default search action
DICTAP 2014: Bangkok, Thailand
- Fourth International Conference on Digital Information and Communication Technology and its Applicationsm DICTAP 2014, Bangkok, Thailand, May 6-8, 2014. IEEE 2014, ISBN 978-1-4799-3723-3
- Shivangi Surati, Devesh C. Jinwala, Sanjay Garg:
A Peer-to-Peer multiway tree network with efficient range query search using multidimensional indexing. 1-6 - Wittakarn Keeratichayakorn, Saranya Maneeroj:
Design patterns for integration between enterprise application with any business process management systems. 7-12 - Chang Liu, Fei Qiao, Xinghua Yang, Huazhong Yang:
Hardware acceleration with pipelined adder for Support Vector Machine classifier. 13-16 - Isarin Promyarut, Anant Choksuriwong:
A Review Perceptual Information Fusion. 17-22 - Putthiporn Thanathamathee:
Boosting with feature selection technique for screening and predicting adolescents depression. 23-27 - Ta Kiatkaiwansiri, Sukree Sinthupinyo:
Combining nodes in multiple neural network on large datasets. 28-30 - Thitiphat Anakavej, Aram Kawewong, Karn Patanukhom:
License plate localization using MSERs and vehicle frontal mask localization using visual saliency for vehicle recognition. 31-36 - Mohammad Hamdan:
Revisiting the distribution index in simulated binary crossover operator for evolutionary multiobjective optimisation algorithms. 37-41 - David Ellis, Kosuke Imamura:
Square Wave Artificial Neuron (SWAN). 42-45 - Udaya Raj Dhungana, Subarna Shakya:
Word sense disambiguation in Nepali language. 46-50 - Fawaz S. Al-Anzi, Ayed A. Salman, Noby K. Jacob, Jyoti Soni:
Towards robust, scalable and secure network storage in Cloud Computing. 51-55 - Hani Attar, Lina Stankovic, Mohamed Alhihi, Ahmed Ameen:
Deterministic network coding over Long Term Evaluation Advance communication system. 56-61 - Amith Khandakar, Amr Mohammed, Amr A. El-Sherif:
Experimental threshold determination for secondary users using USRP and Gnu radio. 62-68 - Junichi Suzuki, Pruet Boonma, Dung H. Phan:
Neuronal signaling optimization for intrabody nanonetworks. 69-74 - Myungseok Song, Jun-Dong Cho, Jongpil Jeong:
On mathematical modeling of hierarchical mobility management protocols. 75-80 - Zolidah Kasiran, Juliza Mohamad:
Throughput performance analysis of the wormhole and sybil attack in AODV. 81-84 - Kuen-Meau Chen, Yu-Min Fang, Ying-Sin Lin:
Product development of the glasses design - Color imagery in eyeglass frames and skin tone. 85-89 - Chakchai So-In, Nutakarn Mongkonchai, Phet Aimtongkham, Kasidit Wijitsopon, Kanokmon Rujirakul:
An evaluation of data mining classification models for network intrusion detection. 90-94 - Abdulloh Baka, Wiphada Wettayaprasit, Sirirut Vanichayobon:
A novel discretization technique using Class Attribute Interval Average. 95-100 - Devi Fitrianah, Nursidik H. Praptono, Remmy A. M. Zen, Achmad Nizar Hidayanto, Aniati Murni Arymurthy:
An integrated system architecture in managing fishery data in Indonesia. 101-108 - Nor Zairah Ab. Rahim, Noor Haniza Abu Bakar:
e-Book use by Malaysian primary school children. 109-113 - Abdulrahman Al-Kandari, Mishari Alhouli:
Fuzzy Object Relational Database Management System (FORDBMS) is appropriate approach for Real-Estate (GIS) business. 114-117 - Balaji Hariharan, S. Padmini, Uma Gopalakrishnan:
Gesture recognition using Kinect in a virtual classroom environment. 118-124 - Nassir Jabir Al-khafaji, Abdul Jaleel Kehinde Shittu, Wan Rozaini Sheik Osman:
G2G interaction among local agencies in developing countries based on diffusion of innovations theory. 125-131 - Wisam Abduladheem Kamil, Zaid Abass Fadahl, Ban Salman Shukur, Nassir Jabir Al-khafaji, Naofal Mohamad Hassin Azeez:
Mobile school: Face-to-face learning interface for Iraqi students in Malaysia. 132-137 - Sylvia Chin:
Mobile technology and Gamification: The future is now! 138-143 - Suresh Shanmugasundaram, Divyapreya Chidambaram:
Volunteer hive computing and virtualization in Botswana's web based edification techniques. 144-148 - Huynh Ba Dieu, Nguyen Xuan Huy:
An improved technique for hiding data in audio. 149-153 - Sang-Pil Cheon, Jung-Min Kang, Min-Woo Park, Jung-Ho Eom:
The scheme of 3-level authentication mechanism for preventing internal information leakage. 154-157 - Chaisup Wongsaroj, Nakornthip Prompoon, Athasit Surarerks:
A music similarity measure based on chord progression and song segmentation analysis. 158-163 - Komaek Kawinakrathiti, Suphakant Phimoltares:
A comparative study of CBIR descriptors on innovative application of fashion image. 164-168 - Ananchai Muangon, Sotarat Thammaboosadee, Choochart Haruechaiyasak:
A lexiconizing framework of feature-based opinion mining in tourism industry. 169-173 - Nelson K. Y. Leung, Sim Kim Lau, Nicole Tsang:
A new methodology to streamline ontology integration processes. 174-179 - Waralak V. Siricharoen, Udsanee Pakdeetrakulwong:
A survey on ontology-driven geographic information systems. 180-185 - Nitiwat Thongkao, Somchai Limsiroratana:
Design of cloud-based university data structure. 186-191 - Akrapol Samart, Nakornthip Prompoon:
Framework for Modification Request Management based on Taxonomy and Knowledge Asset for software maintenance. 192-198 - Wu-Chen Su:
Integrating and mining virtual communities across multiple Online Social Networks: Concepts, approaches and challenges. 199-204 - Golnaz Badkobeh, Maxime Crochemore, Chalita Toopsuwan:
Maximal anti-exponent of gapped palindromes. 205-210 - Saran Yamasathien, Wiwat Vatanawood:
An approach to construct formal model of business process model from BPMN workflow patterns. 211-215 - M. Arafa, Elsayed A. Sallam, M. M. Fahmy:
An enhanced differential evolution optimization algorithm. 216-225 - Chatchai Poonriboon, Chakchai So-In, Somjit Arch-int, Kanokmon Rujirakul:
An optimized genetic routing approach for constrained shortest path selections. 226-230 - Boonprasert Surakratanasakul, Kazuhiko Hamamoto:
Conjugate of knowledge items between abstract and organization knowledge models. 231-236 - Ren Meng, Shengbing Zhang, Lei Yi, Zhang Meng:
CUDA-based real-time face recognition system. 237-241 - Swapnil Nema, Prabin Kumar Padhy:
Cuckoo PID-P controller for non-linear process. 242-246 - Kanayah Saurty, Pierre Clarel Catherine, K. M. S. Soyjaudah:
Early CU size determination in HEVC intra prediction using Average Pixel Cost. 247-252 - John Tsiligaridis:
Tabu based Search for discovering Regular Plans in mobile clients. 253-257 - Kapil Kumar, Joy Bose:
User data management by tabs during a browsing session. 258-263 - Chin-Chih Chang, Wen-Xiang Wu:
Distributed file sharing using web services. 264-268 - Ake Osothongs, Noboru Sonehara:
A proposal of personal information trading platform (PIT): A fair trading between personal information and incentives. 269-274 - Won Shin, Jin-Lee Lee, Doo-Ho Park, Chun-Hyon Chang:
Design of authenticity evaluation metric for Android applications. 275-278 - Amr Farouk, Ali Miri, Mohamed M. Fouad, Ahmed A. Abdelhafez:
Efficient pairing-free, certificateless two-party authenticated key agreement protocol for grid computing. 279-284 - Yi Hua Chen, Chang Lueng Chu, Wei Jhe Lyu:
KPI signal analysis of the custom behavior in Kenting Spring Scream festival hot zone. 285-290 - Yotsapon Lertladechanon, Nakornthip Prompoon:
Privacy-aware policy establishment and enforcement for information center repository: A case study of Government Meteorological Information Center Repository. 291-296 - Hussah AlRashid, Rasheed AlZahrani, Eyas ElQawasmeh:
Reverse of e-mail spam filtering algorithms to maintain e-mail deliverability. 297-300 - Deng Huaqiu:
A real-time embedded video monitoring system. 301-303 - Sutang Sawasdee, Suree Pumrin:
Elderly care notification system using hand posture recognition. 304-309 - Abdul Hadi H. Nograles, Christopher Paolo D. Agbay, Ian Steven L. Flores, A. Linsangan Manuel, John Bethany C. Salonga:
Low cost internet based wireless sensor network for air pollution monitoring using Zigbee module. 310-314 - Neramitr Chirakanphaisarn:
Measurement and analysis system of the knee joint motion in gait evaluation for rehabilitation medicine. 315-320 - Samer Al-Shaer, Mohammad Al-Shabi, Mohammed Bani Younis:
Applying image processing techniques on a ball collecting robot. 321-326 - Chhaily Moun, Chayakorn Netramai:
Localization and building identification in outdoor environment for smartphone using integrated GPS and camera. 327-332 - Kosin Kalarat:
Relief Mapping on facade of Sino Portuguese Architecture in Virtual Reality. 333-336 - Tebbi Hanane, Maamar Hamadouche, Azzoune Hamid:
TTS-SA (A text-to-speech system based on Standard Arabic). 337-341 - Chaowanan Khundam:
Virtual objects on limit view surface using transparent parallax specular mapping: Case study of Tubkased Vihara, Wat Phra Mahathat Woramahawihan Nokhon Si Thammarat. 342-346 - Kanathip Thongraweewong:
State telecommunication surveillance: A comparative study of the US and Thai telecommunication privacy laws. 347-352 - Nurul Asyikin Mohd Daud, Nur Emileen Abd Rashid, Kama Azura Othman, Norhayati Ahmad:
Analysis on Radar Cross Section of different target specifications for Forward Scatter Radar (FSR). 353-356 - Muhammad Norhisham Majid, Nur Emileen Abd Rashid, Suhaila Subahir, Mohd. Tarmizi Ali:
Miniature stub-loaded monopole antenna at 800 MHz for FSR sensor. 357-362 - Chaoqun Li, Jianhua Sun, Hao Chen:
An improved method for tree-based clone detection in Web Applications. 363-367 - Kama Azura Othman, Eda Hilyati Abdullah, Norfazilah Li, Nur Emileen Abd Rashid:
GSM wireless technology implementation in haze monitoring. 368-371 - Hiroyuki Hisamatsu, Hiroki Oda:
Performance evaluation of compound TCP+ congestion control parameters in wireless networks. 372-377 - Yazan A. Alqudah, Michelle Mace:
Project Based Learning in wireless communications utilizing deployed wireless networks. 378-382 - Amit Vishwakarma, Anil Kumar, Girish Kumar Singh:
Simple iterative method for designing prototype filter for cosine modulated nearly perfect reconstructed transmultiplexer. 383-388 - Abdulrahman Al-Kandari, Meshal Al-Nasheet, Abdullah R. Abdulgafer:
WiMAX vs. LTE: An analytic comparison. 389-393 - Boonyarit Uengtrakul, Dahmmaet Bunnjaweht:
A cost efficient software defined radio receiver for demonstrating concepts in communication and signal processing using Python and RTL-SDR. 394-399 - Saiyan Saiyod, Pichet Wayalun:
A hybrid technique for overlapped chromosome segmentation of G-band mataspread images automatic. 400-404 - Andrew Cyrus Smith:
Cluster-based tangible programming. 405-410 - (Withdrawn) Enhancement of jobshop scheduling problem using search optimization. 411-414
- Montree Kumngern, Usa Torteanchai:
FDCCII-based P, PI, PD and PID controllers. 415-418 - Kittasil Silanon, Nikom Suvonvorn:
Finger-spelling recognition system using fuzzy finger shape and hand appearance features. 419-424 - Degui Xiao, Xiaoli Hu:
Road detection based on superpixels and anisotropic heat diffusion. 425-429 - Andrew Cyrus Smith:
Rock Garden programming: Programming in the physical world. 430-434 - Yu-Min Fang, Kuen-Meau Chen, Chao-Wei Hsu:
The study on the correlation between emotional design and emotion - Taking the conditioning process of lemonade for example. 435-439 - Darunee Bunma, Sartid Vongpradhip:
Using augment reality to increase capacity in QR code. 440-443
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.