Zobrazeno 1 - 10
of 65
pro vyhledávání: '"Chalee Vorakulpipat"'
Publikováno v:
PeerJ Computer Science, Vol 7, p e678 (2021)
In information security, it is widely accepted that the more authentication factors are used, the higher the security level. However, more factors cannot guarantee usability in real usage because human and other non-technical factors are involved. Th
Externí odkaz:
https://doaj.org/article/55f02be04f8a47dcac0935f4f9d68956
Publikováno v:
Applied Sciences, Vol 12, Iss 10, p 5153 (2022)
With the growing need for HPC resource usage in Thailand, this study aims to foster the creation of an HPC resource sharing ecosystem based on available in-house computing infrastructure. The model of computing resource sharing based on blockchain te
Externí odkaz:
https://doaj.org/article/c2f44002ba68426284cc9871a12c7ea8
Publikováno v:
2022 11th International Conference on Control, Automation and Information Sciences (ICCAIS).
Publikováno v:
Proceedings of the 14th International Conference on Management of Digital EcoSystems.
Autor:
Chalee Vorakulpipat, Licheng Wang, Zonghua Zhang, Yanmei Tian, Ahmed Meddahi, Montida Pattaranantakul, Qipeng Song
Publikováno v:
IEEE Transactions on Network and Service Management. 18:3140-3153
Service Function Chaining (SFC) has recently received considerable attentions from both industry and academia, due to its potential for improving the flexibility of provisioning and composition of Virtualized Network Functions (VNFs) to suit applicat
Publikováno v:
Annals of Computer Science and Information Systems.
Autor:
Sasakorn Pichetjamroen, Ekkachan Rattanalerdnusorn, Thanonchai Leelaruji, Chalee Vorakulpipat
Publikováno v:
Proceedings of the 8th International Conference on Computing and Artificial Intelligence.
Publikováno v:
2022 3rd Asia Service Sciences and Software Engineering Conference.
Publikováno v:
Computer Networks. 221:109484
Autor:
Sasakorn Pichetjamroen, Chalee Vorakulpipat, Ekkachan Rattanalerdnusorn, Achara Pichetjamroen
Publikováno v:
2021 18th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON).
Various methods for face validation-based authentication systems have been applied in a number of access control applications. However, using only one biometric factor such as facial data may limit accuracy and use, and is not practical in a real env