Suan Luang, Thailand
Suan Luang, Thailand

Time filter

Source Type

Monsakul A.,Thai Nichi Institute of Technology
IEICE Transactions on Communications | Year: 2016

Designing a backbone IP network, especially to support both unicast and multicast traffic under delay constraints, is a difficult problem. Real network design must consider cost, performance and reliability. Therefore, a simulator can help a network designer to test the functionality of the network before the implementation. This paper proposes a heuristic design algorithm called D-MENTOR, and the algorithm was developed by programming based on Mesh Network Topological Optimization and Routing Version 2 (MENTOR-II) to integrate as a new module of DElite tool. The simulation results show that, in almost all test cases, the proposed algorithm yields lower installation cost. Copyright © 2016 The Institute of Electronics, Information and Communication Engineers.

Kaewkiriya T.,Thai Nichi Institute of Technology
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2015

One of the problems of learners is learners do not know their own skills. Especially learners who study IT field will have different aptitudes. If learners do not know their aptitude will affect themselves such as learning without a goal, and so on. The objective of this research is to design of conceptual framework for students recommendation for Information Technology skills. The concept framework consists of five modules. (1) to introduce the pattern base module which is an analysis by data mining. (2) to explain the mapping module for students. (3) to present the forecasting module which connect to the mapping module. (4) to present the web portal module. Web portal module is the User interface (UI) to connect user with system application. (5) to describe the Information Technology skills. This module consists of four parts; (1) programming skills (2) System engineering and network engineering (3) Graphic designs (4) other skills. Information Technology skills are mapped by using Multiple Intelligence theory. The process of selection pattern base, is use to compare the algorithm which is consisted of three algorithms (1) ID3 algorithm (2) J48 algorithm (3) Bayes Net algorithm. J48 algorithm is the highest percentage of prediction. Percentage of prediction for J48 algorithm is 78.267 % which base on pattern base for recommendation systems. © Springer International Publishing Switzerland 2015.

Tamtrakarn A.,Thai Nichi Institute of Technology
IEEE Region 10 Annual International Conference, Proceedings/TENCON | Year: 2016

This paper presents a compact architecture of portable functional electrical stimulator (FES) together with a level-shifting digital inverter. The presented architecture is composed of boost converter block with compact limiter circuit. The bi-phasic pulse generation is made from H-bridge switches with the boosted voltage from the boost converter block. The H-bridge switches are controlled by a level-shifting inverter which is composed of only four MOSFET devices with two capacitors. The clocking scheme for minimize power consumption is also a key point for reducing average power consumption in this work. The simulation results from LTSpice IV show that the presented stimulator can generate stimulating bi-phasic pulses with approximately +/-21V amplitude in voltage and constantly supply +/-19.2mA current to the load. The simulated bi-phasic pulse has pulse width of 326μs with frequency of 28.6Hz. The presented system can be operated under a single 6V supply voltage and the average power consumption is 117mW at stimulating frequency of 28.6Hz which can continuously operate under two CR2032 batteries for more than 11 hours. With this level of power consumption, the presented work is very suitable for using as a portable stimulator. © 2015 IEEE.

Gosumbonggot J.,Thai Nichi Institute of Technology
IEEE Region 10 Annual International Conference, Proceedings/TENCON | Year: 2016

The barrier of genders in global society has been reduced. Female has opportunities to choose more various occupations, especially in engineering. Although, number of female engineers in Thailand still exists, however; in the past five years, there exist the reductions of female engineers in Thai society. This paper represents the overall image of female engineers in Thai society since they were prospective engineering students and after graduation working as professional engineers. Occurred problems are relevant to a gender gap in engineering, trustworthy and physical limitation. Rationally, there are possible ways to enhance more number of female engineers, using some ideas from developed countries include giving support to educational sectors, enhance the research and development area and establish more recognition and awards. The problem could not be solved in certain amount of time; society should play the important role to increase the numbers of Thai female engineers. © 2015 IEEE.

Limjeerajarus N.,Thai Nichi Institute of Technology | Charoen-Amornkitt P.,Thai Nichi Institute of Technology
International Journal of Hydrogen Energy | Year: 2015

An improper designed flow field of a polymer electrolyte fuel cell (PEFC) can cause the maldistributions, resulting in the reduction of PEFC performance and lifetime. Although there are several researches investigating the effect of flow field design, the parallel in series flow fields have, however, received a very low attention. In this study, a numerical investigation on the distributions in six different flow field designs over 5 cm2 PEFC has been systematically carried out using CFD techniques via ANSYS FLUENT software to study the effect of different flow field configurations and number of channels. The results revealed that, for a small-size PEFC, the flow fields with less number of channels provided both a better uniformity and cell performance. Although the number of channels affects the small-size PEFC performance much greater than the flow field geometric configurations, the further investigation revealed that the influence of configurations will be greater as the number of channels increases. In addition, with the same number of channels, the parallel in series flow fields performed better than the multi-channel serpentine flow fields in both uniformity and water management aspects as their geometry provided higher reactant flow velocity. © 2015 Hydrogen Energy Publications, LLC. Published by Elsevier Ltd. All rights reserved.

Benjaboonyazit T.,Thai Nichi Institute of Technology
Engineering Journal | Year: 2014

This paper presents a systematic approach to arowana gender identification problem using algorithm of inventive problem solving (ARIZ). Arowana is a beautiful and expensive fish. Many farms try to improve their efficiency in breeding arowana, but the problem is that arowana is monomorphic, which makes it difficult to distinguish male from female just from their appearance. This causes difficulties in mating and selling of arowana. Many trial-and-error methods have been used with little success. The problem of arowana gender identification cannot be solved easily with the psychological methods such as brainstorming or trial and error, it needs a more logical and well-structured method of problem solving. In this paper, ARIZ is used to systematically analyze the problem and search for possibilities to identify the gender of arowana step by step, and finally, among 32 ideas generated, some potential solutions have been evaluated and compared with the commonly used methods with satisfactory results which demonstrate the effectiveness of ARIZ as a powerful innovative problem solving tool.

Metkarunchit T.,Thai Nichi Institute of Technology
2016 5th International Conference on Modern Circuits and Systems Technologies, MOCAST 2016 | Year: 2016

Discrete Fourier transform spread orthogonal frequency division multiplexing (DFTs-OFDM) has recently attacked much interest in research and developments on wireless communication systems. The combination of direct sequence code division multiple access (DS-CDMA) and DFTs-OFDM potentially offers the degradation of bit error rate (BER) performance as indicated in literatures. This paper presents the causes of such degradation on BER performance through the analysis of cross-correlation between Walsh Hadamard (WH) spread and DFT-spread, which produces destructive interference to a subcarrier. The new proposed interleaving spreading code technique is simple and can address the problem. Simulation results reveal that the combined DFTs-OFDM and DS-CDMA can potentially enhance the BER performance as those existing DFTs-OFDM system. © 2016 IEEE.

Srichavengsup W.,Thai Nichi Institute of Technology
Proceedings - 2015 IEEE 12th International Symposium on Autonomous Decentralized Systems, ISADS 2015 | Year: 2015

In shared wireless communication channel, the collision occurs when multiple users transmit the packet simultaneously. Tree algorithm has been proposed to resolve the collision. However, tree algorithm may suffer from high delay when the number of users gets large due to the collisions cause by too many users attempting to access the limited slots. To enhance the system delay of the tree algorithm, in this paper we introduce a Re-split mechanism that can be utilized in conjunction with the tree algorithm. As can be seen from the results that under heavy loads, the proposed mechanism offers better performance compared to the existing tree algorithm in terms of average delay, which signifies that the Re-split mechanism can be used to enhance the efficiency of the tree algorithm. © 2015 IEEE.

Wilaisakoolyong N.,Thai Nichi Institute of Technology
2016 3rd International Conference on Digital Information Processing, Data Mining, and Wireless Communications, DIPDMWC 2016 | Year: 2016

In 2016, Thailand had integrated with the ASEAN Economic Community (AEC). This causes technological competition increasing. Information Technologists are particularly important in this competition. The main aim of this research presents the essential features and characteristics of Information Technologists that were desired by the enterprises. Population of the study were the enterprises which run a business in Thailand. Samples of the research were 139 enterprises which were random selected. The samples comprise of 83 Thai enterprises and 56 foreign enterprises. The statistics employed for analyzing the data were mean, standard deviation and independent t-test. The research results show that enterprises need Information Technologists who have four essential features. These are Knowledge and Abilities' Characteristics, Management's Characteristics, Information Technology Skill's Licenses, Ethics and Moral's Characteristics. If Information Technologists have these features and characteristics, they will be desired by enterprises. Entrepreneurs are confident that they can work more efficiently. © 2016 IEEE.

Srichavengsup W.,Thai Nichi Institute of Technology
International Conference on ICT Convergence 2015: Innovations Toward the IoT, 5G, and Smart Media Era, ICTC 2015 | Year: 2015

Radio-frequency identification (RFID) is employed for the objectives of automatically tracing and identifying the tags placed on the objects. The tags transmit their identification (ID) codes to the reader during the identification procedure and tag collision occurs when more than one tag send data to a reader simultaneously. In order to alleviate the collision problem, the EPC-Gen 2 standard uses an anti-collision protocol, known as Q algorithm, which defines that all tags shall have the capability to generate random number between 0 and 2Q-1 using a random number generator (RNG) and a 15-bit slot counter. The RFID reader can transmit a command to tags to change the Q value in order to effectively support varying load levels. After receiving the adjust command, tags will change the value of Q and then generate a new random number. In this paper, we consider the problem of malfunctioned tags when some tags violate the agree rules by not increasing the value of Q in order to achieve better delay performance than the normal tags. Simulation results show that at large number of malfunctioned tags the overall delay performance clearly degrades. Finally when comparing between the normal tags and the malfunction tags we found that the malfunctioned tags have the delay advantage over the normal tags due to a higher opportunity to be identified at the early stage of identification procedure. © 2015 IEEE.

Loading Thai Nichi Institute of Technology collaborators
Loading Thai Nichi Institute of Technology collaborators