Abstract is missing.
- Source code classification using Neural NetworksShlok Gilda. 1-6 [doi]
- Extracting UML class diagrams from software requirements in Thai using NLPMathawan Jaiwai, Usa Sammapun. 1-5 [doi]
- Development of a MySQL Sandbox for processing SQL statements: Case of DML and DDL statementsKanokwan Atchariyachanvanich, Srinual Nalintippayawong, Tanasab Permpool. 1-6 [doi]
- Separation of abnormal regions on black gram leaves using image analysisPavit Noinongyao, Ukrit Watchareeruetai, Puriwat Khantiviriya, Chaiwat Wattanapaiboonsuk, Sutsawat Duangsrisai. 1-5 [doi]
- Two factor image-based password authentication for junior high school studentsNiramai Cherdmuangpak, Tanapat Anusas-Amornkul, Benchaphon Limthanmaphon. 1-6 [doi]
- Automatic microaneurysm detection using Multi-level Threshold based on ISODATATanin Intaramanee, Ratanak Khoeun, Krisana Chinnasarn. 1-6 [doi]
- Evaluate different machine learning techniques for classifying sleep stages on single-channel EEGShahnawaz Qureshi, Sirirut Vanichayobon. 1-6 [doi]
- Speech emotion recognition using derived features from speech segment and kernel principal component analysisMatee Charoendee, Atiwong Suchato, Proadpran Punyabukkana. 1-6 [doi]
- Building a brain atlas based on gabor texture featuresArkane Khaminkure, Paramate Horkaew, Jantana Panyavaraporn. 1-5 [doi]
- Design and development of lane detection based on FPGAPiyatap Promrit, Wannarat Suntiamorntut. 1-4 [doi]
- Robust video editing detection using Scalable Color and Color Layout DescriptorsPeerapon Chantharainthron, Sasipa Panthuwadeethorn, Suphakant Phimoltares. 1-6 [doi]
- Strabismus screening by Eye Tracker and gamesUdomchai Saisara, Poonpong Boonbrahm, Achara Chaiwiriya. 1-5 [doi]
- Shape recognition by using Scale Invariant Feature Transform for contourMathara Rojanamontien, Ukrit Watchareeruetai. 1-6 [doi]
- Burn in Zone: Real time Heart Rate monitoring for physical activitySakchai Muangsrinoon, Poonpong Boonbrahm. 1-6 [doi]
- Temporal kNN for short-term ocean current prediction based on HF radar observationsArnon Jirakittayakorn, Teeranai Kormongkolkul, Peerapon Vateekul, Kulsawasd Jitkajornwanich, Siam Lawawirojwong. 1-6 [doi]
- One time key Issuing for Verification and Detecting Caller ID Spoofing AttacksNarongsak sukma, Roongroj Chokngamwong. 1-4 [doi]
- Workflow simulation based on cloud platform for office automation systemKanittha Promsakul, Somchai Limsiroratana. 1-5 [doi]
- Measuring difficulty levels of JavaScript questions in Question-Answer Community based on concept hierarchyNeung Viriyadamrongkij, Twittie Senivongse. 1-6 [doi]
- Design and implement of GPON-FTTH network for residential condominiumRonnakorn Jirachariyakool, Napat Sra-ium, Somkiat Lerkvaranyu. 1-5 [doi]
- Parallelized FPA-SVM: Parallelized parameter selection and classification using Flower Pollination Algorithm and Support Vector MachineJean-Charles Coetsier, Rachsuda Jiamthapthaksin. 1-6 [doi]
- Keystroke dynamics for authentication using dynamic time warpingMade Indra Wira Pramana, Suhardi, Novianto Budi Kurniawan, Jaka Sembiring. 1-5 [doi]
- Improved least-squares quadratic mutual information clustering via Laplacian EigenmapJanya Sainui. 1-5 [doi]
- Cache replacement mechanism with Content Popularity for Vehicular Content-Centric Networks (VCCN)Sangduan Chootong, Jirawat Thaenthong. 1-6 [doi]
- OSV: OSPF vulnerability checking toolPoonyavee Kasemsuwan, Vasaka Visoottiviseth. 1-6 [doi]
- An Incremental Dynamic Time Warping for person re-identificationWisrut Kwankhoom, Paisarn Muneesawang. 1-5 [doi]
- Multi-role identification of sentences using Relevance Vector SpaceAkara Prayote, Watcharet Kuntichod. 1-6 [doi]
- A robust algorithm for R peak detection based on optimal Discrete Wavelet TransformAnurak Thungtong. 1-6 [doi]
- Trending topic discovery of Twitter Tweets using clustering and topic modeling algorithmsMa. Shiela C. Sapul, Than Htike Aung, Rachsuda Jiamthapthaksin. 1-6 [doi]
- Measuring data locality ratio in virtual MapReduce cluster using WorkflowSimPeerasak Wangsom, Kittichai Lavangnananda, Pascal Bouvry. 1-6 [doi]
- Segmentation of optic nerve head imagesPunsiri Boonyakiat, Piyanuch Silapachote. 1-5 [doi]
- Brain tumor's approximate correspondence and area with interior holes filledVarin Chouvatut, Ekkarat Boonchieng. 1-5 [doi]
- A semantic approach for question answering using DBpedia and WordNetKittiphong Sengloiluean, Ngamnij Arch-int, Somjit Arch-int, Theerayut Thongkrau. 1-6 [doi]
- Analyzing user reviews in Thai language toward aspects in mobile applicationsBoonyarit Deewattananon, Usa Sammapun. 1-6 [doi]
- Vertebral pose segmentation on low radiation image using Convergence Gravity ForceJakapong Boonyai, Suwanna Rasmequan. 1-6 [doi]
- Model-based engineering for microservice architectures using Enterprise Integration Patterns for inter-service communicationRoland Petrasch. 1-4 [doi]
- A linear discriminant analysis using weighted local structure informationRaywut Ketsuwan, Praisan Padungweang. 1-5 [doi]
- Enhancing trustworthy of document using a combination of image hash and cryptographic hashPornchai Assamongkol, Suphakant Phimoltares, Sasipa Panthuwadeethorn. 1-6 [doi]
- The classification of sets of medical procedures used in the treatment of Diabetes and/or HypertensionKanokwan Rungreangsuparat, Sukumal Kitisin, Kunwadee Sripanidkulchai. 1-7 [doi]
- Graphical representation of the whole sequentially MRI images in a single view image sequences of human's whole headVarin Chouvatut, Ekkarat Boonchieng. 1-6 [doi]
- Evaluation of mobile phone interaction with large public displaysPatchara Pattanakimhun, Winyu Chinthammit, Nopporn Chotikakamthorn. 1-6 [doi]
- Recommender Systems for university elective course recommendationKiratijuta Bhumichitr, Songsak Channarukul, Nattachai Saejiem, Rachsuda Jiamthapthaksin, Kwankamol Nongpong. 1-5 [doi]
- Northern Thai Dialect Text to SpeechPannakorn Chao-angthong, Atiwong Suchato, Proadpran Punyabukkana. 1-6 [doi]
- Formal verification of ABAP by Z specificationSoravit Rodruksa, Denduang Pradubsuwun. 1-4 [doi]
- Design computer-assisted learning in an online Augmented Reality environment based on Shneiderman's eight Golden RulesNaladtaporn Aottiwerch, Urachart KoKaew. 1-5 [doi]
- Spam detection for closed Facebook groupsNattanan Watcharenwong, Kanda Saikaew. 1-6 [doi]
- Authenticating physical location using QR codes and network latencyCharles Allen, Antony Harfield. 1-6 [doi]
- Burmese word segmentation with Character Clustering and CRFsMyat Lay Phyu, Kiyota Hashimoto. 1-6 [doi]
- Experimental performance evaluation of LoRaWAN: A case study in BangkokNuttakit Vatcharatiansakul, Panwit Tuwanut, Chotipat Pornavalai. 1-4 [doi]
- A performance comparison of Apache Tez and MapReduce with data compression on Hadoop clusterKritwara Rattanaopas. 1-5 [doi]
- Separation of occluded leaves using direction fieldNicha Piemkaroonwong, Ukrit Watchareeruetai. 1-6 [doi]
- Front-rear crossover: A new crossover technique for solving a trap problemDilok Pumsuwan, Sunisa Rimcharoen, Nutthanon Leelathakul. 1-6 [doi]
- Enemy evaluation AI for 2D action-platform gamePichit Promsutipong, Vishnu Kotrajaras. 1-6 [doi]
- A rapid anomaly detection technique for big data curationKorn Poonsirivong, Chanintorn Jittawiriyanukoon. 1-6 [doi]
- IOT for smart farm: A case study of the Lingzhi mushroom farm at Maejo UniversityOran Chieochan, Anukit Saokaew, Ekkarat Boonchieng. 1-6 [doi]
- Generalization of a mental rotation skill in humanoid robotsKristsana Seepanomwan. 1-6 [doi]
- ARSA-the pervasive Rescuer Supporting System for the Pre-hospital Emergency Medical ServiceManachai Toahchoodee. 1-6 [doi]
- Distributed consensus-based Sybil nodes detection in VANETsChea Sowattana, Wantanee Viriyasitavat, Assadarat Khurat. 1-6 [doi]
- Queuing-aware Routing Algorithm in Software Defined NetworksPakawat Chumcharoen, Kiattikun Kawila, Kulit Na Nakorn, Kultida Rojviboonchai. 1-5 [doi]
- Pre-impact fall detection approach using dynamic threshold based and center of gravity in multiple Kinect viewpointsNuth Otanasap, Poonpong Boonbrahm. 1-6 [doi]
- Modeling realistic virtual pulse of radial artery pressure waveform using haptic interfaceMoragot Kandee, Poonpong Boonbrahm, Valla Tantayotai. 1-5 [doi]
- Developing a framework for services computing systems engineeringSuhardi, Novianto Budi Kurniawan, Made Indra Wira Pramana, Jaka Sembiring. 1-6 [doi]
- Encouraging water management in local communities through Living Weir 3D animationsSasithorn Rattanarungrot, Somjit Chaisriya, Patibut Preeyawongsakul, Patiwat Ketlertprasert, Nattacha Silakun. 1-6 [doi]