DSpace Repository

Browsing by Title

Browsing by Title

Sort by: Order: Results:

  • Aroonluck Thabloha (Asian Institute of Technology, 2003-12)
    3D Graphics for Mobile Applications is an optional package to be used with J2ME technology profiles such as MIDP 1.0. The session starts with an overview of the objectives and processes of the effort, and describes the ...
  • Jednipat Moonrinta (Asian Institute of Technology, 2010-05)
    Through automated agricultural inspection, farmers can potentially achieve better productivity and accurately predict yields and crop quality. The cheapest device for collecting rich information about a crop is the video ...
  • Hussain, Akhtar (Asian Institute of Technology, 2009-05)
    Nowadays, robots can perform many tasks. One of their potential tasks is to bin picking and part placement. Now many industries could use robots to perform bin picking, to saves time and money. To perform the di cult task ...
  • Atima Tharatipyakul (Asian Institute of Technology, 2011-05)
    Agricultural farm inspection is essential to maintain good crop quality. Using a robot equipped with a monocular webcam for observation could reduce time and e orts of a farmer. This thesis is a continuous research to ...
  • Petsaen, Namchok (2013-05)
    Nowadays, there are many potential travelers using Internet search engines to search for travel information about Thailand and, specifically, about Chiang Mai Province. However, many travel websites are not providing ...
  • Do Tuan Anh (Asian Institute of Technology, 2008-05)
    Security is an important problem nowadays, especially outside security of important building like banks, underground stations, and military stations. In most video surveillance systems, operators take a seat in front of ...
  • Jirasak Submanee
    Electronic commerce, in a broad sense, is the use of computer networks to improve organizational performance. Increasing profitability, gaining market share, improving customer service and delivering products faster are ...
  • Nguyen Dinh Han
    Today, foreign code in the form of macros, scri pts, e-mail attachments, etc. traveling from one machine to others and get executing at those machines. This leads to many potential risks for the machines that run ...
  • Chalid Nalampoon
    This thesis proposes a framework as an extension to an access control markup language (XACML) to be able to handle and utilize spatial/temporal information at its best. The information is associated to subj ects ...
  • Satja Hongyok
    The security is one of the most important issues in information protection of the digital repository system. The integration between access control a nd version control emerges as a new technique in security for ...
  • Bui Hoai Thang
    This thesis deals with planning problems in the UNIX domain. It studies the UNIX environment, and represents the UNIX domains in the first order logic. The thesis also represents UNIX commands as actions in an action ...
  • Tippyarat Tansupasiri (Asian Institute of Technology, 2005-02)
    The Internet has been known to be a best-effort network that offers no provision for reliable data transfer or delivery time. Some Internet applications, however, have specific requirements for their transmission and demand ...
  • Nguyen Thi Bich Nga
    Appropriate feedback and improvement support are essential factors that constitute the effectiveness of an assessment system. This study proposes an adaptive assessment system that aims to enhance those factors. For ...
  • Theechat Chatvijit (Asian Institute of Technology, 2007)
    Today, there are intensive competitions in marketing world. Marketers have to proactively run their businesses. Customer targeting is an important marketing decision that companies should pay attention to. Using information ...
  • Kitt Tientanopajai (Asian Institute of Technology, 2005)
    This thesis presents a path-vector protocol to support QoS-based routing. The protocol allows nodes in the network to exchange paths, and construct new paths using the distributed algorithm implemented. Explicit paths ...
  • Suriya Natsupakpong
    This study is concerned with neural networks. In particular, two unsupervised neural networks; Adaptive Resonance Theory (ART) and the Self-Organizing Map (SOM), used for the recognition of 44 Thai consonant characters. ...
  • Supattra Jindadamrongwech (Asian Institute of Technology, 2000)
    Since many tasks that software agents have to perform on behalf of their users always require more than one single agent to be accomplished properly, the concept of Agent Communication Language (ACL) has been used for the ...
  • Poonphon Suesaowaluk (Asian Institute of Technology, 2005)
    Agents may represent living humans, machines or entities of various kinds. There may be agents representing agents themselves. They negotiate with one another to maximize their interests based on their beliefs and aspirations. ...
  • Nattiya Kanhabua
    In this thesis, we presented a sim u lator f o r barter trade exchange. The sim u lator is im plem ented using a data-driven approach. This technique learns probabilistic m odels of com p any purchase behavior ...
  • Thepparit Banditwattanawong
    It is percieved that only pure object-oriented techniques are inadequate to face challenges effectively in intelligent software development. To overcome this limitation, the agent concept has been used to extend traditional ...

Search DSpace

Browse

My Account