Sinchai Kamolphiwong

Sinchai Kamolphiwong
Prince of Songkla University · Department of Computer Engineering

Ph.D. (EE & Comm), The UNSW

About

55
Publications
8,542
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
305
Citations
Additional affiliations
January 2004 - present
Prince of Songkla University
Position
  • Director of CNR (Centre for Network Research)
July 1994 - January 1999
UNSW Sydney
Position
  • PhD Student

Publications

Publications (55)
Article
Full-text available
Sleep apnea is one of the most common sleep disorders in the world. It is a common problem for patients to suffer from sleep disturbances. In this paper, we propose a deep convolutional neural network (CNN) model based on the oxygen saturation (SpO2) signal from a smart sensor. This is the reason why we called ZleepNet a network for sleep apnea det...
Preprint
Full-text available
Anomaly detection has emerged as a popular technique for detecting malicious activities in local area networks (LANs). Various aspects of LAN anomaly detection have been widely studied. Nonetheless, the privacy concern about individual users or their relationship in LAN has not been thoroughly explored in the prior work. In some realistic cases, th...
Article
Full-text available
Anomaly detection has emerged as a popular technique for detecting malicious activities in local area networks (LANs). Various aspects of LAN anomaly detection have been widely studied. Nonetheless, the privacy concern about individual users or their relationship in LAN has not been thoroughly explored in the prior work. In some realistic cases, th...
Book
This book gathers selected papers presented at the International Conference on Sentimental Analysis and Deep Learning (ICSADL 2021), jointly organized by Tribhuvan University, Nepal; Prince of Songkla University, Thailand; and Ejesra during June, 18–19, 2021. The volume discusses state-of-the-art research works on incorporating artificial intellige...
Article
Full-text available
Objectives To develop and validate a new clinical prediction model for screening patients at risk for obstructive sleep apnea–hypopnea syndrome (OSAHS). Methods This study used 2 data sets to develop and validate the model. To build the model, the first data set comprised 892 patients who had diagnostic polysomnography (PSG); data were assessed by...
Article
Full-text available
The impact of Distributed Denial of Service (DDoS) attack is one of the major concerns for Software Defined Networking (SDN) environments. Support Vector Machine (SVM) has been used in a DDoS attack detection mechanism on SDN. The advantages of SVM algorithms in DDoS attack detections are high accuracy and low false positive rate. However, SVM algo...
Article
Full-text available
Software Defined Networking (SDN) has many advantages over a traditional network. The great advantage of SDN is that the network control is physically separated from forwarding devices. SDN can solve many security issues of a legacy network. Nevertheless, SDN has many security vulnerabilities. The biggest issue of SDN vulnerabilities is Distributed...
Article
The Mobile IPv6 protocol (MIPv6) allows a single Mobile Node (MN) to keep the same IPv6 address independently of its network of attachment. Network Mobility protocol (NEMO) is an extension of MIPv6. NEMO is concerned with managing the mobility of an entire network, so it's used for devices or vehicles which move to another point of attachment to th...
Conference Paper
Software-Defined Networking (SDN) provides network operators to easily and quickly introduce new services and flexibly adapt to their requirements. In new network architectures, mobility management is an important aspect for the future of mobile networks. To offer the mobility of an entire network (e.g., vehicles), it needs the mobility protocol fo...
Article
Mobility support in IPv6 is an extension IPv6 protocol. It provides for mobile IPv6 node which relocates to another network location. Mobility support in IPv6 can keep connection between mobile node and the global node on Internet after mobile node changes a network location. However when mobile node moves and changes a network location, it cannot...
Article
Full-text available
Personal e-healthcare service is growing significantly. A large number of personal e-health measuring and monitoring devices are now in the market. However, to achieve better health outcome, various devices or services need to work together. This coordination among services remains challenge, due to their variations and complexities. To address thi...
Article
Full-text available
Internet Protocol-based Television (IPTV) is a mechanism for transporting a stream of video content over a network that uses the IP networking protocol. Compared to the traditional TV system, IPTV is offers much better features and services. However, most of IPTV services are based on a client-server approach that has some limitations and may not b...
Conference Paper
Tele-medicine service is playing an important role in near future. The rapid growth of information and communication technology (ICT) is an important driver to improve medical services. Moreover, a number of medical sensors/devices have been introduced. In this work, we study medical environments and infrastructure that affect the medical service q...
Conference Paper
From global Internet information, IPv6 traffic grows slowly. A large portion of service providers are still using IPv4 even IPv6 co-exists with IPv4 for long time. However, IPv6 traffic are gradually growing especially most of network backbone sides. This paper proposes an enhancement mechanism of IPv4-in-IPv6 which supports IPv6 natively and provi...
Conference Paper
Context aware systems are able to adapt their operation to the current context information without explicit user intervention, in order to derive high-level context information from low-level context information that may be spread over multiple domains, context reasoning method is necessary. Most existing reasoning methods in context aware systems...
Conference Paper
Full-text available
Exhaustion of IPv4 address space is highly aware for most internet players, not only Internet Service Providers (ISPs), but also Telco and Content Providers. A number of IPv4/IPv6 migration/transition tools and mechanisms have been proposed, deployed/implemented world-wide. To make IPv4 networks be able to connect to IPv6 world, 4over6, DS-lite, an...
Article
Traditional location tracking and positioning systems rely on the implicit assumption that users are willing to reveal their credentials or private location to an untrustworthy service provider; if a situation suddenly deteriorates, personal information can be intercepted and abused by adversary attacks. Addressing the need for location privacy is...
Conference Paper
Full-text available
Web services for Personal Health Records (PHRs) have been deployed increasingly. However, the benefit of using PHR is still limited due to difficulty of understanding health information as well as its flexibility. Even semantic web approaches have been implemented in this domain; it is still hard to find a good practice one. To overcome this proble...
Article
Protecting privacy is an important goal in designing location-based services. Service providers want to verify legitimate users and allow permitted users to enjoy their services. Users, however, want to preserve their privacy and prevent tracking. In this paper, a new framework providing users with more privacy and anonymity in both the authenticat...
Article
Full-text available
Mobile IPv6 protocol allows a single Mobile Node (MN) to keep the same IPv6 address independently of its network of attachment. One of these extensions, Network Mobility (NEMO) Basic Support protocol is an extension Mobile IPv6. NEMO signaling is performed with extended Mobile IPv6 messages. NEMO Basic Support protocol is concerned with managing th...
Conference Paper
Recently, location based services (LBS) have become more important in today technology advancements. Privacy issue in LBS is one of the most important concerns. In this paper, we have proposed an anonymity preserving framework which can provide a user with more privacy in both authenticating and querying processes. In our framework, an authenticati...
Conference Paper
Context aware systems are able to adapt their operations to the current context information without explicit user intervention, in order to derive high-level context information from low-level context information that may be spread over multiple domains. To that end, context reasoning method is necessary. Several context reasoning approaches relied...
Article
To handle several online examination settings, a web-based application test management software, namely interactive examination management system (iEMS), is proposed in this paper. The outstanding points of the proposed system are its good architecture designs, ease of uses, rich features, flexibilities and extensibilities. Seven standard types of...
Conference Paper
Full-text available
Most of context aware systems are based on client-server model which has some limitations, e.g. a bottle neck problem, single point of failure. The most disadvantage of client-server model is when all nodes need to update their context information frequently and quickly; it will cause massive information flooding in a system. By applying P2P model...
Article
Unified Communication and Collaboration (UCC) system is the converging service of all communications. IMS (IP Multimedia Subsystem) is expected to be a core service for both Internet and mobile phones. Hence, UCC certainly involves with IMS to provide a future service to both world. Presence service is crucial component in UCC system. It provides n...
Article
Full-text available
In mobile IP, the home agent (HA) is an essential component. Mobile nodes will not function properly if the HA cannot be reached. Enhanced Route Optimization applies the Cryptographically Generated Home Address in the Mobile IPv6, to enhance the security and reduce the handoff delays. Unfortunately, it cannot provide home prefix validation. Communi...
Conference Paper
In this day, the necessity of security and protection of computer information on network has become more and more important. In cryptography, asymmetric-key is the framework with high flexibility which can be applied to most of cryptographic systems using today. To reduce the encryption and decryption time which is the main drawback of asymmetric-k...
Conference Paper
Nowadays not only many of research works with various international networks are increasing more and more but also commercial works are increasing with different international networks. In this paper, we have constructed the overlay multicast testbed with KOREN and TEIN2 network, and then we also analyze and research many works with the data got fr...
Conference Paper
Full-text available
Network Mobility (NEMO) Basic Support protocol is an extension Mobile IPv6. NEMO signaling is performed with extended of Mobile IPv6 messages. NEMO Basic Support protocol is concerned with managing the mobility of an entire network, it provides for devices or vehicles which move to another point of attachment to the Internet. NEMO can maintain sess...
Article
Network mobility (NEMO) basic support protocol is an extension mobile IPv6. NEMO signaling is performed with extended mobile IPv6 messages. NEMO basic support protocol is concerned with managing the mobility of an entire network, it provides for devices or vehicles which move to another point of attachment to the Internet. NEMO can maintain session...
Conference Paper
Full-text available
Enhanced route optimization for mobile IPv6 applies cryptographically generated addresses (CGAs) to improve security and reduce handover delays. However the use of CGAs requires computationally expensive algorithms. This may be an issue for small mobile devices with low processing power. It is a problem for correspondent nodes that simultaneously c...
Conference Paper
Full-text available
In this paper we discuss several issues with the present usage model for Mobile-IP that tend to limit its deployability and suggest solutions to most of these practical deficiencies. In particular, we conclude that the Mobile IP protocols and implementations should operate with any number of Home Agents. That is, from none to many.
Conference Paper
Full-text available
SIP-based Internet Telephony is an increasingly popular communication system that is used by various users and organizations. Most of deployments are based on client/server model in traditional SIP system. Especially, conferencing function is used for voice/video conference include file transfer and share remote applications through internet networ...
Article
Full-text available
Multimedia communications are communications with several types of media, such as audio, video and data. The current Internet has some levels of capability to support multimedia communications, unfortunately, the QoS (Quality of Service) is still challenging. A large number of QoS mechanisms has been proposed; however, the main concern is for low l...
Conference Paper
Web-based session mobility system is capability of moving HTTP session from one device to another device without interrupted and seamless web access, User may be continue using web applications at the same point on a new device without re-login or re-type any information. Web application working on HTTP is stateless protocol. A number of approaches...
Article
In this project, we have developed the computer assisting tool for persons who have hand moving problems. This software tool will help them to use a computer for those who cannot use mouse and keyboard properly. The tool detects human eyes and face actions to control mouse and keyboard as a pointer and input devices. Our project uses inexpensive eq...
Conference Paper
Full-text available
During the transition from IPv4 to IPv6 a mobile node may be required to move from an IPv4 only to an IPv6 only network, or vice versa. This causes problems for mobile IP nodes. In this paper we examine those problems and suggest some possible solutions to permit a mobile node to move between IP protocol versions.
Article
Full-text available
Universal Mobile Telecommunication Systems (UMTS) known as Third Generation (3G) mobile phone systems using Wideband Code Division Multi-ple Access (WCDMA) standard aim to provide a high bit rate of services to enable a high quality of multi-media communications. The 3G specification entity, 3GPP, has defined a reliable link layer protocol, Radio L...
Conference Paper
This work investigates Network Address Translation – Protocol Translation (NAT-PT) as an IPv4/IPv6 transition technique. NAT-PT is adequate for unicast communication, however, there is no provision for multicast address mapping. This paper presents a solution to improve NAT-PT by adding support for multicast. As a result, NAT-PT can provide multica...
Conference Paper
The real-time video communications over the Internet can be affected by packet loss problem because the current Internet does not guarantee quality of service (QoS). Video applications are necessary to apply some mechanisms to minimize the effect of packet loss. In this paper, we propose a new algorithm in adaptive quality control for real-time MPE...
Conference Paper
In this paper, we present a design framework of interactive distance leaning (IDL) in distributed system environment. In this design framework, interactive distance learning (IDL) system is based on Java technology: Jini technology and Java Media Framework (JMF). Using Java language, a developed system is a platform independent both in software, e....
Conference Paper
In this paper, we present the investigation of the traffic load measurement mechanisms and their performance impact on an ATM switch in presence of VBR traffic. We first categorise those mechanisms employed by a number of switch algorithms into two main schemes: arrival cell counter based (ACCB) and resource management cell information based (RCIB)...
Conference Paper
A number of algorithms of the ER (explicit rate) switch for ABR service in ATM networks has been proposed. The main objectives of these algorithms are to avoid cell loss and to utilise the unused bandwidth, which is used by ABR traffic, left over by CBR and VBR traffic. In this paper, we have shown some significant limitations of some proposed algo...
Article
In this paper, we present results of a study of flow control in ATM networks. Two classes of flow control are described: preventive and reactive. A preventive control, which uses a static resources allocation, seems inadequate to handle rough traffic in high speed networks. On the other hand, the reactive control schemes, which employ a closed-loop...
Conference Paper
After an introduction to congestion control schemes in ATM networks, the ATM Forum explicit rate (ER) control scheme is described. An analytical model of ER control mechanism for ABR (available bit rate) services is proposed. Properties of correctness are demonstrated. The effect of cross traffic in multi-hop networks on the performance of ABR serv...
Article
UE and UTRAN will be emulated by Ethernet link through Layer management suite (LMS)[9]. All signals (primitives) will be processed in real-time. However, we test our virtual hardware in a case of voice communication. It does not still support multimedia services. In this paper, virtual hardware of 3 rd Generation (3G) Medium Access Control (MAC) pr...

Network

Cited By