Multicast is encountered in many applications where there is a need to disseminate information to a large user community in a wireless asymmetric communication environment. To utilize the transmission media ...
  • Piti Cherntanomwong
    Virtual Private Networks (VPN) are used by companies for connecting between their headquarters and remotes branches because the company can eliminate the leased line cost, which is extremely expensive. However, VPN is ...
  • Kronprom Thirawat (2000)
    MPEG-2 is an international standard for the compression of video signals. It is a lossy compression algorithm that reduces the number of bits required to digitally encode a video picture by removing visual redundancies and ...
  • Khin Ann Mon
    This study aims to understand the fundamental concepts of fuzzy concepts and access its usefulness in the studies of control systems along with the example of elevator group control system. The concept seems to be potentially ...
  • Pichai Lertprasitpun
    Since modern applications have applied Extensible Markup Language (XML) to encode their data and information, traditional databases including relational and object-oriented databases have been used to handle XML documents. ...
  • Rajpar, Masroor A.
    This study is about the analysis, designing and implementation requirements of electronic commerce application of doing the mission-critical business for organizations. This study propose how to design and implement ...
  • J. Seng Ja
    The Gregory patch is a modification of the Bà à à à à à ©zier patch using Gregoryà à à à à ¢ s solution for the twist incompatibility in a Coons patch. The main feature of the Gregory patch is ...
  • Kyaw Hlaing Aye
    Bayesian belief networks have proven to be an effective technique for representing and reasoning with uncertain knowledge. A Bayesian network is a graphical representation of a probability distribution. Therefore statistical ...
  • Krit Witwiyaruj
    Ordered Binary Decision Diagram (OBDD) is a directed acyclic graph, which has been used as an efficient tool to reduce the amount of space and computation required for verifying digital circuits by removing redundant copies ...
  • Danai Treeratwattana
    Proxy server is a dedicated server to cache Internet objects, requested from clients. If the object does not exist in the proxy server, it will retrieve that object from the original server. Every time a client access to ...

Search DSpace


Advanced Search

Browse

My Account