Search Results
The integration of file server function and task management function to replace web application on cloud platform for cost reduction
Namee, Khanista, Karnbunjong, Sirinun, Polpinij, Jantima (2019)
The aim of this paper is to propose a new technique to operate a web application on a cloud platform based on the integration of multiple services which could benefit in the cost reduction of renting a cloud. Two of the most important functions... are file server function and task management function. The purpose of study is to experiment this concept and technique. It is tested on Microsoft Azure platform since it is a cloud platform that covers all services required. These services are helpful
Study of The Function of Keeping System Used In Government Agencies
Satit, Sasithorn, Chaichuay, Vispat (2017)
Guiding application development for finding information resources in the Academic Recourses Center, Mahasarakham University
Manphonsri, Phurithat, Thienmongkol, Ratanachote (2018)
application development and design. After the prototype media evaluation; the significant finding highlighted the need for the book classification symbol design for each category of book and the User Interface (UI) format to function properly on a mobile... application. The research outcome was eventually resulted as 9 graphic symbol sets with suitable functions that were already tested for their performance used with the prototype application.
IoT services agent platform: A case study in network monitoring
Mingkhwan, Anirach, Suvunnasan, Wipoo, Hongkumdee, Panya (2018)
IoT Services Agent Platform of Network Monitoring using IoT is a work that was utilizing The Internet of Thing (IoT) devices for gathering information not just from the SNMP equipment’s but also has an advantage from the specific functions
Authentication and password storing improvement using SXR algorithm with a hash function
Polpong, Jakkapong, Wuttidittachotti, Pongpisit (2020)
authentication systems. SXR algorithm consisted of four steps. First; the received password from users was hashed through a general hash function. Second; the ratio and the number of iterations from the secret key (username and password) were calculated. Third...; even if the hackers hacked the hashed password; it would be challenging and would consume more time to decrypt the actual one; because the pattern of the stored password is the same as the one that has been hashed through the general hash function.
DDoS attack detection using moment in statistics with discriminant analysis
Pitaksathienkul, Pradit, Wuttidittachotti, Pongpisit (2017)
In this research; the discriminant analysis function was created by using four moments of the traffic to find the characteristics of harmful traffic and accuracy of detection was found to be at 92.5%. The research objectives are to create... discriminant analysis functions using moment of aggregate traffic packets on victims to classifying attack situations and detect DDoS attacks on the network. To simulate the network model; the DDoS attack simulation model over wired networks was conducted
Behavior features for automatic detection of depression from Facebook users
Hemtanon, Siranuch, Aekwarangkoon, Saifon, Kittphattanabawon, Nichnan (2020)
to Facebook main functions including amount of posting, sharing, commenting and replying is designed to represent users’ activities in a numerical value form. The collected data with periodic and consecutive aspects are gathered without interpreting content
Metadata Schema for Folktales in the Mekong River Basin
Kwiecien, Kanyarat, Chansanam, Wirapong, Supnithi, Thepchai, Chitiyaphol, Jaturong, Tuamsuk, Kulthida (2021)
; characters; scenes; magical objects; ethnic groups; languages; countries; relationships between tales; and their sources; (3) the folktale structure includes verbal; non-verbal; and mixed forms. The metadata schema development adopted the functional
A Conceptual Model of Requirement Engineering in Cloud Project Delivery for Thai Government Organizations
Chaipunyathat, Ajchareeya, Porrawatpreyakorn, Nalinpat, Nuchitprasitchai, Siranee, Viriyapant, Kanchana (2019)
) people in general lack of knowledge and understanding of cloud technology (9) problems about pricing model; it's impact on 23 cloud requirements (functional and non-functional) as well as factors that involved in RE phases. Based on these results
The design of voice over IP monitoring system
Phuphong, Jaroonsak, Jandaeng, Chanankorn (2019)
behavior. However; most of network monitoring are general and designed for traditional network. They cannot monitor VoIP function directly. This paper proposes the software architecture for VoIP Monitoring. Our system aim is flexibility and scalability
- «
- 1 (current)
- 2
- 3
- »