Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Punnarumol Temdee is active.

Publication


Featured researches published by Punnarumol Temdee.


Wireless Personal Communications | 2014

Ubiquitous Learning Environment: Smart Learning Platform with Multi-Agent Architecture

Punnarumol Temdee

Ubiquitous learning (u-learning) has become popular nowadays in education area. The key factor of u-leaning is that the learners are situated in a context-aware learning environment and they may not even be conscious of the learning process. This paper aims to develop the ubiquitous learning environment (ULE) being able to provide the content to the learners appropriately and adaptively. The developed ULE consists of several leaning objects (LOs) having the multi-agent architecture to achieve adaptability. Each LO consists of three different agents coordinating together including a personal agent for keeping the users’ profiles and their historic actions, a content agent for selecting LO to the learners, and a representation agent for presenting the content to the learners. Two empirical studies are conducted in this paper including architecture and learning mode empirical study. For both empirical studies, the learning efficiency enhancement and students’ satisfaction in terms of functionality and adaptability are evaluated. The results show that the developed ULE with multi agent architecture can enhance the students’ learning efficiency significantly for both individual and collaborative learning modes. Additionally, the students satisfy their learning through the developed ULE in the “satisfied” level in terms of functionality and adaptability for both empirical studies.


International Journal of Production Research | 2017

A group signature based buyer coalition scheme with trustable third party

Laor Boongasame; Punnarumol Temdee; Farhad Daneshgar

Despite the large number of existing buyer coalition schemes and increasing need for trusting relationship in buyer coalitions, no current buyer coalition scheme explicitly addresses trust issues within these schemes in a formalised manner. Without establishing a trusting relationships among various roles, many buyers may not be willing to join the coalitions. This study proposes a solution, in the form of an algorithmic design, as a response to the above need. Specific features of the proposed solution are: (i) the use of ‘group signature’ in order to guarantees anonymity within a group that results in trustfulness of the relationships and (ii) introducing a new role called ‘authority’ to maintain and implement anonymity. In addition, the proposed scheme is capable of maintaining ‘correctness’ and ‘accountability’ by both identifying misbehaved buyers as well as implementing various punishment methods.Knowledge domain of the study is the common space between three overlapping fields including Electronic Commerce, Communication Technologies and Information Systems.


Vitae-revista De La Facultad De Quimica Farmaceutica | 2014

Determining of compatible different attributes for online mentoring model

Pratya Nuankaew; Punnarumol Temdee

Online mentoring is nowadays become popular because it can be used in various applications. Particularly in education area, the mentoring generally means the interactions between the teachers as the mentors and the students as the mentees. In order to work together successfully, this paper believes that not only some common attributes between the mentor and the mentee are required but also some compatible different attributes. This paper thus proposes the attributes for online monitoring model named compatible different attributes. There are 2 sets of compatible different attributes including mentee and mentor attributes. Both sets are represented in different size of matrix elements. The objective of this paper is thus to study to which extent the proposed compatible different attributes can be used for online mentoring model. The empirical study is conducted with 74 lectures and 588 students from Faculty of Information and Technology, Rajabhat Maha Sarakham University. They are asked to complete the survey questionnaire to obtain the satisfaction value. Consequently, the satisfaction results show that the proposed attributes can reasonably be used for online monitoring model.


Wireless Personal Communications | 2017

Social Context-Aware Recommendation for Personalized Online Learning

Wacharawan Intayoad; Till Becker; Punnarumol Temdee

Abstract The integration of ICT in teaching and learning enables the paradigm shift for education system by creating a possibility for learner to learn anywhere and anytime through variety of communication system. To enhance effective learning for a large number of learners, online learning requires effective personalized learning method. For decades, recommendation system is responsible for providing personalized learning to the learners by considering several related learners information such as individual characteristic, learning style, and knowledge background. With context aware computing perspective, this paper thus proposes the context-aware recommendation system to promote effective personalized online learning for each learner individually. Instead of employing ordinary individual context, this paper focuses also on the social context which is the interaction between learning objects and the learners. The gathered social context is classified with K-nearest neighbor and decision tree for classifying appropriate types of learners. Consequently, the appropriate learning paths are recommended by using association rule. The empirical study is conducted with the learners having scientific and non-scientific backgrounds studying in two different content modules of basic computer skill course. The results show that the proposed social context-aware recommendation system is able to provide acceptable classification accuracies from both classifiers. Additionally, the proposed system is potentially able to recommend appropriate learning path to different group of learners.


Artificial Life and Robotics | 2016

Agent-based modeling of collaborative interaction in ubiquitous learning environment using local dynamic behavior

Punnarumol Temdee

This paper focuses on modeling collaborative interaction in Ubiquitous Learning Environment (ULE) based on the assumption that the collaborative interaction can be perceived through interpersonal interactions, which can be described as local dynamic behaviors of the team. In this paper, the collaborative interaction is collected from the experiment with 50 students having 5 members per team. Then the collaborative interaction is coded with 16 participation shift (P-shifts) from 5 different types of turns including turn receiving, turn claiming, turn usurping, turn continuing, and turn noreturning to represent the participation status of each member. Three types of participation statuses used in this paper are the contributor, the target and the unaddressed recipient. Then the discovered local dynamic behavior is used for constructing the model by using agent-based modeling. The model consists of student agents working together according to the discovered behavior. Then, the constructed model is verified by comparing the actual behavior with the simulated behavior. Finally, the comparison result shows that the constructed model can reasonably be the model for modeling collaborative interaction in ULE.


Wireless Personal Communications | 2015

Online Mentoring Model by Using Compatible Different Attributes

Pratya Nuankaew; Punnarumol Temdee

This paper proposes the compatible different attributes for online mentoring model based on the assumption that the mentor and the mentee are able to work successfully not only because of some common attributes between them but also some compatible different attributes between them. There are two sets of compatible different attributes proposed in this paper including mentee and mentor attributes. Both sets are represented in different size of matrix elements having some common factors and some different factors. The common factors are ability and skill for both mentor and mentee attributes. Additionally, the different factor for mentee attribute is motivation in learning and the different factors for mentor attribute are experience, knowledge, and effectiveness. The objective of this paper is to study to what extent the proposed compatible different attributes can be used for online mentoring model. The empirical study is conducted with 250 mentees and 46 mentors from Mae Fah Luang University, University of Phayao, Chiang Rai Rajabhat University, and Rajabhat Maha Sarakham University. They are asked to complete the survey questionnaire for determining the satisfaction to the individual factors and overall attributes. Additionally, other 205 mentees and 32 mentors are asked to determine the satisfaction to a specific condition of the proposed attributes. The results show that the proposed compatible different attributes are agreed to be used as the mentor and mentee attributes for online mentoring model.


Vitae-revista De La Facultad De Quimica Farmaceutica | 2014

Modeling of student and learning object interactions toward ubiquitous learning environment

Punnarumol Temdee

This paper focuses on modeling the interaction between the learners and the learning objects in the ubiquitous learning environment for personalization support. The empirical study is conducted with 30 students from School of Information Technology, Mae Fah Luang University, Chiang Rai, Thailand enrolling Artificial Intelligence subject for gathering the interaction data. Then, the interaction data is analyzed and explained by the measurement of Social Network Analysis. Consequently, the model is constructed by agent based modeling according to the measured interactions. The constructed model is verified in order to compare the similarity between the interactions of the real learners and the simulated agents to the learning objects. Consequently, the experiment with 20 students and the simulation with 20 simulated agents are conducted for verifying the constructed model. Finally, the results show that the constructed model can reasonably provide the accurate interaction model between the learners and the learning objects in ubiquitous learning environment.


international symposium on communications and information technologies | 2013

Inventory cloud service for local SME: A scenario study for Ice cream factory

Wacharawan Intayoad; Punnarumol Temdee

The value of the information system is high. It creates the competitive advantage by supporting the business processes. However, system implementation is relatively high because the systems is required the IT resources for implementation and maintenance, such as the infrastructures and the IT experts. Therefore, the cloud service could be a potential solution for the SMEs, in Thailand, especially would be very helpful in the rural area, where the internet is available. The inventory system is very important for the factory which helps reducing cost and gaining the competitive advantage. And the inventory systems are also very common used in the SMESs. Therefore, the Ice cream factory which is a medium-sized plant and located in the rural area in the north of Thailand, Chiang Rai has been chosen as the scenario in this paper. Currently, the factory uses the inventory system which based on web-application technology. The companys size and location is the main problem that it cannot get the good service and the utilization of the information system is not effective. The detailed behind the cloud computing service framework is discussed in this paper. Furthermore, a scenario is presented to analyse the cloud service framework by adapting the ATAM method to evaluate the framework. The results of the scenario study provided the utility tree, quality attributes; scalability, reliability and usability, sensitive point and trade-off points for the inventory cloud service framework.


Archive | 2018

Security for Context-Aware Applications

Punnarumol Temdee; Ramjee Prasad

With the advance of wireless technology, the contexts are transmitted through fast and efficient communication method. All computing activities occur around the users obtrusively. To satisfy context-aware applications, it is tough to maximize functionality but remains strong security at the same time. This chapter introduces the principle concept of security required for context-aware applications. The security, in general, is firstly introduced. Some security attacks and countermeasures are reported. Some security recommendations for context-aware applications and the existing security protocols are also discussed in this chapter. The ultimate goal of this chapter is to promote sense of security awareness for the readers who can be both the developers and the users.


Archive | 2018

Context-Aware Middleware and Applications

Punnarumol Temdee; Ramjee Prasad

This chapter focuses on reporting some context-aware middleware and applications impacting the variety of application domains of context-aware computing for decades so that the readers will be able to utilize this kind of application appropriately. However, the main focus is on smart environments such as smart home, and personalized environments. At the end of this chapter, the future trends in smart environments for healthcare and education domains are suggested based on the evolution of existing works and some significant concerns.

Collaboration


Dive into the Punnarumol Temdee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kosin Chamnongthai

King Mongkut's University of Technology Thonburi

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dago Tshering

Mae Fah Luang University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tejtasin Phiasai

King Mongkut's University of Technology Thonburi

View shared research outputs
Top Co-Authors

Avatar

Farhad Daneshgar

University of New South Wales

View shared research outputs
Researchain Logo
Decentralizing Knowledge