International Journal Publications : Year 2018

1 . An efficient coverage hole-healing algorithm for area-coverage improvements in mobile sensor networks

Peer to Peer Networking and Application, 12,

Department : Computer Science


2 . Tackling Regional Public Health Issues Using Mobile Health Technology: Event Report of an mHealth Hackathon in Thailand

JMIR mHealth and uHealth., 5,

Athanasethpong A. Soomlek C. Morley K. Morley M. Polpinit P. Dagan A. Weis J.W. Celi L.A.

Department : Computer Science


3 . Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks with NOMA and SWIPT over Nakagami-m Fading

IEEE Access, 6,

D. Tran, D. Ha, V. N. Vo, C. So-In, H. Trung, T. G. Nguyen, Z. A. Baig, and S. Sanguanpong

Department : Computer Science


4 . Mutation-Based Harmony Search Algorithm for Hybrid Testing of Web Service Composition

Computational Intelligence and Neuroscience, ,

Eckwijai Maythaisong and Wararat Songpan

Department : Computer Science


5 . Lagrangian Duality with ELM for Word Sense Multiprototype Discovery

Applied Artificial Intelligence , 32, 979-990

Liang P, Wongthanavasu S

Department : Computer Science


6 . A Two-Level Intelligent Web Caching Scheme with Hybrid Extreme Learning Machine and Least Frequently Used

Journal of Internet Technology, 19, 725-740

P. Aimtongkham, C. So-In, S. Sanguanpong, and S. Permpol

Department : Computer Science


7 . Congestion Control and Prediction Schemes using Fuzzy Logic System with Adaptive Membership Function in Wireless Sensor Networks

Wireless Communications and Mobile Computing , 2018,

P. Aimtongkham, T. G. Nguyen, and C. So-In

Department : Computer Science


8 . Estimating Vegetation Canopy Density in the Lower Chi Basin, Northeast, Thailand Using Landsat Data

International Journal of Applied Engineering Research, 13, 3215-3219

Pladsrichuay S, Suwanwerakamtorn R, Pannucharoenwong, N

Department : Computer Science


9 . Isarn Dialect Speech Synthesis using HMM with syllable-context features

ECTI TRANSACTIONS ON COMPUTER AND INFORMATION TECHNOLOGY (ECTI-CIT), 12,

Pongsathon Janyoi and Pusadee Seresangtakul

Department : Computer Science


10 . A Hybrid Model using Fuzzy Logic and an Extreme Learning Machine with Vector Particle Swarm Optimization for Wireless Sensor Network Localization

Applied Soft Computing , 65, 101-120

S. Phoemphon, C. So-In, and D. Niyato

Department : Computer Science


11 . A Hybrid Model using Fuzzy Logic and an Extreme Learning Machine with Vector Particle Swarm Optimization for Wireless Sensor Network Localization

Applied Soft Computing , 65,

S. Phoemphon, C. So-In, and D. Niyato

Department : Computer Science


12 . Fuzzy Weighted Centroid Localization with Virtual Node Approximation in Wireless Sensor Networks

IEEE Internet of Things Journal , 5,

S. Phoemphon, C. So-In, and N. Leelathakul

Department : Computer Science


13 . Optimized Hop Angle Relativity for DV-Hop Localization in Wireless Sensor Networks

IEEE Access, 6,

S. Phoemphon, C. So-In, and N. Leelathakul

Department : Computer Science


14 . An Enhanced Wireless Sensor Network Localization Scheme for Radio Irregularity Models using Hybrid Fuzzy Deep Extreme Learning Machines

Wireless Network, 24, 799-819

S. Phoemphon, C. So-In, and T. G. Nguyen

Department : Computer Science


15 . Filtered book features with Artificial Neural Network: A Case Study of the Ban Nong Saeng Samakkee Book of the AMSS ++ System Office of Khon Kaen Primary Education Area 5

Kasem Bundit Engineering Journal , 2018,

Sangkaphat Khampong, Urachart Kokaew

Department : Computer Science


16 . An Energy-Efficient Point Coverage-Aware Clustering Protocol in Wireless Sensor Networks

International Journal of Ad Hoc and Ubiquitous Computing, 28, 148-167

T. G. Nguyen and C. So-In

Department : Computer Science


17 . Distributed Deployment Algorithm for Barrier Coverage in Mobile Sensor Networks

IEEE Access , 6, 21042-21052

T. G. Nguyen and C. So-In

Department : Computer Science


18 . Secrecy Performance Analysis for Fixed Gain Energy Harvesting in Internet of Things with Untrusted Relays

IEEE Access , 6,

V. N. Vo, D. D. Tran, C. So-In, and H. Trung

Department : Computer Science


19 . Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks With a Jammer Using Relay Selection Strategy

IEEE Access , 6, 23406-23419

V. N. Vo, T. G. Nguyen, C. So-In, Z. Baig, and S. Sanguanpong

Department : Computer Science


20 . Prediction of Revisit of Repeated Attempted-Suicide Patients

Information Technology Journal, 14,

Vichianchai, V., Kasemvilas, S., Kaewhao, S.&.Youdkang, O.

Department : Computer Science


21 . Prediction of Revisit of Repeated Attempted-Suicide Patients

Information Technology Journal , 14,

Vuttichai Vichianchai, Sumonta Kasemvilas, Sakarin Kaewhao, Orapin Youdkang

Department : Computer Science


22 . Redundant Association-rule Mining Reduction for Rosewood Crime Arrest Planning

JP Journal of Heat and Mass Transfer Special Volume, Issue I, Advances in Mechanical System and ICT-convergence, ,

Wararat Songpan Ngamnij Arch-in and Rit Loaphanom

Department : Computer Science