Sirapat Boonkrong
King Mongkut's University of Technology North Bangkok
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sirapat Boonkrong.
Archive | 2015
Herwig Unger; Phayung Meesad; Sirapat Boonkrong
This book presents recent research work and results in the area of communicationand information technologies. The book includes the main results of the 11th InternationalConference on Computing and Information Technology (IC2IT) held during July2nd-3rd, 2015 in Bangkok, Thailand. The book is divided into the two main parts DataMining and Machine Learning as well as Data Network and Communications.New algorithms and methods of data mining asr discussed as well as innovativeapplications and state-of-the-art technologies on data mining, machine learning anddata networking.
Archive | 2015
Suwimon Vongsingthong; Sirapat Boonkrong; Mario Kubek; Herwig Unger
Understanding user behavior is an important issue to make any prediction of the resource utilization and the distribution of information in social networks as well as to determine approaches to optimize the networks. Based on the results of surveys, a typical group of users, their behaviors and activities in the online social network Facebook have been analyzed and classified. The results confirm the validity of power laws and small-world properties in various areas of social network systems and will later allow the establishment of useful models for further simulations and investigations in the area of social network mining.
international conference on knowledge and smart technology | 2015
Phakpoom Santisarun; Sirapat Boonkrong
In todays community and social communication, we cannot deny that social network and media play the biggest part in our typical daily life. We can see that more information is displayed on the social media sites. New social media sites have also increased each day. However, when most of the people use a social network, they tend to put in all of their information into the social network profile without knowing any threats that may come to them from the complete stranger who can look at their profile. This is especially the case for children under thirteen who are prone to information stealing and phishing. This research, therefore, designs and implements a new mobile application that will help parents monitor their childrens activities on social network so that any foreseeing threats can be detected before harming their children.
Archive | 2016
Weena Janratchakool; Sirapat Boonkrong; Sucha Smanchat
Threshold cryptography is mostly used in securing the keys, which are the most important element in cryptographic systems. Threshold scheme protects the key by dividing and distributing the key among the entities in the system instead of storing it on a single server. In order to generate the key again, not all the shares are needed. However, there has been no research attempting to find a suitable threshold for any number of shares distributed. The objective of this paper is, therefore, to design and implement a guideline that can assist in choosing such value. The experiment was setup to collecting and observing the time used in distribution and reconstruction process to optimize proper threshold value.
international conference on information technology and electrical engineering | 2015
Sirapat Boonkrong; Pham Cao Dinh
Nowadays, energy saving solutions have become an interesting topic in all fields of technology, including Android mobile devices. Data polling and data pushing techniques are the two methods used by Android mobile devices to gather and retrieve information from the Internet. Due to the limited amount of battery, there is a need for a way that can help reduce the battery consumption. In order to achieve the objective, this paper proposes that data compression known as GZip is applied to the data before it is sent to the Android mobile device. The results show that the amount of battery used to send data is reduced by approximately 65% and 30% for the data polling and pushing techniques, respectively.
Security and Communication Networks | 2014
Sirapat Boonkrong
The Andrew Secure Remote Procedure Call RPC is a protocol that allows two parties to establish a new cryptographic key. The protocol was originally designed to work on the Andrew network of Carnegie Mellon University, USA. Its concept and method can now be used to enhance security of communications on different modules in smart cards, computer networks and the Internet. There have been many varieties of the protocol since it was designed. We questioned whether or not those existing Andrew Secure RPC varieties were really secure and efficient. It is shown in this paper that most of them are indeed not secure, and their efficiency can be improved. We carried out security analyses and experiments to illustrate that our proposed protocol here is more secure and 25% more efficient, in terms of speed, than the others. Copyright
Archive | 2013
Phayung Meesad; Herwig Unger; Sirapat Boonkrong
This volume contains the papers of the 9th International Conference on Computing and Information Technology (IC2IT 2013) held at King Mongkuts University of Technology North Bangkok (KMUTNB), Bangkok, Thailand, on May 9th-10th, 2013. Traditionally, the conference is organized in conjunction with the National Conference on Computing and Information Technology, one of the leading Thai national events in the area of Computer Science and Engineering. The conference as well as this volume is structured into 3 main tracks on Data Networks/Communication, Data Mining/Machine Learning, and Human Interfaces/Image processing.
Archive | 2013
Kittipong Suwannaraj; Sirapat Boonkrong
Selecting the outbound call route on IP-PBX phone system using Fixed Channel Technique and Pattern Matching has been found that both methods are not able to choose the outbound route through mobile phone service providers, and cause high traffic between GSM network operators. Therefore, this research proposed a using of Unstructured Supplementary Service Data or USSD technique. The experiment was carried out by using Asterisk Server as an IP-PBX system, which was connected with Sim3000CZ Micro Controller board to select the route. The results of this research show that this method can select the outbound call route correctly and efficiently as well as reduce the traffic between the networks. Furthermore, it can greatly reduce the overhead when calling an external network. Therefore, we claim that this is a more suitable technique for the call route selection.
Information Technology Journal | 2012
Sirapat Boonkrong
Walailak Journal of Science and Technology (WJST) | 2016
Suwimon Vongsingthong; Sirapat Boonkrong; Herwig Unger