Search Results

Now showing 1 - 10 of 22
No Thumbnail Available
Publication

The integration of file server function and task management function to replace web application on cloud platform for cost reduction

Namee, Khanista, Karnbunjong, Sirinun, Polpinij, Jantima (2019)

The aim of this paper is to propose a new technique to operate a web application on a cloud platform based on the integration of multiple services which could benefit in the cost reduction of renting a cloud. Two of the most important functions... are file server function and task management function. The purpose of study is to experiment this concept and technique. It is tested on Microsoft Azure platform since it is a cloud platform that covers all services required. These services are helpful

No Thumbnail Available
Publication

Study of The Function of Keeping System Used In Government Agencies

Satit, Sasithorn, Chaichuay, Vispat (2017)

No Thumbnail Available
Publication

Guiding application development for finding information resources in the Academic Recourses Center, Mahasarakham University

Manphonsri, Phurithat, Thienmongkol, Ratanachote (2018)

application development and design. After the prototype media evaluation; the significant finding highlighted the need for the book classification symbol design for each category of book and the User Interface (UI) format to function properly on a mobile... application. The research outcome was eventually resulted as 9 graphic symbol sets with suitable functions that were already tested for their performance used with the prototype application.

No Thumbnail Available
Publication

IoT services agent platform: A case study in network monitoring

Mingkhwan, Anirach, Suvunnasan, Wipoo, Hongkumdee, Panya (2018)

IoT Services Agent Platform of Network Monitoring using IoT is a work that was utilizing The Internet of Thing (IoT) devices for gathering information not just from the SNMP equipment’s but also has an advantage from the specific functions

No Thumbnail Available
Publication

Authentication and password storing improvement using SXR algorithm with a hash function

Polpong, Jakkapong, Wuttidittachotti, Pongpisit (2020)

authentication systems. SXR algorithm consisted of four steps. First; the received password from users was hashed through a general hash function. Second; the ratio and the number of iterations from the secret key (username and password) were calculated. Third...; even if the hackers hacked the hashed password; it would be challenging and would consume more time to decrypt the actual one; because the pattern of the stored password is the same as the one that has been hashed through the general hash function.

No Thumbnail Available
Publication

DDoS attack detection using moment in statistics with discriminant analysis

Pitaksathienkul, Pradit, Wuttidittachotti, Pongpisit (2017)

In this research; the discriminant analysis function was created by using four moments of the traffic to find the characteristics of harmful traffic and accuracy of detection was found to be at 92.5%. The research objectives are to create... discriminant analysis functions using moment of aggregate traffic packets on victims to classifying attack situations and detect DDoS attacks on the network. To simulate the network model; the DDoS attack simulation model over wired networks was conducted

No Thumbnail Available
Publication

Behavior features for automatic detection of depression from Facebook users

Hemtanon, Siranuch, Aekwarangkoon, Saifon, Kittphattanabawon, Nichnan (2020)

to Facebook main functions including amount of posting, sharing, commenting and replying is designed to represent users’ activities in a numerical value form. The collected data with periodic and consecutive aspects are gathered without interpreting content

No Thumbnail Available
Publication

Metadata Schema for Folktales in the Mekong River Basin

Kwiecien, Kanyarat, Chansanam, Wirapong, Supnithi, Thepchai, Chitiyaphol, Jaturong, Tuamsuk, Kulthida (2021)

; characters; scenes; magical objects; ethnic groups; languages; countries; relationships between tales; and their sources; (3) the folktale structure includes verbal; non-verbal; and mixed forms. The metadata schema development adopted the functional

No Thumbnail Available
Publication

A Conceptual Model of Requirement Engineering in Cloud Project Delivery for Thai Government Organizations

Chaipunyathat, Ajchareeya, Porrawatpreyakorn, Nalinpat, Nuchitprasitchai, Siranee, Viriyapant, Kanchana (2019)

) people in general lack of knowledge and understanding of cloud technology (9) problems about pricing model; it's impact on 23 cloud requirements (functional and non-functional) as well as factors that involved in RE phases. Based on these results

No Thumbnail Available
Publication

The design of voice over IP monitoring system

Phuphong, Jaroonsak, Jandaeng, Chanankorn (2019)

behavior. However; most of network monitoring are general and designed for traditional network. They cannot monitor VoIP function directly. This paper proposes the software architecture for VoIP Monitoring. Our system aim is flexibility and scalability