default search action
Werasak Kurutach
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j13]Chian Techapanupreeda, Ekarat Rattagan, Werasak Kurutach:
A transaction security accountability protocol for electronic health systems. Int. Arab J. Inf. Technol. 19(3): 289-297 (2022) - 2020
- [j12]Chian Techapanupreeda, Werasak Kurutach:
Enhancing Transaction Security for Handling Accountability in Electronic Health Records. Secur. Commun. Networks 2020: 8899409:1-8899409:18 (2020) - [j11]Thuvanan Borvornvitchotikarn, Werasak Kurutach:
miRID: Multi-Modal Image Registration Using Modality-Independent and Rotation-Invariant Descriptor. Symmetry 12(12): 2078 (2020)
2010 – 2019
- 2019
- [j10]Chalee Thammarat, Werasak Kurutach:
A lightweight and secure NFC-base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification. Int. J. Commun. Syst. 32(12) (2019) - 2018
- [j9]Chalee Thammarat, Werasak Kurutach:
A Secure Fair Exchange for SMS-Based Mobile Payment Protocols Based on Symmetric Encryption Algorithms with Formal Verification. Wirel. Commun. Mob. Comput. 2018: 6953160:1-6953160:21 (2018) - [c28]Kanjana Ruttanateerawichien, Werasak Kurutach:
An Improved Golden Ball Algorithm for the Vehicle Routing Problem with Simultaneous Pickup and Delivery. ICIS 2018: 258-262 - [c27]Krisada Sangsanit, Werasak Kurutach, Suronapee Phoomvuthisarn:
REST web service composition: A survey of automation and techniques. ICOIN 2018: 116-121 - [c26]Thuvanan Borvornvitchotikarn, Werasak Kurutach:
Robust Self-Similarity Descriptor for Multimodal Image Registration. IWSSIP 2018: 1-4 - 2017
- [c25]Chalee Thammarat, Werasak Kurutach, Suronapee Phoomvuthisarn:
A secure lightweight and fair exchange protocol for NFC mobile payment based on limited-use of session keys. ISCIT 2017: 1-6 - [c24]Chalee Thammarat, Werasak Kurutach, Suronapee Phoomvuthisarn:
A secure lightweight protocol for SMS mutual authentication protocols based on symmetic-key encryption. ISCIT 2017: 1-6 - 2016
- [j8]Phimmarin Keerin, Werasak Kurutach, Tossapon Boongoen:
A cluster-directed framework for neighbour based imputation of missing value in microarray data. Int. J. Data Min. Bioinform. 15(2): 165-193 (2016) - [c23]Kanjana Ruttanateerawichien, Werasak Kurutach, Tantikorn Pichpibul:
A new efficient and effective golden-ball-based technique for the capacitated vehicle routing problem. ICIS 2016: 1-5 - [c22]Thuvanan Borvornvitchotikarn, Werasak Kurutach:
A taxonomy of mutual information in medical image registration. IWSSIP 2016: 1-4 - 2014
- [c21]Kanjana Ruttanateerawichien, Werasak Kurutach, Tantikorn Pichpibul:
An Improved Golden Ball Algorithm for the Capacitated Vehicle Routing Problem. BIC-TA 2014: 341-356 - [c20]Pruegsa Duangphasuk, Werasak Kurutach:
Tattoo skin cross - correlation neural network. ISCIT 2014: 489-493 - 2012
- [c19]Phimmarin Keerin, Werasak Kurutach, Tossapon Boongoen:
Cluster-based KNN missing value imputation for DNA microarray data. SMC 2012: 445-450 - 2011
- [j7]Yutthapong Tuppadung, Werasak Kurutach:
Comparing nonlinear inertia weights and constriction factors in particle swarm optimization. Int. J. Knowl. Based Intell. Eng. Syst. 15(2): 65-70 (2011) - [c18]Pornnapas Kasemthaweesab, Werasak Kurutach:
Study of Diabetes Mellitus (DM) with Ophthalmic Complication Using Association Rules of Data Mining Technique. ICCCI (1) 2011: 527-536 - 2010
- [j6]Rerkchai Fooprateepsiri, Werasak Kurutach:
A Highly Robust Approach Image Identification based-on Hausdorff-Trace Transform. J. Digit. Content Technol. its Appl. 4(1): 26-31 (2010) - [c17]Werasak Kurutach, Rerkchai Fooprateepsiri, Suronapee Phoomvuthisarn:
A Highly Robust Approach Face Recognition Using Hausdorff-Trace Transformation. ICONIP (2) 2010: 549-556
2000 – 2009
- 2009
- [j5]Rerkchai Fooprateepsiri, Werasak Kurutach:
Facial Recognition using Hausdorff- Shape- Radon Transform. J. Digit. Content Technol. its Appl. 3(2): 67-74 (2009) - [j4]Rerkchai Fooprateepsiri, Werasak Kurutach:
An Efficient Face Reconstruction Framework for Face Recognition Systems. J. Digit. Content Technol. its Appl. 3(3): 96-102 (2009) - [c16]Rerkchai Fooprateepsiri, Werasak Kurutach:
Face Verification base-on Hausdorff-Shape Context. CAR 2009: 240-244 - [c15]Rerkchai Fooprateepsiri, Werasak Kurutach, Surakarn Duangphasuk:
A hybrid method for facial recognition systems. CIMSIVP 2009: 53-60 - [c14]Suphak Suwanya, Werasak Kurutach:
Applying Agility Framework in Small and Medium Enterprises. FGIT-ASEA 2009: 102-110 - [c13]Rerkchai Fooprateepsiri, Werasak Kurutach, Sutthipong Tamsumpaolerd:
An Image Identifier Based on Hausdorff Shape Trace Transform. ICONIP (1) 2009: 788-797 - 2008
- [j3]Yutthapong Tuppadung, Werasak Kurutach:
Modified Particle Swarm Optimization for an Optimal Feeder-Switch Relocation. Int. J. Artif. Intell. Tools 17(2): 401-409 (2008) - [c12]Suphak Suwanya, Werasak Kurutach:
An analysis of software process improvement for sustainable development in Thailand. CIT 2008: 724-729 - 2006
- [c11]Werasak Kurutach, Surat Srinoy, Witcha Chimphlee, Siriporn Chimphlee:
An Improving Fuzzy Ant Clustering Using Artificial Immune Recognition System . IMECS 2006: 18-22 - [c10]Surat Srinoy, Werasak Kurutach:
Unsupervised Learning: A Fusion of Rough Sets and Fuzzy Ants Clustering for Anomaly Detection System. SMC 2006: 1079-1084 - 2005
- [j2]Sanun Srisuk, Maria Petrou, Werasak Kurutach, Alexander Kadyrov:
A face authentication system using the trace transform. Pattern Anal. Appl. 8(1-2): 50-61 (2005) - 2004
- [c9]Sanun Srisuk, Maria Petrou, Rerkchai Fooprateepsiri, Khamron Sunat, Werasak Kurutach, Pichet Chopaka:
A Combination of Shape and Texture Classifiers for a Face Verification System. ICBA 2004: 44-51 - 2003
- [c8]Kieron Messer, Josef Kittler, Mohammad Sadeghi, Sébastien Marcel, Christine Marcel, Samy Bengio, Fabien Cardinaux, Conrad Sanderson, Jacek Czyz, Luc Vandendorpe, Sanun Srisuk, Maria Petrou, Werasak Kurutach, Alexander Kadyrov, Roberto Paredes, Burcu Kepenekci, Faik Boray Tek, Gozde Bozdagi Akar, Farzin Deravi, Nick Jeremy Mavity:
Face Verification Competition on the XM2VTS Database. AVBPA 2003: 964-974 - [c7]Sanun Srisuk, Maria Petrou, Werasak Kurutach, Alexander Kadyrov:
Face Authentication using the Trace Transform. CVPR (1) 2003: 305-312 - [c6]Wootipong Consue, Werasak Kurutach:
Novel Vertical Mining On Diffsets Structure. IAT 2003: 343-349 - 2002
- [c5]Sanun Srisuk, Werasak Kurutach:
A New Robust Face Detection in Color Images. FGR 2002: 306-311 - [c4]Sanun Srisuk, Werasak Kurutach:
An Efficient Algorithm for Face Detection in Color Images. JCIS 2002: 688-691 - 2001
- [j1]Sanun Srisuk, Werasak Kurutach, Kongsak Limpitikeat:
A Novel Approach for Robust, Fast and Accurate Face Detection. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 9(6): 769-779 (2001) - [c3]Sanun Srisuk, Werasak Kurutach:
New robust Hausdorff distance-based face detection. ICIP (1) 2001: 1022-1025
1990 – 1999
- 1998
- [c2]Werasak Kurutach:
Handling fuzziness in temporal databases. SMC 1998: 2762-2767 - 1993
- [c1]Werasak Kurutach, James Franklin:
On Temporal-fuzziness in Temporal Fuzzy Databases. DEXA 1993: 154-165
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint