Sangsuree Vasupongayya

Sangsuree Vasupongayya
Prince of Songkla University · Department of Computer Engineering

About

38
Publications
4,952
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
267
Citations

Publications

Publications (38)
Article
Full-text available
Objectives To develop and validate a new clinical prediction model for screening patients at risk for obstructive sleep apnea–hypopnea syndrome (OSAHS). Methods This study used 2 data sets to develop and validate the model. To build the model, the first data set comprised 892 patients who had diagnostic polysomnography (PSG); data were assessed by...
Article
Full-text available
The Personal Health Record (PHR) could be seen as a preventive care solution to the incoming aging society. The blockchain-based PHR system has been proposed recently to enhance the security and privacy for the PHR data. Consequently, the performance becomes a concern for blockchain-PHR integration because of the blockchain performance issues in th...
Article
Full-text available
This article presents the threshold-based incremental learning model for a case-base updating approach that can support adaptive detection and incremental learning of Case-based Reasoning (CBR)-based automatic adaptable phishing detection. The CBR-based adaptive phishing detection model detects the phishing with the most suitable machine learning t...
Article
Full-text available
The impact of Distributed Denial of Service (DDoS) attack is one of the major concerns for Software Defined Networking (SDN) environments. Support Vector Machine (SVM) has been used in a DDoS attack detection mechanism on SDN. The advantages of SVM algorithms in DDoS attack detections are high accuracy and low false positive rate. However, SVM algo...
Article
Biometric template protection approaches have been developed to secure the biometric templates against image reconstruction on the stored templates. Two cancellable fingerprint template protection approaches namely minutiae-based bit-string cancellable fingerprint template and modified minutiae-based bit-string cancellable fingerprint template, are...
Article
Full-text available
Personal health record system (PHR system) stores health-related information of an individual. PHR system allows the data owner to manage and share his/her data with selected individuals. The originality or tamper resistance feature is crucial for PHR system because of the irreversible consequence of incorrect information. Blockchain technology bec...
Article
Full-text available
Currently, the smartphone contains lots of sensitive information. The increasing number of smartphone usage makes it more interesting for phishers. Existing phishing detection techniques are performed on their specific features with selected classifiers to get their best accuracy. An effective phishing detection approach is required to adapt the co...
Article
Full-text available
Software Defined Networking (SDN) has many advantages over a traditional network. The great advantage of SDN is that the network control is physically separated from forwarding devices. SDN can solve many security issues of a legacy network. Nevertheless, SDN has many security vulnerabilities. The biggest issue of SDN vulnerabilities is Distributed...
Conference Paper
Full-text available
Describe the mobile phishing features
Conference Paper
Full-text available
The blockchain systems are analyzed under the context of the personal health record system (PHRs) requirements. The transparent property of blockchain may cause the privacy and confidentiality concerns for PHRs. The append-only storage of blockchain can be a barrier for implementing the revocability of consent in PHRs. Moreover, the health care dat...
Conference Paper
DSePHR is proposed in this work in order to manage the encrypted PHR data on a cloud storage. HBase and Hadoop are utilized in this work. The objective is to provide an API for any PHR system to upload/download the encrypted PHR data from a cloud storage. The DSePHR resolves the Namenode memory issues of HDFS when storing a lot of small files by cl...
Conference Paper
Personal Health Records (PHRs) is a system that allows an individual to store and share his/her health related information with others. The PHR owner can control all accesses to his/her data stored on the PHR system. This work aims to propose a privacy-preserved identification scheme to be used in the PHR system during an emergency situation especi...
Article
Recently, a flexible scheme for handling personal health records (PHRs) in emergency situations has been proposed. Under such a scheme, each PHR is classified as secure, restricted, or exclusive information. Secure PHRs are immediately available to the emergency response unit (ERU) staff. Restricted PHRs require additional approvals from a set of a...
Article
Several existing parallel computer systems partition their system resources or consist of systems from different geographical locations. This work is focusing on extending the original goal-oriented parallel computer job scheduling policies to cover such systems. The goal-oriented parallel computer job scheduling policies are proposed recently to h...
Conference Paper
Course timetable is a problem that can be solved using a search technique. The task is usually required in all educational institutes. Even though several literature's had been proposed for the problem, the practical solution is still required a lot of human modifications due to a list of specific requirements and the different characteristics of e...
Conference Paper
Personal health record (PHR) becomes a popular research topic nowadays. Many research works have proposed several concepts in managing and organizing a PHR. However, there are several uncertain issues left such as the role of a PHR in emergency situations. In this paper, a solution to handle a PHR information management in emergency situations is p...
Conference Paper
A batch processing cluster job scheduling problem can be viewed as a problem of packing a set of two dimension boxes into a large rectangular container. Each job can be viewed as a box. The job runtime can be viewed as the height of the box while the job processor requirement can be viewed as the width of the box. This work aims to apply a two dime...
Article
Library management systems are commonly used in all educational related institutes. Many commercial products are available. However, many institutions may not be able to afford the cost of using commercial products. Therefore, an alternative solution in such situations would be open source software. This paper is focusing on reviewing open source l...
Article
To handle several online examination settings, a web-based application test management software, namely interactive examination management system (iEMS), is proposed in this paper. The outstanding points of the proposed system are its good architecture designs, ease of uses, rich features, flexibilities and extensibilities. Seven standard types of...
Article
To provide a better understanding of fair share policies supported by current production schedulers and their impact on scheduling performance, A relative fair share policy supported in four well-known production job schedulers is evaluated in this study. The experimental results show that fair share indeed reduces heavy-demand users from dominatin...
Article
In this study, we examined computer engineering students' perspectives on a web-based classroom as a resource and interaction center in addition to actual lectures. The topics of interest include: 1) students' motivation, 2) students' class preparation, 3) students' learning strategies and class attendance, and 4) students' general impressions of t...
Article
To balance multiple scheduling performance re- quirements on parallel computer systems, traditional job schedulers are configured with many parameters for defining job or queue priorities. Using many parameters seems flexible, but in reality tuning their values is highly challenging. To simplify resource management, we propose goal-oriented poli- c...
Article
Many prediction techniques based on historical data have been proposed to reduce over-estimations of job runtimes provided by users. They were shown to improve the accuracy of runtime estimates and scheduling performance of backfill policies, according to particular error metrics and average performance measures. However, using a more complete set...
Conference Paper
This paper is concerned with the design of goal-oriented scheduling policies that deal with multiple goals on production parallel systems. Several objective models are compared, including two new models that allow an explicit specification of tradeoff among different goals and a hierarchical model studied in our previous paper. We focus on two perf...
Conference Paper
To balance performance goals and allow administrators to declaratively specify high-level objective, we have proposed a goal-oriented scheduling framework by designing an objective model and a scheduling policy based on combinatorial search techniques to achieve the objective. In this work, we further evaluate our new policy on various real workloa...
Conference Paper
Full-text available
To balance performance goals and allow administra- tors to declaratively specify high-level performance goal s, we apply complete search algorithms to design on-line job scheduling policies for workloads that run on parallel com- puter systems. We formulate a hierarchical two-level objec - tive that contains two goals commonly placed on parallel co...
Conference Paper
Fairness is an important issue for parallel job scheduling policies, but has been ignored in most of previous stud- ies. In this paper, we consider two different styles of job fairness: FCFS and EQ. Commonly used summary statis- tics are applied to different job measures to evaluate the fairness under a wide range of non-preemptive parallel job sch...
Conference Paper
Full-text available
A differentiable model is required in Dual Heuristic Programming and many other adaptive critic approaches to approximate Dynamic Programming. We use brute force search to find minimal models for two benchmark problems. A minimal model is a minimal set of derivatives that are specified to be non random together with a specification of how non rando...
Conference Paper
Full-text available
This research investigates cross-validation techniques for performing neural network ensemble generation and performance evaluation. The chosen framework is the Neural Network Ensemble Simulator (NNES). Ensembles of classifiers are generated using level-one cross-validation. Extensive modeling is performed and evaluated using level-two cross-valida...
Article
This work is focusing on tailoring goal-oriented parallel computer job scheduling policies to multi-partition systems since several parallel computer systems allow partitioning of system resources. The design issues concern how to build a new search tree for multi-partition system and effects of a new algorithm on computational time and scheduling...
Article
The impact of three under-estimate ad-justment methods on the performance of three historical based system-generated prediction methods and three inflated prediction methods are evalu-ated. The results show that an inflated prediction is the best technique for pre-dicting parallel job runtimes. The ad-justment methods have minimal or no impact on t...

Network

Cited By