Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sirapat Boonkrong is active.

Publication


Featured researches published by Sirapat Boonkrong.


Archive | 2015

Recent Advances in Information and Communication Technology 2015

Herwig Unger; Phayung Meesad; Sirapat Boonkrong

This book presents recent research work and results in the area of communicationand information technologies. The book includes the main results of the 11th InternationalConference on Computing and Information Technology (IC2IT) held during July2nd-3rd, 2015 in Bangkok, Thailand. The book is divided into the two main parts DataMining and Machine Learning as well as Data Network and Communications.New algorithms and methods of data mining asr discussed as well as innovativeapplications and state-of-the-art technologies on data mining, machine learning anddata networking.


Archive | 2015

On the Distributions of User Behaviors in Complex Online Social Networks

Suwimon Vongsingthong; Sirapat Boonkrong; Mario Kubek; Herwig Unger

Understanding user behavior is an important issue to make any prediction of the resource utilization and the distribution of information in social networks as well as to determine approaches to optimize the networks. Based on the results of surveys, a typical group of users, their behaviors and activities in the online social network Facebook have been analyzed and classified. The results confirm the validity of power laws and small-world properties in various areas of social network systems and will later allow the establishment of useful models for further simulations and investigations in the area of social network mining.


international conference on knowledge and smart technology | 2015

Social network monitoring application for parents with children under thirteen

Phakpoom Santisarun; Sirapat Boonkrong

In todays community and social communication, we cannot deny that social network and media play the biggest part in our typical daily life. We can see that more information is displayed on the social media sites. New social media sites have also increased each day. However, when most of the people use a social network, they tend to put in all of their information into the social network profile without knowing any threats that may come to them from the complete stranger who can look at their profile. This is especially the case for children under thirteen who are prone to information stealing and phishing. This research, therefore, designs and implements a new mobile application that will help parents monitor their childrens activities on social network so that any foreseeing threats can be detected before harming their children.


Archive | 2016

Finding an Optimal Parameter for Threshold Cryptography

Weena Janratchakool; Sirapat Boonkrong; Sucha Smanchat

Threshold cryptography is mostly used in securing the keys, which are the most important element in cryptographic systems. Threshold scheme protects the key by dividing and distributing the key among the entities in the system instead of storing it on a single server. In order to generate the key again, not all the shares are needed. However, there has been no research attempting to find a suitable threshold for any number of shares distributed. The objective of this paper is, therefore, to design and implement a guideline that can assist in choosing such value. The experiment was setup to collecting and observing the time used in distribution and reconstruction process to optimize proper threshold value.


international conference on information technology and electrical engineering | 2015

Reducing battery consumption of data polling and pushing techniques on Android using GZip

Sirapat Boonkrong; Pham Cao Dinh

Nowadays, energy saving solutions have become an interesting topic in all fields of technology, including Android mobile devices. Data polling and data pushing techniques are the two methods used by Android mobile devices to gather and retrieve information from the Internet. Due to the limited amount of battery, there is a need for a way that can help reduce the battery consumption. In order to achieve the objective, this paper proposes that data compression known as GZip is applied to the data before it is sent to the Android mobile device. The results show that the amount of battery used to send data is reduced by approximately 65% and 30% for the data polling and pushing techniques, respectively.


Security and Communication Networks | 2014

A more secure and efficient Andrew Secure RPC protocol

Sirapat Boonkrong

The Andrew Secure Remote Procedure Call RPC is a protocol that allows two parties to establish a new cryptographic key. The protocol was originally designed to work on the Andrew network of Carnegie Mellon University, USA. Its concept and method can now be used to enhance security of communications on different modules in smart cards, computer networks and the Internet. There have been many varieties of the protocol since it was designed. We questioned whether or not those existing Andrew Secure RPC varieties were really secure and efficient. It is shown in this paper that most of them are indeed not secure, and their efficiency can be improved. We carried out security analyses and experiments to illustrate that our proposed protocol here is more secure and 25% more efficient, in terms of speed, than the others. Copyright


Archive | 2013

The 9th International Conference on Computing and InformationTechnology (IC2IT2013)

Phayung Meesad; Herwig Unger; Sirapat Boonkrong

This volume contains the papers of the 9th International Conference on Computing and Information Technology (IC2IT 2013) held at King Mongkuts University of Technology North Bangkok (KMUTNB), Bangkok, Thailand, on May 9th-10th, 2013. Traditionally, the conference is organized in conjunction with the National Conference on Computing and Information Technology, one of the leading Thai national events in the area of Computer Science and Engineering. The conference as well as this volume is structured into 3 main tracks on Data Networks/Communication, Data Mining/Machine Learning, and Human Interfaces/Image processing.


Archive | 2013

Outbound Call Route Selection on IP-PBX Using Unstructured Supplementary Service Data

Kittipong Suwannaraj; Sirapat Boonkrong

Selecting the outbound call route on IP-PBX phone system using Fixed Channel Technique and Pattern Matching has been found that both methods are not able to choose the outbound route through mobile phone service providers, and cause high traffic between GSM network operators. Therefore, this research proposed a using of Unstructured Supplementary Service Data or USSD technique. The experiment was carried out by using Asterisk Server as an IP-PBX system, which was connected with Sim3000CZ Micro Controller board to select the route. The results of this research show that this method can select the outbound call route correctly and efficiently as well as reduce the traffic between the networks. Furthermore, it can greatly reduce the overhead when calling an external network. Therefore, we claim that this is a more suitable technique for the call route selection.


Information Technology Journal | 2012

Security of Passwords

Sirapat Boonkrong


Walailak Journal of Science and Technology (WJST) | 2016

Modeling Network Evolution by Colored Petri Nets

Suwimon Vongsingthong; Sirapat Boonkrong; Herwig Unger

Collaboration


Dive into the Sirapat Boonkrong's collaboration.

Top Co-Authors

Avatar

Phayung Meesad

King Mongkut's University of Technology North Bangkok

View shared research outputs
Top Co-Authors

Avatar

Suwimon Vongsingthong

King Mongkut's University of Technology North Bangkok

View shared research outputs
Top Co-Authors

Avatar

Sucha Smanchat

King Mongkut's University of Technology North Bangkok

View shared research outputs
Top Co-Authors

Avatar

Weena Janratchakool

King Mongkut's University of Technology North Bangkok

View shared research outputs
Top Co-Authors

Avatar

Kittipong Suwannaraj

King Mongkut's University of Technology North Bangkok

View shared research outputs
Top Co-Authors

Avatar

Phakpoom Santisarun

King Mongkut's University of Technology North Bangkok

View shared research outputs
Top Co-Authors

Avatar

Pham Cao Dinh

King Mongkut's University of Technology North Bangkok

View shared research outputs
Researchain Logo
Decentralizing Knowledge