Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Suvepon Sittichivapak"'
Publikováno v:
Advanced Science Letters. 22:3076-3079
Autor:
Apisit Sriwan, Suvepon Sittichivapak
Publikováno v:
Procedia Computer Science. 86:19-22
The data collision of multiple tags to access the channel is one of the most problems in active Radio Frequency Identification (RFID). The technique of random tag is based on William Feller equation by considering the successful probability (Psuc) ma
Publikováno v:
2017 14th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON).
This paper presents an enhancement of IP (Internet Protocol) standard to support user authentication within the protocol itself. The options field in an IP header is used for carrying specific data to add the ability of self-authentication. The speci
Publikováno v:
Advanced Materials Research. 979:386-389
In this paper, we introduce a new theoretical scheme for evaluating the performance of backoff algorithms focusing on multiple types of wall and floor material such as: concrete, wood, glass and brick. The proposed scheme is an extension and combinat
Publikováno v:
Applied Mechanics and Materials. :1471-1477
This paper presents a group persistent assignment method in contention slots for DOCSIS standard. Our model is a numerical method which can separate each user access to the arbitrary contention slot with independent persistent value. Each user can be
Publikováno v:
2016 International Computer Science and Engineering Conference (ICSEC).
This article presents a new method for image communication via low bit rate channel that transfer JPEG image to buffered Image storage and encoding to Byte Array Output Stream then receiving byte Array data that ready to transfer by used Byte Array p
Publikováno v:
2016 13th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON).
This paper presents an application of Internet Protocol Options for enhancing self-authenticated feature to the Internet Protocol. The options consist of Keyed-Hash Message Authentication Code and timestamp. In the network access control system, loca
Autor:
Norio Shiratori, Yasushi Kato, Ruttikorn Varakulsiripunth, Suvepon Sittichivapak, Seri Asavaruk
Publikováno v:
IEICE Transactions on Communications. :2578-2587
This paper presents an analysis of the Slotted DS-CDMA system with modified node components in order to construct a load control structure in which the service rates of each node can be dynamically adapted without using feedback information. In contr
Publikováno v:
TENCON 2014 - 2014 IEEE Region 10 Conference.
Throughput is an important parameter that it is used to measure the performance of wireless local network (WLAN). In this research, we proposes a new discrete time Markov chain model to calculate the boundary of saturated and unsaturated throughput e
Publikováno v:
2014 11th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON).
In this paper, we present the analysis of the new transmission algorithm of RFID in form of multichannel which has been developed from frame slotted ALOHA protocol. By using concept of the tag transmission group division which differ in slot access a