Search Publications
| Detail | Category | Owner | SortKey |
|---|---|---|---|
|
W. Werapun, T. Karode, T. Arpornthip, J. Suaboot, E. Sangiamkul, and P. Boonrat, "The Flash loan Attack Analysis (FAA) Framework -- A Case Study of the Warp Finance Exploitation," Informatics, Vol.10, Issue 1, December 2022, pp.1-22. [SCOPUS Q1-tier 1] Tag: flash loan attacks, defi vulnerability, Cryptocurrency, equity |
International Journal Articles | JAKAPAN SUABOOT | 202212 |
|
Nanthaamornphong, A., & Kitpanich, T. (2022). The impact of peer code review on software maintainability in open-source software: A case study. International Journal of Advance Computer Science and Applications, 13(12), 954-965. [Scopus indexed] 12/ 2022 |
International Journal Articles | AZIZ NANTHAAMORNPHONG | 202212 |
|
Arsanchai Sukkuea, Apichat Heednacram, “Prediction on Spatial Elevation Using Improved Kriging Algorithms: An application in Environmental Management”, Expert Systems with Applications, vol. 207, no. 117971, pp. 1-10, November, 2022. (ISSN 0957-4174, https://doi.org/10.1016/j.eswa.2022.117971, ISI-Q1, SCIE, Impact Factor 2021: 8.665) 11/ 2022 |
International Journal Articles | APICHAT HEEDNACRAM | 202211 |
|
Kamal Baha and Makoto Shishido, Development of Vocabulary Study System and Measurement of its Effect. EdMedia + Innovate Learning Online November 2022. (pp. 5-18). https://www.learntechlib.org/p/221651/.
|
International Journal Articles | Kamal Baha | 202211 |
|
Kamal Baha and Makoto Shishido, Development of Word-Level Classification and Vocabulary Meaning System, International Journal of Information and Education Technology (IJIET), Vol. 12, No. 11, pp. 1205〜1210. Nov. 2022. http://www.ijiet.org/show-180-2311-1.html |
International Journal Articles | Kamal Baha | 202211 |
|
Terapass Jariyanorawiss, Komsan Kanjanasit and Wachira Chongburee, “Creation of Rigorous Human Head Model from MRI Images with Reports on SAR Caused by 2.6 GHz 5G Mobile Handset Radiation,” The ECTI Transactions on Electrical Engineering, Electronics, and Communications, Vol. 20, No.3, pp.461-470, Oct, 2022 |
International Journal Articles | KOMSAN KANJANASIT | 202210 |
|
Arsanchai Sukkuea, Apichat Heednacram, “Practical Kriging Models with Divide and Conquer Algorithms for Spatial Heights Forecast”, Ecological Informatics, vol. 70, no. 101756, pp. 1-11, September, 2022. (ISSN 1574-9541, https://doi.org/10.1016/j.ecoinf.2022.101756, ISI-Q1, SCIE, Impact Factor 2021: 4.498) 9/ 2022 |
International Journal Articles | APICHAT HEEDNACRAM | 202209 |
|
A. Bernik, D. Vusic, and V. Wattanasoontorn, “Computer Game Elements and its Impact on Higher Education,” *Tehnički Glasnik*, vol. 16, no. 3, pp. 566–571, Sep. 2022, doi: 10.31803/tg-20220126221837. |
International Journal Articles | VORAVIKA WATTANASOONTORN | 202209 |
|
N. Boonpeam, W. Werapun, T. Karode, and E. Sangiamkul, "The Automated Equity-Split Cryptocurrency Arbitrage Strategy", Songklanakarin Journal of Science and Technology, pp. 845-851, Vol.44, No.3, May - Jun 2022, DOI: 10.14456/sjst-psu.2022.113, Scopus Q3 Tag: blockchain, Arbitrage, Cryptocurrency |
International Journal Articles | WARODOM WERAPUN | 202206 |
|
Amonrat Prasitsupparote and Pakorn Pasitsuparoad, “Alarm System using Image Processing to Prevent a Patient with Nasogastric Tube Feeding from Removing Tube” International Journal of Advanced Computer Science and Applications(IJACSA), 13(5), 2022. http://dx.doi.org/10.14569/IJACSA.2022.0130590 |
International Journal Articles | AMONRAT PRASITSUPPAROTE | 202205 |
|
N.Rattanavipanon, D.Ponnoprat, H.Ochiai, K.Tantayakul, T.Angchuan, and S.Kamolphiwong, "Detecting Anomalous LAN Activities under Differential Privacy", Security and Communication Networks, vol. 2022, Apr. 2022. Tag: Network Security |
International Journal Articles | KULJAREE TANTAYAKUL | 202204 |
|
Janchai, W., Bouras, A., & Siddoo, V. (2022). An Ontology Model for Medical Tourism Supply Chain Knowledge Representation. International Journal of Advanced Computer Science and Applications, 13(4). Tag: Knowledge management, Ontology, Medical tourism, Supply chain |
International Journal Articles | VEERAPORN SIDDOO | 202204 |
|
Norrathep Rattanavipanon, Donlapark Ponnoprat, Hideya Ochiai, Kuljaree Tantayakul, Touchai Angchuan, and Sinchai Kamolphiwong, Detecting Anomalous LAN Activities under Differential Privacy, Hindawi Security and Communication Networks, 2022. |
International Journal Articles | Norrathep Rattanavipanon | 202204 |