Online Multi-camera People Tracking with Spatial-temporal Mechanism and Anchor-feature Hierarchical Clustering
…, W Saetan, V Suttichaya - Proceedings of the …, 2024 - openaccess.thecvf.com
Multi-camera Multi-object tracking (MTMC) surpasses conventional single-camera tracking
by enabling seamless object tracking across multiple camera views. This capability is critical …
by enabling seamless object tracking across multiple camera views. This capability is critical …
Source code plagiarism detection based on abstract syntax tree fingerprintings
V Suttichaya, N Eakvorachai… - 2022 17th International …, 2022 - ieeexplore.ieee.org
Syntax Tree (AST) is an abstract logical structure of source code represented as a tree. This
research utilizes information of fingerprinting with AST to locate the similarities between …
research utilizes information of fingerprinting with AST to locate the similarities between …
Automatic Crack Detection Approach for the Offshore Flare System Inspection
V Suttichaya, C Utintu… - Intelligent Computing and …, 2023 - books.google.com
Asset inspection using unmanned aerial vehicle (UAV) is gaining more attention in surveillance
and exploratory engineering. UAV surveillance enables higher efficiency in terms of …
and exploratory engineering. UAV surveillance enables higher efficiency in terms of …
Analysis on network traffic features for designing machine learning based IDS
N Meemongkolkiat, V Suttichaya - Journal of Physics: Conference …, 2021 - iopscience.iop.org
An intrusion detection system (IDS) is the most important technology for securing network
systems. It can dynamically monitor network traffic for malicious activities that are aimed to …
systems. It can dynamically monitor network traffic for malicious activities that are aimed to …
The Fuzzy Scheduling Algorithm for the Parallel Key Searching Problem on Cloud Environment
P Tubthong, V Suttichaya - 2017 21st International Computer …, 2017 - ieeexplore.ieee.org
Rainbow table is the well-known cryptanalytic method for searching the encryption key or the
plaintext. The user can precompute several lookup tables in order to increase the success …
plaintext. The user can precompute several lookup tables in order to increase the success …
Solving the learning parity with noiseʼs open question
V Suttichaya, P Bhattarakosol - Information Processing Letters, 2013 - Elsevier
The classical cryptographic primitives are constructed on the assumptions that the private
key is securely kept and uniformly distributed. Learning parity with noise is a famous problem …
key is securely kept and uniformly distributed. Learning parity with noise is a famous problem …
Comparison of Corrosion Segmentation Techniques on Oil and Gas Offshore Critical Assets
…, T Tosawadi, P Choppradit, V Suttichaya… - 2023 20th …, 2023 - ieeexplore.ieee.org
Corrosion is one of the biggest problems that can lead to fatal disasters in the industry.
Investigate corrosion and perform timely maintenance on the asset to prevent corrosion issues. …
Investigate corrosion and perform timely maintenance on the asset to prevent corrosion issues. …
Determining Physical Location of Wireless Access Point using Smart Devices
V Suttichaya, TW Liang… - 2018 International Joint …, 2018 - ieeexplore.ieee.org
Indoor Position System (IPS) is a method for locating objects in an enclosed space. This
paper applies the concept of IPS to locate the physical location of wireless access point. The …
paper applies the concept of IPS to locate the physical location of wireless access point. The …
Predicting drug sale quantity using machine learning
W Saena, V Suttichaya - 2019 14th International Joint …, 2019 - ieeexplore.ieee.org
Medication is one of the essential parts of a patient's treatment. Therefore, it is important to
have good medication storage administration in order to have effective medication storage. …
have good medication storage administration in order to have effective medication storage. …
Analyzing SQL injection statements using common substructure of parse tree
W Sirisang, V Suttichaya - 2017 21st international computer …, 2017 - ieeexplore.ieee.org
This paper proposes a SQL injection detection method by analyzing substructure of SQL
statement. The proposed method consists of 2 parts, Automated Common Substructure …
statement. The proposed method consists of 2 parts, Automated Common Substructure …