Browsing by Author Pattarasinee Bhattarakosol

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:  
Showing results 1 to 20 of 26  next >
Issue DateTitleAuthor(s)
2006An adaptive agent-based application for quality of service management in wireless internet networkWijak Srisujjalertwaja
2013ANALYSIS OF BHUTAN’S INFORMATION AND COMMUNICATION TECHNOLOGY POLICIES TOWARDS COUNTRY DEVELOPMENTJeevan Gurung
2010Applying virus technology in audio protection mechanismKullapat Theera-angkananon
2013ARCHITECTURE FOR DETECTING INFINITE LOOPS OF WEB SERVICES USING TIME BOUNDARY VALUESNattapatch Srirajun
2013AUTHENTICATION INDICATORS USING BIO-DETECTION FUNCTION WITH TEXT-BASED CAPTCHANilobon Nanglae
2012Authentication process using eye vision with keystroke patternsKanogporn Nonsrichai
2012Conformance verification of finite state machines based on machine inference and model checkingWarawoot Pacharoen
2013EMPIRICAL STUDY OF INFLUENCERS OF DEVELOPMENT OF BHUTANESE EDUCATION TECHNOLOGYSherab Tenzin
2001Factors related to the delay time over the HTTP environmentSupasit Apiwattanapong
2011Framework of specific information search protocolMonlica Wattana
2012Identification of significant influencers on text-based CAPTCHA verification from personal characteristicsTsheten Tamang
2015IFIX: NEW INFORMATION EXCHANGE FRAMEWORK FOR FINANCIAL ORGANIZATIONSPheerasak Tongkamonwat
2010Implementation of personal characteristics in computer securityPremchai Phoorivatana
2004An improvement of software reliability by detecting faulty code in structured programmingPrattana Deeprasertkul, 1975-
2011Innovative marketing tool by applying opinion mining on the micro-blogWilas Chamlertwat
2011Intelligent Cache Farming Architecture for network managementSupawadee Hiranpongsin
2012A Mobile cloud system for multimedia file playingKaewkhwan Kaewmahingsa
2014MOBILE CLOUD SYSTEM: SECURITY ENHANCEMENT IN MULTIMEDIA RETRIEVAL VIA MOBILE PHONESPongsakorn Kingsuwankul
2013MULTIPLE BIOMETRICS FOR AUTHENTICATION SYSTEM BY EYE VISION WITH KEYSTROKE DYNAMICSKranogwan Krasaesat
2008Network management policy for overlapping between cabling and wireless networks in medicare systemWatcharaporn Tanchotsrinon