Chulalongkorn University

Displaying 1-17 of 17 results

  • White Papers // Apr 2013

    The Study of Blended Learning and Knowledge Sharing in Micro Knowledge Cluster in Thailand

    Success in a changing world needs balance and well preparedness for change. Forming a cluster of knowledge for practitioners as a cooperative network is the aim of staying in every business especially agriculture related businesses. This paper employs mixed methods focusing on ethnographic research to explore Knowledge Management (KM) activities...

    Provided By Chulalongkorn University

  • White Papers // Jan 2013

    Use Multiplexing to Increase Information in QR Code

    In this paper a novel approach to multiplex data in QR code is presented. This paper can increase the amount of data, as the original information, in QR code as well as keeping secret information. The original data for encoding is divided into smaller parts, each part will form QR...

    Provided By Chulalongkorn University

  • White Papers // Jul 2012

    Using Ontology Search in the Design of Class Diagram from Business Process Model

    Business process model describes process flow of a business and can be seen as the requirement for developing a software application. This paper discusses a BPM2CD guideline which complements the Model Driven Architecture concept by suggesting how to create a platform-independent software model in the form of a UML class...

    Provided By Chulalongkorn University

  • White Papers // May 2012

    A Cross Video-MAC Layer Approach for Generating Adaptive FMO Map

    Recent researches in video transmission over heterogeneous networks move toward cross-layer design to realize the optimal video quality. In this paper, the authors investigate the cross layer approach between H.264 video coding layer and IEEE 802.11e Medium Access Control (MAC) layer on the issues of how to improve error resiliency...

    Provided By Chulalongkorn University

  • White Papers // Mar 2012

    A Cost Estimation for Web Applications on Amazon Elastic Compute Cloud (Amazon EC2)

    This paper proposed a cost estimation model for web applications on Amazon EC2 with auto scaling. The authors' approach was largely based on simulation with about 10 parameters. They observed that the cost was subjected to the distribution of users over time. The uniform distribution was the most costly. They...

    Provided By Chulalongkorn University

  • White Papers // Nov 2011

    A Fast and Efficient Palmprint Identification Method for a Large Database

    This paper proposes a fast and efficient palmprint identification method for a large database. The process is accelerated as a result of the authors' efficient palmprint classification and matching scheme. Palmprint classification method is based on principle lines which are life line, head line and heart line. Palmprints' features are...

    Provided By Chulalongkorn University

  • White Papers // Jul 2011

    Visualization of Load Security Region Bounded by Operational Constraints of Power Systems

    In this paper, the authors present the method to visualize a set of feasible loading points, called \"Feasible region\", in the two-dimensional power flow solution space. The visualization can be done by tracing the boundary of feasible region. The boundary points are determined by optimizing the reduced cost function with...

    Provided By Chulalongkorn University

  • White Papers // May 2011

    Efficient Subsequence Search on Streaming Data Based on Time Warping Distance

    Many algorithms have been proposed to deal with subsequence similarity search problem in time series data stream. Dynamic Time Warping (DTW), which has been accepted as the best distance measure in time series similarity search, has been used in many research works. SPRING and its variance were proposed to solve...

    Provided By Chulalongkorn University

  • White Papers // May 2011

    Characteristic Sets for Learning K-Acceptable Languages

    Learnability of languages is a challenging problem in the domain of formal language identification. It is known that the efficiency of a learning technique can be measured by the size of some good samples (representative or distinctive samples) formally called a characteristic set. The authors' research focuses on the characteristic...

    Provided By Chulalongkorn University

  • White Papers // Apr 2011

    Survey of Protections from Buffer-Overflow Attacks

    Buffer-overflow attacks began two decades ago and persist today. Over that time, a number of researchers have proposed many solutions. Their targets were either to prevent or to protect against buffer-overflow attacks. As defenses improved, attacks adapted and became more complicated. Given the maturity of field and the fact that...

    Provided By Chulalongkorn University

  • White Papers // Aug 2010

    Bytecode-Based Analysis for Increasing Class-Component Testability

    Software testing attempts to reveal software faults by executing the program on input values and comparing the outputs from the execution with expected outputs. Testing software is easier when testability is high, so increasing testability allows the detection of faults to be done more efficiently. Component-based software is often constructed...

    Provided By Chulalongkorn University

  • White Papers // Mar 2010

    A Framework for UML Class Diagrams and Software Patterns Integration

    In software engineering, a software pattern is a reusable solution to solve recurring software design problems. Traditionally, suitable patterns are identified by software designers to satisfy a set of requirements. A part of appropriate patterns is then applied to a recurring software design problem. However, the existing software patterns part...

    Provided By Chulalongkorn University

  • White Papers // Dec 2009

    Demand-Supply Optimization with Risk Management for a Multi-Connection Water Reservoir Network

    In this paper, the authors propose a framework to solve a demand-supply optimization problem of long-term water resource allocation on a multi-connection reservoir network which, in two aspects, is different to the problem considered in previous papers. While all previous works consider a problem where each reservoir can transfer water...

    Provided By Chulalongkorn University

  • White Papers // May 2009

    Making Hand Geometry Verification System More Accurate Using Time Series Representation With R-K Band Learning

    At present, applications of biometrics are rapidly increasing due to inconveniences in using traditional passwords and physical keys. Hand geometry, one of the most well-known biometrics, is implemented in many verification systems with various feature extraction methods. In recent work, a hand geometry verification system using time series conversion techniques...

    Provided By Chulalongkorn University

  • White Papers // Apr 2009

    Transmission System Expansion Planning with Consideration of N-1 Security Constraints

    In this paper, the authors present a heuristic method for solving Transmission System Expansion Problems (TSEP) with consideration of N-1 security constraints. The method is divided into two phases. An initial plan is established in the first phase by a search process which is based on a modified simplex method...

    Provided By Chulalongkorn University

  • White Papers // May 2008

    Basis Path Test Suite and Testing Process for WS-BPEL

    Web services technology offers a WS-BPEL language for business process execution. The building block of WS-BPEL is those Web services components that collaborate to realize a certain function of the business process. Applications can now be built more easily by composing existing Web services into workflows; each workflow itself is...

    Provided By Chulalongkorn University

  • White Papers // Feb 2008

    A Basis Path Testing Framework for WS-BPEL Composite Services

    Web services technology has been widely accepted as a technology that can answer to the requirements of the Service-Oriented Architecture in building software applications out of loosely-coupled software components called services. This opens an opportunity to aggregate functionalities of various services in a software composition. Web services technology offers the...

    Provided By Chulalongkorn University

  • White Papers // Mar 2010

    A Framework for UML Class Diagrams and Software Patterns Integration

    In software engineering, a software pattern is a reusable solution to solve recurring software design problems. Traditionally, suitable patterns are identified by software designers to satisfy a set of requirements. A part of appropriate patterns is then applied to a recurring software design problem. However, the existing software patterns part...

    Provided By Chulalongkorn University

  • White Papers // May 2009

    Making Hand Geometry Verification System More Accurate Using Time Series Representation With R-K Band Learning

    At present, applications of biometrics are rapidly increasing due to inconveniences in using traditional passwords and physical keys. Hand geometry, one of the most well-known biometrics, is implemented in many verification systems with various feature extraction methods. In recent work, a hand geometry verification system using time series conversion techniques...

    Provided By Chulalongkorn University

  • White Papers // Aug 2010

    Bytecode-Based Analysis for Increasing Class-Component Testability

    Software testing attempts to reveal software faults by executing the program on input values and comparing the outputs from the execution with expected outputs. Testing software is easier when testability is high, so increasing testability allows the detection of faults to be done more efficiently. Component-based software is often constructed...

    Provided By Chulalongkorn University

  • White Papers // May 2012

    A Cross Video-MAC Layer Approach for Generating Adaptive FMO Map

    Recent researches in video transmission over heterogeneous networks move toward cross-layer design to realize the optimal video quality. In this paper, the authors investigate the cross layer approach between H.264 video coding layer and IEEE 802.11e Medium Access Control (MAC) layer on the issues of how to improve error resiliency...

    Provided By Chulalongkorn University

  • White Papers // Nov 2011

    A Fast and Efficient Palmprint Identification Method for a Large Database

    This paper proposes a fast and efficient palmprint identification method for a large database. The process is accelerated as a result of the authors' efficient palmprint classification and matching scheme. Palmprint classification method is based on principle lines which are life line, head line and heart line. Palmprints' features are...

    Provided By Chulalongkorn University

  • White Papers // May 2011

    Efficient Subsequence Search on Streaming Data Based on Time Warping Distance

    Many algorithms have been proposed to deal with subsequence similarity search problem in time series data stream. Dynamic Time Warping (DTW), which has been accepted as the best distance measure in time series similarity search, has been used in many research works. SPRING and its variance were proposed to solve...

    Provided By Chulalongkorn University

  • White Papers // May 2011

    Characteristic Sets for Learning K-Acceptable Languages

    Learnability of languages is a challenging problem in the domain of formal language identification. It is known that the efficiency of a learning technique can be measured by the size of some good samples (representative or distinctive samples) formally called a characteristic set. The authors' research focuses on the characteristic...

    Provided By Chulalongkorn University

  • White Papers // Mar 2012

    A Cost Estimation for Web Applications on Amazon Elastic Compute Cloud (Amazon EC2)

    This paper proposed a cost estimation model for web applications on Amazon EC2 with auto scaling. The authors' approach was largely based on simulation with about 10 parameters. They observed that the cost was subjected to the distribution of users over time. The uniform distribution was the most costly. They...

    Provided By Chulalongkorn University

  • White Papers // Dec 2009

    Demand-Supply Optimization with Risk Management for a Multi-Connection Water Reservoir Network

    In this paper, the authors propose a framework to solve a demand-supply optimization problem of long-term water resource allocation on a multi-connection reservoir network which, in two aspects, is different to the problem considered in previous papers. While all previous works consider a problem where each reservoir can transfer water...

    Provided By Chulalongkorn University

  • White Papers // Jan 2013

    Use Multiplexing to Increase Information in QR Code

    In this paper a novel approach to multiplex data in QR code is presented. This paper can increase the amount of data, as the original information, in QR code as well as keeping secret information. The original data for encoding is divided into smaller parts, each part will form QR...

    Provided By Chulalongkorn University

  • White Papers // Apr 2013

    The Study of Blended Learning and Knowledge Sharing in Micro Knowledge Cluster in Thailand

    Success in a changing world needs balance and well preparedness for change. Forming a cluster of knowledge for practitioners as a cooperative network is the aim of staying in every business especially agriculture related businesses. This paper employs mixed methods focusing on ethnographic research to explore Knowledge Management (KM) activities...

    Provided By Chulalongkorn University

  • White Papers // Apr 2009

    Transmission System Expansion Planning with Consideration of N-1 Security Constraints

    In this paper, the authors present a heuristic method for solving Transmission System Expansion Problems (TSEP) with consideration of N-1 security constraints. The method is divided into two phases. An initial plan is established in the first phase by a search process which is based on a modified simplex method...

    Provided By Chulalongkorn University

  • White Papers // Feb 2008

    A Basis Path Testing Framework for WS-BPEL Composite Services

    Web services technology has been widely accepted as a technology that can answer to the requirements of the Service-Oriented Architecture in building software applications out of loosely-coupled software components called services. This opens an opportunity to aggregate functionalities of various services in a software composition. Web services technology offers the...

    Provided By Chulalongkorn University

  • White Papers // May 2008

    Basis Path Test Suite and Testing Process for WS-BPEL

    Web services technology offers a WS-BPEL language for business process execution. The building block of WS-BPEL is those Web services components that collaborate to realize a certain function of the business process. Applications can now be built more easily by composing existing Web services into workflows; each workflow itself is...

    Provided By Chulalongkorn University

  • White Papers // Apr 2011

    Survey of Protections from Buffer-Overflow Attacks

    Buffer-overflow attacks began two decades ago and persist today. Over that time, a number of researchers have proposed many solutions. Their targets were either to prevent or to protect against buffer-overflow attacks. As defenses improved, attacks adapted and became more complicated. Given the maturity of field and the fact that...

    Provided By Chulalongkorn University

  • White Papers // Jul 2012

    Using Ontology Search in the Design of Class Diagram from Business Process Model

    Business process model describes process flow of a business and can be seen as the requirement for developing a software application. This paper discusses a BPM2CD guideline which complements the Model Driven Architecture concept by suggesting how to create a platform-independent software model in the form of a UML class...

    Provided By Chulalongkorn University

  • White Papers // Jul 2011

    Visualization of Load Security Region Bounded by Operational Constraints of Power Systems

    In this paper, the authors present the method to visualize a set of feasible loading points, called \"Feasible region\", in the two-dimensional power flow solution space. The visualization can be done by tracing the boundary of feasible region. The boundary points are determined by optimizing the reduced cost function with...

    Provided By Chulalongkorn University