


default search action
DICTAP 2014: Bangkok, Thailand
- Fourth International Conference on Digital Information and Communication Technology and its Applicationsm DICTAP 2014, Bangkok, Thailand, May 6-8, 2014. IEEE 2014, ISBN 978-1-4799-3723-3

- Shivangi Surati, Devesh C. Jinwala

, Sanjay Garg
:
A Peer-to-Peer multiway tree network with efficient range query search using multidimensional indexing. 1-6 - Wittakarn Keeratichayakorn, Saranya Maneeroj:

Design patterns for integration between enterprise application with any business process management systems. 7-12 - Chang Liu, Fei Qiao, Xinghua Yang, Huazhong Yang:

Hardware acceleration with pipelined adder for Support Vector Machine classifier. 13-16 - Isarin Promyarut, Anant Choksuriwong:

A Review Perceptual Information Fusion. 17-22 - Putthiporn Thanathamathee

:
Boosting with feature selection technique for screening and predicting adolescents depression. 23-27 - Ta Kiatkaiwansiri, Sukree Sinthupinyo:

Combining nodes in multiple neural network on large datasets. 28-30 - Thitiphat Anakavej, Aram Kawewong, Karn Patanukhom:

License plate localization using MSERs and vehicle frontal mask localization using visual saliency for vehicle recognition. 31-36 - Mohammad Hamdan

:
Revisiting the distribution index in simulated binary crossover operator for evolutionary multiobjective optimisation algorithms. 37-41 - David Ellis, Kosuke Imamura:

Square Wave Artificial Neuron (SWAN). 42-45 - Udaya Raj Dhungana, Subarna Shakya:

Word sense disambiguation in Nepali language. 46-50 - Fawaz S. Al-Anzi

, Ayed A. Salman
, Noby K. Jacob, Jyoti Soni:
Towards robust, scalable and secure network storage in Cloud Computing. 51-55 - Hani Attar

, Lina Stankovic
, Mohamed Alhihi, Ahmed Ameen:
Deterministic network coding over Long Term Evaluation Advance communication system. 56-61 - Amith Khandakar

, Amr Mohammed, Amr A. El-Sherif
:
Experimental threshold determination for secondary users using USRP and Gnu radio. 62-68 - Junichi Suzuki, Pruet Boonma

, Dung H. Phan:
Neuronal signaling optimization for intrabody nanonetworks. 69-74 - Myungseok Song, Jun-Dong Cho

, Jongpil Jeong
:
On mathematical modeling of hierarchical mobility management protocols. 75-80 - Zolidah Kasiran, Juliza Mohamad:

Throughput performance analysis of the wormhole and sybil attack in AODV. 81-84 - Kuen-Meau Chen, Yu-Min Fang

, Ying-Sin Lin:
Product development of the glasses design - Color imagery in eyeglass frames and skin tone. 85-89 - Chakchai So-In

, Nutakarn Mongkonchai, Phet Aimtongkham, Kasidit Wijitsopon, Kanokmon Rujirakul
:
An evaluation of data mining classification models for network intrusion detection. 90-94 - Abdulloh Baka, Wiphada Wettayaprasit

, Sirirut Vanichayobon
:
A novel discretization technique using Class Attribute Interval Average. 95-100 - Devi Fitrianah

, Nursidik H. Praptono, Remmy A. M. Zen, Achmad Nizar Hidayanto, Aniati Murni Arymurthy:
An integrated system architecture in managing fishery data in Indonesia. 101-108 - Nor Zairah Ab Rahim

, Noor Haniza Abu Bakar:
e-Book use by Malaysian primary school children. 109-113 - Abdulrahman Alkandari

, Mishari Alhouli:
Fuzzy Object Relational Database Management System (FORDBMS) is appropriate approach for Real-Estate (GIS) business. 114-117 - Balaji Hariharan, S. Padmini, Uma Gopalakrishnan

:
Gesture recognition using Kinect in a virtual classroom environment. 118-124 - Nassir Jabir Al-khafaji, Abdul Jaleel Kehinde Shittu, Wan Rozaini Sheik Osman:

G2G interaction among local agencies in developing countries based on diffusion of innovations theory. 125-131 - Wisam Abduladheem Kamil, Zaid Abass Fadahl, Ban Salman Shukur

, Nassir Jabir Al-khafaji, Naofal Mohamad Hassin Azeez:
Mobile school: Face-to-face learning interface for Iraqi students in Malaysia. 132-137 - Sylvia Chin:

Mobile technology and Gamification: The future is now! 138-143 - Suresh Shanmugasundaram

, Divyapreya Chidambaram:
Volunteer hive computing and virtualization in Botswana's web based edification techniques. 144-148 - Huynh Ba Dieu, Nguyen Xuan Huy:

An improved technique for hiding data in audio. 149-153 - Sang-Pil Cheon, Jung-Min Kang, Min-Woo Park, Jung-Ho Eom:

The scheme of 3-level authentication mechanism for preventing internal information leakage. 154-157 - Chaisup Wongsaroj, Nakornthip Prompoon, Athasit Surarerks:

A music similarity measure based on chord progression and song segmentation analysis. 158-163 - Komaek Kawinakrathiti, Suphakant Phimoltares:

A comparative study of CBIR descriptors on innovative application of fashion image. 164-168 - Ananchai Muangon, Sotarat Thammaboosadee

, Choochart Haruechaiyasak:
A lexiconizing framework of feature-based opinion mining in tourism industry. 169-173 - Nelson K. Y. Leung, Sim Kim Lau

, Nicole Tsang:
A new methodology to streamline ontology integration processes. 174-179 - Waralak V. Siricharoen

, Udsanee Pakdeetrakulwong
:
A survey on ontology-driven geographic information systems. 180-185 - Nitiwat Thongkao, Somchai Limsiroratana

:
Design of cloud-based university data structure. 186-191 - Akrapol Samart, Nakornthip Prompoon:

Framework for Modification Request Management based on Taxonomy and Knowledge Asset for software maintenance. 192-198 - Wu-Chen Su:

Integrating and mining virtual communities across multiple Online Social Networks: Concepts, approaches and challenges. 199-204 - Golnaz Badkobeh, Maxime Crochemore, Chalita Toopsuwan:

Maximal anti-exponent of gapped palindromes. 205-210 - Saran Yamasathien, Wiwat Vatanawood:

An approach to construct formal model of business process model from BPMN workflow patterns. 211-215 - M. Arafa

, Elsayed A. Sallam, M. M. Fahmy:
An enhanced differential evolution optimization algorithm. 216-225 - Chatchai Poonriboon, Chakchai So-In

, Somjit Arch-int, Kanokmon Rujirakul
:
An optimized genetic routing approach for constrained shortest path selections. 226-230 - Boonprasert Surakratanasakul, Kazuhiko Hamamoto

:
Conjugate of knowledge items between abstract and organization knowledge models. 231-236 - Ren Meng, Shengbing Zhang, Lei Yi, Zhang Meng:

CUDA-based real-time face recognition system. 237-241 - Swapnil Nema, Prabin Kumar Padhy:

Cuckoo PID-P controller for non-linear process. 242-246 - Kanayah Saurty, Pierre Clarel Catherine, K. M. S. Soyjaudah:

Early CU size determination in HEVC intra prediction using Average Pixel Cost. 247-252 - John Tsiligaridis:

Tabu based Search for discovering Regular Plans in mobile clients. 253-257 - Kapil Kumar, Joy Bose

:
User data management by tabs during a browsing session. 258-263 - Chin-Chih Chang

, Wen-Xiang Wu:
Distributed file sharing using web services. 264-268 - Ake Osothongs, Noboru Sonehara:

A proposal of personal information trading platform (PIT): A fair trading between personal information and incentives. 269-274 - Won Shin, Jin-Lee Lee, Doo-Ho Park, Chun-Hyon Chang:

Design of authenticity evaluation metric for Android applications. 275-278 - Amr Farouk, Ali Miri, Mohamed M. Fouad

, Ahmed A. Abdelhafez:
Efficient pairing-free, certificateless two-party authenticated key agreement protocol for grid computing. 279-284 - Yi Hua Chen, Chang Lueng Chu, Wei Jhe Lyu:

KPI signal analysis of the custom behavior in Kenting Spring Scream festival hot zone. 285-290 - Yotsapon Lertladechanon, Nakornthip Prompoon:

Privacy-aware policy establishment and enforcement for information center repository: A case study of Government Meteorological Information Center Repository. 291-296 - Hussah AlRashid, Rasheed AlZahrani, Eyas ElQawasmeh:

Reverse of e-mail spam filtering algorithms to maintain e-mail deliverability. 297-300 - Deng Huaqiu:

A real-time embedded video monitoring system. 301-303 - Sutang Sawasdee, Suree Pumrin:

Elderly care notification system using hand posture recognition. 304-309 - Abdul Hadi H. Nograles

, Christopher Paolo D. Agbay, Ian Steven L. Flores, A. Linsangan Manuel, John Bethany C. Salonga:
Low cost internet based wireless sensor network for air pollution monitoring using Zigbee module. 310-314 - Neramitr Chirakanphaisarn:

Measurement and analysis system of the knee joint motion in gait evaluation for rehabilitation medicine. 315-320 - Samer Al-Shaer

, Mohammad Al-Shabi
, Mohammed Bani Younis
:
Applying image processing techniques on a ball collecting robot. 321-326 - Chhaily Moun, Chayakorn Netramai:

Localization and building identification in outdoor environment for smartphone using integrated GPS and camera. 327-332 - Kosin Kalarat:

Relief Mapping on facade of Sino Portuguese Architecture in Virtual Reality. 333-336 - Tebbi Hanane

, Maamar Hamadouche, Azzoune Hamid:
TTS-SA (A text-to-speech system based on Standard Arabic). 337-341 - Chaowanan Khundam

:
Virtual objects on limit view surface using transparent parallax specular mapping: Case study of Tubkased Vihara, Wat Phra Mahathat Woramahawihan Nokhon Si Thammarat. 342-346 - Kanathip Thongraweewong:

State telecommunication surveillance: A comparative study of the US and Thai telecommunication privacy laws. 347-352 - Nurul Asyikin Mohd Daud, Nur Emileen Abd Rashid

, Kama Azura Othman, Norhayati Ahmad:
Analysis on Radar Cross Section of different target specifications for Forward Scatter Radar (FSR). 353-356 - Muhammad Norhisham Majid, Nur Emileen Abd Rashid

, Suhaila Subahir
, Mohd. Tarmizi Ali:
Miniature stub-loaded monopole antenna at 800 MHz for FSR sensor. 357-362 - Chaoqun Li, Jianhua Sun, Hao Chen:

An improved method for tree-based clone detection in Web Applications. 363-367 - Kama Azura Othman, Eda Hilyati Abdullah, Norfazilah Li, Nur Emileen Abd Rashid

:
GSM wireless technology implementation in haze monitoring. 368-371 - Hiroyuki Hisamatsu, Hiroki Oda:

Performance evaluation of compound TCP+ congestion control parameters in wireless networks. 372-377 - Yazan A. Alqudah, Michelle Mace:

Project Based Learning in wireless communications utilizing deployed wireless networks. 378-382 - Amit Vishwakarma, Anil Kumar

, Girish Kumar Singh:
Simple iterative method for designing prototype filter for cosine modulated nearly perfect reconstructed transmultiplexer. 383-388 - Abdulrahman Alkandari

, Meshal Al-Nasheet, Abdullah R. Abdulgafer
:
WiMAX vs. LTE: An analytic comparison. 389-393 - Boonyarit Uengtrakul, Dahmmaet Bunnjaweht:

A cost efficient software defined radio receiver for demonstrating concepts in communication and signal processing using Python and RTL-SDR. 394-399 - Saiyan Saiyod, Pichet Wayalun:

A hybrid technique for overlapped chromosome segmentation of G-band mataspread images automatic. 400-404 - Andrew Cyrus Smith:

Cluster-based tangible programming. 405-410 - (Withdrawn) Enhancement of jobshop scheduling problem using search optimization. 411-414

- Montree Kumngern

, Usa Torteanchai:
FDCCII-based P, PI, PD and PID controllers. 415-418 - Kittasil Silanon, Nikom Suvonvorn:

Finger-spelling recognition system using fuzzy finger shape and hand appearance features. 419-424 - Degui Xiao, Xiaoli Hu:

Road detection based on superpixels and anisotropic heat diffusion. 425-429 - Andrew Cyrus Smith:

Rock Garden programming: Programming in the physical world. 430-434 - Yu-Min Fang

, Kuen-Meau Chen, Chao-Wei Hsu:
The study on the correlation between emotional design and emotion - Taking the conditioning process of lemonade for example. 435-439 - Darunee Bunma

, Sartid Vongpradhip:
Using augment reality to increase capacity in QR code. 440-443

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














