
Sinchai KamolphiwongPrince of Songkla University · Department of Computer Engineering
Sinchai Kamolphiwong
Ph.D. (EE & Comm), The UNSW
About
55
Publications
8,542
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
305
Citations
Introduction
Additional affiliations
January 2004 - present
July 1994 - January 1999
Publications
Publications (55)
Sleep apnea is one of the most common sleep disorders in the world. It is a common problem for patients to suffer from sleep disturbances. In this paper, we propose a deep convolutional neural network (CNN) model based on the oxygen saturation (SpO2) signal from a smart sensor. This is the reason why we called ZleepNet a network for sleep apnea det...
Anomaly detection has emerged as a popular technique for detecting malicious activities in local area networks (LANs). Various aspects of LAN anomaly detection have been widely studied. Nonetheless, the privacy concern about individual users or their relationship in LAN has not been thoroughly explored in the prior work. In some realistic cases, th...
Anomaly detection has emerged as a popular technique for detecting malicious activities in local area networks (LANs). Various aspects of LAN anomaly detection have been widely studied. Nonetheless, the privacy concern about individual users or their relationship in LAN has not been thoroughly explored in the prior work. In some realistic cases, th...
This book gathers selected papers presented at the International Conference on Sentimental Analysis and Deep Learning (ICSADL 2021), jointly organized by Tribhuvan University, Nepal; Prince of Songkla University, Thailand; and Ejesra during June, 18–19, 2021. The volume discusses state-of-the-art research works on incorporating artificial intellige...
Objectives
To develop and validate a new clinical prediction model for screening patients at risk for obstructive sleep apnea–hypopnea syndrome (OSAHS).
Methods
This study used 2 data sets to develop and validate the model. To build the model, the first data set comprised 892 patients who had diagnostic polysomnography (PSG); data were assessed by...
The impact of Distributed Denial of Service (DDoS) attack is one of the major concerns for Software Defined Networking (SDN) environments. Support Vector Machine (SVM) has been used in a DDoS attack detection mechanism on SDN. The advantages of SVM algorithms in DDoS attack detections are high accuracy and low false positive rate. However, SVM algo...
Software Defined Networking (SDN) has many advantages over a traditional network. The great advantage of SDN is that the network control is physically separated from forwarding devices. SDN can solve many security issues of a legacy network. Nevertheless, SDN has many security vulnerabilities. The biggest issue of SDN vulnerabilities is Distributed...
The Mobile IPv6 protocol (MIPv6) allows a single Mobile Node (MN) to keep the same IPv6 address independently of its network of attachment. Network Mobility protocol (NEMO) is an extension of MIPv6. NEMO is concerned with managing the mobility of an entire network, so it's used for devices or vehicles which move to another point of attachment to th...
Software-Defined Networking (SDN) provides network operators to easily and quickly introduce new services and flexibly adapt to their requirements. In new network architectures, mobility management is an important aspect for the future of mobile networks. To offer the mobility of an entire network (e.g., vehicles), it needs the mobility protocol fo...
Mobility support in IPv6 is an extension IPv6 protocol. It provides for mobile IPv6 node which relocates to another network location. Mobility support in IPv6 can keep connection between mobile node and the global node on Internet after mobile node changes a network location. However when mobile node moves and changes a network location, it cannot...
Personal e-healthcare service is growing significantly. A large number of personal e-health measuring and monitoring devices are now in the market. However, to achieve better health outcome, various devices or services need to work together. This coordination among services remains challenge, due to their variations and complexities. To address thi...
Internet Protocol-based Television (IPTV) is a mechanism for transporting a stream of video content over a network that uses the IP networking protocol. Compared to the traditional TV system, IPTV is offers much better features and services. However, most of IPTV services are based on a client-server approach that has some limitations and may not b...
Tele-medicine service is playing an important role in near future. The rapid growth of information and communication technology (ICT) is an important driver to improve medical services. Moreover, a number of medical sensors/devices have been introduced. In this work, we study medical environments and infrastructure that affect the medical service q...
From global Internet information, IPv6 traffic grows slowly. A large portion of service providers are still using IPv4 even IPv6 co-exists with IPv4 for long time. However, IPv6 traffic are gradually growing especially most of network backbone sides. This paper proposes an enhancement mechanism of IPv4-in-IPv6 which supports IPv6 natively and provi...
Context aware systems are able to adapt their operation to the current context information without explicit user intervention, in order to derive high-level context information from low-level context information that may be spread over multiple domains, context reasoning method is necessary. Most existing reasoning methods in context aware systems...
Exhaustion of IPv4 address space is highly aware for most internet players, not only Internet Service Providers (ISPs), but also Telco and Content Providers. A number of IPv4/IPv6 migration/transition tools and mechanisms have been proposed, deployed/implemented world-wide. To make IPv4 networks be able to connect to IPv6 world, 4over6, DS-lite, an...
Traditional location tracking and positioning systems rely on the implicit assumption that users are willing to reveal their credentials or private location to an untrustworthy service provider; if a situation suddenly deteriorates, personal information can be intercepted and abused by adversary attacks. Addressing the need for location privacy is...
Web services for Personal Health Records (PHRs) have been deployed increasingly. However, the benefit of using PHR is still limited due to difficulty of understanding health information as well as its flexibility. Even semantic web approaches have been implemented in this domain; it is still hard to find a good practice one. To overcome this proble...
Protecting privacy is an important goal in designing location-based services. Service providers want to verify legitimate users and allow permitted users to enjoy their services. Users, however, want to preserve their privacy and prevent tracking. In this paper, a new framework providing users with more privacy and anonymity in both the authenticat...
Mobile IPv6 protocol allows a single Mobile Node (MN) to keep the same IPv6 address independently of its network of attachment. One of these extensions, Network Mobility (NEMO) Basic Support protocol is an extension Mobile IPv6. NEMO signaling is performed with extended Mobile IPv6 messages. NEMO Basic Support protocol is concerned with managing th...
Recently, location based services (LBS) have become more important in today technology advancements. Privacy issue in LBS is one of the most important concerns. In this paper, we have proposed an anonymity preserving framework which can provide a user with more privacy in both authenticating and querying processes. In our framework, an authenticati...
Context aware systems are able to adapt their operations to the current context information without explicit user intervention, in order to derive high-level context information from low-level context information that may be spread over multiple domains. To that end, context reasoning method is necessary. Several context reasoning approaches relied...
To handle several online examination settings, a web-based application test management software, namely interactive examination management system (iEMS), is proposed in this paper. The outstanding points of the proposed system are its good architecture designs, ease of uses, rich features, flexibilities and extensibilities. Seven standard types of...
Most of context aware systems are based on client-server model which has some limitations, e.g. a bottle neck problem, single point of failure. The most disadvantage of client-server model is when all nodes need to update their context information frequently and quickly; it will cause massive information flooding in a system. By applying P2P model...
Unified Communication and Collaboration (UCC) system is the converging service of all communications. IMS (IP Multimedia Subsystem) is expected to be a core service for both Internet and mobile phones. Hence, UCC certainly involves with IMS to provide a future service to both world. Presence service is crucial component in UCC system. It provides n...
In mobile IP, the home agent (HA) is an essential component. Mobile nodes will not function properly if the HA cannot be reached. Enhanced Route Optimization applies the Cryptographically Generated Home Address in the Mobile IPv6, to enhance the security and reduce the handoff delays. Unfortunately, it cannot provide home prefix validation. Communi...
In this day, the necessity of security and protection of computer information on network has become more and more important. In cryptography, asymmetric-key is the framework with high flexibility which can be applied to most of cryptographic systems using today. To reduce the encryption and decryption time which is the main drawback of asymmetric-k...
Nowadays not only many of research works with various international networks are increasing more and more but also commercial works are increasing with different international networks. In this paper, we have constructed the overlay multicast testbed with KOREN and TEIN2 network, and then we also analyze and research many works with the data got fr...
Network Mobility (NEMO) Basic Support protocol is an extension Mobile IPv6. NEMO signaling is performed with extended of Mobile IPv6 messages. NEMO Basic Support protocol is concerned with managing the mobility of an entire network, it provides for devices or vehicles which move to another point of attachment to the Internet. NEMO can maintain sess...
Network mobility (NEMO) basic support protocol is an extension mobile IPv6. NEMO signaling is performed with extended mobile IPv6 messages. NEMO basic support protocol is concerned with managing the mobility of an entire network, it provides for devices or vehicles which move to another point of attachment to the Internet. NEMO can maintain session...
Enhanced route optimization for mobile IPv6 applies cryptographically generated addresses (CGAs) to improve security and reduce handover delays. However the use of CGAs requires computationally expensive algorithms. This may be an issue for small mobile devices with low processing power. It is a problem for correspondent nodes that simultaneously c...
In this paper we discuss several issues with the present usage model for Mobile-IP that tend to limit its deployability and suggest solutions to most of these practical deficiencies. In particular, we conclude that the Mobile IP protocols and implementations should operate with any number of Home Agents. That is, from none to many.
SIP-based Internet Telephony is an increasingly popular communication system that is used by various users and organizations. Most of deployments are based on client/server model in traditional SIP system. Especially, conferencing function is used for voice/video conference include file transfer and share remote applications through internet networ...
Multimedia communications are communications with several types of media, such as audio, video and data. The current Internet has some levels of capability to support multimedia communications, unfortunately, the QoS (Quality of Service) is still challenging. A large number of QoS mechanisms has been proposed; however, the main concern is for low l...
Web-based session mobility system is capability of moving HTTP session from one device to another device without interrupted and seamless web access, User may be continue using web applications at the same point on a new device without re-login or re-type any information. Web application working on HTTP is stateless protocol. A number of approaches...
In this project, we have developed the computer assisting tool for persons who have hand moving problems. This software tool will help them to use a computer for those who cannot use mouse and keyboard properly. The tool detects human eyes and face actions to control mouse and keyboard as a pointer and input devices. Our project uses inexpensive eq...
During the transition from IPv4 to IPv6 a mobile node may be required to move from an IPv4 only to an IPv6 only network, or vice versa. This causes problems for mobile IP nodes. In this paper we examine those problems and suggest some possible solutions to permit a mobile node to move between IP protocol versions.
Universal Mobile Telecommunication Systems (UMTS) known as Third Generation (3G) mobile phone systems using Wideband Code Division Multi-ple Access (WCDMA) standard aim to provide a high bit rate of services to enable a high quality of multi-media communications. The 3G specification entity, 3GPP, has defined a reliable link layer protocol, Radio L...
This work investigates Network Address Translation – Protocol Translation (NAT-PT) as an IPv4/IPv6 transition technique. NAT-PT
is adequate for unicast communication, however, there is no provision for multicast address mapping. This paper presents a
solution to improve NAT-PT by adding support for multicast. As a result, NAT-PT can provide multica...
The real-time video communications over the Internet can be affected by packet loss problem because the current Internet does not guarantee quality of service (QoS). Video applications are necessary to apply some mechanisms to minimize the effect of packet loss. In this paper, we propose a new algorithm in adaptive quality control for real-time MPE...
In this paper, we present a design framework of interactive distance leaning (IDL) in distributed system environment. In this design framework, interactive distance learning (IDL) system is based on Java technology: Jini technology and Java Media Framework (JMF). Using Java language, a developed system is a platform independent both in software, e....
In this paper, we present the investigation of the traffic load
measurement mechanisms and their performance impact on an ATM switch in
presence of VBR traffic. We first categorise those mechanisms employed
by a number of switch algorithms into two main schemes: arrival cell
counter based (ACCB) and resource management cell information based
(RCIB)...
A number of algorithms of the ER (explicit rate) switch for ABR
service in ATM networks has been proposed. The main objectives of these
algorithms are to avoid cell loss and to utilise the unused bandwidth,
which is used by ABR traffic, left over by CBR and VBR traffic. In this
paper, we have shown some significant limitations of some proposed
algo...
In this paper, we present results of a study of flow control in ATM networks. Two classes of flow control are described: preventive and reactive. A preventive control, which uses a static resources allocation, seems inadequate to handle rough traffic in high speed networks. On the other hand, the reactive control schemes, which employ a closed-loop...
After an introduction to congestion control schemes in ATM networks, the ATM Forum explicit rate (ER) control scheme is described. An analytical model of ER control mechanism for ABR (available bit rate) services is proposed. Properties of correctness are demonstrated. The effect of cross traffic in multi-hop networks on the performance of ABR serv...
UE and UTRAN will be emulated by Ethernet link through Layer management suite (LMS)[9]. All signals (primitives) will be processed in real-time. However, we test our virtual hardware in a case of voice communication. It does not still support multimedia services. In this paper, virtual hardware of 3 rd Generation (3G) Medium Access Control (MAC) pr...