Chanintorn Jittawiriyanukoon
Assumption University
AlgorithmImage (mathematics)Distributed computingData miningEngineeringLoad balancing (computing)Mean squared errorArtificial intelligenceThroughputNetwork packetQueueLeaky bucketParallel computingIP forwardingConcurrencyFuzzy control systemQueueing theoryParallel processing (DSP implementation)Rate controlComputer networkComputer visionLoose Source RoutingComputer scienceQuality of serviceFuzzy logicBig dataReal-time computingOptical IP Switching
50Publications
4H-index
50Citations
Publications 48
Newest
The IEEE 802.11ay wireless communication standard consents gadgets to link in the spectrum of mm-Wave 60 Giga Hertz band through 100 Gbps bandwidth. The development of promising high bandwidth in communication networks is a must as QoS, throughput and error rates of bandwidth-intensive applications like merged reality (MR), AI related apps or wireless communication boggling exceed the extent of the chronic 802.11 standard established in 2012. Thus, the IEEE 802.11ay task group committee has newl...
Source
Neutrosophic concept is known undirected graph theory to involve with complex logistic networks, not clearly given and unpredictable real life situations, where fuzzy logic malfunctions to model. The transportation objective is to ship all logistic nodes in the network. The logistic network mostly experiences in stable condition, but for some edges found to be volatile. The weight of these erratic edges may vary at random (bridge-lifting/bascule, adhoc accident on road, traffic condition) In thi...
Source
Color image interpolation encompasses reconstructing parts of a video or an image based on information from the neighbor. Technique involves the restoration of noised photos and animation or image denoising. The Navier-Stokes (NS) technique has been widely investigated as an essential research by image restoration. These NS equations contribute spectacular results for producing an animation as they augment reality. They can boost real-time video games to be more sensible than ever. In this paper...
Source
#1Chanintorn Jittawiriyanukoon (Assumption University)H-Index: 4
#1C. Jittawiriyanukoon (Assumption University)
Last. Vilasinee Srisarkun (Assumption University)H-Index: 1
view all 2 authors...
The regular image fusion method based on scalar has the problem how to prioritize and proportionally enrich image details in multi-sensor network. Based on multiple sensors to fuse and manipulate patterns of computer vision is practical. A fusion (integration) rule, bit-depth conversion, and truncation (due to conflict of size) on the image information are studied. Through multi-sensor images, the fusion rule based on weighted priority is employed to restructure prescriptive details of a fused i...
Source
A fundamental factor of digital image compression is the conversion processes. The intention of this process is to understand the shape of an image and to modify the digital image to a grayscale configuration where the encoding of the compression technique is operational. This article focuses on an investigation of compression algorithms for images with artistic effects. A key component in image compression is how to effectively preserve the original quality of images. Image compression is to co...
Source
Cloud system accommodates the computing environment including PaaS (platform as a service), SaaS (software as a service), and IaaS (infrastructure as service) that enables the services of cloud systems. Cloud system allows multiple users to employ computing services through browsers, which reflects an alternative service model that alters the local computing workload to a distant site. Cloud virtualization is another characteristic of the clouds that deliver virtual computing services and imitat...
Source
This research associates three distinct approaches for computer network traffic prediction. They are the traditional stochastic gradient descent (SGD) using a few random samplings instead of the complete dataset for each iterative calculation, the gradient descent algorithm (GDA) which is a well-known optimization approach in Deep Learning, and the proposed method. The network traffic is computed from the traffic load (data and multimedia) of the computer network nodes via the Internet. It is ap...
Source
Purpose: The paper copes with the queueing theory for evaluating a muti-stage production line process with concurrent goods. The intention of this article is to evaluate the efficiency of products assembly in the production line. Design/Methodology/Approach: To elevate the efficiency of the assembly line it is required to control the performance of individual stations. The arrival process of concurrent products is piled up before flowing to each station. All experiments are based on queueing net...
Source
The distribution of scheduler from user inquiries in the clouds is complex. In keeping up with the cloud computing environment and the inquirers, the clouds meet with some problematic load balancing complications as an improving load balancing tool induces the rigorous efficiency of the cloud based website’s user access. Overloaded or underloaded conditions originate processing catastrophe regarding the prolonged execution time, bandwidth hog, malfunction, and etc. Besides, to manipulate Erlang ...
Source
The noise has incited an original data due to a network with an inferior SNR. In case of the bulk noise, the insightful content within the data is substantially squeezed. A cost-effective method will challenge to quarantine the insights, so that information can be utilized more resourcefully. To achieve this aim, it is essential to iron the bulk noise content out, and then calculate the analytics of the clean data. As noise is bulk so some statistical methodologies such as averaging or randomizi...
Source