Wattana Viriyasitavat

Wattana Viriyasitavat
Verified
Wattana verified their affiliation via an institutional email.
Verified
Wattana verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Professor at Chulalongkorn University

About

90
Publications
47,819
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,653
Citations
Current institution
Chulalongkorn University
Current position
  • Professor
Additional affiliations
Chulalongkorn University
Position
  • Professor (Assistant)
August 2009 - present
Chulalongkorn University
Position
  • Professor (Assistant)

Publications

Publications (90)
Article
In this article, we look at how intuitionistic fuzzy programming (IFP) for MOO works in several real-life situations. Problems in the real world frequently have non-linear properties, in contrast to the majority of MOO research, which has traditionally relied on linear assignment functions in an intuitionistic setting. To tackle this, our research...
Article
Telemedicine has emerged as a vital innovation in healthcare, improving access to medical services by reducing the need for physical interactions. Previous studies revealed that self-efficacy influences individuals’ perceptions and behaviors toward adopting new technologies, especially telemedicine. However, these studies do not emphasize understan...
Article
The data transfer volume is massive in next-generation Wireless Sensor Networks (6G-enabled WSNs) in smart city with consumer electronics-based high communication density, especially for multimedia data. Deploying multiple IoT nodes on such networks makes the process complex and challenging. In such cases, quality of Service (QoS) is critical as it...
Article
Full-text available
The image object recognition and detection technology are widely used in many scenarios. In recent years, big data has become increasingly abundant, and big data-driven artificial intelligence models have attracted more and more attention. Evolutionary computation has also provided a powerful driving force for the optimization and improvement of de...
Article
In contemporary real-time applications, diminutive devices are increasingly employing a greater portion of the spectrum to transmit data despite the relatively small size of said data. The demand for big data in cloud storage networks is on the rise, as cognitive networks can enable intelligent decision-making with minimal spectrum utilization. The...
Article
Recent advancements in natural language processing (NLP) have catalyzed the development of models capable of generating coherent and contextually relevant responses. Such models are applied across a diverse array of applications, including but not limited to chatbots, expert systems, question-and-answer robots, and language translation systems. Lar...
Article
The evolution of Internet-of-Vehicles (IoV) from IoT has revolutionized Smart cities, enabling vehicle communication for safety and traffic information dissemination. However, fulfilling time-sensitive applications like safety alerts via Cellular Vehicle-to-Everything (C-V2X) faces resource constraints. This study presents a Non-Orthogonal Multiple...
Article
In the operation of power grid, worldwide, non-technical losses (NTLs) occur in a massive amount of proportion which is observed up to 40% of the total electric transmission and distribution losses. These dominant losses severely affect to adverse the performance of all the private and public distribution sectors. By rectifying these NTLs, the nece...
Article
Full-text available
Data security poses a significant challenge in cloud computing, the Internet of Things (IoT), and blockchain applications. Attribute-Based Encryption (ABE) has emerged as a promising cryptographic solution for secure data sharing and access management in these contexts. This research article focuses on enhancing security in cloud, IoT, and blockcha...
Article
The use of renewable energy seems to be vital as the demand for electricity power rises quickly. But the traditional electric power grid is not able to face the challenges raised by the modern power system. As the distributed generation (DGs) become more and more integrated into the grid, the power quality (PQ) and grid stability of the system will...
Article
Full-text available
This article outlines an integrated strategy that combines fuzzy multi‐objective programming and a multi‐criteria decision‐making framework to achieve a number of transportation system management‐related objectives. To rank fleet cars using various criteria enhancement, the Fuzzy technique for order of preference by resemblance to optimum solution...
Article
Full-text available
Distributed Denial of Service (DDoS) attacks continue to pose a significant threat to network infrastructures, exploiting vulnerabilities within existing security protocols and disrupting the seamless availability of online services. The intricate interconnections of nodes within computer networks contribute to the dynamic structure of this environ...
Article
Swarm Intelligence (SI) has proven to be useful in solving issues that are difficult to solve using traditional mathematical methodologies by using a collective behavior of a decentralized or self-organized system. SI-based optimization algorithms use a collaborative trial-and-error process to identify a solution. The development of various efficie...
Article
Full-text available
Diabetic retinopathy, a microvascular condition associated with an increased risk of cardiovascular disease, poses a substantial global healthcare challenge. The demand for timely diagnosis has prompted the development of automated solutions due to the scarcity of specialists. In this paper, we introduce a ground-breaking approach to diabetic retin...
Article
Artificial intelligence (AI) systems have been increasingly faced with significant challenges and opportunities, particularly in the realm of security for consumer electronics technology. The adversarial defense (ADV) mechanism has more potential for addressing those issues. Some pertinent AI-enabled or metaheuristic schemes, such as MOPSO, MOGWO,...
Article
Full-text available
The significance of community structure in complex networks, such as social, biological, and online networks, has been widely recognized. Detecting communities in social media networks typically relies on two sources of information: the network’s topological structure and node attributes. Incorporating rich node content attribute information poses...
Article
Full-text available
The Industrial Internet of Things (IIoT) evolved quickly at the start of the twenty-first century. Various services, such as quality of service (QoS) for smart cyber security management from the industrial domain, are complicated for us. It is challenging to select the optimal malicious nodes by taking into account QoS criteria, including informati...
Article
Full-text available
Hepatitis B is a virus that attacks the liver and causes liver disease. This virus is a possibly deadly infection of liver. The Hepatitis infection mainly disturbs all the operations done by the liver. Moreover, this infection now becomes the world's most severe kind of virus among all Hepatitis as out of 12 individuals; one is resulted as positive...
Article
This systematic review aims to evaluate the efficacy of fuzzy multi-objective optimization techniques in supporting decision-making in financial portfolio management under conditions of uncertainty. The review will critically appraise and compare different approaches to identify the most suitable technique for addressing the challenges posed by unc...
Article
Full-text available
Hepatitis B is a virus that attacks the liver and causes liver disease. This virus is a possibly deadly infection of liver. The Hepatitis infection mainly disturbs all the operations done by the liver. Moreover, this infection now becomes the world’s most severe kind of virus among all Hepatitis as out of 12 individuals; one is resulted as positive...
Chapter
The motive of job evaluation is to elucidate the relative work that the role of different jobs makes towards different organisational objectives. Various methods are used to solve problems related to job evaluation as ranking method, factor comparison method, and many more. In the present paper, various jobs are evaluated in fuzzy environment. Fuzz...
Chapter
Problems with facility location include selecting where to site a facility in order to meet the specified constraints most effectively. Choosing a production site that minimizes total weighted distances between suppliers and consumers, where weights represent the difficulty of carrying goods, is sometimes a challenging task. Numerous approaches and...
Article
Full-text available
The rapid growth of IoT devices leads to increasing requests. These tremendous requests cannot be processed by IoT devices due to the computational power of IoT devices and the disparate requirements of requests. Cloud computing seemed appealing to service these requests due to its remarkable characteristics. However, the physical gap between the C...
Article
Computation and memory resource management strategies are the backbone of continuous object tracking in intelligent vehicle orchestration. Multi-object tracking generates enormous measurements of targets and extended object positions using light detection and ranging (Lidar) sensors. Designing an adequate object-tracking system is a global challeng...
Article
The rapid growth of the Internet of Things (IoT) in the early twenty-first century has introduced complexities in delivering various services, including quality of service (QoS) management for smart agriculture sensors. Selecting optimal IoT nodes considering QoS parameters such as energy consumption, latency, and network coverage area has become c...
Article
Most computation-intensive industry applications and servers encounter service-reliability challenges due to the limited resource capability of the edge. Achieving quality data fusion and accurate service reliability with optimized service-x execution cost is challenging. While existing systems have taken into account factors such as device service...
Article
Full-text available
Cloud computational service is one of the renowned services utilized by employees, employers, and organizations collaboratively. It is accountable for data management and processing through virtual machines and is independent of end users’ system configurations. The usage of cloud systems is very simple and easy to organize. They can easily be inte...
Article
Full-text available
Tuberculosis (TB) is an airborne disease caused by Mycobacterium tuberculosis. It is imperative to detect cases of TB as early as possible because if left untreated, there is a 70% chance of a patient dying within 10 years. e necessity for supplementary tools has increased in mid to low-income countries due to the rise of automation in healthcare s...
Article
Full-text available
The goal of this work is to investigate how the self‐awareness characteristic of autonomic computing, paired with existing performance optimization rules, may be used in applications to minimise multi‐core processor performance concerns. The suggested self‐awareness technique can assist applications in self‐execution while also assisting other appl...
Article
Biomedical Event Extraction (BEE) is a demanding and prominent technology that attracts the researchers and scientists in the field of natural language processing (NLP). The conventional method relies mostly on external NLP packages and manual designed features, where the features engineering is complex and large. In addition, the conventional meth...
Article
The Internet of Things (IoT) is a revolutionary technique of sharing data for smart devices that generates huge amounts of data from smart healthcare systems. Therefore, healthcare systems utilise the convergence power and traffic analysis of sensors that cannot be satisfactorily handled by the IoT. In this article, a novel mutation operator is dev...
Article
Laws and regulations for privacy protection have been promulgated one after another, and the phenomenon of data islands has become a significant bottleneck hindering the development of big data and artificial intelligence technologies. From the perspective of the historical development, concepts, and architecture classification of federated learnin...
Article
Full-text available
Nowadays, the program’s mechanisms are becoming more dynamic. As a result, maintaining performance for a longer duration of time to increase the system’s long-term growth is tough. This is mostly because of the malfunction occurrence during the study, as the machine does not always have all details. In order to tackle this problem, the available da...
Article
The work aims to develop an automatic recognition model to classify medicinal plants using machine learning techniques to enrich the traditional medical system of India. Though many countries have accepted conventional medicine as the best alternative to synthetic drugs, there exists limitations such as lack of awareness among general public and un...
Article
Full-text available
In recent years, federated learning has received widespread attention as a technology to solve the problem of data islands, and it has begun to be applied in fields such as finance, healthcare, and smart cities. The federated learning algorithm is systematically explained from three levels. First, federated learning is defined through the definitio...
Article
Full-text available
Machine Learning (ML) has been categorized as a branch of Artificial Intelligence (AI) under the Computer Science domain wherein programmable machines imitate human learning behavior with the help of statistical methods and data. The Healthcare industry is one of the largest and busiest sectors in the world, functioning with an extensive amount of...
Article
Full-text available
As 5G and other technologies are widely used in the Internet of Vehicles, intrusion detection plays an increasingly important role as a vital detection tool for information security. However, due to the rapid changes in the structure of the Internet of Vehicles, the large data flow, and the complex and diverse forms of intrusion, traditional detect...
Article
Full-text available
Handling the uncertainties in the utility grid and uncertainties in renewable energy sources is a main challenge to accomplish the modern grid code requirements. This article proposes a new control strategy based on interval type‐2 fuzzy sets for controlling the grid‐connected dispersed generation (DG) system tied to the distorted electric grid. Th...
Article
The advancement of hardware, software, and Internet infrastructure leads to the increasing quantities of smart Internet of Things (IoT) devices. Meanwhile, security issues have increasingly brought to us the concerns due to the evolving IoT scope and mass communications. Trusting service vendors depends on their devices that generate information an...
Article
Full-text available
The benefits and drawbacks of various technologies, as well as the scope of their application, are thoroughly discussed. The use of anonymity technology and differential privacy in data collection can aid in the prevention of attacks based on background knowledge gleaned from data integration and fusion. The majority of medical big data are stored...
Article
Full-text available
Cloud computing provides unprecedented advantages of using computing resources with very less efforts and cost. The energy utilization in cloud data centers has forced the cloud service providers to raise the expense of using its services and has increased the carbon footprints in the environment. Many static bin-packing algorithms exist which can...
Article
Full-text available
The popularization of electronic clinical medical records makes it possible to use automated methods to extract high-value information from medical records quickly. As essential medical information, oncology medical events are composed of attributes that describe malignant tumors. In recent years, oncology medicine event extraction has become a res...
Article
Full-text available
Saffron, one of the most expensive crops on earth, having a vast domain of applications, has the potential to boost the economy of India. The cultivation of saffron has been immensely affected in the past few years due to the changing climate. Despite the use of different artificial methods for cultivation, hydroponic approaches using the IoT prove...
Article
The Smart Manufacturing paradigm requires support by smart supply chains with capabilities of self-organizing and self-optimizing capabilities to accommodate uncertainties. Conventional supply chains face challenges in optimizing logistic processes and reducing overall costs of products and services. The emerging Internet of Things, Cyber-Physical...
Article
Edge infrastructure and Industry 4.0 required services are offered by edge-servers (ESs) with different computation capabilities to run social application's workload based on a leased-price method. The usage of Social Internet of Things (SIoT) applications increases day-to-day, which makes social platforms very popular and simultaneously requires a...
Article
Full-text available
In the new era, the Internet of Everything (IoE) provides distributed services like data, processes, people, and things, etc. The services to the connected IoE significantly increase the time of service, workload, energy consumption, and delay. These objectives conflict with each other. To address the issue, a novel multi-objective based evolutiona...
Article
Full-text available
Blockchain (BC), as an emerging technology, is revolutionizing Business Process Management (BPM) in multiple ways. The main adoption is to serve as a trusted infrastructure to guarantee the trust of collaborations among multiple partners in trustless environments. Especially, BC enables trust of information by using Distributed Ledger Technology (D...
Article
Due to energy efficiency and near real-time finality settlement, permissioned Blockchain is mainly used in Blockchain-based IoT (BIoT) services. This Blockchain requires validators to reach the consensuses. Currently, the validators are chosen based on generic attributes of trusted nodes capriciously. However, service users have no mechanism to pro...
Article
Full-text available
In this article, we present two resilient algorithms, the improved alternative hard c-means (IAHCM) and the improved alternative fuzzy c-means (IAFCM). We implement the Gaussian distance-dependent function proposed by Zhang and Chen (D.-Q. Zhang and Chen, 2004). In some cases, Zhang and Chen's metric distance does not account for the clustering cen...
Article
Full-text available
The Internet of Medical Things (IoMT) has emerged as one of the most important key applications of IoT. IoMT makes the diagnosis and care more convenient and reliable with proven results. The paper presents the technology, open issues, and challenges of IoMT-based systems. It explores the various types of sensors and smart equipment based on IoMT a...
Article
Full-text available
Wireless Sensor Networks (WSNs) are capable of achieving data dissemination between them such that exploration of their potential could be performed based on their frequency range. It is considered to be highly difficult for recharging sensor devices under adverse situations. The main drawbacks of WSNs concern to the issue of network lifetime, cove...
Article
Workflow is used to support and connect business processes (BP) in organizations. Historically, it is used to define the control of how tasks are coordinated and executed. Its importance has been continuously increasing with the incorporation of rapidly developed Service-oriented Architecture (SoA), Blockchain, and Internet-of-Thing (IoT); new info...
Article
This research paper focus on a Machine learning model named Face Lock Algorithm with Gender and Age Classifier which will detect the face of the user using a face classifier called Haar Cascade Frontal Face classifier and will also provide an extra layer of security to mobile applications and websites by unlocking them only when the algorithm confi...
Article
Blockchain has been successfully used in many applications for international asset transfers and domestic payments. In these cases, payment processes are more liquidated and automated leading to the paradigm shift in the payment industry. The advancement of Blockchain technology (BCT) tends to replace conventional payment methods in supply chain th...
Article
Full-text available
Business process management (BPM) aims to optimize business processes to achieve better system performance such as higher profit, quicker response, and better services. BPM systems in Industry 4.0 are required to digitize and automate business process workflows and support the transparent interoperations of service vendors. The critical bottleneck...
Article
Full-text available
Unfortunately, the corresponding author name is misspelled as Wattana Viryasitavat in the original article. The correct name is Wattana Viriyasitavat. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.
Article
With the fast development of information technologies, traditional value-added chain business models are shifting to service-based applications (SBAs) to cope with ever-changing user behaviors and the modern social system. An SBA allows an organization to utilize external and distributed resources to achieve its business goals, especially when the...
Article
Enterprises heavily rely on the state-of-the-art information technologies user behaviors and social system to sustain business competitiveness. Service-Oriented Architecture (SoA) and Cloud allow enterprises to utilize dynamic distributed services across enterprise boundaries and even individuals. Based on the needs of society, enterprise can spin...
Article
Full-text available
Internet of Things (IoT) is able to integrate the computation and physical processes as services in the social world. The number of services at the edge of IoT is rising rapidly due to the prevalent uses of smart devices and cyber-physical systems (CPSs). To explore the promising applications of IoT services, one of the challenges is to enable the...
Article
Internet of Things (IoT) refers to networks with billions of physical devices for collecting, sharing and utilizing data in the virtual world. Most of IoT applications centralize security assurance in creating, authenticating, transferring, or delating system components. However, the centralization exposes its limitations to meet security needs of...
Article
Full-text available
In addition to functionalities, business process management (BPM) involves several key indicators such as openness, security, flexibility, and scalability. Optimizing system performance is becoming a great challenge for an ever-increasing large-scale distributed application system in the digital economy on the Internet of Things (IoT) era. In a cen...
Article
Full-text available
Owing to the exponential growth of Internet of Things (IoTs), ensure that the Quality of Service (QoS) over IoT becomes challenges at the network edge or on cloud. The traditional mechanisms for QoS measurements rely on the centralized trusted third parties who use specialized agents to collect data and measure the performances of services. However...
Article
Innovating business processes involves cutting-edge technologies where the Internet of Things (IoT) and Blockchain are technological breakthroughs. IoT is envisioned as a global network infrastructure consisting of numerous connected devices over the Internet. Many attempts have been made to improve and adapt business workflows for best utilizing I...
Article
Researches in Blockchain Technology (BCT) and Internet of Things (IoT) are experiencing exponential growth in recent years. They are being witnessed as mainstream technologies that have the potential of revolutionizing our society. However, these two contain technologically unrelated in philosophies. This article has a special interest in exploring...
Article
Full-text available
Service-Oriented Computing (SOC) lays the foundation for modern enterprise systems where services are incorporated as building blocks in application workflows. However, SOC is still at development stage with many unsolved issues; particularly, composing services for a workflow poses a significant challenge when some factors including distribution a...
Article
Full-text available
Blockchain technology has attracted a great deal of attentions as an effective way to innovate business processes. It has to be integrated with other Business Process Management system (BPM) components to implement specified functionalities related to the applications. The current efforts in integrating this technology into BPM are at a very early...
Article
Service-Oriented Computing is changing the ways of modern information systems that are designed, operated, and evolved. SOC makes possible to aggregate distributed resources at the phases of decision-making support and system operations. Myriad available resources with similar functionalities require effective methodologies in selecting and composi...
Article
A Service Workflow is an aggregation of distributed services to fulfill specific functionalities. With ever increasing available services, the methodologies for the selections of the services against the given requirements become main research subjects in multiple disciplines. A few of researchers have contributed to the formal specification langua...
Article
In the globalized market and business environment, enterprises strive to cope with rapid market changes and competition. To sustain competitiveness, enterprises need to continually adapt their business processes to accommodate changes promptly. This view includes the integration of external services with their internal services for required capabil...
Article
Selecting services to be part of a workflow has been a very important challenge. As a number of available services increases, the selection becomes more complicated. Different providers may offer the same service with different non-functional attributes such as services’ qualities, past experience, reputation value, etc. Moreover, the importance of...
Article
The internet-of-things (IoT) technology allows auto-organized and intelligent entities such as services to be interoperable and able to act independently. This enables the advanced form of service composition by allowing individual services to dynamically form a service workflow. In this context, services possess different requirements where the co...
Article
Full-text available
The emergence of the Internet-of-Things (IoT) refers to not only the ability to identify physical objects, but also to identify many types of virtual objects, including services. Such identification plays a crucial role in service workflow. The success of a service workflow requires the composition of services where requirements must be satisfied....
Article
The Internet of Things (IoT) not only identifies physical and virtual objects, but also enables the connection of such objects in an internet-like structure. In this context, services are one of the most important technologies where IoT can be utilized to enhance dynamic interoperation in the form of service workflows. In opened environments, becau...
Article
Advanced technologies have changed the nature of business processes in the form of services. In coordinating services to achieve a particular objective, service workflow is used to control service composition, execution sequences as well as path selection. Since existing mechanisms are insufficient for addressing the diversity and dynamicity of the...
Article
Full-text available
This paper presents a requirement-oriented automated framework for formal verification of service workflows. It is based on our previous work describing the requirement-oriented service workflow specification language called SWSpec. This language has been developed to facilitate workflow composer as well as arbitrary services willing to participate...
Article
Abstract With the fast-growing Internet technology, several service-based interactions are prevalent and appear in several forms such as e-commerce, content provider, Virtual Organizations, Peer-to-Peer, Web Service, Grids, Cloud Computing, and individual interactions. This demands for an effective mechanism to establish trust among participants in...
Conference Paper
Full-text available
This paper presents an improvement of requirement- oriented compliance checking algorithm to support trust-based decision making in service workflow environments. The proposed algorithm is based on our previous progressive works on (1) Service Workflow Specification language (SWSpec) serving as a formal and uniformed representation of requirements,...
Conference Paper
Full-text available
Service-based interactions have become common over the past few years. Nowadays, their applications are visible in several forms including e-commerce, Virtual Organizations, Grid, and Cloud Computing. Proliferation of services leads to the creation of new value-added services composed of several sub-services in a pre-specified manner, known as serv...
Conference Paper
The emergence of the Internet has changed the nature of face-to-face towards online interactions. This leads to the concept of virtual interoperation such as Web Services, Grid, and Cloud Computing. Since existing security mechanisms are insufficient to cover the diversity of workflow application domains, trust is considered as an adaptive, high-le...
Conference Paper
Exponentially growing of global dynamic interoperation in service workflow requires promising mechanisms and processes to establish trust relationship among entities involved. The information and service sharing on each domain has different set of policies and requirements. In order to provide in place mechanisms to allow previously unknown entitie...

Network

Cited By