default search action
Pitikhate Sooraksa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Suppakrit Kirdponpattara, Pitikhate Sooraksa, Veera Boonjing:
Building a Rule-Based Expert System to Enhance the Hard Disk Drive Manufacturing Processes. IEEE Access 12: 29558-29570 (2024) - [j10]Asutosh Kar, S. Shoba, Srikanth Burra, Pankaj Goel, Sanjeev Kumar, Vasundhara, Vladimir Mladenovic, Pitikhate Sooraksa:
Adaptive Tap-Length Based Sub-band Mean M-Estimate Filtering for Active Noise Cancellation. Circuits Syst. Signal Process. 43(9): 5912-5932 (2024) - 2023
- [c13]Dwi Joko Suroso, Panarat Cherntanomwong, Pitikhate Sooraksa:
Fingerprint-based Indoor Localization via Deep Learning. ICECC 2023: 146-152 - 2022
- [j9]Guttikonda Gowtham, Srikanth Burra, Asutosh Kar, Jan Østergaard, Pitikhate Sooraksa, Vladimir Mladenovic, Diego B. Haddad:
A Family of Adaptive Volterra Filters Based on Maximum Correntropy Criterion for Improved Active Control of Impulsive Noise. Circuits Syst. Signal Process. 41(2): 1019-1037 (2022)
2010 – 2019
- 2018
- [j8]Pitikhate Sooraksa, Guanrong Chen:
Chen System as a Controlled Weather Model - Physical Principle, Engineering Design and Real Applications. Int. J. Bifurc. Chaos 28(4): 1830009:1-1830009:12 (2018) - [j7]Napa Sae-Bae, Nasir D. Memon, Pitikhate Sooraksa:
Distinctiveness, complexity, and repeatability of online signature templates. Pattern Recognit. 84: 332-344 (2018) - [i1]Napa Sae-Bae, Nasir D. Memon, Pitikhate Sooraksa:
Distinctiveness, complexity, and repeatability of online signature templates. CoRR abs/1808.03399 (2018) - 2016
- [c12]Pitikhate Sooraksa, Sakda Sakorntanant, Anurak Jansri, Kitdakorn Klomkarn:
Tree robot: An innovation for STEAM education. RCAR 2016: 338-341 - [c11]Kitdakorn Klomkarn, Pitikhate Sooraksa:
A simple chaotic drawing robot: STEAM 2.0. RCAR 2016: 342-345 - 2014
- [c10]Suwilai Phumpho, Poomyos Payakkawan, Anurak Jansri, Direk Tongaram, Chirasak Promprayoon, Pithuk Keattipun, Boonchu Ruengpongsrisuck, Chanachai Punnua, Satree Areejit, Pitikhate Sooraksa:
Anti-copy of 2D Barcode Using Multi-encryption Technique. UIC/ATC/ScalCom 2014: 707-711 - 2013
- [c9]Pham Anh Hung, Kitdakorn Klomkarn, Pitikhate Sooraksa:
Image encryption based on chaotic map and dynamic S-box. ISPACS 2013: 435-439 - 2012
- [j6]Anurak Jansri, Pitikhate Sooraksa:
Enhanced model and fuzzy strategy of air to fuel ratio control for spark ignition engines. Comput. Math. Appl. 64(5): 922-933 (2012) - [c8]Anurak Jansri, Thadchapong Pongsuttiyakorn, Pitikhate Sooraksa:
On practical control of electronic throttle body. FSKD 2012: 349-351 - [c7]Pichate Kunakornvong, Chiewchan Tangkongkiet, Pitikhate Sooraksa:
Defect detection on air bearing surface with luminance intensity invariance. FSKD 2012: 693-696 - 2011
- [j5]Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksa, Masato Terada:
Analysis on the Sequential Behavior of Malware Attacks. IEICE Trans. Inf. Syst. 94-D(11): 2139-2149 (2011) - [j4]Kitdakorn Klomkarn, Pitikhate Sooraksa:
Simple Self-Instructional Modules Based on Chaotic oscillators: Few Blocks Generating Many Patterns. Int. J. Bifurc. Chaos 21(5): 1469-1491 (2011) - [c6]Kraimon Maneesilp, Boontee Kruatrachue, Pitikhate Sooraksa:
Adaptive parameter forecasting for FOREX automatic trading system using fuzzy time series. ICMLC 2011: 189-194 - [c5]Dwi Joko Suroso, Panarat Cherntanomwong, Pitikhate Sooraksa, Jun-ichi Takada:
Fingerprint-based technique for indoor localization in wireless sensor networks using Fuzzy C-Means clustering algorithm. ISPACS 2011: 1-5 - 2010
- [j3]Kitdakorn Klomkarn, Pitikhate Sooraksa, Guanrong Chen:
New Construction of Mixed-Mode Chaotic Circuits. Int. J. Bifurc. Chaos 20(5): 1485-1497 (2010) - [c4]Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksa, Masato Terada:
A discovery of sequential attack patterns of malware in botnets. SMC 2010: 2564-2570
2000 – 2009
- 2004
- [j2]Pitikhate Sooraksa, Guanrong Chen:
On comparison of hybrid fuzzy PI plus conventional D controller versus fuzzy PI+D controller. IEEE Trans. Ind. Electron. 51(1): 238-239 (2004) - [c3]Nitiwat Sanornoi, Pitikhate Sooraksa:
Artificial intelligence based on fuzzy behavior for game programming. Advances in Computer Entertainment Technology 2004: 277-279 - [c2]Montri Chatpoj, Boonchana Purahong, Thossaporn Thossansin, Pitikhate Sooraksa:
Floating robots by fuzzy algorithm. RAM 2004: 292-295 - [c1]Nitiwat Sanornoi, Thossaporn Thossansin, Boonchana Phurahong, Pitikhate Sooraksa:
Hydra Control System. RAM 2004: 1135-1140 - 2002
- [j1]Pitikhate Sooraksa, Thana Pattaradej, Guanrong Chen:
Design and implementation of fuzzy P^2ID controller for handlebar control of a bicycle robot. Integr. Comput. Aided Eng. 9(4): 319-331 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint