Ruttikorn Varakulsiripunth's research while affiliated with Thai-Nichi Institute of Technology and other places

Publications (45)

Conference Paper
Principal component analysis (PCA) is one of the successful techniques for applying to face recognition, but its challenge still remains for solving an illumination effect condition. This paper proposes an improved 2DPCA (I-2DPCA) for overwhelming the illumination effect in face recognition. The proposed method is based on two assumptions. The firs...
Article
The purpose of this paper is introduces blood warmer system to easy for anesthesiologists and patients for infusion and facilitate of anesthesiologists work for using blood bag. The system is contained in a rectangular box, inside of which consists of two separate chambers: one housing the electronics inside have; circulating fans, heat sinks, tran...
Conference Paper
This paper proposes an automatic system to diagnose the diabetic retinopathy symptom, which can cause a loss of vision by analysis the abnormality in retinal image. Digital image processing system is developed for the retinal image analysis which helps ophthalmologists to identify diabetic patients. The retinal images derived from ophthalmologists...
Conference Paper
Demand for large bandwidth network connections is growing continuously while network connections via multiple paths can exist because of high degree of connectivity. Utilization of the multiple paths is an economical solution for provisioning large network capacity to meet the users' requirements but it brings about key issues such as load imbalanc...
Conference Paper
Diabetic Retinopathy (DR) is the most common cause of blindness in diabetic patients, but early detection and timely treatment can prevent this problem. Exudates have been found to be one of the signs and serious DR anomalies so the proper detection of these lesions and the treatment should be done immediately to prevent loss of vision. The aim of...
Conference Paper
This paper presents an ontology-based multi agent automotive parts transportation system. The system is used to decide for a route of transportation by Dijkstra's algorithm and Ontology Concept to find the shortest path. This system collects the traffic data and vehicle's position for a suitable path decision. So the user can control and monitor th...
Conference Paper
Automated detection of lesions in retinal fundus image can be aid in the detection of diabetic retinopathy. Exudates are the early sign of diabetic retinopathy so the proper detection of these lesions is an essential task in an automatic retinal screening. On the research work leading to automatic analysis of exudate detection, the knowledge of Opt...
Article
In wireless OFDM systems the system performance is suffered from frequency offset and symbol timing offset due to the Doppler effect Using the discrete Fourier transform (DFT) and Inverse discrete Fourier transform (IDFT) for traditional signal transformation from the time domain into frequency domain and vice versa the system performance may be se...
Article
In Thailand, most of people like to use Thai herbs for their traditional medical treatments. However, since there are various sorts of Thai herbs, and the Thai herbal knowledge is complicated, it is difficult to find an appropriate one for each health condition. In order to help people to find suitable Thai herbs to cure the diseases, we have devel...
Conference Paper
Intrusion detection system (IDS) is a crucial part of network security area and is widely employed. Signature-based matching mechanisms require a completed analysis of attack patterns and the availability of knowledge detection beforehand. To cope with new attacks, IDS tools require to be continuously updated with the signature rules. In this paper...
Conference Paper
Security in Wireless Sensor Networks (WSNs) is especially challenging and quite different from traditional network security mechanisms. There are two major reasons. Firstly, there are severe constraints on these devices namely their minimal energy, computational and communicational capabilities. Secondly, there is an additional risk of physical att...
Conference Paper
Presently, the wireless sensor networks (WSNs) are widely used in many areas of communication systems and its security system becomes very important. However, the security mechanism for WSNs has to be considered differently from traditional network. Firstly, there are severe constraints on WSNs devices such as minimal energy, computational and comm...
Article
In this paper, we propose a modified scheme of MSODB and PMS, called Predictive User Mobility Behavior (PUMB) to improve performance of resource reservation and call admission control for cellular networks. This algorithm is proposed in which bandwidth is allocated more efficiently to neighboring cells by key mobility parameters in order to provide...
Conference Paper
The daily useful nutrition needs become important information to be given to the society. Occurrence of many nutrition cases, such as obesity, overweight or even underweight, shows that the society have not been given an appropriate information about their recommended daily values for key nutrients and also the suggestion of their daily menus. In t...
Conference Paper
We develop a daily menu assistance system which is built to give a suggested daily menu based on daily calories need. In this paper, we design a recommendation feature using fuzzy ontology to give menu recommendation by few factors, such as price, rate, vote and taste, since so many menus are suggested. Protege, SWRL (Semantic Web Rule Language) an...
Article
In this paper, we propose a scheme for improved performance of resource reservation and call admission control for cellular networks called Predictive User Mobility Behavior (PUMB) scheme. This algorithm is proposed in which bandwidth is allocated more efficiently to neighboring cells by key mobility parameters in order to provide Quality of Servic...
Conference Paper
Wireless sensor networks (WSN) have received a lot of attention recently due to their enormous potential in different applications. Many applications in WSN require time synchronization among all the sensor nodes. However, in practice, network do normally have some abnormal nodes (we called Fault Clock Node or FCN), which could cause high synchroni...
Conference Paper
In this paper, we propose a scheme for improved performance of resource reservation and call admission control for cellular networks called predictive mobility support demand (PMSD) scheme. This scheme is proposed in which bandwidth is allocated more efficiently to neighboring cells by key mobility parameters in order to provide QoS guarantees for...
Article
One important application for mobile robot is the ability to send most real visualization to the viewer. The possible algorithm is the stereoscopic application that consists of data from left and right views. Therefore, the left and right image pairs have to be transmitted simultaneously in order to display 3-dimentional video at the remote site. M...
Conference Paper
Due to many unique characteristics on the MANET environment such as node's autonomy, highly limited and shared resources, dynamic topology, etc. And these characteristics introduce to the new MANET aspects such as node autonomy, node's roles and resources. The needs for each node to control its resources and roles participated on the MANET is incre...
Conference Paper
All mobile nodes participating in a group communicate with one another in the group through a shared radio link without cable or backbone composes an infrastructureless network, called mobile ad hoc network (MANET). Because network topology may be changed at any time as result of mobility of nodes and the failure of available routes, quality-of-ser...
Conference Paper
Integration of Mobile IP (MIP) and Multiprotocol Label Switching (MPLS) networks has greatly gained achievement of Quality of Service (QoS) guarantees over dynamic mobile environment. Recovery technique is one significant requirement for traffic management to support QoS guaranteed tunnels, according to link/node failure or topology changes in mobi...
Article
This paper presents an analysis of the Slotted DS-CDMA system with modified node components in order to construct a load control structure in which the service rates of each node can be dynamically adapted without using feedback information. In contrast to the traditional Slotted DS-CDMA which is widely represented with single queue, prior emphasis...
Conference Paper
All communications in a network made by mobile hosts through a shared radio link without cable or backbone, commonly called mobile ad hoc network (MANET). Since the network topology may change constantly because of mobility of nodes and the available routes may fail many times, quality-of-service (QoS) of real-time multimedia application may have d...
Conference Paper
In this paper, we present two approaches for enhancing current MPLS-based recovery. In order to resilience a QoS path from node or link failures, at present there are three main MPLS fault management methods, global, reverse and local recovery. The local recovery method is seemed to be the best choice in case of minimum recovery time with minimum p...
Article
One of the important techniques in communication system design is the composition of service and protocol specifications. In this paper, we have presented a new approach to the composition technique based on the weak bisimulation concept The main objective is to combine service specifications and protocol specifications individually and simultaneou...
Conference Paper
Fractal coding is a recent and effective compression technique based on self-similarity of images. However, its encoding time is very high. In addition, when 2-D fractal coding is applied directly to field-sequential stereo video sequences, the high vertical-frequencies of stereo image pairs are suppressed. This makes the depth perception defective...
Conference Paper
In this paper, we concentrate on mutual scan-line fractal coding (MSFC), which is a novel fractal coding approach, and its performance. The purposes of this study are to examine the advantages and disadvantages of the MSFC. The main idea of this approach is to make use of similarity of each imaging scan-line pair. In this method, the domain pool is...
Conference Paper
The Internet Engineering Task Force (IETF) had recommended the active queue management (AQM) scheme to solve the global synchronization problems in TCP/IP based networks for next generation routers. Since then, random early detection (RED) has been proposed as one of the AQM schemes. However, the major problems of the RED mechanism are low throughp...
Conference Paper
Network services can be served to user requests when it has enough resources. But they cannot be served if the network does not have enough resources or knowledge, or they are new services. We introduce a new network management scheme, resource evolutionary management (REMan). It consists of four domains, user, managed, managing and supplier. All r...
Article
The network management usually polls its managed devices in network. Intermediate devices connected subnetworks relay polling packets to destination sub-networks, which causes network delay time and more traffic, called polling cost. Improper location of polling station, NMS, makes more cost and inefficient for network management operation, i.e. mo...
Conference Paper
In this paper, we propose a new approach for encoding 3D video in virtual reality by using the active/passive optical mechanism (APOM). This mechanism which is based on a field-sequential standard for encoding the 3D-video format collaborates with only a single CCD camera. The core of this research is to substitute the double camera geometry with a...
Conference Paper
A satellite link has been employing as the minor part of a data network for many years, but it is a hard task for engineers to initially design and evaluate a network employing both terrestrial and satellite links, since the satellite scheme from each vendor has different aspects and conditions, though their basic structures are similar. This paper...
Article
A new approach to congestion-control policy for the interconnected networks system, called “FCP”, is proposed. The main purpose of the FCP policy is to avoid the congestion of a network as well as to guarantee the performance of each network up to the desired value. In FCP policy, the traffic that arrives at aateway is restricted by that gateway in...
Article
Store-and-forward communication networks with no effective means of flow control are subject to congestion under heavy load conditions. In this paper a distributed congestion control policy, called PF-C, with nodal buffer management strategy based on traffic priorities is proposed and analyzed. The limited number of buffers (limit value) at any nod...
Conference Paper
Ad hoc network is a set of mobile nodes that each mobile host is able to move freely and the network is unpredictable topologies transformation. Therefore, the searching for transmission path becomes difficult and complicated. Because each mobile host in ad hoc network acts as a switching node that routes and forward packets to its neighboring mobi...
Conference Paper
This paper studies routing and wavelength assignment in wavelength-routed (WR) optical WDM networks which are circuit-switched in nature. When a session request is given, the hard task of routing and wavelength assignment (RWA) is to calculate the satisfiable path between two nodes, and also to assign an available set of wavelengths along this path...
Conference Paper
Ad hoc network is a set of mobile nodes that each mobile host is able to move freely and the network is unpredictable topologies transformation. Therefore, the searching for transmission path becomes difficult and complicated. Because each mobile host in ad hoc network acts as a switching node that routes and forward packets to its neighboring mobi...
Conference Paper
In this paper, we have proposed an approach of negotiation protocol for services agreement between two wireless nodes in ad hoc networks. Protocol principles are based on peculiarities of mobile nodes and mobile users on MANET, i.e., user autonomy, node functionality and resource management. Mobile users can use this negotiation protocol for defini...
Article
Full-text available
Nowadays people afflicted with lifestyle related diseases such as hypertension, obesity and diabetes are increasing. People can prevent these diseases by taking care their health and following their health records. There are many Thai herbs that can treat some diseases or symptoms. They are easy to find and cheap. People can find them in a kitchen,...
Article
Full-text available
This paper presents a constrained-based routing (CBR) algorithm called, Dynamic Possible Path per Link (D-PPL) routing algorithm, for MultiProtocol Label Switching (MPLS) networks. In MPLS on-line routing, future traffics are unknown and network resource is limited. Therefore many routing algorithms such as Minimum Hop Algorithm (MHA), Widest Short...
Article
Full-text available
In Thailand, most of people like to use Thai herbs for their traditional medical treatment. However, since there are various sorts of Thai herbs, it is difficult to find an appropriate one for each health condition and situation. In order to help people to find suitable Thai herbs to cure diseases, here we have developed an e-health system based on...
Article
Full-text available
A conventional stereoscopic system with a single left and right image pair that should be transmitted simultaneously is twice of the raw data in a monoscopic image system, so it needs an effective coding algorithm. Disparity compensation is a good methodology for stereo image compression that uses one view as a reference to predict another, and the...

Citations

... CarePlan [3] is a semantic representation framework for healthcare plans, that mixes the patients' health conditions with personal preferences, but ignores other aspects, such as personalization coming from educational health information, user's culture and religion, that impact on the food choice. In [4] an ontology containing fuzzy sets is used to sort recommended recipes according to prices and users' ratings, in combination with attributes like sex, age, weight, physical activity, used to calculate Basal Metabolic Rate (BMR), Activity Factor (AF) and Body Mass Index (BMI). Authors implement a demographic filtering algorithm, thus providing common suggestions to people with common attributes. ...
... However, the transformation from matrix to vector might destroy the specific structure of original 2D images, and increase the computing complexity. As a more competitive method, 2-dimensional (2D) dimensionality reduction attracts increasing attentions recently [4,8,12,[26][27][28]30], such as two dimensional PCA. These 2D dimensionality reduction methods largely depend on the similarity matrix learning, which is the key step in dimensionality reduction. ...
... The approaches for MIs detection presented in the literatures can be roughly divided into different types such as mathematical morphology [5][6] base analyzes on the characteristics of MIs (size, pixel range, shape etc.). The average values of the HSV color model were defined by the color of MIs in the images with area and eccentricity methods were used in [7]. In [8], the authors propose a method to detect MIs based on eigenvalue analysis using the Hessian matrix. ...
... Image binarization, Region of Interest (ROI) based segmentation and Morphological Reconstruction (MR) are proposed. [15]. Nidhal and Enas [16] developed a method for localizing, isolating the optic disk and then detecting the exudates. ...
... Herb has been an indispensable source of nutrition and medicines in many cultures. There are many wisdoms and knowledge around the world that specialize in using herbs as diets and as medicines; to name a few, Indian Ayurvedic medicines, Thai's herb knowledge [18][19][20], Chinese herb medicines, and so on. Herb, as one of the alternative medicines, has several quite inspiring merits. ...
... Herb has been an indispensable source of nutrition and medicines in many cultures. There are many wisdoms and knowledge around the world that specialize in using herbs as diets and as medicines; to name a few, Indian Ayurvedic medicines, Thai's herb knowledge [18][19][20], Chinese herb medicines, and so on. Herb, as one of the alternative medicines, has several quite inspiring merits. ...
... The sinkhole attack occurs when a malicious node attempts to attract all data packets in IoMT system by pretending that it is the most appropriate routing algorithm. This attack is performed to prevent data packets from reaching their destination [44,46]. ...
... Adhari et al. (2011) presented an optimised buffer handling technique, which focuses the transport efficiency issues in multipath environment. Prabhavat et al. (2013) proposed a load distribution model for TCP transmission, called load distribution over multipath with extended drop slope random early detection (LDM/ExRED). LDM/ExRED takes advantages of RED mechanism to maintain a small queue and mitigate packet reordering problem in MPTCP. ...
... The fourth industrial revolution is initiating the use of CPS (Lee et al., 2015) and is focused on the development of a new generation of intelligent and integrated technologies for smart manufacturing (Ivezic & Ljubicic, 2016), seeking to optimize its planning and usage across different industrial domains such as oil and gas industry (Du et al., 2010), (Guo & Wu, 2012), mining (Xue & Chang, 2012), energy (Teixeira et al., 2017), steel production (Dobrev et al., 2008), construction (Sorli et al., 2006), aviation (Hoppe et al., 2017;Lehmann et al., 2018), automotive industry (Phutthisathian et al., 2013), electronic industry (Liu et al., 2005a), chemical industry (Natarajan et al., 2011), and process engineering (Wiesner et al., 2010). In addition, the concept of virtual production is considered to be the key factor for modeling production aiming for zero defects (MacDonald, 2016). ...
... The results obtained reach 70% of accuracy. Sreng et al. [10] also performed BDR detection using boundary measurement and maximum entropy thresholding. The aim is to extract Optic Disk (OD) and exudates for early detection of diabetic retinopathy. ...