
Weena JanratchakoolRajamangala University of Technology · Computer Science
Weena Janratchakool
About
8
Publications
704
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6
Citations
Introduction
Publications
Publications (8)
The major objective of this research project is to develop a smartphone-based emergency reporting system, the case study of the Rajamangala University of Technology Thanyaburi (RMUTT). This was about to be the preliminary source for first aid instructions for major system users: students and paramedic staff (ambulance drivers and medical attendants...
Agriculture has emerged as one of the Internet of Things' (IoT) most notable applications due to its quick and widespread adoption. This study presents several IoT applications in agriculture, focusing on using a sensor system to monitor the quality of bioorganic fertiliser. This system detects changes in temperature, humidity, acidity (pH), electr...
The objective of using threshold cryptography on cloud environment is to protect the keys, which are the most important elements in cryptographic systems. Threshold cryptography works by dividing the private key to a number of shares, according to the number of virtual machines, then distributing them each share to each virtual machine. In order to...
p>The objective of using threshold cryptography on cloud environment is to protect the keys, which are the most important elements in cryptographic systems. Threshold cryptography works by dividing the private key to a number of shares, according to the number of virtual machines, then distributing them each share to each virtual machine. In order...
Threshold cryptography is mostly used in securing the keys, which are the most important element in cryptographic systems. Threshold scheme protects the key by dividing and distributing the key among the entities in the system instead of storing it on a single server. In order to generate the key again, not all the shares are needed. However, there...